If you want a class that implements the Map interface and do not need any methods beyond those in the Map interface, you can use the ____________ class.

(a) Vector
(b) AbstractMap
(c) HashMap
(d) HashSet


(c) HashMap

Computer Science & Information Technology

You might also like to view...

Which of the following is the process of using a programming tool to not only identify syntactic problems in the code but to also discover weaknesses that can lead to memory leaks and buffer overflows?

A. runtime debugging B. sandboxing C. memory dumping D. fuzzing

Computer Science & Information Technology

________ consists of thin strands of glass or plastic about the diameter of a human hair.

a. Coaxial cable b. Fiber-optic cable c. Twisted pair d. Cat-5

Computer Science & Information Technology

Which of the following is NOT a commercially available type of ERP software?

A. Microsoft B. Oracle C. PeopleSoft D. SAP

Computer Science & Information Technology

A security analyst is inspecting the results of a recent internal vulnerability scan that was performed against intranet services.The scan reports include the following critical-rated vulnerability: Title: Remote Command Execution vulnerability in web server Rating: Critical (CVSS 10.0)Threat actor: any remote user of the web serverConfidence: certain -Recommendation: apply vendor patchesWhich of the following actions should the security analyst perform FIRST?

A. Escalate the issue to senior management. B. Apply organizational context to the risk rating. C. Organize for urgent out-of-cycle patching. D. Exploit the server to check whether it is a false positive.

Computer Science & Information Technology