____________ is an enhancement of simple accessor and mutator methods.
a. Event handling
b. Introspection
c. Persistence
d. None of the above
B
Computer Science & Information Technology
a. Event handling
b. Introspection
c. Persistence
d. None of the above
B