What function is used to delete files?

A. delete()
B. delete_file()
C. unlink()
D. del_file()


Answer: C

Computer Science & Information Technology

You might also like to view...

When this process is complete, the array elements that are still set to one indicate that the subscript is a prime number. These subscripts can then be printed. Write a program that uses an array of 1000 elements to determine and print the prime numbers between 2 and 999. Ignore element 0 of the array.

(The Sieve of Eratosthenes) A prime integer is any integer that is evenly divisible only by itself and 1. The Sieve of Eratosthenes is a method of finding prime numbers. It operates as follows: a) Create an array with all elements initialized to 1 (true). Array elements with prime subscripts will remain 1. All other array elements will eventually be set to zero. You’ll ignore elements 0 and 1 in this exercise. b) Starting with array subscript 2, every time an array element is found whose value is 1, loop through the remainder of the array and set to zero every element whose subscript is a multiple of the subscript for the element with value 1. For array subscript 2, all elements beyond 2 in the array that are multiples of 2 will be set to zero (subscripts 4, 6, 8, 10, etc.); for array subscript 3, all elements beyond 3 in the array that are multiples of 3 will be set to zero (subscripts 6, 9, 12, 15, etc.); and so on.

Computer Science & Information Technology

The x- and y-coordinates of the MouseEventArgs object are relative to _______.

a) the screen b) the application c) the Form or control that contains the control that raised the event d) None of the above.

Computer Science & Information Technology

A written report is often submitted as what type of document?

a. A subpoena b. An affidavit c. A court order d. A deposition

Computer Science & Information Technology

Match the protocol or encryption name with the feature.

A. No longer considered secure because the key used for encryption doesn’t change. B. Typically uses TKIP for encryption. C. Typically uses AES for encryption. D. Generates a different key for every transmission; however, the encryption algorithm used for its calculations is no longer considered secure. E. Current encryption algorithm used today.

Computer Science & Information Technology