An ADT’s ______ govern(s) what its operations are and what they do.

a) specifications
b) implementation
c) documentation
d) data structure

a.

Computer Science & Information Technology

You might also like to view...

The set of methods we use to establish a claim of identity as being true is called ______.

A. Authentication B. Authorization C. Identification D. Identify verification

Computer Science & Information Technology

When an array is sorted from highest to lowest, it is said to be in

a. reverse order b. forward order c. ascending order d. descending order e. None of these

Computer Science & Information Technology