The technique of implementing each stack method as a call to a List method is called __________.
a. delegation.
b. delimiting.
c. assigning.
d. shifting responsibility.
a. Delegation.
Computer Science & Information Technology
You might also like to view...
A news and weather toolbar was accidently installed into a web browser. The toolbar tracks users online activities and sends them to a central logging server. Which of the following attacks took place?
A. Man-in-the-browser B. Flash cookies C. Session hijacking D. Remote code execution E. Malicious add-on
Computer Science & Information Technology
A ________ object specifies the line style used to draw a shape.
a) Brush b) Pencil c) Pen d) Stencil e) Line
Computer Science & Information Technology