Which of the following is used to protect important data?

a. the public access specifier
b. the private access specifier
c. the protect member function
d. the class protection operator, @
e. None of these


b. the private access specifier

Computer Science & Information Technology

You might also like to view...

Discuss the criteria on which the physical and electronic perimeters are based.

What will be an ideal response?

Computer Science & Information Technology

The max-width property sets the maximum width of an element.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

?To add the comment, Welcome John Smith, the syntax would be _____.

A. ?<---Welcome John Smith> B. ? C. ? D. ?< !/--- Welcome John Smith-->?

Computer Science & Information Technology

The ____ query combines fields from more than one table into one query set.

A. Pass-Through B. Join C. Data Definition D. Union

Computer Science & Information Technology