Set - 6

Question 1 :

What is rollback ?

Answer :

The point in a transaction when all updates to any resources involved in the transaction are reversed.


Question 2 :

What is root ?

Answer :

The outermost element in an XML document. The element that contains all other elements.


Question 3 :

What is SAX ?

Answer :

Abbreviation of Simple API for XML.


Question 4 :

What is Simple API for XML ?

Answer :

An event-driven interface in which the parser invokes one of several methods supplied by the caller when a parsing event occurs. Events include recognizing an XML tag, finding an error, encountering a reference to an external entity, or processing a DTD specification.


Question 5 :

What is schema ?

Answer :

A database-inspired method for specifying constraints on XML documents using an XML-based language. Schemas address deficiencies in DTDs, such as the inability to put constraints on the kinds of data that can occur in a particular field. Because schemas are founded on XML, they are hierarchical. Thus it is easier to create an unambiguous specification, and it is possible to determine the scope over which a comment is meant to apply.


Question 6 :

What is Secure Socket Layer (SSL) ?

Answer :

A technology that allows Web browsers and Web servers to communicate over a secured connection.


Question 7 :

What is security attributes ?

Answer :

A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol or by a J2EE product provider or both.


Question 8 :

What is security constraint ?

Answer :

A declarative way to annotate the intended protection of Web content. A security constraint consists of a Web resource collection, an authorization constraint, and a user data constraint.


Question 9 :

What is security context ?

Answer :

An object that encapsulates the shared state information regarding security between two entities.


Question 10 :

What is security permission ?

Answer :

A mechanism defined by J2SE, and used by the J2EE platform to express the programming restrictions imposed on application component developers.


Question 11 :

What is security permission set ?

Answer :

The minimum set of security permissions that a J2EE product provider must provide for the execution of each component type.


Question 12 :

What is security policy domain ?

Answer :

A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well-defined authentication protocol or protocols for authenticating users (or principals), and may have groups to simplify setting of security policies.


Question 13 :

What is security role ?

Answer :

An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn't care who you are, only that you have the right key.


Question 14 :

What is security technology domain ?

Answer :

A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.


Question 15 :

What is security view ?

Answer :

The set of security roles defined by the application assembler.


Question 16 :

What is server certificate ?

Answer :

Used with the HTTPS protocol to authenticate Web applications. The certificate can be self-signed or approved by a certificate authority (CA). The HTTPS service of the Sun Java System Application Server Platform Edition 8 will not run unless a server certificate has been installed.


Question 17 :

What is server principal ?

Answer :

The OS principal that the server is executing as.


Question 18 :

What is service element ?

Answer :

A representation of the combination of one or more Connector components that share a single engine component for processing incoming requests.


Question 19 :

What is service endpoint interface ?

Answer :

A Java interface that declares the methods that a client can invoke on a Web service.


Question 20 :

What is servlet ?

Answer :

A Java program that extends the functionality of a Web server, generating dynamic content and interacting with Web applications using a request-response paradigm.


Question 21 :

What is servlet container ?

Answer :

A container that provides the network services over which requests and responses are sent, decodes requests, and formats responses. All servlet containers must support HTTP as a protocol for requests and responses but can also support additional request-response protocols, such as HTTPS.


Question 22 :

What is servlet container, distributed ?

Answer :

A servlet container that can run a Web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.


Question 23 :

What is servlet context ?

Answer :

An object that contains a servlet's view of the Web application within which the servlet is running. Using the context, a servlet can log events, obtain URL references to resources, and set and store attributes that other servlets in the context can use.


Question 24 :

What is servlet mapping ?

Answer :

Defines an association between a URL pattern and a servlet. The mapping is used to map requests to servlets.


Question 25 :

What is session ?

Answer :

An object used by a servlet to track a user's interaction with a Web application across multiple HTTP requests.


Question 26 :

What is session bean ?

Answer :

An enterprise bean that is created by a client and that usually exists only for the duration of a single client-server session. A session bean performs operations, such as calculations or database access, for the client. Although a session bean can be transactional, it is not recoverable should a system crash occur. Session bean objects either can be stateless or can maintain conversational state across methods and transactions. If a session bean maintains state, then the EJB container manages this state if the object must be removed from memory. However, the session bean object itself must manage its own persistent data.


Question 27 :

What is SGML ?

Answer :

Standard Generalized Markup Language. The parent of both HTML and XML. Although HTML shares SGML's propensity for embedding presentation information in the markup, XML is a standard that allows information content to be totally separated from the mechanisms for rendering that content.


Question 28 :

What is SOAP ?

Answer :

Simple Object Access Protocol. A lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. It defines, using XML technologies, an extensible messaging framework containing a message construct that can be exchanged over a variety of underlying protocols.


Question 29 :

What is SOAP with Attachments API for Java (SAAJ) ?

Answer :

The basic package for SOAP messaging, SAAJ contains the API for creating and populating a SOAP message.


Question 30 :

What is SQL ?

Answer :

Structured Query Language. The standardized relational database language for defining database objects and manipulating data.


Question 31 :

What is SQL/J ?

Answer :

A set of standards that includes specifications for embedding SQL statements in methods in the Java programming language and specifications for calling Java static methods as SQL stored procedures and user-defined functions. An SQL checker can detect errors in static SQL statements at program development time, rather than at execution time as with a JDBC driver.


Question 32 :

What is SSL ?

Answer :

Secure Socket Layer. A security protocol that provides privacy over the Internet. The protocol allows client-server applications to communicate in a way that cannot be eavesdropped upon or tampered with. Servers are always authenticated, and clients are optionally authenticated.


Question 33 :

What is stateful session bean ?

Answer :

A session bean with a conversational state.


Question 34 :

What is stateless session bean ?

Answer :

A session bean with no conversational state. All instances of a stateless session bean are identical.


Question 35 :

What is system administrator ?

Answer :

The person responsible for configuring and administering the enterprise's computers, networks, and software systems.


Question 36 :

What is tag ?

Answer :

In XML documents, a piece of text that describes a unit of data or an element. The tag is distinguishable as markup, as opposed to data, because it is surrounded by angle brackets (< and >). To treat such markup syntax as data, you use an entity reference or a CDATA section.


Question 37 :

What is template ?

Answer :

A set of formatting instructions that apply to the nodes selected by an XPath expression.


Question 38 :

What is tool provider ?

Answer :

An organization or software vendor that provides tools used for the development, packaging, and deployment of J2EE applications.


Question 39 :

What is transaction attribute ?

Answer :

A value specified in an enterprise bean's deployment descriptor that is used by the EJB container to control the transaction scope when the enterprise bean's methods are invoked. A transaction attribute can have the following values: Required, RequiresNew, Supports, NotSupported, Mandatory, or Never.


Question 40 :

What is transaction ?

Answer :

An atomic unit of work that modifies data. A transaction encloses one or more program statements, all of which either complete or roll back. Transactions enable multiple users to access the same data concurrently.


Question 41 :

What is transaction isolation level ?

Answer :

What is transaction isolation level The degree to which the intermediate state of the data being modified by a transaction is visible to other concurrent transactions and data being modified by other transactions is visible to it.


Question 42 :

What is transaction manager ?

Answer :

Provides the services and management functions required to support transaction demarcation, transactional resource management, synchronization, and transaction context propagation.


Question 43 :

What is Unicode ?

Answer :

A standard defined by the Unicode Consortium that uses a 16-bit code page that maps digits to characters in languages around the world. Because 16 bits covers 32,768 codes, Unicode is large enough to include all the world's languages, with the exception of ideographic languages that have a different character for every concept, such as Chinese.


Question 44 :

What is Universal Description, Discovery and Integration (UDDI) project ?

Answer :

An industry initiative to create a platform-independent, open framework for describing services, discovering businesses, and integrating business services using the Internet, as well as a registry. It is being developed by a vendor consortium.


Question 45 :

What is Universal Standard Products and Services Classification (UNSPSC) ?

Answer :

A schema that classifies and identifies commodities. It is used in sell-side and buy-side catalogs and as a standardized account code in analyzing expenditure.


Question 46 :

What is unparsed entity ?

Answer :

A general entity that contains something other than XML. By its nature, an unparsed entity contains binary data.


Question 47 :

What is URI ?

Answer :

Uniform resource identifier. A globally unique identifier for an abstract or physical resource. A URL is a kind of URI that specifies the retrieval protocol (http or https for Web applications) and physical location of a resource (host name and host-relative path). A URN is another type of URI.


Question 48 :

What is URL ?

Answer :

Uniform resource locator. A standard for writing a textual reference to an arbitrary piece of data in the World Wide Web. A URL looks like this: protocol://host/local info where protocol specifies a protocol for fetching the object (such as http or ftp), host specifies the Internet name of the targeted host, and local info is a string (often a file name) passed to the protocol handler on the remote host.


Question 49 :

What is URL path ?

Answer :

The part of a URL passed by an HTTP request to invoke a servlet. A URL path consists of the context path + servlet path + path info, where Context path is the path prefix associated with a servlet context of which the servlet is a part. If this context is the default context rooted at the base of the Web server's URL namespace, the path prefix will be an empty string. Otherwise, the path prefix starts with a / character but does not end with a / character. Servlet path is the path section that directly corresponds to the mapping that activated this request. This path starts with a / character. Path info is the part of the request path that is not part of the context path or the servlet path


Question 50 :

What is URN ?

Answer :

Uniform resource name. A unique identifier that identifies an entity but doesn't tell where it is located. A system can use a URN to look up an entity locally before trying to find it on the Web. It also allows the Web location to change, while still allowing the entity to be found.