Disadvantage of two-tier architecture is A) Different to administer and maintain B) Not effective in running batch programs C) Cannot service

more than 100 users D) All of the above

DCOM can be implemented on platform. A) Apple Macintosh B) Windows C) UNIX/Mainframe D) All of the above _______ is defined as a requester of services. A) Server B) Client C) Both A) and B) D) None of the above Architecture is based on object request bro er technology. A) Distributive Collaborative enterprise B) File sharing C) Mainframe D) None of the above ________is a CORBA service that allows CORBA objects to be named by means of binding a name to an object reference. A) Object naming B) Server naming C) Both A) and B) D) Naming Service Server's Main( A) B) C) D) ) method of server class Gets the root naming context Creates and initializes an ORB instance Waits for invocations of the new object from the client All of the above

For multiprocess operating systems, global space is ____________ A) Process B) Collection of all processes C) Same as execution space D) Same as execution space

is used to enable clients to transparently locate and invo e persistent objects on servers in the CORBA environment. A) orbd



It is available on any platform with JDK software compliant technologies b. b-F B) a-T. A) a-F.constructor A) a and b B) Only c C) b and c D) a. Dynamic Invocation Interface Dynamic Stub Interface Dynamic S eleton Interface All of the above . B) number of users are less than 10 C) number of users are less than 100 D) number of users are greater than 1000 Which of the following languages interact well with DCOM? A) Micro Focus COBOL B) Microsoft Visual Basic C) Delphi D) All of the above Select true statements for Java RMI technology. b-T An activation identifier for an object can be obtained by registering an object with the activation system. b-F C) a-F. a. This registration can be accomplished a. during situation A) number of users are greater than 100. via the activable. b and c   _______ dispatch to the A) B) C) D) in CORBA.B) C) D) ORB IDL DS1 Two-tier client server architectures are appropriate alternatives to the three-tier architecture. Provides communication in a homogeneous or heterogeneous environment. provides dynamic objects. register method b. via the first or second activable. b-T D) a-T.

Application Interfaces State True (T) or False (T) a. a. Domain Interfaces C) Application interfaces. b-T D) a-T. It is available on any platform with JDK software compliant technologies b. A) Object services. b and c C) a and c D) None of the above Select true statements for Java RMI technology.In OMG reference model architecture_____ are domain independent interfaces that are used by many distributed object programs and ______is a runtime component that can be used for distributed computing using HOP communication. A) a-F. Heterogeneity A) Only b B) a. b-T D) a-F. Java IDL is based on an industry standard distributed object model. b-F B) a-T. Provides communication in a homogeneous or heterogeneous environment. b-T Which of the following characteristics help to distinguish a distributed environment from a stand. b-F C) a-T. ORB D) Domain interfaces. b-T Advantages of distributed computing environment is/are     . Object Request Bro er B) Object services. A) a-F. Java IDL is a technology for objects interacting on different platforms across a networ . b-F B) a-T. b. Scalability b.alone environment? a. b-F C) a-F. Administrative autonomy c.

ORB arguments for bootstrapping. b and c State True(T) or False(F) a. b-T C) a-T. CORBA provides a distributed object framewor . This registration can be accomplished a. b-F State True (T) or False (F) a. b-F B) a-F. b-T C) a-F. Resource sharing b. Performance A) Only a and b B) Only b and c C) Only a D) All the above An activation identifier for an object can be obtained by registering an object with the activation system. services to support framewor and interoperability with other languages. b-T D) a-F. via the first or second activable. b.a. Standard APIs in Naming Context for       . Java platform provides a portable object infrastructure that wor s on every major A) a-T. b-F B) a-T. URLs for CORBA object references d.constructor A) a and b B) Only c C) b and c D) a. register method b. Availability of services c. via the activable. Capability to resolve using string field names b. c. MOM reduces the involvement of application developers A) a-F. b-F Interoperable Naming Service (INS) provides following features: a. b-T D) a-T. MOM supports asynchronous calls between the client and server applications b.

not a programming language. a. b. b. c and e C) a. c. c and d Only c What happens when a stub method is invo ed? a.conver A) B) C) D) None of the above a and d a. d and e B) b and d C) Only d D) a. Provides features A) b. b. Creating instance of activable objects. Provides exception definitions to define exceptional conditions that may arise during the course of an operation. c and e D) b and d The activation Instantiator is responsible for a. It is a declarative language. c. b. d and e B) a. b. C. Writes and transmits the parameters to the remote JVM. Returning a Marshalled object containing the remote object A) None of the above B) All of the above C) a and d D) b and c __________ is the standard CORBA protocol for ORB-to-ORB interwor ing a) TCP/IP b) IIOP c) HTTP d) FTP     . b. c and e Select the features of OMG IDL. Waits for the result of the method invocation A) a. Determining the class for the object using the descriptor's getClassName method. Initiates a connection with the remote JVM containing the remote object. c. b.

12 b. 100 d. a) True -x b) False The two tier architecture improves scalability by accommodating up to _________ ____ users.6 NFS stands for _____________________________ a. 1000 c. a. 12 b.4 d) JDK 1. Networ File System b. File Sharing architecture c. Open Systems File d. a.5 e) JDK 1.2 -x b) JDK 1. Distributed/Collaborative enterprise architecture OSF stands for ______________________ a.3 c) JDK 1. 20 In RMI a typical server application creates a number of remote objects. a) JDK 1. Mainframe architecture b. New File System c. None A a. 100 d.In a ___________ architecture server download files from shared location to the des top environment. Client/Server architecture d. Net File Sharing d. a. d. b. Open Source File c. 8 c. way to synchronize threads access to shared data is __________________ Alerts Mutexes Time slicing None     . 200 New Java RMI functionality is added to _____________ software to expand the fun ctionality of Java RMI. c. None File sharing architecture can support simultaneously _______________ number of users. Open Systems Foundation b.

RemoteException is thrown when a remote method invocatio n fails for some reason: I.rmi. DSI stands for ________________ Dynamic S eletmn Interface Dynamic Stub Interface Deferred Synchronous Invocation None     . a) Distributed objects b) remote interfaces x c) remote objects d) remote methods _______________ is considered as second generation of TP Monitor a. a) Java. Communication failure(the remote server is unreachable or is refusing connect ions. 6000 d.rmi -x b) Javax. None The exception java. Application Server c. 80 b. which interfaces are written in the Java programming language that declare the methods of the re mote object. etc.remote d) None The RMI registry daemon listens on port ________.)   In a) b) c) d) CORBA. Online Analysis Processor b. On-line Anticipation processor c. 109 OLAP stands for a. Messaging Server b.rmi c) Java. On-line analytical processor d. 1099 c. DBMS Server d. a. S eleton -x Stub In RMI remote object is described by one or more_____________.The interfaces and classes that are responsible for specifying the remote behav ior of the RMI system are defined in the _________________ pac age hierarchy. None A or a) b) ________ for a remote object acts as a Server s local representative or proxy f the remote object. the connection is close by the server.rmi.

statement true c) Both statement A and B are true d) Both statement A and B are false Business object and _________ should be brought as closer together as possible . None A) The ORB is the distributed service that implements the request to the remote object. II. 4 b) 2. Protocols errors Choose the correct answers a) I true. II and III false c) I. Physically b) Client . a) Statement A true. III false What messaging communication component such as CORBA does? Select all possible a nswers? a. statement B false b) Statement A false. ideally they should together _________ on the same server. Transfer data over the networ b. a) Data Storage. 4 d) 2. II and III false b) I false. and hosts c. process. Production environment services such as transaction management. Networ c) Service. 3.II. security mess aging reliability. All Building powerful distributed applications with Java RMI technology is simple f our step process: 1) Implement the remote objects 2) Define the interfaces to your remote objects 3) Run rmic on remote implementation classes 4) Ma e code networ -accessible Choose correct order a) 1. 1. The implementation details of networ ing and protocols b. The location and distribution of data. 3. Share data between two host d. B) ORB is the CORBA communication channel. 2. 1.III true x d) I. 4 Inter-process communication (IPC) is a mechanism to ___________ a. Failure during parameter or return value marshalling or unmarshalling III. Exchange           .II. 3. 2. 1. Memory management technique c. Server d) None of these An ORB is a middleware technology that manages ________& data _________ between objects a) Communication . 4 -x c) 3. and persistent storage d.

Software b) Technology. Method d) None of these ________as related to the characteristics of administrative _________or domains. Platform c) System . a) Distributed . Autonomy b) Indeterminacy . System d) None of these ________file system technology provides the ability to access & _________data at remote locations. Software c) Hardware . a) Client . Software d) None of these         . a) Manageability . a) Object Oriented . Server b) System .b) Connection . Environment d) None of these The computer on which the user in wor ing is called _______the computer on which the data is stored is called ________. Call c) Application . Exchange d) None of these OOD is concerned with an ________model of a software system to implement the ________requirements. Identified b) Platform . Support d) None of these Data ________. Information c) Foundation . Activation c) Client . Successes c) System . a) Consistency . distributed file system operate by allowing a user on a computer connected to a _________ to access & modify data stored in file on another computer. Networ b) Computing . Developing d) None of these The maximum impact from ________is achieved when used with the goal of designing reusable _______system a) OOD . Store b) Procedure . Trademar c) Distributed . of the networ will be marageel in different ways.

Mechanism   file access . Thread b) Integrity. Remote c) Identifier. DCOM c) DLL ._______which abstracts the communication _________to the level of a procedure call. Reference b) System . Flexibility b) Distributed . COM b) HTTP . Resources d) None of these A components that display & modifies ________is implemented as a _______object. Remote d) None of these The registry implements a _________flat naming syntax that associates the name of a remote object with a remote ________ a) Simple . Download c) Design. Object d) None of these RMI uses built-in Java _______mechanisms that allow your system to be safe then users ________implementations. Class c) Remote . Interface b) Jum . Downloading b) Networ . a) Security. a) Remote. Cod d) None of these A method dispatched by the RMI runtime to a _______object implementation may or may not esecute in a separate ________. Exception d) None of these _________applications for distribution gives the system manager a great deal of ________in deployment. CLSID d) None of these The ________used for accessing the persisted data is the native _________ a) Protocol . Application c) Components . a) Rpc . a) HTML. Argument c) Xdr . a) Designing .

Distributed Object Management . DCOM b) Platform . COM c) HTTP . Application d) None of these       . Object d) None of these Mechanism to deal with _______related design issues have been built into ________from the ground up a) Security . Connects. Object Service . Asseccing . Security c) Standard . Interface . IDL c) CORBA. Composed c) Extension . DII b) DII . Application b) Interface . Oriented. Architecture c) Implementation . WAN b) Communication . ORB d) NONE OF THESE The ___________ Communication component lin s the organization ________ it to computing ___________ & resource via the organization s LAN or ___________ a) Massage.b) Resolves . Information . CLSID d) None of these _________are domain independent interfaces that are used by many ________ object programs. OMG b) DLL . Bro er. ORB d) None of these Every ________based application requires access to the _________IDL type system when it is executing. IDL c) DSI . a) CORBA . Facilities None of these _______interface developed specifically for a given ________ a) Application . Servant d) None of these _________is the server side s analogue to the client side s _________ a) DSI . Networ Domain Interface.

Kernel None of these Physical ___________use of both __________& ___________hardware capabilities . Stored b) Recover . Modify . Hardware d) None of these In a __________ environment each system has its own representation of time . Resource . Networ . Platform Apis . when an event occurs the client application . Design . distributed transaction need to be coordinated throughout the ________ to ensure data ___________ for the users a) Distributed . the computing environment can be ___________ dispersed & __________extended over a large geographical area. Events b) Manipulation . that some action needs to be ta en MOM . Class . Accesses . Distributed Connected . such as in the ___________ architecture . Requirement . Processing . WAN . Decision . MAN . Protocols c) Pac age . Flexibility . hands off to the ___________ middleware application the responsibility of notifying ___________ .When dealing with ___________ databases . a) Distributed . Hardware c) Management . Consistency c) Networ . Physically . Capability . Time-Stamp. a) LAN . Server RPC .Environment . Potentially b) MAN . Application d) None of these ___________ is most appropriate for ___________ application .Distributed .Ban ing . LAN . Distributed d) None of these               . Technologies Environment . Client/Server . Messaging . Dependence . Potentially . System d) None of these __________is the __________file system operate by allowing a user on a computer __________to a networ to access and modify data ___________ in files on another computer a) Data Consistency . Request . therefore any ___________ based on the associated with ___________ from different system is suspect. Common . Integrity b) Database . Capability c) Networ . Events-Driven .

Re Producible d) None of these   __________the physical _________& the no. Optimized. Consulted . During c) Standard . method . Re-Create . Performance . launch ___________chec . complex c) RPC . Distributed . system . target . Functionality b) Deployment . Persistent .__________use built-in java ___________ mechanisms that allow your __________to be safe users ___________ implementation a) RMI . Protection .Denial . Reference . Latency . Activate b) Constructor . Bandwidth . Object c) Networ . Permission . Virtual . Smallest . Scalability c) Versioning . of networ delay even than ________data pac et ___________ a) Lantency . Method d) None of these A ________registered with the activation system is ________to obtain in order to __________or _________an object a) Descriptor . Remote . Object . Object . Reliability d) None of these __________a critical factor for a ___________ application is its ability to row with the no. Protocol . Arguments . downloading b) JDK . Operator. Security b) Authourization . potentially on a different ___________ a) Distributed . Invo ing . Interfaces c) Argument . protocols d) None of these In a java platform s ___________ object model . Distributed . Identifier d) None Of These ___________ mechanism for access chec . a) Authentication . Excessive Automatically . Accessed . interface . Machine . security . Accomodate c) Deployment . of _________. Support . the amount of data . Users . download . a __________object is one those methods can be invo ed from another ___________ machine . Host b) Remote . Distance . & the required _______ a) Scalability . Model d) None of these elements involved             . Significantly b) Application . Security . & data ___________requires some mechanism for determining the ___________ identity of the client .

Facilities c) Repository . Constructors . Adapter . Components . Facilities . nor is it directly used to ___________ distributed ___________ a) Mapping . Gateway d) None of these __________has two types of exceptions __________system exceptions which are fully satisfied by the __________& user exceptions which are defined by the __________application programmer. Implement . DII . Application . IDL . CORBA . Services . Applications b) Programming . Context . Server d) None of these Language ___________. OMG . References . Management COS . Writing . Individual ORB . Standard . Interface . Mapped . Interface . Deamon . Services c) Application Interface . does not provide features li e control _________. Domain b) Common Facilities . Recommend None of these total 81 questions   ._________fill roles similar to object ________& common __________but are oriented towards application ___________ a) Domain Interface .

Sign up to vote on this title
UsefulNot useful