Understanding Access Control in C++ Inheritance

Protected Members

A protected member is inaccessible to all clients at all levels. If a protected data member is inherited, it is not accessible to the clients of this derived class, no matter what the access control is.

Protected items are things you need to write your functions, but you do not want any client to know about. For example, ListError.

Example

  • class base

    • private a // base’s client cannot use; cannot be passed down either
    • protected b // base’s client cannot use; can be passed down
    • public c
Read More

QBA 1720 Exam 2: Key Concepts & Excel Functions

QBA 1720 Exam 2 Note Sheet

Key Concepts and Formulas

  1. Measures of Central Tendency:

    • Mean (Average): =AVERAGE(range)

    • Median: =MEDIAN(range)

    • Mode: =MODE.SNGL(range)

  2. Measures of Variability:

    • Standard Deviation: =STDEV.S(range)

    • Variance: =VAR.S(range)

    • 68-95 Rule:

      1. 68% of data is within 1 standard deviation.

      2. 95% of data is within 2 standard deviations.

  3. COUNTIFS Function:

    • Counts based on multiple conditions: =COUNTIFS(criteria_range1,criteria1,[criteria_range2,criteria2],…)

    • Example: Count the number of students who

Read More

Public and Private Keys: Understanding Encryption and Security

Public and Private Keys: Understanding Encryption

Public Key

The encryption key is shared publicly with many people. However, only the person or company that created the key can decrypt the information.

Private Key

The creator is the only one who knows how to encode and decode. They can only read or hide the information from those to whom they provide instructions.

Symmetric and Asymmetric Encryption: Main Problems

Symmetric Encryption

  • Requires a secure channel for key exchange.
  • Does not guarantee authenticity
Read More

Understanding Operating Systems: Functions and Usage

An operating system is a program or set of programs that allows you to manage the resources of a computer. It starts working when you turn on the computer, enabling user interaction. The operating system manages the installation, configuration, usage, and maintenance of software and computer hardware. There are two main types:

  • Windows: A commercial operating system owned by Microsoft. They have developed a family of operating systems that have evolved over time.
  • Linux: A free and open-source operating
Read More

Pioneers and Key Concepts in Computing and Technology

Blaise Pascal: Computing Pioneer

Blaise Pascal was a mathematician, physicist, French philosopher, and theologian, considered one of the fathers of computing. He strongly influenced the development of modern economics and social sciences, creating mechanical calculators and contributing to the mathematical theory of probability. He died at the age of 39.

The Pascaline: An Early Calculator

The Pascaline, invented by Pascal, was the first prototype calculator. However, it was not very efficient, and

Read More

Data Center Operations: Key Concepts and Procedures

Frequently Asked Questions

FAS (Frontend Aggregate Switch)

What does FAS stand for?

d. Frontend Aggregate Switch

Are FAS switches an aggregation point for multiple BCS Switches?

True. FAS switches serve as an aggregation point for multiple BCS Switches.

Network Connectivity and Redundancy

Do Dual Path customer racks offer redundant private and public network connections?

True. Dual Path customer racks provide redundant private and public network connections.

Which switch does BMS connect to for IPMI access

Read More