Get premium membership and access questions with answers, video lessons as well as revision papers.
Copy constructors are needed when the programmer, must control precisely how a copy of an object is made.This is important only when the default bitwise copy creates undesired side effect.
Githiari answered the question on November 17, 2017 at 05:42
- Explain why using a default argument is related to function overloading(Solved)
Explain why using a default argument is related to function overloading
Date posted: November 17, 2017. Answers (1)
- Give two advantages of reference pattern in a computer program(Solved)
Give two advantages of reference pattern in a computer program
Date posted: November 17, 2017. Answers (1)
- What are the ways that a class might indicate an allocation failure in a computer program?(Solved)
What are the ways that a class might indicate an allocation failure in a computer program?
Date posted: November 17, 2017. Answers (1)
- Give two possible restrictions to an inline functions(Solved)
Give two possible restrictions to an inline functions
Date posted: November 17, 2017. Answers (1)
- There are two ways to cause a function to be expanded in line in a computer program.What are they(Solved)
There are two ways to cause a function to be expanded in lineprogram in a computer .What are they
Date posted: November 17, 2017. Answers (1)
- What is the difference between a class and a structure?(Solved)
What is the difference between a class and a structure?
Date posted: November 17, 2017. Answers (1)
- Explain 5 application of internet in a learning institution (Solved)
Explain 5 application of internet in a learning institution
Date posted: November 17, 2017. Answers (1)
- What is an inline function.Give an advantage and a disadvantage of using an inline function when coding a computer program(Solved)
What is an inline function.Give an advantage and a disadvantage of using an inline function when coding a computer program
Date posted: November 17, 2017. Answers (1)
- Distinguish between a constructor and a destructor and specify when they are executed in a computer code.(Solved)
Distinguish between a constructor and a destructor and specify when they are executed in a computer code.
Date posted: November 17, 2017. Answers (1)
- Explain what an anonymous union is and how it differs from a normal union in computer programming(Solved)
Explain what an anonymous union is and how it differs from a normal union in computer programming
Date posted: November 17, 2017. Answers (1)
- List six database programs available in the market today.(Solved)
List six database programs available in the market today.
Date posted: November 17, 2017. Answers (1)
- (a) What is a utility software? (b) Give four examples of utility software(Solved)
(a) What is a utility software?
(b) Give four examples of utility software
Date posted: November 17, 2017. Answers (1)
- List four stages involved in the data processing cycle.(Solved)
List four stages involved in the data processing cycle
Date posted: November 17, 2017. Answers (1)
- List three differences between a laser printer and a dot matrix printer(Solved)
List three differences between a laser printer and a dot matrix printer
Date posted: November 17, 2017. Answers (1)
- Explain why computers use binary numbers in data representation(Solved)
Explain why computers use binary numbers in data representation
Date posted: November 17, 2017. Answers (1)
- State any four advantages of using an electronic spreadsheets(Solved)
State any four advantages of using an electronic spreadsheets
Date posted: November 16, 2017. Answers (1)
- Differentiate between real–time systems and online systems(Solved)
Differentiate between real–time systems and online systems
Date posted: November 16, 2017. Answers (1)
- Distinguish between an entity and an attribute as used in database design.(Solved)
Distinguish between an entity and an attribute as used in database design.
Date posted: November 16, 2017. Answers (1)
- What is a reference model? State any two models that are used in creating computer networks.(Solved)
What is a reference model? State any two models that are used in creating computer networks.
Date posted: November 16, 2017. Answers (1)
- Biometrics is one of the security measures organizations are adopting today. Explain what is meant by biometric analysis.(Solved)
Biometrics is one of the security measures organizations are adopting today. Explain what is meant by biometric analysis.
Date posted: November 16, 2017. Answers (1)