1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
12

To ____ a public member function of a base class in the derived class, the corresponding function in the derived class must have

the same name, number, and types of parameters.
a. rename
b. redefine
c. reuse
d. overload
Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
8 0

Answer:

None of the mentioned options

Explanation:

  • If we define a method in a derived class with same declaration type as that of base class then it is said to be overriding a function which behaves differently which will depend on the object which is calling the method.
  • Option a,b and c are not any kind of methods we implement using coding.
  • Option d is done when number or data types of parameters are different than the declaration of the base type.

You might be interested in
Que significa el término “Informática”?
Ad libitum [116K]

Answer:

Explanation:

proviene del francés informatique, implementado por el ingeniero Philippe Dreyfus a comienzos de la década del '60. ... De esta forma, la informática se refiere al procesamiento automático de información mediante dispositivos electrónicos y sistemas computacionales.

4 0
3 years ago
Most of the Desktop games contain a backdoor used to test and update the game.
sveta [45]

A backdoor is a typically covert method of bypassing normal authentication or encryption in a computer, product, embedded device (e.g. a home router), or its embodiment (e.g. part of a cryptosystem, algorithm, chipset, or even a "homunculus computer" —a tiny computer-within-a-computer such as that found in Intel's AMT technology).Backdoors are most often used for securing remote access to a computer, or obtaining access to plaintext in cryptographic systems. From there it may be used to gain access to privileged information like passwords, corrupt or delete data on hard drives, or transfer information within autoschediastic networks.

the answer is True

i hope it will help you

8 0
3 years ago
A __________ acts as separate network that rests outside the secure network perimeter so untrusted users can access web servers
pychu [463]
Firewall
Dont forget to thanks and give brianliest.
4 0
4 years ago
Create a class ProblemSolution with following characteristics Two private member variables name & designation of string type
Romashka-Z-Leto [24]

Answer:

Please see the attachment for the solution

Explanation:

Download txt
4 0
4 years ago
Which of the following is the most compelling
Gemiola [76]
To compare data makes the most sense
5 0
3 years ago
Read 2 more answers
Other questions:
  • I need help making a survey for highschool students in my school any topics/questions?
    9·1 answer
  • Write an expression that evaluates to true if and only if the value of the integer variable workedOvertime is true.
    7·1 answer
  • How many generations of computer languages have there been since the middle of the 20th century?
    9·2 answers
  • Online library catalogs can direct you to your closest library. (1 point)<br> True<br> False
    8·1 answer
  • HELP ASAP U GET BRAINLIEST
    15·2 answers
  • Can you make copies of classified documents provided you alert others?
    6·1 answer
  • If given the chance to own manage a business,what will be the name of the business?
    11·2 answers
  • You can access a button s screentip by _____.
    6·1 answer
  • A fast way to add up a column of numbers is to click in the cell below the numbers and then: Click Subtotals on the Data menu. V
    6·2 answers
  • Which of the following statements about ip addresses is true?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!