The ____ metacharacter is used to specify a range of values in a character class.

A. (-)
B. (+)
C. (@)
D. (‘)


Answer: A

Computer Science & Information Technology

You might also like to view...

Possible security steps to protect and secure a VoIP network include which of the following:

a. Encrypting the VoIP data traffic b. Using firewalls to prevent attacks c. Routing VoIP data traffic on the same LANs as normal data traffic d. All the above

Computer Science & Information Technology

The Conversation Prism in the accompanying figure was created by ____ Brian Solis.

A. social network programmer B. project leader C. social network systems analyst D. social media thought leader

Computer Science & Information Technology

Which of the following function headings can be used for a recursive definition of a function to calculate the nth Fibonacci number?

A. void rFibNum(int a, int b) B. bool rFibNum(int a, int b) C. bool rFibNum(int a, int b, int n) D. int rFibNum(int a, int b, int n)

Computer Science & Information Technology

Using a trusted channel and link encryption are both ways to prevent what type of access control attack?

A. Brute force B. Spoofed login screens C. Man-in-the-middle attacks D. Dictionary attacks

Computer Science & Information Technology