Programmers refer to hidden implementation details as existing in a(n) ____________________.
Fill in the blank(s) with the appropriate word(s).
black box
Computer Science & Information Technology
You might also like to view...
The Restrict Editing button is part of the ________ group on the Review tab
A) Protect B) Changes C) Comments D) Proofing
Computer Science & Information Technology
The Mark as Final command is a security feature
Indicate whether the statement is true or false
Computer Science & Information Technology