1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
IgorC [24]
4 years ago
12

Which class can be used to read data into a text file?

Computers and Technology
1 answer:
son4ous [18]4 years ago
7 0

Answer:

BufferedReader

Explanation:

There are many ways for reading a file. Many classes independently or with combination can be used for this purpose.

Option (a) BufferedReader class can be used to read data of a file.

Option (b) The System class contains methods which are useful to conduct IO ( Input Output ) operations like Standard Input and Standard Output.This class cannot be used to read a file. So, option (b) is not correct answer.

Option (c) and (d) Even though the names ReadFile and FileRead seems to be classes related to reading a file but there are no classes with the names ReadFile and FileRead. Infact there is a class named "FileReader" which can be used to read a file along with "BufferedReader" class. So, options (c) and (d) are not correct answers.

You might be interested in
A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her ac
muminat

Answer:d)apprehend and prosecute

Explanation: A intruder is a person who tries to access the system or damage it in an unauthorized manner. The person who is found with any intruding activity should be discovered.

Apprehending means of getting aware and prosecute defines the accusing of any person committing a crime .These activities define the nature of the intruder whose trying to commit the crime and should be detected while he  is pursuing the activity.Thus , the correct option is option(d).

7 0
3 years ago
Pleaseee need help ASAP!!<br><br> Will mark BRAINLIEST!! :)
torisob [31]

Answer:

The correct option is Option B

Explanation:

We need to find examples of client-side code.

Client Side code: The part of code, that doesn't require server for performing specific task

SO, The correct option is Option B

Prompt for special characters in user name

Reason: We can use alert to generate prompt using JavaScript or through validation and it can be done on client side.

All other options, we need to hit the server to perform the task, So they are not client-side code.

6 0
3 years ago
Are brake and break pronounced the same way?​
erastova [34]

Answer:

one is correct and yes

Explanation:

4 0
3 years ago
What does Digital Citizenship mean to you?
Nikolay [14]
A digital citizen refers to a person who has the knowledge and skills to effectively use digital technologies to communicate with others, participate in society and create and consume digital content. Digital citizenship is about confident and positive engagement with digital technologies. Digital citizenship refers to responsible technology usage, and teaching digital citizenship is essential to helping students achieve and understand digital literacy, as well as ensuring cyberbullying prevention, online safety, digital responsibility, and digital health and wellness.
5 0
3 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Other questions:
  • Which Computer career field enables you to create and design interactive multimedia products and service
    5·2 answers
  • Create a public non-final class named Streamer. You should implement one class method: filterStrings. It should accept a single
    8·1 answer
  • Using the phase plane program, plot the phase plane for the Lotka-Volterra model:
    11·1 answer
  • Composition means ________. a)that data fields should be declared private b)that a class extends another class c)that a variable
    6·1 answer
  • Different search engines available on the internet​
    7·1 answer
  • Change the following sentences using 'used to
    12·1 answer
  • Va rog urgent
    8·1 answer
  • 9.
    8·1 answer
  • A(n) ___________ allows people at two or more locations to interact via two-way video and audio transmissions simultaneously as
    6·1 answer
  • Which of the following is opened when the Find command is clicked? Question 9 options: Navigation Pane Insert Hyperlink dialog b
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!