Dennis works as a Programmer in Broadnet Inc. He writes the following program.
1.
public class Ques0307{
2.
public static void main(String[] argv){
3.
int arr[] = {1, 2, 3, 4};
4.
try{
5.
int k = 0;
6.
for(; k < 4; k++)
7.
arr[k] = arr[k] + 1;
8.
System.out.println("try");
9.
}
10.
catch(ArrayIndexOutOfBoundsException a){
11.
System.out.println("index " +k +" not found");
12.
}
13.
catch(Exception e){
14.
System.out.println("catch1");
15.
}
16.
finally{
17.
System.out.println("finally");
18.
}
19.
}
20.
}
What will happen when Dennis attempts to compile and execute the program?
A. A compile-time error will occur.
B. The program will display index 0 not found catch1 finally
C. The program will display index 4 not found finally
D. The program will display try finally
Given below are top-level class declarations. Which of these class declarations would not produce a compile-time error?
abstract class P {} //1 private class Q {} //2 static class R {} //3 transient class S {} //4
A. Line 3
B. Line 1
C. Line 2
D. Line 4
Which of the following mechanisms is closely related to authorization?
A. Sending data so that no one can alter it on the way.
B. Allowing access to a particular resource.
C. Verifying username and password.
D. Sending secret data such as credit card information.
Sam works as a Software Developer for Gentech Inc. He writes the following code.
1.
class TryFinallyTest {
2.
public static void main(String[] args) {
3.
try {
4.
int i=15/0;
5.
System.out.println("Testing Try");
6.
}
7.
catch(ArithmeticException ae) {
8.
System.out.println("Arithmetic exception");
9.
}
10.
System.out.println("Correct");
11.
finally {
12.
System.out.println("Must execute");
13.
}
14.
}
15.
}
What will happen when he attempts to compile and execute the code?
A. It will compile successfully and run with output Arithmetic exception.
B. It will compile successfully and run with output Must execute.
C. It will compile successfully and run with output Correct.
D. It will give a compile-time error.
Which of the following statements about serialization are true? Each correct answer represents a complete solution. Choose all that apply.
A. Transient variables cannot be serialized.
B. Externalizable is a marker interface and does not define any method.
C. Serializable is a marker interface and does not define any method.
D. Static variables cannot be serialized.
Which of the following methods specifies which LoginModules should be used for a particular application, and in what order the LoginModules should be invoked?
A. getLogger
B. getConfiguration
C. getResourceBundle
D. getAppConfigurationEntry
Mark works as a Programmer for InfoTech Inc. He creates a method named roomBooking() and this method throws IndexOutOfBoundsException. Which of the following roles will automatically handle the exception?
A. Bean Provider
B. Application Assembler
C. Bean Deployer
D. Container
Mark works as a Programmer for InfoTech Inc. He develops the following code snippet. class Auto {public
static void main(String args[])
{Character iob ='d';float i=iob;System.out.println(iob);}} What will be the result when Mark tries to execute
the code snippet?
A. It will display d.
B. It will show a runtime error.
C. It will show a compile-time error.
D. It will display 0.00.
Which of the following are the main basic difference between the POST and PUT request? Each correct answer represents a complete solution. Choose all that apply.
A. The PUT request does not have a corresponding doXXX method in the HttpServlet class. However, POST have a corresponding doXXX method in the HttpServlet class.
B. The URI in a PUT request identifies the entity enclosed with the request and the user agent knows what URI is intended and the server MUST NOT attempt to apply the request to some other resource.
C. The URI in a PUT request identifies the resource that will handle the enclosed entity.
D. The URI in a POST request identifies the resource that will handle the enclosed entity.
You work as a Software Developer for UcTech Inc. You want the deployment descriptor to contain entries for the authentication type and the security realm. In order to accomplish this, you have to use the sub-elements of the
A.
B.
C.
D.
E.
F.
G.
Which of the following code fragments will compile without error? Each correct answer represents a complete solution. Choose all that apply.
A. boolean a = false;if(a)System.out.println(a);
B. int a = 10;if(a != 10)System.out.println(a);
C. int a = 0;if(a)System.out.println(a);
D. boolean a = true;if(!a);
Which of the following exceptions will be thrown by the validate method if the result type does not match the Source type, or if the specified source is neither SAXSource nor DOM Source?
A. SAXException
B. NullPointerException
C. IllegalArgumentException
D. IOException
Identify whether the given statement is true or false. "There is no method to create a new thread other than extending the Thread class."
A. True
B. False
Which of the following is the valid permission for a BasicPermission?
A. *
B. a*b
C. *.com
D. *java
Which of the following annotations specifies the roles that are allowed to invoke a particular bean method?
A. @DenyAll
B. @RolesAllowed
C. @RunAs
D. @DeclareRoles
E. @PermitAll