多选题Which two demonstrate encapsulation of data? ()AMember data have no access modifiers.BMember data can be modified directly.CThe access modifier for methods is protected.DThe access modifier to member data is private.EMethods provide for access and modi

题目
多选题
Which two demonstrate encapsulation of data? ()
A

Member data have no access modifiers.

B

Member data can be modified directly.

C

The access modifier for methods is protected.

D

The access modifier to member data is private.

E

Methods provide for access and modification of data.


相似考题
更多“Which two demonstrate encapsulation of data? ()”相关问题
  • 第1题:

    WAN data link encapsulation types include which of the following?()

    A. T1

    B. Frame Relay

    C. DSL

    D. PPP

    E. ISDN

    F. IPX


    参考答案:B, D

  • 第2题:

    Which of following statements about testing software with data is (are) true?

    Ⅰ.The primary purpose of such testing is to find errors.

    Ⅱ.Such testing can demonstrate the existence of errors but can not demonstrate the absence of errors.

    A.Neither

    B.Ⅰ only

    C.Ⅱ only

    D.Ⅰ and Ⅱ


    正确答案:B

  • 第3题:

    Which WAN service utilizes two different encapsulation types (one for data and one for signaling) on its data link layer?()

    • A、ISDN
    • B、Frame Relay
    • C、ATM
    • D、FDDI

    正确答案:A

  • 第4题:

    Which are the two options to which a menu can be assigned?() (Choose two.)

    • A、menu
    • B、functions
    • C、data group
    • D、responsibility
    • E、functional group

    正确答案:A,D

  • 第5题:

    Which two demonstrate encapsulation of data? ()

    • A、 Member data have no access modifiers.
    • B、 Member data can be modified directly.
    • C、 The access modifier for methods is protected.
    • D、 The access modifier to member data is private.
    • E、 Methods provide for access and modification of data.

    正确答案:D,E

  • 第6题:

    Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

    • A、 access point certification and software control
    • B、 compression and Layer 3 address mapping
    • C、 Layer 3 addressing and distribution
    • D、 packet encapsulation, fragmentation, and formatting
    • E、 SNMP monitoring services

    正确答案:A,D

  • 第7题:

    Which two are benefits of fully encapsulating a class?()  

    • A、 Performance of class methods is improved.
    • B、 Implementation details of the class are hidden.
    • C、 Access modifiers can be omitted on class data members.
    • D、 Code that uses the encapsulation class can access data members directly.
    • E、 Internal operation of the class can be modified without impacting clients of that class.

    正确答案:B,E

  • 第8题:

    Which two fields are found in an Ethernet frame?()

    • A、Version
    • B、TTL
    • C、Checksum
    • D、Flags
    • E、Data

    正确答案:C,E

  • 第9题:

    多选题
    WAN data link encapsulation types include which of the following?()
    A

    T1

    B

    Frame Relay

    C

    DSL

    D

    PPP

    E

    ISDN

    F

    IPX


    正确答案: A,F
    解析: 暂无解析

  • 第10题:

    多选题
    Which two of these are recommended practices with trunks?()
    A

    use ISL encapsulation

    B

    use 802.1q encapsulation

    C

    set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation

    D

    use VTP server mode to support dynamic propagation of VLAN information across the network

    E

    set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two are the prerequisites to enable Flashback Data Archive?() (Choose two.)
    A

    Database must be running in archivelog mode.

    B

    Automatic undo management must be enabled.

    C

    Undo retention guarantee must be enabled.

    D

    The tablespace on which the Flashback Data Archive is created must be managed with Automatic Segment Space Management (ASSM).


    正确答案: C,D
    解析: 暂无解析

  • 第12题:

    多选题
    As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the device. For what two reasons can this happen?()
    A

    The data is moving from 10BASE-TX to 100BASE-TX.

    B

    The WAN encapsulation type has changed.

    C

    The data format has changed from analog to digital.

    D

    The source and destination hosts are in the same subnet.

    E

    The source and destination MAC addresses have changed.


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    Which WAN service utilizes two different encapsulation types (one for data and one for signaling) on its data link layer?()

    A. ISDN

    B. Frame Relay

    C. ATM

    D. FDDI


    参考答案:A

  • 第14题:

    WAN data link encapsulation types include which of the following?()

    • A、T1
    • B、Frame Relay
    • C、DSL
    • D、PPP
    • E、ISDN
    • F、IPX

    正确答案:B,D

  • 第15题:

    Which of the following is the correct configuration for a RAID 5 array?()

    • A、A two disk set with one data strip
    • B、A three disk set with two data strips and a parity strip
    • C、A two disk set with two data strips
    • D、A four disk set with two sets of data strips

    正确答案:B

  • 第16题:

    Which two security mechanisms protect the response stream?()

    • A、 authorization
    • B、 data integrity
    • C、 confidentiality
    • D、 authentication

    正确答案:B,C

  • 第17题:

    Your Service Provider does not support Link Fragmentation and Interleave, but upstream serialization delay on your broadband link is affecting voice quality. Which two mitigation strategies are viable?()

    • A、Upgrade your residential broadband service to at least 768kbps uplink.
    • B、Switch your home router to use PPP encapsulation.
    • C、Use the ip tcp adjust-mss interface command.
    • D、Employ QoS techniques to drop large data packets.
    • E、Use traffic shaping to interrupt large data packets.

    正确答案:A,C

  • 第18题:

    As a frame leaves a Layer 3 device, the Layer 2 encapsulation information is changed from what it was when it entered the devicE.For what two reasons can this happen? ()

    • A、The data is moving from 10BASE-TX to 100BASE-TX.
    • B、The WAN encapsulation type has changed.
    • C、The data format has changed from analog to digital.
    • D、The source and destination hosts are in the same subnet.
    • E、The source and destination MAC addresses have changed.

    正确答案:B,D

  • 第19题:

    Which two functions of JUNOS Software are handled by the data plane?()

    • A、NAT
    • B、OSPF
    • C、SNMP
    • D、SCREEN options

    正确答案:A,D

  • 第20题:

    Which two client requests are captured during database replay Capture?() (Choose two)

    • A、Flashback queries
    • B、Shared server requests
    • C、Login and logoff activities of sessions
    • D、Direct path load of data from external files by using utilities such as SQL *loader
    • E、Data definition language (DDL) and data manipulation language (DML) operations

    正确答案:C,E

  • 第21题:

    多选题
    Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()
    A

    access point certification and software control

    B

    compression and Layer 3 address mapping

    C

    Layer 3 addressing and distribution

    D

    packet encapsulation, fragmentation, and formatting

    E

    SNMP monitoring services


    正确答案: C,E
    解析: 暂无解析

  • 第22题:

    多选题
    Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)
    A

    NAT

    B

    OSPF

    C

    SNMP

    D

    SCREEN options


    正确答案: A,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which the two demonstrate encapsulation of data?()
    A

    Member data have no access modifiers.

    B

    Member data can be modified directly.

    C

    The access modifier for methods is protected.

    D

    The access modifier to member data is private.

    E

    Methods provide for access and modification of data.


    正确答案: E,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two are benefits of fully encapsulating a class?()
    A

    Performance of class methods is improved.

    B

    Implementation details of the class are hidden.

    C

    Access modifiers can be omitted on class data members.

    D

    Code that uses the encapsulation class can access data members directly.

    E

    Internal operation of the class can be modified without impacting clients of that class.


    正确答案: A,D
    解析: 暂无解析