If a base class member has a protected access and the derived class’s access specifier is public, the derived class member is ____ to its class.

a. public
b. global
c. protected
d. private


c. protected

Computer Science & Information Technology

You might also like to view...

What are the first two lines of the implementation of replace, a member function of the template

class indexList, whose prototype is: bool replace (int, const T&);

Computer Science & Information Technology

A method used to change the size of a(n) ____ is to drag the window borders.

A. icon B. file C. window D. folder

Computer Science & Information Technology

A(n) ________ is a powerful, interactive data-mining feature that enables you to summarize and analyze data, especially helpful when working with large datasets

Fill in the blank(s) with correct word

Computer Science & Information Technology

In Excel, the default calculation setting is manual

Indicate whether the statement is true or false.

Computer Science & Information Technology