Mô tả:
1
_____________ are implemented differently in both CMP and BMP beans.
Containers
Container call back methods
Instance of an entity bean
2
The ___________ impose restrictions on the logical design of the database.
Database-oriented business rule
Application-oriented business rule
System-oriented business rule
3
The _________ isolation anomaly occurs when data is changed between two
consecutive reads by a transaction.
Phantom Read
Non-Repeatable Read
Dirty Read
4
The _________ manages interactions between applications and the application
server.
Container
Transaction manager
CMT
5
The ___________ controls JDBC transactions using the commit () and rollback()
methods.
DBMS transaction manager
DQL transaction manager
Transaction server
6
The __________ field provides a way to correlate messages in a request/response
type of setup.
JMSCorrelationID
JMSDestination
JMSExpiration
7
In __________, J2EE architecture makes use of a Message-Driven bean
for fulfilling the requests of the client.
Resource facade
Session fa?ade
Message fa?ade
8
In __________, an end user is required to authenticate by providing
necessary authentication data only when the user tries to access a
secured resource.
J2EE security architecture
Lazy authentication
Resource security
9
Which of the following method of Entity Beans is used to retrieve information
from the database?
retrieve
finder
remove
home
10
Which of the following deployment descriptor contains the details about the
classes and interfaces which compose an EJB application along with the
persistence details in case of an Entity Bean?
application.xml
web.xml
ejb.xml
ejb-jar.xml
11
Which of the following exception is thrown if the container encounters a problem
in searching a particular record?
page 32
Finder Exception
Duplicate Key Exception
Remove Exception
Create Exception
12
Which of the following behavioral UML diagram focuses on the type and order
of messages passed between elements during execution?
Sequence
State Machine
Timing
Use Case
13
Which of the following ACID property specifies that each transaction should be
allowed to execute independently?
Atomicity
Isolation
Consistency
Durability
14
Which of the following security mechanisms allow the use of digital certificate?
bai 15 sile 5
Authorization
Authentication
Confidentiality
Data integrity
15
Which of the following is captured by a state machine diagram?
Type and order of messages
Internal state transitions of an element
Flow from one activity to the next in a single process
Messages that are passed between different elements
16
Which of the following are the properties of a transaction?
1. Isolation
2. Durability
3. Atomicity
4. Consistency
1, 2, 3
2, 3, 4
1, 3, 4
1, 2, 3, 4
17
Which of the following properties of a transaction ensures that each transaction
should be allowed to execute independently without interference from other
transactions or processes?
Atomicity
Consistency
Isolation
Durability
18
Which of the following components of the Transaction processing are EJB
business methods which invoke transactions?
Application Components
Resource Managers
Transaction Manager
All of the above
19
___________________transaction contains one main transaction with one or
smaller transactions embedded within it.
Flat
Nested
Joint
Main
20
Which of the following are the main methods in java.sql.Connection interface
that are used for handling transactions?
1. SetAutoCommit() phan biet hoa thuong
2. commit()
3. rollback()
bai 10 sile 21
1, 2
2, 3
1, 3
1, 2, 3
21
Which of the following methods of the
javax.ejb.SessionSynchronization interface are used for handling
transactions in the stateful session beans?
1. afterBegin()
2. beforeBegin()
3. afterCompletition(boolean committed)
4. beforeCompletition(boolean committed)
ngoai ra con beforecomletitopn()
1, 2, 3
2, 3, 4
1, 3, 4
1, 2, 3, 4
22
The JMS API architecture is composed of which of the following parts?
1. JMS Provider
2. JMS Clients
3. Messages
4. Administered Objects
1, 2, 3
2, 3, 4
1, 3, 4
1, 2, 3, 4
23 A transacted session supports ____________________series of transaction.
http://www.novell.com/documentation/extend52/Docs/help/MP/jms/tutorial/transacted.html
Single
Multiple
Double
Triple
24
The identity of both stateful and stateless session beans can be compared using
the _________ method.
isIdentical()
Identical()
Compare()
25
The ________ method of the CMP Bean is called by the container to disassociate
a bean from its environment.
ejbRemove()
unsetEntityContext()
ejbPassivate()
- Xem thêm -