Polymorphic programming is associated with the ____________. You do not have to know how the method goes about doing its work. All you have to know is what arguments to send, if any, and what you expect to be accomplished when the object finishes its work.

Fill in the blank(s) with the appropriate word(s).


black box concept

Computer Science & Information Technology

You might also like to view...

4. If a web page meets all the authoritative rules given in this chapter it can still contain ________ information.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

You can enter color names as ____ values.

A. number B. text C. image D. flash

Computer Science & Information Technology

A(n) ___________________ is the point around which the transform command takes place.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

________ integrates public-key cryptography with digital certificates and certificate authorities to authenticate parties in a transaction.

a) Public-Key Infrastructure. b) Private-Key Infrastructure. c) Digital-Key Infrastructure. d) None of the above.

Computer Science & Information Technology