网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
A
Transfer Object
B
Session Facade
C
Intercepting Filter
D
Template Method
E
Model-View-Controller
参考答案
参考解析
解析:
暂无解析
更多 “单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller” 相关考题
考题
Which statement is true about web container session management?()A、Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B、To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C、If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D、The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller
考题
Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate
考题
A developer is designing a web application which extensively uses EJBs and JMS. The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides a solution for this problem?()A、 CommandB、 Transfer objectC、 Service locatorD、 Session FaçadeE、 Business delegateF、 Data access object
考题
A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller
考题
A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller
考题
A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller
考题
A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate
考题
A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )A、 Session FaçadeB、 Business DelegateC、 Data Access ObjectD、 Model-View-ControllerE、 Chain of Responsibility
考题
You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.
考题
单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()A
Start the default Web site.B
Start the IIS Admin Service.C
Run the IPconfig /registerdns command.D
In the default Web site properties,disable the host header setting.
考题
多选题A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()ATransfer ObjectBService LocatorCFront ControllerDIntercepting FilterEBusiness Delegate
考题
单选题A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )A
Session FaçadeB
Business DelegateC
Data Access ObjectD
Model-View-ControllerE
Chain of Responsibility
考题
单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A
Transfer ObjectB
Session FacadeC
Intercepting FilterD
Template MethodE
Model-View-Controller
考题
多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.
考题
单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A
FlyweightB
Transfer ObjectC
Service LocatorD
Dispatcher ViewE
Business DelegateF
Model-View-Controller
考题
单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A
FlyweightB
Transfer ObjectC
Service LocatorD
Dispatcher ViewE
Business DelegateF
Model-View-Controller
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides a solution for this problem?()A
CommandB
Transfer objectC
Service locatorD
Session FaçadeE
Business delegateF
Data access object
考题
单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A
Transfer ObjectB
Service LocatorC
Front ControllerD
Intercepting FilterE
Business DelegateF
Model-View-Controller
考题
单选题A developer is designing a web application that must support multiple interfaces,including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()A
Session FacadeB
Business DelegateC
Data Access ObjectD
Model-View-ControllerE
Chain of Responsibility
考题
单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A
Remote ProxyB
Front ControllerC
Service ActivatorD
Intercepting FilterE
Business Delegate
考题
单选题Which statement is true about web container session management?()A
Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B
To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C
If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D
The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A
The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB
The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC
The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD
The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.
考题
单选题A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A
Business Delegate and Transfer ObjectB
Business Delegate and Service LocatorC
Front Controller and Business DelegateD
Intercepting Filter and Transfer Object
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A
CommandB
Transfer ObjectC
Service LocatorD
Session FacadeE
Business Delegate
考题
多选题A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()AInclude a listener directive in a JSP pageBconfigure a listener in the TLD file using the elementCInclude a element in the web application deployment descriptorDconfigure a listener in the application deployment descriptor, using the elementEInclude a class implementing ServletContextListener as part of the web application deploymen
热门标签
最新试卷