1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Allushta [10]
3 years ago
6

Set methods are also commonly called _____ methods, and get methods are also commonly called _____ methods.

Computers and Technology
1 answer:
WITCHER [35]3 years ago
7 0

Answer:

mutator, accessor

Explanation:

Set methods are commonly called mutator methods, and get methods are commonly called accessor methods.

This is because set methods are used to mutate the state of a variable. Get methods, on the other hand are used to access the current state of the variable.

For example:

class Demo{

    //Member variable

    private int var;

    //Accessor method

    public int getVar(){

          return var;

    }

    //Mutator method

    public void setVar(int value){

         var=value;

    }

}

You might be interested in
22. A<br> allows one computer to input data into another computer.
Katen [24]

Answer:

input device

Explanation:

any hardware device that allows users to enter programs, data, and commands into a computer system

7 0
3 years ago
When using the red / yellow / green method to present status of a project, yellow can mean which of the following? A. There are
DerKrebs [107]
It would be A. Think of radar for weather. Yellow splotches mean that it could get worse, but could get better. Hoped it helped!
5 0
3 years ago
Read 2 more answers
If you are uploading files you plan to edit online, you will need to convert them to Google Drive format. T or F
Amiraneli [1.4K]

Answer:

save as a word document (.docx) to keep editing offline then copy and paste into the google doc

5 0
3 years ago
Write a while loop that prints userNum divided by 2 (integer division) until reaching 1. Follow each number by a space.
Ksenya-84 [330]

Answer:

   while(userNum>=1){

       System.out.print(userNum/2+" ");

       userNum--;

        }

Explanation:

This is implemented in Java programming language. Below is a complete code which prompts a user for the number, receives and stores this number in the variable userNum.

<em>import java.util.Scanner;</em>

<em>public class TestClock {</em>

<em>    public static void main(String[] args) {</em>

<em>    Scanner in = new Scanner (System.in);</em>

<em>        System.out.println("Enter the number");</em>

<em>    int userNum = in.nextInt();</em>

<em>    while(userNum>=1){</em>

<em>        System.out.print(userNum/2+" ");</em>

<em>        userNum--;</em>

<em>         }</em>

<em>    }</em>

<em>}</em>

The condition for the while statement is userNum>=1 and after each iteration we subtract 1 from the value of   userNum until reaching 1 (Hence userNum>=1)

3 0
3 years ago
On laptops with a smart card reader installed, where is the smart card reader usually located?
dem82 [27]
Plenty of space in the palm rest
4 0
3 years ago
Other questions:
  • The _____ function is a logical function that returns a TRUE value if any of the logical conditions are true and a FALSE value i
    10·1 answer
  • It is illegal to have __________ emergency lights on your vehicle.
    6·2 answers
  • you are concerned with security at your company and want to implement a technology that requires no configuring on the users sid
    15·1 answer
  • When creating a presentation you should use a blank as a starting point?
    15·1 answer
  • A user reports that he cleared a paper jam and now cannot print. The technician reseats the paper and then prints a test page fr
    14·1 answer
  • Which type of account is typically the MOST liquid?
    15·1 answer
  • Refer to the method f: Public int f( int k, int n ) { if( n == k ) return k; else if( n &gt; k ) return f( k, n - k ); else retu
    8·1 answer
  • What is pseudo code?
    11·2 answers
  • I need to reverse a inputted word using for loops with range 0 to the input word and increment 1.
    5·1 answer
  • By definition, what is the process of reducing security exposure and tightening security controls?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!