Alice uses ____ to surround an index number of an array.

A. square brackets
B. curly braces
C. asterisks
D. arrows

Answer: A

Computer Science & Information Technology

You might also like to view...

________ attempts to trick Internet users into thinking a fake but official-looking website or email is legitimate.

A. Phishing B. A first-party cookie C. A Trojan horse D. A third-party cookie

Computer Science & Information Technology

Which of the following malware types is MOST commonly associated with command and control?

A. Rootkits B. Logic bombs C. Botnets D. Backdoors

Computer Science & Information Technology