{"id":73,"date":"2008-02-19T23:36:19","date_gmt":"2008-02-19T23:36:19","guid":{"rendered":""},"modified":"2008-02-19T23:36:19","modified_gmt":"2008-02-19T23:36:19","slug":"73","status":"publish","type":"post","link":"https:\/\/www.poloo.org\/?p=73","title":{"rendered":"\u96c5\u864e\u516c\u53f8C#\u7b14\u8bd5\u9898"},"content":{"rendered":"<p>\u96c5\u864e\u516c\u53f8C#\u7b14\u8bd5\u9898\uff0c\u5305\u62ec\u95ee\u7b54\u9898\u548c\u9009\u62e9\u9898\u4e24\u90e8\u5206\u3002\u8bd5\u8bd5\u770b\uff0c\u4f60\u80fd\u56de\u7b54\u51fa\u591a\u5c11\u9898\uff0c\u53ef\u4ee5\u901a\u8fc7\u96c5\u864e\u7684\u8003\u8bd5\u5417\uff1f<\/p>\n<p>Question 1. (\u5355\u9009)<\/p>\n<p>\u5728\u8ba1\u7b97\u673a\u7f51\u7edc\u4e2d,\u8868\u5f81\u6570\u636e\u4f20\u8f93\u53ef\u9760\u6027\u7684\u6307\u6807\u662f<\/p>\n<p>1. \u4f20\u8f93\u7387<\/p>\n<p>2. \u8bef\u7801\u7387<\/p>\n<p>3. \u4fe1\u606f\u5bb9\u91cf<\/p>\n<p>4. \u9891\u5e26\u5229\u7528\u7387<\/p>\n<p>Question 2. (\u5355\u9009)<\/p>\n<p>\u4ee5\u4e0b\u5173\u4e8e\u94fe\u5f0f\u5b58\u50a8\u7ed3\u6784\u7684\u53d9\u8ff0\u4e2d\u54ea\u4e00\u6761\u662f\u4e0d\u6b63\u786e\u7684?<\/p>\n<p>1. \u7ed3\u70b9\u9664\u81ea\u8eab\u4fe1\u606f\u5916\u8fd8\u5305\u62ec\u6307\u9488\u57df,\u56e0\u6b64\u5b58\u50a8\u5bc6\u5ea6\u5c0f\u4e8e\u987a\u5e8f\u5b58\u50a8\u7ed3\u6784<\/p>\n<p>2. \u903b\u8f91\u4e0a\u76f8\u90bb\u7684\u7ed3\u70b9\u7269\u7406\u4e0a\u4e0d\u5fc5\u90bb\u63a5<\/p>\n<p>3. \u53ef\u4ee5\u901a\u8fc7\u8ba1\u7b97\u76f4\u63a5\u786e\u5b9a\u7b2ci\u4e2a\u7ed3\u70b9\u7684\u5b58\u50a8\u5730\u5740<\/p>\n<p>4. \u63d2\u5165\u3001\u5220\u9664\u8fd0\u7b97\u64cd\u4f5c\u65b9\u4fbf,\u4e0d\u5fc5\u79fb\u52a8\u7ed3\u70b9<\/p>\n<p>Question 3. (\u5355\u9009)<\/p>\n<p>\u4ee5\u4e0b\u54ea\u4e00\u4e2a\u4e0d\u662f\u6808\u7684\u57fa\u672c\u8fd0\u7b97<\/p>\n<p>1. \u5220\u9664\u6808\u9876\u5143\u7d20<\/p>\n<p>2. \u5220\u9664\u6808\u5e95\u5143\u7d20<\/p>\n<p>3. \u5224\u65ad\u6808\u662f\u5426\u4e3a\u7a7a<\/p>\n<p>4. \u5c06\u6808\u7f6e\u4e3a\u7a7a\u6808<\/p>\n<p>Question 4. (\u5355\u9009)<\/p>\n<p>\u4ee5\u4e0b\u5173\u4e8e\u5e7f\u4e49\u8868\u7684\u53d9\u8ff0\u4e2d,\u6b63\u786e\u7684\u662f<\/p>\n<p>1. \u5e7f\u4e49\u8868\u662f0\u4e2a\u6216\u591a\u4e2a\u5355\u5143\u7d20\u6216\u5b50\u8868\u7ec4\u6210\u7684\u6709\u9650\u5e8f\u5217<\/p>\n<p>2. \u5e7f\u4e49\u8868\u81f3\u5c11\u6709\u4e00\u4e2a\u5143\u7d20\u662f\u5b50\u8868<\/p>\n<p>3. \u5e7f\u4e49\u8868\u4e0d\u53ef\u4ee5\u662f\u81ea\u8eab\u7684\u5b50\u8868<\/p>\n<p>4. \u5e7f\u4e49\u8868\u4e0d\u80fd\u4e3a\u7a7a\u8868<\/p>\n<p>Question 5. (\u5355\u9009)<\/p>\n<p>\u5982\u679c\u4e00\u68f5\u4e8c\u53c9\u6811\u7ed3\u70b9\u7684\u524d\u5e8f\u5e8f\u5217\u662fA\u3001B\u3001C,\u540e\u5e8f\u5e8f\u5217\u662fC\u3001B\u3001A,\u5219\u8be5\u4e8c\u53c9\u6811\u7ed3\u70b9\u7684\u5bf9\u79f0\u5e8f\u5e8f\u5217<\/p>\n<p>1. \u5fc5\u4e3aA\u3001B\u3001C<\/p>\n<p>2. \u5fc5\u4e3aA\u3001C\u3001B<\/p>\n<p>3. \u5fc5\u4e3aB\u3001C\u3001A<\/p>\n<p>4. \u4e0d\u80fd\u786e\u5b9a<\/p>\n<p>Question 6. (\u5355\u9009)<\/p>\n<p>\u5728\u865a\u62df\u9875\u5f0f\u5b58\u50a8\u7ba1\u7406\u65b9\u6848\u4e2d,\u4e0b\u9762\u54ea\u4e00\u90e8\u5206\u5b8c\u6210\u5c06\u9875\u9762\u8c03\u5165\u5185\u5b58\u7684\u5de5\u4f5c?<\/p>\n<p>1. \u7f3a\u9875\u4e2d\u65ad\u5904\u7406<\/p>\n<p>2. \u9875\u9762\u6dd8\u6c70\u8fc7\u7a0b<\/p>\n<p>3. \u5de5\u4f5c\u96c6\u6a21\u578b\u5e94\u7528<\/p>\n<p>4. \u7d27\u7f29\u6280\u672f\u5229\u7528<\/p>\n<p>Question 7. (\u5355\u9009)<\/p>\n<p>\u5728DOS\u7cfb\u7edf\u4e2d,\u7528\u4e8e\u8bb0\u5f55\u548c\u7ba1\u7406\u78c1\u76d8\u6570\u636e\u533a\u4f7f\u7528\u60c5\u51b5\u7684\u6570\u636e\u7ed3\u6784<\/p>\n<p>1. \u4f4d\u56fe\u8868<\/p>\n<p>2. \u7a7a\u95f2\u5757\u8868<\/p>\n<p>3. \u6587\u4ef6\u5206\u914d\u8868<\/p>\n<p>4. \u6587\u4ef6\u63a7\u5236\u5757<\/p>\n<p>Question 8. (\u5355\u9009)<\/p>\n<p>\u8bbe\u6709\u5173\u7cfbR(S,D,M),\u5176\u51fd\u6570\u4f9d\u8d56\u96c6F={S\u2192D,D\u2192M}\u3002\u5219\u5173\u7cfbR\u81f3\u591a\u6ee1\u8db3<\/p>\n<p>1. 1NF<\/p>\n<p>2. 2NF<\/p>\n<p>3. 3NF<\/p>\n<p>4. BCNF<\/p>\n<p>Question 9. (\u5355\u9009)<\/p>\n<p>\u5728\u6570\u636e\u5e93\u903b\u8f91\u8bbe\u8ba1\u4e2d,\u5f53\u5c06E-R\u56fe\u8f6c\u6362\u4e3a\u5173\u7cfb\u6a21\u5f0f\u65f6,\u4e0b\u9762\u7684\u505a\u6cd5\u54ea\u4e00\u4e2a\u662f\u4e0d\u6b63\u786e\u7684?<\/p>\n<p>1. \u4e00\u4e2a\u5b9e\u4f53\u7c7b\u578b\u8f6c\u6362\u4e3a\u4e00\u4e2a\u5173\u7cfb\u6a21\u5f0f<\/p>\n<p>2. \u4e00\u4e2a\u8054\u7cfb\u7c7b\u578b\u8f6c\u6362\u4e3a\u4e00\u4e2a\u5173\u7cfb\u6a21\u5f0f<\/p>\n<p>3. \u7531\u5b9e\u4f53\u7c7b\u578b\u8f6c\u6362\u6210\u7684\u5173\u7cfb\u6a21\u5f0f\u7684\u4e3b\u952e\u662f\u8be5\u5b9e\u4f53\u7c7b\u578b\u7684\u4e3b\u952e<\/p>\n<p>4. \u7531\u8054\u7cfb\u7c7b\u578b\u8f6c\u6362\u6210\u7684\u5173\u7cfb\u6a21\u5f0f\u7684\u5c5e\u6027\u662f\u4e0e\u8be5\u8054\u7cfb\u7c7b\u578b\u76f8\u5173\u7684\u8bf8\u5b9e\u4f53\u7c7b\u578b\u7684\u5c5e\u6027\u7684\u5168\u4f53<\/p>\n<p>Question 10. (\u5355\u9009)<\/p>\n<p>\u8ba1\u7b97\u673a\u7f51\u7edc\u6309\u7167\u6240\u8986\u76d6\u7684\u5730\u7406\u8303\u56f4\u5206\u7c7b,\u53ef\u4ee5\u5206\u5e7f\u57df\u7f51\u3001\u5c40\u57df\u7f51\u4e0e<\/p>\n<p>1. TCP\/IP\u7f51<\/p>\n<p>2. ATM\u7f51<\/p>\n<p>3. ISDN<\/p>\n<p>4. \u57ce\u57df\u7f51 <\/p>\n<p>Question 11. (\u5355\u9009) <\/p>\n<p>\u8ba1\u7b97\u673a\u7f51\u7edc\u62d3\u6251\u7ed3\u6784\u4e3b\u8981\u53d6\u51b3\u4e8e\u5b83\u7684<\/p>\n<p>1. \u8d44\u6e90\u5b50\u7f51<\/p>\n<p>2. FDDI\u7f51<\/p>\n<p>3. \u901a\u4fe1\u5b50\u7f51<\/p>\n<p>4. \u8def\u7531\u5668<\/p>\n<p>Question 12. (\u5355\u9009)<\/p>\n<p>\u7f51\u7edc\u534f\u8bae\u7684\u4e09\u4e2a\u8981\u7d20\u662f\u8bed\u6cd5\u3001\u8bed\u4e49\u4e0e<\/p>\n<p>1. \u5de5\u4f5c\u539f\u7406<\/p>\n<p>2. \u65f6\u5e8f<\/p>\n<p>3. \u8fdb\u7a0b<\/p>\n<p>4. \u670d\u52a1\u539f\u8bed<\/p>\n<p>Question 13. (\u5355\u9009)<\/p>\n<p>TCP\/IP\u53c2\u8003\u6a21\u578b\u4e2d,\u7535\u5b50\u90ae\u4ef6\u534f\u8baeSMTP\u4f9d\u8d56\u4e8e\u4f20\u8f93\u5c42\u7684<\/p>\n<p>1. UDP\u534f\u8bae<\/p>\n<p>2. IP\u534f\u8bae<\/p>\n<p>3. TCP\u534f\u8bae<\/p>\n<p>4. 802.2\u534f\u8bae<\/p>\n<p>Question 14. (\u5355\u9009)<\/p>\n<p>IEEE802.2\u534f\u8bae\u4e2d10BASE-T\u6807\u51c6\u89c4\u5b9a\u5728\u4f7f\u75285\u7c7b\u53cc\u7ede\u7ebf\u65f6,\u4ece\u7f51\u5361\u5230\u96c6\u7ebf\u5668\u7684\u6700\u5927\u8ddd\u79bb\u4e3a<\/p>\n<p>1. 100m<\/p>\n<p>2. 185m<\/p>\n<p>3. 300m<\/p>\n<p>4. 500m<\/p>\n<p>Question 15. (\u5355\u9009)<\/p>\n<p>100Mbps Fast Ethernet\u4e0e10Mbps Ethernet \u5de5\u4f5c\u539f\u7406\u7684\u76f8\u540c\u4e4b\u5904\u4e3b\u8981\u5728<\/p>\n<p>1. \u4ecb\u8d28\u8bbf\u95ee\u63a7\u5236\u65b9\u6cd5<\/p>\n<p>2. \u7269\u7406\u5c42\u534f\u8bae<\/p>\n<p>3. \u7f51\u7edc\u5c42<\/p>\n<p>4. \u53d1\u9001\u65f6\u949f\u5468\u671f<\/p>\n<p>Question 16. (\u5355\u9009)<\/p>\n<p>\u5728Client\/Server\u8ba1\u7b97\u6a21\u5f0f\u4e2d,\u4e2d\u95f4\u4ef6middleware\u7684\u4f5c\u7528\u662f\u9694\u79bb\u5e94\u7528\u4e0e<\/p>\n<p>1. \u7ed3\u6784\u5316\u67e5\u8be2\u8bed\u8a00SQL<\/p>\n<p>2. \u5e94\u7528\u8fdb\u7a0b<\/p>\n<p>3. \u7f51\u7edc<\/p>\n<p>4. IP\u5730\u5740<\/p>\n<p>Question 17. (\u5355\u9009)<\/p>\n<p>\u5f53\u7528\u6237\u5411ISP\u7533\u8bf7Internet\u5e10\u6237\u65f6,\u7528\u6237\u7684E-mail\u5e10\u6237\u5e94\u5305\u62ec<\/p>\n<p>1. IP\u5730\u5740<\/p>\n<p>2. WWW\u5730\u5740<\/p>\n<p>3. \u7528\u6237\u5bc6\u7801(Password)<\/p>\n<p>4. \u7528\u6237\u540d(User Name)\u4e0e\u7528\u6237\u5bc6\u7801(Password)<\/p>\n<p>Question 18. (\u5355\u9009)<\/p>\n<p>WWW\u7684\u8d85\u94fe\u63a5\u4e2d\u5b9a\u4f4d\u4fe1\u606f\u6240\u5728\u7684\u4f4d\u7f6e\u4f7f\u7528\u7684\u662f<\/p>\n<p>1. \u8d85\u6587\u672c(hypertext)\u6280\u672f<\/p>\n<p>2. \u7edf\u4e00\u8d44\u6e90\u5b9a\u4f4d\u5668(URL, Uniform Resource Locators)<\/p>\n<p>3. \u8d85\u5a92\u4f53(hypermedia\u6280\u672f)<\/p>\n<p>4. \u8d85\u6587\u672c\u6807\u6ce8\u8bed\u8a00HTML<\/p>\n<p>Question 19. (\u5355\u9009)<\/p>\n<p>\u8ba1\u7b97\u673a\u7f51\u7edc\u7cfb\u7edf\u4e0e\u5206\u5e03\u5f0f\u7cfb\u7edf\u4e4b\u95f4\u7684\u533a\u522b\u4e3b\u8981\u662f<\/p>\n<p>1. \u7cfb\u7edf\u7269\u7406\u7ed3\u6784<\/p>\n<p>2. \u7cfb\u7edf\u9ad8\u5c42\u8f6f\u4ef6<\/p>\n<p>3. \u4f20\u8f93\u4ecb\u8d28\u7c7b\u578b<\/p>\n<p>4. \u670d\u52a1\u5668\u7c7b\u578b<\/p>\n<p>Question 20. (\u5355\u9009)<\/p>\n<p>\u5e27\u4e2d\u7ee7\u7cfb\u7edf\u8bbe\u8ba1\u7684\u4e3b\u8981\u76ee\u6807\u662f\u7528\u4e8e\u4e92\u8fde\u591a\u4e2a<\/p>\n<p>1. \u5e7f\u57df\u7f51<\/p>\n<p>2. \u7535\u8bdd\u7f51<\/p>\n<p>3. \u5c40\u57df\u7f51<\/p>\n<p>4. 0)ATIM\u7f51 <\/p>\n<p>Question 21. (\u5355\u9009)<\/p>\n<p>ATM\u7f51\u7edc\u91c7\u7528\u56fa\u5b9a\u957f\u53a6\u7684\u4fe1\u5143\u4f20\u9001\u6570\u636e\uff0c\u4fe1\u5143\u957f\u5ea6\u4e3a<\/p>\n<p>1. 1024B<\/p>\n<p>2. 53B<\/p>\n<p>3. 128B<\/p>\n<p>4. 64B<\/p>\n<p>Question 22. (\u5355\u9009)<\/p>\n<p>TCP\/IP\u53c2\u8003\u6a21\u578b\u4e2d\u7684\u4e3b\u673a-\u7f51\u7edc\u5c42\u5bf9\u5e94\u4e8eOSI RM\u4e2d\u7684<\/p>\n<p>1. \u7f51\u7edc\u5c42<\/p>\n<p>2. \u7269\u7406\u5c42<\/p>\n<p>3. \u6570\u636e\u94fe\u8def\u5c42<\/p>\n<p>4. \u7269\u7406\u5c42\u4e0e\u6570\u636e\u94fe\u8def\u5c42<\/p>\n<p>Question 23. (\u5355\u9009)<\/p>\n<p>\u8ba1\u7b97\u673a\u7f51\u7edc\u6700\u7a81\u51fa\u7684\u4f18\u70b9\u662f\uff1a<\/p>\n<p>1. \u8ba1\u7b97\u7cbe\u5ea6\u9ad8<\/p>\n<p>2. \u5185\u5b58\u5bb9\u91cf\u5927<\/p>\n<p>3. \u8fd0\u7b97\u901f\u5ea6\u5feb<\/p>\n<p>4. \u8fde\u7f51\u7684\u8ba1\u7b97\u673a\u80fd\u591f\u76f8\u4e92\u5171\u4eab\u8d44\u6e90<\/p>\n<p>Question 24. (\u5355\u9009)<\/p>\n<p>\u8ba1\u7b97\u673a\u7f51\u7edc\u5206\u4e3a\u5c40\u57df\u7f51\u3001\u57ce\u57df\u7f51\u4e0e\u5e7f\u57df\u7f51\uff0c\u5176\u5212\u5206\u7684\u4f9d\u636e\u662f\uff1a<\/p>\n<p>1. \u6570\u636e\u4f20\u8f93\u6240\u4f7f\u7528\u7684\u4ecb\u8d28<\/p>\n<p>2. \u7f51\u7edc\u7684\u4f5c\u7528\u8303\u56f4<\/p>\n<p>3. \u7f51\u7edc\u7684\u63a7\u5236\u65b9\u5f0f<\/p>\n<p>4. \u7f51\u7edc\u7684\u62d3\u6251\u7ed3\u6784<\/p>\n<p>Question 25. (\u5355\u9009)<\/p>\n<p>\u7528\u4e8c\u5206\u6cd5\u67e5\u627e\u4e00\u4e2a\u957f\u5ea6\u4e3a10\u7684\u3001\u6392\u597d\u5e8f\u7684\u7ebf\u6027\u8868\uff0c\u67e5\u627e\u4e0d\u6210\u529f\u65f6\uff0c\u6700\u591a\u9700\u8981\u6bd4\u8f83\u591a\u5c11\u6b21\uff1f<\/p>\n<p>1. 5<\/p>\n<p>2. 2<\/p>\n<p>3. 4<\/p>\n<p>4. 1<\/p>\n<p>Question 26. (\u5355\u9009)<\/p>\n<p>\u6a21\u5757\u5185\u805a\u5ea6\u8d8a\u9ad8\uff0c\u8bf4\u660e\u6a21\u5757\u5185\u5404\u6210\u5206\u5f7c\u6b64\u7ed3\u5408\u7684\u7a0b\u5ea6\u8d8a<\/p>\n<p>1. \u677e\u6563<\/p>\n<p>2. \u7d27\u5bc6<\/p>\n<p>3. \u65e0\u6cd5\u5224\u65ad<\/p>\n<p>4. \u76f8\u540c<\/p>\n<p>Question 27. (\u5355\u9009)<\/p>\n<p>\u8f6f\u4ef6\u9700\u6c42\u5206\u6790\u9636\u6bb5\u7684\u8f93\u51fa\u4e3b\u8981\u662f<\/p>\n<p>1. \u9700\u6c42\u8bf4\u660e\u4e66<\/p>\n<p>2. \u5f00\u53d1\u8ba1\u5212<\/p>\n<p>3. \u53ef\u884c\u6027\u62a5\u544a<\/p>\n<p>4. \u8bbe\u8ba1\u8bf4\u660e\u4e66<\/p>\n<p>Question 28. (\u5355\u9009)<\/p>\n<p>\u4ee5\u4e0b\u9009\u9879\u4e2d\u4e0d\u662f\u9879\u76ee\u7ecf\u7406\u7684\u804c\u8d23\u7684\u662f\uff1f<\/p>\n<p>1. \u9700\u6c42\u5206\u6790<\/p>\n<p>2. \u8ba1\u5212<\/p>\n<p>3. \u8ba1\u5212\u8ddf\u8e2a<\/p>\n<p>4. \u8d28\u91cf\u7ba1\u7406<\/p>\n<p>Question 29. (\u5355\u9009)<\/p>\n<p>\u5355\u5143\u6d4b\u8bd5\u4e00\u822c\u5728\u4ec0\u4e48\u65f6\u5019\u8fdb\u884c\uff1f<\/p>\n<p>1. \u7f16\u7801\u5b8c\u6210\u540e<\/p>\n<p>2. \u7cfb\u7edf\u6d4b\u8bd5\u524d<\/p>\n<p>3. \u6d4b\u8bd5\u7528\u4f8b\u7f16\u5199\u5b8c\u6210\u540e<\/p>\n<p>4. \u96c6\u6210\u6d4b\u8bd5\u540e<\/p>\n<p>Question 30. (\u591a\u9009)<\/p>\n<p>\u914d\u7f6e\u7ba1\u7406\u80fd\u8d77\u5230\u4ee5\u4e0b\u54ea\u4e9b\u4f5c\u7528\uff1f<\/p>\n<p>1. \u7248\u672c\u7ba1\u7406<\/p>\n<p>2. \u53d8\u66f4\u7ba1\u7406<\/p>\n<p>3. \u9700\u6c42\u7ba1\u7406<\/p>\n<p>4. \u6d4b\u8bd5\u7ba1\u7406 <\/p>\n<p>Question 31. (\u5355\u9009) <\/p>\n<p>\u6839\u636e\u7ebf\u7a0b\u5b89\u5168\u7684\u76f8\u5173\u77e5\u8bc6\uff0c\u5206\u6790\u4ee5\u4e0b\u4ee3\u7801\uff0c\u5f53\u8c03\u7528test\u65b9\u6cd5\u65f6i&gt;10\u65f6\u662f\u5426\u4f1a\u5f15\u8d77\u6b7b\u9501?<\/p>\n<p>public void test(int i) <\/p>\n<p>{ <\/p>\n<p>lock(this) <\/p>\n<p>{ <\/p>\n<p>if (i&gt;10) <\/p>\n<p>{ <\/p>\n<p>i&#8211;; <\/p>\n<p>test(i); <\/p>\n<p>} <\/p>\n<p>} <\/p>\n<p>} <\/p>\n<p>1. \u4f1a\u9501\u6b7b<\/p>\n<p>2. \u4e0d\u4f1a\u9501\u6b7b<\/p>\n<p>Question 32. (\u5355\u9009)<\/p>\n<p>\u4ee5\u4e0b\u63cf\u8ff0\u9519\u8bef\u7684\u662f\uff08\uff09<\/p>\n<p>1. \u5728C++\u4e2d\u652f\u6301\u62bd\u8c61\u7c7b\u800c\u5728C#\u4e2d\u4e0d\u652f\u6301\u62bd\u8c61\u7c7b\u3002<\/p>\n<p>2. C++\u4e2d\u53ef\u5728\u5934\u6587\u4ef6\u4e2d\u58f0\u660e\u7c7b\u7684\u6210\u5458\u800c\u5728CPP\u6587\u4ef6\u4e2d\u5b9a\u4e49\u7c7b\u7684\u6210\u5458\uff0c\u5728C#\u4e2d\u6ca1\u6709\u5934\u6587\u4ef6\u5e76\u4e14\u5728\u540c\u4e00\u5904\u58f0\u660e\u548c\u5b9a\u4e49\u7c7b\u7684\u6210\u5458\u3002<\/p>\n<p>3. \u5728C#\u4e2d\u53ef\u4f7f\u7528 new \u4fee\u9970\u7b26\u663e\u5f0f\u9690\u85cf\u4ece\u57fa\u7c7b\u7ee7\u627f\u7684\u6210\u5458\u3002<\/p>\n<p>4. \u5728C#\u4e2d\u8981\u5728\u6d3e\u751f\u7c7b\u4e2d\u91cd\u65b0\u5b9a\u4e49\u57fa\u7c7b\u7684\u865a\u51fd\u6570\u5fc5\u987b\u5728\u524d\u9762\u52a0Override\u3002<\/p>\n<p>Question 33. (\u5355\u9009)<\/p>\n<p>int[][] myArray3=new int[3][]{new int[3]{5,6,2},new int[5]{6,9,7,8,3},new int[2]{3,2}}; myArray3[2][2]\u7684\u503c\u662f\uff08\uff09\u3002<\/p>\n<p>1. 9<\/p>\n<p>2. 2<\/p>\n<p>3. 6<\/p>\n<p>4. \u8d8a\u754c<\/p>\n<p>Question 34. (\u5355\u9009)<\/p>\n<p>\u5728C#\u4e2d\u5229\u7528Socket\u8fdb\u884c\u7f51\u7edc\u901a\u4fe1\u7f16\u7a0b\u7684\u4e00\u822c\u6b65\u9aa4\u662f\uff1a\u5efa\u7acbSocket\u4fa6\u542c\u3001\uff08 \uff09\u3001\u5229\u7528Socket\u63a5\u6536\u548c\u53d1\u9001\u6570\u636e\u3002<\/p>\n<p>1. \u5efa\u7acbSocket\u8fde\u63a5<\/p>\n<p>2. \u83b7\u5f97\u7aef\u53e3\u53f7\uff1b<\/p>\n<p>3. \u83b7\u5f97IP\u5730\u5740\uff1b<\/p>\n<p>4. \u83b7\u5f97\u4e3b\u673a\u540d\uff1b<\/p>\n<p>Question 35. (\u5355\u9009)<\/p>\n<p>\u5982\u679c\u8bbetreeView1=new TreeView(),TreeNode node=new TreeNode(&#8220;\u6839\u7ed3\u70b9&#8221; )\uff0c\u5219treeView1.Nodes.Add(node)\u8fd4\u56de\u7684\u662f\u4e00\u4e2a ()\u7c7b\u578b\u7684\u503c\u3002<\/p>\n<p>1. TreeNode\uff1b<\/p>\n<p>2. int\uff1b<\/p>\n<p>3. string\uff1b<\/p>\n<p>4. TreeView\uff1b<\/p>\n<p>Question 36. (\u5355\u9009)<\/p>\n<p>\u58f0\u660e\u4e00\u4e2a\u59d4\u6258public delegate int myCallBack(int x); \u5219\u7528\u8be5\u59d4\u6258\u4ea7\u751f\u7684\u56de\u8c03\u65b9\u6cd5\u7684\u539f\u578b\u5e94\u8be5\u662f<\/p>\n<p>1. void myCallBack(int x)<\/p>\n<p>2. int receive(int num)<\/p>\n<p>3. string receive(int x)<\/p>\n<p>4. \u4e0d\u786e\u5b9a\u7684<\/p>\n<p>Question 37. (\u5355\u9009)<\/p>\n<p>\u5173\u4e8eASP.NET\u4e2d\u7684\u4ee3\u7801\u9690\u85cf\u6587\u4ef6\u7684\u63cf\u8ff0\u6b63\u786e\u7684\u662f<\/p>\n<p>1. Web\u7a97\u4f53\u9875\u7684\u7a0b\u5e8f\u7684\u903b\u8f91\u7531\u4ee3\u7801\u7ec4\u6210\uff0c\u8fd9\u4e9b\u4ee3\u7801\u7684\u521b\u5efa\u7528\u4e8e\u4e0e\u7a97\u4f53\u4ea4\u4e92\u3002\u7f16\u7a0b\u903b\u8f91\u552f\u4e00\u4e0e\u7528\u6237\u754c\u9762\u4e0d\u540c\u7684\u6587\u4ef6\u4e2d\u3002\u8be5\u6587\u4ef6\u79f0\u4f5c\u4e3a\u201c\u4ee3\u7801\u9690\u85cf\u201d\u6587\u4ef6\uff0c\u5982\u679c\u7528C\uff03\u521b\u5efa\uff0c\u8be5\u6587\u4ef6<\/p>\n<p>2. \u9879\u76ee\u4e2d\u6240\u6709Web\u7a97\u4f53\u9875\u7684\u4ee3\u7801\u9690\u85cf\u6587\u4ef6\u90fd\u88ab\u7f16\u8bd1\u6210.EXE\u6587\u4ef6<\/p>\n<p>3. \u9879\u76ee\u4e2d\u6240\u6709\u7684Web\u7a97\u4f53\u9875\u7684\u4ee3\u7801\u9690\u85cf\u6587\u4ef6\u90fd\u88ab\u7f16\u8bd1\u6210\u9879\u76ee\u52a8\u6001\u94fe\u63a5\u5e93\uff08.dll\uff09\u6587\u4ef6<\/p>\n<p>4. \u4ee5\u4e0a\u90fd\u4e0d\u6b63\u786e<\/p>\n<p>Question 38. (\u5355\u9009)<\/p>\n<p>What compiler switch creates an xml file from the xml comments in the files in an assembly?<\/p>\n<p>1. \/text<\/p>\n<p>2. \/doc<\/p>\n<p>3. \/xml<\/p>\n<p>4. \/help<\/p>\n<p>Question 39. (\u5355\u9009)<\/p>\n<p>\u4e0b\u9762\u7684\u4ee3\u7801\u5b9e\u73b0\u4e86\u8bbe\u8ba1\u6a21\u5f0f\u4e2d\u7684\u4ec0\u4e48\u6a21\u5f0f<\/p>\n<p>public class A {<\/p>\n<p>private A instance;<\/p>\n<p>private A() {<\/p>\n<p>}<\/p>\n<p>public static A Instance {<\/p>\n<p>get<\/p>\n<p>{<\/p>\n<p>if ( A == null )<\/p>\n<p>A = new A();<\/p>\n<p>return instance;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>1. Factory<\/p>\n<p>2. Abstract Factory<\/p>\n<p>3. Singleton<\/p>\n<p>4. Builder<\/p>\n<p>Question 40. (\u5355\u9009)<\/p>\n<p>class Class1<\/p>\n<p>{<\/p>\n<p>public static int Count = 0;<\/p>\n<p>static Class1()<\/p>\n<p>{<\/p>\n<p>Count++;<\/p>\n<p>}<\/p>\n<p>public Class1()<\/p>\n<p>{<\/p>\n<p>Count++;<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>Class1 o1 = new Class1();<\/p>\n<p>Class1 o2 = new Class1();<\/p>\n<p>\u8bf7\u95ee\uff0cClass1.Count\u7684\u503c\u662f\u591a\u5c11\uff1f( )<\/p>\n<p>1. 1<\/p>\n<p>2. 2<\/p>\n<p>3. 3<\/p>\n<p>4. 4 <\/p>\n<p>Question 41. (\u5355\u9009) <\/p>\n<p>abstract class BaseClass<\/p>\n<p>{<\/p>\n<p>public virtual void MethodA()<\/p>\n<p>{<\/p>\n<p>Console.WriteLine(&#8220;BaseClass&#8221;);<\/p>\n<p>}<\/p>\n<p>public virtual void MethodB()<\/p>\n<p>{<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>class Class1: BaseClass<\/p>\n<p>{<\/p>\n<p>public void MethodA()<\/p>\n<p>{<\/p>\n<p>Console.WriteLine(&#8220;Class1&#8221;);<\/p>\n<p>}<\/p>\n<p>public override void MethodB()<\/p>\n<p>{<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>class Class2: Class1<\/p>\n<p>{<\/p>\n<p>new public void MethodB()<\/p>\n<p>{<\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>class MainClass<\/p>\n<p>{<\/p>\n<p>public static void Main(string[] args)<\/p>\n<p>{<\/p>\n<p>Class2 o = new Class2();<\/p>\n<p>o.MethodA(); <\/p>\n<p>}<\/p>\n<p>}<\/p>\n<p>\u8bf7\u95ee\uff0c\u6b64\u7a0b\u5e8f\u8f93\u51fa\u7ed3\u679c\u662f:<\/p>\n<p>1. BaseClass<\/p>\n<p>2. BassClass Class1<\/p>\n<p>3. Class1<\/p>\n<p>4. Class1 BassClass <\/p>\n<p>Question 42. (\u5355\u9009)<\/p>\n<p>public static void Main(string[] args)<\/p>\n<p>{<\/p>\n<p>int i = 2000;<\/p>\n<p>object o = i;<\/p>\n<p>i = 2001;<\/p>\n<p>int j =(int) o;<\/p>\n<p>Console.WriteLine(&#8220;i={0},o={1}, j={2}&#8221;,i,o,j);<\/p>\n<p>}<\/p>\n<p>1. i=2001,o=2000,j=2000<\/p>\n<p>2. i=2001,o=2001,,j=2001<\/p>\n<p>3. i=2000,o=2001,,j=2000<\/p>\n<p>4. i=2001,o=2000,j=2001<\/p>\n<p>Question 43. (\u591a\u9009)<\/p>\n<p>\u60a8\u8981\u521b\u5efaASP.NET\u5e94\u7528\u7a0b\u5e8f\u7528\u4e8e\u8fd0\u884cAllWin\u516c\u53f8\u5185\u90e8\u7684Web\u7ad9\u70b9\uff0c\u8fd9\u4e2a\u5e94\u7528\u7a0b\u5e8f\u5305\u542b\u4e8650\u4e2a\u9875\u9762\u3002\u60a8\u60f3\u8981\u914d\u7f6e\u8fd9\u4e2a\u5e94\u7528\u7a0b\u5e8f\u4ee5\u4fbf\u5f53\u53d1\u751f\u4e00\u4e2aHTTP\u4ee3\u7801\u9519\u8bef\u65f6\u5b83\u53ef\u4ee5\u663e\u793a\u4e00\u4e2a\u81ea\u5b9a\u4e49\u7684\u9519\u8bef\u9875\u9762\u7ed9\u7528\u6237\u3002\u60a8\u60f3\u8981\u82b1\u6700\u5c0f\u7684\u4ee3\u4ef7\u5b8c\u6210\u8fd9\u4e9b\u76ee\u6807\uff0c\u60a8\u5e94\u8be5\u600e\u4e48\u505a\uff1f(\u591a\u9009)<\/p>\n<p>1. \u5728\u8fd9\u4e2a\u5e94\u7528\u7a0b\u5e8f\u7684Global.asax\u6587\u4ef6\u4e2d\u521b\u5efa\u4e00\u4e2aApplication_Error\u8fc7\u7a0b\u53bb\u5904\u7406ASP.NET\u4ee3\u7801\u9519\u8bef\u3002<\/p>\n<p>2. \u5728\u8fd9\u4e2a\u5e94\u7528\u7a0b\u5e8f\u7684Web.config\u6587\u4ef6\u4e2d\u521b\u5efa\u4e00\u4e2aapplicationError\u8282\u53bb\u5904\u7406ASP.NET\u4ee3\u7801\u9519\u8bef\u3002<\/p>\n<p>3. \u5728\u8fd9\u4e2a\u5e94\u7528\u7a0b\u5e8f\u7684Global.asax\u6587\u4ef6\u4e2d\u521b\u5efa\u4e00\u4e2aCustomErrors\u4e8b\u4ef6\u53bb\u5904\u7406HTTP\u9519\u8bef\u3002<\/p>\n<p>4. \u5728\u8fd9\u4e2a\u5e94\u7528\u7a0b\u5e8f\u7684Web.config\u6587\u4ef6\u4e2d\u521b\u5efa\u4e00\u4e2aCustomErrors\u8282\u53bb\u5904\u7406HTTP\u9519\u8bef\u3002<\/p>\n<p>Question 44. (\u5355\u9009)<\/p>\n<p>\u5982\u4e0b\u7a0b\u5e8f\u7684\u8fd0\u884c\u7ed3\u679c\u662f\uff1a<\/p>\n<p>public abstract class A <\/p>\n<p>{ <\/p>\n<p>public A() <\/p>\n<p>{ <\/p>\n<p>Console.WriteLine(&#8221;A&#8221;); <\/p>\n<p>} <\/p>\n<p>public virtual void Fun() <\/p>\n<p>{ <\/p>\n<p>Console.WriteLine(&#8220;A.Fun()&#8221;); <\/p>\n<p>} <\/p>\n<p>} <\/p>\n<p>public class B: A <\/p>\n<p>{ <\/p>\n<p>public B() <\/p>\n<p>{ <\/p>\n<p>Console.WriteLine(&#8221;B&#8221;); <\/p>\n<p>} <\/p>\n<p>public new void Fun() <\/p>\n<p>{ <\/p>\n<p>Console.WriteLine(&#8220;B.Fun()&#8221;); <\/p>\n<p>} <\/p>\n<p>public static void Main() <\/p>\n<p>{ <\/p>\n<p>A a = new B(); <\/p>\n<p>a.Fun(); <\/p>\n<p>} <\/p>\n<p>} <\/p>\n<p>1. A B A.Fun() <\/p>\n<p>2. A B B.Fun()<\/p>\n<p>3. B A A.Fun()<\/p>\n<p>4. B A B.Fun()<\/p>\n<p>Question 45. (\u5355\u9009)<\/p>\n<p>Which of these string definitions will prevent escaping on backslashes in C#?*<\/p>\n<p>1. string s = #\u201dn Test string\u201d;<\/p>\n<p>2. string s = \u201c\u2019n Test string\u201d;<\/p>\n<p>3. string s = @\u201dn Test string\u201d;<\/p>\n<p>4. string s = \u201cn Test string\u201d;<\/p>\n<p>Question 46. (\u5355\u9009)<\/p>\n<p>Which of the following operations can you NOT perform on an ADO.NET DataSet?<\/p>\n<p>1. A DataSet can be synchronised with a RecordSet.<\/p>\n<p>2. A DataSet can be synchronised with the database.<\/p>\n<p>3. A DataSet can be converted to XML.<\/p>\n<p>4. You can infer the schema from a DataSet<\/p>\n<p>Question 47. (\u5355\u9009)<\/p>\n<p>In Object oriented Programming, how would you describe encapsulation?<\/p>\n<p>1. The conversion of one type of object to another.<\/p>\n<p>2. The runtime resolution of method calls.<\/p>\n<p>3. The exposition of data.<\/p>\n<p>4. The separation of interface and implementation.<\/p>\n<p>Question 48. (\u5355\u9009)<\/p>\n<p>How does assembly versioning in .NET prevent DLL Hell?<\/p>\n<p>1. The runtime checks to see that only one version of an assembly is on the machine at any one time.<\/p>\n<p>2. .NET allows assemblies to specify the name AND the version of any assemblies they need to run.<\/p>\n<p>3. The compiler offers compile time checking for backward compatibility.<\/p>\n<p>4. It doesn\u2019t.<\/p>\n<p>Question 49. (\u5355\u9009)<\/p>\n<p>\u4e09\u79cd\u5e38\u7528\u7684\u5b57\u7b26\u4e32\u5224\u7a7a\u4e32\u65b9\u6cd5\uff1a<\/p>\n<p>1: bool isEmpty = (str.Length == 0); <\/p>\n<p>2: bool isEmpty = (str == String.Empty); <\/p>\n<p>3: bool isEmpty = (str == &#8220;&#8221;);<\/p>\n<p>\u54ea\u79cd\u65b9\u6cd5\u6700\u5feb\uff1f<\/p>\n<p>1. 1<\/p>\n<p>2. 2<\/p>\n<p>3. 3<\/p>\n<p>Question 50. (\u5355\u9009)<\/p>\n<p>public sealed class SampleSingleton1<\/p>\n<p>{<\/p>\n<p>private int m_Counter = 0;<\/p>\n<p>private SampleSingleton1()<\/p>\n<p>{<\/p>\n<p>Console.WriteLine(&#8220;&#8221;\u521d\u59cb\u5316SampleSingleton1\u3002&#8221;&#8221;);<\/p>\n<p>}<\/p>\n<p>public static readonly SampleSingleton1 Singleton = new SampleSingleton1();<\/p>\n<p>public void Counter()<\/p>\n<p>{<\/p>\n<p>m_Counter ++;<\/p>\n<p>}<\/p>\n<p>} <\/p>\n<p>\u4ee5\u4e0a\u4ee3\u7801\u5b9e\u73b0\u4e86\u8bbe\u8ba1\u6a21\u5f0f\u4e2d\u7684\u54ea\u79cd\u6a21\u5f0f\uff1f<\/p>\n<p>1. \u539f\u578b<\/p>\n<p>2. \u62bd\u8c61\u5de5\u5382<\/p>\n<p>3. \u5355\u952e<\/p>\n<p>4. \u751f\u6210\u5668<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u96c5\u864e\u516c\u53f8C#\u7b14\u8bd5\u9898\uff0c\u5305\u62ec\u95ee\u7b54\u9898\u548c\u9009\u62e9\u9898\u4e24\u90e8\u5206\u3002\u8bd5\u8bd5\u770b\uff0c\u4f60\u80fd\u56de\u7b54\u51fa\u591a\u5c11&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-73","post","type-post","status-publish","format-standard","hentry","category-NET"],"_links":{"self":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/posts\/73","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=73"}],"version-history":[{"count":0,"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/posts\/73\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=73"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=73"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=73"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}