It seems that mutator and accessor functions defeat the purpose of making the member variables private. Why is this not so?
What will be an ideal response?
The mutator functions can filter data and control the way data members are set. For
example, you (as class author) can exclude illegal data. With accessor functions you
(as class author) can allow the client to see just the variables you want seen, in the
format in which you want them seen.
Computer Science & Information Technology
You might also like to view...
It is NOT necessary to animate every object on every slide
Indicate whether the statement is true or false
Computer Science & Information Technology
would look up Pizza in pat's phone book, no matter who is running rolo. The program can find pat's phone book by looking at .rolo in pat's home directory.
Add the -u flag to rolo to allow you to look up someone in another user's phone book (provided that you have read access to it). For example: $ rolo -u pat Pizza
Computer Science & Information Technology