Which of the following is NOT an example of a best practice?
A. Using an Application Programming Interface (API)
B. Using inheritance
C. Using accessor methods
D. Using the Model-View-Controller design pattern
Answer: B
Computer Science & Information Technology
You might also like to view...
A ________ is malicious code or software designed to invade your computer system and change or destroy data without your knowledge and against your will
A) worm B) botnet C) virus D) zombie
Computer Science & Information Technology
You can use the Required property to specify whether a value is required in a field, ensuring that the field is left blank, or in database terms, is null
Indicate whether the statement is true or false
Computer Science & Information Technology