Hard to see please add a better image. Actually just type out the question.
Answer:
Explanation:
a. In this scenario, the best solution would have an Object of Traditional Books, CD, Music, Bookstore and Customer.
b. All five objects would be able to be called by the main program loop and the Customer Object would call upon and use either the Books or CD object, While the Bookstore object would call upon all of the other objects.
c. Both the Bookstore object and Customer object will "have" other objects as the Bookstore needs to hold information on every Book or CD in the Inventory. While the Customer object would call upon the Book and CD object that they are purchasing.
d. The Music Object will extend the CD object and use information on the CD object as its parent class.
e. Since the Music Object extends the CD object it is also considered a CD since it is in CD format like the Books on CD and therefore is both objects.
When two people come together, each with a clear definition of their identities, the potential can be astounding. A successful communication is composed of two individuals - each with a clearly defined sense of her or his own identity.
The answer is encryption
steganography would be hiding data, like in an image
digital forensics is the analysis done after an attack
and the last one is a security standard
The answer to your question is,
NIC - Network Interface Card
-Mabel <3