1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tom [10]
3 years ago
8

The general syntax for the function prototype to overload the assignment operator = for a class is ____.a. friend className&

operator=(const className&);b. const className& operator=(const className&);c. className& operator=(className&);d. string className& operator=(className&);
Computers and Technology
1 answer:
dsp733 years ago
4 0

Answer:

Option (B) is the correct answer to the following question.

Explanation:

Here, in the code "const" is the constant keyword which is used when we need that the value stored in that variable will never change.

The following option is correct because the assignment operator are those operator which initialize the value in the variable and overloading of the assignment operator would be as we use the other operators and also we could use them by creating the objects as we use in the copy constructor.

So, that's why the following option is correct.

You might be interested in
An employee has contacted the IT Support call center where you work. They are complaining that they are unable to access any web
TEA [102]

Answer:

C

Explanation:

Remember the question says LEAST LIKELY. The questions states that internal web servers work but external ones do not. If wireless were the issue nothing would work at all. The issue is more likely to be related to external DNS, a firewall or an issue with the proxy used to connect outside the local network.

3 0
3 years ago
A trust domain is defined as Select one: a. The agreed upon, trusted third party b. A scenario where one user needs to validate
soldier1979 [14.2K]

Answer:

A construct of systems, personnel, applications, protocols, technologies, and policies that work together to provide a certain level of protection

Explanation:

Creation of dynamic Trust Domains can be realized through collaborative, secure sharing solutions. The local system is able to trust a domain to authenticate users. If an application or a user is authenticated by a trusted domain, all domains accept the authenticating domain. For instance, if a system trust domain X, it will also trust all domains that domain X trusts. It is a two-way trust relationship and is transitive.

7 0
3 years ago
Read 2 more answers
What is the first step you should take when you want to open a savings account?
pav-90 [236]
 First Go to the bank
Second Present Photo ID
 third Fill out application

I would think review the different savings account options that your bank offers...

Last Make initial deposit.



Hope that helps!!!

.
5 0
3 years ago
What does the<br> command do
I am Lyosha [343]
Please specify your question.
6 0
3 years ago
True or false, cloud storage does not require internet access?
Dmitry_Shevchenko [17]
False, the storage is being accessed from the cloud which can only be accessed through an internet connection.
3 0
4 years ago
Other questions:
  • Based on the relational model, create the database metadata as part the physical designphase.b)from the metadata, write the sql
    10·1 answer
  • Negative methods of behavior correction include all but this:
    9·1 answer
  • In c++ when you create a class and you don't want to put the class and the main program in one source file and let's say you cre
    14·1 answer
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. (1) The given p
    14·1 answer
  • In a fully underwritten offering a firm sells 1 million shares of stock through a fully underwritten offering. Their banker char
    10·1 answer
  • To answer the research question "How am I going to find the information I need on the tople?" the best thing Georgia should
    15·1 answer
  • HELP PLEASE!!!
    7·1 answer
  • 30 pts!<br> Explain how Moore's law presumes everyone will have access to the Internet.
    14·1 answer
  • what is cicada 3301? i will give brainliest if you give me a correct answer (not copy and pasted) and somewhat well detailed, i
    8·1 answer
  • an attacker is attempting to crack a system's password by matching the password hash to a hash in a large table of hashes he or
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!