单选题When you are designing a Web application, which options define how rich text displays in a browser?()AUsing HTMLBUsing Java AppletCUsing AJAX ControlDUsing Best Fit for OS

单选题
When you are designing a Web application, which options define how rich text displays in a browser?()
A

Using HTML

B

Using Java Applet

C

Using AJAX Control

D

Using Best Fit for OS


参考解析

解析: 暂无解析

相关考题:

Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?() A.When using versions of Java technology earlier than 5.0.B.When sharing a StringBuffer among multiple threads.C.When using the java.io class StringBufferInputStream.D.When you plan to reuse the StringBuffer to build more than one string.

You would like to view all Fast Ethernet interfaces currently using VLAN tagging and the specific VLANs each interface is using.Which CLI command displays this information?() A.AB.BC.CD.D

When you are designing a Web application, which options define how rich text displays in a browser?()A、"Using HTML"B、"Using Java Applet"C、"Using AJAX Control"D、"Using Best Fit for OS"

You are using windows installer to deploy an application to 750 Windows 2000 Professional computers on your network. The network includes organizational unit (OU) named sales. A Group Policy object (GPO) is created for the Sales OU. You want to deploy that application in such a way that the shortcuts of that application should be created on the used desktop as well as in start-menu. When a user first click on the shortcut or try to open any file whose extension is associated with that application, then that application should automatically install on the computer. What should you do to accomplish this task?()A、Using GPO, publish that application at user levelB、Using GPO, assign that application at the user levelC、Using GPO, publish that application at computer levelD、Using GPO, assign that application at the computer level.

Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()A、 Adjust Path MTU attributes, using the no command.B、 Adjust the status queue size on the adapters, using the chdev command.C、 Adjust ipforwarding to enabled, using the no command.D、 Adjust tcp_maxburst to enabled, using the no command.

A Cluster Administrator is implementing a custom resource group for a new web application. The  goal is to ensure the resource group is always active. Preference should be given to the priority node at startup time,but fallback to the priority node should be scheduled during a nonbusy time.  Using custom resource group options, what combination best achieve the desired resource group behavior?()   A、 Online On All Available Nodes,using a setting timerB、 Online On Home Node Only,using a fallback timerC、 Online On Home Node Only,using both setting and fallback timersD、 Online On First Available Node,using both settling and fallback timers

A developer wants a web application to be notified when the application is about to be shut down. Which two actions are necessary to accomplish this goal?()A、Include a listener directive in a JSP pageB、configure a listener in the TLD file using the  elementC、Include a  element in the web application deployment descriptorD、configure a listener in the application deployment descriptor, using the  elementE、Include a class implementing ServletContextListener as part of the web application deploymen

You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5. When you access the application in a Web browser, you receive the following error message: "Service Unavailable".  You need to access the application successfully.  What should you do?()A、Start Microsoft IIS 6.0. B、Start the Application pool. C、Set the .NET Framework version. D、Add the Web.config file for the application.

Which activity supports the data integrity requirements of an application?()A、Using HTTPS as a protocolB、Using an LDAP security realmC、Using HTTP Basic authenticationD、Using forms-based authentication

Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()A、When using versions of Java technology earlier than 5.0.B、When sharing a StringBuffer among multiple threads.C、When using the java.io class StringBufferInputStream.D、When you plan to reuse the StringBuffer to build more than one string.

You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()A、You should consider using the healthMonitoring enabled="true"/ configuration.B、You should consider using the deployment retail="true"/ configuration.C、You should consider using the customErrors mode="On"/ configuration.D、You should consider using the trace enabled="true"/ configuration.

Certkiller.com has employed you as a system administrator. You are in the process of creating anASP.NET AJAX application using .NET Framework v3.5.  You receive an instruction from management to debug the JavaScript code in the application. Youthen attach Microsoft Visual Studio 2008 debugger to the Microsoft Internet Explorer instance. Youneed to make sure that the details of the client side object on the debugger console is displayedon the application.  What should you do?()A、This can be achieved using the Sys.Debug.fail method.B、This can be achieved using the Sys.Debug.traceDump method.C、This can be achieved using the Sys.Debug.trace method.D、This can be achieved using the Sys.Debug.assert method.

You are planning to migrate an existing web application to Windows Azure.  The application consists of an ASP.NET web application and a set of native Win32 Windows Services that provide data to the application by using named pipes. The Windows Services cannot be modified.  You need to recommend a strategy for migrating the application to Windows Azure.  What should you recommend?()A、 Define a Windows CommunicationFoundation (WCF) contract for the services.B、 Deploy each Windows Service to a separate worker role.  Deploy the ASP.NET application to a web role.C、 Deploy the application and Windows Services in a Windows Azure VM role.D、 Upload service binaries to a web role by using the Windows Azure Service Management API.

You want to enable users of a Web application to modify the Web application's UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code. What should you do?()A、Persist control data by using view state.B、Use Web Part controls.C、Maintain a profile for each user.D、Enable session state on the Web application.

You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A、Run ipconfig /flushdns at the command prompt. B、Reset the password for the local administrator user account. C、From the Internet Options in Internet Explorer, clear the AutoComplete history.D、From the Internet Options in Internet Explorer, delete the Temporary Internet Files.

You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?() A、Start the default Web site.B、Start the IIS Admin Service.C、Run the IPconfig /registerdns command.D、In the default Web site properties,disable the host header setting.

You develop a Web application. Your application contains two settings in the Web.config file. You deploy your application to production. You need to modify the application settings in the production environment without manually editing the XML markup in the Web.config file. What should you do? ()A、Modify the application settings by using the Web Site Administration Tool.B、Modify the application settings by using the Visual Studio property page editor for the project.C、Modify the application settings by using the resource editor.D、Modify the application settings by using the Visual Studio start options editor.

单选题Which can appropriately be thrown by a programmer using Java SE technology to create a desktop application?()AClassCastExceptionBNullPointerExceptionCNoClassDefFoundErrorDNumberFormatExceptionEArrayIndexOutOfBoundsException

单选题A Cluster Administrator is implementing a custom resource group for a new web application. The  goal is to ensure the resource group is always active. Preference should be given to the priority node at startup time,but fallback to the priority node should be scheduled during a nonbusy time.  Using custom resource group options, what combination best achieve the desired resource group behavior?()A Online On All Available Nodes,using a setting timerB Online On Home Node Only,using a fallback timerC Online On Home Node Only,using both setting and fallback timersD Online On First Available Node,using both settling and fallback timers

单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()ARun ipconfig /flushdns at the command prompt. BReset the password for the local administrator user account. CFrom the Internet Options in Internet Explorer, clear the AutoComplete history.DFrom the Internet Options in Internet Explorer, delete the Temporary Internet Files.

单选题You create a Microsoft ASP.NET application by using the Microsoft .NET Framework version 3.5.  When you access the application in a Web browser, you receive the following error message: "Service Unavailable".  You need to access the application successfully.  What should you do?()AStart Microsoft IIS 6.0.BStart the Application pool.CSet the .NET Framework version.DAdd the Web.config file for the application.

单选题Which of the following options would best help to reduce packet fragmentation for a TCP application transferring large amounts of data between servers across a path of multiple networks?()A Adjust Path MTU attributes, using the no command.B Adjust the status queue size on the adapters, using the chdev command.C Adjust ipforwarding to enabled, using the no command.D Adjust tcp_maxburst to enabled, using the no command.

单选题You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  An exception management framework is not used in the Web application. You need to ensure thatthe application log the unhandled exceptions automatically to the event log. You need to configurethe Web.config file to accomplish this. Identify the configuration that will assist you in thisscenario?()AYou should consider using the healthMonitoring enabled=true/ configuration.BYou should consider using the deployment retail=true/ configuration.CYou should consider using the customErrors mode=On/ configuration.DYou should consider using the trace enabled=true/ configuration.

单选题You want to schedule a job to rebuild all indexes on the SALES table after the completion of a bulk load operation. The bulk load operation must also be a scheduled job that executes as soon as the first file that contains data arrives on the system. How would you create these jobs?()ACreate both jobs by using events raised by the schedulerBCreate both jobs by using events raised by the applicationCCreate a job to rebuild indexes by using events arised by the application and then create another job to perform bulk load by using events raised by the schedulerDCreate a job to rebuild indexes by using events arised by the Scheduller and then create another job to perform bulk load by using events raised by the application

单选题You develop a Web application. Your application contains two settings in the Web.config file. You deploy your application to production. You need to modify the application settings in the production environment without manually editing the XML markup in the Web.config file. What should you do?()AModify the application settings by using the Web Site Administration Tool.BModify the application settings by using the Visual Studio property page editor for the project.CModify the application settings by using the resource editor.DModify the application settings by using the Visual Studio start options editor.

单选题You want to enable users of a Web application to modify the Web application's UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code. What should you do?()APersist control data by using view state.BUse Web Part controls.CMaintain a profile for each user.DEnable session state on the Web application.

单选题You are the desktop administrator for your company. Your company’s software developers use Windows XP Professional and IIS on their client computers to develop Web-based applications. All client computers use Microsoft Internet Explorer 6. 0 or later as their Web browser. One of the developers reports that he can no longer access the Web-based application on his desktop by using his Web browser. When you attempt to access the application by using your Web browser, you receive the following error message: “Cannot find server or DNS Error.” You verify that the World Wide Web Publishing Service is started on the developer’s computer. You also verify that you are using the correct URL to access the developer’s computer by using your Web browser. You need to ensure that the developer can access the Web application by using his Web browser. How should you configure the developer’s computer?()AStart the default Web site.BStart the IIS Admin Service.CRun the IPconfig /registerdns command.DIn the default Web site properties,disable the host header setting.

单选题When you are designing a Web application, which options define how rich text displays in a browser?()AUsing HTMLBUsing Java AppletCUsing AJAX ControlDUsing Best Fit for OS