Protected members of a base class are like __________, but they may be accessed by derived classes.

a. constructor functions
b. static members
c. private members
d. public members
e. None of these


c. private members

Computer Science & Information Technology

You might also like to view...

Every network has its legitimate DHCP server, where it should get its authentic network configuration settings from. However, when there is an illegitimate DHCP server on the same local network and it is serving out a different set of network configuration settings, then the information is invalid and in most case, will lead to no connectivity to those DHCP devices. Which of the following is a term for this.

What will be an ideal response?

Computer Science & Information Technology

URL stands for Uniform Resource ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following attacks sends an unsolicited message to a Bluetooth-enabled device often for the purpose of adding their business card to the victims contact list?

A. bluejacking B. bluesnarfing C. bluesmurf D. bluebombing

Computer Science & Information Technology

Describe ways that you can use personal finance apps safely.

What will be an ideal response?

Computer Science & Information Technology