3. Which one of the following options is incorrect? A. Friend function can access public data members of the class. B. Friend function can access protected data members of the class. C Friend function can't access private data members of the class. D. All of the above
Q: PARALLELIZABLE TASKS AND THE NC CLASS IN PROCESSING
A: solution is :-
Q: Provide three to four examples of messages sent from a client applocation to a server application…
A: Introduction: Provide three to four messages that come from a client applicating a server…
Q: How may the differences between backward integration and forward integration be shown via examples?
A: Forward integration is a business strategy that involves expanding a company's activities to include…
Q: Give some real examples to show how a three-tier application architecture differs from a two-tier…
A: We need to differentiate between 2 tier and 3 tier architecture with examples, and suggest a better…
Q: Examine the concept of abstraction via comparison and contrast using many case studies from from the…
A: Assigned task: The question centers on the definition of abstraction and its applicability to…
Q: you were asked to implement the information system for a company in Vietnam providing similar…
A: Please find the answer below :
Q: Explain the differences between interlacing and progressive scan in video signal transmission and…
A: Please find the answer below :
Q: Are x86 processors compatible with earlier computing platforms like the Vax or Motorola 68x00, for…
A: No, x86 processors are not compatible with earlier computing platforms like the Vax or Motorola…
Q: language from bytecode?What distinguishes assembly
A: The assembly language is also known as assembler language.
Q: A process that is capable indicates The process is acceptable The process is centered D The process…
A: The answer of this question is as follows
Q: Donald Norman's interactional model.
A: Donald Norman's interactional model: The Donald Norman Model…
Q: to change Text Styles in web development
A: Please find the answer:
Q: Where would you utilise assembly language programming?
A: A programming language known as assembly language is used to interact with the computer's hardware.…
Q: What distinguishes assembly language from bytecode?
A: Introduction: Byte code is a kind of computer object code that a virtual machine interprets. It may…
Q: How often does a good compiler write better code than a skilled assembly language programmer on…
A: Introduction: Although the compiler will often perform far better than a person would for a large…
Q: What distinguishes a solid-state drive (SSD) from a hard disk drive (HDD)?
A: Solution: Solid State Drive (SSD) could be a storage device that stores and retrieves information…
Q: What are apps actually, and why do they matter
A: Apps basically means applications. They are made to make out work easier.
Q: Computer A is sending a 10 MByte long file to Computer B via packet-switching over two consecutive…
A: Given that, Length of file= 10 MB Length of packet= 1480 bytes Bandwidth of the link= 100 Mbps…
Q: What do the cornerstone ideas of software engineering not account for? Explain?
A: What do the cornerstone ideas of software engineering not account for? Explain answer in below step.
Q: How sure can you be that your data will be safe? How do we safeguard the authenticity of users and…
A: The security of the web servers is a very crucial aspect for an organisation.
Q: Why was batch processing the norm before time sharing became popular?
A: The solution to the given question is: BATCH PROCESSING SYSTEM In this case , works of the same type…
Q: Can we use dynamic programming to generate a chain of decisions that depend on one another? I don't…
A: Dynamic programming can be used to create chain decision making process which dependes on one…
Q: 32. Systems of interrelated computers and computer equipment and can be as simple as a personal…
A: Answer and explanation is given below:
Q: How does the presence of a principle affect student cell phone use during class Mention the…
A: There is no greater distraction in the classroom than a student using their phone. Teachers deal…
Q: we anticipate from a preemptive goal programming problem when there are only two choice variables?
A: Programming goals: Goal programming is a type of linear programming in which a set of goals is given…
Q: The deployment of firewall software and hardware is another crucial method for policing and…
A: Because they are still widely used and have had a significant impact on contemporary security…
Q: does a good compiler write better code than a skilled assembly language programmer on modern…
A: We know An assembly language programmer can typically develop quicker code than someone who just…
Q: What are the drawbacks of using assembly language for non-specialist programming tasks? Is there…
A:
Q: How may the differences between backward integration and forward integration be shown via examples?
A: When a corporation integrates forward, it takes control of the value chain's earlier business…
Q: What are a few benefits of a digital government?
A: A digital government could improve communication between the government and the public. It could…
Q: Use Bootstrap Horizontal form (source: https://www.w3school s.com/bootstrap/boots trap forms.asp)…
A: I'm using HTML to design.
Q: How does a device driver operate and what does it do?
A: Here is the answer below:-
Q: Evaluate the pros and cons of using agile practises throughout the system development process.
A: Agile is defined by a set of ceremonies or specific development techniques.
Q: What encoding technique is the most effective? Which one, and why, is now being used at a high data…
A: Technique for encoding: Data, or a predetermined sequence of letters, symbols, alphabets, or other…
Q: What are some ways in which the similarities and differences between Web Services and…
A: Web Services vs Service Oriented-Architecture: Web Services Service Oriented-Architecture It…
Q: What encoding technique is the most effective? Which one, and why, is now being used at a high data…
A: Introduction: Encoding technique: Encoding is the process of converting data, or a certain sequence…
Q: In software engineering, software is created via architectural mapping.
A: introduction: A mapping approach called organised plan is sometimes dubbed an information stream…
Q: How would you feel about the secrecy, integrity, and availability of your bank's website?
A: Introduction Banks have a major effect on people's daily lives. A bank acts as a connecting point…
Q: What are the most significant differences between physical location exchanges and computer/telephone…
A: Physical location exchanges and computer/telephone networks differ most significantly in that the…
Q: In what ways are backward integration and forward integration different, and how may these…
A: Backward integration is different from forward integration: Forward integration is the process by…
Q: 23. In CAPITA GUUTO mode, both stations can transmit and receive simultaneously. c. full duplex d.…
A: Here in this question we have asked to fill the blank given in . In ________ mode .both station can…
Q: Which kind of malware do you possess? What distinguishes worms from viruses? Insects and viruses are…
A: here we have given a brief note on malware. added a few points on worms vs viruses.
Q: How well do the various Compiler steps do their intended tasks? If possible, it would be helpful to…
A: What are the fundamental characteristics of Compiler Phases? Give illustrations for each phase. The…
Q: Make a list of the physical storage devices that are installed on the PCs that you often use. Give…
A: Storage device : A storage device is any type of computing hardware that is used for storing,…
Q: 1. Complete the truth table for the following digital circuit: A B A 0 0 1 1 B 0 1 0 1 X = AB 1 1 I…
A: The question is to complete the given truth table with details.
Q: The variable-length record format uses a null bitmap to show whether an attribute has a null value…
A: introduction: In the field of computer science, the distance between two places or memory locations…
Q: You are being asked to name a handful of the most widely used messaging apps of the present day. I…
A: Messaging apps: A messaging app is a software used for sending and receiving messages. To send and…
Q: Why does Transmission Control Protocol (TCP) predominate over User Datagram Protocol (UDP)?
A: Transmission Control Protocol (TCP) is the most commonly used protocol on the internet. It is a…
Q: Compiles source code from a higher level language into machine code. The compiler has an effect on…
A: level language is machine code: A low-level language made out of binary numbers is known as machine…
Q: Examine the concept of abstraction via comparison and contrast using many case studies from from the…
A: The subject is the idea of abstraction and its significance in software engineering.
Step by step
Solved in 2 steps
- Q-2: What is the main difference between constructor of a class and functions we use in same class? AND write one simple program where constructor is called and execute a function from the object of a class.The main difference between structures and classes is: Select one: a. There is no difference between structures and classes b. That classes always require new be used with them while structures do not c. How they access member variables d. Whether they default to public or private access1) Which of the following statements are true about ADTs (abstract data types). (Select all true statements.) a) They are a way to model data structures. b) They are a high level view of data structures. c) ADTs show the specific implementation details of each method. d) "Abstract Data Type" is just another term we use for Abstract Classes. e) None of these answers.
- Write the following program in C++. 1. Create a class called Employee that includes attributes: empid, name, points,group, and avg with data types: “int”, “String”, “double”, “String”, and “double”respectively.2. Include a constructor with parameters: empid and name.3. Include another constructor to assign default values to the attributes.4. Include a function called addPoints that is used to add a given amount to the valueof the attribute points.5. Include a function called upgradePoints that is used to increase the value of theattribute points by a given percentage.6. Include a function called removePoints that is used to reduce a given amount fromthe value of the attribute points. If the resultant value is negative then the value ofthe attribute should be set into zero.7. Include a function called computeGroup that assigns a value to the attribute groupbased on the value of the attribute points as given in the following table. Points Group points < 100 Silver 100 ≤…OOPstudent Student_ID: int Grades[5]: int + setgrades: void + setID: int + setage: double + print:void + age:int + OOPstudent( ) 1. Write the c++ code of the above UML diagram. 2. Write the class member function definitions (including class constructor). 3. Create an object of the same class data type in the main function. 4. Using the declared object, call all the class member functions. (use the following values): 1. ID= 12021330 2. GRADES: 5,6,7,8,9 3. AGE: 19C++ program: In this exercise, you will design the class memberType. Each object of memberType can hold the name of a person, member ID, number of books bought, and amount spent. Include the member functions to perform the various operations on the objects of memberType—for example, modify, set, and show a person’s name. Similarly, up-date, modify, and show the number of books bought and the amount spent. Add the appropriate constructors. Write the definitions of the member functions of memberType. Write a program to test various operations of your class memberType. File memberData.txt: 410John Williams0020Lisa Berry235.5030Ron Brown10255.6840Jessey Smith00 The program will be checked by criterias as below: The program can initialize objects of type memberType without error. memberType's isMemberID indicates which member object is assigned the provided ID. memberType's getBooksPurchased returns the number of books purchased. memberType's getTotalAmountSpent returns the total amount…
- Q1: A- Choose the correct answer. 1. A function's single most important role is to: a. reduce program size. c. accept arguments and return value. 2. In a class definition, private data or functions are accessible: a. to any function in the program. c. to member functions of that class. 3. A member function can always access the data: a. in the object of which it is a member. c. in any object of the class of which it is a member. 15 marks| b. give a name to a block of code. d. organize a program into conceptual units. b. only if you know the password. d. only to public members of the class. b. in the class of which it is a member. d. in the public part of its class.1. Create a class called ADDITION has one integer and one float data member. Use pointer to data member to find their sum and print it from main method and also use the concept of dynamic constructor. 2. Create a class: Doctor, with private data members: id, name, specialization and salary with public member function: get_data () to take input for all data members, show_data () to display the values of all data members and get_specialization () to return specialization. Write a program to write 10 records of doctors and allocating the memory at run time only. 3. Write a program to create a base class: “Question3”, with protected data member: x (int) and with pure virtual function: “Task ()” [Returns no value and takes no argument]. Create a derived class of “Question3” such as “Sub1” (Derive features in public mode). In sub1, there is a member function in public section: get_data1 () to take input for x, and define Task () in this class to display the factorial of x. [Implement the…A data field and function can be declared as instance or static. What are the criteria for deciding?
- What is difference between static data and a regular data of a class? Question 18 options: Static data of a class is shared by all objects of that class Each object of the class has its own copy of the regular data Static data can only be accessed using class name and scope resolution operator A and B A, B, and Cprogramming language : C++ subject : object oriented programming question: We know that an Organization consists of Managers and Employees. You are required to create a base class Person with attributes name, CNIC and gender. Derive Manager and Employee class from Person class.Important requirements for all questions: • All data members must be declared as “private” • No global variable is allowed to be declared and used • Methods within the class and the requested functions cannot have “cin” or “cout” but it should make use of parameters and return value instead. • “cin” and “cout” should be done in main() or any testing functions • Make sure that you clearly show how the C++ class, its methods and all the functions are being called at least twice and print out its return value and its results properly.