1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
6

Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0

Answer:

mutator, accessor

Explanation:

Set methods are commonly called mutator methods, and get methods are commonly called accessor methods.

This is because set methods are used to mutate the state of a variable. Get methods, on the other hand are used to access the current state of the variable.

For example:

class Demo{

    //Member variable

    private int var;

    //Accessor method

    public int getVar(){

          return var;

    }

    //Mutator method

    public void setVar(int value){

         var=value;

    }

}

You might be interested in
Categories of functions specified by computer instruction?
Lelu [443]
Is this for a test, because someone else asked that.
4 0
3 years ago
You have just been named Director of Data Administration of General Hardware Co. General Hardware maintains a large central IS o
Afina-wow [57]

Answer:

Since General Hardware has a "huge, central IS organization," this organization ought to incorporate the two data administration and database administration departments.

The data administration department will be required to deal with the full scope of data administration duties regarding the whole corporation, both at the central station and at the local offices.

The central database administration department will give the standard operational database administrations for the home office databases.

It will likewise give direction and coordination to the individuals at the provincial offices who are answerable for their databases.

Obviously, database administration will likewise be answerable for the daily data downloads alluded to.

Data administration and database administration will increase the value of the corporation by making arrangements for and overseeing data as a corporate asset with the objective of increasing an upper hand from it.

Explanation:

5 0
3 years ago
By Definition, a Small Business?
Strike441 [17]

Answer:

A small business is a privately owned and operated business. A small business typically has a small number of employees.

Hope this helped you!

Explanation:

4 0
3 years ago
Use the drop-down menus to complete the statements about printing Contacts. When printing a single contact, go to File and then
UkoKoshka [18]

Answer:

When printing a single contact, go to File and then Print; the only style available is Memo style .

When printing multiple contacts, there are several styles to choose from

Explanation:

<em>The question has been answered (by you). I will help you with the explanation. The texts in bold in the answer section represent the answer.</em>

<em />

The question is an illustration of Microsoft outlook.

In Microsoft outlook, the default style of printing is the memo style of printing. This is the only form of printing allowed when printing single contacts. In other words, other forms of printing cannot be selected.

However, there are several options available when multiple contacts are to be printied. Some of the printing styles are:  phone directory style, card style, medium booklet style, etc.

8 0
3 years ago
You are given a string of n characters s[1 : : : n], which you believe to be a corrupted text document in which all punctuation
alexdok [17]

Answer: provided in the explanation section

Explanation:

Given that:

Assume D(k) =║ true it is [1 : : : k] is valid sequence  words or false otherwise

  • To determine D(n)

now the sub problem s[1 : : : k] is a valid sequence of words IFF s[1 : : : 1] is a valid sequence of words and s[ 1 + 1 : : : k] is valid word.

So, from here we have that D(k) is given by the following recorance relation:

D(k) = ║ false maximum (d[l]∧DICT(s[1 + 1 : : : k]) otherwise

Algorithm:

Valid sentence (s,k)

D [1 : : : k]             ∦ array of boolean variable.

for a ← 1 to m

do ;

d(0) ← false

for b ← 0 to a - j

for b ← 0 to a - j

do;

if D[b] ∧ DICT s([b + 1 : : : a])

d (a) ← True

(b). Algorithm Output

      if D[k] = = True

stack = temp stack           ∦stack is used to print the strings in order

c = k

while C > 0

stack push (s [w(c)] : : : C] // w(p) is the position in s[1 : : : k] of the valid world at // position c

P = W (p) - 1

output stack

= 0 =

cheers i hope this helps !!!

8 0
3 years ago
Other questions:
  • Where is the insert function button found in microsoft excel?
    11·1 answer
  • An operating system cannot run from an external drive. true or false
    15·1 answer
  • The Internet may best be compared to a/an
    8·1 answer
  • Each webpage is assigned a(n) ______, an address that identifies the location of the page on the Internet.
    6·1 answer
  • Which of the following is the correct order of the SDLC?
    14·1 answer
  • Which of the following best explains what the profit motive pushes producers to do
    9·1 answer
  • Write a program that reads an unspecified number of integers, determines how many positive and negative values have been read, a
    8·1 answer
  • Define client and.server​
    13·1 answer
  • To extract detailed and comprehensive responses from your client, use the _____ questioning technique.
    5·2 answers
  • What is file management?can please help me​
    14·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!