} What will happen when Martin attempts to compile and execute the code?

Martin works as a Programmer in Data Net Inc. He writes the following code.1. class Ques0191{2. public static void main(String[] argv){3. byte a = 1;4. switch(a+1){5. case 1.6. System.out.println("One");7. case 2.8. System.out.println("2");9. case 2.10. System.out.println("Two"); break;11. }12. }13. }What will happen when Martin attempts to compile and execute the code? A. The code will compile […]

Read More

Which of the following can be the possible values for the element?

You work as a Software Developer for UcTech Inc. You want to declare a security constraint in the deploymentdescriptor using the <transport-guarantee> element. Which of the following can be the possible values for theelement?Each correct answer represents a complete solution. Choose all that apply. A. CONFIDENTIAL B. ALL C. NONE D. INTEGRAL Explanation: Show Answer

Read More

Which of the following methods will you use to accomplish the task?

You work as a Software Developer for UcTech Inc. You want to write a filter that will implement the Filterinterface. Which of the following methods will you use to accomplish the task?Each correct answer represents a complete solution. Choose all that apply. A. doPostFilter() B. doGetFilter() C. doFilter() D. init() E. service() Explanation: Show Answer

Read More

Which security mechanism will you use to accomplish the task?

You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchasebooks using their credit cards. You want to ensure that only the administrator can access the credit cardinformation sent by users. Which security mechanism will you use to accomplish the task? A. Confidentiality B. Authorization C. […]

Read More

Manager

You work as a Programmer for InfoTech Inc and develop the following two <security-constraint>declarations.<security-constraint><web-resource-collection><web-resource-name>Manager</web-resource-name><url-pattern>/acme/Manager/*</url-pattern><http-method>GET</http-method><http-method>POST</http-method></web-resource-collection><auth-constraint/></security-constraint><security-constraint><web-resource-collection><web-resource-name>Manager</web-resource-name><url-pattern>/acme/Manager/*</url-pattern><http-method>GET</http-method><http-method>POST</http-method></web-resource-collection><auth-constraint><role-name>Manager</role-name></auth-constraint></security-constraint> Which of the following statements is true about the <auth-constraint> in the code given above? A. Nobody is allowed to access the specified resources. B. Only Manager is allowed to access the specified resources. C. The first <security-constraint> element declaration is […]

Read More