What is encapsulation technique, Computer Engineering

Hiding data within the class and making it available only by the methods. This method is used to protect your class against accidental changes to fields, which might leave the class in an inconsistent state.              

 

 

Posted Date: 4/9/2013 3:22:54 AM | Location : United States







Related Discussions:- What is encapsulation technique, Assignment Help, Ask Question on What is encapsulation technique, Get Answer, Expert's Help, What is encapsulation technique Discussions

Write discussion on What is encapsulation technique
Your posts are moderated
Related Questions
Make a spreadsheet that has on every line an integer student identification number followed by 3 quiz grades for that student.  Go though that information from the spreadsheet into

Explain the difference between depth first and breadth first traversing techniques of a graph.   Depth-first search is dissimilar from Breadth-first search in the following way

Define underflow and overflow. Underflow: If the result the arithmetic operation including n-bit numbers is too small to show by n-bits, underflow is said to occur. Overflow

Can I get the scheduling code for NachOS?

Which structure can be used as a criterion for classification of data structures used in language processing. And. Nature of a data structure, purpose of a data structure and l

Design two matlab algorithms for enlarging the 256x256 images into 512x512 images by using bilinear and bicubic interpolations   a)  Evaluate the interpolated images with the

Explain File scope File scope: The variables and functions with file scope appear outside any block or list of parameters and are accessible from any place in the translation

A verification point is a point in a script that you make to confirm the state of an object across builds of the application-under-test.

The term byte stuffing refers to: The term byte stuffing consider as to data stuffing used along with character -oriented hardware.

Signalling transfer point (STP) exist in (A) Strowger exchange                  (B)  SS7 (C)  Local area network                 (D)  PABX Ans: STP that is stand f