2008年9月15日星期一

Pass4side SUN 310-052考试题库分享(16-20)

16. Your web application requires access to several different services, so you created a Service Locator class to beused by the UI developers on the team. New services with different interfaces are occasionally added.Unfortunately, the caching benefits of the Service Locator class are NOT being realized because a new instance ofthis class is being created in every backing bean method that requires a service. Which pattern should you apply toeliminate this problem?A. BridgeB. SingletonC. PrototypeD. Factory MethodE. Business DelegateAnswer: B
17. What are two benefits of using the Value List Handler pattern? (Choose two.)A. improves network performanceB. facilitates exposing existing servicesC. provides an alternative to potentially inefficient EJB findersD. facilitates post-processing across heterogeneous requestsE. provides a mechanism to support shared elements of composite viewsAnswer: AC
18. What are two capabilities of the Abstract Factory pattern? (Choose two.)A. creates whole-part hierarchiesB. creates families of related objectsC. enforces dependencies between concrete classesD. specifies the types of objects to create using a sample instanceE. separates the construction of a complex object from its representationAnswer: BC
19. A teenage fashion web site, includes a set of pages for displaying and browsing their catalog, as well as pagesfor making fashion suggestions that also display tables of catalog entries. Currently, the JSP code uses scriptletsthat perform database SELECT statements and format the results in HTML tables. You have been hired to helpreduce the maintenance overhead when either the look is modified or the database schema changes. Which twopatterns, used together, do you apply to reduce this maintenance overhead? (Choose two.)A. View HelperB. Front ControllerC. Composite ViewD. Data Access ObjectAnswer: AD
20. A new security feature has been requested for an existing web application with the following requirements:All requests must be logged to a secure database.Each request must be time-stamped with the start and completion times.Each request must contain the IP address of the client that made the request.Which pattern is most applicable for this new feature?A. StrategyB. Front ControllerC. Abstract FactoryD. Intercepting FilterE. Model View ControllerAnswer: D
更多最新考试信息可登陆www.pass4side.cn网站查看!本文考试题库摘自pass4side.cn 更新时间:2008-9-11

没有评论: