Skip to main content

What are the different types of visibility modes used in Inheritance? Discuss.

 In C++, visibility modes are used to determine the access of the derived class to the members of the base class. There are three visibility modes used in inheritance, which are as follows:

1. Public Inheritance: In public inheritance, all the public members of the base class become public members of the derived class, and all the protected members of the base class become protected members of the derived class. Private members of the base class are not accessible in the derived class.

Example:

class Base {
public:
    int public_member;
protected:
    int protected_member;
private:
    int private_member;
};
class Derived : public Base {
public:
    void access_base_members() {
        public_member = 1; // Accessible
        protected_member = 2; // Accessible
        // private_member = 3; Not accessible
    }
};

2. Protected Inheritance: In protected inheritance, all the public and protected members of the base class become protected members of the derived class. Private members of the base class are not accessible in the derived class.

Example:

class Base {
public:
    int public_member;
protected:
    int protected_member;
private:
    int private_member;
};
class Derived : protected Base {
public:
    void access_base_members() {
        public_member = 1; // Accessible
        protected_member = 2; // Accessible
        // private_member = 3; Not accessible
    }
};

3. Private Inheritance: In private inheritance, all the public and protected members of the base class become private members of the derived class. Private members of the base class are not accessible in the derived class.

Example:

class Base {
public:
    int public_member;
protected:
    int protected_member;
private:
    int private_member;
};
class Derived : private Base {
public:
    void access_base_members() {
        public_member = 1; // Accessible
        protected_member = 2; // Accessible
        // private_member = 3; Not accessible
    }
};

These visibility modes are used to implement various access control policies in object-oriented programming. The choice of visibility mode depends on the design of the system and the requirements of the application.

Comments

Popular posts from this blog

Write a program using the algorithm count() to count how many elements in a container have a specified value.

 Here's an example program using the count() algorithm to count the number of occurrences of a specific value in a vector container: #include <iostream> #include <vector> #include <algorithm> using namespace std; int main() {     vector<int> numbers = { 2, 5, 3, 7, 8, 5, 1, 5, 4 };          // count the number of occurrences of the value 5 in the vector     int count = count(numbers.begin(), numbers.end(), 5);          cout << "The number of occurrences of 5 in the vector is: " << count << endl;          return 0; } Output: The number of occurrences of 5 in the vector is: 3 Explanation: The program starts by creating a vector named numbers that contains several integer values. The count() algorithm is used to count the number of occurrences of the value 5 in the numbers vector. The function takes three arguments: the beginning and end iterators of...

What are Stub and Skeleton in Distributed Application? Explain its function with block diagram.

 Stub and Skeleton are two important components of distributed applications. A distributed application is a software system that runs on multiple computers connected through a network. It allows users to access resources and services on different computers as if they were on a local computer. In a distributed application, a client program on one computer sends a request to a server program on another computer. The server program processes the request and sends a response back to the client program. Stub and Skeleton help to facilitate this communication between the client and server programs. A Stub is a client-side proxy that represents the remote object on the client machine. It acts as a gateway for the client to communicate with the server. When a client invokes a method on the Stub, it marshals the arguments and sends them to the server over the network. The Stub then waits for the server to send a response. When the response is received, the Stub unmarshals the data and retur...

Write short notes on 1. polymorphism 2. applet vs Application 3. Marshalling and unmarshalling

 1. Polymorphism: Polymorphism is a concept in object-oriented programming (OOP) that refers to the ability of an object to take on multiple forms. In Java, polymorphism can be achieved through method overloading and method overriding. Method overloading means that multiple methods can have the same name but different parameters. Method overriding means that a subclass can provide a different implementation of a method that is already defined in its superclass. Polymorphism allows for more flexible and modular code design, as objects can be treated as their superclass type, allowing for easier code reuse and maintenance. 2. Applet vs Application: An applet is a small program that runs within a web browser. It is written in Java and can be embedded into a web page using HTML. Applets are designed to be run on any computer with a Java Virtual Machine (JVM) installed, making them platform-independent. In contrast, an application is a standalone program that runs on a computer's operat...