Implementing encapsulation with public, protected, and private access control
This section covers access control.