单选题A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()A java.util.QueueB java.util.ArrayListC java.

题目
单选题
A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()
A

java.util.Queue

B

java.util.ArrayList

C

java.util.LinearList

D

java.util.LinkedList


相似考题
更多“单选题A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()A java.util.QueueB java.util.ArrayListC java.”相关问题
  • 第1题:

    What are the characteristics of the process of documenting the layers of an existing network? ()

    A. begins with gathering organizational input that may be inaccurate

    B. begins with gathering organizational input that does not need to be supplemented by a network audit

    C. requires a network audit to support some upgrade decisions

    D. requires a network audit to support any network restructuring

    E. provides reliable input for verifying network consistency

    F. does not provide reliable input for designing changes


    参考答案:A, D, E

  • 第2题:

    What is the primary purpose of SMB Smart Designs? ()

    • A、 assists in locating appropriate resources
    • B、 provides training on products, tools, and solutions
    • C、 provides a direct support path for any partner issue
    • D、 provides validated commercial solutions
    • E、 provides a step-by-step outline of implementation tasks required

    正确答案:B

  • 第3题:

    What are the characteristics of the process of documenting the layers of an existing network? ()

    • A、begins with gathering organizational input that may be inaccurate
    • B、begins with gathering organizational input that does not need to be supplemented by a network audit
    • C、requires a network audit to support some upgrade decisions
    • D、requires a network audit to support any network restructuring
    • E、provides reliable input for verifying network consistency
    • F、does not provide reliable input for designing changes

    正确答案:A,D,E

  • 第4题:

    A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0,object), but does NOT need to support quick random access. What supports these requirements?() 

    • A、 java.util.Queue
    • B、 java.util.ArrayList
    • C、 java.util.LinearList
    • D、 java.util.LinkedList

    正确答案:D

  • 第5题:

    A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly. What design flaw is most likely the cause of these new bugs?()

    • A、Inheritance
    • B、Tight coupling
    • C、Low cohesion
    • D、High cohesion
    • E、Loose coupling
    • F、Object immutability

    正确答案:B

  • 第6题:

    A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()

    • A、Inheritance
    • B、Tight coupling
    • C、Low cohesion
    • D、High cohesion
    • E、Loose coupling

    正确答案:B

  • 第7题:

    You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()

    • A、Use Event Viewer to review the application logs on each of the seven servers.
    • B、Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.
    • C、Use Task Manager to view the performance data on each of the seven servers.
    • D、Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.

    正确答案:B

  • 第8题:

    多选题
    Identify two correct statements to complete the sentance. In a Coherence implementation, it is a best practice to implement PortableObject on all customer objects because:()
    A

    it leverages Java’s built-in serialization

    B

    it provides a more efficient serialization of the object

    C

    it allows the object to be shared across applications

    D

    it allows the object to be shared across programming platforms


    正确答案: A,C
    解析: 暂无解析

  • 第9题:

    单选题
    public class Drink implements Comparable {  public String name;  public int compareTo(Object o) {  return 0;  }  }  and:  Drink one = new Drink();  Drink two = new Drink();  one.name= “Coffee”;  two.name= “Tea”;  TreeSet set = new TreeSet();  set.add(one);  set.add(two);  A programmer iterates over the TreeSet and prints the name of each Drink object. What is the result?()
    A

     Tea

    B

     Coffee

    C

     Coffee Tea

    D

     Compilation fails.

    E

     The code runs with no output.

    F

     An exception is thrown at runtime.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    A company that makes Computer Assisted Design (CAD) software has, within its application, some utilityclasses that are used to perform 3D rendering tasks. The company’s chief scientist has just improved theperformance of one of the utility classes’ key rendering algorithms, and has assigned a programmer toreplace the old algorithm with the new algorithm. When the programmer begins researching the utilityclasses, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class’s API, and replaces the old algorithm with the new algorithm, being carefulthat her changes adhere strictly to the class’s API. Once testing has begun, the programmer discovers thatother classes that use the class she changed are no longer working properly. What design flaw is mostlikely the cause of these new bugs?()
    A

    Inheritance

    B

    Tight coupling

    C

    Low cohesion

    D

    High cohesion

    E

    Loose coupling


    正确答案: E
    解析: 暂无解析

  • 第11题:

    单选题
    You are the network administrator for Testking.com. The TestKing network contains seven application servers. Each application server runs a database application named TestKingApp. Requirements for TestKingApp state that when you add a new user, you must add the user to the server that has the most available disk space. You need to ensure that you meet the requirements when you add new users to TestKingApp. What should you do?()
    A

    Use Event Viewer to review the application logs on each of the seven servers.

    B

    Use Performance Logs and Alerts to record the PhysicalDisk object on all seven servers.

    C

    Use Task Manager to view the performance data on each of the seven servers.

    D

    Use System Monitor to generate a histogram view of the LogicalDisk object on all seven servers.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)? ()
    A

    EAP-FAST has the ability to tie login with non-Microsoft user databases

    B

    EAP-TLS supports static passwords

    C

    PEAP supports one-time passwords

    D

    LEAP does not support multiple operating systems

    E

    LEAP supports Layer 3 roaming

    F

    PEAP does not work with WPA·


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    Because objects( ) data and implementation, the user of an object can view the object as a black box that provides services.

    A.encapsulate
    B.inherit
    C.connect
    D.refer

    答案:A
    解析:

  • 第14题:

    What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)? ()

    • A、 EAP-FAST has the ability to tie login with non-Microsoft user databases
    • B、 EAP-TLS supports static passwords
    • C、 PEAP supports one-time passwords
    • D、 LEAP does not support multiple operating systems
    • E、 LEAP supports Layer 3 roaming
    • F、 PEAP does not work with WPA·

    正确答案:A,C,E

  • 第15题:

    A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on.The company has just purchased some new, state-of-the-art,wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company’s old printers, but the new wireless printers as well.When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers.  Which two design concepts most likely explain the situation?()

    • A、Inheritance
    • B、Low cohesion
    • C、Tight coupling
    • D、High cohesion
    • E、Loose coupling
    • F、Object immutablility

    正确答案:B,C

  • 第16题:

    What are two reasons for using a virtual link in OSPF?()

    • A、Provides fast convergence times.
    • B、Supports connections of multiple backbones.
    • C、Eliminates the need for a Designated Router.
    • D、Supports non direct connections to the backbone.

    正确答案:B,D

  • 第17题:

    Identify two correct statements to complete the sentance. In a Coherence implementation, it is a best practice to implement PortableObject on all customer objects because:()

    • A、 it leverages Java’s built-in serialization
    • B、 it provides a more efficient serialization of the object
    • C、 it allows the object to be shared across applications
    • D、 it allows the object to be shared across programming platforms

    正确答案:B,D

  • 第18题:

    You work as an application developer at Certkiller .com. Certkiller .com has instructed you to create a class named MetricFormula. This class will be used to compare MetricUnit and EnglishUnit objects.The MetricFormula is currently defined as follows (Line numbers are used for reference purposes only): 1. public class MetricFormula2. { 3. 4. } You need to ensure that the MetricFormula class can be used to compare the required objects. What should you do? ()

    • A、 Add the following code on line 1: : IComparable {
    • B、 Add the following code on line 1: : IComparer {
    • C、 Add the following code on line 3: public int Compare (object x, object y) {// implementation code }
    • D、 Add the following code on line 3: public int CompareTo (object obj) {// implementation code }

    正确答案:B,C

  • 第19题:

    单选题
    Which statement best describes what Cisco Smart Care Service provides?()
    A

    bundled technical support and maintenance for Cisco networks

    B

    bundled, unlimited support with the purchase of any Cisco product

    C

    technical support, maintenance, and monitoring to Cisco networks

    D

    fee-based add-on support and tech-to-tech assistance for Cisco products


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()
    A

    java.util.Queue

    B

    java.util.ArrayList

    C

    java.util.LinearList

    D

    java.util.LinkedList


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    What is the primary purpose of SMB Smart Designs? ()
    A

     assists in locating appropriate resources

    B

     provides training on products, tools, and solutions

    C

     provides a direct support path for any partner issue

    D

     provides validated commercial solutions

    E

     provides a step-by-step outline of implementation tasks required


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()
    A

    java.util.Queue

    B

    java.util.ArrayList

    C

    java.util.LinearList

    D

    java.util.LinkedList


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0,object), but does NOT need to support quick random access. What supports these requirements?()
    A

     java.util.Queue

    B

     java.util.ArrayList

    C

     java.util.LinearList

    D

     java.util.LinkedList


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company's chief scientist has just improved the performance of one of the utility classes' key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class's API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class's API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly. What design flaw is most likely the cause of these new bugs?()
    A

    Inheritance

    B

    Tight coupling

    C

    Low cohesion

    D

    High cohesion

    E

    Loose coupling

    F

    Object immutability


    正确答案: B
    解析: 暂无解析