By ____ the data, you pass one argument.
A. encapsulating
B. hiding
C. exposing
D. internalizing
Answer: A
Computer Science & Information Technology
You might also like to view...
A(n) ________ symbol is used to indicate which paragraph is associated with the selected picture
A) anchor B) rope C) asterisk D) plus
Computer Science & Information Technology
The three cornerstones of voice network system security are availability,
a. circumvention, and confidentiality. b. circumvention, and disclosure. c. confidentiality, and integrity. d. disclosure, and integrity.
Computer Science & Information Technology