Assuming the tag library in the exhibit is imported with the prefix forum, which custom tag invocation produces a translation error in a JSP page?()
A.A
B.B
C.C
D.D
E.E
您可能感兴趣的试卷
你可能感兴趣的试题
A. authorization
B. data integrity
C. confidentiality
D. authentication
A. HTTP Basic Authentication
B. Form Based Authentication
C. HTTP Digest Authentication
D. HTTPS Client Authentication
B. <auth-metod>
C. <auth-constraint>
D. <form-login-config>
E. <user-data-constaint>
A. authorization
B. data integrity
C. confidentiality
D. authentication
A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.
Which two design patterns can be used together to refactor and simplify this web application? ()
A. Proxy
B. View Helper
C. Front Controller
D. Session Façade
E. Business Delegate
F. Model-View-Controller
A. It decreases complexity by removing a layer of proxy classes.
B. It reduces coupling between tiers by hiding implementation details.
C. It decreases performance due to the lack of caching of remote data.
D. It forces business-tier expectations to be dealt with in the presentation-tier.
Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance.
Which J2EE pattern can help with this performance issue?()
A. Transfer Object
B. Service Locator
C. Intercepting Filter
D. Model-View-Controller
A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.
Which design patterns, working together, address these issues?()
A. Front Controller and Transfer Object
B. Front Controller and Service Locator
C. Business Delegate and Transfer Object
D. Business delegate and Intercepting Filter
E. Model-View-Controller and Intercepting Filter
A Company.com developer is designing the presentation tier for a web application that relies on a complex session bean. The session bean is still being developed and the APIs for are NOT finalized. Any changes to the session bean API directly impacts the development of the presentation tier.
Which design pattern provides a means to manage the uncertainty in the API?()
A. View Helper
B. Front Controller
C. Composite View
D. Intercepting Filter
E. Business Delegate
F. Chain of Responsibility
A Company.com developer chooses to avoid using SingleThreadModel but wants to ensure that data is updated in a thread-safe manner.
Which two can support this design goal?()
A. Store the data in a local variable.
B. Store the data in an instance variable.
C. Store the data in the HttpSession object.
D. Store the data in the ServletContext object.
E. Store the data in the ServletRequest object.
最新试题
Given a JSP error page, which implicit object refers to the uncaught Throwable that resulted in th epage being invoked?()
For a given product instance, which three jsp:setProperty attributes must be used to initialized its properties form the HTML form? ()
A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user. The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()
A developer is designing a web application which extensively uses EJBs and JMS. The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides a solution for this problem?()
Within the web application deployment descriptor, which defines a valid JNDI environment entry()
Which the two are true regarding a web application class loader?()
What else must the developer do to ensure that the intended security goal is achieved()?
Which three are guaranteed to be valid for the element of a web application deployment descriptor?()
Which the three EL expressions, inserted at line 15, are valid and evaluate to "3"? ()
Which path, relative to a web application’s root, identifies the web application’s deployment descriptor?()