多选题Which declarations of identifiers are legal?()A$personsBTwoUsersC*pointDthisE_endline

多选题
Which declarations of identifiers are legal?()
A

$persons

B

TwoUsers

C

*point

D

this

E

_endline


参考解析

解析: Java的标识符可以以一个Unicode字符,下滑线(_),美元符($)开始,后续字符可以是前面的符号和数字,没有长度限制,大小写敏感,不能是保留字。

相关考题:

A corporation is a legal person, which means it is treated like a private person under the law.() 此题为判断题(对,错)。

Business law refers to the branch of law which consists of rules, statutes, codes and regulations established to provide a legal framework within which business may be conducted.() 此题为判断题(对,错)。

Which are valid identifiers?()  A、_classB、$value$C、zer@D、¥ngstrE、2muchuq

Which the three are valid declarations of a float?()A、 float foo = -1;B、 float foo = 1.0;C、 float foo = 42el:D、 float foo = 2.02f:E、 float foo = 3.03d:

When disposing of data, which of the following should be considered FIRST?()A、Company policy requirementsB、Local legal requirementsC、Storage requirementsD、Disposal requirements

Which two declarations prevent the overriding of a method?() A、 Final void methoda() {}B、 Void final methoda() {}C、 Static void methoda() {}D、 Static final void methoda() {}E、 Final abstract void methoda() {}

Which two are valid declarations of a float?()A、 float f = 1F;B、 float f = 1.0.;C、 float f = ‘1’;D、 float f = “1”;E、 float f = 1.0d;

Which declarations of identifiers are legal?()A、 $personsB、 TwoUsersC、 *pointD、 thisE、 _endline

Which of the following is the technology that helps organizations to reduce legal risks associated with e-mail?()A、Information Rights ManagementB、JoumalingC、Legal disclaimerD、Messaging Records Management

多选题Which are valid identifiers?()A_classB$value$Czer@D¥ngstrE2muchuq

多选题Which two declarations prevent the overriding of a method? ()AFinal void methoda(){}BVoid final methoda(){}CStatic void methoda(){}DStatic final void methoda(){}EFinal abstract void methoda(){}

多选题Which two are valid declarations of a float?()Afloat f = 1F;Bfloat f = 1.0.;Cfloat f = ‘1’;Dfloat f = “1”;Efloat f = 1.0d;

多选题Which declarations will allow a class to be started as a standalone program?()Apublic void main(String args[])Bpublic void static main(String args[])Cpublic static main(String[] argv)Dfinal public static void main(String [] array)Epublic static void main(String args[])

多选题A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years.  Which of the following locations should an administrator configure when complying with the new policy?()ALocal workstationsBBackup tapesCDomain controllersDEmail serverESMTP gatewayFProxy server

多选题Which two are valid declarations within an interface definition?()Avoid methoda();Bpublic double methoda();Cpublic final double methoda();Dstatic void methoda(double d1);Eprotected void methoda(double d1);

多选题Which of the following would be considered reasonable network maintenance tasks?(Choose allthat apply.)()AEnsuring compliance with legal regulations and corporate policiesBTroubleshooting problem reportsCPlanning for network expansionDProviding support to sales and marketingEGiving presentations to managementFMonitoring and tuning network performance

多选题You are the administrator of a Windows 2000 network. You need to store secured files for your company’s Accounting and Legal departments on a Windows 2000 Professional computer. You want to accomplish the following goals:  • Enable users in both departments to access their own files from the network  • Enable users in the Accounting department to view the Legal department’s documents  • Prevent users in the Legal department from being able to view the Accounting department’s    documents  • Enable managers within the company to access and modify both the Accounting and the Legal   department’s files You take the following actions:   • Create two shared folders named Accounting and Legal  • Create three groups named Accounting, Legal, and Management  • Allow the Accounting group Modify permission on the Accounting folder  • Allow the Accounting group Read permissions on the Legal folders.  • Allow the Management group Modify permission on both the Accounting and Legal folders.   Which result or results do these actions produce?()AUsers in both departments can access to their own files from the network.BUsers in the Accounting department can view the Legal department’s documents.CUsers in the Legal department cannot view the Accounting department’s documents.DCompany managers can access and modify both departments’ files.

多选题Which three form part of correct array declarations?()Apublic int a []Bstatic int [] aCpublic [] int aDprivate int a [3]Eprivate int [3] a []Fpublic final int [] a

多选题Oracle Net Configuration Assistant is a post-installation tool that configures basic network components after installation. Which four components are included in the configuration?()ADirectory serverBHostname adaptorCTCP/IP host fileDConnection ManagerEconnecting poolingFexternal proceduresGlistener names and protocol addressesHNet Service names in a tnsnames.ora fileInaming methods the client uses to resolve connect identifiers

多选题Which two valid declarations of a char?()AChar ch = “a”;BChar ch = ‘/’ ‘;CChar ch = ‘cafe’;DChar ch = “cafe”;EChar ch = ‘/ucafe’;FChar ch = ‘/u10100’;GChar ch = (char) true;

多选题Which three are valid declarations of a float? ()AFloat foo = -1;BFloat foo = 1.0;CFloat foo = 42e1;DFloat foo = 2.02f;EFloat foo = 3.03d;FFloat foo = 0x0123;

多选题Which the three are valid declarations of a float?()Afloat foo = -1;Bfloat foo = 1.0;Cfloat foo = 42el:Dfloat foo = 2.02f:Efloat foo = 3.03d:

多选题A JavaBeans component has the following field:   11. private boolean enabled;   Which two pairs of method declarations follow the JavaBeans standard for accessing this field?()AABBCCDD

多选题Which tow statements are most correct regarding opt-in models?()AA based opt-in model uses virtualized identifiersBA based opt-in model uses hardware values as identifiersCA logical server opt-in model uses virtualized identifiersDA logical server opt-in model uses hardware values as identifiers

多选题Which of the following statements are legal?()Along l = 4990;Bint i = 4L;Cfloat f = 1.1;Ddouble d = 34.4;Edouble t = 0.9F;

多选题Which declarations of identifiers are legal?()A$personsBTwoUsersC*pointDthisE_endline

多选题Which three elements must be used when you configure a router interface for vlan trunking?()Aone IP network or subnetwork for each subinterfaceBsubinterface numbering that matches vlan tagesCsubinterface encapsulation identifiers that match vlan tagsDa management domain for each subinterfaceEone physical interface for each subinterfaceFone subinterface per vlan

多选题Which result or results do these actions produce?()AUsers in both departments can access their files from the network.BUsers in the accounting department can view the legal department’s documents.CUsers in the legal department cannot view the accounting department’s documents.DCompany managers can access and modify both departments’ files.