网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which is characteristic of the Business Delegate pattern?()
A
It decreases complexity by removing a layer of proxy classes.
B
It reduces coupling between tiers by hiding implementation details.
C
It decreases performance due to the lack of caching of remote data.
D
It forces business-tier expectations to be dealt with in the presentation-tier.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which is characteristic of the Business Delegate pattern?()A It decreases complexity by removing a layer of proxy classes.B It reduces coupling between tiers by hiding implementation details.C It decreases performance due to the lack of caching of remote data.D It forces business-tier expectations to be dealt with in the presentation-tier.” 相关考题
考题
which of the following is not considered a characteristic of london?A. The culturaI centre.B. The sports centre.C. The financial centre.D. The business centre.
考题
Which is characteristic of the Business Delegate pattern?()A、 It decreases complexity by removing a layer of proxy classes.B、 It reduces coupling between tiers by hiding implementation details.C、 It decreases performance due to the lack of caching of remote data.D、 It forces business-tier expectations to be dealt with in the presentation-tier.
考题
A developer is designing the presentation tier for a web application that relies on a complex session bean.The session bean is still being developed and the APIs for it are NOT finalized. Any changes to the sessionbean API directly impacts the development of the presentation tier. Which design pattern provides a meansto manage the uncertainty in the API?()A、View HelperB、Front ControllerC、Composite ViewD、Intercepting FilterE、Business Delegate
考题
In an n-tier application, which two invocations are typically remote, not local?()A、JSP to Transfer ObjectB、Service Locator to JNDIC、Controller to request objectD、Transfer Object to Entity BeanE、Controller to Business Delegate
考题
You are designing a password management solution to meet the business and technical requirements. Which two actions should you perform?hich two actions should you perform?()A、 Delegate the password management controls to the help desk staff.B、 Delegate the password management controls to the Domain Users group.C、 Configure the Default Domain Policy to enforce password expiration settings.D、 Configure the Default Domain Controller Policy to enforce password expiration settings.
考题
A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, because the business and resourcetiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing clientrequests. Which design patterns, working together, address these issues?()A、Front Controller and Transfer ObjectB、Front Controller and Service LocatorC、Business Delegate and Transfer ObjectD、Business Delegate and Intercepting Filter
考题
Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate
考题
A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests. Which design patterns, working together, address these issues?()A、 Front Controller and Transfer ObjectB、 Front Controller and Service LocatorC、 Business Delegate and Transfer ObjectD、 Business delegate and Intercepting FilterE、 Model-View-Controller and Intercepting Filter
考题
You might recommend a Cisco Integrated Services Router to a business with which characteristic?()A、 a high-bandwidth environment with applications such as IP videoB、 a predominantly telecommuter workforceC、 a robust LAN intrusion detection systemD、 the intention to upgrade from Cisco Unified Communications Manager Express to Cisco Unified Communications Manager
考题
A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A、 Business Delegate and Transfer ObjectB、 Business Delegate and Service LocatorC、 Front Controller and Business DelegateD、 Intercepting Filter and Transfer ObjectE、 Model-View-Controller and Intercepting Filter
考题
A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A、CommandB、Transfer ObjectC、Service LocatorD、Session FacadeE、Business Delegate
考题
A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()A、Transfer ObjectB、Service LocatorC、Front ControllerD、Intercepting FilterE、Business Delegate
考题
Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A、Transfer ObjectB、Service LocatorC、Intercepting FilterD、Business Delegate
考题
A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate
考题
A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A、Business Delegate and Transfer ObjectB、Business Delegate and Service LocatorC、Front Controller and Business DelegateD、Intercepting Filter and Transfer Object
考题
单选题According to the passage, which of the following is true?A
People in allocations are unwilling to conform to a general pattern.B
Conformity is a special characteristic of business.C
Businessmen are all original thinkers.D
Businessmen are provided with greater opportunities than people in other professions.
考题
单选题According to the growth pattern of Los Angeles, homes were mainly built _____.A
in the city centerB
along the main roadsC
around business districtsD
within the business districts
考题
单选题A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests. Which design patterns, working together, address these issues?()A
Front Controller and Transfer ObjectB
Front Controller and Service LocatorC
Business Delegate and Transfer ObjectD
Business delegate and Intercepting FilterE
Model-View-Controller and Intercepting Filter
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
单选题A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, because the business and resourcetiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing clientrequests. Which design patterns, working together, address these issues?()A
Front Controller and Transfer ObjectB
Front Controller and Service LocatorC
Business Delegate and Transfer ObjectD
Business Delegate and Intercepting Filter
考题
单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A
Remote ProxyB
Front ControllerC
Service ActivatorD
Intercepting FilterE
Business Delegate
考题
多选题In an n-tier application, which two invocations are typically remote, not local?()AJSP to Transfer ObjectBService Locator to JNDICController to request objectDTransfer Object to Entity BeanEController to Business Delegate
考题
单选题A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A
Business Delegate and Transfer ObjectB
Business Delegate and Service LocatorC
Front Controller and Business DelegateD
Intercepting Filter and Transfer ObjectE
Model-View-Controller and Intercepting Filter
考题
单选题A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A
Business Delegate and Transfer ObjectB
Business Delegate and Service LocatorC
Front Controller and Business DelegateD
Intercepting Filter and Transfer Object
考题
单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A
Transfer ObjectB
Service LocatorC
Intercepting FilterD
Business Delegate
考题
单选题Which is characteristic of the Business Delegate pattern?()A
It decreases complexity by removing a layer of proxy classes.B
It reduces coupling between tiers by hiding implementation details.C
It decreases performance due to the lack of caching of remote data.D
It forces business-tier expectations to be dealt with in the presentation-tier.
考题
单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A
CommandB
Transfer ObjectC
Service LocatorD
Session FacadeE
Business Delegate
考题
单选题A developer is designing the presentation tier for a web application that relies on a complex session bean.The session bean is still being developed and the APIs for it are NOT finalized. Any changes to the sessionbean API directly impacts the development of the presentation tier. Which design pattern provides a meansto manage the uncertainty in the API?()A
View HelperB
Front ControllerC
Composite ViewD
Intercepting FilterE
Business Delegate
热门标签
最新试卷