0

architecture Online Quiz - 7

Description: architecture Online Quiz - 7
Number of Questions: 20
Created by:
Tags: architecture
Attempted 0/20 Correct 0 Score 0

What is the name of the design pattern in which the data, the data presentation and the data controls are defined separately?

  1. Model-View-Controller.

  2. Publish-Subscribe.

  3. Observer-Observable.

  4. Reader-Writer.


Correct Option: A

This Layer manages reading, writing, updating and deleting stored data?

  1. Value Objects Layer.

  2. Presentation Layer.

  3. Data access object layer.

  4. Deployment Layer.


Correct Option: C

What is Persistence?

  1. The capability of an object to exist after the program that created it has stopped running.

  2. The ability of a class to support multiple threads.

  3. An Error-Handling technique.

  4. None of the above.


Correct Option: A

How do you change the value that is encapsulated by a wrapper class after you have instantiated it?

  1. Use the setXXX() method defined for the wrapper class.

  2. Use the parseXXX() method defined for the wrapper class.

  3. Use the equals() method defined for the wrapper class.

  4. The value encapsulated by a wrapper class is immutable.


Correct Option: D

Which would be most suitable for storing data elements that must not appear in the store more than once, if searching is not a priority?

  1. Collection

  2. List

  3. Set

  4. Map


Correct Option: D

How can you force garbage collection of an object?

  1. Call System.gc()

  2. Garbage collection cannot be forced.

  3. Call System.gc(), passing in a reference to the object to be garbage-collected.

  4. Call Runtime.gc()


Correct Option: B

A Vector is created, and three strings called Tinker, Evers and Chance are added to it. The method removeElement(“Evers”) is called. Which of the following Vector methods retrieve the string “Chance”?

  1. get(1);

  2. get(2);

  3. get(“Chance”);

  4. None of the above.


Correct Option: A

AI Explanation

To answer this question, we need to understand how elements are stored and retrieved from a Vector.

A Vector is an ordered collection of objects, similar to an array. Elements in a Vector are stored with an index, starting from 0.

In this case, when the method removeElement("Evers") is called, the string "Evers" is removed from the Vector. This means that the original index positions of the remaining elements may change.

Let's go through each option to determine which one retrieves the string "Chance":

Option A) get(1) - This option retrieves the element at index 1 in the Vector. Since the string "Evers" was removed, the string "Chance" would now be at index 1.

Option B) get(2) - This option retrieves the element at index 2 in the Vector. However, after removing "Evers", "Chance" would now be at index 1, not index 2.

Option C) get("Chance") - This option is not a valid method for retrieving elements from a Vector. The get() method in a Vector requires an integer index, not a string.

Option D) None of the above - This option is incorrect because option A (get(1)) is the correct answer.

Therefore, the correct answer is A) get(1). This option retrieves the string "Chance" from the Vector.

How do you declare and initialize a String array with two elements in a single line of code?

  1. String [] strArr = [“element 1”, “element 2];

  2. String [] strArr = {“element 1”, “element 2”};

  3. String [] strArr = (“element 1”, “element2”);

  4. String [] strArr = new String [“element 1” , “element 2”];


Correct Option: B

Your Company’s web-site offers the customers price comparisons of different products. You are in charge of converting the web-based solution over to the appropriate J2EE technology. Which of the following should you use?

  1. JSP, Servlets.

  2. JSP, Servlets, EJBs

  3. Applets, EJBs

  4. No need to change it.


Correct Option: A

Which statement is not true when discussing the EJB tier?

  1. The EJB tier hosts the application-specific business objects.

  2. The EJB tier does not host system-level services (such as transaction management, concurrency control and security); they are hosted on the EIS tier.

  3. The EJB tier is a link between the web tier and the EIS integration tier.

  4. The EJB tier hosts the entity beans and session beans, data access objects and value objects and perhaps master-detail modeling using enterprise beans.


Correct Option: B

What method can be used to help programmatically determine the caller’s identity within enterprise bean code?

  1. getIdentity()

  2. getCallerPrincipal()

  3. getCallerIdentity()

  4. getUserId()


Correct Option: B

Containers and servers have the same function. What is the difference between an Enterprise Java Beans Container and an Enterprise JavaBeans Server?

  1. Containers run within servers.

  2. Servers run within containers.

  3. Only one server can run in a container.

  4. Only one container can run in a server.


Correct Option: A

Which of the following is not a tier of three-tier architecture?

  1. Client Interface.

  2. Business Logic.

  3. Security

  4. Data Storage.


Correct Option: C

AI Explanation

To answer this question, you need to understand the concept of three-tier architecture.

Three-tier architecture is a client-server architecture that consists of three layers or tiers: the client interface, the business logic, and the data storage.

Let's go through each option to understand why it is correct or incorrect:

Option A) Client Interface - This option is incorrect. The client interface is one of the tiers in the three-tier architecture. It is responsible for presenting the user interface to the end-users and receiving their inputs.

Option B) Business Logic - This option is incorrect. The business logic is another tier in the three-tier architecture. It contains the logic and rules that govern the operations and processes of the application or system.

Option C) Security - This option is correct. Security is not a tier in the three-tier architecture. While security is an important aspect of any system, it is typically implemented across all layers of the architecture rather than being considered a separate tier.

Option D) Data Storage - This option is incorrect. Data storage is the third tier in the three-tier architecture. It is responsible for storing and managing the data used by the application or system.

The correct answer is C) Security. This option is not a tier in the three-tier architecture.

Which of the following is true about the requirements of a banking System?

  1. The need for security is a classic example of a functional service level requirement and a checking account rile is an example of a non-functional requirement.

  2. Security and the mandatory checking account both illustrate functional service level requirements.

  3. Neither security nor the mandatory checking account is an example of any kind of requirement.

  4. Security is an architectural non-functional requirement and the mandatory checking account a functional design requirement.


Correct Option: D

What would be the version number for XI3.1 with FP9 over Service Pack 2?

  1. 12.1.6.xxx

  2. 12.9.2.xxx

  3. 12.3.2.xxx

  4. 12.2.9.xxx


Correct Option: D

Auditing cannot be enabled in which of the following servers?

  1. Central Management Server

  2. Crystal Reports Job Server

  3. Webi Processing Server

  4. Adaptive Job Server


Correct Option: C

What is the default number of audit event records stored in one single audit file?

  1. 300

  2. 400

  3. 500

  4. 600


Correct Option: C

Which of the following switch is enabled in job servers by default?

  1. typeOutproc

  2. typeMixedproc

  3. typeInproc

  4. None of the above


Correct Option: B
- Hide questions