Set methods are also commonly called ________ methods and get methods are also commonly called ________ methods.
a. query, mutator.
b. accessor, mutator.
c. mutator, accessor.
d. query, accessor.
c. mutator, accessor.
Computer Science & Information Technology
You might also like to view...
Each manufacturer uses a(n) ________ number to identify its label sheets
Fill in the blank(s) with correct word
Computer Science & Information Technology
Programmable locks and combination locks are vulnerable to shoulder surfing
Indicate whether the statement is true or false.
Computer Science & Information Technology