0

web technology Online Quiz - 187

Description: web technology Online Quiz - 187
Number of Questions: 20
Created by:
Tags: web technology
Attempted 0/20 Correct 0 Score 0

cluster member has suddenly crashed. The administrator is concerned about aborted transactions holding locks in the database. What can an administrator do to release the locks?

  1. Unmount the shared file system such as a Network Attached Storage (NAS) where thetransaction log is stored

  2. Restart the deployment manager and node agents who manage the transaction log

  3. Verify another running cluster member has access to the transaction log

  4. Reconnect the database where the transaction log is stored


Correct Option: C

What functionality does the Caching Proxy server provide?

  1. Reverse proxy and content-based routing

  2. Dynamic content caching and integration with servlet caching

  3. File serving enabler

  4. HTTP compression


Correct Option: A,B

What is needed to load balance the HTTP traffic across a cluster of Web servers?

  1. Configure a proxy server such as Tivoli Access Manager (TAM)

  2. Enable server affinity for each HTTP server in the cluster

  3. Implement the caching proxy server component of the WebSphere Edge

  4. se an IP sprayer from the load balancing component of the WebSphere Edge Components


Correct Option: D
  1. An embedded portlet container

  2. A scaled-down version of the WebSphere Portal Server

  3. Several J2EE applications that render and aggregate portlets in a browser

  4. An embedded version of WebSphere Portal Express


Correct Option: A

Which two components provide workload management capabilities?

  1. Node Agent

  2. Web server Plug-in

  3. Caching proxy

  4. Deployment Manager

  5. Load Balancer


Correct Option: B,E

what type of reports we can create with report studio?

  1. Ad hoc reports

  2. Professional reports

  3. Cubes

  4. None of them


Correct Option: B

Which services are implemented by the WebSphere application server?

  1. Security, JMS messaging, Naming and HTTP Plug-in

  2. The user registry, Naming and HTTP Plug-in

  3. HTTP Load Balancing service, JMS messaging and Data Replication Service (DRS)

  4. Security, Naming, Transaction and Dynamic Cache


Correct Option: D

Session Initiation Protocol (SIP) servlets are packaged in which type of archive file?

  1. SAR

  2. WAR

  3. JAR

  4. EJB-JAR

  5. SIP-JAR


Correct Option: A

In a WebSphere cell configuration, which component is a single point of failure?

  1. Deployment Manager

  2. Web container

  3. EJB container

  4. HTTP Server


Correct Option: A
Explanation:

To answer this question, the user needs to have a basic understanding of WebSphere cell configuration and its components.

The correct answer is:

A. Deployment Manager

Explanation:

In a WebSphere cell configuration, the Deployment Manager is a single point of failure. The Deployment Manager is responsible for managing the deployment of applications across the cell, and if it fails, it can result in the entire cell being unavailable. The other components, such as the web container, EJB container, and HTTP server, can be distributed across multiple nodes in the cell, providing redundancy and fault tolerance.

Option B, web container, is incorrect because it is responsible for handling HTTP requests and is not a single point of failure.

Option C, EJB container, is incorrect because it manages the execution of EJB components and is not a single point of failure.

Option D, HTTP server, is incorrect because it is responsible for handling HTTP requests and can be distributed across multiple nodes in the cell.

Therefore, the correct answer is A. Deployment Manager.

  1. Create a design using multiple machines that handle the full production load, enabling the use

  2. Utilize load balancers between the Web servers and the application servers to provide failover

  3. Place the Authentication servers outside of the intrusion firewall with the Web servers, since

  4. Use the largest processor engines and least number of physical machines for the application


Correct Option: A

If an administrator configures session management for an application server to use SSL ID tracking, which two other session tracking mechanisms should also be enabled?

  1. Cookies

  2. URL Rewriting

  3. Security Integration

  4. Serial Access

  5. RMI


Correct Option: A,B

If list of values is very large, we use value prompt.

  1. True

  2. False


Correct Option: B

Full form of YAHOO

  1. Yet Another Hierarchical Offensive Oracle

  2. Yet Another Hierarchically Organised Oracle

  3. Yet Another Hierarchy of Officious Oracle

  4. Yet Another Hasty Organizer Of Opportunity


Correct Option: C

Full form of ADIDAS

  1. A.ll D.ay I. D.ream A.bout S.ource code

  2. All Day I Dream About Sports

  3. All Day I Dream About Squash

  4. Adidas is a shortened version of the founder's name. (Adi Dassler of Germany.)


Correct Option: B,D

In what year was the "@" chosen for its use in e-mail addresses?

  1. 1976

  2. 1972

  3. 1980

  4. 1984


Correct Option: B

AI Explanation

To answer this question, let's go through each option to understand why it is correct or incorrect:

Option A) 1976 - This option is incorrect because the "@" symbol was not chosen for its use in email addresses in 1976.

Option B) 1972 - This option is correct because the "@" symbol was chosen for its use in email addresses in 1972. The symbol was selected by Ray Tomlinson, the inventor of email, to separate the local part of an email address from the domain name.

Option C) 1980 - This option is incorrect because the "@" symbol was chosen for its use in email addresses before 1980.

Option D) 1984 - This option is incorrect because the "@" symbol was chosen for its use in email addresses before 1984.

The correct answer is B) 1972. This option is correct because the "@" symbol was chosen for its use in email addresses in 1972.

Who developed Yahoo?

  1. Dennis Ritchie & Ken Thompson

  2. David Filo & Jerry Yang

  3. Vint Cerf & Robert Kahn

  4. Steve Case & Jeff Bezos


Correct Option: B

Compact discs, (according to the original CD specifications) hold how many minutes of music?

  1. 74 Mins

  2. 56 Mins

  3. 60 Mins

  4. 90 Mins


Correct Option: A

Where is the headquarters of Intel located?

  1. Redmond, Washington

  2. Tucson, Arizona

  3. Santa Clara, California

  4. Richmond, Virginia


Correct Option: C

AI Explanation

To answer this question, we need to know the location of Intel's headquarters. Let's go through each option to understand why it is correct or incorrect:

Option A) Redmond, Washington - This option is incorrect because the headquarters of Intel is not located in Redmond, Washington.

Option B) Tucson, Arizona - This option is incorrect because the headquarters of Intel is not located in Tucson, Arizona.

Option C) Santa Clara, California - This option is correct because the headquarters of Intel is located in Santa Clara, California.

Option D) Richmond, Virginia - This option is incorrect because the headquarters of Intel is not located in Richmond, Virginia.

The correct answer is C. Santa Clara, California. This option is correct because the headquarters of Intel is located in Santa Clara, California.

Who co-created the UNIX operating system in 1969 with Dennis Ritchie?

  1. Bjarne Stroustrup

  2. Steve Wozniak

  3. Ken ThompsonĀ 

  4. Niklaus Wirth


Correct Option: C

Where is the headquarters of Microsoft located?

  1. Santa Clara, California

  2. Tucson, Arizona

  3. Richmond, Virginia

  4. Redmond, Washington


Correct Option: A
- Hide questions