3460:421 OOP S22 Encapsulation

12345678910111213141516171819202122232425262728
Across
  1. 2. Use get method names for _____ methods
  2. 6. In limiting the interface, we want to limit the access and _____
  3. 12. With _____ _____ we hide the internal representation, or state, of an object from the outside
  4. 18. One of the Information Hiding Rules is Don't expose _____ _____ of a class
  5. 20. The _____ _____ states that we should place data and the operations that perform on that data in the same class
  6. 21. We always want a minimum essential _____
  7. 23. Want to _____ client's from changes to data members
  8. 24. Use _____ methods for read access if needed externally to class
  9. 26. Use _____ whenever possible for reference and pointer parameters and methods
  10. 27. Don't make the _____ tie data and operations together
  11. 28. Start with the _____ functionality and configurability, and add as needed
Down
  1. 1. Developers tend to _____ and provide more than is needed (sometimes missing what is needed)
  2. 3. In limiting the interface, we want to use _____ access whenever possible
  3. 4. In limiting the interface, we want to limit the _____ available
  4. 5. In limiting the interface, remove any unneeded _____
  5. 7. With private methods, only _____ methods or friends of a class can access
  6. 8. An additional improvement is that a separate iterator object would allow multiple, _____ access
  7. 9. Make all fields and data members _____
  8. 10. One of the Information Hiding Rules is Don't expose a class's _____ structure
  9. 11. One of the Information Hiding Rules is Don't expose the difference between stored data and _____ data
  10. 13. Unless required, more is _____ better
  11. 14. With _____ methods, only internal methods or friends of a class or derived class can access
  12. 15. Applying the encapsulation rule improves the class _____
  13. 16. In Java, Objects are passed by object _____
  14. 17. Use _____ methods for write access if needed externally to class
  15. 19. Always return data by value or _____ reference
  16. 22. The bundling of data with the methods that operate on that data
  17. 25. One of the Information Hiding Rules is Don't expose _____ items