According to Paragraph 2, some organizations check their systems to find out
[A] whether there is any weak point.
[B] what sort of data has been stolen.
[C] who is responsible for the leakage.
[D] how the potential spies can be located.
第1题:
A.null
B.zero
C.some
D.Compilationfails.
E.Anexceptionisthrownatruntime.
第2题:
A. 3
B. 4
C. 5
D. 6
E. 语句if(i= 2、编译出错
第3题:
下列()语句使复选框Check1变成灰色。
A.Check1.Value = 0
B.Check1.Value =1
C.Check1.Value = 2
D.Check1.Style = 0
第4题:
A.Adesk,asitnotrackmountable
B.EthernetconnectionstothePOWER5systems
C.SerialconnectionstothePOWER5systems
D.USBconnectionsforthekeyboardandmouse
第5题:
以下程序调试结果为:
public class Test {
int m=5;
public void some(int x) {
m=x;
}
public static void main(String args []) {
new Demo().some(7);
}
}
class Demo extends Test {
int m=8;
public void some(int x) {
super.some(x);
System.out.println(m);
}
}
A.5
B.8
C.7
D.无任何输出
E.编译错误
第6题:
18、下列()语句使复选框Check1变成灰色。
A.Check1.Value = 0
B.Check1.Value =1
C.Check1.Value = 2
D.Check1.Style = 0