To call a member function, you code a. the name of the object in parentheses, followed by the name of the function b. the name of the object, the dot operator, and the name of the function c. the name of the object, followed by the scope resolution operator and the name of the function d. the name of the object, followed by the name of the function in parentheses

Answers

Answer 1

Answer:

using a pointer to member function to call function


Related Questions

What is the correct name for the words Home, Insert, Design, Layout, References, etc. in the ribbon in Word 2016?

groups
tabs
sections
properties

Answers

Answer:

tabs

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users to type, format and save text-based documents.

The commands which are used in Microsoft Word 2016 are displayed using series of icons that are stored on different tabs.

A ribbon is a combination of icons and tabs. In Microsoft Word 2016, the correct name for the words Home, Insert, Design, Layout, References, View, Mailings, and Review in the ribbon is tabs.

Tabs are a section of the Microsoft Word application that avails end users the opportunity to perform certain tasks such as formatting a text, changing the layout, clipboard, paragraph, styles, tables, page setup, inserting a theme, applying color, editing and inputting footnotes, header, citation and bibliography, etc.

Answer:

B, tabs

Explanation:

edge 2021

write the name of the technologies used in all five generation​

Answers

Answer:

First Generation (1940-1956)

First Generation (1940-1956)Second Generation (1956-1963)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)

Answer:

Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .

Explanation:

Encryption is a process
i. To hide the massage
ii. To decipher the massage
iii. To delete the massage
iv. None of them​

Answers

Answer:

answer is i

Explanation:

jjgjnyjghjhkgukhi

Answer:

Encryption is a process by which we can conceal the original message (effectively hiding it)

Explanation:

We typically apply some kind of algorithm to encrypt a message. By doing this we are effectively hiding the original contents of the message so only the people with the appropriate secret key or knowledge of the algorithm can decipher it.

It is used to select specific menu options, drag and drop options and to draw something on screen.

Answers

Answer:

A mouse.

Explanation:

An input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, scanner, projector, mouse, etc.

A mouse is an input device that is designed and used to select specific menu options, drag and drop options and to draw something on screen.

what is computer graphics uses of computer graphics​

Answers

Answer:

The technology that deals with the design and pictures on computer is called computer graphics.

It is displaying art and image data effectively and meaningfully to the consumer.

It is also used for processing image data received from the physical world, such as photo and video content.

Plz help help help


What was the first electromechanical digital computer?

For your kind information I would like to tell you that don't search on internet because it will show ENIAC and that is not the answer the answeris may be ABC or MARK I. I am just confused, Please help me

Answers

Explanation:

For your kind information the answer of the question is MARK I.

Answer:

What was the first electromechanical digital computer?

=⟩ Mark I was the first electromechanical digital computer.

Hope it helpful to you

Define Fiber optic cable​

Answers

an assembly similar to an electrical cable, but containing one or more optical fibers that are used to carry light

Explanation:

An optical fiber is a flexible, transparent fiber made by drawing glass or plastic to a diameter slightly thicker than that of a human hair.

write an algorithm and draw a flowchart for switching off a machine after it has made 500 glass bottles. use an appropriate conditional statement for this

Answers

Answer:

The algorithm is as follows:

1. Start

2. bottles = 0

3. While bottles != 500

  3.1 Create bottle

  3.2 bottle = bottle + 1

4. Switch off machine

5. Stop

See attachment for flowchart

Explanation:

This begins the algorithm

1. Start

This initializes bottles to 0

2. bottles = 0

The loop is repeated until 500 bottles is created

3. While bottles != 500

This creates a new bottle

  3.1 Create bottle

This increments the number of bottles by 1

  3.2 bottle = bottle + 1

This switches of the machine after all bottles are created

4. Switch off machine

End algorithm

5. Stop

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

In the early 1900s, engineers introduced the first_____.

Answers

They introduced the first radio
The answer is: a0 radio.

In the early 1900s, engineers introduced the first “a0 radio”.

Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally go up to ______________ feet above airport elevation and the outer ring begins at _______ feet above the ground and extend vertically to _________ feet above airport elevation. (NOTE #1: no commas) (NOTE #2: All values on the Sectional Charts are in MSL values)

Answers

Answer:

5 nautical mile

4000 feet

1200 feet

Explanation:

Class C Airspace has inner ring which is also an inner core has usually 5 nautical mile radius. This extends from surface area upto 4000 feet above airport elevation and outer ring starts at an altitude of 1200 feet above ground and is extended upto 4000 feet above airport elevation.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

Select the six parts of the boot sequence. Computer displays details of the process BIOS confirms it has found boot loader Shortcuts and hotkeys loaded BIOS begins flashing process Boot loader loads operating system First sector of boot disk is accessed Computer performs POST Power goes to motherboard Printer prints test page

Answers

Answer:

Computer displays details of the process

BIOS confirms it has found boot loader

Boot loader loads operating system

First sector of boot disk is accessed

Computer performs POST

Power goes to motherboard

Explanation:

The place on the computer where information is stored temporarily so the processor can access it quickly is called what? Memory Kernel Mode Driver

Answers

Answer:

The answer is Memory

what is a common translator?​

Answers

Answer:

Conventional interpretation is the process of converting (simultaneously or sequentially) a word/sentence/paragraph/text from one language to another in spoken form without changing the meaning, helping people who do not share the same language. one language can understand each other.

Explanation:

Answer:

A translator is a programming language processor that converts a computer program from one language to another . It takes a program written in source code and converts it into machine code. It discovers and identifies the error during translation.

Your organization uses the following tape rotation strategy for its backup tapes: The first set of tapes is used for daily backups. At the end of each week, the latest daily backup tape is promoted to the weekly backup tape. At the end of each month, one of the weekly backup tapes is promoted to the monthly backup tape. What kind of backup tape rotation strategy is being used

Answers

Answer:

- Grandfather

Explanation:

In the given scenario, the 'grandfather backup rotation strategy' is employed to have the backup of the audiotape files. This is because the entire process is segregated into three distinct sections; daily backup that keeps the track of all the files recorded every day. It is followed by weekly storage of the audio files after the week wraps up in order to save it for future usage. Lastly, 'monthly' media is backed up in order to ensure that no data is left to be backed up that might be required later. This promotes a quicker, easier, yet complete strategy for backing up the desired data files in the systems. Hence, 'grandfather-son-rotation strategy' is the correct answer.

Greg has a list of payments for goods brought every month for the years 2009,2010,2011, and 2012. He needs information from only the last three years. He can filter this by clicking on

Answers

Answer:

"2009" and clicking "does not equal 2009"

Explanation:

The operator, 'does not equal', is a filtering operator used to exclude a specified attribute. The 'does not equal' operator is also used to provide the definition of the condition of the filter given that there are different values of two attributes

Therefore, given that there are only four years, and Greg needs the information of the last three years, which are, 2010, 2011, and 2012, the information for the year 2009 is to be excluded

Therefore, the correct option is; "2009" and clicking "does not equal 2009"

What an algorithm to calculate area of squre.​

Answers

algorithm to calculate area of the square

input x.

sq=x*x.

print sq.

The formula for calculating the surface area of a square is A = L x W
Area = Length x Width

The formula for Perimeter is P = 2L + 2W
Which simply means add all the sides
(Perimeter = 2 Length + 2 Width

These formulas only work for 2d shapes not 3d.

To calculate Volume of a cube its
V= L x W x H
Volume= Length x Width x Height

Hope this helps

what is the working principle of computer?​

Answers

Answer:

input, process, output, storage

Which statement describes how to insert the IF, COUNTIF, or SUM function into a cell?

Use the Insert tab and select the appropriate function from the Functions group.
Type an = sign in the cell, followed by the name of the function and the relevant arguments.
Right-click the cell to access the context menu to insert the function.
Use the View tab and choose the correct function from the displayed list.

Answers

Answer:

Type an = sign in the cell, followed by the name of the function and the relevant arguments.

Explanation:

Microsoft Excel is a software application or program designed and developed by Microsoft Inc., for analyzing and visualizing spreadsheet documents. There are different types of functions used in Microsoft Excel to perform specific tasks and these includes;

1. VLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized vertically. Thus, it's typically used for searching values in a column.

2. SUMIF function: it is an Excel function to sum cells that meet criteria such as text, dates and numbers. This function can be used with the following logical operators; <, >, and =.

3. COUNT function: it's an Excel function to find the total number of entries in a column. For example, to count the number of entries in B1:B15; COUNT(B2:B15).

4. IF function: runs a logical test and returns one value for a TRUE result, and another for a FALSE result. For example, to fail scores that are below 40; IF (A1 < 40, "Fail", "Pass").

5. HLOOKUP function: it's an Excel function that avails end users the ability to lookup data in a table organized horizontally. Thus, it's typically used for searching values in a column.

In Microsoft Excel, to insert the IF, COUNTIF, or SUM function into a cell, you should type an equal to (=) sign in the cell, followed by the name of the particular function and the relevant arguments.

For example, to use the SUMIF function, you should type; =SUMIF(A2:B5, "Peter", C1:C9).

The router is physically located in a server room that requires an ID card to gain access. You've backed up the router configuration to a remote location in an encrypted file. You access the router configuration interface from your notebook computer by connecting it to the console port on the router. You've configured the management interface with a username of admin and a password of password. What should you do to increase the security of this device

Answers

Explanation:

the best thing to do is to create a personal password with a two time passcode for better security of the device

why is computer virus called destructive program​

Answers

Answer:

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

Viruses which are the most commonly-known form of malware and potentially the most destructive. A virus can do anything from erasing the data on a computer to hijacking a computer to attack other systems, send spam, or host and share illegal content.

Explanation:

The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally because they are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Some viruses wreak havoc as soon as their code is executed, while others lie dormant until a particular event (as programmed) gets initiated, that causes their code to run in the computer. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected email attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.  

Which option is used in Access to locate and retrieve data that may be present in multiple database tables within the database?

queries
forms
procedures
subroutines

Answers

Answer:

subroutines

Explanation:

subroutines is used in access to locate and retrieve data

Câu 1: Đất trồng là môi trường?

A. Cung cấp chất dinh dưỡng, ôxy

B. Giúp cây đứng vững

C. Cung cấp chất dinh dưỡng, ôxy, nước

D. Câu B và C

Answers

Answer:

D

Explanation:

who is the father of computer



Answers

Answer:

Charles Babbage is the father of computer

Explanation:

Charles Babbage is know as father of computer.

hope this help!

What is the Sparklines group for in Excel? to place charts in individual cells working with hyperlinks selecting font styles or themes formatting the appearance of the cells or tables

Answers

Answer:

A sparkline is a tiny chart in an Excel worksheet cell that provides a visual representation of data.

Tests of controls in an advanced computer system Can be performed using actual transactions or simulated transactions. Can be performed using only actual transactions because testing of simulated transactions is of no consequence. Is inadvisable because they may distort the evidence in master files. Is impracticable because many procedures within the computer processing activity leave no visible evidence of having been performed.

Answers

Answer:

Can be performed using actual transactions or simulated transactions.

Explanation:

Artificial intelligence (AI) also known as machine learning can be defined as a branch of computer science which typically involves the process of using algorithms to build a smart computer-controlled robot or machine that is capable of performing tasks that are exclusively designed to be performed by humans or with human intelligence.

Artificial intelligence (AI) provides smarter results and performs related tasks excellently when compared with applications that are built using conventional programming.

In an advanced computer system, test of controls can be performed using actual transactions or simulated transactions.

Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:

A. Cung cấp nước, dinh dưỡng

B. Giữ cây đứng vững

C. Cung cấp nước, oxy, dinh dưỡng và giữ cây đứng vững

D. Cung cấp nguồn lương thực

Answers

Answer:

C

Explanation:

Similarities between in line css and internal css

Answers

Answer:

inline css is used to style a specific html element. for this css style, you'll only need to add the style attribute to each html tag, without using selectors. this css type is not really recommended, as each html tag needs to be styled individually. managing your website may become too hard if you only use inline css.

Explanation:

queens

An attacker gained remote access to a user's computer by exploiting a vulnerability in a piece of software on the device. The attacker sent data that was able to manipulate the return address that is reserved to store expected data. Which vulnerability exploit resulted from the attacker's actions

Answers

"A Buffer overflow" vulnerability exploit resulted from the attacker's actions.

Whenever a software or an application writes too much data into a buffer, causing neighboring storage regions to have been corrupted as a consequence, this could be determined as Buffer overflow.

⇒ There are two kinds of Buffer overflow attacks such as:

Stack-based - It will become more popular to use such memory, as well as that's only available during implementation of any code.Heap-based - Those attacks seem to be more difficult to execute because they entail overflowing overall storage capacity allotted for a program further than the space needed for something like the program's present activities.

Thus we can say that the correct answer is a Buffer overflow.

Learn more about Buffer overflow here:

https://brainly.com/question/4952591

Other Questions
The circle graph above shows the distribution of utility expenses for the Hierra family last year. If the familys total utility expenses last year were $3,600, what were their expensive go water and sewer.Water and sewer=X%Electric=30%Heating and gas=50% The main difference between the readers guide to periodical literature and resources like ebscohost mention the power and function of central government and state government of nepal in table Suppose that the tax on interest income is levied on the nominal interest rate, the tax rate is 20 percent, and the real interest rate is 4 percent a year. There is no inflation. Calculate the after-tax real interest rate and the true tax rate on interest income. What are the roots of this equation x^2-4x+9=0? Tobias has a brokerage account and buys on the margin, which resulted in an interest expense of $52,000 during the year. Income generated through the brokerage account was as follows: Municipal interest $104,000 Taxable dividends and interest 520,000 If required, round any division to two decimal places and use in subsequent computations. Round your final answer to the nearest dollar. How much investment interest can Tobias deduct You play a game where you roll a single die. You pay $1 to play, and the payouts are $0.50 if you roll aneven number, $2 if you roll a 1, and $1 if you roll a 3 or 5.2. What are the odds for winning money if you play this game? Show your work and Explain.dan3. What is the expected value of this game? Show your work and Explain what the results mean. 4over6=24over16 explain the error in the students work Will give BRAINLIESTCardiovascular disease is the leading cause of death in the United States today. What healthyhabits do you practice to prevent cardiovascular disease? What can you to do improve yourhabits?Need two paragraphs Joshua buys a $6000 car on the following terms:30% deposit monthly repayments of $210 for 2 years.Find:a) the deposit paid. 1 poirQuestion 1. Jessica has $1,625.00 to purchase a five-year Certificate ofDeposit (CD). In the chart, there are CD rates frombankrate.com. Whatwould the account ending balance be at Synchrony Bank if it iscompounded quarterly? *Use the Compound Interest Formula to calculate the ending balance. A = P(1 + 5)ntNationwideBankNationwide2.01%NoSynchrony Bankall synchrony1.95% Multiply the polynomials. Find the length of CV writting a letter to a friend telling them about teenage pregnancy Situation 1 Riverbed Cosmetics acquired 10% of the 215,000 shares of common stock of Martinez Fashion at a total cost of $12 per share on March 18, 2020. On June 30, Martinez declared and paid $74,000 cash dividend to all stockholders. On December 31, Martinez reported net income of $127,600 for the year. At December 31, the market price of Martinez Fashion was $13 per share. Situation 2 Marin, Inc. obtained significant influence over Seles Corporation by buying 30% of Seles's 31,300 outstanding shares of common stock at a total cost of $9 per share on January 1, 2020. On June 15, Seles declared and paid cash dividends of $36,600 to all stockholders. On December 31, Seles reported a net income of $80,100 for the year. Prepare all necessary journal entries in 2020 for both situations. (Credit account titles are automatically indented when amount is entered. Do not indent manually. If no entry is required, select "No Entry" for the account titles and enter for the amounts.) 9) Assume that the random variable X is normally distributed, with mean = 90 and standard deviation o = 12. Compute the probability P(57 < X < 105). A) 0.7888 B) 0.8944 C) 0.8914 D) 0.8819 If a person develops chronic lymphocytic leukemia, what leukocytes may be involved and how mature are they in the bloodstream? Common symptoms of all types of leukemia are caused not only by the poor functioning of leukocytes, but also by the loss of erythrocytes and platelets. These formed elements have a reduction in their number because the tissue that normally produces them is crowded out by the uncontrolled growth of the leukocyte-producing tissue. For each symptom below, state whether leukocytes, erythrocytes, or platelets are involved. anemia easy bleeding repeated infections enlarged lymph nodes shortness of breath excessive bruising Write either True or False. a) Software is touchable part of computer system. b) System software provides easy interaction between user and computer c) Every computer needs to have own operating system. d) A computer can only understand the program written in assembly language. SANJIWANI Computer Book 7 Which of the graphs shows the solution to the inequality?p < 2 Evaluate the functions in the given points.a. f(x) = x2 6 for f(0), f(6), f(6), f(12)b. f(x) = x3 + 2x for f(0), f(2), f(1), f(12)c. f(x) =12x3for f(0), f(2), f(2), f (12) , f(m), f(m 1), f(m)d.f(x) = |x| 1xfor f(1), f(2), f(h), f (12) , f(h + 2) where h 0