Which methods from the String and StringBuffer classes modify the object on which they are called?()  A、The charAt() method of the String class.B、The toUpperCase() method of the String class.C、The replace() method of the String class.D、The reverse() method of the StringBuffer class.E、The length() method of the StringBuffer class.

Which methods from the String and StringBuffer classes modify the object on which they are called?()  

  • A、The charAt() method of the String class.
  • B、The toUpperCase() method of the String class.
  • C、The replace() method of the String class.
  • D、The reverse() method of the StringBuffer class.
  • E、The length() method of the StringBuffer class.

相关考题:

Which of the following scheduling methods uses more of the risk management concepts:A ADMB PDMC CPMD PERTE Gantt

Which one of the following is not an acquisition method?A advertisingB invitationC negotiationD purchaseE all are acquisition methods

There are four methods of government procurement. Which is not one of these methods?A AssistanceB Sealed biddingC Competitive proposalsD AcquisitionE Small purchases

161 There are four methods of government procurement. Which is not one of these methods? A. AssistanceB. Sealed biddingC. Competitive proposalsD. AcquisitionE. Small purchases

Which is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description, classification and transcription?A.PhoneticsB.PhonologyC.SemanticsD.Pragmatics

Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP

Which of the following methods can move files in clear text and can be easily intercepted?()A、RSHB、SNMPC、FTPD、TELNET

Which of the following archiving methods only backs up data that has changed since the previous full backup?()A、SnapshotB、IncrementalC、CopyD、Differential

Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP