methods are also commonly called ________ methods and get methods are also commonly called ________ methods.
a. query, mutator.
b. accessor, mutator.
c. mutator, accessor.
d. query, accessor.
c. mutator, accessor.
Computer Science & Information Technology
You might also like to view...
Access requires the correct ________ when designing calculated fields
Fill in the blank(s) with correct word
Computer Science & Information Technology
ICMP (Internet Control Message Protocol) is a _______ layer core protocol that reports on the success or failure of data delivery.?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology