Match each term with the correct statement below.

A. Keeps data private
B. A mechanism that enables one class to assume both the behavior and the attributes of another class
C. Must be the first statement in the subclass constructor
D. A base class
E. Determines whether an object is a member or descendant of a class
F. An instance method call
G. Makes a program run faster
H. A part of UML
I. Inherits from a base class
J. Graphical language used to describe classes and methods
K. Classes that directly use fields from parent classes
L. "has a"
M. Specific type of containment
N. Methods that work appropriately for subclasses of the same parent class
O. Casting to a supertype


A. information hiding
B. inheritance
C. super()
D. superclass
E. instanceof
F. virtual method call
G. inlining
H. class diagram
I. derived class
J. UML
K. fragile
L. containment
M. aggregation
N. subtype polymorphism
O. upcast

Computer Science & Information Technology

You might also like to view...

The method my first method is an example of an event ___________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Analyzing computer systems to gather legal evidence is known as the field of

a. crowdsourcing. b. information technology. c. computer forensics. d. simulation theory.

Computer Science & Information Technology

The combination of typeface and type style is a ________

A) theme B) font C) template D) layout

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. The origin of the rulers is where the number 0 appears. _________________________ 2. Like grids, you can customize the location of individual guides and place them exactly where you want them. _________________________ 3. The options bar appears beneath the menu bar in the Photoshop window _________________________

Computer Science & Information Technology