Methods from the ________ class can be used to read data from a file.
a) StreamWriter
b) FileReader
c) StreamReader
d) ReadFile
Answer: C
Computer Science & Information Technology
You might also like to view...
________ is a procedure for identifying active hosts on a network, either to attack them or as a network security assessment.
A. Vulnerability scanning B. Port scanning C. Workstation scanning D. Network scanning
Computer Science & Information Technology
If the cell references should not be modified when moved to a new location, you should use a(n) relative reference.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology