单选题The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()ATransfer ObjectBFront ControllerCService LocatorDIntercepting FilterEBusiness DelegateFModel-View-Controller

单选题
The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()
A

Transfer Object

B

Front Controller

C

Service Locator

D

Intercepting Filter

E

Business Delegate

F

Model-View-Controller


参考解析

解析: 暂无解析

相关考题:

Given:And MainClass exists in the /apps/com/company/application directory. Assume the CLASSPATHenvironment variable is set to . (current directory). Which two java commands entered at the command line will run MainClass?()A.java MainClass if run from the /apps directoryB.java com.company.application.MainClass if run from the /apps directoryC.java -classpath /apps com.company.application.MainClass if run from any directoryD.java -classpath . MainClass if run from the /apps/com/company/application directoryE.java -classpath /apps/com/company/application:. MainClass if run from the /apps directoryF.java com.company.application.MainClass if run from the /apps/com/company/application directory

A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()A、ProxyB、View HelperC、Front ControllerD、Session FacadeE、Business DelegateF、Model-View-Controller

Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Business Delegate

A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A、 CommandB、 Transfer objectC、 Service locatorD、 Session FaçadeE、 Business delegateF、 Data access object

Company.com has a six-node concurrent resource group with an application that is accessed by  a web connection to the cluster nodes. How is the workload moved to another cluster node during a node failure?()  A、 The concurrent application must control the web interface through application monitoring.B、 A second resource group will be required to move the web application and IP label to a new node during a node failure.C、 The concurrent resource group can support multiple IP labels through IP aliasing so all IP labels are defined in the concurrent resource group.D、 The dynamic node priority facility in HACMP will relocate the web application and the IP label,if it is correctly defined in the application start and stop script.

What is the new feature within 8.5.1 that allows a developer to remove malicious code from HTML?()A、Java Server Faces (JSF)B、Representational State Transfer (REST)C、Active Content Filtering (ACF)D、Notes Application Scrubber

A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A、CommandB、Transfer ObjectC、Service LocatorD、Session FacadeE、Business Delegate

The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A、Transfer ObjectB、Front ControllerC、Service LocatorD、Intercepting FilterE、Business DelegateF、Model-View-Controller

package com.company.application;  public class MainClass {  public static void main(String[] args) { }  }  And MainClass exists in the /apps/com/company/application directory. Assume the CLASSPATH environment variable is set to “.“ (current directory).  Which two java commands entered at the command line will run MainClass?()A、 java MainClass if run from the /apps directoryB、 java com.company.application.MainClass if run from the /apps directoryC、 java -classpath /apps com.company.application.MainClass if run from any directoryD、 java -classpath . MainClass if run from the /apps/com/company/application directoryE、 java -classpath /apps/com/company/application:. MainClass if run from the /apps directoryF、 java com.company.application.MainClass if run from the /apps/com/company/application directory

Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Model-View-Controller

Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()A、Transfer ObjectB、Service LocatorC、Intercepting FilterD、Business Delegate

Servlet A receives a request that it forwards to servlet B within another web application in the same web container. Servlet A needs to share data with servlet B and that data must not be visible to other servlets in A’s web application.  In which object can the data that A shares with B be stored?()A、 HttpSessionB、 ServletConfigC、 ServletContextD、 HttpServletRequestE、 HttpServletResponse

A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()A、 ProxyB、 View HelperC、 Front ControllerD、 Session FaçadeE、 Business DelegateF、 Model-View-Controller

You work as an application developer at Certkiller .com. You have recently created an application domain for Certkiller .com. A few weeks later you are asked to retrieve information from this application domain, which is the current application domain. What can you do to achieve this objective?()A、 Use the following code: AppDomain appInfo = ApplicationDomain.Current;B、 Use the following code: AppDomain appInfo = AppDomain.CurrentDomain ();C、 Use the following code: AppDomain appInfo = Thread.GetDomain ();D、 Use the following code: AppDomain appInfo = MainThread.GetDomain ();

You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()A、Configure the Windows Authentication setting to Enabled.B、Configure the Forms Authentication setting to Enabled by using all the default settings.C、Configure the ASP.NET State service to log on to the new local user account by using the Services console.D、Configure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

单选题You are developing an application that dynamically loads assemblies from an application directory. You need to write a code segment that loads an assembly named Company1.dll into the current application domain. Which code segment should you use?()A AB BC CD D

单选题You manage a server that runs Windows Server 2008. The server has the Web Server (IIS) role installed. The Web developer at your company creates a new Web site that runs an ASP.NET 3.0 Web application.  The ASP.NET Web application must run under a security context that is separate from any other ASP.NET application on the Web server.  You create a local user account and grant account rights and permissions to run the ASP.NET Web application.  You need to configure authentication for the new Web site to support the Web application. What should you do?()AConfigure the Windows Authentication setting to Enabled.BConfigure the Forms Authentication setting to Enabled by using all the default settings.CConfigure the ASP.NET State service to log on to the new local user account by using the Services console.DConfigure the ASP.NET Impersonation setting to Enabled. Edit the ASP.NET Impersonation setting by specifying the new local user account.

单选题Company.com has a six-node concurrent resource group with an application that is accessed by  a web connection to the cluster nodes. How is the workload moved to another cluster node during a node failure?()A The concurrent application must control the web interface through application monitoring.B A second resource group will be required to move the web application and IP label to a new node during a node failure.C The concurrent resource group can support multiple IP labels through IP aliasing so all IP labels are defined in the concurrent resource group.D The dynamic node priority facility in HACMP will relocate the web application and the IP label,if it is correctly defined in the application start and stop script.

多选题Given: And MainClass exists in the /apps/com/company/application directory. Assume the CLASSPATH environment variable is set to "." (current directory). Which two java commands entered at the commandline will run MainClass?()Ajava MainClass if run from the /apps directoryBjava com.company.application.MainClass if run from the /apps directoryCjava -classpath /apps com.company.application.MainClass if run from any directoryDjava -classpath . MainClass if run from the /apps/com/company/application directoryEjava -classpath /apps/com/company/application:. MainClass if run from the /apps directory

单选题Your company has an internal Web application that uses a self-signed SSL certificate.  The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application.    You need to ensure that Internet Explorer does not display the error message.   What should you do?()AIssue a certificate from the internal CA and install it on the application serverBInstall the Web application’s certificate into the computer store on each client computerCInstall the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerDPurchase a commercial certificate and install it on the internal CA

单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()ACommandBTransfer ObjectCService LocatorDSession FacadeEBusiness Delegate

单选题What is the new feature within 8.5.1 that allows a developer to remove malicious code from HTML?()AJava Server Faces (JSF)BRepresentational State Transfer (REST)CActive Content Filtering (ACF)DNotes Application Scrubber

单选题A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A CommandB Transfer objectC Service locatorD Session FaçadeE Business delegateF Data access object

单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()A Transfer ObjectB Service LocatorC Intercepting FilterD Business Delegate

单选题Servlet A receives a request that it forwards to servlet B within another web application in the same web container. Servlet A needs to share data with servlet B and that data must not be visible to other servlets in A’s web application.  In which object can the data that A shares with B be stored?()A HttpSessionB ServletConfigC ServletContextD HttpServletRequestE HttpServletResponse

单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A Transfer ObjectB Service LocatorC Intercepting FilterD Model-View-Controller

单选题Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly,the consultant created several dozen JSP pages that directly communicate with the database. The Squeakybusiness team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the newsystem. Which pattern can the developer use to solve this problem?()ATransfer ObjectBService LocatorCIntercepting FilterDBusiness Delegate