Theoretically, clients do not need to see the _________ of classes from which they derive other classes.

a. Header files.
b. Source code.
c. Object code.
d. Interface.


b. Source code.

Computer Science & Information Technology

You might also like to view...

How might the constraints in an information management plan be imposed on an organization?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is not a member function of all sequence containers?

a. front b. back c. push_front d. push_back

Computer Science & Information Technology

Which of the following best describes a black hat hacker?

A) A person that usually follows the law but, in some cases, performs illegal activities B) Someone who hacks into systems with the permission of the owner of the systems C) Someone who hacks into systems to cause some type of harm D) Someone who is hired by a company to hack into systems

Computer Science & Information Technology

COGNITIVE ASSESSMENT A program has been placed on your smartphone without your knowledge and it is collecting personal information about you. What kind of application is this?

A. adware B. phishing application C. spyware D. filter

Computer Science & Information Technology