Base class methods with this level of access cannot be called from derived classes.

a. Private
b. Public
c. Protected
d. None of the above


a. Private

Computer Science & Information Technology

You might also like to view...

Match the following terms to their meanings:

I. layer II. fill III. grid IV. rotate V. flip A. shift an object in a particular direction B. a mirror image of an object C. underlying set of lines D. interior space of an object E. stack objects on one another

Computer Science & Information Technology

The Online Video command inserts a link in the Word document to an online video.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case-Based Critical Thinking Questions

? Case 1: LuvUrPetThe database for a pet supply company includes the following table, named tblCollar, that contains product data for pet collars. The ItemDesc and Color fields contain text. The ItemNum, Price, and Quantity fields contain numbers. ItemNum ItemDesc Color Price Quantity 2358 leather studded collar black 30.00 35 2693 leather collar brown 25.00 25 3547 striped collar red 20.00 75 3855 striped collar blue 15.00 42 3764 striped collar green 15.00 48 5782 solid collar pink 12.00 36 5785 solid collar red 12.00 10 5787 solid collar blue 10.00 15 An application using the dataset should allow a user to type in a price to use to query the dataset. Which of the following clauses would allow a user to select the records for collars with a price of 15 or more? A. WHERE Price = 15 B. WHERE Price Like 15 C. WHERE Price >= @Price D. WHERE Price < @Price

Computer Science & Information Technology

Computer viruses first appeared in the early __________.

A. 1960s B. 1970s C. 1980s D. 1990s

Computer Science & Information Technology