________ is an intermediate operation that transforms a stream’s elements to new values and produces a stream containing the resulting (possibly different type) elements.

a. Transforming
b. Converting
c. Mapping
d. Translating

c. Mapping

Computer Science & Information Technology

You might also like to view...

You should include no more than ____ subcategories for each main category on a Web site.

A. two B. four C. five D. ten

Computer Science & Information Technology

When an incident violates civil or criminal law, it is the organization's responsibility to notify the proper authorities; selecting the appropriate law enforcement agency depends on __________.

A. the type of crime committed B. how many perpetrators were involved C. the network provider the hacker used D. what kind of computer the hacker used

Computer Science & Information Technology