-
public interface Foo{ int k = 4; } Which three are equivalent to line 2?()
A . Final int k = 4;
B . Public int k = 4;
C . Static int k = 4;
D . Private int k = 4;
E . Abstract int k = 4;
F . Volatile int k = 4;
-
public interface Foo { int k = 4; 3. } Which three are equivalent to line 2?()
A . final int k = 4;
B . public int k = 4;
C . static int k = 4;
D . abstract int k = 4;
E . volatile int k = 4;
F . protected int k = 4;
-
Which two are equivalent? ()
A . 16>4
B . 16/2
C . 16*4
D . 16>>2
E . 16/2^2
F . 16>>>2
-
Which two are equivalent?()
A . 3/2
B . 3<2
C . 3*4
D . 3<<2
E . 3*2^2
F . 3<<<2
-
Which two are valid and equivalent?()
A . <%! int i; %>
B . <%= int i; %>
C . <jsp:expr>int i;</jsp:expr>
D . <jsp:scriptlet>int i;</jsp:scriptlet>
E . <jsp:declaration>int i;</jsp:declaration>
-
Which two of these parameters are used to determine a forwarding equivalence class?()
A . IP prefix
B . Layer 2 circuit
C . RSVP request from CE for bandwidth reservation
D . BGP MED value
-
Which two IOS commands are equivalents for putting a Cisco 7500 OC-12 RPR interface card intowrapped mode? ()
A . shutdown [a b]
B . srp shutdown [a b]
C . srp ips request manual-switched [a b]
-
Which two statements about forwarding equivalence class (FEC) are true?()
A . FEC might correspond to a destination IP subnet, but it might also correspond to any traffic class that the edge LSR considers significant.
B . FEC is a group of IP packets that is forwarded over a different path, but with the same forwarding treatment.
C . FEC is a group of IP packets that is forwarded over the same path, and with the same forwarding treatment.
D . FEC is a group of IP packets that is forwarded over a different path, but with the different forwarding treatment.
E . FEC is a group of IP packets that is forwarded over the same path, but with a different forwarding treatment
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method’s sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().
-
Which two choices are equivalent?()
A . 16 > 4
B . 16 / 2
C . 16 * 4
D . 16 >> 2
E . 16 / 22
F . 16 >>> 2
-
Which two multicast protocol statements are true? (Choose two.) ()
A . Dense mode multicast requires explicit join messages from their members.
B . Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic.
C . Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.
D . Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.
E . The primary use of sparse mode multicast is for test labs and router performance testing.
-
Which are the two options to which a menu can be assigned?() (Choose two.)
A . menu
B . functions
C . data group
D . responsibility
E . functional grou
-
If two routers, both reachable from one another, originate functionally equivalent type 2 external- LSAs (i.e,same destination, cost and non-zero forwarding address ), Which of the following statements wouldapply ?()
A . Two LSAs will exist in the network for this destination, and both will be used
B . Two LSAs will exist in the network for this destination, but only the one generated by the highest RID ASBR will be used
C . Only the LSA generated by the highest RID ASBR will exist in the network
D . Only the LSA generated by the lowest RID ASBR will exist in the network
-
Which two are true?()
A . An encapsulated, public class promotes re-use.
B . Classes that share the same interface are always tightly encapsulated.
C . An encapsulated class allows subclasses to overload methods, but does NOT allow overriding methods.
D . An encapsulated class allows a programmer to change an implementation without affecting outside code.
-
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
A . the two methods of authentication using the WEP encryption are open and shared key
B . the 802.11 standard defines WEP security using 128-bit keys
C . WEP can provide stronger authentication through the use of LEAP, PEAP, or EAP-FAST
D . WEP is a scalable encryption solution that uses static keys for authentication
E . WEP security provides only one-way authentication
F . WEPv2 offers improved encryption by replacing the RC4 encryption mechanism with the AES (symmetric block cipher) mechanism
-
Which two statemets are true?()
A . DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings.
B . DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber.
C . In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth.
D . DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.
-
Given: 1. public interface Foo { 2. int k = 4: 3. } Which three are equivalent to line 2?()
A . final int k = 4:
B . public int k = 4:
C . static int k = 4:
D . private int k = 4:
E . abstract int k = 4:
F . volatile int k = 4:
G . transient int k = 4:
H . protected int k = 4:
-
Which the two are valid and equivalent?()
A .https://assets.asklib.com/images/image2/2018073115112695987.jpg
B .https://assets.asklib.com/images/image2/2018073115114664903.jpg
C .https://assets.asklib.com/images/image2/2018073115123688801.jpg
D .https://assets.asklib.com/images/image2/2018073115124427624.jpg
E .https://assets.asklib.com/images/image2/2018073115125392737.jpg
-
Which two statements are true?()
A . It is possible for more than two threads to deadlock at once.
B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state.
C . Deadlocked threads release once their sleep() method's sleep duration has expired.
D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly.
E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly.
F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility of deadlocking by inserting invocations of Thread.yield().
-
Which two are true?()
A . A finalizer may NOT be invoked explicitly.
B . The finalize method declared in class Object takes no action.
C . super.finalize()is called implicitly by any over riding finalize method.
D . The finalize method for a given objec twill be called no more than once by the garbage collector.
E . The order in which finalize will be called on two objects is based on the order in which the two objects became finalizable.
-
Which the two choices are equivalent?()
A . 3 / 2
B . 3 < 2
C . 3 * 4
D . 3 << 2
E . 3 * 22
F . 3 <<<2
-
Which two statements are correct? Choose two answers.
-
读代码:1. public interface Foo{2.int k = 4;3. }Which three are equivalent to line 2? (Choose Three)