A(n) __________ allows a program to walk through the collection and remove elements from the collection.

a. Set.
b. Queue.
c. Iterator.
d. List.

c. Iterator.

Computer Science & Information Technology

You might also like to view...

Which protocol is the secure counterpart of HTTP?

A. SSL B. HTTPS C. Telnet D. RSH

Computer Science & Information Technology

Session hijacking attacks listen in on a wireless network, gathering up all the conversations and gaining access to passwords, shared keys, or other sensitive information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology