A base class’s _________ members can be accessed in the base-class definition, in derived- class definitions and in friends of the base class its derived classes.

Fill in the blank(s) with the appropriate word(s).


protected.

Computer Science & Information Technology

You might also like to view...

Text inserted in a text box is formatted in the same font as the body font used in the content placeholder

Indicate whether the statement is true or false

Computer Science & Information Technology

Biometrics refers to the biological information gathered from a human body to authenticate a user. All the following are types of biometrics except ________?

a. Fingerprint reader b. Retina scanner c. Personal identification card d. Voice recognition

Computer Science & Information Technology

The storage team is discussing the implementation of shared storage to support a business critical, high volume database application. Which of the following techniques can be used to make some of the storage solution available to some hosts and unavailable to others?

A. multi-pathing B. LUN masking C. VLANs D. port security

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 2-2Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can speed up his computer by scanning it for viruses and ____.

A. mailware B. utilities C. spyware D. icons

Computer Science & Information Technology