Java认证考试

Which methods from the String and StringBuffer classes modify the object on which they are called?()  A、The charAt() method of the String class.B、The toUpperCase() method of the String class.C、The replace() method of the String class.D、The reverse() metho

题目

Which methods from the String and StringBuffer classes modify the object on which they are called?()  

  • A、The charAt() method of the String class.
  • B、The toUpperCase() method of the String class.
  • C、The replace() method of the String class.
  • D、The reverse() method of the StringBuffer class.
  • E、The length() method of the StringBuffer class.
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

There are four methods of government procurement. Which is not one of these methods?

A Assistance

B Sealed bidding

C Competitive proposals

D Acquisition

E Small purchases


正确答案:D

第2题:

Which is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description, classification and transcription?

A.Phonetics
B.Phonology
C.Semantics
D.Pragmatics

答案:A
解析:
本题考查语音学的概念。

A选项,Phonetics语音学:从自然属性的角度研究人类语音。是研究人类语音特点,并提供语音描写、分类和标音方法的科学。综上,A选项正确。

B选项,Phonology音系学:研究语言中出现的区别语音及语音结构、分布和排序的规则以及音节的形状是如何形成语音系统来表达意义的语言学分支。故排除。

C选项,Semantics语义学:语义学研究意义的语言学分支。故排除。

D选项,Pragmatics语用学:研究语言在语境中的意义的语言学分支。故排除。

故正确答案为A项。

第3题:

Which of the following scheduling methods uses more of the risk management concepts:

A ADM

B PDM

C CPM

D PERT

E Gantt


正确答案:D

第4题:

Which of the following archiving methods only backs up data that has changed since the previous full backup?()

  • A、Snapshot
  • B、Incremental
  • C、Copy
  • D、Differential

正确答案:D

第5题:

Which of the following methods of user authentication is the MOST secure?()

  • A、CHAP
  • B、Kerberos
  • C、TACACS
  • D、EAP

正确答案:B

第6题:

161 There are four methods of government procurement. Which is not one of these methods? A. Assistance

B. Sealed bidding

C. Competitive proposals

D. Acquisition

E. Small purchases


正确答案:D

第7题:

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()

  • A、WEP
  • B、CCKM
  • C、AES
  • D、TKIP
  • E、CCMP

正确答案:A,D

第8题:

Which one of the following is not an acquisition method?

A advertising

B invitation

C negotiation

D purchase

E all are acquisition methods


正确答案:A

第9题:

Which of the following methods can move files in clear text and can be easily intercepted?()

  • A、RSH
  • B、SNMP
  • C、FTP
  • D、TELNET

正确答案:C

第10题:

Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()

  • A、OSPF
  • B、IS-IS
  • C、EIGRP
  • D、BGP

正确答案:D