Answer the following statements true (T) or false (F)
1. The following statement could be used to set the Filter property of the OpenFileDialog
control so that it displays files with the .txt extension.
Text Files (*txt)|*.txt
2. To get rid of an existing closed file, execute a statement of the form
IO.File.Delete(filespec).
3. Text files are updated by opening them for Input and then entering the new data.
4. The value of sr.EndOfStream is True when the end of file accessed by the StreamReader is
reached.
5. The following code is valid.
Dim filespec As String
filespec = InputBox("Enter name of file to process:")
Dim sr As IO.StreamReader = IO.File.OpenText(filespec)
1. T
2. T
3. F
4. T
5. T
You might also like to view...
Answer the following statements true (T) or false (F)
1. The vast majority of network based symmetric cryptographic applications make use of stream ciphers. 2. The Feistel cipher structure, based on Shannon's proposal of 1945, dates back over a quarter of a century and is the structure used by many significant symmetric block ciphers currently in use. ? 3. DES uses a 56-bit block and a 64-bit key. ? 4. If the bit-stream generator is a key-controlled algorithm the two users only need to share the generating key and then each can produce the keystream. ? 5. A problem with the ideal block cipher using a small block size is that it is vulnerable to a statistical analysis of the plaintext.
Answer the following statements true (T) or false (F)
1. Memory management is concerned with managing the system’s memory resources as the computer runs, allocating space to applications as needed and ensuring that those applications do not interfere with each other. 2. Inter-computer communication is enabled by processor management services installed on both machines 3. Because each layer is functionally independent, layers cannot be combined to form a system. 4. All operating systems are open source; in other words, they are based on open, published source code that can be modified and improved by anyone. 5. UNIX is an example of a proprietary operating system.
The __________ is described as being an abstract computing machine, consisting of an instruction set, a program counter register, a stack to hold variables and results, and a heap for runtime data and garbage collection, and a method area for code and constants.
Fill in the blank(s) with the appropriate word(s).
When you press the Tab key in an Excel worksheet, the active cell moves:
A) down. B) up. C) right. D) left.