网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
A

Transfer Object

B

Session Facade

C

Intercepting Filter

D

Template Method

E

Model-View-Controller


参考答案

参考解析
解析: 暂无解析
更多 “单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller” 相关考题
考题 Which statement is true about web container session management?()A、Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B、To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C、If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D、The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.

考题 A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller

考题 Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate

考题 A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A、 CommandB、 Transfer objectC、 Service locatorD、 Session FaçadeE、 Business delegateF、 Data access object

考题 A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

考题 A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

考题 A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate

考题 A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )A、 Session FaçadeB、 Business DelegateC、 Data Access ObjectD、 Model-View-ControllerE、 Chain of Responsibility

考题 You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

考题 单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()A Start the default Web site.B Start the IIS Admin Service.C Run the IPconfig /registerdns command.D In the default Web site properties,disable the host header setting.

考题 多选题A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()ATransfer ObjectBService LocatorCFront ControllerDIntercepting FilterEBusiness Delegate

考题 单选题A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )A  Session FaçadeB  Business DelegateC  Data Access ObjectD  Model-View-ControllerE  Chain of Responsibility

考题 单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller

考题 多选题Which two about WAR files are true?()AWAR files must be located in the web application library directory.BWAR files must contain the web application deployment descriptor.CWAR files must be created by using archive tools designed specifically for that purpose.DThe web container must serve the content of any META-INF directory located in a WAR file.EThe web container must allow access to resources in JARs in the web application library directory.

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

考题 单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A  FlyweightB  Transfer ObjectC  Service LocatorD  Dispatcher ViewE  Business DelegateF  Model-View-Controller

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Business Delegate

考题 单选题A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A  CommandB  Transfer objectC  Service locatorD  Session FaçadeE  Business delegateF  Data access object

考题 单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A  Transfer ObjectB  Service LocatorC  Front ControllerD  Intercepting FilterE  Business DelegateF  Model-View-Controller

考题 单选题A developer is designing a web application that must support multiple interfaces,including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()A Session FacadeB Business DelegateC Data Access ObjectD Model-View-ControllerE Chain of Responsibility

考题 单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A Remote ProxyB Front ControllerC Service ActivatorD Intercepting FilterE Business Delegate

考题 单选题Which statement is true about web container session management?()A Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.

考题 单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A  The developer must ensure that every URL is properly encoded using the appropriate URL rewriting APIsB  The developer must provide an alternate mechanism for managing sessions and abandon theHttpSession mechanism entirelyC  The developer can ignore this issue. Web containers are required to support automatic URL rewriting when cookies are not supportedD  The developer must ass the string ?id= to the end of every URL to ensure that the conversion with the browser can continue.

考题 单选题A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()A Business Delegate and Transfer ObjectB Business Delegate and Service LocatorC Front Controller and Business DelegateD Intercepting Filter and Transfer Object

考题 单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A Transfer ObjectB Service LocatorC Intercepting FilterD Business Delegate

考题 单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A CommandB Transfer ObjectC Service LocatorD Session FacadeE Business Delegate

考题 多选题A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()AInclude a listener directive in a JSP pageBconfigure a listener in the TLD file using the  elementCInclude a  element in the web application deployment descriptorDconfigure a listener in the application deployment descriptor, using the  elementEInclude a class implementing ServletContextListener as part of the web application deploymen