Đăng ký Đăng nhập

Tài liệu đề trắc nghiệm ejb

.DOC
10
817
97

Mô tả:

1. Which of the following are the main methods in java.sql.Connection interface that are used for handling transactions? 1. SetAutoCommit() 2. commit() 3. rollback() 1,2 2,3 1,3 1,2,3 2. Which of the following methods of the javax.ejb.SessionSynchronization interface are used for handling transactions in the stateful session beans? 1. afterBegin() 2. beforeBegin() 3. afterCompletition(boolean committed) 4. beforeCompletition(boolean committed) 1,2,3 2,3,4 1,3,4 1,2,3,4 3. The JMS API architecture is composed of which of the following parts? 1. JMS Provider 2. JMS Clients 3. Messages 4. Administered Objects 1,2,3 2,3,4 1,3,4 1,2,3,4 4. A transacted session supports ____________________series of transaction. Single Multiple Double Triple 5. The identity of both stateful and stateless session beans can be compared using the _________ method. isIdentical() Identical() Compare() 6. The ________ method of the CMP Bean is called by the container to disassociate a bean from its environment. ejbRemove() unsetEntityContext() ejbPassivate() 7. _____________ are implemented differently in both CMP and BMP beans. Containers Container call back methods Instance of an entity bean 8. BNF schemas created using BNF symbols use these schemas to declare ________ in EJB QL.x page 69 Queries Functions Relations 9. The _________ isolation anomaly occurs when data is changed between two consecutive reads by a transaction. Phantom Read Non-Repeatable Read Dirty Read 10. The _________ manages interactions between applications and the application server. Container Transaction manager CMT 11. The ___________ controls JDBC transactions using the commit () and rollback() methods. DBMS transaction manager DQL transaction manager Transaction server 12. The __________ field provides a way to correlate messages in a request/response type of setup. JMSCorrelationID JMSDestination JMSExpiration 13. In __________, J2EE architecture makes use of a Message-Driven bean for fulfilling the requests of the client. Resource façade Session façade Message façade 14. In __________, an end user is required to authenticate by providing necessary authentication data only when the user tries to access a secured resource. J2EE security architecture Lazy authentication Resource security 15.(xem lai) Which of the following method of Entity Beans is used to retrieve information from the database? Retrieve Finder Remove Home 16. Which of the following deployment descriptor contains the details about the classes and interfaces which compose an EJB application along with the persistence details in case of an Entity Bean? application.xml web.xml ejb.xml ejb-jar.xml 17. Which of the following exception is thrown if the container encounters a problem in searching a particular record? Finder Exception Duplicate Key Exception Remove Exception Create Exception 18. Which of the following behavioral UML diagram focuses on the type and order of messages passed between elements during execution? Sequence State Machine Timing Use Case 19. Which of the following ACID property specifies that each transaction should be allowed to execute independently? Atomicity Isolation Consistency Durability 20. Which of the following messaging domain models allow multiple applications or components to receive the same message? Point to Point Point to Publish Publish and Subscribe Point and Subscribe 21. EJB QL supports path navigation using a __________. Dot (.) Arrow (->) Hyphen (-) Equal to (=) 22. Which of the following are the properties of a transaction? 1. Isolation 2. Durability 3. Atomicity 4. Consistency 1, 2, 3 2, 3, 4 1, 3, 4 1, 2, 3, 4 23. Which of the following properties of a transaction ensures that each transaction should be allowed to execute independently without interference from other transactions or processes? Atomicity Consistency Isolation Durability 24. Which of the following components of the Transaction processing are EJB business methods which invoke transactions? Application Components Resource Managers Transaction Manager All of the above 25. ___________________transaction contains one main transaction with one or smaller transactions embedded within it. Flat Nested Joint Main 1. Strengths of EJB clients are: EJB clients provide a more flexible user interface. EJB clients distribute the workload. EJB clients handle complex data models. EJB clients tend to be more complex. (drawback) 2. ____________ are used for identifying the objects and classes in an application. Attributes ERD's Object models 3. The __________ indicates that an inappropriate argument has been passed to a method. java.lang.IllegalArgumentException java.rmi.MarshalException Javax.ejb.AccessLocalException 4. _________ are used to represent the relationships between various entities. Object models ERDs Fully-attributed ERD 5. The ____________ is thrown if an attempt is made to create an entity bean object with an existing primary key. javax.ejb.DuplicateKeyException javax.ejb.FinderException Javax.ejb.RemoveException 6. The System exception ____________ indicates communication related problems that may occur during the execution of a remote method call. java.rmi.NoSuchObjectException java.rmi.RemoteException javax.lang.SecurityException 7. Which types of cardinalities are supported by EJB? 1. One-to-One 2. One-to-Many 3. Many-to-Many 1,2 2,3 1,3 1,2,3 8. The _______ clause of a query in an EJB QL contains the condition using which the retrieved data can be filtered. SELECT FROM WHERE ORDER BY 9. The __________ components of JMS API architecture denote preconfigured JMS objects. JMS provider JMS clients Messages Administered object 10. The ________ exception is thrown by the container to indicate that a system exception has occurred and the current transaction will be rolled back. EJBException IllegalStateException NoSuchEntityException NoSuchObjectException 11. A relationship between objects in which one object contains another object is termed as ____________. Association Inheritance Aggregation Generalization 12. An enterprise application is usually composed of which of following layer architecture? 1. Data Layer 2. Business Layer 3. Presentation Layer 1, 2 2, 3 1, 3 1, 2, 3 13. Which of the following entities of Business Objects specifies that the same business object can be used by different sub-systems of the same application as well as by different applications? Reusability Access Control Remote Access All of the above 14. EJB comes in which of the following flavors? 1. Session bean 2. Entity bean 3. Message-driven bean 1, 2 2, 3 1, 3 1, 2, 3 15. The lifestyle of the stateless session bean goes through which of the following stages? 1. Bean Creation 2. Bean Use 3. Bean Access 4. Bean Removal 1, 2, 3 2, 3, 4 1, 2, 4 1, 2, 3, 4 16. Which of the following Session Bean Components contains the implementation method of the bean? Session Bean Class EJB Object Interface Local EJB Object Interface Home Object Interface 17. Which of the following are the main features of entity beans? 1. Persistence 2. Shared access 3. Primary key 4. Relationship 1, 2, 3 2, 3, 4 1, 2, 4 1, 2, 3, 4 18. Entity beans undergo which of the following stages? 1. Does Not Exist 2. Pooled 3. Ready 1, 2 2, 3 1, 3 1, 2, 3 19. A session bean which is exposed as Web service can be called by client program in which of the following ways? 1. Static stub 2. dynamic proxy 3. dynamic invocation Interface 1, 2 2, 3 1, 3 1, 2, 3 20. Which of the following deployment descriptors includes information which describes how the contents of a unit are composed with other units to produce a new component? Structural Assembly Meta-data None of the above 21. Which of the following are the kinds of aggregation relationships? 1. Basic 2. Advance 3. Composition 1, 2 2, 3 1, 3 1, 2, 3 22. An _________ can be designed as a message receiver that works in synchronous mode. Session bean Entity bean Application bean 23. To enhance performance, a stateful session bean can be converted to ____________. IIOP stateless session bean CORBA 24. __________ accesses each entity bean instance with the help of a primary key. Container call back methods Multiple instances Container 25. Advantages of using Remote interface are: Better location transparency (remote) Distributed environment (remote) Better fine-grained access (local) Better Performance (local) BONUS: 1. ___________ is used to query enterprise beans, their persistent states, and their relationships. SQL EJB QL MS ACCESS 2. The BNF form uses __________ to define elements of a programming language. Characters Symbols Variables Note: Backus-Naur Form 3. The _________ isolation anomaly occurs when a transaction reads data that had been modified by another transaction. Phantom Reads Non-Repeatable Reads Dirty Reads 4. In which of the following states can an entity bean exist? 1. EXIST 2. DOES NOT EXIST 3. READY 4. POOLED 5. DEAD 1, 3, 5 2, 3, 4 1, 2, 5 2, 3, 5 5. For __________ bean, the container manages the persistence of the entity bean. BMP Session CMP Message-Driven 6. The file ____ contains meta information of EJB. ejb-jar.xml manifest.mf config.xml sun-ejb-jar.xml 7. The _______ methods allow the container to notify the events in its life cycle. creater finder callback home 8. The __________ contain Java classes and libraries required to implement a JCA. EJB Application JAR files Web Application WAR files Application client JAR files Resource Adapter RAR files 9. __________ ensures that a relationship between entity beans remains consistent. Entity integrity (related to primary key to identify the entity) Referential integrity Database integrity Triggers 12. The __________ can be set by locating the relationship between two entity beans and then performing the necessary configuration in the deployment descriptor. Cascade delete property Java object tuple 11. Field-specific and relationship-specific are Two forms of business rule Two types of business rule Two categories of business rule
- Xem thêm -

Tài liệu liên quan