1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlabodo [156]
3 years ago
14

Define a pointer variable named daco that can be used for objects of the class Banana.

Computers and Technology
2 answers:
ozzi3 years ago
4 0

Answer:

c)Banana * daco;

Explanation:

To declare an variable pointer we use * symbol after writing it's type.For example int *.Then we write the name of the variable since the name of the variable is daco.The class is a user defined data type so instead of writing any data type we will write class name then the * then name of the variable.

Banana * daco; which matches the option c Banana* daco;

shusha [124]3 years ago
3 0

Answer:

A

Explanation:

it's new int daco;

You might be interested in
Suppose that each country completely specializes in the production of the good in which it has a comparative advantage, producin
djverab [1.8K]

Answer:

In  this case, the country that produces rye will produce 24 million bushels per week, and the country that produces jeans will produce 64  million pairs per week.

Explanation:

Total labor hour = 4 million hour

Number of bushes produce in 1 hour = 6

⇒total bushes produce = 6*4 = 24 million

∴ we get

The country that produces rye will produce 24 million bushels per week

Now,

Total labor hour = 4 million hour

Number of pairs produce in 1 hour = 16

⇒total bushes produce = 16*4 = 64 million

∴ we get

The country that produces jeans will produce 64  million pairs per week.

5 0
3 years ago
Convert one billion byte into one storage unit​
notka56 [123]

Answer:

Explanation:

To convert larger units to smaller units (i.e. take a number of gigabytes and convert it down in to megabytes, kilobytes, or bytes) you simply multiply the original number by 1,024 for each unit size along the way to the final desired unit

7 0
3 years ago
Order the following routine maintenance tasks from most to least important when securing a computer. a. Verify anti-malware sett
spin [16.1K]

Answer:

The following are the order of the routine maintenance tasks that is C, A, B, D

Explanation:

For securing the computer system the user has to follow some steps related to the routine maintenance tasks.

  • Firstly, the user has to validate the settings on the Windows Update.
  • Then, they have to validate the settings on the anti-malware software.
  • Then, the user has to validate the setting related to the file-sharing system.
  • Finally, they have to validate the frequent optimization of hard drives or hard disks.
7 0
3 years ago
A SOHO's connection to the internet is through an antenna that sends and receives a microwave signal to the ISP's antenna. There
aksik [14]

Answer:

Line of sight wireless

Explanation:

Line of sight wireless are wireless which enable antenna to sends and receives a microwave signal to the ISP's antenna

By standing between the mounted antenna at client building so that the other side of the wireless connection you intend to create can be visible.

Line of Sight wireless also provide electro-magnetic radio waves that tends to be less affected by external forces leading to better connection reliability because all wireless networks excel only with true line of sight that is why it is always advisable that the antennas are mounted above the tree line, to ensure proper connections without obstacles between them since

Line of sight depend on having a clear line of sight between the antenna and the hotspot .

3 0
4 years ago
A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high s
Montano1993 [528]

Answer: This is private IP address

Explanation:

192.168.25.10 is a private IP address and is reserved for use only within an organisation so it cannot be used to communicate with the outside world. So in order to have videoconferencing they have to share their public IP addresses.

4 0
3 years ago
Other questions:
  • You can create a ____ partition to hold files that are created temporarily, such as files used for printing documents (spool fil
    11·1 answer
  • What do we call a subset of new media in which groups and their fans can interact directly?
    14·1 answer
  • A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
    11·1 answer
  • Give an example of an input device, an output device, a storage device, and a networking device.
    10·1 answer
  • Help!!!!!!!!!!!!!!!!!!!
    12·1 answer
  • Write a short program that allows the user to input a positive integer and then
    5·1 answer
  • This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
    12·1 answer
  • Write a program that reads in ten numbers and displays the number of distinct numbers and the distinct numbers separated by exac
    7·1 answer
  • JAVA NEED HELP ASAP
    7·1 answer
  • Is each of the following method identifiers (a) legal and conventional, (b) legal but unconventional, or (C) illegal?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!