A developer has 

题目

A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()

  • A、Facade
  • B、View Helper
  • C、Transfer Object
  • D、Intercepting Filter
  • E、Composite Facade
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()

  • A、Transfer Object
  • B、Session Facade
  • C、Intercepting Filter
  • D、Template Method
  • E、Model-View-Controller

正确答案:C

第2题:

You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()

  • A、 Use the ServiceBase class.
  • B、 Use the ServiceInstaller class.
  • C、 Use the ServiceManager class.
  • D、 Use the ServiceController class.

正确答案:D

第3题:

目前,具有代表性的CASE工具有______。

A.UNIFACE

B.Erwin

C.PowerBuilder

D.Developer2000


正确答案:B

第4题:

Where should a Developer go to freely manipulate inline style coding for an object?()

  • A、Design
  • B、Source
  • C、Properties
  • D、Controls

正确答案:B

第5题:

以下哪几项是Oracle客户端连接工具()

  • A、OEM
  • B、SQL*PLUS
  • C、NETCA
  • D、PLSQL DEVELOPER

正确答案:A,B,D

第6题:

You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()

  • A、 The HybridDictionary collection class.
  • B、 The HashTable collection class.
  • C、 The ListDictionary collection class.
  • D、 The StringCollection collection class.

正确答案:A

第7题:

Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system.  Which pattern can the developer use to solve this problem?()

  • A、 Transfer Object
  • B、 Service Locator
  • C、 Intercepting Filter
  • D、 Business Delegate

正确答案:D

第8题:

Rapid application development(RAD) systems purport to lighten the developer's(46)by making it easy to program an application with simple intuitive steps.RAD tools(47)the developer everything needed to construct a fully functional application quickly and easily. They make short work of modifying the developed product to(48)changes after the program is finished. Applications developed with RAD tools are constructed as they are envisioned. As an application's real usefulness(49), the developer armed with RAD tools should be able to(50)on new features with little fuss.

A.burden

B.trouble

C.task

D.weight


正确答案:A

第9题:

Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()

  • A、MANAGER can do a GET on resources in the /Bar/Baz directory.
  • B、MANAGER can do a POST on any resource in the /Bar/Baz directory.
  • C、MANAGER can do a TRACE on any resource in the /Bar/Baz directory.
  • D、DEVELOPER can do a GET on resources in the /Bar/Baz directory.
  • E、DEVELOPER can do only a POST on resources in the /Bar/Baz directory.
  • F、DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.

正确答案:A,C,D,F

第10题:

The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()

  • A、Transfer Object
  • B、Front Controller
  • C、Service Locator
  • D、Intercepting Filter
  • E、Business Delegate
  • F、Model-View-Controller

正确答案:C

更多相关问题