Accessors are sometimes called ________ functions and mutators are sometimes called ________ functions.
A) set, get
B) get, set
C) public, private
D) private, public
E) regular, inline
B) get, set
Computer Science & Information Technology
You might also like to view...
You can create a table by selecting a range, clicking the Quick Analysis button, and clicking Tables
Indicate whether the statement is true or false
Computer Science & Information Technology
Discuss why traditional transaction management protocols are too restrictive for advanced database applications.
What will be an ideal response?
Computer Science & Information Technology