Subscribe

RSS Feed (xml)

Powered By

Skin Design:
Free Blogger Skins

Powered by Blogger

Monday, April 14, 2008

Java Architect Interview Questions 82

1. What do you understand by UML. How to interpret UML diagrams?
2. State the effect of encapsulation, inheritance, and use of interfaces on architectural characteristics?
3. Differentiate between 2 tier, 3 tier and n-tier architectures.
4. How do the following characteristics scalability,performance, high availabilty behave based on the above architecture selected.
5. In what all ways (methods/concepts) can we achieve integration with legacy/n-n-legacy applications using JAVA technologies.
6. List the required classes/interfaces that must be provided for an EJB technology.
7. Distinguish stateful and stateless Session beans.
8. Distinguish Session and Entity beans.
9. Recognize appropriate uses for Entity, Stateful Session, and Stateless Session beans.
10. State the transactional behavior in a given scenario for an enterprise bean method with a specified transactional deployment descriptor.
11.Given a requirement specification detailing security and flexibility needs, identify architectures that would fulfill those requirements.
12. Identify costs and benefits of using an intermediate data-access object between an entity bean and the data resource.
13. State the benefits of bean pooling in an EJB container.
14. State the benefits of Passivation in an EJB container.
15. State the benefit of monitoring of resources in an EJB container.
16. Explain how the EJB container does lifecycle management and has the capability to increase scalability.
17. Given a scenario description, distinguish appropriate from inappropriate protocols to implement that scenario.
18. Identify a protocol, given a list of some of its features, where the protocol is one of the following: HTTP, HTTPS, IIOP, JRMP.
19. Select from a list, common firewall features that might interfere with the normal operation of a given protocol.
20. State the benefits of using design patterns.
21. State the name of a design pattern given the UML diagram and/or a brief description of the pattern’s functionality.
22. Select from a list benefits of a specified design pattern.
23. Identify the design pattern associated with a specified J2EE feature.
24. Identify scenarios that are appropriate to implementation using messaging, EJB, or both.
25. List benefits of synchronous and asynchronous messaging.
26. Select scenarios from a list that are appropriate to implementation using synchronous and asynchronous messaging.
27. State three aspects of any application that might need to be varied or customized in different deployment locales.
28. Match the following features of the Java 2 platform with descriptions of their functionality, purpose or typical uses: Properties, Locale, ResourceBundle, Unicode, java.text package, 29. InputStreamReader and OutputStreamWriter.
30. Select from a list security restrictions that Java 2 environments normally impose on applets running in a browser.
31. Given an architectural system specification, identify appropriate locations for implementation of specified security features, and select suitable technologies for implementation of those features.

No comments:

Archives