CPSC 421 OOP Encapsulation
Across
- 2. Use get method names for _____ methods
- 6. In limiting the interface, we want to limit the access and _____
- 12. With _____ _____ we hide the internal representation, or state, of an object from the outside
- 18. One of the Information Hiding Rules is Don't expose _____ _____ of a class
- 20. The _____ _____ states that we should place data and the operations that perform on that data in the same class
- 21. We always want a minimum essential _____
- 23. Want to _____ client's from changes to data members
- 24. Use _____ methods for read access if needed externally to class
- 26. Use _____ whenever possible for reference and pointer parameters and methods
- 27. Don't make the _____ tie data and operations together
- 28. Start with the _____ functionality and configurability, and add as needed
Down
- 1. Developers tend to _____ _____ and provide more than is needed (sometimes missing what is needed)
- 3. In limiting the interface, we want to use _____ access whenever possible
- 4. In limiting the interface, we want to limit the _____ available
- 5. In limiting the interface, remove any unneeded _____
- 7. With private methods, only _____ methods or friends of a class can access
- 8. An additional improvement is that a separate iterator object would allow multiple, _____ access
- 9. Make all fields and data members _____
- 10. One of the Information Hiding Rules is Don't expose a class's _____ structure
- 11. One of the Information Hiding Rules is Don't expose the difference between stored data and _____ data
- 13. Unless required, more is _____ better
- 14. With _____ methods, only internal methods or friends of a class or derived class can access
- 15. Applying the encapsulation rule improves the class _____
- 16. In Java, Objects are passed by object _____
- 17. Use _____ methods for write access if needed externally to class
- 19. Always return data by value or _____ reference
- 22. The bundling of data with the methods that operate on that data
- 25. One of the Information Hiding Rules is Don't expose _____ items