Which two can be used to create a new Thread?()   

题目
多选题
Which two can be used to create a new Thread?()
A

Extend java.lang.Thread and override the run method.

B

Extend java.lang.Runnable and override the start method.

C

Implement java.lang.thread and implement the run method.

D

Implement java.lang.Runnable and implement the run method.

E

Implement java.lang.Thread and implement the start method.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which three statements are true when the listener handles connection requests to an Oracle 12cdatabase instance with multithreaded architecture enabled In UNIX?()

A. Thread creation must be routed through a dispatcher process

B. The local listener may spawn a now process and have that new process create a thread

C. Each Oracle process runs an SCMN thread.

D. Each multithreaded Oracle process has an SCMN thread.

E. The local listener may pass the request to an existing process which in turn will create a thread.


参考答案:A, D, E

第2题:

Which two statements regarding symmetric key encryption are true?() (Choose two.)

A. The same key is used for encryption and decryption.

B. It is commonly used to create digital certificate signatures.

C. It uses two keys: one for encryption and a different key for decryption.

D. An attacker can decrypt data if the attacker captures the key used for encryption.


参考答案:A, D

第3题:

Which two statements regarding a SQL profile are true?()

A. It is built by Automatic Tuning Optimizer.

B. It cannot be stored persistently in the data dictionary.

C. It can be used by the query optimizer automatically.

D. It can be created manually by using the CREATE PROFILE command.


参考答案:A, C

第4题:

Which statements about the garbage collection are true?() 

  • A、 The program developer must create a thread to be responsible for free the memory.
  • B、 The garbage collection will check for and free memory no longer needed.
  • C、 The garbage collection allow the program developer to explicity and immediately free the memory.
  • D、 The garbage collection can free the memory used java object at expect time.

正确答案:B

第5题:

Which two code fragments will execute the method doStuff() in a separate thread?()

  • A、 new Thread() { public void run() { doStuff(); } }
  • B、 new Thread() { public void start() { doStuff(); } }
  • C、 new Thread() { public void start() { doStuff(); } } .run();
  • D、 new Thread() { public void run() { doStuff(); } } .start();
  • E、 new Thread(new Runnable() { public void run() { doStuff(); } } ).run();
  • F、 new Thread(new Runnable() { public void run() { doStuff(); } }).start();

正确答案:D,F

第6题:

Which two statements are true with regard to policy ordering? ()(Choose two.)

A. The last policy is the default policy, which allows all traffic.

B. The order of policies is not important.

C. New policies are placed at the end of the policy list.

D. The insert command can be used to change the order.


参考答案:C, D

第7题:

Which two statements are true regarding the USING clause in table joins?()

  • A、It can be used to join a maximum of three tables 
  • B、It can be used to restrict the number of columns used in a NATURAL join 
  • C、It can be used to access data from tables through equijoins as well as nonequijoins 
  • D、It can be used to join tables that have columns with the same name and compatible data types

正确答案:B,D

第8题:

Which two events will cause a slave server to create a new relay log file?()

A.Execution of the FLUSH LOGS statement

B.Starting of the SQL thread

C.Reaching the slave_pendign _jobs_size_max limit

D.Execution of FULSH TABLES WITH READ LOCK

E.Starting of the I/O thread


参考答案:A, E

第9题:

Which method in the Thread class is used to create and launch a new thread of execution?()

  • A、 Run();
  • B、 Start();
  • C、 Execute();
  • D、 Run(Runnable r);
  • E、 Start(Runnable r);
  • F、 Execute(Thread t);

正确答案:B

第10题:

Which two statements regarding asymmetric key encryption are true?()

  • A、The same key is used for encryption and decryption.
  • B、It is commonly used to create digital certificate signatures.
  • C、It uses two keys: one for encryption and a different key for decryption.
  • D、An attacker can decrypt data if the attacker captures the key used for encryption

正确答案:A,B

更多相关问题