Which of the following is NOT an example of a best practice?

A. Using an Application Programming Interface (API)
B. Using inheritance
C. Using accessor methods
D. Using the Model-View-Controller design pattern

Answer: B

Computer Science & Information Technology

You might also like to view...

A ________ is malicious code or software designed to invade your computer system and change or destroy data without your knowledge and against your will

A) worm B) botnet C) virus D) zombie

Computer Science & Information Technology

You can use the Required property to specify whether a value is required in a field, ensuring that the field is left blank, or in database terms, is null

Indicate whether the statement is true or false

Computer Science & Information Technology