Accessors are sometimes called ________ functions and mutators are sometimes called ________ functions.

A) set, get
B) get, set
C) public, private
D) private, public
E) regular, inline

B) get, set

Computer Science & Information Technology

You might also like to view...

You can create a table by selecting a range, clicking the Quick Analysis button, and clicking Tables

Indicate whether the statement is true or false

Computer Science & Information Technology

Discuss why traditional transaction management protocols are too restrictive for advanced database applications.

What will be an ideal response?

Computer Science & Information Technology