网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )
A

 Session Façade

B

 Business Delegate

C

 Data Access Object

D

 Model-View-Controller

E

 Chain of Responsibility


参考答案

参考解析
解析: 暂无解析
更多 “单选题A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )A  Session FaçadeB  Business DelegateC  Data Access ObjectD  Model-View-ControllerE  Chain of Responsibility” 相关考题
考题 Which statement is true about web container session management?()A、Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B、To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C、If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D、The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.

考题 A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller

考题 Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate

考题 A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A、 CommandB、 Transfer objectC、 Service locatorD、 Session FaçadeE、 Business delegateF、 Data access object

考题 A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

考题 A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate

考题 A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )A、 Session FaçadeB、 Business DelegateC、 Data Access ObjectD、 Model-View-ControllerE、 Chain of Responsibility

考题 多选题A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()ATransfer ObjectBService LocatorCFront ControllerDIntercepting FilterEBusiness Delegate

考题 单选题A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )A  Session FaçadeB  Business DelegateC  Data Access ObjectD  Model-View-ControllerE  Chain of Responsibility

考题 单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller

考题 多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A  FlyweightB  Transfer ObjectC  Service LocatorD  Dispatcher ViewE  Business DelegateF  Model-View-Controller

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Business Delegate

考题 单选题A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A  CommandB  Transfer objectC  Service locatorD  Session FaçadeE  Business delegateF  Data access object

考题 单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A  Transfer ObjectB  Service LocatorC  Front ControllerD  Intercepting FilterE  Business DelegateF  Model-View-Controller

考题 单选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()A Configure the Windows Authentication setting to Enabled.B Configure the Forms Authentication setting to Enabled by using all the default settings.C Configure the ASP.NET State service to log on to the new local user account by using the Services console.D Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

考题 单选题A developer is designing a web application that must support multiple interfaces,including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()A Session FacadeB Business DelegateC Data Access ObjectD Model-View-ControllerE Chain of Responsibility

考题 单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A Remote ProxyB Front ControllerC Service ActivatorD Intercepting FilterE Business Delegate

考题 多选题You are designing a Windows Azure application.   The application includes processes that communicate by using Windows Communications Foundation (WCF) services.  The WCF services must support streaming.  You need to recommend a host for the processes and a WCF binding.   Which two actions should you recommend?()AHost the processes in web roles.BHost the processes in worker roles.CUse NetTcpBinding for the WCF services.DUse WSHttpBinding for the WCF services.

考题 单选题Which statement is true about web container session management?()A Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.

考题 单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A  The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB  The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC  The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD  The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.

考题 单选题A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A Business Delegate and Transfer ObjectB Business Delegate and Service LocatorC Front Controller and Business DelegateD Intercepting Filter and Transfer Object

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A Transfer ObjectB Service LocatorC Intercepting FilterD Business Delegate

考题 单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A CommandB Transfer ObjectC Service LocatorD Session FacadeE Business Delegate

考题 多选题A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()AInclude a listener directive in a JSP pageBconfigure a listener in the TLD file using the  elementCInclude a  element in the web application deployment descriptorDconfigure a listener in the application deployment descriptor, using the  elementEInclude a class implementing ServletContextListener as part of the web application deploymen