Which of the following statements describe the use of the keywordstatic?a) Within the body of a function: A static variable maintains its valuebetween function revocationsb) Within a module: A static variable is accessible by all functionswithin that modu

题目

Which of the following statements describe the use of the keyword

static?

a) Within the body of a function: A static variable maintains its value

between function revocations

b) Within a module: A static variable is accessible by all functions

within that module

c) Within a module: A static function can only be called by other

functions within that module


相似考题
更多“Which of the following statements describe the use of the keywordstatic?a) Within the body of a function: A static variable maintains its valuebetween function revocationsb) Within a module: A static variable is accessible by all functionswithin that modu”相关问题
  • 第1题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    A.It specifies use of a static encryption key that must be changed frequently to enhance security

    B.It requires use of an open authentication method

    C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

    D.It requires that all access points and wireless devices use the same encryption key

    E.It includes authentication by PSK


    参考答案:C, E

  • 第2题:

    Which statements concerning the value of a member variable are true, when no explicit assignments have been made?()  

    • A、The value of an int is undetermined.
    • B、The value of all numeric types is zero.
    • C、The compiler may issue an error if the variable is used before it is initialized.
    • D、The value of a String variable is "" (empty string).
    • E、The value of all object variables is null.

    正确答案:B,E

  • 第3题:

    Several @functions can execute multiple statements. Which one of the following initializes a variable and can increment in during the operation?()

    • A、 @do 
    • B、 @for 
    • C、 @while 
    • D、 @dowhile 

    正确答案:B

  • 第4题:

    Which two statements best describe the wireless security standard that is defined by WPA? (Choose two.)()

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security.
    • B、It requires use of an open authentication method.
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    • D、It requires that all access points and wireless devices use the same encryption key.
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第5题:

    Which of the following statements are correct in regard to classless routing protocols?()

    • A、Discontiguous subnets are not allowed.
    • B、Variable length subnet masks are allowed.
    • C、RIP v1 is a classless routing protocol.
    • D、IGRP supports classless routing within the same autonomous system.
    • E、RIP v2 supports classless routing.

    正确答案:B,E

  • 第6题:

    Given an EL function declared with:11.  12.spin 13.com.example.Spinner 14. 15.java.lang.String spinIt() 16. 17. Which two are true?()

    • A、The function method must have the signature: public String spin().
    • B、The method must be mapped to the logical name "spin" in the web.xml file.
    • C、The function method must have the signature: public String spinIt().
    • D、The function method must have the signature public static String spin().
    • E、The function method must have the signature: public static String spinIt().
    • F、The function class must be named Spinner, and must be in the package com.example.

    正确答案:E,F

  • 第7题:

    The CALC function is used several times within the sales report. To simplify maintenance you want to store the function in one place and call it from within your PL/SQL trigger code. Which node would you use in object navigator to create a report level programme unit to store the function?()

    • A、Programme units. 
    • B、PL/SQL libraries. 
    • C、Database object. 
    • D、Built in packages.

    正确答案:A

  • 第8题:

    Your company uses SQL Server 2005. You are implementing a series of views that are used in ad hoc queries. The views are used to enforce your companys security policy of abstracting data.  Some of these views perform slowly. You create indexes on those views to increase performance, while still maintaining the companys security policy. One of the views returns the current date as one of the columns. The view returns the current date by using the GETDATE( ) function. This view does not allow you to create an index. You need to create an index on the view.  Which two actions should you perform?()

    • A、 Remove all deterministic function calls from within the view. 
    • B、 Remove all nondeterministic function calls from within the view. 
    • C、 Schema-bind all functions that are called from within the view. 
    • D、 Create the view and specify the WITH CHECK OPTION clause.

    正确答案:B,C

  • 第9题:

    You create a Web page that contains the span shown in the following line of code. TextYou need replace the contents of the span with HTML that you download from a URL specified by a global variable named localURL. Which code segment should you use?()

    • A、$.ajax({ type: "GET", url: localURL, dataType: "jsonp", success: function(htmlText  { $("#span1").text(htmlText); } }); 
    • B、$.ajax(  localURL, {}, function(htmlText) { $("#span1").html(htmlText); },"html" ); 
    • C、$.ajax({  type: "GET", url: localURL, dataType: "html",success: function(htmlText) { $("#span1").innerHTML = htmlText; }}); 
    • D、$.ajax({  type: "GET", url: localURL,  success: function(htmlText) { $("#span1").html(htmlText); } });

    正确答案:D

  • 第10题:

    多选题
    Which statements concerning the value of a member variable are true, when no explicit assignments have been made?()
    A

    The value of an int is undetermined.

    B

    The value of all numeric types is zero.

    C

    The compiler may issue an error if the variable is used before it is initialized.

    D

    The value of a String variable is  (empty string).

    E

    The value of all object variables is null.


    正确答案: B,E
    解析: 暂无解析

  • 第11题:

    多选题
    Which statements are true regarding classless routing protocols?()
    A

    The use of discontiguous subnets is not allowed

    B

    The use of variable length subnet masks is permitted

    C

    RIP v1 is a classless routing protocol

    D

    IGRP supports classless routing within the same autonomous system

    E

    RIP v2 supports classless routing


    正确答案: B,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which statements concerning the correlation between the inner and outer instances of non-static inner classes are true?()
    A

    Member variables of the outer instance are always accessible to inner instances, regardless of their      accessibility modifiers.

    B

    Member variables of the outer instance can never be referred to using only the variable name within     the inner instance.

    C

    More than one inner instance can be associated with the same outer instance.

    D

    All variables from the outer instance that should be accessible in the inner instance must be declared     final.

    E

    A class that is declared final cannot have any inner classes.


    正确答案: C,B
    解析: 暂无解析

  • 第13题:

    Which statements concerning the correlation between the inner and outer instances of non-static inner classes are true?()  

    • A、Member variables of the outer instance are always accessible to inner instances, regardless of their      accessibility modifiers.
    • B、Member variables of the outer instance can never be referred to using only the variable name within     the inner instance.
    • C、More than one inner instance can be associated with the same outer instance.
    • D、All variables from the outer instance that should be accessible in the inner instance must be declared     final.
    • E、A class that is declared final cannot have any inner classes.

    正确答案:A,C

  • 第14题:

    Which of the following commands cannot use the functionality assosciated with theNLS_DATE_FORMAT variable?()

    • A、RESTORE
    • B、RECOVER
    • C、REPORT
    • D、BACKUP

    正确答案:D

  • 第15题:

    Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

    • A、It specifies use of a static encryption key that must be changed frequently to enhance security
    • B、It requires use of an open authentication method
    • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
    • D、It requires that all access points and wireless devices use the same encryption key
    • E、It includes authentication by PSK

    正确答案:C,E

  • 第16题:

    Which statements are true regarding classless routing protocols?()

    • A、The use of discontiguous subnets is not allowed
    • B、The use of variable length subnet masks is permitted
    • C、RIP v1 is a classless routing protocol
    • D、IGRP supports classless routing within the same autonomous system
    • E、RIP v2 supports classless routing

    正确答案:B,E

  • 第17题:

    The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()

    • A、 Control traffic between an access point and a controller is encrypted within LWAPP.
    • B、 Data traffic between an access point and a controller is encrypted within LWAPP.
    • C、 Layer 3 mode packets are transmitted in TCP frames.
    • D、 Data traffic between an access point and a controller is encapsulated within LWAPP.
    • E、 VLAN tagging and QoS markings are applied at the access point.

    正确答案:A,D

  • 第18题:

    public class TestSeven extends Thread {  private static int x;  public synchronized void doThings() {  int current = x;  current++;  x = current;  }  public void run() {  doThings();  }  }  Which is true?() 

    • A、 Compilation fails.
    • B、 An exception is thrown at runtime.
    • C、 Synchronizing the run() method would make the class thread-safe.
    • D、 The data in variable “x” are protected from concurrent access problems.
    • E、 Declaring the doThings() method as static would make the class thread-safe.
    • F、 Wrapping the statements within doThings() in a synchronized(new Object()) {} block would make the class thread-safe.

    正确答案:E

  • 第19题:

    Which statement is true about the log-output variable?()

    • A、It is a static variable and can be set only at MySQL server startup
    • B、It enables and starts the General Query Log
    • C、It sets the target location for the binary logs generated by the MySQL sever
    • D、It specifies output destinations for the slow and General Query logs

    正确答案:D

  • 第20题:

    Which of the following lists of items all require an HMC to function with POWER5?()

    • A、Running AIX 5.3 Implementing HACMP Implementing Static LPAR
    • B、Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawers
    • C、Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned "On"
    • D、Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning

    正确答案:D

  • 第21题:

    多选题
    The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()
    A

    Control traffic between an access point and a controller is encrypted within LWAPP.

    B

    Data traffic between an access point and a controller is encrypted within LWAPP.

    C

    Layer 3 mode packets are transmitted in TCP frames.

    D

    Data traffic between an access point and a controller is encapsulated within LWAPP.

    E

    VLAN tagging and QoS markings are applied at the access point.


    正确答案: A,D
    解析: 暂无解析

  • 第22题:

    多选题
    Given an EL function declared with:11.  12.spin 13.com.example.Spinner 14. 15.java.lang.String spinIt() 16. 17. Which two are true?()
    A

    The function method must have the signature: public String spin().

    B

    The method must be mapped to the logical name spin in the web.xml file.

    C

    The function method must have the signature: public String spinIt().

    D

    The function method must have the signature public static String spin().

    E

    The function method must have the signature: public static String spinIt().

    F

    The function class must be named Spinner, and must be in the package com.example.


    正确答案: B,F
    解析: 暂无解析

  • 第23题:

    多选题
    Which of the following routing protocols support the use of VLSM (Variable Length Subnet Masking)?()
    A

    RIPv1

    B

    EIGRP

    C

    OSPF

    D

    IGRP

    E

    RIPv2


    正确答案: D,A
    解析: 暂无解析