网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

In an n-tier application, which two invocations are typically remote, not local?()

  • A、JSP to Transfer Object
  • B、Service Locator to JNDI
  • C、Controller to request object
  • D、Transfer Object to Entity Bean
  • E、Controller to Business Delegate

参考答案

更多 “In an n-tier application, which two invocations are typically remote, not local?()A、JSP to Transfer ObjectB、Service Locator to JNDIC、Controller to request objectD、Transfer Object to Entity BeanE、Controller to Business Delegate” 相关考题
考题 You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server.From which base type should your custom event type inherit? ()A. IWebEventCustomEvaluatorB. WebEventProviderC. WebBaseEventD. WebAuditEvent

考题 浏览器/服务器模式简称为() A、C/S模式B、B/S模式C、B/W/S模式D、N-Tier模式

考题 The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the ( 请作答此空) into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. functional requirements 功能需求 B. nonfunctional requirements 非功能需求 C. system constraint 系统约束 D. system operational environment 系统运行环境

考题 The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a (), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. (请作答此空 ) are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. Safety requirements 安全要求 B. Security requirements 安全要求 C. Data management requirements 数据管理要求 D. System requirements 系统要求

考题 The architecture design specifies the overall architecture and the placement of software and hardware that will be used. Architecture design is a very complex process that is often left to experienced architecture designers and consultants. The first step is to refine the () into more detailed requirements that are then employed to help select the architecture to be used and the software components to be placed on each device. In a ( ), one also has to decide whether to use a two-tier, three-tier, or n-tier architecture. Then the requirements and the architecturedesign are used to develop the hardware and software specification. There are four primary types of nonfunctional requirements that can be important in designing the architecture. () specify the operating environment(s) in which the system must perform and how those may change over time. () focus on the nonfunctional requirements issues such as response time, capacity, and reliability. () are the abilities to protect the information system from disruption and data loss, whether caused by an intentional act. Cultural and political requirements are specific to the countries in which the system will be used. A. client-based architecture 基于客户端的架构 B. server-based architecture 基于服务器的体系结构 C. network architecture 网络体系结构 D. client-server architecture 客户机服务器体系结构

考题 SecCenter的部署模式包括以下哪几种()A、1-Tier模式,简单、成本低,适合于中小型网络B、N-Tier模式,丰富、分层管理,适合大中型网络C、大型广域网络内部隔离

考题 You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()A、The stub will increase network traffic.B、The Transfer Object will decrease data staleness.C、The stub will increase the logic necessary in the JSPs.D、In both cases, the JSPs can use EL expressions to get data.E、Only the Transfer Object will need to use a Business Delegate.

考题 You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()A、IWeb Event Custom EvaluatorB、Web Event ProviderC、Web Base EventD、Web Audit Event

考题 You create a large, n-tier Web application that has a custom event tracking system. You need to create a custom event type that enables your event tracking system to record all relevant event details for all types of events. The events must be stored in Microsoft SQL Server. From which base type should your custom event type inherit? ()A、IWebEventCustomEvaluatorB、WebEventProviderC、WebBaseEventD、WebAuditEvent

考题 多选题You are designing an n-tier Java EE application. You have already decided that some of your JSPs willneed to get data from a Customer entity bean. You are trying to decide whether to use a Customer stubobject or a Transfer Object. Which two statements are true?()AThe stub will increase network traffic.BThe Transfer Object will decrease data staleness.CThe stub will increase the logic necessary in the JSPs.DIn both cases, the JSPs can use EL expressions to get data.EOnly the Transfer Object will need to use a Business Delegate.

考题 多选题In an n-tier application, which two invocations are typically remote, not local?()AJSP to Transfer ObjectBService Locator to JNDICController to request objectDTransfer Object to Entity BeanEController to Business Delegate