____  involves the restriction of access to one or more of the properties and methods defined within a class.

A. Inheritance
B. Encapsulation
C. Abstraction
D. Polymorphism


Answer: B

Computer Science & Information Technology

You might also like to view...

A password text box hides text entered by the user.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Storing data on the hard drive until the printer needs it is called _______

Fill in the blank(s) with correct word

Computer Science & Information Technology

Case-Based Critical Thinking QuestionsCase 3-2Maureen's brother Paul has also been researching cruise ships online and has created his own presentation. Maureen and Paul decide to work together to create a great presentation to show the rest of the family. Paul sends Maureen his slides about offshore excursions and, following the simplest strategy available to her, she ____.

A. embeds them into her presentation B. uses the Reuse Slides task pane to incorporate his slides into her presentation C. copies and pastes his slides into her presentation D. appends them to her presentation

Computer Science & Information Technology

Category 5e twisted pair can run farther than 100 meters from its source to its final destination, as long as the signal is regenerated at least every ____ meters.?

A. ?20 B. ?50 C. ?75 D. ?100

Computer Science & Information Technology