what is encapulation?
Answers were Sorted based on User's Feedback
Answer / yohesh rasal
The wrapping up of data and function into a single
unit(called class) is known as encapsulation.
The data is not accessible to the out side word,and only
those functions which are wrapped in the class can access
it.These function provide the interface between the object
data and the program.This insulation of data from direct
access by the program is called data hiding or information
hiding.
| Is This Answer Correct ? | 32 Yes | 1 No |
Answer / guest
The wrapping of data and its member functions into a single
unit is called encapsulation.
| Is This Answer Correct ? | 5 Yes | 1 No |
Answer / ashish jadhav
hiding non essential details is called encapsulation.
preventing the access of non essential details.
| Is This Answer Correct ? | 4 Yes | 2 No |
Answer / hetal
The wrapping of data and its member functions into a single
unit is called encapsulation.
| Is This Answer Correct ? | 0 Yes | 0 No |
Write a program to implement BFS/ DFS routine in a connected graph
Which tag is used to break a line
I was try to insert 120000 records into the orcle table using the stroed proceeder. But it was stop the 9999. What can I do insert all the records.
plz send me NIC Scientific Officer /Engineer-SB(Programmer) previous question paper or syllabus
Difference between views and index in sas programming
1. Consider the following input and generate the object code using single pass assembler. JOHN START 0 USING *,15 L 1,FIVE A 1,FOUR ST 1,TEMP FOUR DC F’4’ FIVE DC F’5’ TEMP DS ‘F END
Corillian's product is a "Component Container." Name at least 3 component
Difference between delegates and Events?
What is the Super Class of Exception in java?
11 Answers Andesa Services, Benchmark, CitiGroup, CMC, Evergent, KOT Systems, Value Labs, Vijay infoart Solutions,
Which of the following are Java modifiers?
List and explain any five built in functions for Lists data type in python
in network security,how we identified threat?some one say we found threat according to it's signature,but how we get signature or pattern of the virus?