1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
3 years ago
11

Given the following class definition and the variable declaration:

Computers and Technology
1 answer:
Lorico [155]3 years ago
7 0

Answer:

The answer is "Option d".

Explanation:

In the above-given code, two-class is defined that is "employee and manager", in which the first class "employee" defines two variables that are "name, id". In this name is pointer type character and id is a long type variable.

In the second class "manager" one variable "rank" and the employee object is created. In this class, the rank variable is a pointer type character, and outside this class, a reference "x" is created.

In this code, we use both class object that uses the "employee" class variable that is id to hold value in it.

You might be interested in
Which technique emphasizes the participative development among system owners, users, designers, and builders?A) Rapid applicatio
tekilochka [14]

Answer:

The correct option to the following question is option (D).

Explanation:

Rapid Application Building is also known as the RAD(Rapid Application Development) and it is one of the important functions of software development.

It is the concept that gives special importance in working on software and get more flexible as compared with the first development methods.

JAD(Joint Application Development) which is referred to as designing in the computers based systems and it the one of the important function of the software development.

5 0
4 years ago
Distinguish between secondary storage device and primary storage device
Ede4ka [16]

Answer:

Primary storage refers to the main storage of the computer or main memory which is the random access memory or RAM. Secondary storage, on the other hand, refers to the external storage devices used to store data on a long-term basis.

3 0
3 years ago
When listing columns in the select list, what should you use to separate the columns?
Gala2k [10]
The answer is commas.  <span>When listing columns in the select list, commas should be used to separate the columns.</span>
6 0
4 years ago
What are the five types of alignment in Word?
Basile [38]
There are four types of alignment in word.
Left-aligned text
Right-aligned text
Center-aligned text
Justified text
6 0
4 years ago
Read 2 more answers
In total, how many 8-bit registers are there in the Intel 80x86 CPU design presented in class? Name one of these 8-bit registers
RSB [31]

Answer:

In general the number of  bit registers in Intel 80x86 CPU design when combined together forms a 16 - bit register

An example of the  -bit registers are AH, AL, BH, BL, CH, CL, DH, and DL

Explanation:

Solution

The 8086 CPU design has a total of eight 8-bit registers and these register can be integrated together to make 16- bit register as well.

The 16-bit data is stored by breaking the data into a low-order byte and high order byte.

The name of the 8 bit registers is shown below:

AH, AL, BH, BL, CH, CL, DH, and DL

7 0
3 years ago
Other questions:
  • What's does the Mutual Reward Theory state?
    10·1 answer
  • What appears in the document after you have inserted a video?
    14·2 answers
  • What does phishing mean?
    9·2 answers
  • Darren wants to substitute every occurence of the word bulky in his spreadsheet with the word strong. which of these options sho
    11·1 answer
  • You are planning trip to South America and and are worried about your devices with private keys being stolen. So you decide to s
    9·1 answer
  • Use the drop-down menu to correctly identify the numbering system.
    7·1 answer
  • Mathematics and modern technology​
    14·1 answer
  • Whenever I rate an answer to a question, it says so and so finds it helpful. It's always the same people that they say find it h
    10·1 answer
  • Instruction: weird I know (~ ̄³ ̄)~
    5·1 answer
  • Part of the operating system core is responsible for controlling security, managing the file system, and providing a platform fo
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!