________ to a base class may be assigned the address of a derived class object.

A) Access specifiers
B) Static members
C) Private members
D) Pointers
E) None of the above

D) Pointers

Computer Science & Information Technology

You might also like to view...

Because the SCO's duties are also focused in ensuring ____________________ security this position is responsible for conducting routine threat and vulnerability assessments to identify compliance based security risks as they arise.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An error that is detected as a program runs is referred to as a(n) ____________________ error.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology