1. Which of the following are the main methods in java.sql.Connection interface that
are used for handling transactions?
1. SetAutoCommit()
2. commit()
3. rollback()
1,2
2,3
1,3
1,2,3
2. Which of the following methods of the javax.ejb.SessionSynchronization interface
are used for handling transactions in the stateful session beans?
1. afterBegin()
2. beforeBegin()
3. afterCompletition(boolean committed)
4. beforeCompletition(boolean committed)
1,2,3
2,3,4
1,3,4
1,2,3,4
3. The JMS API architecture is composed of which of the following parts?
1. JMS Provider
2. JMS Clients
3. Messages
4. Administered Objects
1,2,3
2,3,4
1,3,4
1,2,3,4
4. A transacted session supports ____________________series of transaction.
Single
Multiple
Double
Triple
5. The identity of both stateful and stateless session beans can be compared using
the _________ method.
isIdentical()
Identical()
Compare()
6. The ________ method of the CMP Bean is called by the container to disassociate a
bean from its environment.
ejbRemove()
unsetEntityContext()
ejbPassivate()
7. _____________ are implemented differently in both CMP and BMP beans.
Containers
Container call back methods
Instance of an entity bean
8. BNF schemas created using BNF symbols use these schemas to declare ________
in EJB QL.x page 69
Queries
Functions
Relations
9. The _________ isolation anomaly occurs when data is changed between two
consecutive reads by a transaction.
Phantom Read
Non-Repeatable Read
Dirty Read
10. The _________ manages interactions between applications and the application
server.
Container
Transaction manager
CMT
11. The ___________ controls JDBC transactions using the commit () and rollback()
methods.
DBMS transaction manager
DQL transaction manager
Transaction server
12. The __________ field provides a way to correlate messages in a request/response
type of setup.
JMSCorrelationID
JMSDestination
JMSExpiration
13. In __________, J2EE architecture makes use of a Message-Driven bean for
fulfilling the requests of the client.
Resource façade
Session façade
Message façade
14. In __________, an end user is required to authenticate by providing necessary
authentication data only when the user tries to access a secured resource.
J2EE security architecture
Lazy authentication
Resource security
15.(xem lai) Which of the following method of Entity Beans is used to retrieve
information from the database?
Retrieve
Finder
Remove
Home
16. Which of the following deployment descriptor contains the details about the
classes and interfaces which compose an EJB application along with the persistence
details in case of an Entity Bean?
application.xml
web.xml
ejb.xml
ejb-jar.xml
17. Which of the following exception is thrown if the container encounters a problem
in searching a particular record?
Finder Exception
Duplicate Key Exception
Remove Exception
Create Exception
18. Which of the following behavioral UML diagram focuses on the type and order
of messages passed between elements during execution?
Sequence
State Machine
Timing
Use Case
19. Which of the following ACID property specifies that each transaction should be
allowed to execute independently?
Atomicity
Isolation
Consistency
Durability
20. Which of the following messaging domain models allow multiple applications or
components to receive the same message?
Point to Point
Point to Publish
Publish and Subscribe
Point and Subscribe
21. EJB QL supports path navigation using a __________.
Dot (.)
Arrow (->)
Hyphen (-)
Equal to (=)
22. Which of the following are the properties of a transaction?
1. Isolation
2. Durability
3. Atomicity
4. Consistency
1, 2, 3
2, 3, 4
1, 3, 4
1, 2, 3, 4
23. Which of the following properties of a transaction ensures that each transaction
should be allowed to execute independently without interference from other
transactions or processes?
Atomicity
Consistency
Isolation
Durability
24. Which of the following components of the Transaction processing are EJB
business methods which invoke transactions?
Application Components
Resource Managers
Transaction Manager
All of the above
25. ___________________transaction contains one main transaction with one or
smaller transactions embedded within it.
Flat
Nested
Joint
Main
1. Strengths of EJB clients are:
EJB clients provide a more flexible user interface.
EJB clients distribute the workload.
EJB clients handle complex data models.
EJB clients tend to be more complex. (drawback)
2. ____________ are used for identifying the objects and classes in an application.
Attributes
ERD's
Object models
3. The __________ indicates that an inappropriate argument has been passed to a method.
java.lang.IllegalArgumentException
java.rmi.MarshalException
Javax.ejb.AccessLocalException
4. _________ are used to represent the relationships between various entities.
Object models
ERDs
Fully-attributed ERD
5. The ____________ is thrown if an attempt is made to create an entity bean object with
an existing primary key.
javax.ejb.DuplicateKeyException
javax.ejb.FinderException
Javax.ejb.RemoveException
6. The System exception ____________ indicates communication related problems that
may occur during the execution of a remote method call.
java.rmi.NoSuchObjectException
java.rmi.RemoteException
javax.lang.SecurityException
7. Which types of cardinalities are supported by EJB?
1. One-to-One
2. One-to-Many
3. Many-to-Many
1,2
2,3
1,3
1,2,3
8. The _______ clause of a query in an EJB QL contains the condition using which the
retrieved data can be filtered.
SELECT
FROM
WHERE
ORDER BY
9. The __________ components of JMS API architecture denote preconfigured JMS
objects.
JMS provider
JMS clients
Messages
Administered object
10. The ________ exception is thrown by the container to indicate that a system
exception has occurred and the current transaction will be rolled back.
EJBException
IllegalStateException
NoSuchEntityException
NoSuchObjectException
11. A relationship between objects in which one object contains another object is termed
as ____________.
Association
Inheritance
Aggregation
Generalization
12. An enterprise application is usually composed of which of following layer
architecture?
1. Data Layer
2. Business Layer
3. Presentation Layer
1, 2
2, 3
1, 3
1, 2, 3
13. Which of the following entities of Business Objects specifies that the same business
object can be used by different sub-systems of the same application as well as by
different applications?
Reusability
Access Control
Remote Access
All of the above
14. EJB comes in which of the following flavors?
1. Session bean
2. Entity bean
3. Message-driven bean
1, 2
2, 3
1, 3
1, 2, 3
15. The lifestyle of the stateless session bean goes through which of the following stages?
1. Bean Creation
2. Bean Use
3. Bean Access
4. Bean Removal
1, 2, 3
2, 3, 4
1, 2, 4
1, 2, 3, 4
16. Which of the following Session Bean Components contains the implementation
method of the bean?
Session Bean Class
EJB Object Interface
Local EJB Object Interface
Home Object Interface
17. Which of the following are the main features of entity beans?
1. Persistence
2. Shared access
3. Primary key
4. Relationship
1, 2, 3
2, 3, 4
1, 2, 4
1, 2, 3, 4
18. Entity beans undergo which of the following stages?
1. Does Not Exist
2. Pooled
3. Ready
1, 2
2, 3
1, 3
1, 2, 3
19. A session bean which is exposed as Web service can be called by client program in
which of the following ways?
1. Static stub
2. dynamic proxy
3. dynamic invocation Interface
1, 2
2, 3
1, 3
1, 2, 3
20. Which of the following deployment descriptors includes information which describes
how the contents of a unit are composed with other units to produce a new component?
Structural
Assembly
Meta-data
None of the above
21. Which of the following are the kinds of aggregation relationships?
1. Basic
2. Advance
3. Composition
1, 2
2, 3
1, 3
1, 2, 3
22. An _________ can be designed as a message receiver that works in synchronous
mode.
Session bean
Entity bean
Application bean
23. To enhance performance, a stateful session bean can be converted to ____________.
IIOP
stateless session bean
CORBA
24. __________ accesses each entity bean instance with the help of a primary key.
Container call back methods
Multiple instances
Container
25. Advantages of using Remote interface are:
Better location transparency (remote)
Distributed environment (remote)
Better fine-grained access (local)
Better Performance (local)
BONUS:
1. ___________ is used to query enterprise beans, their persistent states, and their
relationships.
SQL
EJB QL
MS ACCESS
2. The BNF form uses __________ to define elements of a programming language.
Characters
Symbols
Variables
Note: Backus-Naur Form
3. The _________ isolation anomaly occurs when a transaction reads data that had been
modified by another transaction.
Phantom Reads
Non-Repeatable Reads
Dirty Reads
4. In which of the following states can an entity bean exist?
1. EXIST
2. DOES NOT EXIST
3. READY
4. POOLED
5. DEAD
1, 3, 5
2, 3, 4
1, 2, 5
2, 3, 5
5. For __________ bean, the container manages the persistence of the entity bean.
BMP
Session
CMP
Message-Driven
6. The file ____ contains meta information of EJB.
ejb-jar.xml
manifest.mf
config.xml
sun-ejb-jar.xml
7. The _______ methods allow the container to notify the events in its life cycle.
creater
finder
callback
home
8. The __________ contain Java classes and libraries required to implement a JCA.
EJB Application JAR files
Web Application WAR files
Application client JAR files
Resource Adapter RAR files
9. __________ ensures that a relationship between entity beans remains consistent.
Entity integrity (related to primary key to identify the entity)
Referential integrity
Database integrity
Triggers
12. The __________ can be set by locating the relationship between two entity beans and
then performing the necessary configuration in the deployment descriptor.
Cascade delete property
Java object
tuple
11. Field-specific and relationship-specific are
Two forms of business rule
Two types of business rule
Two categories of business rule
- Xem thêm -