If you want to ensure that a user enters numeric data, you should use ____ techniques that provide the means for your program to recover from the mistake.
A. error-handling
B. looping
C. exception-handling
D. decision
Answer: C
Computer Science & Information Technology
You might also like to view...
HTTP is a _________ protocol: it does not support persistent connections.
a) connectionful b) connectionless c) stateless d) stateful
Computer Science & Information Technology
When setting start-up options, if ________ is selected in the Display Form text box, then when your application opens, no form will open
A) No B) X C) Zero D) None
Computer Science & Information Technology
By ________ its user name comment button, you can view and edit a comment
Fill in the blank(s) with correct word
Computer Science & Information Technology
WPA2 uses the Advanced Encryption Standard (AES) for data encryption but does not support IEEE 802.1x authentication or PSK technology.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology