网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()
A
GET
B
ASK
C
SEND
D
HEAD
E
TRACE
参考答案
参考解析
解析:
暂无解析
更多 “单选题A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A GETB ASKC SENDD HEADE TRACE” 相关考题
考题
The Web Browser is a simple program that enables a computer to(71)and view pages on the Web.A.downfallB.downgradeC.downwardD.download
考题
WWW is popular for its multimedia transmission and friendly(71). Although the speed of network has been improved considerably in recent years, the rapid(72)of using the Internet, the inherited character of delay in the network and the Request/Response working mode of WWW still make the Internet traffic very(73)and give no guarantee on the Quality of Service. Because HTTP has no states, the web server cannot know the users' demand and the users' requests cannot be predicted Taking advantage of a cache mechanism and the time locality of WWW accesses, the browser can preserve the documents ever accessed in the local machine. By this means, for the documents in the local cache, the browser does not need to send the requests to the remote server or to receive the whole responses from the remote one Pre-fetching uses the space locality of accesses First, the users' access requests are predicted according to the users' current request. Secondly, the expected pages are fetched into the local cache when the user is brow sing the current page. Finally, the users can access these pages downloaded from the local cache. And this can reduce the access delay to some degrees. Pre-fetching is one kind of active caches that can cache the pages which are still not requested by the user. The application of pre-fetching technology in the web can greatly reduce the waiting time after users have sent their requests. This paper brings forward an intelligent technique of web pre-fetching, which can speed up fetching web pages. In this technique, we use a simplified WWW data model to represent the data in the cache of web browser to mine the association rules. We store these rules in a knowledge base so as to(74)the user's actions. In the client sides, the agents are responsible for mining the users' interest and pre-fetching the web pages, which are based on the interest association repository. Therefore it is(75)for the users to speed up the browsing.A.interactiveB.interactionC.interactivityD.infection
考题
If you need to access information and know where it is on the Web, you only need to enter the entire www address into your browser’s Uniform. Resource Locator (URL) field.()
此题为判断题(对,错)。
考题
The Hypertext Transfer Protocol , the Web's ( ) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by (请作答此空) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.exchanging
B.changing
C.declining
D.removing
考题
The Hypertext Transfer Protocol , the Web's (请作答此空) protocol , is at the heart of the Web. HTTP is implemented in two programs : a ( ) program and a server program . The client program and server program executing on different end systems , talk to each other by ( ) HTTP messages . HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients . when a user ( ) a web page , the browser sends http request messages for the objects in the page to the server . The server ( ) the requests and responds with http response messages that contain the objects .A.transport-layer
B.application-layer
C.network-layer
D.link-layer
考题
The Hypertext Transfer Protocol,the Web's(请作答此空)protocol,is at the heart of the Web.HTTP is implemented in two programs:a( )program and a server program.The client program and server program executing on different end systems,talk to each other by( )HTTP messages.HTTP defines how Web clients request Web pages from servers and how servers transfer web pages to clients.when a user( )a web page,the browser sends http request messages for the objects in the page to the server.The server( )the requests and responds with http response messages that contain the objects.A.transport-layer
B.application-layer
C.network-layer
D.link-layer
考题
Which is the true choice about the web container request processing model()?A、 The init method on a filter is called the first time a servlet mapped to that filter is invokedB、 A filter defined for a servlet must always forward control to the next resource in the filter chain.C、 Filters associated with a named servlet are applied in the order they appear in the web application deployment descriptor fileD、 If the init method on a filter throws an UnavailableException, then the container will make no further attempt to execute it
考题
A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()A、They are using the wrong WEP key.B、They have been infected with malware.C、They have lost Internet connectivity.D、They need to update their network device drivers.
考题
You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A、GETB、PUTC、POSTD、SENDE、FORM
考题
A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate
考题
A web application is bound to the context named "/webapp" and the client uses the browser and makes a request to the resource http://server:port/webapp/ctxl/resource. Where do you place this resource inside the web application structure?()A、in the subdirectory /WEB-INF/ctxlB、in the subdirectory /META-INF/ctxlC、in the subdirectory /ctxl in the root of the archiveD、in the subdirectory /ctxl/resource in the root of the archiveE、in the root of the archive
考题
You need to design a certificate management process for internal users. What should you do?()A、Establish a Web enrollment service for internal users to request access to resourcesB、Grant Enrollment Agent rights to usersC、Establish enrollment stations and store user certificates in a smart cardD、Create Connection Manager scripts to identify the client computer operating system, and configure Web proxy settings to specify the appropriate Web enrollment service
考题
You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.
考题
单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()A
Start the default Web site.B
Start the IIS Admin Service.C
Run the IPconfig /registerdns command.D
In the default Web site properties,disable the host header setting.
考题
单选题A web browser need NOT always perform a complete request for a particular page that it suspects mightNOT have changed. The HTTP specification provides a mechanism for the browser to retrieve only a partialresponse from the web server; this response includes information, such as the Last-Modified date but NOTthe body of the page. Which HTTP method will the browser use to retrieve such a partial response?()A
GETB
ASKC
SENDD
HEADE
TRACE
考题
单选题A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()A
They are using the wrong WEP key.B
They have been infected with malware.C
They have lost Internet connectivity.D
They need to update their network device drivers.
考题
单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A
Remote ProxyB
Front ControllerC
Service ActivatorD
Intercepting FilterE
Business Delegate
考题
多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate
考题
单选题You are creating a Web application that will run on an intranet. The Web application reads comma-delimited text files. The text files reside in a subdirectory below the Web application's root directory. Users must not be able to navigate directly to these files in a Web browser unless they are members of the Accounting role. You need to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which form of authentication should you use?()A
AnonymousB
CertificateC
FormsD
Microsoft Windows Integrated Security
考题
多选题Your web application uses a simple architecture in which servlets handle requests and then forward to aJSP using a request dispatcher. You need to pass information calculated in the servlet to the JSP for view generation.This information must NOT be accessible to any other servlet,JSP or session in the webapp. Which two techniques can you use to accomplish this goal?()AAdd attributes to the session object.BAdd attributes on the request object.CAdd parameters to the request object.DUse the pageContext object to add request attributes.EAdd parameters to the JSP’s URL when generating the request dispatcher.
考题
单选题You are creating a web form with this HTML: 11. 12. 13. 14. 15. Which HTTP method is used when sending this request from the browser?()A
GETB
PUTC
POSTD
SENDE
FORM
考题
单选题You need to design a security solution for WEB1. Your solution must address the chief information officer’s concerns. What should you do?()A
Enable Web distributed Authoring and Versioning (WebDAV) components on WEB1B
Install and configure the URLScan ISAPI filter on WEB1C
Install a computer certificate on WEB1, and enable the Server (Request Security) IPSec policy on WEB1D
Configure the Web site redirection option on the properties of WEB1 in the Internet Service Manager console
考题
单选题A web application is bound to the context named "/webapp" and the client uses the browser and makes a request to the resource http://server:port/webapp/ctxl/resource. Where do you place this resource inside the web application structure?()A
in the subdirectory /WEB-INF/ctxlB
in the subdirectory /META-INF/ctxlC
in the subdirectory /ctxl in the root of the archiveD
in the subdirectory /ctxl/resource in the root of the archiveE
in the root of the archive
考题
单选题Which is the true choice about the web container request processing model()?A
The init method on a filter is called the first time a servlet mapped to that filter is invokedB
A filter defined for a servlet must always forward control to the next resource in the filter chain.C
Filters associated with a named servlet are applied in the order they appear in the web application deployment descriptor fileD
If the init method on a filter throws an UnavailableException, then the container will make no further attempt to execute it
考题
单选题The mariner must be the final judge of the reliance he can place on the information given in the Admiralty charts and other publications,since they().A
may always be complete and up-to-dateB
may not always be complete and up-to-dateC
may sometimes be complete and up-to-dateD
may not sometimes be complete and up-to-date
热门标签
最新试卷