0

web technology Online Quiz - 19

Description: web technology Online Quiz - 19
Number of Questions: 20
Created by:
Tags: web technology
Attempted 0/20 Correct 0 Score 0

Does SharePoint 2007 does not have any browser restrictions.

  1. True

  2. False


Correct Option: B

What security levels are assigned to users?

  1. Reader, Manager, Web Designer, Administrator

  2. Reader, Contributor, Web Designer, Administrator

  3. Reader, Contributor, Web Administrator, Administrator

  4. None of the above


Correct Option: B

What of following features can not be configured in the JSF configuration file?

  1. Navigation rules

  2. Custom components

  3. Managed beans

  4. Application name


Correct Option: D

AI Explanation

To answer this question, we need to understand the purpose and features of the JSF configuration file.

The JSF configuration file, also known as faces-config.xml, is used to configure various aspects of a JavaServer Faces (JSF) application. It is an optional file that can be used to define navigation rules, managed beans, and custom components.

Let's go through each option to understand why it can or cannot be configured in the JSF configuration file:

A) Navigation rules - This option can be configured in the JSF configuration file. Navigation rules define the navigation flow of a JSF application, specifying which page or view to display based on user actions or outcomes.

B) Custom components - This option can be configured in the JSF configuration file. The JSF configuration file allows you to define custom components and map them to their corresponding implementation classes.

C) Managed beans - This option can be configured in the JSF configuration file. Managed beans are Java objects that are managed by the JSF framework, and the JSF configuration file is used to define these beans, their properties, and their scopes.

D) Application name - This option cannot be configured in the JSF configuration file. The application name is typically defined in other configuration files, such as the deployment descriptor (web.xml) or through the application server's configuration.

Therefore, the correct answer is D) Application name. This option cannot be configured in the JSF configuration file.

Which tag must enclose all other tags on a Faces JSP page?


Correct Option: B
Explanation:

To solve this question, the user needs to have knowledge of JavaServer Faces (JSF) and its structure.

The correct answer is:

B.

The tag must enclose all other tags on a Faces JSP page. It represents the outermost container for a JavaServer Faces (JSF) application and is used to define the view that is to be rendered.

Option A, , is not a valid JSF tag.

Option C, , is not a valid JSF tag either.

Option D, , is a valid JSF tag, but it is not the correct answer to this question. The correct tag is .

Which JSF component can be used to create tables?

  1. HtmlPanelGroup

  2. HtmlTable

  3. UITable

  4. HtmlPanelGrid


Correct Option: D

How do you declare a text label for an input control?

  1. Use the HtmlOutputLabel component

  2. Use the HtmlOutputLabel component with a child HtmlOutputText component

  3. Use the HtmlOutputText component

  4. Use the OutputLabel component


Correct Option: B

What type of events does the HtmlCommandButton generate?

  1. Command events

  2. Submit events

  3. Action events

  4. Click events


Correct Option: C
  1. To keep track of its identifier

  2. To keep track of the components in tree

  3. To set its submitted property

  4. For JavaScript integration


Correct Option: C

Which JSF expression references an application's context path?

  1. #{contextPath}

  2. #{requestContextPath}

  3. #{facesContext.externalContext.requestContextPath}

  4. ${request.contextPath}


Correct Option: C

How do you integrate JSF components with custom JavaScript?

  1. Write a new renderer

  2. hrough faces-config.xml

  3. With HTML pass-through attributes

  4. No specific integration is necessary


Correct Option: C

How do you integrate JSF components with cascading style sheets (CSS)?

  1. With the JSF configuration file

  2. With the styleClass property

  3. With the cssClass property

  4. With the class property


Correct Option: B

AI Explanation

To integrate JSF components with cascading style sheets (CSS), you can use the styleClass property.

Option A) With the JSF configuration file - This option is incorrect because the JSF configuration file is used for configuring the JSF framework, not for integrating CSS with JSF components.

Option B) With the styleClass property - This option is correct. The styleClass property is used to apply a CSS class to a JSF component. By specifying a CSS class, you can define the styling for the component using CSS.

Option C) With the cssClass property - This option is incorrect because there is no cssClass property in JSF. The correct property to use is styleClass.

Option D) With the class property - This option is incorrect because the class property is not used in JSF for applying CSS styles. The correct property to use is styleClass.

The correct answer is B) With the styleClass property. This option is correct because it allows you to apply a CSS class to a JSF component and integrate it with CSS.

How do you customize validation messages with JSF?

  1. Create a resource bundle with specific keys and specify its name in faces-config.xml

  2. Create a resource bundle with specific keys

  3. Create a properties file with custom keys and specify its name in web.xml

  4. Specify the custom messages in faces-config.xml


Correct Option: A

Which of the following is not possible using Repository Manager

  1. a. Creating folder within repository

  2. b. Creating users and assigning roles

  3. c. Taking backup of Repository

  4. d. Comparing folders


Correct Option: C

Where is the headquarters of Microsoft located?

  1. Santa Clara, California

  2. Tucson, Arizona

  3. Richmond, Virginia

  4. Redmond, Washington


Correct Option: D

Which law states that "The value of a network is squared each time another peer joins the network"?

  1. Reed's Law

  2. Sarnoff's Law

  3. Metcalfe Law

  4. Archie's Law


Correct Option: C

One word for "Network Analyzer".

  1. Ethereal

  2. Wireshark

  3. Sniffer

  4. NetZer


Correct Option: C

What is the purpose of using Single User ID application?

  1. Used for transaction services

  2. Used for user authorization and authentication

  3. Used for user authentication

  4. Used for Data Entry System


Correct Option: B

What is the LDAP used for SUID?

  1. Sun One LDAP

  2. Domino LDAP

  3. MS-Active Directory

  4. Sun Web LDAP


Correct Option: C

Find the correct flow of transactions for the following: 1. Premium calculation 2. Underwriting 3. Policy Submission

  1. Tran05c, Tran05a, Tran05d

  2. Tran05f, Tran05d, Tran05a

  3. Tran05a, Tran05c, Tran05f

  4. Tran05d, Tran05a, Tran05f


Correct Option: C

Which of the following is not possible in SUID?

  1. User Creation and Deletion

  2. Password Management

  3. Modifying AD structure

  4. Search Users


Correct Option: C

AI Explanation

To answer this question, we need to understand what SUID (System User Identification) refers to and what actions are typically possible within it.

SUID is a permission that allows a user to execute a program with the permission of the owner of the file, rather than the user who is executing it. It is commonly used in Unix-like operating systems to grant elevated privileges to certain programs.

Let's go through each option to understand why it is correct or incorrect:

Option A) User Creation and Deletion - This option is possible in SUID. With the appropriate permissions, a user can create or delete other users.

Option B) Password Management - This option is possible in SUID. A user with SUID permissions can manage passwords, such as resetting or changing them.

Option C) Modifying AD structure - This option is not possible in SUID. SUID is typically used at the file level, granting permissions for executing specific programs with elevated privileges. Modifying the Active Directory (AD) structure is a higher-level administrative task that is not directly related to SUID.

Option D) Search Users - This option is possible in SUID. A user with SUID permissions can search for other users in the system.

The correct answer is C) Modifying AD structure. This option is not possible in SUID because SUID is not directly related to the Active Directory structure.

- Hide questions