Which two are characteristics of the Service Locator pattern?()A、It encapsulates component lookup procedures.B、It increases source code duplication and decreases reuse.C、It improves client performance by caching context and factory objects.D、It degrades network performance due to increased access to distributed lookup services.

Which two are characteristics of the Service Locator pattern?()

  • A、It encapsulates component lookup procedures.
  • B、It increases source code duplication and decreases reuse.
  • C、It improves client performance by caching context and factory objects.
  • D、It degrades network performance due to increased access to distributed lookup services.

相关考题:

You are creating an application that consumes a Windows Communication Foundation (WCF) service. The service implements the IService contract. The client application contains the CallbackHandler class, which implements IServiceCallback.You need to ensure that a client proxy is created that can communicate with the service over a duplex channel.Which code segment should you use?()A.B.C.D.

following code segment.[ServiceContract]public interface ICustomerService{...}public class CustomerService : ICustomerService{...}The service is self-hosted in a console application. Older client applications access the service at http://contoso.com:8080/CustomerService/V1.Newer client applications access the service at http://contoso.com:8080/CustomerService/V2.You need to ensure that any client application can access the service at either address.Which code segment should you use?()A.B.C.D.

The distance between any two meridians measured along a parallel of latitude ______.A.increases in north latitude and decreases in south latitudeB.decreases as DLO increasesC.increases with increased latitudeD.decreases with increased latitude

Reusing frequencies in a cellular pattern (compared to “one big cell”)()A、Increases channel utilization, cost ,and interference.B、Increases capacity and cost, but decreases interference.C、Increases capacity, but decreases cost and interference.D、Increases capacity, cost, and interference.

Which is characteristic of the Business Delegate pattern?()A、 It decreases complexity by removing a layer of proxy classes.B、 It reduces coupling between tiers by hiding implementation details.C、 It decreases performance due to the lack of caching of remote data.D、 It forces business-tier expectations to be dealt with in the presentation-tier.

In an n-tier application, which two invocations are typically remote, not local?()A、JSP to Transfer ObjectB、Service Locator to JNDIC、Controller to request objectD、Transfer Object to Entity BeanE、Controller to Business Delegate

You are designing a DNS strategy to meet the business and technical requirements. Which two actions should you perform?()A、Create a dynamic reverse lookup zone for each subnet.B、Create a dynamic forward lookup for each domain.C、Install caching-only DNS servers in the branch offices.D、Enable the BIND secondaries option for each DNS server.

According to Ohm’s Law, which of the following is correct?()A、As voltage increases, resistance decreasesB、As amperage decreases, resistance decreasesC、As resistance decreases, amperage increasesD、As resistance increases, voltage increases

Which of the following performance tools will work with optimized code and also provides source statement profiling?()A、 profB、 gprofC、 kprofD、 tprof

Which two are characteristics of the Intercepting Filter pattern?()A、 it provides centralized request handling for incoming requests.B、 It forces resource authentication to be distributed across web components.C、 It reduces coupling between presentation-tier clients and underlying business services.D、 It can be added and removed unobtrusively, without requiring changes to existing  code.E、 It allows preprocessing and postprocessing on the incoming requests and outgoing  responses.

Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.  Which J2EE pattern can help with this performance issue?()A、 Transfer ObjectB、 Service LocatorC、 Intercepting FilterD、 Model-View-Controller

A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

Which the two are characteristics of the Service Locator pattern?()A、 It encapsulates component lookup proceduresB、 It increases source code duplication and decreases reuseC、 It improves client performance by caching context and factory objectsD、 It degrades network performance due to increased access to distributed lookup services

Which two are characteristics of the Front Controller pattern?()A、It simplifies remote interfaces to distributed objects.B、It promotes cleaner application partitioning and encourages reuse.C、It provides an initial point of contact for handling all related requests.D、It reduces maintainability due to the increased complexity of the design.E、It provides loosely coupled handlers that can be combined in various permutations.

Which two are characteristics of the Transfer Object design pattern?()A、It reduces network traffic by collapsing multiple remote requests into one.B、It increases the complexity of the remote interface by removing coarse-grained methods.C、It increases the complexity of the design due to remote synchronization and version control issues.D、It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.

Which statement is true regarding the Junos OS?()A、All platforms running the Junos OS have identical factory-default configurations.B、All platforms running the Junos OS use the IP2 processor for longest-match lookup.C、All platforms running the Junos OS use the same source code base.D、All platforms running the Junos OS use FXP1 for communication between control and forwarding planes.

Which two statements are true about Oracle ActiveCache ?()A、 it supports very large data-sets such as the result-sets from large search queries to be held in memoryB、 it provides a set of management tools that enables automation of configurationC、 it provides enhanced visibility across the entire application infrastructureD、 it significantly increases the performance of Web-based applications with no code change

You are designing a DNS Name resolution strategy for the client computer in the customer service department. What are the two possible ways to achieve the goal?()A、Create a reverse lookup zone in DNS for each new Domain.B、Add a WINS lookup record to the DNS forward lookup zone.C、Add a WINS reverse record to the DNS reverse lookup zone.D、Enable Dynamic updates for DownLevel client computers on each DHCP server.E、Install the Active Directory Client on All Computers in the Customer service department.

单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

多选题Which two statements are true about Oracle ActiveCache ?()Ait supports very large data-sets such as the result-sets from large search queries to be held in memoryBit provides a set of management tools that enables automation of configurationCit provides enhanced visibility across the entire application infrastructureDit significantly increases the performance of Web-based applications with no code change

多选题Which the two are characteristics of the Service Locator pattern?()AIt encapsulates component lookup proceduresBIt increases source code duplication and decreases reuseCIt improves client performance by caching context and factory objectsDIt degrades network performance due to increased access to distributed lookup services

多选题Which two are characteristics of the Transfer Object design pattern?()AIt reduces network traffic by collapsing multiple remote requests into one.BIt increases the complexity of the remote interface by removing coarse-grained methods.CIt increases the complexity of the design due to remote synchronization and version control issues.DIt increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.

单选题Which of the following performance tools will work with optimized code and also provides source statement profiling?()A profB gprofC kprofD tprof

多选题Which two are characteristics of the Service Locator pattern?()AIt encapsulates component lookup procedures.BIt increases source code duplication and decreases reuse.CIt improves client performance by caching context and factory objects.DIt degrades network performance due to increased access to distributed lookup services.

单选题According to Ohm’s Law, which of the following is correct?()AAs voltage increases, resistance decreasesBAs amperage decreases, resistance decreasesCAs resistance decreases, amperage increasesDAs resistance increases, voltage increases

单选题Which of the following best describes the thermodynamic effect on the pressure and volume relationship with regards to saturated gases?()AAs pressure decreases, volume increasesBAs volume increases, pressure increasesCAs volume decreases, pressure decreasesDAs pressure increases, volume increases

单选题Which is characteristic of the Business Delegate pattern?()A It decreases complexity by removing a layer of proxy classes.B It reduces coupling between tiers by hiding implementation details.C It decreases performance due to the lack of caching of remote data.D It forces business-tier expectations to be dealt with in the presentation-tier.