Mark works as a Programmer for InfoTech Inc. He develops the following deployment descriptor code for specifying the security roles for a Web application.
Which of the following are the valid <auth-constraint> element that will allow the users to access resources constrained by the security role declared given above?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about a filter are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about serialization are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods is defined by ObjectOutputStream?
Which of the following statements about the isUserInRole() method are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements are true about Vector and ArrayList?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Programmer for InfoTech Inc. He develops a code snippet for a class named
servletClassA that extends the HttpServlet class. Which of the following HttpServlet class methods are not required to be overridden by the servletClassA?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Programmer for InfoTech Inc. He develops the following code snippet.
import java.util.*;
public class DemoSet{
public static void main(String[] args){
TreeSet
ts.add("Sunday");
ts.add("Friday");
ts.add("Wednesday");
ts.add("Sunday");
ts.add("Monday");
Iterator it = ts.iterator();
while(it.hasNext()){
System.out.print(it.next() + " ");
}
}
}
What will be the output when he tries to execute the given code snippet?
Which of the following exceptions will be thrown if a program fails to implement the Serializable interface?
Which of the following statements are correct about the code given below?
Each correct answer represents a complete solution. Choose all that apply.