Objects normally are not allowed to know how other objects are implemented. This is called __________.
a) encarceration
b) information hiding
c) blindfolding
d) inheritance
b) information hiding
Computer Science & Information Technology
You might also like to view...
Which of the following would not be considered data?
A) A person's name B) A student's ID card C) An event D) An idea
Computer Science & Information Technology
A __________ is a document that provides a formal statement of one or more permissions.
A. policy B. permission C. Role D. resource
Computer Science & Information Technology