What two terms are used for the methods that are used to observe or modify the state of an object, respectively

Answers

Answer 1
The answer is: accessors and mutators

Accessors and Mutators are used to observe or modify the state of an object respectively.
Answer 2

The two terms used for the method that is used to observe or modify the state of an object, are accessors, and mutators.

What are accessors, and mutators?

Arrangements and mutators are both used in Java to find and set the value of private fields, respectively. Accessors and algoritmo are both referred to as getters and setters, respectively.

The verb "access," which enables the user to access the secret data in a class, serves as the inspiration for the name of the accessor function.

Accessors are the same as "winners," the "get" operation, and other similar terms. The private constants and variables are retrieved by the getters so that they can be used outside of a class.

To learn more about accessors and mutators,

https://brainly.com/question/13098886

#SPJ12


Related Questions

Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the lower bound, and the upper bound. The method also takes in a boolean parameter. The method creates and returns an integer array of the specified size that contains random numbers between and lower and upper bound. If the boolean parameter is true, the upper bound is inclusive. If the boolean parameter is false, the upper bound is not inclusive (meaning it is exclusive). Note the lower bound is always inclusive. If any of the parameters are invalid, null is returned.

Answers

Write a complete method to create an array of random integers. The method takes in three integer parameters: the array size, the lower bound, and the upper bound. The method also takes in a boolean parameter. The method creates and returns an integer array of the specified size that contains random numbers between and lower and upper bound. If the boolean parameter is true, the upper bound is inclusive. If the boolean parameter is false, the upper bound is not inclusive (meaning it is exclusive). Note the lower bound is always inclusive. If any of the parameters are invalid, null is returned.

Hope this helps!

Define mini computer

Answers

Answer:

Definition of minicomputer

a small computer that is intermediate between a microcomputer and a mainframe in size, speed, and capacity, that can support time-sharing, and that is often dedicated to a single application.

Answer:

A very small Computer

Explanation:

I computer that is very small like a apple watch.

help its in binary and im a small brain for that

Answers

The bit on the i-th position from RIGHT to LEFT has a value of 2 to the i (start counting with 0), so,

First one is,

[tex]0\cdot2^3+1\cdot2^2+0\cdot2^1+1\cdot2^0=5[/tex]

The next are thusly,

[tex]2,0,6[/tex] and 8.

Hope this helps :)

A browser processes requests every time a person clicks on a
hyperlink.
O True
O False

Answers

Answer:

False

Explanation:

Write a for loop that is going to check whether the values in data_list are even or odd. Use a for loop with a conditional to do this. For each value, it should add True to a new list is_even if the value is even, and False to is_even if the value is odd.

Answers

Answer:

Jsjshshusuaijwiwueheue

Consider the following program written in C syntax:
void swap(int a, int b) {
int temp;
temp = a;
a = b;
b = temp;
}
void main() {
int value = 2, list[5] = {1, 3, 5, 7, 9};
swap(value, list[0]);
swap(list[0], list[1]);
swap(value, list[value]);
}
. Passed by value-result

Answers

Answer:

5=swap 0

Explanation:

becouse it is invalid

Write a algorithm to calculate the sum of digits in a given three digit number

Answers

[tex]{\huge{\pink{↬}}} \:  \: {\huge{\underline{\boxed{\bf{\pink{Answer}}}}}}[/tex]

Sum of digits algorithm

Step 1: Get number by user.

Step 2: Get the modulus/remainder of the number.

Step 3: sum the remainder of the number.

Step 4: Divide the number by 10.

Step 5: Repeat the step 2 while number is greater than 0.

give 5 examples for software ​

Answers

Answer:

Adobe Photoshop.

Picasa.

VLC Media Player.

Windows Media Player.

Windows Movie Maker

2. What is multimedia? Explain the components of multimedia​

Answers

The various components of multimedia are Text, Audio, Graphics, Video and Animation. All these components work together to represent information in an effective and easy manner. 1)Text: Text is the most common medium of representing the information. In multimedia, text is mostly use for titles, headlines,menu etc.

Mounting a file systems means that: the file system is being created in the disk space. the file system is removed from the disk space. the file system is becoming available within the file system name space. the file system is becoming unavailable within the file system name space.

Answers

Answer:

Mounting is a process by which the operating system makes files and directories on a storage device (such as hard drive, CD-ROM, or network share) available for users to access via the computer's file system.

Explanation:

50 ) What is the cell address of 4th row and 4th column? A) 4D B) E4 оооо C) 04 D) B4​

Answers

Answer:

The cell address of 4th row and 4th column is

4D/D4

Why LinkedIn doesn’t like automation tools?

Answers

Answer:

LinkedIn has clearly mentioned that using LinkedIn automation is against their TOS. They block an account if they suspect any automation activity.

It’s because they want to keep the platform transparent and free of spam. Many users have already called it the worsts social media platform because of spamming.

On the other hand, large companies and brands are endorsing these tools. Many users have got their accounts blocked while many are using LinkedIn automation to grow their business opportunities.

what do these two parts of the lift do?​

Answers

Answer:

The Big Bang Theory is our best guess about how the universe began. A 2013 map of the background radiation left over from the Big Bang, taken by the ESA's Planck spacecraft, captured the oldest light in the universe. This information helps astronomers determine the age of the universe. ... The "Big Bang Theory" TV show.

as computers work, they generate heat. Discuss the types and importance of cooling systems in the computer system ​

Answers

Answer:

If no cooling, computer is burning, whole house burming

Three brands of petrol were compared on five makes of car. Table below shows the kilometers travelled in each case, on a standard amount of petrol under similar conditions.

Petrol brand
Make of car
A B C D E

1
2
3
31.0 33.5 28.0 40.1 34.1
29.5 31.4 25.0 30.2 32.1
22.7 32.1 26.4 29.8 30.1

Required: Carry out the analysis of variance (ANOVA) and test, at the 5% level of significance, for differences between makes of car and between brands of petrol.​

Answers

Answer:

rwrertttttttttttttteeeeeewwqqqqqqdddf

Explanation:

3523232w3qewerderttrrtesdweasdwae2q4ewesdeswd

List at least three particular pieces of data you would collect to determine the effects of water pollution kind of data would you collect (number data, text data , sensor , etc.)? Would you be able to make any other conclusions by using the data you collect?

Answers

The three particular pieces of data which a person would collect to determine the effects of water pollution are

TemperatureTurbiditypH level

The question of whether a person would be able to make any other conclusions by using the data you collect is:

Yes, because the data can be analysed.

What is Water Pollution?

This refers to the contamination of water which makes a body of water to begin to lose its natural composition.

With this in mind, we can see that to find out the effects of water pollution in a particular body of water, then there needs to be extensive testing of the water to find out the pH level, water temperature, etc.

Read more about water pollution here:
https://brainly.com/question/1235358

George has to present the goals of information management to his team member. What is a goal of information management? The goal of information management is to identify information requirements for various levels.

Answers

Answer:

The purpose of information management is to: design, develop, manage, and use information with insight and innovation. support decision making and create value for individuals, organizations, communities, and societies.

Explanation:

Write the 5 roles of operating system.​

Answers

Answer:

» It controls the booting process.

» It carries out disk configuration processes.

» It's the master processor in end to end user tasks.

» It verifies the legitimate user by loading passwords.

» It carries and controls the machine cycle

Explanation:

[tex].[/tex]

What is connectivity?

Answers

Answer:

In general terms, connectivity is the ability to connect systems or application programs.

connecting devices to each other in order to transfer data back and fourth

Select the best answer for the question
17. Which of the following is a design theory that recognizes that many problems are similar to problems that have already been solved?
O A. C-K Theory
O BASE
OC. TRIZ
OD. General Design Theory

Answers

your answer is C my guy

Điền dữ liệu cho cột Phân loại theo điều kiện sau:
+ Nêu ngày công từ 20 ngày trở lên xếp loại A:
+ Nếu ngày công từ 18 ngay đến 20 ngày xếp loại B; 19
+ Nếu ngày công từ 17 ngày trở xuống xếp loại C. 20 (b) Tinh Lương = 490000 x Hệ số 21 (c) Tinh Thương biết
+ Nếu xếp loại A được thưởng 650000 đồng, + Nếu xếp loại B được thưởng 450000 đồng,
+ Nếu xếp loại C bị phạt 250000 đồng 25 (4) Tinh Thực lĩnh = Lương + Thưởng 26 (6) Tinh tổng phụ theo phái.

Answers

Answer:

need the PT thx have a nice day

1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could be obtained immediately after training or at periodic intervals over several months.

Answers

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

Which of the following is an example of a
payload?

Answers

Answer:

LOAD

Explanation: PAY

Answer: it's B,  E-Mail message

Explanation:

There are fifty photographs and each photographs is between 1.8 and 2.5 in size, what is the maximum storage required for a set of photographs and suitable medium to use for the copies to be sent to the gust

Answers

write down the factor on which gravitation force depends

Topic:

Recursion. Use recursion to display the pattern given above. No loops allowed.

See the picture for the pattern​

Answers

Answer:

const SIZE=8

function print(n, s) {

 if (n > 0) {

   process.stdout.write(s);

   print(n-1, s);

 }

}

function main(n=1) {

 if (n<=SIZE) {

   print(SIZE-n, "  ");

   print(n, "* ");

   process.stdout.write("\n");

   main(n+1);

 }

}

main();

Explanation:

Here is a solution in javascript. Note that it uses recursion multiple times to avoid loops.

1. What are the process involved in data processing cycle?​

Answers

Answer:

This cycle involves the following steps: Collection of data. Preparation of the data into a format suitable for data entry, as well as error checking. Entry of the data into the system, which may involve manual data entry, scanning, machine encoding, and so forth.

hiiiiii

______________________ created a comprehensive standard to help any organization create an information security governance program.

a. The Federal Trade Commission
b. The Government Accountability Office (GOA)
c. The International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC)
d. National Institute of Standards and Technology (NIST)

Answers

c the internation Organization for standardization (iso) and the international electrotechnical commission (irc)

The Federal Trade Commission created a comprehensive standard to help any organization create an information security governance program. Thus, option A is correct.

What is International Electrotechnical Commission (IEC) ?

International Electrotechnical Commission (IEC) which was first formed in 1906 is the predominant organization for developing and publishing international standards for technologies related to electrical and electronic devices and processes.

The standards developed by this association are widely used in scientific fields such as power generation, semiconductors, fibre optics, batteries, solar energy, nanotechnology and marine energy. They also proposed the International System of Units( SI unit) used in many fields of study today.

Therefore, The Federal Trade Commission created a comprehensive standard to help any organization create an information security governance program. Thus, option A is correct.

Learn more about Federal Trade Commission on:

https://brainly.com/question/12007903

#SPJ2

How was Television used when originally invented? How is television used today?

Answers

Explanation:

.......................

Answer:

Than:

Baird's early mechanical television had 30 holes and rotated 12.5 times per second. There was a lens in front of the disk to focus light onto the subject. When light hit the subject, that light would be reflected into a photoelectric cell, which then converted this light energy to electrical impulses.

Now :

Television is an inescapable part of modern culture. We depend on TV for entertainment, news, education, culture, weather, sports—and even music, since the advent of music videos. ... News, current events and historical programming can help make young people more aware of other cultures and people.

which of the following not a hardware componet​

Answers

Answer:

antivirus.......hope this answers your question

Explain basic anatomy of computers.

Answers

Explanation:

A computer system can be divided into two components which are responsible for providing the mechanisms to input and output data, to manipulate and process data, and to electronically control the various input, output, and their storage. ... They are known as hardware and software.

Other Questions
Define the following in your own words. Please do not copy and paste of the internet. Thank you in advancePerpendicular bisectorCylinderPlaneRegular Polygon 1/9 x + 2/3 xy +y Find and simplify the expression if f(x)=x^2-1.f(x-3) Chose the correct property 7(2)6 = 7(12) A) Commutative Property Of Multiplication B) Associative Property Of Multiplication C) Neither explain dehydrogenation suggest why the new isolated southern population of frogs could be considered a separate new species Please help with answers I need them as soon as possible! URGENT 50 POINTS WILL MARK BRAINLIEST HELP Mary plans to put carpeting in her house.The floor plan shows the part of herhouse that will be carpeted. How manysquare feet of carpet does she need? what is 342 m/s in kilometers per hour? Compare and contrasts the advantages of both the north and the south during the civil war Mukesh can walks 8 1/3 km in one hour. How much distance will he covers in 2 2/5 hours? pls answer it quickly How does the protagonist and condensed milk deal with their conflict The ratio of oranges to apples in a basket is 3:4. If 6 oranges were taken from the basket and 6 apples were added to the basket, the ratio of the number of oranges to apples would be 1:6. How many more apples than oranges are there in the original basket? 27Which sentence uses theunderlined vocabulary wordincorrectly.?A. Many students who attend onlineschool exhibit strong erudition in multiplesubject areas.ints innessB. After 12 years of school, high schoolgraduates demonstrate a large measure oferudition.thy,upportC. Emma failed the test; it was a goodexample of her knowledge and erudition inthe subject.owardook Which value of x would make No || Kj? 16810 The exploration of which continent led Europeans to create better maps in the 1800's?1-Europe2-Africa3-North america4-Antartica Keystone research summary lesson 9 I dont even know what these are called, please explain what they are and how they work Solve 4 (z + 5) = 32.The solution is z = 2x+7y=-64x-y=18 PLEASE HELP ASAP