hat's true about oop in c ? group of answer choices generally follows a pattern of forward declaration in a .h file and definitions in a .cpp file

Answers

Answer 1

These statement are about OOP in C++:

In C++ structs are fully OOP but it changes the base assumption of visibility from private to public"this" is a pointer in C++ and therefore we use -> to access from itFollows a standard pattern of forward declaration in a.h file and definitions in a.cpp file.
What is C++ ?

As an expansion of the C programming language, also known as "C with Classes," computer scientist Bjarne Stroustrup developed C++ (pronounced "C plus plus"), a high-level general-purpose programming

language. Over the years, the language has grown significantly, and contemporary C++ now includes facilities for low-level memory manipulation along with object-oriented, generic, and functional features.

Since it is almost always implemented as a compiled language and is offered by numerous vendors, such as the Free Software Foundation, LLVM, Microsoft, Intel, Embarcadero, Oracle, and IBM, C++ is available on a wide range of platforms.

Performance, efficiency, and flexibility of use were key design focuses when C++ was created, with an emphasis on systems programming, embedded, resource-constrained software, and large systems.

Learn more about C++

https://brainly.com/question/13441075

#SPJ4


Related Questions

There are dash types of symbols

Answers

Answer:

logo , pictogram, ideogram, icon, rebus, phonogram and typogram

Explanation:

they are forty symbols

WHAT IS A GOOD APP FOR REMOVING VIRUSES AND IT YOU DONT HAVE TO PAY MUCH FOR IT ????? PLEASE HELP ME

Answers

Answer:

Best free virus removal and free malware removal tools

Avira Free Antivirus – Offers a larger package of free security tools than most competitors, including real-time AV, malware removal, and a VPN. Bitdefender Antivirus Free Edition: Award-winning free version

Norton is a good one

In designing the interior of a physical fitness center, Sybil pays attention to sight lines and the arrangement of rooms and equipment to avoid the fishbowl effect common to such structures. She wants to give people working out a sense of privacy and isolation. Accordingly, she designs the center’s workout areas to have lots of short walls and angles to reduce the number of people visible in any given direction. In reviewing her plans, the client is dismayed. What do you predict are potential problems with Sybil’s design? (Select all that apply.)


The complicated nature of Sybil’s design means that she is probably in violation of numerous codes governing the construction of such structures.

It would be impossible to have fitness classes because the trainer and the class members wouldn’t be able to see each other as they work out.

The lack of sight lines that can encompass entire areas means lots of hidden corners that can create safety and security concerns.

The labyrinth effect of so many short walls and angles likely means that the facility doesn’t make effective use of natural light coming in from outside.

Answers

Answer:

The potential problems with Sybil's design are;

1) Due to the complicated nature of Sybil's design means that she is probably in violation of numerous codes governing the construction of such structures

2) It would be impossible to have fitness classes because the trainer and the class members wouldn't be able to see each other as they work out

3) The lack of sight lines that can encompass entire areas means lots of hidden corners that can create safety and security concerns

4) The labyrinth of so many short walls and angles likely means that the facility doesn't make effective use of natural light coming in from outside

Explanation:

The design considerations for a fitness center includes

1) Provision of adequate space for circulation

2) The sizes of the interior should be varied to avoid the feeling of being inside a big box

3) Allow ample access to natural light

4) Visibility of activity areas to increase interest

5) Ensure that likely dangerous spaces are visible

6) Avoid the creation of dark or hidden corners

Therefore

1) There are likely probabilities that Sybil's design could be in violation of federal and state codes for building similar structures

2) There will be reduced visibility of the trainer

3) Hidden areas formed, due to lack of visibility can be a source of concern for safety

4) There could be limited access for natural light within the facility

which of the following are the three mobile devices management policies a company can choose(check all that apply) Bring Your Own Device
Choose Your Own Device
Company-Issued, Personally Enabled

Answers

A portable computing device that meets the following requirements: I is small enough to be carried by one person.

What are mobile devices?

It can function wirelessly to send or receive information; has local, non-removable data storage; and can be powered on for long periods of time using a self-contained power source.

Additionally, mobile devices may have built-in tools for synchronizing local data with distant places, on-board sensors that enable the device to gather information (such as photos, videos, recordings, or location information), and voice communication capabilities.

Smart phones, tablets, and e-readers are among examples. It should be noted that a device is classified as a portable storage device if it can just store data and cannot process, transfer, or receive data.

Therefore, A portable computing device that meets the following requirements: I is small enough to be carried by one person.

To learn more about mobile devices, refer to the link:

https://brainly.com/question/7642965

#SPJ1

Which education and qualifications are most helpful for Law Enforcement Services careers? Check all that apply.

master’s degree
high school degree
integrity
physical fitness
ability to swim
graphic design skills
social skills

Answers

Answer:i just did the instruction on edgeunity

Explanation:

Which education and qualifications are most helpful for Law Enforcement Services careers? Check all that

The qualifications which are most helpful for Law Enforcement Services careers are "high school degree", "integrity", "physical fitness" and "social skills".

Law Enforcement Services

The organizations including people who are in charge of enforcing the laws, preserving civil morality, as well as regulating community policing are referred to as law enforcement.

Law enforcement's core responsibilities comprise investigating, apprehending, including detaining persons charged with serious activities.

Thus the above response is appropriate.

Find out more information about Law Enforcement Services here:

https://brainly.com/question/21867917

Did Kevin meet his academic standards the first month? in freakonomics

Answers

Answer:

No he didn't meet his academic standards the first month

task a and task b are activities on the critical path of a project activity on network diagram. which of these is a correct observation about a and b: group of answer choices

Answers

All of these, Here both task A & B are on critical path. So all of these options are correct i.e, A and B has the same Early Finish and Late Start.

What is Critical Path?

The critical path is the longest sequence of tasks that must be completed in order to complete a project. The tasks on the critical path are referred to as critical activities because if they are delayed, the entire project will be delayed.

Finding the critical path is critical for project managers because it allows them to do the following:

Estimate the total project duration precisely.

Determine task dependencies, resource limitations, and project risks.

Create realistic project schedules by prioritizing tasks.

Project managers use the critical path method (CPM) algorithm to define the shortest amount of time required to complete each task with the least amount of slack.

To learn more about Critical Path, visit: https://brainly.com/question/14036336

#SPJ4

what can accommodate most file formats? btw there are no answer choices

Answers

Answer:.doc and .docx - Microsoft Word file.

.odt - OpenOffice Writer document file.

.pdf - PDF file.

.rtf - Rich Text Format.

.tex - A LaTeX document file.

.txt - Plain text file.

.wpd - WordPerfect documen

Explanation:

6. What will be the order of letters printed to the console when this program is run?
console.log
a
i
letters 09;
letters (); →
vo ir A WNH
4
function letters ()
console.log
console.log
T
O
11
A. abc
B. abcbcbc
0000
C. abcbc
D
a b ca

Answers

Answer: There’s a thing called repl .it. Or u can use GitHub and stackOverFlow

Explanation:

Answer:

a bc bc

will be displayed

Explanation:

executive order on enhancing safeguards for united states signals intelligence activities

Answers

Making strides toward sufficiency with the Executive Order on Strengthening Protective measures for US Signal Intelligence Agencies. As mentioned in our earlier blog post, the US White House released an Executive Order on improving safeguards for American signals intelligence activities on October 7, 2022.

What is the function of signal intelligence?

Signal intelligence: what is it? Key civilian and military authorities are among the clients of SIGINT, which gathers intelligence information from communications and data systems and provides it to them.

What is a signals analyst responsible for?

As nothing more than a Signals Intelligence Agent, you will investigate and assess foreign communications and behaviour to gather intelligence, and you will communicate this vital knowledge to top management by creating strategic and strategic reports based on your investigation.

To know more about signals intelligence visit:

https://brainly.com/question/14824818

#SPJ4

The Product Owner is not sure about the sustainability of the current velocity. What can be the reason?

Answers

The reason the Product Owner is not sure about the sustainability of the current velocity could be due to inconsistencies in team performance, unrealistic estimations, or external factors affecting the project.

1. Inconsistencies in team performance: The team may be experiencing variations in productivity, such as fluctuating workloads, absenteeism, or fluctuating team size. This can cause uncertainty about maintaining the current velocity.
2. Unrealistic estimations: The team might be overestimating or underestimating their capacity, leading to a mismatch between their planned and actual work completed. This can raise doubts about the sustainability of the current velocity.
3. External factors: Factors such as changing requirements, stakeholder expectations, or technological limitations can impact the team's ability to maintain their current velocity.

To address the Product Owner's concerns about the sustainability of the current velocity, the team should focus on improving estimation accuracy, addressing any inconsistencies in performance, and adjusting to external factors as needed.

Learn more about sustainability visit:

https://brainly.com/question/29770722

#SPJ11

What are 3 inputs and outputs of an ipad?

Answers

Answer:

do u mean pros and cons?????

Explanation:

Karlie wants to eat a good breakfast before taking a test

Answers

yum sounds like a good idea

Answer:C

Explanation:

A computer can read whatever you type into it.
A)True
B)False

Answers

Answer:

True

Explanation:

Everything typed into a computer is saved as data and logged.

Answer:

B   false

Explanation:

I think that is false. (Unless someone is hacking the computer)

Which statement describes lossless compression?
OA. It is a method that converts temporary files into permanent files
for greater storage capacity.
B. It is a technique that accesses memory addresses to retrieve data.
C. It is a method that results in the loss of all the original data in a
file.
D. It is a technique that allows all of a file's data to be restored from
compressed data.
its d

Answers

D. It is a technique that allows all of a file's data to be restored from

compressed data. Lossless compression shrinks the image without sacrificing any crucial information.

More about lossless compression

A type of data compression known as lossless compression enables flawless reconstruction of the original data from the compressed data with no information loss. Since most real-world data exhibits statistical redundancy, lossless compression is feasible.

By utilizing a sort of internal shorthand to denote redundant material, lossless compression "packs" data into a smaller file size. Depending on the type of information being compressed, lossless compression can reduce an initial file that is 1.5 MB to roughly half that size.

Learn more about lossless compression here:

https://brainly.com/question/17266589

#SPJ1

Use the drop-down menus to complete each sentence.
If a student wants to participate in an online experiment, she will need to access a digital .
If a student wants to watch videos, listen to lectures, and take quizzes for a class, he will access a digital .
If a student who is also entering the workforce needs to get some skills training for a new job, she will likely need access to a digital .

Answers

Answer:

If a student wants to participate in an online experiment, she will need to access a digital platform.

If a student wants to watch videos, listen to lectures, and take quizzes for a class, he will access a digital learning management system (LMS).

If a student who is also entering the workforce needs to get some skills training for a new job, she will likely need access to a digital training program.

Answer:If a student wants to participate in an online experiment, she will need to access a digital

✔ laboratory

.

If a student wants to watch videos, listen to lectures, and take quizzes for a class, he will access a digital

✔ classroom

.

If a student who is also entering the workforce needs to get some skills training for a new job, she will likely need access to a digital

✔ office

.

Explanation:

Ava, a system administrator, configures 45 remote access clients to use the VPN server in the organization using the SSTP protocol. On any day, the number of users that work remotely does not exceed 15, so AVA configures the SSTP VPN protocol for 25 connections on the server. One day, owing to extreme weather, many employees are asked to work from home. When more than 25 users try to connect to the organization's servers, they are not allowed access. Ava uses the Routing and Remote Access tool to increase the number of connections for the SSTP protocol to 45. When she asks these additional users to confirm if they have received access, the users tell her that they are unable to connect to the organization's servers.



Required:


If some or all of these users were able to remotely connect on a previous occasion, what is the most likely issue in this scenario?

Answers

After the most recent updates, the remote access server was not rebooted, the most likely problem in this circumstance if some or all of these users were able to remotely connect in the past.

Rebooting is the act of purposefully or unintentionally restarting a previously operational computer system. Warm reboots, in which the system restarts while still powered on, and cold reboots, in which the power to the system is physically turned off and back on, are the two types of reboots. The reboot is known as a restart when the operating system closes all running programmes and completes all pending input and output tasks before beginning a soft reboot. Early electrical computers lacked an operating system and had limited internal memory. The input was often a Switch Register or a stack of punch cards. On systems using cards, turning on the computer was accomplished by pressing a start button, which issued a single command.

Learn more about rebooted from

brainly.com/question/13869329

#SPJ4

Observe the following statements and decide whether the variable result’s value is TRUE or FALSE.

Given that:

    int x = -77;

    int z = 43;

result = (z < x && 1 != 10) ? true : false;

result = 90 < x || -1 < z;

#OED​

Answers

Answer:

    result 1 = false;

     result 2 = true;      

Explanation:

result 1 = (43 < -77 && 1! = 10)

            43 < -77 = false

             1 != 10 = true

for any false && true logical operator, it returns false

    result 1 = false;

 false = 90 < -77 || -1 < 43

              90 < -77 = false

                -1 < 43 = true

for any false || true logical operator, it returns true

  result 2 = true;      

Icons for the most commonly used applications on a Mac can be found here. Dock Menu bar Toolbar Toolbox

Answers

Icons for the most commonly used applications on a Mac can be found in the dock.

What OS is most commonly used by businesses

Microsoft

This provides an easy method for workers to use their computers

GUI

Select the application software

Spreadsheet, word processing.

What is the function of the GUI

Provides an interface between the user and the OS

These are pictures that you can click on to tell your computers what to do.

Icons

A ____ is a list of commands that tell your computer what to do.

Menu

The desktops of computers running the same OS all look the same.

False

When you open your word processing program it opens in a

Window

The instructions for the OS provided by application software are known as

System calls

How does the OS make multitasking possible

By allocating RAM to open applications

The Dock is a row of icons that's also generally located all across the bottom of the screen, but it can be changed. Apple fills up the Dock using products that they believe or hope you will use, and you can edit it to fit your specific needs. You can add programs, files, or files to the dock.

The Dock just on Mac desktop is indeed a convenient spot you reach apps and features you're inclined to use on a daily basis. The dock on a Macbook contains icons of the most frequently accessed applications.

Therefore, the answer is "Dock".

Learn more:

brainly.com/question/14698544

today’s dimms use a 64-bit data path.

Answers

Today's DIMMs (Dual Inline Memory Modules) commonly use a 64-bit data path. DIMMs are the primary form of memory used in modern computers, including desktops, laptops, and servers.

The data path refers to the number of bits that can be transferred simultaneously between the memory module and the system's memory controller.

A 64-bit data path means that the DIMM can transfer 64 bits of data in a single operation. This allows for faster and more efficient data transfer between the memory module and the rest of the system. It is worth noting that the data path width can vary depending on the specific technology and generation of DIMMs, with 64-bit being a standard configuration in many systems today.

To learn more about Data path - brainly.com/question/4544451

#SPJ11

You should see the following code in your programming environments import simplegui def draw_handler(canvas) # your code goes here frame = simplegui. Create_frame('Testing', 699, 60G) frame. Set_canvas background (Black) frame, set draw_handler(draw_handler) frame,start() Using the house program we started in Lesson 6. 5 as a foundation, modify the code to add to the house drawing, Make additions to your house such as windows, doors, and a roof to personalize it,​

Answers

Python program that draws a house with windows, doors, and a roof. The use of the SimpleGUI library that allows the creation of frames and their functions is shown.

Python code

import simplegui

def draw_handler(canvas):

#Define variables

   x = 150

   y = 400

   x1 = 400

   y1 = 400    

   #Left diagonal roof

   canvas.draw_line((300, 100), (80, 250), 2, 'White')  

   #Righ diagonal roof

   canvas.draw_line((500, 250), (300, 100), 2, 'White')

   #Roof

   canvas.draw_line((500, 250), (80, 250), 2, 'White')

   #Right external wall

   canvas.draw_line((500, 250), (500, 1000), 2, 'White')

   #Left external wall    canvas.draw_line((80, 250), (80, 1000), 2, 'White')    # Left Window

   canvas.draw_polygon([(x,y),(x+50,y),(x+50,y+50),(x,y+50)], 3, "black", "yellow")

   canvas.draw_line((x+25,y),(x+25,y+50), 3, "black")

   canvas.draw_line((x,y+25),(x+50,y+25), 3, "black")

   # Right Window

   canvas.draw_polygon([(x1,y1),(x1+50,y1),(x1+50,y1+50),(x1,y1+50)], 3, "black", "yellow")

   canvas.draw_line((x1+25,y1),(x1+25,y1+50), 3, "black")

   canvas.draw_line((x1,y1+25),(x1+50,y1+25), 3, "black")  

   #Front Door

   canvas.draw_circle((300,500), 25, 3, "black", "yellow")

   canvas.draw_polyline([(288,479),(300,500),(312,479)], 3, "black")

   canvas.draw_polygon([(275,500),(325,500),(325,600),(275,600)], 3, "black", "crimson")

   canvas.draw_circle((320,550), 4, 1, "black", "gold")

# Create a frame

frame = simplegui.create_frame("Testing", 600, 600)

frame.set_canvas_background("Black")

frame.set_draw_handler(draw_handler)

# Start the frame

frame.start()

To learn more about SimpleGUI library see: https://brainly.com/question/23532730

#SPJ4

You should see the following code in your programming environments import simplegui def draw_handler(canvas)

many websites use cookies to collect information on internet users. which of the following are not a result of websites using cookies? select two many websites use cookies to collect information on internet users. which of the following are not a result of websites using cookies? select two cookies are susceptible to packet sniffing, which could result in a loss of private data. visiting a website using cookies increases the chance of getting a virus or worm. cookies can read private data from a hard drive to find out information about an internet user. websites that use cookies can remember things purchased and web searches.

Answers

Out of the given options, the two results that are not a direct outcome of websites using cookies are "cookies are susceptible to packet sniffing, which could result in a loss of private data" and "visiting a website using cookies increases the chance of getting a virus or worm."

Cookies are small text files that websites store on a user's computer to remember their preferences, login information, and other details. They help websites provide a personalized experience to users. However, cookies can also be used to track user behavior and collect personal information, which raises privacy concerns.

Packet sniffing is a technique used by hackers to intercept and steal data that is transmitted over a network. While cookies can be used to track user behavior, they are not vulnerable to packet sniffing. Also, visiting a website that uses cookies does not increase the risk of getting a virus or worm. These risks depend on the security measures implemented by the website and the user's own computer system.

For more such questions on cookies, click on:

https://brainly.com/question/12731764

#SPJ11

What's your opinion on Brainly?

Answers

Answer:

great it helped me a lot at tests

Explanation:

Answer:

amazing thank you so much your a life saver

Help me plzzzzzzzzzzzzz

Help me plzzzzzzzzzzzzz

Answers

Answer:

(3)squareroot23)ru(jump)-MArio(input)

Explanation:

Mathematics includes the study of such topics as quantity, structure, space, and change. It has no generally accepted definition. Mathematicians seek and use patterns to formulate new conjectures; they resolve the truth or falsity of such by mathematical proof. -_mathsMARIO.(input_f

Yeni

- - - - -- - - -- - -- - --- -- - - -- Mario

Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides

Answers

Answer:

D) Slides

Explanation:

A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.

This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.

Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.

Choose all items that represent examples of good website accessibility.
site easily found using a search engine
font size can be changed
site text makes sense when read aloud to a blind person
pages load quickly
the Tab and Enter keys can be used to move through a website

Answers

Answer:

B,C, E

Explanation:

I did it on edge :)

Answer:

b, c, and e !!

Explanation:

just did the assignment, hope this helps !! <3

brainliest pls? :)

A published synthesis of comprehensive works or data collections on particular topics is defined as a:

Answers

A published synthesis of comprehensive works or data collections on particular topics is defined as a literature review.

What is the term for a compilation of research on specific subjects?

A literature review refers to a published synthesis of comprehensive works or data collections on particular topics. It involves analyzing and summarizing existing research, books, articles, and other relevant sources to provide a comprehensive overview of the subject matter.

A literature review serves as a foundation for understanding the current state of knowledge, identifying research gaps, and formulating research questions. It helps researchers and readers gain insights into the existing literature, theories, methodologies, and findings related to a specific field of study.

Learn more about Literature review

brainly.com/question/30509743

#SPJ11

What will you see on the next line?

int(200.9123)

Answers

Answer:

200

Explanation:

Because int number can not carry decimal point.

What is Current interrupt register

Answers

Answer: An interrupt control register, or ICR, is a hardware register in a computer chip used to configure the chip to generate interrupts—to raise a signal on an interrupt line—in response to some event occurring within the chip or a circuit connected to the chip.

Explanation:

Is it possible to be logged into a wifi network that does not have internet access.

Answers

Answer: Im not sure.

Explanation:

If i had to give you a straight answer it would be NO.

Other Questions
To apply to the FITT Principles to eating habits we use Which of these is an idiomA. as comfortable as a baby in its blanket B. snugger than anything alive C. like an insect wrapped up in carpet D. as snug as a bug in a rug Why does it take long to become a doctor Ava is looking to purchase a new TV. She is looking at one that states it is 55 inches. TV screens are measured by the TV screen diagonal. If the TV screen measures 27 inches high, which is the correct equation to use to find the width, w, of the TV The Lorax movie What is the significance of the animals walking past the first cut down tree on their way out of town? A client uses continuous positive airway pressure (CPAP) during the night to assist with sleep apnea. Which client statement indicates to the nurse the need for additional client teaching. here is a graph that displays a proportional relationship between the cost of carpeting and the area that carpet can cover what is the slope of the line ________ refers to a person's genetic makeup, while ________ refers to a person's physical characteristics.a. Phenotype; genotypeb. Genotype; phenotypec. DNA; gened. Gene; DNA biggest snake of world How do the tails account for the hydrophobic nature of fats? (See Concept 3.2.) Ask your parents or grandparents about the origin of the places, includingthe province, city, or district. Ph PLEAS HELP!The diagram shows a convex polygon. What is the value of a? what does compensation mean? ways for raising fish In which of the following communities does mass transit most likely refer to the transportation of goods?Fargo, North DakotaPhiladelphia, PennsylvaniaLos Angeles, CaliforniaBoston, Massachusetts a company has accounts named purchases, purchases discounts, purchases returns and allowances, and freight-in as part of its chart of accounts. this company is using which system of inventory The Compromise of 1850 included a much harsher fugitive slave law. It also included all of the following EXCEPT a. New Mexico and Utah would determine their own fates as slave or free states based on popular sovereignty b. Kansas entered the Union as a slave state c. California joined the Union as a free stated. The slave trade, but not slavery, was banned in Washington consumers in a country are concerned that cars they drive create too much air pollution, which response would most likely occur if the country had a free enterprise system? a. the government would instruct car companies to stop selling cars that create pollutionb. businesses would compete by making new cars that produce less pollution c. courts would order all car manufacturers to modify cars to reduce pollution d. voters would select one company to produce cars that create less pollution Federal act requiring disclosure of property information to buyers when 25 or more unimproved parcels of land in a subdivision are offered for sale. Subdivisions must be registered through the Office of Interstate Land Sales Registration (OILSR) how in the world do i do this? please explain.