0

web technology Online Quiz - 29

Description: web technology Online Quiz - 29
Number of Questions: 20
Created by:
Tags: web technology
Attempted 0/20 Correct 0 Score 0

Which of the following are tags of hibernate.cfg.xml?

  1. mapping file

  2. mapping-file

  3. session-factory

  4. session


Correct Option: C

AI Explanation

To answer this question, let's go through each option to understand why it is correct or incorrect:

Option A) mapping file - This option is incorrect because it is not a valid tag in hibernate.cfg.xml.

Option B) mapping-file - This option is incorrect because it is not a valid tag in hibernate.cfg.xml.

Option C) session-factory - This option is correct because `` is a valid tag in hibernate.cfg.xml. It is used to configure the session factory, which is responsible for creating sessions to interact with the database.

Option D) session - This option is incorrect because it is not a valid tag in hibernate.cfg.xml.

The correct answer is C) session-factory. This option is correct because `` is a valid tag in hibernate.cfg.xml.

How many Configuration files are there for BlazeDS ?

  1. 4

  2. 5

  3. 3

  4. 2


Correct Option: A

default-channels in BlazeDS configuration

  1. Sets the application-level default channels to use for all services

  2. Contains a service adapter definition

  3. Fully qualified name of the Java class that provides the adapter functionality

  4. Indicates whether this adapter is the default adapter for service destinations.


Correct Option: A

When the initialize event is dispatched in flex?

  1. Dispatched when a component has been created in a rough state, and no children have been created.

  2. Dispatched when the component has been laid out and the component is visible (if appropriate).

  3. Dispatched when a component and all its children have been created, but before the component size has been determined

  4. Dispatched when a component has been updated


Correct Option: C

For logging some information for debugging purpose, its good to use:

  1. log.debug

  2. log.info

  3. log.error

  4. System.out.println


Correct Option: A

To display a grouping collection in tabular format which of the following controls can be used?

  1. DataGrid

  2. AdvancedDataGrid

  3. SummaryRow

  4. GroupedTable


Correct Option: B
  1. Transperancy

  2. Brightness

  3. Space

  4. Relative Height/Width


Correct Option: A

destination property specified for mx:Producer control must match with the destination id specified in

  1. services-config.xml

  2. remoting-config.xml

  3. proxy-config.xml

  4. messaging-config.xml


Correct Option: D

Which event helps us to identify if the image is correctly loaded or not using mx:Image control ?

  1. scaleContent

  2. states

  3. httpStatus

  4. imageLoaded


Correct Option: C

creationPolicy property is used to

  1. defer the creation of any component, container, or child of a container

  2. delete the creation of any component, container, or child of a container

  3. create parent container

  4. Attach child container to Parent container


Correct Option: A

When it is good to change scaleX and scaleY properties of a display object

  1. To change height and width of a object

  2. To make relative changes to the size of a display object

  3. To change height more than width

  4. To change width more than height


Correct Option: B

Referring to the scenario above, what will happen to the final results when there is NO match between the tables?

  1. The right table will return ALL rows

  2. The right table will return NULL

  3. Both tables will return NULL

  4. The left table will return ALL rows

  5. The left table will return NULL


Correct Option: A

What happens when we run checkpoint VPN?

  1. Configures the network parameters and enables all the http request to reach vpn server.

  2. Configures the network parameters and enables all the http request with appropriate dns suffix to reach vpn server.

  3. Configures the network parameters and enables all the http request with appropriate dns suffix to reach nielsen server.

  4. Configures the network parameters and enables all the http request with appropriate dns suffix to reach nielsen ntework.


Correct Option: B

what happens when you request hermes.nielsen.com with vpn connected inside TCS?

  1. Request reaches the TCS dns servers and get resolved.

  2. Request reaches the TCS domain server and get resolved.

  3. Request reaches the vpn domain server and get resolved.

  4. Request reaches the vpn dns servers and get resolved.


Correct Option: D
  1. Request reaches the TCS dns servers and get resolved.

  2. Request reaches the vpn dns servers and get resolved.

  3. Request reaches the TCS domain server and get resolved.

  4. Request reaches the vpn domain server and get resolved.


Correct Option: A

how many dns servers does vpn has?

  1. 3

  2. 2

  3. 1

  4. 4


Correct Option: B

What protocol does hermes.nielsen.com uses to receive emails?

  1. POP3

  2. IMAP

  3. SMTP

  4. MIME


Correct Option: B

What is the default checkpoint vpn dns suffix?

  1. enterprisenet.org

  2. nielsen.com

  3. narheapp.org

  4. answersint.nielsen.com


Correct Option: A
Explanation:

To solve this question, the user needs to have knowledge about DNS suffix and Checkpoint VPN. The user needs to identify which DNS suffix is the default for Checkpoint VPN.

The correct answer is option A: enterprisenet.org. This is the default Checkpoint VPN DNS suffix. Checkpoint VPN is a software-based VPN client and firewall solution which uses DNS suffix to resolve domain names to IP addresses. The DNS suffix is added to the hostname when making a DNS query. In the case of Checkpoint VPN, the default DNS suffix is enterprisenet.org. Options B, C, and D are incorrect, as they are not related to Checkpoint VPN or its default DNS suffix.

- Hide questions