SlideShare uma empresa Scribd logo
1 de 28
Baixar para ler offline
Cover Page
Enterprise
Java Design
Patterns
EJDP
Author: JavaChamp Team
Copyright (c) 2010-2014
(2) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
About Us
Powered by QuizOver.com
The Leading Online Quiz & Exam Creator
Create, Share, and Discover Quizzes & Exams
http://www.quizover.com
(3) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
Disclaimer
All services and content of QuizOver.com are provided under QuizOver.com terms of use on an "as is" basis,
without warranty of any kind, either expressed or implied, including, without limitation, warranties that the provided
services and content are free of defects, merchantable, fit for a particular purpose or non-infringing.
The entire risk as to the quality and performance of the provided services and content is with you.
In no event shall QuizOver.com be liable for any damages whatsoever arising out of or in connection with the use
or performance of the services.
Should any provided services and content prove defective in any respect, you (not the initial developer, author or
any other contributor) assume the cost of any necessary servicing, repair or correction.
This disclaimer of warranty constitutes an essential part of these "terms of use".
No use of any services and content of QuizOver.com is authorized hereunder except under this disclaimer.
The detailed and up to date "terms of use" of QuizOver.com can be found under:
http://www.QuizOver.com/public/termsOfUse.xhtml
(4) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
eBook Content License
Creative Commons License
Attribution-NonCommercial-NoDerivs 3.0 Unported (CC BY-NC-ND 3.0)
http://creativecommons.org/licenses/by-nc-nd/3.0/
You are free to:
Share: copy and redistribute the material in any medium or format
The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
Attribution: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You
may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial: You may not use the material for commercial purposes.
NoDerivatives: If you remix, transform, or build upon the material, you may not distribute the modified material.
No additional restrictions: You may not apply legal terms or technological measures that legally restrict others
from doing anything the license permits.
-
-
-
(5) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
Table of Contents
Quiz Permalink: http://www.quizover.com/pdf/enterprise-java-patterns
Author Profile: http://www.quizover.com/user/profile/Java.Champ
1. Enterprise Java Design Patterns
Presentation Tier J2EE Patterns
Business Tier J2EE Patterns
Integration Tier J2EE Patterns
(6) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4. Chapter: Presentation Tier J2EE Patterns
1. Presentation Tier J2EE Patterns Questions
•
•
•
•
(7) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4.1.1. Question: You would like to raise the security level of your system by examin...
You would like to raise the security level of your system by examining incoming HTTP requests. You would like to
log information about each request and to filter requests with malicious scripts.
Where would you put such request processing code?
Please choose only one answer:
in the Service Locator
in the Service Activator
in the Intercepting Filter
in the View Helper
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use an intercepting filter?
Permalink: http://www.quizover.com/pdf/when-to-use-an-intercepting-filter
•
•
•
•
(8) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4.1.2. Question: you are in charge of developing an e-commerce web application, the ...
you are in charge of developing an e-commerce web application, the client expects high traffic volumes and the
security is of essence.
Which user session management strategy would you choose?
Please choose only one answer:
Save user session in http cookies
Save user session in html hidden fields
Save user session in an HttpSession object
Save user session in an EJB stateful session bean object
Author: Yasser Ibrahim
Check the answer of this question online on QuizOver.com:
Question: session management in enterprise java applications
Permalink: http://www.quizover.com/pdf/session-management-in-enterprise-java-applications
•
•
•
•
(9) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4.1.3. Question: Which of the following patterns would you use to transfer certain s...
Which of the following patterns would you use to transfer certain state to the next tier without passing on protocol-
specific system information?
Please choose only one answer:
Transfer Object
Context Object
Context Filter
Service To Worker
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: what is the role of a context object?
Permalink: http://www.quizover.com/pdf/what-is-the-role-of-a-context-object
•
•
•
•
(10) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4.1.4. Question: How to secure you web application against security risks such as cr...
How to secure you web application against security risks such as cross site scripting (css) and SQL injection in a
centralized manner that avoids code duplicate and ensures that every HTTP request would be inspected?
Please choose all the answers that apply:
use Intercepting Filter pattern
use Front Controller pattern
use Composite View pattern
use Business Delegate pattern
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: how to secure you web application?
Permalink: http://www.quizover.com/pdf/how-to-secure-you-web-application
•
•
•
•
(11) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4.1.5. Question: Your job is to refactor an application ,which uses JSP technology a...
Your job is to refactor an application ,which uses JSP technology as a View. The JSP pages are dominated by
scriptlet code.
Which pattern would be appropriate to solve this problem?
Please choose only one answer:
View Helper
Composite View
Data Access Object
Context Object
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use the view helper pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-the-view-helper-pattern
•
•
•
•
(12) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4.1.6. Question: In your web application you decided to use Javascript to validate e...
In your web application you decided to use Javascript to validate each user input on the client browser.
Where do you need to duplicate the validation code on the server?
Please choose only one answer:
No double check on the server side is needed as the input is already checked on the client side
double check in the presentation tier
double check in the integration tier
double check in the business tier
Author: Yasser Ibrahim
Check the answer of this question online on QuizOver.com:
Question: enterprise java applications input validation
Permalink: http://www.quizover.com/pdf/enterprise-java-applications-input-validation
•
•
•
•
(13) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
4.1.7. Question: Your Parcel delivery company is expanding it's existing web applica...
Your Parcel delivery company is expanding it's existing web application.
Currently the clients can track their parcels using web browsers, and your company wants to expose it's business
to it's partners as web-services.
However; when you inspected the code base, you discovered that the application passes HttpServletRequest
parameters to the business tier for further processing.
Your job is to refactor this existing code base to avoid duplicating the business logic to handle the two request
channels (http and web service requests).
Which refactoring is appropriate for this case without code duplication?
Please choose only one answer:
Use front controller pattern
Use context object pattern
Use proxy pattern
Use service broker pattern
Author: Yasser Ibrahim
Check the answer of this question online on QuizOver.com:
Question: context object pattern
Permalink: http://www.quizover.com/pdf/context-object-pattern
(14) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5. Chapter: Business Tier J2EE Patterns
1. Business Tier J2EE Patterns Questions
•
•
•
•
(15) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.1. Question: Your application's performance is affected due to the significant n...
Your application's performance is affected due to the significant number of remote calls to your business logic.
The business logic is exposed as fine grained methods to the clients.
Which refactoring can be done to improve the application's performance?
Please choose all the answers that apply:
Add a Front Controller to centralize requests processing
Implement a Session Facade, which provides a coarse grained service-oriented interface
to clients
Move the frequently called business logic to the presentation tier
Encapsulate multiple business data attributes into smaller set of
serializable transfer objects, to reduce remote invocations
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use java enterprise business tier session facade pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-business-tier-session-facade-pattern
•
•
•
•
(16) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.2. Question: Your online shop application maintains the customers information,...
Your online shop application maintains the customers information, like their personal information,contact lists
and lists of purchases.
The remote descktop clients usually require only parts of these information. Which pattern would be most
appropriate for this scenario and would improve your system?
Please choose only one answer:
Updatable Transfer Objects
Transfer Object Assembler
Entity Inherits Transfer Object
Multiple Transfer Objects Strategy
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use enterprise multiple transfer objects strategy pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-enterprise-multiple-transfer-objects-strategy-pattern
•
•
•
(17) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.3. Question: ABC university library system is available to students over differe...
ABC university library system is available to students over different campuses in the world and installed in one
server in the main campus. Queries results are usually large result sets returned all to clients which causes a
heavy load on both client and server.
What do you think can be done to alleviate this problem on a tight budget?
Please choose only one answer:
Place a server in each campus to serve the students in this campus to
distribute the load
apply Transfer Object Pattern
apply a Value List Handler Pattern
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use a value list handler pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-a-value-list-handler-pattern
•
•
•
•
(18) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.4. Question: You application's performance is affected due to repeated JNDI look...
You application's performance is affected due to repeated JNDI lookups done by every client accessing your
application.
Which pattern is most appropriate to improve the performance and solve the problem?
Please choose only one answer:
Service Locator
Session Facade
Business Delegate
Transfer Object
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use java enterprise service locator pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-service-locator-pattern
•
•
•
•
(19) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.5. Question: When is it recommended to use a Value List Handler Pattern?
When is it recommended to use a Value List Handler Pattern?
Please choose only one answer:
You want to avoid embedding business logic in the view
You want to avoid passing protocol-specific information outside its context
You want to provide the clients with an efficient search and iterate
mechanism over a large results set
You want to maintain the search results on the client side
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use enterprise java value list handler pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-enterprise-java-value-list-handler-pattern
•
•
•
•
(20) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.6. Question: What is TRUE about the Updatable Transfer Objects Strategy?
What is TRUE about the Updatable Transfer Objects Strategy?
Please choose all the answers that apply:
It is used when the client needs not only to read the business component attributes
but also to be able to modify them
It reduces the complexity of the system in terms of update propagation and synchronization
It adds on complexity to the system in terms of update propagation and synchronization
Transfer Objects in general can reduce network overhead
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use java enterprise updatable transfer objects strategy pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-updatable-transfer-objects-strategy-pattern
•
•
(21) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.7. Question: A service locator is best implemented as a Singleton.
A service locator is best implemented as a Singleton.
Please choose only one answer:
true
false
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: how to write a service locator?
Permalink: http://www.quizover.com/pdf/how-to-write-a-service-locator
•
•
•
•
(22) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
5.1.8. Question: A presentation tier component is requesting data attributes, which ...
A presentation tier component is requesting data attributes, which are scattered in multiple business components,
DAOs and services in your application?
Which pattern is best suited for this scenario, providing the client with the required data causing no significant
performance degradation?
Please choose only one answer:
Business Object
Transfer Object Assembler
Data Acess Object
Composite Entitiy
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use java enterprise transfer object assembler pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-transfer-object-assembler-pattern
(23) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
6. Chapter: Integration Tier J2EE Patterns
1. Integration Tier J2EE Patterns Questions
•
•
•
(24) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
6.1.1. Question: What benefits does Data Access Object (DAO) pattern provide?
What benefits does Data Access Object (DAO) pattern provide?
Please choose all the answers that apply:
it increases the cohesiveness of the business objects by extracting out
the data acess code from them
it reduces network overhead by caching queries results
it enhances loose coupling between the business tier and the data sources
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: what benefits does data access object (dao) pattern provide?
Permalink: http://www.quizover.com/pdf/what-benefits-does-data-access-object-dao-pattern-provide
•
•
•
•
(25) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
6.1.2. Question: What pattern is applied in Java Message Driven Beans?
What pattern is applied in Java Message Driven Beans?
Please choose only one answer:
Service Locator
Service Activator
Service to Worker
Front Controller
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: what pattern is applied in java message driven beans?
Permalink: http://www.quizover.com/pdf/what-pattern-is-applied-in-java-message-driven-beans
•
•
•
•
(26) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
6.1.3. Question: You want to expose part of your application as services to other cl...
You want to expose part of your application as services to other client applications. The client application will
request a service through standard web protocols. The requests are received by a servlet which in turn delegetes
them to the bussiness tier.
Which pattern is most appropriate for this task?
Please choose only one answer:
Service Activator
Service Locator
Web Service Broker
Service to Worker
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: when to use web service broker pattern?
Permalink: http://www.quizover.com/pdf/when-to-use-web-service-broker-pattern
•
•
•
(27) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
6.1.4. Question: What is the role of a Service Activator?
What is the role of a Service Activator?
Please choose only one answer:
A Service Activator acts as a centralized point to process http requests
A Service Activator allows an asynchronous messages to invoke
business components, including the EJBs
A Service Activator enables business logic in EJBs to be exposed as web services
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: what is the role of a service activator?
Permalink: http://www.quizover.com/pdf/what-is-the-role-of-a-service-activator
•
•
•
•
(28) Powered by QuizOver.com - http://www.quizover.com
QuizOver.com is the leading online quiz & exam creator
Copyright (c) 2009-2014 all rights reserved
6.1.5. Question: Which integration pattern can be used to integrate Java EE code to ...
Which integration pattern can be used to integrate Java EE code to a relational database?
Please choose only one answer:
Service Activator
Front Controller
Data Access Object (DAO)
Web Service Broker
Author: JavaChamp Team
Check the answer of this question online on QuizOver.com:
Question: which integration pattern can be used to integrate java ee code to a relational database?
Permalink: http://www.quizover.com/pdf/which-integration-pattern-can-be-used-to-integrate-java-ee-code-to-a-
relational-database

Mais conteúdo relacionado

Destaque

Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Lisa Myers
 
Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...
Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...
Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...timothyrlee
 
Bayesia Lab Choice Modeling 1
Bayesia Lab Choice Modeling 1Bayesia Lab Choice Modeling 1
Bayesia Lab Choice Modeling 1jouffe
 
everdo for ad
everdo for adeverdo for ad
everdo for adzopen
 
Host University And Advisor Ppt2
Host University And Advisor Ppt2Host University And Advisor Ppt2
Host University And Advisor Ppt2IREX
 
C:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upC:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upAngele Champigny
 
Solving Business Problems for Our Clients, Each Step of the Way
Solving Business Problems for Our Clients, Each Step of the WaySolving Business Problems for Our Clients, Each Step of the Way
Solving Business Problems for Our Clients, Each Step of the WayKevin Hoffman
 
Yahoo Korea 10th anniversary Plan Concept
Yahoo Korea 10th anniversary Plan ConceptYahoo Korea 10th anniversary Plan Concept
Yahoo Korea 10th anniversary Plan ConceptJongjin Park
 
BDI- The Beginning (Big data training in Coimbatore)
BDI- The Beginning (Big data training in Coimbatore)BDI- The Beginning (Big data training in Coimbatore)
BDI- The Beginning (Big data training in Coimbatore)Ashok Rangaswamy
 
Host University And Advisor Ppt
Host University And Advisor PptHost University And Advisor Ppt
Host University And Advisor PptIREX
 

Destaque (18)

Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012Social Shares - The New Link Building. SMX London 2012
Social Shares - The New Link Building. SMX London 2012
 
2006 Downtown Ferndale Parking Study_Section 6
2006 Downtown Ferndale Parking Study_Section 62006 Downtown Ferndale Parking Study_Section 6
2006 Downtown Ferndale Parking Study_Section 6
 
Test builder
Test builderTest builder
Test builder
 
Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...
Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...
Buy-Sell Agreements :: Convergence of Business Succession & Shareholder P...
 
Bayesia Lab Choice Modeling 1
Bayesia Lab Choice Modeling 1Bayesia Lab Choice Modeling 1
Bayesia Lab Choice Modeling 1
 
everdo for ad
everdo for adeverdo for ad
everdo for ad
 
About Blogs
About BlogsAbout Blogs
About Blogs
 
Stackato
StackatoStackato
Stackato
 
Aftrap BIK Challenge
Aftrap BIK ChallengeAftrap BIK Challenge
Aftrap BIK Challenge
 
Host University And Advisor Ppt2
Host University And Advisor Ppt2Host University And Advisor Ppt2
Host University And Advisor Ppt2
 
C:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set upC:\fakepath\tour 2011 – first set up
C:\fakepath\tour 2011 – first set up
 
Solving Business Problems for Our Clients, Each Step of the Way
Solving Business Problems for Our Clients, Each Step of the WaySolving Business Problems for Our Clients, Each Step of the Way
Solving Business Problems for Our Clients, Each Step of the Way
 
Yahoo Korea 10th anniversary Plan Concept
Yahoo Korea 10th anniversary Plan ConceptYahoo Korea 10th anniversary Plan Concept
Yahoo Korea 10th anniversary Plan Concept
 
BDI- The Beginning (Big data training in Coimbatore)
BDI- The Beginning (Big data training in Coimbatore)BDI- The Beginning (Big data training in Coimbatore)
BDI- The Beginning (Big data training in Coimbatore)
 
What You Need to Know about Instagram
What You Need to Know about Instagram What You Need to Know about Instagram
What You Need to Know about Instagram
 
PO
POPO
PO
 
Asp.net exception reporter
Asp.net exception reporterAsp.net exception reporter
Asp.net exception reporter
 
Host University And Advisor Ppt
Host University And Advisor PptHost University And Advisor Ppt
Host University And Advisor Ppt
 

Último

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 

Último (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 

Enterprise Java Design Patterns Mock Exams

  • 1. Cover Page Enterprise Java Design Patterns EJDP Author: JavaChamp Team Copyright (c) 2010-2014
  • 2. (2) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved About Us Powered by QuizOver.com The Leading Online Quiz & Exam Creator Create, Share, and Discover Quizzes & Exams http://www.quizover.com
  • 3. (3) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved Disclaimer All services and content of QuizOver.com are provided under QuizOver.com terms of use on an "as is" basis, without warranty of any kind, either expressed or implied, including, without limitation, warranties that the provided services and content are free of defects, merchantable, fit for a particular purpose or non-infringing. The entire risk as to the quality and performance of the provided services and content is with you. In no event shall QuizOver.com be liable for any damages whatsoever arising out of or in connection with the use or performance of the services. Should any provided services and content prove defective in any respect, you (not the initial developer, author or any other contributor) assume the cost of any necessary servicing, repair or correction. This disclaimer of warranty constitutes an essential part of these "terms of use". No use of any services and content of QuizOver.com is authorized hereunder except under this disclaimer. The detailed and up to date "terms of use" of QuizOver.com can be found under: http://www.QuizOver.com/public/termsOfUse.xhtml
  • 4. (4) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved eBook Content License Creative Commons License Attribution-NonCommercial-NoDerivs 3.0 Unported (CC BY-NC-ND 3.0) http://creativecommons.org/licenses/by-nc-nd/3.0/ You are free to: Share: copy and redistribute the material in any medium or format The licensor cannot revoke these freedoms as long as you follow the license terms. Under the following terms: Attribution: You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use. NonCommercial: You may not use the material for commercial purposes. NoDerivatives: If you remix, transform, or build upon the material, you may not distribute the modified material. No additional restrictions: You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
  • 5. - - - (5) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved Table of Contents Quiz Permalink: http://www.quizover.com/pdf/enterprise-java-patterns Author Profile: http://www.quizover.com/user/profile/Java.Champ 1. Enterprise Java Design Patterns Presentation Tier J2EE Patterns Business Tier J2EE Patterns Integration Tier J2EE Patterns
  • 6. (6) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4. Chapter: Presentation Tier J2EE Patterns 1. Presentation Tier J2EE Patterns Questions
  • 7. • • • • (7) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4.1.1. Question: You would like to raise the security level of your system by examin... You would like to raise the security level of your system by examining incoming HTTP requests. You would like to log information about each request and to filter requests with malicious scripts. Where would you put such request processing code? Please choose only one answer: in the Service Locator in the Service Activator in the Intercepting Filter in the View Helper Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use an intercepting filter? Permalink: http://www.quizover.com/pdf/when-to-use-an-intercepting-filter
  • 8. • • • • (8) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4.1.2. Question: you are in charge of developing an e-commerce web application, the ... you are in charge of developing an e-commerce web application, the client expects high traffic volumes and the security is of essence. Which user session management strategy would you choose? Please choose only one answer: Save user session in http cookies Save user session in html hidden fields Save user session in an HttpSession object Save user session in an EJB stateful session bean object Author: Yasser Ibrahim Check the answer of this question online on QuizOver.com: Question: session management in enterprise java applications Permalink: http://www.quizover.com/pdf/session-management-in-enterprise-java-applications
  • 9. • • • • (9) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4.1.3. Question: Which of the following patterns would you use to transfer certain s... Which of the following patterns would you use to transfer certain state to the next tier without passing on protocol- specific system information? Please choose only one answer: Transfer Object Context Object Context Filter Service To Worker Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: what is the role of a context object? Permalink: http://www.quizover.com/pdf/what-is-the-role-of-a-context-object
  • 10. • • • • (10) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4.1.4. Question: How to secure you web application against security risks such as cr... How to secure you web application against security risks such as cross site scripting (css) and SQL injection in a centralized manner that avoids code duplicate and ensures that every HTTP request would be inspected? Please choose all the answers that apply: use Intercepting Filter pattern use Front Controller pattern use Composite View pattern use Business Delegate pattern Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: how to secure you web application? Permalink: http://www.quizover.com/pdf/how-to-secure-you-web-application
  • 11. • • • • (11) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4.1.5. Question: Your job is to refactor an application ,which uses JSP technology a... Your job is to refactor an application ,which uses JSP technology as a View. The JSP pages are dominated by scriptlet code. Which pattern would be appropriate to solve this problem? Please choose only one answer: View Helper Composite View Data Access Object Context Object Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use the view helper pattern? Permalink: http://www.quizover.com/pdf/when-to-use-the-view-helper-pattern
  • 12. • • • • (12) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4.1.6. Question: In your web application you decided to use Javascript to validate e... In your web application you decided to use Javascript to validate each user input on the client browser. Where do you need to duplicate the validation code on the server? Please choose only one answer: No double check on the server side is needed as the input is already checked on the client side double check in the presentation tier double check in the integration tier double check in the business tier Author: Yasser Ibrahim Check the answer of this question online on QuizOver.com: Question: enterprise java applications input validation Permalink: http://www.quizover.com/pdf/enterprise-java-applications-input-validation
  • 13. • • • • (13) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 4.1.7. Question: Your Parcel delivery company is expanding it's existing web applica... Your Parcel delivery company is expanding it's existing web application. Currently the clients can track their parcels using web browsers, and your company wants to expose it's business to it's partners as web-services. However; when you inspected the code base, you discovered that the application passes HttpServletRequest parameters to the business tier for further processing. Your job is to refactor this existing code base to avoid duplicating the business logic to handle the two request channels (http and web service requests). Which refactoring is appropriate for this case without code duplication? Please choose only one answer: Use front controller pattern Use context object pattern Use proxy pattern Use service broker pattern Author: Yasser Ibrahim Check the answer of this question online on QuizOver.com: Question: context object pattern Permalink: http://www.quizover.com/pdf/context-object-pattern
  • 14. (14) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5. Chapter: Business Tier J2EE Patterns 1. Business Tier J2EE Patterns Questions
  • 15. • • • • (15) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.1. Question: Your application's performance is affected due to the significant n... Your application's performance is affected due to the significant number of remote calls to your business logic. The business logic is exposed as fine grained methods to the clients. Which refactoring can be done to improve the application's performance? Please choose all the answers that apply: Add a Front Controller to centralize requests processing Implement a Session Facade, which provides a coarse grained service-oriented interface to clients Move the frequently called business logic to the presentation tier Encapsulate multiple business data attributes into smaller set of serializable transfer objects, to reduce remote invocations Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use java enterprise business tier session facade pattern? Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-business-tier-session-facade-pattern
  • 16. • • • • (16) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.2. Question: Your online shop application maintains the customers information,... Your online shop application maintains the customers information, like their personal information,contact lists and lists of purchases. The remote descktop clients usually require only parts of these information. Which pattern would be most appropriate for this scenario and would improve your system? Please choose only one answer: Updatable Transfer Objects Transfer Object Assembler Entity Inherits Transfer Object Multiple Transfer Objects Strategy Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use enterprise multiple transfer objects strategy pattern? Permalink: http://www.quizover.com/pdf/when-to-use-enterprise-multiple-transfer-objects-strategy-pattern
  • 17. • • • (17) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.3. Question: ABC university library system is available to students over differe... ABC university library system is available to students over different campuses in the world and installed in one server in the main campus. Queries results are usually large result sets returned all to clients which causes a heavy load on both client and server. What do you think can be done to alleviate this problem on a tight budget? Please choose only one answer: Place a server in each campus to serve the students in this campus to distribute the load apply Transfer Object Pattern apply a Value List Handler Pattern Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use a value list handler pattern? Permalink: http://www.quizover.com/pdf/when-to-use-a-value-list-handler-pattern
  • 18. • • • • (18) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.4. Question: You application's performance is affected due to repeated JNDI look... You application's performance is affected due to repeated JNDI lookups done by every client accessing your application. Which pattern is most appropriate to improve the performance and solve the problem? Please choose only one answer: Service Locator Session Facade Business Delegate Transfer Object Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use java enterprise service locator pattern? Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-service-locator-pattern
  • 19. • • • • (19) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.5. Question: When is it recommended to use a Value List Handler Pattern? When is it recommended to use a Value List Handler Pattern? Please choose only one answer: You want to avoid embedding business logic in the view You want to avoid passing protocol-specific information outside its context You want to provide the clients with an efficient search and iterate mechanism over a large results set You want to maintain the search results on the client side Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use enterprise java value list handler pattern? Permalink: http://www.quizover.com/pdf/when-to-use-enterprise-java-value-list-handler-pattern
  • 20. • • • • (20) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.6. Question: What is TRUE about the Updatable Transfer Objects Strategy? What is TRUE about the Updatable Transfer Objects Strategy? Please choose all the answers that apply: It is used when the client needs not only to read the business component attributes but also to be able to modify them It reduces the complexity of the system in terms of update propagation and synchronization It adds on complexity to the system in terms of update propagation and synchronization Transfer Objects in general can reduce network overhead Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use java enterprise updatable transfer objects strategy pattern? Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-updatable-transfer-objects-strategy-pattern
  • 21. • • (21) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.7. Question: A service locator is best implemented as a Singleton. A service locator is best implemented as a Singleton. Please choose only one answer: true false Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: how to write a service locator? Permalink: http://www.quizover.com/pdf/how-to-write-a-service-locator
  • 22. • • • • (22) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 5.1.8. Question: A presentation tier component is requesting data attributes, which ... A presentation tier component is requesting data attributes, which are scattered in multiple business components, DAOs and services in your application? Which pattern is best suited for this scenario, providing the client with the required data causing no significant performance degradation? Please choose only one answer: Business Object Transfer Object Assembler Data Acess Object Composite Entitiy Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use java enterprise transfer object assembler pattern? Permalink: http://www.quizover.com/pdf/when-to-use-java-enterprise-transfer-object-assembler-pattern
  • 23. (23) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 6. Chapter: Integration Tier J2EE Patterns 1. Integration Tier J2EE Patterns Questions
  • 24. • • • (24) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 6.1.1. Question: What benefits does Data Access Object (DAO) pattern provide? What benefits does Data Access Object (DAO) pattern provide? Please choose all the answers that apply: it increases the cohesiveness of the business objects by extracting out the data acess code from them it reduces network overhead by caching queries results it enhances loose coupling between the business tier and the data sources Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: what benefits does data access object (dao) pattern provide? Permalink: http://www.quizover.com/pdf/what-benefits-does-data-access-object-dao-pattern-provide
  • 25. • • • • (25) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 6.1.2. Question: What pattern is applied in Java Message Driven Beans? What pattern is applied in Java Message Driven Beans? Please choose only one answer: Service Locator Service Activator Service to Worker Front Controller Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: what pattern is applied in java message driven beans? Permalink: http://www.quizover.com/pdf/what-pattern-is-applied-in-java-message-driven-beans
  • 26. • • • • (26) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 6.1.3. Question: You want to expose part of your application as services to other cl... You want to expose part of your application as services to other client applications. The client application will request a service through standard web protocols. The requests are received by a servlet which in turn delegetes them to the bussiness tier. Which pattern is most appropriate for this task? Please choose only one answer: Service Activator Service Locator Web Service Broker Service to Worker Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: when to use web service broker pattern? Permalink: http://www.quizover.com/pdf/when-to-use-web-service-broker-pattern
  • 27. • • • (27) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 6.1.4. Question: What is the role of a Service Activator? What is the role of a Service Activator? Please choose only one answer: A Service Activator acts as a centralized point to process http requests A Service Activator allows an asynchronous messages to invoke business components, including the EJBs A Service Activator enables business logic in EJBs to be exposed as web services Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: what is the role of a service activator? Permalink: http://www.quizover.com/pdf/what-is-the-role-of-a-service-activator
  • 28. • • • • (28) Powered by QuizOver.com - http://www.quizover.com QuizOver.com is the leading online quiz & exam creator Copyright (c) 2009-2014 all rights reserved 6.1.5. Question: Which integration pattern can be used to integrate Java EE code to ... Which integration pattern can be used to integrate Java EE code to a relational database? Please choose only one answer: Service Activator Front Controller Data Access Object (DAO) Web Service Broker Author: JavaChamp Team Check the answer of this question online on QuizOver.com: Question: which integration pattern can be used to integrate java ee code to a relational database? Permalink: http://www.quizover.com/pdf/which-integration-pattern-can-be-used-to-integrate-java-ee-code-to-a- relational-database