Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

351.

What Is Ejb Server Provider?

Answer»

A VENDOR that SUPPLIES an EJB SERVER.

A vendor that supplies an EJB server.

352.

What Is Dtd?

Answer»

Document type definition. An optional part of the XML document PROLOG, as specified by the XML standard. The DTD specifies constraints on the valid TAGS and tag sequences that can be in the document. The DTD has a number of shortcomings, however, and this has led to VARIOUS schema proposals. For EXAMPLE, the DTD entry says that the XML element called username contains parsed character data-that is, text alone, with no other structural elements under it. The DTD includes both the local subset, defined in the current file, and the EXTERNAL subset, which consists of the definitions contained in external DTD files that are referenced in the local subset using a parameter entity.

Document type definition. An optional part of the XML document prolog, as specified by the XML standard. The DTD specifies constraints on the valid tags and tag sequences that can be in the document. The DTD has a number of shortcomings, however, and this has led to various schema proposals. For example, the DTD entry says that the XML element called username contains parsed character data-that is, text alone, with no other structural elements under it. The DTD includes both the local subset, defined in the current file, and the external subset, which consists of the definitions contained in external DTD files that are referenced in the local subset using a parameter entity.

353.

What Is Document Root?

Answer»

The top-level directory of a WAR. The document root is where JSP pages, client-side CLASSES and archives, and STATIC Web RESOURCES are stored.

The top-level directory of a WAR. The document root is where JSP pages, client-side classes and archives, and static Web resources are stored.

354.

What Is Document Object Model?

Answer»

An API for accessing and MANIPULATING XML documents as tree structures. DOM provides platform-neutral, language-neutral INTERFACES that ENABLES programs and scripts to dynamically access and MODIFY content and structure in XML documents.

An API for accessing and manipulating XML documents as tree structures. DOM provides platform-neutral, language-neutral interfaces that enables programs and scripts to dynamically access and modify content and structure in XML documents.

355.

What Is Distributed Application?

Answer»

An APPLICATION made up of DISTINCT components running in separate RUNTIME environments, usually on different PLATFORMS connected via a network. Typical DISTRIBUTED applications are two-tier (client-server), three-tier (client-middleware-server), and multitier (client-multiple middleware-multiple servers).

An application made up of distinct components running in separate runtime environments, usually on different platforms connected via a network. Typical distributed applications are two-tier (client-server), three-tier (client-middleware-server), and multitier (client-multiple middleware-multiple servers).

356.

What Is Digest Authentication?

Answer»

An authentication mechanism in which a Web application authenticates itself to a Web server by SENDING the server a message digest along with its HTTP request message. The digest is computed by employing a one-way hash ALGORITHM to a concatenation of the HTTP request message and the client's PASSWORD. The digest is typically much smaller than the HTTP request and doesn't contain the password.

An authentication mechanism in which a Web application authenticates itself to a Web server by sending the server a message digest along with its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation of the HTTP request message and the client's password. The digest is typically much smaller than the HTTP request and doesn't contain the password.

357.

What Is Destination?

Answer»

A JMS ADMINISTERED OBJECT that encapsulates the identity of a JMS QUEUE or topic. See point-to-point MESSAGING system, publish/subscribe messaging system.

A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point messaging system, publish/subscribe messaging system.

358.

What Is Deployer?

Answer»

A PERSON who INSTALLS J2EE MODULES and applications into an OPERATIONAL environment.

A person who installs J2EE modules and applications into an operational environment.

359.

What Is Delegation?

Answer»

An act whereby one PRINCIPAL authorizes ANOTHER principal to USE its identity or PRIVILEGES with some restrictions.

An act whereby one principal authorizes another principal to use its identity or privileges with some restrictions.

360.

What Is Declarative Security?

Answer»

Mechanisms USED in an APPLICATION that are EXPRESSED in a DECLARATIVE syntax in a deployment DESCRIPTOR.

Mechanisms used in an application that are expressed in a declarative syntax in a deployment descriptor.

361.

What Is Declaration?

Answer»

The very first thing in an XML DOCUMENT, which DECLARES it as XML. The minimal DECLARATION is . The declaration is part of the document PROLOG.

The very first thing in an XML document, which declares it as XML. The minimal declaration is . The declaration is part of the document prolog.

362.

What Is Ddp?

Answer»

Document-driven PROGRAMMING. The USE of XML to DEFINE APPLICATIONS.

Document-driven programming. The use of XML to define applications.

363.

What Is Credentials?

Answer»

The INFORMATION DESCRIBING the SECURITY ATTRIBUTES of a PRINCIPAL.

The information describing the security attributes of a principal.

364.

What Is Create Method?

Answer»

A method DEFINED in the HOME interface and INVOKED by a client to CREATE an enterprise bean.

A method defined in the home interface and invoked by a client to create an enterprise bean.

365.

What Is Corba?

Answer»

Common OBJECT Request Broker ARCHITECTURE. A language-independent DISTRIBUTED object MODEL SPECIFIED by the OMG.

Common Object Request Broker Architecture. A language-independent distributed object model specified by the OMG.

366.

What Is Conversational State?

Answer»

The FIELD values of a session bean PLUS the transitive closure of the objects reachable from the bean's FIELDS. The transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is, the fields that WOULD be stored by serializing the bean instance.

The field values of a session bean plus the transitive closure of the objects reachable from the bean's fields. The transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is, the fields that would be stored by serializing the bean instance.

367.

What Is Context Root?

Answer»

A NAME that gets mapped to the DOCUMENT ROOT of a WEB application.

A name that gets mapped to the document root of a Web application.

368.

What Is Context Attribute?

Answer»

An OBJECT BOUND into the CONTEXT ASSOCIATED with a SERVLET.

An object bound into the context associated with a servlet.

369.

What Is Content?

Answer»

In an XML DOCUMENT, the PART that occurs after the prolog, including the ROOT element and everything it CONTAINS.

In an XML document, the part that occurs after the prolog, including the root element and everything it contains.

370.

What Is Container-managed Transaction?

Answer»

A transaction whose BOUNDARIES are defined by an EJB CONTAINER. An ENTITY BEAN must use container-managed transactions.

A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions.

371.

What Is Container-managed Sign-on?

Answer»

The mechanism whereby security information needed for signing on to a RESOURCE is SUPPLIED by the CONTAINER.

The mechanism whereby security information needed for signing on to a resource is supplied by the container.

372.

What Is Container-managed Persistence?

Answer»

The mechanism whereby DATA TRANSFER between an entity bean's VARIABLES and a resource MANAGER is managed by the entity bean's container.

The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean's container.

373.

What Is Container?

Answer»

An entity that provides life-cycle management, security, deployment, and RUNTIME services to J2EE COMPONENTS. Each TYPE of container (EJB, Web, JSP, servlet, applet, and application CLIENT) also provides component-specific services.

An entity that provides life-cycle management, security, deployment, and runtime services to J2EE components. Each type of container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services.

374.

What Is Connector Architecture?

Answer»

An architecture for integration of J2EE products with ENTERPRISE information systems. There are two parts to this architecture: a resource ADAPTER provided by an enterprise information system vendor and the J2EE product that allows this resource adapter to PLUG in. This architecture defines a set of contracts that a resource adapter must support to plug in to a J2EE product-for example, transactions, security, and resource management.

An architecture for integration of J2EE products with enterprise information systems. There are two parts to this architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this resource adapter to plug in. This architecture defines a set of contracts that a resource adapter must support to plug in to a J2EE product-for example, transactions, security, and resource management.

375.

What Is Connector?

Answer»

A standard extension mechanism for containers that PROVIDES connectivity to ENTERPRISE information systems. A connector is specific to an enterprise information system and consists of a resource adapter and application DEVELOPMENT TOOLS for enterprise information system connectivity. The resource adapter is plugged in to a container through its support for system-level contracts defined in the Connector ARCHITECTURE.

A standard extension mechanism for containers that provides connectivity to enterprise information systems. A connector is specific to an enterprise information system and consists of a resource adapter and application development tools for enterprise information system connectivity. The resource adapter is plugged in to a container through its support for system-level contracts defined in the Connector architecture.

376.

What Is Component-managed Sign-on?

Answer»

A mechanism whereby SECURITY information needed for SIGNING on to a resource is provided by an application COMPONENT.

A mechanism whereby security information needed for signing on to a resource is provided by an application component.

377.

What Is Component Contract?

Answer»

The contract between a J2EE component and its container. The contract INCLUDES life-cycle management of the component, a CONTEXT interface that the instance uses to obtain various information and SERVICES from its container, and a list of services that EVERY container MUST provide for its components.

The contract between a J2EE component and its container. The contract includes life-cycle management of the component, a context interface that the instance uses to obtain various information and services from its container, and a list of services that every container must provide for its components.

378.

What Is Commit?

Answer»

The point in a TRANSACTION when all UPDATES to any RESOURCES involved in the transaction are MADE permanent.

The point in a transaction when all updates to any resources involved in the transaction are made permanent.

379.

What Is Comment?

Answer»

In an XML document, text that is ignored UNLESS the PARSER is SPECIFICALLY told to RECOGNIZE it.

In an XML document, text that is ignored unless the parser is specifically told to recognize it.

380.

What Is Client-certificate Authentication?

Answer»

An authentication MECHANISM that USES HTTP over SSL, in which the SERVER and, optionally, the client authenticate each other with a public key certificate that conforms to a standard that is defined by X.509 Public Key INFRASTRUCTURE.

An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client authenticate each other with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.

381.

What Is Certificate Authority?

Answer»

A TRUSTED organization that ISSUES public KEY CERTIFICATES and PROVIDES identification to the bearer.

A trusted organization that issues public key certificates and provides identification to the bearer.

382.

What Is Cdata?

Answer»

A predefined XML TAG for character data that means "don't interpret these characters," as opposed to parsed character data (PCDATA), in which the normal RULES of XML syntax apply. CDATA SECTIONS are typically USED to show examples of XML syntax.

A predefined XML tag for character data that means "don't interpret these characters," as opposed to parsed character data (PCDATA), in which the normal rules of XML syntax apply. CDATA sections are typically used to show examples of XML syntax.

383.

What Is Cascade Delete?

Answer»

A deletion that TRIGGERS another deletion. A CASCADE DELETE can be specified for an entity BEAN that has container-managed persistence.

A deletion that triggers another deletion. A cascade delete can be specified for an entity bean that has container-managed persistence.

384.

What Is Caller Principal?

Answer»

The PRINCIPAL that identifies the INVOKER of the ENTERPRISE BEAN method.

The principal that identifies the invoker of the enterprise bean method.

385.

What Is Callback Methods?

Answer»

Component methods CALLED by the CONTAINER to notify the component of IMPORTANT events in its life cycle.

Component methods called by the container to notify the component of important events in its life cycle.

386.

What Is Business Method?

Answer»

A method of an ENTERPRISE BEAN that implements the business logic or RULES of an APPLICATION.

A method of an enterprise bean that implements the business logic or rules of an application.

387.

What Is Business Logic?

Answer»

The code that implements the FUNCTIONALITY of an application. In the ENTERPRISE JavaBeans ARCHITECTURE, this LOGIC is implemented by the METHODS of an enterprise bean.

The code that implements the functionality of an application. In the Enterprise JavaBeans architecture, this logic is implemented by the methods of an enterprise bean.

388.

What Is Build File?

Answer»

The XML FILE that contains one or more asant targets. A target is a set of TASKS you WANT to be executed. When starting asant, you can SELECT which targets you want to have executed. When no target is given, the project's default target is executed.

The XML file that contains one or more asant targets. A target is a set of tasks you want to be executed. When starting asant, you can select which targets you want to have executed. When no target is given, the project's default target is executed.

389.

What Is Binding (javaserver Faces Technology)

Answer»

Wiring UI COMPONENTS to back-end DATA sources such as backing bean PROPERTIES.

Wiring UI components to back-end data sources such as backing bean properties.

390.

What Is Binding (xml)?

Answer»

GENERATING the CODE needed to PROCESS a well-defined portion of XML DATA.

Generating the code needed to process a well-defined portion of XML data.

391.

What Is Bean-managed Transaction?

Answer»

A transaction whose boundaries are DEFINED by an enterprise BEAN.

A transaction whose boundaries are defined by an enterprise bean.

392.

What Is Bean-managed Persistence?

Answer»

The MECHANISM WHEREBY data transfer between an entity bean's variables and a RESOURCE manager is managed by the entity bean.

The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean.

393.

What Is Basic Authentication?

Answer»

An AUTHENTICATION mechanism in which a Web server AUTHENTICATES an entity via a user name and PASSWORD obtained USING the Web application's built-in authentication mechanism.

An authentication mechanism in which a Web server authenticates an entity via a user name and password obtained using the Web application's built-in authentication mechanism.

394.

What Is Backing Bean?

Answer»

A JavaBeans component that corresponds to a JSP PAGE that INCLUDES JavaServer Faces components. The backing bean defines PROPERTIES for the components on the page and methods that PERFORM processing for the component. This processing includes EVENT handling, validation, and processing associated with navigation.

A JavaBeans component that corresponds to a JSP page that includes JavaServer Faces components. The backing bean defines properties for the components on the page and methods that perform processing for the component. This processing includes event handling, validation, and processing associated with navigation.

395.

What Is B2b?

Answer»

B2B STANDS for Business-to-business.

B2B stands for Business-to-business.

396.

What Is Authorization Constraint?

Answer»

An authorization RULE that determines who is PERMITTED to ACCESS a Web RESOURCE COLLECTION.

An authorization rule that determines who is permitted to access a Web resource collection.

397.

What Is Authorization?

Answer»

The process by which ACCESS to a method or resource is determined. Authorization depends on the determination of WHETHER the PRINCIPAL associated with a request through authentication is in a given security role. A security role is a logical GROUPING of users defined by the person who assembles the application. A deployer maps security ROLES to security identities. Security identities may be principals or groups in the operational environment.

The process by which access to a method or resource is determined. Authorization depends on the determination of whether the principal associated with a request through authentication is in a given security role. A security role is a logical grouping of users defined by the person who assembles the application. A deployer maps security roles to security identities. Security identities may be principals or groups in the operational environment.

398.

What Is "applet Container"?

Answer»

A container that INCLUDES SUPPORT for the APPLET PROGRAMMING MODEL.

A container that includes support for the applet programming model.

399.

What Is "applet"?

Answer»

A J2EE component that typically executes in a Web browser but can execute in a variety of other APPLICATIONS or DEVICES that support the applet programming MODEL.

A J2EE component that typically executes in a Web browser but can execute in a variety of other applications or devices that support the applet programming model.

400.

What Is The Difference Between Session Bean And Entity Bean?one?

Answer»

The SESSION bean and ENTITY bean are two MAIN parts of EJB container.
Session Bean
--represents a workflow on behalf of a client.
--one-to-one logical mapping to a client.
--CREATED and destroyed by a client.
--not permanent objects.
--lives its EJB container(generally) does NOOT survive system shut down.
--two types: stateless and stateful beans Entity Bean.
--represents persistent data and behavior off this data.
--can be shared among multiple clients.
--persists across multiple invocations.
--findable permanent objects.
--outlives its EJB container, survives systeem shutdown.
--two types: container managed persistence(CCMP) and bean managed persistence(BMP).

The Session bean and Entity bean are two main parts of EJB container.
Session Bean
--represents a workflow on behalf of a client.
--one-to-one logical mapping to a client.
--created and destroyed by a client.
--not permanent objects.
--lives its EJB container(generally) does noot survive system shut down.
--two types: stateless and stateful beans Entity Bean.
--represents persistent data and behavior off this data.
--can be shared among multiple clients.
--persists across multiple invocations.
--findable permanent objects.
--outlives its EJB container, survives systeem shutdown.
--two types: container managed persistence(CCMP) and bean managed persistence(BMP).