The JavaScript object _____ describes patterns of characters.?

A. ?RegExp
B. ?DOM
C. ?navigator
D. ?screen


Answer: A

Computer Science & Information Technology

You might also like to view...

The capabilities of inputting and outputting strings in memory are known as:

a. String i/o manipulation. b. String stream processing. c. Character handling. d. Dynamic string operations.

Computer Science & Information Technology

Private fields of a base class can be accessed in a derived class

a. by calling Private methods declared in the base class b. by calling Public or Protected methods declared in the base class c. directly d. All of the above

Computer Science & Information Technology

The ____ Tool selects a single column of pixels in the document window.?

A. ?Single Column Marquee B. ?Single Row Marquee C. ?Elliptical Marquee D. ?Rectangular Marquee

Computer Science & Information Technology

If strong authentication is a priority, select an application gateway firewall or a dedicated application-specific proxy firewall.

Answer the following statement(s) true (T) or false (F)

Computer Science & Information Technology