Which of the following statements describe the use of the keywordstatic?a) Within the body of a function: A static variable maintains its valuebetween function revocationsb) Within a module: A static variable is accessible by all functionswithin that modu

题目

Which of the following statements describe the use of the keyword

static?

a) Within the body of a function: A static variable maintains its value

between function revocations

b) Within a module: A static variable is accessible by all functions

within that module

c) Within a module: A static function can only be called by other

functions within that module

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which statements are true regarding classless routing protocols?()

A. The use of discontiguous subnets is not allowed

B. The use of variable length subnet masks is permitted

C. RIP v1 is a classless routing protocol

D. IGRP supports classless routing within the same autonomous system

E. RIP v2 supports classless routing


参考答案:B, E

第2题:

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

A.It specifies use of a static encryption key that must be changed frequently to enhance security

B.It requires use of an open authentication method

C.It specifies the use of dynamic encryption keys that change each time a client establishes a connection

D.It requires that all access points and wireless devices use the same encryption key

E.It includes authentication by PSK


参考答案:C, E

第3题:

The overall transfer function is the ratio of the transform. of the controlled variable to the transform. of ( ).

A.the controlled variable

B.the reference input

C.the feedback

D.the output variable


参考答案:B

第4题:

Several @functions can execute multiple statements. Which one of the following initializes a variable and can increment in during the operation?()

  • A、 @do 
  • B、 @for 
  • C、 @while 
  • D、 @dowhile 

正确答案:B

第5题:

Which statements concerning the value of a member variable are true, when no explicit assignments have been made?()  

  • A、The value of an int is undetermined.
  • B、The value of all numeric types is zero.
  • C、The compiler may issue an error if the variable is used before it is initialized.
  • D、The value of a String variable is "" (empty string).
  • E、The value of all object variables is null.

正确答案:B,E

第6题:

Which of the following statements are correct in regard to classless routing protocols?()

A. Discontiguous subnets are not allowed.

B. Variable length subnet masks are allowed.

C. RIP v1 is a classless routing protocol.

D. IGRP supports classless routing within the same autonomous system.

E. RIP v2 supports classless routing.


参考答案:B, E

第7题:

Which statements concerning the correlation between the inner and outer instances of non-static inner classes are true?()  

  • A、Member variables of the outer instance are always accessible to inner instances, regardless of their      accessibility modifiers.
  • B、Member variables of the outer instance can never be referred to using only the variable name within     the inner instance.
  • C、More than one inner instance can be associated with the same outer instance.
  • D、All variables from the outer instance that should be accessible in the inner instance must be declared     final.
  • E、A class that is declared final cannot have any inner classes.

正确答案:A,C

第8题:

Which statement is true about the log-output variable?()

A.It is a static variable and can be set only at MySQL server startup

B.It enables and starts the General Query Log

C.It sets the target location for the binary logs generated by the MySQL sever

D.It specifies output destinations for the slow and General Query logs


参考答案:D

第9题:

Which of the following commands cannot use the functionality assosciated with theNLS_DATE_FORMAT variable?()

  • A、RESTORE
  • B、RECOVER
  • C、REPORT
  • D、BACKUP

正确答案:D

第10题:

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。

  • A、It specifies use of a static encryption key that must be changed frequently to enhance security
  • B、It requires use of an open authentication method
  • C、It specifies the use of dynamic encryption keys that change each time a client establishes a connection
  • D、It requires that all access points and wireless devices use the same encryption key
  • E、It includes authentication by PSK

正确答案:C,E

更多相关问题