Which of the following is a built-in reference type?

a) Integer
b) String
c) Boolean
d) Char


b) String

Computer Science & Information Technology

You might also like to view...

Describe in terms of who needs access to class members why the public members should come first in a class definition.

What will be an ideal response?

Computer Science & Information Technology

A method ____.

A. Is a collection of statements defined within a class B. Can be used to interact with objects C. Can be used to control the operation of an object D. All of the above

Computer Science & Information Technology

One of the two characterizations of expert hackers is ________.

automated attack tools dogged persistence Both automated attack tools and dogged persistence Neither automated attack tools nor dogged persistence

Computer Science & Information Technology

You can cancel updates at any time during your current work session.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology