de thi c00910g sang18-5-2012

Upload: nguyentuan822

Post on 05-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 de thi c00910G sang18-5-2012

    1/4

    2. An enterprise application is usually composed of which of following layer architecture?

    1. Data Layer

    2. Business Layer

    3. Presentation Layer

    A. 1, 2

    B. 2, 3

    C. 1, 3*D. 1, 2, 3

    3. EJB comes in which of the following flavors?

    1. Session bean

    2. Entity bean

    3. Message-driven bean

    A. 1, 2

    B. 2, 3

    C. 1, 3

    *D. 1, 2, 3

    4. The __________ are encoded into the business logic of the application that uses the database.

    A. Database-oriented business rules

    *B. Application-oriented business rules

    C. System-oriented business rules

    2. Which of the following Session Bean Components contains the implementation method of the

    bean?

    *A. Session Bean Class

    B. EJB Object Interface

    C. Local EJB Object Interface

    D. Home Object Interface

    4. The identity of both stateful and stateless session beans can be compared using the _________

    method.

    *A. isIdentical()

    B. Identical()

    C. Compare()

    1.__________ accesses each entity bean instance with the help of a primary key.

    A. Container call back methods

    B. Multiple instances

    *C. Container

    2. Which of the following are the main features of entity beans?1. Persistence2. Shared access

    3. Primary key

    4. Relationship

    A. 1, 2, 3

    B. 2, 3, 4

    C. 1, 2, 4

    *D. 1, 2, 3, 4

    1.____________ are used for identifying the objects and classes in an application.

    A. Attributes

    B. ERD's*C. Object models

  • 7/31/2019 de thi c00910G sang18-5-2012

    2/4

    2. The __________ indicates that an inappropriate argument has been passed to a method.

    *A.java.lang.IllegalArgumentException

    B. java.rmi.MarshalException

    C. Javax.ejb.AccessLocalException

    3._________ are used to represent the relationships between various entities.

    A. Object models

    *B. ERDs

    C. Fully-attributed ERD

    4. The ____________ is thrown if an attempt is made to create an entity bean object with an

    existing primary key.

    *A. javax.ejb.DuplicateKeyException

    B. javax.ejb.FinderException

    C. Javax.ejb.RemoveException

    5. The ________ exception is thrown by the container to indicate that a system exception has

    occurred and the current transaction will be rolled back.

    *A. EJBException

    B. IllegalStateExceptionC. NoSuchEntityException

    D. NoSuchObjectException

    6. Which types of cardinalities are supported by EJB?

    1. One-to-One

    2. One-to-Many

    3. Many-to-Many

    A. 1,2

    B. 2,3

    C. 1,3*D. 1,2,3

    7. The System exception ____________ indicates communication related problems that may

    occur during the execution of a remote method call.

    A. java.rmi.NoSuchObjectException

    *B. java.rmi.RemoteException

    C. javax.lang.SecurityException

    8. UML diagrams are divided into which of the following types?1. Structural

    2. Behavioral3. Unified

    *A. 1, 2

    B. 2, 3

    C. 1, 3

    D. 1, 2, 3

    1. The _______ clause of a query in an EJB QL contains the condition using which the retrieved

    data can be filtered.

    A. SELECT

    B. FROM

    *C. WHERE

    D. ORDER BY

    2. A relationship between objects in which one object contains another object is termed as

    ____________.A. Association

  • 7/31/2019 de thi c00910G sang18-5-2012

    3/4

    B. Inheritance

    *C. Aggregation

    D. Generalization

    3. Which of the following are the kinds of aggregation relationships?1. Basic2. Advance

    3. Composition

    A. 1, 2B. 2, 3

    *C. 1, 3

    D. 1, 2, 3

    5. Which of the following operations accesses the state of an object but does not alter the state?

    A. Modification

    *B. Selection

    C. Iteration

    D. Construction

    7. In a ____________ relationship, a record in the first table corresponds to one or more records

    in the second table, but a record in the second table corresponds to exactly one record in the first

    table.*A. One-to-many

    B. One-to-one

    C. Many-to-many

    8. In a _______ relationship, a record in either table can correspond to more than one record in

    the other table.

    A. One-to-many

    B. One-to-one

    *C. Many-to-many

    9. EJB QL uses the ____________ to represent relationships which use a named relationship

    from one object to another.

    A. Built-in model

    B. Relational model

    *C. Object model

    12. In which of the following relationships, one bean instance relates to multiple bean instances?

    A. One-to-one

    *B. One-to-Many

    C. Many-to-Many

    D. All of the above

    14. Field-specific and relationship-specific are

    A. Two forms of business rule

    B. Two types of business rule*C. Two categories of business rule

    15.___________ is used to query enterprise beans, their persistent states, and their relationships.

    A. SQL

    *B. EJB QL

    C. MS ACCESS

    5. Which of the following properties of a transaction ensures that each transaction should be

    allowed to execute independently without interference from other transactions or processes?

    A. Atomicity

    B. Consistency

    *C. Isolation

    D. Durability

  • 7/31/2019 de thi c00910G sang18-5-2012

    4/4

    11. The ________ exception is thrown by the container to indicate that a system exception has

    occurred and the current transaction will be rolled back.

    *A. EJBException

    B. IllegalStateException

    C. NoSuchEntityException

    D. NoSuchObjectException

    2. The __________ components of JMS API architecture denote preconfigured JMS objects.

    A. JMS provider

    B. JMS clients

    C. Messages

    *D. Administered object

    3. The __________ field provides a way to correlate messages in a request/response type of setup.

    *A. JMSCorrelationID

    B. JMSDestination

    C. JMSExpiration

    1. In __________, J2EE architecture makes use of a Message-Driven bean for fulfilling the

    requests of the client.

    A. Resource faadeB. Session fascade

    *C. Message fascade

    2. In __________, an end user is required to authenticate by providing necessary authentication

    data only when the user tries to access a secured resource.

    A. J2EE security architecture

    *B. Lazy authentication

    C. Resource security

    BNF schemas created using BNF symbols use these schemas to declare ________ in

    EJB QL.(sach 69/118)

    Queries

    Functions

    Relations