网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()

  • A、Facade
  • B、View Helper
  • C、Transfer Object
  • D、Intercepting Filter
  • E、Composite Facade

参考答案

更多 “ A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A、FacadeB、View HelperC、Transfer ObjectD、Intercepting FilterE、Composite Facade” 相关考题
考题 目前,具有代表性的CASE工具有______。A.UNIFACEB.ErwinC.PowerBuilderD.Developer2000

考题 Rapid application development(RAD) systems purport to lighten the developer's(46)by making it easy to program an application with simple intuitive steps.RAD tools(47)the developer everything needed to construct a fully functional application quickly and easily. They make short work of modifying the developed product to(48)changes after the program is finished. Applications developed with RAD tools are constructed as they are envisioned. As an application's real usefulness(49), the developer armed with RAD tools should be able to(50)on new features with little fuss.A.burdenB.troubleC.taskD.weight

考题 A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller

考题 You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()A、 The HybridDictionary collection class.B、 The HashTable collection class.C、 The ListDictionary collection class.D、 The StringCollection collection class.

考题 You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A、 Use the ServiceBase class.B、 Use the ServiceInstaller class.C、 Use the ServiceManager class.D、 Use the ServiceController class.

考题 Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate

考题 以下哪几项是Oracle客户端连接工具()A、OEMB、SQL*PLUSC、NETCAD、PLSQL DEVELOPER

考题 Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()A、MANAGER can do a GET on resources in the /Bar/Baz directory.B、MANAGER can do a POST on any resource in the /Bar/Baz directory.C、MANAGER can do a TRACE on any resource in the /Bar/Baz directory.D、DEVELOPER can do a GET on resources in the /Bar/Baz directory.E、DEVELOPER can do only a POST on resources in the /Bar/Baz directory.F、DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.

考题 Where should a Developer go to freely manipulate inline style coding for an object?()A、DesignB、SourceC、PropertiesD、Controls

考题 The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A、Transfer ObjectB、Front ControllerC、Service LocatorD、Intercepting FilterE、Business DelegateF、Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

考题 单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller

考题 单选题A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A FacadeB View HelperC Transfer ObjectD Intercepting FilterE Composite Facade

考题 单选题Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. Server1 has the Hyper- V server role installed. The domain contains a virtual machine named VM1. A developer wants to attach a debugger to VM1. You need to ensure that the developer can connect to VM1 by using a named pipe. Which virtual machine setting should you configure?()A Network AdapterB BIOSC ProcessorD COM 1

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Business Delegate

考题 多选题A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()AProxyBView HelperCFront ControllerDSession FacadeEBusiness DelegateFModel-View-Controller

考题 单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A Transfer ObjectB Front ControllerC Service LocatorD Intercepting FilterE Business DelegateF Model-View-Controller

考题 单选题You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()A  Use the ServiceBase class.B  Use the ServiceInstaller class.C  Use the ServiceManager class.D  Use the ServiceController class.

考题 单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A  The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB  The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC  The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD  The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A Transfer ObjectB Service LocatorC Intercepting FilterD Business Delegate

考题 单选题Which statements about the garbage collection are true?()A  The program developer must create a thread to be responsible for free the memory.B  The garbage collection will check for and free memory no longer needed.C  The garbage collection allow the program developer to explicity and immediately free the memory.D  The garbage collection can free the memory used java object at expect time.

考题 单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A CommandB Transfer ObjectC Service LocatorD Session FacadeE Business Delegate

考题 多选题A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()AProxyBView HelperCFront ControllerDSession FaçadeEBusiness DelegateFModel-View-Controller

考题 单选题John, a junior workflow developer, has approached you for advice on a workflow process that he is defining. He is unclear about the implications of selecting the Runnable checkbox while defining the Process Activity. What advice would you offer?()A Runnable allows the workflow engine to compile the process.B Runnable allows the process to be included as a stand-alone subprocess.C Runnable allows the workflow engine to check its status during process execution.D Runnable allows the workflow engine to define this as a top-level process and initiate it