网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()

  • A、The stub will increase network traffic.
  • B、The Transfer Object will decrease data staleness.
  • C、The stub will increase the logic necessary in the JSPs.
  • D、In both cases, the JSPs can use EL expressions to get data.
  • E、Only the Transfer Object will need to use a Business Delegate.

参考答案

更多 “ You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()A、The stub will increase network traffic.B、The Transfer Object will decrease data staleness.C、The stub will increase the logic necessary in the JSPs.D、In both cases, the JSPs can use EL expressions to get data.E、Only the Transfer Object will need to use a Business Delegate.” 相关考题
考题 Angry customers tend to aim their dissatisfaction and complaints at staff members. If this happens to you, you should remember that they are actually expressing their dissatisfaction about the company and not about you as an individual. But if you wish to be successful in any business, then you have to learn how to handle angry customers. Listed below are a few guidelines to help you develop your own personal strategy for dealing with angry customers:Never argue back. You must stay calm and aim to satisfy the customer even in the most difficult situations. It is only by agreeing with their view point and suggesting a possible solution that you will resolve the situation and send the customer away happy.Use your ears more than your mouth. Make sure you listen more than you speak. By listening carefully, you will be able to understand why the customer is complaining, so that satisfactory steps can be taken.Show that you care: Use every opportunity to express your apology and understanding. You have to show that you will do everything within your power to try and resolve the situation. This exhibition of your concern will win the customer over. There will be a significant change in their behavior.Control your anger and be patient. Learn to relax and calm yourself. Having patience with your customers and with yourself will go a long way in winning over hostile customers.The above guidelines are very useful in helping you successfully tackle all kinds of difficult situations in life. If you follow them, you are on your way to succeeding in your career.21. Whom do angry customers tend to aim their dissatisfaction and complaints at?A. Staff members.B. Company managers.C. Those who accompany them.22. When a customer shouts rudely at you, you should().A. arg1e back and protect yourselfB. keep quiet and leave the customer aloneC. keep calm and listen carefully to the customer23. The underlined sentence “Use your ears more than your mouth” means().A. Your mouth is not more important for you than your ears.B. You should listen more than you speak.C. You should talk more than you listen.24. When dealing with an angry customer, which is NOT the right attitude?A. Be concerned.B. Be patient.C. Be amused.25. Which of the following statements is true according to the passage?A. When the customers complain, you neednt listen carefully.B. You neednt say sorry to those angry customers.C. You should relax yourself and try to understand the angry customers.

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

考题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A. from source-portB. from source-addressC. from destination-addressD. from destination-port

考题 资料:Early Experiences If you've communicated a positive initial impression and customers decide to explore your product, can they discover the features and functions that help get them up to speed? Does your interface provide clear, streamlined paths free of unnecessary instructions, distracting visual elements, or unneeded features or functionality? Finally, how well does your product help customers get the benefits they want, or even lead them to benefits they were unaware of? Testing helps determine if customers find the terminology clear and jargon-free; whether the page and content is organized logically from their perspective; if processes-such as registration, checkout or upgrading-are efficient and easy to use; and if it's clear how to cancel a process or navigate to a specific function or location. Maturity Over time, discovering shortcuts and advanced functionality will help mature customers do their jobs more quickly. You'll want to test how these options are communicated and ensure that they address the needs of these customers without impacting the experience of other customers. Unless you test with actual users, your product team won't get a true perspective about what your product is like to use by the people who matter most the users themselves. This may seem obvious, but in many organizations, approximate customers-such as salespeople-are sometimes used to review products. After all, they have a lot of customer contact. But salespeople don't have the same motivations or context as customers. At best, this approach is risky. When you test with real users, usability tests ensure that all product stakeholders get a realistic, honest view of your product's effectiveness. If you have never watched a customer use your product, you might be in for a surprise. "Obvious" product assumptions may be challenged, or you might find that customers think differently about what value means to them. Whatever you discover, you'll unearth information to develop products that are more likely to be ones that your customers value. Which of the following is true?A.You should separate new and mature customers in testing your products. B.Approximate customers are equally valuable as real users. C.Salespeople have a lot of customer contact, so they have the same motivations as customers D.Usability test aims to please the customers

考题 You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()A、from source-portB、from source-addressC、from destination-addressD、from destination-port

考题 You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior.  You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.  Which Windows Defender option should you use? ()A、IgnoreB、RemoveC、QuarantineD、Always Allow

考题 If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()A、Your deployment descriptor will need to contain this tag: CUSTOM.B、The related custom HTML login page must be named loginPage.html.C、When you use this type of authentication, SSL is turned on automatically.D、You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.E、In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.

考题 You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast

考题 You want to create a valid directory structure for your Java EE web application, and you want to put yourweb application into a WAR file called MyApp.war. Which two are true about the WAR file?()A、At deploy time, Java EE containers add a directory called META-INF directly into the MyApp directory.B、At deploy time, Java EE containers add a file called MANIFEST.MF directly into the MyApp directory.C、It can instruct your Java EE container to verify, at deploy time, whether you have properly configured your application’s classes.D、At deploy time, Java EE containers add a directory call META-WAR directly into the MyApp directory.

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

考题 If you create your database using Oracle Managed Files (OMF), what is true?()A、You must use Oracle predefined names to identify raw partitions that will hold OMF structures. B、You must define directories for two online redo log groups and three copies of the control file. C、If your CREATE DATABASE command fails, any OMF database files that have already been created will be dropped automatically. D、You must use only OMF data files when adding new tablespaces or data files to your database in the future.

考题 You plan to move data from a flat file to a table in your database. You decide to use SQL*Loader direct pathload method to perform this task. The table in which you plan to load data is an important table having variousintegrity constraints defined on it.  Which constraints will remain enabled by default during this operation()A、CHECKB、UNIQUEC、NOT NULLD、PRIMARY KEYE、FOREIGN KEY

考题 You are using flat files as the data source for one of your data warehousing applications. You plan to move the data from the flat file structures to an Oracle database to optimize the application performance. In your database you have clustered tables. While migrating the data, you want to have minimal impact on the database performance and optimize the data load operation. Which method would you use to load data into Oracle database?()A、use the external table populationB、use the Oracle Data Pump export and import utilityC、use the conventional path data load of SQL*Loader utilityD、use the direct path data load of Oracle export and import utility

考题 You work as a database administrator for Supportcenter.cn. You suspect that in one of your applications the customer table is being accessed by some unauthorized users. Which option would you use to monitor the queries being executed on the customer table?()A、Monitor thealert.logfileB、Enable server-side SQL tracing for user sessionsC、Enable fine-grained auditing for the customer tableD、Enable Fine-Grained Access Control (FGAC) for the customer tableE、Write a database trigger on the customer table on the SELECT event

考题 You observe that in your PROD database, customer information is being modified by some unauthorized users. You want to keep track of all of the transactions happening on the table using PL/SQL. Which type of PL/SQL subprogram or construct would you use to accomplish this task?()A、functionsB、packagesC、proceduresD、database triggersE、anonymous PL/SQL block

考题 Flashback Database is enabled in your Oracle 10g database. One of your database users erroneously purged an important table residing in his schema. The table was purged sometime between 10:00 P.M. and 10:30 P.M. The next day, you decide to flash back the database. Before you flash back the database, you want to ensure that you have all the necessary flashback data. Which dynamic performance view must you use to determine whether you have the required flashback data to recover the purged table?()A、 V$DATABASEB、 V$UNDOSTATC、 V$FLASHBACK_DATABASE_LOGD、 V$FLASHBACK_DATABASE_STAT

考题 You use Microsoft Visual Studio 2010 and Microsoft . NET Framework 4 to create a Windows Presentation Foundation (WPF) application. You create a WPF window in the application. You add the following code segment to the application. public class ViewModel { public CollectionView Data { get; set; } } public class BusinessObject { public string Name { get; set; } } The DataContext property of the window is set to an instance of the ViewModel class. The Data property of the ViewModel instance is initialized with a collection of BusinessObject objects. You add a TextBox control to the Window. You need to bind the Text property of the TextBox control to the Name property of the current item of the CollectionView of the DataContext object. You also need to ensure that when a binding error occurs, the Text property of the TextBox control is set to N/A . Which binding expression should you use?()A、{ Binding Path=Data/Name, FallbackValue='N/A' }B、{ Binding Path=Data.Name, FallbackValue='N/A' }C、{ Binding Path=Data/Name, TargetNullValue='N/A' }D、{ Binding Path=Data.Name, TargetNullValue='N/A' }

考题 Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A、 Create a FOR trigger. B、 Create an INSTEAD OF trigger. C、 Create an AFTER trigger. D、 Create a DDL trigger.

考题 多选题Some data storage and transfer media have fixed-length physical records.  When the data records are short, more then one can be stored in a single, physical record to use the storage space efficiently. Consider this data:   1119 Smith 1120 Yvonne 1121 Albert 1130 Thomas   Which two statements can you use to load the data into the EMP table?()AABBCCDD

考题 单选题You have 100 segments in the USERS tablespace. You get an alert that the USERS tablespace is running low on space. You decide to shrink some segments. Which option would you use to determine which segments to shrink?()A Segment Advisor B SQL Tuning Advisor C SQL Access Advisor D Segment Resource Estimation E Automatic Database Diagnostic Monitor (ADDM)

考题 问答题Directions:  Two months ago, you and some former classmates decided to go for an outing to the Summer Palace during the National Day holidays. As the organizer, you are to write an email message to remind the others of:  (1)when and where to meet,  (2)what to bring, and  (3)why they have to tell you in advance whether they will come.  Do not sign your own name at the end of the letter. Use “Li Ming” instead. You do not need to write the address.

考题 多选题You want to create a valid directory structure for your Java EE web application, and you want to put yourweb application into a WAR file called MyApp.war. Which two are true about the WAR file?()AAt deploy time, Java EE containers add a directory called META-INF directly into the MyApp directory.BAt deploy time, Java EE containers add a file called MANIFEST.MF directly into the MyApp directory.CIt can instruct your Java EE container to verify, at deploy time, whether you have properly configured your application’s classes.DAt deploy time, Java EE containers add a directory call META-WAR directly into the MyApp directory.

考题 单选题Your company uses a SQL Server 2005 database. Customer data from your trading partners is imported into the Customers table every night. You need to ensure that the customer record is updated if it already exists in the Customers table. If the record does not exist, the data needs to be inserted into the Customers table. What should you do?()A  Create a FOR trigger. B  Create an INSTEAD OF trigger. C  Create an AFTER trigger. D  Create a DDL trigger.

考题 多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates

考题 多选题You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()AThe stub will increase network traffic.BThe Transfer Object will decrease data staleness.CThe stub will increase the logic necessary in the JSPs.DIn both cases, the JSPs can use EL expressions to get data.EOnly the Transfer Object will need to use a Business Delegate.

考题 问答题Practice 3  Discussion—about 5 minutes  In this part of the test you are given a discussion topic. You have 30 seconds to look at the task promptly, an example of which is below, and then about three minutes to discuss the topic with your partner. After that the examiner will ask you more questions related to the topic.  For two candidates  Satisfaction Survey  The company you work for has conducted a satisfaction survey. We all know customer satisfaction is essential to the survival of our businesses.  You have been asked to find out whether customers are satisfied.  Discuss the situation together, and decide:  ● how to find out whether the customers are satisfied  ● what to ask in a customer satisfaction survey.

考题 多选题You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()AThe stub will increase network traffic.BThe Transfer Object will decrease data staleness.CThe stub will increase the logic necessary in the JSPs.DIn both cases, the JSPs can use EL expressions to get data.EOnly the Transfer Object will need to use a Business Delegate.