Michael Chang

Ranch Hand
+ Follow
since Jan 08, 2001
Merit badge: grant badges
For More
Cows and Likes
Cows
Total received
In last 30 days
0
Forums and Threads

Recent posts by Michael Chang

Thanks a lot for your comments, Amenda and Sanjay. It was really helpful. A question about sequence diagrams. In some use cases like "Prepare Itinerary", was it where you used more than one sequence diagrams per use case so you wouldn't have more than one starting point? I am not sure if I should and how to include all the user interactions in that use case in one sequence diagram.
Thanks a lot.
Michael
Wow,
I have to say that your friend is probably a genius if he didn't steal or copy the work from someone who has passed it before. It is hard to believe someone could pass with 95% with only a week's preparation even if he was real good and has had a lot of work expeience. Examination is different from real work. I have to say he is a pretty smart guy.
I am impressed.
Thanks for sharing your thoughts. Thanks.


Your message was edited since you quoted content from the actual assignment. Please read our policy on SCEA questions and refrain from discussing actual assignment issues.
Thank You!

[ August 13, 2003: Message edited by: Ajith Kallambella ]
In case of "Prepare Itinerary", should I break it into several small sequence diagrams or cover everything in one big sequence diagram? There are 3 or 4 interactions with online customers in that use case and I really don't know how I can put them all in one sequence diagram. But if I break it into small pieces, then some of them(like System returns search result back to customer) will be too simple to have its own sequence diagram. Any suggestions?
Thanks a lot.
Congratulations!
You missed that question about I18N too? :-) yeah, I would definitely argue with Sun if I could.
Congratulations!
Can you please share some more details? I am working on part two right now. Did you make your diagrams, especially class diagrams, really down to the details of methods and attributes? What about those things that can't be easily described or shown in class diagrams? For example, how did you describe that a class is talking to another class through XML-RPC over HTTPS? Merely through notes?
Thanks a lot.
Michael
that book is enough.
Michael
There was no question specific about JSP. It was mentioned only in a few common architecture questions with servlet, EJB, etc. So no need to study about custom tag.
Thanks for your congratulations. Here is some details.
Common Architecture 50%
I18N 50%
Legacy System 80%
Everything else 100%
I have no idea which question of I18N I answered wrong. There were only two questions in that section and I was pretty confident I got both right. Don't know which one I missed. And I don't know which question of legacy system I answered incorrectly either. There were probably 2 or 3 questions of common architecture that I was not sure about. I guess I got them all wrong. Some of them dealed with applet combined with CORBA. I don't know a whole lot details about CORBA. It might cost me a question. During my preparation, I have read EJB spec 1.1, UML distilled, design patterns, and some useful notes John and other java ranch friends provided. Oh, I have also played with the petstore application a little bit and read the blueprint. I have working experience with clustered environment, internet application development and JMS. The EJB questions were relatively simple. No questions about details. You only need to know the generic stuff. That's pretty much it.
Thanks again for all the help you guys have given me. I will start to work on 2 and 3 soon.
Michael
Just passed part I an hour ago. My score was 89%. I am quite disappointed and embarrassed. I had thought I would have scored over 90% easily after finishing it in 40 minutes. Anyway, as a contribution to the java ranch community, I will post more details this weekend.
Thanks.
Thanks for your replies. What I meant by "untrusted code loads untrusted code" is that untrusted code uses some other untrusted classes that need to be loaded by the classloader. So from your replies, I think the answer is yes. does anyone have a clear answer for the CORBA pass by value/reference question?
Thanks.
Can someone please clarify my doubts about the questions?
Thanks a lot.
Michael
Hi, Everybody
I have a few questions. Please help me out.
1. I know RMI can use http tunnelling to bypass firewall. Is there a way CORBA or EJB can bypass firewall through http tunneling? I guess not.
2. In CORBA, remote operation parameters can be passed by either value of reference. Correct?
3. In the default security environment, can untrusted code initiate any network connection? I guess yes because "listen" is permitted for any port 1024-.
4. In the default security environment, can untrusted code load another untrusted class? I think so.
Thank you very much.
Michael
In question 8 of the EJB exam, don't you think the correct answer is C? In the linked document, it says that an EJB is considered created after the data is inserted into the database. In the CMP entity bean, the data is NOT inserted into the database in ejbCreate. It is done by the container after ejbCreate finished. Any opinion is welcome.
Thanks.
It is true that usually you will need to go through the controller class to fill the data object. But your data object can also be set up by other objects or saved into session or passed around, a pure data object is a much cleaner and more efficient way than having the database stuff in it. Think of the data object being used by a jsp file or as a session information. Session data needs to be serializable in most of the environments. So you don't want to keep a lot of database information in it.