多项选择题
A.<prefix:myTag a="foo" b="bar" c="baz" />
B.<prefix:myTag attributes={"foo","bar","baz"} />
C.<prefix:myTag jsp:attribute a="foo" b="bar" c="baz" />
D.<prefix:myTag><jsp:attribute name="a">foo</jsp:attribute><jsp:attribute name="b">bar</jsp:attribute><jsp:attribute name="c">baz</jsp:attribute>. </prefix:myTag>
多项选择题 You are developing several tag libraries that will be sold for development of third-party web applications.You are about to publish the first three libraries as JAR files: container-tags.jar,advanced-html-form-tags.jar, and basic-html-form-tags.jar. Which two techniques are appropriate for packaging the TLD files forthese tag libraries?()
多项选择题 Whichtwosecuritymechanismscanbedirectedthroughasub-elementoftheelementinawebapplicationdeploymentdescriptor?()
单项选择题 Whichsecuritymechanismusestheconceptofarealm?()