Answer the following statements true (T) or false (F)

1. In the class hierarchy, ifstream inherits from, or is a subclass of, the class istream.
2. A blank character can be input and stored into character variable c using the statement:
cin >> c;
3. The peek() method can be used to examine the next character in the input stream, without
actually removing it from the input stream.
4. When an input file encounters an input error and goes into the fail state an error message is
automatically generated and displayed on the output screen.
5. When an open statement is successful the stream state flag goodbit is set to 1.


1. True
2. False
3. True
4. False
5. True

Computer Science & Information Technology

You might also like to view...

What is the relationship between a primary key and its corresponding foreign keys?

a. One-to-one. b. Many-to-one. c. Many-to-many. d. One-to-many.

Computer Science & Information Technology

Suppose A is an inner class in Test. A is compiled into a file named _________.

a. A.class b. Test$A.class c. A$Test.class d. Test&A.class

Computer Science & Information Technology

You are assessing the value of insurance plans for a group of your clients. The data is contained in a table named "Insurance." The interest rates are contained in a field named "Interest." The numbers of payments per period are contained in a field named "Retain." The amount per payment, shown as a positive number, is contained in a field named "Amount." The field will be named "Value." What is

the proper entry for the field name? A) Value: FV([Insurance]![Interest], [Insurance]![Retain], -[Insurance]![Amount]) B) Value: FV(Insurance![Interest], Insurance![Retain], Insurance![Amount]) C) Value: FV([Interest], [Retain], -[Amount]) D) Value: FV([Insurance]![Interest], [Insurance]![Retain], [Insurance]![Amount])

Computer Science & Information Technology

Attacking threats (to the law) can completely eliminate threats.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology