网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

7、允许不同类的对象使用同一个方法的不同变体的能力,这种OOP的特性称为多态。 The ability to allow objects of different classes to use different variants of the same method is called polymorphism.


参考答案和解析
静态数据成员
更多 “7、允许不同类的对象使用同一个方法的不同变体的能力,这种OOP的特性称为多态。 The ability to allow objects of different classes to use different variants of the same method is called polymorphism.” 相关考题
考题 在面向对象技术中,同一个算子在不同的表达式中可能有不同的操作意义,这种多态性称为(40)。A.参数多态B.过载多态C.包含多态D.隐含多态

考题 ( )iS a property of object—oriented software by which an abstract operation ma)’be performed in different ways in different classes. A.Method B.Polymorphism C.Inheritance D.Encapsulation

考题 在面向对象技术中,一个子类的对象同时又属于父类,它继承了父类的一切属性,这种多态性称为(34)。同一个算子在不同的表达式中可能有不同的操作意义,这种多态性称为(35)。编译程序根据上下文判定算子的操作意义,这称为(36)。A.参数多态B.过载多态C.包含多态D.隐含多态

考题 The phenomenon that words having different meanings have the same form is called____.A.hyponymy B.synonymy C.polysemy D.homonymy

考题 ( ) is a property of object-oriented software by which an abstract operation may be performed in different ways in different classes. A.MethoD. B.Polymorphism C.Inheritance D.Encapsulation

考题 In the Expression Editor panel of CRS Script Editor, why would you use the Java tab? ()A、to execute a specified method of a Java class  B、to reference a variable or invoke a method of a custom Java Object  C、to pass variables between two different workflows  D、to create an object for the purpose of executing methods on a remote computer  E、to get a reference to the Contact and Session states  F、to allow for arguments to be passed to a specified method

考题 对象的多态性是指()A、两个或多个属于不同类的对象,对于同一个消息(方法调用)作出不同的响应的方式B、两个或多个属于不同类的对象,对于同一个消息(方法调用)作出相同的响应的方式C、两个或多个属于同一类的对象,对于同一个消息(方法调用)作用于不同类型的数据,作出不同响应的方式D、两个或多个属于同一类的对象,对于不同消息(方法调用)作用于相同类型的数据,作出不同响应的方式

考题 Which three statements concerning the use of the java.io.Serializable interface are true?()A、Objects from classes that use aggregation cannot be serializedB、An object serialized on one JVM can be successfully deserialized on a different JVMC、The values in fields with the volatile modifier will NOT survive serialization and deserializationD、The values in fields with the transient modifier will NOT survive serialization and deserializationE、It is legal to serialize an object of a type that has a supertype that does NOT implement java.io.Serializable

考题 我们需要不同种类的油漆用于不同的区域。()A、We need same kinds of paint for different areas.B、We need different kinds of paint for different areas.C、We need different kinds of paint for each areas.D、We need same kinds of paint for every areas.

考题 What is the same meaning of location value? ()A、Different valueB、Different value of same goods at the different placeC、Different goodsD、Different value of different goods at the same place

考题 Which description about asymmetric encryption algorithms is correct?()A、They use the same key for encryption and decryption of data.B、They use different keys for decryption but the same key for encryption of data.C、They use different keys for encryption and decryption of data.D、They use the same key for decryption but different keys for encryption of data.

考题 For what two purposes does the Ethernet protocol use physical addresses?()A、to uniquely identify devices at Layer 2B、to allow communication with devices on a different networkC、to differentiate a Layer 2 frame from a Layer 3 packetD、to establish a priority system to determine which device gets to transmit firstE、to allow communication between different devices on the same networkF、to allow detection of a remote device when its physical address is unknown

考题 Which two statements are true regarding the return values of property written hashCode and equals methods from two instances of the same class?()A、 If the hashCode values are different, the objects might be equal.B、 If the hashCode values are the same, the object must be equal.C、 If the hashCode values are the same, the objects might be equal.D、 If the hashCode values are different, the objects must be unequal.

考题 Which scenario describes an appropriate use for opening a form in a new session?()A、The data entered into the called form is logically independent of the data entered in the calling form. B、The called form requires different privileges than the calling form. C、The called form must execute as a different user than the calling form. D、The calling form must be able to query data in the called form before it is saved.

考题 You use Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 to manage virtual machines (VMs). You need to deploy a cloned VM and automatically assign it a different name.  Where should you deploy the cloned VM?()A、to the same host as the source VMB、to a different host from the source VMC、to the same library as the source VMD、to a different library from the source VM

考题 单选题When general cargo with different amounts in each draft is involved,the checker must use the ().A unit methodB block methodC straight methodD package method

考题 多选题In the Expression Editor panel of CRS Script Editor, why would you use the Java tab? ()Ato execute a specified method of a Java classBto reference a variable or invoke a method of a custom Java ObjectCto pass variables between two different workflowsDto create an object for the purpose of executing methods on a remote computerEto get a reference to the Contact and Session statesFto allow for arguments to be passed to a specified method

考题 单选题Same goods can be valued different at different times. Goods often stop during the transfer process, which is professionally called the ().A InventoryB StoreC StockD Storage of logistics

考题 多选题Which two statements are true regarding the return values of property written hashCode and equals methods from two instances of the same class?()AIf the hashCode values are different, the objects might be equal.BIf the hashCode values are the same, the object must be equal.CIf the hashCode values are the same, the objects might be equal.DIf the hashCode values are different, the objects must be unequal.

考题 多选题For what two purposes does the Ethernet protocol use physical addresses?()Ato uniquely identify devices at Layer 2Bto allow communication with devices on a different networkCto differentiate a Layer 2 frame from a Layer 3 packetDto establish a priority system to determine which device gets to transmit firstEto allow communication between different devices on the same networkFto allow detection of a remote device when its physical address is unknown

考题 单选题The receiving stations can use the B2 character to()different, classes of messages.A identifyB CorrectC RejectD Print out

考题 单选题()is a category assigned to products or services having the same functional use but different technical characteristics. It is not same as quality.A ProblemB GradeC RiskD Defect

考题 单选题You want to use te Coherence Java APIs to directly cached POJOs. Consider this snippet of code: NamedCache cache - CacheFactory.getCache("mycache");  cache.put(new Integer(I)f "hello"); cache.put(T,"hi");  cache.put(new Long(II),"hey");  This code inserts three objects into the cache.  Why ?()A  hashCode() and equals() method for each object type is different so a different key is usedB  each object value string is different so a different value is inserted on each putC  equals() and compare() method is different for each putD  POF need to be implemented for this to work properly

考题 多选题Given that b and c refer to instances of wrapper classes, which two statements are true?()Ab.equals(b) returns true.Bb.equals(c) returns the same result as b == c.Cb.eqials(c) can return false even if c.equals(b) returns true.Db.equals(c) throws an exception if b and c are different wrapper types.Eb.equals(c) returns false if the type of wrapper objects being compared are different.

考题 单选题The phenomenon that words having different meanings have the same form is called _____.A hyponymyB synonymyC polysemyD homonymy

考题 单选题Which description about asymmetric encryption algorithms is correct?()A They use the same key for encryption and decryption of data.B They use different keys for decryption but the same key for encryption of data.C They use different keys for encryption and decryption of data.D They use the same key for decryption but different keys for encryption of data.

考题 单选题Given classes defined in two different files:What is required at line 5 in class SomeApp to use the process method of BitUtils?()A process(bytes);B BitUtils.process(bytes);C util.BitUtils.process(bytes);D SomeApp cannot use methods in BitUtils.E import util.BitUtils.*; process(bytes);

考题 单选题Given classes defined in two different files: What is required at line 5 in class SomeApp to use the process method of BitUtils?()A process(bytes);B BitUtils.process(bytes);C app.BitUtils.process(bytes);D util.BitUtils.process(bytes);E import util.BitUtils.*; process(bytes);F SomeApp cannot use the process method in BitUtils.