网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()

  • A、 Business Delegate and Transfer Object
  • B、 Business Delegate and Service Locator
  • C、 Front Controller and Business Delegate
  • D、 Intercepting Filter and Transfer Object
  • E、 Model-View-Controller and Intercepting Filter

参考答案

更多 “A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A、 Business Delegate and Transfer ObjectB、 Business Delegate and Service LocatorC、 Front Controller and Business DelegateD、 Intercepting Filter and Transfer ObjectE、 Model-View-Controller and Intercepting Filter” 相关考题
考题 An application is using WebLogic JMS Store and Forward to forward messages from a local JMS queue a remote WebLogic JMS destination. You need to determine if the messages are being  sent from the local Weblogic Server. Where do you find information and metrics about Store and Forward components in the WebLogic Admin Console?()A、JMS Persistent StoreB、JMS Server  C、JMS Distributed DestinationD、JMS Store and Forward  E、Automatic Service Migration

考题 You are designing a test plan for an existing Windows Azure .NET 4 application.  Method calls return incorrect results for certain input parameters.   You need to recommend an approach for debugging the method calls.  What should you recommend?()  A、 Attach the remote debugger to the application.B、 Use the Microsoft Visual Studio 2010 Test Manager tool.C、 Use IntelliTrace to collect only eventsfrom the application.D、 Use IntelliTrace to collect events and call information from the application.

考题 A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, because the business and resourcetiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing clientrequests. Which design patterns, working together, address these issues?()A、Front Controller and Transfer ObjectB、Front Controller and Service LocatorC、Business Delegate and Transfer ObjectD、Business Delegate and Intercepting Filter

考题 A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()A、 Front Controller and Transfer ObjectB、 Front Controller and Service LocatorC、 Business Delegate and Transfer ObjectD、 Business delegate and Intercepting FilterE、 Model-View-Controller and Intercepting Filter

考题 A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()A、Transfer ObjectB、Service LocatorC、Front ControllerD、Intercepting FilterE、Business Delegate

考题 A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

考题 A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate

考题 You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()A、Configure a Linked Server connection to the application database.B、Write a query that uses an OPENDATASOURCE command.C、Write a query that uses an OPENQUERY command.D、Configure a Remote Server connection to the application database.

考题 You work as an ASP.NET Web Application Developer for SomeCompany. The company uses Visual Studio .NET 2010 as its application development platform. You have recently finished the development of an ASP.NET Web application using .NET Framework 4.0. Now, you are deploying the ASP.NET Web application to a remote server. You are required to select a deployment method that will make sure that all Internet Information Services (IIS) settings, in addition to the Web content, are deployed to the remote server. Which of the following deployment methods will you select to accomplish this?()A、Web Setup projectB、Web-based deploymentC、Deployment manifestD、Web Deployment Tool

考题 You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application requires frequent updates. You want to use the ClickOnce technology to distribute the application to Internet users. You need to ensure that the application is automatically updated without requiring user intervention. You also need to ensure that the users execute the most recent version of the application. What should you do when you publish the application? ()A、Use Install the application from a file share. Select the Application is available online and offline option.B、Use Install the application from CD-ROM or a DVD-ROM. Select the Application will not check for updates option.C、Use Install the application from a Web site. Select the Application is available online only option.D、Use Install the application from a Web site. Select the Application is available online and offline option.

考题 You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()A、Symmetric key encryptionB、Asymmetric key encryptionC、Certificate-based encryptionD、Transparent data encryption

考题 Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()A、Publish the application as a RemoteApp.B、Publish the application by using Remote Desktop Web Access (RD Web Access).C、Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).D、Assign the application to all client computers by using a Group Policy object (GPO).

考题 You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

考题 You are designing a Windows Azure application that will store data in two SQL Azure databases. The application will insert data in both databases as part of a single logical operation.   You need to recommend an approach for maintaining data consistency across the databases.  What should you recommend?()A、 Execute database calls on parallel threads.B、 Wrap the database calls in a single transaction scope.C、 Use Microsoft Distributed Transaction Coordinator (MSDTC).D、 Handle errors resulting from the database calls by using compensatory logic.

考题 A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A、Business Delegate and Transfer ObjectB、Business Delegate and Service LocatorC、Front Controller and Business DelegateD、Intercepting Filter and Transfer Object

考题 You are designing an automated deployment process for a Windows Azure application.   The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy.  What should you recommend?()A、 Use the Service Management API to deploy the application package.B、 Use the cspack and csrun command-line utilities and pass the cloud project as an argument.C、 Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.D、 Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A  FlyweightB  Transfer ObjectC  Service LocatorD  Dispatcher ViewE  Business DelegateF  Model-View-Controller

考题 单选题You are designing a test plan for an existing Windows Azure .NET 4 application.  Method calls return incorrect results for certain input parameters.   You need to recommend an approach for debugging the method calls.  What should you recommend?()A  Attach the remote debugger to the application.B  Use the Microsoft Visual Studio 2010 Test Manager tool.C  Use IntelliTrace to collect only eventsfrom the application.D  Use IntelliTrace to collect events and call information from the application.

考题 多选题A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()ATransfer ObjectBService LocatorCFront ControllerDIntercepting FilterEBusiness Delegate

考题 单选题You are designing an automated deployment process for a Windows Azure application.   The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy.  What should you recommend?()A  Use the Service Management API to deploy the application package.B  Use the cspack and csrun command-line utilities and pass the cloud project as an argument.C  Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.D  Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.

考题 单选题A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A  Business Delegate and Transfer ObjectB  Business Delegate and Service LocatorC  Front Controller and Business DelegateD  Intercepting Filter and Transfer ObjectE  Model-View-Controller and Intercepting Filter

考题 单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A  Transfer ObjectB  Service LocatorC  Front ControllerD  Intercepting FilterE  Business DelegateF  Model-View-Controller

考题 单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()A  Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B  Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C  Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D  Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

考题 单选题A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()A  Front Controller and Transfer ObjectB  Front Controller and Service LocatorC  Business Delegate and Transfer ObjectD  Business delegate and Intercepting FilterE  Model-View-Controller and Intercepting Filter