To detect exceptions and take corrective action, the ____ structure is used.
A. Try-Catch
B. Try-Code
C. Catch-Error
D. Try-CatchError
Answer: A
Computer Science & Information Technology
You might also like to view...
Most Web developers use ____ to enclose the filename for the background image as the value of the background-image property.
A. single quotation marks B. double quotation marks C. ampersands D. none of the above
Computer Science & Information Technology
It is possible for the DNS server to be attacked, an intrusion called DNS ____.
A. poisoning B. spoofing C. phishing D. cracking
Computer Science & Information Technology