Which of the following mechanisms is closely related to authorization?
Mark works as a Programmer for InfoTech Inc. He develops a Website that uses HTML and processes HTML validation. Which of the following are the advantages of the HTML application?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements is true?
Which of the following options are available with jar files?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is the appropriate deployment descriptor elements entry for the code given below?
@RunAs("admin")
@Stateless public class StudentBean implements Student {
//more code ...
}
In which of the following directories will files be searched when the classpath is specified by the syntax below.-classpath uc\JavaFiles\NewFiles;uc\ServletFiles;.;
Dennis works as a Programmer in Broadnet Inc. He writes the following program.
1. public class Ques0307{
2. public static void main(String[] argv){
3. int arr[] = {1, 2, 3, 4};
4. try{
5. int k = 0;
6. for(; k < 4; k++)
7. arr[k] = arr[k] + 1;
8. System.out.println("try");
9. }
10. catch(ArrayIndexOutOfBoundsException a){
11. System.out.println("index " +k +" not found");
12. }
13. catch(Exception e){
14. System.out.println("catch1");
15. }
16. finally{
17. System.out.println("finally");
18. }
19. }
20. }
What will happen when Dennis attempts to compile and execute the program?
What will be the output of the following code snippet?
class test22
{
public static void main(String args[])
{
String str= new String("Hello");
str.insert(3,"bye");
System.out.println(str);
}
}
Which of the following methods are overridden by the FileInputStream class?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Programmer for InfoTech Inc. He develops a deployment descriptor code that contains three valid
<security-constraint> elements.
All of them constraining a Web resource Res1, the
<auth-constraint> sub-element of the <security-constraint>
elements are as follows.
<auth-constraint>Admin</auth-constraint>
<auth-constraint>Manager</auth-constraint>
<auth-constraint/>
Which of the following can access the resource Res1?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |