Match each term with the correct statement below.

A. Used to return a value back to the calling method
B. The first line of a method
C. Data components of a class
D. The combination of the method name and the number, types, and order of arguments
E. Variables in the method declaration that accept the values from the actual parameters
F. Are called class methods
G. Variables you declare within a class, but outside of any method
H. Included within the method declaration parentheses
I. An application or a class that instantiates objects of another prewritten class
J. Encapsulating method details in a class
K. Unreachable statements that can never execute
L. Classes that can be used as the basis for any other class
M. Method that retrieves a value
N. Method that sets or changes field values
O. Allocates memory for an object


A. return statement
B. header
C. instance variables
D. method's signature
E. formal parameters
F. static method
G. data fields
H. parameter type
I. class user
J. implementation hiding
K. dead code
L. extended
M. accessor method
N. mutator method
O. new operator

Computer Science & Information Technology

You might also like to view...

What elements are required for a network to exist for three or more devices?

What will be an ideal response?

Computer Science & Information Technology

Match each item with a statement below.

A. Examines network traffic for known attack signatures B. Composed of information commonly known about the individual C. Uses a list of common passwords to try to crack an unknown password D. Typically the most time consuming way to crack a password E. The technique of examining the network traffic entering a network or a computer and determining if the traffic is malicious in nature

Computer Science & Information Technology

Pressing [Ctrl] [______] moves you to the top of a document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

VMWare?s ESXi is an example of a(n) _____________.

A. operating system B. virtual machine C. bare-metal hypervisor D. sandbox

Computer Science & Information Technology