单项选择题
A.A
B.B
C.C
D.D
单项选择题 You are developing a method to call a COM component.You need to use declarative security to explicitly request the runtime to perform a full stack walk. You must ensure that all callers have the required level of trust for COM interop before the callers execute your method. Which attribute should you place on the method?()
单项选择题 假设您现在在写一个方法用以压缩一个字节数组,这个方法定义了一个形式参数叫document,您需要压缩他,那么下面的代码您会选择哪个?()
单项选择题 You are developing a method to decrypt data that was encrypted with the Triple DES Algorithm. The method accepts the following parameters: The byte array to be decrypted, which is named cipherMessage The key, which is named key An initialization vector, which is named iv You need to decrypt the message by using the TripleDES class and place the result in a string. Which code segment should you use?()