Question 1 :
What is null ?
The null type has one value, the null reference, represented by the literal null, which is formed from ASCII characters. A null literal is always of the null type.
Question 2 :
What is object ?
The principal building blocks of object-oriented programs. Each object is a programming unit consisting of data (instance variables) and functionality (instance methods). See also class.
Question 3 :
What is object-oriented design ?
A software design method that models the characteristics of abstract or real objects using classes and objects.
Question 4 :
What is octal What is object-oriented design ?
The numbering system using 8 as its base, using the numerals 0-7 as its digits. In programs written in the Java programming language, octal numbers must be preceded with 0. See also hexadecimal.
Question 5 :
What is optional packages ?
The set or sets of APIs in a Java platform edition which are available with and may be supported in a compatible implementation. Over time, optional packages may become required in an edition as the marketplace requires them.
Question 6 :
What is ORB ?
Object Request Broker. A library than enables CORBA objects to locate and communicate with one another.
Question 7 :
What is OS principal ?
A principal native to the operating system on which the Java platform is executing.
Question 8 :
What is OTS ?
Object Transaction Service. A definition of the interfaces that permit CORBA objects to participate in transactions.
Question 9 :
What is overloading ?
Using one identifier to refer to multiple items in the same scope. In the Java programming language, you can overload methods but not variables or operators.
Question 10 :
What is overriding ?
Providing a different implementation of a method in a subclass of the class that originally defined the method.
Question 11 :
What is package ?
A group of types. Packages are declared with the package keyword.
Question 12 :
What is peer ?
In networking, any functional unit in the same layer as another entity.
Question 13 :
What is persistence ?
The protocol for transferring the state of a bean between its instance variables and an underlying database.
Question 14 :
What is pixel ?
The picture element on a display area, such as a monitor screen or printed page. Each pixel is individually accessible.
Question 15 :
What is POA ?
Portable Object Adapter. A CORBA standard for building server-side applications that are portable across heterogeneous ORBs.
Question 16 :
What is primary key ?
An object that uniquely identifies an entity bean within a home
Question 17 :
What is primitive type ?
A variable data type in which the variable's value is of the appropriate size and format for its type: a number, a character, or a Boolean value.
Question 18 :
What is principal ?
The identity assigned to an entity as a result of authentication.
Question 19 :
What is private ?
A Java keyword used in a method or variable declaration. It signifies that the method or variable can only be accessed by other elements of its class.
Question 20 :
What is privilege ?
A security attribute that does not have the property of uniqueness and which may be shared by many principals. An example of a privilege is a group.
Question 21 :
What is process ?
A virtual address space containing one or more threads.
Question 22 :
What is property ?
Characteristics of an object that users can set, such as the color of a window.
Question 23 :
What is profiles ?
A profile is a collection of Java APIs that complements one or more Java 2 Platform Editions by adding domain-specific capabilities. Profiles may also include other defined profiles. A profile implementation requires a Java 2 Platform Edition to create a complete development and deployment environment in a targeted vertical market. Each profile is subject to an associated set of compatibility requirements. Profiles may be usable on one or more editions.
Some examples of profiles within the Java 2 Platform, Micro Edition are:
* Personal Profile- for non-PC products that need to display Web-compatible Java-based content
* Java Card - for secure smart cards and other severely memory-constrained devices.
Question 24 :
What is protected ?
A Java keyword used in a method or variable declaration. It signifies that the method or variable can only be accessed by elements residing in its class, subclasses, or classes in the same package.
Question 25 :
What is public ?
A Java keyword used in a method or variable declaration. It signifies that the method or variable can be accessed by elements residing in other classes.
Question 26 :
What is raster ?
A two-dimensional rectangular grid of pixels.
Question 27 :
What is realm ?
See security policy domain. Also, a string, passed as part of an HTTP request during basic authentication, that defines a protection space. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme and/or authorization database
Question 28 :
What is realm ?
A variable data type in which the variable's value is an address.
Question 29 :
What is return ?
A Java keyword used to finish the execution of a method. It can be followed by a value required by the method definition.
Question 30 :
What is RMI ?
See Java Remote Method Invocation.
Question 31 :
What is rollback ?
The point in a transaction when all updates to any databases involved in the transaction are reversed.
Question 32 :
What is root ?
In a hierarchy of items, the one item from which all other items are descended. The root item has nothing above it in the hierarchy. See also hierarchy, class, package.
Question 33 :
What is RPC ?
Remote Procedure Call. Executing what looks like a normal procedure call (or method invocation) by sending network packets to some remote host.
Question 34 :
What is runtime system ?
The software environment in which programs compiled for the Java virtual machine1 can run. The runtime system includes all the code necessary to load programs written in the Java programming language, dynamically link native methods, manage memory, handle exceptions, and an implementation of the Java virtual machine, which may be a Java interpreter.
Question 35 :
What is SAX ?
Simple API for XML. An event-driven, serial-access mechanism for accessing XML documents.
Question 36 :
What is sandbox ?
Comprises a number of cooperating system components, ranging from security managers that execute as part of the application, to security measures designed into the Java virtual machine1 and the language itself. The sandbox ensures that an untrusted, and possibly malicious, application cannot gain access to system resources.
Question 37 :
What is scope ?
A characteristic of an identifier that determines where the identifier can be used. Most identifiers in the Java programming environment have either class or local scope. Instance and class variables and methods have class scope; they can be used outside the class and its subclasses only by prefixing them with an instance of the class or (for class variables and methods) with the class name. All other variables are declared within methods and have local scope; they can be used only within the enclosing block.
Question 38 :
What is Secure Socket Layer (SSL) ?
A protocol that allows communication between a Web browser and a server to be encrypted for privacy.
Question 39 :
What is security attributes ?
A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol.
Question 40 :
What is security context ?
An object that encapsulates the shared state information regarding security between two entities.
Question 41 :
What is security policy domain ?
A scope over which security policies are defined and enforced by a security administrator. A security policy domain has the following characteristics:
It has a collection of users (or principals).
It uses a well defined authentication protocol(s) for authenticating users (or principals).
It may have groups to simplify setting of security policies.
Question 42 :
What is security technology domain ?
A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.
Question 43 :
What is serialization ?
The encoding of objects, and the objects reachable from them, into a stream of bytes and the complementary reconstruction of the object graph from the stream.
Question 44 :
What is short ?
A Java keyword used to define a variable of type short.
Question 45 :
What is single precision ?
In the Java language specification, describes a floating point number with 32 bits of data. See also double precision.
Question 46 :
What is SGML ?
Standardized Generalized Markup Language. An ISO/ANSI/ECMA standard that specifies a way to annotate text documents with information about types of sections of a document.
Question 47 :
What is SOAP ?
The Simple Object Access Protocol (SOAP) uses a combination of XML-based data structuring and the Hyper Text Transfer Protocol (HTTP) to define a standardized method for invoking methods in objects distributed in diverse operating environments across the Internet.
Question 48 :
What is SQL ?
Structured Query Language. The standardized relational database language for defining database objects and manipulating data.
Question 49 :
What is static ?
A Java keyword used to define a variable as a class variable. Classes maintain one copy of class variables regardless of how many instances exist of that class. static can also be used to define a method as a class method. Class methods are invoked by the class instead of a specific instance, and can only operate on class variables.
Question 50 :
What is static field ?
Another name for class variable.