更多“Which type of event indicates a key pressed on a java.awt.Co”相关问题
  • 第1题:

    Usually low key is used for emphasis and contrast; mid key indicates an expected, neutral attitude; and low key provides low information.()

    A

    B



  • 第2题:

    Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()

    • A、invalid radio type selected
    • B、no WEP key configured on the client
    • C、invalid SSID configured
    • D、invalid WEP key

    正确答案:D

  • 第3题:

    What does the value returned by the method getID() found in class java.awt.AWTEvent uniquely identify?()  

    • A、The particular event instance.
    • B、The source of the event.
    • C、The set of events that were triggered by the same action.
    • D、The type of event.
    • E、The type of component from which the event originated.

    正确答案:D

  • 第4题:

    Which type of event indicates a key pressed on a java.awt.Component?()  

    • A、 KeyEvent
    • B、 KeyDownEvent
    • C、 KeyPressEvent
    • D、 KeyTypedEvent
    • E、 KeyPressedEvent

    正确答案:A

  • 第5题:

    Which three statements describe the functionality of the DO_KEY built-in?()

    • A、It accepts both a built-in and a key name as argument. 
    • B、If no key trigger is defined, the specified built-in executes. 
    • C、Its parameter must be specified in upper case, enclosed in single quotation marks. 
    • D、It performs the same task as if you pressed the function key associated with the specified argument. 
    • E、It executes the key trigger that corresponds to the built-in specified as its parameter. 

    正确答案:B,D,E

  • 第6题:

    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()

    • A、IWeb Event Custom Evaluator
    • B、Web Event Provider
    • C、Web Base Event
    • D、Web Audit Event

    正确答案:C

  • 第7题:

    Which statements concerning the event model of the AWT are true?()  

    • A、At most one listener of each type can be registered with a component.
    • B、Mouse motion listeners can be registered on a List instance.
    • C、There exists a class named ContainerEvent in package java.awt.event.
    • D、There exists a class named MouseMotionEvent in package java.awt.event.
    • E、There exists a class named ActionAdapter in package java.awt.event.

    正确答案:B,C

  • 第8题:

    单选题
    What does the value returned by the method getID() found in class java.awt.AWTEvent uniquely identify?()
    A

    The particular event instance.

    B

    The source of the event.

    C

    The set of events that were triggered by the same action.

    D

    The type of event.

    E

    The type of component from which the event originated.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statements describe the functionality of the DO_KEY built-in?()
    A

    It accepts both a built-in and a key name as argument.

    B

    If no key trigger is defined, the specified built-in executes.

    C

    Its parameter must be specified in upper case, enclosed in single quotation marks.

    D

    It performs the same task as if you pressed the function key associated with the specified argument.

    E

    It executes the key trigger that corresponds to the built-in specified as its parameter.


    正确答案: E,C
    解析: 暂无解析

  • 第10题:

    单选题
    Static WEP is configured on the access point. You are authenticated and associated to the accesspoint but are unable to obtain an IP address. Which of the following will cause this problem?()
    A

    invalid radio type selected

    B

    no WEP key configured on the client

    C

    invalid SSID configured

    D

    invalid WEP key


    正确答案: C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about mouse button variables?()
    A

    SYSTEM.MOUSE_BUTTON_PRESSED returns a string.

    B

    SYSTEM.MOUSE_BUTTON_PRESSED returns a numeric value. 1Z0-132 World Leaders In Certifications Material - Test-king.com

    C

    A possible value for SYSTEM.MOUSE_BUTTON_MODIFIERS is Control+Alt+Delete.

    D

    SYSTEM.MOUSE_BUTTON_MODIFIERS can only be references in form-level triggers.

    E

    SYSTEM.MOUSE_BUTTON_MODIFIERS identifies which special key was pressed in conjunction with the usual mouse button action.


    正确答案: E,B
    解析: 暂无解析

  • 第12题:

    单选题
    Which key should be pressed on an ASCII terminal during the system initialization to force the system to read from the default boot list?()
    A

    1

    B

    3

    C

    5

    D

    9


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Usually low key is used for emphasis and contrast; mid key indicates an expected, neutral attitude; and low key provides low information.()


    正确答案:错误

  • 第14题:

    Which key should be pressed on an ASCII terminalduring the system initialization to force the system to read from the default bootlist?()

    • A、1
    • B、3
    • C、5
    • D、9

    正确答案:C

  • 第15题:

    Which key should be pressed on an ASCII terminal during the system initialization to force the system to read from the default boot list?()

    • A、1
    • B、3
    • C、5
    • D、9

    正确答案:C

  • 第16题:

    Which two statements are true about mouse button variables?()

    • A、SYSTEM.MOUSE_BUTTON_PRESSED returns a string. 
    • B、SYSTEM.MOUSE_BUTTON_PRESSED returns a numeric value. 1Z0-132 World Leaders In Certifications Material - Test-king.com 
    • C、A possible value for SYSTEM.MOUSE_BUTTON_MODIFIERS is Control+Alt+Delete. 
    • D、SYSTEM.MOUSE_BUTTON_MODIFIERS can only be references in form-level triggers. 
    • E、SYSTEM.MOUSE_BUTTON_MODIFIERS identifies which special key was pressed in conjunction with the usual mouse button action. 

    正确答案:B,E

  • 第17题:

    Which three scenarios describe appropriate uses for key triggers?()

    • A、Alter data in a database table. 
    • B、Add custom item validation code. 
    • C、Disable the Next Block key and menu item. 
    • D、Display a custom form in place of a List of Values. 
    • E、Change the navigational order of the blocks in a form. 
    • F、Perform a complex calculation each time the F10 key is pressed. 

    正确答案:C,D,E

  • 第18题:

    You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()

    • A、IWebEventCustomEvaluator
    • B、WebEventProvider
    • C、WebBaseEvent
    • D、WebAuditEvent

    正确答案:C

  • 第19题:

    多选题
    Which three scenarios describe appropriate uses for key triggers?()
    A

    Alter data in a database table.

    B

    Add custom item validation code.

    C

    Disable the Next Block key and menu item.

    D

    Display a custom form in place of a List of Values.

    E

    Change the navigational order of the blocks in a form.

    F

    Perform a complex calculation each time the F10 key is pressed.


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    单选题
    Pan-Pan repeated three times over the radiotelephone indicates which type of message will follow?()
    A

    distress

    B

    safety

    C

    all clear

    D

    urgency


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Static wep is configured on the access point. you are authenticated and associated to the access point but are unable to obtain an ip address. Which of the following will cause this problem?()
    A

    invalid radio type selected

    B

    no wep key configured on the client

    C

    invalid ssid configured

    D

    invalid wep key


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which encryption type is used to secure user data in an IPsec tunnel?()
    A

    symmetric key encryption

    B

    asymmetric key encryption

    C

    RSA

    D

    digital certificates


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    Which key should be pressed on an ASCII terminalduring the system initialization to force the system to read from the default bootlist?()
    A

    1

    B

    3

    C

    5

    D

    9


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which type of event indicates a key pressed on a java.awt.Component?()
    A

     KeyEvent

    B

     KeyDownEvent

    C

     KeyPressEvent

    D

     KeyTypedEvent

    E

     KeyPressedEvent


    正确答案: A
    解析: 暂无解析