The ____ process uses the clone message to obtain copies.

A. duplication
B. deep copying
C. aliasing
D. overriding


Answer: B

Computer Science & Information Technology

You might also like to view...

Spreadsheet columns can be hidden but rows cannot.

a. true b. false c. not enough information

Computer Science & Information Technology

COUNT is an example of a(n) ________

A) argument B) parameter C) function D) formula

Computer Science & Information Technology

To find the greatest numerical value in a range of cells, you would use the ________ function

Fill in the blank(s) with correct word

Computer Science & Information Technology

You must add fields in a certain order to the design grid.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology