You can use a(n) _______________ to create a collection that offers only read-only access to others while allowing read–write access to yourself.

Fill in the blank(s) with the appropriate word(s).


unmodifiable wrapper.

Computer Science & Information Technology

You might also like to view...

What are the advantages of using vector-based animation formats? Are there any disadvantages? If so, what are they?

What will be an ideal response?

Computer Science & Information Technology

A JCheckBox is selected when its isSelected method returns _____________.

a) on b) true c) selected d) checked

Computer Science & Information Technology

If you need to employ security by disallowing users from one department or network segment from access another department's resources, which should you use?

A. bridges B. hubs C. routers D. switches

Computer Science & Information Technology

The ostream member function ________ is used to perform unformatted output.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology