When deriving a class from a protected base class, the public members of the base class become _________ and the protected members of the base class become __________?

a. protected, private
b. public, private
c. protected, protected
d. public, protected


c. protected, protected

Computer Science & Information Technology

You might also like to view...

A ____ executes graphics commands, leaving the main processor free for other tasks.

A. graphics processing unit B. video card C. monitor D. computer display device

Computer Science & Information Technology

Match the following Data Type Sort Options with their example:

I. Sort Z to A II. Sort Oldest to Newest III. Sort Largest to Smallest IV. Sort A to Z V. Sort Newest to Oldest A. Number; Othniel; Psychology B. 11/20/2015; 8/20/2015; 5/25/91 C. 58; 29; 27 D. 1/16/1957; 12/26/1959; 1/7/87 E. Karen; Doug; Barb

Computer Science & Information Technology

?The _____ phase of the SDLC includes four main activities: requirements modeling, data and process modeling, object modeling, and consideration of development strategies.

A. ?systems planning B. ?systems analysis C. ?systems design D. ?systems implementation

Computer Science & Information Technology

A vSwitch (virtual switch) or bridge is a logically defined device that operates at what layer of the OSI model?

a. Layer 1 b. Layer 2 c. Layer 4 d. Layer 7

Computer Science & Information Technology