INTERVIEW QUESTIONS
AND ANSWERS
PART-II
C++ INTERVIEW QUESTIONS
What is encapsulation??
Containing and hiding information about an object, such as internal data structures and
code. Encapsulation isolates the internal complexity of an object's operation from the rest
of the application. For example, a client component asking for net revenue from a business
object need not know the data's origin.
Containing and hiding information about an object, such as internal data structures and
code. Encapsulation isolates the internal complexity of an object's operation from the rest
of the application. For example, a client component asking for net revenue from a business
object need not know the data's origin.
What is inheritance?
Inheritance allows one class to reuse the state and behavior of another class. The derived
class inherits the properties and method implementations of the base class and extends it by
overriding methods and adding additional properties and methods.
What is Polymorphism??
Polymorphism allows a client to treat different objects in the same way even if they were
created from different classes and exhibit different behaviors. You can use implementation
inheritance to achieve polymorphism in languages such as C++ and Java. Base class object's
pointer can invoke methods in derived class objects. You can also achieve polymorphism in
C++ by function overloading and operator overloading.
What is constructor or ctor?
Constructor creates an object and initializes it. It also creates vtable for virtual
functions. It is different from other methods in a class.
What is destructor?
Destructor usually deletes any extra resources allocated by the object.
What is default constructor?
Constructor with no arguments or all the arguments has default values.
What is copy constructor?
Constructor which initializes the it's object member variables ( by shallow copying) with
another object of the same class. If you don't implement one in your class then compiler
implements one for you.
for example:
Boo Obj1(10); // calling Boo constructor
Boo Obj2(Obj1); // calling boo copy constructor
Boo Obj2 = Obj1;// calling boo copy constructor
When are copy constructors called?
Copy constructors are called in following cases:
a) when a function returns an object of that class by value
b) when the object of that class is passed by value as an argument to a function
c) when you construct an object based on another object of the same class
d) When compiler generates a temporary object
What is assignment operator?
Default assignment operator handles assigning one object to another of the same class.
Member to member copy (shallow copy)
What are all the implicit member functions of the class? Or what are all the functions which
compiler implements for us if we don't define one.??
default ctor
copy ctor
assignment operator
default destructor
address operator
What is conversion constructor?
constructor with a single argument makes that constructor as conversion ctor and it can be
used for type conversion.
for example:
class Boo
{
public:
Boo( int i );
};
Boo BooObject = 10 ; // assigning int 10 Boo object
What is conversion operator??
class can have a public method for specific data type conversions.
for example:
class Boo
{
double value;
public:
Boo(int i )
operator double()
{
return value;
}
};
Boo BooObject;
double i = BooObject; // assigning object to variable i of type double. now conversion
operator gets called to assign the value.
What is diff between malloc()/free() and new/delete?
malloc allocates memory for object in heap but doesn't invoke object's constructor to
initiallize the object.
new allocates memory and also invokes constructor to initialize the object.
malloc() and free() do not support object semantics
Does not construct and destruct objects
string * ptr = (string *)(malloc (sizeof(string)))
Are not safe
Does not calculate the size of the objects that it construct
Returns a pointer to void
int *p = (int *) (malloc(sizeof(int)));
int *p = new int;
Are not extensible
new and delete can be overloaded in a class
"delete" first calls the object's termination routine (i.e. its destructor) and then
releases the space the object occupied on the heap memory. If an array of objects was
created using new, then delete must be told that it is dealing with an array by preceding
the name with an empty []:-
Int_t *my_ints = new Int_t[10];
...
delete []my_ints;
What is the diff between "new" and "operator new" ?
"operator new" works like malloc.
What is difference between template and macro??
There is no way for the compiler to verify that the macro parameters are of compatible
types. The macro is expanded without any special type checking.
If macro parameter has a postincremented variable ( like c++ ), the increment is performed
two times.
Because macros are expanded by the preprocessor, compiler error messages will refer to the
expanded macro, rather than the macro definition itself. Also, the macro will show up in
expanded form during debugging.
for example:
Macro:
#define min(i, j) (i < j ? i : j)
template:
template<class T>
T min (T i, T j)
{
return i < j ? i : j;
}
What are C++ storage classes?
auto
register
static
extern
auto: the default. Variables are automatically created and initialized when they are defined
and are destroyed at the end of the block containing their definition. They are not visible
outside that block
register: a type of auto variable. a suggestion to the compiler to use a CPU register for
performance
static: a variable that is known only in the function that contains its definition but is
never destroyed and retains its value between calls to that function. It exists from the
time the program begins execution
extern: a static variable whose definition and placement is determined when all object and
library modules are combined (linked) to form the executable code file. It can be visible
outside the file where it is defined.
What are storage qualifiers in C++ ?
They are..
const
volatile
mutable
Const keyword indicates that memory once initialized, should not be altered by a program.
volatile keyword indicates that the value in the memory location can be altered even though
nothing in the program
code modifies the contents. for example if you have a pointer to hardware location that
contains the time, where hardware changes the value of this pointer variable and not the
program. The intent of this keyword to improve the optimization ability of the compiler.
mutable keyword indicates that particular member of a structure or class can be altered even
if a particular structure variable, class, or class member function is constant.
struct data
{
char name[80];
mutable double salary;
}
const data MyStruct = { "Satish Shetty", 1000 }; //initlized by complier
strcpy ( MyStruct.name, "Shilpa Shetty"); // compiler error
MyStruct.salaray = 2000 ; // complier is happy allowed
What is reference ??
reference is a name that acts as an alias, or alternative name, for a previously defined
variable or an object. prepending variable with "&" symbol makes it as reference. for
example:
int a;
int &b = a;
What is passing by reference?
Method of passing arguments to a function which takes parameter of type reference. for
example:
void swap( int & x, int & y )
{
int temp = x;
x = y;
y = x;
}
int a=2, b=3;
swap( a, b );
Basically, inside the function there won't be any copy of the arguments "x" and "y" instead
they refer to original variables a and b. so no extra memory needed to pass arguments and it
is more efficient.
When do use "const" reference arguments in function?
a) Using const protects you against programming errors that inadvertently alter data.
b) Using const allows function to process both const and non-const actual arguments, while a
function without const in the prototype can only accept non constant arguments.
c) Using a const reference allows the function to generate and use a temporary variable
appropriately.
When are temporary variables created by C++ compiler?
Provided that function parameter is a "const reference", compiler generates temporary
variable in following 2 ways.
a) The actual argument is the correct type, but it isn't Lvalue
double Cuberoot ( const double & num )
{
num = num * num * num;
return num;
}
double temp = 2.0;
double value = cuberoot ( 3.0 + temp ); // argument is a expression and not a Lvalue;
b) The actual argument is of the wrong type, but of a type that can be converted to the
correct type
long temp = 3L;
double value = cuberoot ( temp); // long to double conversion
What is virtual function?
When derived class overrides the base class method by redefining the same function, then if
client wants to access redefined the method from derived class through a pointer from base
class object, then you must define this function in base class as virtual function.
class parent
{
void Show()
{
cout << "i'm parent" << endl;
}
};
class child: public parent
{
void Show()
{
cout << "i'm child" << endl;
}
};
parent * parent_object_ptr = new child;
parent_object_ptr->show() // calls parent->show() i
now we goto virtual world...
class parent
{
virtual void Show()
{
cout << "i'm parent" << endl;
}
};
class child: public parent
{
void Show()
{
cout << "i'm child" << endl;
}
};
parent * parent_object_ptr = new child;
parent_object_ptr->show() // calls child->show()
What is pure virtual function? or what is abstract class?
When you define only function prototype in a base class without and do the complete
implementation in derived class. This base class is called abstract class and client won't
able to instantiate an object using this base class.
You can make a pure virtual function or abstract class this way..
class Boo
{
void foo() = 0;
}
Boo MyBoo; // compilation error
What is Memory alignment??
The term alignment primarily means the tendency of an address pointer value to be a multiple
of some power of two. So a pointer with two byte alignment has a zero in the least
significant bit. And a pointer with four byte alignment has a zero in both the two least
significant bits. And so on. More alignment means a longer sequence of zero bits in the
lowest bits of a pointer.
What problem does the namespace feature solve?
Multiple providers of libraries might use common global identifiers causing a name collision
when an application tries to link with two or more such libraries. The namespace feature
surrounds a library's external declarations with a unique namespace that eliminates the
potential for those collisions.
namespace [identifier] { namespace-body }
A namespace declaration identifies and assigns a name to a declarative region.
The identifier in a namespace declaration must be unique in the declarative region in which
it is used. The identifier is the name of the namespace and is used to reference its
members.
What is the use of 'using' declaration?
A using declaration makes it possible to use a name from a namespace without the scope
operator.
What is an Iterator class?
A class that is used to traverse through the objects maintained by a container class. There
are five categories of iterators: input iterators, output iterators, forward iterators,
bidirectional iterators, random access. An iterator is an entity that gives access to the
contents of a container object without violating encapsulation constraints. Access to the
contents is granted on a one-at-a-time basis in order. The order can be storage order (as in
lists and queues) or some arbitrary order (as in array indices) or according to some
ordering relation (as in an ordered binary tree). The iterator is a construct, which
provides an interface that, when called, yields either the next element in the container, or
some value denoting the fact that there are no more elements to examine. Iterators hide the
details of access to and update of the elements of a container class. Something like a
pointer.
What is a dangling pointer?
A dangling pointer arises when you use the address of an object after its lifetime is over.
This may occur in situations like returning addresses of the automatic variables from a
function or using the address of the memory block after it is freed.
What do you mean by Stack unwinding?
It is a process during exception handling when the destructor is called for all local
objects in the stack between the place where the exception was thrown and where it is
caught.
Name the operators that cannot be overloaded??
sizeof, ., .*, .->, ::, ?:
What is a container class? What are the types of container classes?
A container class is a class that is used to hold objects in memory or external storage. A
container class acts as a generic holder. A container class has a predefined behavior and a
well-known interface. A container class is a supporting class whose purpose is to hide the
topology used for maintaining the list of objects in memory. When a container class contains
a group of mixed objects, the container is called a heterogeneous container; when the
container is holding a group of objects that are all the same, the container is called a
homogeneous container.
What is inline function??
The __inline keyword tells the compiler to substitute the code within the function
definition for every instance of a function call. However, substitution occurs only at the
compiler's discretion. For example, the compiler does not inline a function if its address
is taken or if it is too large to inline.
What is overloading??
With the C++ language, you can overload functions and operators. Overloading is the practice
of supplying more than one definition for a given function name in the same scope.
- Any two functions in a set of overloaded functions must have different argument lists.
- Overloading functions with argument lists of the same types, based on return type alone,
is an error.
What is Overriding?
To override a method, a subclass of the class that originally declared the method must
declare a method with the same name, return type (or a subclass of that return type), and
same parameter list.
The definition of the method overriding is:
• Must have same method name.
• Must have same data type.
• Must have same argument list.
Overriding a method means that replacing a method functionality in child class. To imply
overriding functionality we need parent and child classes. In the child class you define the
same method signature as one defined in the parent class.
What is "this" pointer?
The this pointer is a pointer accessible only within the member functions of a class,
struct, or union type. It points to the object for which the member function is called.
Static member functions do not have a this pointer.
When a nonstatic member function is called for an object, the address of the object is
passed as a hidden argument to the function. For example, the following function call
myDate.setMonth( 3 );
can be interpreted this way:
setMonth( &myDate, 3 );
The object's address is available from within the member function as the this pointer. It is
legal, though unnecessary, to use the this pointer when referring to members of the class.
What happens when you make call "delete this;" ??
The code has two built-in pitfalls. First, if it executes in a member function for an
extern, static, or automatic object, the program will probably crash as soon as the delete
statement executes. There is no portable way for an object to tell that it was instantiated
on the heap, so the class cannot assert that its object is properly instantiated. Second,
when an object commits suicide this way, the using program might not know about its demise.
As far as the instantiating program is concerned, the object remains in scope and continues
to exist even though the object did itself in. Subsequent dereferencing of the pointer can
and usually does lead to disaster.
You should never do this. Since compiler does not know whether the object was allocated on
the stack or on the heap, "delete this" could cause a disaster.
How virtual functions are implemented C++?
Virtual functions are implemented using a table of function pointers, called the vtable.
There is one entry in the table per virtual function in the class. This table is created by
the constructor of the class. When a derived class is constructed, its base class is
constructed first which creates the vtable. If the derived class overrides any of the base
classes virtual functions, those entries in the vtable are overwritten by the derived class
constructor. This is why you should never call virtual functions from a constructor: because
the vtable entries for the object may not have been set up by the derived class constructor
yet, so you might end up calling base class implementations of those virtual functions
What is name mangling in C++??
The process of encoding the parameter types with the function/method name into a unique name
is called name mangling. The inverse process is called demangling.
For example Foo::bar(int, long) const is mangled as `bar__C3Fooil'.
For a constructor, the method name is left out. That is Foo::Foo(int, long) const is mangled
as `__C3Fooil'.
What is the difference between a pointer and a reference?
A reference must always refer to some object and, therefore, must always be initialized;
pointers do not have such restrictions. A pointer can be reassigned to point to different
objects while a reference always refers to an object with which it was initialized.
How are prefix and postfix versions of operator++() differentiated?
The postfix version of operator++() has a dummy parameter of type int. The prefix version
does not have dummy parameter.
What is the difference between const char *myPointer and char *const myPointer?
Const char *myPointer is a non constant pointer to constant data; while char *const
myPointer is a constant pointer to non constant data.
How can I handle a constructor that fails?
throw an exception. Constructors don't have a return type, so it's not possible to use
return codes. The best way to signal constructor failure is therefore to throw an exception.
How can I handle a destructor that fails?
Write a message to a log-file. But do not throw an exception.
The C++ rule is that you must never throw an exception from a destructor that is being
called during the "stack unwinding" process of another exception. For example, if someone
says throw Foo(), the stack will be unwound so all the stack frames between the throw Foo()
and the } catch (Foo e) { will get popped. This is called stack unwinding.
During stack unwinding, all the local objects in all those stack frames are destructed. If
one of those destructors throws an exception (say it throws a Bar object), the C++ runtime
system is in a no-win situation: should it ignore the Bar and end up in the } catch (Foo e)
{ where it was originally headed? Should it ignore the Foo and look for a } catch (Bar e) {
handler? There is no good answer -- either choice loses information.
So the C++ language guarantees that it will call terminate() at this point, and terminate()
kills the process. Bang you're dead.
What is Virtual Destructor?
Using virtual destructors, you can destroy objects without knowing their type - the correct
destructor for the object is invoked using the virtual function mechanism. Note that
destructors can also be declared as pure virtual functions for abstract classes.
if someone will derive from your class, and if someone will say "new Derived", where
"Derived" is derived from your class, and if someone will say delete p, where the actual
object's type is "Derived" but the pointer p's type is your class.
Can you think of a situation where your program would crash without reaching the breakpoint
which you set at the beginning of main()?
C++ allows for dynamic initialization of global variables before main() is invoked. It is
possible that initialization of global will invoke some function. If this function crashes
the crash will occur before main() is entered.
Name two cases where you MUST use initialization list as opposed to assignment in
constructors.
Both non-static const data members and reference data members cannot be assigned values;
instead, you should use initialization list to initialize them.
Can you overload a function based only on whether a parameter is a value or a reference?
No. Passing by value and by reference looks identical to the caller.
What are the differences between a C++ struct and C++ class?
The default member and base class access specifiers are different.
The C++ struct has all the features of the class. The only differences are that a struct
defaults to public member access and public base class inheritance, and a class defaults to
the private access specifier and private base class inheritance.
What does extern "C" int func(int *, Foo) accomplish?
It will turn off "name mangling" for func so that one can link to code compiled by a C
compiler.
How do you access the static member of a class?
<ClassName>::<StaticMemberName>
What is multiple inheritance(virtual inheritance)? What are its advantages and
disadvantages?
Multiple Inheritance is the process whereby a child can be derived from more than one parent
class. The advantage of multiple inheritance is that it allows a class to inherit the
functionality of more than one base class thus allowing for modeling of complex
relationships. The disadvantage of multiple inheritance is that it can lead to a lot of
confusion(ambiguity) when two base classes implement a method with the same name.
What are the access privileges in C++? What is the default access level?
The access privileges in C++ are private, public and protected. The default access level
assigned to members of a class is private. Private members of a class are accessible only
within the class and by friends of the class. Protected members are accessible by the class
itself and it's sub-classes. Public members of a class can be accessed by anyone.
What is a nested class? Why can it be useful?
A nested class is a class enclosed within the scope of another class. For example:
// Example 1: Nested class
//
class OuterClass
{
class NestedClass
{
// ...
};
// ...
};
Nested classes are useful for organizing code and controlling access and dependencies.
Nested classes obey access rules just like other parts of a class do; so, in Example 1, if
NestedClass is public then any code can name it as OuterClass::NestedClass. Often nested
classes contain private implementation details, and are therefore made private; in Example
1, if NestedClass is private, then only OuterClass's members and friends can use
NestedClass.
When you instantiate as outer class, it won't instantiate inside class.
What is a local class? Why can it be useful?
local class is a class defined within the scope of a function -- any function, whether a
member function or a free function. For example:
// Example 2: Local class
//
int f()
{
class LocalClass
{
// ...
};
// ...
};
Like nested classes, local classes can be a useful tool for managing code dependencies.
Can a copy constructor accept an object of the same class as parameter, instead of reference
of the object?
No. It is specified in the definition of the copy constructor itself. It should generate an
error if a programmer specifies a copy constructor with a first argument that is an object
and not a reference.
(From Microsoft) Assume I have a linked list contains all of the alphabets from ‘A’ to ‘Z’.
I want to find the letter ‘Q’ in the list, how does you perform the search to find the ‘Q’?
How do you write a function that can reverse a linked-list? (Cisco System)
void reverselist(void)
{
if(head==0)
return;
if(head->next==0)
return;
if(head->next==tail)
{
head->next = 0;
tail->next = head;
}
else
{
node* pre = head;
node* cur = head->next;
node* curnext = cur->next;
head->next = 0;
cur->next = head;
for(; curnext!=0; )
{
cur->next = pre;
pre = cur;
cur = curnext;
curnext = curnext->next;
}
curnext->next = cur;
}
}
How do you find out if a linked-list has an end? (i.e. the list is not a cycle)
You can find out by using 2 pointers. One of them goes 2 nodes each time. The second one
goes at 1 nodes each time. If there is a cycle, the one that goes 2 nodes each time will
eventually meet the one that goes slower. If that is the case, then you will know the
linked-list is a cycle.
How can you tell what shell you are running on UNIX system?
You can do the Echo $RANDOM. It will return a undefined variable if you are from the
C-Shell, just a return prompt if you are from the Bourne shell, and a 5 digit random numbers
if you are from the Korn shell. You could also do a ps -l and look for the shell with the
highest PID.
What is Boyce Codd Normal form?
A relation schema R is in BCNF with respect to a set F of functional dependencies if for all
functional dependencies in F+ of the form a->b, where a and b is a subset of R, at least one
of the following holds:
• a->b is a trivial functional dependency (b is a subset of a)
• a is a superkey for schema R
Could you tell something about the Unix System Kernel?
The kernel is the heart of the UNIX openrating system, it’s reponsible for controlling the
computer’s resouces and scheduling user jobs so that each one gets its fair share of
resources.
What is a Make file?
Make file is a utility in Unix to help compile large programs. It helps by only compiling
the portion of the program that has been changed
How do you link a C++ program to C functions?
By using the extern "C" linkage specification around the C function declarations.
Explain the scope resolution operator.
Design and implement a String class that satisfies the following:
Supports embedded nulls
Provide the following methods (at least)
Constructor
Destructor
Copy constructor
Assignment operator
Addition operator (concatenation)
Return character at location
Return substring at location
Find substring
Provide versions of methods for String and for char* arguments
Suppose that data is an array of 1000 integers. Write a single function call that will sort
the 100 elements data [222] through data [321].
Answer: quicksort ((data + 222), 100);
What is a modifier?
What is an accessor?
Differentiate between a template class and class template.
When does a name clash occur?
Define namespace.
What is the use of ‘using’ declaration.
What is an Iterator class?
List out some of the OODBMS available.
List out some of the object-oriented methodologies.
What is an incomplete type?
What is a dangling pointer?
Differentiate between the message and method.
What is an adaptor class or Wrapper class?
What is a Null object?
What is class invariant?
What do you mean by Stack unwinding?
Define precondition and post-condition to a member function.
What are the conditions that have to be met for a condition to be an invariant of the class?
What are proxy objects?
Name some pure object oriented languages.
Name the operators that cannot be overloaded.
What is a node class?
What is an orthogonal base class?
What is a container class? What are the types of container classes?
What is a protocol class?
What is a mixin class?
What is a concrete class?
What is the handle class?
What is an action class?
When can you tell that a memory leak will occur?
What is a parameterized type?
Differentiate between a deep copy and a shallow copy?
What is an opaque pointer?
What is a smart pointer?
What is reflexive association?
What is slicing?
What is name mangling?
What are proxy objects?
What is cloning?
Describe the main characteristics of static functions.
Will the inline function be compiled as the inline function always? Justify.
Define a way other than using the keyword inline to make a function inline.
How can a '::' operator be used as unary operator?
What is placement new?
What do you mean by analysis and design?
What are the steps involved in designing?
What are the main underlying concepts of object orientation?
What do u meant by "SBI" of an object?
Differentiate persistent & non-persistent objects?
What do you meant by active and passive objects?
What is meant by software development method?
What do you meant by static and dynamic modeling?
How to represent the interaction between the modeling elements?
Why generalization is very strong?
Differentiate Aggregation and containment?
Can link and Association applied interchangeably?
What is meant by "method-wars"?
Whether unified method and unified modeling language are same or different?
Who were the three famous amigos and what was their contribution to the object community?
Differentiate the class representation of Booch, Rumbaugh and UML?
What is an USECASE? Why it is needed?
Who is an Actor?
What is guard condition?
Differentiate the following notations?
USECASE is an implementation independent notation. How will the designer give the
implementation details of a particular USECASE to the programmer?
Suppose a class acts an Actor in the problem domain, how to represent it in the static
model?
Why does the function arguments are called as "signatures"?
CCNA QUESTIONS::
1 As system administrator, you type “debug ipx sap” and receive the following lines as part of the IOS response: type 0×4, “HELLO2″, 199.0002.0003.0006 (451), 2 hops type 0×4, “HELLO1″, 199.0002.0003.0008 (451), 2 hops What does “0×4″ signify?
A. That is a Get Nearest Server response.
B. That it is a General query.
C. That it is a General response.
D. That it is a Get Nearest Server request.
Ans A
2 To monitor IP igrp traffic, you can use “debug IP igrp transaction” or “debug IP igrp events”. How do you display information about IPX routing update packets?
A. debug routing
B. debug ipx transaction
C. debug ipx routing activity
D. debug ipx events
Ans: C
3 To monitor ipx traffic on a network, what command would you use?
A. debug ipx transaction
B. show ipx traffic
C. show ipx events
D. display ipx traffic
Ans B
4 What command would you use to find out the names of Novell servers on a network?
A. show ipx servers
B. show ipx hosts
C. show ipx sap
D. show ipx nodes.
Ans A
5 The “ipx delay number” command will allow an administrator to change the defaultsettings. What are the default settings?
A. For LAN interfaces, one tick; for WAN interfaces, six ticks
B. For LAN interfaces, six ticks; for WAN interfaces, one tick
C. For LAN interfaces, zero ticks; for WAN interfaces, five ticks
D. For LAN interfaces, five ticks; for WAN interfaces, zero Ticks
Ans A
The default is–for LAN interfaces, one tick; for WAN interfaces, six ticks
6 As a system administrator, you need to set up one Ethernet interface on the Cisco router to allow for both sap and Novell-ether encapsulations. Which set of commands will accomplish this?
A. interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx network 6c
B. interface ethernet 0 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0 ipx encapsulation sap ipx network 6c
C. interface ethernet 0.1 ipx encapsulation Novell-ether interface ethernet 0.2 ipx encapsulation sap
D. interface ethernet 0.1ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
Ans D
The following commands setup the subinterfaces to allow for two types of encapsulation: interface ethernet 0.1 ipx encapsulation Novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
7 What does the “IPX maximum-paths 2″ command accomplish?
A. It enables load sharing on 2 paths if the paths are equal metric paths.
B. It sets up routing to go to network 2.
C. It is the default for Cisco IPX load sharing.
D. It enables load sharing on 2 paths if the paths are unequal metric paths.
Ans A
It enables load sharing on 2 paths if the paths are equal metric paths. The default is 1 path and the maximum is 512 paths.
8 You want to enable both arpa and snap encapsulation on one router interface. How do you do this?
A. The interface can handle multiple encapsulation types with no extra configuration.
B. Assign two network numbers, one for each encapsulation type.
C. Enable Novell-ether to run multiple encapsulation types.
D. Both arpa and snap are enabled by default so you don’t have to configureanything.
Ans B
To assign multiple network numbers, you usually use subinterfaces. A sample configuration follows: ipx ethernet 0.1 ipx encapsulation novell-ether ipx network 9e interface ethernet 0.2 ipx encapsulation sap ipx network 6c
By default, Cisco routers forward GNS SAPs to remote networks.
A. False
B. True
Ans A
GNS is Novell’s protocol to Get Nearest Server. If there is a server on the local network, that server will respond. If there isn’t, the Cisco router has to be configured to forward the GNS SAP.
9 To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks?
A. Each router builds its own SAP table and forwards that every 60 seconds.
B. Each router assigns a service number and broadcasts that.
C. SAPs aren’t necessary with Cisco routers.
D. Cisco routers filter out all SAPs.
Ans: A
Cisco routers build SAP tables and forward the table every 60 seconds. All SAPs can’t be filtered even with 4.x since NDS and time synchronization uses SAPs.
10 Novell’s implementation of RIP updates routing tables every ____ seconds.
A. 60
B. 90
C. 10
D. 30
Ans A
Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10 seconds, routers ARP every 60 seconds, IGRP signal every 90 seconds, and Banyan VINES signals every 90 seconds.
11 In Novell’s use of RIP, there are two metrics used to make routing decisions. Select the two metrics.
A. Ticks.
B. Hops
C. Loops
D. Counts
Ans:A &B
It first uses ticks (which is about 1/18 sec.); if there is a tie, it uses hops; if hops are equal, then it uses an administratively assigned tiebreaker.
12 What is the Cisco name for the encapsulation type used on a serial interface?
A. HDLC
B. SDLC
C. SAP
D. SNAP
Ans A
13 “arpa” is used by the Cisco IOS for which encapsulation types?
A. Ethernet_II
B. Ethernet_802.3
C. Ethernet_802.2
D. Ethernet_SNAP
Ans A
Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.
14 “snap” is used by the Cisco IOS for which encapsulation types?
A. Ethernet_SNAP
B. Token-Ring_SNAP
C. FDDI_SNAP
D. Novell-SNAP
E. Novell-FDDI.
Ans: A,B &C Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.
15″sap” is used by the Cisco IOS for which encapsulation types?
A. Ethernet_802.2
B. Token-Ring
C. FDDI_SNAP
D. Ethernet_802.3
E. FDDI_802.2
Ans A,B &E
Novell’s IPX and Cisco’s IOS name their protocols differently. Cisco uses sap for Ethernet_802.2, Token-Ring, and Novell’s FDDI_802.2. Cisco uses snap for Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses arpa for Ethernet_II and, finally the default is Novell-ether for Novell’s Ethernet_802.3.
16 Which type of Ethernet framing is used for TCP/IP and AppleTalk?
A. Ethernet 802.3
B. Ethernet 802.2
C. Ethernet II
D. Ethernet SNAP
Ans D
Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk.
17 Which type of Ethernet framing is used for TCP/IP and DECnet?
A. Ethernet 802.3
B. Ethernet 802.2
C. Ethernet II
D. Ethernet SNAP
Ans: C
Ethernet 802.3 is used with NetWare versions 2 through 3.11, Ethernet 802.2 is used with NetWare 3.12 and later plus OSI routing, Ethernet II is used with TCP/IP and DECnet, and Ethernet SNAP is used with TCP/IP and AppleTalk.
18 You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem?
A. NetWare 4.11 defaults to 802.2 encapsulation.
B. NetWare 4.11 defaults to 802.3 encapsulation
C. Cisco routers only work with NetWare 3.11.
D. NetWare 3.11 defaults to 802.2 encapsulation.
Ans A
The default encapsulation on Cisco routers is Novell Ethernet_802.3 and NetWare 3.12 and later defaults to 802.2 encapsulation, 3.11 and earlier defaults to 802.3.
19 NetWare IPX addressing uses a network number and a node number. Which statements are true?
A. The network address is administratively assigned and can be up to 16 hexadecimal digits long.
B. The node address is always administratively assigned.
C. The node address is usually the MAC address.
D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.
Ans A, C &D
The network address can be up to 16 hexadecimal digits in length. The node number is 12 hexadecimal digits. The node address is usually the MAC address. An example IPX address is 4a1d.0000.0c56.de33. The network part is 4a1d. The node part is 0000.0c56.de33. The network number is assigned by the system administrator of the Novell network.
20 Which NetWare protocol works on layer 3–network layer—of the OSI model?
A. IPX
B. NCP
C. SPX
D. NetBIOS
Ans A
IPX (Internetwork Packet Exchange) is a NetWare network layer 3 protocol used for transferring information on LANs.
21 Which NetWare protocol provides link-state routing?
21 Which NetWare protocol provides link-state routing?
A. NLSP
B. RIP
C. SAP
D. NCP
Ans: A
NetWare Link Services Protocol (NLSP) provides link-state routing. SAP (Service Advertisement Protocol) advertises network services. NCP (NetWare Core Protocol) provides client-to-server connections and applications. RIP is a distance vector routing protocol.
22 As a system administrator, you want to debug igrp but are worried that the “debug IP igrp transaction” command will flood the console. What is the command that you should use?
A. debug IP igrp event
B. debug IP igrp-events
C. debug IP igrp summary
D. debug IP igrp events
Ans D
The “debug IP igrp events” is used to only display a summary of IGRP routing information. You can append an IP address onto either command to see only the IGRP updates from a neighbor.
23 What does the following series of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0
A. It isolates networks 10.0.0.0 and 172.68.7.0.
B. It loads igrp for networks 109 and 71.
C. It disables RIP.
D. It disables all routing protocols.
Ans A
It isolates network 10.0.0.0 and 172.68.7.0 and associates autonomous systems 109 and 71 with IGRP. IGRP does not disable RIP, both can be used at the same time.
24 In the command “router igrp 109″ what does 109 signify?
A. an autonomous system
B. any network number which the router is attached to
C. the allowable length of the routing table
D. the network socket number
Ans A
The Cisco IOS global configuration command “router igrp xxx” is used to configure the Interior Gateway Routing Protocol. In this case, the 109 is called the process-id , which can also be used for an autonomous system number.
25 IGRP supports a feature that allows traffic to be distributed among up to 6 (4 default) paths to provide greater overall throughput and reliability. What is this called?
A. unequal-cost load balancing
B. equal-cost load balancing
C. proportionate load balancing
D. low cost load balancing
Ans A
An unequal-cost load balancing is used to provide alternate paths for data distribution on an internetwork. Cisco developed this method to use unused or under utilized links to increase bandwidth and network availability.
26 IGRP uses flash updates, poison reverse updates, holddown times, and split horizon. How often does it broadcast its routing table updates?
A. 90 seconds
B. 10 seconds
C. 30 seconds
D. 45 seconds
Ans A
27 The command “show IP protocol” displays which information?
A. routing timers
B. network information
C. contents of the IP routing table
D. information about all known network and subnetworks
Ans A & B
“show IP protocol” displays routing timers and network information. “show IP route” displays the routing table with information about all known networks and subnetworks.
28 When using RIP, routing updates are broadcast every ____ seconds.
A. 30
B. 10
C. 60
D. 90
Ans: A
Novell’s RIP updates routing tables every 60 seconds, Apple’s RTMP is every 10 seconds, routers ARP every 60 seconds, DECnet hosts and IGRP signal every 15 seconds, and Banyan VINES signals every 90 seconds.
29 An autonomous system can only exist if all routers in that system meet which criteria?
A. interconnected
B. run the same routing protocol
C. assigned same autonomous system number
D. run IGRP only
E. run RIP only
Ans A,B &C
An autonomous system is a set of routers and networks under the same administration. Each router must be interconnected, run the same routing protocol, and assigned the same autonomous system number. The network Information Center (NIC) assigns a unique autonomous system number to enterprises.
30 A default route is analogous to a _________.
A. default gateway
B. static route
C. dynamic route
D. one-way route
Ans: A
A default route is analogous to a default gateway. It is used to reduce the length of routing tables and to provide complete routing capabilities when a router might not know the routes to all other networks.
31 Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________.
31 Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________.
A. IGRP
B. RIP
C. IP
D. TCP
Ans A
The quality of information is rated:
Connected interface 0
Static route 1
IGRP 100
RIP 120
Unknown 255
The lower the value, the more reliable the source with 255 signifying information that the router will ignore. So, the router will use IGRP, rated at 100, before RIP, rated at 120.
32 You are logged into a router, what command would show you the IP addresses of routers connected to you?
A. show cdp neighbors detail
B. show run
C. show neighbors
D. show cdp
Ans A
33 As a system administrator, you perform an extended ping at the privileged EXEC prompt. As part of the display, you see “Set DF bit in IP header? [yes] :” What would happen if you answered no at the prompt.
A. This lets the router fragment the packet.
B. It tells the router not to fragment the packet.
C. This lets the router direct the packet to the destination it finds in its routing table.
D. It tell the router to send the packet to the next hop router
Ans A
“Set DF bit in IP header?” is a response to an extended ping at the router. If you answer yes (the default) the router will not fragment the packet. If you answer no, the router will fragment the packet.
34 You have typed “ping” 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds:
.!!!!
What does the “.” signify?
A. That one message timed out.
A. That one message timed out.
B. That all messages were successful.
C. That one message was successful.
D. That one message completed in under the allotted timeframe.
Ans A
The possible responses from the ping command are: ! Successful receipt of an echo reply. Timed out waiting for a reply U Destination unreachable C Congestion-experienced packet I Ping interrupted ? Packet type unknown & Packet TTL exceeded
35 Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router.
A. trace
B. ping
C. telnet
D. bootp
Ans: A
The Cisco IOS EXEC command “trace [protocol] [destination]” is used to discover routes that packets will travel to their destination hosts. Trace uses TTL (Time to Live) values to report destination route information.
36 What does the command “IP name-server 255.255.255.255″ accomplish?
A. It sets the domain name lookup to be a local broadcast.
B. This is an illegal command.
C. It disables domain name lookup.
D. The command is now defunct and has been replaced by “IP server-name ip any”
Ans A
By default DNS is enabled on a router with a server address of 255.255.255.255, which provides for a local broadcast.
37 As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command?
A. 6
B. 1
C. 2
D. 4
Ans A
You can only specify six name servers in one command. The syntax is “IP name-server server-address1 [[ server-address2 ]…server-address6]. You must also enable
DNS.
38 How would you configure one host name that points to two IP addresses?
A. IP host jacob 1.0.0.5 2.0.0.8
B. IP jacob 1.0.0.5 2.0.0.8
C. IP host jacob 1.0.0.5
D. IP host duplicate “all”
Ans A
The correct syntax is IP host name [ TCP-port-number ] address [ address ]….. So, “IP host P1R1 1.0.0.5 2.0.0.8″ is the correct choice. “IP host jacob 1.0.0.5″ only points the host name jacob to one IP address–1.0.0.5.
39 The following selections show the command prompt and the configuration of the IP network mask. Which two are correct?
A. Router#term IP netmask-format { bitcount | decimal | hexadecimal }
B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal }
C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal }
D. Router#ip netmask-format { bitcount | decimal | hexadecimal }
Ans A & B
Router#term IP netmask-format { bitcount | decimal | hexadecimal } and Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } are correct. You can configure the mask for the current session and you can configure it for a specific line.
40 When configuring the subnet mask for an IP address, which formats can be used?
A. dotted-decimal.
B. Hexadecimal
C. Bit-count
D. Octal
E. Binary
Ans A, B &C
41 You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address.
A. 255.255.255.128, B,153.50.6.0, 153.50.6.127
B. 255.255.255.128, C,153.50.6.0, 153.50.6.127
C. 255.255.255.128, C,153.50.6.127, 153.50.6.0
D. 255.255.255.224, C,153.50.6.0, 153.50.6.127
Ans A
41 You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address.
A. 255.255.255.128, B,153.50.6.0, 153.50.6.127
B. 255.255.255.128, C,153.50.6.0, 153.50.6.127
C. 255.255.255.128, C,153.50.6.127, 153.50.6.0
D. 255.255.255.224, C,153.50.6.0, 153.50.6.127
Ans A
42 You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address,
and broadcast address.
A. 255.255.255.252, B,128.16.32.12, 128.16.32.15
B. 255.255.255.252, C,128.16.32.12, 128.16.32.15
C. 255.255.255.252, B,128.16.32.15, 128.16.32.12
D. 255.255.255.248, B,128.16.32.12, 128.16.32.15
Ans A
and broadcast address.
A. 255.255.255.252, B,128.16.32.12, 128.16.32.15
B. 255.255.255.252, C,128.16.32.12, 128.16.32.15
C. 255.255.255.252, B,128.16.32.15, 128.16.32.12
D. 255.255.255.248, B,128.16.32.12, 128.16.32.15
Ans A
43 You are given the following address: 15.16.193.6/21. Determine the subnet mask, address class, subnet address,
and broadcast address.
A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255
B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255
C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0
D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255
Ans A
and broadcast address.
A. 255.255.248.0, A, 15.16.192.0, 15.16.199.255
B. 255.255.248.0, B, 15.16.192.0, 15.16.199.255
C. 255.255.248.0, A, 15.16.199.255, 14.15.192.0
D. 255.255.242.0, A, 15.16.192.0, 15.16.199.255
Ans A
44 You have an IP host address of 201.222.5.121 and a subnet mask of 255.255.255.248. What is the broadcast address?
A. 201.222.5.127
B. 201.222.5.120
C. 201.222.5.121
D. 201.222.5.122
A. 201.222.5.127
B. 201.222.5.120
C. 201.222.5.121
D. 201.222.5.122
Ans A
The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this
equals 7. Convert the address 201.222.5.121 to binary–11001001 11011110 00000101 01111001. Convert the
mask 255.255.255.248 to binary–11111111 11111111 11111111 11111000. AND them together to get: 11001001 11011110
00000101 01111000 or 201.222.5.120. 201.222.5.120 is the subnet address, add 7 to this address for 201.222.5.127 or
the broadcast address. 201.222.5.121 through 201.222.5.126 are the valid host addresses.
The easiest way to calculate this is to subtract 255.255.255.248 (subnet mask) from 255.255.255.255, this
equals 7. Convert the address 201.222.5.121 to binary–11001001 11011110 00000101 01111001. Convert the
mask 255.255.255.248 to binary–11111111 11111111 11111111 11111000. AND them together to get: 11001001 11011110
00000101 01111000 or 201.222.5.120. 201.222.5.120 is the subnet address, add 7 to this address for 201.222.5.127 or
the broadcast address. 201.222.5.121 through 201.222.5.126 are the valid host addresses.
45 Given the address 172.16.2.120 and the subnet mask of 255.255.255.0. How many hosts are available?
A. 254
B. 510
C. 126
D. 16,372
A. 254
B. 510
C. 126
D. 16,372
Ans A
172.16.2 120 is a standard Class B address with a subnet mask that allows 254 hosts. You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. The subnet mask is 255.255.255.248.
172.16.2 120 is a standard Class B address with a subnet mask that allows 254 hosts. You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. The subnet mask is 255.255.255.248.
46 Which addresses are valid host addresses?
A. 201.222.5.17
B. 201.222.5.18
C. 201.222.5.16
D. 201.222.5.19
E. 201.222.5.31
A. 201.222.5.17
B. 201.222.5.18
C. 201.222.5.16
D. 201.222.5.19
E. 201.222.5.31
Ans A,B & D
Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16.
Subnet addresses in this situation are all in multiples of 8. In this example, 201.222.5.16 is the subnet, 201.22.5.31 is the broadcast address. The rest are valid host IDs on subnet 201.222.5.16.
47 You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with
5 hosts per subnet. What subnet mask will you use?
A. 255.255.255.248
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.240
5 hosts per subnet. What subnet mask will you use?
A. 255.255.255.248
B. 255.255.255.128
C. 255.255.255.192
D. 255.255.255.240
Ans A
By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing 4 bits, you have (2×2x2×2)-2=14. By borrowing 5 bits, you have (2×2x2×2x2)-2=30. To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248.
By borrowing 5 bits from the last octet, you can. have 30 subnets. If you borrowed only 4 bits you could only have 14 subnets. The formula is (2 to the power of n)-2. By borrowing 4 bits, you have (2×2x2×2)-2=14. By borrowing 5 bits, you have (2×2x2×2x2)-2=30. To get 20 subnets, you would need to borrow 5 bits so the subnet mask would be 255.255.255.248.
48 You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary?
A. 10101100 00010000
B. 00000010 10100000
C. 10101100 00000000
D. 11100000 11110000
A. 10101100 00010000
B. 00000010 10100000
C. 10101100 00000000
D. 11100000 11110000
Ans: A
To find the network address, convert the IP address to binary–10101100 000100000 00000010 10100000–then ANDed it with the subnet mask–11111111 11111111 00000000 00000000. The rest is 10101100 00010000 00000000 00000000, which is 172.16.0.0 in decimal.
The first octet rule states that the class of an address can be determined by the numerical value of the first octet.
To find the network address, convert the IP address to binary–10101100 000100000 00000010 10100000–then ANDed it with the subnet mask–11111111 11111111 00000000 00000000. The rest is 10101100 00010000 00000000 00000000, which is 172.16.0.0 in decimal.
The first octet rule states that the class of an address can be determined by the numerical value of the first octet.
49 Which addresses are INCORRECTLY paired with their class?
A. 128 to 191, Class B
B. 192 to 223 Class B
C. 128 to 191, Class C
D. 192 to 223, Class C
A. 128 to 191, Class B
B. 192 to 223 Class B
C. 128 to 191, Class C
D. 192 to 223, Class C
Ans B & C
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and
240 to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and
240 to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.
50 Which addresses are INCORRECTLY paired with their class?
A. 1 to 126, Class A
B. 128 to 191, Class A
C. 1 to 126, Class B
D. 128 to 191, Class B
A. 1 to 126, Class A
B. 128 to 191, Class A
C. 1 to 126, Class B
D. 128 to 191, Class B
Ans:B & C.
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and
240 to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.
51 Which addresses are INCORRECTLY paired with their class?
A. 240 - 255, Class D
B. 240 - 255, Class E
C. 224 - 239, Class D
D. 224 - 239, Class E
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and
240 to 255, Class E. The first octet rule states that the class of an address can be determined by the numerical value of the first octet.
51 Which addresses are INCORRECTLY paired with their class?
A. 240 - 255, Class D
B. 240 - 255, Class E
C. 224 - 239, Class D
D. 224 - 239, Class E
Ans A & D
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and 240 to 255, Class E.
Address classes are: 1 to 126, Class A; 128 to 191, Class B, 192 to 223, Class C; 224 to 239, Class D; and 240 to 255, Class E.
52 Which IP Address Class is INCORRECTLY paired with its range of network numbers?
A. Class A addresses include 192.0.0.0 through 223.255.255.0
B. Class A addresses include 1.0.0.0 through 126.0.0.0
C. Class B addresses include 128.0.0.0 through 191.255.0.0
D. Class C addresses include 192.0.0.0 through 223.255.255.0
E. Class D addresses include 224.0.0.0 through 239.255.255.0
A. Class A addresses include 192.0.0.0 through 223.255.255.0
B. Class A addresses include 1.0.0.0 through 126.0.0.0
C. Class B addresses include 128.0.0.0 through 191.255.0.0
D. Class C addresses include 192.0.0.0 through 223.255.255.0
E. Class D addresses include 224.0.0.0 through 239.255.255.0
Ans A
Class A addresses include 1.0.0.0 through 126.0.0.0
Class B addresses include 128.0.0.0 through 191.255.0.0
Class C addresses include 192.0.0.0 through 223.255.255.0
Class D addresses include 224.0.0.0 through 239.255.255.0
Class A addresses include 1.0.0.0 through 126.0.0.0
Class B addresses include 128.0.0.0 through 191.255.0.0
Class C addresses include 192.0.0.0 through 223.255.255.0
Class D addresses include 224.0.0.0 through 239.255.255.0
53 Which IP Address Class can have 16 million subnets but support 254 hosts?
A. Class C
B. Class A
C. Class B
D. Class D
A. Class C
B. Class A
C. Class B
D. Class D
Ans A
Possible Subnets IP Address Class Possible Hosts
254 A 16M.
64K B 64K
16M C 254
Possible Subnets IP Address Class Possible Hosts
254 A 16M.
64K B 64K
16M C 254
54 Which IP Address Class can have 64,000 subnets with 64,000 hosts per subnet?
A. Class B
B. Class A
C. Class C
D. Class D
A. Class B
B. Class A
C. Class C
D. Class D
Ans A
IP Address Class Possible Subnets Possible Hosts
254 A 16M
64K B 64K
16M C 254
IP Address Class Possible Subnets Possible Hosts
254 A 16M
64K B 64K
16M C 254
55 There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address?
A. RARP
B. ARP
C. RIP
D. IGRP
A. RARP
B. ARP
C. RIP
D. IGRP
Ans A
ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.
ARP (Address Resolution Protocol) maps an IP address to the MAC address, RARP (Reverse Address Resolution Protocol) maps the MAC address to the IP address. ARP and RARP work at the internet layer of the Internet Model or the network layer of the OSI model.
56 When the router runs out of buffer space, this is called ________.
A. Source Quench
B. Redirect
C. Information Request
D. Low Memory
A. Source Quench
B. Redirect
C. Information Request
D. Low Memory
Ans A
Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.
Source quench is the process where the destination router, or end internetworking device will “quench” the date from the “source”, or the source router. This usually happens when the destination router runs out of buffer space to process packets.
57 Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply?
A. ICMP
B. UDP
C. TCP
D. TFTP
E. FTP
A. ICMP
B. UDP
C. TCP
D. TFTP
E. FTP
Ans A
ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.
ICMP (Internet Control Message Protocol) is a network layer internet protocol described in RFC # 792. ICMP reports IP packet information such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply.
58 Two of the protocols that can be carried in the Protocol field of an IP packet are?
A. TCP
B. UDP
C. FTP
D. TFTP
A. TCP
B. UDP
C. FTP
D. TFTP
Ans A & B
The following are the fields in an IP segment,
their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits)
Data (4 bits).
The following are the fields in an IP segment,
their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits)
Data (4 bits).
59 Where would network testing be included in an IP packet?
A. IP Options field
B. Identification field
C. Type of Service field
D. Reservation field
A. IP Options field
B. Identification field
C. Type of Service field
D. Reservation field
Ans A
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits)
Data (4 bits).
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits)
Data (4 bits).
60 What field tells the Internet layer how to handle an IP packet?
A. Type of Service
B. Identification
C. Flags
D. Frag Offset
A. Type of Service
B. Identification
C. Flags
D. Frag Offset
Ans A
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).
61 Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet?
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits) Data (4 bits).
61 Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet?
A. Identification
B. Flags
C. Frag Offset
D. Type of Service
E. Total Length
B. Flags
C. Frag Offset
D. Type of Service
E. Total Length
Ans A, B & C
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits)
Data (4 bits).
The following are the fields in an IP segment, their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others - 4 bits)
Data (4 bits).
62 Which processes does TCP, but not UDP, use?
A. Windowing
B. Acknowledgements
C. Source Port
D. Destination Port
A. Windowing
B. Acknowledgements
C. Source Port
D. Destination Port
Ans A & B
UDP (User Datagram Protocol) does not use sequence or acknowledgement fields in transmission.
UDP is a connectionless and unreliable protocol, since there is no delivery checking mechanism in the UDP data format.
UDP (User Datagram Protocol) does not use sequence or acknowledgement fields in transmission.
UDP is a connectionless and unreliable protocol, since there is no delivery checking mechanism in the UDP data format.
63 What is the UDP datagram format?
A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data
B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data
C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data
D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data
B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data
C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data
D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Ans A
The UDP format for a segment is as follows:
Source Port 16 bits
Destination Port 16 bits
Length 16 bits
Checksum 16 bits
Data xx bits
The UDP format for a segment is as follows:
Source Port 16 bits
Destination Port 16 bits
Length 16 bits
Checksum 16 bits
Data xx bits
64 What is the function of DDR on Cisco routers?
A. DDR is dial–on-demand routing. It provides a continuous LAN only connection.
B. DDR is dial-on-demand routing. It provides routing for high volume traffic.
C. DDR is dial–on-demand routing. It provides a continuous WAN connection.
D. DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.
A. DDR is dial–on-demand routing. It provides a continuous LAN only connection.
B. DDR is dial-on-demand routing. It provides routing for high volume traffic.
C. DDR is dial–on-demand routing. It provides a continuous WAN connection.
D. DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.
Answer: D
DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a remote site when there is traffic to transmit.
DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic. It initiates a call to a remote site when there is traffic to transmit.
65 What are the two types of access lists that can be configured on a Cisco router?
A. Standard
B. Extended
C. Filtering
D. Packet
A. Standard
B. Extended
C. Filtering
D. Packet
Ans: A & B
The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc.
The access lists are standard and extended. Standard access lists for IP check the source address of packets that could be routed. Extended access lists can check the source and destination packet plus check for specific protocols, port numbers, etc.
66 When using access lists, what does a Cisco router check first?
A. To see if the packet is routable or bridgeable
B. The destination address
C. The source address
D. The packet contents
A. To see if the packet is routable or bridgeable
B. The destination address
C. The source address
D. The packet contents
Ans A
The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.
The first thing checked is to see if the packet is routable or bridgeable. If it is not, the packet will be dropped.
67 How many access lists are allowed per interface?
A. One per port, per protocol
B. Two per port, per protocol
C. Unlimited
D. Router interface +1 per port.
A. One per port, per protocol
B. Two per port, per protocol
C. Unlimited
D. Router interface +1 per port.
Ans: A
Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list.
Only one access list is allowed per interface. An access list must have conditions that test true for all packets that use the access list.
68 What do the following commands accomplish?
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any interface ethernet 0
IP access-group 1 out
access-list 1 deny 172.16.4.0 0.0.0.255
access-list 1 permit any interface ethernet 0
IP access-group 1 out
A. This will block traffic from subnet 172.16.4.0 and allow all other traffic.
B. This will allow traffic from subnet 172.16.4.0 and block all other traffic.
C. All traffic is allowed.
D. All traffic is blocked.
B. This will allow traffic from subnet 172.16.4.0 and block all other traffic.
C. All traffic is allowed.
D. All traffic is blocked.
Ans: A
This will block traffic from subnet 172.16.4.0 and allow all other traffic. The first statement “access-list 1 deny 172.16.4.0 0.0.0.255″ will deny access to the subnet 172.16.4.0.
This will block traffic from subnet 172.16.4.0 and allow all other traffic. The first statement “access-list 1 deny 172.16.4.0 0.0.0.255″ will deny access to the subnet 172.16.4.0.
69 What do the following statements in an extended access list accomplish?
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255
A. This will block ftp traffic.
B. This will block http traffic.
C. This will permit ftp traffic.
D. This will permit tftp traffic.
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21
access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20
access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255
A. This will block ftp traffic.
B. This will block http traffic.
C. This will permit ftp traffic.
D. This will permit tftp traffic.
Ans: A
This will block ftp traffic since ftp uses ports 20 and 21.
This will block ftp traffic since ftp uses ports 20 and 21.
70 Access lists are numbered. Which of the following ranges could be used for an IP access list?
A. 600 - 699
B. 100 - 199
C. 1 - 99
D. 800 - 899
E. 1000 - 1099
A. 600 - 699
B. 100 - 199
C. 1 - 99
D. 800 - 899
E. 1000 - 1099
Answer: B & C
AppleTalk access lists use numbers in the 600 - 699 range. IP uses 1 - 99 for standard access lists or 100-199 for extended access lists. IPX uses 800 - 899 or 900 - 999 for extended access lists. IPX SAP filters use 1000 - 1099.
71 Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do?
A. It tells the router to check the corresponding bit value.
B. It tells the router to ignore the corresponding bit value.
C. It tells the router to check its alternate routing list.
D. It tells the router to use its primary routing list.
AppleTalk access lists use numbers in the 600 - 699 range. IP uses 1 - 99 for standard access lists or 100-199 for extended access lists. IPX uses 800 - 899 or 900 - 999 for extended access lists. IPX SAP filters use 1000 - 1099.
71 Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do?
A. It tells the router to check the corresponding bit value.
B. It tells the router to ignore the corresponding bit value.
C. It tells the router to check its alternate routing list.
D. It tells the router to use its primary routing list.
Ans A
It tells the router to check the corresponding bit value.
It tells the router to check the corresponding bit value.
72 You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use?
A. 0.0.15.255
B. 0.0.255.255
C. 0.0.31.255
D. 0.0.127.255
E. 0.0.255.255
A. 0.0.15.255
B. 0.0.255.255
C. 0.0.31.255
D. 0.0.127.255
E. 0.0.255.255
Ans: A
0.0.15.255 will check the last 13 bits of an address so that computers 172.30.16.0 to 172.30.31.0 will be denied access. 0.0.31.255 would check the last 6 binary digits and deny access to addresses 172.30.32.0 to 172.30.63.0. 0.0.127.255 would check the last 7 binary digits and deny access to addresses 172.30.64.0 to 172.30.127.0. 0.0.255.255 would deny 172.30.0.0 to 172.30.254.0. If you write decimal 15 in binary, you have 0001111, the 1’s tell the router to ignore address with these bits set; 0’s tell the router to check the bits. The third octet for 172.30.16.0 is 00010000. The third octet for 172.30.31.0 would be 00011111. So, traffic from these addresses would be denied.
0.0.15.255 will check the last 13 bits of an address so that computers 172.30.16.0 to 172.30.31.0 will be denied access. 0.0.31.255 would check the last 6 binary digits and deny access to addresses 172.30.32.0 to 172.30.63.0. 0.0.127.255 would check the last 7 binary digits and deny access to addresses 172.30.64.0 to 172.30.127.0. 0.0.255.255 would deny 172.30.0.0 to 172.30.254.0. If you write decimal 15 in binary, you have 0001111, the 1’s tell the router to ignore address with these bits set; 0’s tell the router to check the bits. The third octet for 172.30.16.0 is 00010000. The third octet for 172.30.31.0 would be 00011111. So, traffic from these addresses would be denied.
73 In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0?
A. host
B. any
C. all
D. include
A. host
B. any
C. all
D. include
Ans: A
Cisco uses host to specify 0.0.0.0. This tells the router to check all. Cisco uses any to specify 255.255.255.255. This tells the router to ignore all and permit any address to use an access list test.
Cisco uses host to specify 0.0.0.0. This tells the router to check all. Cisco uses any to specify 255.255.255.255. This tells the router to ignore all and permit any address to use an access list test.
74 What do the following commands accomplish?
access-list 1 permit 172.16.0.0 0.0.255.255
interface ethernet 0
IP access-group 1 out
interface ethernet 1
IP access-group 1 out
A. Only traffic from the source network 172.16.0.0 will be blocked.
B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked.
C. Non-172.16.0.0 traffic will be forwarded.
D. All traffic will be forwarded.
access-list 1 permit 172.16.0.0 0.0.255.255
interface ethernet 0
IP access-group 1 out
interface ethernet 1
IP access-group 1 out
A. Only traffic from the source network 172.16.0.0 will be blocked.
B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked.
C. Non-172.16.0.0 traffic will be forwarded.
D. All traffic will be forwarded.
Ans: B
Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. The wildcard mask 0.0.255.255 tells the router to check the first 2 octets and to ignore the last 2 octets.
Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. The wildcard mask 0.0.255.255 tells the router to check the first 2 octets and to ignore the last 2 octets.
75 When using access lists, it is important where those access lists are placed. Which statement best describes access list placement?
A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible.
B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible.
C. It isn’t import where access lists are placed since the router will read and cache the whole list.
D. Put access lists as close to corporate headquarters as possible.
A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible.
B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible.
C. It isn’t import where access lists are placed since the router will read and cache the whole list.
D. Put access lists as close to corporate headquarters as possible.
Ans A
Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. Standard access lists don’t specify the destination address.
Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. Standard access lists don’t specify the destination address.
76 As the system administrator, you enter the following commands at the command prompt:
ipx routing
access-list 800 permit 2b 4d
int e0
ipx network 4d
ipx access-group 800 out
int e1
ipx network 2b
int e2
ipx network 3c
What did these command accomplish?
A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0.
B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0.
C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0.
D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.
ipx routing
access-list 800 permit 2b 4d
int e0
ipx network 4d
ipx access-group 800 out
int e1
ipx network 2b
int e2
ipx network 3c
What did these command accomplish?
A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0.
B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0.
C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0.
D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.
Ans C
Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. The other interfaces E1 and E2 are not subject to the access list since they lack the access group statement to link them to access list 800.
Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. The other interfaces E1 and E2 are not subject to the access list since they lack the access group statement to link them to access list 800.
78 The following commands were entered at the command prompt of a Cisco router. What do they accomplish?
access-list 1000 deny 9e.1234.5678.1212 4
access-list 1000 permit -1
interface ethernet 0
ipx network 9e
interface ethernet 1
ipx network 4a
interface serial 0
ipx network 1
ipx output-sap-filter 1000
A. File server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0.
B. All other SAP services, other than file server, from any source will be forwarded on S0.
C. All other SAP services, other than print server, from any source will be forwarded on S0.
D. Print server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0.
access-list 1000 deny 9e.1234.5678.1212 4
access-list 1000 permit -1
interface ethernet 0
ipx network 9e
interface ethernet 1
ipx network 4a
interface serial 0
ipx network 1
ipx output-sap-filter 1000
A. File server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0.
B. All other SAP services, other than file server, from any source will be forwarded on S0.
C. All other SAP services, other than print server, from any source will be forwarded on S0.
D. Print server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0.
Ans A & B
File server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0. All other SAP services, other than file server, from any source will be forwarded on S0.
File server advertisements from server 9e.1234.5678.1212 will not be forwarded on interface S0. All other SAP services, other than file server, from any source will be forwarded on S0.
79 You receive “input filter list is 800 and output filter list is 801″ as part of the output from a show interfaces command. What kind of traffic are you filtering?
A. IPX/SPX
B. TCP/IP
C. LocalTalk
D. DDR
A. IPX/SPX
B. TCP/IP
C. LocalTalk
D. DDR
Ans: A
Because the access list is numbered in the 800 range, you are filtering IPX/SPX traffic.
Because the access list is numbered in the 800 range, you are filtering IPX/SPX traffic.
80 Which service uses telephone control messages and signals between the transfer points along the way to the called destination?
A. Signaling System 7 (SS7)
B. Time-division Multiplexing (TDM)
C. X.25
D. Frame relay
A. Signaling System 7 (SS7)
B. Time-division Multiplexing (TDM)
C. X.25
D. Frame relay
Ans: A
Signaling System 7 (SS7) uses telephone control messages and signals between the transfer points along the way to the called destination. Time-division Multiplexing (TDM) has information from multiple sources and allocates bandwidth on a single media. Circuit switching uses signaling to determine the call route, which is a dedicated path between the sender and the receiver. Basic telephone service and Integrated Services Digital Network (ISDN) use TDM circuits. X.25 and Frame Relay services have information contained in packets or frames to share non-dedicated bandwidth. X.25 avoids delays for call setup. Frame Relay uses permanent virtual circuits (PVCs).
81 Which service takes information from multiple sources and allocates bandwidth on a single media?
A. Time-division Multiplexing (TDM)
B. Signaling System 7 (SS7)
C. X.25
D. Frame relay
Signaling System 7 (SS7) uses telephone control messages and signals between the transfer points along the way to the called destination. Time-division Multiplexing (TDM) has information from multiple sources and allocates bandwidth on a single media. Circuit switching uses signaling to determine the call route, which is a dedicated path between the sender and the receiver. Basic telephone service and Integrated Services Digital Network (ISDN) use TDM circuits. X.25 and Frame Relay services have information contained in packets or frames to share non-dedicated bandwidth. X.25 avoids delays for call setup. Frame Relay uses permanent virtual circuits (PVCs).
81 Which service takes information from multiple sources and allocates bandwidth on a single media?
A. Time-division Multiplexing (TDM)
B. Signaling System 7 (SS7)
C. X.25
D. Frame relay
Ans A
82 Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service’s facility?
A. Modem
B. CSU/DSU
C. TA/NT1
D. CO
E. SS7
A. Modem
B. CSU/DSU
C. TA/NT1
D. CO
E. SS7
Ans A, B & C
A modem, CSU/DSU (Channel Service Unit/Data Service Unit), or TA/NT1 (Terminal Adapter/Network Termination 1) can be used to convert the user data from the DTE into a form acceptable to the WAN service’s facility.
A modem, CSU/DSU (Channel Service Unit/Data Service Unit), or TA/NT1 (Terminal Adapter/Network Termination 1) can be used to convert the user data from the DTE into a form acceptable to the WAN service’s facility.
83 What is the juncture at which the CPE ends and the local loop portion of the service begins?
A. Demarc
B. CO
C. Local loop
D. Last-mile
A. Demarc
B. CO
C. Local loop
D. Last-mile
Ans A
The demarcation or demarc is the juncture at which the CPE ends and the local loop portion of the service begins. The CO (Central Office) is the nearest point of presence for the provider’s WAN service. The local loop or “last-mile” is the cabling that extends from the demarc into the WAN service provider’s central office.
The demarcation or demarc is the juncture at which the CPE ends and the local loop portion of the service begins. The CO (Central Office) is the nearest point of presence for the provider’s WAN service. The local loop or “last-mile” is the cabling that extends from the demarc into the WAN service provider’s central office.
84 You can access three forms of WAN services with Cisco routers. Select the three forms:
A. Switched or relayed services
B. Interface front end to IBM enterprise data center computers
C. Using protocols that connect peer-to-peer devices like HDLC or PPP encapsulation.
D. IPX/SPX
E. NetBEUI
A. Switched or relayed services
B. Interface front end to IBM enterprise data center computers
C. Using protocols that connect peer-to-peer devices like HDLC or PPP encapsulation.
D. IPX/SPX
E. NetBEUI
Ans: A, B & C
You can access three forms of WAN services with Cisco routers. Switched or relayed services include X.25, Frame Relay, and ISDN. An interface front end to IBM enterprise data center computers includes SDLC. And, you can access the services of WAN providers using protocols that connect peer devices such as HDLC and PPP encapsulation. IPX/SPX and NetBEUI are LAN protocols.
You can access three forms of WAN services with Cisco routers. Switched or relayed services include X.25, Frame Relay, and ISDN. An interface front end to IBM enterprise data center computers includes SDLC. And, you can access the services of WAN providers using protocols that connect peer devices such as HDLC and PPP encapsulation. IPX/SPX and NetBEUI are LAN protocols.
85 Select the fields for the Cisco HDLC protocol:
A. Flag, Address, Control
B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag
C. Flag, Address, Control, Data, FCS, Flag
D. Flag, Address, Control, Proprietary, Data, FCS, Flag
A. Flag, Address, Control
B. Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag
C. Flag, Address, Control, Data, FCS, Flag
D. Flag, Address, Control, Proprietary, Data, FCS, Flag
Ans D
The Cisco HDLC frame format is Flag, Address, Control Proprietary, Data, FCS, Flag. The PPP frame format is Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag. The SDLC and LAPB format is Flag, Address, Control, Data, FCS, Flag.
The Cisco HDLC frame format is Flag, Address, Control Proprietary, Data, FCS, Flag. The PPP frame format is Flag, Address, Control, Protocol, LCP (Code, Identifier, Length, Data), FCS, Flag. The SDLC and LAPB format is Flag, Address, Control, Data, FCS, Flag.
85: Select the physical interfaces that PPP can be configured on a Cisco router:
A. Asynchronous serial
B. HSSI
C. ISDN
D. Synchronous serial
A. Asynchronous serial
B. HSSI
C. ISDN
D. Synchronous serial
Ans A, B, C & D
All four of them can carry PPP traffic. HSSI is High Speed Serial Interface.
All four of them can carry PPP traffic. HSSI is High Speed Serial Interface.
86 Select the correct statements about PPP and SLIP for WAN communications?
A. PPP uses its Network Control Programs (NCPs) component to encapsulate multiple protocols.
B. PPP can only transport TCP/IP
C. SLIP can only transport TCP/IP.
D. SLIP uses its Network Control Programs (NCPs) component to encapsulate multiple protocols.
A. PPP uses its Network Control Programs (NCPs) component to encapsulate multiple protocols.
B. PPP can only transport TCP/IP
C. SLIP can only transport TCP/IP.
D. SLIP uses its Network Control Programs (NCPs) component to encapsulate multiple protocols.
Ans A & C
87a Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake?
A. CHAP
B. PAP
C. UDP
D. IPX
A. CHAP
B. PAP
C. UDP
D. IPX
Ans: A
87b Which form of PPP error detection on Cisco routers monitors data dropped on a link?
A. Quality
B. Magic Number
C. Error Monitor
D. Droplink
A. Quality
B. Magic Number
C. Error Monitor
D. Droplink
Ans: A
The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping.
The Quality protocol monitors data dropped on a link. Magic Number avoids frame looping.
88 Which protocol for PPP provides load balancing across multiple links?
A. Multilink Protocol (MP)
B. Quality
C. Magic Number
D. Stacker
E. Predictor
A. Multilink Protocol (MP)
B. Quality
C. Magic Number
D. Stacker
E. Predictor
Ans A
89 As the system administrator, you type “ppp authentication chap pap secret”. Which authentication method is used first in setting up a session?
A. secret
B. PAP
C. CHAP
D. PPP/SLIP
A. secret
B. PAP
C. CHAP
D. PPP/SLIP
Ans C
90 Select the compression protocols for PPP?
A. Stac
B. Predictor
C. Quality
D. Magic Number
A. Stac
B. Predictor
C. Quality
D. Magic Number
Ans: A & B
91 What are the three phases of PPP session establishment?
91 What are the three phases of PPP session establishment?
A. Link establishment phase
B. Authentication phase
C. Network layer protocol phase
D. Handshake phase
E. Dial-in phase
B. Authentication phase
C. Network layer protocol phase
D. Handshake phase
E. Dial-in phase
Ans A, B & C
92 What is the default IPX Ethernet encapsulation?
A.) SNAP
B.) Arpa
C.) 802.2
D.) Novell-Ether
E.) SAP
B.) Arpa
C.) 802.2
D.) Novell-Ether
E.) SAP
Ans D
93 What must be true for two Routers running IGRP to communicate their routes?
A.) Same autonomous system number
B.) Connected using Ethernet only
C.) Use composite metric
D)Configured for PPP
B.) Connected using Ethernet only
C.) Use composite metric
D)Configured for PPP
Ans A
94 The following is partial output from a routing table, identify the 2 numbers in the square brackets; ‘192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1′
A.) 100 = metric, 1300 = administrative distance
B.) 100 = administrative distance, 1300 = hop count
C.) 100 = administrative distance, 1300 = metric
D.) 100 = hop count, 1300 = metric
B.) 100 = administrative distance, 1300 = hop count
C.) 100 = administrative distance, 1300 = metric
D.) 100 = hop count, 1300 = metric
Ans C
95 Identify 3 methods used to prevent routing loops?
A.) Split horizon
B.) Holddown timers
C.) Poison reverse
D.) SPF algorithm
E.) LSP’s
Ans A B C
B.) Holddown timers
C.) Poison reverse
D.) SPF algorithm
E.) LSP’s
Ans A B C
96 Which statement is true regarding full duplex?
A.) Allows for transmission and receiving of data simultaneously
B.) Only works in a multipoint configuration
C.) Does not affect the bandwidth
D.) Allows for transmission and receiving of data but not a the same time
A.) Allows for transmission and receiving of data simultaneously
B.) Only works in a multipoint configuration
C.) Does not affect the bandwidth
D.) Allows for transmission and receiving of data but not a the same time
Ans A
Full duplex is just the opposite of half duplex. It handles traffic in both directions simultaneously.
Full duplex is just the opposite of half duplex. It handles traffic in both directions simultaneously.
97 Identify the switching method that receives the entire frame then dispatches it?
A.) Cut-through
B.) Receive and forward
C.) Store and forward
D.) Fast forward
B.) Receive and forward
C.) Store and forward
D.) Fast forward
Ans C
Store and forward switching receives the entire frame before dispatching it.
Store and forward switching receives the entire frame before dispatching it.
98Identify the purpose of ICMP?
A.) Avoiding routing loops
B.) Send error and control messages
C.) Transporting routing updates
D.) Collision detection
B.) Send error and control messages
C.) Transporting routing updates
D.) Collision detection
Ans B
ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.
ICMP is used to send error and control messages. Ping uses ICMP to carry the echo-request and echo-reply.
99Which statement is true regarding the user exec and privileged exec mode?
A.) The ‘?’ only works in Privileged exec
B.) They are identical
C.) They both require the enable password
D.) User exec is a subset of the privileged exec
B.) They are identical
C.) They both require the enable password
D.) User exec is a subset of the privileged exec
Ans D
The user exec mode is a subset of the privileged exec mode. Only a certain number of commands are available at the user exec mode.
The user exec mode is a subset of the privileged exec mode. Only a certain number of commands are available at the user exec mode.
100 Which OSI layer end to end communication, segmentation and re-assembly?
A.) Network
B.) Transport
C.) Physical
D.) Application
E.) Data-Link
F.) Presentation
B.) Transport
C.) Physical
D.) Application
E.) Data-Link
F.) Presentation
Ans B
Layer 4 the Transport layer performs this function.
101 What IP command would you use to test the entire IP stack?
Layer 4 the Transport layer performs this function.
101 What IP command would you use to test the entire IP stack?
A.) Stack-test
B.) Arp
C.) Telnet
D.) Ping
E.) Trace
B.) Arp
C.) Telnet
D.) Ping
E.) Trace
Ans C
Because Telnet is an application and it resides at the top of the stack it traverses down the stack and up the stack at the receiving end.
Because Telnet is an application and it resides at the top of the stack it traverses down the stack and up the stack at the receiving end.
102 Identify the 2 hardware components used to manage and/or configure a router?
A.) Auxiliary port
B.) ROM port
C.) Management port
D.) Console port
B.) ROM port
C.) Management port
D.) Console port
Ans A D
The 2 hardware ports used to configure the router are the console and auxiliary ports.
The 2 hardware ports used to configure the router are the console and auxiliary ports.
103 What is the default bandwidth of a serial connection?
A.) 1200 baud
B.) 1.544 Mbps (T1)
C.) 10 Mbps
D.) 96Kpbs
B.) 1.544 Mbps (T1)
C.) 10 Mbps
D.) 96Kpbs
Ans B
The default bandwidth is T1.
The default bandwidth is T1.
104 Identify 2 functions of IPX access-lists?
A.) Control SAP traffic
B.) Limit number of Novell servers on a network
C.) Limit number of workstations on a network
D.) Block IPX traffic
B.) Limit number of Novell servers on a network
C.) Limit number of workstations on a network
D.) Block IPX traffic
Ans A D
IPX access lists are used to restrict IPX traffic and SAP broadcasts.
IPX access lists are used to restrict IPX traffic and SAP broadcasts.
105 Identify 2 HDLC characteristics?
A.) Default serial encapsulation
B.) Open standard
C.) Supports Stacker compression
D.) Supports point-to-point and multipoint
B.) Open standard
C.) Supports Stacker compression
D.) Supports point-to-point and multipoint
Ans A D
HDLC is the default serial encapsulation and supports point-to-point and multipoint. It is not an open standard and does not support compression.
HDLC is the default serial encapsulation and supports point-to-point and multipoint. It is not an open standard and does not support compression.
106 Identify 3 IP applications?
A.) AURP
B.) ARP
C.) Telnet
D.) SMTP
E.) DNS
F.) RARP
B.) ARP
C.) Telnet
D.) SMTP
E.) DNS
F.) RARP
Ans C D E
ARP and AURP are not part the application layer of the TCP/IP stack. SMTP - Simple Mail Transfer Protocol, Telnet, DNS - Domain Name Services (name to IP resolution).
ARP and AURP are not part the application layer of the TCP/IP stack. SMTP - Simple Mail Transfer Protocol, Telnet, DNS - Domain Name Services (name to IP resolution).
107 Identify 3 LAN technologies?
A.) FDDI
B.) HDLC
C.) HSSI
D.) X.25
E.) 802.3
F.) 802.5
B.) HDLC
C.) HSSI
D.) X.25
E.) 802.3
F.) 802.5
Ans A E F
The question is asking for 3 LAN technologies, HDLC, HSSI and X.25 are all WAN technologies.
The question is asking for 3 LAN technologies, HDLC, HSSI and X.25 are all WAN technologies.
108 Identify the 4 that are not LAN technologies?
A.) HDLC
B.) FDDI
C.) 802.5
D.) HSSI
E.) SDLC
F.) Frame Relay
B.) FDDI
C.) 802.5
D.) HSSI
E.) SDLC
F.) Frame Relay
Ans A D E F
802.5 and FDDI are LAN technologies
802.5 and FDDI are LAN technologies
109 Which OSI layer supports the communication component of an application?
A.) Data-Link
B.) Physical
C.) Session
D.) Presentation
E.) Application
F.) Transport
B.) Physical
C.) Session
D.) Presentation
E.) Application
F.) Transport
Ans E
Layer 7 the Application layer performs this function.
Layer 7 the Application layer performs this function.
110 Identify the length of an IPX address and it’s components?
A.) 80 bits, 48 bits network and 32 bits node
B.) 32 bits, 16 bits network and 16 bits node
C.) None of the above
D.) 80 bits, 32 bits network and 48 bits node
B.) 32 bits, 16 bits network and 16 bits node
C.) None of the above
D.) 80 bits, 32 bits network and 48 bits node
Ans D
IPX address has 2 components; network and node. The network address is 32 bits and the node is 48 bits, total of 80 bits.
111 Identify the administrative distance and appropriate routing protocol?
IPX address has 2 components; network and node. The network address is 32 bits and the node is 48 bits, total of 80 bits.
111 Identify the administrative distance and appropriate routing protocol?
A.) RIP = 255, IGRP = 100
B.) RIP = 100, IGRP = 120
C.) RIP = 1, IGRP = 0
D.) RIP = 120, IGRP = 100
B.) RIP = 100, IGRP = 120
C.) RIP = 1, IGRP = 0
D.) RIP = 120, IGRP = 100
Ans D
The administrative distance for RIP is 120 and IGRP is 100. The lower the AD the better the routing information.
The administrative distance for RIP is 120 and IGRP is 100. The lower the AD the better the routing information.
112 Which OSI layer incorporates the MAC address and the LLC?
A.) Data link
B.) Network
C.) Physcial
D.) Transport
B.) Network
C.) Physcial
D.) Transport
Ans): A
Layer 2 the Data-Link layer incorporates the MAC and LLC sublayers
Layer 2 the Data-Link layer incorporates the MAC and LLC sublayers
113 If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select?
A.) Q933a
B.) ISDN
C.) IETF
D.) CISCO
E.) ANSI
B.) ISDN
C.) IETF
D.) CISCO
E.) ANSI
Ans C
There are two types of Frame Relay encapsulations; Cisco and IETF. IETF is required when connecting a Cisco to a non-Cisco router.
There are two types of Frame Relay encapsulations; Cisco and IETF. IETF is required when connecting a Cisco to a non-Cisco router.
114 Identify the 2 items that TCP and UDP share in common?
A.) Both use port numbers to identify upper level applications
B.) Operate at the Network layer
C.) Both are Transport protocols
D.) Both are reliable communications
B.) Operate at the Network layer
C.) Both are Transport protocols
D.) Both are reliable communications
Ans A C
TCP and UPD are both layer 4 Transport protocols and both use port number to identify upper level applications.
TCP and UPD are both layer 4 Transport protocols and both use port number to identify upper level applications.
115 Identify 3 characteristics of IP RIP?
A.) Distance vector
B.) Administrative distance is 120
C.) Periodic updates every 60 seconds
D.) Uses a composite metric
E.) Can load balance
B.) Administrative distance is 120
C.) Periodic updates every 60 seconds
D.) Uses a composite metric
E.) Can load balance
Ans A B E
IP RIP is a distance vector protocol, it can load balance up to 4 equal cost paths and it’s rating of trustworthiness is 120.
IP RIP is a distance vector protocol, it can load balance up to 4 equal cost paths and it’s rating of trustworthiness is 120.
116 Which of the following is a layer 2 device?
A.) Switch
B.) Router
C.) Repeater
D.) Hub
B.) Router
C.) Repeater
D.) Hub
Ans A
A Hub and Repeater are layer 1 devices. A Router is a layer 3 device.
A Hub and Repeater are layer 1 devices. A Router is a layer 3 device.
117 Identify the definition of demarcation?
A.) Date in which the WAN service contract expires
B.) Cabling which extends from the WAN service provider to the customer
C.) Division of responsibility, where the CPE ends and the local loop begins
D.) Equipment which is located at the customer premises
B.) Cabling which extends from the WAN service provider to the customer
C.) Division of responsibility, where the CPE ends and the local loop begins
D.) Equipment which is located at the customer premises
Ans C
Demarcation is the point in which responsibility changes hands.
Demarcation is the point in which responsibility changes hands.
118 Identify the 3 key features of the Cisco Discovery Protocol?
A.) Off by default
B.) Will allow for the discovery of layer 3 addresses on neighbor routers
C.) Verify connectivity
D.) Open standard
E.) Does not require any layer 3 protocols to be configured
B.) Will allow for the discovery of layer 3 addresses on neighbor routers
C.) Verify connectivity
D.) Open standard
E.) Does not require any layer 3 protocols to be configured
Ans B C E
CDP is used for 2 basic reasons; neighbor connectivity and layer 3 discovery if configured. It is proprietary and is on by default.
CDP is used for 2 basic reasons; neighbor connectivity and layer 3 discovery if configured. It is proprietary and is on by default.
119 Identify the 3 characteristics of IPX RIP?
A.) Distance vector
B.) Does not support multiple paths
C.) 60 second updates
D.) Default encapsulation is SAP
E.) Uses ticks and hop count as a metric
B.) Does not support multiple paths
C.) 60 second updates
D.) Default encapsulation is SAP
E.) Uses ticks and hop count as a metric
Ans A C E
IPX RIP is a distance vector routing protocol, it does support multiple paths, the default encapsulation is ‘novell-ether’, it uses tick count as a primary metric and hop count as a tie breaker and it sends it’s updates every 60 seconds.
IPX RIP is a distance vector routing protocol, it does support multiple paths, the default encapsulation is ‘novell-ether’, it uses tick count as a primary metric and hop count as a tie breaker and it sends it’s updates every 60 seconds.
120 Identify the access-list range for an extended IP access-list?
A.) 800 - 899
B.) 1 - 99
C.) 1000 - 1099
D.) 100 - 199
B.) 1 - 99
C.) 1000 - 1099
D.) 100 - 199
Ans D
IP extended access-lists use the number range of 100-199.
121 Identify the X.25 addressing standard?
IP extended access-lists use the number range of 100-199.
121 Identify the X.25 addressing standard?
A.) X.121
B.) X.25a
C.) ITU-1
D.) Q933a
B.) X.25a
C.) ITU-1
D.) Q933a
Ans A
The X.25 layer 3 addressing standards is X.121.
The X.25 layer 3 addressing standards is X.121.
122 Identify 3 features of IGRP?
A.) Composite metric
B.) New horizon
C.) Flash updates
D.) 60 periodic updates
E.) Poison reverse
B.) New horizon
C.) Flash updates
D.) 60 periodic updates
E.) Poison reverse
Ans A C E
IGRP uses a composite metric made up of bandwidth and delay by default, it updates every 60 seconds and will trigger an update if the topology changes.
IGRP uses a composite metric made up of bandwidth and delay by default, it updates every 60 seconds and will trigger an update if the topology changes.
123 Where is the backup configuration file stored?
A.) RAM
B.) ROM
C.) Console
D.) NVRAM
B.) ROM
C.) Console
D.) NVRAM
Ans D
One location to store the backup configuration is NVRAM.
One location to store the backup configuration is NVRAM.
124 Identify the correct pair of Novell Ethernet encapsulation and Cisco terminology?
A.) Ethernet II, Snap
B.) Ethernet 802.3, Novell-Ether
C.) Ethernet SNAP, Arpa
D.) Ethernet 802.2, Snap
B.) Ethernet 802.3, Novell-Ether
C.) Ethernet SNAP, Arpa
D.) Ethernet 802.2, Snap
Ans B
The default IPX LAN encapsulation is Novell-Ether which is 802.3
The default IPX LAN encapsulation is Novell-Ether which is 802.3
125 Identify 3 characteristics regarding IP access-lists?
A.) Can be configured as a standard access-list
B.) Can be run from another router running IP
C.) Can be configured as a named access-list
D.) Are the same as IPX access-lists
E.) Can be configured as an extended access-list
B.) Can be run from another router running IP
C.) Can be configured as a named access-list
D.) Are the same as IPX access-lists
E.) Can be configured as an extended access-list
Ans A C E
There are 3 types of IP access-lists; standard, extended and named. Named access-lists can be either standard or extended depending on how they are configured.
There are 3 types of IP access-lists; standard, extended and named. Named access-lists can be either standard or extended depending on how they are configured.
126 Identify 3 ways in which a router can be configured?
A.) TFTP
B.) Nvram
C.) Ping
D.) Console
E.) Trace
B.) Nvram
C.) Ping
D.) Console
E.) Trace
Ans A B D
Changes to the configuration can be entered via the console, a config stored in NVRAM or on a TFTP server. Trace and ping are tools to verify connectivity.
Changes to the configuration can be entered via the console, a config stored in NVRAM or on a TFTP server. Trace and ping are tools to verify connectivity.
127 A traffic light is an example of what type of mechanism?
A.) Collision detection
B.) Flow control
C.) Sequence numbering
D.) Network management
B.) Flow control
C.) Sequence numbering
D.) Network management
Ans B
A Traffic light is an example of flow control.
A Traffic light is an example of flow control.
128 Windowing is a type of?
A.) Negative acknowledgement
B.) Address resolution
C.) Layer transition mechanism
D.) Flow control
B.) Address resolution
C.) Layer transition mechanism
D.) Flow control
Ans D
Windowing allow the sender and receiver to dictate how much information that can be received prior to an acknowledgement. It is a form of flow control.
Windowing allow the sender and receiver to dictate how much information that can be received prior to an acknowledgement. It is a form of flow control.
129 Identify the 2 types of access-list filters that control SAP traffic?
A.) Novell-ether
B.) Arpa
C.) Input-sap-filter
D.) Round-robin
E.) Output-sap-filter
B.) Arpa
C.) Input-sap-filter
D.) Round-robin
E.) Output-sap-filter
Ans C E
SAP’s can be blocked by 2 methods; inbound and outbound.
SAP’s can be blocked by 2 methods; inbound and outbound.
130 Identify the 3 guidelines for routers in the same autonomous system?
A.) Must be configured for IGRP or RIP
B.) Interconnected
C.) Assigned the same autonomous system number
D.) Configured for the same routing protocol
E.) Must be same model of router
B.) Interconnected
C.) Assigned the same autonomous system number
D.) Configured for the same routing protocol
E.) Must be same model of router
Ans B C D
Autonomous system must be interconnected, assigned the same AS # and configured with the same routing protocol.
131 Identify the hardware component used to store buffers, tables, running-configuration etc?
Autonomous system must be interconnected, assigned the same AS # and configured with the same routing protocol.
131 Identify the hardware component used to store buffers, tables, running-configuration etc?
A.) NVRAM
B.) ROM
C.) RAM
D.) Flash
B.) ROM
C.) RAM
D.) Flash
Ans C
RAM is the dynamic memory area. ROM contains the boot strap code, NVRAM contains the startup-config and Flash contains the IOS.
RAM is the dynamic memory area. ROM contains the boot strap code, NVRAM contains the startup-config and Flash contains the IOS.
132 Identify 3 UDP characteristics?
A.) Reliable communication protocol
B.) Applications that use UDP must incorporate reliability
C.) Connection-less oriented
D.) Incorporates no handshaking
B.) Applications that use UDP must incorporate reliability
C.) Connection-less oriented
D.) Incorporates no handshaking
Ans B C D
UPD is a layer 4 Transport protocol. It is connection-less because it does establish a connection therefore the 3 step handshake is not needed, it does NOT implement any flow control or acknowledgments. Any application that uses UDP must incorporate any needed reliability.
UPD is a layer 4 Transport protocol. It is connection-less because it does establish a connection therefore the 3 step handshake is not needed, it does NOT implement any flow control or acknowledgments. Any application that uses UDP must incorporate any needed reliability.
133 Identify the IPX standard access-list number range?
A.) 600 - 699
B.) 1000 - 1099
C.) 1 - 99
D.) 100 - 199
E.) 800 - 899
B.) 1000 - 1099
C.) 1 - 99
D.) 100 - 199
E.) 800 - 899
Ans E
IPX standard access-list range is 800-899.
IPX standard access-list range is 800-899.
134 Which OSI layer provides best effort end to end packet delivery?
A.) Data-Link
B.) Presentation
C.) Network
D.) Transport
E.) Physical
F.) Application
B.) Presentation
C.) Network
D.) Transport
E.) Physical
F.) Application
Ans C
Layer 3 the Network layer performs this function.
Layer 3 the Network layer performs this function.
135 Identify the 2 methods to modify the routers boot sequence?
A.) Setup program
B.) Boot system commands
C.) RXBoot
D.) Config-register
A.) Setup program
B.) Boot system commands
C.) RXBoot
D.) Config-register
Ans B D
‘Boot system’ command the ‘config-register’ are used to manipulate the boot sequence.
‘Boot system’ command the ‘config-register’ are used to manipulate the boot sequence.
136 Identify the 3 pieces of hardware you would not install to prevent broadcasts?
A.) Switch
B.) Repeater
C.) Bridge
D.) Router
B.) Repeater
C.) Bridge
D.) Router
Ans A B C
Router are implemented not only to break up networks into smaller segments but they are used to block broadcasts.
Router are implemented not only to break up networks into smaller segments but they are used to block broadcasts.
137 Identify 2 features of PPP PAP authentication?
A.) Username and password is sent in clear text
B.) Authentication messages are sent periodically during the connection
C.) More secure than CHAP
D.) Remote node is control of authentication process
B.) Authentication messages are sent periodically during the connection
C.) More secure than CHAP
D.) Remote node is control of authentication process
Ans A D
PPP PAP authentication sends the username and passwords in clear text and the remote node initiates the authentication process.
PPP PAP authentication sends the username and passwords in clear text and the remote node initiates the authentication process.
138 Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame?
A.) Fragment-free
B.) Store and Forward
C.) Cut-through
D.) Fast forward
B.) Store and Forward
C.) Cut-through
D.) Fast forward
Ans C
Cut through examines the destination MAC address and begins forwarding the frame prior to receiving the entire frame.
Cut through examines the destination MAC address and begins forwarding the frame prior to receiving the entire frame.
139 Identify 1 characteristic of RARP?
A.) IP to MAC address translation
B.) Connectionless delivery of packets
C.) Can be used to initiate remote O/S load sequence
D.) Generates error and control messages
B.) Connectionless delivery of packets
C.) Can be used to initiate remote O/S load sequence
D.) Generates error and control messages
Ans C
Reverse Address Resolution Protocol is used to obtain a layer 3 address if the MAC address is known which then facilitates the loading of the O/S.
Reverse Address Resolution Protocol is used to obtain a layer 3 address if the MAC address is known which then facilitates the loading of the O/S.
140 Identify the protocol to test connectivity without configuring any layer 3 protocols?
A.) TCP
B.) Ping
C.) IP
D.) CDP
E.) Telnet
B.) Ping
C.) IP
D.) CDP
E.) Telnet
Ans D
CDP can be used to verify connectivity prior to any layer 3 protocols being configured.
141 LMI operates between the Frame Switch and what other device?
CDP can be used to verify connectivity prior to any layer 3 protocols being configured.
141 LMI operates between the Frame Switch and what other device?
A.) CPE device
B.) Another Frame Switch
C.) X.25 switch
D.) Novell File Server
B.) Another Frame Switch
C.) X.25 switch
D.) Novell File Server
Ans A
LMI stands for local management interface. It operates between the Frame Relay switch and the customer equipment.
LMI stands for local management interface. It operates between the Frame Relay switch and the customer equipment.
142 Identify IPX SAP and it’s purpose?
A.) Sonet Access Pipe - interface to Sonet ring
B.) Service Advertising Protocol - advertise services
C.) Server Appletalk Protocol - appletalk directory services
D.) Service Access Point - identify upper layer protocols
B.) Service Advertising Protocol - advertise services
C.) Server Appletalk Protocol - appletalk directory services
D.) Service Access Point - identify upper layer protocols
Ans B
SAP is an Novell protocol to advertise services.
SAP is an Novell protocol to advertise services.
143 Identify the default values that make up IGRP’s composite metric?
A.) Bandwidth
B.) Load
C.) Reliability
D.) MTU
E.) Delay
B.) Load
C.) Reliability
D.) MTU
E.) Delay
Ans A E
IGRP can be configured to use all 5 within it’s metric. By default it uses bandwidth and delay.
IGRP can be configured to use all 5 within it’s metric. By default it uses bandwidth and delay.
144 Identify the default serial encapsulation?
A.) ISDN
B.) HDLC
C.) SDLC
D.) Frame Relay
E.) PPP
A.) ISDN
B.) HDLC
C.) SDLC
D.) Frame Relay
E.) PPP
Ans B
The default serial encapsulation is HDLC.
The default serial encapsulation is HDLC.
145 Identify the purpose of ARP?
A.) Avoiding routing loops
B.) Determining a workstation’s IP address
C.) Sending a directed broadcast
D.) Determining a workstation’s MAC address
B.) Determining a workstation’s IP address
C.) Sending a directed broadcast
D.) Determining a workstation’s MAC address
Ans D
ARP is used to find a devices MAC address given an IP address.
ARP is used to find a devices MAC address given an IP address.
146 What is the purpose of the DLCI?
A.) Identifies the remote routers
B.) Contained with a 802.2 frame for routing purposes
C.) Used with PPP during authentication
D.) Identifies the PVC in a Frame Relay network
B.) Contained with a 802.2 frame for routing purposes
C.) Used with PPP during authentication
D.) Identifies the PVC in a Frame Relay network
Ans D
DLCI stands for Data Link Connection Identifier. It identifies the local PVC.
DLCI stands for Data Link Connection Identifier. It identifies the local PVC.
147 Identify 3 characteristics of the Network layer (OSI layer 3)?
A.) Connection oriented
B.) Path determination
C.) Supports multiplexing
D.) Manages sessions
E.) Packet forwarding
B.) Path determination
C.) Supports multiplexing
D.) Manages sessions
E.) Packet forwarding
Ans B C E
The network layer is responsible for routing which entails learning the paths, selecting the best path and forwarding the packet. Because it services multiple layer 4 protocols it multiplexes.
The network layer is responsible for routing which entails learning the paths, selecting the best path and forwarding the packet. Because it services multiple layer 4 protocols it multiplexes.
148 Identify 3 characteristics of switches?
A.) Increase available bandwidth
B.) Decrease broadcast traffic
C.) Support full duplex in a multipoint topology
D.) Make forwarding decision using MAC address
E.) Create collision domains
B.) Decrease broadcast traffic
C.) Support full duplex in a multipoint topology
D.) Make forwarding decision using MAC address
E.) Create collision domains
Ans A D E
Switches operate at layer 2. They increase bandwidth by reducing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon layer 2 address/ MAC address.
Switches operate at layer 2. They increase bandwidth by reducing the number of devices sharing the media. They isolate collisions. Like a bridge they forward traffic based upon layer 2 address/ MAC address.
149 Which OSI layer handles physical address, network topology?
A.) Presentation
B.) Physical
C.) Transport
D.) Application
E.) Data-Link
F.) Network
B.) Physical
C.) Transport
D.) Application
E.) Data-Link
F.) Network
Ans E
Layer 2 the Data-Link layer performs this function.
Layer 2 the Data-Link layer performs this function.
150 Identify 2 reasons for disabling CDP?
A.) If the router is not configured for RIP
B.) Save bandwidth by eliminating overhead
C.) If the router is configured for Appletalk
D.) When connected to a non-Cisco router
B.) Save bandwidth by eliminating overhead
C.) If the router is configured for Appletalk
D.) When connected to a non-Cisco router
Ans B D
CDP can be disabled here are a couple of reasons. Connecting a Cisco router to a non-Cisco router. Don’t want to exchange CDP information to save bandwidth.
151 Identify 3 characteristics of ISDN?
CDP can be disabled here are a couple of reasons. Connecting a Cisco router to a non-Cisco router. Don’t want to exchange CDP information to save bandwidth.
151 Identify 3 characteristics of ISDN?
A.) Transports voice and data
B.) Transports voice only
C.) Support both BRI and PRI
D.) Runs over existing phone lines
E.) Same as X.25
B.) Transports voice only
C.) Support both BRI and PRI
D.) Runs over existing phone lines
E.) Same as X.25
Ans A C D
ISDN supports voice, data, and video. It runs over existing phone lines and supports 128K (BRI) and T1 (PRI).
ISDN supports voice, data, and video. It runs over existing phone lines and supports 128K (BRI) and T1 (PRI).
152 Identify the 3 characteristics of IGRP?
A.) Uses hop count as a metric
B.) Supports multiple unequal paths
C.) Administrative distance is 100
D.) Configured with an Autonomous system number
E.) Link state
A.) Uses hop count as a metric
B.) Supports multiple unequal paths
C.) Administrative distance is 100
D.) Configured with an Autonomous system number
E.) Link state
Ans B C D
IGRP is a distance vector routing protocol, it’s degree of trustworthiness is 100, it can support up to 6 un-equal paths and must be configured with an autonomous system number.
IGRP is a distance vector routing protocol, it’s degree of trustworthiness is 100, it can support up to 6 un-equal paths and must be configured with an autonomous system number.
153 Identify 2 features of PPP CHAP authentication?
A.) Username and password is sent in clear text
B.) Authentication messages are sent periodically during the connection
C.) Less secure then PAP
D.) Local router ‘challenges’ the remote router
B.) Authentication messages are sent periodically during the connection
C.) Less secure then PAP
D.) Local router ‘challenges’ the remote router
Ans B D
PPP CHAP authentication message are sent periodically during the connection by challenging the other end of the connection.
It is more secure than PAP and passwords and username are encrypted.
PPP CHAP authentication message are sent periodically during the connection by challenging the other end of the connection.
It is more secure than PAP and passwords and username are encrypted.
154 Identify the default IPX serial encapsulation?
A.) Novell-Ether
B.) SDLC
C.) SNAP
D.) HDLC
Ans D
The default IPX serial encapsulation is HDLC.
B.) SDLC
C.) SNAP
D.) HDLC
Ans D
The default IPX serial encapsulation is HDLC.
155 Identify the hardware component that stores the backup configuration?
A.) RAM
B.) NVRAM
C.) Flash
D.) ROM
B.) NVRAM
C.) Flash
D.) ROM
Ans B
NVRAM contains the backup config. RAM is the dynamic memory area, ROM contains the boot strap code and Flash contains the IOS.
NVRAM contains the backup config. RAM is the dynamic memory area, ROM contains the boot strap code and Flash contains the IOS.
156 Identify the extended IP access-list number range?
A.) 600 - 699
B.) 1 - 99
C.) 900 - 999
D.) 100 - 199
B.) 1 - 99
C.) 900 - 999
D.) 100 - 199
Ans D
The extended IP access-list range is 100-199.
The extended IP access-list range is 100-199.
157 Identify 3 Fast Ethernet technologies?
A.) 100 Base FastEther
B.) 100 Base FX
C.) 100 Base T4
D.) 100 Base TX
A.) 100 Base FastEther
B.) 100 Base FX
C.) 100 Base T4
D.) 100 Base TX
Ans B C D
100 BaseFastEther is false. 100 Base FX, TX and T4 are all valid.
100 BaseFastEther is false. 100 Base FX, TX and T4 are all valid.
158 Identify the OSI layer which is responsible for end-to-end connections?
A.) Network
B.) Transport
C.) Session
D.) Data link
E.) TCP
B.) Transport
C.) Session
D.) Data link
E.) TCP
Ans B
Layer 4 is the Transport layer and is responsible for end-to-end connections.
Layer 4 is the Transport layer and is responsible for end-to-end connections.
159 Identify the 2 characteristics regarding MAC addresses?
A.) Contains a network portion and host portion
B.) Always assigned by System Administrator
C.) 48 bits long
D.) Contains a vendor code and serial number
B.) Always assigned by System Administrator
C.) 48 bits long
D.) Contains a vendor code and serial number
Ans C D
MAC addresses are assigned by the vendor. Each MAC address is 48 bits long and made up of 24 bits vendor code and 24 bits serial number.
MAC addresses are assigned by the vendor. Each MAC address is 48 bits long and made up of 24 bits vendor code and 24 bits serial number.
160 Identify the number range for IPX SAP filters?
A.) 900 - 999
B.) 1000 - 1099
C.) 800 -899
D.) 100 - 199
B.) 1000 - 1099
C.) 800 -899
D.) 100 - 199
Ans B
The IPX SAP filtering range is 1000-1099.
161 What is the purpose of ARP?
The IPX SAP filtering range is 1000-1099.
161 What is the purpose of ARP?
A.) IP to host name resolution
B.) Host name to IP address resolution
C.) Mac to IP address resolution
D.) IP to Mac address resolution
B.) Host name to IP address resolution
C.) Mac to IP address resolution
D.) IP to Mac address resolution
Ans D
Address Resolution Protocol resolves the MAC address if the IP address is known. It is a layer 3 protocol.
Address Resolution Protocol resolves the MAC address if the IP address is known. It is a layer 3 protocol.
162 Which OSI layer establishes, maintains and terminates sessions between hosts?
A.) Application
B.) Physical
C.) Data-Link
D.) Presentation
E.) Network
F.) Session
B.) Physical
C.) Data-Link
D.) Presentation
E.) Network
F.) Session
Ans F
Layer 5 the Session layer performs this function.
Layer 5 the Session layer performs this function.
163 Which statement is true regarding Administrative distance?
A.) It is a metric
B.) Number of hops between two routers
C.) Trustworthiness of the routing information
D.) RIP Administrative distance is 100
B.) Number of hops between two routers
C.) Trustworthiness of the routing information
D.) RIP Administrative distance is 100
Ans C
Administrative distance is rating of trustworthiness of the routing information. The lower the AD the better the information.
Administrative distance is rating of trustworthiness of the routing information. The lower the AD the better the information.
164 Identify the purpose of the Ping command?
A.) Share routing information with a neighbor router
B.) Transmit user data when buffers are full
C.) Test connectivity at layer 3
D.) Test entire protocol stack
B.) Transmit user data when buffers are full
C.) Test connectivity at layer 3
D.) Test entire protocol stack
Ans C
The ping command tests layer 3 connectivity.
The ping command tests layer 3 connectivity.
165 Identify the order of the 5 step encapsulation?
1. Create the segment
2. Convert the frame to bits
3. Create the packet
4. Create the frame
5. User creates the data
A.) 1,2,4,2,5
B.) 2,1,3,4,5
C.) 5,1,3,4,2
D.) 5,3,4,1,2
2. Convert the frame to bits
3. Create the packet
4. Create the frame
5. User creates the data
A.) 1,2,4,2,5
B.) 2,1,3,4,5
C.) 5,1,3,4,2
D.) 5,3,4,1,2
Ans C
Cisco 5 step encapsulation.
1) User creates Data
2) Data is converted into a segment at layer 4
3) The segment is converted to packet at layer 3
4) The packet it converted into a frame at layer 2
5) The frame is converted into bits at layer 1
Cisco 5 step encapsulation.
1) User creates Data
2) Data is converted into a segment at layer 4
3) The segment is converted to packet at layer 3
4) The packet it converted into a frame at layer 2
5) The frame is converted into bits at layer 1
166 The Cisco IOS is stored where?
A.) ROM
B.) CD
C.) Flash
D.) NVRAM
B.) CD
C.) Flash
D.) NVRAM
Ans C
By default the Cisco IOS is stored in flash.
By default the Cisco IOS is stored in flash.
167 Sequence and acknowledgement numbers are used for?
A.) Layer transitioning
B.) Flow control
C.) Port number addressing
D.) Reliability
B.) Flow control
C.) Port number addressing
D.) Reliability
Ans D
TCP uses sequence numbers and acknowledgements to implement reliability.
TCP uses sequence numbers and acknowledgements to implement reliability.
168 Identify IPX GNS and it’s purpose?
A.) Go Network Server - sends a print job to a network server
B.) Get Nearest Server - locate the nearest server
C.) Guaranteed Network Services - allocates resources to users
D.) Get Notes Server - locates Domino Server
B.) Get Nearest Server - locate the nearest server
C.) Guaranteed Network Services - allocates resources to users
D.) Get Notes Server - locates Domino Server
Ans B
GNS stands for Get Nearest Server, initiated by a workstation.
GNS stands for Get Nearest Server, initiated by a workstation.
169 Identify the true statement regarding subnetting?
A.) Allows for more host address
B.) Borrow bits from the network portion of the address
C.) Allows for unlimited number of networks
D.) Borrow bits from the host portion of the address
B.) Borrow bits from the network portion of the address
C.) Allows for unlimited number of networks
D.) Borrow bits from the host portion of the address
Ans D
Subnetting involves borrowing bits for the host portion of the address to be used to subnet addressing.
Subnetting involves borrowing bits for the host portion of the address to be used to subnet addressing.
170 Inverse ARP serves what purpose?
A.) Method for a local router to introduce itself to the remote end of the connection
B.) Broadcast a routing table update
C.) Identify MAC addresses if the IP address is known
D.) Sent every 10 seconds used to verify the Frame Switch is still active
B.) Broadcast a routing table update
C.) Identify MAC addresses if the IP address is known
D.) Sent every 10 seconds used to verify the Frame Switch is still active
Ans A
Inverse ARP operates in a Frame Relay network so the two end points can identify themselves to each other.
171 Identify 3 characteristics of a MAC address?
Inverse ARP operates in a Frame Relay network so the two end points can identify themselves to each other.
171 Identify 3 characteristics of a MAC address?
A.) Burned into the NIC
B.) 48 bits long
C.) Length is 32 bits
D.) Used to deliver the frame to the end device
E.) Contains a network portion and a host portion
B.) 48 bits long
C.) Length is 32 bits
D.) Used to deliver the frame to the end device
E.) Contains a network portion and a host portion
Ans A B D
The MAC address is 48 bits long not 32. It does NOT contain a network and host portion with the address. It is used to deliver the frame to the destination device.
The MAC address is 48 bits long not 32. It does NOT contain a network and host portion with the address. It is used to deliver the frame to the destination device.
172 Identify 3 IP routing protocols?
A.) RIP
B.) AURP
C.) OSPF
D.) IGRP
E.) ARP
F.) ICMP
B.) AURP
C.) OSPF
D.) IGRP
E.) ARP
F.) ICMP
Ans A C D
AURP and ICMP are not routing protocols.
AURP and ICMP are not routing protocols.
173 Identify the type of routing protocol that exchanges entire routing tables at regular intervals?
A.) Link state
B.) Interior gateway protocols
C.) Appletalk routing
D.) Distance vector
B.) Interior gateway protocols
C.) Appletalk routing
D.) Distance vector
Ans D
Distance Vector routing protocols exchange entire routing tables with it’s neighbors. Link State routing protocols exchange LSP’s to share information regarding the networks they know.
Distance Vector routing protocols exchange entire routing tables with it’s neighbors. Link State routing protocols exchange LSP’s to share information regarding the networks they know.
174 Identify the type of hardware required to connect a Token ring network to an Ethernet network?
A.) Repeater
B.) TR-Enet
C.) Router
D.) Token Ring to Ethernet translation hub
B.) TR-Enet
C.) Router
D.) Token Ring to Ethernet translation hub
Ans C
Routers are used to connect dissimilar networks with different access-methods, like connecting Token Ring to Ethernet.
Routers are used to connect dissimilar networks with different access-methods, like connecting Token Ring to Ethernet.
175 Identify 3 characteristics regarding CDP?
A.) On by default
B.) Shows only directly connected neighbors
C.) Requires IP or IPX
D.) 60 second update interval by default
E.) 30 second updates interval by default
B.) Shows only directly connected neighbors
C.) Requires IP or IPX
D.) 60 second update interval by default
E.) 30 second updates interval by default
Ans A B D
CDP stands for Cisco Discovery Protocol. It is used to discover directly connected neighbors, it is on by default and has a 60 second update interval by default.
CDP stands for Cisco Discovery Protocol. It is used to discover directly connected neighbors, it is on by default and has a 60 second update interval by default.
176 Identify 2 transport layer protocols?
A.) IP
B.) TCP
C.) CDP
D.) ARP
E.) UDP
B.) TCP
C.) CDP
D.) ARP
E.) UDP
Ans B E
TPC and UDP are 2 layer4 Transport protocols.
TPC and UDP are 2 layer4 Transport protocols.
177 Identify 2 features of X.25?
A.) Supports only IP
B.) Utilizes switched and permanent virtual circuits
C.) Contains minimal flow control and error recovery
D.) Utilizes LAPB as it’s data-link protocol
B.) Utilizes switched and permanent virtual circuits
C.) Contains minimal flow control and error recovery
D.) Utilizes LAPB as it’s data-link protocol
Ans B D
X.25 utilizes LAPB and uses switched and permanent VC’s. It supports multiple layer protocols and is heavy laden with error detection and correction mechanisms.
X.25 utilizes LAPB and uses switched and permanent VC’s. It supports multiple layer protocols and is heavy laden with error detection and correction mechanisms.
180 Identify the purpose of the Trace command?
A.) Explorer packet transmitting routing information
B.) Test connectivity
C.) Determine the path a packet is taking through the network
D.) Transmits user data when buffers are full
B.) Test connectivity
C.) Determine the path a packet is taking through the network
D.) Transmits user data when buffers are full
Ans C
The trace command is used to determine the path a packet has taken through the network.
The trace command is used to determine the path a packet has taken through the network.
190 Identify the purpose of the TCP 3 step handshake?
A.) Setup a un-reliable connection
B.) Initialize routing tables
C.) Synchronize sequence numbers between hosts
D.) Connection tear down process
B.) Initialize routing tables
C.) Synchronize sequence numbers between hosts
D.) Connection tear down process
Ans C
The 3 step handshake establishes the parameters required for a TCP connection. During the handshake process sequence numbers are synchronized allowing for the end points to properly acknowledge and re-assemble the segments.
191 Identify 2 PPP characteristics?
The 3 step handshake establishes the parameters required for a TCP connection. During the handshake process sequence numbers are synchronized allowing for the end points to properly acknowledge and re-assemble the segments.
191 Identify 2 PPP characteristics?
A.) Is proprietary to Cisco
B.) Supports authentication
C.) Support compression
D.) Run on a multi-access network
B.) Supports authentication
C.) Support compression
D.) Run on a multi-access network
Ans B C
PPP supports authentication; PAP and CHAP. It also supports compression; Stacker and Predictor.
PPP supports authentication; PAP and CHAP. It also supports compression; Stacker and Predictor.
192 Which statement is true regarding half duplex?
A.) Only works in a point-to-point configuration
B.) Allows for transmitting and receiving but not a the same time
C.) Allow for transmitting and receiving of data simultaneously
D.) Doubles the bandwidth
B.) Allows for transmitting and receiving but not a the same time
C.) Allow for transmitting and receiving of data simultaneously
D.) Doubles the bandwidth
Ans B
Half duplex is analogous to a single a lane bridge, it can handle traffic in both directions but no at the same time.
Half duplex is analogous to a single a lane bridge, it can handle traffic in both directions but no at the same time.
193 Identify the purpose of the wildcard mask?
A.) Match a certain portion of the IP address while ignoring the rest of the address
B.) Determine the class of the IP address
C.) Determine the network portion of an IP address
D.) Hide the host portion of an IP address
B.) Determine the class of the IP address
C.) Determine the network portion of an IP address
D.) Hide the host portion of an IP address
Ans A
The purpose of the wildcard mask to match a certain portion of the IP address while ignoring the rest.
The purpose of the wildcard mask to match a certain portion of the IP address while ignoring the rest.
194 Identify the OSI layer associated with bits?
A.) Physical
B.) Network
C.) Binary
D.) Data link
B.) Network
C.) Binary
D.) Data link
Ans A
The Physical layer converts the frames to bits.
The Physical layer converts the frames to bits.
195 Identify the type of routing protocol that maintains a topological database of the network?
A.) Topological state
B.) Shortest Path First
C.) Link state
D.) Distance vector
B.) Shortest Path First
C.) Link state
D.) Distance vector
Ans C
Link State routing protocols maintain a database that lists all the networks in the internetwork.
Link State routing protocols maintain a database that lists all the networks in the internetwork.
196 Identify the 3 major functions at layer 3 of the OSI model?
A.) Forwarding process
B.) Logical addressing
C.) End-to-end connections
D.) Path selection
E.) MAC address examination
F.) Network monitoring
B.) Logical addressing
C.) End-to-end connections
D.) Path selection
E.) MAC address examination
F.) Network monitoring
Ans A B D
Layer 3 determines the path, forwards the packet and implements software or logical addressing.
Layer 3 determines the path, forwards the packet and implements software or logical addressing.
197 Identify the 2 rules used when configuring a Distance Vector routing protocol?
A.) Physically connected network(s)
B.) Configure the classful address, no subnets
C.) Enable CDP so neighbors can be detected
D.) Configure all networks in Area0
B.) Configure the classful address, no subnets
C.) Enable CDP so neighbors can be detected
D.) Configure all networks in Area0
Ans A B
When configuring a Distance Vector routing protocol only assign the physically connected networks with the classful address only.
When configuring a Distance Vector routing protocol only assign the physically connected networks with the classful address only.
198 Identify 3 characteristics of an IP address?
A.) Contains a network portion and a host portion
B.) 32 bits long
C.) Unique to each network
D.) Part of the default Cisco configuration
E.) Referred to as the hardware address
B.) 32 bits long
C.) Unique to each network
D.) Part of the default Cisco configuration
E.) Referred to as the hardware address
Ans A B C
An IP address is 32 bits long, it is referred as the logical or software address. It contains a network and host portion. Each IP address is unique.
An IP address is 32 bits long, it is referred as the logical or software address. It contains a network and host portion. Each IP address is unique.
199 Identify 3 feature of access-lists?
A.) Implicit deny will deny any packets not matched
B.) Processed sequentially from bottom to top
C.) Processed sequentially from top to bottom
D.) If a packet is denied it would be tested against the remaining statements in the access-list
E.) Once a match is made the packet is either denied or permitted
F.) Enabled on all interfaces by default
B.) Processed sequentially from bottom to top
C.) Processed sequentially from top to bottom
D.) If a packet is denied it would be tested against the remaining statements in the access-list
E.) Once a match is made the packet is either denied or permitted
F.) Enabled on all interfaces by default
Ans A C E
Access-list are processed from top to bottom, once a match occurs the packet is either denied or permitted and is no longer tested and if no match occurs the packet is denied via the implicit deny.
Access-list are processed from top to bottom, once a match occurs the packet is either denied or permitted and is no longer tested and if no match occurs the packet is denied via the implicit deny.
200 Which OSI layer performs code conversion, code formatting and encryption?
A.) Physical
B.) Data-Link
C.) Application
D.) Transport
E.) Presentation
F.) Network
B.) Data-Link
C.) Application
D.) Transport
E.) Presentation
F.) Network
Ans E
Layer 6 the Presentation layers performs this function.
201 Identify the 3 methods routers learn paths to destinations?
Layer 6 the Presentation layers performs this function.
201 Identify the 3 methods routers learn paths to destinations?
A.) Dynamic routing
B.) None of the above, configured by default
C.) Default routes
D.) Administrative distance
E.) Static routes
B.) None of the above, configured by default
C.) Default routes
D.) Administrative distance
E.) Static routes
Ans A C E
Routers can learn paths via 3 different sources; static routes, dynamic routing protocols (i.e. RIP) and default routes.
Routers can learn paths via 3 different sources; static routes, dynamic routing protocols (i.e. RIP) and default routes.
202 Identify the purpose of the following command ‘ip route 192.168.100.0 255.255.255.0 10.1.0.1′
A.) Enabling a dynamic routing protocol
B.) Creating a static route to the 10.1.0.0 network
C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1
D.) Assigning the IP address 192.168.100.0 to an interface
B.) Creating a static route to the 10.1.0.0 network
C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1
D.) Assigning the IP address 192.168.100.0 to an interface
Ans C
A static routes teaches the router about a distant network and the next hop to reach that network. Command syntax:
ip route network-address subnet-mask next-hop-address
A static routes teaches the router about a distant network and the next hop to reach that network. Command syntax:
ip route network-address subnet-mask next-hop-address
203 Based upon the 1st octet rule identify the range for a Class A address?
A.) 1 - 126
B.) 192 - 223
C.) 128 - 191
D.) 1 - 191
B.) 192 - 223
C.) 128 - 191
D.) 1 - 191
Ans A
Class A address has the 1st octet between 1 - 126. Class B between 128 - 191 and Class C between 192 - 223.
Class A address has the 1st octet between 1 - 126. Class B between 128 - 191 and Class C between 192 - 223.
204 What does a Standard IP Access-list use as test criteria?
A.) IP source address
B.) IP source and destination address, protocol numbers and port numbers
C.) IPX source and destination address
D.) Source MAC address
B.) IP source and destination address, protocol numbers and port numbers
C.) IPX source and destination address
D.) Source MAC address
Ans A
Standard IP access list use only source address.
Standard IP access list use only source address.
205 What is the function of the Transport layer and which protocols reside there?
A.) MAC addressing - IP
B.) Interhost communication - SQL, NFS
C.) Best effort Packet delivery - TCP, UDP
D.) End-to-end connections - TCP, UDP
B.) Interhost communication - SQL, NFS
C.) Best effort Packet delivery - TCP, UDP
D.) End-to-end connections - TCP, UDP
Ans D
Layer 4, the Transport layer, is responsible for end-to-end connections. The two TCP/IP protocols that reside there are TCP and UDP.
Layer 4, the Transport layer, is responsible for end-to-end connections. The two TCP/IP protocols that reside there are TCP and UDP.
206 Identify the 3 Internet layer IP protocols?
A.) NetBios
B.) IPX
C.) ARP
D.) IP
E.) RARP
B.) IPX
C.) ARP
D.) IP
E.) RARP
Ans C D E
NetBios and IPX are not layer 3 IP protocols. IP - Internet Protocol, ARP - Address Resolution Protocol and RARP - Reverse Address Resolution Protocol.
NetBios and IPX are not layer 3 IP protocols. IP - Internet Protocol, ARP - Address Resolution Protocol and RARP - Reverse Address Resolution Protocol.
207 IPX routing updates occur how often?
A.) Every 30 seconds
B.) Every 60 seconds
C.) Only as needed
D.) When the remote router asks for an update
B.) Every 60 seconds
C.) Only as needed
D.) When the remote router asks for an update
Ans B
IPX RIP updates are exchanged every 60 seconds.
IPX RIP updates are exchanged every 60 seconds.
208 Identify 3 methods not used to prevent routing loops?
A.) Holddown timers
B.) Sequence numbers
C.) Triggered updates
D.) Split horizon
E.) Area hierarchies
F.) Order of router startup
B.) Sequence numbers
C.) Triggered updates
D.) Split horizon
E.) Area hierarchies
F.) Order of router startup
Ans B E F
Area hierarchies, sequence numbers and order of router startup all relate to Link State routing protocols which do NOT incur routing loops.
Area hierarchies, sequence numbers and order of router startup all relate to Link State routing protocols which do NOT incur routing loops.
209 Identify the hardware component that stores the bootstrap program?
A.) ROM
B.) NVRAM
C.) Booter load
D.) RAM
E.) Flash
B.) NVRAM
C.) Booter load
D.) RAM
E.) Flash
Ans A
ROM contains the boot strap code.
ROM contains the boot strap code.
210 Which OSI layer provides mechanical, electrical, procedural for activating, maintaining physical link?
A.) Presentation
B.) Network
C.) Application
D.) Physical
E.) Transport
F.) Data-Link
B.) Network
C.) Application
D.) Physical
E.) Transport
F.) Data-Link
Ans D
Layer 1 the Physical layer performs this function.
211 Identify 2 characteristics of PPP?
Layer 1 the Physical layer performs this function.
211 Identify 2 characteristics of PPP?
A.) Uses LLC to establish the link
B.) Default serial encapsulation
C.) Support multiple layer 3 protocols
D.) Offers two types of authentication; PAP and CHAP
B.) Default serial encapsulation
C.) Support multiple layer 3 protocols
D.) Offers two types of authentication; PAP and CHAP
Ans C D
PPP is not the default encapsulation and uses LCP not LLC to establish the link. It support multiple layer 3 protocols and supports authentication.
PPP is not the default encapsulation and uses LCP not LLC to establish the link. It support multiple layer 3 protocols and supports authentication.
212 Identify 3 characteristics of a connection oriented protocol?
A.) Path determination
B.) Flow control
C.) Acknowledgements
D.) Uses hop count as metric
E.) 3 step handshake
B.) Flow control
C.) Acknowledgements
D.) Uses hop count as metric
E.) 3 step handshake
Ans B C E
Connection oriented protocols must first establish the connection (3 step handshake), employ methods to acknowledge the receipt of data (acknowledgements) and slow down the flow of data if required (flow control).
Connection oriented protocols must first establish the connection (3 step handshake), employ methods to acknowledge the receipt of data (acknowledgements) and slow down the flow of data if required (flow control).
213 What is the maximum hop count for IP RIP?
A.) Infinity
B.) 16
C.) 15
D.) 1
B.) 16
C.) 15
D.) 1
Ans C
15 is the maximum hop count, underscoring the size limitation of RIP.
15 is the maximum hop count, underscoring the size limitation of RIP.
214 What is Cisco’s default encapsulation method on serial interfaces?
A.) ANSI
B.) Cisco
C.) Q933a
D.) HDLC
B.) Cisco
C.) Q933a
D.) HDLC
Ans D
Cisco’s implementation of HDLC is only compatible with Cisco routers. It is the default encapsulation type for serial interfaces.
Cisco’s implementation of HDLC is only compatible with Cisco routers. It is the default encapsulation type for serial interfaces.
215 Which of the following is a characteristic of a switch, but not of a repeater?
A.) Switches forward packets based on the IPX or IP address in the frame
B.) Switches forward packets based on the IP address in the frame
C.) Switches forward packets based on the MAC address in the frame
D.) Switches forward packets based only on the IP address in the packet
B.) Switches forward packets based on the IP address in the frame
C.) Switches forward packets based on the MAC address in the frame
D.) Switches forward packets based only on the IP address in the packet
Ans C
A repeater regenerates the signal it receives, a switch makes decisions based upon MAC addresses to determine whether a frame should be forwarded. Repeaters forward all packets.
A repeater regenerates the signal it receives, a switch makes decisions based upon MAC addresses to determine whether a frame should be forwarded. Repeaters forward all packets.
216 Ping uses which Internet layer protocol?
A.) RARP
B.) ICMP
C.) ARP
D.) FTP
B.) ICMP
C.) ARP
D.) FTP
Ans B
Internet Control Message Protocol - ICMP is a management protocol and messaging service provider for IP. Its messages are carried as IP datagrams.
Internet Control Message Protocol - ICMP is a management protocol and messaging service provider for IP. Its messages are carried as IP datagrams.
ICMP is used in the following events:
Destination Unreachable - If a router cannot send an IP packet any further, it uses an ICMP echo to send a message back to the sender notifying it that the remote node is unreachable.
Buffer Full - If a routers memory buffer is full ICMP will send out a message to the originator.
Hops - Each IP datagram is assigned a path. This consists of hops. If it goes through the maximum number of hops, the packet is discarded and the discarding router sends an ICMP echo to the host.
Ping - Ping use ICMP echo message to check connectivity.
217 Which is true regarding store-and-forward switching method?
A.) Latency varies depending on frame-length
B.) Latency is constant
C.) It is default for all Cisco switches
D.) It only reads the destination hardware address before forwarding the frame
B.) Latency is constant
C.) It is default for all Cisco switches
D.) It only reads the destination hardware address before forwarding the frame
Ans A
Store-and-Forward switching copies the entire frame into its buffer and computes the CRC. If a CRC error is detected, the frame is discarded, or if the frame is a runt (less than 64 bytes including the CRC) or a giant (more than 1518 bytes including the CRC). The LAN switch then looks up the destination address in its switching table and determines the outgoing interface. The frame is then forwarded to the outgoing interface. Cisco Catalyst 5000 switches uses the Store-and-Forward method. The problem with Store-and-Forward switching is latency is increased. Latency also varies with the size of the frame. The larger the frame, the more latency associated. This of course is due to the fact that the entire frame is copied into its buffer before being forwarded.
Store-and-Forward switching copies the entire frame into its buffer and computes the CRC. If a CRC error is detected, the frame is discarded, or if the frame is a runt (less than 64 bytes including the CRC) or a giant (more than 1518 bytes including the CRC). The LAN switch then looks up the destination address in its switching table and determines the outgoing interface. The frame is then forwarded to the outgoing interface. Cisco Catalyst 5000 switches uses the Store-and-Forward method. The problem with Store-and-Forward switching is latency is increased. Latency also varies with the size of the frame. The larger the frame, the more latency associated. This of course is due to the fact that the entire frame is copied into its buffer before being forwarded.
218 Which three of the following are true statements about connection-oriented sessions?
A.) The segments delivered are acknowledged back to the sender upon their reception
B.) Any segments not acknowledged the are retransmitted by the receiver
C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data
D.) Segments are sequenced back into their proper order upon arrival at their destination
B.) Any segments not acknowledged the are retransmitted by the receiver
C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data
D.) Segments are sequenced back into their proper order upon arrival at their destination
Ans A C D
Connection-oriented services are useful for transmitting data from applications that are intolerant of delays and packet re-sequencing. FTP and Telnet applications are based on connection-oriented services as well as some voice and video programs. Any segment that is not acknowledged by the received is retransmitted by the sender.
Connection-oriented services are useful for transmitting data from applications that are intolerant of delays and packet re-sequencing. FTP and Telnet applications are based on connection-oriented services as well as some voice and video programs. Any segment that is not acknowledged by the received is retransmitted by the sender.
219 What does a metric of 16 hops represent when using RIP?
A.) Number of hops to the destination
B.) Destination unreachable
C.) Number of routers
D.) Bandwidth
B.) Destination unreachable
C.) Number of routers
D.) Bandwidth
Ans B
Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops is considered unreachable. RIP updates are broadcast every 30 seconds by default. RIP has an administrative distance of 120.
Routing Information Protocol (RIP) is a distance vector routing protocol that used hop count as its metric. The maximum hop count is 15, 16 hops is considered unreachable. RIP updates are broadcast every 30 seconds by default. RIP has an administrative distance of 120.
220 You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network?
A.) The location of DHCP servers
B.) The volume of traffic on each subnet
C.) The number of subnets on the network
D.) The location of the default gateway
E.) The number of host IDs on each subnet
B.) The volume of traffic on each subnet
C.) The number of subnets on the network
D.) The location of the default gateway
E.) The number of host IDs on each subnet
Ans C E
When determining which subnet mask to use, you must determine how many hosts and how many subnets are required.
221 What is the difference between TCP and UDP?
A.) TCP is connection-oriented; UDP uses acknowledgements only
B.) TCP is connection-oriented; UDP is connectionless
C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing
D.) TCP and UDP both have sequencing, but UDP is connectionless
When determining which subnet mask to use, you must determine how many hosts and how many subnets are required.
221 What is the difference between TCP and UDP?
A.) TCP is connection-oriented; UDP uses acknowledgements only
B.) TCP is connection-oriented; UDP is connectionless
C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing
D.) TCP and UDP both have sequencing, but UDP is connectionless
The correct answer(s): B
TCP provides guaranteed connection oriented delivery of packets, UDP does not.
TCP provides guaranteed connection oriented delivery of packets, UDP does not.
222 What does the ‘S’ mean when looking at the routing table?
A.) Statically connected
B.) Directly connected
C.) Dynamically attached
D.) Shutdown route
B.) Directly connected
C.) Dynamically attached
D.) Shutdown route
Ans A
Statically connected routes are those that an administrator has manually entered into the routing table.
Statically connected routes are those that an administrator has manually entered into the routing table.
223 Why would you use static routing instead of dynamic routing?
A.) When you want automatic updates of the routing tables
B.) All the time
C.) When you have very few routes and want to conserve bandwidth
D.) When you have a gateway of last resort
A.) When you want automatic updates of the routing tables
B.) All the time
C.) When you have very few routes and want to conserve bandwidth
D.) When you have a gateway of last resort
Ans C
Static routes are typically used when there are very few routes and you want to conserve bandwidth. Since routing protocols are constantly sending their updates across the wire, it can cause a great deal of congestion.
Static routes are typically used when there are very few routes and you want to conserve bandwidth. Since routing protocols are constantly sending their updates across the wire, it can cause a great deal of congestion.
224 On Cisco catalyst 5000 how would you set the second port on the controller in the first slot to full duplex?
A.) Set port duplex 1/1 full
B.) Set port duplex 1/2 full
C.) Set port duplex 0/1 full
D.) Set port duplex 0/2 full
A.) Set port duplex 1/1 full
B.) Set port duplex 1/2 full
C.) Set port duplex 0/1 full
D.) Set port duplex 0/2 full
Ans B
The syntax is: set type duplex slot/port <full/half>
The syntax is: set type duplex slot/port <full/half>
225 What does the acronym ARP stand for?
A.) Address Resolution Phase
B.) ARP Resolution Protocol
C.) Address Resolution Protocol
D.) Address Recall Protocol
B.) ARP Resolution Protocol
C.) Address Resolution Protocol
D.) Address Recall Protocol
Ans C
The Address Resolution Protocol (ARP) resolved IP addresses to MAC addresses.
The Address Resolution Protocol (ARP) resolved IP addresses to MAC addresses.
226 What is the default encapsulation of Netware 3.12?
A.) Ethernet_II
B.) 802.5
C.) 802.2
D.) 802.3
B.) 802.5
C.) 802.2
D.) 802.3
Ans C
The 802.2 Frame Type is the default frame-type for Netware 3.12.
The 802.2 Frame Type is the default frame-type for Netware 3.12.
227 Regarding frame relay, which of the following statements are true?
A.) You must use ANSI encapsulation if connecting to non-Cisco equipment
B.) You must use IETF encapsulation if connecting to non-Cisco equipment
C.) You must use Q.933a encapsulation if connecting to non-Cisco equipment
D.) You must use Cisco encapsulation if connecting to non-Cisco equipment
B.) You must use IETF encapsulation if connecting to non-Cisco equipment
C.) You must use Q.933a encapsulation if connecting to non-Cisco equipment
D.) You must use Cisco encapsulation if connecting to non-Cisco equipment
Ans B
Cisco’s encapsulation for Frame relay is proprietary. To communicate with non-Cisco equipment when using frame-relay encapsulation, the IETF method must be used.
Cisco’s encapsulation for Frame relay is proprietary. To communicate with non-Cisco equipment when using frame-relay encapsulation, the IETF method must be used.
228 What is required to support full-duplex Ethernet?
A.) Multiple paths between multiple stations on a link
B.) Automatic sensing operation by all connected stations
C.) Loopback and collision detection disabled
D.) Full-duplex NIC cards
B.) Automatic sensing operation by all connected stations
C.) Loopback and collision detection disabled
D.) Full-duplex NIC cards
Ans C D
Full duplex ethernet requires that the NIC supports full-duplex, and loopback and collision detection are disabled.
Full duplex ethernet requires that the NIC supports full-duplex, and loopback and collision detection are disabled.
229 Which layer is responsible for determining if sufficient resources for the intended communication exists?
A.) Application
B.) Network
C.) Session
D.) Presentation
E.) Transport
B.) Network
C.) Session
D.) Presentation
E.) Transport
Ans A
The Application layer is responsible for determining if sufficient resources for the intended communication exists.
The Application layer is responsible for determining if sufficient resources for the intended communication exists.
230 What are the 2 functions of the Data Link Mac layer?
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another on the data link layer
A.) Handles access to shared media
B.) Manages protocol access to the physical network medium
C.) Provides SAPs for higher level protocols
D.) Allows multiple devices to uniquely identify one another on the data link layer
Ans B D
Media Access Control (MAC) -The MAC sublayer manages protocol access to the physical network medium. The IEEE MAC specification defines MAC addresses, which allow multiple devices to uniquely identify one another at the data link layer.
231 Describe End to End network services: (Choose all that apply)
Media Access Control (MAC) -The MAC sublayer manages protocol access to the physical network medium. The IEEE MAC specification defines MAC addresses, which allow multiple devices to uniquely identify one another at the data link layer.
231 Describe End to End network services: (Choose all that apply)
A.) Best Route selection
B.) Accomplished Segment by Segment, each segment is autonomous
C.) Flow Control & Data Integrity
D.) Best efforts packet delivery
B.) Accomplished Segment by Segment, each segment is autonomous
C.) Flow Control & Data Integrity
D.) Best efforts packet delivery
Ans A B C D
All of the above End to End network services.
All of the above End to End network services.
232 Which of the following provide correct information about a protocol at the transport layer of the OSI model?
A.) UDP - Provides Connectionless datagrams service
B.) TCP - Provides Connection Oriented Services
C.) SMTP - Provides Mail Exchange
D.) IP - Route determination
E.) TCP - Provides Flow Control and Error Checking
F.) FTP - Transfers of Files
B.) TCP - Provides Connection Oriented Services
C.) SMTP - Provides Mail Exchange
D.) IP - Route determination
E.) TCP - Provides Flow Control and Error Checking
F.) FTP - Transfers of Files
Ans A B E
Only TCP and UDP work at the Transport layer of the above choices. IP is a Network layer protocol. SMTP and FTP are application layer protocols.
Only TCP and UDP work at the Transport layer of the above choices. IP is a Network layer protocol. SMTP and FTP are application layer protocols.
233 Which protocol works at the Internet layer and is responsible for making routing decisions?
A.) UDP
B.) IP
C.) TCP
D.) ARP
B.) IP
C.) TCP
D.) ARP
Ans B
Internet Protocol - IP provides routing and a single interface to the upper layers. No upper layer protocol and now lower layer protocol have any functions relating to routing. IP receives segments from the transport layer and fragments them into packets including the hosts IP address.
Internet Protocol - IP provides routing and a single interface to the upper layers. No upper layer protocol and now lower layer protocol have any functions relating to routing. IP receives segments from the transport layer and fragments them into packets including the hosts IP address.
234 Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits?
A.) Session
B.) Network
C.) Physical
D.) Transport
E.) Application
F.) Presentation
B.) Network
C.) Physical
D.) Transport
E.) Application
F.) Presentation
Ans D
The Transport layer does the following: Responsible for end-to-end integrity of data transmission. Handles multiplexing upper-layer application, session establishment and tear down of virtual circuits. Hides details of network dependent info from the higher layers by providing transparent data transfer. The ‘windows’ works at this level to control how much information is transferred before an acknowledgement is required.
The Transport layer does the following: Responsible for end-to-end integrity of data transmission. Handles multiplexing upper-layer application, session establishment and tear down of virtual circuits. Hides details of network dependent info from the higher layers by providing transparent data transfer. The ‘windows’ works at this level to control how much information is transferred before an acknowledgement is required.
235 Which of the following are logged when IP access list logging is enabled?
A.) source address
B.) protocol
C.) source port
D.) destination address
E.) access list number
F.) destination port
B.) protocol
C.) source port
D.) destination address
E.) access list number
F.) destination port
Ans A B C D E F
All of the above are logged when IP access list logging is enabled.
All of the above are logged when IP access list logging is enabled.
236 What’s the default CDP holdtime in seconds for Cisco routers?
A.) 30 seconds
B.) 180 seconds
C.) 90 seconds
D.) 60 seconds
B.) 180 seconds
C.) 90 seconds
D.) 60 seconds
Ans B
Cisco Discovery Protocol is a proprietary protocol to allow you to access configuration information on other routers and switches with a single command. It uses SNAP at the Data-Link Layer. By default CDP sends out a broadcast every 60 seconds and it holds this information for 180 seconds. CDP is enabled by default.
Cisco Discovery Protocol is a proprietary protocol to allow you to access configuration information on other routers and switches with a single command. It uses SNAP at the Data-Link Layer. By default CDP sends out a broadcast every 60 seconds and it holds this information for 180 seconds. CDP is enabled by default.
237 Which two of the following protocols are used at the Transport layer?
A.) ARP
B.) UDP
C.) ICMP
D.) RARP
E.) TCP
F.) BootP
B.) UDP
C.) ICMP
D.) RARP
E.) TCP
F.) BootP
Ans B E
TCP and UDP operate at the Transport layer.
TCP and UDP operate at the Transport layer.
238 LAN stands for which of the following?
A.) Local Area Network
B.) Local Arena Network
C.) Local Area News
D.) Logical Area Network
B.) Local Arena Network
C.) Local Area News
D.) Logical Area Network
Ans A
LAN stands for Local Area Network
LAN stands for Local Area Network
239 Choose three reasons why the networking industry uses a layered model:
A.) It facilitates systematic troubleshooting
B.) It allows changes in one layer to occur without changing other layers
C.) It allows changes to occur in all layers when changing one protocol
D.) It clarifies how to do it rather than what general function to be done
E.) It clarifies what general function is to be done rather than how to do it
B.) It allows changes in one layer to occur without changing other layers
C.) It allows changes to occur in all layers when changing one protocol
D.) It clarifies how to do it rather than what general function to be done
E.) It clarifies what general function is to be done rather than how to do it
Ans A B E
Why do we have a Layered Model?
1) It reduces complexity
2) Allows for a standardized interface
3) Facilitates modular engineering
4) Ensures interoperable technology
5) Accelerates evolution
6) Simplifies teaching and learning
1) It reduces complexity
2) Allows for a standardized interface
3) Facilitates modular engineering
4) Ensures interoperable technology
5) Accelerates evolution
6) Simplifies teaching and learning
240 Which layer is responsible for identifying and establishing the availability of the intended communication partner?
A.) Application
B.) Presentation
C.) Transport
D.) Session
E.) Network
A.) Application
B.) Presentation
C.) Transport
D.) Session
E.) Network
Ans A
The Application layer performs the following: Synchronizing sending and receiving applications. Program-to program communication. Identify and establish the availability of the intended communication partner, and determine if sufficient resources exist for the communication. Popular application protocols include WWW, SMTP, EDI, FTP, Telnet, and SNMP
The Application layer performs the following: Synchronizing sending and receiving applications. Program-to program communication. Identify and establish the availability of the intended communication partner, and determine if sufficient resources exist for the communication. Popular application protocols include WWW, SMTP, EDI, FTP, Telnet, and SNMP
J2EE QUESTIONS::
What is “abstract schema”
The part of an entity bean’s deployment descriptor that defines the bean’s persistent fields and relationships.
The part of an entity bean’s deployment descriptor that defines the bean’s persistent fields and relationships.
What is “abstract schema name”
A logical name that is referenced in EJB QL queries.
A logical name that is referenced in EJB QL queries.
What is “access control”
The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing
integrity, confidentiality, or availability constraints.
The methods by which interactions with resources are limited to collections of users or programs for the purpose of enforcing
integrity, confidentiality, or availability constraints.
What is “ACID”
The acronym for the four properties guaranteed by transactions: atomicity, consistency, isolation, and durability.
The acronym for the four properties guaranteed by transactions: atomicity, consistency, isolation, and durability.
What is “activation”
The process of transferring an enterprise bean from secondary storage to memory. (See passivation.) What is “anonymous access”
Accessing a resource without authentication.
The process of transferring an enterprise bean from secondary storage to memory. (See passivation.) What is “anonymous access”
Accessing a resource without authentication.
What is “applet”
A J2EE component that typically executes in a Web browser but can execute in a variety of other applications or devices that
support the applet programming model.
A J2EE component that typically executes in a Web browser but can execute in a variety of other applications or devices that
support the applet programming model.
What is “applet container”
A container that includes support for the applet programming model.
A container that includes support for the applet programming model.
What is “application assembler”
A person who combines J2EE components and modules into deployable application units.
A person who combines J2EE components and modules into deployable application units.
What is “application client”
A first-tier J2EE client component that executes in its own Java virtual machine. Application clients have access to some
J2EE platform APIs.
A first-tier J2EE client component that executes in its own Java virtual machine. Application clients have access to some
J2EE platform APIs.
What is “application client container”
A container that supports application client components. What is “application client module”
A software unit that consists of one or more classes and an application client deployment descriptor.
A container that supports application client components. What is “application client module”
A software unit that consists of one or more classes and an application client deployment descriptor.
What is “application component provider”
A vendor that provides the Java classes that implement components’ methods, JSP page definitions, and any required deployment
descriptors.
A vendor that provides the Java classes that implement components’ methods, JSP page definitions, and any required deployment
descriptors.
What is “application configuration resource file”
An XML file used to configure resources for a JavaServer Faces application, to definenavigation rules for the application,
and to register converters, validators, listeners, renderers, and components with the application.
An XML file used to configure resources for a JavaServer Faces application, to definenavigation rules for the application,
and to register converters, validators, listeners, renderers, and components with the application.
What is “archiving”
The process of saving the state of an object and restoring it.
The process of saving the state of an object and restoring it.
What is “asant”
A Java-based build tool that can be extended using Java classes. The configuration files are XML-based, calling out a target
tree where various tasks get executed.
A Java-based build tool that can be extended using Java classes. The configuration files are XML-based, calling out a target
tree where various tasks get executed.
What is “attribute”
A qualifier on an XML tag that provides additional information.
What is authentication
The process that verifies the identity of a user, device, or other entity in a computer system, usually as a prerequisite to
allowing access to resources in a system. The Java servlet specification requires three types of authentication-basic,
form-based, and mutual-and supports digest authentication.
A qualifier on an XML tag that provides additional information.
What is authentication
The process that verifies the identity of a user, device, or other entity in a computer system, usually as a prerequisite to
allowing access to resources in a system. The Java servlet specification requires three types of authentication-basic,
form-based, and mutual-and supports digest authentication.
What is authorization
The process by which access to a method or resource is determined. Authorization depends on the determination of whether the
principal associated with a request through authentication is in a given security role. A security role is a logical grouping
of users defined by the person who assembles the application. A deployer maps security roles to security identities. Security
identities may be principals or groups in the operational environment.
The process by which access to a method or resource is determined. Authorization depends on the determination of whether the
principal associated with a request through authentication is in a given security role. A security role is a logical grouping
of users defined by the person who assembles the application. A deployer maps security roles to security identities. Security
identities may be principals or groups in the operational environment.
What is authorization constraint
An authorization rule that determines who is permitted to access a Web resourcecollection.
An authorization rule that determines who is permitted to access a Web resourcecollection.
What is B2B
B2B stands for Business-to-business.
B2B stands for Business-to-business.
What is backing bean
A JavaBeans component that corresponds to a JSP page that includes JavaServer Faces components. The backing bean defines
properties for the components on the page and methods that perform processing for the component. This processing includes
event handling, validation, and processing associated with navigation. What is basic authentication
An authentication mechanism in which a Web server authenticates an entity via a user name and password obtained using the Web
application’s built-in authentication mechanism.
A JavaBeans component that corresponds to a JSP page that includes JavaServer Faces components. The backing bean defines
properties for the components on the page and methods that perform processing for the component. This processing includes
event handling, validation, and processing associated with navigation. What is basic authentication
An authentication mechanism in which a Web server authenticates an entity via a user name and password obtained using the Web
application’s built-in authentication mechanism.
What is bean-managed persistence
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean.
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean.
What is bean-managed transaction
A transaction whose boundaries are defined by an enterprise bean.
A transaction whose boundaries are defined by an enterprise bean.
What is binary entity
See unparsed entity.
See unparsed entity.
What is binding (XML)
Generating the code needed to process a well-defined portion of XML data.
Generating the code needed to process a well-defined portion of XML data.
What is binding (JavaServer Faces technology)
Wiring UI components to back-end data sources such as backing bean properties.
What is build file
The XML file that contains one or more asant targets. A target is a set of tasks you want to be executed. When starting
asant, you can select which targets you want to have executed. When no target is given, the project’s default target is
executed.
Wiring UI components to back-end data sources such as backing bean properties.
What is build file
The XML file that contains one or more asant targets. A target is a set of tasks you want to be executed. When starting
asant, you can select which targets you want to have executed. When no target is given, the project’s default target is
executed.
What is business logic
The code that implements the functionality of an application. In the Enterprise JavaBeans architecture, this logic is
implemented by the methods of an enterprise bean.
The code that implements the functionality of an application. In the Enterprise JavaBeans architecture, this logic is
implemented by the methods of an enterprise bean.
What is business method
A method of an enterprise bean that implements the business logic or rules of an application.
A method of an enterprise bean that implements the business logic or rules of an application.
What is callback methods
Component methods called by the container to notify the component of important events in its life cycle.
Component methods called by the container to notify the component of important events in its life cycle.
What is caller
Same as caller principal.
Same as caller principal.
What is caller principal
The principal that identifies the invoker of the enterprise bean method. What is cascade delete
A deletion that triggers another deletion. A cascade delete can be specified for an entity bean that has container-managed
persistence.
The principal that identifies the invoker of the enterprise bean method. What is cascade delete
A deletion that triggers another deletion. A cascade delete can be specified for an entity bean that has container-managed
persistence.
What is CDATA
A predefined XML tag for character data that means “don’t interpret these characters,” as opposed to parsed character data
(PCDATA), in which the normal rules of XML syntax apply. CDATA sections are typically used to show examples of XML syntax.
A predefined XML tag for character data that means “don’t interpret these characters,” as opposed to parsed character data
(PCDATA), in which the normal rules of XML syntax apply. CDATA sections are typically used to show examples of XML syntax.
What is certificate authority
A trusted organization that issues public key certificates and provides identification to the bearer.
A trusted organization that issues public key certificates and provides identification to the bearer.
What is client-certificate authentication
An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client authenticate each other
with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.
An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client authenticate each other
with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.
What is comment
In an XML document, text that is ignored unless the parser is specifically told to recognize it.
What is commit
The point in a transaction when all updates to any resources involved in the transaction are made permanent.
In an XML document, text that is ignored unless the parser is specifically told to recognize it.
What is commit
The point in a transaction when all updates to any resources involved in the transaction are made permanent.
What is component
See what is J2EE component.
See what is J2EE component.
What is component (JavaServer Faces technology)
See what is JavaServer Faces UI component.
See what is JavaServer Faces UI component.
What is component contract
The contract between a J2EE component and its container. The contract includes life-cycle management of the component, a
context interface that the instance uses to obtain various information and services from its container, and a list of
services that every container must provide for its components.
The contract between a J2EE component and its container. The contract includes life-cycle management of the component, a
context interface that the instance uses to obtain various information and services from its container, and a list of
services that every container must provide for its components.
What is component-managed sign-on
A mechanism whereby security information needed for signing on to a resource is provided by an application component.
A mechanism whereby security information needed for signing on to a resource is provided by an application component.
What is connection
See what is resource manager connection.
See what is resource manager connection.
What is connection factory
See what is resource manager connection factory.
See what is resource manager connection factory.
What is connector
A standard extension mechanism for containers that provides connectivity to enterprise information systems. A connector is
specific to an enterprise information system and consists of a resource adapter andapplication development tools for
enterprise information system connectivity. The resource adapter is plugged in to a container through its support for
system-level contracts defined in the Connector architecture.
What is Connector architecture
An architecture for integration of J2EE products with enterprise information systems. There are two parts to this
architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this
resource adapter to plug in. This architecture defines a set of contracts that a resource adapter must support to plug in to
a J2EE product-for example, transactions, security, and resource management.
A standard extension mechanism for containers that provides connectivity to enterprise information systems. A connector is
specific to an enterprise information system and consists of a resource adapter andapplication development tools for
enterprise information system connectivity. The resource adapter is plugged in to a container through its support for
system-level contracts defined in the Connector architecture.
What is Connector architecture
An architecture for integration of J2EE products with enterprise information systems. There are two parts to this
architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this
resource adapter to plug in. This architecture defines a set of contracts that a resource adapter must support to plug in to
a J2EE product-for example, transactions, security, and resource management.
What is container
An entity that provides life-cycle management, security, deployment, and runtime services to J2EE components. Each type of
container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services.
An entity that provides life-cycle management, security, deployment, and runtime services to J2EE components. Each type of
container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services.
What is container-managed persistence
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean’s
container.
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean’s
container.
What is container-managed sign-on
The mechanism whereby security information needed for signing on to a resource is supplied by the container.
The mechanism whereby security information needed for signing on to a resource is supplied by the container.
What is container-managed transaction
A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions.What is content
In an XML document, the part that occurs after the prolog, including the root element and everything it contains.
A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions.What is content
In an XML document, the part that occurs after the prolog, including the root element and everything it contains.
What is context attribute
An object bound into the context associated with a servlet.
An object bound into the context associated with a servlet.
What is context root
A name that gets mapped to the document root of a Web application.
A name that gets mapped to the document root of a Web application.
What is conversational state
The field values of a session bean plus the transitive closure of the objects reachable from the bean’s fields. The
transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is,
the fields that would be stored by serializing the bean instance.
The field values of a session bean plus the transitive closure of the objects reachable from the bean’s fields. The
transitive closure of a bean is defined in terms of the serialization protocol for the Java programming language, that is,
the fields that would be stored by serializing the bean instance.
What is CORBA
Common Object Request Broker Architecture. A language-independent distributed object model specified by the OMG.
What is create method
A method defined in the home interface and invoked by a client to create an enterprise bean.
Common Object Request Broker Architecture. A language-independent distributed object model specified by the OMG.
What is create method
A method defined in the home interface and invoked by a client to create an enterprise bean.
What is credentials
The information describing the security attributes of a principal.
The information describing the security attributes of a principal.
What is CSS
Cascading style sheet. A stylesheet used with HTML and XML documents to add a style to all elements marked with a particular
tag, for the direction of browsers or other presentation mechanisms.
Cascading style sheet. A stylesheet used with HTML and XML documents to add a style to all elements marked with a particular
tag, for the direction of browsers or other presentation mechanisms.
What is CTS
Compatibility test suite. A suite of compatibility tests for verifying that a J2EE product complies with the J2EE platform
specification.
Compatibility test suite. A suite of compatibility tests for verifying that a J2EE product complies with the J2EE platform
specification.
What is data
The contents of an element in an XML stream, generally used when the element does not contain any subelements. When it does,
the term content is generally used. When the only text in an XML structure is contained in simple elements and when elements
that have subelements have little or no data mixed in, then that structure is often thought of as XML data, as opposed to an
XML document.
What is DDP
Document-driven programming. The use of XML to define applications.
The contents of an element in an XML stream, generally used when the element does not contain any subelements. When it does,
the term content is generally used. When the only text in an XML structure is contained in simple elements and when elements
that have subelements have little or no data mixed in, then that structure is often thought of as XML data, as opposed to an
XML document.
What is DDP
Document-driven programming. The use of XML to define applications.
What is declaration
The very first thing in an XML document, which declares it as XML. The minimal declaration is <?xml version=”1.0″?>. The
declaration is part of the document prolog.
The very first thing in an XML document, which declares it as XML. The minimal declaration is <?xml version=”1.0″?>. The
declaration is part of the document prolog.
What is declarative security
Mechanisms used in an application that are expressed in a declarative syntax in a deployment descriptor.
Mechanisms used in an application that are expressed in a declarative syntax in a deployment descriptor.
What is delegation
An act whereby one principal authorizes another principal to use its identity or privileges with some restrictions.
An act whereby one principal authorizes another principal to use its identity or privileges with some restrictions.
What is deployer
A person who installs J2EE modules and applications into an operational environment.
A person who installs J2EE modules and applications into an operational environment.
What is deployment
The process whereby software is installed into an operational environment.
The process whereby software is installed into an operational environment.
What is deployment descriptor
An XML file provided with each module and J2EE application that describes how they should be deployed. The deployment
descriptor directs a deployment tool to deploy a module or application with specific container options and describes specific
configuration requirements that a deployer must resolve. What is destination
A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point messaging system,
publish/subscribe messaging system.
An XML file provided with each module and J2EE application that describes how they should be deployed. The deployment
descriptor directs a deployment tool to deploy a module or application with specific container options and describes specific
configuration requirements that a deployer must resolve. What is destination
A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point messaging system,
publish/subscribe messaging system.
What is digest authentication
An authentication mechanism in which a Web application authenticates itself to a Web server by sending the server a message
digest along with its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation
of the HTTP request message and the client’s password. The digest is typically much smaller than the HTTP request and doesn’t
contain the password.
An authentication mechanism in which a Web application authenticates itself to a Web server by sending the server a message
digest along with its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation
of the HTTP request message and the client’s password. The digest is typically much smaller than the HTTP request and doesn’t
contain the password.
What is distributed application
An application made up of distinct components running in separate runtime environments, usually on different platforms
connected via a network. Typical distributed applications are two-tier (client-server), three-tier
(client-middleware-server), and multitier (client-multiple middleware-multiple servers).
An application made up of distinct components running in separate runtime environments, usually on different platforms
connected via a network. Typical distributed applications are two-tier (client-server), three-tier
(client-middleware-server), and multitier (client-multiple middleware-multiple servers).
What is document
In general, an XML structure in which one or more elements contains text intermixed with subelements. See also data.
In general, an XML structure in which one or more elements contains text intermixed with subelements. See also data.
What is Document Object Model
An API for accessing and manipulating XML documents as tree structures. DOM provides platform-neutral, language-neutral
interfaces that enables programs and scripts to dynamically access and modify content and structure in XML documents.
An API for accessing and manipulating XML documents as tree structures. DOM provides platform-neutral, language-neutral
interfaces that enables programs and scripts to dynamically access and modify content and structure in XML documents.
What is document root
The top-level directory of a WAR. The document root is where JSP pages, client-side classes and archives, and static Web
resources are stored.
What is DTD
Document type definition. An optional part of the XML document prolog, as specified by the XML standard. The DTD specifies
constraints on the valid tags and tag sequences that can be in the document. The DTD has a number of shortcomings, however,
and this has led to various schema proposals. For example, the DTD entry <!ELEMENT username (#PCDATA)> says that the XML
element called username contains parsed character data-that is, text alone, with no other structural elements under it. The
DTD includes both the local subset, defined in the current file, and the external subset, which consists of the definitions
contained in external DTD files that are referenced in the local subset using a parameter entity.
The top-level directory of a WAR. The document root is where JSP pages, client-side classes and archives, and static Web
resources are stored.
What is DTD
Document type definition. An optional part of the XML document prolog, as specified by the XML standard. The DTD specifies
constraints on the valid tags and tag sequences that can be in the document. The DTD has a number of shortcomings, however,
and this has led to various schema proposals. For example, the DTD entry <!ELEMENT username (#PCDATA)> says that the XML
element called username contains parsed character data-that is, text alone, with no other structural elements under it. The
DTD includes both the local subset, defined in the current file, and the external subset, which consists of the definitions
contained in external DTD files that are referenced in the local subset using a parameter entity.
What is durable subscription
In a JMS publish/subscribe messaging system, a subscription that continues to exist whether or not there is a current active
subscriber object. If there is no active subscriber, the JMS provider retains the subscription’s messages until they are
received by the subscription or until they expire.
In a JMS publish/subscribe messaging system, a subscription that continues to exist whether or not there is a current active
subscriber object. If there is no active subscriber, the JMS provider retains the subscription’s messages until they are
received by the subscription or until they expire.
What is EAR file
Enterprise Archive file. A JAR archive that contains a J2EE application.
Enterprise Archive file. A JAR archive that contains a J2EE application.
What is ebXML
Electronic Business XML. A group of specifications designed to enable enterprises to conduct business through the exchange of
XML-based messages. It is sponsored by OASIS and the United Nations Centre for the Facilitation of Procedures and Practices
in Administration, Commerce and Transport (U.N./CEFACT).
Electronic Business XML. A group of specifications designed to enable enterprises to conduct business through the exchange of
XML-based messages. It is sponsored by OASIS and the United Nations Centre for the Facilitation of Procedures and Practices
in Administration, Commerce and Transport (U.N./CEFACT).
What is EJB
Enterprise JavaBeans.
Enterprise JavaBeans.
What is EJB container
A container that implements the EJB component contract of the J2EE architecture. This contract specifies a runtime
environment for enterprise beans that includes security, concurrency, life-cycle management, transactions, deployment,
naming, and other services. An EJB container is provided by an EJB or J2EE server. What is EJB container provider
A vendor that supplies an EJB container.
A container that implements the EJB component contract of the J2EE architecture. This contract specifies a runtime
environment for enterprise beans that includes security, concurrency, life-cycle management, transactions, deployment,
naming, and other services. An EJB container is provided by an EJB or J2EE server. What is EJB container provider
A vendor that supplies an EJB container.
What is EJB context
An object that allows an enterprise bean to invoke services provided by the container and to obtain the information about the
caller of a client-invoked method.
An object that allows an enterprise bean to invoke services provided by the container and to obtain the information about the
caller of a client-invoked method.
What is EJB home object
An object that provides the life-cycle operations (create, remove, find) for an enterprise bean. The class for the EJB home
object is generated by the container’s deployment tools. The EJB home object implements the enterprise bean’s home interface.
The client references an EJB home object to perform life-cycle operations on an EJB object. The client uses JNDI to locate an
EJB home object.
An object that provides the life-cycle operations (create, remove, find) for an enterprise bean. The class for the EJB home
object is generated by the container’s deployment tools. The EJB home object implements the enterprise bean’s home interface.
The client references an EJB home object to perform life-cycle operations on an EJB object. The client uses JNDI to locate an
EJB home object.
What is EJB JAR file
A JAR archive that contains an EJB module.
A JAR archive that contains an EJB module.
What is EJB module
A deployable unit that consists of one or more enterprise beans and an EJB deployment descriptor.
A deployable unit that consists of one or more enterprise beans and an EJB deployment descriptor.
What is EJB object
An object whose class implements the enterprise bean’s remote interface. A client never references an enterprise bean
instance directly; a client always references an EJB object. The class of an EJB object is generated by a container’s
deployment tools.
What is EJB server
Software that provides services to an EJB container. For example, an EJB container typically relies on a transaction manager
that is part of the EJB server to perform the two-phase commit across all the participating resource managers. The J2EE
architecture assumes that an EJB container is hosted by an EJB server from the same vendor, so it does not specify the
contract between these two entities. An EJB server can host one or more EJB containers.
An object whose class implements the enterprise bean’s remote interface. A client never references an enterprise bean
instance directly; a client always references an EJB object. The class of an EJB object is generated by a container’s
deployment tools.
What is EJB server
Software that provides services to an EJB container. For example, an EJB container typically relies on a transaction manager
that is part of the EJB server to perform the two-phase commit across all the participating resource managers. The J2EE
architecture assumes that an EJB container is hosted by an EJB server from the same vendor, so it does not specify the
contract between these two entities. An EJB server can host one or more EJB containers.
What is EJB server provider
A vendor that supplies an EJB server.
A vendor that supplies an EJB server.
What is element
A unit of XML data, delimited by tags. An XML element can enclose other elements.
A unit of XML data, delimited by tags. An XML element can enclose other elements.
What is empty tag
A tag that does not enclose any content.
A tag that does not enclose any content.
What is enterprise bean
A J2EE component that implements a business task or business entity and is hosted by an EJB container; either an entity bean,
a session bean, or a message-driven bean.
A J2EE component that implements a business task or business entity and is hosted by an EJB container; either an entity bean,
a session bean, or a message-driven bean.
What is enterprise bean provider
An application developer who produces enterprise bean classes, remote and home interfaces, and deployment descriptor files,
and packages them in an EJB JAR file.
What is enterprise information system
The applications that constitute an enterprise’s existing system for handling companywide information. These applications
provide an information infrastructure for an enterprise. An enterprise information system offers a well-defined set of
services to its clients. These services are exposed to clients as local or remote interfaces or both. Examples of enterprise
information systems include enterprise resource planning systems, mainframe transaction processing systems, and legacy
database systems.
An application developer who produces enterprise bean classes, remote and home interfaces, and deployment descriptor files,
and packages them in an EJB JAR file.
What is enterprise information system
The applications that constitute an enterprise’s existing system for handling companywide information. These applications
provide an information infrastructure for an enterprise. An enterprise information system offers a well-defined set of
services to its clients. These services are exposed to clients as local or remote interfaces or both. Examples of enterprise
information systems include enterprise resource planning systems, mainframe transaction processing systems, and legacy
database systems.
What is enterprise information system resource
An entity that provides enterprise information system-specific functionality to its clients. Examples are a record or set of
records in a database system, a business object in an enterprise resource planning system, and a transaction program in a
transaction processing system.
An entity that provides enterprise information system-specific functionality to its clients. Examples are a record or set of
records in a database system, a business object in an enterprise resource planning system, and a transaction program in a
transaction processing system.
What is Enterprise JavaBeans (EJB)
A component architecture for the development and deployment of object-oriented, distributed, enterprise-level applications.
Applications written using the Enterprise JavaBeans architecture are scalable, transactional, and secure.
A component architecture for the development and deployment of object-oriented, distributed, enterprise-level applications.
Applications written using the Enterprise JavaBeans architecture are scalable, transactional, and secure.
What is Enterprise JavaBeans Query Language (EJB QL)
Defines the queries for the finder and select methods of an entity bean having container-managed persistence. A subset of
SQL92, EJB QL has extensions that allow navigation over the relationships defined in an entity bean’s abstract schema.
Defines the queries for the finder and select methods of an entity bean having container-managed persistence. A subset of
SQL92, EJB QL has extensions that allow navigation over the relationships defined in an entity bean’s abstract schema.
What is an entity
A distinct, individual item that can be included in an XML document by referencing it. Such an entity reference can name an
entity as small as a character (for example, <, which references the less-than symbol or left angle bracket, <). An entity
reference can also reference an entire document, an external entity, or a collection of DTD definitions.
What is entity bean
An enterprise bean that represents persistent data maintained in a database. An entity bean can manage its own persistence or
can delegate this function to its container. An entity bean is identified by a primary key. If the container in which an
entity bean is hosted crashes, the entity bean, its primary key, and any remote references survive the crash.
A distinct, individual item that can be included in an XML document by referencing it. Such an entity reference can name an
entity as small as a character (for example, <, which references the less-than symbol or left angle bracket, <). An entity
reference can also reference an entire document, an external entity, or a collection of DTD definitions.
What is entity bean
An enterprise bean that represents persistent data maintained in a database. An entity bean can manage its own persistence or
can delegate this function to its container. An entity bean is identified by a primary key. If the container in which an
entity bean is hosted crashes, the entity bean, its primary key, and any remote references survive the crash.
What is entity reference
A reference to an entity that is substituted for the reference when the XML document is parsed. It can reference a predefined
entity such as < or reference one that is defined in the DTD. In the XML data, the reference could be to an entity that is
defined in the local subset of the DTD or to an external XML file (an external entity). The DTD can also carve out a segment
of DTD specifications and give it a name so that it can be reused (included) at multiple points in the DTD by defining a
parameter entity.
A reference to an entity that is substituted for the reference when the XML document is parsed. It can reference a predefined
entity such as < or reference one that is defined in the DTD. In the XML data, the reference could be to an entity that is
defined in the local subset of the DTD or to an external XML file (an external entity). The DTD can also carve out a segment
of DTD specifications and give it a name so that it can be reused (included) at multiple points in the DTD by defining a
parameter entity.
What is error
A SAX parsing error is generally a validation error; in other words, it occurs when an XML document is not valid, although it
can also occur if the declaration specifies an XML version that the parser cannot handle. See also fatal error, warning.
A SAX parsing error is generally a validation error; in other words, it occurs when an XML document is not valid, although it
can also occur if the declaration specifies an XML version that the parser cannot handle. See also fatal error, warning.
What is Extensible Markup Language
XML.
XML.
What is external entity
An entity that exists as an external XML file, which is included in the XML document using an entity reference.
An entity that exists as an external XML file, which is included in the XML document using an entity reference.
What is external subset
That part of a DTD that is defined by references to external DTD files.
That part of a DTD that is defined by references to external DTD files.
What is fatal error
A fatal error occurs in the SAX parser when a document is not well formed or otherwise cannot be processed. See also error,
warning.
What is filter
An object that can transform the header or content (or both) of a request or response. Filters differ from Web components in
that they usually do not themselves create responses but rather modify or adapt the requests for a resource, and modify or
adapt responses from a resource. A filter should not have any dependencies on a Web resource for which it is acting as a
filter so that it can be composable with more than one type of Web resource.
A fatal error occurs in the SAX parser when a document is not well formed or otherwise cannot be processed. See also error,
warning.
What is filter
An object that can transform the header or content (or both) of a request or response. Filters differ from Web components in
that they usually do not themselves create responses but rather modify or adapt the requests for a resource, and modify or
adapt responses from a resource. A filter should not have any dependencies on a Web resource for which it is acting as a
filter so that it can be composable with more than one type of Web resource.
What is filter chain
A concatenation of XSLT transformations in which the output of one transformation becomes the input of the next.
A concatenation of XSLT transformations in which the output of one transformation becomes the input of the next.
What is finder method
A method defined in the home interface and invoked by a client to locate an entity bean.
A method defined in the home interface and invoked by a client to locate an entity bean.
What is form-based authentication
An authentication mechanism in which a Web container provides an application-specific form for logging in. This form of
authentication uses Base64 encoding and can expose user names and passwords unless all connections are over SSL.
An authentication mechanism in which a Web container provides an application-specific form for logging in. This form of
authentication uses Base64 encoding and can expose user names and passwords unless all connections are over SSL.
What is general entity
An entity that is referenced as part of an XML document’s content, as distinct from a parameter entity, which is referenced
in the DTD. A general entity can be a parsed entity or an unparsed entity.
An entity that is referenced as part of an XML document’s content, as distinct from a parameter entity, which is referenced
in the DTD. A general entity can be a parsed entity or an unparsed entity.
What is group
An authenticated set of users classified by common traits such as job title or customer profile. Groups are also associated
with a set of roles, and every user that is a member of a group inherits all the roles assigned to that group.
An authenticated set of users classified by common traits such as job title or customer profile. Groups are also associated
with a set of roles, and every user that is a member of a group inherits all the roles assigned to that group.
What is handle
An object that identifies an enterprise bean. A client can serialize the handle and then later deserialize it to obtain a
reference to the enterprise bean. What is home handle
An object that can be used to obtain a reference to the home interface. A home handle can be serialized and written to stable
storage and deserialized to obtain the reference.
An object that identifies an enterprise bean. A client can serialize the handle and then later deserialize it to obtain a
reference to the enterprise bean. What is home handle
An object that can be used to obtain a reference to the home interface. A home handle can be serialized and written to stable
storage and deserialized to obtain the reference.
What is home interface
One of two interfaces for an enterprise bean. The home interface defines zero or more methods for managing an enterprise
bean. The home interface of a session bean defines create and remove methods, whereas the home interface of an entity bean
defines create, finder, and remove methods.
One of two interfaces for an enterprise bean. The home interface defines zero or more methods for managing an enterprise
bean. The home interface of a session bean defines create and remove methods, whereas the home interface of an entity bean
defines create, finder, and remove methods.
What is HTML
Hypertext Markup Language. A markup language for hypertext documents on the Internet. HTML enables the embedding of images,
sounds, video streams, form fields, references to other objects with URLs, and basic text formatting.
Hypertext Markup Language. A markup language for hypertext documents on the Internet. HTML enables the embedding of images,
sounds, video streams, form fields, references to other objects with URLs, and basic text formatting.
What is HTTP
Hypertext Transfer Protocol. The Internet protocol used to retrieve hypertext objects from remote hosts. HTTP messages
consist of requests from client to server and responses from server to client.
Hypertext Transfer Protocol. The Internet protocol used to retrieve hypertext objects from remote hosts. HTTP messages
consist of requests from client to server and responses from server to client.
What is HTTPS
HTTP layered over the SSL protocol.
HTTP layered over the SSL protocol.
What is IDL
Interface Definition Language. A language used to define interfaces to remote CORBA objects. The interfaces are independent
of operating systems and programming languages.
Interface Definition Language. A language used to define interfaces to remote CORBA objects. The interfaces are independent
of operating systems and programming languages.
What is IIOP
Internet Inter-ORB Protocol. A protocol used for communication between CORBA object request brokers.
Internet Inter-ORB Protocol. A protocol used for communication between CORBA object request brokers.
What is impersonation
An act whereby one entity assumes the identity and privileges of another entity without restrictions and without any
indication visible to the recipients of the impersonator’s calls that delegation has taken place. Impersonation is a case of
simple delegation. What is initialization parameter
A parameter that initializes the context associated with a servlet.
An act whereby one entity assumes the identity and privileges of another entity without restrictions and without any
indication visible to the recipients of the impersonator’s calls that delegation has taken place. Impersonation is a case of
simple delegation. What is initialization parameter
A parameter that initializes the context associated with a servlet.
What is ISO 3166
The international standard for country codes maintained by the International Organization for Standardization (ISO).
The international standard for country codes maintained by the International Organization for Standardization (ISO).
What is ISV
Independent software vendor.
Independent software vendor.
What is J2EE
Java 2 Platform, Enterprise Edition.
Java 2 Platform, Enterprise Edition.
What is J2EE application
Any deployable unit of J2EE functionality. This can be a single J2EE module or a group of modules packaged into an EAR file along with a J2EE application deployment descriptor. J2EE applications are typically engineered to be distributed across multiple computing tiers.
Any deployable unit of J2EE functionality. This can be a single J2EE module or a group of modules packaged into an EAR file along with a J2EE application deployment descriptor. J2EE applications are typically engineered to be distributed across multiple computing tiers.
What is J2EE component
A self-contained functional software unit supported by a container and configurable at deployment time. The J2EE specification defines the following J2EE components:
Application clients and applets are components that run on the client.
Java servlet and JavaServer Pages (JSP) technology components are Web components that run on the server.
Enterprise JavaBeans (EJB) components (enterprise beans) are business components that run on the server.
J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and “standard” Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server or client container.
What is J2EE module
A software unit that consists of one or more J2EE components of the same container type and one deployment descriptor of that type. There are four types of modules: EJB, Web, application client, and resource adapter. Modules can be deployed as stand-alone units or can be assembled into a J2EE application.
A self-contained functional software unit supported by a container and configurable at deployment time. The J2EE specification defines the following J2EE components:
Application clients and applets are components that run on the client.
Java servlet and JavaServer Pages (JSP) technology components are Web components that run on the server.
Enterprise JavaBeans (EJB) components (enterprise beans) are business components that run on the server.
J2EE components are written in the Java programming language and are compiled in the same way as any program in the language. The difference between J2EE components and “standard” Java classes is that J2EE components are assembled into a J2EE application, verified to be well formed and in compliance with the J2EE specification, and deployed to production, where they are run and managed by the J2EE server or client container.
What is J2EE module
A software unit that consists of one or more J2EE components of the same container type and one deployment descriptor of that type. There are four types of modules: EJB, Web, application client, and resource adapter. Modules can be deployed as stand-alone units or can be assembled into a J2EE application.
What is J2EE product
An implementation that conforms to the J2EE platform specification.
An implementation that conforms to the J2EE platform specification.
What is J2EE product provider
A vendor that supplies a J2EE product.
A vendor that supplies a J2EE product.
What is J2EE server
The runtime portion of a J2EE product. A J2EE server provides EJB or Web containers or both.
The runtime portion of a J2EE product. A J2EE server provides EJB or Web containers or both.
What is J2ME
Abbreviate of Java 2 Platform, Micro Edition.
Abbreviate of Java 2 Platform, Micro Edition.
What is J2SE
Abbreviate of Java 2 Platform, Standard Edition.
Abbreviate of Java 2 Platform, Standard Edition.
What is JAR
Java archive. A platform-independent file format that permits many files to be aggregated into one file. What is Java 2 Platform, Enterprise Edition (J2EE)
An environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered, Web-based applications.
Java archive. A platform-independent file format that permits many files to be aggregated into one file. What is Java 2 Platform, Enterprise Edition (J2EE)
An environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered, Web-based applications.
What is Java 2 Platform, Micro Edition (J2ME)
A highly optimized Java runtime environment targeting a wide range of consumer products, including pagers, cellular phones, screen phones, digital set-top boxes, and car navigation systems.
A highly optimized Java runtime environment targeting a wide range of consumer products, including pagers, cellular phones, screen phones, digital set-top boxes, and car navigation systems.
What is Java 2 Platform, Standard Edition (J2SE)
The core Java technology platform.
The core Java technology platform.
What is Java API for XML Processing (JAXP)
An API for processing XML documents. JAXP leverages the parser standards SAX and DOM so that you can choose to parse your data as a stream of events or to build a tree-structured representation of it. JAXP supports the XSLT standard, giving you control over the presentation of the data and enabling you to convert the data to other XML documents or to other formats, such as HTML. JAXP provides namespace support, allowing you to work with schema that might otherwise have naming conflicts.
An API for processing XML documents. JAXP leverages the parser standards SAX and DOM so that you can choose to parse your data as a stream of events or to build a tree-structured representation of it. JAXP supports the XSLT standard, giving you control over the presentation of the data and enabling you to convert the data to other XML documents or to other formats, such as HTML. JAXP provides namespace support, allowing you to work with schema that might otherwise have naming conflicts.
What is Java API for XML Registries (JAXR)
An API for accessing various kinds of XML registries.
An API for accessing various kinds of XML registries.
What is Java API for XML-based RPC (JAX-RPC)
An API for building Web services and clients that use remote procedure calls and XML. What is Java IDL
A technology that provides CORBA interoperability and connectivity capabilities for the J2EE platform. These capabilities enable J2EE applications to invoke operations on remote network services using the Object Management Group IDL and IIOP.
An API for building Web services and clients that use remote procedure calls and XML. What is Java IDL
A technology that provides CORBA interoperability and connectivity capabilities for the J2EE platform. These capabilities enable J2EE applications to invoke operations on remote network services using the Object Management Group IDL and IIOP.
What is Java Message Service (JMS)
An API for invoking operations on enterprise messaging systems.
An API for invoking operations on enterprise messaging systems.
What is Java Naming and Directory Interface (JNDI)
An API that provides naming and directory functionality.
An API that provides naming and directory functionality.
What is Java Secure Socket Extension (JSSE)
A set of packages that enable secure Internet communications.
A set of packages that enable secure Internet communications.
What is Java Transaction API (JTA)
An API that allows applications and J2EE servers to access transactions.
An API that allows applications and J2EE servers to access transactions.
What is Java Transaction Service (JTS)
Specifies the implementation of a transaction manager that supports JTA and implements the Java mapping of the Object Management Group Object Transaction Service 1.1 specification at the level below the API.
Specifies the implementation of a transaction manager that supports JTA and implements the Java mapping of the Object Management Group Object Transaction Service 1.1 specification at the level below the API.
What is JavaBeans component
A Java class that can be manipulated by tools and composed into applications. A JavaBeans component must adhere to certain property and event interface conventions.
What is JavaMail
An API for sending and receiving email.
A Java class that can be manipulated by tools and composed into applications. A JavaBeans component must adhere to certain property and event interface conventions.
What is JavaMail
An API for sending and receiving email.
What is JavaServer Faces Technology
A framework for building server-side user interfaces for Web applications written in the Java programming language.
A framework for building server-side user interfaces for Web applications written in the Java programming language.
What is JavaServer Faces conversion model
A mechanism for converting between string-based markup generated by JavaServer Faces UI components and server-side Java objects.
A mechanism for converting between string-based markup generated by JavaServer Faces UI components and server-side Java objects.
What is JavaServer Faces event and listener model
A mechanism for determining how events emitted by JavaServer Faces UI components are handled. This model is based on the JavaBeans component event and listener model.
A mechanism for determining how events emitted by JavaServer Faces UI components are handled. This model is based on the JavaBeans component event and listener model.
What is JavaServer Faces expression language
A simple expression language used by a JavaServer Faces UI component tag attributes to bind the associated component to a bean property or to bind the associated component’s value to a method or an external data source, such as a bean property. Unlike JSP EL expressions, JavaServer Faces EL expressions are evaluated by the JavaServer Faces implementation rather than by the Web container.
A simple expression language used by a JavaServer Faces UI component tag attributes to bind the associated component to a bean property or to bind the associated component’s value to a method or an external data source, such as a bean property. Unlike JSP EL expressions, JavaServer Faces EL expressions are evaluated by the JavaServer Faces implementation rather than by the Web container.
What is JavaServer Faces navigation model
A mechanism for defining the sequence in which pages in a JavaServer Faces application are displayed.
A mechanism for defining the sequence in which pages in a JavaServer Faces application are displayed.
What is JavaServer Faces UI component
A user interface control that outputs data to a client or allows a user to input data to a JavaServer Faces application.
What is JavaServer Faces UI component class
A JavaServer Faces class that defines the behavior and properties of a JavaServer Faces UI component.
A user interface control that outputs data to a client or allows a user to input data to a JavaServer Faces application.
What is JavaServer Faces UI component class
A JavaServer Faces class that defines the behavior and properties of a JavaServer Faces UI component.
What is JavaServer Faces validation model
A mechanism for validating the data a user inputs to a JavaServer Faces UI component.
A mechanism for validating the data a user inputs to a JavaServer Faces UI component.
What is JavaServer Pages (JSP)
An extensible Web technology that uses static data, JSP elements, and server-side Java objects to generate dynamic content for a client. Typically the static data is HTML or XML elements, and in many cases the client is a Web browser.
An extensible Web technology that uses static data, JSP elements, and server-side Java objects to generate dynamic content for a client. Typically the static data is HTML or XML elements, and in many cases the client is a Web browser.
What is JavaServer Pages Standard Tag Library (JSTL)
A tag library that encapsulates core functionality common to many JSP applications. JSTL has support for common, structural tasks such as iteration and conditionals, tags for manipulating XML documents, internationalization and locale-specific formatting tags, SQL tags, and functions.
A tag library that encapsulates core functionality common to many JSP applications. JSTL has support for common, structural tasks such as iteration and conditionals, tags for manipulating XML documents, internationalization and locale-specific formatting tags, SQL tags, and functions.
What is JAXR client
A client program that uses the JAXR API to access a business registry via a JAXR provider.
A client program that uses the JAXR API to access a business registry via a JAXR provider.
What is JAXR provider
An implementation of the JAXR API that provides access to a specific registry provider or to a class of registry providers that are based on a common specification.
An implementation of the JAXR API that provides access to a specific registry provider or to a class of registry providers that are based on a common specification.
What is JDBC
An API for database-independent connectivity between the J2EE platform and a wide range of data sources.
An API for database-independent connectivity between the J2EE platform and a wide range of data sources.
What is JMS
Java Message Service.
What is JMS administered object
A preconfigured JMS object (a resource manager connection factory or a destination) created by an administrator for the use of JMS clients and placed in a JNDI namespace.
Java Message Service.
What is JMS administered object
A preconfigured JMS object (a resource manager connection factory or a destination) created by an administrator for the use of JMS clients and placed in a JNDI namespace.
What is JMS application
One or more JMS clients that exchange messages.
One or more JMS clients that exchange messages.
What is JMS client
A Java language program that sends or receives messages.
A Java language program that sends or receives messages.
What is JMS provider
A messaging system that implements the Java Message Service as well as other administrative and control functionality needed in a full-featured messaging product.
A messaging system that implements the Java Message Service as well as other administrative and control functionality needed in a full-featured messaging product.
What is JMS session
A single-threaded context for sending and receiving JMS messages. A JMS session can be nontransacted, locally transacted, or participating in a distributed transaction.
A single-threaded context for sending and receiving JMS messages. A JMS session can be nontransacted, locally transacted, or participating in a distributed transaction.
What is JNDI
Abbreviate of Java Naming and Directory Interface.
Abbreviate of Java Naming and Directory Interface.
What is JSP
Abbreviate of JavaServer Pages.
Abbreviate of JavaServer Pages.
What is JSP action
A JSP element that can act on implicit objects and other server-side objects or can define new scripting variables. Actions follow the XML syntax for elements, with a start tag, a body, and an end tag; if the body is empty it can also use the empty tag syntax. The tag must use a prefix. There are standard and custom actions.
What is JSP container
A container that provides the same services as a servlet container and an engine that interprets and processes JSP pages into a servlet.
A JSP element that can act on implicit objects and other server-side objects or can define new scripting variables. Actions follow the XML syntax for elements, with a start tag, a body, and an end tag; if the body is empty it can also use the empty tag syntax. The tag must use a prefix. There are standard and custom actions.
What is JSP container
A container that provides the same services as a servlet container and an engine that interprets and processes JSP pages into a servlet.
What is JSP container, distributed
A JSP container that can run a Web application that is tagged as distributable and is spread across multiple Java virtual machines that might be running on different hosts.
A JSP container that can run a Web application that is tagged as distributable and is spread across multiple Java virtual machines that might be running on different hosts.
What is JSP custom action
A user-defined action described in a portable manner by a tag library descriptor and imported into a JSP page by a taglib directive. Custom actions are used to encapsulate recurring tasks in writing JSP pages.
A user-defined action described in a portable manner by a tag library descriptor and imported into a JSP page by a taglib directive. Custom actions are used to encapsulate recurring tasks in writing JSP pages.
What is JSP custom tag
A tag that references a JSP custom action.
A tag that references a JSP custom action.
What is JSP declaration
A JSP scripting element that declares methods, variables, or both in a JSP page.
A JSP scripting element that declares methods, variables, or both in a JSP page.
What is JSP directive
A JSP element that gives an instruction to the JSP container and is interpreted at translation time.
A JSP element that gives an instruction to the JSP container and is interpreted at translation time.
What is JSP document
A JSP page written in XML syntax and subject to the constraints of XML documents.
What is JSP element
A portion of a JSP page that is recognized by a JSP translator. An element can be a directive, an action, or a scripting element.
A JSP page written in XML syntax and subject to the constraints of XML documents.
What is JSP element
A portion of a JSP page that is recognized by a JSP translator. An element can be a directive, an action, or a scripting element.
What is JSP expression
A scripting element that contains a valid scripting language expression that is evaluated, converted to a String, and placed into the implicit out object.
A scripting element that contains a valid scripting language expression that is evaluated, converted to a String, and placed into the implicit out object.
What is JSP expression language
A language used to write expressions that access the properties of JavaBeans components. EL expressions can be used in static text and in any standard or custom tag attribute that can accept an expression.
A language used to write expressions that access the properties of JavaBeans components. EL expressions can be used in static text and in any standard or custom tag attribute that can accept an expression.
What is JSP page
A text-based document containing static text and JSP elements that describes how to process a request to create a response. A JSP page is translated into and handles requests as a servlet.
A text-based document containing static text and JSP elements that describes how to process a request to create a response. A JSP page is translated into and handles requests as a servlet.
What is JSP scripting element
A JSP declaration, scriptlet, or expression whose syntax is defined by the JSP specification and whose content is written according to the scripting language used in the JSP page. The JSP specification describes the syntax and semantics for the case where the language page attribute is “java”.
A JSP declaration, scriptlet, or expression whose syntax is defined by the JSP specification and whose content is written according to the scripting language used in the JSP page. The JSP specification describes the syntax and semantics for the case where the language page attribute is “java”.
What is JSP scriptlet
A JSP scripting element containing any code fragment that is valid in the scripting language used in the JSP page. The JSP specification describes what is a valid scriptlet for the case where the language page attribute is “java”.
A JSP scripting element containing any code fragment that is valid in the scripting language used in the JSP page. The JSP specification describes what is a valid scriptlet for the case where the language page attribute is “java”.
What is JSP standard action
An action that is defined in the JSP specification and is always available to a JSP page.
What is JSP tag file
A source file containing a reusable fragment of JSP code that is translated into a tag handler when a JSP page is translated into a servlet.
An action that is defined in the JSP specification and is always available to a JSP page.
What is JSP tag file
A source file containing a reusable fragment of JSP code that is translated into a tag handler when a JSP page is translated into a servlet.
What is JSP tag handler
A Java programming language object that implements the behavior of a custom tag.
A Java programming language object that implements the behavior of a custom tag.
What is JSP tag library
A collection of custom tags described via a tag library descriptor and Java classes.
A collection of custom tags described via a tag library descriptor and Java classes.
What is JSTL
Abbreviate of JavaServer Pages Standard Tag Library.
Abbreviate of JavaServer Pages Standard Tag Library.
What is JTA
Abbreviate of Java Transaction API.
Abbreviate of Java Transaction API.
What is JTS
Abbreviate of Java Transaction Service.
Abbreviate of Java Transaction Service.
What is keystore
A file containing the keys and certificates used for authentication. What is life cycle (J2EE component)
The framework events of a J2EE component’s existence. Each type of component has defining events that mark its transition into states in which it has varying availability for use. For example, a servlet is created and has its init method called by its container before invocation of its service method by clients or other servlets that require its functionality. After the call of its init method, it has the data and readiness for its intended use. The servlet’s destroy method is called by its container before the ending of its existence so that processing associated with winding up can be done and resources can be released. The init and destroy methods in this example are callback methods. Similar considerations apply to the life cycle of all J2EE component types: enterprise beans, Web components (servlets or JSP pages), applets, and application clients.
A file containing the keys and certificates used for authentication. What is life cycle (J2EE component)
The framework events of a J2EE component’s existence. Each type of component has defining events that mark its transition into states in which it has varying availability for use. For example, a servlet is created and has its init method called by its container before invocation of its service method by clients or other servlets that require its functionality. After the call of its init method, it has the data and readiness for its intended use. The servlet’s destroy method is called by its container before the ending of its existence so that processing associated with winding up can be done and resources can be released. The init and destroy methods in this example are callback methods. Similar considerations apply to the life cycle of all J2EE component types: enterprise beans, Web components (servlets or JSP pages), applets, and application clients.
What is life cycle (JavaServer Faces)
A set of phases during which a request for a page is received, a UI component tree representing the page is processed, and a response is produced. During the phases of the life cycle:
The local data of the components is updated with the values contained in the request parameters.
Events generated by the components are processed.
Validators and converters registered on the components are processed.
The components’ local data is updated to back-end objects.
The response is rendered to the client while the component state of the response is saved on the server for future requests.
A set of phases during which a request for a page is received, a UI component tree representing the page is processed, and a response is produced. During the phases of the life cycle:
The local data of the components is updated with the values contained in the request parameters.
Events generated by the components are processed.
Validators and converters registered on the components are processed.
The components’ local data is updated to back-end objects.
The response is rendered to the client while the component state of the response is saved on the server for future requests.
What is local subset
That part of the DTD that is defined within the current XML file.
That part of the DTD that is defined within the current XML file.
What is managed bean creation facility
A mechanism for defining the characteristics of JavaBeans components used in a JavaServer Faces application.
A mechanism for defining the characteristics of JavaBeans components used in a JavaServer Faces application.
What is message
In the Java Message Service, an asynchronous request, report, or event that is created, sent, and consumed by an enterprise application and not by a human. It contains vital information needed to coordinate enterprise applications, in the form of precisely formatted data that describes specific business actions.
In the Java Message Service, an asynchronous request, report, or event that is created, sent, and consumed by an enterprise application and not by a human. It contains vital information needed to coordinate enterprise applications, in the form of precisely formatted data that describes specific business actions.
What is message consumer
An object created by a JMS session that is used for receiving messages sent to a destination.
An object created by a JMS session that is used for receiving messages sent to a destination.
What is message-driven bean
An enterprise bean that is an asynchronous message consumer. A message-driven bean has no state for a specific client, but its instance variables can contain state across the handling of client messages, including an open database connection and an object reference to an EJB object. A client accesses a message-driven bean by sending messages to the destination for which the bean is a message listener.
An enterprise bean that is an asynchronous message consumer. A message-driven bean has no state for a specific client, but its instance variables can contain state across the handling of client messages, including an open database connection and an object reference to an EJB object. A client accesses a message-driven bean by sending messages to the destination for which the bean is a message listener.
What is message producer
An object created by a JMS session that is used for sending messages to a destination.
What is mixed-content model
A DTD specification that defines an element as containing a mixture of text and one more other elements. The specification must start with #PCDATA, followed by diverse elements, and must end with the “zero-or-more” asterisk symbol (*).
An object created by a JMS session that is used for sending messages to a destination.
What is mixed-content model
A DTD specification that defines an element as containing a mixture of text and one more other elements. The specification must start with #PCDATA, followed by diverse elements, and must end with the “zero-or-more” asterisk symbol (*).
What is method-binding expression
A JavaServer Faces EL expression that refers to a method of a backing bean. This method performs either event handling, validation, or navigation processing for the UI component whose tag uses the method-binding expression.
A JavaServer Faces EL expression that refers to a method of a backing bean. This method performs either event handling, validation, or navigation processing for the UI component whose tag uses the method-binding expression.
What is method permission
An authorization rule that determines who is permitted to execute one or more enterprise bean methods.
An authorization rule that determines who is permitted to execute one or more enterprise bean methods.
What is mutual authentication
An authentication mechanism employed by two parties for the purpose of proving each other’s identity to one another.
An authentication mechanism employed by two parties for the purpose of proving each other’s identity to one another.
What is namespace
A standard that lets you specify a unique label for the set of element names defined by a DTD. A document using that DTD can be included in any other document without having a conflict between element names. The elements defined in your DTD are then uniquely identified so that, for example, the parser can tell when an element <name> should be interpreted according to your DTD rather than using the definition for an element <name> in a different DTD.
A standard that lets you specify a unique label for the set of element names defined by a DTD. A document using that DTD can be included in any other document without having a conflict between element names. The elements defined in your DTD are then uniquely identified so that, for example, the parser can tell when an element <name> should be interpreted according to your DTD rather than using the definition for an element <name> in a different DTD.
What is naming context
A set of associations between unique, atomic, people-friendly identifiers and objects.
A set of associations between unique, atomic, people-friendly identifiers and objects.
What is naming environment
A mechanism that allows a component to be customized without the need to access or change the component’s source code. A container implements the component’s naming environment and provides it to the component as a JNDI naming context. Each component names and accesses its environment entries using the java:comp/env JNDI context. The environment entries are declaratively specified in the component’s deployment descriptor.
What is normalization
The process of removing redundancy by modularizing, as with subroutines, and of removing superfluous differences by reducing them to a common denominator. For example, line endings from different systems are normalized by reducing them to a single new line, and multiple whitespace characters are normalized to one space.
A mechanism that allows a component to be customized without the need to access or change the component’s source code. A container implements the component’s naming environment and provides it to the component as a JNDI naming context. Each component names and accesses its environment entries using the java:comp/env JNDI context. The environment entries are declaratively specified in the component’s deployment descriptor.
What is normalization
The process of removing redundancy by modularizing, as with subroutines, and of removing superfluous differences by reducing them to a common denominator. For example, line endings from different systems are normalized by reducing them to a single new line, and multiple whitespace characters are normalized to one space.
What is North American Industry Classification System (NAICS)
A system for classifying business establishments based on the processes they use to produce goods or services.
A system for classifying business establishments based on the processes they use to produce goods or services.
What is notation
A mechanism for defining a data format for a non-XML document referenced as an unparsed entity. This is a holdover from SGML. A newer standard is to use MIME data types and namespaces to prevent naming conflicts.
A mechanism for defining a data format for a non-XML document referenced as an unparsed entity. This is a holdover from SGML. A newer standard is to use MIME data types and namespaces to prevent naming conflicts.
What is OASIS
Organization for the Advancement of Structured Information Standards. A consortium that drives the development, convergence, and adoption of e-business standards. Its Web site is http://www.oasis-open.org/. The DTD repository it sponsors is at http://www.XML.org.
Organization for the Advancement of Structured Information Standards. A consortium that drives the development, convergence, and adoption of e-business standards. Its Web site is http://www.oasis-open.org/. The DTD repository it sponsors is at http://www.XML.org.
What is OMG
Object Management Group. A consortium that produces and maintains computer industry specifications for interoperable enterprise applications. Its Web site is http://www.omg.org/.
Object Management Group. A consortium that produces and maintains computer industry specifications for interoperable enterprise applications. Its Web site is http://www.omg.org/.
What is one-way messaging
A method of transmitting messages without having to block until a response is received.
A method of transmitting messages without having to block until a response is received.
What is ORB
Object request broker. A library that enables CORBA objects to locate and communicate with one another. What is OS principal
A principal native to the operating system on which the J2EE platform is executing.
Object request broker. A library that enables CORBA objects to locate and communicate with one another. What is OS principal
A principal native to the operating system on which the J2EE platform is executing.
What is OTS
Object Transaction Service. A definition of the interfaces that permit CORBA objects to participate in transactions.
Object Transaction Service. A definition of the interfaces that permit CORBA objects to participate in transactions.
What is parameter entity
An entity that consists of DTD specifications, as distinct from a general entity. A parameter entity defined in the DTD can then be referenced at other points, thereby eliminating the need to recode the definition at each location it is used.
An entity that consists of DTD specifications, as distinct from a general entity. A parameter entity defined in the DTD can then be referenced at other points, thereby eliminating the need to recode the definition at each location it is used.
What is parsed entity
A general entity that contains XML and therefore is parsed when inserted into the XML document, as opposed to an unparsed entity.
A general entity that contains XML and therefore is parsed when inserted into the XML document, as opposed to an unparsed entity.
What is parser
A module that reads in XML data from an input source and breaks it into chunks so that your program knows when it is working with a tag, an attribute, or element data. A nonvalidating parser ensures that the XML data is well formed but does not verify that it is valid. See also validating parser.
A module that reads in XML data from an input source and breaks it into chunks so that your program knows when it is working with a tag, an attribute, or element data. A nonvalidating parser ensures that the XML data is well formed but does not verify that it is valid. See also validating parser.
What is passivation
The process of transferring an enterprise bean from memory to secondary storage. See activation.
The process of transferring an enterprise bean from memory to secondary storage. See activation.
What is persistence
The protocol for transferring the state of an entity bean between its instance variables and an underlying database.
What is persistent field
A virtual field of an entity bean that has container-managed persistence; it is stored in a database.
The protocol for transferring the state of an entity bean between its instance variables and an underlying database.
What is persistent field
A virtual field of an entity bean that has container-managed persistence; it is stored in a database.
What is POA
Portable Object Adapter. A CORBA standard for building server-side applications that are portable across heterogeneous ORBs.
Portable Object Adapter. A CORBA standard for building server-side applications that are portable across heterogeneous ORBs.
What is point-to-point messaging system
A messaging system built on the concept of message queues. Each message is addressed to a specific queue; clients extract messages from the queues established to hold their messages.
A messaging system built on the concept of message queues. Each message is addressed to a specific queue; clients extract messages from the queues established to hold their messages.
What is primary key
An object that uniquely identifies an entity bean within a home.
An object that uniquely identifies an entity bean within a home.
What is principal
The identity assigned to a user as a result of authentication.
The identity assigned to a user as a result of authentication.
What is privilege
A security attribute that does not have the property of uniqueness and that can be shared by many principals.
A security attribute that does not have the property of uniqueness and that can be shared by many principals.
What is processing instruction
Information contained in an XML structure that is intended to be interpreted by a specific application.
What is programmatic security
Security decisions that are made by security-aware applications. Programmatic security is useful when declarative security alone is not sufficient to express the security model of an application.
Information contained in an XML structure that is intended to be interpreted by a specific application.
What is programmatic security
Security decisions that are made by security-aware applications. Programmatic security is useful when declarative security alone is not sufficient to express the security model of an application.
What is prolog
The part of an XML document that precedes the XML data. The prolog includes the declaration and an optional DTD.
The part of an XML document that precedes the XML data. The prolog includes the declaration and an optional DTD.
What is public key certificate
Used in client-certificate authentication to enable the server, and optionally the client, to authenticate each other. The public key certificate is the digital equivalent of a passport. It is issued by a trusted organization, called a certificate authority, and provides identification for the bearer.
Used in client-certificate authentication to enable the server, and optionally the client, to authenticate each other. The public key certificate is the digital equivalent of a passport. It is issued by a trusted organization, called a certificate authority, and provides identification for the bearer.
What is publish/subscribe messaging system
A messaging system in which clients address messages to a specific node in a content hierarchy, called a topic. Publishers and subscribers are generally anonymous and can dynamically publish or subscribe to the content hierarchy. The system takes care of distributing the messages arriving from a node’s multiple publishers to its multiple subscribers.
A messaging system in which clients address messages to a specific node in a content hierarchy, called a topic. Publishers and subscribers are generally anonymous and can dynamically publish or subscribe to the content hierarchy. The system takes care of distributing the messages arriving from a node’s multiple publishers to its multiple subscribers.
What is query string
A component of an HTTP request URL that contains a set of parameters and values that affect the handling of the request.
A component of an HTTP request URL that contains a set of parameters and values that affect the handling of the request.
What is queue
See point-to-point messaging system.
See point-to-point messaging system.
What is RAR
Resource Adapter Archive. A JAR archive that contains a resource adapter module.
Resource Adapter Archive. A JAR archive that contains a resource adapter module.
What is RDF
Resource Description Framework. A standard for defining the kind of data that an XML file contains. Such information can help ensure semantic integrity-for example-by helping to make sure that a date is treated as a date rather than simply as text.
Resource Description Framework. A standard for defining the kind of data that an XML file contains. Such information can help ensure semantic integrity-for example-by helping to make sure that a date is treated as a date rather than simply as text.
What is RDF schema
A standard for specifying consistency rules that apply to the specifications contained in an RDF.
A standard for specifying consistency rules that apply to the specifications contained in an RDF.
What is realm
See security policy domain. Also, a string, passed as part of an HTTP request during basic authentication, that defines a protection space. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme or authorization database or both.
In the J2EE server authentication service, a realm is a complete database of roles, users, and groups that identify valid users of a Web application or a set of Web applications.
See security policy domain. Also, a string, passed as part of an HTTP request during basic authentication, that defines a protection space. The protected resources on a server can be partitioned into a set of protection spaces, each with its own authentication scheme or authorization database or both.
In the J2EE server authentication service, a realm is a complete database of roles, users, and groups that identify valid users of a Web application or a set of Web applications.
What is reentrant entity bean
An entity bean that can handle multiple simultaneous, interleaved, or nested invocations that will not interfere with each other.
An entity bean that can handle multiple simultaneous, interleaved, or nested invocations that will not interfere with each other.
What is reference
See entity reference.
See entity reference.
What is registry
An infrastructure that enables the building, deployment, and discovery of Web services. It is a neutral third party that facilitates dynamic and loosely coupled business-to-business (B2B) interactions.
What is registry provider
An implementation of a business registry that conforms to a specification for XML registries (for example, ebXML or UDDI).
An infrastructure that enables the building, deployment, and discovery of Web services. It is a neutral third party that facilitates dynamic and loosely coupled business-to-business (B2B) interactions.
What is registry provider
An implementation of a business registry that conforms to a specification for XML registries (for example, ebXML or UDDI).
What is relationship field
A virtual field of an entity bean having container-managed persistence; it identifies a related entity bean.
A virtual field of an entity bean having container-managed persistence; it identifies a related entity bean.
What is remote interface
One of two interfaces for an enterprise bean. The remote interface defines the business methods callable by a client.
One of two interfaces for an enterprise bean. The remote interface defines the business methods callable by a client.
What is remove method
Method defined in the home interface and invoked by a client to destroy an enterprise bean.
Method defined in the home interface and invoked by a client to destroy an enterprise bean.
What is render kit
A set of renderers that render output to a particular client. The JavaServer Faces implementation provides a standard HTML render kit, which is composed of renderers that can render HMTL markup.
A set of renderers that render output to a particular client. The JavaServer Faces implementation provides a standard HTML render kit, which is composed of renderers that can render HMTL markup.
What is renderer
A Java class that can render the output for a set of JavaServer Faces UI components.
A Java class that can render the output for a set of JavaServer Faces UI components.
What is request-response messaging
A method of messaging that includes blocking until a response is received.What is resource adapter
A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system. A resource adapter typically is specific to an enterprise information system. It is available as a library and is used within the address space of the server or client using it. A resource adapter plugs in to a container. The application components deployed on the container then use the client API (exposed by the adapter) or tool-generated high-level abstractions to access the underlying enterprise information system. The resource adapter and EJB container collaborate to provide the underlying mechanisms-transactions, security, and connection pooling-for connectivity to the enterprise information system.
A method of messaging that includes blocking until a response is received.What is resource adapter
A system-level software driver that is used by an EJB container or an application client to connect to an enterprise information system. A resource adapter typically is specific to an enterprise information system. It is available as a library and is used within the address space of the server or client using it. A resource adapter plugs in to a container. The application components deployed on the container then use the client API (exposed by the adapter) or tool-generated high-level abstractions to access the underlying enterprise information system. The resource adapter and EJB container collaborate to provide the underlying mechanisms-transactions, security, and connection pooling-for connectivity to the enterprise information system.
What is resource adapter module
A deployable unit that contains all Java interfaces, classes, and native libraries, implementing a resource adapter along with the resource adapter deployment descriptor.
A deployable unit that contains all Java interfaces, classes, and native libraries, implementing a resource adapter along with the resource adapter deployment descriptor.
What is resource manager
Provides access to a set of shared resources. A resource manager participates in transactions that are externally controlled and coordinated by a transaction manager. A resource manager typically is in a different address space or on a different machine from the clients that access it. Note: An enterprise information system is referred to as a resource manager when it is mentioned in the context of resource and transaction management.
Provides access to a set of shared resources. A resource manager participates in transactions that are externally controlled and coordinated by a transaction manager. A resource manager typically is in a different address space or on a different machine from the clients that access it. Note: An enterprise information system is referred to as a resource manager when it is mentioned in the context of resource and transaction management.
What is resource manager connection
An object that represents a session with a resource manager.
An object that represents a session with a resource manager.
What is resource manager connection factory
An object used for creating a resource manager connection.
An object used for creating a resource manager connection.
What is RMI
Remote Method Invocation. A technology that allows an object running in one Java virtual machine to invoke methods on an object running in a different Java virtual machine.
Remote Method Invocation. A technology that allows an object running in one Java virtual machine to invoke methods on an object running in a different Java virtual machine.
What is RMI-IIOP
A version of RMI implemented to use the CORBA IIOP protocol. RMI over IIOP provides interoperability with CORBA objects implemented in any language if all the remote interfaces are originally defined as RMI interfaces.
What is role (development)
The function performed by a party in the development and deployment phases of an application developed using J2EE technology. The roles are application component provider, application assembler, deployer, J2EE product provider, EJB container provider, EJB server provider, Web container provider, Web server provider, tool provider, and system administrator.
A version of RMI implemented to use the CORBA IIOP protocol. RMI over IIOP provides interoperability with CORBA objects implemented in any language if all the remote interfaces are originally defined as RMI interfaces.
What is role (development)
The function performed by a party in the development and deployment phases of an application developed using J2EE technology. The roles are application component provider, application assembler, deployer, J2EE product provider, EJB container provider, EJB server provider, Web container provider, Web server provider, tool provider, and system administrator.
What is role mapping
The process of associating the groups or principals (or both), recognized by the container with security roles specified in the deployment descriptor. Security roles must be mapped by the deployer before a component is installed in the server.
The process of associating the groups or principals (or both), recognized by the container with security roles specified in the deployment descriptor. Security roles must be mapped by the deployer before a component is installed in the server.
What is role (security)
An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment.
In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn’t care who you are, only that you have the right key.
An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment.
In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn’t care who you are, only that you have the right key.
What is rollback
The point in a transaction when all updates to any resources involved in the transaction are reversed.
The point in a transaction when all updates to any resources involved in the transaction are reversed.
What is root
The outermost element in an XML document. The element that contains all other elements.
The outermost element in an XML document. The element that contains all other elements.
What is SAX
Abbreviation of Simple API for XML.
Abbreviation of Simple API for XML.
What is Simple API for XML
An event-driven interface in which the parser invokes one of several methods supplied by the caller when a parsing event occurs. Events include recognizing an XML tag, finding an error, encountering a reference to an external entity, or processing a DTD specification.
What is schema
A database-inspired method for specifying constraints on XML documents using an XML-based language. Schemas address deficiencies in DTDs, such as the inability to put constraints on the kinds of data that can occur in a particular field. Because schemas are founded on XML, they are hierarchical. Thus it is easier to create an unambiguous specification, and it is possible to determine the scope over which a comment is meant to apply.
An event-driven interface in which the parser invokes one of several methods supplied by the caller when a parsing event occurs. Events include recognizing an XML tag, finding an error, encountering a reference to an external entity, or processing a DTD specification.
What is schema
A database-inspired method for specifying constraints on XML documents using an XML-based language. Schemas address deficiencies in DTDs, such as the inability to put constraints on the kinds of data that can occur in a particular field. Because schemas are founded on XML, they are hierarchical. Thus it is easier to create an unambiguous specification, and it is possible to determine the scope over which a comment is meant to apply.
What is Secure Socket Layer (SSL)
A technology that allows Web browsers and Web servers to communicate over a secured connection.
A technology that allows Web browsers and Web servers to communicate over a secured connection.
What is security attributes
A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol or by a J2EE product provider or both.
A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol or by a J2EE product provider or both.
What is security constraint
A declarative way to annotate the intended protection of Web content. A security constraint consists of a Web resource collection, an authorization constraint, and a user data constraint.
A declarative way to annotate the intended protection of Web content. A security constraint consists of a Web resource collection, an authorization constraint, and a user data constraint.
What is security context
An object that encapsulates the shared state information regarding security between two entities.
An object that encapsulates the shared state information regarding security between two entities.
What is security permission
A mechanism defined by J2SE, and used by the J2EE platform to express the programming restrictions imposed on application component developers.
A mechanism defined by J2SE, and used by the J2EE platform to express the programming restrictions imposed on application component developers.
What is security permission set
The minimum set of security permissions that a J2EE product provider must provide for the execution of each component type.
What is security policy domain
A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well-defined authentication protocol or protocols for authenticating users (or principals), and may have groups to simplify setting of security policies.
The minimum set of security permissions that a J2EE product provider must provide for the execution of each component type.
What is security policy domain
A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well-defined authentication protocol or protocols for authenticating users (or principals), and may have groups to simplify setting of security policies.
What is security role
See role (security).
See role (security).
What is security technology domain
A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.
A scope over which the same security mechanism is used to enforce a security policy. Multiple security policy domains can exist within a single technology domain.
What is security view
The set of security roles defined by the application assembler.
The set of security roles defined by the application assembler.
What is server certificate
Used with the HTTPS protocol to authenticate Web applications. The certificate can be self-signed or approved by a certificate authority (CA). The HTTPS service of the Sun Java System Application Server Platform Edition 8 will not run unless a server certificate has been installed.
Used with the HTTPS protocol to authenticate Web applications. The certificate can be self-signed or approved by a certificate authority (CA). The HTTPS service of the Sun Java System Application Server Platform Edition 8 will not run unless a server certificate has been installed.
What is server principal
The OS principal that the server is executing as.
The OS principal that the server is executing as.
What is service element
A representation of the combination of one or more Connector components that share a single engine component for processing incoming requests.
What is service endpoint interface
A Java interface that declares the methods that a client can invoke on a Web service.
A representation of the combination of one or more Connector components that share a single engine component for processing incoming requests.
What is service endpoint interface
A Java interface that declares the methods that a client can invoke on a Web service.
What is servlet
A Java program that extends the functionality of a Web server, generating dynamic content and interacting with Web applications using a request-response paradigm.
A Java program that extends the functionality of a Web server, generating dynamic content and interacting with Web applications using a request-response paradigm.
What is servlet container
A container that provides the network services over which requests and responses are sent, decodes requests, and formats responses. All servlet containers must support HTTP as a protocol for requests and responses but can also support additional request-response protocols, such as HTTPS.
A container that provides the network services over which requests and responses are sent, decodes requests, and formats responses. All servlet containers must support HTTP as a protocol for requests and responses but can also support additional request-response protocols, such as HTTPS.
What is servlet container, distributed
A servlet container that can run a Web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.
A servlet container that can run a Web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.
What is servlet context
An object that contains a servlet’s view of the Web application within which the servlet is running. Using the context, a servlet can log events, obtain URL references to resources, and set and store attributes that other servlets in the context can use.
An object that contains a servlet’s view of the Web application within which the servlet is running. Using the context, a servlet can log events, obtain URL references to resources, and set and store attributes that other servlets in the context can use.
What is servlet mapping
Defines an association between a URL pattern and a servlet. The mapping is used to map requests to servlets.
Defines an association between a URL pattern and a servlet. The mapping is used to map requests to servlets.
What is session
An object used by a servlet to track a user’s interaction with a Web application across multiple HTTP requests. What is session bean
An enterprise bean that is created by a client and that usually exists only for the duration of a single client-server session. A session bean performs operations, such as calculations or database access, for the client. Although a session bean can be transactional, it is not recoverable should a system crash occur. Session bean objects either can be stateless or can maintain conversational state across methods and transactions. If a session bean maintains state, then the EJB container manages this state if the object must be removed from memory. However, the session bean object itself must manage its own persistent data.
An object used by a servlet to track a user’s interaction with a Web application across multiple HTTP requests. What is session bean
An enterprise bean that is created by a client and that usually exists only for the duration of a single client-server session. A session bean performs operations, such as calculations or database access, for the client. Although a session bean can be transactional, it is not recoverable should a system crash occur. Session bean objects either can be stateless or can maintain conversational state across methods and transactions. If a session bean maintains state, then the EJB container manages this state if the object must be removed from memory. However, the session bean object itself must manage its own persistent data.
What is SGML
Standard Generalized Markup Language. The parent of both HTML and XML. Although HTML shares SGML’s propensity for embedding presentation information in the markup, XML is a standard that allows information content to be totally separated from the mechanisms for rendering that content.
Standard Generalized Markup Language. The parent of both HTML and XML. Although HTML shares SGML’s propensity for embedding presentation information in the markup, XML is a standard that allows information content to be totally separated from the mechanisms for rendering that content.
What is SOAP
Simple Object Access Protocol. A lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. It defines, using XML technologies, an extensible messaging framework containing a message construct that can be exchanged over a variety of underlying protocols.
Simple Object Access Protocol. A lightweight protocol intended for exchanging structured information in a decentralized, distributed environment. It defines, using XML technologies, an extensible messaging framework containing a message construct that can be exchanged over a variety of underlying protocols.
What is SOAP with Attachments API for Java (SAAJ)
The basic package for SOAP messaging, SAAJ contains the API for creating and populating a SOAP message.
The basic package for SOAP messaging, SAAJ contains the API for creating and populating a SOAP message.
What is SQL
Structured Query Language. The standardized relational database language for defining database objects and manipulating data.
Structured Query Language. The standardized relational database language for defining database objects and manipulating data.
What is SQL/J
A set of standards that includes specifications for embedding SQL statements in methods in the Java programming language and specifications for calling Java static methods as SQL stored procedures and user-defined functions. An SQL checker can detect errors in static SQL statements at program development time, rather than at execution time as with a JDBC driver.
What is SSL
Secure Socket Layer. A security protocol that provides privacy over the Internet. The protocol allows client-server applications to communicate in a way that cannot be eavesdropped upon or tampered with. Servers are always authenticated, and clients are optionally authenticated.
A set of standards that includes specifications for embedding SQL statements in methods in the Java programming language and specifications for calling Java static methods as SQL stored procedures and user-defined functions. An SQL checker can detect errors in static SQL statements at program development time, rather than at execution time as with a JDBC driver.
What is SSL
Secure Socket Layer. A security protocol that provides privacy over the Internet. The protocol allows client-server applications to communicate in a way that cannot be eavesdropped upon or tampered with. Servers are always authenticated, and clients are optionally authenticated.
What is stateful session bean
A session bean with a conversational state.
A session bean with a conversational state.
What is stateless session bean
A session bean with no conversational state. All instances of a stateless session bean are identical.
A session bean with no conversational state. All instances of a stateless session bean are identical.
What is system administrator
The person responsible for configuring and administering the enterprise’s computers, networks, and software systems.
The person responsible for configuring and administering the enterprise’s computers, networks, and software systems.
What is tag
In XML documents, a piece of text that describes a unit of data or an element. The tag is distinguishable as markup, as opposed to data, because it is surrounded by angle brackets (< and >). To treat such markup syntax as data, you use an entity reference or a CDATA section.
In XML documents, a piece of text that describes a unit of data or an element. The tag is distinguishable as markup, as opposed to data, because it is surrounded by angle brackets (< and >). To treat such markup syntax as data, you use an entity reference or a CDATA section.
What is template
A set of formatting instructions that apply to the nodes selected by an XPath expression.
A set of formatting instructions that apply to the nodes selected by an XPath expression.
What is tool provider
An organization or software vendor that provides tools used for the development, packaging, and deployment of J2EE applications.What is topic
See publish-subscribe messaging system.
An organization or software vendor that provides tools used for the development, packaging, and deployment of J2EE applications.What is topic
See publish-subscribe messaging system.
What is transaction
An atomic unit of work that modifies data. A transaction encloses one or more program statements, all of which either complete or roll back. Transactions enable multiple users to access the same data concurrently.
An atomic unit of work that modifies data. A transaction encloses one or more program statements, all of which either complete or roll back. Transactions enable multiple users to access the same data concurrently.
What is transaction attribute
A value specified in an enterprise bean’s deployment descriptor that is used by the EJB container to control the transaction scope when the enterprise bean’s methods are invoked. A transaction attribute can have the following values: Required, RequiresNew, Supports, NotSupported, Mandatory, or Never.
A value specified in an enterprise bean’s deployment descriptor that is used by the EJB container to control the transaction scope when the enterprise bean’s methods are invoked. A transaction attribute can have the following values: Required, RequiresNew, Supports, NotSupported, Mandatory, or Never.
What is transaction isolation level
The degree to which the intermediate state of the data being modified by a transaction is visible to other concurrent transactions and data being modified by other transactions is visible to it.
The degree to which the intermediate state of the data being modified by a transaction is visible to other concurrent transactions and data being modified by other transactions is visible to it.
What is transaction manager
Provides the services and management functions required to support transaction demarcation, transactional resource management, synchronization, and transaction context propagation.
Provides the services and management functions required to support transaction demarcation, transactional resource management, synchronization, and transaction context propagation.
What is Unicode
A standard defined by the Unicode Consortium that uses a 16-bit code page that maps digits to characters in languages around the world. Because 16 bits covers 32,768 codes, Unicode is large enough to include all the world’s languages, with the exception of ideographic languages that have a different character for every concept, such as Chinese. For more information, see http://www.unicode.org/.
What is Universal Description, Discovery and Integration (UDDI) project
An industry initiative to create a platform-independent, open framework for describing services, discovering businesses, and integrating business services using the Internet, as well as a registry. It is being developed by a vendor consortium.
A standard defined by the Unicode Consortium that uses a 16-bit code page that maps digits to characters in languages around the world. Because 16 bits covers 32,768 codes, Unicode is large enough to include all the world’s languages, with the exception of ideographic languages that have a different character for every concept, such as Chinese. For more information, see http://www.unicode.org/.
What is Universal Description, Discovery and Integration (UDDI) project
An industry initiative to create a platform-independent, open framework for describing services, discovering businesses, and integrating business services using the Internet, as well as a registry. It is being developed by a vendor consortium.
What is Universal Standard Products and Services Classification (UNSPSC)
A schema that classifies and identifies commodities. It is used in sell-side and buy-side catalogs and as a standardized account code in analyzing expenditure.
A schema that classifies and identifies commodities. It is used in sell-side and buy-side catalogs and as a standardized account code in analyzing expenditure.
What is unparsed entity
A general entity that contains something other than XML. By its nature, an unparsed entity contains binary data.
A general entity that contains something other than XML. By its nature, an unparsed entity contains binary data.
What is URI
Uniform resource identifier. A globally unique identifier for an abstract or physical resource. A URL is a kind of URI that specifies the retrieval protocol (http or https for Web applications) and physical location of a resource (host name and host-relative path). A URN is another type of URI.
Uniform resource identifier. A globally unique identifier for an abstract or physical resource. A URL is a kind of URI that specifies the retrieval protocol (http or https for Web applications) and physical location of a resource (host name and host-relative path). A URN is another type of URI.
What is URL
Uniform resource locator. A standard for writing a textual reference to an arbitrary piece of data in the World Wide Web. A URL looks like this: protocol://host/localinfo where protocol specifies a protocol for fetching the object (such as http or ftp), host specifies the Internet name of the targeted host, and localinfo is a string (often a file name) passed to the protocol handler on the remote host.
Uniform resource locator. A standard for writing a textual reference to an arbitrary piece of data in the World Wide Web. A URL looks like this: protocol://host/localinfo where protocol specifies a protocol for fetching the object (such as http or ftp), host specifies the Internet name of the targeted host, and localinfo is a string (often a file name) passed to the protocol handler on the remote host.
What is URL path
The part of a URL passed by an HTTP request to invoke a servlet. A URL path consists of the context path + servlet path + path info, where Context path is the path prefix associated with a servlet context of which the servlet is a part. If this context is the default context rooted at the base of the Web server’s URL namespace, the path prefix will be an empty string. Otherwise, the path prefix starts with a / character but does not end with a / character.
Servlet path is the path section that directly corresponds to the mapping that activated this request. This path starts with a / character.
Path info is the part of the request path that is not part of the context path or the servlet path.
What is URN
Uniform resource name. A unique identifier that identifies an entity but doesn’t tell where it is located. A system can use a URN to look up an entity locally before trying to find it on the Web. It also allows the Web location to change, while still allowing the entity to be found.
The part of a URL passed by an HTTP request to invoke a servlet. A URL path consists of the context path + servlet path + path info, where Context path is the path prefix associated with a servlet context of which the servlet is a part. If this context is the default context rooted at the base of the Web server’s URL namespace, the path prefix will be an empty string. Otherwise, the path prefix starts with a / character but does not end with a / character.
Servlet path is the path section that directly corresponds to the mapping that activated this request. This path starts with a / character.
Path info is the part of the request path that is not part of the context path or the servlet path.
What is URN
Uniform resource name. A unique identifier that identifies an entity but doesn’t tell where it is located. A system can use a URN to look up an entity locally before trying to find it on the Web. It also allows the Web location to change, while still allowing the entity to be found.
What is user data constraint
Indicates how data between a client and a Web container should be protected. The protection can be the prevention of tampering with the data or prevention of eavesdropping on the data.
Indicates how data between a client and a Web container should be protected. The protection can be the prevention of tampering with the data or prevention of eavesdropping on the data.
What is user (security)
An individual (or application program) identity that has been authenticated. A user can have a set of roles associated with that identity, which entitles the user to access all resources protected by those roles.
An individual (or application program) identity that has been authenticated. A user can have a set of roles associated with that identity, which entitles the user to access all resources protected by those roles.
What is valid
A valid XML document, in addition to being well formed, conforms to all the constraints imposed by a DTD. It does not contain any tags that are not permitted by the DTD, and the order of the tags conforms to the DTD’s specifications.
A valid XML document, in addition to being well formed, conforms to all the constraints imposed by a DTD. It does not contain any tags that are not permitted by the DTD, and the order of the tags conforms to the DTD’s specifications.
What is validating parser
A parser that ensures that an XML document is valid in addition to being well formed. See also parser.
A parser that ensures that an XML document is valid in addition to being well formed. See also parser.
What is value-binding expression
A JavaServer Faces EL expression that refers to a property of a backing bean. A component tag uses this expression to bind the associated component’s value or the component instance to the bean property. If the component tag refers to the property via its value attribute, then the component’s value is bound to the property. If the component tag refers to the property via its binding attribute then the component itself is bound to the property.
What is virtual host
Multiple hosts plus domain names mapped to a single IP address.
A JavaServer Faces EL expression that refers to a property of a backing bean. A component tag uses this expression to bind the associated component’s value or the component instance to the bean property. If the component tag refers to the property via its value attribute, then the component’s value is bound to the property. If the component tag refers to the property via its binding attribute then the component itself is bound to the property.
What is virtual host
Multiple hosts plus domain names mapped to a single IP address.
What is W3C
World Wide Web Consortium. The international body that governs Internet standards. Its Web site is http://www.w3.org/.
World Wide Web Consortium. The international body that governs Internet standards. Its Web site is http://www.w3.org/.
What is WAR file
Web application archive file. A JAR archive that contains a Web module.
Web application archive file. A JAR archive that contains a Web module.
What is warning
A SAX parser warning is generated when the document’s DTD contains duplicate definitions and in similar situations that are not necessarily an error but which the document author might like to know about, because they could be. See also fatal error, error.
A SAX parser warning is generated when the document’s DTD contains duplicate definitions and in similar situations that are not necessarily an error but which the document author might like to know about, because they could be. See also fatal error, error.
What is Web application
An application written for the Internet, including those built with Java technologies such as JavaServer Pages and servlets, as well as those built with non-Java technologies such as CGI and Perl.
An application written for the Internet, including those built with Java technologies such as JavaServer Pages and servlets, as well as those built with non-Java technologies such as CGI and Perl.
What is Web application, distributable
A Web application that uses J2EE technology written so that it can be deployed in a Web container distributed across multiple Java virtual machines running on the same host or different hosts. The deployment descriptor for such an application uses the distributable element.
A Web application that uses J2EE technology written so that it can be deployed in a Web container distributed across multiple Java virtual machines running on the same host or different hosts. The deployment descriptor for such an application uses the distributable element.
What is Web component
A component that provides services in response to requests; either a servlet or a JSP page.
What is Web container
A container that implements the Web component contract of the J2EE architecture. This contract specifies a runtime environment for Web components that includes security, concurrency, life-cycle management, transaction, deployment, and other services. A Web container provides the same services as a JSP container as well as a federated view of the J2EE platform APIs. A Web container is provided by a Web or J2EE server.
A component that provides services in response to requests; either a servlet or a JSP page.
What is Web container
A container that implements the Web component contract of the J2EE architecture. This contract specifies a runtime environment for Web components that includes security, concurrency, life-cycle management, transaction, deployment, and other services. A Web container provides the same services as a JSP container as well as a federated view of the J2EE platform APIs. A Web container is provided by a Web or J2EE server.
What is Web container, distributed
A Web container that can run a Web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.
A Web container that can run a Web application that is tagged as distributable and that executes across multiple Java virtual machines running on the same host or on different hosts.
What is Web container provider
A vendor that supplies a Web container.
A vendor that supplies a Web container.
What is Web module
A deployable unit that consists of one or more Web components, other resources, and a Web application deployment descriptor contained in a hierarchy of directories and files in a standard Web application format.
A deployable unit that consists of one or more Web components, other resources, and a Web application deployment descriptor contained in a hierarchy of directories and files in a standard Web application format.
What is Web resource
A static or dynamic object contained in a Web application that can be referenced by a URL.
A static or dynamic object contained in a Web application that can be referenced by a URL.
What is Web resource collection
A list of URL patterns and HTTP methods that describe a set of Web resources to be protected.
A list of URL patterns and HTTP methods that describe a set of Web resources to be protected.
What is Web server
Software that provides services to access the Internet, an intranet, or an extranet. A Web server hosts Web sites, provides support for HTTP and other protocols, and executes server-side programs (such as CGI scripts or servlets) that perform certain functions. In the J2EE architecture, a Web server provides services to a Web container. For example, a Web container typically relies on a Web server to provide HTTP message handling. The J2EE architecture assumes that a Web container is hosted by a Web server from the same vendor, so it does not specify the contract between these two entities. A Web server can host one or more Web containers.
What is Web server provider
A vendor that supplies a Web server.
Software that provides services to access the Internet, an intranet, or an extranet. A Web server hosts Web sites, provides support for HTTP and other protocols, and executes server-side programs (such as CGI scripts or servlets) that perform certain functions. In the J2EE architecture, a Web server provides services to a Web container. For example, a Web container typically relies on a Web server to provide HTTP message handling. The J2EE architecture assumes that a Web container is hosted by a Web server from the same vendor, so it does not specify the contract between these two entities. A Web server can host one or more Web containers.
What is Web server provider
A vendor that supplies a Web server.
What is Web service
An application that exists in a distributed environment, such as the Internet. A Web service accepts a request, performs its function based on the request, and returns a response. The request and the response can be part of the same operation, or they can occur separately, in which case the consumer does not need to wait for a response. Both the request and the response usually take the form of XML, a portable data-interchange format, and are delivered over a wire protocol, such as HTTP.
An application that exists in a distributed environment, such as the Internet. A Web service accepts a request, performs its function based on the request, and returns a response. The request and the response can be part of the same operation, or they can occur separately, in which case the consumer does not need to wait for a response. Both the request and the response usually take the form of XML, a portable data-interchange format, and are delivered over a wire protocol, such as HTTP.
What is well-formed
An XML document that is syntactically correct. It does not have any angle brackets that are not part of tags, all tags have an ending tag or are themselves self-ending, and all tags are fully nested. Knowing that a document is well formed makes it possible to process it. However, a well-formed document may not be valid. To determine that, you need a validating parser and a DTD.
An XML document that is syntactically correct. It does not have any angle brackets that are not part of tags, all tags have an ending tag or are themselves self-ending, and all tags are fully nested. Knowing that a document is well formed makes it possible to process it. However, a well-formed document may not be valid. To determine that, you need a validating parser and a DTD.
What is Xalan
An interpreting version of XSLT.
An interpreting version of XSLT.
What is XHTML
An XML look-alike for HTML defined by one of several XHTML DTDs. To use XHTML for everything would of course defeat the purpose of XML, because the idea of XML is to identify information content, and not just to tell how to display it. You can reference it in a DTD, which allows you to say, for example, that the text in an element can contain <em> and <b> tags rather than being limited to plain text.
An XML look-alike for HTML defined by one of several XHTML DTDs. To use XHTML for everything would of course defeat the purpose of XML, because the idea of XML is to identify information content, and not just to tell how to display it. You can reference it in a DTD, which allows you to say, for example, that the text in an element can contain <em> and <b> tags rather than being limited to plain text.
What is XLink
The part of the XLL specification that is concerned with specifying links between documents.
The part of the XLL specification that is concerned with specifying links between documents.
What is XLL
The XML Link Language specification, consisting of XLink and XPointer.
What is XML
Extensible Markup Language. A markup language that allows you to define the tags (markup) needed to identify the content, data, and text in XML documents. It differs from HTML, the markup language most often used to present information on the Internet. HTML has fixed tags that deal mainly with style or presentation. An XML document must undergo a transformation into a language with style tags under the control of a style sheet before it can be presented by a browser or other presentation mechanism. Two types of style sheets used with XML are CSS and XSL. Typically, XML is transformed into HTML for presentation. Although tags can be defined as needed in the generation of an XML document, a document type definition (DTD) can be used to define the elements allowed in a particular type of document. A document can be compared by using the rules in the DTD to determine its validity and to locate particular elements in the document. A Web services application’s J2EE deployment descriptors are expressed in XML with schemas defining allowed elements. Programs for processing XML documents use SAX or DOM APIs.
The XML Link Language specification, consisting of XLink and XPointer.
What is XML
Extensible Markup Language. A markup language that allows you to define the tags (markup) needed to identify the content, data, and text in XML documents. It differs from HTML, the markup language most often used to present information on the Internet. HTML has fixed tags that deal mainly with style or presentation. An XML document must undergo a transformation into a language with style tags under the control of a style sheet before it can be presented by a browser or other presentation mechanism. Two types of style sheets used with XML are CSS and XSL. Typically, XML is transformed into HTML for presentation. Although tags can be defined as needed in the generation of an XML document, a document type definition (DTD) can be used to define the elements allowed in a particular type of document. A document can be compared by using the rules in the DTD to determine its validity and to locate particular elements in the document. A Web services application’s J2EE deployment descriptors are expressed in XML with schemas defining allowed elements. Programs for processing XML documents use SAX or DOM APIs.
What is XML registry
See registry.
See registry.
What is XML Schema
The W3C specification for defining the structure, content, and semantics of XML documents.
The W3C specification for defining the structure, content, and semantics of XML documents.
What is XPath
An addressing mechanism for identifying the parts of an XML document.
An addressing mechanism for identifying the parts of an XML document.
What is XPointer
The part of the XLL specification that is concerned with identifying sections of documents so that they can be referenced in links or included in other documents. What is XSL
Extensible Stylesheet Language. A standard that lets you do the following:
Specify an addressing mechanism, so that you can identify the parts of an XML document that a transformation applies to (XPath).
Specify tag conversions, so that you can convert XML data into different formats (XSLT).
Specify display characteristics, such page sizes, margins, and font heights and widths, as well as the flow objects on each page. Information fills in one area of a page and then automatically flows to the next object when that area fills up. That allows you to wrap text around pictures, for example, or to continue a newsletter article on a different page (XSL-FO).
The part of the XLL specification that is concerned with identifying sections of documents so that they can be referenced in links or included in other documents. What is XSL
Extensible Stylesheet Language. A standard that lets you do the following:
Specify an addressing mechanism, so that you can identify the parts of an XML document that a transformation applies to (XPath).
Specify tag conversions, so that you can convert XML data into different formats (XSLT).
Specify display characteristics, such page sizes, margins, and font heights and widths, as well as the flow objects on each page. Information fills in one area of a page and then automatically flows to the next object when that area fills up. That allows you to wrap text around pictures, for example, or to continue a newsletter article on a different page (XSL-FO).
What is XSL-FO
A subcomponent of XSL used for describing font sizes, page layouts, and how information flows from one page to another.
A subcomponent of XSL used for describing font sizes, page layouts, and how information flows from one page to another.
What is XSLT
XSL Transformations. An XML document that controls the transformation of an XML document into another XML document or HTML. The target document often has presentation-related tags dictating how it will be rendered by a browser or other presentation mechanism. XSLT was formerly a part of XSL, which also included a tag language of style flow objects.
XSL Transformations. An XML document that controls the transformation of an XML document into another XML document or HTML. The target document often has presentation-related tags dictating how it will be rendered by a browser or other presentation mechanism. XSLT was formerly a part of XSL, which also included a tag language of style flow objects.
What is XSLTC
A compiling version of XSLT
A compiling version of XSLT
J2ME questions::
What is 3G
Third generation (3G) wireless networks will offer faster data transfer rates than current networks. The first generation of
wireless (1G) was analog cellular. The second generation (2G) is digital cellular, featuring integrated voice and data
communications. So-called 2.5G networks offer incremental speed increases. 3G networks will offer dramatically improved data
transfer rates, enabling new wireless applications such as streaming media.
Third generation (3G) wireless networks will offer faster data transfer rates than current networks. The first generation of
wireless (1G) was analog cellular. The second generation (2G) is digital cellular, featuring integrated voice and data
communications. So-called 2.5G networks offer incremental speed increases. 3G networks will offer dramatically improved data
transfer rates, enabling new wireless applications such as streaming media.
What is 3GPP
The 3rd Generation Partnership Project (3GPP) is a global collaboration between 6 partners: ARIB, CWTS, ETSI, T1, TTA, and
TTC. The group aims to develop a globally accepted 3rd-generation mobile system based on GSM.
The 3rd Generation Partnership Project (3GPP) is a global collaboration between 6 partners: ARIB, CWTS, ETSI, T1, TTA, and
TTC. The group aims to develop a globally accepted 3rd-generation mobile system based on GSM.
What is 802.11
802.11 is a group of specifications for wireless networks developed by the Institute of Electrical and Electronics Engineers
(IEEE). 802.11 uses the Ethernet protocol and CSMA/CA (carrier sense multiple access with collision avoidance) for path
sharing.
What is API
An Application Programming Interface (API) is a set of classes that you can use in your own application. Sometimes called
libraries or modules, APIs enable you to write an application without reinventing common pieces of code. For example, a
networking API is something your application can use to make network connections, without your ever having to understand the
underlying code.
802.11 is a group of specifications for wireless networks developed by the Institute of Electrical and Electronics Engineers
(IEEE). 802.11 uses the Ethernet protocol and CSMA/CA (carrier sense multiple access with collision avoidance) for path
sharing.
What is API
An Application Programming Interface (API) is a set of classes that you can use in your own application. Sometimes called
libraries or modules, APIs enable you to write an application without reinventing common pieces of code. For example, a
networking API is something your application can use to make network connections, without your ever having to understand the
underlying code.
What is AMPS
Advanced Mobile Phone Service (AMPS) is a first-generation analog, circuit-switchedcellular phone network. Originally
operating in the 800 MHz band, service was later expanded to include transmissions in the 1900 MHz band, the VHF range in
which most wireless carriers operate. Because AMPS uses analog signals, it cannot transmit digital signals and cannot
transport data packets without assistance from newer technologies such as TDMA and CDMA.
Advanced Mobile Phone Service (AMPS) is a first-generation analog, circuit-switchedcellular phone network. Originally
operating in the 800 MHz band, service was later expanded to include transmissions in the 1900 MHz band, the VHF range in
which most wireless carriers operate. Because AMPS uses analog signals, it cannot transmit digital signals and cannot
transport data packets without assistance from newer technologies such as TDMA and CDMA.
What is CDC
The Connected Device Configuration (CDC) is a specification for a J2ME configuration. Conceptually, CDC deals with devices
with more memory and processing power than CLDC; it is for devices with an always-on network connection and a minimum of 2 MB
of memory available for the Java system.
What is CDMA
Code-Division Multiple Access (CDMA) is a cellular technology widely used in North America. There are currently three CDMA
standards: CDMA One, CDMA2000 and W-CDMA. CDMA technology uses UHF 800Mhz-1.9Ghz frequencies and bandwidth ranges from 115Kbs
to 2Mbps.
The Connected Device Configuration (CDC) is a specification for a J2ME configuration. Conceptually, CDC deals with devices
with more memory and processing power than CLDC; it is for devices with an always-on network connection and a minimum of 2 MB
of memory available for the Java system.
What is CDMA
Code-Division Multiple Access (CDMA) is a cellular technology widely used in North America. There are currently three CDMA
standards: CDMA One, CDMA2000 and W-CDMA. CDMA technology uses UHF 800Mhz-1.9Ghz frequencies and bandwidth ranges from 115Kbs
to 2Mbps.
What is CDMA One
Also know as IS-95, CDMAOne is a 2nd generation wireless technology. Supports speeds from 14.4Kbps to 115K bps.
Also know as IS-95, CDMAOne is a 2nd generation wireless technology. Supports speeds from 14.4Kbps to 115K bps.
What is CDMA2000
Also known as IS-136, CDMA2000 is a 3rd generation wireless technology. Supports speeds ranging from 144Kbps to 2Mbps.
Also known as IS-136, CDMA2000 is a 3rd generation wireless technology. Supports speeds ranging from 144Kbps to 2Mbps.
What is CDPD
Developed by Nortel Networks, Cellular Digital Packet Data (CDPD) is an open standard for supporting wireless Internet access
from cellular devices. CDPD also supports Multicast, which allows content providers to efficiently broadcast information to
many devices at the same time.
What is cHTML
Compact HTML (cHTML) is a subset of HTML which is designed for small devices. The major features of HTML that are excluded
from cHTML are: JPEG image, Table, Image map, Multiple character fonts and styles, Background color and image, Frame and
Style sheet.
Developed by Nortel Networks, Cellular Digital Packet Data (CDPD) is an open standard for supporting wireless Internet access
from cellular devices. CDPD also supports Multicast, which allows content providers to efficiently broadcast information to
many devices at the same time.
What is cHTML
Compact HTML (cHTML) is a subset of HTML which is designed for small devices. The major features of HTML that are excluded
from cHTML are: JPEG image, Table, Image map, Multiple character fonts and styles, Background color and image, Frame and
Style sheet.
What is CLDC
The Connected, Limited Device Configuration (CLDC) is a specification for a J2ME configuration. The CLDC is for devices with
less than 512 KB or RAM available for the Java system and an intermittent (limited) network connection. It specifies a
stripped-down Java virtual machine1 called the KVM as well as several APIs for fundamental application services. Three
packages are minimalist versions of the J2SE java.lang, java.io, and java.util packages. A fourth package,
javax.microedition.io, implements the Generic Connection Framework, a generalized API for making network connections.
The Connected, Limited Device Configuration (CLDC) is a specification for a J2ME configuration. The CLDC is for devices with
less than 512 KB or RAM available for the Java system and an intermittent (limited) network connection. It specifies a
stripped-down Java virtual machine1 called the KVM as well as several APIs for fundamental application services. Three
packages are minimalist versions of the J2SE java.lang, java.io, and java.util packages. A fourth package,
javax.microedition.io, implements the Generic Connection Framework, a generalized API for making network connections.
What is configuration
In J2ME, a configuration defines the minimum Java runtime environment for a family of devices: the combination of a Java
virtual machine (either the standard J2SE virtual machine or a much more limited version called the CLDC VM) and a core set
of APIs. CDC and CLDC are configurations. See also profile, optional package.
What is CVM
The Compact Virtual Machine (CVM) is an optimized Java virtual machine1 (JVM) that is used by the CDC.
In J2ME, a configuration defines the minimum Java runtime environment for a family of devices: the combination of a Java
virtual machine (either the standard J2SE virtual machine or a much more limited version called the CLDC VM) and a core set
of APIs. CDC and CLDC are configurations. See also profile, optional package.
What is CVM
The Compact Virtual Machine (CVM) is an optimized Java virtual machine1 (JVM) that is used by the CDC.
What is Deck
A deck is a collection of one or more WML cards that can be downloaded, to a mobile phone, as a single entity.
A deck is a collection of one or more WML cards that can be downloaded, to a mobile phone, as a single entity.
What is EDGE
Enhanced Data GSM Environment (EDGE) is a new, faster version of GSM. EDGE is designed to support transfer rates up to
384Kbps and enable the delivery of video and other high-bandwidth applications. EDGE is the result of a joint effort between
TDMA operators, vendors and carriers and the GSM Alliance.
Enhanced Data GSM Environment (EDGE) is a new, faster version of GSM. EDGE is designed to support transfer rates up to
384Kbps and enable the delivery of video and other high-bandwidth applications. EDGE is the result of a joint effort between
TDMA operators, vendors and carriers and the GSM Alliance.
What is ETSI
The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications
standards for Europe.
The European Telecommunications Standards Institute (ETSI) is a non-profit organization that establishes telecommunications
standards for Europe.
What is FDMA
Frequency-division multiple-access (FDMA) is a mechanism for sharing a radio frequency band among multiple users by dividing
it into a number of smaller bands.
What is Foundation Profile
The Foundation Profile is a J2ME profile specification that builds on CDC. It adds additional classes and interfaces to the
CDC APIs but does not go so far as to specify user interface APIs, persistent storage, or application life cycle. Other J2ME
profiles build on the CDC/Foundation combination: for example, the Personal Profile and the RMI Profile both build on the
Foundation Profile.
Frequency-division multiple-access (FDMA) is a mechanism for sharing a radio frequency band among multiple users by dividing
it into a number of smaller bands.
What is Foundation Profile
The Foundation Profile is a J2ME profile specification that builds on CDC. It adds additional classes and interfaces to the
CDC APIs but does not go so far as to specify user interface APIs, persistent storage, or application life cycle. Other J2ME
profiles build on the CDC/Foundation combination: for example, the Personal Profile and the RMI Profile both build on the
Foundation Profile.
What is Generic Connection Framework
The Generic Connection Framework (GCF) makes it easy for wireless devices to make network connections. It is part of CLDC and
CDC and resides in the javax.microedition.io package.
The Generic Connection Framework (GCF) makes it easy for wireless devices to make network connections. It is part of CLDC and
CDC and resides in the javax.microedition.io package.
What is GPRS
The General Packet Radio System (GPRS) is the next generation of GSM. It will be the basis of 3G networks in Europe and
elsewhere.
The General Packet Radio System (GPRS) is the next generation of GSM. It will be the basis of 3G networks in Europe and
elsewhere.
What is GSM
The Global System for Mobile Communications (GSM) is a wireless network system that is widely used in Europe, Asia, and
Australia. GSM is used at three different frequencies: GSM900 and GSM1800 are used in Europe, Asia, and Australia, while
GSM1900 is deployed in North America and other parts of the world.
What is HLR
The Home Location Register (HLR) is a database for permanent storage of subscriber data and service profiles.
The Global System for Mobile Communications (GSM) is a wireless network system that is widely used in Europe, Asia, and
Australia. GSM is used at three different frequencies: GSM900 and GSM1800 are used in Europe, Asia, and Australia, while
GSM1900 is deployed in North America and other parts of the world.
What is HLR
The Home Location Register (HLR) is a database for permanent storage of subscriber data and service profiles.
What is HTTPS
Hyper Text Transfer Protocol Secure sockets (HTTPS) is a protocol for transmission of encrypted hypertext over Secure Sockets
Layer.
Hyper Text Transfer Protocol Secure sockets (HTTPS) is a protocol for transmission of encrypted hypertext over Secure Sockets
Layer.
What is i-appli
Sometimes called “Java for i-mode”, i-appli is a Java environment based on CLDC. It is used on handsets in NTT DoCoMo’s
i-mode service. While i-appli is similar to MIDP, it was developed before the MIDP specification was finished and the two
APIs are incompatible.
Sometimes called “Java for i-mode”, i-appli is a Java environment based on CLDC. It is used on handsets in NTT DoCoMo’s
i-mode service. While i-appli is similar to MIDP, it was developed before the MIDP specification was finished and the two
APIs are incompatible.
What is IDE
An Integrated Development Environment (IDE) provides a programming environment as a single application. IDEs typically bundle
a compiler, debugger, and GUI builder tog ether. Forte for Java is Sun’s Java IDE.
An Integrated Development Environment (IDE) provides a programming environment as a single application. IDEs typically bundle
a compiler, debugger, and GUI builder tog ether. Forte for Java is Sun’s Java IDE.
What is iDEN
The Integrated Dispatch Enhanced Network (iDEN) is a wireless network system developed by Motorola. Various carriers support
iDEN networks around the world: Nextel is one of the largest carriers, with networks covering North and South America.
What is i-mode
A standard used by Japanese wireless devices to access cHTML (compact HTML) Web sites and display animated GIFs and other
multimedia content.
The Integrated Dispatch Enhanced Network (iDEN) is a wireless network system developed by Motorola. Various carriers support
iDEN networks around the world: Nextel is one of the largest carriers, with networks covering North and South America.
What is i-mode
A standard used by Japanese wireless devices to access cHTML (compact HTML) Web sites and display animated GIFs and other
multimedia content.
What is J2ME
Java 2, Micro Edition is a group of specifications and technologies that pertain to Java on small devices. The J2ME moniker
covers a wide range of devices, from pagers and mobile telephones through set-top boxes and car navigation systems. The J2ME
world is divided into configurations and profiles, specifications that describe a Java environment for a specific class of
device.
Java 2, Micro Edition is a group of specifications and technologies that pertain to Java on small devices. The J2ME moniker
covers a wide range of devices, from pagers and mobile telephones through set-top boxes and car navigation systems. The J2ME
world is divided into configurations and profiles, specifications that describe a Java environment for a specific class of
device.
What is J2ME WTK
The J2ME Wireless Toolkit is a set of tools that provides developers with an emulation environment, documentation and
examples for developing Java applications for small devices. The J2ME WTK is based on the Connected Limited Device
Configuration (CLDC) and Mobile Information Device Profile (MIDP) reference implementations, and can be tightly integrated
with Forte for Java
The J2ME Wireless Toolkit is a set of tools that provides developers with an emulation environment, documentation and
examples for developing Java applications for small devices. The J2ME WTK is based on the Connected Limited Device
Configuration (CLDC) and Mobile Information Device Profile (MIDP) reference implementations, and can be tightly integrated
with Forte for Java
What is Java Card
The Java Card specification allows Java technology to run on smart cards and other small devices. The Java Card API is
compatible with formal international standards, such as, ISO7816, and industry-specific standards, such as, Europay/Master
Card/Visa (EMV).
What is JavaHQ
JavaHQ is the Java platform control center on your Palm OS device.
The Java Card specification allows Java technology to run on smart cards and other small devices. The Java Card API is
compatible with formal international standards, such as, ISO7816, and industry-specific standards, such as, Europay/Master
Card/Visa (EMV).
What is JavaHQ
JavaHQ is the Java platform control center on your Palm OS device.
What is JCP
The Java Community Process (JCP) an open organization of international Java developers and licensees who develop and revise
Java technology specifications, reference implementations, and technology compatibility kits through a formal process.
The Java Community Process (JCP) an open organization of international Java developers and licensees who develop and revise
Java technology specifications, reference implementations, and technology compatibility kits through a formal process.
What is JDBC for CDC/FP
The JDBC Optional Package for CDC/Foundation Profile (JDBCOP for CDC/FP) is an API that enables mobile Java applications to
communicate with relational database servers using a subset of J2SE’s Java Database Connectivity. This optional package is a
strict subset of JDBC 3.0 that excludes some of JDBC’s advanced and server-oriented features, such as pooled connections and
array types. It’s meant for use with the Foundation Profile or its supersets.
The JDBC Optional Package for CDC/Foundation Profile (JDBCOP for CDC/FP) is an API that enables mobile Java applications to
communicate with relational database servers using a subset of J2SE’s Java Database Connectivity. This optional package is a
strict subset of JDBC 3.0 that excludes some of JDBC’s advanced and server-oriented features, such as pooled connections and
array types. It’s meant for use with the Foundation Profile or its supersets.
What is JSR
Java Specification Request (JSR) is the actual description of proposed and final specifications for the Java platform. JSRs
are reviewed by the JCP and the public before a final release of a specification is made.
Java Specification Request (JSR) is the actual description of proposed and final specifications for the Java platform. JSRs
are reviewed by the JCP and the public before a final release of a specification is made.
What is KittyHawk
KittyHawk is a set of APIs used by LG Telecom on its IBook and p520 devices. KittyHawk is based on CLDC. It is conceptually
similar to MIDP but the two APIs are incompatible.
KittyHawk is a set of APIs used by LG Telecom on its IBook and p520 devices. KittyHawk is based on CLDC. It is conceptually
similar to MIDP but the two APIs are incompatible.
What is KJava
KJava is an outdated term for J2ME. It comes from an early package of Java software for PalmOS, released at the 2000 JavaOne
show. The classes for that release were packaged in the com.sun.kjava package.
KJava is an outdated term for J2ME. It comes from an early package of Java software for PalmOS, released at the 2000 JavaOne
show. The classes for that release were packaged in the com.sun.kjava package.
What is kSOAP
kSOAP is a SOAP API suitable for the J2ME, based on kXML.
kSOAP is a SOAP API suitable for the J2ME, based on kXML.
What is kXML
The kXML project provides a small footprint XML parser that can be used with J2ME.
The kXML project provides a small footprint XML parser that can be used with J2ME.
What is KVM
The KVM is a compact Java virtual machine (JVM) that is designed for small devices. It supports a subset of the features of
the JVM. For example, the KVM does not support floating-point operations and object finalization. The CLDC specifies use of
the KVM. According to folklore, the ‘K’ in KVM stands for kilobyte, signifying that the KVM runs in kilobytes of memory as
opposed to megabytes.
What is LAN
A Local Area Network (LAN) is a group of devices connected with various communications technologies in a small geographic
area. Ethernet is the most widely-used LAN technology. Communication on a LAN can either be with Peer-to-Peer devices or
Client-Server devices.
The KVM is a compact Java virtual machine (JVM) that is designed for small devices. It supports a subset of the features of
the JVM. For example, the KVM does not support floating-point operations and object finalization. The CLDC specifies use of
the KVM. According to folklore, the ‘K’ in KVM stands for kilobyte, signifying that the KVM runs in kilobytes of memory as
opposed to megabytes.
What is LAN
A Local Area Network (LAN) is a group of devices connected with various communications technologies in a small geographic
area. Ethernet is the most widely-used LAN technology. Communication on a LAN can either be with Peer-to-Peer devices or
Client-Server devices.
What is LCDUI
LCDUI is a shorthand way of referring to the MIDP user interface APIs, contained in the javax.microedition.lcdui package.
Strictly speaking, LCDUI stands for Liquid Crystal Display User Interface. It’s a user interface toolkit for small device
screens which are commonly LCD screens.
LCDUI is a shorthand way of referring to the MIDP user interface APIs, contained in the javax.microedition.lcdui package.
Strictly speaking, LCDUI stands for Liquid Crystal Display User Interface. It’s a user interface toolkit for small device
screens which are commonly LCD screens.
What is MExE
The Mobile Execution Environment (MExE) is a specification created by the 3GPP which details an applicatio n environment for
next generation mobile devices. MExE consists of a variety of technologies including WAP, J2ME, CLDC and MIDP.
The Mobile Execution Environment (MExE) is a specification created by the 3GPP which details an applicatio n environment for
next generation mobile devices. MExE consists of a variety of technologies including WAP, J2ME, CLDC and MIDP.
What is MIDlet
A MIDlet is an application written for MIDP. MIDlet applications are subclasses of the javax.microedition.midlet.MIDlet class
that is defined by MIDP.
What is MIDlet suite
MIDlets are packaged and distributed as MIDlet suites. A MIDlet suite can contain one or more MIDlets. The MIDlet suite
consists of two files, an application descriptor file with a .jad extension and an archive file with a .jar file. The
descriptor lists the archive file name, the names and class names for each MIDlet in the suite, and other information. The
archive file contains the MIDlet classes and resource files.
A MIDlet is an application written for MIDP. MIDlet applications are subclasses of the javax.microedition.midlet.MIDlet class
that is defined by MIDP.
What is MIDlet suite
MIDlets are packaged and distributed as MIDlet suites. A MIDlet suite can contain one or more MIDlets. The MIDlet suite
consists of two files, an application descriptor file with a .jad extension and an archive file with a .jar file. The
descriptor lists the archive file name, the names and class names for each MIDlet in the suite, and other information. The
archive file contains the MIDlet classes and resource files.
What is MIDP
The Mobile Information Device Profile (MIDP) is a specification for a J2ME profile. It is layered on top of CLDC and adds
APIs for application life cycle, user interface, networking, and persistent storage.
The Mobile Information Device Profile (MIDP) is a specification for a J2ME profile. It is layered on top of CLDC and adds
APIs for application life cycle, user interface, networking, and persistent storage.
What is MIDP-NG
The Next Generation MIDP specification is currently under development by the Java Community Process. Planned improvements
include XML parsing and cryptographic support.
The Next Generation MIDP specification is currently under development by the Java Community Process. Planned improvements
include XML parsing and cryptographic support.
What is Mobitex
Mobitex is a packet-switched, narrowband PCS network, designed for wide-area wireless data communications. It was developed
in 1984 by Eritel, an Ericsson subsidiary, a nd there are now over 30 Mobitex networks in operation worldwide.
What is Modulation
Modulation is the method by which a high-frequency digital signal is grafted onto a lower-frequency analog wave, so that
digital packets are able to ride piggyback on the analog airwave.
Mobitex is a packet-switched, narrowband PCS network, designed for wide-area wireless data communications. It was developed
in 1984 by Eritel, an Ericsson subsidiary, a nd there are now over 30 Mobitex networks in operation worldwide.
What is Modulation
Modulation is the method by which a high-frequency digital signal is grafted onto a lower-frequency analog wave, so that
digital packets are able to ride piggyback on the analog airwave.
What is MSC
A Mobile Switching Center (MSC) is a unit within a cellular phone network that automatically coordinates and switches calls
in a given cell. It monitors each caller’s signal strength, and when a signal begins to fade, it hands off the call to
another MSC that’s better positioned to manage the call.
A Mobile Switching Center (MSC) is a unit within a cellular phone network that automatically coordinates and switches calls
in a given cell. It monitors each caller’s signal strength, and when a signal begins to fade, it hands off the call to
another MSC that’s better positioned to manage the call.
What is Obfuscation
Obfuscation is a technique used to complicate code. Obfuscation makes code harder to understand when it is de-compiled, but
it typically has no affect on the functionality of the code. Obfuscation programs can be used to protect Java programs by
making them harder to reverse-engineer.
Obfuscation is a technique used to complicate code. Obfuscation makes code harder to understand when it is de-compiled, but
it typically has no affect on the functionality of the code. Obfuscation programs can be used to protect Java programs by
making them harder to reverse-engineer.
What is optional package
An optional package is a set of J2ME APIs providing services in a specific area, such as database access or multimedia.
Unlike a profile, it does not define a complete application environment, but rather is used in conjunction with a
configuration or a profile. It extends the runtime environment to support device capabilities that are not universal enough
to be defined as part of a profile or that need to be shared by different profiles. J2ME RMI and the Mobile Media RMI are
examples of optional packages.
What is OTA
Over The Air (OTA) refers to any wireless networking technology.
An optional package is a set of J2ME APIs providing services in a specific area, such as database access or multimedia.
Unlike a profile, it does not define a complete application environment, but rather is used in conjunction with a
configuration or a profile. It extends the runtime environment to support device capabilities that are not universal enough
to be defined as part of a profile or that need to be shared by different profiles. J2ME RMI and the Mobile Media RMI are
examples of optional packages.
What is OTA
Over The Air (OTA) refers to any wireless networking technology.
What is PCS
Personal Communications Service (PCS) is a suite of second-generation, digitally modulated mobile-communications interfaces
that includes TDMA, CDMA, and GSM. PCS serves as an umbrella term for second-generation wireless technologies operating in
the 1900MHz range
Personal Communications Service (PCS) is a suite of second-generation, digitally modulated mobile-communications interfaces
that includes TDMA, CDMA, and GSM. PCS serves as an umbrella term for second-generation wireless technologies operating in
the 1900MHz range
What is PDAP
The Personal Digital Assistant Profile (PDAP) is a J2ME profile specification designed for small platforms such as PalmOS
devices. You can think of PDAs as being larger than mobile phones but smaller than set-top boxes. PDAP is built on top of
CLDC and will specify user interface and persistent storage APIs. PDAP is currently being developed using the Java Community
Process (JCP).
The Personal Digital Assistant Profile (PDAP) is a J2ME profile specification designed for small platforms such as PalmOS
devices. You can think of PDAs as being larger than mobile phones but smaller than set-top boxes. PDAP is built on top of
CLDC and will specify user interface and persistent storage APIs. PDAP is currently being developed using the Java Community
Process (JCP).
What is PDC
Personal Digital Cellular (PDC) is a Japanese standard for wireless communications.
What is PDCP
Parallel and Distributed Computing Practices (PDCP) are often used to describe computer systems that are spread over many
devices on a network (wired or wireless) where many nodes process data simultaneously.
Personal Digital Cellular (PDC) is a Japanese standard for wireless communications.
What is PDCP
Parallel and Distributed Computing Practices (PDCP) are often used to describe computer systems that are spread over many
devices on a network (wired or wireless) where many nodes process data simultaneously.
What is Personal Profile
The Personal Profile is a J2ME profile specification. Layered on the Foundation Profile and CDC, the Personal Profile will be
the next generation of PersonalJava technology. The specification is currently in development under the Java Community
Process (JCP).
The Personal Profile is a J2ME profile specification. Layered on the Foundation Profile and CDC, the Personal Profile will be
the next generation of PersonalJava technology. The specification is currently in development under the Java Community
Process (JCP).
What is PersonalJava
PersonalJava is a Java environment based on the Java virtual machine1 (JVM) and a set of APIs similar to a JDK 1.1
environment. It includes the Touchable Look and Feel (also called Truffle), a graphic toolkit that is optimized for consumer
devices with a touch sensitive screen. PersonalJava will be included in J2ME in the upcoming Personal Profile, which is built
on CDC.
PersonalJava is a Java environment based on the Java virtual machine1 (JVM) and a set of APIs similar to a JDK 1.1
environment. It includes the Touchable Look and Feel (also called Truffle), a graphic toolkit that is optimized for consumer
devices with a touch sensitive screen. PersonalJava will be included in J2ME in the upcoming Personal Profile, which is built
on CDC.
What is PNG
Portable Network Graphics (PNG) is an image format offering lossless compression and storage flexibility. The MIDP
specification requires implementations to recognize certain types of PNG images.
What is POSE
Palm OS Emulator (POSE).
Portable Network Graphics (PNG) is an image format offering lossless compression and storage flexibility. The MIDP
specification requires implementations to recognize certain types of PNG images.
What is POSE
Palm OS Emulator (POSE).
What is PRC
Palm Resource Code (PRC) is the file format for Palm OS applications.
Palm Resource Code (PRC) is the file format for Palm OS applications.
What is preverification
Due to memory and processing power available on a device, the verification process of classes are split into two processes.
The first process is the preverification which is off-device and done using the preverify tool. The second process is
verification which is done on-device.
Due to memory and processing power available on a device, the verification process of classes are split into two processes.
The first process is the preverification which is off-device and done using the preverify tool. The second process is
verification which is done on-device.
What is profile
A profile is a set of APIs added to a configuration to support specific uses of a mobile device. Along with its underlying
configuration, a profile defines a complete, and usually self-contained, general-purpose application environment. Profiles
often, but not always, define APIs for user interface and persistence; the MIDP profile, based on the CLDC configuration,
fits this pattern. Profiles may be supersets or subsets of other profiles; the Personal Basis Profile is a subset of the
Personal Profile and a superset of the Foundation Profile. See also configuration, optional package.
A profile is a set of APIs added to a configuration to support specific uses of a mobile device. Along with its underlying
configuration, a profile defines a complete, and usually self-contained, general-purpose application environment. Profiles
often, but not always, define APIs for user interface and persistence; the MIDP profile, based on the CLDC configuration,
fits this pattern. Profiles may be supersets or subsets of other profiles; the Personal Basis Profile is a subset of the
Personal Profile and a superset of the Foundation Profile. See also configuration, optional package.
What is Provisioning
In telecommunications terms, provisioning means to provide telecommunications services to a user. This includes providing all
necessary hardware, software, and wiring or transmission devices.
What is PSTN
The public service telephone network (PSTN) is the traditional, land-line based system for exchanging phone calls.
In telecommunications terms, provisioning means to provide telecommunications services to a user. This includes providing all
necessary hardware, software, and wiring or transmission devices.
What is PSTN
The public service telephone network (PSTN) is the traditional, land-line based system for exchanging phone calls.
What is RMI
Remote method invocation (RMI) is a feature of J2SE that enables Java objects running in one virtual machine to invoke
methods of Java objects running in another virtual machine, seamlessly.
Remote method invocation (RMI) is a feature of J2SE that enables Java objects running in one virtual machine to invoke
methods of Java objects running in another virtual machine, seamlessly.
What is RMI OP
The RMI Optional Package (RMI OP) is a subset of J2SE 1.3’s RMI functionality used in CDC-based profiles that incorporate the
Foundation Profile, such as the Personal Basis Profile and the Personal Profile. The RMIOP cannot be used with CLDC-based
profiles because they lack object serialization and other important features found only in CDC-based profiles. RMIOP supports
most of the J2SE RMI functionality, including the Java Remote Method Protocol, marshalled objects, distributed garbage
collection, registry-based object lookup, and network class loading, but not HTTP tunneling or the Java 1.1 stub protocol.
The RMI Optional Package (RMI OP) is a subset of J2SE 1.3’s RMI functionality used in CDC-based profiles that incorporate the
Foundation Profile, such as the Personal Basis Profile and the Personal Profile. The RMIOP cannot be used with CLDC-based
profiles because they lack object serialization and other important features found only in CDC-based profiles. RMIOP supports
most of the J2SE RMI functionality, including the Java Remote Method Protocol, marshalled objects, distributed garbage
collection, registry-based object lookup, and network class loading, but not HTTP tunneling or the Java 1.1 stub protocol.
What is RMI Profile
The RMI Profile is a J2ME profile specification designed to support Java’s Remote Method Invocation (RMI) distributed object
system. Devices implementing the RMI Profile will be able to interoperate via RMI with other Java devices, including Java 2,
Standard Edition. The RMI Profile is based on the Foundation Profile, which in turn is based on CDC.
What is RMS
The Record Management System (RMS) is a simple record-oriented database that allows a MIDlet to persistently store
information and retrieve it later. Different MIDlets can also use the RMS to share data.
The RMI Profile is a J2ME profile specification designed to support Java’s Remote Method Invocation (RMI) distributed object
system. Devices implementing the RMI Profile will be able to interoperate via RMI with other Java devices, including Java 2,
Standard Edition. The RMI Profile is based on the Foundation Profile, which in turn is based on CDC.
What is RMS
The Record Management System (RMS) is a simple record-oriented database that allows a MIDlet to persistently store
information and retrieve it later. Different MIDlets can also use the RMS to share data.
What is SDK
A Software Development Kit (SDK) is a set of tools used to develop applications for a particular platform. An SDK typically
contains a compiler, linker, and debugger. It may also contain libraries and documentation for APIs.
A Software Development Kit (SDK) is a set of tools used to develop applications for a particular platform. An SDK typically
contains a compiler, linker, and debugger. It may also contain libraries and documentation for APIs.
What is SIM
A Subscriber Identity Module (SIM) is a stripped-down smart card containing information about the identity of a cell-phone
subscriber, and subscriber authentication and service information. Because the SIM uniquely identifies the subscriber and is
portable among handsets, the user can move it from one kind of phone to another, facilitating international roaming.
A Subscriber Identity Module (SIM) is a stripped-down smart card containing information about the identity of a cell-phone
subscriber, and subscriber authentication and service information. Because the SIM uniquely identifies the subscriber and is
portable among handsets, the user can move it from one kind of phone to another, facilitating international roaming.
What is SMS
Short Message Service (SMS) is a point-to-point service similar to paging for sending text messages of up to 160 characters
to mobile phones.
What is SOAP
The Simple Object Access Protocol (SOAP) is an XML- based protocol that allows objects of any type to communicated in a
distributed environment. SOAP is used in developing Web Services.
Short Message Service (SMS) is a point-to-point service similar to paging for sending text messages of up to 160 characters
to mobile phones.
What is SOAP
The Simple Object Access Protocol (SOAP) is an XML- based protocol that allows objects of any type to communicated in a
distributed environment. SOAP is used in developing Web Services.
What is SSL
Secure Sockets Layer (SSL) is a socket protocol that encrypts data sent over the network and provides authentication for the
socket endpoints.
Secure Sockets Layer (SSL) is a socket protocol that encrypts data sent over the network and provides authentication for the
socket endpoints.
What is T9
T9 is a text input method for mobile phones and other small devices. It replaces the “multi-tap” input method by guessing the
word that you are trying to enter. T9 may be embedded in a device by the manufacturer. Note that even if the device supports
T9, the Java implementation may or may not use it. Check your documentation for details.
T9 is a text input method for mobile phones and other small devices. It replaces the “multi-tap” input method by guessing the
word that you are trying to enter. T9 may be embedded in a device by the manufacturer. Note that even if the device supports
T9, the Java implementation may or may not use it. Check your documentation for details.
What is TDMA
Time Division Multiple Access (TDMA) is a second-generation modulation standard using bandwidth allocated in the 800 MHz, 900
MHz, and 1900MHz ranges.
Time Division Multiple Access (TDMA) is a second-generation modulation standard using bandwidth allocated in the 800 MHz, 900
MHz, and 1900MHz ranges.
What is Telematics
Telematics is a location-based service that routes event notification and control data over wireless networks to and from
mobile devices installed in automobiles. Telematics makes use of GPS technology to track vehicle latitude and longitude, and
displays maps in LED consoles mounted in dashboards. It connects to remote processing centers that turn provide server-side
Internet and voice services, as well as access to database resources.
What is Tomcat
Tomcat is a reference implementation of the Java servlet and JavaServer Pages (JSP) specifications. It is intended as a
platform for developing and testing
servlets.
Telematics is a location-based service that routes event notification and control data over wireless networks to and from
mobile devices installed in automobiles. Telematics makes use of GPS technology to track vehicle latitude and longitude, and
displays maps in LED consoles mounted in dashboards. It connects to remote processing centers that turn provide server-side
Internet and voice services, as well as access to database resources.
What is Tomcat
Tomcat is a reference implementation of the Java servlet and JavaServer Pages (JSP) specifications. It is intended as a
platform for developing and testing
servlets.
What is UDDI
Universal Description, Discovery, and Integration (UDDI) is an XML-based standard for describing, publishing, and finding Web
services. UDDI is a specification for a distributed registry of Web services.
Universal Description, Discovery, and Integration (UDDI) is an XML-based standard for describing, publishing, and finding Web
services. UDDI is a specification for a distributed registry of Web services.
What is UMTS
Developed by Nortel Networks, Universal Mobile Telecommunications Service (UMTS) is a standard that will provide cellular
users a consistent set of technologies no matter where they are located worldwide. UMTS utilizes W-CDMA technology.
Developed by Nortel Networks, Universal Mobile Telecommunications Service (UMTS) is a standard that will provide cellular
users a consistent set of technologies no matter where they are located worldwide. UMTS utilizes W-CDMA technology.
What is VLR
The Visitor Location Register (VLR) is a database that contains temporary information about subscribers.
What is WAE
The Wireless Application Environment (WAE) provides a application framework for small devices. WAE leverages other
technologies such as WAP, WTP, and WSP.
The Visitor Location Register (VLR) is a database that contains temporary information about subscribers.
What is WAE
The Wireless Application Environment (WAE) provides a application framework for small devices. WAE leverages other
technologies such as WAP, WTP, and WSP.
What is WAP
Wireless Application Protocol (WAP) is a protocol for transmitting data between servers and clients (usually small wireless
devices like mobile phones). WAP is analogous to HTTP in the World Wide Web. Many mobile phones include WAP browser software
to allow users access to Internet WAP sites.
Wireless Application Protocol (WAP) is a protocol for transmitting data between servers and clients (usually small wireless
devices like mobile phones). WAP is analogous to HTTP in the World Wide Web. Many mobile phones include WAP browser software
to allow users access to Internet WAP sites.
What is WAP Gateway
A WAP Gateway acts as a bridge allowing WAP devices to communicate with other networks (namely the Internet).
A WAP Gateway acts as a bridge allowing WAP devices to communicate with other networks (namely the Internet).
What is W-CDMA
Wideband Code-Division Multiple Access (W-CDMA), also known as IMT-2000, is a 3rd generation wireless technology. Supports
speeds up to 384Kbps on a wide-area network, or 2Mbps locally.
Wideband Code-Division Multiple Access (W-CDMA), also known as IMT-2000, is a 3rd generation wireless technology. Supports
speeds up to 384Kbps on a wide-area network, or 2Mbps locally.
What is WDP
Wireless Datagram Protocol (WDP) works as the transport layer of WAP. WDP processes datagrams from upper layers to formats
required by different physical datapaths, bearers, that may be for example GSM SMS or CDMA Packet Data. WDP is adapted to the
bearers available in the device so upper layers don’t need to care about the physical level.
Wireless Datagram Protocol (WDP) works as the transport layer of WAP. WDP processes datagrams from upper layers to formats
required by different physical datapaths, bearers, that may be for example GSM SMS or CDMA Packet Data. WDP is adapted to the
bearers available in the device so upper layers don’t need to care about the physical level.
What is WMA
The Wireless Messaging API (WMA) is a set of classes for sending and receiving Short Message Service messages. See also SMS.
The Wireless Messaging API (WMA) is a set of classes for sending and receiving Short Message Service messages. See also SMS.
What is WML
The Wireless Markup Language (WML) is a simple language used to create applications for small wireless devices like mobile
phones. WML is analogous to HTML in the World Wide Web.
What is WMLScript
WMLScript is a subset of the JavaScript scripting language designed as part of the WAP standard to provide a convenient
mechanism to access mobile phone’s peripheral functions.
The Wireless Markup Language (WML) is a simple language used to create applications for small wireless devices like mobile
phones. WML is analogous to HTML in the World Wide Web.
What is WMLScript
WMLScript is a subset of the JavaScript scripting language designed as part of the WAP standard to provide a convenient
mechanism to access mobile phone’s peripheral functions.
What is WSP
Wireless Session Protocol (WSP) implements session services of WAP. Sessions can be connection-oriented and connectionless
and they may be suspended and resumed at will.
Wireless Session Protocol (WSP) implements session services of WAP. Sessions can be connection-oriented and connectionless
and they may be suspended and resumed at will.
What is WTLS
Wireless Transport Layer Security protocal (WTLS) does all cryptography oriented features of WAP. WTLS handles
encryption/decryption, user authentication and data integrity. WTLS is based on the fixed network Transport Layer Security
protocal (TLS), formerly known as Secure Sockets Layer (SSL).
Wireless Transport Layer Security protocal (WTLS) does all cryptography oriented features of WAP. WTLS handles
encryption/decryption, user authentication and data integrity. WTLS is based on the fixed network Transport Layer Security
protocal (TLS), formerly known as Secure Sockets Layer (SSL).
What is WTP
Wireless Transaction Protocol (WTP) is WAP’s transaction protocol that works between the session protocol WSP and security
protocol WTLS. WTP chops data packets into lower level datagrams and concatenates received datagrams into useful data. WTP
also keeps track of received and sent packets and does re-transmissions and acknowledgment sending when needed
Wireless Transaction Protocol (WTP) is WAP’s transaction protocol that works between the session protocol WSP and security
protocol WTLS. WTP chops data packets into lower level datagrams and concatenates received datagrams into useful data. WTP
also keeps track of received and sent packets and does re-transmissions and acknowledgment sending when needed
JAVA QUESTIONS::
1. What is a transient variable?
A transient variable is a variable that may not be serialized.
A transient variable is a variable that may not be serialized.
2. Which containers use a border Layout as their default layout?
The window, Frame and Dialog classes use a border layout as their default layout.
The window, Frame and Dialog classes use a border layout as their default layout.
3. Why do threads block on I/O?
Threads block on I/O (that is enters the waiting state) so that other threads may execute while the I/O Operation is performed.
Threads block on I/O (that is enters the waiting state) so that other threads may execute while the I/O Operation is performed.
4. How are Observer and Observable used?
Objects that subclass the Observable class maintain a list of observers. When an Observable object is updated it invokes the update() method of each of its observers to notify the observers that it has changed state. The Observer interface is implemented by objects that observe Observable objects.
Objects that subclass the Observable class maintain a list of observers. When an Observable object is updated it invokes the update() method of each of its observers to notify the observers that it has changed state. The Observer interface is implemented by objects that observe Observable objects.
5. What is synchronization and why is it important?
With respect to multithreading, synchronization is the capability to control the access of multiple threads to shared resources. Without synchronization, it is possible for one thread to modify a shared object while another thread is in the process of using or updating that object’s value. This often leads to significant errors.
With respect to multithreading, synchronization is the capability to control the access of multiple threads to shared resources. Without synchronization, it is possible for one thread to modify a shared object while another thread is in the process of using or updating that object’s value. This often leads to significant errors.
6. Can a lock be acquired on a class?
Yes, a lock can be acquired on a class. This lock is acquired on the class’s Class object.
Yes, a lock can be acquired on a class. This lock is acquired on the class’s Class object.
7. What’s new with the stop(), suspend() and resume() methods in JDK 1.2?
The stop(), suspend() and resume() methods have been deprecated in JDK 1.2.
8. Is null a keyword?
The null value is not a keyword.
The stop(), suspend() and resume() methods have been deprecated in JDK 1.2.
8. Is null a keyword?
The null value is not a keyword.
9. What is the preferred size of a component?
The preferred size of a component is the minimum component size that will allow the component to display normally.
The preferred size of a component is the minimum component size that will allow the component to display normally.
10. What method is used to specify a container’s layout?
The setLayout() method is used to specify a container’s layout.
The setLayout() method is used to specify a container’s layout.
11. Which containers use a FlowLayout as their default layout?
The Panel and Applet classes use the FlowLayout as their default layout.
The Panel and Applet classes use the FlowLayout as their default layout.
12. What state does a thread enter when it terminates its processing?
When a thread terminates its processing, it enters the dead state.
When a thread terminates its processing, it enters the dead state.
13. What is the Collections API?
The Collections API is a set of classes and interfaces that support operations on collections of objects.
The Collections API is a set of classes and interfaces that support operations on collections of objects.
14. which characters may be used as the second character of an identifier, but not as the first character of an identifier?
The digits 0 through 9 may not be used as the first character of an identifier but they may be used after the first character of an identifier.
15. What is the List interface?
The List interface provides support for ordered collections of objects.
The digits 0 through 9 may not be used as the first character of an identifier but they may be used after the first character of an identifier.
15. What is the List interface?
The List interface provides support for ordered collections of objects.
16. How does Java handle integer overflows and underflows?
It uses those low order bytes of the result that can fit into the size of the type allowed by the operation.
It uses those low order bytes of the result that can fit into the size of the type allowed by the operation.
17. What is the Vector class?
The Vector class provides the capability to implement a growable array of objects
The Vector class provides the capability to implement a growable array of objects
18. What modifiers may be used with an inner class that is a member of an outer class?
A (non-local) inner class may be declared as public, protected, private, static, final, orabstract.
A (non-local) inner class may be declared as public, protected, private, static, final, orabstract.
19. What is an Iterator interface?
The Iterator interface is used to step through the elements of a Collection.
The Iterator interface is used to step through the elements of a Collection.
20. What is the difference between the >> and >>> operators?
The >> operator carries the sign bit when shifting right. The >>> zero-fills bits that have been shifted out.
The >> operator carries the sign bit when shifting right. The >>> zero-fills bits that have been shifted out.
21. Which method of the Component class is used to set the position and size of a component?
setBounds()
22. How many bits are used to represent Unicode, ASCII, UTF-16, and UTF-8 characters?
Unicode requires 16 bits and ASCII require 7 bits. Although the ASCII character set uses only 7 bits, it is usually represented as 8 bits. UTF-8 represents characters using 8, 16, and 18 bit patterns. UTF-16 uses 16-bit and larger bit patterns.
setBounds()
22. How many bits are used to represent Unicode, ASCII, UTF-16, and UTF-8 characters?
Unicode requires 16 bits and ASCII require 7 bits. Although the ASCII character set uses only 7 bits, it is usually represented as 8 bits. UTF-8 represents characters using 8, 16, and 18 bit patterns. UTF-16 uses 16-bit and larger bit patterns.
23 What is the difference between yielding and sleeping?
When a task invokes its yield() method, it returns to the ready state. When a task invokes its sleep() method, it returns to the waiting state.
When a task invokes its yield() method, it returns to the ready state. When a task invokes its sleep() method, it returns to the waiting state.
24. Which java.util classes and interfaces support event handling?
The EventObject class and the EventListener interface support event processing.
The EventObject class and the EventListener interface support event processing.
25. Is sizeof a keyword?
The sizeof operator is not a keyword.
The sizeof operator is not a keyword.
26. What are wrapper classes?
Wrapper classes are classes that allow primitive types to be accessed as objects.
Wrapper classes are classes that allow primitive types to be accessed as objects.
27. Does garbage collection guarantee that a program will not run out of memory?
Garbage collection does not guarantee that a program will not run out of memory. It is possible for programs to use up memory resources faster than they are garbage collected. It is also possible for programs to create objects that are not subject to garbage collection.
Garbage collection does not guarantee that a program will not run out of memory. It is possible for programs to use up memory resources faster than they are garbage collected. It is also possible for programs to create objects that are not subject to garbage collection.
28. What restrictions are placed on the location of a package statement within asource code file?
A package statement must appear as the first line in a source code file (excluding blank lines and comments).
29. Can an object’s finalize() method be invoked while it is reachable?
An object’s finalize() method cannot be invoked by the garbage collector while the object is still reachable. However, an object’s finalize() method may be invoked by other objects.
A package statement must appear as the first line in a source code file (excluding blank lines and comments).
29. Can an object’s finalize() method be invoked while it is reachable?
An object’s finalize() method cannot be invoked by the garbage collector while the object is still reachable. However, an object’s finalize() method may be invoked by other objects.
30. What is the immediate superclass of the Applet class?
Panel
Panel
31. What is the difference between preemptive scheduling and time slicing?
Under preemptive scheduling, the highest priority task executes until it enters the waiting or dead states or a higher priority task comes into existence. Under time slicing, a task executes for a predefined slice of time and then reenters the pool of ready tasks. The scheduler then determines which task should execute next, based on priority and other factors.
Under preemptive scheduling, the highest priority task executes until it enters the waiting or dead states or a higher priority task comes into existence. Under time slicing, a task executes for a predefined slice of time and then reenters the pool of ready tasks. The scheduler then determines which task should execute next, based on priority and other factors.
32. Name three Component subclasses that support painting.
The Canvas, Frame, Panel, and Applet classes support painting.
The Canvas, Frame, Panel, and Applet classes support painting.
33. What value does readLine() return when it has reached the end of a file?
The readLine() method returns null when it has reached the end of a file.
The readLine() method returns null when it has reached the end of a file.
34. What is the immediate superclass of the Dialog class?
Window.
Window.
35. What is clipping?
Clipping is the process of confining paint operations to a limited area or shape.
36. What is a native method?
A native method is a method that is implemented in a language other than Java.
Clipping is the process of confining paint operations to a limited area or shape.
36. What is a native method?
A native method is a method that is implemented in a language other than Java.
37. Can a for statement loop indefinitely?
Yes, a for statement can loop indefinitely. For example, consider the following:
for(;;) ;
Yes, a for statement can loop indefinitely. For example, consider the following:
for(;;) ;
38. What are order of precedence and associativity, and how are they used?
Order of precedence determines the order in which operators are evaluated in expressions. Associatity determines whether an expression is evaluated left-to-right or right-to-left
Order of precedence determines the order in which operators are evaluated in expressions. Associatity determines whether an expression is evaluated left-to-right or right-to-left
39. When a thread blocks on I/O, what state does it enter?
A thread enters the waiting state when it blocks on I/O.
A thread enters the waiting state when it blocks on I/O.
40. To what value is a variable of the String type automatically initialized?
The default value of a String type is null.
The default value of a String type is null.
41. What is the catch or declare rule for method declarations?
If a checked exception may be thrown within the body of a method, the method must either catch the exception or declare it in its throws clause.
If a checked exception may be thrown within the body of a method, the method must either catch the exception or declare it in its throws clause.
42. What is the difference between a MenuItem and a CheckboxMenuItem?
The CheckboxMenuItem class extends the MenuItem class to support a menu item that may be checked or unchecked.
43. What is a task’s priority and how is it used in scheduling?
A task’s priority is an integer value that identifies the relative order in which it should be executed with respect to other tasks. The scheduler attempts to schedule higher priority tasks before lower priority tasks.
The CheckboxMenuItem class extends the MenuItem class to support a menu item that may be checked or unchecked.
43. What is a task’s priority and how is it used in scheduling?
A task’s priority is an integer value that identifies the relative order in which it should be executed with respect to other tasks. The scheduler attempts to schedule higher priority tasks before lower priority tasks.
44. What class is the top of the AWT event hierarchy?
The java.awt.AWTEvent class is the highest-level class in the AWT event-class hierarchy.
The java.awt.AWTEvent class is the highest-level class in the AWT event-class hierarchy.
45. When a thread is created and started, what is its initial state?
A thread is in the ready state after it has been created and started.
A thread is in the ready state after it has been created and started.
46. Can an anonymous class be declared as implementing an interface and extending a class?
An anonymous class may implement an interface or extend a superclass, but may not be declared to do both.
An anonymous class may implement an interface or extend a superclass, but may not be declared to do both.
47. What is the range of the short type?
The range of the short type is -(2^15) to 2^15 - 1.
The range of the short type is -(2^15) to 2^15 - 1.
48. What is the range of the char type?
The range of the char type is 0 to 2^16 - 1.
The range of the char type is 0 to 2^16 - 1.
49. In which package are most of the AWT events that support the event-delegation model defined?
Most of the AWT-related events of the event-delegation model are defined in the java.awt.event package. The AWTEvent class is defined in the java.awt package.
50. What is the immediate superclass of Menu?
MenuItem
Most of the AWT-related events of the event-delegation model are defined in the java.awt.event package. The AWTEvent class is defined in the java.awt package.
50. What is the immediate superclass of Menu?
MenuItem
51. What is the purpose of finalization?
The purpose of finalization is to give an unreachable object the opportunity to perform any cleanup processing before the object is garbage collected.
The purpose of finalization is to give an unreachable object the opportunity to perform any cleanup processing before the object is garbage collected.
52. Which class is the immediate superclass of the MenuComponent class.
Object
Object
53. What invokes a thread’s run() method?
After a thread is started, via its start() method or that of the Thread class, the JVM invokes the thread’s run() method when the thread is initially executed.
After a thread is started, via its start() method or that of the Thread class, the JVM invokes the thread’s run() method when the thread is initially executed.
54. What is the difference between the Boolean & operator and the && operator?
If an expression involving the Boolean & operator is evaluated, both operands are evaluated. Then the & operator is applied to the operand. When an expression involving the && operator is evaluated, the first operand is evaluated. If the first operand returns a value of true then the second operand is evaluated. The && operator is then applied to the first and second operands. If the first operand evaluates to false, the evaluation of the second operand is skipped.
If an expression involving the Boolean & operator is evaluated, both operands are evaluated. Then the & operator is applied to the operand. When an expression involving the && operator is evaluated, the first operand is evaluated. If the first operand returns a value of true then the second operand is evaluated. The && operator is then applied to the first and second operands. If the first operand evaluates to false, the evaluation of the second operand is skipped.
55. Name three subclasses of the Component class.
Box.Filler, Button, Canvas, Checkbox, Choice, Container, Label, List, Scrollbar, or TextComponent
Box.Filler, Button, Canvas, Checkbox, Choice, Container, Label, List, Scrollbar, or TextComponent
56. What is the GregorianCalendar class?
The GregorianCalendar provides support for traditional Western calendars.
57. Which Container method is used to cause a container to be laid out and redisplayed?
validate()
The GregorianCalendar provides support for traditional Western calendars.
57. Which Container method is used to cause a container to be laid out and redisplayed?
validate()
58. What is the purpose of the Runtime class?
The purpose of the Runtime class is to provide access to the Java runtime system.
The purpose of the Runtime class is to provide access to the Java runtime system.
59. How many times may an object’s finalize() method be invoked by the
garbage collector?
An object’s finalize() method may only be invoked once by the garbage collector.
garbage collector?
An object’s finalize() method may only be invoked once by the garbage collector.
60. What is the purpose of the finally clause of a try-catch-finally statement?
The finally clause is used to provide the capability to execute code no matter whether or not an exception is thrown or caught.
The finally clause is used to provide the capability to execute code no matter whether or not an exception is thrown or caught.
61. What is the argument type of a program’s main() method?
A program’s main() method takes an argument of the String[] type.
A program’s main() method takes an argument of the String[] type.
62. Which Java operator is right associative?
The = operator is right associative.
The = operator is right associative.
63. What is the Locale class?
The Locale class is used to tailor program output to the conventions of a particular geographic, political, or cultural region.64. Can a double value be cast to a byte?
Yes, a double value can be cast to a byte.
The Locale class is used to tailor program output to the conventions of a particular geographic, political, or cultural region.64. Can a double value be cast to a byte?
Yes, a double value can be cast to a byte.
65. What is the difference between a break statement and a continue statement?
A break statement results in the termination of the statement to which it applies (switch, for, do, or while). A continue statement is used to end the current loop iteration and return control to the loop statement.
A break statement results in the termination of the statement to which it applies (switch, for, do, or while). A continue statement is used to end the current loop iteration and return control to the loop statement.
66. What must a class do to implement an interface?
It must provide all of the methods in the interface and identify the interface in its implements clause.
It must provide all of the methods in the interface and identify the interface in its implements clause.
67. What method is invoked to cause an object to begin executing as a separate thread?
The start() method of the Thread class is invoked to cause an object to begin executing as a separate thread.
The start() method of the Thread class is invoked to cause an object to begin executing as a separate thread.
68. Name two subclasses of the TextComponent class.
TextField and TextArea
TextField and TextArea
69. What is the advantage of the event-delegation model over the earlier event-inheritance model?
The event-delegation model has two advantages over the event-inheritance model. First, it enables event handling to be handled by objects other than the ones that generate the events (or their containers). This allows a clean separation between a component’s design and its use. The other advantage of the event-delegation model is that it performs much better in applications where many events are generated. This performance improvement is due to the fact that the event-delegation model does not have to repeatedly process unhandled events, as is the case of the event-inheritance
model.
The event-delegation model has two advantages over the event-inheritance model. First, it enables event handling to be handled by objects other than the ones that generate the events (or their containers). This allows a clean separation between a component’s design and its use. The other advantage of the event-delegation model is that it performs much better in applications where many events are generated. This performance improvement is due to the fact that the event-delegation model does not have to repeatedly process unhandled events, as is the case of the event-inheritance
model.
70. Which containers may have a MenuBar?
Frame
71. How are commas used in the initialization and iteration parts of a for statement?
Commas are used to separate multiple statements within the initialization and iteration parts of a for statement.
Frame
71. How are commas used in the initialization and iteration parts of a for statement?
Commas are used to separate multiple statements within the initialization and iteration parts of a for statement.
72. What is the purpose of the wait(), notify(), and notifyAll() methods?
The wait(),notify(), and notifyAll() methods are used to provide an efficient way for threads to wait for a shared resource. When a thread executes an object’s wait() method, it enters the waiting state. It only enters the ready state after another thread invokes the object’s notify() or notifyAll() methods.
The wait(),notify(), and notifyAll() methods are used to provide an efficient way for threads to wait for a shared resource. When a thread executes an object’s wait() method, it enters the waiting state. It only enters the ready state after another thread invokes the object’s notify() or notifyAll() methods.
73. What is an abstract method?
An abstract method is a method whose implementation is deferred to a subclass.
An abstract method is a method whose implementation is deferred to a subclass.
74. How are Java source code files named?
A Java source code file takes the name of a public class or interface that is defined within the file. A source code file may contain at most one public class or interface. If a public class or interface is defined within a source code file, then the source code file must take the name of the public class or interface. If no public class or interface is defined within a source code file, then the file must take on a name that is different than its classes and interfaces. Source code files use the .java extension.
A Java source code file takes the name of a public class or interface that is defined within the file. A source code file may contain at most one public class or interface. If a public class or interface is defined within a source code file, then the source code file must take the name of the public class or interface. If no public class or interface is defined within a source code file, then the file must take on a name that is different than its classes and interfaces. Source code files use the .java extension.
75. What is the relationship between the Canvas class and the Graphics class?
A Canvas object provides access to a Graphics object via its paint() method.
A Canvas object provides access to a Graphics object via its paint() method.
76. What are the high-level thread states?
The high-level thread states are ready, running, waiting, and dead.
The high-level thread states are ready, running, waiting, and dead.
77. What value does read() return when it has reached the end of a file?
The read() method returns -1 when it has reached the end of a file.
78. Can a Byte object be cast to a double value?
No, an object cannot be cast to a primitive value.
The read() method returns -1 when it has reached the end of a file.
78. Can a Byte object be cast to a double value?
No, an object cannot be cast to a primitive value.
79. What is the difference between a static and a non-static inner class?
A non-static inner class may have object instances that are associated with instances of the class’s outer class. A static inner class does not have any object instances.
A non-static inner class may have object instances that are associated with instances of the class’s outer class. A static inner class does not have any object instances.
80. What is the difference between the String and StringBuffer classes?
String objects are constants. StringBuffer objects are not.
String objects are constants. StringBuffer objects are not.
81. If a variable is declared as private, where may the variable be accessed?
A private variable may only be accessed within the class in which it is declared.
A private variable may only be accessed within the class in which it is declared.
82. What is an object’s lock and which objects have locks?
An object’s lock is a mechanism that is used by multiple threads to obtain synchronized access to the object. A thread may execute a synchronized method of an object only after it has acquired the object’s lock. All objects and classes have locks. A class’s lock is acquired on the class’s Class object.
An object’s lock is a mechanism that is used by multiple threads to obtain synchronized access to the object. A thread may execute a synchronized method of an object only after it has acquired the object’s lock. All objects and classes have locks. A class’s lock is acquired on the class’s Class object.
83. What is the Dictionary class?
The Dictionary class provides the capability to store key-value pairs.
The Dictionary class provides the capability to store key-value pairs.
84. How are the elements of a BorderLayout organized?
The elements of a BorderLayout are organized at the borders (North, South, East, and West) and the center of a container.
85. What is the % operator?
It is referred to as the modulo or remainder operator. It returns the remainder of dividing the first operand by the second operand.
The elements of a BorderLayout are organized at the borders (North, South, East, and West) and the center of a container.
85. What is the % operator?
It is referred to as the modulo or remainder operator. It returns the remainder of dividing the first operand by the second operand.
86. When can an object reference be cast to an interface reference?
An object reference be cast to an interface reference when the object implements the referenced interface.
An object reference be cast to an interface reference when the object implements the referenced interface.
87. What is the difference between a Window and a Frame?
The Frame class extends Window to define a main application window that can have a menu bar.
The Frame class extends Window to define a main application window that can have a menu bar.
88. Which class is extended by all other classes?
The Object class is extended by all other classes.
The Object class is extended by all other classes.
89. Can an object be garbage collected while it is still reachable?
A reachable object cannot be garbage collected. Only unreachable objects may be garbage collected..
A reachable object cannot be garbage collected. Only unreachable objects may be garbage collected..
90. Is the ternary operator written x : y ? z or x ? y : z ?
It is written x ? y : z.
It is written x ? y : z.
91. What is the difference between the Font and FontMetrics classes?
The FontMetrics class is used to define implementation-specific properties, such as ascent and descent, of a Font object.
92. How is rounding performed under integer division?
The fractional part of the result is truncated. This is known as rounding toward zero.
The FontMetrics class is used to define implementation-specific properties, such as ascent and descent, of a Font object.
92. How is rounding performed under integer division?
The fractional part of the result is truncated. This is known as rounding toward zero.
93. What happens when a thread cannot acquire a lock on an object?
If a thread attempts to execute a synchronized method or synchronized statement and is unable to acquire an object’s lock, it enters the waiting state until the lock becomes available.
If a thread attempts to execute a synchronized method or synchronized statement and is unable to acquire an object’s lock, it enters the waiting state until the lock becomes available.
94. What is the difference between the Reader/Writer class hierarchy and the InputStream/OutputStream class hierarchy?
The Reader/Writer class hierarchy is character-oriented, and the InputStream/OutputStream class hierarchy is byte-oriented.
The Reader/Writer class hierarchy is character-oriented, and the InputStream/OutputStream class hierarchy is byte-oriented.
95. What classes of exceptions may be caught by a catch clause?
A catch clause can catch any exception that may be assigned to the Throwable type. This includes the Error and Exception types.
A catch clause can catch any exception that may be assigned to the Throwable type. This includes the Error and Exception types.
96. If a class is declared without any access modifiers, where may the class be accessed?
A class that is declared without any access modifiers is said to have package access. This means that the class can only be accessed by other classes and interfaces that are defined within the same package.
A class that is declared without any access modifiers is said to have package access. This means that the class can only be accessed by other classes and interfaces that are defined within the same package.
97. What is the SimpleTimeZone class?
The SimpleTimeZone class provides support for a Gregorian calendar.
The SimpleTimeZone class provides support for a Gregorian calendar.
98. What is the Map interface?
The Map interface replaces the JDK 1.1 Dictionary class and is used associate keys with values.99. Does a class inherit the constructors of its superclass?
A class does not inherit constructors from any of its super classes.
The Map interface replaces the JDK 1.1 Dictionary class and is used associate keys with values.99. Does a class inherit the constructors of its superclass?
A class does not inherit constructors from any of its super classes.
100. For which statements does it make sense to use a label?
The only statements for which it makes sense to use a label are those statements that can enclose a break or continue statement.
The only statements for which it makes sense to use a label are those statements that can enclose a break or continue statement.
101. What is the purpose of the System class?
The purpose of the System class is to provide access to system resources.
The purpose of the System class is to provide access to system resources.
102. Which TextComponent method is used to set a TextComponent to the read-only state?
setEditable()
setEditable()
103. How are the elements of a CardLayout organized?
The elements of a CardLayout are stacked, one on top of the other, like a deck of cards.
The elements of a CardLayout are stacked, one on top of the other, like a deck of cards.
104. Is &&= a valid Java operator?
No, it is not.
No, it is not.
105. Name the eight primitive Java types.
The eight primitive types are byte, char, short, int, long, float, double, and boolean.
106. Which class should you use to obtain design information about an object?
The Class class is used to obtain information about an object’s design.
The eight primitive types are byte, char, short, int, long, float, double, and boolean.
106. Which class should you use to obtain design information about an object?
The Class class is used to obtain information about an object’s design.
107. What is the relationship between clipping and repainting?
When a window is repainted by the AWT painting thread, it sets the clipping regions to the area of the window that requires repainting.
When a window is repainted by the AWT painting thread, it sets the clipping regions to the area of the window that requires repainting.
108. Is “abc” a primitive value?
The String literal “abc” is not a primitive value. It is a String object.
The String literal “abc” is not a primitive value. It is a String object.
109. What is the relationship between an event-listener interface and an event-adapter class?
An event-listener interface defines the methods that must be implemented by an event handler for a particular kind of event. An event adapter provides a default implementation of an event-listener interface.
An event-listener interface defines the methods that must be implemented by an event handler for a particular kind of event. An event adapter provides a default implementation of an event-listener interface.
110. What restrictions are placed on the values of each case of a switch statement?
During compilation, the values of each case of a switch statement must evaluate to a value that can be promoted to an int value.
During compilation, the values of each case of a switch statement must evaluate to a value that can be promoted to an int value.
111. What modifiers may be used with an interface declaration?
An interface may be declared as public or abstract.
An interface may be declared as public or abstract.
112. Is a class a subclass of itself?
A class is a subclass of itself.
113. What is the highest-level event class of the event-delegation model?
The java.util.EventObject class is the highest-level class in the event-delegation class hierarchy.
A class is a subclass of itself.
113. What is the highest-level event class of the event-delegation model?
The java.util.EventObject class is the highest-level class in the event-delegation class hierarchy.
114. What event results from the clicking of a button?
The ActionEvent event is generated as the result of the clicking of a button.
The ActionEvent event is generated as the result of the clicking of a button.
115. How can a GUI component handle its own events?
A component can handle its own events by implementing the required event-listener interface and adding itself as its own event listener.
A component can handle its own events by implementing the required event-listener interface and adding itself as its own event listener.
116. What is the difference between a while statement and a do statement?
A while statement checks at the beginning of a loop to see whether the next loop iteration should occur. A do statement checks at the end of a loop to see whether the next iteration of a loop should occur. The do statement will always execute the body of a loop at least once.
A while statement checks at the beginning of a loop to see whether the next loop iteration should occur. A do statement checks at the end of a loop to see whether the next iteration of a loop should occur. The do statement will always execute the body of a loop at least once.
117. How are the elements of a GridBagLayout organized?
The elements of a GridBagLayout are organized according to a grid. However, the elements are of different sizes and may occupy more than one row or column of the grid. In addition, the rows and columns may have different sizes.
The elements of a GridBagLayout are organized according to a grid. However, the elements are of different sizes and may occupy more than one row or column of the grid. In addition, the rows and columns may have different sizes.
118. What advantage do Java’s layout managers provide over traditional windowing systems?
Java uses layout managers to lay out components in a consistent manner across all windowing platforms. Since Java’s layout managers aren’t tied to absolute sizing and positioning, they are able to accommodate platform-specific differences among windowing systems.
Java uses layout managers to lay out components in a consistent manner across all windowing platforms. Since Java’s layout managers aren’t tied to absolute sizing and positioning, they are able to accommodate platform-specific differences among windowing systems.
119. What is the Collection interface?
The Collection interface provides support for the implementation of a mathematical bag - an unordered collection of objects that may contain duplicates.
120. What modifiers can be used with a local inner class?
A local inner class may be final or abstract.
The Collection interface provides support for the implementation of a mathematical bag - an unordered collection of objects that may contain duplicates.
120. What modifiers can be used with a local inner class?
A local inner class may be final or abstract.
121. What is the difference between static and non-static variables?
A static variable is associated with the class as a whole rather than with specific instances of a class. Non-static variables take on unique values with each object instance.
A static variable is associated with the class as a whole rather than with specific instances of a class. Non-static variables take on unique values with each object instance.
122. What is the difference between the paint() and repaint() methods?
The paint() method supports painting via a Graphics object. The repaint() method is used to cause paint() to be invoked by the AWT painting thread.
The paint() method supports painting via a Graphics object. The repaint() method is used to cause paint() to be invoked by the AWT painting thread.
123. What is the purpose of the File class?
The File class is used to create objects that provide access to the files and directories of a local file system.
The File class is used to create objects that provide access to the files and directories of a local file system.
124. Can an exception be rethrown?
Yes, an exception can be rethrown.
Yes, an exception can be rethrown.
125. Which Math method is used to calculate the absolute value of a number?
The abs() method is used to calculate absolute values.
The abs() method is used to calculate absolute values.
126. How does multithreading take place on a computer with a single CPU?
The operating system’s task scheduler allocates execution time to multiple tasks. By quickly switching between executing tasks, it creates the impression that tasks execute sequentially.
127. When does the compiler supply a default constructor for a class?
The compiler supplies a default constructor for a class if no other constructors are provided.
The operating system’s task scheduler allocates execution time to multiple tasks. By quickly switching between executing tasks, it creates the impression that tasks execute sequentially.
127. When does the compiler supply a default constructor for a class?
The compiler supplies a default constructor for a class if no other constructors are provided.
128. When is the finally clause of a try-catch-finally statement executed?
The finally clause of the try-catch-finally statement is always executed unless the thread of execution terminates or an exception occurs within the execution of the finally clause.
The finally clause of the try-catch-finally statement is always executed unless the thread of execution terminates or an exception occurs within the execution of the finally clause.
129. Which class is the immediate superclass of the Container class?
Component
Component
130. If a method is declared as protected, where may the method be accessed?
A protected method may only be accessed by classes or interfaces of the same package or by subclasses of the class in which it is declared.
A protected method may only be accessed by classes or interfaces of the same package or by subclasses of the class in which it is declared.
131. How can the Checkbox class be used to create a radio button?
By associating Checkbox objects with a CheckboxGroup.
By associating Checkbox objects with a CheckboxGroup.
132. Which non-Unicode letter characters may be used as the first character of an identifier?
The non-Unicode letter characters $ and _ may appear as the first character of an identifier
The non-Unicode letter characters $ and _ may appear as the first character of an identifier
133. What restrictions are placed on method overloading?
Two methods may not have the same name and argument list but different return types.
134. What happens when you invoke a thread’s interrupt method while it is sleeping or waiting?
When a task’s interrupt() method is executed, the task enters the ready state. The next time the task enters the running state, an InterruptedException is thrown.
Two methods may not have the same name and argument list but different return types.
134. What happens when you invoke a thread’s interrupt method while it is sleeping or waiting?
When a task’s interrupt() method is executed, the task enters the ready state. The next time the task enters the running state, an InterruptedException is thrown.
135. What is casting?
There are two types of casting, casting between primitive numeric types and casting between object references. Casting between numeric types is used to convert larger values, such as double values, to smaller values, such as byte values. Casting between object references is used to refer to an object by a compatible class, interface, or array type reference.
There are two types of casting, casting between primitive numeric types and casting between object references. Casting between numeric types is used to convert larger values, such as double values, to smaller values, such as byte values. Casting between object references is used to refer to an object by a compatible class, interface, or array type reference.
136. What is the return type of a program’s main() method?
A program’s main() method has a void return type.
A program’s main() method has a void return type.
137. Name four Container classes.
Window, Frame, Dialog, FileDialog, Panel, Applet, or ScrollPane
Window, Frame, Dialog, FileDialog, Panel, Applet, or ScrollPane
138. What is the difference between a Choice and a List?
A Choice is displayed in a compact form that requires you to pull it down to see the list of available choices. Only one item may be selected from a Choice. A List may be displayed in such a way that several List items are visible. A List supports the selection of one or more List items.
A Choice is displayed in a compact form that requires you to pull it down to see the list of available choices. Only one item may be selected from a Choice. A List may be displayed in such a way that several List items are visible. A List supports the selection of one or more List items.
139. What class of exceptions are generated by the Java run-time system?
The Java runtime system generates RuntimeException and Error exceptions.
The Java runtime system generates RuntimeException and Error exceptions.
140. What class allows you to read objects directly from a stream?
The ObjectInputStream class supports the reading of objects from input streams.
141. What is the difference between a field variable and a local variable?
A field variable is a variable that is declared as a member of a class. A local variable is a variable that is declared local to a method.
The ObjectInputStream class supports the reading of objects from input streams.
141. What is the difference between a field variable and a local variable?
A field variable is a variable that is declared as a member of a class. A local variable is a variable that is declared local to a method.
142. Under what conditions is an object’s finalize() method invoked by the garbage collector?
The garbage collector invokes an object’s finalize() method when it detects that the object has become unreachable.
The garbage collector invokes an object’s finalize() method when it detects that the object has become unreachable.
143. How are this () and super () used with constructors?
this() is used to invoke a constructor of the same class. super() is used to invoke a superclass constructor.
this() is used to invoke a constructor of the same class. super() is used to invoke a superclass constructor.
144. What is the relationship between a method’s throws clause and the exceptions that can be thrown during the method’s execution?
A method’s throws clause must declare any checked exceptions that are not caught within the body of the method.
A method’s throws clause must declare any checked exceptions that are not caught within the body of the method.
145. What is the difference between the JDK 1.02 event model and the event-delegation model introduced with JDK 1.1?
The JDK 1.02 event model uses an event inheritance or bubbling approach. In this model, components are required to handle their own events. If they do not handle a particular event, the event is inherited by (or bubbled up to) the component’s container. The container then either handles the event or it is bubbled up to its container and so on, until the highest-level container has been tried.
In the event-delegation model, specific objects are designated as event handlers for GUI components. These objects implement event-listener interfaces. The event-delegation model is more efficient than the event-inheritance model because it eliminates the processing required to support the bubbling of unhandled events.
The JDK 1.02 event model uses an event inheritance or bubbling approach. In this model, components are required to handle their own events. If they do not handle a particular event, the event is inherited by (or bubbled up to) the component’s container. The container then either handles the event or it is bubbled up to its container and so on, until the highest-level container has been tried.
In the event-delegation model, specific objects are designated as event handlers for GUI components. These objects implement event-listener interfaces. The event-delegation model is more efficient than the event-inheritance model because it eliminates the processing required to support the bubbling of unhandled events.
146. How is it possible for two String objects with identical values not to be equal under the == operator?
The == operator compares two objects to determine if they are the same object in memory. It is possible for two String objects to have the same value, but located indifferent areas of memory.
The == operator compares two objects to determine if they are the same object in memory. It is possible for two String objects to have the same value, but located indifferent areas of memory.
147. Why are the methods of the Math class static?
So they can be invoked as if they are a mathematical code library.
148. What Checkbox method allows you to tell if a Checkbox is checked?
getState()
So they can be invoked as if they are a mathematical code library.
148. What Checkbox method allows you to tell if a Checkbox is checked?
getState()
149. What state is a thread in when it is executing?
An executing thread is in the running state.
An executing thread is in the running state.
150. What are the legal operands of the instanceof operator?
The left operand is an object reference or null value and the right operand is a class, interface, or array type.
The left operand is an object reference or null value and the right operand is a class, interface, or array type.
151. How are the elements of a GridLayout organized?
The elements of a GridBad layout are of equal size and are laid out using the squares of a grid.
The elements of a GridBad layout are of equal size and are laid out using the squares of a grid.
152. What an I/O filter?
An I/O filter is an object that reads from one stream and writes to another, usually altering the data in some way as it is passed from one stream to another.
An I/O filter is an object that reads from one stream and writes to another, usually altering the data in some way as it is passed from one stream to another.
153. If an object is garbage collected, can it become reachable again?
Once an object is garbage collected, it ceases to exist. It can no longer become reachable again.
Once an object is garbage collected, it ceases to exist. It can no longer become reachable again.
154. What is the Set interface?
The Set interface provides methods for accessing the elements of a finite mathematical set. Sets do not allow duplicate elements.
155. What classes of exceptions may be thrown by a throw statement?
A throw statement may throw any expression that may be assigned to the Throwable type.
The Set interface provides methods for accessing the elements of a finite mathematical set. Sets do not allow duplicate elements.
155. What classes of exceptions may be thrown by a throw statement?
A throw statement may throw any expression that may be assigned to the Throwable type.
156. What are E and PI?
E is the base of the natural logarithm and PI is mathematical value pi.
E is the base of the natural logarithm and PI is mathematical value pi.
157. Are true and false keywords?
The values true and false are not keywords.
The values true and false are not keywords.
158. What is a void return type?
A void return type indicates that a method does not return a value.
A void return type indicates that a method does not return a value.
159. What is the purpose of the enableEvents() method?
The enableEvents() method is used to enable an event for a particular object. Normally, an event is enabled when a listener is added to an object for a particular event. The enableEvents() method is used by objects that handle events by overriding their event-dispatch methods.
The enableEvents() method is used to enable an event for a particular object. Normally, an event is enabled when a listener is added to an object for a particular event. The enableEvents() method is used by objects that handle events by overriding their event-dispatch methods.
160. What is the difference between the File and RandomAccessFile classes?
The File class encapsulates the files and directories of the local file system. The RandomAccessFile class provides the methods needed to directly access data contained in any part of a file.
The File class encapsulates the files and directories of the local file system. The RandomAccessFile class provides the methods needed to directly access data contained in any part of a file.
161. What happens when you add a double value to a String?
The result is a String object.162. What is your platform’s default character encoding?
If you are running Java on English Windows platforms, it is probably Cp1252. If you are running Java on English Solaris platforms, it is most likely 8859_1..
The result is a String object.162. What is your platform’s default character encoding?
If you are running Java on English Windows platforms, it is probably Cp1252. If you are running Java on English Solaris platforms, it is most likely 8859_1..
163. Which package is always imported by default?
The java.lang package is always imported by default.
The java.lang package is always imported by default.
164. What interface must an object implement before it can be written to a stream as an object?
An object must implement the Serializable or Externalizable interface before it can be written to a stream as an object.
An object must implement the Serializable or Externalizable interface before it can be written to a stream as an object.
165. How are this and super used?
this is used to refer to the current object instance. super is used to refer to the variables and methods of the superclass of the current object instance.
this is used to refer to the current object instance. super is used to refer to the variables and methods of the superclass of the current object instance.
166. What is the purpose of garbage collection?
The purpose of garbage collection is to identify and discard objects that are no longer needed by a program so that their resources may be reclaimed and
reused.
The purpose of garbage collection is to identify and discard objects that are no longer needed by a program so that their resources may be reclaimed and
reused.
167. What is a compilation unit?
A compilation unit is a Java source code file.
A compilation unit is a Java source code file.
168. What interface is extended by AWT event listeners?
All AWT event listeners extend the java.util.EventListener interface.
169. What restrictions are placed on method overriding?
Overridden methods must have the same name, argument list, and return type.
The overriding method may not limit the access of the method it overrides.
The overriding method may not throw any exceptions that may not be thrown
by the overridden method.
All AWT event listeners extend the java.util.EventListener interface.
169. What restrictions are placed on method overriding?
Overridden methods must have the same name, argument list, and return type.
The overriding method may not limit the access of the method it overrides.
The overriding method may not throw any exceptions that may not be thrown
by the overridden method.
170. How can a dead thread be restarted?
A dead thread cannot be restarted.
A dead thread cannot be restarted.
171. What happens if an exception is not caught?
An uncaught exception results in the uncaughtException() method of the thread’s ThreadGroup being invoked, which eventually results in the termination of the program in which it is thrown.
An uncaught exception results in the uncaughtException() method of the thread’s ThreadGroup being invoked, which eventually results in the termination of the program in which it is thrown.
172. What is a layout manager?
A layout manager is an object that is used to organize components in a container.
A layout manager is an object that is used to organize components in a container.
173. Which arithmetic operations can result in the throwing of an ArithmeticException?
Integer / and % can result in the throwing of an ArithmeticException.
Integer / and % can result in the throwing of an ArithmeticException.
174. What are three ways in which a thread can enter the waiting state?
A thread can enter the waiting state by invoking its sleep() method, by blocking on I/O, by unsuccessfully attempting to acquire an object’s lock, or by invoking an object’s wait() method. It can also enter the waiting state by invoking its
(deprecated) suspend() method.
A thread can enter the waiting state by invoking its sleep() method, by blocking on I/O, by unsuccessfully attempting to acquire an object’s lock, or by invoking an object’s wait() method. It can also enter the waiting state by invoking its
(deprecated) suspend() method.
175. Can an abstract class be final?
An abstract class may not be declared as final.176. What is the ResourceBundle class?
The ResourceBundle class is used to store locale-specific resources that can be loaded by a program to tailor the program’s appearance to the particular locale in which it is being run.
An abstract class may not be declared as final.176. What is the ResourceBundle class?
The ResourceBundle class is used to store locale-specific resources that can be loaded by a program to tailor the program’s appearance to the particular locale in which it is being run.
177. What happens if a try-catch-finally statement does not have a catch clause to handle an exception that is thrown within the body of the try statement?
The exception propagates up to the next higher level try-catch statement (if any) or results in the program’s termination.
The exception propagates up to the next higher level try-catch statement (if any) or results in the program’s termination.
178. What is numeric promotion?
Numeric promotion is the conversion of a smaller numeric type to a larger numeric type, so that integer and floating-point operations may take place. In numerical promotion, byte, char, and short values are converted to int
values. The int values are also converted to long values, if necessary. The long and float values are converted to double values, as required.
Numeric promotion is the conversion of a smaller numeric type to a larger numeric type, so that integer and floating-point operations may take place. In numerical promotion, byte, char, and short values are converted to int
values. The int values are also converted to long values, if necessary. The long and float values are converted to double values, as required.
179. What is the difference between a Scrollbar and a ScrollPane?
A Scrollbar is a Component, but not a Container. A ScrollPane is a Container. A ScrollPane handles its own events and performs its own scrolling.
A Scrollbar is a Component, but not a Container. A ScrollPane is a Container. A ScrollPane handles its own events and performs its own scrolling.
180. What is the difference between a public and a non-public class?
A public class may be accessed outside of its package. A non-public class may not be accessed outside of its package.
A public class may be accessed outside of its package. A non-public class may not be accessed outside of its package.
181. To what value is a variable of the boolean type automatically initialized?
The default value of the boolean type is false.
The default value of the boolean type is false.
182. Can try statements be nested?
Try statements may be tested.
183. What is the difference between the prefix and postfix forms of the ++ operator?
The prefix form performs the increment operation and returns the value of the increment operation. The postfix form returns the current value all of the expression and then performs the increment operation on that value.
Try statements may be tested.
183. What is the difference between the prefix and postfix forms of the ++ operator?
The prefix form performs the increment operation and returns the value of the increment operation. The postfix form returns the current value all of the expression and then performs the increment operation on that value.
184. What is the purpose of a statement block?
A statement block is used to organize a sequence of statements as a single statement group.
A statement block is used to organize a sequence of statements as a single statement group.
185. What is a Java package and how is it used?
A Java package is a naming context for classes and interfaces. A package is used to create a separate name space for groups of classes and interfaces. Packages are also used to organize related classes and interfaces into a single API unit and to control accessibility to these classes and interfaces.
A Java package is a naming context for classes and interfaces. A package is used to create a separate name space for groups of classes and interfaces. Packages are also used to organize related classes and interfaces into a single API unit and to control accessibility to these classes and interfaces.
186. What modifiers may be used with a top-level class?
A top-level class may be public, abstract, or final.
A top-level class may be public, abstract, or final.
187. What are the Object and Class classes used for?
The Object class is the highest-level class in the Java class hierarchy. The Class class is used to represent the classes and interfaces that are loaded by a Java program.
The Object class is the highest-level class in the Java class hierarchy. The Class class is used to represent the classes and interfaces that are loaded by a Java program.
188. How does a try statement determine which catch clause should be used to handle an exception?
When an exception is thrown within the body of a try statement, the catch clauses of the try statement are examined in the order in which they appear. The first catch clause that is capable of handling the exception is executed.
The remaining catch clauses are ignored.
When an exception is thrown within the body of a try statement, the catch clauses of the try statement are examined in the order in which they appear. The first catch clause that is capable of handling the exception is executed.
The remaining catch clauses are ignored.
189. Can an unreachable object become reachable again?
An unreachable object may become reachable again. This can happen when the object’s finalize() method is invoked and the object performs an operation which causes it to become accessible to reachable objects.190. When is an object subject to garbage collection?
An object is subject to garbage collection when it becomes unreachable to the program in which it is used.
An unreachable object may become reachable again. This can happen when the object’s finalize() method is invoked and the object performs an operation which causes it to become accessible to reachable objects.190. When is an object subject to garbage collection?
An object is subject to garbage collection when it becomes unreachable to the program in which it is used.
191. What method must be implemented by all threads?
All tasks must implement the run() method, whether they are a subclass of Thread or implement the Runnable interface.
All tasks must implement the run() method, whether they are a subclass of Thread or implement the Runnable interface.
192. What methods are used to get and set the text label displayed by a Button object?
getLabel() and setLabel()
getLabel() and setLabel()
193. Which Component subclass is used for drawing and painting?
Canvas
Canvas
194. What are synchronized methods and synchronized statements?
Synchronized methods are methods that are used to control access to an object. A thread only executes a synchronized method after it has acquired the lock for the method’s object or class. Synchronized statements are similar to synchronized methods. A synchronized statement can only be executed after a thread has acquired the lock for the object or class referenced in the synchronized statement195. What are the two basic ways in which classes that can be run as threads may be defined?
A thread class may be declared as a subclass of Thread, or it may implement the Runnable interface.
Synchronized methods are methods that are used to control access to an object. A thread only executes a synchronized method after it has acquired the lock for the method’s object or class. Synchronized statements are similar to synchronized methods. A synchronized statement can only be executed after a thread has acquired the lock for the object or class referenced in the synchronized statement195. What are the two basic ways in which classes that can be run as threads may be defined?
A thread class may be declared as a subclass of Thread, or it may implement the Runnable interface.
196. What are the problems faced by Java programmers who don’t use layout managers?
Without layout managers, Java programmers are faced with determining how their GUI will be displayed across multiple windowing systems and finding a common sizing and positioning that will work within the constraints imposed by each windowing system.
Without layout managers, Java programmers are faced with determining how their GUI will be displayed across multiple windowing systems and finding a common sizing and positioning that will work within the constraints imposed by each windowing system.
197. What is the difference between an if statement and a switch statement?
The if statement is used to select among two alternatives. It uses a boolean expression to decide which alternative should be executed. The switch statement is used to select among multiple alternatives. It uses an int expression to determine which alternative should be executed.
The if statement is used to select among two alternatives. It uses a boolean expression to decide which alternative should be executed. The switch statement is used to select among multiple alternatives. It uses an int expression to determine which alternative should be executed.
PART-II
NEXT POST,,
TO DOWNLOAD THIS FULLY USE THE LINK POSTED IN COMMENT::