Coder Baba
2.41K subscribers
1.01K photos
23 videos
722 files
726 links
Everything about programming for beginners.
1 and only official telegram channel of CODERBABA India.

Content:
.NET Developer,
Programming (ASP. NET, VB. NET, C#, SQL Server),
& Projects
follow me https://linktr.ee/coderbaba
*Programming
*Coding
*Note
Download Telegram
Q.How can nested transactions be implemented with enterprise bean?

Java EE does not support nested transactions. The only thing it supports is suspending a transaction, running an unrelated transaction, and the resuming the first transaction.

To accomplish that, you would need to call another EJB that uses the RequiresNew transaction attribute. Note that the inner transaction can complete even if the message receipt rolls back, which means if the messaging

engine crashes, the second transaction might be run again. Alternatively, you could change the EJB to use bean-managed transactions, which would have a similar effect.
1.What are the relationships and responsibilities of EJB? Explain.
2. Differentiate stateless and stateful session bean.
3.What is enterprise java bean query language? Give some examples.
4.Explain array function and hash function with example.
5.What are the control structures available in Perl?
6.Explain with examples.
7.What is meant by bean astonization? Explain.
8.What is introspection? Explain.
9.Distinguish between stateful and stateless session beans.
10. Explain enterprise bean lifecycle methods in detail.
11.Explain Container -Managed Persistence with an example.
12.Write short notes on EJB session bean and entity bean.
13.Explain the functions and scope of Perl.
14.How does EJB support asynchronous communication with clients?
15.Discuss about file operation in Perl.
16.Explain EJB requirements.
17.Write the features of the application server in EJP.
18.Explain how the EJB interacts with other beans.
1.Explain the architecture of EJB with a neat diagram.
2.Describe the control structures and operators of Perl with suitable examples.
3.Describe the roles, relationship and responsibilities of EJB with a neat diagram.
4. Explain the functions and scope of Perl with suitable examples.
5.What are the two subtypes of entity bean? Explain the two types in detail.
6.Explain EJB architecture.
7.Explain life cycle of a session bean in detail.
8.Describe the implementation and future direction of EJB.
9.Write a program to develop an Enterprise JavaBean for library operations.
10.Describe the functions of different types of client views available in EJB.
11.What is an EJB Client? Explain EJB deployment model.
12. Explain arithmetic and string functions used in PERL.
Q1)What is RMI:
The RMI (Remote Method Invocation) is an API that provides a mechanism to create distributed applications in java. The RMI allows an object to invoke methods on an object running in another JVM.

Q2)Give the Meaning of REMOTE ACTIVATION:
Java RMI activation is a process that continually runs on a system to ensure that activatable services are available when they are needed.

Q3)What is ORB, give example:
The ORB is both a tool and a runtime component EG: WebSphere Application Server provided by IBM

Q4)How will you declare RMI:
A remote interface defines method(s) that can be invoked remotely by a client.

Like any Java interfaces, the remote interfaces describe the behavior of remote objects and do not contain the implementation of this behavior.

The client program will “have a feeling” that it calls local methods, but actually these calls will be redirected to a remote server.

Q5)What are the procedures to register RMI:
Create the remote interface
Provide the implementation of the remote interface
Compile the implementation class and create the stub and skeleton objects using the rmic tool
Start the registry service by rmi registry tool
Create and start the remote application
Create and start the client application

Q6)State the role of stub in RMI:

The stub is an object, and acts as a gateway for the client side. All the outgoing requests are routed through it. It resides at the client side and represents the remote object.

Q7)State the methods for registering remote interface:
bind(): Binds the specified name to the remote object.
unbind(): removes an object from the registry.
rebind(): replaces any preexisting registry entry with the new one.

Q8)Specify the goal of RMI:

To minimize the complexity of the application.
To preserve type safety.
Distributed garbage collection.
Minimize the difference between working with local and remote objects.

Q9)What is java RMI?

RMI stands for Remote Method Invocation. It is a mechanism that allows an object residing in one system (JVM) to access/invoke an object running on another JVM. RMI is used to build distributed applications; it provides remote communication between Java programs. It is provided in the package java. rmi.

Q10)What is IIOP

IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet

Q11)Define STUB and skeleton:
The stub is an object, acts as a gateway for the client side. All the outgoing requests are routed through it. It resides at the client side and represents the remote object.

The skeleton is an object, and acts as a gateway for the server side object. All the incoming requests are routed through it

Q12)What are the components of RMI application:

1.CLIENT

2. SERVER

3.REGISTRY

Q13)what is meant by remote exceptions

In RMI applications, all remote methods must declare java.rmi.RemoteException.

This exception will be thrown by the server application in such cases as communication failures, marshalling or unmarshalling errors, and so on.

Because a Remote Exception is a checked exception, it has to be handled in the client code.

Q14) EXPAND JNDI:

JAVA NAMING and DIRECTORY INTERFACE

Q15) What do you mean by Rmic ?
RMI compiler ,tool which automatically programs the network communications in RMI applications
This media is not supported in your browser
VIEW IN TELEGRAM
INFORMATION SECURITY Interview Question
————————————————————-

1. Define: "Vulnerability".

2. What are career criminals?

3. Write a note on encryption.

4. What do you mean by Relocation?

5. Define Segmentation.

6. What is persistent permission?

7. Write a note on physical database integrity.

8. What is user authentication?

9. Define the term SSL.

10. What do you mean by satellite communication?

11. Write down the basic steps of risk analysis ?

12. What are the characteristics of a good security policy?
13. Summarize the viruses and other malicious code.

14. Elaborate the characteristics of computer intrusion.

15. Describe the memory and address protection.

16. Explain the procedure-oriented access control.

17. What are the reliability and integrity in database? Explain.

18. Describe the various security threat analyses.

19. Explain the contents of a security plan.
20. Discuss the targeted malicious code in detail.

21. Explain the various types of file protection mechanisms.

22. What are the proposals for multilevel security? Explain.

23. How to establish a virtual private network? Explain.

24. Illustrate the components of an intrusion detection framework.

25. How will you protect programs and data? Explain.
Algorithms for Interviews.pdf
25.4 MB
Algorithms for Interviews By Amit Prakash & Adnan Aziz
Java Projects👆👆🖥
Unboxing Zebronics Zeb Wonderbar 10 Best Budget Speaker
https://youtu.be/w5BCjqH2s7A
-: What is the difference between array, array list and list in c# :-

They are different object types. They have different capabilities and store their data in different ways.

Array:
An Array (System.Array) is fixed in size once it is allocated. You can't add items to it or remove items from it. Also, all the elements must be the same type. As a result, it is type safe, and is also the most efficient of the three, both in terms of memory and performance. Also, System.Array supports multiple dimensions (i.e. it has a Rank property) while List and ArrayList do not (although you can create a List of Lists or an ArrayList of ArrayLists, if you want to).

ArrayList:
An ArrayList is a flexible array which contains a list of objects. You can add and remove items from it and it automatically deals with allocating space. If you store value types in it, they are boxed and unboxed, which can be a bit inefficient. Also, it is not type-safe.

List<>:
A List<> leverages generics; it is essentially a type-safe version of ArrayList. This means there is no boxing or unboxing (which improves performance) and if you attempt to add an item of the wrong type it'll generate a compile-time error.
follow @coder_baba
Basics of SOLID design principles using C# and .NET.


Intro to SOLID principles

SOLID principles are the design principles that enable us to manage most of the software design problems. Robert C. Martin compiled these principles in the 1990s. These principles provide us with ways to move from tightly coupled code and little encapsulation to the desired results of loosely coupled and encapsulated real needs of a business properly.
SOLID is an acronym of the following.

S:👉 Single Responsibility Principle (SRP)
O:👉 Open closed Principle (OCP)
L: 👉Liskov substitution Principle (LSP)
I:👉 Interface Segregation Principle (ISP)
D:👉 Dependency Inversion Principle (DIP)
SQL Cheat Sheet.pdf
634 KB
SQL Server Cheat Sheet
COMPUTER ARCHITECTURE QUESTION ANSWER.pdf
609.3 KB
COMPUTER ARCHITECTURE QUESTION ANSWER