A ________ iterates through the parts of a string that match a regular expression.
a. regex_iterator
b. string_iterator
c. regex_token_iterator
d. string_match_iterator
c. regex_token_iterator
Computer Science & Information Technology
You might also like to view...
The formal specification of product requirements forms the basis of what type of document?
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
When using a 3-D chart, the ________ is the value axis
A) X-axis B) Legend C) Z-axis D) Y-axis
Computer Science & Information Technology
The VPN server properties ____ tab allows you to enable the server as a router and/or a remote access server.
A. Security B. PPP C. Advanced D. General
Computer Science & Information Technology
What security control may be used to implement a concept known as two-person control?
A. Mandatory vacation B. Separation of duties C. Least privilege D. Defense in depth
Computer Science & Information Technology