Multiple choice

 

1, [mode] In the observer design pattern, misrepresentation, C, an observer can change the state of the observer, then the observer is notified by all observers based on a state observer. 2, Design Patterns] [an error is about to inherit, D, inherited essentially "white box reuse" of the parent class to be modified without affecting the subclasses. 3, specification development [behavior] daily work, which of the following changes in behavior, B, encountered non-essential areas of work. . To concentrate on their own projects. 4, [automated] zabbix monitoring system to monitor big promotion period, DNS client cache system how to deal with? B, open 5] [deployment architecture before and after the end of the separation architecture, static resources on which servers in general? B, nginx6, deployment architecture [] bear the following web server protection? D, waf7, system stability and security [] to see if the card server traffic, the general view of what platform? A, zabbix8, system stability and security [] command to view the current number of production redis, which can be viewed from the platform? D, promes9, system stability and security [] from which the platform can generate an application exception to supervise? B, cloud track 10, [automated] zabbix monitoring system to monitor big promotion period, the server expansion operation should comply with what rules? C, expansion to 11 filing, [automated] zabbix monitoring system to monitor big promotion period, the database backup operation how to deal with? D, according to the backup down or delay 12, [] depends on the design pattern abstraction, not depending on the particular. That is an interface for programming, not for the realization of programming, is () expression, D, rely on the principle of reverse 13 [SQL] is used to indicate the relationship between the entities is the database? A, Entity Relationship Diagram 14, unit testing [] the following basic skills unit testing is correct? B, refers to the smallest testable software unit checking and validation. 15, unit testing [base] ability Normally, only for the class to write unit tests with a certain business practices, the following description of the class it is necessary for unit testing? C, Business16, the ultimate goal [SQL] database design does not include B, meet the requirements paradigm 17] [SQL statement related data redundancy is correct? C, in database design stage, we must do our best possible to avoid data redundancy, data redundancy is best to do no 18] [SQL statement alter table user_info add constraint uq_userid After the unique (userid) is successful, () field added as user_info table () constraint. B, userid the sole 19, a student [SQL] can only be enrolled in a class, but a class can accommodate more students, the relationship between students and classes that? C, many-to-20, ER [SQL] FIG, set by the following relationship () is represented. C, a diamond 21, [] the following SQL table structure, beginning with a # represents the primary key, Order No. # # # Product Code () order number and product code is a combination of the primary key of the table of the highest symbol () paradigm. B, two 22, [] the following SQL table structure, beginning with a # represents the primary key, commodity code # # row order number, order number, product number, order quantity, the most significant symbol of the table () paradigm. C, three 23 [SQL] to establish the following database table Create table, in order to ensure that each employee employee is unique and can only belong to a table already exists in the department of department, the most effective approach is to ()? B, and set employeeld primary key, creating a foreign key in departld. 24, [SQL] In order to speed up the query speed table, the table should be the establishment of this (), D, index 25, [SQL] FIG ER converting process to the table, if there is many to many relationships, the usual practice (), B, association table in two entities, the decomposition of one-many relationship between two entities into one pair many relationships. 26, the user table design [SQL], fixed identification number 18, is preferably used for this field () data type, B, char27, the basic structure of the relational model [SQL] is (), A, 28 two-dimensional table, [system] release process management practices, and configure the appropriate alarm threshold, which is not a horizontal line in the quality of service monitoring content (), D, 29 disk space, [SQL] requires several stages of project development, database ER diagram should be drawn in ( ) stage, B, outline design 30, HTTP protocol [HTTP] commonly used method What? D, are above 31, HTTP protocol [] http protocol layer protocol is what? B, 32 application-layer protocol, HTTP protocol [] http status code, 301 what is the point? A, 33 permanent redirect, HTTP protocol [] argument about GET and POST error? A, poest can send data to the server 34, [mode] Open-Close design principle is the meaning of a software entity. A, should be open for extension, but closed for modification 35, design patterns [] "Do not talk to strangers" is () the principle of popular representation. D, Dimmit, a subject to deal with other objects as little as possible to understand 36 [Design Mode] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principle 37, project management [] in project management, project first clear what characteristics, the following () not project characteristics. Reversibility 38 D results, project management [] () function defined software developers must implement to meet the business needs. A, 39 functional requirements, [project management] in the course of the project "track progress" in, () is not content to deal with the progression below. D, the development of incentive systems 40, [project management] in the design of the project phased delivery plan, the following () can not be delivered as a separate stage. C, coding stage 41, the following [project management] () statement is wrong. D, software tracking software measurement is 42, [project management] needs analysis is completed when the (). D, submit a complete software requirements specification 43, [Design] In UML modeling, which is generally used in FIG UML following requirements describe software system (). C, with the embodiment of FIG. 44, [Design] Which of the following design pattern and the other three main object of different design patterns. B Template method pattern 45, [TCP / HTTP protocol] FTP protocol to provide () service. B, file transfer 46, unit testing [] following statements correct. D, statement coverage reached 100%, the branches (determined) to cover 47 should reach 100%, [unit] The following tests can not guarantee that the test unit (), D, development of the missing function 48, [] Design the following models and strategies on the template model description of the error is (). D, strategy pattern tended to problem-solving algorithm is defined as an interface, the specific problem-solving process by way of packaging their inheritance Ali 49, [Design] factory pattern is more commonly used design pattern that follows the design principles of the following ? B, open - closed principle 50,] [design patterns java exception handling mechanism which may be understood as a pattern of behavior. C, duty chain 51, [system release process management practices] service-end flow control threshold should ensure that normal business without flow control impact, the following flow-control is not correct (), B, core services and non-core services can be combined set the same flow control packet. 52, the system issuing process management specification [in] () can be protected by the system abnormality, the system takes too long to avoid a single service block, or a cascade formation. B, response time 53, the system issuing process management [] the following specification which is not a "non-core system can not rely on core system" specification (), B, a system 54 can be strongly dependent on three systems, process management system issues [Specification] for questions after the release of the upgrade failure and promptly rolled back, which is wrong (), B, where there is a greater impact issues after the release, and should be developed immediately to address this urgent issue version. 55, [the system] release process management practices for the "timely escalation of production failure" error is (), D, problems may occur early in the morning change does not comply with the specification. 56, the system issuing process management [Specification] Treatment abnormal, abnormal inhibition flag on the following principles which type (), B, a class of codes can be solved abnormality. 57, [cloud track] the following about the exception oversight say wrong is (), D, abnormal happened that day, that day if not in appearance by exception tag, it can be considered the exception 58, [cloud track] submit () Process access real-time trace log cloud platform. B, ITSM59, [cloud] If an interface top99 track response time of 10ms, the following interpretation correct yes. A, 99% request response time of less than 10ms. 60, track cloud] [(amount of codes & Call volume) relevant, on the basis of the data acquisition system described is not correct (). Monthly call volume D, are currently unable to obtain automatic, the user must manually maintain 61 per month, [cloud] track real-time log analysis application can retrieve Which of the following products cloud drift. D, real-time trace log cloud platform 62, [project management] of the following statements about software requirements analysis is not correct yes. A, software requirements analysis phase of the task is to describe the interface 63 between software architecture and related components, [project management] of the following statements about software requirements analysis is not correct yes. D, after the demand for change can delete the original requirements document 64, [project management] testing often used V model, you can start writing test cases from () phase. B, needs analysis 65, [automated] zabbix monitoring system for monitoring involves the entire center-level operating system configuration from the process, how to implement. B, change the transfer center 66, which design [Design] mode, style can not change the object itself, based on the added responsibilities to objects dynamically (method or property). B, decorator pattern 67, [Design] Which of the following design patterns, belongs to create design patterns? ABC, factory method pattern, abstract factory pattern, singleton 68 [Design] Which of the following design patterns suited to address dependencies between objects? D, 69 observer pattern, multiplicity] [Design UML the associated means. B, a real class class with another class can be associated with the class of the plurality of the solid 70, [zabbix monitoring system for monitoring automated] zabbix monitoring system, the following statement is false (). D, can not see the 7 days of historical data 71, [Design Mode] The following are the basic principles of object-oriented is (). C, Richter 72 substitution, [] the Observer design pattern (observer) mode is suitable. C, when an object must notify other objects, but it can not assume that anyone other objects Yes. 73, [project management] input cost estimates generally do not include which of the following. D, 74 standard quality, [project management] in the course of project implementation and closeout principal contradiction from what it is. A, Schedule 75, [project management] on the network diagram, which of the following is not true. C, a detailed view of network management time 76, the sorting algorithm] [Fibonacci number is usually represented by F (n), formed in sequence, is given n = 4, calculate F (4). B, 377, [] MYSQL index database which is used in the data structure. D, B + tree 78, [] redis redis Mining What data structure. A, jump Table 79, [TCP / IP] protocol on TCP / IP description, which is wrong. A, TCP / IP protocol is an application layer 80, [TCP / IP protocol - the TCP / IP reference model for the third layer (), (from top to bottom the word). D, transport layer 81 [SQL] DATETIME type field how much space is required. C, 8byte82, [SQL] when another user performs a LOCK TABLE A FOR WRITE, you can. D, none of the above can be 83 [ "SQL"] The following sample table tab1, perform the following sql in DB2, select id, job from old table correct yes. Record C, SQL statement executed successfully, and returns a delete statement delete. 84, [ "SQL"] Which of the following options can check out the table 'Persons' fields 'FirstName' to 'a' at the beginning of all records. A, SELECT * FROM Persons WHERE FirstName LIKE 'a% '85, application development and deployment [using] NJS Services (Suengine + WildFly), Suengine load the default policy WildFly Yes. A, Round Robin86, [ "Suning Appliance information system development processes and norms"] in the coding phase, some or all of the code code completion, in order to ensure timely detection of errors and poor performance coding problems and improve the quality of programming needed (). B, code review 87, [ "Suning Appliance Information Systems development processes and norms"] coding is complete, transfer the test needs to be developed before. A, 88 smoke test, [ "Suning Appliance information system development processes and norms"] depiction of UML for system analysis and design models from many different angles through a graphical representation mechanism. B, 89 structural view, [database]. B, Repeatable Read (RR) 90, [database]. B, REFRESH TABLE q1_sales91, [database]. A, CREATE INDEX tab1_idx ON tab1 (col1); 92, [database]. C, insert, update, and delete operations performed against table TAB1 are automatically cascaded to table TAB293, [ "UML"] with the embodiment of FIG participants may not be: A, A event 94, [ "UML"] is not in the class of FIG. static elements of Yes. B, B constants 95, [ "Design Patterns"] of the following modes, is part of the behavior pattern (). B, the observer 96, [ "design mode" static factory] central role is, A. Abstract the product 97, [ "Design Patterns" Hereinafter pattern structure belonging Yes. D, facade pattern 98, [ "design mode"] does not belong to the following schema is created there. C, adapter mode 99, below] [encryption algorithm which algorithm is a symmetric encryption algorithm. A, DES100, MYSQL database [database] default transaction isolation level yes. C, REPEATABLE-READ101, which of the following [database] statement table can be updated according to an operation condition or insertion. B, MERGE statement 102, [database] Which of the following description is wrong. C, and the same PRIMARY KEY UNIQUE. 103, following which a [database] statement is false. B, the view is an alias table. 104, [database] the following statement on the index error Yes. C, using an index scan must be higher than the full table scan efficiency. 105, [] MYSQL database does not support the join of type. C, FULL OUTER JOIN 106, [database] select TRUNCATE (789.8389,2) which is the return value. B, 789.83107, [database]. D, the query result table query product_info product_id by column in ascending order, the query article 6 to 15 taken in the recording and display the results. 108, [database] description of the primary key (PRIMARY KEY), the description of which one is correct? A, if a column is designated as a primary key, then the column can not store a NULL value. 109, [database] description of MYSQL constraints (Constraints), the argument is wrong is which one. D, because the deadline to MYSQL5. 7 throw does not support the Check constraint, so if you specify Check constraint when you define the table will cause an error to build the table. 110, [database]. In the presence of the data A, the table when order_info order_product equal 'PD000002' of, Product_Info product_id all records in the table, are taken PRODUCT_NAME 111, application development and deployment] [deployed in WildFly application package, this time need to customize the access path the context-root, which of the following configuration files can be. C, jboss-wexml112, [project management] in the project schedule management, content schedule management plan include: definition of the activities arranged sequence of activities, estimating activity resources, __, specify the schedule. B, estimating activity durations 113, [ "design mode"] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principles 114, Project Management [core] project management method and management objectives () binding. D, Risk Management 115, [ "design mode"] intent adapter mode yes. B, and an uncontrollable existing object with a particular interface matches. 116, [TCP / IP protocol] OSI reference model is divided into () layer. D, seven 117] [SQL MYSQL explain the results in the following types of access which is best. C, const118, stability and security of the system] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience ]. In the presence of the data A, the table when order_info order_product equal 'PD000002' of, Product_Info product_id all records in the table, are taken PRODUCT_NAME 111, application development and deployment] [deployed in WildFly application package, this time need to customize the access path the context-root, which of the following configuration files can be. C, jboss-wexml112, [project management] in the project schedule management, content schedule management plan include: definition of the activities arranged sequence of activities, estimating activity resources, __, specify the schedule. B, estimating activity durations 113, [ "design mode"] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principles 114, Project Management [core] project management method and management objectives () binding. D, Risk Management 115, [ "design mode"] intent adapter mode yes. B, and an uncontrollable existing object with a particular interface matches. 116, [TCP / IP protocol] OSI reference model is divided into () layer. D, seven 117] [SQL MYSQL explain the results in the following types of access which is best. C, const118, stability and security of the system] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience ]. In the presence of the data A, the table when order_info order_product equal 'PD000002' of, Product_Info product_id all records in the table, are taken PRODUCT_NAME 111, application development and deployment] [deployed in WildFly application package, this time need to customize the access path the context-root, which of the following configuration files can be. C, jboss-wexml112, [project management] in the project schedule management, content schedule management plan include: definition of the activities arranged sequence of activities, estimating activity resources, __, specify the schedule. B, estimating activity durations 113, [ "design mode"] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principles 114, Project Management [core] project management method and management objectives () binding. D, Risk Management 115, [ "design mode"] intent adapter mode yes. B, and an uncontrollable existing object with a particular interface matches. 116, [TCP / IP protocol] OSI reference model is divided into () layer. D, seven 117] [SQL MYSQL explain the results in the following types of access which is best. C, const118, stability and security of the system] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience o product_id all records in the table, are taken PRODUCT_NAME 111, application development and deployment of [] in the application package WildFly deployment, required at this time since the context-root defined access paths, through which configuration the following files. C, jboss-wexml112, [project management] in the project schedule management, content schedule management plan include: definition of the activities arranged sequence of activities, estimating activity resources, __, specify the schedule. B, estimating activity durations 113, [ "design mode"] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principles 114, Project Management [core] project management method and management objectives () binding. D, Risk Management 115, [ "design mode"] intent adapter mode yes. B, and an uncontrollable existing object with a particular interface matches. 116, [TCP / IP protocol] OSI reference model is divided into () layer. D, seven 117] [SQL MYSQL explain the results in the following types of access which is best. C, const118, stability and security of the system] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience o product_id all records in the table, are taken PRODUCT_NAME 111, application development and deployment of [] in the application package WildFly deployment, required at this time since the context-root defined access paths, through which configuration the following files. C, jboss-wexml112, [project management] in the project schedule management, content schedule management plan include: definition of the activities arranged sequence of activities, estimating activity resources, __, specify the schedule. B, estimating activity durations 113, [ "design mode"] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principles 114, Project Management [core] project management method and management objectives () binding. D, Risk Management 115, [ "design mode"] intent adapter mode yes. B, and an uncontrollable existing object with a particular interface matches. 116, [TCP / IP protocol] OSI reference model is divided into () layer. D, seven 117] [SQL MYSQL explain the results in the following types of access which is best. C, const118, stability and security of the system] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience Management, content schedule management plan include: definition of the activities arranged sequence of activities, estimating activity resources, __, specify the schedule. B, estimating activity durations 113, [ "design mode"] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principles 114, Project Management [core] project management method and management objectives () binding. D, Risk Management 115, [ "design mode"] intent adapter mode yes. B, and an uncontrollable existing object with a particular interface matches. 116, [TCP / IP protocol] OSI reference model is divided into () layer. D, seven 117] [SQL MYSQL explain the results in the following types of access which is best. C, const118, stability and security of the system] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience Management, content schedule management plan include: definition of the activities arranged sequence of activities, estimating activity resources, __, specify the schedule. B, estimating activity durations 113, [ "design mode"] Object Adapter pattern is () a typical application of the principles. A, synthetic polymeric multiplexing principles 114, Project Management [core] project management method and management objectives () binding. D, Risk Management 115, [ "design mode"] intent adapter mode yes. B, and an uncontrollable existing object with a particular interface matches. 116, [TCP / IP protocol] OSI reference model is divided into () layer. D, seven 117] [SQL MYSQL explain the results in the following types of access which is best. C, const118, stability and security of the system] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience 18, system stability and security] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience 18, system stability and security] [cloud track system which includes the following features. B, view the system log 119, [quality management] The following non-sonar function yes. A, javascrit 120 checks the code, stability and security of the system] [zabbix monitoring index is not included. D, jvm memory 121, [TCP / HTTP protocol HTTP protocol] interaction does not contain () step. D, download data 122, [ "UML" FIG] Which of these requirements may be used and analytical models. A, A Class 123, deployment architecture] [jboss console default port address. D, 9990124, release process management systems [specification] all need a fallback plan in the pre environment through exercise, to restore business and can quickly perform. For the production change, the view wrong yes. D, non-core system can no fallback plan. 125, [ "UML"] The following is not a dynamic view of yes. B, B object diagram 126, the [Analysis] business needs analysis process, which is typically a first analysis. B, business audience

Guess you like

Origin www.cnblogs.com/lizhewei/p/11890987.html