网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You have a use case in your web application that adds several session-scoped attributes. At the end of theuse case, one of these objects, the manager attribute, is removed and then it needs to decide which of theother session-scoped attributes to remove. How can this goal be accomplished?()
- A、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the removeAttribute method on the appropriate session attributes.
- B、The object of the manager attribute should implement the HttpSessionListener and it should call the removeAttribute method on the appropriate session attributes.
- C、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the deleteAttribute method on the appropriate session attributes.
- D、The object of the manager attribute should implement the HttpSessionListener and it should call the deleteAttribute method on the appropriate session attributes.
参考答案
更多 “ You have a use case in your web application that adds several session-scoped attributes. At the end of theuse case, one of these objects, the manager attribute, is removed and then it needs to decide which of theother session-scoped attributes to remove. How can this goal be accomplished?()A、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the removeAttribute method on the appropriate session attributes.B、The object of the manager attribute should implement the HttpSessionListener and it should call the removeAttribute method on the appropriate session attributes.C、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the deleteAttribute method on the appropriate session attributes.D、The object of the manager attribute should implement the HttpSessionListener and it should call the deleteAttribute method on the appropriate session attributes.” 相关考题
考题
Which of the following conditions will make a relation that is in first normal form. to be in second normal form?Ⅰ.every non-key attribute is functionally dependent on the full set of primary key attributes.Ⅱ.no non-key attributes exist in the relation.Ⅲ.the primary key consists of only one attribute.A.Ⅰ onlyB.Ⅰ and Ⅱ onlyC.Ⅰ and Ⅲ onlyD.any of them
考题
Your network consists of a single Active Directory domain.The domain contains more than 300 group objects. The group objects are divided between several regional organizational units (OUs).You need to create a list of all groups that have names that begin with the word Sales.Which command should you use? ()A. Dsget groupB. Dsquery groupC. Netdom queryD. Net group
考题
You run a Windows Defender scan on your computer system. The scan identifies one of your applications as having potentially unwanted behavior. You need to continue to use the application. You also need to stop Windows Defender from alerting you about this application.Which Windows Defender option should you use?()A.AB.BC.CD.D
考题
A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()A、ProxyB、View HelperC、Front ControllerD、Session FacadeE、Business DelegateF、Model-View-Controller
考题
You include the calendar class in your Hotel Booking application. Which additional form level objects will you need to create to implement this reusable component fully?()A、Blocks B、Visual attributes. C、Stacked canvas. D、Nothing further needs to be created.
考题
Your web application requires the adding and deleting of many session attributes during a complex usecase. A bug report has come in that indicates that an important session attribute is being deleted too soonand a NullPointerException is being thrown several interactions after the fact. You have decided to create asession event listener that will log when attributes are being deleted so you can track down when theattribute is erroneously being deleted. Which listener class will accomplish this debugging goal?()A、Create an HttpSessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getName method on the event object.B、Create an HttpSessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getName method on the event object.C、Create an SessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getAttributeName method on the event object.D、Create an SessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getAttributeName method on the event object.
考题
A session-scoped attribute is stored by a servlet, and then that servlet forwards to a JSP page. Which threejsp:useBean attributes must be used to access this attribute in the JSP page?()A、idB、nameC、beanD、typeE、scope
考题
One of the use cases in your web application uses many session-scoped attributes. At the end of the usecase,you want to clear out this set of attributes from the session object. Assume that this static variableholds this set of attribute names: 201.private static final Set USE_CASE_ATTRS; 202.static { 203.USE_CASE_ATTRS.add("customerOID"); 204.USE_CASE_ATTRS.add("custMgrBean"); 205.USE_CASE_ATTRS.add("orderOID"); 206.USE_CASE_ATTRS.add("orderMgrBean"); 207.} Which code snippet deletes these attributes from the session object?()A、session.removeAll(USE_CASE_ATTRS);B、for ( String attr : USE_CASE_ATTRS ) {session.remove(attr);}C、for ( String attr : USE_CASE_ATTRS ) {session.removeAttribute(attr);}D、for ( String attr : USE_CASE_ATTRS ) {session.deleteAttribute(attr);}E、session.deleteAllAttributes(USE_CASE_ATTRS);
考题
Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated in the servlet to the JSP for view generation.This information must NOT be accessible to any other servlet,JSP or session in the webapp. Which two techniques can you use to accomplish this goal?()A、Add attributes to the session object.B、Add attributes on the request object.C、Add parameters to the request object.D、Use the pageContext object to add request attributes.E、Add parameters to the JSP’s URL when generating the request dispatcher.
考题
Which the statement is true about web container session management()?A、 Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B、 To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C、 If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D、 The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar. Which two design patterns can be used together to refactor and simplify this web application? ()A、 ProxyB、 View HelperC、 Front ControllerD、 Session FaçadeE、 Business DelegateF、 Model-View-Controller
考题
You work as a database administrator for Supportcenter.cn. You want to administer your database servers, which are running on different host machines, using the Web-enabled grid control interface. You have configured the agent on the host machines. You have started the Oracle Database 10g Grid Control utility on your machine. Which two additional components would you configure to achieve this objective?()A、Application Server ControlB、Oracle Management ServiceC、Oracle Enterprise Manager RepositoryD、Oracle Enterprise Manager Database Control
考题
In which case would you use a FULL OUTER JOIN?()A、Both tables have NULL values.B、You want all unmatched data from one table.C、You want all matched data from both tables.D、You want all unmatched data from both tables.E、One of the tables has more data than the other.F、You want all matched and unmatched data from only one table.
考题
A customer needs to ensure that the number of threads servicing an application does not exceed the number of database connections available to the application. What step must you take to address this situation?()A、Configure a Max Threads Constraint and add your application to the list of applications for the Constraint.B、Configure a Work Manager with a Maximum Threads Constraint tied to the Connection Pool and configuration your application to use the Work Manager.C、Configure a Work Manager with a Minimum Threads Constraint tied to the Connection Pool and configure your application to use the Work Manager.D、Configure a global MaxThreads constraint and target it to the server or clusters where your application is deployed.E、Configure the startup parameter "-Dwls-maxThreads" to be the same as the number of database connections configured.
考题
You recently installed an application on your computer. The application is configured to automatically start. This application might cause your computer to run slower. You need to prevent the application from auto starting without uninstalling the application. What should you do?()A、Use the Microsoft Windows Task Manager application to end the task for the application.B、Use the Control Panel application to uninstall the application. Reboot the computer.C、Use the Software Explorer application to disable the application. Reboot the computer.D、Use the Services application to disable the Application Experience service, and then launch the application.
考题
You work as an ASP.NET Web Application Developer for SomeCompany. The company uses Visual Studio .NET 2010 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 4.0. The Web application comprises a class named Employee with properties named as First Name, Last Name, and Age. You add a Web page in which you get a list of Employee objects and display those objects in a GridView control. You are required to add code so that the GridView row is highlighted in red color if the age of the employee is less than 21 years. What will you do to accomplish this?()A、Use the RowCommand event of the GridView control.B、Use the SelectedlndexChanged event of the GridView control.C、Use the RowDataBound event of the GridView control.D、Use the RowEditing event of the GridView control.E、Use the RowUpdated event of the GridView control.
考题
Your network contains an Active Directory forest. The forest schema contains a custom attribute for user objects. You need to modify the custom attribute value of 500 user accounts. Which tool should you use()A、CsvdeB、DsmodC、DsrmD、Ldifde
考题
Your network consists of a single Active Directory domain. The domain contains more than 300 group objects. The group objects are divided between several regional organizational units (OUs). You need to create a list of all groups that have names that begin with the word Sales. Which command should you use? ()A、Dsget groupB、Dsquery groupC、Netdom queryD、Net group
考题
You have a single Active Directory directory service domain. You have an application that adds Active Directory Schema attributes during installation. The attributes replicate as part of global catalog replication. Your user account is a member of the Domain Admins, Schema Admins, and Enterprise Admins global groups. You test the application and decide not to deploy it to production. You need to ensure that the attributes that are added by the application are no longer available in Active Directory. Using the Active Directory Schema snap-in,what should you do?()A、 Clear the Index this attribute in the Active Directory option for each attribute that is added by the application.B、 Clear the Attribute is active option for each attribute that is added by the application.C、 Clear the Replicate this attribute to the Global Catalog option for each attribute that is added by the application.D、 Clear the Allow this attribute to be shown in advanced view option for each attribute that is added by the application.
考题
You have a server that runs Windows Server 2008. The server has the Web Server (IIS) server role installed. The server contains a Web site that is configured to use only Windows Authentication. You have a security group named Group1 that contains several user accounts. You need to prevent the members of Group1 from accessing a Web site. You must not prevent other users from accessing the Web site. Which Web site feature should you configure?()A、AuthenticationB、Authorization RulesC、IIS Manager PermissionsD、SSL Settings
考题
You work as an application developer at Certkiller .com. You are currently in the process of creating a class that stores data about Certkiller .com’s customers. Certkiller .com customers are assigned unique identifiers and various characteristics that may include aliases, shipping instructions, and sales comments. These characteristics can change in both size and data type. You start by defining the Customer class as shown below: public class Customer { private int custID; private ArrayList attributes; public int CustomerID { get {return custID;} } public Customer (int CustomerID) { this.custID = CustomerID; this.attributes = new ArrayList (); } public void AddAttribute (object att) { attributes.Add (att); } } You have to create the FindAttribute method for locating attributes in Customer objects no matter what the data type is.You need to ensure that the FindAttributemethod returns the attribute if found,and you also need to ensure type-safety when returning the attribute.What should you do?()A、 Use the following code to declare the FindAttribute method: public T FindAttribute (T att) {//Find attribute and return the value }B、 Use the following code to declare the FindAttribute method: public object FindAttribute (object att) {//Find attribute and return the value }C、 Use the following code to declare the FindAttribute method: public T FindAttribute (T att) {//Find attribute and return the value }D、 Use the following code to declare the FindAttribute method: public string FindAttribute (string att) {//Find attribute and return the value }
考题
You have a share on your local computer. Someone has been intentionally damaging your files. You want to be able to know which account is doing this. What do you do? ()A、Turn on auditing for objects in the Local Security Policy and Select 'Process Tracking'. B、Turn on auditing for objects in the Local Security Policy and Select 'Object Access'. C、Use Windows Explorer to turn on auditing for the specific files. D、Have the administrator for domains log you on as an administrator and enable auditing for a specific file. E、Turn on auditing for objects in the Local Security Policy and Select 'Account Management'. F、Allow only one account at a time to log on to your shared folder. Check the event viewer to see who logged on.
考题
多选题A session-scoped attribute is stored by a servlet, and then that servlet forwards to a JSP page. Which threejsp:useBean attributes must be used to access this attribute in the JSP page?()AidBnameCbeanDtypeEscope
考题
问答题Practice 1 You have read the following advertisement on the Morning Post, an English newspaper. Write an application letter to the hotel manager. Your letter should include: (1) reasons for your application (2) a request for an interview You should write approximately 100 words. Do not sign your own name at the end of your letter. Use “Wang Lin” instead. You do not need to write the address.
考题
问答题Practice 3 You have read the job advertisement below in a newspaper and you want to apply for the job. Write a letter of application to the manager of the company, Mr. Meed, giving all the necessary personal information. You should write approximately 100 words. Do not sign your own name at the end of your letter. Use“Wang Lin” instead. You do not need to write the address.
考题
单选题Which statement is true about web container session management?()A
Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B
To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C
If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D
The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
单选题You have a use case in your web application that adds several session-scoped attributes. At the end of theuse case, one of these objects, the manager attribute, is removed and then it needs to decide which of theother session-scoped attributes to remove. How can this goal be accomplished?()A
The object of the manager attribute should implement the HttpSessionBindingListener and it should call the removeAttribute method on the appropriate session attributes.B
The object of the manager attribute should implement the HttpSessionListener and it should call the removeAttribute method on the appropriate session attributes.C
The object of the manager attribute should implement the HttpSessionBindingListener and it should call the deleteAttribute method on the appropriate session attributes.D
The object of the manager attribute should implement the HttpSessionListener and it should call the deleteAttribute method on the appropriate session attributes.
热门标签
最新试卷