The client can use a method without knowing how it is implemented. The details of the implementation are encapsulated in the method and hidden from the client who invokes the method. This is known as __________.

a. information hiding
b. encapsulation
c. method hiding
d. simplifying method

ab

Computer Science & Information Technology

You might also like to view...

Data types that can be assigned only a single value are called ____ types.

A. individual B. mono C. primitive

Computer Science & Information Technology

Which of the following journals deal with information security?

A. Information Week B. Computer World C. Cross Talk D. All of the above

Computer Science & Information Technology