33. What is callback methods
Component methods called by the container to notify the component of important events in its life cycle.
34. What is caller
Same as caller principal.
35. What is caller principal
The principal that identifies the invoker of the enterprise bean method.
36. What is cascade delete
A deletion that triggers another deletion. A cascade delete can be specified for an entity bean that has
37. What is CDATA
A predefined XML tag for character data that means "don't interpret these characters," as opposed to
parsed character data (PCDATA), in which the normal rulesof XML syntax apply. CDATA sections are typically used to show examples of XML syntax.
38. What is certificate authority
A trusted organization that issues public key certificates and provides identification to the bearer.
39. What is client-certificate authentication
An authentication mechanism that uses HTTP over SSL, in which the server and, optionally, the client
authenticate each other with a public key certificate that conforms to a standard that is defined by X.509 Public Key Infrastructure.
40. What is comment
In an XML document, text that is ignored unless the parser is specifically told to recognize it.
41. What is commit
The point in a transaction when all updates to any resources involved in the transaction are made
42. What is component contract
The contract between a J2EE component and its container. The contract includes life-cycle management
of the component, a context interface that the instance uses to obtain various information and
services from its container, and a list of services that every container must provide for its components.
43. What is component-managed sign-on
A mechanism whereby security information needed for signing on to a resource is provided by an application component.
44. What is connector
A standard extension mechanism for containers that provides connectivity to enterprise information
systems. A connector is specific to an enterprise information system and consists of a resource adapter
and application development tools for enterprise information system connectivity. The resource adapter
is plugged in to a container through its support for system-level contracts defined in the Connector
45. What is Connector architecture
An architecture for integration of J2EE products with enterprise information systems. There are two parts to this architecture: a resource adapter provided by an enterprise information system vendor and the J2EE product that allows this resource adapter to plug in. This architecture defines a set of contracts that a resource adapter must support to plug in to a J2EE product-for example, transactions, security, and resource management.
46. What is container
An entity that provides life-cycle management, security, deployment, and runtime services to J2EE components. Each type of container (EJB, Web, JSP, servlet, applet, and application client) also provides component-specific services.
47. What is container-managed persistence
The mechanism whereby data transfer between an entity bean's variables and a resource manager is managed by the entity bean's container
48. What is container-managed sign-on
The mechanism whereby security information needed for signing on to a resource is supplied by the container.
49. What is container-managed transaction
A transaction whose boundaries are defined by an EJB container. An entity bean must use container-managed transactions.
50. What is content
In an XML document, the part that occurs after the prolog, including the root element and everything it
51. What is context attribute
An object bound into the context associated with a servlet.
52. What is context root
A name that gets mapped to the document root of a Web application.
53. What is conversational state
The field values of a session bean plus the transitive closure of the objects reachable from the bean's
fields. The transitive closure of a bean is defined in terms of the serialization protocol for the Java
programming language, that is, the fields that would be stored by serializing the bean instance.
54. What is CORBA
Common Object Request Broker Architecture. A language-independent distributed object model specified by the OMG.
55. What is create method
A method defined in the home interface and invoked by a client to create an enterprise bean.
56. What is credentials
The information describing the security attributes of a principal.
57. What is CSS
Cascading style sheet. A stylesheet used with HTML and XML documents to add a style to all elements marked with a particular tag, for the direction of browsers or other presentation mechanisms.
58. What is CTS
Compatibility test suite. A suite of compatibility tests for verifying that a J2EE product complies with
the J2EE platform specification.
59. What is data
The contents of an element in an XML stream, generally used when the element does not contain any
subelements. When it does, the term content is generally used. When the only text in an XML structure
is contained in simple elements and when elements that have subelements have little or no data mixed in, then that structure is often thought of as XML data, as opposed to an XML document.
60. What is DDP
Document-driven programming. The use of XML to define applications.
61. What is declaration
The very first thing in an XML document, which declares it as XML. The minimal declaration is . The
declaration is part of the document prolog.
62. What is declarative security
Mechanisms used in an application that are expressed in a declarative syntax in a deployment descriptor.
63. What is delegation
An act whereby one principal authorizes another principal to use its identity or privileges with some
64. What is deployer
A person who installs J2EE modules and applications into an operational environment.
65. What is deployment
The process whereby software is installed into an operational environment.
66. What is deployment descriptor
An XML file provided with each module and J2EE application that describes how they should be
deployed. The deployment descriptor directs a deployment tool to deploy a module or application with
specific container options and describes specific configuration requirements that a deployer must
67. What is destination
A JMS administered object that encapsulates the identity of a JMS queue or topic. See point-to-point
messaging system, publish/subscribe messaging system.
68. What is digest authentication
An authentication mechanism in which a Web application authenticates itself to a Web server by sending the server a message digest along with its HTTP request message. The digest is computed by employing a one-way hash algorithm to a concatenation of the HTTP request message and the client's password. The digest is typically much smaller than the HTTP request and doesn't contain the password.
69. What is distributed application
An application made up of distinct components running in separate runtime environments, usually on different platforms connected via a network. Typical distributed applications are two-tier (client-server), three-tier (client-middleware-server), and multitier (client-multiple middleware-multiple servers).
67. What is document
In general, an XML structure in which one or more elements contains text intermixed with subelements.
68. What is Document Object Model
An API for accessing and manipulating XML documents as tree structures. DOM provides platform-neutral, language-neutral interfaces that enables programs and scripts to dynamically access and modify content and structure in XML documents.
69. What is document root
The top-level directory of a WAR. The document root is where JSP pages, client-side classes and archives, and static Web resources are stored.
70. What is DTD
Document type definition. An optional part of the XML document prolog, as specified by the XML standard. The DTD specifies constraints on the valid tags and tag sequences that can be in the document. The DTD has a number of shortcomings, however, and this has led to various schema proposals. For example, the DTD entry says that the XML element called username contains parsed character data-that is, text alone, with no other structural elements under it. The DTD includes both the local subset, defined in the current file, and the external subset, which consists of the definitions contained in external DTD files that are referenced in the local subset using a parameter entity.