Đăng ký Đăng nhập

Tài liệu Trắc nghiệm ejb

.DOC
7
584
64

Mô tả:

1 _____________ are implemented differently in both CMP and BMP beans. Containers Container call back methods Instance of an entity bean 2 The ___________ impose restrictions on the logical design of the database. Database-oriented business rule Application-oriented business rule System-oriented business rule 3 The _________ isolation anomaly occurs when data is changed between two consecutive reads by a transaction. Phantom Read Non-Repeatable Read Dirty Read 4 The _________ manages interactions between applications and the application server. Container Transaction manager CMT 5 The ___________ controls JDBC transactions using the commit () and rollback() methods. DBMS transaction manager DQL transaction manager Transaction server 6 The __________ field provides a way to correlate messages in a request/response type of setup. JMSCorrelationID JMSDestination JMSExpiration 7 In __________, J2EE architecture makes use of a Message-Driven bean for fulfilling the requests of the client. Resource facade Session fa?ade Message fa?ade 8 In __________, an end user is required to authenticate by providing necessary authentication data only when the user tries to access a secured resource. J2EE security architecture Lazy authentication Resource security 9 Which of the following method of Entity Beans is used to retrieve information from the database? retrieve finder remove home 10 Which of the following deployment descriptor contains the details about the classes and interfaces which compose an EJB application along with the persistence details in case of an Entity Bean? application.xml web.xml ejb.xml ejb-jar.xml 11 Which of the following exception is thrown if the container encounters a problem in searching a particular record? page 32 Finder Exception Duplicate Key Exception Remove Exception Create Exception 12 Which of the following behavioral UML diagram focuses on the type and order of messages passed between elements during execution? Sequence State Machine Timing Use Case 13 Which of the following ACID property specifies that each transaction should be allowed to execute independently? Atomicity Isolation Consistency Durability 14 Which of the following security mechanisms allow the use of digital certificate? bai 15 sile 5 Authorization Authentication Confidentiality Data integrity 15 Which of the following is captured by a state machine diagram? Type and order of messages Internal state transitions of an element Flow from one activity to the next in a single process Messages that are passed between different elements 16 Which of the following are the properties of a transaction? 1. Isolation 2. Durability 3. Atomicity 4. Consistency 1, 2, 3 2, 3, 4 1, 3, 4 1, 2, 3, 4 17 Which of the following properties of a transaction ensures that each transaction should be allowed to execute independently without interference from other transactions or processes? Atomicity Consistency Isolation Durability 18 Which of the following components of the Transaction processing are EJB business methods which invoke transactions? Application Components Resource Managers Transaction Manager All of the above 19 ___________________transaction contains one main transaction with one or smaller transactions embedded within it. Flat Nested Joint Main 20 Which of the following are the main methods in java.sql.Connection interface that are used for handling transactions? 1. SetAutoCommit() phan biet hoa thuong 2. commit() 3. rollback() bai 10 sile 21 1, 2 2, 3 1, 3 1, 2, 3 21 Which of the following methods of the javax.ejb.SessionSynchronization interface are used for handling transactions in the stateful session beans? 1. afterBegin() 2. beforeBegin() 3. afterCompletition(boolean committed) 4. beforeCompletition(boolean committed) ngoai ra con beforecomletitopn() 1, 2, 3 2, 3, 4 1, 3, 4 1, 2, 3, 4 22 The JMS API architecture is composed of which of the following parts? 1. JMS Provider 2. JMS Clients 3. Messages 4. Administered Objects 1, 2, 3 2, 3, 4 1, 3, 4 1, 2, 3, 4 23 A transacted session supports ____________________series of transaction. http://www.novell.com/documentation/extend52/Docs/help/MP/jms/tutorial/transacted.html Single Multiple Double Triple 24 The identity of both stateful and stateless session beans can be compared using the _________ method. isIdentical() Identical() Compare() 25 The ________ method of the CMP Bean is called by the container to disassociate a bean from its environment. ejbRemove() unsetEntityContext() ejbPassivate()
- Xem thêm -

Tài liệu liên quan