Answer the following statements true (T) or false (F)

1. An inheritance chain of any desired length is possible.
2. The class D inherits from base class B using public inheritance. The class B has public member function f(), but the derived class has no function member with this signature. The f() is not available to an object of class D.
3. Deriving a class from a base class requires serious changes to the base class.
4. We can assign a base class object to a derived class variable.


1. True
There is no reason to limit the length of an inheritance chain. There are software complexity arguments against very long inheritance chains that are beyond the scope of this text.
2. False
The derived class D inherits public members from class D.
3. False
No changes are needed to derive one class from another.
4. False
Where would the parts of the derived class object that are not in the base class variable go? Once this issue is raised, you should realize this false by now, although this is not formally discussed until the next chapter. The difficulty is called the ‘slicing problem.”

Computer Science & Information Technology

You might also like to view...

Theoretically, clients do not need to see the _________ of classes from which they derive other classes.

a. Header files. b. Source code. c. Object code. d. Interface.

Computer Science & Information Technology

The ____________________ category of the Insert panel is used to insert text and list formatting tags such as bold (b), unordered list (ul), and paragraph (p).

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The CheckBox control in Visual Basic is used when you want to user to select one or more options at the same time

Indicate whether the statement is true or false

Computer Science & Information Technology

Your instance is associated with two security groups. The first allows Remote Desktop Protocol (RDP) access over port 3389 from Classless Inter-Domain Routing (CIDR) block 72.14.0.0/16. The second allows HTTP access over port 80 from CIDR block 0.0.0.0/0. What traffic can reach your instance?

A. RDP and HTTP access from CIDR block 0.0.0.0/0 B. No traffic is allowed. C. RDP and HTTP traffic from 72.14.0.0/16 D. RDP traffic over port 3389 from 72.14.0.0/16 and HTTP traffic over port 80 from 0.0.00/0

Computer Science & Information Technology