1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
son4ous [18]
4 years ago
6

Assume that inputFile references a Scanner object that was used to open a file. Which of the following while loops is the correc

t way to read data from the file until the end of the file is reached?
Computers and Technology
1 answer:
diamong [38]4 years ago
6 0

Answer:

while(inputFile.hasNext()) { //some code here  }

Explanation:

Even though you did not provide the options, here is how it should look like.

It is known in the question that there is an object called <em>inputFile. </em>To be able to read all the data from a file in Java, you need to use <em>hasNext()</em> function with the object. inputFile.hasNext() enables you to read the data in a file.

while(inputFile.hasNext()) {   } enables you to loop through the file while it has something to read in a file.

You might be interested in
Choose the appropriate computing generation.
tia_tia [17]

Answer:

5th generation : artificial intelligence

3rd generation: integrated circuits

4th generation : microprocessors

5th generation: parallel processing

<em>hope this helps!</em>

5 0
3 years ago
Read 2 more answers
2. Why is there no country code for the USA?
babymother [125]

Answer:

there is a contrary

Explanation:

+1

4 0
3 years ago
Read 2 more answers
What are the vitamins used for DNA Synthesis and Repair?​
raketka [301]

Answer:

Vitamins C & E

Vitamin D

Vitamin B3

5 0
3 years ago
Which access control principle limits a user's access to the specific information required to perform the currently assigned tas
Svetradugi [14.3K]

Answer:

The answer is "Need-To-Know Access Control Principle"

Explanation:

There are three types of access control methods such as Role-Based Access Control, Discretionary Access Control and Mandatory Access Control.

The access control principle that limits/blocks the user from gaining access to a folder/information/procedure within the system is called "Need-To-Know Access Control Principle".

I hope this answer helps.

4 0
3 years ago
I have a summary to write for my robotics class but it is way too hard and i have a bery less time. If you can help me it would
Ierofanga [76]

Answer:

What is Robotics?

Robotics is the branch of technology that deal with the design, construction, operation and application of robots as well as computer system for there control, sensory feed back, and information processing. the design of given robotic system often contain principle of mechanical or electronic engineering and computer science. The word robotic was first used in 1941 by the writer Isaac Asimov.

Branches of robotics:

Artificial intelligence: The developing of an intelligence of machine and is a branch of computer science.

Nano Robotics : the field of creating machines that are at a scale of a nano meter.

Tele-presence: The study given to an illusion of being at a place without being there physically.

Robot Locomotion: The study of method that Robots used to transport them selves from place to another.

Robots have long captured the human imagination but despite many advances robots have yet to reach the potential so often envisioned in science fiction today engineers and computer scientist are still pursuing one missing ingredient high intelligence it would be nice for example: if robots possessed the intelligent needed to cope  with uncertainty, learn from experience and work as team.

Intelligent robots will be one of the engineering achievement of 21 century said Junku Yuh, how leads the robotics program in the national science foundation computers and information science and engineering directorate "we will see them more and more in our daily life".

5 0
3 years ago
Other questions:
  • The Internet may best be compared to a/an
    8·1 answer
  • You can avoid culture shock by ____________.
    10·2 answers
  • Please check my answer! (Java)
    13·1 answer
  • A type of VPN connection, where a single computer logs into a remote network and becomes, for all intents and purposes, a member
    13·1 answer
  • What is the forging of the return address on an email so that the email message appears to come from someone other than the actu
    11·1 answer
  • A ________ database state is one in which all data integrity constraints are satisfied
    15·2 answers
  • (20points)
    6·1 answer
  • Choose the correct term to complete the sentence.
    12·1 answer
  • What is the name of the process of checking the client's production environment to ensure software and hardware compatibility wi
    5·2 answers
  • Explain the working principle of computer with suitable diagram​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!