Protected members of a base class are like ________, with the exception that they may be accessed by derived classes.

A) constructor functions
B) static members
C) private members
D) public members
E) None of the above


C) private members

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. If a program uses multiple classes from the same package, these classes can access each other's package access members directly through references to objects of the appropriate classes, or in the case of static members, through the class name. b. Package access is rarely used. c. Classes in the same source file are part of the same package. d. Use the access modifier package to give a method or variable package access.

Computer Science & Information Technology

What is the name for a function that calls itself?

What will be an ideal response?

Computer Science & Information Technology

A(n) ________ enables a business to save, share, search, and audit electronic documents

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ on a chart can be used to point out important elements or items that need further explanation

Fill in the blank(s) with correct word

Computer Science & Information Technology