题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-14 10:55:39

[单项选择] Given  1.  public class Foo {  2.  public static void main (String [] args) }  3.  try { return;}  4.  finally { Syste.out.printIn (“Finally”);}  5. }  6. }   What is the result( )?
A.  The program runs and prints nothing.
B.  The program runs and prints “Finally”.
C.  The code comiles. But an exception is thrown at runtime.
D.  The code will not compile because the catch block is missing.

更多"Given  1.  public&en"的相关试题:

[单项选择] 现有:  class Test2  f  public static void main (String  []  args)  {      boolean X= true;      boolean y=false;      short Z=20;      if((x==true)  &&  (y=true))  z++;     if((y==true) ||  (++z==22))  z++;      System. out .println( "z="+z);      }      结果是什么?()     
A. Z=21
B. Z=22
C. Z=23
D. Z= 24
[单项选择] The loss of the control file forced you to re/x7fcreate the control file. After re/x7fcreating it and opening the database, you find that some of the data files are named as MISSINGnnnnn, where nnnnn is a five/x7fdigit number starting with 0.  What could be the possible reason?()
A. These are the data files that are corrupted.
B. There is no SYSAUX tablespace in your database
C. There is a read­only tablespace in your database.
D. These are the data files that cannot be recovered.
[单项选择] You want to perform the following operations for the DATA ASM disk group: -Verify the consistency of the disk.  -Cross-check all the file extent maps and allocation tables for consistency. check whether the alias metadata directory and file directory are linked correctly.  -Check that ASM metadata directories do not have unreachable allocated blocks.   Which command accomplishes these tasks()?
A.  ALTER DISKGROUP data CHECK
B.  ALTER DISKGROUP data CHECK DISK
C.  ALTER DISKGROUP data CHECK FILE
D.  ALTER DISKGROUP data CHECK DISK IN FAILURE GROUP 1
[单项选择] A customer has the need for performance monitoring of an IBM System Storage DS8000.  Which product does the customer need()
A. System Storage Productivity Center
B. Tivoli Storage Productivity Center for Data
C. Tivoli Storage Productivity Center for Disk
D. Tivoli Storage Productivity Center for Fabric
[多项选择] You plan to execute the following command to perform a Flashback Database operation in your database:   SQL> FLASHBACK DATABASE TO TIMESTAMP (SYSDATE -5/24);   Which two statements are true about this?()
A.  The database must have multiplexed redo log files
B.  The database must be in the MOUNT state to execute the command
C.  The database must be in the NOMOUNT state to execute the command
D.  The database must be opened in RESTRICTED mode before this operation
E.  The database must be opened with the RESETLOGS option after the flashback operation
[单项选择] 现有:  class Banana2  f      static int X=2;  public static void main (String  []  args)  {     int X=2;   Banana2 b=new Banana2();     b.go(x);     }  static  {x+=x; }   void go (int x)  {    ++x;  System. out.println (x);    }         结果为:()    
A. 7
B. 5
C. 3
D. 2
[单项选择] You need to recommend a file recovery solution that meets the company's technical requirements. What should you include in the recommendation?()
A. Distributed File System (DFS) Replication
B. File Server Resource Manager (FSRM) active file screens
C. shadow copies
D. Windows Storage Server 2008
[简答题] What is the protocol of following described: there are 4 priority queues:high,medium,normal.low the high and medium queue have precedence over the default queue the classifcation is configuration via the command ‘priority-list’ the default queue is the normal queue.
[单项选择] What would be the cause for the following fault in UCS Manager?()  "ether VIF x / xxx down, reason: ENM source pinning failed"
A.  The associated VLANs of a vNIC are not found on an uplink.
B.  Overlapping VLAN IDs exist on upstream disjoint networks.
C.  The vNIC was not configured for fabric failover.
D.  The vNIC is pinned to the wrong fabric.
E.  Overlapping VSAN IDs exist on upstream SAN switches.
F.  The vHBA was not configured for failover.
[单项选择] 现有:  class TestFoo f      int x;  String y;  int  getX()  {  return  x;  }     String getY()  {return y;  }      void setX (int  x)  {      int Z=7:      this.x=x;      }      可以添加多少个修饰符来封装此类?()     
A. 5
B. 4
C. 3
D. 2
[单项选择] 现有:D   - f 是一个对 java.io.File 实例的合法引用   - fw 是一个对 java.io.FileWriter 实例的合法引用   - bw 是一个对 java.io.BufferedWriter 实例的合法引用   以下哪一项无效?()  
A.  PrintWriter prtWtr = new PrintWriter(f);
B.  PrintWriter prtWtr = new PrintWriter(fw);
C.  PrintWriter prtWtr = new PrintWriter(bw);
D.  BufferWriter bufWtr = new BufferedWriter(f);
E.  BufferWriter bufWtr = new BufferedWriter(fw);
F.  BufferWriter bufWtr = new BufferedWriter(bw);
[单项选择] Companycom has a requirement for an LPAR in their p5 595 to run SUSE Linux. They also require an adapter that is not currently supported in Linux. Which of the following would be the best solution to recommend?()
A. Assign the adapter to an IO Hosting partition
B. Use AIX 5L affinity to move the application from SUSE to AIX
C. Use AIX 5.3 drivers to install the adapter in the Linux LPAR
D. Assign the adapter to an AIX 5.3 partition running Linux Affinity
[单项选择] While designing the database for one of your online transaction processing (OLTP) applications, you want to achieve the following:  a) high availability of data  b) faster primary key access to the table data  c) compact storage for the table  Which type of tables would you use to achieve these objectives?()
A.  heap tables
B.  object tables
C.  partitioned tables
D.  index-organized tables (IOTs)
[多项选择] You have stored confidential financial data in a shared folder named AccSecured on your Windows 2000 Professional computer. Your company hires an intern named Richard.  You create a subfolder named intern, which Richard needs to access. You want to allow Richard access to the intern subfolder only. You create a user account named intern. You want to allow the intern user account the ability to update, create, and delete files within the intern folder. You need to prevent Richard from accessing any other files or folders within the AccSecured folder.  What should you do?()
A.  Map a network drive to the AccSecuredintern folder from Richard’s computer. 
B.  Map a network drive to the AccSecured shared folder from Richard’s computer. 
C.  Allow the intern user account modify permissions on the intern subfolder. 
D.  Allow the intern user account traverse folder/execute file permission on the AccSecured  folder. 
E.  Allow the intern user account list folder content permission on the AccSecured folder.  Remove read extended attributes and read permissions.
[单项选择] 现有:  class Wrench f  public static void main(String  []  args)  {  Wrench w=new Wrench();    Wrench w2=new Wrench();     w2=go (w, w2);      System.out.print (w2==w);      }  static Wrench go (Wrench wrl,  Wrench wr2)  {     Wrench wr3=wrl; wrl=wr2; wr2=wr3;     return wr3;      }       结果是什么?()     
A.  false
B.  true
C. 编译失败
D. 运行的时候有异常抛出

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

截图扫码使用小程序[完全免费查看答案]
请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码