____________ means that an object has an identity that extends beyond one session.

(a) Event handling
(b) Introspection
(c) Persistence
(d) None of the above


(c) Persistence

Computer Science & Information Technology

You might also like to view...

The programs that control and manage the basic operations of a computer are generally referred to as

A) control programs. B) utility programs. C) system hardware programs. D) system software. E) computer application programs.

Computer Science & Information Technology

You can use the ________ key to choose a group of contiguous slides

A) F2 B) F5 C) Shift D) Alt

Computer Science & Information Technology

Match the following parts of an Access window to their descriptions: I. Navigation Pane II. Ribbon II. title bar IV. Field Properties pane V. Backstage view A. provides access to database tools such as Save, Save As, and Print B. contains details of each field C. displays full path name and file name D. area that organizes and lists database objects E. includes five tabs

What will be an ideal response?

Computer Science & Information Technology

The world of shapes is much richer than the shapes included in the inheritance hierarchy of Fig. 12.3. Write down all the shapes you can think of—both two-dimensional and three-dimen- sional—and form them into a more complete Shape hierarchy with as many levels as possible. Your hierarchy should have the base class Shape from which class TwoDimensionalShape and class ThreeD- imensionalShape

are derived. [Note: You do not need to write any code for this exercise.] We will use this hierarchy in the exercises of Chapter 13 to process a set of distinct shapes as objects of base- class Shape. What will be an ideal response?

Computer Science & Information Technology