6.What's the difference between servlet and applets? 
applets:
Applets are executed on client-side i.e applet runs within a Web browser on the client machine.
Important methods of applet include init(), stop(), paint(), start(), destroy().
servlets:
Servlets on other hand executed on the server-side i.e servlet runs on the web Page on server.
Lifecycle methods of servlet are init( ), service( ), and destroy( ).
  applets:
Applets are executed on client-side i.e applet runs within a Web browser on the client machine.
Important methods of applet include init(), stop(), paint(), start(), destroy().
servlets:
Servlets on other hand executed on the server-side i.e servlet runs on the web Page on server.
Lifecycle methods of servlet are init( ), service( ), and destroy( ).
7.What are the four drivers available in JDBC? 
Type-1 driver or JDBC-ODBC bridge driver.
Type-2 driver or Native-API driver.
Type-3 driver or Network Protocol driver.
Type-4 driver or Thin driver.
  Type-1 driver or JDBC-ODBC bridge driver.
Type-2 driver or Native-API driver.
Type-3 driver or Network Protocol driver.
Type-4 driver or Thin driver.
9.What is Java media framework? 
The Java Media Framework API (JMF) enables audio, video and other time-based media to be added to applications and applets built on Java technology
  The Java Media Framework API (JMF) enables audio, video and other time-based media to be added to applications and applets built on Java technology
10.What is Servlet interface? 
This interface is for developing servlets. A servlet is a body of Java code that is loaded into and runs inside a servlet engine, such as a web server.
The Servlet interface defines methods to initialize a servlet, to receive and respond to client requests, and to destroy a servlet and its resources.
  This interface is for developing servlets. A servlet is a body of Java code that is loaded into and runs inside a servlet engine, such as a web server.
The Servlet interface defines methods to initialize a servlet, to receive and respond to client requests, and to destroy a servlet and its resources.
Java Interview Question
1.What is servlet chaining? Explain.
2.Describe the basic concepts of servlet life cycle.
3.Write short notes on JDBC drivers.
4.What is server side include? Explain
5.Describe the life cycle methods of servlet with a neat diagram.
6.What are the advantages and disadvantages of the Get method?
7.Describe briefly on the servlet interface.
8.What are the advantages of using servlet than using CGI? Explain.
9.Explain applet and servlet communication with example.
10.How to create servlet filter elements?
11.Explain the usage of JDBC in servlet with an example
12.What are the uses of servlet? Explain.
13.What are the types of statements in JDBC? Explain with examples.
  1.What is servlet chaining? Explain.
2.Describe the basic concepts of servlet life cycle.
3.Write short notes on JDBC drivers.
4.What is server side include? Explain
5.Describe the life cycle methods of servlet with a neat diagram.
6.What are the advantages and disadvantages of the Get method?
7.Describe briefly on the servlet interface.
8.What are the advantages of using servlet than using CGI? Explain.
9.Explain applet and servlet communication with example.
10.How to create servlet filter elements?
11.Explain the usage of JDBC in servlet with an example
12.What are the uses of servlet? Explain.
13.What are the types of statements in JDBC? Explain with examples.
1.Explain session management in servlet.
2.Explain connection establishment of JDBC.
3.Explain applet and servlet communication with example.
4.Explain in detail about servlet architecture with necessary diagrams.
5.Explain the life cycle of servlets.
6.Write an Airline Reservation Program using JDBC and servlet.
7.Explain briefly about applet to servlet communication with an example.
8.Explain briefly the session tracking API with HTTP session objects.
9.Explain briefly session tracking with servlet.
10.Explain HTTP GET and HTTP POST requests.
11.Write a servlet code to display Name, ISBN number, prize data of book stored in database, (use form).
12.How session tracking can be achieved in servlets?
  2.Explain connection establishment of JDBC.
3.Explain applet and servlet communication with example.
4.Explain in detail about servlet architecture with necessary diagrams.
5.Explain the life cycle of servlets.
6.Write an Airline Reservation Program using JDBC and servlet.
7.Explain briefly about applet to servlet communication with an example.
8.Explain briefly the session tracking API with HTTP session objects.
9.Explain briefly session tracking with servlet.
10.Explain HTTP GET and HTTP POST requests.
11.Write a servlet code to display Name, ISBN number, prize data of book stored in database, (use form).
12.How session tracking can be achieved in servlets?
What are the three types of EJB? 
✦ Entity beans
✦ Session beans
✦ Message-driven beans
  ✦ Entity beans
✦ Session beans
✦ Message-driven beans
Q-Define WAR file. 
A war (web archive) File contains files of a web project. It may have servlet, xml,
jsp, image, html, css, js etc. files.It reduces the time duration for transferring files
  A war (web archive) File contains files of a web project. It may have servlet, xml,
jsp, image, html, css, js etc. files.It reduces the time duration for transferring files
Q.Define java beans. 
A JavaBean is a Java class that should follow the following conventions:
It should have a no-arg constructor.
It should be Serializable.
It should provide methods to set and get the values of the properties, known as getter and setter methods.
  A JavaBean is a Java class that should follow the following conventions:
It should have a no-arg constructor.
It should be Serializable.
It should provide methods to set and get the values of the properties, known as getter and setter methods.
Q.How should system exceptions be handled from an enterprise bean? 
A system exception indicates a problem with the services that support an application.
If it encounters a system-level problem, enterprise bean should throw a javax.ejb.EJBException. Because the EJBException is a subclass of the RuntimeException, you do not have to specify it in the throws clause of the method declaration.
If a system exception is thrown, the EJB container might destroy the bean instance.
Therefore, a system exception cannot be handled by the bean’s client program, but instead requires intervention by a system administrator.
An application exception signals an error in the business logic of an enterprise bean.
  A system exception indicates a problem with the services that support an application.
If it encounters a system-level problem, enterprise bean should throw a javax.ejb.EJBException. Because the EJBException is a subclass of the RuntimeException, you do not have to specify it in the throws clause of the method declaration.
If a system exception is thrown, the EJB container might destroy the bean instance.
Therefore, a system exception cannot be handled by the bean’s client program, but instead requires intervention by a system administrator.
An application exception signals an error in the business logic of an enterprise bean.
Q.How can nested transactions be implemented with enterprise bean?
Java EE does not support nested transactions. The only thing it supports is suspending a transaction, running an unrelated transaction, and the resuming the first transaction.
To accomplish that, you would need to call another EJB that uses the RequiresNew transaction attribute. Note that the inner transaction can complete even if the message receipt rolls back, which means if the messaging
engine crashes, the second transaction might be run again. Alternatively, you could change the EJB to use bean-managed transactions, which would have a similar effect.
  Java EE does not support nested transactions. The only thing it supports is suspending a transaction, running an unrelated transaction, and the resuming the first transaction.
To accomplish that, you would need to call another EJB that uses the RequiresNew transaction attribute. Note that the inner transaction can complete even if the message receipt rolls back, which means if the messaging
engine crashes, the second transaction might be run again. Alternatively, you could change the EJB to use bean-managed transactions, which would have a similar effect.
1.What are the relationships and responsibilities of EJB? Explain. 
2. Differentiate stateless and stateful session bean.
3.What is enterprise java bean query language? Give some examples.
4.Explain array function and hash function with example.
5.What are the control structures available in Perl?
6.Explain with examples.
7.What is meant by bean astonization? Explain.
8.What is introspection? Explain.
9.Distinguish between stateful and stateless session beans.
10. Explain enterprise bean lifecycle methods in detail.
11.Explain Container -Managed Persistence with an example.
12.Write short notes on EJB session bean and entity bean.
13.Explain the functions and scope of Perl.
14.How does EJB support asynchronous communication with clients?
15.Discuss about file operation in Perl.
16.Explain EJB requirements.
17.Write the features of the application server in EJP.
18.Explain how the EJB interacts with other beans.
  2. Differentiate stateless and stateful session bean.
3.What is enterprise java bean query language? Give some examples.
4.Explain array function and hash function with example.
5.What are the control structures available in Perl?
6.Explain with examples.
7.What is meant by bean astonization? Explain.
8.What is introspection? Explain.
9.Distinguish between stateful and stateless session beans.
10. Explain enterprise bean lifecycle methods in detail.
11.Explain Container -Managed Persistence with an example.
12.Write short notes on EJB session bean and entity bean.
13.Explain the functions and scope of Perl.
14.How does EJB support asynchronous communication with clients?
15.Discuss about file operation in Perl.
16.Explain EJB requirements.
17.Write the features of the application server in EJP.
18.Explain how the EJB interacts with other beans.
1.Explain the architecture of EJB with a neat diagram.
2.Describe the control structures and operators of Perl with suitable examples.
3.Describe the roles, relationship and responsibilities of EJB with a neat diagram.
4. Explain the functions and scope of Perl with suitable examples.
5.What are the two subtypes of entity bean? Explain the two types in detail.
6.Explain EJB architecture.
7.Explain life cycle of a session bean in detail.
8.Describe the implementation and future direction of EJB.
9.Write a program to develop an Enterprise JavaBean for library operations.
10.Describe the functions of different types of client views available in EJB.
11.What is an EJB Client? Explain EJB deployment model.
12. Explain arithmetic and string functions used in PERL.
  2.Describe the control structures and operators of Perl with suitable examples.
3.Describe the roles, relationship and responsibilities of EJB with a neat diagram.
4. Explain the functions and scope of Perl with suitable examples.
5.What are the two subtypes of entity bean? Explain the two types in detail.
6.Explain EJB architecture.
7.Explain life cycle of a session bean in detail.
8.Describe the implementation and future direction of EJB.
9.Write a program to develop an Enterprise JavaBean for library operations.
10.Describe the functions of different types of client views available in EJB.
11.What is an EJB Client? Explain EJB deployment model.
12. Explain arithmetic and string functions used in PERL.
Q1)What is RMI:
The RMI (Remote Method Invocation) is an API that provides a mechanism to create distributed applications in java. The RMI allows an object to invoke methods on an object running in another JVM.
Q2)Give the Meaning of REMOTE ACTIVATION:
Java RMI activation is a process that continually runs on a system to ensure that activatable services are available when they are needed.
Q3)What is ORB, give example:
The ORB is both a tool and a runtime component EG: WebSphere Application Server provided by IBM
Q4)How will you declare RMI:
A remote interface defines method(s) that can be invoked remotely by a client.
Like any Java interfaces, the remote interfaces describe the behavior of remote objects and do not contain the implementation of this behavior.
The client program will “have a feeling” that it calls local methods, but actually these calls will be redirected to a remote server.
Q5)What are the procedures to register RMI:
Create the remote interface
Provide the implementation of the remote interface
Compile the implementation class and create the stub and skeleton objects using the rmic tool
Start the registry service by rmi registry tool
Create and start the remote application
Create and start the client application
Q6)State the role of stub in RMI:
The stub is an object, and acts as a gateway for the client side. All the outgoing requests are routed through it. It resides at the client side and represents the remote object.
Q7)State the methods for registering remote interface:
bind(): Binds the specified name to the remote object.
unbind(): removes an object from the registry.
rebind(): replaces any preexisting registry entry with the new one.
Q8)Specify the goal of RMI:
To minimize the complexity of the application.
To preserve type safety.
Distributed garbage collection.
Minimize the difference between working with local and remote objects.
Q9)What is java RMI?
RMI stands for Remote Method Invocation. It is a mechanism that allows an object residing in one system (JVM) to access/invoke an object running on another JVM. RMI is used to build distributed applications; it provides remote communication between Java programs. It is provided in the package java. rmi.
Q10)What is IIOP
IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet
Q11)Define STUB and skeleton:
The stub is an object, acts as a gateway for the client side. All the outgoing requests are routed through it. It resides at the client side and represents the remote object.
The skeleton is an object, and acts as a gateway for the server side object. All the incoming requests are routed through it
Q12)What are the components of RMI application:
1.CLIENT
2. SERVER
3.REGISTRY
Q13)what is meant by remote exceptions
In RMI applications, all remote methods must declare java.rmi.RemoteException.
This exception will be thrown by the server application in such cases as communication failures, marshalling or unmarshalling errors, and so on.
Because a Remote Exception is a checked exception, it has to be handled in the client code.
Q14) EXPAND JNDI:
JAVA NAMING and DIRECTORY INTERFACE
Q15) What do you mean by Rmic ?
RMI compiler ,tool which automatically programs the network communications in RMI applications
  The RMI (Remote Method Invocation) is an API that provides a mechanism to create distributed applications in java. The RMI allows an object to invoke methods on an object running in another JVM.
Q2)Give the Meaning of REMOTE ACTIVATION:
Java RMI activation is a process that continually runs on a system to ensure that activatable services are available when they are needed.
Q3)What is ORB, give example:
The ORB is both a tool and a runtime component EG: WebSphere Application Server provided by IBM
Q4)How will you declare RMI:
A remote interface defines method(s) that can be invoked remotely by a client.
Like any Java interfaces, the remote interfaces describe the behavior of remote objects and do not contain the implementation of this behavior.
The client program will “have a feeling” that it calls local methods, but actually these calls will be redirected to a remote server.
Q5)What are the procedures to register RMI:
Create the remote interface
Provide the implementation of the remote interface
Compile the implementation class and create the stub and skeleton objects using the rmic tool
Start the registry service by rmi registry tool
Create and start the remote application
Create and start the client application
Q6)State the role of stub in RMI:
The stub is an object, and acts as a gateway for the client side. All the outgoing requests are routed through it. It resides at the client side and represents the remote object.
Q7)State the methods for registering remote interface:
bind(): Binds the specified name to the remote object.
unbind(): removes an object from the registry.
rebind(): replaces any preexisting registry entry with the new one.
Q8)Specify the goal of RMI:
To minimize the complexity of the application.
To preserve type safety.
Distributed garbage collection.
Minimize the difference between working with local and remote objects.
Q9)What is java RMI?
RMI stands for Remote Method Invocation. It is a mechanism that allows an object residing in one system (JVM) to access/invoke an object running on another JVM. RMI is used to build distributed applications; it provides remote communication between Java programs. It is provided in the package java. rmi.
Q10)What is IIOP
IIOP (Internet Inter-ORB Protocol) is a protocol that makes it possible for distributed programs written in different programming languages to communicate over the Internet
Q11)Define STUB and skeleton:
The stub is an object, acts as a gateway for the client side. All the outgoing requests are routed through it. It resides at the client side and represents the remote object.
The skeleton is an object, and acts as a gateway for the server side object. All the incoming requests are routed through it
Q12)What are the components of RMI application:
1.CLIENT
2. SERVER
3.REGISTRY
Q13)what is meant by remote exceptions
In RMI applications, all remote methods must declare java.rmi.RemoteException.
This exception will be thrown by the server application in such cases as communication failures, marshalling or unmarshalling errors, and so on.
Because a Remote Exception is a checked exception, it has to be handled in the client code.
Q14) EXPAND JNDI:
JAVA NAMING and DIRECTORY INTERFACE
Q15) What do you mean by Rmic ?
RMI compiler ,tool which automatically programs the network communications in RMI applications
INFORMATION SECURITY Interview Question
————————————————————-
1. Define: "Vulnerability".
2. What are career criminals?
3. Write a note on encryption.
4. What do you mean by Relocation?
5. Define Segmentation.
6. What is persistent permission?
7. Write a note on physical database integrity.
8. What is user authentication?
9. Define the term SSL.
10. What do you mean by satellite communication?
11. Write down the basic steps of risk analysis ?
12. What are the characteristics of a good security policy?
13. Summarize the viruses and other malicious code.
14. Elaborate the characteristics of computer intrusion.
15. Describe the memory and address protection.
16. Explain the procedure-oriented access control.
17. What are the reliability and integrity in database? Explain.
18. Describe the various security threat analyses.
19. Explain the contents of a security plan.
20. Discuss the targeted malicious code in detail.
21. Explain the various types of file protection mechanisms.
22. What are the proposals for multilevel security? Explain.
23. How to establish a virtual private network? Explain.
24. Illustrate the components of an intrusion detection framework.
25. How will you protect programs and data? Explain.
  ————————————————————-
1. Define: "Vulnerability".
2. What are career criminals?
3. Write a note on encryption.
4. What do you mean by Relocation?
5. Define Segmentation.
6. What is persistent permission?
7. Write a note on physical database integrity.
8. What is user authentication?
9. Define the term SSL.
10. What do you mean by satellite communication?
11. Write down the basic steps of risk analysis ?
12. What are the characteristics of a good security policy?
13. Summarize the viruses and other malicious code.
14. Elaborate the characteristics of computer intrusion.
15. Describe the memory and address protection.
16. Explain the procedure-oriented access control.
17. What are the reliability and integrity in database? Explain.
18. Describe the various security threat analyses.
19. Explain the contents of a security plan.
20. Discuss the targeted malicious code in detail.
21. Explain the various types of file protection mechanisms.
22. What are the proposals for multilevel security? Explain.
23. How to establish a virtual private network? Explain.
24. Illustrate the components of an intrusion detection framework.
25. How will you protect programs and data? Explain.
Algorithms for Interviews.pdf
    25.4 MB
  Algorithms for Interviews By Amit Prakash & Adnan Aziz