45
Question Bank Introduction to J2EE 1. Business logic is placed in _________ [0. 5] a) Two-tier c ) Five-tier b) Middle-tier d ) Bottom-tier 2. Enterprise edition are based on either ________ or _________ [0. 5] a ) Ethernet c ) Intranets b ) Net d ) Internet 3. J2EE is a kind of Technology [0. 5] a ) True b ) False 4. The full form of WML is ______ [0. 5] a ) Wireless Markup Language c ) Wireless Mark Language

j2eecomplete 167 qs

  • Upload
    cauchua

  • View
    522

  • Download
    0

Embed Size (px)

Citation preview

Page 1: j2eecomplete 167 qs

Question Bank Introduction to J2EE

1. Business logic is placed in _________ [0.5]

a) Two-tier c) Five-tier

b) Middle-tier d) Bottom-tier

2. Enterprise edition are based on either ________ or _________ [0.5]

a) Ethernet c) Intranets

b) Net d) Internet

3. J2EE is a kind of Technology [0.5]

a) True b) False

4. The full form of WML is ______ [0.5]

a) Wireless Markup Language c) Wireless Mark Language

b) Wire Markup Language d) Wire Mark Language

5. The PDA understands ______ [0.5]

a) WML c) HDML

b) UML d) HTML

6. The Atomicity, Consistency, Isolation, Durability represents ______ property.

[0.5]

a) ACDI c) ADIC

Page 2: j2eecomplete 167 qs

b) ACID d) None of the above

7. Using Standard protocol, the implementation of application components are dependent of the implementation of various services

[0.5]

a) True b) False

8. J2EE stands for ________ [0.5]

a) Java 2 Platform Enterprise Edition

c) Java 2.1 Platform Enterprise Edition

b) Java 2 Platform Edition Enterprise

d) Jini 2 Platform Enterprise Edition

9. In developing an application the Transaction part is handled by ________

[0.5]

a) Developer c) Transaction manager

b) Application manager d) Business manager

10. Traditional enterprise application providers have client server application of ________ models.

[0.5]

a) Two-tier c) Three-tier

b) Four-tier d) Five-tier

11. Every component need not be present in the Container. [0.5]

a) True b) False

12. J2EE is platform-dependent [0.5]

Page 3: j2eecomplete 167 qs

a) True b) False

13. What does the property Isolation mean? [0.5]

a) All the transaction must be complete.

c) At a time only one transaction should occur.

b) The transaction should not be concurrent.

d) None of the above.

14. The middleware services are transaction-monitoring services. [1.0]

a) True b) False

15. Developers of enterprise applications are not able to deploy applications effectively & quickly.

[1.0]

a) True b) False

16. Extensible Markup Language is the full form of _______ [1.0]

a) HTML c) XML

b) EML d) XLM

17. Mobiles understand ______ [1.0]

a) WML c) HDML

b) UML d) HTML

18. An application that requires any restructuring or redeployment to scale will impede growth.

[1.0]

a) True b) False

Page 4: j2eecomplete 167 qs

19. Transactions should ideally have _________ [1.0]

a) ACDI properties c) ADIC properties

b) ACID properties d) None of the options given

20. Servlets & JavaServer Pages enable dynamic content in HTML, XML. [1.0]

a) True b) False

21. The developers should not integrate the existing legacy systems [1.0]

a) True b) False

22. In B2B there is exchange of either ______or ________ [1.0]

a) Data c) Request

b) Reports d) Connectivity

23. EJB stands for ______ [1.0]

a) Enterprise Java Backend c) Eternal JavaBeans

b) Enterprise JavaBeans d) Edition JavaBeans

24. JMS stands for _____ [1.0]

a) Java Messaging Service c) Java Mark Service

b) Java Message Service d) Java Messaging Solution

Page 5: j2eecomplete 167 qs

25. Databases cannot be accessible by _________ [1.0]

a) JDBC c) Applets

b) Servlets d) XML

26. Is APIs a Contracts type [1.0]

a) True b) False

27. _______ is a standard for naming and directory services. [1.0]

a) JavaMail c) J2EE SDK

b) CORBA d) JNDI

28. In the Process of developing an application, _______ [1.5]

a) Applications must move quickly from prototype to production

b) Applications must move slowly from prototype to production

29. Users browse the net, access their emails on the mobile using _______

[1.5]

a) E-Commerce c) M-Commerce

b) N-commerce

30. Transaction processors and queues are commonly used as ______ [1.5]

a) Frontends for different application

b) Backends for different application

Page 6: j2eecomplete 167 qs

31. The PDA, mobile system & others could be either interactive or non-interactive.

[1.5]

a) True b) False

32. The database connection consumes vast amount of resources in terms of _______

[1.5]

a) Data c) Time & Memory

b) Memory

33. A developer likes to depend on a transaction management system that would allow him to concentrate only on the ________

[1.5]

a) System logic c) Business logic

b) Transaction logic d) Management logic

34. The good Transaction system should be reliable, efficient in terms of scaling & performance

[1.5]

a) True b) False

35. The advent of B2B led to __________ [1.5]

a) Intra- organization communication

c) Organizational communication

b) Inter- organization communication

d) Both a & b

36. EJB is _______ [1.5]

a) A standard for communicating with the database

c) A standard for building client side components in Beans

Page 7: j2eecomplete 167 qs

b) A standard for building server side components in Java

37. HTTP, HTTPS, JDBC, JTA are ________technologies. [1.5]

a) Service & Communication c) Enterprise

b) Communication d) Protocol

38. _______ tier of J2EE model contains the data processing logic [1.5]

a) Application c) Business

b) Presentation d) Object

39. The different types of Contracts are divided into ____ and ______ [1.5]

a) APIs c) Deployer

b) Network Protocol

40. The J2EE platform provides _______ benefits [1.5]

a) simplified architecture & development

c) Deployment descriptor

b) Product provider d) Containers

41. _______ produces the basic building blocks of J2EE application. [1.5]

a) Product Provider c) Tool provider

b) Application Component Provider

d) Application Assembler

Page 8: j2eecomplete 167 qs

42. ________ is needed for sending email over the internet. [1.5]

a) JavaMail d) JNDI

b) JavaBeans Activation framework

e) Both b and d

c) Both a and b

43. The developer faces _______ problem while developing an enterprise application.

[1.5]

a) Programming productivity c) System problems

b) Hardware Problems d) Software problems

44. The features which most J2EE applications have are ______, _______ [1.5]

a) Database Access c) none of the above

b) Transaction Management

45. In ________ there is exchange of either data or reports. [1.5]

a) Intra- organization communication

c) Organizational communication

b) Inter- organization communication

d) both a & b

46. Which of the following statements are true with respect to J2EE [1.5]

a) Design the Enterprise application

c) Provide a standard for Java application servers

b) Separate the files to the client d) Standardize the

Page 9: j2eecomplete 167 qs

technologies that could be used in J2EE

47. The technologies used to build the business logic include ______ and _________

[1.5]

a) JDBC c) Servlets

b) JSP d) JMS

48. The types of Application components are ______, _______, and ________

[1.5]

a) Application server c) Servlets & JavaServer Pages

b) Applets d) Enterprise JavaBeans

49. Applets are _______ [1.5]

a) Graphical clients that normally execute within a web browser

c) Graphical clients that normally execute outside a web browser

b) Graphical servers that normally execute within a web browser

50. _______ are used server-wide and have to be present [1.5]

a) JavaMail & JavaBeans services

c) JDBC

b) Java Naming & Directory Interface services

d) RMI-IIOP services

51. The J2EE components are ______ and ______ [1.5]

Page 10: j2eecomplete 167 qs

a) Application components c) Middleware

b) Containers d) Enterprise connectivity

52. The statements true about J2EE are _________ [1.5]

a) J2EE is a technology used for web development.

d) J2EE is multi-user

b) J2EE is portable e) Behaviour of J2EE changes with the change in the operating system.

c) J2EE supports all languages

53. BEA Systems is a J2EE product provider, _______ and ______ [1.5]

a) Application component provider

c) Deploy provider

b) Tool provider d) WORA

54. _______ is the API for calling CORBA services. [1.5]

a) JavaMail c) Java IDL

b) JNDI d) JTA

55. The application assembler delivers _____ file [1.5]

a) Archive c) Enterprise

b) Enterprise Archive d) Archive Enterprise

56. The J2EE platform communicates with the outside world in a way known as _____

[1.5]

Page 11: j2eecomplete 167 qs

a) Container c) EJB

b) Contracts d) JMS

57. ___________ is used when accessing Enterprise JavaBeans [1.5]

a) JMS c) RMI-IIOP

b) JNDI d) RMI

58. ________ provides CRUD services. [0.5]

a) Service Layer d) Component Layer

b) Server side Layer e) Persistence Layer

c) Domain Layer

59. The presentation layer is partitioned into _______ and ______. [0.5]

a) client tier c) Middle tier

b) System tier d) Server side tier

60. ______ is used to generate dynamic content for web. [0.5]

a) HTML d) JDBC

b) EJB e) JNDI

c) JSP

61. The J2EE stack consists of ____ layers. [0.5]

a) 2 c) 6

Page 12: j2eecomplete 167 qs

b) 3 d) 9

62. In a distributed enterprise system, one schema can support many clients.

[0.5]

a) True b) False

63. In ______ layer semantic validation of new information takes place. [0.5]

a) Service c) Component

b) Domain d) Persistence

64. In the Multi-tier application scenario ______ can be included to provide a flexible way for integrating data from heterogeneous client platforms.

[0.5]

a) XSL c) XML

b) HTML d) JSP

65. In J2EE the developer cannot use the server side services. [0.5]

a) True b) False

66. Containers provides run time environment for ______. [0.5]

a) beans c) Components

b) servlets d) container classes

67. In 2-tier architecture the business tier has to be present on every client machine.

[0.5]

a) True b) False

Page 13: j2eecomplete 167 qs

68. In the 2-tier architecture the _______ and ________ are combined together.

[0.5]

a) Presentation logic c) Business logic

b) Database logic d) Client logic

69. Component can also be a type of a container. [0.5]

a) True b) False

70. The _______ tier implements presentation logic. [1.0]

a) Client c) Application

b) Software d) Data

71. The _______ tier implements database management services. [1.0]

a) Client c) Application

b) Software d) Data

72. The _______ tier implements business logic. [1.0]

a) Client c) Application

b) Software d) ESI

73. Different types of n-tier systems are : [1.0]

a) Traditional c) component

b) Non-traditional d) Business component

Page 14: j2eecomplete 167 qs

74. The _______ mediates the interaction between the client-side presentation and services layers.

[1.0]

a) Service Layer c) Component Layer

b) Domain Layer d) Application Layer

75. ________ are responsible for the session management in HTTP session.

[1.0]

a) Servlets c) Applets

b) Beans d) HTML

76. ______ provides an API to the business logic cases and utility operations required by the application.

[1.0]

a) Service Layer c) Component layer

b) Domain Layer d) Application Layer

77. The components that form the service layer are : (choose two) [1.0]

a) simple beans c) JSP

b) transactional components d) servlets

78. CRUD represents for : [1.0]

a) create, read, update, delete c) create, run, update, declare

b) catch, read, upload, delete

79. Which of the following components are held by EJB Containers: (choose three)

[1.0]

a) Entity Beans d) Message Beans

Page 15: j2eecomplete 167 qs

b) Stateful Session Beans e) Java Beans

c) State beans

80. The three main units of J2EE are: [1.0]

a) Components d) Servlets

b) Containers e) Beans

c) Connectors

81. The two different types of Containers are: [1.0]

a) Web Container c) State container

b) EJB Container

82. If a small change is made in a 2-tier application then, [1.5]

a) the changes are made in the present version only.

c) changes cannot be made in a 2-tier application

b) the changes are upgraded in the newer version.

83. 3-tier architecture consists of the following tiers : (choose three) [1.5]

a) Client tier d) ESI tier

b) Software tier e) Data tier

c) Application tier

84. _______ is used to prevent unauthorized access to a private network. [1.5]

Page 16: j2eecomplete 167 qs

a) Firewall c) Login key

b) Password d) Administrator password

85. In n-tier approach the application logic is divided into _______ and _________

[1.5]

a) presentation logic c) Business logic

b) database logic d) Client logic

86. In n-tier approach the application follows _______ pattern. [1.5]

a) MWC c) WTC

b) MVC d) CMV

87. The three types of stand-alone clients are : [1.5]

a) EJB clients d) Java application clients

b) Server clients e) Visual Basic clients

c) Bean clients

88. The J2EE framework have been designed upon which of the following Components : (choose two)

[1.5]

a) C++ c) HTML

b) JSP d) None of the options given

89. The J2EE stack consists of the following layers: (choose three) [1.5]

a) Service Layer d) Component Layer

Page 17: j2eecomplete 167 qs

b) Server side Layer e) Persistence Layer

c) Domain Layer

90. The ______ provides the mechanisms necessary to save the object state permanently.

[1.5]

a) Service Layer d) Component Layer

b) Server side Layer e) Persistence Layer

c) Domain Layer

91. The modules of Domain layer are : (choose two) [1.5]

a) JNDI c) applets

b) Java Connector architecture d) servlets

92. The major issues of enterprise application are: (choose three) [2.0]

a) scalability d) performance

b) data e) client system

c) sharing data

93. Drawbacks of a 2-tier client/server architecture are : (choose two) [2.0]

a) the business logic has to be present on every client.

c) 2-tier can be broken into several components so it creates problem.

b) to satisfy clients request the time required is more.

d) maximizes the use of available system resources.

Page 18: j2eecomplete 167 qs

94. The advantages of the 3-tier approach are : (choose three) [2.0]

a) changes can be made easily.

d) different presentations can be done from the same business data.

b) prevents firewall security of network.

e) the entire application is rewritten during upgradation

c) maximizes the use of available system resources.

95. The drawback of traditional n-tier architecture is ______ [2.0]

a) middle tier consists of one application object.

c) The entire application is rewritten during upgradation

b) middle tier consists of number of application objects

96. The J2EE are partitioned into: (choose three) [2.0]

a) EJB containers c) Database

b) J2EE Web Container d) Java Applet

97. The job of the container is: (choose three) [2.0]

a) deleting unwanted data d) Pooling instance

b) Providing transaction services

e) Managing states

c) Restricting access to the necessary environment variables

Page 19: j2eecomplete 167 qs

98. According to the J2EE specifications, the application server provides the following services: (choose three)

[2.0]

a) Security framework d) Naming Services

b) Transaction management e) Assembly and deployment tools

c) Performance

99. The benefits of the J2EE architecture are : (choose two) [2.0]

a) J2EE server core removes resources and transactions from the JVM.

c) J2EE-compliant servers guarantee the seamless and correct execution of all components and middle-ware services.

b) J2EE platform services can be implemented on a single system or distributed over disparate platforms.

d) It is responsible for un integrating the service implementations of different vendors.

100. The Java Application has _____ file extension. [0.5]

a) .war d) .ear

b) .class e) .xml

c) .jar

101. The J2EE modules are _____ and _______ [0.5]

a) reusable c) portable

b) manageable d) understandable

Page 20: j2eecomplete 167 qs

102. ______ is an XML file. [0.5]

a) deployment descriptor b) J2EE bundle

103. The structural information describes various components of the ______file.

[0.5]

a) JAR d) JAVA

b) XML e) CLASS

c) BAT

104. The deployment descriptor is edited in the _____ phase. [0.5]

a) Application assemblers c) deployment descripting

b) Deployer d) Separation of concerns

105. The J2EE application deployment descriptor has file with _____ extension.

[0.5]

a) .war d) .xml

b) .class e) .jsp

c) .jar

106. The Enterprise bean is a file with _____ extension. [0.5]

a) .class c) .xml

b) ejb.jar d) .bean

107. The Web component has file with ______ extension. [0.5]

Page 21: j2eecomplete 167 qs

a) .war c) Ejb.jar

b) .class d) .bean

108. A single archive file with .ear extension is a _________ file. [0.5]

a) application descriptor c) deployment descriptor

b) J2EE application d) Java application

109. The final J2EE application is a ______ file [0.5]

a) .jar c) .ear

b) .war d) ejb.jar

110. In the final J2EE application stage the .ear file is added to ______. [0.5]

a) J2EE client c) J2EE container

b) J2EE server d) application client

111. The elements of ______ file explain how to assemble and deploy the components in a particular environment.

[0.5]

a) JAR c) EAR

b) XML d) Java

112. Which of the following modules are comprised in J2EE application: (choose three)

[1.0]

a) Enterprise beans c) Application clients

b) Web components d) Java bean

Page 22: j2eecomplete 167 qs

113. Deployment descriptors provide ________and _______ [1.0]

a) Structural information c) Deployer information

b) Assembly information d) Client information

114. The job of the deployer is to _____ [1.0]

a) Specify component deployment descriptors, and package components into modules

c) Customize deployment descriptor elements, and install deployment units on servers.

b) Assemble modules into larger deployment units.

115. The ______ describes how to compose the contents of a JAR file to form a deployable unit.

[1.0]

a) Structural information c) deployer information

b) Assembly information d) client information

116. Deploying an application involves two tasks : (choose two) [1.0]

a) Installation c) Configuration

b) deployer information d) assembling

117. The enterprise bean class files along with the deployment descriptor are packaged together into ______ file with ______extension.

[1.0]

a) JAR , .jar c) UML,.jar

b) XML , .jar d) ejb.bean

Page 23: j2eecomplete 167 qs

118. The Java code generation is done in _____ stage. [1.0]

a) Component Packaging c) Application Deployment

b) Application Assembly d) Creation of Components

119. Which of the following abbreviation is incorrect : [1.0]

a) Web ARchive ------- .fwar file c) Java ARchive ------- .jar file

b) Enterprise ARchive ------- .ear file

d) none of the above

120. Which of the following are not J2EE modules : (choose two) [1.0]

a) enterprise beans c) Web components

b) deployment descriptor d)* application assembly

121. _______ provides information related to the entire application. [1.0]

a) Deployer c) Web components

b) Application assembler d) Application server

122. The three roles in the final stages of developing a J2EE application are:

[1.5]

a) Application Component Provider

d) deployment descripting

b) Application assembler e) Separation of concerns

c) Deployer

Page 24: j2eecomplete 167 qs

123. The task of the Application Component Provider is to : [1.5]

a) Specify component deployment descriptors, and package components into modules

c) customize deployment descriptor elements, and install deployment units on servers.

b) assemble modules into larger deployment units.

124. The task of the Application assembler is to : [1.5]

a) Specify component deployment descriptors, and package components into modules

c) customize deployment descriptor elements, and install deployment units on servers.

b) assemble modules into larger deployment units.

125. An enterprise bean consists of three class files that are : [1.5]

a) the EJB class file d) the remote interface file

b) configuration file e) the interface file

c) the home interface file

126. The WAR file consists of : (choose three ) [1.5]

a) Servlets d) .gif file

b) tag libraries e) .jar file

c) EJB class file and the interfaces

127. The various components of the Structural information include: [1.5]

Page 25: j2eecomplete 167 qs

(choose three)

a) fully qualified class names c) the relationship of the components

b) references used d) separate concerns used

128. The java archive file contains the following : (choose two) [1.5]

a) The EJB class file and the interfaces

c) The java files and interfaces

b) the ejb-jar.xml file

129. _______ allows the client interact with the business components [0.5]

a) Client-side technologies c) Service technologies

b) Middleware technologies

130. A stateful session bean exists even after the session expires. [0.5]

a) True b) False

131. Multiple clients can share an instance of an entity bean. [0.5]

a) True b) False

132. HTTP stands for _________ [0.5]

a) Hypertext Transfer Protocol c) High Technology Transmission Packet

b) Hypertext Transaction Protocol

d) None of the above

Page 26: j2eecomplete 167 qs

133. Does TCP/IP ensure that the packets are error free during transmission process?

[0.5]

a) True b) False

134. SSL stands for ________ protocol. [0.5]

a) Server Side Language c) Single Side Layer

b) Secure Socket Layer d) None of the options given

135. DTD stands for _________ [0.5]

a) Document Type Definition c) Document Type Data

b) Data Type Definition d) None of the options given

136. The ________ technology was created to support the authoring of HTML and XML pages

[0.5]

a) Service technology c) Communication Technology

b) JSP technology d) Component Technology

137. The stateless bean persists as long as the current session exists. [0.5]

a) True b) False

138. MOM stands for __________ [0.5]

a) Middleware Oriented Message c) Multiple Operable Middleware

b) Message-Oriented Middleware

d) Mechanism of Middleware

Page 27: j2eecomplete 167 qs

139. Middleware is the layer between _______ and ________ [1.0]

a) Hardware c) Network

b) Application d) End user

140. Servlets are ______ programs [1.0]

a) Server side c) Application side

b) Client side d) business side

141. JSP stands for ________ [1.0]

a) Java Servlet Programming c) Java Servlet Page

b) Java Server Pages d) None of the options given

142. Types of session beans are _____ and ________ [1.0]

a) Java bean c) Stateless bean

b) Stateful bean d) Enterprise bean

143. The Transmission Control Protocol ensures _______ [1.0]

a) The data packets reach the destination from the source of communication

b) The data packets sent from destination reach the source of communication

144. NDS stands for ________ [1.0]

a) Novell Directory Services c) Network Directory service

Page 28: j2eecomplete 167 qs

b) Novell Data Setup d) None of the options given

145. A Transaction is said to be isolated if it is executed Dependent of the other transaction

[1.0]

a) True b) False

146. In a ______ application the client is typically a browser and could be situated anywhere in the world.

[1.0]

a) three-tier c) n-tier

b) two-tier d) four-tier

147. ________ is a set of rules that is used to exchange files on World Wide Web

[1.0]

a) HTTP c) SSL

b) TCP/IP d) RMI-IIOP

148. _________ stands for Extensible Stylesheet Language [1.0]

a) XSL c) XML

b) ESL

149. JMS allows asynchronous messages to be sent back and forth the components

[1.0]

a) True b) False

150. XML cannot be used to create customized views of data depending on clients requirements

[1.0]

a) True b) False

Page 29: j2eecomplete 167 qs

151. Servlets do not run on the server and they do have an interface. [1.5]

a) True b) False

152. _______ stands for Lightweight Directory Protocol [1.5]

a) LWDAP c) LDA

b) LDAP

153. ______ means that the transaction or the entire group should be treated as a single entity.

[1.5]

a) Atomic b) Isolated

b) Consistent d) Durable

154. Consistent means a transaction should affect the state of database. [1.5]

a) True c) False

155. _____ builds the gap between directory services and allows the user to write portable naming and directory services.

[1.5]

a) JDBC c) JNDI

b) JDN

156. ______ forms the basic communication language over the internet [1.5]

a) HTTP c) TCP

b) SSL d) TCP/IP

Page 30: j2eecomplete 167 qs

157. _________ is used for securing the information, which is transmitted over the network.

[1.5]

a) HTTP c) TCP

b) SSL d) TCP/IP

158. ______ is an Object Request Broker available with JDK1.2 [1.5]

a) JMS c) Java Mail

b) Java IDL d) None of these

159. XML documents come in two flavors that are : [1.5]

a) well formed c) invalid

b) Valid

160. The two types of Enterprise beans are ______ & ______ [1.5]

a) Java bean c) Session bean

b) Stateful bean d) Entity bean

161. _____ allows the application developer to connect to relational databases.

[2.0]

a) JBDC c) RDMS

b) JDBC d) DBMS

162. javax.sql package is used as ______ package. [2.0]

a) JDBC 2.x Optional c) JDBC 2.x Core API

Page 31: j2eecomplete 167 qs

b) JDBC 1.x Optional d) None of the options given

163. The directory services available are ________ and _______ [2.0]

a) ADS c) DNS

b) LDAP d) None of the options given

164. ______is used to establish a connection with the database [2.0]

a) Getconnection object c) Driver Manager

b) Connection object d) Driver object

165. In a transactional application the transaction finally ends, when _______

[2.0]

a) A thread issues a commit or even a stand by request

b) A thread issues a commit or even a rollback request

166. Remote Object Protocols include : [2.0]

a) RMI c) JDI

b) JMS d) SSL

167. ______ enables the programmer to develop applications where invocation of methods of remote Java objects would be possible

[2.0]

a) XML c) RMI and RMI-IIOP

b) UML d) JMS