The ability to reuse objects already defined, perhaps for a different purpose, with modification appropriate to the new purpose, is referred to as:

a) Information hiding.
b) Inheritance.
c) Redefinition.
d) Overloading


b) Inheritance.

Computer Science & Information Technology

You might also like to view...

Once a program is in memory, the dispatcher uses its __________ priority to determine its right to access the processor.

a. internal b. external c. either d. neither

Computer Science & Information Technology

In deciding on your proposal, what options do the owners have?

What will be an ideal response?

Computer Science & Information Technology

What are the general requirements for the Traffic Class field in an IPv6 header?

What will be an ideal response?

Computer Science & Information Technology

Which of the following would be used to test out the security of a specific network by allowing it to receive security attacks?

A. Honeynet B. Honeypot C. Vulnerability scanner D. Network based IDS

Computer Science & Information Technology