QB CT-2-1
QB CT-2-1
Answer: b
2. Name the class which is used to create a port where the server will listen.
Answer: c
Answer: d
(c) static InetAddress getAllName(String hostname) (d) static InetAddress[ ] getAllByName(String hostname)
Answer: c
Answer: c
Answer: b
Answer: a
Answer: b
9. Which of these is a bundle of information passed between machines?
Answer: c
Answer: a
Answer: a
(a) 100% pure Java Driver (b) JDBC – net pure Java Driver
(c) JDBC – Native API driver (d) JDBC – Native pure Java Driver
Answer: d
13. Database programming using Java throws which of the following exception?
Answer: d
14. Which of these is a protocol for breaking and sending packets to an address across a network?
(a)TCP/IP (b)Socket
Answer: a
Answer: a
16. JSP embeds in …..
Answer: d
Answer: a
(b) If a tag is implemented as a tag file and packaged in /WEB‐INF/tags/ or a subdirectory,a TLD will be generated
automatically by the web container, though, you can provide one if you wish
(c) packaged in the /META‐INF/ directory or subdirectoryof a tag library packaged in a jar.
Answer: d
19. Name the http method used to send resources to the server.
Answer: a
Answer: c
System.out.println(rs.getString(3));
Answer: d
23. How many steps are used to connect any java application with the database using JDBC ?
(a) 5 (b) 4
(c) 3 (d) 6
Answer: d
Answer: d
25. Which of these method of DatagramPacket class is used to find the destination address?
Answer: b
Answer: a
(a) 1 (b) 2
Answer: d
Answer: a
(a)DataGramPacket (b)DatagramSocket
(c)Both (d)None
Answer: c
30. A user types the URL http://www.msbte.com/result.php. Which request gets generated?
Answer: a
Answer: d
32. How many ports of TCP/IP are reserved for specific protocols?
Answer: b
33. The authentication mechanism in the servlet specification uses a technique called ?
Answer: c