Set - 5

Question 1 :

What is normalization ?

Answer :

The process of removing redundancy by modularizing, as with subroutines, and of removing superfluous differences by reducing them to a common denominator. For example, line endings from different systems are normalized by reducing them to a single new line, and multiple whitespace characters are normalized to one space.


Question 2 :

What is North American Industry Classification System (NAICS) ?

Answer :

A system for classifying business establishments based on the processes they use to produce goods or services.


Question 3 :

What is notation ?

Answer :

A mechanism for defining a data format for a non-XML document referenced as an unparsed entity. This is a holdover from SGML. A newer standard is to use MIME data types and namespaces to prevent naming conflicts.


Question 4 :

What is OASIS ?

Answer :

Organization for the Advancement of Structured Information Standards. A consortium that drives the development, convergence, and adoption of e-business standards.


Question 5 :

What is OMG ?

Answer :

Object Management Group. A consortium that produces and maintains computer industry specifications for interoperable enterprise applications.


Question 6 :

What is one-way messaging ?

Answer :

A method of transmitting messages without having to block until a response is received.


Question 7 :

What is ORB ?

Answer :

Object request broker. A library that enables CORBA objects to locate and communicate with one another.


Question 8 :

What is OS principal ?

Answer :

A principal native to the operating system on which the J2EE platform is executing.


Question 9 :

What is OTS ?

Answer :

Object Transaction Service. A definition of the interfaces that permit CORBA objects to participate in transactions.


Question 10 :

What is parameter entity ?

Answer :

An entity that consists of DTD specifications, as distinct from a general entity. A parameter entity defined in the DTD can then be referenced at other points, thereby eliminating the need to recode the definition at each location it is used.


Question 11 :

What is parsed entity ?

Answer :

A general entity that contains XML and therefore is parsed when inserted into the XML document, as opposed to an unparsed entity.


Question 12 :

What is parser ?

Answer :

A module that reads in XML data from an input source and breaks it into chunks so that your program knows when it is working with a tag, an attribute, or element data. A nonvalidating parser ensures that the XML data is well formed but does not verify that it is valid. See also validating parser.


Question 13 :

What is passivation ?

Answer :

The process of transferring an enterprise bean from memory to secondary storage. See activation.


Question 14 :

What is persistence ?

Answer :

The protocol for transferring the state of an entity bean between its instance variables and an underlying database.


Question 15 :

What is persistent field ?

Answer :

A virtual field of an entity bean that has container-managed persistence; it is stored in a database.


Question 16 :

What is POA ?

Answer :

Portable Object Adapter. A CORBA standard for building server-side applications that are portable across heterogeneous ORBs.


Question 17 :

What is point-to-point messaging system ?

Answer :

A messaging system built on the concept of message queues. Each message is addressed to a specific queue; clients extract messages from the queues established to hold their messages.


Question 18 :

What is primary key ?

Answer :

An object that uniquely identifies an entity bean within a home.


Question 19 :

What is principal ?

Answer :

The identity assigned to a user as a result of authentication.


Question 20 :

What is privilege ?

Answer :

A security attribute that does not have the property of uniqueness and that can be shared by many principals.


Question 21 :

What is processing instruction ?

Answer :

Information contained in an XML structure that is intended to be interpreted by a specific application.


Question 22 :

What is programmatic security ?

Answer :

Security decisions that are made by security-aware applications. Programmatic security is useful when declarative security alone is not sufficient to express the security model of an application.


Question 23 :

What is prolog ?

Answer :

The part of an XML document that precedes the XML data. The prolog includes the declaration and an optional DTD.


Question 24 :

What is public key certificate ?

Answer :

Used in client-certificate authentication to enable the server, and optionally the client, to authenticate each other. The public key certificate is the digital equivalent of a passport. It is issued by a trusted organization, called a certificate authority, and provides identification for the bearer.


Question 25 :

What is publish/subscribe messaging system ?

Answer :

A messaging system in which clients address messages to a specific node in a content hierarchy, called a topic. Publishers and subscribers are generally anonymous and can dynamically publish or subscribe to the content hierarchy. The system takes care of distributing the messages arriving from a node's multiple publishers to its multiple subscribers.


Question 26 :

What is query string ?

Answer :

A component of an HTTP request URL that contains a set of parameters and values that affect the handling of the request.


Question 27 :

What is queue ?

Answer :

A messaging system built on the concept of message queues. Each message is addressed to a specific queue; clients extract messages from the queues established to hold their messages.


Question 28 :

What is RAR ?

Answer :

Resource Adapter Archive. A JAR archive that contains a resource adapter module.


Question 29 :

What is RDF ?

Answer :

Resource Description Framework. A standard for defining the kind of data that an XML file contains. Such information can help ensure semantic integrity-for example-by helping to make sure that a date is treated as a date rather than simply as text.


Question 30 :

What is RDF schema ?

Answer :

A standard for specifying consistency rules that apply to the specifications contained in an RDF.


Question 31 :

What is realm ?

Answer :

See security policy domain. Also, a string, passed as part of an HTTP request during basic authentication, that defines a protection space. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme or authorization database or both. In the J2EE server authentication service, a realm is a complete database of roles, users, and groups that identify valid users of a Web application or a set of Web applications.


Question 32 :

What is reentrant entity bean ?

Answer :

An entity bean that can handle multiple simultaneous, interleaved, or nested invocations that will not interfere with each other.


Question 33 :

What is reference ?

Answer :

A reference to an entity that is substituted for the reference when the XML document is parsed. It can reference a predefined entity such as < or reference one that is defined in the DTD. In the XML data, the reference could be to an entity that is defined in the local subset of the DTD or to an external XML file (an external entity). The DTD can also carve out a segment of DTD specifications and give it a name so that it can be reused (included) at multiple points in the DTD by defining a parameter entity.


Question 34 :

What is registry ?

Answer :

An infrastructure that enables the building, deployment, and discovery of Web services. It is a neutral third party that facilitates dynamic and loosely coupled business-to-business (B2B) interactions.


Question 35 :

What is registry provider ?

Answer :

An implementation of a business registry that conforms to a specification for XML registries (for example, ebXML or UDDI).


Question 36 :

What is relationship field ?

Answer :

A virtual field of an entity bean having container-managed persistence; it identifies a related entity bean.


Question 37 :

What is remote interface ?

Answer :

One of two interfaces for an enterprise bean. The remote interface defines the business methods callable by a client.


Question 38 :

What is remove method ?

Answer :

Method defined in the Home interface and invoked by a client to destroy an enterprise bean.


Question 39 :

What is render kit ?

Answer :

A set of renderers that render output to a particular client. The JavaServer Faces implementation provides a standard HTML render kit, which is composed of renderers that can render HMTL markup.


Question 40 :

What is renderer ?

Answer :

A Java class that can render the output for a set of JavaServer Faces UI components.


Question 41 :

What is resource adapter ?

Answer :

A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system. A resource adapter typically is specific to an enterprise information system. It is available as a library and is used within the address space of the server or client using it. A resource adapter plugs in to a container. The application components deployed on the container then use the client API (exposed by the adapter) or tool-generated high-level abstractions to access the underlying enterprise information system. The resource adapter and EJB container collaborate to provide the underlying mechanisms-transactions, security, and connection pooling-for connectivity to the enterprise information system.


Question 42 :

What is resource adapter module ?

Answer :

A deployable unit that contains all Java interfaces, classes, and native libraries, implementing a resource adapter along with the resource adapter deployment descriptor.


Question 43 :

What is resource manager ?

Answer :

Provides access to a set of shared resources. A resource manager participates in transactions that are externally controlled and coordinated by a transaction manager. A resource manager typically is in a different address space or on a different machine from the clients that access it. Note: An enterprise information system is referred to as a resource manager when it is mentioned in the context of resource and transaction management.


Question 44 :

What is resource manager connection ?

Answer :

An object that represents a session with a resource manager.


Question 45 :

What is resource manager connection factory ?

Answer :

An object used for creating a resource manager connection.


Question 46 :

What is RMI ?

Answer :

Remote Method Invocation. A technology that allows an object running in one Java virtual machine to invoke methods on an object running in a different Java virtual machine.


Question 47 :

What is RMI-IIOP ?

Answer :

A version of RMI implemented to use the CORBA IIOP protocol. RMI over IIOP provides interoperability with CORBA objects implemented in any language if all the remote interfaces are originally defined as RMI interfaces.


Question 48 :

What is role (development) ?

Answer :

The function performed by a party in the development and deployment phases of an application developed using J2EE technology. The roles are application component provider, application assembler, deployer, J2EE product provider, EJB container provider, EJB server provider, Web container provider, Web server provider, tool provider, and system administrator.


Question 49 :

What is role mapping ?

Answer :

The process of associating the groups or principals (or both), recognized by the container with security roles specified in the deployment descriptor. Security roles must be mapped by the deployer before a component is installed in the server.


Question 50 :

What is role (security) ?

Answer :

An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn't care who you are, only that you have the right key.