By ____ the data, you pass one argument.

A. encapsulating
B. hiding
C. exposing
D. internalizing

Answer: A

Computer Science & Information Technology

You might also like to view...

A(n) ________ symbol is used to indicate which paragraph is associated with the selected picture

A) anchor B) rope C) asterisk D) plus

Computer Science & Information Technology

The three cornerstones of voice network system security are availability,

a. circumvention, and confidentiality. b. circumvention, and disclosure. c. confidentiality, and integrity. d. disclosure, and integrity.

Computer Science & Information Technology