1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Murrr4er [49]
3 years ago
13

Assume the existence of a class named window with functions named close and freeresources, both of which accept no parameters an

d return no value . write a destructor for the class that invokes close followed by freeresources.
Computers and Technology
1 answer:
denis-greek [22]3 years ago
7 0
In your question whereas there is a class named window and it would be like this:

class window {
//code here 
}

Next is there is a function called close and freeresource and it goes like this:

class window{
  function close( ){
   //code here
  }
  function freeresource( ){
  // code here
  }
 public destruct (){
this.close();
this.freeresource();
}

}
The last code function destruct invokes the function close and freeresource. Hope this would help 

You might be interested in
Which of the two previously described wing designs should result in a longer flying time?
Archy [21]

Answer:

If it's a bird than the bigger the wing span the faster it can fly... or possibly glide in the air longer. I think all plan wing sizes don't change the effect of how it goes. If it is something like the sky gliders than yes. It would most likely be in the sky longer.

5 0
3 years ago
Discuss the importance of the coordinated attention to the 3 broad areas of InfoSec (pillars): Computer Security, Data Security,
True [87]

Answer:

Computer security, includes network security and data security

Explanation:

It is very important to be aware of computer security, then I provide the definitions of each of the three pillars.

Computer security:

Take into account that there is no absolute security, however, risks must be minimized.

 In this section, confidentiality, integrity, availability, and authenticity are important.

It also includes physical security (hardware), software security (network) and data security.

Data Security:

It is the set of logical systems whose function is to coordinate the hardware and software (registers, packages that travel through the network, etc.).

Network Security:

The goal is the advanced detection of botnets and malware callbacks. It must be prevented from intrusions.

5 0
3 years ago
Java Eclipse homework. I need help coding this
Maslowich

public class ArithmeticAssignment {

   public static void main(String[] args) {

       Tester test = new Tester();

       test.printTester();

   }

   

}

class Tester{

   Tester(){

       

   }

   void printTester(){

       int i1 = 79 + 3 * (4 + 82 -68) - 7 +19;

       int i2 = (179 +21 +10) / 7 + 181;

       int i3 = 10389 * 56 * 11 + 2246;

       System.out.println(i1);

       System.out.println(i2);

       System.out.println(i3);

   }

}

I think this is what you wanted. I hope this helps!

5 0
3 years ago
Which of the following statements best represents the pros and cons of being a solitary artist?
qaws [65]
I strongly believe the third option best describes the pros and cons of being a solo artists apart form the fact it is the one option that makes more sense to me.


Hope it helped,

Happy homework/ study/ exam!
5 0
3 years ago
Read 2 more answers
Time management is all about managing your emotions. <br> True <br> False
Alex777 [14]
I’m pretty sure it’s true
5 0
3 years ago
Read 2 more answers
Other questions:
  • Patient letters created from __________ use structured data and do not require a large amount of typing from the medical assista
    8·1 answer
  • Will a pair of bar magnet ,with keepers on the two ends, act as a magnet
    13·1 answer
  • Which of the following tasks requires you to use the Tabs option?
    13·1 answer
  • The thinner the thread on the screw, the ______the force needed but the _____the distance.
    15·1 answer
  • Hey guys, quick question:<br><br> What are the positives and negative’s of GUI’s??
    5·2 answers
  • What is the result of expression 15 &gt; 10 &gt; 5 in C? What is the result of the same expression in Java?
    14·1 answer
  • Accessing disk is much slower than accessing memory. As a result, many file systems have been designed with various optimization
    7·1 answer
  • Which of the following jobs usually requires some level of formal higher education other than vocational training?
    14·2 answers
  • A student wrote a song. Another student posted a video of the song on You Tube, claiming to have written the song. This is most
    15·1 answer
  • Write an algorithm to print the odd number from 100 to 1​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!