Objects normally are not allowed to know how other objects are implemented. This is called __________.

a) encarceration
b) information hiding
c) blindfolding
d) inheritance

b) information hiding

Computer Science & Information Technology

You might also like to view...

Which of the following would not be considered data?

A) A person's name B) A student's ID card C) An event D) An idea

Computer Science & Information Technology

A __________ is a document that provides a formal statement of one or more permissions.

A. policy B. permission C. Role D. resource

Computer Science & Information Technology