单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()ATransfer ObjectBFront ControllerCService LocatorDIntercepting FilterEBusiness DelegateFModel-View-Controller

单选题
The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()
A

Transfer Object

B

Front Controller

C

Service Locator

D

Intercepting Filter

E

Business Delegate

F

Model-View-Controller


参考解析

解析: 暂无解析

相关考题:

It has been decided that to be lawful merchandise, goods loaded under the charter-party must not only be such as can be loaded without breach of the law in force at the port of loading, but must also be such as can lawfully be carried and discharged at the ________ .A.port of dischargeB.port of sailingC.port of flagD.port of departure

___________where the sound laboratory9A.Has it decided; will buildB.Will it be decided; will be builtC.Has it been decided; will be builtD.Is it decided; is built

The voice VLAN feature has been enabled on a new Company Catalyst switch port.  What is the  effect of this? ()A、The CoS is trusted for 802.1P or 802.1Q tagged traffic.B、PortFast is disabled on the port.C、Port Security is automatically enabled on a voice VLAN port.D、Untagged traffic is sent according to the default CoS priority of the port.E、None of the other alternatives apply

EJB分为()三种类型A、会话bean、实体bean、Web serviceB、会话bean、实体bean、消息驱动beanC、Jsp、servlet、jsfD、实现类、Home接口类、Object接口类

A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier.  Which design pattern provides a means to manage the uncertainty in the API?()A、 View HelperB、 Front ControllerC、 Composite ViewD、 Intercepting FilterE、 Business DelegateF、 Chain of Responsibility

Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

Company.com has decided to implement virtual hosts in their web server. The current estimate is to create six virtual hosts with unique URL’s and IP addresses. The solution is going to use the IP aliasing faction in HACMP.  How many resource groups are required to support this configuration?()A、 1B、 2C、 6D、 7

The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A、Transfer ObjectB、Front ControllerC、Service LocatorD、Intercepting FilterE、Business DelegateF、Model-View-Controller

Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

单选题EJB分为()三种类型A会话bean、实体bean、Web serviceB会话bean、实体bean、消息驱动beanCJsp、servlet、jsfD实现类、Home接口类、Object接口类

单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A Transfer ObjectB Service LocatorC Intercepting FilterD Model-View-Controller

单选题A technician works for a company that has recently been affected by a virus. The virus entered the network by using port 6000. Port 6000 is used by an application located on a server. The technician has been asked to block this port on all servers and computers except for the one server which uses this port. Which of the following should the technician do?()AUpdate the antivirus applicationBInstall critical update security patchesCAdjust the software firewall settingsDReplace the current antivirus program

单选题The company has decided to sponsor the exhibition, ______ helps to promote its image.AthatBwhoCwhatDwhich

单选题Recently traffic to the company web server has more than doubled, resulting in slower response times from the server.  An administrator has decided to add a second, identical 10/100/1000 NIC to the server.  The server is presently connected to a 10/100/1000 switch, with four open ports on the switch.  Which of the following is the BEST solution to speed up web traffic?()AFree up more ports on the switchBEnable server load balancingCMove the second network adapter to a new subnetDEnable network adapter teaming

单选题The voice VLAN feature has been enabled on a new Company Catalyst switch port.  What is the  effect of this? ()AThe CoS is trusted for 802.1P or 802.1Q tagged traffic.BPortFast is disabled on the port.CPort Security is automatically enabled on a voice VLAN port.DUntagged traffic is sent according to the default CoS priority of the port.ENone of the other alternatives apply

多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A Transfer ObjectB Service LocatorC Intercepting FilterD Business Delegate

多选题The Company administrator has issue the "show vlan id 5" command.  What will this command  display? ()APorts in VLAN 5BUtilizationCVLAN information on port 0/5DFiltersEMTU and type

单选题Company.com has decided to implement virtual hosts in their web server. The current estimate is to create six virtual hosts with unique URL’s and IP addresses. The solution is going to use the IP aliasing faction in HACMP.  How many resource groups are required to support this configuration?()A 1B 2C 6D 7

单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()ATransfer ObjectBFront ControllerCService LocatorDIntercepting FilterEBusiness DelegateFModel-View-Controller

单选题Companycom wants to reduce the number of copper, Ethernet adapters on their 4 way p5 570 running AIX 5.3 used in each of the four LPARs. Companycom has one database LPAR, two application LPARs, and one web LPAR. Only the Web LPAR needs to communicate with the outside world. What is the minimum number of Ethernet adapters that should be provided to ensure redundancy and no single point of failure?()AOne single port Ethernet adapterBFour dual port Ethernet adaptersCTwo single port Ethernet adaptersDEight single port Ethernet adapters

单选题A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier.  Which design pattern provides a means to manage the uncertainty in the API?()A View HelperB Front ControllerC Composite ViewD Intercepting FilterE Business DelegateF Chain of Responsibility

单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()ATransfer ObjectBService LocatorCIntercepting FilterDBusiness Delegate

单选题A company needs to connect seven of their Windows-based servers to a DS4000 storage server.   The DS4000 only has two host-side connections, and each server has two HBAs.  Which of the following is the lowest cost solution to provide no single points of failure?()AImplement two 8-port switches design with ISLsBImplement two 16-port switches design with ISLsCImplement two 8-port switches design without ISLsDImplement two 16-port switches design without ISLs

多选题Your company named Contoso, Ltd. has a Network Load Balancing cluster named nlb.contoso.com. The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenly distributes HTTP traffic between both hosts.  You need to configure WEB2 to handle all HTTPS traffic for nlb.contoso.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2.  Which two actions should you perform?()AIn the properties for WEB2, change the Handling priority option for the TCP 443 port rule to the value of1.BIn the properties for WEB1, change the Handling priority option for the TCP 443 port rule to the value of 0.CIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Single host.DIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering mode option set to Multiple host and the Affinity option set to the value of Single.

多选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services,and configuring aweb services infrastructure. Your company has a Network Load Balancing cluster named nlb.wiikigo.com.The cluster hosts are named WEB1 and WEB2. The cluster is configured with a single port rule that evenlydistributes HTTP traffic between both hosts. WEB2 needs to be configured to handle all HTTPS traffic fornlb.wiikigo.com. You must retain the even distribution of HTTP traffic between WEB1 and WEB2. What should you do to achieve this?()AIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Single host.BIn the properties for WEB2, the Handling priority option for the TCP 443 port rule should be changed tothe value of 1.CIn the properties for WEB1, the Handling priority option for the TCP 443 port rule should be changed tothe value of 0.DIn the properties for the cluster, create a new port rule for port TCP 443 that has the Filtering modeoption set to Multiple host and the Affinity option set to the value of Single.