单项选择题
You work as the application developer at Hi-Tech.com. You create a new custom dictionary named MyDictionary. Choose the code segment which will ensure that MyDictionary is type safe?()
A. Class MyDictionary Implements Dictionary (Of String,String)
B. Class MyDictionary Inherits HashTable
C. Class MyDictionary Implements IDictionary
D. Class MyDictionary End Class Dim t as New Dictionary (Of String, String) Dim dict As MyDIctionary= CType (t,MyDictionary)
相关考题
-
单项选择题
YouworkasanapplicationdeveloperatCER-Tech.com.Cert-Tech.comusesVisualstudio.NET2005asitsApplicationDevelopmentplatform.Youaredevelopinga.NETFramework2.0applicationusedtostoreatype-safelistofnamesande-mailaddresses.Thelistwillbepopulatedallatonesfromthesorteddatawhichmeansyouwillnotalwaysneedtoperforminsertionordeletionoperationsonthedata.Youarerequiredtochooseadatastructurethatoptimizesmemoryuseandhasgoodperformance.Whatshouldyoudo?()
A. The System.Collections.Generic.SortedList class should be used
B. The System.Collections.HashTable class should be used
C. The System.Collections.Generic.SortedDictionary class should be used
D. The System.Collections.SortedList class should be used -
单项选择题
您正在开发.NET Framework2.0应用程序用于存储类型安全列表中的姓名和电子邮件地址。列表中将填充所有在那些从排序的数据,这意味着您不总是需要执行插入或删除对数据的操作。您需要选择一种数据结构,优化内存使用,并且具有良好的性能。你应该做什么?()
A.应使用 System.Collections.Generic.SortedList 类
B.应使用 System.Collections.HashTable 类
C.应使用 System.Collections.Generic.SortedDictionary 类
D.应使用 System.Collections.SortedList 类 -
多项选择题
YoucreateMicrosoftWindows-basedapplications.Youcreateanapplicationthatrequiresuserstobeauthenticatedbyadomaincontroller.Theapplicationcontainsaseriesofprocessorintensivemethodcallsthatrequiredifferentdatabaseconnections.Abugisreportedduringtesting.Thebugdescriptionstatesthattheapplicationhangsduringoneoftheprocessor-intensivecallsmorethan50percentofthetimeswhenthemethodisexecuted.Yourunittestforthesamemethodwassuccessful.Youneedtoreproducethebug.Whichtwofactorsshouldyouascertainfromthetester?()
A. Security credentials of the logged on user
B. Code access security settings
C. Hardware settings
D. Network settings
E. Database settings
