Which of the following elements are the subelements of the mime-mapping element in a deployment descriptor file?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods is used to request that any pending finalizers be run for objects eligible for garbage collection?
Mark works as a Programmer for InfoTech Inc. He wants to develop a JMS API application that is used as a messaging service application. He writes the following createSession() method.
session = connection.createSession(false, 2);
Which of the following statements are true about the syntax?
Each correct answer represents a complete solution. Choose all that apply.
Given below are top-level class declarations. Which of these class declarations would not produce a compile-time error?
abstract class P {} //1
private class Q {} //2
static class R {} //3
transient class S {} //4
Mark works as a Programmer for InfoTech Inc. He develops a session bean class named
accountService. Which of the following rules must be conformed by the session bean class?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Programmer for InfoTech Inc. He develops a Java application that uses the encryption and compression techniques. Which of the following interfaces will he use to control the serialization and deserialization processes?
Mark works as an Application Developer for XYZ Solutions Inc. He writes the following code.
public class TestDemo{public static void main(String[] args){
{try{int x =0;int d= 5/x;}catch(Exception ex){System.out.println("Exception");}
catch(ArithmeticException ae){System.out.println("Arithmetic Exception");}}}
What is the result when Mark tries to compile and execute the code?
Which of the following fields must be present in the login page when using the form-based
authentication?
Each correct answer represents a part of the solution. Choose two.
Which of the following options are available with jar files?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are valid code samples for creating file permissions?
Each correct answer represents a complete solution. Choose all that apply.