The technique of implementing each stack method as a call to a List method is called __________.

a. delegation.
b. delimiting.
c. assigning.
d. shifting responsibility.

a. Delegation.

Computer Science & Information Technology

You might also like to view...

A news and weather toolbar was accidently installed into a web browser. The toolbar tracks users online activities and sends them to a central logging server. Which of the following attacks took place?

A. Man-in-the-browser B. Flash cookies C. Session hijacking D. Remote code execution E. Malicious add-on

Computer Science & Information Technology

A ________ object specifies the line style used to draw a shape.

a) Brush b) Pencil c) Pen d) Stencil e) Line

Computer Science & Information Technology