____ is a calculated number that is used to uniquely identify an object.

A. Method binding
B. A hash code
C. Implicit conversion
D. Ad-hoc polymorphism


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of these sorting procedures can introduce bias into information?

A) alphabetical B) chronological C) cost D) All of the above. E) None of the above.

Computer Science & Information Technology

Which ports would be common on a KVM switch?

A) DB9, PS/2, DB25 B) PS/2, DVI, DB9 C) HDMI, DVI, VGA D) PS/2, VGA, USB

Computer Science & Information Technology

Overriding a member function is the same as redefining it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?Assume your organization is experiencing an intruder attack. You have an intrusion detection system (IDS) set up. Which of the following events occurs first?

A. ?Messages from the IDS are routed to the network security team B. ?The IDS warns the firewall of suspicious traffic C. The network router sends traffic to the firewall as well as to the IDS D. Network security team decides to block traffic from that IP address

Computer Science & Information Technology