网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()
A

Proxy

B

View Helper

C

Front Controller

D

Session Facade

E

Business Delegate

F

Model-View-Controller


参考答案

参考解析
解析: 暂无解析
更多 “多选题A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()AProxyBView HelperCFront ControllerDSession FacadeEBusiness DelegateFModel-View-Controller” 相关考题
考题 A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller

考题 Which the two are true regarding a web application class loader?()A、 A web application may override the web container’s implementation classesB、 A web application running in a J2EE product may override classes in the javax.* namespaceC、 A web application class loader may NOT override any classes in the java.* and javax.*  namespaceD、 Resources in the WAR class directory or in any of the JAR files within the library directory may  be accessed using the J2SE semantics of getResourceE、 Resources in the WAR class directory or in any of the JAR files within the library directory  cannot be accessed using the J2SE semantics of getResource

考题 Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate

考题 You are migrating a solution to Windows Azure.   The solution includes a web application and a business logic layer.  The web application runs on three dual-core servers.  The business logic layer runs on two quad-core servers.   The Windows Azure application must match or exceed the current hardware specifications.  You need to recommend role instance sizes that minimize cost.  What should you recommend?()A、 Small for the web application and Medium for the business logic layerB、 Small for the web application and Large for the business logic layerC、 Medium for the web application and Large for the business logic layerD、 Large for the web application and Extra Large for the business logic layer

考题 Which ONE of the following statements about Domino Enterprise server is true?()A、Can host Active Server Pages Web sitesB、Can host PHP Web sitesC、Includes a DB2 serverD、Includes an integrated Web application server

考题 The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A、Transfer ObjectB、Front ControllerC、Service LocatorD、Intercepting FilterE、Business DelegateF、Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

考题 You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

考题 You work as an application developer at Certkiller .com. You are currently in theprocess of reviewing an application that was created by a fellow developer.The application that you are reviewing includes a declaration for a collection named EmployeeList, which stores Employee objects. The declaration is shown below: public class EmployeeList : Enumerator, IEnumerable { // Class implementation } You require the ability to iterate through the EmployeeList with minimum development effort.What should you do?()A、 Utilize the switch statementB、 Utilize the dowhile statementC、 Utilize the foreach statementD、 Utilize the if statement

考题 You work as an ASP.NET Web Application Developer for SomeCompany. The company uses Visual Studio .NET 2010 as its application development platform. You have recently finished the development of an ASP.NET Web application using .NET Framework 4.0. Now, you are deploying the ASP.NET Web application to a remote server. You are required to select a deployment method that will make sure that all Internet Information Services (IIS) settings, in addition to the Web content, are deployed to the remote server. Which of the following deployment methods will you select to accomplish this?()A、Web Setup projectB、Web-based deploymentC、Deployment manifestD、Web Deployment Tool

考题 单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()A Start the default Web site.B Start the IIS Admin Service.C Run the IPconfig /registerdns command.D In the default Web site properties,disable the host header setting.

考题 单选题You work as an application developer at Certkiller .com. You have recently created an application that includes the code shown below. public delegate stringGetFileContentsDel (); public string GetFileContents () {  //Process file and return results }  You now need to invoke the GetFileContents method asynchronously.  You have to ensure that the code you use to invoke the GetFileContents method will continue to process other user instructions, and displays the results as soon as the GetFileContents method finishes processing.What should you do?()A AB BC CD D

考题 单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Business Delegate

考题 单选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()A Configure the Windows Authentication setting to Enabled.B Configure the Forms Authentication setting to Enabled by using all the default settings.C Configure the ASP.NET State service to log on to the new local user account by using the Services console.D Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

考题 多选题Which the two are true regarding a web application class loader?()AA web application may override the web container’s implementation classesBA web application running in a J2EE product may override classes in the javax.* namespaceCA web application class loader may NOT override any classes in the java.* and javax.*  namespaceDResources in the WAR class directory or in any of the JAR files within the library directory may  be accessed using the J2SE semantics of getResourceEResources in the WAR class directory or in any of the JAR files within the library directory  cannot be accessed using the J2SE semantics of getResource

考题 单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A Transfer ObjectB Front ControllerC Service LocatorD Intercepting FilterE Business DelegateF Model-View-Controller

考题 单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A GetcreationtimeB InvalidateafterC GetlastaccessedtimeD Getmaxinactiveinterval

考题 单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A  The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB  The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC  The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD  The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A Transfer ObjectB Service LocatorC Intercepting FilterD Business Delegate

考题 多选题A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()AProxyBView HelperCFront ControllerDSession FaçadeEBusiness DelegateFModel-View-Controller

考题 单选题You are a systems administrator responsible for securing a Windows Server 2008 Web server. You havecreated a new Web site called Contoso Intranet that will contain seven Web applications. One of theapplication developers has told you that her Web application requires a new request handler that isprocessed using a .NET library her team created. How can you meet these requirements while also maximizing security for the server?()A Add a new managed handler to the Contoso Intranet Web site.B Add a new managed handler for the specific Web application that requires it.C Add a new module mapping to the Contoso Intranet Web site.D Add a new module mapping for the specific Web application that requires it.

考题 单选题You are migrating a solution to Windows Azure.   The solution includes a web application and a business logic layer.  The web application runs on three dual-core servers.  The business logic layer runs on two quad-core servers.   The Windows Azure application must match or exceed the current hardware specifications.  You need to recommend role instance sizes that minimize cost.  What should you recommend?()A  Small for the web application and Medium for the business logic layerB  Small for the web application and Large for the business logic layerC  Medium for the web application and Large for the business logic layerD  Large for the web application and Extra Large for the business logic layer

考题 多选题A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()AInclude a listener directive in a JSP pageBconfigure a listener in the TLD file using the  elementCInclude a  element in the web application deployment descriptorDconfigure a listener in the application deployment descriptor, using the  elementEInclude a class implementing ServletContextListener as part of the web application deploymen

考题 单选题You work as an application developer at Certkiller .com. You have recently created a multithreaded application to manage Certkiller .com’s inventory system.  The fulfillment task has to be executed on a regular basis, while other tasks are performed in the application. The task does not need any input to start.  You are required to create and start the fulfillment thread using the appropriate code.What code should you use?()A AB BC CD D