In object-oriented programming, the ___________ is more general than classes related to it.

a. container class
b. default design
c. base class
d. derived class


c. base class

Computer Science & Information Technology

You might also like to view...

A(n) ____________________ on one layer exposes content on the layer directly beneath it, but only within the confines of a particular shape.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ____ specifies how networked data is formatted into discrete units, such as packets or frames.

A. router B. protocol C. topology D. communications medium

Computer Science & Information Technology

Which of the following allows active exploitation of security vulnerabilities on a system or network for the purpose of determining true impact?

A. Port scanning B. Penetration testing C. Vulnerability scanning D. Performing risk analysis

Computer Science & Information Technology

A security technician has removed the sample configuration files from a database server. Which of the following application security controls has the technician attempted?

A. Application hardening B. Application baselines C. Application patch management D. Application input validation

Computer Science & Information Technology