网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()
A

Proxy

B

View Helper

C

Front Controller

D

Session Façade

E

Business Delegate

F

Model-View-Controller


参考答案

参考解析
解析: 暂无解析
更多 “多选题A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()AProxyBView HelperCFront ControllerDSession FaçadeEBusiness DelegateFModel-View-Controller” 相关考题
考题 During a planning meeting, Company.com indicates that they intend to make a relational  Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab.  How would this be managed in an HACMP environment?()  A、 It can be started with a crontab entry.B、 It can be created as an Application Server.C、 It can be added to a resource group as a dependency.D、 It cannot be done because HACMP provides no method to order application start/stop scripts.

考题 A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller

考题 A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier.  Which design pattern provides a means to manage the uncertainty in the API?()A、 View HelperB、 Front ControllerC、 Composite ViewD、 Intercepting FilterE、 Business DelegateF、 Chain of Responsibility

考题 Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate

考题 A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()A、 Front Controller and Transfer ObjectB、 Front Controller and Service LocatorC、 Business Delegate and Transfer ObjectD、 Business delegate and Intercepting FilterE、 Model-View-Controller and Intercepting Filter

考题 Company.com has a six-node concurrent resource group with an application that is accessed by  a web connection to the cluster nodes. How is the workload moved to another cluster node during a node failure?()  A、 The concurrent application must control the web interface through application monitoring.B、 A second resource group will be required to move the web application and IP label to a new node during a node failure.C、 The concurrent resource group can support multiple IP labels through IP aliasing so all IP labels are defined in the concurrent resource group.D、 The dynamic node priority facility in HACMP will relocate the web application and the IP label,if it is correctly defined in the application start and stop script.

考题 Company.com has a database application and a Web server application running on the same p5-570 server in a single partition. Recently there have been a number of instances where the increased load on the database server has impacted the performance of the Web server. What can the technical specialist recommend to keep the database application from impacting the performance of the Web server?()A、Create a VLAN between the web server and database server.B、Purchase APV and install the VIOS.C、Increase the priority of the Web server.D、Create separate LPARs for Web and database workloads.

考题 The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A、Transfer ObjectB、Front ControllerC、Service LocatorD、Intercepting FilterE、Business DelegateF、Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

考题 You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

考题 单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()A Start the default Web site.B Start the IIS Admin Service.C Run the IPconfig /registerdns command.D In the default Web site properties,disable the host header setting.

考题 单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Model-View-Controller

考题 单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Business Delegate

考题 多选题A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()AProxyBView HelperCFront ControllerDSession FacadeEBusiness DelegateFModel-View-Controller

考题 单选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()A Configure the Windows Authentication setting to Enabled.B Configure the Forms Authentication setting to Enabled by using all the default settings.C Configure the ASP.NET State service to log on to the new local user account by using the Services console.D Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

考题 单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A Transfer ObjectB Front ControllerC Service LocatorD Intercepting FilterE Business DelegateF Model-View-Controller

考题 单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A GetcreationtimeB InvalidateafterC GetlastaccessedtimeD Getmaxinactiveinterval

考题 单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A  The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB  The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC  The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD  The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.

考题 单选题A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier.  Which design pattern provides a means to manage the uncertainty in the API?()A  View HelperB  Front ControllerC  Composite ViewD  Intercepting FilterE  Business DelegateF  Chain of Responsibility

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A Transfer ObjectB Service LocatorC Intercepting FilterD Business Delegate

考题 多选题A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()AProxyBView HelperCFront ControllerDSession FaçadeEBusiness DelegateFModel-View-Controller

考题 单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()A Add a new managed handler to the Contoso Intranet Web site.B Add a new managed handler for the specific Web application that requires it.C Add a new module mapping to the Contoso Intranet Web site.D Add a new module mapping for the specific Web application that requires it.

考题 多选题A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()AInclude a listener directive in a JSP pageBconfigure a listener in the TLD file using the  elementCInclude a  element in the web application deployment descriptorDconfigure a listener in the application deployment descriptor, using the  elementEInclude a class implementing ServletContextListener as part of the web application deploymen

考题 单选题During a planning meeting, Company.com indicates that they intend to make a relational  Database highly available. The application has a pre-requisite that a kernel extension be loaded from /etc/inittab.  How would this be managed in an HACMP environment?()A  It can be started with a crontab entry.B  It can be created as an Application Server.C  It can be added to a resource group as a dependency.D  It cannot be done because HACMP provides no method to order application start/stop scripts.

考题 单选题You work as an application developer at Certkiller .com. You have recently created a multithreaded application to manage Certkiller .com’s inventory system.  The fulfillment task has to be executed on a regular basis, while other tasks are performed in the application. The task does not need any input to start.  You are required to create and start the fulfillment thread using the appropriate code.What code should you use?()A AB BC CD D