The ____________________ function can be used to return the names of the entries in the directory.

Fill in the blank(s) with the appropriate word(s).


scandir

Computer Science & Information Technology

You might also like to view...

Which of the following malware takes advantage of a security vulnerability on the same day that the vulnerability becomes known to the public?

A) Ransomware B) Screen scraper C) Bot D) Zero-day exploit

Computer Science & Information Technology

A(n) ____________ class is used to define nodes that form dynamic data structures, which can grow and shrink at execution time.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The FREQUENCY function will count numbers that are outside the predetermined bins

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is NOT one of the three general strategies that are used to authenticate individuals?

A. Who you are B. What you have C. What you know D. Who you know

Computer Science & Information Technology