Converting from a value of primitive type to a corresponding object of its associated wrapper class is called:

a. Boxing
b. Unboxing
c. Converting
d. Reinstantiating

A

Computer Science & Information Technology

You might also like to view...

What type of network attack relies on multiple servers participating in an attack on one host system?

a. Trojan attack b. Buffer overflow c. Denial-of-service attack d. Distributed denial-of-service attack

Computer Science & Information Technology

The ____________________ command is used to fill a DataTable with data from the selected table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology