Computer Networking: A Top-Down Approach (7th Edition)
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
Bartleby Related Questions Icon

Related questions

Question

need help with c++....please paste indented code here plzz

 

Part 1:
Define a class named ID
Protected Data Member: number - type int pointer (dynamic variable)
number has to be 10 digits integer.
Appropriate accessor and mutator functions.
Default constructor and one argument constructor.
Overload the insertion operator << to output ID objects.
Overload the extraction operator >> to input ID objects.
Add big three to ID class.
Please indicate call of big three.
Use following main() to test your class.
int main(){
ID a(12345678);
cout<<a;
ID b = a;
cin>>a;
cout<<a;
ID c;
C = a;
cin>>a;
cout<<a;
cout<<b;
cout<<c;
}
Output from given main function:
ID number: 12345678
ID => copy constrcutor is called
Enter id number: 1234
ID number: 1234
ID => Assignment operator is called
Enter id number: 56789
ID number: 56789
ID number: 12345678
ID number: 1234
ID => Destructor is called
ID => Destructor is called
ID => Destructor is called
expand button
Transcribed Image Text:Part 1: Define a class named ID Protected Data Member: number - type int pointer (dynamic variable) number has to be 10 digits integer. Appropriate accessor and mutator functions. Default constructor and one argument constructor. Overload the insertion operator << to output ID objects. Overload the extraction operator >> to input ID objects. Add big three to ID class. Please indicate call of big three. Use following main() to test your class. int main(){ ID a(12345678); cout<<a; ID b = a; cin>>a; cout<<a; ID c; C = a; cin>>a; cout<<a; cout<<b; cout<<c; } Output from given main function: ID number: 12345678 ID => copy constrcutor is called Enter id number: 1234 ID number: 1234 ID => Assignment operator is called Enter id number: 56789 ID number: 56789 ID number: 12345678 ID number: 1234 ID => Destructor is called ID => Destructor is called ID => Destructor is called
Expert Solution
Check Mark
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON
Text book image
Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science
Text book image
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning
Text book image
Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning
Text book image
Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education
Text book image
Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY