The ability to reuse objects already defined, perhaps for a different purpose, with modification appropriate to the new purpose, is referred to as:

a) Information hiding.
b) Inheritance.
c) Redefinition.
d) Overloading


b) Inheritance.

If class D inherits from class B, D automatically receives all of the members of B, and the members defined in D.

Computer Science & Information Technology

You might also like to view...

The purpose of a defense in depth strategy is:

a. To make protected assets difficult to find b. To ensure that protected assets are reachable c. To protect assets from unauthorized access d. To protect assets using a variety of controls

Computer Science & Information Technology

A(n) ____ diagram shows the transitions or changes that occur in a GUI (graphical user interface), in response to the user's actions.

A. class B. transition C. object D. component

Computer Science & Information Technology

__________ image files compresses them without losing significant visual information.

A. Validating B. Cropping C. Optimizing D. Minifying

Computer Science & Information Technology

System testing is often done by independent testers who are not involved in developing program code.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology