web technology Online Quiz - 19

Description: web technology Online Quiz - 19
Number of Questions: 20
Created by:
Tags: web technology
Attempted 0/20 Correct 0 Score 0

What security levels are assigned to users?

  1. Reader, Manager, Web Designer, Administrator

  2. Reader, Contributor, Web Designer, Administrator

  3. Reader, Contributor, Web Administrator, Administrator

  4. None of the above

Correct Option: B
  1. Navigation rules

  2. Custom components

  3. Managed beans

  4. Application name

Correct Option: D
  1. HtmlPanelGroup

  2. HtmlTable

  3. UITable

  4. HtmlPanelGrid

Correct Option: D
  1. Use the HtmlOutputLabel component

  2. Use the HtmlOutputLabel component with a child HtmlOutputText component

  3. Use the HtmlOutputText component

  4. Use the OutputLabel component

Correct Option: B
  1. Command events

  2. Submit events

  3. Action events

  4. Click events

Correct Option: C
  1. To keep track of its identifier

  2. To keep track of the components in tree

  3. To set its submitted property

  4. For JavaScript integration

Correct Option: C

Which JSF expression references an application's context path?

  1. #{contextPath}

  2. #{requestContextPath}

  3. #{facesContext.externalContext.requestContextPath}

  4. ${request.contextPath}

Correct Option: C
  1. Write a new renderer

  2. hrough faces-config.xml

  3. With HTML pass-through attributes

  4. No specific integration is necessary

Correct Option: C
  1. With the JSF configuration file

  2. With the styleClass property

  3. With the cssClass property

  4. With the class property

Correct Option: B
  1. Create a resource bundle with specific keys and specify its name in faces-config.xml

  2. Create a resource bundle with specific keys

  3. Create a properties file with custom keys and specify its name in web.xml

  4. Specify the custom messages in faces-config.xml

Correct Option: A
  1. a. Creating folder within repository

  2. b. Creating users and assigning roles

  3. c. Taking backup of Repository

  4. d. Comparing folders

Correct Option: C
  1. Santa Clara, California

  2. Tucson, Arizona

  3. Richmond, Virginia

  4. Redmond, Washington

Correct Option: D

Which law states that "The value of a network is squared each time another peer joins the network"?

  1. Reed's Law

  2. Sarnoff's Law

  3. Metcalfe Law

  4. Archie's Law

Correct Option: C
  1. Ethereal

  2. Wireshark

  3. Sniffer

  4. NetZer

Correct Option: C

What is the purpose of using Single User ID application?

  1. Used for transaction services

  2. Used for user authorization and authentication

  3. Used for user authentication

  4. Used for Data Entry System

Correct Option: B
  1. Sun One LDAP

  2. Domino LDAP

  3. MS-Active Directory

  4. Sun Web LDAP

Correct Option: C

Find the correct flow of transactions for the following: 1. Premium calculation 2. Underwriting 3. Policy Submission

  1. Tran05c, Tran05a, Tran05d

  2. Tran05f, Tran05d, Tran05a

  3. Tran05a, Tran05c, Tran05f

  4. Tran05d, Tran05a, Tran05f

Correct Option: C
  1. User Creation and Deletion

  2. Password Management

  3. Modifying AD structure

  4. Search Users

Correct Option: C
- Hide questions