Objects normally are not allowed to know how other objects are implemented. This is called __________.

a) encarceration
b) information hiding
c) blindfolding
d) inheritance

b) information hiding

Computer Science & Information Technology

You might also like to view...

Which of the following is NOT true about creating strong passwords?

A) You should not use information that can be easily guessed such as your birth date, phone number, street address, pet's name, or family member's names. B) A strong password has between 5 and 12 characters. C) A strong password uses a combination of upper- and lower-case letters, numbers, and symbols. D) You should not use words found in a dictionary.

Computer Science & Information Technology

A form that displays records in rows and columns like a datasheet is called a ________ form

Fill in the blank(s) with correct word

Computer Science & Information Technology