Match each term with a statement below.

A. The data components of a class that belong to every instantiated object
B. A program or class that instantiates objects of another prewritten class
C. The process of acquiring the traits of one's predecessors
D. Describes a group or collection of objects with common attributes
E. The concept that other classes should not alter an object's attributes-only the methods of an object's own class should have that privilege
F. The set of all the values or contents of a class object's instance variables
G. Simple numbers and characters
H. The characteristics that define an object as part of a class
I. The process of combining all of an object's attributes and methods into a single package
J. An instance of a class


A. instance variables
B. class client
C. inheritance
D. class
E. information hiding
F. state
G. primitive data types
H. attributes
I. encapsulation
J. object

Computer Science & Information Technology

You might also like to view...

Critical Thinking QuestionsIntegration Case 1Tim is a designer who, until recently, had not been involved with creating animations. His new client, however, wants him to make extensive use of animation on their company website, and Tim is trying to familiarize himself with the relevant features to make this a reality. Since he is new to animation, Tim has not yet assessed all the available options for his animation. Which of the following is NOT a choice that he can make for his animation?

A. the event that will cause the animation to occur B. how many times the animation should occur C. how many seconds the animation should last D. He can control any of these options.

Computer Science & Information Technology

?A _____ specifies the fields and identifies the primary key in a particular file.

A. ?frame design B. ?table design C. ?viewport D. ?window

Computer Science & Information Technology

If _______________ information is added to IPv6 router advertisements, the need for DHCP in IPv6 could diminish.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

What organization offers the Certified Ethical Hacker (CEH) certification exam?

a. International Information Systems Security Certification Consortium (ISC2) b. EC-Council c. SANS Institute d. GIAC

Computer Science & Information Technology