1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aksik [14]
2 years ago
12

(true or false) A setter or getter method in object-oriented programming is an example of encapsulation.

Computers and Technology
1 answer:
marusya05 [52]2 years ago
5 0

Answer:

True.

Explanation:

Encapsulation wraps and bundle data under a single data(so external access to such variable outside of the class is restricted). Getter and Setters are functions that gets and sets a specific value within your object class. If you override the setter and getter function within the class(and not declare it in primary constructor), it allows to store and bind specific information about data inside the class.

You might be interested in
When the program generates or populates reports after getting the data and processinng,it is called
TiliK225 [7]

Answer:

In computing, extract, transform, load (ETL) is the general procedure of copying data from one or more sources into a destination system which represents the data differently from the source(s) or in a different context than the source(s).

Data extraction involves extracting data from homogeneous or heterogeneous sources; data transformation processes data by data cleansing and transforming them into a proper storage format/structure for the purposes of querying and analysis; finally, data loading describes the insertion of data into the final target database such as an operational data store, a data mart, data lake or a data warehouse. Hope this helps! PLEASE GIVEE ME BRAINLIST!!! =)

6 0
3 years ago
You are a network technician for a small network. Your ITAdmin workstation just stopped communicating with all other computers i
Lelu [443]

Answer:

Ping the other workstations from the IT Admin workstation to confirm that connection has been lost, check the status of the network interface card in the workstation with command ifconfig in the terminal, then reset the connection using ifdown and ifup commands. If the problem is not resolved, check the cable connection.

Explanation:

Ping is an ICMP echo message sent by a network host to another to check for connectivity. If they are connected, the other workstation responds with an ICMP response message.

The ifconfig in Linux systems displays the network adapters and their individual IP configurations. If there is no connection even after the network is reset, then the cable connectors could be the problem.

8 0
3 years ago
Do windows+ Tab keys allow you to view documents at one time or the same time
pentagon [3]

Answer:

Yes, at the same time. But not really in too much detail. (if you have a small monitor that is.)

Explanation:

I've attached an image below of what the Window + Tab key looks like and does.

6 0
3 years ago
Tech A states that batteries have different sizing and configuration requirements. Tech B states that this helps them to fit the
Ymorist [56]

Answer:

Both

Explanation:

Batteries come in different sizes and configurations. This is evident in car batteries where third sizes vary from car to car depending on the space and manufacturer's discretion.

Thus, Both technicians are correct.

Cheers

3 0
3 years ago
What is networking??????????????????????
kodGreya [7K]

Answer:

the activity or cycle of collaborating with others to trade data and create proficient or social contacts.

Explanation:

<3

8 0
3 years ago
Other questions:
  • Are u a chicken nugget!!??
    14·2 answers
  • Select all examples of proper keyboarding technique.
    15·2 answers
  • Which group of commands all appear on the Standard toolbar?
    9·2 answers
  • Kiaan wants to give people who attend his presentation a printed copy of the slides. Instead of printing one slide on each piece
    11·1 answer
  • In order to do a binary search on an array Group of answer choices you must first do a sequential search to be sure the element
    5·1 answer
  • You have noticed that one of your DNS servers has possibly been compromised. You believe that a cached DNS entry for your domain
    8·1 answer
  • Rule number one for handling an emergency is to _____. A. buy a new vehicle B. call law enforcement C. remain calm D. restart th
    6·2 answers
  • To delete only the selected contents of the table, but not the table itself, ____.
    7·1 answer
  • COMPUTER CODING
    5·1 answer
  • Write a C program that right shifts an integer variable 4 bits. The program should print the integer in bits before and after th
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!