Posts

Query Form

Loading...

Project Architecture's

Image
1.) Functional flow/ Architecture a.) Only for 6+/7+years b.) Explain the flow of process/business 2.) Technical Flow/Architecture a.) Upto 5+ years b.) Explain technologies /components that are involved in the project Servlet & JSP Project Architecture:- 1.)What is need of Business Deligate to convert VO class object to DTO class object ? a.) If Business Deligate is not there servlet component directly prepares DTO class object by receiving and translating form data and passes to service class, if service class excepts certain input in other format like numeric employee number as string employee number then we need to modify servlet component code i.e For the changes that happened in business tier service component we have to modify servlet component of presentation tier b.) If Business Deligate is taken then it gets original form data as VO class object having string inputs and converts VO class object to DTO class object to pass to service class c.) If serv

Java Mail API

Image
Java Mail API: -->DB software manages the data in the form of DB table cols -->WebServer manages and executes web application -->JNDI Registry manages objects -->Similarly mail server manages and executes Email Accounts and Email Messages        Java App---(jdbc api(java.sql.javax.sql,...))---->DW Software        Java App---(jndi api(javax.naming and its sub packages))--->JNDI registry             E.g:- rmi registry, Cos registry...        Java App--(java mail api(javax.mail,javax.activation ))-->Mail Server            E.g:- james server, Lotus Notes, Microsoft exchange server Mail Server Architecture:- 1.)SMTP=Simple Mail Transfer Protocol 2.)POP=Post Office Protocol 3.)IMAP=Internet Mail Access Protocol --> Incoming server  receives and manages email messages in the email accounts --> Outgoing server  sends the email messages from one account to another account -->The  pop3  enabled mail server sends the em

Security

Image
Security:- a.)Network security (Network admins will take of this by using firewalls) b.)Web application security (Programmers should take care of it) (1)Authentication (2)Authorization (3)Data integrity (4)Data privacy (1)Authentication:- -->Checking the identity of a user is called Authentication. It can be done by using username, passwords, thumbs, impressions, iris, face recognition and etc... (2)Authorization:- -->Checking the access permissions of a user to use various services that are there in the project comes under authorization E.g: To get into banking application every one should be authenticated, but to use loan module the user must be manager role user (3)Data Integrity:- -->Making sure that, the data sent over the network can't be tampered(modification( by using encryption techniques is called Data integrity (4)Data Privacy/Data Confidentiality:- -->Making sure that sensitive data like username, passwords are not visible and

AdvertisementRotator

Add Rotator App(AdvertisementRotator): 1.)Add should come as graphical hyper link 2.)Add should come randomly 3.)Add should be changed at regular intervals 4.)Follow mvc1 architecture (jsp with java class /java bean) AddRotatorApp |-->java resources      |-->src          |-->xyz.bean               |-->Rotator.java |-->webcontent      |-->addrotator.jsp      |-->1.png, 2.png, 3.png, 4.png, 5.png      |-->WEB-INF          |-->web.xml Rotator.java package xyz.bean; import java.util.Random; public class Rotator { int addNo;   private String images[] = { "1.png", "2.png", "3.png", "4.png", "5.png" };   private String links[] = { "http://www.raymond.in", "http://onlyvimal.co.in",      "https://www.peterengland.com", "http://www.siyaram.com", "https://www.ramrajcotton.in" };    public void nextAdd() {       Random rad = n