Set methods are also commonly called ________ methods and get methods are also commonly called ________ methods.

a. query, mutator.
b. accessor, mutator.
c. mutator, accessor.
d. query, accessor.

c. mutator, accessor.

Computer Science & Information Technology

You might also like to view...

Each manufacturer uses a(n) ________ number to identify its label sheets

Fill in the blank(s) with correct word

Computer Science & Information Technology

Programmable locks and combination locks are vulnerable to shoulder surfing

Indicate whether the statement is true or false.

Computer Science & Information Technology