The scanner class has a series of methods that checks to see if there is any more well-formed input of the appropriate type. These methods are called __________ methods:
a. nextToken
b. hasNext
c. getNext
d. testNext
B
Computer Science & Information Technology
You might also like to view...
The type of computer most vulnerable to theft is a ________
A) microcomputer B) portable computer C) desktop computer D) minicomputer
Computer Science & Information Technology
How do you animate text beyond the first bulleted-level on a slide?
A) Right-click and click Beyond B) Right-click and click Animate Text C) Click the Animation Dialog Box Launcher D) Click the Effect Options button on the Animations tab
Computer Science & Information Technology