网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which methods from the String and StringBuffer classes modify the object on which they are called?()  

  • A、The charAt() method of the String class.
  • B、The toUpperCase() method of the String class.
  • C、The replace() method of the String class.
  • D、The reverse() method of the StringBuffer class.
  • E、The length() method of the StringBuffer class.

参考答案

更多 “Which methods from the String and StringBuffer classes modify the object on which they are called?()  A、The charAt() method of the String class.B、The toUpperCase() method of the String class.C、The replace() method of the String class.D、The reverse() method of the StringBuffer class.E、The length() method of the StringBuffer class.” 相关考题
考题 Which of the following scheduling methods uses more of the risk management concepts:A ADMB PDMC CPMD PERTE Gantt

考题 Which one of the following is not an acquisition method?A advertisingB invitationC negotiationD purchaseE all are acquisition methods

考题 There are four methods of government procurement. Which is not one of these methods?A AssistanceB Sealed biddingC Competitive proposalsD AcquisitionE Small purchases

考题 161 There are four methods of government procurement. Which is not one of these methods? A. AssistanceB. Sealed biddingC. Competitive proposalsD. AcquisitionE. Small purchases

考题 Which is the branch of linguistics which studies the characteristics of speech sounds and provides methods for their description, classification and transcription?A.Phonetics B.Phonology C.Semantics D.Pragmatics

考题 Which two wireless encryption methods are based on the RC4 encryption algorithm? ()A、WEPB、CCKMC、AESD、TKIPE、CCMP

考题 Which of the following methods of user authentication is the MOST secure?()A、CHAPB、KerberosC、TACACSD、EAP

考题 Which of the following methods can move files in clear text and can be easily intercepted?()A、RSHB、SNMPC、FTPD、TELNET

考题 Which of the following archiving methods only backs up data that has changed since the previous full backup?()A、SnapshotB、IncrementalC、CopyD、Differential

考题 Which of the following routing protocols uses AS-Path as one of the methods to build the routing table?()A、OSPFB、IS-ISC、EIGRPD、BGP