Programmers refer to hidden implementation details as existing in a(n) ____________________.

Fill in the blank(s) with the appropriate word(s).

black box

Computer Science & Information Technology

You might also like to view...

The Restrict Editing button is part of the ________ group on the Review tab

A) Protect B) Changes C) Comments D) Proofing

Computer Science & Information Technology

The Mark as Final command is a security feature

Indicate whether the statement is true or false

Computer Science & Information Technology