A developer has used this code within a servlet: 62.if(request.isUserInRole("vip")) { 63.// VIP-related logic here 64.} What else must the developer do to ensure that the intended security goal is achieved?()
第1题:
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
第2题:
You work as an application developer at Certkiller .com. Certkiller .com has asked you to develop an application that monitors and controls the activities of a Windows service.You need to use the appropriate class to meet Certkiller .com’s requirements. What should you do?()
第3题:
目前,具有代表性的CASE工具有______。
A.UNIFACE
B.Erwin
C.PowerBuilder
D.Developer2000
第4题:
Where should a Developer go to freely manipulate inline style coding for an object?()
第5题:
以下哪几项是Oracle客户端连接工具()
第6题:
You work as an application developer at Certkiller .com. Certkiller .com has been hired by a small local private school to develop a class library that will be used in an application named ManageAttendance for the purpose of managing student records.You are responsible for developing this class library. Certkiller .com has instructed you to create a collection in the application to store learners’ results. The school has informed you that they currently only have seven learners, but that this value will triple in the following year. Due to the limited resources, you need to ensure that the collection you create consumes a minimum amount of resources. What should you use to create the collection?()
第7题:
Squeaky Beans Inc. hired an outside consultant to develop their web application. To finish the job quickly, the consultant created several dozen JSP pages that directly communicate with the database. The Squeaky business team has since purchased a set of business objects to model their system, and the Squeaky developer charged with maintaining the web application must now refactor all the JSPs to work with the new system. Which pattern can the developer use to solve this problem?()
第8题:
Rapid application development(RAD) systems purport to lighten the developer's(46)by making it easy to program an application with simple intuitive steps.RAD tools(47)the developer everything needed to construct a fully functional application quickly and easily. They make short work of modifying the developed product to(48)changes after the program is finished. Applications developed with RAD tools are constructed as they are envisioned. As an application's real usefulness(49), the developer armed with RAD tools should be able to(50)on new features with little fuss.
A.burden
B.trouble
C.task
D.weight
第9题:
Given the security constraint in a DD:// 101.
第10题:
The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. Whilereviewing the application, a developer realizes that in multiple places within the current application, nearlyduplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicatecode?()