You are defining A class for use in a program you are writing. Which of the
>>>>ADD: “a” lowwercse
following should be placed in the interface file for your class? Which should be placed in the implementation file for your class?

a. The class definition.
b. The declaration of a stand-alone function (neither member nor friend of the class) that uses this class type parameter, and is used as a class operation.
c. The declaration of a stand-alone overloaded operator (neither member nor friend of the class) that is to serve as a class operation.
d. The definition of a stand-alone function (neither member nor friend of the class) that uses this class type parameter, and is to serve as a class operation.
e. The definition of a friend function that is to serve as a class operation.
f. The definition of a member function.
g. The definition of a stand-alone overloaded operator (neither member nor friend of the class) that is to serve as a class operation.
h) The definition of an overloaded operator that is to serve as a class operation and is a friend of the class.
i) The main function of your program.


The interface file should include a) b) and c). Parts d) through h): All definitions of any sort go into the implementation file. Note that the class definition must also go into the implementation file. It is a good practice to #include the interface in the implementation file. Part (i), the main function goes into the application file.

Computer Science & Information Technology

You might also like to view...

Name several strategies to reduce the file size of a video.

What will be an ideal response?

Computer Science & Information Technology

When you use the assignment operator with variables of a class type, you are assigning a:

(a) value (b) primitive type (c) local variable (d) reference

Computer Science & Information Technology

How do you prevent booting from a USB thumb drive?

What will be an ideal response?

Computer Science & Information Technology

_________ is a document that describes the application level protocol for exchanging data between intrusion detection entities.

A. RFC 4767 B. RFC 4766 C. RFC 4765 D. RFC 4764

Computer Science & Information Technology