• Post author:
  • Post category:Computer


851. What does the cerr represent?
A. Standard error stream
B. Standard logging stream
C. Input stream
D. Output stream

852. How many ways of reusing are there in class hierarchy?
A. 1
B. 3
C. 4
D. 2

853. Where does the object is created?
A. Class
B. Constructor
C. Destructors
D. Attributes

854. Which of the following is a valid class declaration?
A. Class A { int x; };
B. Class B { }
C. Public class A { }
D. Object A { int x; };

855. Which of the following keywords is used to control access to a class member?
A. Default
B. Break
C. Protected
D. Asm

856. Which of the following statements is incorrect?
A. Destructor of base class should always be static
B. Destructor of base class should always be virtual.
C. Destructor of base class should not be virtual.
D. Destructor of base class should always be private.

857. Which operator can not be overloaded?
A. +
B. ::
C. –
D. *

858. When Virtual Table is created?
A. Every Class has VTable
B. Class inherited from other Class
C. Class has at least one Virtual Function
D. When a Class Overrides the function of Base class

859. What is the size of empty class?
A. 0
B. 2
C. 4
D. 1

860. How to access the object in the class?
A. Ternary operator
B. Scope resolution operator
C. Direct member access operator
D. None of the above