aspose file tools*
The moose likes Web Component Certification (SCWCD/OCPJWCD) and the fly likes i dont agree with tgis on Design patterns Big Moose Saloon
  Search | Java FAQ | Recent Topics | Flagged Topics | Hot Topics | Zero Replies
Register / Login


Win a copy of Spring in Action this week in the Spring forum!
JavaRanch » Java Forums » Certification » Web Component Certification (SCWCD/OCPJWCD)
Bookmark "i dont agree with tgis on Design patterns" Watch "i dont agree with tgis on Design patterns" New topic
Author

i dont agree with tgis on Design patterns

Niranjan Deshpande
Ranch Hand

Joined: Oct 16, 2005
Posts: 1277
the are questions from Whozlabs Design Patterns -

Which of the following can be contorlled centrally by MVC ?

A. database functionlaity
B. security
C. loggin
D. screen flow
E. accessing remote component

a model holds the businees logic and data base access thing. so MVC does waht is said in A, but it uses the model component to do so. So A is correct

E is incorrect because MVC is a presentaion layer pattern and has nothing to with remote access.

the POINT is option like SECURITY and LOGGING are 'NOT AT ALL RELATED TO DESIGN PATTERNS' and must never appear here. we use the J2EE features to imlement sevurity/logging, and design patterns are never related to these issues in any way. so as per me -
only A and D are correct. but whizlabs tells to select 3 options and they are B,D,C

Another question on similar lines -

Whic hare advantages of Front Controller ?

A. improves security mangeability
B. centralizes control
C. enables seperation between presentation and web tier services
D. reduces networking calls involved and thus increases performance
E. improves reusability

my answers wer - B,C,E
whizlabs says - B,A,E

My arguement against E - security management is not a design pattern issue
its rather a J2EE spec issue and design patterns have nothing to do with it
and as J2EE says- we never code security in the source files, rather we deslare it in web.xml

i agree that C is wrong as Front Controller is a presentaion tier pattern

i expect a healthy debate on this -

security management is not a design pattern issue
its rather a J2EE spec issue and design patterns have nothing to do with it
and as J2EE says- we never code security in the source files, rather we deslare it in web.xml


like SECURITY and LOGGING are 'NOT AT ALL RELATED TO DESIGN PATTERNS' and must never appear here. we use the J2EE features to imlement sevurity/logging, and design patterns are never related to these issues in any way

thanks in advance !


SCJP 1.4 - 95% [ My Story ] - SCWCD 1.4 - 91% [ My Story ]
Performance is a compulsion, not a option, if my existence is to be justified.
Boobalan Pillai
Greenhorn

Joined: Nov 01, 2006
Posts: 9
Hi,

I 100% agree with your answer...

security management is not a design pattern issue
its rather a J2EE spec issue and design patterns have nothing to do with it
and as J2EE says- we never code security in the source files, rather we deslare it in web.xml

like SECURITY and LOGGING are 'NOT AT ALL RELATED TO DESIGN PATTERNS' and must never appear here. we use the J2EE features to imlement sevurity/logging, and design patterns are never related to these issues in any way


Regards
Bala
Marc Peabody
pie sneak
Sheriff

Joined: Feb 05, 2003
Posts: 4727

I mostly disagree.

Security can be done programmatically. Also, it's not necessarily meaning that a design pattern ever implements security or logging, but they may create a central processing that could make security and logging more maintainable.


A good workman is known by his tools.
Niranjan Deshpande
Ranch Hand

Joined: Oct 16, 2005
Posts: 1277
hope such stupid questions are not on the exam

but still these questions teach a lot

hoping to get more replies on it !
Boobalan Pillai
Greenhorn

Joined: Nov 01, 2006
Posts: 9
Hi,

There is no design pattern for security,logging..but I hope we can achieve this with Filter chaining design pattern...
Ashley Mittal
Greenhorn

Joined: May 17, 2006
Posts: 3
A book on J2EE Security pattern:
Core J2EE Security pattern
- By Sun microsystems


Ashish Mittal<br />No Fears, No Limits, No Substitutions
Ashley Mittal
Greenhorn

Joined: May 17, 2006
Posts: 3
Have a look
http://www.coresecuritypatterns.com/
 
I agree. Here's the link: http://aspose.com/file-tools
 
subject: i dont agree with tgis on Design patterns