If the Set and Get functions are either protected or public, the child inherits them. It doesn’t make sense for Set and Get functions to be protected, as they should be used by the object (who only has access to public members).
What will be an ideal response?
Yes, the function can be called in the “normal” manner, via an object and dot operator.
Computer Science & Information Technology
You might also like to view...
A DVD stores information magnetically on a disc
Indicate whether the statement is true or false
Computer Science & Information Technology
A table used to create a many-to-many relationship is called a ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
To open the Label Wizard, you click the Labels button in the:
A) Reports group on the Design tab. B) Tools group on the Design tab. C) Tools group on the Create tab. D) Reports group on the Create tab.
Computer Science & Information Technology
If cell A1 contained 10, cell A2 contained 2 and cell A3 contained =A1/A2, what would cell A3 show on the worksheet?
A. =A1/A2 B. =10/2 C. 5 D. =5
Computer Science & Information Technology