A language is ____ typed if it enforces type abstractions where operations can be applied only to objects of the appropriate type.

A. weakly
B. virtually
C. securely
D. strongly


Answer: D

Computer Science & Information Technology

You might also like to view...

The _________ is the node that is attempting to access the network and may be any device that is managed by the network access control system.

A. AR B. RAS C. IP D. PS

Computer Science & Information Technology

Camera shake can be reduced by looking for a camera that provides ________

A) a digital zoom B) image stabilization C) burst mode D) an optical zoom

Computer Science & Information Technology

To change the order of a picture and move it to the top of the stack, you click the Bring to Front button in the:

A) Arrange group on the Format tab. B) Arrange group on the Design tab. C) Adjust group on the Design tab. D) Adjust group on the Format tab.

Computer Science & Information Technology

An information security ________ is a specification of a model to be followed during the design, selection, and initial and ongoing implementation of all subsequent security controls, including information security policies, security education, and training.

A. plan B. framework C. model D. policy

Computer Science & Information Technology