methods are also commonly called ________ methods and get methods are also commonly called ________ methods.

a. query, mutator.
b. accessor, mutator.
c. mutator, accessor.
d. query, accessor.

c. mutator, accessor.

Computer Science & Information Technology

You might also like to view...

Access requires the correct ________ when designing calculated fields

Fill in the blank(s) with correct word

Computer Science & Information Technology

ICMP (Internet Control Message Protocol) is a _______ layer core protocol that reports on the success or failure of data delivery.?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology