Which of the following should be declared virtual?

a. all constructors
b. all destructors
c. all constructors in a base class
d. all base class destructors
e. none of the above


D

Computer Science & Information Technology

You might also like to view...

LINQ’s Order By clause can __________ objects in the result according to multiple properties specified in a comma-separated list.

a) merge b) total c) sort d) search

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. One criteria for an S-box is: "If two inputs to an S-box differ in exactly one bit, the outputs must also differ in exactly one bit. “? 2. The heart of a Feistel block cipher is the function F, which relies on the use of S-boxes. ? 3. The strict avalanche criterion and the bit independence criterion appear to weaken the effectiveness of the confusion function. ? 4. An advantage of key-dependent S-boxes is that because they are not fixed, it is impossible to analyze the S-boxes ahead of time to look for weaknesses. ? 5. The key schedule algorithm is more popular and has received more attention than S-box design. ?

Computer Science & Information Technology

The dictionary is a research tool that provides a list of synonyms

Indicate whether the statement is true or false

Computer Science & Information Technology

An example of fault tolerance would be ________

a. A RAID array b. A large hard drive c. Installation of RAM beyond the manufacturer's default d. None of the above

Computer Science & Information Technology