| < Day Day Up > |
|
backslash, Table 5-2: Simple Escape Sequences
backspace, Table 5-2: Simple Escape Sequences
bad programming habits
avoiding, Introduction
bad software architecture
characteristics of, Characteristics of Bad Software Architecture
base class, Table 10-2: Object-Oriented Terminology, Introduction, Quick Review, Summary
base class attributes
initialized from derived class, Quick Review
base class constructor, Introduction
base class constructor call, Summary
base class constructors
calling from derived classes, Calling Base Class Constructors
base class pointer, An Example: Class Interface
base class pointers, Introduction
base classes
preventing multiple instances of, Virtual Base Classes: Virtual Inheritance
behavior, Introduction
defining common in base classes, Purpose And Use Of Inheritance
predictable object, Introduction
Bertrand Meyer, Introduction, The Open-Closed Principle
Bertrand Meyer' s Design by Contract (DbC), The Liskov Substitution Principle & Design by Contract
Bertrand Meyer' s Design by Contract programming, Introduction
binary, The Program Creation Process
binary instructions, The Program Creation Process
bit, Bit
bitwise AND operator, Bitwise AND Operator - &
bitwise exclusive OR operator, Bitwise Exclusive OR Operator - ^
bitwise inclusive OR operator, Bitwise Inclusive OR Operator - |
block statement, Compound Statements
bool, Table 5-1: Fundamental Types and their Value Ranges
boolean literals, Boolean Literals
branch link register, A Minimal C++ Program
break, break
buses, Computer System
byte, Byte
byte addressable memory, Alignment and Addressability
| < Day Day Up > |
|