____ is the encapsulation of method details.
A. Abstraction
B. Templating
C. Implementation hiding
D. Generalization
Answer: C
Computer Science & Information Technology
You might also like to view...
Application and system security joint reviews are typically done using a(n) ____ set of processes and tools.
A. informally stipulated B. formally stipulated C. ad-hoc D. hybrid
Computer Science & Information Technology
A location in the computer’s memory that may contain different values at various times throughout the execution of a program is called a(n) _____________
What will be an ideal response?
Computer Science & Information Technology