1. Which one of the following is the correct way to declare a pure virtual function?





Write Comment

Type in
(Press Ctrl+g to toggle between English and the chosen language)

Comments

Tags
Show Similar Question And Answers
QA->Recently, which of the following Indian bank has launched a virtual queuingmobile application that will help customers save on time ?....
QA->A virtual image larger than the object can be formed by which mirror?....
QA->“One vision, One identity, One Community” is the motto of which of the following organizations?....
QA->Virtual memory is :....
QA->The size of the virtual memory depends on the size of :....
MCQ-> Read the following passage carefully and answer the given questions. Certain words/phrases have been given in bold to help you locate them while answering some of the questions. Virtual currencies are growing in popularity. While the collective value of virtual currencies is still a fraction of the total U.S. Dollars in circulation, the use of virtual currencies as a payment mechanism of transfer of value is gaining momentum. Additionally, the number of entities (issuers, exchangers and intermediaries, to name just a few) that engage in virtual currency transactions is increasing and these entities often need access to traditional banking services.Virtual currencies are digital representations of value that function as a medium of exchange, a unit of account and a store of value (buy now redeem later policy). In many cases, virtual currencies are “convertible” currencies; they are not legal lenders, but they have an equivalent value in real currency. Despite what seems to be a tremendous interest in virtual currencies their overall value is still extremely small relative to other payment mechanisms, such as cash, cheques and credit and debit cards. The virtual currency landscape includes many participants from the merchant that accepts the virtual currency, to the intermediary that exchanges the virtual currency on behalf of the merchant, to the exchange that actually converts the virtual currency to the real currency to the electronic wallet provider that holds the virtual currency on behalf of its owner. Accordingly, opportunities abound for community banks to provide services to entities engaged in virtual currency activities. Eventually, it is also possible that community banks may find themselves holding virtual currency on their own balance sheets.Launched in 2009, Silicon is currently the largest and most popular virtual currency. However, many other virtual currencies have emerged over the past few years, such as Litecoin, Dogecoin, Peercoin and these provide even more anonymity to its users than that provided by Bitcoin.As the virtual currency landscape is fraught with dangers, what important risks should community bankers consider?The most significant is compliance risk- a subset of legal risk. Specifically, virtual currency administrators or legal exchangers may present risks similar to other money transmitters, as well in presenting their own unique risks. Quite simply, many users of virtual currencies do so because of the perceptions that transactions conaucted using virtual currencies are anonymous. The less-than transparent nature of the transactions, :nay make it more difficult for a inancial institution to truly know and understand the activities of its customer and whether the customer’s activities are legal. Therefore, these transactions may present a higher risk for banks and require additional due diligence and monitoring.Another important risk for community banks to consider is credit risk. How should a community bank respond if a borrower wants to specifically post Bitcoin or another virtual currency as collateral for a loan? For many, virtual currencies are simply another form of cash, so it is not hard to analyse that bankers will face such a scenario at some point. In this case, caution is appropriate. Bankers should carefully weigh the pros and cons of extending any loan secured by Bitcoin or other virtual currencies (in whole or in part), or where the source of loan repayment is in some way dependent on the virtual currency. For one, the value of Bitcoin in particular has been volatile. Then, the collateral value could fluctuate widely from day-to-day. Bankers also need to think about control over the account. ‘How does the banker control access to a virtual wallet, and how can it control the borrower’s access to the virtual wallet? In the event of a loan default, the bank would need to take control of the virtual currency. This would require access to the borrower’s virtual wallet and private key. All of this suggests that the loan agreement needs to be carefully crafted and that additional steps need to be taken to ensure the bank has a perfected lift on the virtual currency.Virtual currencies bring with them, both opportunities and challenges, and they are likely here to stay. Although, it is too early to determine just how prevalent they will be in the coming years, we too expect that the virtual participants in the virtual currency ecosystem will increasingly intersect with the banking industry.Which of the following is the meaning of the phrase ‘fraught with dangers’ as mentioned in the passage?
 ....
MCQ-> The persistent patterns in the way nations fight reflect their cultural and historical traditions and deeply rooted attitudes that collectively make up their strategic culture. These patterns provide insights that go beyond what can be learnt just by comparing armaments and divisions. In the Vietnam War, the strategic tradition of the United States called for forcing the enemy to fight a massed battle in an open area, where superior American weapons would prevail. The United States was trying to re-fight World War II in the jungles of Southeast Asia, against an enemy with no intention of doing so. Some British military historians describe the Asian way of war as one of indirect attacks, avoiding frontal attacks meant to overpower an opponent. This traces back to Asian history and geography: the great distances and harsh terrain have often made it difficult to execute the sort of open-field clashes allowed by the flat terrain and relatively compact size of Europe. A very different strategic tradition arose in Asia. The bow and arrow were metaphors for an Eastern way of war. By its nature, the arrow is an indirect weapon. Fired from a distance of hundreds of yards, it does not necessitate immediate physical contact with the enemy. Thus, it can be fired from hidden positions. When fired from behind a ridge, the barrage seems to come out of nowhere, taking the enemy by surprise. The tradition of this kind of fighting is captured in the classical strategic writings of the East. The 2,000 years' worth of Chinese writings on war constitutes the most subtle writings on the subject in any language. Not until Clausewitz, did the West produce a strategic theorist to match the sophistication of Sun-tzu, whose Art of War was written 2,300 years earlier. In Sun-tzu and other Chinese writings, the highest achievement of arms is to defeat an adversary without fighting. He wrote: "To win one hundred victories in one hundred battles is not the acme of skill. To subdue the enemy without fighting is the supreme excellence." Actual combat is just one among many means towards the goal of subduing an adversary. War contains too many surprises to be a first resort. It can lead to ruinous losses, as has been seen time and again. It can have the unwanted effect of inspiring heroic efforts in an enemy, as the United States learned in Vietnam, and as the Japanese found out after Pearl Harbor. Aware of the uncertainties of a military campaign, Sun-tzu advocated war only after the most thorough preparations. Even then it should be quick and clean. Ideally, the army is just an instrument to deal the final blow to an enemy already weakened by isolation, poor morale, and disunity. Ever since Sun-tzu, the Chinese have been seen as masters of subtlety who take measured actions to manipulate an adversary without his knowledge. The dividing line between war and peace can be obscure. Low-level violence often is the backdrop to a larger strategic campaign. The unwitting victim, focused on the day-to-day events, never realizes what's happening to him until it's too late. History holds many examples. The Viet Cong lured French and U.S. infantry deep into the jungle, weakening their morale over several years. The mobile army of the United States was designed to fight on the plains of Europe, where it could quickly move unhindered from one spot to the next. The jungle did more than make quick movement impossible; broken down into smaller units and scattered in isolated bases, US forces were deprived of the feeling of support and protection that ordinarily comes from being part of a big army. The isolation of U.S. troops in Vietnam was not just a logistical detail, something that could be overcome by, for instance, bringing in reinforcements by helicopter. In a big army reinforcements are readily available. It was Napoleon who realized the extraordinary effects on morale that come from being part of a larger formation. Just the knowledge of it lowers the soldier's fear and increases his aggressiveness. In the jungle and on isolated bases, this feeling was removed. The thick vegetation slowed down the reinforcements and made it difficult to find stranded units. Soldiers felt they were on their own. More important, by altering the way the war was fought, the Viet Cong stripped the United States of its belief in the inevitability of victory, as it had done to the French before them. Morale was high when these armies first went to Vietnam. Only after many years of debilitating and demoralizing fighting did Hanoi launch its decisive attacks, at Dienbienphu in 1954 and against Saigon in 1975. It should be recalled that in the final push to victory the North Vietnamese abandoned their jungle guerrilla tactics completely, committing their entire army of twenty divisions to pushing the South Vietnamese into collapse. This final battle, with the enemy's army all in one place, was the one that the United States had desperately wanted to fight in 1965. When it did come out into the open in 1975, Washington had already withdrawn its forces and there was no possibility of re-intervention. The Japanese early in World War II used a modern form of the indirect attack, one that relied on stealth and surprise for its effect. At Pearl Harbor, in the Philippines, and in Southeast Asia, stealth and surprise were attained by sailing under radio silence so that the navy's movements could not be tracked. Moving troops aboard ships into Southeast Asia made it appear that the Japanese army was also "invisible." Attacks against Hawaii and Singapore seemed, to the American and British defenders, to come from nowhere. In Indonesia and the Philippines the Japanese attack was even faster than the German blitz against France in the West. The greatest military surprises in American history have all been in Asia. Surely there is something going on here beyond the purely technical difficulties of detecting enemy movements. Pearl Harbor, the Chinese intervention in Korea, and the Tet offensive in Vietnam all came out of a tradition of surprise and stealth. U.S. technical intelligence – the location of enemy units and their movements was greatly improved after each surprise, but with no noticeable improvement in the American ability to foresee or prepare what would happen next. There is a cultural divide here, not just a technical one. Even when it was possible to track an army with intelligence satellites, as when Iraq invaded Kuwait or when Syria and Egypt attacked Israel, surprise was achieved. The United States was stunned by Iraq's attack on Kuwait even though it had satellite pictures of Iraqi troops massing at the border. The exception that proves the point that cultural differences obscure the West's understanding of Asian behavior was the Soviet Union's 1979 invasion of Afghanistan. This was fully anticipated and understood in advance. There was no surprise because the United States understood Moscow's worldview and thinking. It could anticipate Soviet action almost as well as the Soviets themselves, because the Soviet Union was really a Western country. The difference between the Eastern and the Western way of war is striking. The West's great strategic writer, Clausewitz, linked war to politics, as did Sun-tzu. Both were opponents of militarism, of turning war over to the generals. But there all similarity ends. Clausewitz wrote that the way to achieve a larger political purpose is through destruction of the enemy's army. After observing Napoleon conquer Europe by smashing enemy armies to bits, Clausewitz made his famous remark in On War (1932) that combat is the continuation of politics by violent means. Morale and unity are important, but they should be harnessed for the ultimate battle. If the Eastern way of war is embodied by the stealthy archer, the metaphorical Western counterpart is the swordsman charging forward, seeking a decisive showdown, eager to administer the blow that will obliterate the enemy once and for all. In this view, war proceeds along a fixed course and occupies a finite extent of time, like a play in three acts with a beginning, a middle, and an end. The end, the final scene, decides the issue for good. When things don't work out quite this way, the Western military mind feels tremendous frustration. Sun-tzu's great disciples, Mao Zedong and Ho Chi Minh, are respected in Asia for their clever use of indirection and deception to achieve an advantage over stronger adversaries. But in the West their approach is seen as underhanded and devious. To the American strategic mind, the Viet Cong guerrilla did not fight fairly. He should have come out into the open and fought like a man, instead of hiding in the jungle and sneaking around like a cat in the night. According to the author, the main reason for the U.S. losing the Vietnam war was
 ....
MCQ->Which of the following are necessary for Run-time Polymorphism? The overridden base method must be virtual, abstract or override. Both the override method and the virtual method must have the same access level modifier. An override declaration can change the accessibility of the virtual method. An abstract inherited property cannot be overridden in a derived class. An abstract method is implicitly a virtual method.....
MCQ->Which one of the following is the correct way to declare a pure virtual function?....
MCQ->18 litres of pure water was added to a vessel containing 80 litres of pure milk. 49 litres of the resultant mixture was then sold and some more quantity of pure milk and pure water was added to the vessel in the respective ratio of 2 : 1. If the resultant respective ratio of milk and water in the vessel was 4 : 1, what was the quantity of pure milk added in the vessel ? (in litres)....
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use
DMCA.com Protection Status Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions