( ) is a contiguous, numbered set of variables of a given base type, which can be used and passed to functions as a unit.A.Record B.Array C.Parameter D.File

题目
( ) is a contiguous, numbered set of variables of a given base type, which can be used and passed to functions as a unit.

A.Record
B.Array
C.Parameter
D.File

相似考题
更多“( ) is a contiguous, numbered set of variables of a given base type, which can be used and passed to functions as a unit.”相关问题
  • 第1题:

    Array is a contiguous,numbered set of variables of a given base type,which can be used and passed to functions as a(67).

    A.record

    B.unit

    C.file

    D.parameter


    正确答案:B
    解析:数组是一个由给定基本类型的变量组成的连续有序的集合,它可以作为一个单元使用或者传给某个函数。

  • 第2题:

    Which two LSA types can be used to aggregate inter-area routes?()

    A. Type 2

    B. Type 3

    C. Type 4

    D. Type 5

    E. Type 9


    参考答案:B, D

  • 第3题:

    What type of constraint can be used to ensure that, in any given row in a table, the value of one column never exceeds the value of another column?()

    A.Check

    B.Range

    C.Referential

    D.Informational


    参考答案:A

  • 第4题:

    Which three functions can CCC be used for?()

    • A、To interconnect VLANS
    • B、To interconnect ATM VCs
    • C、To interconnect MPLS LSPs
    • D、To interconnect MPLS VPNs

    正确答案:A,B,C

  • 第5题:

    There are 3 steps to confirm whether a range of IP address can be summarized. When of thefollowing is used in each of these 3 steps?()

    • A、 The first number in the contiguous block of addresses
    • B、 The last number in the contiguous block of addresses
    • C、 The size of the contiguous block of addresses
    • D、 The subnet mask of the original network address

    正确答案:A

  • 第6题:

    Which operational mode command can be used to synchronize the local system with an NTP server?()

    • A、set ntp time 64.32.129.3
    • B、set clock ntp 64.32.129.3
    • C、set time 64.32.129.3
    • D、set date ntp 64.32.129.3

    正确答案:D

  • 第7题:

    Which DBMS_SCHEDULER procedures can be used to enable a program?()

    • A、 ENABLE
    • B、 ENABLE_PROGRAM
    • C、 VALIDATE_PROGRAM
    • D、 SET_ATTRIBUTE
    • E、 SET_ENABLED

    正确答案:A,D

  • 第8题:

    Which three statements are true regarding single-row functions?()

    • A、 They can accept only one argument.
    • B、 They can be nested up to only two levels.
    • C、 They can return multiple values of more than one data type.
    • D、 They can be used in SELECT, WHERE, and ORDER BY clauses.  
    • E、 They can modify the data type of the argument that is referenced.
    • F、 They can accept a column name, expression, variable name, or a user-supplied constant as arguments.

    正确答案:D,E,F

  • 第9题:

    Which DBMS_SCHEDULER procedures can be used to enable a program?()

    • A、ENABLE启用
    • B、ENABLE_PROGRAM
    • C、VALIDATE_PROGRAM
    • D、SET_ATTRIBUTE设置属性
    • E、SET_ENABLED

    正确答案:A,D

  • 第10题:

    多选题
    Which three statements are true regarding single-row functions?()
    A

    They can accept only one argument.

    B

    They can be nested up to only two levels.

    C

    They can return multiple values of more than one data type.

    D

    They can be used in SELECT, WHERE, and ORDER BY clauses.

    E

    They can modify the data type of the argument that is referenced.

    F

    They can accept a column name, expression, variable name, or a user-supplied constant as arguments.


    正确答案: F,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the Automatic Diagnostic Repository (ADR)?()
    A

    The ADR base keeps all diagnostic information in binary format

    B

    SQL*Plus provides the ADRI script, which can be used to work with ADR

    C

    The ADR can be used for problem diagnosis only when the database is open

    D

    The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null

    E

    The ADR can be used for problem diagnosis even when the database instance is down

    F

    The ADR base is shared across multiple instances


    正确答案: E,F
    解析: 暂无解析

  • 第12题:

    多选题
    Which two statements are true about the hashCode method?()
    A

    The hashCode method for a given class can be used to test for object equality and object inequality for that class.

    B

    The hashCode method is used by the java.util.SortedSet collection class to order theelements within that set.

    C

    The hashCode method for a given class can be used to test for object inequality, but NOT object equality, for that class.

    D

    The only important characteristic of the values returned by a hashCode method is that the distribution of values must follow a Gaussian distribution.

    E

    The hashCode method is used by the java.util.HashSet collection class to group the elements within that set into hash buckets for swift retrieval.


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    ______ is a contiguous, numbered set of variables of a given base type, which can be used and passed to functions as a unit.

    A.Record

    B.Array

    C.File

    D.Parameter


    正确答案:B
    解析:译文的含义是:()是给定了基类型的连续编号的变量集合,它能够作为参数传递给函数使用。A、B、C、D各选项的意思分别是:记录、数组、文件、参数。所以,根据题目的描述,应该选择数组。

  • 第14题:

    Which operational mode command can be used to synchronize the local system with an NTP server?()

    A. set ntp time 64.32.129.3

    B. set clock ntp 64.32.129.3

    C. set time 64.32.129.3

    D. set date ntp 64.32.129.3


    参考答案:D

  • 第15题:

    Which two statements are true about the hashCode method?()

    • A、 The hashCode method for a given class can be used to test for object equality and object inequality for that class.
    • B、 The hashCode method is used by the java.util.SortedSet collection class to order theelements within that set.
    • C、 The hashCode method for a given class can be used to test for object inequality, but NOT object equality, for that class.
    • D、 The only important characteristic of the values returned by a hashCode method is that the distribution of values must follow a Gaussian distribution.
    • E、 The hashCode method is used by the java.util.HashSet collection class to group the elements within that set into hash buckets for swift retrieval.

    正确答案:C,E

  • 第16题:

    Which two LSA types can be used to aggregate inter-area routes?()

    • A、Type 2
    • B、Type 3
    • C、Type 4
    • D、Type 5
    • E、Type 9

    正确答案:B,D

  • 第17题:

    A user would like their shell prompt to reflect the current directory. Which of the following environment variables can be set to accomplish this?()

    • A、PS1
    • B、PATH
    • C、PROMPT
    • D、LOCPATH

    正确答案:A

  • 第18题:

    Which two statements are true about the Automatic Diagnostic Repository (ADR)?() 

    • A、 The ADR base keeps all diagnostic information in binary format
    • B、 SQL*Plus provides the ADRI script, which can be used to work with ADR
    • C、 The ADR can be used for problem diagnosis only when the database is open
    • D、 The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to null
    • E、 The ADR can be used for problem diagnosis even when the database instance is down
    • F、 The ADR base is shared across multiple instances

    正确答案:E,F

  • 第19题:

    Which DBMS_SCHEDULER procedure(s) can be used to alter an existing job?()

    • A、 SET_ATTRIBUTE_NULL
    • B、 ALTER_JOB
    • C、 ALTER_JOB_PARAMETERS
    • D、 ALTER
    • E、 SET_ATTRIBUTE

    正确答案:A,E

  • 第20题:

    Consider the Mysql Enterprise Audit plugin. Which statement is true when you identify a connection event that has used external authentication?()

    • A、The attribute "STATUS" is set to the string EXTERNAL_AUTH
    • B、The attribute "PRIV_USER" contains the username
    • C、The event type that is given in the attribute "NAME" is EXTERNAL_AUTH
    • D、There is no differentiation between native and external authentication events
    • E、External authentication is managed through external auditing logs
    • F、The "PROXY_PRIV" user shows a username if external authentication is used

    正确答案:E

  • 第21题:

    多选题
    Which three functions can CCC be used for?()
    A

    To interconnect VLANS

    B

    To interconnect ATM VCs

    C

    To interconnect MPLS LSPs

    D

    To interconnect MPLS VPNs


    正确答案: C,A
    解析: 暂无解析

  • 第22题:

    单选题
    What type of constraint can be used to ensure that, in any given row in a table, the value of one column never exceeds the value of another column?()
    A

    Check

    B

    Range

    C

    Referential

    D

    Informational


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A SELECT statement can be used to perform these three functions: 1.Choose rows from a table. 2.Choose columns from a table. 3.Bring together data that is stored in different tables by creating a link between them. Which set of keywords describes these capabilities?()
    A

    difference, projection, join

    B

    selection, projection, join

    C

    selection, intersection, join

    D

    intersection, projection, join

    E

    difference, projection, product


    正确答案: E
    解析: 暂无解析

  • 第24题:

    多选题
    A JSP page needs to set the property of a given JavaBean to a value that is calculated with the JSP page. Which three jsp:setProperty attributes must be used to perform this initialization?()
    A

    Id

    B

    Val

    C

    Name

    D

    Param

    E

    Value

    F

    Property


    正确答案: C,B
    解析: 暂无解析