Escolar Documentos
Profissional Documentos
Cultura Documentos
a.
b.
c.
d.
Common
Non-field
Field
Custom
2. What is the term for determining whether a user has access to particular resource.
a.
b.
c.
d.
Authentication
Secrecy
Confidentiality
Authorization
3. The J2ee platform uses a multi-tiered distributed application model which of the following is not considered a tier in this architecture.?
a.
b.
c.
d.
Client tier
Security tier
Web tier
EIS tier
Non-field
Custom
Common
Field
The action class usually acts as a controller and executes a particular business logic depending on request object and input parameter.
The action class usually acts as a model and executes a particular business logic depending on the request object and input parameter.
The action class usually acts as a view and executes a particular business logic depending on request object and input parameter.
The action class usually acts as a controller and executes a particular business logic depending on request object and input parameter.
a. If there is no execute method and no other method is specified in the configuration then also action is executed successfully.
b. Implementing action interface is optional
c. If action is not implemented the framework will use reflection to look for an execute method.
d. the method invoked in the processing of an action Is the execute method.
10. You are automating a computer parts ordering business. For this purpose, your web application requires a controller component that would
receive the requests and dispatch them to appropriate JSP pages. It would also coordinate the request processing among the JSP pages, thereby
managing the workflow. Finally, the behavior of the controller component is to be loaded at runtime as needed.Which design pattern would be
appropriate in this situation? (Select one)
a Front Controller
b Session Facade
c Transfer Object
d Model-View-Controller
e Data Access Object
11. Which of the following are "best practices" for large distributed systems?
A.
Avoid business logic implementation in the display code; display inconsistencies can result because the logic can be copied and modified
28.you are building the server side of an application and you are finalizing the interfaces that you will provide to the presentation layer.however
you have not yet finalized the access details of the business services.which design pattern should you use to mitigate this concern?
a.model-view-controller
b.business delegate
c.data access object
d.facade
29.which of the following provide life cycle of action?
a. servletdispatch instantiates a new action proxy and calls execute()
once the execution of action is complete the request is sent to a result to render the results
interceptors intercepts the request being sent to and returning from action
b. servletdispatch instantiates a new action proxy and calls execute()
interceptors intercepts the request being sent to and returning from action
once the execution of action is complete the request is sent to a result to render the results
c. interceptors intercepts the request being sent to and returning from action
servletdispatch instantiates a new action proxy and calls execute()
once the execution of action is complete the request is sent to a result to render the results
d. interceptors intercepts the request being sent to and returning from action
once the execution of action is complete the request is sent to a result to render the results
servletdispatch instantiates a new action proxy and calls execute()
30. In class diagram what does a line with an arrow from one class to other denote?
a.method visibility
b.attribute visibility
c.class visibility
d.global visibility
31. Which of the following are not benefits of using the MVC best practice?
A.
B.
C.
D.
Clarifies application design through separation of data modeling issues from data display and user interaction
Enhances reusability by separating application functionality from presentation
Facilitates maintenance by encapsulating application functions behind trusted APIs
Simplifies database design because only the View components access the database
32. You have been contacted by a company to help them improve the performance of their e-commerce application. You have
suggested that the hardware on which the application is currently deployed (two web servers and a database server) be migrated to
three web servers, an application server, and a database server (all on different machines). You assure them that all the required
software rewrites will be worth it in the long run. What are the characteristics of your suggested architecture?
A.
B.
C.
D.
Fat clients
Thin clients
Good separation of business logic
Good scalability
a. constructor,class,getter
b. setter,class,getter
c. construction,interface,setter
d. construction,interface,getter
36. which item is not one of the three kinds of relationship a class diagram can have?
a.assosciation
b.specialisation
c.generalisation
d.aggregation
38. which of the following is not true of using the mvc best practice?
A.
The Model in an MVC-based application can be divided into two parts: the internal state of the system and the actions that can be taken
Name
Attributes
Method
Comments
Data access objects are a useful best practice, as they encapsulate access to data and maintain a clean separation of bean and database
access code.
B.
C.
A session bean facade provides a simple, single point of entry to shared entity beans.
A session bean facade does not shield the client from complex entity bean relationships and manages workflow on a client's
behalf.
D.
A session bean facade avoids the problems associated with access to entity beans from the client layernamely overabundance of
network traffic and latency and awkward security management.
51. which of the following can execute code before and after action is involked?
a. OGNL
b. validator
c. annotations
d. interceptors
52. which of the following statements are true in respect to value stack?
a. it is the place where data associated with processing of the request is stored
b.the name attribute of the ui tag is the one which links the property on the valuestack
c.<s:text filed name=username label=user name value=somename /> here the propertyon the value stack.
d.all the form properties will be stored on the valuestack
53. which of the following statements are true in respect methodfilterinterceptor? Choose 3
a. parameter excludemethods is used to have the method names to be excluded from interceptor processing
b.if the method name are available in both includemethods and excludemethods, it will be considered as excluded methodmethod
c.parameter includemethods is used to have method names to be included in the interceptor processing
d.methodfilterinterceptor is an abstract interceptor used as a base class for interceptors that will filter execution based on method names.
54. select the correct options related to the actioncontext? Check all that apply.
a. the Actioncontext is a global storage area that holds all data associated with
b.the valuestack is the part of actioncontext
c.the actioncontext is thread local that makes the struts 2 action thread safe
d.the actioncontext is the context in which action is executed
55. A standard set of result tokens are defined by the actionsupport base class.Which of the following are predefined result names?
a. success
none
error
input
login
b.pass
none
error
log-off
logo
c.success
none
error
output
log
d. . success
none
error
log-off
login
56. What are the non-functional requirements?
a. performance,reliability,documentation
b. specification,usecase,
c. performance,availability,reliability
d. scalability, extensibility, manageability
57. which statement is not true about state machines and state diagrams?
a. the state diagram shows the sequences of states that an object passes through during its lifetime.
b. state diagrams are used in situations for which all or most of the events represents the completion of internally generated actions(that
is , procedural flow of control).
c. a state machine is a basically a diagram of states and transactions that describe the response of an object of a given class to the receipt of
external stimuli, and is generally attached to a class or method.
d. a state diagram represents a state machine; a state being a condition during the life of an object or an interaction during which it satisfies some
condition , performs some action, or waits for some event.
58. Which one of the following must be done before authorization takes place? (Select one)
a Data validation
b User authentication
c Data encryption
d Data compression
59. Which of the following elements are used for defining a security constraint? Choose only those elements that come directly under the
securityconstraint element. (Select three)
a login-config
b role-name
c role
d transport-guarantee
e user-data-constraint
f auth-constraint
g authorization-constraint
h web-resource-collection
60. Which of the following statements regarding authentication mechanisms are correct?(Select two)
a The HTTP Basic mechanism transmits the username/password in the open.
b The HTTP Basic mechanism uses HTML FORMs to collect usernames/passwords.
c The transmission method in the Basic and FORM mechanisms is the same.
d The method of capturing the usernames/passwords in the Basic and FORM mechanisms
is the same.
61. Which of the following statements are correct for an unauthenticated user?(Select two)
a HttpServletRequest.getUserPrincipal() returns null.
b HttpServletRequest.getUserPrincipal() throws SecurityException.
c HttpServletRequest.isUserInRole() returns false.
-d HttpServletRequest.getRemoteUser() throws a SecurityException.
D Object
Statement A:notify(), notifyall() and wait() can be used only within synchronized block
Statement B:notify(), notifyall() and wait() can be called on objects not thread.
a. A is true, B is false
b. A is false, B is true
c. Both A and B are True
d. Both A and B are false
Annotation type can extend another annotation type. True/ False
False/true
Which validator is used for Action Level Error message?
a. Field,
b. NonField
c. Custom
d. Common
Question about what is model,view ,controller in struts 2.0
a action , UGI tags, interceptors
b. action , result,interceptors
c. action ,view,interceptors
d.action,result,filterdispatcher
Which one of the following is true regarding property files in struts?
a.
b.
Web-Content/PropertyFile.xml
WebINF/PropertyFile.xml
Declaring a volatile java variable means...(i donno wot the question is, but this is the truth)
declaring a volatile java variable the value will be saved in main memory not local
REQUEST TO filterdispatcher
Actionmapping is called
Actionproxy is called to execute the method actioninvocation
Interceptors to process the request
Action is executed
Result
Interceptors in reverse order
NO IDEA