1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
12

To ____ a public member function of a base class in the derived class, the corresponding function in the derived class must have

the same name, number, and types of parameters.
a. rename
b. redefine
c. reuse
d. overload
Computers and Technology
1 answer:
Norma-Jean [14]3 years ago
8 0

Answer:

None of the mentioned options

Explanation:

  • If we define a method in a derived class with same declaration type as that of base class then it is said to be overriding a function which behaves differently which will depend on the object which is calling the method.
  • Option a,b and c are not any kind of methods we implement using coding.
  • Option d is done when number or data types of parameters are different than the declaration of the base type.

You might be interested in
What are the core components of a computer system?
Fantom [35]
CPU GPU harddrive ram
6 0
3 years ago
Which is a good way to improve your credit score
labwork [276]
Pay your bills and don't be late
8 0
4 years ago
Why might reading a product review be a good idea before purchasing a product?
hichkok12 [17]

   This is a good question! Knowing what others think about a product is very helpful before purchasing it. Also knowing the rating is good too. For example I bought a dress off of Amazon and I never looked at the ratings before I bought it, and once I got it in the mail...It looked NOTHING like the picture.

 I hope this was helpful for you!

3 0
4 years ago
Read 2 more answers
Why is Thomas Jefferson considered an accomplished man , or a Renaissance man?​
lesantik [10]
The term “Renaissance man” means for a very clever person to be good at many different things.
4 0
3 years ago
Here is something cool
makkiz [27]
Cool beans s s s s s s s s
4 0
3 years ago
Read 2 more answers
Other questions:
  • Whichof the following is not a standard method called as part of the JSPlife cycle?jspInit()jspService()_jspService()jspDestroy(
    12·1 answer
  • How can cybercriminals harm a person whose personal information they have stolen
    7·1 answer
  • Jen wants to protect the schools network from hackers,worms,and viruses.she also wants to regulate access to certain websites th
    15·2 answers
  • Lean production systems are sometimes referred to as pull systems because demand from customers activates the production actions
    5·1 answer
  • In 2004, ICQ users were enticed by a sales message from a supposed anti-virus vendor. On the vendor's site, a small program call
    15·1 answer
  • Which property of a DBMS lets you change the database structure without requiring you to change the programs that access the dat
    10·1 answer
  • What happens if the user sysadmin invokes the mail command interface and there are no unread mail messages?
    13·1 answer
  • Which line defines a valid CSS rule?
    6·2 answers
  • * Describe the five components of a<br> computer
    6·2 answers
  • Explain briefly how learning how to follow can make a person a good leader
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!