Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "310-110" Exam

Certified Mobile Application Developer for the Java 2 Platform, Micro Edition

 Question 1.
Which is false about untrusted MID let suites?

A. JTWI devices must treat all MIDP 2.0 suites as trusted.
B. JTWI devices must treat all MIDP 1.0 suites as untrusted.
C. Untrusted MID let suites may access protected APIs or functions if given explicit user 
     permission.
D. An untrusted MID let suite does not request permissions explicitly in the JAR manifest or the 
     application descriptor.

Answer: A

Question 2.
When using x.509 PKI, where must a MID let suite's security certificates be placed?

A. in lined in the JAD, using abased 64 encoding
B. In.cer files in the JAR,s META-INF directory
C. In lined in the JAR manifest, using a base64 encoding
D. In a user-defined subclass of Security Info in the JAR's META-INF directory

Answer: A

Question 3.
Given:
MID let Suite A
Public class Person
Public class Address
MID let Suite B
Public class Person

Which is true?

A. Person in MID let Suite B is allowed access to the Address class defined in MID let Suite A.
B. Person in MID let Suite B is restricted access to the Address class in MID let Suite A.
C. Person in MID let Suite B is NOT allowed access to the Address class defined in MID Let Suite 
    A.
D. Person in MID let Suite B is allowed access to address class in MID let Suite A based on the 
    protection domain.

Answer: C
 
Question 4.
Placed each code snippet where it belongs.

 

Answer: Pending, send your suggestions, comments or feedback at feedback@itcertkey.com 

Question 5.
Which is true regarding access of the manifest file in a MID let suite's JAR file?

A. The manifest file is hidden from MID lets and CANNOT be accessed.
B. The manifest file can be accessed by only by any one authorized MID let in every suite.
C. The manifest file can be accessed only by using MID let.get App Property ().
D. The manifest file can be accessed by any class using Class.get Resource As Stream ().

Answer: A

Question 6.
Which is true about the process of updated MID let suite in a JTWI-complaint device?

A. The RMS record stores of the updated MID let suite always lost.
B. An unsigned MID let suite must NOT be allowed to update a singed MID let suite.
C. A MID let suite CANNOT be updated with the same MID let suite from a different URL.
D. A MID let suite CANNOT be updated with another MID let suite that has a lower value for the 
    MID let-Version attribute.

Answer: B

Question 7.
Which two are true about Gauge? (Choose two.)

A. The current value of a Gauge CANNOT be set programmatically.
B. The visual appearance of a Gauge is determined by the device implementation.
C. You must specify both the initial and maximum values when creating a Gauge.
D. The range of values displayed by the implementation always matches the range of values 
     specified by the application.

Answer: B, C

Question 8.

Exhibit: *** MISSING ***

Which two are true assuming this method is in a MID let? (Choose two.)

A. The user can select more than one type o chocolate.
B. The Chocolate Prefers choice is never display to the user.
C. Compilation fails due to a problem with code related to event handing.
D. Anonymous inner classes must NOT be used as event handlers within a MID let.
E. An exception occurs at runtime due to problem related to the events handing code.
F. The text "you made a choice" is displayed immediately after the user makes a selection.

Answer: A, C

Question 9.
Given:
Date field df = new Date field ("Date", DATE_TIME);

Which requests the width of df to fill available screen space?

A. df.setLayout (Item.LAYOUT_FULL);
B. df.setLayout (Item.LAYOUT_RIGHT);
C. df.setLayout (Item.LAYOUT_EXPAND);
D. df.setLayout (Item.LAYOUT_MAXIMUM);

Answer: C

Question 10.
Given:
21. Text field tf = new Text field ("memo","",50, Text Field. ANY);
22. Date field df = new Date field ("Date", Date field. DATE_TIME);
23. From fm = new Form (" Form demo");
24. Command cm Count = new Command ("Word count", Command. ITEM, 1);
25. Command cm Exit = new Command ("Exit", Command. EXIT, 1);
26.
27. tf. add Command (cm Count);
28. fm. Append(df);
29. fm. Append(tf);
30. fm. Add Command (cm Exit);
31. fm. Set Command Listener (this);

Which is true?

A. Completion fails.
B. An exception is thrown at runtime.
C. The cm Count command is available only when tf is the active Item.
D. The cm Exit command is available only when tf is the active Item.
E. The cm Count and cm Exit commands is always available on fm, regardless of which Item is 
    active.

Answer: C

Question 11.
Place the API label (high-level or low-level) on the code snippet to indicate whether or not the code is from the high-level or low-level API. Assume that all variable names reflect the object type used in the code.

 


Answer: Pending, send your suggestions, comments or feedback at feedback@itcertkey.com

Question 12.
Given:
Font font = Font.getFont (
Font.FACE_SYSTEM,
Font.SYALE_BOLD | Fount.STYLE_ITALIC | Pont.STYLE_UNDERLINED,
Font.SIZE_MEDIUM);
If Font. STYLE_ITALIC is unavailable on the device, what is the result?

A. Compile time error occurs.
B. Runtime Exception occurs.
C. Device substitutes its closest substitute.
D. Illegal Argument Exception occurs.

Answer: C

Question 13.
What action can the device take when some Item objects on a Form do NOT fit when displayed?

A. display a runtime error
B. create a vertical scroll bar
C. create on additional screen
D. delete the extra Item objects

Answer: B

Question 14.
Given a MIP 2.0 device supports alpha blending, a MID let needs semi-transparent images of size 10x10, red, semi-transparent image, using only the MIDP 2.0 API?

A. use create Image () to create a mutable Image, then fill it with red pixels
B. use create RGB Image () to create an immutable Image from ARGB data with the desired 
    values
C. use create Image () to create a mutable image; first fill it with pixels, then ill it with red pixels
D. This is not possible. An Image with semi-transparency CANNOT be created at runtime. 

Answer: B

Question 15.
Given:
12. canvas. Repaint {x1,y1,w1,ht};
13. canvas. Repaint {x2,y2,w2,ht};
14. canvas. Service Repaints ();

Which two are true? (Choose two.)

A. Service Repaints () blocks waiting for paint () to return.
B. Paint () is always called twice, once or each repaint () request.
C. If the two regions specified in repaint () overlap, repaint () may attempt to paint the union of the 
    two areas.
D. Paint () is called three times, once for each repaint () and once for service Repaints ().

Answer: A, C


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 640-802 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "640-802" Exam

Cisco Certified Network Associate

 Question 1.
Both switches and hubs are being utilized within the ITCertKeys network. 

Which of the following is true regarding the use of switches and hubs for network connectivity in this network?

A. Switches take less time to process frames than hubs take
B. Hubs can filter frames
C. Switches do not forward broadcasts
D. Switches increase the number of collision domains in the network
E. Using hubs can increase the amount of bandwidth available to hosts
F. None of the above

Answer:  D

Explanation:
The biggest benefit of using switches instead of hubs in your internetwork is that each switch port is actually its own collision domain. (Conversely, a hub creates one large collision domain.) But even armed with a switch, you still can't break up broadcast domains. Neither switches nor bridges will do that. They'll typically simply forward all broadcasts instead. Switch creates the collision domain per port, so we can say switch increase the number of collision domains.

Question 2.
Which one of the following characteristics is true regarding the use of hubs and switches?

A. Hubs can have their ports be configured with VLANs
B. Using hubs is costly with regard to bandwidth availability.
C. Switches can not forward broadcasts.
D. Switches are more efficient than hubs in processing frames.
E. Switches increase the number of collision domains in the network.

Answer:  E

Explanation: 
Switches increases the number of collisions domains in the network. Switches that are configured with VLANs will reduce the size of the collision domains by increasing the number of collision domains in a network, but making them smaller than that of one big, flat network.

Incorrect Answers:
A. Switches are capable of VLAN configurations, but hubs are not.
B. Hubs are generally the least costly method possible to connect multiple devices together in a 
    network.
C. Switches forward broadcasts and multicasts, by default, to all ports within the same VLAN. 
    Only routers block all broadcast traffic by default.
D. Switches and hubs can be equally efficient in processing frames, in theory. In practice, 
    switches are generally more efficient as they usually have more CPU and memory allocated to 
    them, and are generally much more expensive than a simple hub.

Question 3.
When comparing and contrasting the similarities and differences between bridges and switches, which of the following are valid statements? Choose all the valid answer choices)

A. Bridges are faster than switches because they have fewer ports.
B. A switch is a multiport bridge,
C. Bridges and switches learn MAC addresses by examining the source MAC address of each 
    frame received.
D. A bridge will forward a broadcast but a switch will not.
E. Bridges and switches increase the size of a collision domain.
F. None of the above statements are true.

Answer:  B, C

Explanation:
Both bridges and switches build the bridge table by listening to incoming frames and examining the source MAC address in the frame. Switches are multiport bridges that allow you to create multiple broadcast domains. Each broadcast domain is like a distinct virtual bridge within a switch.

Incorrect Answers:
A. Switches are generally faster than bridges. Bridges also do not necessarily have fewer ports 
    than switches.
D. Both bridges and switches will forward broadcast and multicast traffic, assuming that the traffic 
    remains in the same VLAN.
E. The use of VLANs in a switch can decrease the size of the collision domain, by creating 
    additional, smaller collision domains.

Question 4.
Which of the following correctly describe the various functions and virtues of a router? (Select all valid answer choices)

A. Packet switching
B. Collision prevention on a LAN segment.
C. Packet filtering
D. Broadcast domain enlargement
E. Broadcast forwarding
F. Internetwork communication
G. None of the above

Answer:  A, C, F

Explanation:
The main function of a router is to connect different, separated networks together. In doing so, switching packets from one network to another is a primary function, along with providing for communication between networks. As an additional feature, routers are capable of providing filtering on a network address and application port level, so choice C is also correct.

Incorrect Answers:
B. Routers can indeed be used to segment a network separate a collision domain, since routers 
    do not forward LAN broadcasts and multicasts to other interfaces. However, routers alone can 
    not prevent all collisions from occurring on any given LAN segment.
D. Routers actually segment LANs into smaller broadcast domains.
E. Routers do not forward broadcast and multicast traffic out the additional interfaces by default. 
    Unless bridging or IP helpers are configured on the router, LAN broadcasts are blocked at the 
    router level.

Question 5.
The LAN needs are expanding at the ITCertKeysCorporate office, which is quickly growing. You are instructed to enlarge the area covered by a single LAN segment on the ITCertKeys network.

Which of the following are layer 1 devices that you can use? (Choose all that apply.)

A. A switch
B. A router
C. A network adapter card
D. A hub
E. A repeater

Answer:  D, E

Explanation:
A hub simply repeats the electrical signal and makes no attempt to interpret the electrical signal (layer 1) as a LAN frame (Layer 2). So, a hub actually performs OSI layer 1 functions, repeating an electrical signal, whereas a switch performs OSI layer 2 functions, actually interpreting Ethernet header information, particularly addresses, to make forwarding decisions. Hubs can be used to increase the number of stations that can be supported on a LAN. Because the repeater does not interpret what the bits mean, but does examine and generate electrical signals, a repeater is considered to operate at Layer 1. Repeaters can be used to physically extend the LAN to greater distances.

Question 6.
Cisco is the leader in the router market space. 

What basic functions do their routers perform in a network? (Choose two)

A. The microsegmentation of broadcast domains
B. Path selection
C. Packet switching
D. Bridging between LAN segments
E. Access layer security
F. VLAN membership assignment
G. Application optimization

Answer:  B, C

Explanation:
The primary functions of a router are: Packet Switching and Path Selection. It is the routers job to determine the best method for delivering the data, and switching that data as quickly as possible.

Question 7.
Both bridges are switches are being used throughout the ITCertKeys LAN. 

Which of the following statements are true regarding bridges and switches in this network? (Choose 3)

A. Switches are primarily software based while bridges are hardware based.
B. Switches usually have a higher number of ports than most bridges.
C. Bridges are frequently faster than switches.
D. Bridges define broadcast domains while switches define collision domains.
E. Both bridges and switches forward Layer 2 broadcasts.
F. Both bridges and switches make forwarding decisions based on Layer 2 addresses.

Answer:  B, E, F

Question 8.
As a network administrator, you will need to decide on the appropriate network devices to use. 

Which of the following correctly describes the roles of devices in a WAN? (Choose three)

A. A CSU/DSU terminates a digital local loop.
B. A router is commonly considered a DCE device.
C. A modem terminates an analog local loop.
D. A router is commonly considered a DTE device.
E. A modem terminates a digital local loop.
F. A CSU/DSU terminates an analog local loop.
G. A modem is used to terminate a T1

Answer:  A, C, D

Explanation:
Layer 2 switching is considered hardware-based bridging because it uses specialized hardware called an application-specific integrated circuit (ASIC). ASICs can run up to gigabit speeds with very low latency rates. Switches usually have higher port number then bridge. Generally bridges have two ports. Both operates on Data link layer.

Question 9.
The ITCertKeys network administrator needs to determine what LAN devices to install on the ITCertKeys network. 

What are two advantages of using Layer 2 Ethernet switches over hubs? (Choose two)

A. Allowing simultaneous frame transmissions
B. Increasing the size of broadcast domains
C. Increasing the maximum length of UTP cabling between devices
D. Filtering frames based on MAC addresses
E. Decreasing the number of collision domains

Answer:  A, D

Explanation:
A: A half duplex connection is where only one device can send or receive at a time. A full duplex connection is where both devices can send and receive at the same time. Thus, if you have a 100Mb half-duplex connection, only sending at 100Mb OR receiving at 100Mb can happen at the same time. If you have a 100Mb full duplex connection, you can effectively get 200Mb out of the link because you could be sending 100Mb and receiving 100Mb at the same time.
D: Switches are capable of filtering frames based on any Layer 2 fields. For example, a switch can be programmed to reject (not forward) all frames sourced from a particular network. Because link layer information often includes a reference to an upper-layer protocol, switches usually can filter on this parameter. Furthermore, filters can be helpful in dealing with unnecessary broadcast and multicast packets.

Question 10.
CDP is being used throughout the ITCertKeys network. 

What are two reasons why the ITCertKeys network administrator would use CDP? (Choose two)

A. To determine the status of network services on a remote device
B. To obtain the IP Address of a connected device in order to telnet to the device
C. To verify the type of cable interconnecting two devices
D. To verify Layer 2 connectivity between two devices when Layer 3 fails
E. To obtain VLAN information from directly connected switches
F. To determine the status of the routing protocols between directly connected routers
G. To support automatic network failover during outages

Answer:  B, D

Explanation:
Cisco Discovery Protocol (CDP) is a proprietary protocol designed by Cisco to help administrators collect information about both locally attached and remote devices. By using CDP, you can gather hardware and protocol information about neighbor devices, which is useful info for troubleshooting and documenting the network. 
You can use:
Show cdp neighbor
Show cdp neighbor details
Commands to gather the information of connected neighbors.


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.