0

web technology Online Quiz - 19

Description: web technology Online Quiz - 19
Number of Questions: 20
Created by:
Tags: web technology
Attempted 0/20 Correct 0 Score 0

What security levels are assigned to users?

  1. Reader, Manager, Web Designer, Administrator

  2. Reader, Contributor, Web Designer, Administrator

  3. Reader, Contributor, Web Administrator, Administrator

  4. None of the above


Correct Option: B
  1. Navigation rules

  2. Custom components

  3. Managed beans

  4. Application name


Correct Option: D
  1. HtmlPanelGroup

  2. HtmlTable

  3. UITable

  4. HtmlPanelGrid


Correct Option: D
  1. Use the HtmlOutputLabel component

  2. Use the HtmlOutputLabel component with a child HtmlOutputText component

  3. Use the HtmlOutputText component

  4. Use the OutputLabel component


Correct Option: B
  1. Command events

  2. Submit events

  3. Action events

  4. Click events


Correct Option: C
  1. To keep track of its identifier

  2. To keep track of the components in tree

  3. To set its submitted property

  4. For JavaScript integration


Correct Option: C

Which JSF expression references an application's context path?

  1. #{contextPath}

  2. #{requestContextPath}

  3. #{facesContext.externalContext.requestContextPath}

  4. ${request.contextPath}


Correct Option: C
  1. Write a new renderer

  2. hrough faces-config.xml

  3. With HTML pass-through attributes

  4. No specific integration is necessary


Correct Option: C
  1. With the JSF configuration file

  2. With the styleClass property

  3. With the cssClass property

  4. With the class property


Correct Option: B
  1. Create a resource bundle with specific keys and specify its name in faces-config.xml

  2. Create a resource bundle with specific keys

  3. Create a properties file with custom keys and specify its name in web.xml

  4. Specify the custom messages in faces-config.xml


Correct Option: A
  1. a. Creating folder within repository

  2. b. Creating users and assigning roles

  3. c. Taking backup of Repository

  4. d. Comparing folders


Correct Option: C
  1. Santa Clara, California

  2. Tucson, Arizona

  3. Richmond, Virginia

  4. Redmond, Washington


Correct Option: D

Which law states that "The value of a network is squared each time another peer joins the network"?

  1. Reed's Law

  2. Sarnoff's Law

  3. Metcalfe Law

  4. Archie's Law


Correct Option: C
  1. Ethereal

  2. Wireshark

  3. Sniffer

  4. NetZer


Correct Option: C

What is the purpose of using Single User ID application?

  1. Used for transaction services

  2. Used for user authorization and authentication

  3. Used for user authentication

  4. Used for Data Entry System


Correct Option: B
  1. Sun One LDAP

  2. Domino LDAP

  3. MS-Active Directory

  4. Sun Web LDAP


Correct Option: C

Find the correct flow of transactions for the following: 1. Premium calculation 2. Underwriting 3. Policy Submission

  1. Tran05c, Tran05a, Tran05d

  2. Tran05f, Tran05d, Tran05a

  3. Tran05a, Tran05c, Tran05f

  4. Tran05d, Tran05a, Tran05f


Correct Option: C
  1. User Creation and Deletion

  2. Password Management

  3. Modifying AD structure

  4. Search Users


Correct Option: C
- Hide questions