1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yawa3891 [41]
3 years ago
12

Assume that input file references a Scanner object that was used to open a file. Which of the following while loops shows the co

rrect way to read data from the file until the end of the file is reached?a. while (inputFile != null)b. while (!inputFile.EOF)c. while (inputFile.hasnextInt())d. while (inputFile.nextLine == " ")
Computers and Technology
1 answer:
Brut [27]3 years ago
4 0

while (!inputFile.EOF) loops shows the correct way to read data from the file until the end of the file is reached.

b. while (!inputFile.EOF)

<u>Explanation:</u>

Normally to read an input files as loop the program reads till end of file mark been seen.  A loop been executed till an EOF is reached.

End user has to write a logic in software languages  which should have a loop and ready a bit or set of bits which depends of end user technology and stop reading till end of file which is called  EOF = true.  

If EOF is not true then end user program loop never ends and program is either hang or bug or goes to really task.

End user has check either EOF = True or files size reach to end of bytes. Whichever comes first.

Otherwise if EOF is not true then it is corrupted files.

You might be interested in
What is the best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried
Wittaler [7]

Answer

The best approach to handling the expectation of privacy by employees in the event an investigation needs to be carried out on company-owned digital assets:-<u>A well-defined published policy that clearly states that an employer has the right to examine, inspect or access company-owned assets.</u>

3 0
3 years ago
Which of the following is a recommended approach for data backup? Select one: a. Allow employees to take copies of vital data ho
frosja888 [35]

Answer:d)Use online databases to update and backup the data.

Explanation: Data backup is the creation of copy of the data to be stored in the secondary memory.This data is utilized when the data is lost or deleted from original positional and thus gets restored . Database are used for the updating the backed-up data on online mode.

Other options are incorrect because it does not creates copies for the offices members to take home, no data storage is created in following organization and does not store data in external disk.Thus, the correct option is option(d).

6 0
3 years ago
When considering the typical characteristics of a server, how is the server optimized in relation to applications?
VLD [36.1K]

Answer: Server are optimized so that they can work efficiently and improve their performance while working. Application server optimization mechanism can be used for optimizing the server with respect to the application.

Some of the techniques used in the application server optimization are as follows:-

  • Load balancing- which helps in upgrading throughput ,improves the time of response, enhance the bandwidth of network etc.
  • Fail-over management- it is used for decrement of latency, balancing the server, increasing the availability of network and it resources etc.

3 0
3 years ago
In what form do the hexadecimal numbers need to be converted for a computer’s digital circuit to process them? Hexadecimal numbe
artcher [175]

Answer:

people45

Explanation:

3 0
3 years ago
Computer Science uses the power of ______________ to solve problems.
Alchen [17]
Computer Science uses the power of computers to solve problems.
8 0
3 years ago
Other questions:
  • In the world of computers, the term ____ refers to the computerâs physical components, such as the monitor, keyboard, motherboar
    14·1 answer
  • Which player type focuses on level progression?
    13·1 answer
  • Siva added a "Contact Form" to her website.
    10·1 answer
  • Any part of the computer that you can touch is called ________.
    6·1 answer
  • Create a class called Fraction. Provide a constructor that takes 2 integers. Provide methods for:
    8·1 answer
  • Premise: Tracy has a file that contains a list of actors and the movies in which they acted. She wants to know the top 3 ranked
    8·1 answer
  • Select the correct answer from each drop-down menu. Which two factors do ergonomic principles consider a part of a job? Ergonomi
    10·1 answer
  • Hydraulic pressure is the same throughout the inside of a set of brake lines. What determines the amount of resulting mechanical
    7·1 answer
  • If you have 128 oranges all the same size, color, and weight except one orange is heavier than the rest. Write down a C++ Code/A
    7·1 answer
  • 50 ) What is the cell address of 4th row and 4th column? A) 4D B) E4 оооо C) 04 D) B4​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!