The procedures associated with an object are called ____.

A. methods
B. processes
C. attributes
D. functions


Answer: A

Computer Science & Information Technology

You might also like to view...

A protocol that offers no built-in error-checking or retransmission capability uses which type of packet delivery?

A. low performance B. connection-oriented C. best-effort D. high priority

Computer Science & Information Technology

The smaller the company the ________ likely it will be that change control will be applied to the disaster recovery document when new software or hardware is acquired or retired

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following definitions describes a template?

a. A type of portable document developed by Microsoft that can be viewed on a variety of computers. b. A type of Word document that is compatible with previous versions of Word. c. A type of portable document developed by Adobe Systems that can be viewed on a variety of computers. d. A type of Word document that creates a copy of itself when you open it.

Computer Science & Information Technology

Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.

A. router B. firewall C. hub D. modem

Computer Science & Information Technology