The ability to combine data and operations is called ____.
A. inheritance
B. encapsulation
C. redefinition
D. composition
Answer: B
You might also like to view...
________ is used to describe the ideal state in which a productive relationship exists between the business goals of an organization and the ICT assurance function.
Fill in the blank(s) with the appropriate word(s).
A criterion may be negated by using the ____ logical operator.
A. And B. Or C. Like D. Not
A ____ is a malicious program that masquerades as something else—usually as some type of application program.
A. Trojan horse B. computer worm C. computer insect D. computer bug
A binary search tree (BST) is a binary tree with the following properties:- All items in the left subtree are less than the root.- All items in the right subtree are greater than or equal to the root.- _____.
A. Each subtree is itself a binary search tree B. Each subtree is balanced C. The tree is balanced D. Each subtree is complete