1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
14

Define a pointer variable named daco that can be used for objects of the class Banana.

Computers and Technology
2 answers:
ozzi3 years ago
4 0

Answer:

c)Banana * daco;

Explanation:

To declare an variable pointer we use * symbol after writing it's type.For example int *.Then we write the name of the variable since the name of the variable is daco.The class is a user defined data type so instead of writing any data type we will write class name then the * then name of the variable.

Banana * daco; which matches the option c Banana* daco;

shusha [124]3 years ago
3 0

Answer:

A

Explanation:

it's new int daco;

You might be interested in
Cara is cleaning her computer when she notices a loose cable connecting to her printer. Which two ports would the cable most lik
Rudiy27

Answer:

Explanation:

Displayport

3 0
4 years ago
Which of the following schools would adhere to an open admission guideline?
Lelu [443]
C: Mount Holyoke Community College
7 0
4 years ago
Read 2 more answers
The practice of gaining unauthorized access to a bluetooth device is referred to as:
jok3333 [9.3K]
BlueJacking. It is unclear if the term jack refers to pranking or to hijacking.
6 0
4 years ago
In which of the following situations would it be best to choose portrait orientation?
AnnZ [28]
A poster is a goo example of use for the portrait style.
5 0
4 years ago
You are engaged in affinity analysis. what does this mean?
nataly862011 [7]

Answer:

The answer is d.seaching for pattern matches.

Explanation:

Affinity analysis is a technique of data analysis and data mining used to discover relationships among activities performed by a group of interest. It's applied to process where the group of interest records information of their activities and that can be identified. In other words, this technique is used to analyze the behavior of people to identify patterns to determine links into potential purchases.

3 0
3 years ago
Other questions:
  • What are the possible consequences if you fail to identify system requirements correctly and completely?
    9·1 answer
  • Which type of password would be considered secure
    13·2 answers
  • What does it mean to say RAM is volatile? *
    9·1 answer
  • Which of the following combines something you know, such as a password, with something you are (a biometric device such as a fin
    13·1 answer
  • Microsoft PowerPoint is popular software that allows you tocreate slides, handouts, notes, and outlines.
    12·1 answer
  • Hey!! Can u help me please!!​
    12·2 answers
  • NEED IT ASAP. Jack is an accountant. He cant access the spreadsheet software, which is installed on the server. what should jack
    13·1 answer
  • Which of the following is true of lossy and lossless compression algorithms?
    11·1 answer
  • What is an insertion point?
    6·1 answer
  • Award documentation is typically required to be prepared and submitted within how long after the end of a project period:_____.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!