By defining data members as private, you protect the data and enable access only through the object's methods and properties. This describes the ____ feature.
A. abstraction
B. encapsulation
C. polymorphism
D. inheritance
Answer: B
Computer Science & Information Technology
You might also like to view...
Consider the graph G shown in Figure 2.47 (reproduced in this document as Figure 2.5). Answer the following.
Computer Science & Information Technology
AJAX is an acronym for ____.
A. Asynchronous JavaScript and XML B. Action JavaScript and XML C. Asynchronous Java and XML D. Asymmetric JavaScript and XML
Computer Science & Information Technology
Change the host name of the router to RouterA. List the command sequence required to accomplish this task.
What will be an ideal response?
Computer Science & Information Technology
In a(n) ____ program, each step occurs in the order the programmer determines.
A. procedural B. step-wise C. ordered D. planned
Computer Science & Information Technology