网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )
A
Session Façade
B
Business Delegate
C
Data Access Object
D
Model-View-Controller
E
Chain of Responsibility
参考答案
参考解析
解析:
暂无解析
更多 “单选题A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )A Session FaçadeB Business DelegateC Data Access ObjectD Model-View-ControllerE Chain of Responsibility” 相关考题
考题
Which statement is true about web container session management?()A、Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B、To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C、If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D、The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller
考题
Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate
考题
A developer is designing a web application which extensively uses EJBs and JMS. The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides a solution for this problem?()A、 CommandB、 Transfer objectC、 Service locatorD、 Session FaçadeE、 Business delegateF、 Data access object
考题
A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller
考题
A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller
考题
A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller
考题
A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate
考题
A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )A、 Session FaçadeB、 Business DelegateC、 Data Access ObjectD、 Model-View-ControllerE、 Chain of Responsibility
考题
多选题A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()ATransfer ObjectBService LocatorCFront ControllerDIntercepting FilterEBusiness Delegate
考题
单选题A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )A
Session FaçadeB
Business DelegateC
Data Access ObjectD
Model-View-ControllerE
Chain of Responsibility
考题
单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A
Transfer ObjectB
Session FacadeC
Intercepting FilterD
Template MethodE
Model-View-Controller
考题
多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.
考题
单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A
FlyweightB
Transfer ObjectC
Service LocatorD
Dispatcher ViewE
Business DelegateF
Model-View-Controller
考题
单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A
FlyweightB
Transfer ObjectC
Service LocatorD
Dispatcher ViewE
Business DelegateF
Model-View-Controller
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides a solution for this problem?()A
CommandB
Transfer objectC
Service locatorD
Session FaçadeE
Business delegateF
Data access object
考题
单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A
Transfer ObjectB
Service LocatorC
Front ControllerD
Intercepting FilterE
Business DelegateF
Model-View-Controller
考题
单选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application. The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server. You create a local user account and grant account rights and permissions to run the ASP.NET Web application. You need to configure authentication for the new Web site to support the Web application. What should you do?()A
Configure the Windows Authentication setting to Enabled.B
Configure the Forms Authentication setting to Enabled by using all the default settings.C
Configure the ASP.NET State service to log on to the new local user account by using the Services console.D
Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.
考题
单选题A developer is designing a web application that must support multiple interfaces,including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()A
Session FacadeB
Business DelegateC
Data Access ObjectD
Model-View-ControllerE
Chain of Responsibility
考题
单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A
Remote ProxyB
Front ControllerC
Service ActivatorD
Intercepting FilterE
Business Delegate
考题
多选题You are designing a Windows Azure application. The application includes processes that communicate by using Windows Communications Foundation (WCF) services. The WCF services must support streaming. You need to recommend a host for the processes and a WCF binding. Which two actions should you recommend?()AHost the processes in web roles.BHost the processes in worker roles.CUse NetTcpBinding for the WCF services.DUse WSHttpBinding for the WCF services.
考题
单选题Which statement is true about web container session management?()A
Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B
To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C
If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D
The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A
The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB
The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC
The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD
The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.
考题
单选题A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A
Business Delegate and Transfer ObjectB
Business Delegate and Service LocatorC
Front Controller and Business DelegateD
Intercepting Filter and Transfer Object
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A
CommandB
Transfer ObjectC
Service LocatorD
Session FacadeE
Business Delegate
考题
多选题A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()AInclude a listener directive in a JSP pageBconfigure a listener in the TLD file using the elementCInclude a element in the web application deployment descriptorDconfigure a listener in the application deployment descriptor, using the elementEInclude a class implementing ServletContextListener as part of the web application deploymen
热门标签
最新试卷