The client can use a method without knowing how it is implemented. The details of the implementation are encapsulated in the method and hidden from the client who invokes the method. This is known as __________.
a. information hiding
b. encapsulation
c. method hiding
d. simplifying method
ab
Computer Science & Information Technology
You might also like to view...
Data types that can be assigned only a single value are called ____ types.
A. individual B. mono C. primitive
Computer Science & Information Technology
Which of the following journals deal with information security?
A. Information Week B. Computer World C. Cross Talk D. All of the above
Computer Science & Information Technology