If we have a full selection of accessor and mutator functions, why would we have friend functions?

a. You should not have them
b. More efficient access to the private data members.
c. The friend function must call the accessor or mutator functions anyway.
d. none of the above

b. More efficient access to the private data members.

Computer Science & Information Technology

You might also like to view...

The Common Criteria defines a common set of security requirements. These requirements are divided into which of the following?

A) Functional requirements and assurance requirements B) Security requirements and physical requirements C) Functional requirements and technical requirements D) Technical requirements and logical requirements

Computer Science & Information Technology

You are visiting the French version of a favorite shopping site when you see a music CD that you know your cousin wants. The price is listed as 1.000 EUR. Given that that the Euro currency is roughly equivalent to a dollar, is this a good deal? Explain.

What will be an ideal response?

Computer Science & Information Technology