Business logic is placed in _________
Question Bank Introduction to J2EE 1. Business logic is placed in _________ [0.5] a) Two-tier c) Five-tier b) Middle-tier d) Bottom-tier 2. Enterprise edition are based on either ________ or _________ [0.5] a) Ethernet c) Intranets b) Net d) Internet 3. J2EE is a kind of Technology [0.5] a) True b) False 4. The full form of WML is ______ [0.5] a) Wireless Markup Language c) Wireless Mark Language b) Wire Markup Language d) Wire Mark Language 5. The PDA understands ______ [0.5] a) WML c) HDML b) UML d) HTML 6. The Atomicity, Consistency, Isolation, Durability represents ______ property. [0.5] a) ACDI c) ADIC b) ACID d) None of the above 7. Using Standard protocol, the implementation of application components are dependent of the implementation of various services [0.5] a) True b) False 8. J2EE stands for ________ [0.5] a) Java 2 Platform Enterprise Edition c) Java 2.1 Platform Enterprise Edition b) Java 2 Platform Edition Enterprise d) Jini 2 Platform Enterprise Edition 9. In developing an application the Transaction part is handled by ________ [0.5] a) Developer c) Transaction manager b) Application manager d) Business manager 10. Traditional enterprise application providers have client server application of ________ models. [0.5] a) Two-tier c) Three-tier b) Four-tier d) Five-tier 11. Every component need not be present in the Container. [0.5] a) True b) False 12. J2EE is platform-dependent [0.5] a) True b) False 13. What does the property Isolation mean? [0.5] a) All the transaction must be complete. c) At a time only one transaction should occur. b) The transaction should not be concurrent. d) None of the above. 14. The middleware services are transaction-monitoring services. [1.0] a) True b) False 15. Developers of enterprise applications are not able to deploy applications effectively & quickly. [1.0] a) True b) False 16. Extensible Markup Language is the full form of _______ [1.0] a) HTML c) XML b) EML d) XLM 17. Mobiles understand ______ [1.0] a) WML c) HDML b) UML d) HTML 18. An application that requires any restructuring or redeployment to scale will impede growth. [1.0] a) True b) False 19. Transactions should ideally have _________ [1.0] a) ACDI properties c) ADIC properties b) ACID properties d) None of the options given 20. Servlets & JavaServer Pages enable dynamic content in HTML, XML. [1.0] a) True b) False 21. The developers should not integrate the existing legacy systems [1.0] a) True b) False 22. In B2B there is exchange of either ______or ________ [1.0] a) Data c) Request b) Reports d) Connectivity 23. EJB stands for ______ [1.0] a) Enterprise Java Backend c) Eternal JavaBeans b) Enterprise JavaBeans d) Edition JavaBeans 24. JMS stands for _____ [1.0] a) Java Messaging Service c) Java Mark Service b) Java Message Service d) Java Messaging Solution 25. Databases cannot be accessible by _________ [1.0] a) JDBC c) Applets b) Servlets d) XML 26. Is APIs a Contracts type [1.0] a) True b) False 27. _______ is a standard for naming and directory services. [1.0] a) JavaMail c) J2EE SDK b) CORBA d) JNDI 28. In the Process of developing an application, _______ [1.5] a) Applications must move quickly from prototype to production b) Applications must move slowly from prototype to production 29. Users browse the net, access their emails on the mobile using _______ [1.5] a) E-Commerce c) M-Commerce b) N-commerce 30. Transaction processors and queues are commonly used as ______ [1.5] a) Frontends for different application b) Backends for different application 31. The PDA, mobile system & others could be either interactive or non- interactive. [1.5] a) True b) False 32. The database connection consumes vast amount of resources in terms of _______ [1.5] a) Data c) Time & Memory b) Memory 33. A developer likes to depend on a transaction management system that would allow him to concentrate only on the ________ [1.5] a) System logic c) Business logic b) Transaction logic d) Management logic 34. The good Transaction system should be reliable, efficient in terms of scaling & performance [1.5] a) True b) False 35. The advent of B2B led to __________ [1.5] a) Intra- organization communication c) Organizational communication b) Inter- organization communication d) Both a & b 36. EJB is _______ [1.5] a) A standard for communicating with the database c) A standard for building client side components in Beans b) A standard for building server side components in Java 37. HTTP, HTTPS, JDBC, JTA are ________technologies. [1.5] a) Service & Communication c) Enterprise b) Communication d) Protocol 38. _______ tier of J2EE model contains the data processing logic [1.5] a) Application c) Business b) Presentation d) Object 39. The different types of Contracts are divided into ____ and ______ [1.5] a) APIs c) Deployer b) Network Protocol 40. The J2EE platform provides _______ benefits [1.5] a) simplified architecture & development c) Deployment descriptor b) Product provider d) Containers 41. _______ produces the basic building blocks of J2EE application. [1.5] a) Product Provider c) Tool provider b) Application Component Provider d) Application Assembler 42. ________ is needed for sending email over the internet. [1.5] a) JavaMail d) JNDI b) JavaBeans Activation framework e) Both b and d c) Both a and b 43. The developer faces _______ problem while developing an enterprise application. [1.5] a) Programming productivity c) System problems b) Hardware Problems d) Software problems 44. The features which most J2EE applications have are ______, _______ [1.5] a) Database Access c) none of the above b) Transaction Management 45. In ________ there is exchange of either data or reports. [1.5] a) Intra- organization communication c) Organizational communication b) Inter- organization communication d) both a & b 46. Which of the following statements are true with respect to J2EE [1.5] a) Design the Enterprise application c) Provide a standard for Java application servers b) Separate the files to the client d) Standardize the technologies that could be used in J2EE 47. The technologies used to build the business logic include ______ and _________ [1.5] a) JDBC c) Servlets b) JSP d) JMS 48. The types of Application components are ______, _______, and ________ [1.5] a) Application server c) Servlets & JavaServer Pages b) Applets d) Enterprise JavaBeans 49. Applets are _______ [1.5] a) Graphical clients that normally execute within a web browser c) Graphical clients that normally execute outside a web browser b) Graphical servers that normally execute within a web browser 50. _______ are used server-wide and have to be present [1.5] a) JavaMail & JavaBeans services c) JDBC b) Java Naming & Directory Interface services d) RMI-IIOP services 51. The J2EE components are ______ and ______ [1.5] a) Application components c) Middleware b) Containers d) Enterprise connectivity 52. The statements true about J2EE are _________ [1.5] a) J2EE is a technology used for web development. d) J2EE is multi-user b) J2EE is portable e) Behaviour of J2EE changes with the change in the operating system. c) J2EE supports all languages 53. BEA Systems is a J2EE product provider, _______ and ______ [1.5] a) Application component provider c) Deploy provider b) Tool provider d) WORA 54. _______ is the API for calling CORBA services. [1.5] a) JavaMail c) Java IDL b) JNDI d) JTA 55. The application assembler delivers _____ file [1.5] a) Archive c) Enterprise b) Enterprise Archive d) Archive Enterprise 56. The J2EE platform communicates with the outside world in a way known as _____ [1.5] [...]... _ file a) application descriptor c) deployment descriptor b) J2EE application [0.5] d) Java application 109 The final J2EE application is a file [0.5] a) jar c) ear b) war d) ejb.jar 110 In the final J2EE application stage the ear file is added to a) J2EE client c) J2EE container b) J2EE server [0.5] d) application client 111 The elements of file explain how to assemble and deploy the components... Component Provider is to : [1.5] a) Specify component c) customize deployment deployment descriptors, and descriptor elements, and package components into install deployment units on modules servers b) assemble modules into larger deployment units 124 The task of the Application assembler is to : [1.5] a) Specify component c) customize deployment deployment descriptors, and descriptor elements, and package... Managing states access to the environment [2.0] 98 According to the J2EE specifications, the application server provides [2.0] the following services: (choose three) a) Security framework d) Naming Services b) Transaction management e) Assembly and deployment tools c) Performance 99 The benefits of the J2EE architecture are : (choose two) [2.0] a) J2EE server core removes c) J2EE- compliant servers... comprised in J2EE application: [1.0] (choose three) a) Enterprise beans c) Application clients b) Web components d) Java bean 113 Deployment descriptors provide and _ a) Structural information c) Deployer information b) Assembly information [1.0] d) Client information 114 The job of the deployer is to _ [1.0] a) Specify component c) Customize deployment deployment descriptors, and descriptor elements,... Directory Protocol a) LWDAP [1.5] [1.5] c) LDA b) LDAP 153 means that the transaction or the entire group should be [1.5] treated as a single entity a) Atomic b) Isolated b) Consistent d) Durable 154 Consistent means a transaction should affect the state of database a) True c) [1.5] False 155 _ builds the gap between directory services and allows the [1.5] user to write portable naming and directory... XML file a) deployment descriptor [0.5] b) J2EE bundle 103 The structural information describes various components of the [0.5] file a) JAR d) JAVA b) XML e) CLASS c) BAT 104 The deployment descriptor is edited in the _ phase a) Application assemblers c) deployment descripting b) Deployer [0.5] d) Separation of concerns 105 The J2EE application deployment descriptor has file with _ [0.5] extension... file 120 Which of the following are not J2EE modules : (choose two) a) enterprise beans c) b) deployment descriptor [1.0] Web components d)* application assembly 121 _ provides information related to the entire application a) Deployer c) Web components b) Application assembler [1.0] d) Application server 122 The three roles in the final stages of developing a J2EE application [1.5] are: a) Application... (choose three) a) Client tier d) ESI tier b) Software tier [1.5] e) Data tier c) Application tier 84 _ is used to prevent unauthorized access to a private network [1.5] a) Firewall b) Password 85 c) Login key d) Administrator password In n-tier approach the application logic is divided into _ and [1.5] _ a) presentation logic b) database logic 86 c) Business logic d) Client logic In n-tier approach... 143 The Transmission Control Protocol ensures _ [1.0] a) The data packets reach the b) The data packets sent from destination from the source destination reach the source of communication of communication 144 NDS stands for a) Novell Directory Services [1.0] c) Network Directory service b) Novell Data Setup d) None of the options given 145 A Transaction is said to be isolated if it is executed... d) four-tier 147 is a set of rules that is used to exchange files on World [1.0] Wide Web a) HTTP c) SSL b) TCP/IP d) RMI-IIOP 148 _ stands for Extensible Stylesheet Language a) XSL [1.0] c) XML b) ESL 149 JMS allows asynchronous messages to be sent back and forth the [1.0] components a) True b) False 150 XML cannot be used to create customized views of data depending on [1.0] clients requirements . Question Bank Introduction to J2EE 1. Business logic is placed in _________. true about J2EE are _________ [1.5] a) J2EE is a technology used for web development. d) J2EE is multi-user b) J2EE is portable e) Behaviour of J2EE changes