多选题Which two statements are true about the hashCode method?()AThe hashCode method for a given class can be used to test for object equality and object inequality for that class.BThe hashCode method is used by the java.util.SortedSet collection class to or

题目
多选题
Which two statements are true about the hashCode method?()
A

The hashCode method for a given class can be used to test for object equality and object inequality for that class.

B

The hashCode method is used by the java.util.SortedSet collection class to order theelements within that set.

C

The hashCode method for a given class can be used to test for object inequality, but NOT object equality, for that class.

D

The only important characteristic of the values returned by a hashCode method is that the distribution of values must follow a Gaussian distribution.

E

The hashCode method is used by the java.util.HashSet collection class to group the elements within that set into hash buckets for swift retrieval.


相似考题
更多“Which two statements are true about the hashCode method?()”相关问题
  • 第1题:

    Which two statements are true about L2TP tunnels?() (Choose two.)

    • A、Traffic is clear text
    • B、Traffic is encrypted 
    • C、They are initiated by the LNS
    • D、They are initiated by the LAC

    正确答案:A,D

  • 第2题:

    Which two statements are true about traffic shaping?()

    • A、Out-of-profile packets are queued.
    • B、It causes TCP retransmits.
    • C、Marking/remarking is not supported.
    • D、It does not respond to BECN and ForeSight Messages.
    • E、It uses a single/two-bucket mechanism for metering.

    正确答案:A,C

  • 第3题:

    Which two statements about the open and shared key wireless-authentication methods are true?()

    • A、shared key authentication is considered more secure than open authentication
    • B、shared key authentication is considered less secure than open authentication
    • C、if the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data
    • D、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data
    • E、if the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data

    正确答案:B,D

  • 第4题:

    Which of the following statements are true?() 

    • A、 The equals() method determines if reference values refer to the same object.
    • B、 The == operator determines if the contents and type of two separate objects match.
    • C、 The equals() method returns true only when the contents of two objects match.
    • D、 The class File overrides equals() to return true if the contents and type of two separate objects        match.

    正确答案:A,D

  • 第5题:

    Which two statements are true about pool-based source NAT? ()(Choose two.)

    • A、PAT is not supported.
    • B、PAT is enabled by default.
    • C、It supports the address-persistent configuration option.
    • D、It supports the junos-global configuration option.

    正确答案:B,C

  • 第6题:

    Which two statements are true about record groups?()

    • A、They are stored in the database. 
    • B、They are stored in local Forms memory. 
    • C、The type is specified explicitly at design time. 
    • D、The type is implied by when and how it is created.

    正确答案:B,D

  • 第7题:

    单选题
    Which of the following statements about Vandergrift's research is TRUE?
    A

    The participants were postgraduates learning French as a second language.

    B

    All the participants were taught using the conventional method, with the focus on listening strategies.

    C

    The two groups were taught by different teachers.

    D

    The participants were at the same initial skill level.


    正确答案: A
    解析:

  • 第8题:

    多选题
    Which of the following statements about variables and scope are true?()
    A

    Local variables defined inside a method are destroyed when the method is exited.

    B

    Local variables are also called automatic variables.

    C

    Variables defined outside a method are created when the object is constructed.

    D

    A method parameter variable continues to exist for as long as the object is needed in which the method is defined.


    正确答案: C,A
    解析: 本题是讨论变量的类型及作用域。

  • 第9题:

    多选题
    Which two statements are true regarding the return values of property written hashCode and equals methods from two instances of the same class?()
    A

    If the hashCode values are different, the objects might be equal.

    B

    If the hashCode values are the same, the object must be equal.

    C

    If the hashCode values are the same, the objects might be equal.

    D

    If the hashCode values are different, the objects must be unequal.


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements about SCSI are true? ()
    A

    The bus is limited to 32 devices

    B

    It is a full duplex serial standard

    C

    It is a half-duplex serial standard

    D

    It allows up to 320 MB/s of shared channel bandwidth


    正确答案: B,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which of the following statements are true?()
    A

    The equals() method determines if reference values refer to the same object.

    B

    The == operator determines if the contents and type of two separate objects match.

    C

    The equals() method returns true only when the contents of two objects match.

    D

    The class File overrides equals() to return true if the contents and type of two separate objects        match.


    正确答案: C,D
    解析: 严格来说这个问题的答案是不确定的,因为equals()方法是可以被重载的,但是按照java语言的本意来说:如果没有重写(override)新类的equals(),则该方法和 == 操作符一样在两个变量指向同一对象时返回真,但是java推荐的是使用equals()方法来判断两个对象的内容是否一样,就像String类的equals()方法所做的那样:判定两个String对象的内容是否相同,而==操作符返回true的唯一条件是两个变量指向同一对象。从这个意义上来说选择给定的答案。从更严格的意义来说正确答案应该只有D。

  • 第12题:

    多选题
    Which two statements are true about traffic shaping?()
    A

    Out-of-profile packets are queued.

    B

    It causes TCP retransmits.

    C

    Marking/remarking is not supported.

    D

    It does not respond to BECN and ForeSight Messages.

    E

    It uses a single/two-bucket mechanism for metering.


    正确答案: E,B
    解析: 暂无解析

  • 第13题:

    Given: 6. 7.<%="processing" %> 8. and a custom tag handler for foo which extends TagSupport. Which two are true about thetag handler referenced by foo?()

    • A、The doStartTag method is called once.
    • B、The doAfterBody method is NOT called.
    • C、The EVAL_PAGE constant is a valid return value for the doEndTag method.
    • D、The SKIP_PAGE constant is a valid return value for the doStartTag method.
    • E、The EVAL_BODY_BUFFERED constant is a valid return value for the doStartTag method.

    正确答案:A,C

  • 第14题:

    Which two statements about the Cisco Nexus 1000V VSM are true?()

    • A、It performs switching decisions and forwarding for the VEM
    • B、It can be run on a virtual machine
    • C、It can be used for remote VEM switching Iine cards

    正确答案:B,C

  • 第15题:

    Which two statements are true regarding the return values of property written hashCode and equals methods from two instances of the same class?()

    • A、 If the hashCode values are different, the objects might be equal.
    • B、 If the hashCode values are the same, the object must be equal.
    • C、 If the hashCode values are the same, the objects might be equal.
    • D、 If the hashCode values are different, the objects must be unequal.

    正确答案:C,D

  • 第16题:

    Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()

    • A、It can be invoked only from the doGet or doPost methods.
    • B、It can be used independently of the getRemoteUser method.
    • C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.
    • D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

    正确答案:B,C

  • 第17题:

    Which two statements are true about precedence values in policy?() (Choose two.)

    • A、1 is the default precedence.
    • B、A lower number is preferred.
    • C、A higher number is preferred.
    • D、100 is the default precedence.

    正确答案:B,D

  • 第18题:

    多选题
    Which two statements are true about L2TP tunnels?() (Choose two.)
    A

    Traffic is clear text

    B

    Traffic is encrypted 

    C

    They are initiated by the LNS

    D

    They are initiated by the LAC


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    By default, which two statements are true about export routing polices?()
    A

    Export polices can evaluate only active routes

    B

    Export polices can evaluate all routes

    C

    Export polices can be applied to the forwarding table

    D

    Export polices can be applied to interfaces


    正确答案: B,A
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about AH?() (Choose two.)
    A

    AH provides data integrity.

    B

    AH is identified by IP protocol 50.

    C

    AH is identified by IP protocol 51.

    D

    AH cannot work in conjunction with ESP


    正确答案: D,C
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements about creating constraints are true?()
    A

    Constraint names must start with SYS_C

    B

    All constraints must be defines at the column level

    C

    Constraints can be created after the table is created

    D

    Constraints can be created at the same time the table is created

    E

    Information about constraints is found in the VIEW_CONSTRAINTS dictionary view


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Which of the following statements about variables and their scopes are true? ()
    A

    Instance variables are member variables of a class.

    B

    Instance variables are declared with the static keyword.

    C

    Local variables defined inside a method are created when the method is executed.

    D

    Local variables must be initialized before they are used.


    正确答案: B,D
    解析: 类中有几种变量,分别是:局部变量(英文可以为:local/automatic/temporary/stack variable)是定义在方法里的变量;实例变量(英文为:instance variable)是在方法外而在类声明内定义的变量,有时也叫成员变量;类变量(英文为:class variable)是用关键字static声明的实例变量,他们的生存期分别是:局部变量在定义该变量的方法被调用时被创建,而在该方法退出后被撤销;实例变量在使用new Xxxx()创建该类的实例时被创建,而其生存期和该类的实例对象的生存期相同;类变量在该类被加载时被创建,不一定要用new Xxxx()创建,所有该类的实例对象共享该类变量,其生存期是类的生存期。任何变量在使用前都必须初始化,但是需要指出的是局部变量必须显式初始化,而实例变量不必,原始类型的实例变量在该类的构造方法被调用时为它分配的缺省的值,整型是0,布尔型是false,而浮点型是0.0f,引用类型(类类型)的实例变量的缺省值是null(没有进行实际的初始化,对它的使用将引起NullPointException),类变量的规则和实例变量一样,不同的是类变量的初始化是在类被加载时。

  • 第23题:

    多选题
    Which two statements are true about the hashCode method?()
    A

    The hashCode method for a given class can be used to test for object equality and object inequality for that class.

    B

    The hashCode method is used by the java.util.SortedSet collection class to order theelements within that set.

    C

    The hashCode method for a given class can be used to test for object inequality, but NOT object equality, for that class.

    D

    The only important characteristic of the values returned by a hashCode method is that the distribution of values must follow a Gaussian distribution.

    E

    The hashCode method is used by the java.util.HashSet collection class to group the elements within that set into hash buckets for swift retrieval.


    正确答案: E,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
    A

    It can be invoked only from the doGet or doPost methods.

    B

    It can be used independently of the getRemoteUser method.

    C

    Can return true even when its argument is NOT defined as a valid role name in the deployment descriptor.

    D

    Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.


    正确答案: B,C
    解析: 暂无解析