As opposed to the seek() functions that move the file position marker, the ____ functions simply return the offset value of the file position marker.

A. fail()
B. good()
C. bad()
D. tell()


Answer: D

Computer Science & Information Technology

You might also like to view...

What will be the value of discountRate after the following statements are executed?

``` double discountRate; char custType = 'B'; switch (custType) { case 'A': discountRate = 0.08; break; case 'B': discountRate = 0.06; case 'C': discountRate = 0.04; default: discountRate = 0.0; } ``` a. 0.08 b. 0.06 c. 0.04 d. 0.0

Computer Science & Information Technology

The ____________________ stores symbols you create for a document.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A ___________________ assessment attempts to identify what needs to be protected, what the pressures are against it, and how susceptible the current protection is.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Your company is currently migrating from the current network infrastructure to a faster, more secure network while following the SDLC. To provide an appropriate level of assurance, the security requirements that were specified at the project origin need to be carried through to implementation. Which of the following would BEST help to determine if this occurred?

A. change management process B. penetration testing C. vulnerability assessment D. security requirements traceability matrix (SRTM)

Computer Science & Information Technology