Which of the following functions will input a Boolean value from the user?

a. ask user for a number
b. ask user for a Boolean
c. ask user for yes or no
d. ask user for a string
e. None of these



c. ask user for yes or no

Computer Science & Information Technology

You might also like to view...

All WiFi hotspots are available free

Indicate whether the statement is true or false

Computer Science & Information Technology

Concatenation is a major contributor to reliable and robust programs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The managerial tutorial equivalent of NIST SP 800-12, providing overviews of the roles and responsibilities of a security manager in the development, administration, and improvement of a security program, is NIST __________.

A. SP 800-100: Information Security Handbook: A Guide for Managers (2007) B. SP 800-18, Rev. 1: Guide for Developing Security Plans for Federal Information Systems (2006) C. SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems (1996) D. SP 800-110, Rev. 1: Manager's Introduction to Information Security (2016)

Computer Science & Information Technology

For extended power outages, generators are needed. _________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology