1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
myrzilka [38]
3 years ago
11

Which of the following techniques can you not use to make the members of the std namespace available to your code? a. Code a usi

ng directive for the namespace b. Code an include preprocessor directives for the members c. Identify the members using fully qualified names d. Code a using declaration for each member
Computers and Technology
1 answer:
Aleksandr-060686 [28]3 years ago
5 0

Answer:

b. Code an include preprocessor directives for the members

Explanation:

Namespace in programming can be defined as the declarative region which provides scope for the identifiers such as the functions, name of the types, variables, etc.

The namespaces are $\text{used to organize}$ the code into the logical groups and also used to prevent the name collision.

The ways that can be used outside the namespace $\text{can access the members}$ as :

-- the code used the fully qualifies name

-- by using the declaration to bring one of the identifier into the scope

-- by using the directive to bring all the things in the newspaper into the scope.

Thus the correct option is (b).

You might be interested in
¿Cuál es la diferencia entre una plataforma educativa y una tutoría?
tiny-mole [99]

Answer:

no habla espanola

Explanation:

8 0
3 years ago
After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory l
kumpel [21]

Answer:

Make install

Explanation:

In Computer programming, after compiling source code, make install still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem.

In general, the commands that are executed by make install are defined in the Makefile.

5 0
4 years ago
5. List three safety concerns when using hand<br> ertain safety<br> tools.
sveta [45]

Answer:

Inspect regularly. ...

Wear gloves. ...

Carry with care. ...

Don't pocket sharp objects. ...

Be aware of your surroundings. ...

Use the right tools.

6 0
3 years ago
Which of the following examines the organizational resource of information and regulates its definitions, uses, value, and distr
hichkok12 [17]

Answer:C)Information management

Explanation: Information management is the technique through which the organization and handling of the the data/ information takes place.This technique is made for helping the organization and their business for the supporting the function and processes.

The facilities provided by the information management system is  development, management, designing, innovation etc.

Other options are incorrect because they are used for the coding process,technology and governing of the data, hence no management activity is done by them.Thus, the correct option is option(C).

4 0
4 years ago
Should spreadsheets be used to maintain a checkbook?<br> YES<br><br> NO
algol [13]

Yes, because it keeps all your data organized and allows you to see the trend and growth of your data by automatically creating different types of charts and graphs to help you visualize your data.

Hope that helps!

7 0
2 years ago
Other questions:
  • What is heat sink?what is its use?If it is not in the system what will happen?
    12·1 answer
  • Recursion is memory-intensive because ________. Select one: a. it requires large data values b. it must occur numerous times bef
    11·1 answer
  • Under what circumstances would it be appropriate to use the sentence method of note taking, and what are the advantages and disa
    7·2 answers
  • HURRY!!!!!!
    5·1 answer
  • There are how many GPS satellites orbiting the earth
    15·1 answer
  • What is the output of the following code<br> X = 06<br> y = 0<br> print (x ** y)
    12·1 answer
  • What has happened (or is still happening) to make this speech occur? armageddon
    15·1 answer
  • How does the variable scope influence the structure of an algorithm
    7·1 answer
  • By what other name can the folders in Windows 7 be called?
    5·1 answer
  • What causes the hidden node problem in a wireless local area network (wlan)?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!