40 questions of MMS2Q7_QT_V1.0_WebApp Using Java 01. Java EE Model, Web Component Model, Developing Servlets and JSP QID Question & choices 1: Q7QT001 Mark: 1 Solution: Which of the following Java EE services includes life-cycle, threading and remote object communication? 1, Deployment-based services 2, API-based services 3, Inherent services 4, Vendor-specific services 2: Q7QT002 Mark: 1 Solution: Which of the following APIs exposes the internal operation of the application server and its components for control and monitoring vendor neutral management tools? 1, JAXP 2, JMX 3, JTA 4, JAAS 3: Q7QT003 Mark: 1 Solution: Which of the following APIs provides access to object relational mapping services enabling …show more content…
2, It provides a means for configuring J2EE components and applications without requiring access to component source code. 3, It is a .jar file. 4, It is the super archive file. 18: Q7QT008 Mark: 2 Solution: Which of the following is correct in reference to enterprise archive files? 1, It contains EJB component archive files, web component archive files, resource adapter archive files, and client archive files. 2, It is an XML file. 3, It provides a means for configuring J2EE components and applications without requiring access to component source code. 4, It might contain resource adaptors, Java classes, and a deployment descriptor. 19: Q7QT009 Mark: 2 Solution: Which of the following is incorrect in reference to resource adapter? 1, It is a software component that has hooks into a container's transaction management, security, and resource pooling subsystems. 2, It can request extended access to the system, beyond what would be allowed to an enterprise bean. 3, It can make native calls, create or open network sockets that listen, create and delete threads, and read and write files. 4, It provides a means for configuring Java EE components and applications without requiring access to component source code. 20: Q7QT010 Mark: 2 Solution: Which of the following is incorrect in reference to Asynchronous component interaction? 1, It uses request-notification
This is software or material that is available with the source, this allows users to copy the material and modify the material, the reason for this is because the creators would believe that if someone can edit the material for themselves it will be more useful to another persona and will also allow less
Security-This is a sub-characteristic of the system’s functionality.It relates to the prevention of unauthorized access to the company’s confidential data by using dashboard software.
This process simplifies access controls by maintaining access control at a single location. One issue with this control method is that the central access control unit is a single point of failure. If the centralized access control unit fails, no access can be granted to objects. Additionally, the central access control can hinder performance if the system is unable to keep up with all access requests.
The editors and builders simplify prototyping testing and creating responsive WebPages and websites. The editors have drag and drop options from the Bootstrap’s rich components library.
1. Secure Service: The main objective is secure administrative computing for all network needs with minimal the risk.
The benefits and vulnerabilities of these can be simple or even drastic. These are more beneficial if one
Manage user permissions on employee computers to ensure users cannot install unwanted and potentially dangerous programs and plugins.
It integrates all the other modules and provides communication channels between them. This performs calls to different APIs as well as to the data store.
To help you choose the right technologies when building cross-platform mobile/tablet applications who communicate with C/C++ codebase.
The network services, made available by this layer, are utilized by users and application programs. It basically acts as a window between network services and users & application processes. This layer also handles functions like - Resource sharing and device redirection, Remote file access, Remote printer access, Inter – process communication, Network management, Directory services, Electronic messaging and Network virtual terminals.
In this section, we go through the recommended components and tools required as software infrastructure for building high quality software applications, as shown in Figure \ref{figure1}.
Source Code: the source code must either be included or freely obtainable. (Without source code, making changes or modifications can be impossible.)
It is allows the user to format the data using conditional formatting option, it provides sorting and filtering options, alignment of the data, find and select option for searching the data and also provides auto sum, minimum ,maximum and average add on to perform the simple calculations.
Containers allow us to build a unit to house our application and all of it’s dependencies in an inherently immutable format. This provides us with a consistent deployment unit, capable of being injected into any server and behaving the exact same, regardless of its coded environment.
Component-Based Software Engineering (CBSE) means the development of software by using pre-developed software components. It may contain external as well as in-house built components. Component-based development approach develops the software systems by choosing appropriate components and then integrating them by using a well-defined architecture. Component based software engineering (CBSE) has become a modern approach of software development that provides an optimal, efficient, economic and quick software development as per user requirements.