A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous busine

题目

A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()

  • A、 Business Delegate and Transfer Object
  • B、 Business Delegate and Service Locator
  • C、 Front Controller and Business Delegate
  • D、 Intercepting Filter and Transfer Object
  • E、 Model-View-Controller and Intercepting Filter

相似考题
更多“A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous busine”相关问题
  • 第1题:

    A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()

    • A、 Transfer Object
    • B、 Service Locator
    • C、 Front Controller
    • D、 Intercepting Filter
    • E、 Business Delegate
    • F、 Model-View-Controller

    正确答案:C

  • 第2题:

    A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()

    • A、 Flyweight
    • B、 Transfer Object
    • C、 Service Locator
    • D、 Dispatcher View
    • E、 Business Delegate
    • F、 Model-View-Controller

    正确答案:B

  • 第3题:

    A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()

    • A、Remote Proxy
    • B、Front Controller
    • C、Service Activator
    • D、Intercepting Filter
    • E、Business Delegate

    正确答案:B

  • 第4题:

    You work as an ASP.NET Web Application Developer for SomeCompany. The company uses Visual Studio .NET 2010 as its application development platform. You have recently finished the development of an ASP.NET Web application using .NET Framework 4.0. Now, you are deploying the ASP.NET Web application to a remote server. You are required to select a deployment method that will make sure that all Internet Information Services (IIS) settings, in addition to the Web content, are deployed to the remote server. Which of the following deployment methods will you select to accomplish this?()

    • A、Web Setup project
    • B、Web-based deployment
    • C、Deployment manifest
    • D、Web Deployment Tool

    正确答案:D

  • 第5题:

    You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()

    • A、Symmetric key encryption
    • B、Asymmetric key encryption
    • C、Certificate-based encryption
    • D、Transparent data encryption

    正确答案:A

  • 第6题:

    You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()

    • A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.
    • B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.
    • C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.
    • D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.

    正确答案:A

  • 第7题:

    A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()

    • A、Business Delegate and Transfer Object
    • B、Business Delegate and Service Locator
    • C、Front Controller and Business Delegate
    • D、Intercepting Filter and Transfer Object

    正确答案:B

  • 第8题:

    单选题
    A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()
    A

     Flyweight

    B

     Transfer Object

    C

     Service Locator

    D

     Dispatcher View

    E

     Business Delegate

    F

     Model-View-Controller


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()
    A

    Transfer Object

    B

    Service Locator

    C

    Front Controller

    D

    Intercepting Filter

    E

    Business Delegate


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    单选题
    A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()
    A

     Business Delegate and Transfer Object

    B

     Business Delegate and Service Locator

    C

     Front Controller and Business Delegate

    D

     Intercepting Filter and Transfer Object

    E

     Model-View-Controller and Intercepting Filter


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment.   The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application.   You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort.   What should you do?  ()
    A

     Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.

    B

     Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.

    C

     Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.

    D

     Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()
    A

     Front Controller and Transfer Object

    B

     Front Controller and Service Locator

    C

     Business Delegate and Transfer Object

    D

     Business delegate and Intercepting Filter

    E

     Model-View-Controller and Intercepting Filter


    正确答案: E
    解析: 暂无解析

  • 第13题:

    A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()

    • A、Transfer Object
    • B、Service Locator
    • C、Front Controller
    • D、Intercepting Filter
    • E、Business Delegate

    正确答案:C,D

  • 第14题:

    A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()

    • A、Flyweight
    • B、Transfer Object
    • C、Service Locator
    • D、Dispatcher View
    • E、Business Delegate
    • F、Model-View-Controller

    正确答案:B

  • 第15题:

    You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()

    • A、Configure a Linked Server connection to the application database.
    • B、Write a query that uses an OPENDATASOURCE command.
    • C、Write a query that uses an OPENQUERY command.
    • D、Configure a Remote Server connection to the application database.

    正确答案:B

  • 第16题:

    You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application requires frequent updates. You want to use the ClickOnce technology to distribute the application to Internet users. You need to ensure that the application is automatically updated without requiring user intervention. You also need to ensure that the users execute the most recent version of the application. What should you do when you publish the application? ()

    • A、 Use Install the application from a file share. Select the Application is available online and offline option.
    • B、 Use Install the application from CD-ROM or a DVD-ROM. Select the Application will not check for updates option.
    • C、 Use Install the application from a Web site. Select the Application is available online only option.
    • D、 Use Install the application from a Web site. Select the Application is available online and offline option.

    正确答案:C

  • 第17题:

    Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The  deployment must meet the following requirements:   èUsers must access the application from an icon on their desktops.   èUsers must have access to the application when they are not connected to the network. What should you do?()

    • A、Publish the application as a RemoteApp.
    • B、Publish the application by using Remote Desktop Web Access (RD Web Access).
    • C、Assign the application to the Remote Desktop Services server by using a Group Policy object (GPO).
    • D、Assign the application to all client computers by using a Group Policy object (GPO).

    正确答案:D

  • 第18题:

    You are designing a Windows Azure application that will store data in two SQL Azure databases. The application will insert data in both databases as part of a single logical operation.   You need to recommend an approach for maintaining data consistency across the databases.  What should you recommend?()

    • A、 Execute database calls on parallel threads.
    • B、 Wrap the database calls in a single transaction scope.
    • C、 Use Microsoft Distributed Transaction Coordinator (MSDTC).
    • D、 Handle errors resulting from the database calls by using compensatory logic.

    正确答案:D

  • 第19题:

    You are designing an automated deployment process for a Windows Azure application.   The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy.  What should you recommend?()

    • A、 Use the Service Management API to deploy the application package.
    • B、 Use the cspack and csrun command-line utilities and pass the cloud project as an argument.
    • C、 Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.
    • D、 Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.

    正确答案:A

  • 第20题:

    单选题
    You are designing a test plan for an existing Windows Azure .NET 4 application.  Method calls return incorrect results for certain input parameters.   You need to recommend an approach for debugging the method calls.  What should you recommend?()
    A

     Attach the remote debugger to the application.

    B

     Use the Microsoft Visual Studio 2010 Test Manager tool.

    C

     Use IntelliTrace to collect only eventsfrom the application.

    D

     Use IntelliTrace to collect events and call information from the application.


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    You are designing an automated deployment process for a Windows Azure application.   The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy.  What should you recommend?()
    A

     Use the Service Management API to deploy the application package.

    B

     Use the cspack and csrun command-line utilities and pass the cloud project as an argument.

    C

     Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.

    D

     Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()
    A

     Transfer Object

    B

     Service Locator

    C

     Front Controller

    D

     Intercepting Filter

    E

     Business Delegate

    F

     Model-View-Controller


    正确答案: A
    解析: 暂无解析

  • 第23题:

    单选题
    A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()
    A

    Flyweight

    B

    Transfer Object

    C

    Service Locator

    D

    Dispatcher View

    E

    Business Delegate

    F

    Model-View-Controller


    正确答案: B
    解析: 暂无解析