1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
6

Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0

Answer:

mutator, accessor

Explanation:

Set methods are commonly called mutator methods, and get methods are commonly called accessor methods.

This is because set methods are used to mutate the state of a variable. Get methods, on the other hand are used to access the current state of the variable.

For example:

class Demo{

    //Member variable

    private int var;

    //Accessor method

    public int getVar(){

          return var;

    }

    //Mutator method

    public void setVar(int value){

         var=value;

    }

}

You might be interested in
The two roots of a quadratic equation ax^2 + bx + c = 0 can be obtained using the following formula:
Feliz [49]

Answer: ion k

Explanation:

4 0
3 years ago
How to find out where an item was purchased by the upc code?
diamong [38]
There should be a search engine
3 0
3 years ago
A certain social media Web site allows users to post messages and to comment on other messages that have been posted. When a use
vagabundo [1.1K]

D) To determine which posts from a particular user have received the greatest number of comments

<u>Explanation:</u>

Since social media excepting comments from end user website or social media should keep track of end user information such as name with email address and phone extra.

If we do so we can end user information in cans, end user post, wrong post information can be blocked or given end user information for further analysis.  Moreover web site can receive positive or negative posts.

For me all four will be my answer. If we don’t track any information about end user it is against to law.

4 0
3 years ago
Which field would best function as a primary key for a table that tracks orders?
Travka [436]

Answer:

Order ID

Explanation:

An order ID is a new ID for every order. Every number is unique, making it the beat way to find certain orders.

7 0
3 years ago
Read 2 more answers
What is the meaning of s used in 0 and 1 in computer .​
timofeeve [1]

Answer:

A switch, unless it's busted, can be either on or off, closed or open. A switch that is “on” or “closed” passes electrical signal through it, while a switch that is “off” or “open” blocks that signal. Computer Scientists represent an “on” switch with a 1 and an “off” switch with a 0.

Explanation:

hope this helps!!

6 0
2 years ago
Other questions:
  • Question # 6
    13·1 answer
  • Can embedded computers automate security so you can lock and unlock doors remotely
    15·1 answer
  • From the ages of 18 to 24, individuals born from 1980 to 1984 held an average of 6.2 jobs—which is slightly higher than the numb
    10·1 answer
  • Ram, random-access memory, is called that because
    11·1 answer
  • Two floating point numbers, A and B, are passed to a recursive subroutine.
    11·1 answer
  • A ____ is a synonym for a virtualization application.
    5·1 answer
  • Given a PrintWriter reference variable named output that references a PrintWriter object, write a statement that writes the stri
    5·1 answer
  • Which components are involved with input? Output? Processing? Storage?
    15·2 answers
  • The distance between two walls is called what?
    8·2 answers
  • I will mark you as brainlist
    10·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!