单选题A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()A java.util.QueueB java.util.ArrayListC java.

题目
单选题
A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()
A

java.util.Queue

B

java.util.ArrayList

C

java.util.LinearList

D

java.util.LinkedList

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A company that makes Computer Assisted Design (CAD) software has, within its application, some utility classes that are used to perform 3D rendering tasks. The company‘s chief scientist has just improved the performance of one of the utility classes‘ key rendering algorithms, and has assigned a programmer to replace the old algorithm with the new algorithm. When the programmer begins researching the utility classes, she is happy to discover that the algorithm to be replaced exists in only one class. The programmer reviews that class‘s API, and replaces the old algorithm with the new algorithm, being careful that her changes adhere strictly to the class‘s API. Once testing has begun, the programmer discovers that other classes that use the class she changed are no longer working properly.What design flaw is most likely the cause of these new bugs?()

A.Inheritance

B.Tight coupling

C.Low cohesion

D.High cohesion

E.Loose coupling

F.Object immutability


参考答案:B

第2题:

What are the characteristics of the process of documenting the layers of an existing network? ()

A. begins with gathering organizational input that may be inaccurate

B. begins with gathering organizational input that does not need to be supplemented by a network audit

C. requires a network audit to support some upgrade decisions

D. requires a network audit to support any network restructuring

E. provides reliable input for verifying network consistency

F. does not provide reliable input for designing changes


参考答案:A, D, E

第3题:

Certkiller.com has given you the task of serializing an object and writing it to a data file using binary serialization.You need to ensure that you meet these requirements.What should you do?()

A.

B.

C.

D.


参考答案:A

第4题:

What are the characteristics of the process of documenting the layers of an existing network? ()

  • A、begins with gathering organizational input that may be inaccurate
  • B、begins with gathering organizational input that does not need to be supplemented by a network audit
  • C、requires a network audit to support some upgrade decisions
  • D、requires a network audit to support any network restructuring
  • E、provides reliable input for verifying network consistency
  • F、does not provide reliable input for designing changes

正确答案:A,D,E

第5题:

What is the primary purpose of SMB Smart Designs? ()

  • A、 assists in locating appropriate resources
  • B、 provides training on products, tools, and solutions
  • C、 provides a direct support path for any partner issue
  • D、 provides validated commercial solutions
  • E、 provides a step-by-step outline of implementation tasks required

正确答案:B

第6题:

What are two reasons for using a virtual link in OSPF?()

A. Provides fast convergence times.

B. Supports connections of multiple backbones.

C. Eliminates the need for a Designated Router.

D. Supports non direct connections to the backbone.


参考答案:B, D

第7题:

Because objects( ) data and implementation, the user of an object can view the object as a black box that provides services.

A.encapsulate
B.inherit
C.connect
D.refer

答案:A
解析:

第8题:

A programmer has an algorithm that requires a java.util.List that provides an efficient implementation of add(0, object), but does NOT need to support quick random access. What supports these requirements?()

A.java.util.Queue

B.java.util.ArrayList

C.java.util.LinearList

D.java.util.LinkedList


参考答案:D

第9题:

What three statements are true about the various deployments of the 802.1x Extensible Authentication Protocol (EAP)? ()

  • A、 EAP-FAST has the ability to tie login with non-Microsoft user databases
  • B、 EAP-TLS supports static passwords
  • C、 PEAP supports one-time passwords
  • D、 LEAP does not support multiple operating systems
  • E、 LEAP supports Layer 3 roaming
  • F、 PEAP does not work with WPA·

正确答案:A,C,E

第10题:

A company has a business application that provides its users with many different reports: receivables reports, payables reports, revenue projects, and so on.The company has just purchased some new, state-of-the-art,wireless printers, and a programmer has been assigned the task of enhancing all of the reports to use not only the company’s old printers, but the new wireless printers as well.When the programmer starts looking into the application, the programmer discovers that because of the design of the application, it is necessary to make changes to each report to support the new printers.  Which two design concepts most likely explain the situation?()

  • A、Inheritance
  • B、Low cohesion
  • C、Tight coupling
  • D、High cohesion
  • E、Loose coupling
  • F、Object immutablility

正确答案:B,C

更多相关问题