A ________ iterates through the parts of a string that match a regular expression.

a. regex_iterator
b. string_iterator
c. regex_token_iterator
d. string_match_iterator


c. regex_token_iterator

Computer Science & Information Technology

You might also like to view...

The formal specification of product requirements forms the basis of what type of document?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When using a 3-D chart, the ________ is the value axis

A) X-axis B) Legend C) Z-axis D) Y-axis

Computer Science & Information Technology

The VPN server properties ____ tab allows you to enable the server as a router and/or a remote access server.

A. Security B. PPP C. Advanced D. General

Computer Science & Information Technology

What security control may be used to implement a concept known as two-person control?

A. Mandatory vacation B. Separation of duties C. Least privilege D. Defense in depth

Computer Science & Information Technology