Methods from the ________ class can be used to read data from a file.

a) StreamWriter
b) FileReader
c) StreamReader
d) ReadFile

Answer: C

Computer Science & Information Technology

You might also like to view...

________ is a procedure for identifying active hosts on a network, either to attack them or as a network security assessment.

A. Vulnerability scanning B. Port scanning C. Workstation scanning D. Network scanning

Computer Science & Information Technology

If the cell references should not be modified when moved to a new location, you should use a(n) relative reference.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology