The method ____ returns the next character from the input stream without extracting the character from the stream.

A. cin.getline()
B. cin.put()
C. cin.get()
D. cin.peek()


Answer: D

Computer Science & Information Technology

You might also like to view...

Create a class ShuffleCipher that implements the interface MessageEncoder, as described in Exercise 15. The constructor should have one parameter called n. Define the method encode so that the message is shuffled n times. To perform one shuffle, split the message in half and then take characters from each half alternately. For example, if the message is “abcdefghi”, the halves are “abcde” and “fghi”. The shuffled message is “afbgchdie”. Hint: You may wish to define a private method that performs one shuffle.

What will be an ideal response?

Computer Science & Information Technology

Your company has an intrusion detection system (IDS) and firewall deployed on the perimeter of the network to detect attacks against internal resources. Yesterday, the IDS alerted you that SSL sessions are under attack using an older exploit against SSLv2. Your organization's Web server must use encryption for all financial transactions. You need to prevent this attack from being successful in

the future. What should you do? A. Block SSLv2 on the firewall. B. Block SSLv2 on the Web server. C. Disable SSLv2, and enable SSLv3 on the Web server. D. Update the Web server with the latest patches and updates.

Computer Science & Information Technology

COGNITIVE ASSESSMENT What is another term for the operating system a computer uses?

A. system utility B. file manager C. platform D. application

Computer Science & Information Technology

James recently received a secret message from Martha containing an order for custom services. He would like to be able to prove that Martha sent the message and that is could not be forged. What cryptographic goal is James attempting to achieve?

a. Confidentiality b. Nonrepudiation c. Security though obscurity d. Integrity e. Authentication

Computer Science & Information Technology