The scanner class has a series of methods that checks to see if there is any more well-formed input of the appropriate type. These methods are called __________ methods:

a. nextToken
b. hasNext
c. getNext
d. testNext

B

Computer Science & Information Technology

You might also like to view...

The type of computer most vulnerable to theft is a ________

A) microcomputer B) portable computer C) desktop computer D) minicomputer

Computer Science & Information Technology

How do you animate text beyond the first bulleted-level on a slide?

A) Right-click and click Beyond B) Right-click and click Animate Text C) Click the Animation Dialog Box Launcher D) Click the Effect Options button on the Animations tab

Computer Science & Information Technology