You are on page 1of 4

2. An enterprise application is usually composed of which of following layer architecture? 1. Data Layer 2. Business Layer 3. Presentation Layer A. 1, 2 B. 2, 3 C. 1, 3 *D.

1, 2, 3 3. EJB comes in which of the following flavors? 1. Session bean 2. Entity bean 3. Message-driven bean A. 1, 2 B. 2, 3 C. 1, 3 *D. 1, 2, 3 4. The __________ are encoded into the business logic of the application that uses the database. A. Database-oriented business rules *B. Application-oriented business rules C. System-oriented business rules 2. Which of the following Session Bean Components contains the implementation method of the bean? *A. Session Bean Class B. EJB Object Interface C. Local EJB Object Interface D. Home Object Interface 4. The identity of both stateful and stateless session beans can be compared using the _________ method. *A. isIdentical() B. Identical() C. Compare() 1. __________ accesses each entity bean instance with the help of a primary key. A. Container call back methods B. Multiple instances *C. Container 2. Which of the following are the main features of entity beans?
1. Persistence 2. Shared access 3. Primary key 4. Relationship

A. 1, 2, 3 B. 2, 3, 4 C. 1, 2, 4 *D. 1, 2, 3, 4 1. ____________ are used for identifying the objects and classes in an application. A. Attributes B. ERD's *C. Object models

2. The __________ indicates that an inappropriate argument has been passed to a method. *A. java.lang.IllegalArgumentException B. java.rmi.MarshalException C. Javax.ejb.AccessLocalException 3. _________ are used to represent the relationships between various entities. A. Object models *B. ERDs C. Fully-attributed ERD 4. The ____________ is thrown if an attempt is made to create an entity bean object with an existing primary key. *A. javax.ejb.DuplicateKeyException B. javax.ejb.FinderException C. Javax.ejb.RemoveException 5. The ________ exception is thrown by the container to indicate that a system exception has occurred and the current transaction will be rolled back. *A. EJBException B. IllegalStateException C. NoSuchEntityException D. NoSuchObjectException 6. Which types of cardinalities are supported by EJB?
1. One-to-One

2. One-to-Many 3. Many-to-Many

A. 1,2 B. 2,3 C. 1,3 *D. 1,2,3 7. The System exception ____________ indicates communication related problems that may occur during the execution of a remote method call. A. java.rmi.NoSuchObjectException *B. java.rmi.RemoteException C. javax.lang.SecurityException 8. UML diagrams are divided into which of the following types?
1. Structural 2. Behavioral 3. Unified

*A. 1, 2 B. 2, 3 C. 1, 3 D. 1, 2, 3 1. The _______ clause of a query in an EJB QL contains the condition using which the retrieved data can be filtered. A. SELECT B. FROM *C. WHERE D. ORDER BY 2. A relationship between objects in which one object contains another object is termed as ____________. A. Association

B. Inheritance *C. Aggregation D. Generalization 3. Which of the following are the kinds of aggregation relationships?
1. Basic 2. Advance 3. Composition

A. 1, 2 B. 2, 3 *C. 1, 3 D. 1, 2, 3 5. Which of the following operations accesses the state of an object but does not alter the state? A. Modification *B. Selection C. Iteration D. Construction 7. In a ____________ relationship, a record in the first table corresponds to one or more records in the second table, but a record in the second table corresponds to exactly one record in the first table. *A. One-to-many B. One-to-one C. Many-to-many 8. In a _______ relationship, a record in either table can correspond to more than one record in the other table. A. One-to-many B. One-to-one *C. Many-to-many 9. EJB QL uses the ____________ to represent relationships which use a named relationship from one object to another. A. Built-in model B. Relational model *C. Object model 12. In which of the following relationships, one bean instance relates to multiple bean instances? A. One-to-one *B. One-to-Many C. Many-to-Many D. All of the above 14. Field-specific and relationship-specific are A. Two forms of business rule B. Two types of business rule *C. Two categories of business rule 15. ___________ is used to query enterprise beans, their persistent states, and their relationships. A. SQL *B. EJB QL C. MS ACCESS 5. Which of the following properties of a transaction ensures that each transaction should be allowed to execute independently without interference from other transactions or processes? A. Atomicity B. Consistency *C. Isolation D. Durability

11. The ________ exception is thrown by the container to indicate that a system exception has occurred and the current transaction will be rolled back. *A. EJBException B. IllegalStateException C. NoSuchEntityException D. NoSuchObjectException 2. The __________ components of JMS API architecture denote preconfigured JMS objects. A. JMS provider B. JMS clients C. Messages *D. Administered object 3. The __________ field provides a way to correlate messages in a request/response type of setup. *A. JMSCorrelationID B. JMSDestination C. JMSExpiration 1. In __________, J2EE architecture makes use of a Message-Driven bean for fulfilling the requests of the client. A. Resource faade B. Session fascade *C. Message fascade 2. In __________, an end user is required to authenticate by providing necessary authentication data only when the user tries to access a secured resource. A. J2EE security architecture *B. Lazy authentication C. Resource security

BNF schemas created using BNF symbols use these schemas to declare ________ in EJB QL.
(sach 69/118)

Queries Functions Relations

You might also like