When copying an object involves only copying the values of its data members, the copy is called a(n) ?
a. shallow copy
b. deep copy
c. transfer copy
d. virtual copy
a. shallow copy
Computer Science & Information Technology
You might also like to view...
Administrators often overlook the ________ in terms of security. However, if queried properly, it can provide valuable network information to the attackers.
A. NTP server B. cache file C. virtual database D. Active Directory
Computer Science & Information Technology
Case-Based Critical Thinking QuestionsCase 3-1Ethan is preparing a lecture about the software available for working with photos, videos, music, and other media. He asks James, who is an expert in computers, some questions. Choose the best aswer to each question. Ethan asks James which of the following can be considered a software player?
A. Blu-ray player B. VCR C. QuickTime D. DVD player
Computer Science & Information Technology