GCP 架构师样题

  1. Anonymous users from all over the world access a public health information website hosted in an on-premises EHR data center. The servers that host this website are older, and users are complaining about sluggish response times. There has also been a recent increase of distributed denial-of-service attacks toward the website. The attacks always come from the same IP address ranges. EHR management has identified the public health information website as an easy, low risk application to migrate to Google Cloud. You need to improve access latency and provide a security solution that will prevent the denial-of-service traffic from entering your Virtual Private Cloud (VPC) network. What should you do?
    A. Deploy an external HTTP(S) load balancer, configure VPC firewall rules, and move the applications onto Compute Engine virtual machines.
    B. Deploy an external HTTP(S) load balancer, configure Google Cloud Armor, and move the application onto Compute Engine virtual machines.
    C. Containerize the application and move it into Google Kubernetes Engine (GKE). Create a GKE service to expose the pods within the cluster, and set up a GKE network policy.
    D. Containerize the application and move it into Google Kubernetes Engine (GKE). Create an internal load balancer to expose the pods outside the cluster, and configure Identity-Aware Proxy (IAP) for access.
    A is not correct because firewall rules do not block malicious traffic into a VPC but rather block it at the VM level.
    B is correct because the external HTTP(s) load balancer will improve access latency and Cloud Armor can be configured to block the Distributed Denial-of-Service (DDoS) attack.
    C is not correct because a GKE service does not expose a set of pods outside of a cluster and a GKE network policy only filters traffic between pods and services.
    D is not correct because a GKE internal load balancer will not load balance external traffic and anonymous users need access to the website so IAP is not a fit.

在这里插入图片描述

A. Provision Carrier Peering.
B. Provision a new Internet connection.
C. Provision a Partner Interconnect connection.
D. Provision a Dedicated Interconnect connection.
A is not correct because it does not give private IP addressing across the connection.
B is not correct because an additional Internet connection will not provide RFC1918 communications by itself.
C is correct because it allows the customer to lower latency by connecting directly to a partner network that is directly connected to Google. This option will also allow the customer to use the lower bandwidth interfaces that they have on their current firewall.
D is not correct because Dedicated Interconnect would require the customer to buy new hardware to get a 10 gig interface for their firewall.
3. One of EHR’s healthcare customers is an internationally renowned research and hospital facility. Many of their patients are well-known public personalities. Sources both inside and outside have tried many times to obtain health information on these patients for malicious purposes. The hospital requires that patient information stored in Cloud Storage buckets not leave the geographic areas in which the buckets are hosted. You need to ensure that information stored in Cloud Storage buckets in the “europe-west2” region does not leave that area. What should you do?
A. Encrypt the data in the application on-premises before the data is stored in the “europe-west2” region.
B. Enable Virtual Private Cloud Service Controls, and create a service perimeter around the Cloud Storage resources.
C. Assign the Identity and Access Management (IAM) “storage.objectViewer” role only to users and service accounts that need to use the data.
D. Create an access control list (ACL) that limits access to the bucket to authorized users only, and apply it to the buckets in the “europe-west2” region.
Feedback
A is not correct because encrypting the data does not stop data exfiltration.
B is correct because VPC Service Controls improves your ability to mitigate the risk of data exfiltration from Google Cloud services.
C is not correct because IAM roles deal with identity-based access control, not context-aware perimeter security.
D is not correct because Cloud Storage ACLs are a mechanism you can use to define who has access to your buckets and objects, as well as their level of access. ACLs do not stop data exfiltration.
4. The EHR sales employees are a remote-based workforce that travels to different locations to do their jobs. Regardless of their location, the sales employees need to access web-based sales tools located in the EHR data center. EHR is retiring their current Virtual Private Network (VPN) infrastructure, and you need to move the web-based sales tools to a BeyondCorp access model. Each sales employee has a Google Workspace account and uses that account for single sign-on (SSO). What should you do?
A. Create an Identity-Aware Proxy (IAP) connector that points to the sales tool application.
B. Create a Google group for the sales tool application, and upgrade that group to a security group.
C. Deploy an external HTTP(S) load balancer and create a custom Cloud Armor policy for the sales tool application.
D. For every sales employee who needs access to the sales tool application, give their Google Workspace user account the predefined AppEngine Viewer role.
Feedback
A is correct because Identity-Aware Proxy (IAP) connector allows you to manage access to HTTP-based apps outside of Google Cloud.
B is not correct because Google groups by themselves do not grant access to an application nor do they move an application to a beyond corp model.
C is not correct because Cloud Armor does not authenticate or authorize application access.
D is not correct because the application is installed in the datacenter, not in the AppEngine environment.
5. You are the data compliance officer for Mountkirk Games and must protect customers’ personally identifiable information (PII). Mountkirk Games wants to make sure they can generate anonymized usage reports about their new game and delete PII data after a specific period of time. The solution should have minimal cost. You need to ensure compliance while meeting business and technical requirements. What should you do?
A. Archive audit logs in Cloud Storage, and manually generate reports.
B. Write a Cloud Logging filter to export specific date ranges to Pub/Sub.
C. Archive audit logs in BigQuery, and generate reports using Google Data Studio.
D. Archive user logs on a locally attached persistent disk, and cat them to a text file for auditing.
Feedback
A is not correct because Cloud Storage is an object store with no query language access for report generation.
B is not correct because it does not address log storage for data retention.
C is correct because BigQuery allows easy querying for report generation, with low storage costs.
D is not correct because long term storage in persistent disks is expensive.
6. Mountkirk Games wants you to make sure their new gaming platform is being operated according to Google best practices. You want to verify that Google-recommended security best practices are being met while also providing the operations teams with the metrics they need. What should you do? (Choose two)
A. Ensure that you aren’t running privileged containers.
B. Ensure that you are using obfuscated Tags on workloads.
C. Ensure that you are using the native logging mechanisms.
D. Ensure that workloads are not using securityContext to run as a group.
E. Ensure that each cluster is running GKE metering so each team can be charged for their usage.
Feedback
A is correct because this is High Priority according to Google best practices.
B is not correct because tags should be readable and useful to the operations teams when they are working on the clusters
C is correct because this is High Priority according to Google best practices.
D is not correct because this may be required for some workloads.
E is not correct because although from a business process this may be useful it won’t impact the operations or security of the cluster.

  1. You need to implement Virtual Private Cloud (VPC) Service Controls for Mountkirk Games. Mountkirk Games wants to allow Cloud Shell usage by its developers. Developers should not have full access to managed services. You need to balance these conflicting goals with Mountkirk Games’ business requirements. What should you do?
    A. Use VPC Service Controls for the entire platform.
    B. Prioritize VPC Service Controls implementation over Cloud Shell usage for the entire platform.
    C. Include all developers in an access level associated with the service perimeter, and allow them to use Cloud Shell.
    D. Create a service perimeter around only the projects that handle sensitive data, and do not grant your developers access to it.
    Feedback
    A is not correct because VPC Service Controls do not directly affect scaling of Google Cloud architecture.
    B is not correct because a security perimeter is not a business requirement, but rapid iteration is.
    C is not correct because it works but does not scale, and we do not want to give users this much access.
    D is correct because VPC Service Controls protects data, and Cloud Shell facilitates rapid iteration of Google Cloud architecture changes.
  2. Your new game running on Google Cloud is in public beta, and you want to design meaningful service level objectives (SLOs) before the game becomes generally available. What should you do?
    A. Define one SLO as 99.9% game server availability. Define the other SLO as less than 100-ms latency.
    B. Define one SLO as service availability that is the same as Google Cloud’s availability. Define the other SLO as 100-ms latency.
    C. Define one SLO as 99% HTTP requests return the 2xx status code. Define the other SLO as 99% requests return within 100 ms.
    D. Define one SLO as total uptime of the game server within a week. Define the other SLO as the mean response time of all HTTP requests that are less than 100 ms.
    Feedback
    A is incorrect because it doesn’t clearly define how to measure both the availability and latency.
    B is incorrect because Google Cloud availability has an impact on customer availability but it is only one factor. Also, for different Google Cloud products, the availability could be different.
    C is correct because it clearly defines the service level indicators and how to measure them.
    D is incorrect because there is no objective for the server uptime.
  3. HRL wants you to help them bring existing recorded video content to new fans in emerging regions. Considering the HRL business and technical requirements, what should you do?
    A. Serve the video content directly from a multi-region Cloud Storage bucket.
    B. Use Cloud CDN to cache the video content from HRL’s existing public cloud provider.
    C. Use Apigee Edge to cache the video content from HRL’s existing public cloud provider.
    D. Replicate the video content in Google Kubernetes Engine clusters in regions close to the fans.
    Feedback
    A is not correct because a multi-region bucket does not serve all global areas with similar latency.
    B is correct because Cloud CDN can be used to cache data hosted on other cloud providers and supports large objects such as video.
    C is not correct because Apigee Edge is not designed to cache data larger than 512 KB.
    D is not correct because replicating the video content introduces unnecessary complexity.
  4. You are the data compliance officer for TerramEarth and must protect customers’ personally identifiable information (PII), like credit card information. TerramEarth wants to personalize product recommendations for its large industrial customers. You need to respect data privacy and deliver a solution. What should you do?
    A. Use AutoML to provide data to the recommendation service.
    B. Process PII data on-premises to keep the private information more secure.
    C. Use the Cloud Data Loss Prevention (DLP) API to provide data to the recommendation service.
    D. Manually build, train, and test machine learning models to provide product recommendations anonymously.
    Feedback
    A is not correct because AutoML does not inherently provide data de-identification.
    B is not correct because TerramEarth’s requirements are to go into the cloud, not stay on-premises.
    C is correct because Cloud DLP was specifically designed for this use case.
    D is not correct because developing machine learning models is an excessive way to de-identify data.
  5. You are designing a future-proof hybrid environment that will require network connectivity between Google Cloud and your on-premises environment. You want to ensure that the Google Cloud environment you are designing is compatible with your on-premises networking environment. What should you do?
    A. Use the default VPC in your Google Cloud project. Use a Cloud VPN connection between your on-premises environment and Google Cloud.
    B. Create a custom VPC in Google Cloud in auto mode. Use a Cloud VPN connection between your on-premises environment and Google Cloud.
    C. Create a network plan for your VPC in Google Cloud that uses CIDR ranges that overlap with your on-premises environment. Use a Cloud Interconnect connection between your on-premises environment and Google Cloud.
    D. Create a network plan for your VPC in Google Cloud that uses non-overlapping CIDR ranges with your on-premises environment. Use a Cloud Interconnect connection between your on-premises environment and Google Cloud.
    Feedback
    A is not correct because the default VPC is a VPC with Auto Mode IP ranges, which has the same problem as answer C.
    B is not correct because with Auto Mode IP Ranges there is no guarantee that the IP ranges will not overlap with your on premises environment, either now or in the future.
    C is not correct because to ensure correct routing, ranges cannot overlap between environments.
    D is correct because this ensures your on premises network is compatible with your Google Cloud VPC.

12 Your company wants to track whether someone is present in a meeting room reserved for a scheduled meeting. There are 1000 meeting rooms across 5 offices on 3 continents. Each room is equipped with a motion sensor that reports its status every second. You want to support the data ingestion needs of this sensor network. The receiving infrastructure needs to account for the possibility that the devices may have inconsistent connectivity. Which solution should you design?
A. Have each device create a persistent connection to a Compute Engine instance and write messages to a custom application.
B. Have devices poll for connectivity to Cloud SQL and insert the latest messages on a regular interval to a device specific table.
C. Have devices poll for connectivity to Pub/Sub and publish the latest messages on a regular interval to a shared topic for all devices.
D. Have devices create a persistent connection to an App Engine application fronted by Cloud Endpoints, which ingest messages and write them to Datastore.
Feedback
A is not correct because having a persistent connection does not handle the case where the device is disconnected.
B is not correct because Cloud SQL is a regional, relational database and not the best fit for sensor data. Additionally, the frequency of the writes has the potential to exceed the supported number of concurrent connections.
C is correct because Pub/Sub can handle the frequency of this data, and consumers of the data can pull from the shared topic for further processing.
D is not correct because having a persistent connection does not handle the case where the device is disconnected.
13 Your company wants to try out the cloud with low risk. They want to archive approximately 100 TB of their log data to the cloud and test the serverless analytics features available to them there, while also retaining that data as a long-term disaster recovery backup. Which two steps should they take? (Choose two)
A. Load logs into BigQuery.
B. Load logs into Cloud SQL.
C. Import logs into Cloud Logging.
D. Insert logs into Cloud Bigtable.
E. Upload log files into Cloud Storage.
Feedback
A is correct because BigQuery is a serverless cloud data warehouse for analytics and supports the volume and analytics requirement.
B is not correct because Cloud SQL does not support the expected 100 TB. Additionally, Cloud SQL is a relational database and not the best fit for time-series log data formats.
C is not correct because Cloud Logging is optimized for monitoring, error reporting, and debugging instead of analytics queries.
D is not correct because Cloud Bigtable is optimized for read-write latency and analytics throughput, not analytics querying and reporting.
E is correct because Cloud Storage provides the Coldline and Archive storage classes to support long-term storage with infrequent access, which would support the long-term disaster recovery backup requirement.
14 You set up an autoscaling managed instance group to serve web traffic for an upcoming launch. After configuring the instance group as a backend service to an HTTP(S) load balancer, you notice that virtual machine (VM) instances are being terminated and re-launched every minute. The instances do not have a public IP address. You have verified that the appropriate web response is coming from each instance using the curl command. You want to ensure that the backend is configured correctly. What should you do?
A. Ensure that a firewall rule exists to allow source traffic on HTTP/HTTPS to reach the load balancer.
B. Assign a public IP to each instance, and configure a firewall rule to allow the load balancer to reach the instance public IP.
C. Ensure that a firewall rule exists to allow load balancer health checks to reach the instances in the instance group.
D. Create a tag on each instance with the name of the load balancer. Configure a firewall rule with the name of the load balancer as the source and the instance tag as the destination.
Feedback
A is not correct because the issue to resolve is the VMs being terminated, not access to the load balancer.
B is not correct because this introduces a security vulnerability without addressing the primary concern of the VM termination.
C is correct because health check failures lead to a VM being marked unhealthy and can result in termination if the health check continues to fail. Because you have already verified that the instances are functioning properly, the next step would be to determine why the health check is continuously failing.
D is not correct because the source of the firewall rule that allows load balancer and health check access to instances is defined IP ranges, and not a named load balancer. Tagging the instances for the purpose of firewall rules is appropriate but would probably be a descriptor of the application, and not the load balancer.

  1. Your organization has a 3-tier web application deployed in the same Google Cloud Virtual Private Cloud (VPC). Each tier (web, API, and database) scales independently of the others. Network traffic should flow through the web to the API tier, and then on to the database tier. Traffic should not flow between the web and the database tier. How should you configure the network with minimal steps?
    A. Add each tier to a different subnetwork.
    B. Set up software-based firewalls on individual VMs.
    C. Add tags to each tier and set up routes to allow the desired traffic flow.
    D. Add tags to each tier and set up firewall rules to allow the desired traffic flow.
    Feedback
    A is not correct because the subnetwork alone will not allow and restrict traffic as required without firewall rules.
    B is not correct because this adds complexity to the architecture and the instance configuration.
    C is not correct because routes still require firewall rules to allow traffic as requests. Additionally, the tags are used for defining the instances the route applies to, and not for identifying the next hop. The next hop is either an IP range or instance name, but in the proposed solution the tiers are only identified by tags.
    D is correct because as instances scale, they will all have the same tag to identify the tier. These tags can then be leveraged in firewall rules to allow and restrict traffic as required, because tags can be used for both the target and source.
    16 You are designing a large distributed application with 30 microservices. Each of your distributed microservices needs to connect to a database backend. You want to store the credentials securely. Where should you store the credentials?
    A. In the source code
    B. In an environment variable
    C. In a secret management system
    D. In a config file that has restricted access through ACLs
    Feedback
    A is not correct because storing credentials in source code and source control is discoverable, in plain text, by anyone with access to the source code. This also introduces the requirement to update code and do a deployment each time the credentials are rotated.
    B is not correct because consistently populating environment variables would require the credentials to be available, in plain text, when the session is started.
    C is correct because a secret management system such as Secret Manager is a secure and convenient storage system for API keys, passwords, certificates, and other sensitive data. Secret Manager provides a central place and single source of truth to manage, access, and audit secrets across Google Cloud.
    D is not correct because instead of managing access to the config file and updating manually as keys are rotated, it would be better to leverage a key management system. Additionally, there is increased risk if the config file contains the credentials in plain text.
    17 Your customer is moving their corporate applications to Google Cloud. The security team wants detailed visibility of all resources in the organization. You use Resource Manager to set yourself up as the Organization Administrator. Which Identity and Access Management (IAM) roles should you give to the security team while following Google recommended practices?
    A. Organization viewer, Project owner
    B. Organization viewer, Project viewer
    C. Organization administrator, Project browser
    D. Project owner, Network administrator
    Feedback
    A is not correct because Project owner is too broad. The security team does not need to be able to make changes to projects.
    B is correct because:
  • Organization viewer grants the security team permissions to view the organization’s display name.
  • Project viewer grants the security team permissions to see the resources within projects.
    C is not correct because Organization Administrator is too broad. The security team does not need to be able to make changes to the organization.
    D is not correct because Project Owner is too broad. The security team does not need to be able to make changes to projects.
    18 To reduce costs, the Director of Engineering has required all developers to move their development infrastructure resources from on-premises virtual machines (VMs) to Google Cloud. These resources go through multiple start/stop events during the day and require state to persist. You have been asked to design the process of running a development environment in Google Cloud while providing cost visibility to the finance department. Which two steps should you take? (Choose two)
    A. Use persistent disks to store the state. Start and stop the VM as needed.
    B. Use the “gcloud --auto-delete” flag on all persistent disks before stopping the VM.
    C. Apply VM CPU utilization label and include it in the BigQuery billing export.
    D. Use BigQuery billing export and labels to relate cost to groups.
    E. Store all state in a Local SSD, snapshot the persistent disks, and terminate the VM.
    Correct answer
    A. Use persistent disks to store the state. Start and stop the VM as needed.
    D. Use BigQuery billing export and labels to relate cost to groups.
    Feedback
    A is correct because persistent disks will not be deleted when an instance is stopped.
    B is not correct because the --auto-delete flag has no effect unless the instance is deleted. Stopping an instance does not delete the instance or the attached persistent disks
    C is not correct because labels are used to organize instances, not to monitor metrics
    D is correct because exporting daily usage and cost estimates automatically throughout the day to a BigQuery dataset is a good way of providing visibility to the finance department. Labels can then be used to group the costs based on team or cost center.
    E is not correct because the state stored in local SSDs will be lost when the instance is stopped.
    19 The database administration team has asked you to help them improve the performance of their new database server running on Compute Engine. The database is used for importing and normalizing the company’s performance statistics. It is built with MySQL running on Debian Linux. They have an n1-standard-8 virtual machine with 80 GB of SSD zonal persistent disk which they can’t restart until the next maintenance event. What should they change to get better performance from this system as soon as possible and in a cost-effective manner?
    A. Increase the virtual machine’s memory to 64 GB.
    B. Create a new virtual machine running PostgreSQL.
    C. Dynamically resize the SSD persistent disk to 500 GB.
    D. Migrate their performance metrics warehouse to BigQuery.
    Feedback
    A is not correct because increasing the memory size requires a VM restart.
    B is not correct because the DB administration team is requesting help with their MySQL instance. Migration to a different product should not be the solution when other optimization techniques can still be applied first
    C is correct because persistent disk performance is based on the total persistent disk capacity attached to an instance and the number of vCPUs that the instance has. Incrementing the persistent disk capacity will increment its throughput and IOPS, which in turn improve the performance of MySQL.
    D is not correct because the DB administration team is requesting help with their MySQL instance. Migration to a different product should not be the solution when other optimization techniques can still be applied first.
  • 9
    点赞
  • 16
    收藏
    觉得还不错? 一键收藏
  • 1
    评论
东南亚位于我国倡导推进的“一带一路”海陆交汇地带,作为当今全球发展最为迅速的地区之一,近年来区域内生产总值实现了显著且稳定的增长。根据东盟主要经济体公布的最新数据,印度尼西亚2023年国内生产总值(GDP)增长5.05%;越南2023年经济增长5.05%;马来西亚2023年经济增速为3.7%;泰国2023年经济增长1.9%;新加坡2023年经济增长1.1%;柬埔寨2023年经济增速预计为5.6%。 东盟国家在“一带一路”沿线国家中的总体GDP经济规模、贸易总额与国外直接投资均为最大,因此有着举足轻重的地位和作用。当前,东盟与中国已互相成为双方最大的交易伙伴。中国-东盟贸易总额已从2013年的443亿元增长至 2023年合计超逾6.4万亿元,占中国外贸总值的15.4%。在过去20余年中,东盟国家不断在全球多变的格局里面临挑战并寻求机遇。2023东盟国家主要经济体受到国内消费、国外投资、货币政策、旅游业复苏、和大宗商品出口价企稳等方面的提振,经济显现出稳步增长态势和强韧性的潜能。 本调研报告旨在深度挖掘东南亚市场的增长潜力与发展机会,分析东南亚市场竞争态势、销售模式、客户偏好、整体市场营商环境,为国内企业出海开展业务提供客观参考意见。 本文核心内容: 市场空间:全球行业市场空间、东南亚市场发展空间。 竞争态势:全球份额,东南亚市场企业份额。 销售模式:东南亚市场销售模式、本地代理商 客户情况:东南亚本地客户及偏好分析 营商环境:东南亚营商环境分析 本文纳入的企业包括国外及印尼本土企业,以及相关上下游企业等,部分名单 QYResearch是全球知名的大型咨询公司,行业涵盖各高科技行业产业链细分市场,横跨如半导体产业链(半导体设备及零部件、半导体材料、集成电路、制造、封测、分立器件、传感器、光电器件)、光伏产业链(设备、硅料/硅片、电池片、组件、辅料支架、逆变器、电站终端)、新能源汽车产业链(动力电池及材料、电驱电控、汽车半导体/电子、整车、充电桩)、通信产业链(通信系统设备、终端设备、电子元器件、射频前端、光模块、4G/5G/6G、宽带、IoT、数字经济、AI)、先进材料产业链(金属材料、高分子材料、陶瓷材料、纳米材料等)、机械制造产业链(数控机床、工程机械、电气机械、3C自动化、工业机器人、激光、工控、无人机)、食品药品、医疗器械、农业等。邮箱:market@qyresearch.com
完整版:https://download.csdn.net/download/qq_27595745/89522468 【课程大纲】 1-1 什么是java 1-2 认识java语言 1-3 java平台的体系结构 1-4 java SE环境安装和配置 2-1 java程序简介 2-2 计算机中的程序 2-3 java程序 2-4 java类库组织结构和文档 2-5 java虚拟机简介 2-6 java的垃圾回收器 2-7 java上机练习 3-1 java语言基础入门 3-2 数据的分类 3-3 标识符、关键字和常量 3-4 运算符 3-5 表达式 3-6 顺序结构和选择结构 3-7 循环语句 3-8 跳转语句 3-9 MyEclipse工具介绍 3-10 java基础知识章节练习 4-1 一维数组 4-2 数组应用 4-3 多维数组 4-4 排序算法 4-5 增强for循环 4-6 数组和排序算法章节练习 5-0 抽象和封装 5-1 面向过程的设计思想 5-2 面向对象的设计思想 5-3 抽象 5-4 封装 5-5 属性 5-6 方法的定义 5-7 this关键字 5-8 javaBean 5-9 包 package 5-10 抽象和封装章节练习 6-0 继承和多态 6-1 继承 6-2 object类 6-3 多态 6-4 访问修饰符 6-5 static修饰符 6-6 final修饰符 6-7 abstract修饰符 6-8 接口 6-9 继承和多态 章节练习 7-1 面向对象的分析与设计简介 7-2 对象模型建立 7-3 类之间的关系 7-4 软件的可维护与复用设计原则 7-5 面向对象的设计与分析 章节练习 8-1 内部类与包装器 8-2 对象包装器 8-3 装箱和拆箱 8-4 练习题 9-1 常用类介绍 9-2 StringBuffer和String Builder类 9-3 Rintime类的使用 9-4 日期类简介 9-5 java程序国际化的实现 9-6 Random类和Math类 9-7 枚举 9-8 练习题 10-1 java异常处理 10-2 认识异常 10-3 使用try和catch捕获异常 10-4 使用throw和throws引发异常 10-5 finally关键字 10-6 getMessage和printStackTrace方法 10-7 异常分类 10-8 自定义异常类 10-9 练习题 11-1 Java集合框架和泛型机制 11-2 Collection接口 11-3 Set接口实现类 11-4 List接口实现类 11-5 Map接口 11-6 Collections类 11-7 泛型概述 11-8 练习题 12-1 多线程 12-2 线程的生命周期 12-3 线程的调度和优先级 12-4 线程的同步 12-5 集合类的同步问题 12-6 用Timer类调度任务 12-7 练习题 13-1 Java IO 13-2 Java IO原理 13-3 流类的结构 13-4 文件流 13-5 缓冲流 13-6 转换流 13-7 数据流 13-8 打印流 13-9 对象流 13-10 随机存取文件流 13-11 zip文件流 13-12 练习题 14-1 图形用户界面设计 14-2 事件处理机制 14-3 AWT常用组件 14-4 swing简介 14-5 可视化开发swing组件 14-6 声音的播放和处理 14-7 2D图形的绘制 14-8 练习题 15-1 反射 15-2 使用Java反射机制 15-3 反射与动态代理 15-4 练习题 16-1 Java标注 16-2 JDK内置的基本标注类型 16-3 自定义标注类型 16-4 对标注进行标注 16-5 利用反射获取标注信息 16-6 练习题 17-1 顶目实战1-单机版五子棋游戏 17-2 总体设计 17-3 代码实现 17-4 程序的运行与发布 17-5 手动生成可执行JAR文件 17-6 练习题 18-1 Java数据库编程 18-2 JDBC类和接口 18-3 JDBC操作SQL 18-4 JDBC基本示例 18-5 JDBC应用示例 18-6 练习题 19-1 。。。

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论 1
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值