1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MrRissso [65]
3 years ago
12

private members of a class are accessible only from _____________ of the same class or from their friends

Computers and Technology
1 answer:
maxonik [38]3 years ago
8 0

Answer: Within other member

Explanation:

 The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.

In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.    

You might be interested in
Anyone free to inbox me plz....​
MArishka [77]

Answer:

To message you? Here is my alt number (240-918-2355) you can text me if you want ¯\_(ツ)_/¯

8 0
3 years ago
Read 2 more answers
Consider a file system that uses inodes to represent files. Disk blocks are 2KB in size and a pointer to a disk block requires 4
deff fn [24]

Answer:

a.  Maximum size of file = 8.003 GB

Explanation:

<u>a. Maximum size of file</u>

= (6 * 2 KB) + (2048 * 2 KB) + (2048 * 2048 * 2 KB)

= 12kb + 4096 Kb +  8388608 kb

= 8392716 kb

8392716/1024 mb = 8196.01 MB

8196.01 /1024 GB= 8.003 GB

<u>b. According to above calculation</u>

For 8 GB 6 direct, 1 single and 1 double indirect block requires

so

for 32 GB

24 direct Block

4 single and 4 double indirect block requires

7 0
3 years ago
________ to a base class may be assigned the address of a derived class object.
evablogger [386]
Fed jig. defect bhds. if. bugs. bffs. hex.
6 0
2 years ago
Read 2 more answers
Importance of computer education​
Stells [14]

Answer:

hope this helped

Explanation:

Computer technology has helped the world to grow and evolve quickly. By performing tasks quickly, computers make daily activities more convenient. They give people access to a wide array of information and can reach even the most remote locations on the planet.

6 0
2 years ago
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering personal i
beks73 [17]

Answer:

D

Explanation:

Malware can be used for many things, a click of a button can send complete access to the attacking system. Malware comes in all formes and powers.

4 0
2 years ago
Other questions:
  • give two main reasons that should be considered when preparing and deploying a functional restoral scenario.
    5·1 answer
  • True or false: when considering data backups, it is most important to verify that the integrity of the backup file or data is va
    9·1 answer
  • When a Python program is reading a file, the data is input as plain ASCII characters in a string. What is the following code doi
    15·1 answer
  • The benefit of host and guest operating system difference is:
    8·2 answers
  • There is a renewed focus among today’s parents on providing food to their family.
    6·1 answer
  • How to get bing with any node unblocker
    10·2 answers
  • Write a program that first reads in the name of an input file and then reads the input file using the file.readlines() method. T
    11·1 answer
  • What are the four steps for planning a table?​
    10·1 answer
  • What is the official name of an application on a desktop or a laptop?.
    13·1 answer
  • windows switches to secure desktop mode when the uac prompt appears. what is the objective of secure desktop mode?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!