300+ TOP J2EE Interview Questions and Answers

J2EE Interview Questions for freshers experienced :-

1. What is J2EE?
J2EE is an environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces

(APIs), and protocols that provide the functionality for developing multitiered, web-based applications.

2. What is the J2EE module?
A J2EE module consists of one or more J2EE components for the same container type and one component deployment descriptor of that type.

3. What are the components of J2EE application?
A J2EE component is a self-contained functional software unit that is assembled into a J2EE application with its related classes and files and communicates with other components. The J2EE specification defines the following J2EE components:

Application clients and applets are client components.

Java Servlet and JavaServer PagesTM (JSPTM) technology components are web components.

Enterprise JavaBeansTM (EJBTM) components (enterprise beans) are business components.

Resource adapter components provided by EIS and tool vendors.

4. What are the four types of J2EE modules?

  1. Application client module
  2. Web module
  3. Enterprise JavaBeans module
  4. Resource adapter module
  5. What does application client module contain?

The application client module contains:

=> class files,

=> an application client deployment descriptoor.

Application client modules are packaged as JAR files with a .jar extension.

6. What does web module contain?
The web module contains:

=> JSP files,

=> class files for servlets,

=> GIF and HTML files, and

=> a Web deployment descriptor.

Web modules are packaged as JAR files with a .war (Web ARchive) extension.

7. What are the differences between Ear, Jar and War files? Under what circumstances should we use each one?
There are no structural differences between the files they are all archived using zip-jar compression.

However, they are intended for different purposes.

=> Jar files (files with a .jar extension) arre intended to hold generic libraries of Java classes, resources, auxiliary files, etc.

=> War files (files with a .war extension) arre intended to contain complete Web applications. In this context, a Web application is defined as a single group of files, classes, resources, .jar files that can be packaged and accessed as one servlet context.

=> Ear files (files with a .ear extension) arre intended to contain complete enterprise applications.

In this context, an enterprise application is defined as a collection of .jar files, resources, classes, and multiple Web applications.

Each type of file (.jar, .war, .ear) is processed uniquely by application servers, servlet containers, EJB containers, etc.

8. What is the difference between Session bean and Entity bean?one?

The Session bean and Entity bean are two main parts of EJB container.

Session Bean:

  • represents a workflow on behalf of a cliennt
  • one-to-one logical mapping to a client.
  • created and destroyed by a client
  • not permanent objects
  • lives its EJB container(generally) does noot survive system shut down
  • two types: stateless and stateful beans Entity Bean
  • represents persistent data and behavior off this data
  • can be shared among multiple clients
  • persists across multiple invocations
  • findable permanent objects
  • outlives its EJB container, survives systeem shutdown
  • two types: container managed persistence(CCMP) and bean managed persistence(BMP)

9. What is “applet” ?
A J2EE component that typically executes in a Web browser but can execute in a variety of other applications or devices that support the applet programming model.

10. What is “applet container” ?
A container that includes support for the applet programming model.

J2EE Interview Questions
J2EE Interview Questions

11. What is authorization?
The process by which access to a method or resource is determined. Authorization depends on the determination of whether the principal associated with a request

through authentication is in a given security role. A security role is a logical grouping of users defined by the person who assembles the application. A

deployer maps security roles to security identities.

Security identities may be principals or groups in the operational environment.

22. What is authorization constraint
An authorization rule that determines who is permitted to access a Web resource collection.

23. What is B2B
B2B stands for Business-to-business.

24. What is backing bean
A JavaBeans component that corresponds to a JSP page that includes JavaServer Faces components. The backing bean defines properties for the components on the page

and methods that perform processing for the component.

This processing includes event handling, validation, and processing associated with navigation.

25. What is basic authentication
An authentication mechanism in which a Web server authenticates an entity via a user name and password obtained using the Web application’s built-in authentication mechanism.

26. What is bean-managed persistence
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean.

27. What is bean-managed transaction
A transaction whose boundaries are defined by an enterprise bean.

28. What is binding (XML)
Generating the code needed to process a well-defined portion of XML data.

29. What is binding (JavaServer Faces technology)
Wiring UI components to back-end data sources such as backing bean properties.

30. What is build file
The XML file that contains one or more asant targets.

A target is a set of tasks you want to be executed.

When starting asant, you can select which targets you want to have executed. When no target is given, the project’s default target is executed.

31. What is business logic
The code that implements the functionality of an application. In the Enterprise JavaBeans architecture, this logic is implemented by the methods of an enterprise bean.

32.What is business method
A method of an enterprise bean that implements the business logic or rules of an application.

33. Differentiate Between .ear, .jar And .war Files.

These files are simply zipped file using Java jar tool. These files are created for different purposes. Here is the description of these files:

  • .jar files: These files are with the .jar extension. The .jar files contains the libraries, resources and accessories files like property files.
  • .war files: These files are with the .war extension. The war file contains the web application that can be deployed on the any servlet/jsp container. The .war file contains jsp, html, javascript and other files for necessary for the development of web applications.
  • .ear files: The .ear file contains the EJB modules of the application.

34. What is caller ?
Same as caller principal.

35. What is caller principal ?
The principal that identifies the invoker of the enterprise bean method.

36. What is cascade delete ?
A deletion that triggers another deletion. A cascade delete can be specified for an entity bean that has container-managed persistence.

37. What is CDATA ?
A predefined XML tag for character data that means “don’t interpret these characters,” as opposed to parsed character data (PCDATA), in which the normal

rules of XML syntax apply. CDATA sections are typically used to show examples of XML syntax.

38. What is certificate authority ?
A trusted organization that issues public key certificates and provides identification to the bearer.

39. What is client-certificate authentication ?
An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client authenticate each other with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.

40. What is comment ?
In an XML document, text that is ignored unless the parser is specifically told to recognize it.

41. What is commit ?
The point in a transaction when all updates to any resources involved in the transaction are made permanent.

42. What is component contract ?
The contract between a J2EE component and its container. The contract includes life-cycle management of the component, a context interface that the instance uses to obtain various information and services from its container, and a list of services that every container must provide for its components.

43. What is component-managed sign-on ?
A mechanism whereby security information needed for signing on to a resource is provided by an application component.

44. What is connector ?
A standard extension mechanism for containers that provides connectivity to enterprise information systems. A connector is specific to an enterprise information system and consists of a resource adapter and application development tools for enterprise information system connectivity. The resource adapter is plugged in to a container through its support for system-level contracts defined in the Connector architecture.

45. What is Connector architecture ?

  • An architecture for integration of J2EE products with enterprise information systems. There are two parts to this architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this resource adapter to plug in.
  • This architecture defines a set of contracts that a resource adapter must support to plug in to a J2EE product-for example, transactions, security, and resource management.

46. What is container ?
An entity that provides life-cycle management, security, deployment, and runtime services to J2EE components. Each type of container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services.

47. What is container-managed persistence ?
The mechanism whereby data transfer between an entity bean’s variables and a resource manager is managed by the entity bean’s container.

48. What is container-managed sign-on ?
The mechanism whereby security information needed for signing on to a resource is supplied by the container.

49. What is container-managed transaction ?
A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions.

50. What is content ?
In an XML document, the part that occurs after the prolog, including the root element and everything it contains.

51. What is context attribute ?
An object bound into the context associated with a servlet.

52. What is context root ?
A name that gets mapped to the document root of a Web application.

53. What is conversational state ?
The field values of a session bean plus the transitive closure of the objects reachable from the bean’s fields. The transitive closure of a bean is defined in

terms of the serialization protocol for the Java programming language, that is, the fields that would be stored by serializing the bean instance.

54. What is CORBA
Common Object Request Broker Architecture. A language-independent distributed object model specified by the OMG.

55. What is create method
A method defined in the home interface and invoked by a client to create an enterprise bean.

56. What is credentials
The information describing the security attributes of a principal.

57. What is CSS
Cascading style sheet. A stylesheet used with HTML and XML documents to add a style to all elements marked with a particular tag, for the direction of browsers

or other presentation mechanisms.

58. What is CTS
Compatibility test suite. A suite of compatibility tests for verifying that a J2EE product complies with the J2EE platform specification.

59. What is data?
The contents of an element in an XML stream, generally used when the element does not contain any subelements. When it does, the term content is generally used. When the only text in an XML structure is contained in simple elements and when elements that have subelements have little or no data mixed in, then that structure is often thought of as XML data, as opposed to an XML document.

60. What is DDP
Document-driven programming. The use of XML to define applications.

61. What is declaration
The very first thing in an XML document, which declares it as XML. The minimal declaration is . The declaration is part of the document prolog.

62. What is declarative security
Mechanisms used in an application that are expressed in a declarative syntax in a deployment descriptor.

63. What is delegation
An act whereby one principal authorizes another principal to use its identity or privileges with some restrictions.

64. What is deployer
A person who installs J2EE modules and applications into an operational environment.

65. What is deployment
The process whereby software is installed into an operational environment.

66. What is deployment descriptor
An XML file provided with each module and J2EE application that describes how they should be deployed. The deployment descriptor directs a deployment tool to deploy a module or application with specific container options and describes specific configuration requirements that a deployer must resolve.

67. What is destination
A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point messaging system, publish/subscribe messaging system.

66. What Does Isidentical() Method Return In Case Of Different Type Of Beans?

Stateless – true always. Stateful – depends whether the references point to the same session object. Entity – Depends whether the primary key is the same and the home is same.

69. What is distributed application
An application made up of distinct components running in separate runtime environments, usually on different platforms connected via a network. Typical distributed

applications are two-tier (client-server), three-tier (client-middleware-server), and multitier (client-multiple middleware-multiple servers).

67. What is document
In general, an XML structure in which one or more elements contains text intermixed with subelements.

68. What is Document Object Model
An API for accessing and manipulating XML documents as tree structures. DOM provides platform-neutral, language-neutral interfaces that enables programs and

scripts to dynamically access and modify content and structure in XML documents.

69. What is document root
The top-level directory of a WAR. The document root is where JSP pages, client-side classes and archives, and static Web resources are stored.

70. What Is The Basic Requirement For In-memory Replication In Weblogic?

The data in session should consist only of Serialized objects. Only setAttribute function should be used to set objects in session.

71. How Jdbc Services Can Be Used In Clustered Environment?

Identical DataSource has to be created in each clustered server instances and configure to use different connection pools.

72. Mention Some Tools To Cluster Web Servers?

Web Servers can be clustered using Edge Server or DNS.

73. What Is In-memory Replication?

The process by which the contents in the memory of one physical m/c are replicated in all the m/c in the cluster is called in-memory replication.

74. Difference Between Abstraction And Encapsulation?

Abstraction is removing some distinctions between objects, so as to show their commonalities. Encapsulation is hiding the details of the implementation of an object so that there are no external dependencies on the particular implementation.

75. What Is The Difference Between Url Instance And Urlconnection Instance?

A URL instance represents the location of a resource, and a URLConnection instance represents a link for accessing or communicating with the resource at the location.

76. What Are The Two Important Tcp Socket Classes?

Socket and ServerSocket. ServerSocket is used for normal two-way socket communication. Socket class allows us to read and write through the sockets. getInputStream() and getOutputStream() are the two methods available in Socket class.

77. What Technologies Are Included In J2ee?

The primary technologies in J2EE are: Enterprise JavaBeansTM (EJBsTM), JavaServer PagesTM (JSPsTM), Java Servlets, the Java Naming and Directory InterfaceTM (JNDITM), the Java Transaction API (JTA), CORBA, and the JDBCTM data access API.

78. What Is The Java Authentication And Authorization Service (jaas) 1.0?

The Java Authentication and Authorization Service (JAAS) provides a way for a J2EE application to authenticate and authorize a specific user or group of users to run it. JAAS is a Java programing language version of the standard Pluggable Authentication Module (PAM) framework that extends the Java 2 platform security architecture to support user-based authorization.

79. What’s The Difference Between Jndi Lookup(), List(), Listbindings(), And Search()?

lookup() :attempts to find the specified object in the given context. I.e., it looks for a single, specific object and either finds it in the current context or it fails.

list(): attempts to return an enumeration of all of the NameClassPair’s of all of the objects in the current context. I.e., it’s a listing of all of the objects in the current context but only returns the object’s name and the name of the class to which the object belongs.

listBindings(): attempts to return an enumeration of the Binding’s of all of the objects in the current context. I.e., it’s a listing of all of the objects in the current context with the object’s name, its class name, and a reference to the object itself.

search(): attempts to return an enumeration of all of the objects matching a given set of search criteria. It can search across multiple contexts (or not). It can return whatever attributes of the objects that you desire. It’s by far the most complex and powerful of these options but is also the most expensive.

80. Components Of Jndi?

Naming Interface- The naming interface organizes information hierarchically and maps human-friendly names to addresses or objects that are machine-friendly. It allows access to named objects through multiple namespaces. Directory Interface – JNDI includes a directory service interface that provides access to directory objects, which can contain attributes, thereby providing attribute-based searching and schema support. Service Provider Interface – JNDI comes with the SPI, which supports the protocols provided by third parties.

81. What is EJB object
An object whose class implements the enterprise bean’s remote interface. A client never references an enterprise bean instance directly; a client always

references an EJB object. The class of an EJB object is generated by a container’s deployment tools.

82. What is EJB server
Software that provides services to an EJB container.

For example, an EJB container typically relies on a transaction manager that is part of the EJB server to perform the two-phase commit across all the participating resource managers. The J2EE architecture assumes that an EJB container is hosted by an EJB server from the same vendor, so it does not specify the contract between these two entities. An EJB server can host one or more EJB containers.

83. What is EJB server provider
A vendor that supplies an EJB server.

83.What is element
A unit of XML data, delimited by tags. An XML element can enclose other elements.

84. What is empty tag
A tag that does not enclose any content

85. What is enterprise bean
A J2EE component that implements a business task or business entity and is hosted by an EJB container;

either an entity bean, a session bean, or a message-driven bean.

86. What is enterprise bean provider
An application developer who produces enterprise bean classes, remote and home interfaces, and deployment descriptor files, and packages them in an EJB JAR

file.

87. What is enterprise information system
The applications that constitute an enterprise’s existing system for handling companywide information.

These applications provide an information infrastructure for an enterprise. An enterprise information system offers a well-defined set of services to its clients. These services are exposed to clients as local or remote interfaces or both.

Examples of enterprise information systems include enterprise resource planning systems, mainframe transaction processing systems, and legacy database systems.

88. What is enterprise information system resource
An entity that provides enterprise information system-specific functionality to its clients. Examples are a record or set of records in a database system, a business object in an enterprise resource planning system, and a transaction program in a transaction processing system.

89. What is Enterprise JavaBeans (EJB)
A component architecture for the development and deployment of object-oriented, distributed, enterprise-level applications. Applications written using the Enterprise JavaBeans architecture are scalable, transactional, and secure.

90. What is Enterprise JavaBeans Query Language (EJB QL)
Defines the queries for the finder and select methods of an entity bean having container-managed persistence. A subset of SQL92, EJB QL has extensions that allow navigation over the relationships defined in an entity bean’s abstract schema.

91. What is an entity
A distinct, individual item that can be included in an XML document by referencing it. Such an entity reference can name an entity as small as a character (for example, <, which references the less-than symbol or left angle bracket, <). An entity reference can also reference an entire document, an external entity, or a collection of DTD definitions.

92. What is entity bean
An enterprise bean that represents persistent data maintained in a database. An entity bean can manage its own persistence or can delegate this function to

its container. An entity bean is identified by a primary key. If the container in which an entity bean is hosted crashes, the entity bean, its primary key,

and any remote references survive the crash.

93. What is entity reference
A reference to an entity that is substituted for the reference when the XML document is parsed. It can reference a predefined entity such as < or reference one that is defined in the DTD. In the XML data, the reference could be to an entity that is defined in the local subset of the DTD or to an external XML file (an external entity). The DTD can also carve out a segment of DTD specifications and give it a name so that it can be reused (included) at multiple points in the DTD by defining a parameter entity.

94. What is error
A SAX parsing error is generally a validation error; in other words, it occurs when an XML document is not valid, although it can also occur if the declaration

specifies an XML version that the parser cannot handle. See also fatal error, warning.

95. What is Extensible Markup Language
XML.

96. What is external subset
That part of a DTD that is defined by references to external DTD files.

97. What is fatal error
A fatal error occurs in the SAX parser when a document is not well formed or otherwise cannot be processed.

See also error, warning.

98. What is filter
An object that can transform the header or content (or both) of a request or response. Filters differ from Web components in that they usually do not themselves

create responses but rather modify or adapt the requests for a resource, and modify or adapt responses from a resource. A filter should not have any dependencies on a Web resource for which it is acting as a filter so that it can be composable with more than one type of Web resource.

99. What is filter chain
A concatenation of XSLT transformations in which the output of one transformation becomes the input of the next.

100. What is finder method
A method defined in the home interface and invoked by a client to locate an entity bean.

101. What is form-based authentication
An authentication mechanism in which a Web container provides an application-specific form for logging in.

This form of authentication uses Base64 encoding and can expose user names and passwords unless all connections are over SSL.

102. What is general entity
An entity that is referenced as part of an XML document’s content, as distinct from a parameter entity, which is referenced in the DTD. A general entity can be a parsed entity or an unparsed entity.

103. What is group
An authenticated set of users classified by common traits such as job title or customer profile. Groups are also associated with a set of roles, and every

user that is a member of a group inherits all the roles assigned to that group.

104. What is handle
An object that identifies an enterprise bean. A client can serialize the handle and then later deserialize it to obtain a reference to the enterprise bean.

105. What is home handle
An object that can be used to obtain a reference to the home interface. A home handle can be serialized and written to stable storage and deserialized to obtain the reference.

107. What is home interface
One of two interfaces for an enterprise bean. The home interface defines zero or more methods for managing an enterprise bean. The home interface of a session bean defines create and remove methods, whereas the home interface of an entity bean defines create, finder, and remove methods.

108. What is HTML
Hypertext Markup Language. A markup language for hypertext documents on the Internet. HTML enables the embedding of images, sounds, video streams, form fields, references to other objects with URLs, and basic text formatting.

109. What is HTTP
Hypertext Transfer Protocol. The Internet protocol used to retrieve hypertext objects from remote hosts.

HTTP messages consist of requests from client to server and responses from server to client.

110. What is HTTPS
HTTP layered over the SSL protocol.

111. What is external entity
An entity that exists as an external XML file, which is included in the XML document using an entity reference.

300+ [LATEST] J2ee Interview Questions and Answers

Q1. How Do I Enable Server Side Includes (ssi)?

Two things have to be done for tomcat to acknowledge SSI scripts: 

@Rename $CATALINA_BASE/server/lib/servlets-ssi.renametojar to $CATALINA_BASE/server/lib/servlets-ssi.jar. 

@Uncomment the section of web.xml found in $CATALINA_BASE/conf/web.xml that deals with SSI. it looks like this when it is uncommented: 

   
        ssi
       
          org.apache.catalina.ssi.SSIServlet
       

       
          buffered           1        

       
          debug           0        

       
          expires           666        

       
          isVirtualWebappRelative           0        

        4
   

Q2. What Is The Use Of Message Object?

Message is a light weight message having only header and properties and no payload. Thus if the receivers are to be notified about an event, and no data needs to be exchanged then using Message can be very efficient.

Q3. What Is An Action Class Used For?

An Action is an adapter between the contents of an incoming HTTP request and the corresponding business logic that should be executed to process this request. The controller (ActionServlet) will select an appropriate Action for each request, create an instance (if necessary), and call the perform method. Actions must be programmed in a thread-safe manner, because the controller will share the same instance for multiple simultaneous requests. In this me you should design with the following items in mind:

  • Instance and static variables MUST NOT be used to store information related to the state of a particular request. They MAY be used to share global resources across requests for the same action.
  •  Access to other resources (JavaBe, session variables, etc.) MUST be synchronized if those resources require protection. (Generally, however, resource classes should be designed to provide their own protection where necessary. When an Action instance is first created, the controller servlet will call setServlet() with a non-null argument to identify the controller servlet instance to which this Action is attached. When the controller servlet is to be shut down (or restarted), the setServlet() method will be called with a null argument, which can be used to clean up any allocated resources in use by this Action.

Q4. What Is Jsp Tag Library?

A collection of custom tags described via a tag library descriptor and Java classes.

Q5. What Is Jsp Container?

A container that provides the same services as a servlet container and an engine that interprets and processes JSP pages into a servlet.

Q6. What Is Connector Architecture?

An architecture for integration of J2EE products with enterprise information systems. There are two parts to this architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this resource adapter to plug in. This architecture defines a set of contracts that a resource adapter must support to plug in to a J2EE product-for example, tractions, security, and resource management.

Q7. What Is J2ee Product Provider?

A vendor that supplies a J2EE product.

Q8. What Are Types Of J2ee Clients?

J2EE clients are the software that access the services components installed on the J2EE container. Following are the J2EE clients:
a) Applets
b) Java-Web Start clients
c) Wireless clients
d) Web applications.

Q9. What Is Content?

In an XML document, the part that occurs after the prolog, including the root element and everything it contains.

Q10. How Do You Create Multiple Virtual Hosts?

If you want tomcat to accept requests for different hosts e.g., www.myhostname.com then you must 

@create ${catalina.home}/www/appBase , ${catalina.home}/www/deploy, and ${catalina.home} /conf /Catalina /www.myhostname.com 

@add a host entry in the server.xml file 
 

@Create the the following file under conf/Catalina/www.myhostname.com/ROOT.xml 

    path=”/”
    docBase=”www/deploy/mywebapp.war”
    reloadable=”true” antiJARLocking=”true”>

Add any parameters specific to this hosts webapp to this context file 

@put your war file in ${catalina.home}/www/deploy 

When tomcat starts, it finds the host entry, then looks for any context files and will start any apps with a context 

To add more sites just repeat and rinse, all webapps can share the same war file location and appbase.

Q11. What Is The Default Value Of Boolean?

False.

Q12. How Do You Optimize Entity Be?

• Tune the entity be pool size to avoid overhead of creation and destruction of be.
• Tune the entity be cache size to avoid overhead of activation, passivation and database calls.
• Use setEntityContext() method to cache bean specific resources.
• Release acquired resources in unSetEntityContext() method.
• Use Lazy loading to avoid unnecessary pre-loading of child data.
• Choose optimal traction isolation level to avoid blocking of other tractional clients.
• Use proper locking strategy.
• Make read-only entity be for read only operations.

Q13. What Is External Subset?

That part of a DTD that is defined by references to external DTD files.

Q14. What Are The Special Design Care That Must Be Taken When You Work With Local Interfaces?

It is important to understand that the calling semantics of local interfaces are different from those of remote interfaces. For example, remote interfaces pass parameters using call-by-value semantics, while local interfaces use call-by-reference. This me that in order to use local interfaces safely, application developers need to carefully consider potential deployment scenarios up front, then decide which interfaces can be local and which remote, and finally, develop the application code with these choices in mind. While EJB 2.0 local interfaces are extremely useful in some situations, the long-term costs of these choices, especially when changing requirements and component reuse are taken into account, need to be factored into the design decision.

Q15. What Is Basic Authentication?

An authentication mechanism in which a Web server authenticates an entity via a user name and password obtained using the Web application’s built-in authentication mechanism.

Q16. How Do I Configure Tomcat To Work With Iis And Ntlm?

Follow the standard instructions for when the isapi_redirector.dll 

Configure IIS to use “integrated windows security” 

In server.xml, make sure you disable tomcat authentication: 

protocol=”AJP/1.3″tomcatAuthentication=”false” />

Q17. What Is Javaserver Faces Technology?

A framework for building server-side user interfaces for Web applications written in the Java programming language.

Q18. What Is Ddp?

Document-driven programming. The use of XML to define applications.

Q19. What Is Ejb Object?

An object whose class implements the enterprise bean’s remote interface. A client never references an enterprise bean instance directly; a client always references an EJB object. The class of an EJB object is generated by a container’s deployment tools.

Q20. How Do You Optimize Io?

• Use Buffered IO classes.
• File information such as file length requires a system call and can be slow. Don’t use it often. Similarly, System.currentTimeMillis() uses a native call to get current time. Make sure your production code does not have this statement.
• Many java.io.File methods are system calls which can be slow.
• Use BufferedIO streams to access URLConnection sInput/Output streams.
• Use the trient keyword to define fields to avoid having those fields serialized. Examine serialized objects to determine which fields do not need to be serialized for the application to work.
• Increase server listen queues for high load or high latency servers.

Q21. What Is Jms Administered Object?

A preconfigured JMS object (a resource manager connection factory or a destination) created by an administrator for the use of JMS clients and placed in a JNDI namespace.

Q22. When Are Automatic Variable Initialized?

Automatic variable have to be initialized explicitly.

Q23. What Is Enterprise Bean Provider?

An application developer who produces enterprise bean classes, remote and home interfaces, and deployment descriptor files, and packages them in an EJB JAR file.

Q24. What Is Cdata?

A predefined XML tag for character data that me “don’t interpret these characters,” as opposed to parsed character data (PCDATA), in which the normal rules of XML syntax apply. CDATA sections are typically used to show examples of XML syntax.

Q25. How Is An Argument Passed In Java, By Copy Or By Reference?

If the variable is primitive datatype then it is passed by copy.
If the variable is an object then it is passed by reference.

Q26. What Is J2ee Server?

The runtime portion of a J2EE product. A J2EE server provides EJB or Web containers or both.

Q27. Does The Corba Specification Define Any Specific Capabilities For A Factory Object?

The CORBA Lifecycle specification defines a GenericFactory interface from which all factories should inherit, but this is not required. The CORBA specification also defines a factory for factories, known as a factory finder. The factory finder is a just a CORBA factory which act as a factory for other factory interfaces.

Q28. What Is The Servlet?

Servlet is a script, which resides and executes on server side, to create dynamic HTML. In servlet programming we will use java language. A servlet can handle multiple requests concurrently.

Q29. What Is Deployment?

The process whereby software is installed into an operational environment.

Q30. What Is Destination?

A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point messaging system, publish/subscribe messaging system.

Q31. What Is Ejb Server?

Software that provides services to an EJB container. For example, an EJB container typically relies on a traction manager that is part of the EJB server to perform the two-phase commit across all the participating resource managers. The J2EE architecture assumes that an EJB container is hosted by an EJB server from the same vendor, so it does not specify the contract between these two entities. An EJB server can host one or more EJB containers.

Q32. When Should I Use The -nostage Option?

Set the staging mode to -nostage (using weblogic.Deployer or the Administration Console) if you don’t want to copy deployment files but want to deploy an application from its present location. All target servers must be able to access the same set of deployment files.

Q33. How Do You Optimize A Jsp Page?

• Use jspInit() method to cache static data
• Use StringBuffer rather than using + operator when you concatenate multiple strings
• Use print() method rather than println() method
• Use ServletOutputStream instead of JSPWriter to send binary data
• Initialize the ‘out’ object (implicit object) with proper size in the page directive.
• Flush the data partly.
• Minimize code in the synchronized block.
• Set the content length.
• Release resources in jspDestroy() method.
• Give ‘false’ value to the session in the page directive to avoid session object creation.
• Use include directive instead of include action when you want to include the child page content in the trlation phase.
• Avoid giving unnecessary scope in the ‘useBean’ action.
• Do not use custom tags if you do not have reusability.
• Use application server caching facility.
• Use Mixed session mechanisms such as ‘session’ with hidden fields.
• Use ‘session’ and ‘application’ as cache.
• Use caching tags provided by different organizations like openSymphony.com.
• Remove ‘session’ objects explicitly in your program whenever you finish the task.
• Reduce session time out value as much as possible.
• Use ‘trient’ variables to reduce serialization overhead if your session tracking mechanism uses serialization process.
• Disable JSP auto reloading feature.

Q34. What Is Deployment Descriptor?

An XML file provided with each module and J2EE application that describes how they should be deployed. The deployment descriptor directs a deployment tool to deploy a module or application with specific container options and describes specific configuration requirements that a deployer must resolve.

Q35. What Is Corba?

Common Object Request Broker Architecture. A language-independent distributed object model specified by the OMG.

Q36. What Is Local Subset?

That part of the DTD that is defined within the current XML file.

Q37. What Is B2b?

B2B stands for Business-to-business.

Q38. How Do You Optimize Stateless Session Be?

• Tune the Stateless session be pool size to avoid overhead of creation and destruction of be.
• Use setSessionContext() or ejbCreate() method to cache bean specific resources.
• Release acquired resources in ejbRemove() method.

Q39. Why Do I Get En Exception When I Use Location=”d:codeinclude” As Attribute Of Includepath?

See here.
You need to escape the string to “D:Codeinclude” or use “D:/Code/include” instead!

Believe me or not? Forward slash works on windows in all ant or java code. It also works in windows environment variables. It does not work in cmd (dos) window before XP. It also works in XP dos window now!

Q40. What Is General Entity?

An entity that is referenced as part of an XML document’s content, as distinct from a parameter entity, which is referenced in the DTD. A general entity can be a parsed entity or an unparsed entity.

Q41. What Types Of Performance Should I Be Concerned With?

There are many different performance characteristics that are important. Performance should also scale linearly as connections or objects increase. While raw throughput between one client and one server is important, it is not the only or the most critical characteristic. Many characteristics of the CORBA implementation should be considered. As always, actual application requirements to the relative importance of these different characteristics. With the high speed nature of most CORBA implementations, raw client/server throughput is often not a bottleneck. It is also important that factors such as the number of operations does not slow down individual remote invocations. Here is a list of some important performance characteristics.

• Scalability across connected client applications.
• Scalability across objects within a CORBA server.
• Raw throughout between one client and one server.
• Activation time of server processes.
• Activation time of CORBA objects.
• Streaming time for different IDL types.
• Connection time associated with the first remote operation, _narrow call, _is_a call etc.
• Minimum memory consumed by a CORBA object.
• Number of file descriptors consumed by a complex network of distributed objects.

Q42. What Is Jaap?

The Java Authentication and Authorization Service (JAAS) provides a way for a J2EE application to authenticate and authorize a specific user or group of users to run it. It is a standard Pluggable Authentication Module (PAM) framework that extends the Java 2 platform security architecture to support user-based authorization.

Q43. Can Corba Applications Have Callbacks?

Yes. The words client and server are really only applicable in the context of a remote call. In other words, the “client process” can also receive calls on CORBA objects that it implements and hands out the references to.

Q44. When I Obtain An Object Reference, What Determines If It Is An Ior Or Just An Or?

If you create the object reference from a string via a CORBA 2.0 compliant library then the object reference is an IOR. If you create the object reference via resolve_initial_references() the ORB libraries might create an OR or an IOR. Some ORBs from companies such as Expersoft and Visigenic ORBs support only native IIOP and thus all references are IORs. On the other hand, some commericial vendors who shipped ORBS that supported IDL before IIOP existed pass around references that are not IORs and thus these referencesmight not always be IORs. Many cases an ORB vendor might support a proprietary protocol in addition to IIOP. Note: even if resolve_initial_references() returns and IOR, the IOR almost always refers to an object implemented with the same ORB environment as the application calling resolve_initial_references(). If the object reference is obtained from a server, a NameContext, or from a factory, the process and ORB libraries that originially created the object reference, determine if the reference is an OR or an IOR.

Q45. What Is Java 2 Platform, Enterprise Edition (j2ee)?

An environment for developing and deploying enterprise applications. The J2EE platform consists of a set of services, application programming interfaces (APIs), and protocols that provide the functionality for developing multitiered, Web-based applications.

Q46. What Is The Static Invocation Interface?

The CORBA specification defines two mechanisms for invoking operations on a CORBA Object. Functionaly, the two mechanisms provide the same capabilities. They allow basically the IDL defined operations on the CORBA object to be invoked, allow program variables to be passed to the operation as inbound parameters, and allow return values or out parameters to be passed from the server to the client. The first mechanism is known as the Static Invocation Interface (SII), the other is known as Dynamic Invocation Interface . Developers of client applications which use SII must know the name of the operation, and all parameters/return types prior to program compilation. The actual operation names and parameters/return values are in effect hard coded into the application source code.

Q47. What Other Surprises Are There With Is_equivalent()?

Remember that is_equivalent() is invoked on one of the two objects, and there are cases where this can cause deadlock. The following example illustrates how this can happen on one particular single-threaded ORB that won’t allow a server to invoke a method on the client (contributed by Jeff Stewart, jstewart+@andrew.cmu.edu; used with permission): Suppose a server receives updates from cached clients and then has to update all clients except for the one that reported (updating the reporting client would cause a deadlock on this ORB). So, as the server iterates through its client list it must ensure that it does not invoke the reporting client. But it can’t use is_equivalent() because this will eventually cause an invocation on the reporting client just to do the is_equivalent() check, inadvertently creating a deadlock.

Q48. What Is Corba? What Does It Do?

CORBA is the acronym for Common Object Request Broker Architecture, OMG’s open, vendor-independent architecture and infrastructure that computer applications use to work together over networks. Using the standard protocol IIOP, a CORBA-based program from any vendor, on almost any computer, operating system, programming language, and network, can interoperate with a CORBA-based program from the same or another vendor, on almost any other computer, operating system, programming language, and network.

Q49. What’s The Difference Between Jndi Lookup(), List(), Listbindings(), And Search()?

lookup() :attempts to find the specified object in the given context. I.e., it looks for a single, specific object and either finds it in the current context or it fails.

list(): attempts to return an enumeration of all of the NameClassPair’s of all of the objects in the current context. I.e., it’s a listing of all of the objects in the current context but only returns the object’s name and the name of the class to which the object belongs.

listBindings(): attempts to return an enumeration of the Binding’s of all of the objects in the current context. I.e., it’s a listing of all of the objects in the current context with the object’s name, its class name, and a reference to the object itself.

search(): attempts to return an enumeration of all of the objects matching a given set of search criteria. It can search across multiple contexts (or not). It can return whatever attributes of the objects that you desire. It’s by far the most complex and powerful of these options but is also the most expensive.

Q50. What Are The Different Types Of Messages Available In The Jms Api?

Message, TextMessage, BytesMessage, StreamMessage, ObjectMessage, MapMessage are the different messages available in the JMS API.