多选题Which two are characteristics of the Front Controller pattern?()AIt simplifies remote interfaces to distributed objects.BIt promotes cleaner application partitioning and encourages reuse.CIt provides an initial point of contact for handling all related requests.DIt reduces maintainability due to the increased complexity of the design.EIt provides loosely coupled handlers that can be combined in various permutations.

多选题
Which two are characteristics of the Front Controller pattern?()
A

It simplifies remote interfaces to distributed objects.

B

It promotes cleaner application partitioning and encourages reuse.

C

It provides an initial point of contact for handling all related requests.

D

It reduces maintainability due to the increased complexity of the design.

E

It provides loosely coupled handlers that can be combined in various permutations.


参考解析

解析: 暂无解析

相关考题:

In an n-tier application, which two invocations are typically remote, not local?()A、JSP to Transfer ObjectB、Service Locator to JNDIC、Controller to request objectD、Transfer Object to Entity BeanE、Controller to Business Delegate

A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, because the business and resourcetiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing clientrequests. Which design patterns, working together, address these issues?()A、Front Controller and Transfer ObjectB、Front Controller and Service LocatorC、Business Delegate and Transfer ObjectD、Business Delegate and Intercepting Filter

Which two are characteristics of the Service Locator pattern?()A、It encapsulates component lookup procedures.B、It increases source code duplication and decreases reuse.C、It improves client performance by caching context and factory objects.D、It degrades network performance due to increased access to distributed lookup services.

A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()A、 Front Controller and Transfer ObjectB、 Front Controller and Service LocatorC、 Business Delegate and Transfer ObjectD、 Business delegate and Intercepting FilterE、 Model-View-Controller and Intercepting Filter

Which two are characteristics of the IS -IS protocol but not OSPF?()A、forms adjacencies with all neighborsB、supports demand circuit routingC、provides routing support for multiple network layer protocolsD、utilizes SPF algorithmE、provides for network scalability by allowing the network to be separated into areasF、three layers of hierarchical routing

The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()A、Transfer ObjectB、Front ControllerC、Service LocatorD、Intercepting FilterE、Business DelegateF、Model-View-Controller

Which two are characteristics of the Intercepting Filter pattern?()A、 it provides centralized request handling for incoming requests.B、 It forces resource authentication to be distributed across web components.C、 It reduces coupling between presentation-tier clients and underlying business services.D、 It can be added and removed unobtrusively, without requiring changes to existing  code.E、 It allows preprocessing and postprocessing on the incoming requests and outgoing  responses.

A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

Which the two are characteristics of the Service Locator pattern?()A、 It encapsulates component lookup proceduresB、 It increases source code duplication and decreases reuseC、 It improves client performance by caching context and factory objectsD、 It degrades network performance due to increased access to distributed lookup services

A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate

Which two are characteristics of the Front Controller pattern?()A、It simplifies remote interfaces to distributed objects.B、It promotes cleaner application partitioning and encourages reuse.C、It provides an initial point of contact for handling all related requests.D、It reduces maintainability due to the increased complexity of the design.E、It provides loosely coupled handlers that can be combined in various permutations.

Which two are characteristics of the Transfer Object design pattern?()A、It reduces network traffic by collapsing multiple remote requests into one.B、It increases the complexity of the remote interface by removing coarse-grained methods.C、It increases the complexity of the design due to remote synchronization and version control issues.D、It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.

多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier clients and underlying business services.DIt can be added and removed unobtrusively, without requiring changes to existing  code.EIt allows preprocessing and postprocessing on the incoming requests and outgoing  responses.

多选题Which the two are characteristics of the Service Locator pattern?()AIt encapsulates component lookup proceduresBIt increases source code duplication and decreases reuseCIt improves client performance by caching context and factory objectsDIt degrades network performance due to increased access to distributed lookup services

多选题What are two characteristics of GSS?()AIt helps verify end-to-end path availability.BIt provides traffic rerouting in case of disaster.CHSRP, GLBP, and VRRP can be clients of GSS.DBGP must be the routing protocol between the distributed data centers.EDNS responsiveness is improved by providing centralized domain management.

单选题A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, because the business and resourcetiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing clientrequests. Which design patterns, working together, address these issues?()AFront Controller and Transfer ObjectBFront Controller and Service LocatorCBusiness Delegate and Transfer ObjectDBusiness Delegate and Intercepting Filter

单选题On a series 1010 lightweight access point, the alarm led is flashing red, and all other leds are off. What is the lightweight access point indicating?()Ait has lost contact with controller.Bits ip address already exists.Cit requires a code upgrade.Dit is operating normally.

多选题Which two statements are true about Oracle Real Applications Insight ?()Ait provides enhanced visibility across the entire application infrastructureBit provides a set of management tools that enable automation of configuraionCit significantly increases the performance of Web-based applications with no code changeDit dramatically reduces costs associated with diagnostics, configuration, and deployment on production servers

多选题Which two are characteristics of the Transfer Object design pattern?()AIt reduces network traffic by collapsing multiple remote requests into one.BIt increases the complexity of the remote interface by removing coarse-grained methods.CIt increases the complexity of the design due to remote synchronization and version control issues.DIt increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.

多选题Which two are characteristics of the Service Locator pattern?()AIt encapsulates component lookup procedures.BIt increases source code duplication and decreases reuse.CIt improves client performance by caching context and factory objects.DIt degrades network performance due to increased access to distributed lookup services.

多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network

单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()AFlyweightBTransfer ObjectCService LocatorDDispatcher ViewEBusiness DelegateFModel-View-Controller

单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()ATransfer ObjectBSession FacadeCIntercepting FilterDTemplate MethodEModel-View-Controller

单选题A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()A Front Controller and Transfer ObjectB Front Controller and Service LocatorC Business Delegate and Transfer ObjectD Business delegate and Intercepting FilterE Model-View-Controller and Intercepting Filter