The type of access that restricts a user from seeing how data is actually stored is referred to as ____.

a. source scrambling
b. data hiding
c. limited view
d. class hiding


b. data hiding

Computer Science & Information Technology

You might also like to view...

Which of the following statements are correct?

a. new java.math.BigInteger("343"); b. new java.math.BigDecimal("343.445"); c. new java.math.BigInteger(343); d. new java.math.BigDecimal(343.445);

Computer Science & Information Technology

Which subfolder in your Personal Folder is the default location for the Save As dialog box in most application programs?

A) Documents B) Favorites C) Desktop D) Downloads

Computer Science & Information Technology

What limits the data that can be sought in a criminal investigation?

a. The search warrant b. The legal definition of the purported crime c. The agency's policies and procedures d. The applicable administrative rule

Computer Science & Information Technology

Which of the following statements about cookies is not true?

A. Cookies obtain your personal information by searching your hard drive. B. Cookies are text files. C. Cookies help companies determine the traffic flow through their website. D. Some companies sell the personal information found in cookies to other companies.

Computer Science & Information Technology