5. Encapsulation and Data Hiding