Java MCQ
Java MCQ
III - CSE
Java I/O streaming filter and pipe streams Byte Code interpretation - Threading
Swing.
UNIT II NETWORK PROGRAMMING IN JAVA
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
JAVA FUNDAMENTALS
PART A
1)The symbol ! in java means?
A)Logical NOT B)Logical OR C)Logical XOR D)AND
(1 MARK)
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
compiler).
E. The more comments in a program, the faster the program runs.
12)Consider the following code snippet
String river = new String(Columbia);
System.out.println(river.length());
What is printed?
A. 6
B. 7
C. 8
D. Columbia
13)A constructor
A. must have the same name as the class it is declared within.
B. is used to create objects.
C. may be declared private
D. A and B
E. A, B and C
14)Which of the following may be part of a class definition?
A. instance variables
B. instance methods
C. constructors
D. all of the above
E. none of the above
15)What is different between a Java applet and a Java application?
A. An application can in general be trusted whereas an applet can't.
B. An applet must be executed in a browser environment.
C. An applet is not able to access the files of the computer it runs on
D. (A), (B) and (C).
E. None of the above
16)Consider
public class MyClass{
public MyClass(){/*code*/}
// more code...
}
To instantiate MyClass, you would write?
A. MyClass mc = new MyClass();
B. MyClass mc = MyClass();
C. MyClass mc = MyClass;
D. MyClass mc = new MyClass;
E. It can't be done. The constructor of MyClass should be defined as
public void MyClass(){/*code*/}
17)What is byte code in the context of Java?
A. The type of code generated by a Java compiler
B. The type of code generated by a Java Virtual Machine
C. It is another name for a Java source file
D. It is the code written within the instance methods of a class.
18)What is garbage collection in the context of Java?
A. The operating system periodically deletes all of the java files available on the
system.
B. Any package imported in a program and not used is automatically deleted.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
C. When all references to an object are gone, the memory used by the object is
automatically reclaimed.
D. The JVM checks the output of any Java program and deletes anything that
doesn't make sense.
E. Janitors working for Sun MicroSystems are required to throw away any
Microsoft documentation found in the employees' offices.
19)You read the following statement in a Java program that compiles and
executes.
submarine.dive(depth);
What can you say for sure?
A. depth must be an int
B. dive must be a method.
C. dive must be the name of an instance field.
D. submarine must be the name of a class
E. submarine must be a method.
20)What is an infinite loop?
A)A loop that functions infinitely well
B)A loop that runs forever
C)A loop that never starts
D)A loop that will never function
1 2
3 4
5 6
7
8 9 10 11 12 13 14 15 16 17
A D B A A A B C A B D C E D D A A
PART B
18
C
19
B
20
B
(2 MARK)
Oops stands for object oriented programming structure. Object oriented programming develops a
program around its data and sets well defined interfaces to that data.
22.
23.
Secure
Object oriented
Multithreaded
Interpreted and high performance
Dynamic
Encapsulation is the mechanism that binds together code and the data it manipulates,
and keeps both safe from outside interference and misuse.
24. What is mean by inheritance?
Inheritance is the process by which one object acquires the properties of another object.
25. What is polymorphism? (AU NOV DEC 2012)
Polymorphism is a feature that allows one interface to be used for a general class of actions.
26. What are the two parts of a Java program?
The two parts of a Java program are
i. Applet program
ii. Application program
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
27. What are the kinds of variables in Java? (AU NOV/DEC 2011)
Java has three kinds of variables namely,
a. Instance variables
b. Local variables
c. Class variables
28. What are the various kinds of literals?
There are different types of literals. They are:
a. Number literals
b. Character literals
c. Boolean literals
d. String literals
29. What are wrapper classes? (AU NOV/DEC 2011)
Wrapper classes are provided for the primitive data types in order to use these types as objects. The
wrapper classes for the primitive data types have the same name as the primitive type, but with the
first letter capitalized.
30. What is a method?
Methods are functions that operate on instances of classes in which they are defined. Objects can
communicate with each other using methods and can call methods in other classes. Just as there are
class and instance variables, there are class and instance methods. Instance methods apply and operate
on an instance of the class which class methods operate on the class.
31. Describe output streams and input streams in Java.( AU NOV DEC 2012)
I/O in Java is built on streams. Input streams read data. Output streams write data. Different
fundamental stream classes such as java.io.FileInputStream and sun.net.TelnetOutputStream read and
write particular sources of data.
PART B
(16 MARKS)
32. Explain the features of Java.
33. Briefly explain about fundamentals of Java programming.
34. Explain about the classes.
35. Discuss about the Java class library.
36. What is a vector class in Java? Explain with examples.
37. Describe the methods used to establish inter thread communication in Java.
38. Compare threads and processes.
39. Write a Java program to implement merge sort. Use java.lang comparable interface.
40. What is constructor? Explain with examples.
41. Explain the following:
i. Introduction to inheritance
ii. Advantages of inheritance
42. Briefly explain about I/O streams.
43. Define I/O stream types. (AU NOV DEC 2012)
44. What is mean by filter stream? Explain with examples.
45. Briefly explain about advantages of swing.
46. Describe the common thread methods.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
UNIT II
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
a. Java API
b. JVM API
c. JM API
d. API
62. Which of the following is not a Looping statement ____________
A)FOR
B)Switch
C)while
D)Do-While
63. _____________ is a multi way branch statement
a. Switch
b. continue
c. break
d. Label
64. Choose the proper operator precedence when evaluating an Expression?
1. Comparisons
2. Logical operations
3. Increment
4. Arithmetic operations
a. 1-2-4-3
b. 4-3-1-2
c. 2-1-4-3
d. 3-4-1-2
65. The ______ statement is used inside the switch to terminate a Statement sequence
a. break
b. Jump
c. exit
d. goto
66. A class that is inherited is called a ____________
a. superclass
b. Subclass
c. subsetclass
d. Relativeclass
67. An _________ determines which features of a class may be used by other classes
a. specifier
b. inheritance
c. implementation
d. Access specifier
68. Which property of Java allows the creation of hierarchical classifications?
a. Interface
b. Inheritance
c. Robust
d. Distributed
69. Which of the following is WRONG statement with respect to rules for overriding Methods?
A)The method name and the order of arguments should be identical to that of the superclass
method.
B) The return type of both the methods must be the different.
C) The overriding method cannot be less accessible than the method it overrides.
D) An overriding method cannot raise more exceptions than those raised by the super class.
70. The class at the top of the exception classes hierarchy is called ____________
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
a. Common
b. Throwable.
c. NULL
d. Catch
71. Find the keyword which is not used to implement exception
a. try
b. catch
c. finally
d. access
72. Which of the following is not a Exceptions in Java.
a. Arithmetic Exception
b. Nullpointer Exception
c. ArrayoutofBounds Exception
d. Logical Exception
73. Which of the following Definitions hold good for Exception?
a. Abnormal event that occurs during program execution and disrupts the normal flow of
Instruction.
B) The unexpected situations that may occur during program execution
C) The term exception denotes an exception event.
D) All the above
74. The _________ class creates and maintains a buffer for an input stream
a. Common BufferedInputStream
b. BufferedStream
c. InputStream
d. BufferedInputStream
55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74
B A C A B C A B A D A A D B B B D B D D
PART B
(2MARK)
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
provides e-mail facility) and NNTP (Network News Transfer Protocol acts as a bulletin board for
sharing news).
80. What is the method of datagram packet?
Methods:
Send (Datagram packet d) dispatches the given datagram packet object.
Receive (Datagram packet p) receives the given datagram packet object.
Close () closes the socket connection.
81. Explain runnable.
Runnable defines only one abstract method, called run(), which is the entry point to the thread.
Threads that are created by the user must implement abstract void run() method.
82. Explain the interfaces of java.lang.
The java.lang package contains three interfaces namely clone able, comparable, and runnable.
83. What is a package class?
Package class is one that encapsulates version data associated with a package. Since it is necessary for the
java program to know what version of a package is available, package version information is needed.
84. Give the three components of collection frameworks.
Collection frameworks are composed of three components. They are:
Interfaces abstract data types representing collections
Implementations these are the actual execution of the interfaces
Algorithms these are methods that perform computation on objects that implement the interfaces.
85.Define socket. (AU NOV DEC 2012)
A socket is a connection between two hosts. It can perform following basic operations:
a. Connect to a remote machine
b. Send data
c. Receive data
d. Close a connection
e. Bind to a port
f. Listen for incoming data
86. Describe secret key encryption.
In this, the same key is used both to encrypt and decrypt the data. Both the sender and receiver have to
possess the single key.
87. Describe public key encryption.
In this, different keys are used to encrypt and decrypt the data. One key, called the public key, is used to
encrypt the data. This key can be given to anyone. A different key, called the private key, is used to
decrypt the data. This must be kept secret but needs to be possessed by only one of the correspondents.
88. Write about TCP. (AU NOV DEC 2012)
TCP is designed for reliable transmission of data. If data is lost or damaged in transmission, TCP ensures
that the data is resent; if packets of data arrive out of order, TCP puts them back in the correct order; if the
data is coming too fast for the connection, TCP throttles the speed back so that packets will not be lost.
89. Write about get methods in the DatagramPacket class.
DatagramPacket has five methods that retrieve different parts of a datagram: the actual data plus several
fields from its header. These methods are mostly used for data grams we receive from the network.
public InetAddress getAddress()
public int getPort()
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
107.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
d. None of these
123. A applet tag is written in body tag of ___________
a. HTMM
b. HTTP
c. HTML
d. Applet
124.
All applets must be declared as
a. Protected
b. Public
c. Private
d. Static
125. ________ method is called the first time an applet is loaded into the memory
of a computer
a. init method()
b. start method()
c. stop method()
d. destroy method()
126.
Which of the following is a loop construct that will always be executed once?
a. switch
b. for
c. while
d. do . While
127.
_______ provides a database-programming interface for Java programs
a. ODBC
b. JDBC
c. DBMS
d. DAT
128.
Which of the following is NOT a part of JDBC URL?
a. <protocol>
b. <subprotocol>
c. <subname>
d. <name>
129.
_________package Contains classes that help in connecting to a database
a. sql.java
b. mysql.java
c. java.sql
d. java.mysql
130.
RMI stands for
a. Remote Method Invocation
b. Remote method invention
c. Remote Memory Interface
d. Reduced Method Instructions
131.
CORBA stands for
a. Common Operation Request Broker Architecture
b. Common Object Request Bean Architecture
c. Common Object Request Broker Architecture
d. Component Object Request Broker Architecture
132.
Which of the following statements holds good for JavaBeans?
a. JavaBeans allows to efficiently constructing applications by Configuring and
Connecting Components called Beans.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
133.
134.
135.
136.
III - CSE
137.
119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138
B
A
B
A
C
B
B
D
B
D
C
A
C
A
A
A
B
C
C
B
PART B
(2MARKS)
139. Describe the differences between RMI and RPC.
A remote procedure call (RPC) is a procedural invocation from a process on one machine to a process on
another machine. A remote method invocation in Java takes the RPC concept one step further and allows
for distributed object communications.
140. Describe marshalling and unmarshalling.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
These allow passing parameters, including Java primitives and Java objects, over the network.
Marshalling and Unmarshalling is the process of massaging parameters so that they are usable on the
machine being invoked on remotely. It is the packaging and unpackaging of parameters so that they are
usable in two heterogeneous environments.
141. Define interface and implementation.
The interface defines the exposed information about an object, such as the names of its methods and what
parameters those methods take. The implementation is the core programming logic that an object
provides. It has some very specific algorithms, logic and data
142. Define remote object.
Remote objects are networked object implementation that can be called by another JVM. They implement
a remote interface and thus expose methods that can be invoked by remote clients.
143. Differentiate pass-by-value and pass-by-reference.
When invoking a method using RMI-IIOP, all parameters to the remote method are passed by-value. This
means that when a client calls a server, all parameters are copied from one machine to the other.
When we call a method in Java and pass an object as a parameter, that object is passed by reference. The
reference to the object is copied, but the actual objects data is not.
144. What is object serialization? (AU Nov/Dec 2010) (AU NOV DEC 2012)
Serialization is the conversion of a Java object into a bit-blob representation of that object.
145. Mention some rules for serialization.
Java serialization has the following rules for member variables held in serialized objects:
a. Any basic primitive type (int, char, and so on) is automatically serialized with the object
and is available when deserialized.
b. Java objects can be included with the serialized bit-blob or not.
146. Describe RMI IIOP.
Java RMI IIOP (which stands for Java Remote Method Invocation over the Internet Inter ORB
Protocol) is J2EEs de facto mechanism for performing simple, powerful networking. It allows writing
distributed objects in Java, enabling objects to communicate in memory, across Java Virtual Machines,
and across physical devices.
147. What is JNDI?
The JNDI is a J2EE API that provides a standard interface for locating users, machines, networks, objects
and services.
148. Describe directory service.
A directory service is a naming service that has been extended and enhanced to provide directory object
operations for manipulating attributes. A directory is a system of directory objects that are all connected.
149. What is DNS?
Domain Name System (DNS) is used to translate a machine name to an IP address. If we look up
wiley.com on the internet, the name wiley.com is translated into the object 199.171.201.14 by the DNS.
150. List out some benefits of JNDI.
a. JNDI insulates the application from protocol and implementation details.
b. We can use the JNDI to read and write whole Java objects from directories.
c. Using JNDI to acquire a reference to the Java Transaction API (JTA) User Transaction
interface.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
d. Using JNDI to connect to resource factories, such as JDBC drivers or Java Message
Service (JMS) drivers.
151. Define naming system, name spaces, composite names.
A naming system is a connected set of contexts.
A namespace is all the names contained within naming system.
A composite name is a name that spans multiple naming systems.
152. What is CORBA? (AU Nov/Dec 2010) (AU NOV/DEC 2011)
The Common Object Request Broker Architecture (CORBA) is a unifying standard for writing distributed
object systems. The standard is completely neutral with respect to platform, language and vendor.
CORBA incorporates a host of technologies and is very broad in scope.
153. Why CORBA is needed?
a. We can use CORBA for legacy integration.
b. CORBA allows for advanced middleware development.
c. CORBA and EJB have hooks connecting them.
154. List out the some drawbacks of CORBA.
a. CORBA is slow moving
b. CORBA has a steep learning curve
c. Products developed under CORBA may have incompatible features
155. Mention some services provided by CORBA.
a. The CORBA Naming Service is a CORBA service that allows to look up CORBA objects
by name, a technology similar to the Java Naming and Directory Interface (JNDI).
b. The CORBA Event Service allows for asynchronous communications between CORBA
objects.
c. The CORBA Object Transaction Service (OTS) enables CORBA objects to perform
transactions.
d. The Concurrency Control Service allows for multiple clients to concurrently interact with
a resource.
e. The CORBA Security Service adds secure functionality to our CORBA system.
156. What is ORB?
Object Request Broker (ORB) facilitates network communications. ORBs enable disparate applications
to communicate without being aware of the underlying communications mechanism. They are responsible
for finding objects to service method calls, handling parameter passing and returning results.
157. Write down the steps needed for CORBA client to calling RMI object implementation.
a. Write your RMI IIOP remote interface
b. Generate the needed server side RMI IIOP skeletons
c. Generate the OMG IDL
d. Generate the needed client-side CORBA files
e. Write the client and the server
158. What is EJB JAR file? (AU NOV/DEC 2011) (AU NOV DEC 2012)
An Ejb-jar file is a compressed file that contains everything we have described, and it follows the .ZIP
compression format. Jar files are convenient, compact modules for shipping our Java software.
PART B
(16 MARKS)
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
UNIT IV
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
PART B
(2 MARKS)
192. Describe JDBC.
JDBC allows programmers to connect to a data base, query it, or update it, using the Structured Query
Language (SQL). Programs developed with the Java programming language and JDBC are platform
independent and vendor independent.
193. Describe JDBC API.
The JDBC consist of two layers. The top layer is the JDBC API. This API communicates with the
JDBC manager driver API, sending it the various SQL statements. The manager should communicate with
the various third-party drivers that actually connect to the database and return the information from the query
or perform the action specified by the query.
194. Classify the JDBC drivers.
JDBC drivers are classified into the following types:
i) A type 1 driver translates JDBC to ODBC and relies on an ODBC driver to communicate with the
database.
ii) A type 2 driver, written partly in the Java programming language and partly in native code that
communicates with the client API of a database.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
iii) A type 3 driver is a pure Java client library that uses a database-independent protocol to
communicate database requests to a server component, which then translates the requests into a
database-specific protocol.
iv) A type 4 driver is a pure Java library that translates JDBC requests directly to a database-specific
protocol.
195. What are the options supported by the Java 2D API. (AU NOV/DEC 2011)
* We can easily produce a wide variety of shapes.
* We can control over the stroke.
* We can fill shapes with solid colors, varying hues, and repeating patterns.
* We can use transformations to move, scale, rotate, or stretch shapes.
We can clip shapes to restrict them to arbitrary areas.
196. Write some of the methods in the Graphics class to draw shapes:
i) drawLine
ii) drawRectangle
iii) drawRoundRect
iv) draw3DRect
v) drawPolygon
vi) drawPolyline
vii) drawOval
viii) drawArc
(16 MARKS)
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
207. What is an applet? Explain how applets are used in net based applications.
208. Write an applet to display the institute name.
209. Design an applet to display your institutes name.
210. Discuss in detail the various methods in servlet to handle HTTP request and responses.
211. Explain the various methods defined by servlet request and servlet response interfaces?
212. Explain in detail the various components of JDBC? Give the steps for using JDBC to access a
data base.
213. Explain the life cycle of a servlet with various methods.
214. Write notes on:
i) Servlet APT
ii) Servlet life cycle
215. Write notes on:
i) Layout manager
ii) JDBC
216. Explain the architecture for servlets with a neat diagram. Illustrate each component of servlet.
(AU NOV DEC 2012)
217. Write short notes on:
i) Flow Layout
ii) Border Layout
iii) Grid Layout
iv) Card Layout
217. Explain the JDBC application architecture.
218. Design an applet to draw a traffic signal post with STOP, LISTEN and PROCEED signals.
219. Describe in detail about the multi tier application developments.
220. Describe the Java media framework.
221. Does RMI-IIOP support dynamic downloading for classes? (AU Nov/Dec 2010) (AU
NOV/DEC 2011)
222. Which method is called first when the JSP is requested? Mention its usage. (AU Nov/Dec 2010)
223. Explain the servlet utility classes in detail. (AU Nov/Dec 2010) (AU NOV/DEC 2011)
224. How does an applet running on a client machine send messages to a servlet running in the
server? Illustrate with an example. (AU Nov/Dec 2010)
UNIT V
ENTERPRISE APPLICATIONS
PART A
225.Polymorphism in java is implemented through ----------a) Virtual function
b) Function overloading
c) Both above
d) None of these
226.i) The BufferedInputStream class creates and maintains a buffer for an input stream.
ii) String object we are creating can be changed
A)Both i and ii true
B)i false and ii true
C)i true ii false
D)None
227..example of numeric constant
i.23000
ii.450.6
a) i is true
b)ii is true
c)both true d)none
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
4. friend ,Public
235. A class can be declared as _______ if you do not want the class to be subclassed. Using the
__________keyword we can abstract a class interface from its implementation
1. protected ,interface
2. final,interface
3. public,friend
4. final,protected
236.The term exception denotes an ________ event .Java handles exceptions the
______________ way.
1. exceptional ,object-oriented
2. traditional, object-oriented
3. exceptional, procedural
4. friend ,Public
237. Identify the situations in which an null exception is NOT thrown
1. Using an object without allocating memory for it.
2. Calling the methods of a null object.
3. Accessing or modifying the attributes of a null object.
4. Attempt to access an array element beyond the index of the array
1. 1
2. 3
3. 4
4. 2
238. The two major classes for byte streams are _______ and _______
1. Input,Output.
2. byteStream,bitStream.
3. InputStream,OutputStream.
4. stringStream,stingStream.
239. The ________ and _________ classes are filter streams that allow the reading and Writing
of Java primitive data types.
1. InputStream, OutputStream
2. DataInputStream, DataOutputStream
3. Input,Output.
4. byteStream,bitStream.
240. Which of the following method does not belong to graphics class?
a. Text
b. pixel
c. Lines
d. Circle and ellipse.
241. To establish a connection with a database, you need to register the ODBC-JDBC Driver by
calling the __________ method from the Class class and then calling the ________ method
from the DriverManager class.
1. getConnection (),forName ()
2. for () , get ()
3. get (), for () ,
4. forName (), getConnection ()
242.In the init(ServletConfig) method of Servlet life cycle, what method can be used to access
the ServletConfig object ?
(a) getServletInfo()
(b) getInitParameters()
(c) getServletConfig()
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244
C
C
B
D
B
A
B
D
C
B
A
C
C
A
B
D
C
B
B
PART B
(2 MARKS)
245. When we use execute query () and executeupdate () methods of the statement object?
The execute query () method is used to execute the SQL statements that return a result set object. The
executeupdate () method is used to execute the SQL statements that manipulate data.
246.What is forname () method used for?
The forname () method is a static method present in the class. It is used to load the specified class at run time
and returns the class descriptor.
247. What is the difference between an applet and a Java bean? (AU NOV/DEC 2011)
The main distinguishing features of a Java bean are customization, introspection and persistence.
248.What is Glasgow?
It is the code name for the next release of JavaBeans component model specification.
249. What is bean? (AU NOV DEC 2012)
A bean is a reusable and a self-contained software component.
250. What are the types of Java beans?
Three types of beans:
i)
Control beans ii)Container beans iii)Invisible run time beans
251. What is the use of driver manager class?
The driver manager class is used to establish a connection with a data base.
252.What is executing query ()?
The execute query () method executes a simple select query and returns a result set object.
253. What is executing update ()?
The execute update () method executes an SQLINSERT, UPDATE or DELETE statement and returns
an int value specifying the number of rows affected by the query or () if the query does not return any value.
Ms.B.NIRMALA ASST.PROFESSOR/CSE
QUESTION BANK
III - CSE
QUESTION BANK
III - CSE
265. Explain in detail the server side component architecture with a neat diagram. (AU NOV/DEC
2011)
266. What is J2EE? How is it used in networking?
267. Explain in detail about the J2EE and its features. (AU NOV/DEC 2011) (AU NOV DEC 2012)
268. What is meant by session bean? What are the steps followed in writing a session bean?various
method in it. (AU NOV DEC 2012)
269. Briefly explain about the entity beans and itd adv and disadvantage. (AU NOV DEC 2012)
270. Explain in detail about the persistent entity beans.
271. Write a Java program to use the Java beans.
272. Write a Java program to find the factorials of n numbers.
273. Explain the transactions.
274. What is Java bean? List the steps to create a new bean.
275. Explain the characteristics of stateful session beans. (AU NOV/DEC 2011)
276. What is EJB container? (AU Nov/Dec 2010)
277. What is durable subscription in a JMS? (AU Nov/Dec 2010)
278. Describe the components of a JMS program in detail. (AU Nov/Dec 2010)
279. Explain the use of RMI in a transportation company in which the server has the details of items
transported and the movement can be monitored from any client machine. (AU Nov/Dec 2010)
Ms.B.NIRMALA ASST.PROFESSOR/CSE