1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatyana61 [14]
3 years ago
14

If a base class pointer, p, points to a derived class instance, and both base and derived classes have a method void doIt() whic

h takes no parameters, then p->doIt() will invoke the derived class version:__________
a. only if both the base class method and the derived class method are declared virtual.
b. if the derived class method is declared virtual, but the base is not declared virtual.
c. if the base class method is declared virtual, even if the derived class method is not declared virtual.
Computers and Technology
1 answer:
Luden [163]3 years ago
4 0

Answer:

a. only if both the base class method and the derived class method are declared virtual.

Explanation:

The parameters will invoke derived class version, because objected pointed to determine which method is called. The base and derived class are declared virtual Overriding feature allows subclass and derived class to provide implementation.

You might be interested in
The media should be encouraged to speak with everyone at the POD site.<br> a. True<br> B. False
MakcuM [25]
The statement above is False.

The Media SHOULD NOT be encouraged to speak with everyone at the POD site. POD is stand for Point on Delivery, a module to deliver networkind services. POD design pattern is really impportantn in service provider infrastructue, for instance data centers supporting which required a high level of concentration
7 0
3 years ago
Case 4-1 Santo is creating a company newsletter for his architectural firm. He has solicited contributions from his colleagues o
AleksAgata [21]

Answer:

Saving all graphics as JPEG files

Explanation:

A JPEG file can be defined as the way in which images ,graphics or photos are been stored after the compression of the images has occured because compression of images help to reduce the quality of the image thereby creating more available space.

Since Santo file size has become unmanageable with so many sketches and photos the best alternative for him is to Save all the graphics as JPEG files which will enable him to have extra space because JPEG files will enable the compression of those images by reducing the quality of the image without leaving out any content.

8 0
3 years ago
The set of communications rules for exchanging information electronically on the internet is called the ________.
MA_775_DIABLO [31]
The set of communications rules for exchanging information electronically on the internet is called the URL. URL stands for Uniform Resource Locator. It consists of <span>Protocol identifier that indicates the name of the protocol that is used (for example: http) and  </span>Resource name is the <span>complete address to the resource. brainly.com.</span>
4 0
4 years ago
Once you start designing the processing logic for each function of your software, you might end up throwing out your logical dat
vlabodo [156]

Answer:

B. True.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

An incremental model refers to the process in which the requirements or criteria of the software development is divided into many standalone modules until the program is completed.

Hence, an incremental method typically involves developing a system through repeated cycles and smaller portions at a time, enhancing and evolving the system over time.

A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.

Hence, once you start designing the processing logic for each function of your software, you might end up throwing out your logical data model design and completely redesigning it because each function would use a specific processing logic respectively.

8 0
3 years ago
What kind of information could reasonably be expected to cause serious damage
Eddi Din [679]

Answer:

it could be getting in a car crash

Explanation:

6 0
3 years ago
Other questions:
  • Ooooooooooooooooooooooooooooh im blinded by the lightssssssssss
    11·1 answer
  • Which dialog box opens after selecting a cell in the list of prepared data, clicking the insert tab on ribbon and the clicking t
    6·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • To which built-in object does the function sin(x) belong?
    12·1 answer
  • What is Network Address Translation (NAT) and how does it work in a network?
    14·1 answer
  • After pushing the power switch of the PC to the ʺonʺ position, Bob, the PC repair person, realizes that the power-on lights foun
    8·1 answer
  • One tool of Lean that is a container, card, or visual limit that signals when work needs to be done or replenishment needs to be
    13·1 answer
  • The term callee save denotes the case where the __________ (calling / called) program saves the contents of registers whose cont
    10·1 answer
  • Why would a user want to resend a message? Check all that apply.
    7·2 answers
  • Dropdown Complete the sentence. To protect a web-based database, you should apply to any online forms that add data to it. princ
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!