Which of the following cannot be used as identifiers in Java?

a. variable names
b. class names
c. key words
d. objects


c. key words

Computer Science & Information Technology

You might also like to view...

Most e-mail clients can be configured to automatically reply to e-mail messages, and this feature is always referred to as an out of office response.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Match each item with a statement below.

A. the folders that are shared by default on a network domain that administrator accounts can access B. permissions assigned by Windows that are attained from a parent object C. a group that can back up and restore any files on a Windows system regardless of access permissions to these files D. a method to control access to a folder or file and can apply to local users and network users E. a group that exists on Windows 8/7/Vista for backwards compatibility purposes with Windows XP F. a method to control access to a shared folder and can be assigned to NTFS or FAT volumes G. a console available only in Windows Professional and business editions that is used to control what users can do and how the system can be used H. gives a user access to a Windows desktop from anywhere on the Internet I. configuring a computer so that it will respond to network activity when the computer is in a sleep state J. a small app or add-on that can be downloaded from a website along with a webpage and is executed by IE to enhance the webpage

Computer Science & Information Technology

Of the three blending modes--Multiply, Color Burn, and Linear Burn--probably the least used is the Color Burn blending mode.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which three of the following are file systems? (Select three.)

A) exFAT B) eSATA C) SATA D) NTFS E) FAT F) PATA G) SAS

Computer Science & Information Technology