站内搜索
SCDCD(310-081) 问题列表
问题 单选题Which thefollowingstatements about static inner classes is true?()A  An anonymous class can be declared as static.B  A static inner class cannot be a static member of the outer class.C  A static inner class does not require an instance of the enclosing class.D  Instance member of a static inner class can be referenced using the class name of the staticinner class.

问题 单选题Which interface must a class implement to be informed of a session creation event?()A  javax.servlet.http.HttpSessionListenerB  javax.servlet.http.HttpSessionBindingListenerC  javax.servlet.http.HttpSessionCreationListenerD  javax.servlet.http.HttpSessionActivationListener

问题 单选题Which the HTTP method represents a request for information about the supported methods on an HTTP server?()A  GETB  INFOC  HEADD  TRACEE  OPTIONS

问题 单选题Which is the valid identifier?()A  falseB  defaultC  _objectD  a-class

问题 单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A  Transfer ObjectB  Service LocatorC  Intercepting FilterD  Model-View-Controller

问题 单选题Which option prevents the exception thrown by my:errorProne from invoking the error page mechanism and outputs the message "File not found" in the response?()A AB BC CD DE E

问题 单选题} What is the result?()A  Compilation succeeds and 1 is printed.B  Compilation succeeds and 2 is printed.C  An error at line 8 causes compilation to fail.D  An error at line 14 causes compilation to fail.

问题 多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier clients and underlying business services.DIt can be added and removed unobtrusively, without requiring changes to existing  code.EIt allows preprocessing and postprocessing on the incoming requests and outgoing  responses.

问题 多选题For which three events can web application event listeners be registered? ()Awhen a session is createdBafter a servlet is destroyedCwhen a session has timed outDwhen a cookie has been createdEwhen a servlet has forwarded a requestFwhen a session attribute value is changed

问题 单选题Which HTTP method has the characteristic that multiple indential requests may produce side effect beyond those of a single request()?A  PUTB  GETC  INFOD  POSTE  HEADF  TRACE

问题 多选题A JSP page needs to instantiate a JavaBean to be used by only that page. Which two jsp:useBean attributes must be used to access this attribute in the JSP page?()AidBtypeCnameDclassEscopeFcreate

问题 多选题Given:  1. public class Method Over {  2. public void set Var (int a, int b, float c) {  3. }  4. }   Which two overload the set Var method()?Aprivate void set Var(int a, float c, int b) {}Bprotected void set Var(int a, int b, float c) {}Cpublic int set Var(int a, float c, int b) {return a:}Dpublic int set Var(int a, int b, float c) {return a:}Eprotected float set Var(int a, int b, float c) {return c:}

问题 单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A  Transfer ObjectB  Service LocatorC  Front ControllerD  Intercepting FilterE  Business DelegateF  Model-View-Controller

问题 单选题A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A  getCreationTimeB  invalidateAfterC  getLastAccessedTimeD  getMaxInactiveInterval

问题 多选题Which four types of object can be thrown using the throw statement?()AErrorBEventCObjectDExceptionEThrowableFRuntime Exception