Composition means ______________.

a. that data fields should be declared private
a. that data fields should be declared private
b. that a class extends another class
c. that a variable of supertype refers to a subtype object
d. that a class contains a data field that references another object


d. that a class contains a data field that references another object

Computer Science & Information Technology

You might also like to view...

All split form properties can be changed in ________

A) Design view B) Layout view C) Datasheet view D) Form view

Computer Science & Information Technology

Why is it a good idea to use the Format Painter button when making changes to text in a lengthy document?

What will be an ideal response?

Computer Science & Information Technology

What type of scan is known as half open because a full TCP three-way connection is not established?

a. TCP Connect scan b. TCP SYN scan c. TCP FIN scan d. TCP ACK scan

Computer Science & Information Technology

A security incident happens three times a year on a company's database server costing the company $1,500 in downtime per occurrence. The database server is only for archival access and is scheduled to be decommissioned in five years. The cost of implementing software to prevent this incident would be $15,000 initially, plus $1,000 a year for maintenance. Which of the following is the MOST cost

effective manner to deal with this risk? A. Transfer the risk. B. Accept the risk. C. Avoid the risk. D. Mitigate the risk.

Computer Science & Information Technology