Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Multiple choices needs the answer for this assignment

1. A class's ______ members can only be used by its own methods and friends.

a.  public

b.  protected

c.  private

d.  final

 

2.A derived class in C++ can have more than one base class.

a.  True

b.  False

 

3.  The specifications of an ADT's operations indicate ______.

a.  what the operations do

b.  how to implement the operations

c.  how to store the data in the ADT

d.  how to carry out the operations

 

4. A(n) ______ allows two modules to communicate with each other.

a.  data structure

b.  axiom

c.  interface

d.  client

 

5. In the following list: John, Kate, Fred, Mark, Jon, Adam, Drew which element is the tail of the list?

a.  John

b.  Mark

c.  Drew

d.  Adam

 

6. Which element is the head of the following list: John, Kate, Fred, Mark, Jon, Adam, Drew?

a.  John

b.  Mark

c.  Drew

d.  Adam

 

7.  Data structures are part of an ADT's ______.

a.  definition

b.  implementation

c.  specifications

d.  usage

 

8.   The insertion operation of the ADT list can insert new items ______.

a.  only at the front of the list

b.  only at the end of the list

c.  only in the middle of the list

d.  into any position of the list

 

9.In the ADT list, when an item is deleted from position i of the list, ______.

a.  the position of all items is decreased by 1

b. the position of each item that was at a position smaller than i is decreased by 1

c. the position of each item that was at a position greater than i is decreased by 1

d. the position of each item that was at a position smaller than i is increased by 1 while the position of each item that was at a position greater than i is decreased by 1

 

10.  Which of the following class declarations indicates that Ball is a derived class of Sphere?

a.  class Sphere: public Ball

b.  class Ball: public Sphere

c.  class Ball::Sphere

d.  class Ball(Sphere)

 

11.  In ______ inheritance, public and protected members of the base class are private members of the derived class.

a.  private

b.  public

c.  conditional

d.  protected

 

12.   ______ is the ability of a class to derive properties from a previously defined class.

a.  Encapsulation

b.  Simulation

c.  Inheritance

d.  Polymorphism

 

13.  hich of the following declares a list of characters using a class template?

a. char charList;

b. List charList;

c. List charList;

d. List(char) charList;

 

 

14. The items in the ADT list are referenced by ______.

a.  name

b.  value

c.  position number

d.  position name

 

15.In the following list: John, Kate, Fred, Mark, Jon, Adam, Drew which element does not have a predecessor?

a.  John

b.  Mark

c.  Drew

d.  Kate

 

16.  A ______ method is one that a derived class can override.

a.  final

b.  base

c.  static

d.  virtual

 

17.  An abstract base class cannot have ______.

a.  descendants

b.  instances

c.  data members

d.  virtual methods

 

18.The class from which another class is derived is known as the ______.

a.  base class

b.  subclass

c.  child class

d.  derived class

 

19. Which of the following is a common iterator operation that moves an iterator to the next item in the list?

a.  ++

b.  --

c.  *

d.  +

 

20.  An ADT's ______ govern(s) what its operations are and what they do.

a.  specifications

b.  implementation

c.  documentation

d.  data structure

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91588188

Have any Question?


Related Questions in Computer Engineering

System analysis and designgo to the scr intranet pageto

SYSTEM ANALYSIS AND DESIGN Go to the SCR Intranet page! To enter, please use the following credentials: Then go to Session 5-Data and Process Modeling Look at the Inbox THE the todo-list and answer all the following 1. J ...

Can someone help me identify how intrustion detection

Can someone help me identify how Intrustion detection system and intrusion prevent system can help protect confidentiality, integrity and availability.

In this project you will format a document you will select

In this project, you will format a document. You will select and format text and then use the Find and Replace command to correct errors in the document. You will convert text to a numbered list as well as a bulleted lis ...

Question suppose that an attack would do 200000 in damage

Question : Suppose that an attack would do $200,000 in damage and has a 25% annual probability of success. Spending $15,000 per year on Countermeasure A would reduce the damage of a successful attack by 50%. a) Do a risk ...

Briefly explain what separations are how do they effect the

Briefly explain what separations are, how do they effect the average duration of unemployment?

Refer to the cyclic redundancy check crc codes discussed in

Refer to the Cyclic Redundancy Check (CRC) codes discussed in the textbook and follow the conventions used in the textbook. Consider the 5-bit generator, G=10011, and suppose that D has the value 1010101011. What is the ...

Systems analysis projectpersonal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

Question it has been stated that the increase in adoption

Question : It has been stated that the increase in adoption of cloud computing is similar to the story of why companies moved to adopted the public electrical grid. What motivated companies to adopt the public electrical ...

Suppose that in responding to interrupts from io devicea

Suppose that in responding to interrupts from I/O deviceA the processor consumes 1000 cycles to perform the context switch required to transfer control to the interrupt handler. The interrupt handler takes an additional ...

The freemont automobile factory has discovered that the

The Freemont Automobile Factory has discovered that the longer a worker has been on the job, the more parts the worker can produce. I need help finding an application that computes and displays a worker's anticipated out ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As