________ are used to signal errors or unexpected events that occur while a program is running.

A) Virtual functions
B) Destructors
C) Exceptions
D) Templates
E) None of the above


C) Exceptions

Computer Science & Information Technology

You might also like to view...

An overloaded extraction or insertion operator should return ___________

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A __________ transfers data in and out as a stream of bytes, with no block structure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Java programmers concentrate on creating ____________, which contain fields and the set of methods that manipulate those fields and provide services to clients.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When moving from an internally controlled environment to a fully outsourced infrastructure environment, such as cloud computing, it is MOST important to:

A. Implement mandatory access controls. B. Ensure RAID 0 is implemented on servers. C. Impose time of day restrictions across all services D. Encrypt all confidential data.

Computer Science & Information Technology