Netwrok appsdevelopment midterm 1
docx
keyboard_arrow_up
School
Georgia State University *
*We aren’t endorsed by this school
Course
6640
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
52
Uploaded by johndoejohndoe975
o
Component Reuse
- a component built to perform a simple task for one
application may be compatible and reused when needed in another
application.
o
Modularity
(Plug-and-play) - as long as the interface between
components is honored, then it may be possible to remove a
component and replace it with another similar component, perhaps, for
example, to upgrade the original component.
o
Scalability
- Distributed systems are inherently scalable as they work
across different machines and scale horizontally. This means a user can
add another machine to handle the increasing workload instead of
having to update a single system over and over again.
The major disadvantage is that distributed applications can quickly become
very
complex
.
o
HTML - Hypertext Markup Language
- HTML is used to set up the
structure of your web pages. Here, structure refers to the naming of
the elements of the page and defining how the elements are related to
one another.
o
CSS - Cascading Style Sheets
- CSS is used apply style to the HTML
elements. It is what makes the page look good and usable for us
humans.
o
JS - JavaScript
- a programming language that is most often executed
from within the browser application. It is what we use to make the
static file that is shown in the bowser appear dynamic.
Web services instead share business logic, data and processes through a
programmatic interface across a network. The applications interface, not the users.
Amazon Web Services (AWS) platform, a suite of enterprise-oriented services that
provide remotely provisioned storage, computing resources, and business
functionality.
Network Cloud" or "Cloud - It referred to an abstraction layer derived in the delivery
methods of data across heterogeneous public and semi-public networks that were
primarily packet-switched, although cellular networks used the "Cloud"
Cloud - transmission of data from one end-point (local network) to the "Cloud" (wide
area network) and then further decomposed to another intended end-point
Elastic Compute Cloud (EC2) services that enabled organizations to "lease"
computing capacity and processing power to run their enterprise applications.
a style of computing in which scalable and elastic IT-enabled capabilities are
delivered as a service to external customers using Internet technologies.
"...a standardized IT capability (services, software, or infrastructure) delivered via
Internet technologies in a pay-per-use, self-service way."
scalability in relation to the ability to scale vertically and not just to enormous
proportions.
"Cloud computing is a model for enabling ubiquitous, convenient, on-demand
network access to a shared pool of configurable computing resources (e.g.,
networks, servers, storage, applications, and services) that can be rapidly
provisioned and released with minimal management effort or service provider
interaction. This cloud model is composed of five essential characteristics, three
service models, and four deployment models.
Capacity planning is the process of determining and fulfilling future demands of an
organization's IT resources, products, and services.
Capacity represents the maximum amount of work that an IT resource is capable of
delivering in a given period of time. Capacity planning is focused on minimizing this
discrepancy, inefficient (over-provisioning) or unable to fulfill user needs (under-
provisioning).
o
Lead Strategy
- adding capacity to an IT resource in anticipation of
demand
o
Lag Strategy
- adding capacity when the IT resource reaches its full
capacity
o
Match Strategy
- adding IT resource capacity in small increments, as
demand increases
Much of this required investment is funneled into infrastructure expansion because
the usage potential of a given automation solution will always be limited by the
processing power of its underlying infrastructure.
Two costs need to be accounted for: (1) the cost of acquiring new infrastructure, and
(2) the cost of its ongoing ownership.
Operational overhead represents a considerable share of IT budgets, often
exceeding up-front investment costs.
o
technical personnel required to keep the environment operational
o
upgrades and patches that introduce additional testing and
deployment cycles
o
utility bills and capital expense investments for power and cooling
o
security and access control measures that need to be maintained and
enforced to protect infrastructure resources
o
administrative and accounts staff that may be required to keep track of
licenses and support arrangements
Due to a lack of reliability controls within the infrastructure, responsiveness to
consumer or customer requirements may be reduced to a point whereby a business'
overall continuity is threatened.
up-front investments and infrastructure ownership costs that are required to enable
new or expanded business automation solutions may themselves be prohibitive
enough for a business to settle for IT infrastructure of less-than-ideal quality,
thereby decreasing its ability to meet real-world requirements.
inhibit an organization from keeping up with market demands, competitive
pressures, and its own strategic business goals.
A
cloud
refers to a distinct IT environment that is designed for the purpose of
remotely provisioning scalable and measured IT resources.
Whereas the Internet provides open access to many Web-based IT resources,
a cloud is typically privately owned and offers access to IT resources that is
metered.
An
IT resource
is a physical or virtual IT-related artifact that can be either
software based, such as a virtual server or a custom software program, or
hardware-based, such as a physical server or a network device
"on-premise" is another way of stating "on the premises of a controlled IT
environment that is not cloud-based." This term is used to qualify an IT
resource as an alternative to "cloud-based." An IT resource that is on-premise
cannot be cloud-based, and vice-versa.
o
An on-premise IT resource can access and interact with a cloud-based
IT resource.
o
An on-premise IT resource can be moved to a cloud, thereby changing
it to a cloud-based IT resource.
o
Redundant deployments of an IT resource can exist in both on-premise
and cloud-based environments.
Scaling represents the ability of the IT resource to handle increased or decreased
usage demands.
o
Horizontal Scaling
- scaling out and scaling in
o
Vertical Scaling
- scaling up and scaling down
The horizontal allocation of resources is referred to as
scaling
out and the horizontal
releasing of resources is referred to as
scaling in
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
When an existing IT resource is replaced by another with higher or lower
capacity,
vertical scaling
Vertical scaling is less common in cloud environments due to the downtime
required while the replacement is taking place.
Cloud Service -
any IT resource that is made remotely accessible via a cloud.
The
cloud service consumer
is a temporary runtime role assumed by a software
program when it accesses a cloud service.
o
On-demand access to pay-as-you-go computing resources on a short-term basis (such as
processors by the hour), and the ability to release these computing resources when they
are no longer needed.
o
The perception of having unlimited computing resources that are available on demand,
thereby reducing the need to prepare for provisioning.
o
The ability to add or remove IT resources at a fine-grained level, such as modifying
available storage disk space by single gigabyte increments.
o
Abstraction of the infrastructure so applications are not locked into devices or locations
and can be easily moved if needed.
over-provisioning (under-utilization) and under-provisioning (over-utilization)
increased scalability
clouds can instantly and dynamically allocate IT resources to cloud consumers, on-demand or via
the cloud consumer's direct configuration
reduced investments and proportional costs
increased availability and reliability
limiting its usage and revenue generating potential. Runtime failures that are not immediately
corrected can have a more significant impact during high-volume usage periods.
o
An IT resource with increased availability is accessible for longer periods of time (for
example, 22 hours out of a 24 hour day). Cloud providers generally offer "resilient" IT
resources for which they are able to guarantee high levels of availability.
o
An IT resource with increased reliability is able to better avoid and recover from exception
conditions. The modular architecture of cloud environments provides extensive failover
support that increases reliability.
Increased Security Vulnerabilities
responsibility over data security becomes shared with the cloud provider
Reduced operational governance control
Cloud consumers are usually allotted a level of governance control that is lower
than that over on-premise IT resources.
Limited portability between cloud providers
Due to a lack of established industry standards within the cloud computing industry,
public clouds are commonly proprietary to various extents
Portability is a measure used to determine the impact of moving cloud consumer IT
resources and data between clouds
MultiRegional Regulatory and Legal Issues
Third-party cloud providers will frequently establish data centers in affordable or
convenient geographical locations. Cloud consumers will often not be aware of the
physical location of their IT resources and data when hosted by public clouds.
Infrastructure as service – IAAS
Instant computing infrastructure, provisioned and managed over the Internet.
Quickly scale up and down with demand, and pay only for what you use.
{SAAS[PAAS(IAAS)]}
Typical things businesses do with IaaS include:
Test and development.
Teams can quickly set up and dismantle test and
development environments, bringing new applications to market faster. IaaS
makes it quick and economical to scale up dev-test environments up and
down.
Website hosting.
Running websites using IaaS can be less expensive than
traditional web hosting.
Storage, backup, and recovery.
Organizations avoid the capital outlay for
storage and complexity of storage management, which typically requires a
skilled staff to manage data and meet legal and compliance requirements.
IaaS is useful for handling unpredictable demand and steadily growing
storage needs. It can also simplify planning and management of backup and
recovery systems.
Web apps.
IaaS provides all the infrastructure to support web apps, including
storage, web and application servers, and networking resources.
Organizations can quickly deploy web apps on IaaS and easily scale
infrastructure up and down when demand for the apps is unpredictable.
High-performance computing.
High-performance computing (HPC) on
supercomputers, computer grids, or computer clusters helps solve complex
problems involving millions of variables or calculations. Examples include
earthquake and protein folding simulations, climate and weather predictions,
financial modeling, and evaluating product designs.
Big data analysis.
Big data is a popular term for massive data sets that
contain potentially valuable patterns, trends, and associations. Mining data
sets to locate or tease out these hidden patterns requires a huge amount of
processing power, which IaaS economically provides.
ADVANTAGES OF IAAS
Eliminates capital expense and reduces ongoing cost.
IaaS sidesteps the
upfront expense of setting up and managing an on-site datacenter, making it
an economical option for start-ups and businesses testing new ideas.
Improves business continuity and disaster recovery.
Achieving high availability,
business continuity, and disaster recovery is expensive, since it requires a
significant amount of technology and staff. But with the right service level
agreement (SLA) in place, IaaS can reduce this cost and access applications
and data as usual during a disaster or outage.
Innovate rapidly.
As soon as you’ve decided to launch a new product or
initiative, the necessary computing infrastructure can be ready in minutes or
hours, rather than the days or weeks—and sometimes months—it could take
to set up internally.
Respond quicker to shifting business conditions.
IaaS enables you to quickly
scale up resources to accommodate spikes in demand for your application—
during the holidays, for example—then scale resources back down again
when activity decreases to save money.
Focus on your core business.
IaaS frees up your team to focus on your
organization’s core business rather than on IT infrastructure.
Increase stability, reliability, and supportability.
With IaaS there’s no need to
maintain and upgrade software and hardware or troubleshoot equipment
problems. With the appropriate agreement in place, the service provider
assures that your infrastructure is reliable and meets SLAs.
Better security.
With the appropriate service agreement, a cloud service
provider can provide security for your applications and data that may be
better than what you can attain in-house.
Gets new apps to users faster.
Because you don’t need to first set up the
infrastructure before you can develop and deliver apps, you can get them to
users faster with IaaS.
PAAS -
complete development and deployment environment in the cloud, with
resources that enable you to deliver everything from simple cloud-based apps to
sophisticated, cloud-enabled enterprise applications.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
PaaS is designed to support the complete web application lifecycle: building,
testing, deploying, managing, and updating.
PaaS allows you to avoid the expense and complexity of buying and
managing software licenses, the underlying application infrastructure and
middleware or the development tools and other resources
COMMON SCENARIOS
Organizations typically use PaaS for these scenarios:
Development framework.
PaaS provides a framework that developers can build
upon to develop or customize cloud-based applications. Similar to the way
you create an Excel macro, PaaS lets developers create applications using
built-in software components. Cloud features such as scalability, high-
availability, and multi-tenant capability are included, reducing the amount of
coding that developers must do.
Analytics or business intelligence.
Tools provided as a service with PaaS allow
organizations to analyze and mine their data, finding insights and patterns
and predicting outcomes to improve forecasting, product design decisions,
investment returns, and other business decisions.
Additional services.
PaaS providers may offer other services that enhance
applications, such as workflow, directory, security, and scheduling.
ADVANTAGES OF PAAS
By delivering infrastructure as a service, PaaS offers the same advantages as
IaaS. But its additional features—middleware, development tools, and other
business tools—give you more advantages:
Cut coding time.
PaaS development tools can cut the time it takes to code
new apps with pre-coded application components built into the platform,
such as workflow, directory services, security features, search, and so on.
Add development capabilities without adding staff.
Platform as a Service
components can give your development team new capabilities without your
needing to add staff having the required skills.
Develop for multiple platforms—including mobile—more easily.
Some service
providers give you development options for multiple platforms, such as
computers, mobile devices, and browsers making cross-platform apps
quicker and easier to develop.
Use sophisticated tools affordably.
A pay-as-you-go model makes it possible
for individuals or organizations to use sophisticated development software
and business intelligence and analytics tools that they could not afford to
purchase outright.
Support geographically distributed development teams.
Because the
development environment is accessed over the Internet, development teams
can work together on projects even when team members are in remote
locations.
Efficiently manage the application lifecycle.
PaaS provides all of the capabilities
that you need to support the complete web application lifecycle: building,
testing, deploying, managing, and updating within the same integrated
environment.
SAAS -
allows users to connect to and use cloud-based apps over the Internet
SaaS provides a complete software solution that you purchase on a pay-as-you-go
basis from a
cloud service provider.
The service provider manages the hardware and software, and with the appropriate
service agreement, will ensure the availability and the security of the app and your
data as well.
ADVANTAGES OF SAAS
Gain access to sophisticated applications.
To provide SaaS apps to users, you
don’t need to purchase, install, update, or maintain any hardware,
middleware, or software. SaaS makes even sophisticated enterprise
applications, such as ERP and CRM, affordable for organizations that lack the
resources to buy, deploy, and manage the required infrastructure and
software themselves.
Pay only for what you use.
You also save money because the SaaS service
automatically scales up and down according to the level of usage.
Use free client software.
Users can run most SaaS apps directly from their web
browser without needing to download and install any software, although
some apps require plugins. This means that you don’t need to purchase and
install special software for your users.
Mobilize your workforce easily.
SaaS makes it easy to “mobilize” your
workforce because users can access SaaS apps and data from any Internet-
connected computer or mobile device. You don’t need to worry about
developing apps to run on different types of computers and devices because
the service provider has already done so. In addition, you don’t need to bring
special expertise onboard to manage the security issues inherent in mobile
computing. A carefully chosen service provider will ensure the security of
your data, regardless of the type of device consuming it.
Access app data from anywhere.
With data stored in the cloud, users can
access their information from any Internet-connected computer or mobile
device. And when app data is stored in the cloud, no data is lost if a user’s
computer or device fails.
GOALS AND BENEFITS OF CLOUD COMPUTING
Reduced Investments and Proportional Costs
proportional costs
- A cloud's Measured Usage characteristic represents a feature-set that allows
measured operational expenditures (directly related to business performance) to replace
anticipated capital expenditures
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Opportunities to decrease costs are derived from the deployment and operation of large-scale
data centers by major cloud providers; real estate, IT professionals, and network bandwidth can
be obtained at lower costs, resulting in both capital and operational savings.
Pooled IT resources are made available to and shared by multiple cloud consumers, resulting in
increased or even maximum possible utilization.
IaaS billing can be a problem for some businesses. Cloud billing is extremely
granular, and it is broken out to reflect the precise usage of services.
sticker shock -- or finding costs to be higher than expected
AWS OVERVIEW
HIGH AVAILABILITY THROUGH MULTIPLE AVAILABILITY
ZONES
IMPROVING CONTINUITY WITH REPLICATION BETWEEN
REGIONS
MEETING COMPLIANCE AND DATA RESIDENCY
REQUIREMENTS
GEOGRAPHIC EXPANSION
Computer Clusters are groups of similar machines with close interconnections which often come
with special standardized hardware racks called "blades".
As an organization connects all the
blades together, they get more computing power.
As clusters grow, what results is a dedicated Data Center.
A Data Center is a football-field sized
building completely dedicated to connecting computer clusters to the Internet or private
corporate network.
EC2 -
allowing users to rent
virtual computers
on which to run their own computer applications.
EC2 encourages scalable deployment of applications by providing a
web service
through which a
user can boot an
Amazon Machine Image
(AMI) to configure a
virtual machine, which Amazon
calls an "instance", containing any software desired.
EC2 provides users with control over the geographical location of instances that allows
for
latency
optimization and high levels of
redundancy.
Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that
you actually use. Amazon EC2 provides developers the tools to build failure resilient applications
and isolate them from common failure scenarios.
ELASTIC WEB-SCALE COMPUTING
Amazon EC2 enables you to increase or decrease capacity within minutes, not hours or days.
COMPLETELY CONTROLLED
You have complete control of your instances including root access and the ability to interact with
them as you would any machine.
FLEXIBLE CLOUD HOSTING SERVICES
You have the choice of multiple instance types, operating systems, and software packages.
Amazon EC2 allows you to select a configuration of memory
INTEGRATED
Amazon EC2 is integrated with most AWS services such as Amazon Simple Storage Service
(Amazon S3), Amazon Relational Database Service (Amazon RDS), and Amazon Virtual Private
Cloud (Amazon VPC)
RELIABLE
Amazon EC2 offers a highly reliable environment where replacement instances can be rapidly and
predictably commissioned.
SECURE
Cloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data
center and network architecture built to meet the requirements of the most security-sensitive
organizations.
INEXPENSIVE
Amazon EC2 passes on to you the financial benefits of Amazon’s scale.
EASY TO START
AWS S3 -
Amazon Simple Storage Service (Amazon S3) is storage for the Internet.
You can use Amazon S3 to store and retrieve any amount of data at any time, from anywhere on
the web.
Creating buckets – Create and name a bucket that stores data. Buckets are the
fundamental container in Amazon S3 for data storage.
Storing data – Store an infinite amount of data in a bucket. Upload as many objects as you
like into an Amazon S3 bucket. Each object can contain up to 5 TB of data. Each object is stored
and retrieved using a unique developer-assigned key.
Downloading data – Download your data or enable others to do so. Download your data
anytime you like, or allow others to do the same.
Permissions – Grant or deny access to others who want to upload or download data into
your Amazon S3 bucket. Grant upload and download permissions to three types of users.
Authentication mechanisms can help keep data secure from unauthorized access.
Standard interfaces – Use standards-based REST and SOAP interfaces designed to work
with any internet-development toolkit.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
A bucket is a container for objects stored in Amazon S3. Every object is contained in a bucket. For
example, if the object named
photos/puppy.jpg
is stored in the
johnsmith
bucket
You can have one or more buckets. For each bucket, you can control access to it (who can create,
delete, and list objects in the bucket), view access logs for it and its objects, and choose the
geographical region where Amazon S3 will store the bucket and its contents.
Objects are the fundamental entities stored in Amazon S3. Objects consist of object data and
metadata. The data portion is opaque to Amazon S3.
A key is the unique identifier for an object within a bucket. Every object in a bucket has exactly
one key.
You can choose the geographical AWS Region where Amazon S3 will store the buckets that you
create. You might choose a Region to optimize latency, minimize costs, or address regulatory
requirements.
Eventually Consistent Read
Co
Stale reads possible
No stale reads
Lowest read latency
Potential higher read latency
Highest read throughput
Potential lower read throughput
CAAS – Computer As A Service.
Synonymous with cloud computing.
Others define it more specifically as a subset of
Platform-as-a-Service (Paas). In this regard, CaaS, refers to the components
of the platform that provide computer processing.
WHAT IS ELASTIC BEANSTALK
With Elastic Beanstalk, you can quickly deploy and manage applications in the AWS Cloud without
having to learn about the infrastructure that runs those applications. Elastic Beanstalk reduces
management complexity without restricting choice or control. You simply upload your application,
and Elastic Beanstalk automatically handles the details of capacity provisioning, load balancing,
scaling, and application health monitoring.
Elastic Beanstalk supports applications developed in Go, Java, .NET, Node.js, PHP, Python, and
Ruby.
A. Want data to persist 1. Manually keeping up with data to make it persist for as long as we
need it to 2. http does not persist data automatically, so we have have to make it B. Cookie state
1. Where is it stored? Client side
MODULE 6
We all know that
HTTP
is a stateless protocol. All requests and responses are independent. But
sometimes you need to keep track of client's activity across multiple requests. For eg. When a
User logs into your website, not matter on which web page he visits after logging in, his
credentials will be with the server, until he logs out. So this is managed by creating a session.
Data persistence- refers to the time over which data is valid
State- In OOP, an objects state includes its usual properties plus the current values
of it’s fields.
State Management – actively managing the state of our application objects,
especially when not automatically managed by the server.
Servlet initialization parameters – used to initialize servlet objects
Request attributes – available within one request/response cycle
Session attributes – available throughout session
Cookies – available over multiple sessions
Server side storage – database, files, etc. – very long term
SP Implicit Objects are also called
pre-defined variables
.
Request -
javax.servlet.http.HttpServletRequest
Each time a client requests a page the JSP engine creates a new object to represent that
request.
This is the
HttpServletRequest
object associated with the request.
Response –
The response object is an instance of
a
javax.servlet.http.HttpServletResponse
object
creates an object to represent the response to the client.
This is the
HttpServletResponse
object associated with the response to the client.
Out –
The out implicit object is an instance of a
javax.servlet.jsp.JspWriter
Unlike the PrintWriter object, JspWriter throws
IOExceptions
.
used to send content in a response.
out.print(dataType dt) -
Print a data type value
out.println(dataType dt) -
Print a data type value then terminate the line with new line
character.
out.flush() -
Flush the stream.
This is the
PrintWriter
object used to send output to the client.
Session –
The session object is an instance of
javax.servlet.http.HttpSession
and behaves
exactly the same way that session objects behave under Java Servlets.
The session object is used to track client session between client requests
This is the
HttpSession
object associated with the request.
Application –
The application object is direct wrapper around the
ServletContext
object for the
generated Servlet and in reality an instance of a
javax.servlet.ServletContext
object.
This object is created when the JSP page is initialized and will be removed when the JSP page
is removed by the
jspDestroy()
method.
This is the
ServletContext
object associated with the application context.
Config –
The config object is an instantiation of
javax.servlet.ServletConfig
and is a
direct wrapper around the
ServletConfig
object for the generated servlet.
This object allows the JSP programmer access to the Servlet or JSP engine
initialization parameters such as the paths or file locations etc.
config.getServletName();
This is the
ServletConfig
object associated with the page.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
pageContext-
The pageContext object is an instance of a
javax.servlet.jsp.PageContext
object.
The pageContext object is used to represent the entire JSP page.
This object is intended as a means to access information about the page while
avoiding most of the implementation details.
The PageContext class defines several fields, including
PAGE_SCOPE, REQUEST_SCOPE,
SESSION_SCOPE,
and
APPLICATION_SCOPE
One of the important methods is
removeAttribute
. This method accepts either one or
two arguments. For example,
pageContext.removeAttribute ("attrName")
removes
the attribute from all scopes, while the following code only removes it from the page
scope −
pageContext.removeAttribute("attrName", PAGE_SCOPE);
This encapsulates use of server-specific features like higher performance
JspWriters
.
Page –
This object is an actual reference to the instance of the page. It can be thought of as an
object that represents the entire JSP page.
This is simply a synonym for
this
, and is used to call the methods defined by the translated
servlet class.
Exception –
The exception object is a wrapper containing the exception thrown from the
previous page. It is typically used to generate an appropriate response to the error condition.
The
Exception
object allows the exception data to be accessed by designated JSP.
Accept
This header specifies the
MIME
types that the browser or other clients can handle. Values
of
image/png
or
image/jpeg
are the two most common possibilities.
Accept-Charset
This header specifies the character sets that the browser can use to display the information.
For example,
ISO-8859-1
.
Accept-Encoding
This header specifies the types of encodings that the browser knows how to handle. Values
of
gzip
or
compress
are the two most common possibilities.
Accept-Language
This header specifies the client's preferred languages in case the servlet can produce results in
more than one language. For example
en, en-us, ru
, etc.
Authorization
This header is used by clients to identify themselves when accessing password-protected
webpages.
Connection
This header indicates whether the client can handle persistent HTTP connections. Persistent
connections permit the client or other browser to retrieve multiple files with a single request. A
value of
Keep-Alive
means that persistent connections should be used.
Content-Length
This header is applicable only to
POST
requests and gives the size of the POST data in bytes.
Cookie
This header returns cookies to servers that previously sent them to the browser.
Host
This header specifies the host and port as given in the original URL.
If-Modified-Since
This header indicates that the client wants the page only if it has been changed after the
specified date. The server sends a code, 304 which means
Not Modified
header if no newer
result is available.
If-Unmodified-Since
This header is the reverse of
If-Modified-Since
; it specifies that the operation should succeed
only if the document is older than the specified date.
Referer
This header indicates the URL of the referring webpages. For example, if you are at Webpage 1
and click on a link to Webpage 2, the URL of Webpage 1 is included in the Referer header
when the browser requests Webpage 2.
User-Agent
This header identifies the browser or other client making the request and can be used to return
different content to different types of browsers.
The HttpServletRequest Object
1
Cookie[] getCookies()
Returns an array containing all of the Cookie objects the client sent with this request.
2
Enumeration getAttributeNames()
Returns an Enumeration containing the names of the attributes available to this request.
3
Enumeration getHeaderNames()
Returns an enumeration of all the header names this request contains.
4
Enumeration getParameterNames()
Returns an enumeration of String objects containing the names of the parameters contained
in this request.
5
HttpSession getSession()
Returns the current session associated with the this request, or if the request does not have
a session, creates one.
6
HttpSession getSession(boolean create)
Returns the current HttpSession associated with the this request or, if if there is no current
session and create is true, returns a new session.
7
Locale getLocale()
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Returns the preferred Locale that the client will accept content in, based on the Accept-
Language header.
8
Object getAttribute(String name)
Returns the value of the named attribute as an Object, or null if no attribute of the given
name exists.
9
ServletInputStream getInputStream()
Retrieves the body of the request as binary data using a ServletInputStream.
10
String getAuthType()
Returns the name of the authentication scheme used to protect the servlet, for example,
"BASIC" or "SSL," or null if the JSP was not protected.
11
String getCharacterEncoding()
Returns the name of the character encoding used in the body of this request.
12
String getContentType()
Returns the MIME type of the body of the request, or null if the type is not known.
13
String getContextPath()
Returns the portion of the request URI that indicates the context of the request.
14
String getHeader(String name)
Returns the value of the specified request header as a String.
15
String getMethod()
Returns the name of the HTTP method with which this request was made, for example, GET,
POST, or PUT.
16
String getParameter(String name)
Returns the value of a request parameter as a String, or null if the parameter does not exist.
17
String getPathInfo()
Returns any extra path information associated with the URL the client sent when it made this
request.
18
String getProtocol()
Returns the name and version of the protocol the request uses.
19
String getQueryString()
Returns the query string that is contained in the request URL after the path.
20
String getRemoteAddr()
Returns the Internet Protocol (IP) address of the client that sent the request.
21
String getRemoteHost()
Returns the fully qualified name of the client that sent the request.
22
String getRemoteUser()
Returns the login of the user making this request, if the user has been authenticated, or null if
the user has not been authenticated.
23
String getRequestURI()
Returns the part of this request's URL from the protocol name up to the query string in the
first line of the HTTP request.
24
String getRequestedSessionId()
Returns the session ID specified by the client.
25
String getServletPath()
Returns the part of this request's URL that calls the JSP.
26
String[] getParameterValues(String name)
Returns an array of String objects containing all of the values the given request parameter
has, or null if the parameter does not exist.
27
boolean isSecure()
Returns a boolean indicating whether this request was made using a secure channel, such
as HTTPS.
28
int getContentLength()
Returns the length, in bytes, of the request body and made available by the input stream, or
-1 if the length is not known.
29
int getIntHeader(String name)
Returns the value of the specified request header as an int.
30
int getServerPort()
Returns the port number on which this request was received.
String
paramValue
=
request
.
getHeader
(
paramName
);
Enumeration
headerNames
=
request
.
getHeaderNames
();
while
(
headerNames
.
hasMoreElements
()) {
String
paramName
=
(
String
)
headerNames
.
nextElement
();
accept
*/*
accept-
language
en-us
user-agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; InfoPath.2; MS-
RTC LM 8)
accept-
encoding
gzip, deflate
host
localhost:8080
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
connection
Keep-Alive
cache-control
no-cache
1
Allow
This header specifies the request methods (
GET, POST
, etc.) that the server supports.
2
Cache-Control
This header specifies the circumstances in which the response document can safely be
cached. It can have values
public, private
or
no-cache
etc. Public means document is
cacheable, Private means document is for a single user and can only be stored in private
(nonshared) caches and no-cache means document should never be cached.
3
Connection
This header instructs the browser whether to use persistent HTTP connections or not. A
value of
close
instructs the browser not to use persistent HTTP connections and
keep-
alive
means using persistent connections.
4
Content-Disposition
This header lets you request that the browser ask the user to save the response to disk in a
file of the given name.
5
Content-Encoding
This header specifies the way in which the page was encoded during transmission.
6
Content-Language
This header signifies the language in which the document is written. For example,
en, en-us,
ru,
etc.
7
Content-Length
This header indicates the number of bytes in the response. This information is needed only if
the browser is using a persistent (keep-alive) HTTP connection.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
8
Content-Type
This header gives the
MIME
(
Multipurpose Internet Mail Extension
) type of the response
document.
9
Expires
This header specifies the time at which the content should be considered out-of-date and
thus no longer be cached.
10
Last-Modified
This header indicates when the document was last changed. The client can then cache the
document and supply a date by an
If-Modified-Since
request header in later requests.
11
Location
This header should be included with all responses that have a status code in the 300s. This
notifies the browser of the document address. The browser automatically reconnects to this
location and retrieves the new document.
12
Refresh
This header specifies how soon the browser should ask for an updated page. You can
specify time in number of seconds after which a page would be refreshed.
13
Retry-After
This header can be used in conjunction with a
503 (Service Unavailable)
response to tell
the client how soon it can repeat its request.
14
Set-Cookie
This header specifies a cookie associated with the page.
The HttpServletResponse Object
1
String encodeRedirectURL(String url)
Encodes the specified URL for use in the
sendRedirect
method or, if encoding is not
needed, returns the URL unchanged.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
2
String encodeURL(String url)
Encodes the specified URL by including the session ID in it, or, if encoding is not needed,
returns the URL unchanged.
3
boolean containsHeader(String name)
Returns a boolean indicating whether the named response header has already been set.
4
boolean isCommitted()
Returns a boolean indicating if the response has been committed.
5
void addCookie(Cookie cookie)
Adds the specified cookie to the response.
6
void addDateHeader(String name, long date)
Adds a response header with the given name and date-value.
7
void addHeader(String name, String value)
Adds a response header with the given name and value.
8
void addIntHeader(String name, int value)
Adds a response header with the given name and integer value.
9
void flushBuffer()
Forces any content in the buffer to be written to the client.
10
void reset()
Clears any data that exists in the buffer as well as the status code and headers.
11
void resetBuffer()
Clears the content of the underlying buffer in the response without clearing headers or status
code.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
12
void sendError(int sc)
Sends an error response to the client using the specified status code and clearing the buffer.
13
void sendError(int sc, String msg)
Sends an error response to the client using the specified status.
14
void sendRedirect(String location)
Sends a temporary redirect response to the client using the specified redirect location URL.
15
void setBufferSize(int size)
Sets the preferred buffer size for the body of the response.
16
void setCharacterEncoding(String charset)
Sets the character encoding (MIME charset) of the response being sent to the client, for
example, to UTF-8.
17
void setContentLength(int len)
Sets the length of the content body in the response In HTTP servlets; this method also sets
the HTTP Content-Length header.
18
void setContentType(String type)
Sets the content type of the response being sent to the client, if the response has not been
committed yet.
19
void setDateHeader(String name, long date)
Sets a response header with the given name and date-value.
20
void setHeader(String name, String value)
Sets a response header with the given name and value.
21
void setIntHeader(String name, int value)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Sets a response header with the given name and integer value.
22
void setLocale(Locale loc)
Sets the locale of the response, if the response has not been committed yet.
23
void setStatus(int sc)
Sets the status code for this response.
Session Management
is a mechanism used by the
Web container
to store session
information for a particular user. There are four different techniques used by Servlet
application for session management. They are as follows:
1.
Cookies
2.
Hidden form field
3.
URL Rewriting
4.
HttpSession
The basic concept behind session is, whenever a user starts using our application, we can save
a unique identification information about him, in an object which is available throughout the
application, until its destroyed. So wherever the user goes, we will always have his information
and we can always manage which user is doing what. Whenever a user wants to exit from your
application, destroy the object with his information.
HttpSession
object is used to store entire session with a specific client. We can store, retrieve
and remove attribute from
HttpSession
object. Any servlet can have access
to
HttpSession
object throughout the
getSession()
method of
the
HttpServletRequest
object.
CREATING NEW SESSION
HttpSession session = request.getSession(); -
return existing session or create new session
HttpSession = request.getSession(true); -
always return a new session
GETTING A PREEXISTING SESSION
HttpSession session = request.getSession(false);
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
DESTROYING A SESSION
session.invalidate(); -
destroy a session
long
getCreationTime()
returns the time when the session was created, measu
since midnight January 1, 1970 GMT.
String
getId()
returns a string containing the unique identifier assigne
long
getLastAccessedTime()
returns the last time the client sent a request associate
int
getMaxInactiveInterval()
returns the maximum time interval, in seconds.
void
invalidate()
destroy the session
boolean
isNew()
returns true if the session is new else false
void
setMaxInactiveInterval(int
interval)
Specifies the time, in seconds,after servlet container w
session.
index.html
<
form
method
="
post
"
action
="
Validate
">
User: <
input
type
="
text
"
name
="
user
" /><
br
/>
Password: <
input
type
="
text
"
name
="
pass
" ><
br
/>
<
input
type
="
submit
"
value
="
submit
">
</
form
>
web.xml
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
<
web-app..
>
<
servlet
>
<
servlet-name
>Validate</
servlet-name
>
<
servlet-class
>Validate</
servlet-class
>
</
servlet
>
<
servlet
>
<
servlet-name
>Welcome</
servlet-name
>
<
servlet-class
>Welcome</
servlet-class
>
</
servlet
>
<
servlet-mapping
>
<
servlet-name
>Validate</
servlet-name
>
<
url-pattern
>/Validate</
url-pattern
>
</
servlet-mapping
>
<
servlet-mapping
>
<
servlet-name
>Welcome</
servlet-name
>
<
url-pattern
>/Welcome</
url-pattern
>
</
servlet-mapping
>
<
welcome-file-list
>
<
welcome-file
>index.html</
welcome-file
>
</
welcome-file-list
>
</
web-app
>
Validate.java
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
import
java.io.*;
import
javax.servlet.*;
import
javax.servlet.http.*;
public class
Validate
extends
HttpServlet {
protected void
doPost
(HttpServletRequest request, HttpServletResponse
response)
throws
ServletException, IOException {
response.
setContentType
(
"text/html;charset=UTF-8"
);
Request Attributes
Request from client
then web server creates request and response object
servlet
works with request
jsp : handles view, creates response
model to perform duties
jsp makes response
sends response back and terminates response and request
objects
index
page2 servelt
page2.jsp
page3servlet
page3.jsp (request data exists
within one request response cycle, new request will be gone)
request.setAttribute(“student”, student);
String url = “/page2.jsp”
RequestDispatcher dispatcher = getServletContext().getRequestDispatcher(url);
Dispatcher.forward(request,response);
Student student = (Student) request.getAttribute(“student”);
SESSION ATTRIBUTES – GET/SET
HttpSession session = request.getSession();
Session.setAttribute(“student”, student);
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
RequestDispatcher dispatcher = getServletContext().getRequestDispatcher(url);
Dispatcher.forward(request,response);
Student student = (Student) session.getAttribute(“student”);
COOKIE
Session to session persistence
Small piece of data that is stored within a client’s browser when they browse a website
Name- value pair
Incoming cookies – client to server
Outgoing cookies – server to client
Cookie name Cookie = new Cookie(“nameCookie”, studentName);
nameCookie.setMaxAge(60*60*24*2);
naemCookie.setPath(“/”);
response.addCookie(ageCookie);
…..
Cookie.getName()
….
Cookie [] cookies = request.getCookies();
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
For (int I = 0; I < cookies.length; i++){
Cookie cookie = cookies[i];
Cookie.getName()
Cookie.getValue()
INTIALIZATION
A variable that can be set to be initialized when a servlet object is instantiated
Defined when we create the servlet
Definition stored in @WebServlet or web.xml
Servlet init() method
initParams = {
@WebInitParam(name = “Title”, value = “Cryptonomicon”, description = “Dr.Piercy’s Favorite
Book”),
@WebInitParam(name = “Year”, value = “2002”, description = “Copyright year”)
Instance Variables
Private String title;
Private int year;
Public void init(ServletConfig config) throws ..
This.title = config.getInitParameter(“Title”);
This.year = Integer.parseInt(config.getInitParameter(“Year”));
doGet(…)
System.out.println(this.title);
System.out.println(this.year);
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 1
(1 point)
Saved
Which of the following characteristics of Cloud computing
refers to the ability to increase and decrease the amount of
Cloud resources that are used as needed?
Question 1 options:
configurable
convenient
scalability
ubiquitous
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 2
(1 point)
Saved
Capital Expenses (CAPEX) refers to the costs of acquiring new
infrastructure - for example, buying servers to set up on
premises. Operating Expenses (OPEX) refers to the costs of
ongoing ownership and maintenance. Which of the following is
a true statement related to how Cloud computing can impact
CAPEX and OPEX?
Question 2 options:
Moving to cloud computing generally shifts OPEX to CAPEX.
Moving to cloud computing generally shifts CAPEX to OPEX.
Cloud Computing reduces OPEX to zero.
CAPEX is always higher than OPEX.
Question 3
(1 point)
Saved
The allocating or releasing of more IT resources that are of the
same type as current resources is referred to as ___________.
Question 3 options:
horizontal scaling
on-premise scaling
service scaling
vertical scaling
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 4
(1 point)
Saved
Cloud services are generally considered to have increased
availability and reliability than other types of IT infrastructure.
Question 4 options:
True
False
Question 5
(1 point)
Saved
Which of the following is a risk or challenge that needs to be
addressed when considering a move to Cloud Computing?
(Select all that apply)
Question 5 options:
Potential security vulnerabilities
Reduced operational governance control
Limited portability between cloud providers
Regulatory and legal issues across multiple regions
Question 6
(1 point)
Saved
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cloud computing is often divided into three levels of services -
infrastructure-as-a-service (IAAS), platform-as-a-service
(PAAS), and software-as-a-service (SAAS). Which of these
levels of service deals primarily with the networks, servers
and storage?
Question 6 options:
IAAS
PAAS
SAAS
Question 7
(1 point)
Saved
Cloud computing is often divided into three levels of services -
infrastructure-as-a-service (IAAS), platform-as-a-service
(PAAS), and software-as-a-service (SAAS). Which of these
levels of service deals primarily adds operating systems and
middleware on top of servers network and storage?
Question 7 options:
SAAS
PAAS
IAAS
Question 8
(1 point)
Saved
Cloud computing is often divided into three levels of services -
infrastructure-as-a-service (IAAS), platform-as-a-service
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
(PAAS), and software-as-a-service (SAAS). Which of these
levels of service allows you to run applications and work with
data that is stored in the cloud?
Question 8 options:
PAAS
SAAS
IAAS
Question 9
(1 point)
Saved
What is the name of the portal that you should use to access
the AWS Cloud services for your work in this course?
Question 9 options:
MyAWS
AWS Educate
Cloud Labs Offering Undergraduate Development
Amazon Web Portal
Question 10
(1 point)
Saved
AWS __________ consist of one or more discrete data centers,
each with redundant power, networking and connectivity,
housed in separate facilities.
Question 10 options:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
spot instances
regions
edge locations
availability zones
Question 11
(1 point)
Saved
The __________________ is a web application for managing
Amazon Web Services that provides an interactive user
interface for performing many AWS tasks.
Question 11 options:
AWS Prime
AWS Management Console
AWS Cloudwatch
AWS Region Selector
Question 12
(1 point)
Saved
Which of the following AWS services allows you to rent virtual
computers on which to run your own computer applications?
Question 12 options:
EC2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
SageMaker
S3
RDS
Question 13
(1 point)
Saved
Which of the following AWS services allows you simply to store
and retrieve any amount of data at any time, from anywhere
on the web?
Question 13 options:
EC2
S3
SageMaker
RDS
Question 14
(1 point)
Saved
Which of the following AWS services will you use for posting
and hosting your static web pages for the module assignment?
Question 14 options:
EC2
RDS
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
S3
SageMaker
Question 15
(1 point)
Saved
After posting your web pages to your AWS S3 bucket, which of
the following represents the form of the URL to the home page
of your static web site?
Question 15 options:
https://<your.name>.mist4630.bucket/index.html
http://s3.amazonaws.com/your.name>.mist4630.bucket/index.html
http://s3.amazonaws.com/index.html
You can think of Compute-as-a-Service (CaaS) as being the
subset of Platform-as-a-Service (PaaS) that has a focus on
computer processing.
TRUE
The AWS compute service that lets you rent virtual
computers on which to run their own computer applications is
known as _
EC2
How many keys do you need to include when setting up your
AWS credentials in the Eclipse AWS Toolkit?
4
When setting up an EC2 instance you should select the region.
A region is a geographic area that contains one or more data
centers with the hardware where your instance will "live."
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
TRUE
Platform-as-a-Service provides more than just infrastructure
by adding middleware, development tools, business
intelligence (BI) services, database management systems, and
more.
TRUE
After you set up an EC2 instance, you can access and manage
it in which of the following ways?
Using the AWS Console
When setting up an EC2 instance, you must specify a template
that contains a software configuration for your instance. Which
of the following is the AWS name for such a template.
AMAZON MACHINE IMAGE
Which of the following AWS services allows you to deploy your
dynamic applications without your having to manually set up
servers or storage?
Elastic Beanstalk
Which of the following are considered to be benefits of using
EC2? (Select all that apply)
Question 9 options:
ELASTIC WEB-SCALE COMPUTING
FLEXIBLE CLOUD HOSTING SERVICES
INTEGRATED
SECURE
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
After starting EC2 instances or deploying to Elastic Beanstalk,
you can leave those components running as long as you want
without using AWS credit or incurring a charge.
FALSE
Which of the following state management techniques is useful
for passing data between components only during one
request/response event?
Question 1 options:
A) storing data as request attributes
Which of the following state management techniques is useful
for keeping data persistent as long as a user keeps a session
open to our application?
Question 2 options:
A) storing data as session attributes
Which of the following state management techniques is useful
for storing small amounts of data on the client side so that it
can be retreived by the server during a later session?
D)
storing data as a cookie
Which of the following state management techniques is best
for storing large amounts of data that will persist for a
relatively long timeframe?
Question 4 options:
A)
B) storing data in a database
We can set the initial state of a servlet using initialization
parameters.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
TRUE
Which of the following statements will store an object called
student temporarily so that it can be passed to and used by a
view component? The object will no longer be available once
the response is sent by the server.
D) request.setAttribute("student", student);
Which of the following statements will retrieve an object called
student that has been stored temporarily (until the response is
sent) so that it can be used to create the view?
C) Student student = (Student) request.getAttribute("student");
Which of the following statements can be used to store a
value that will persist from the time it is stored until a user is
no longer actively visiting a site?
)
D) HttpSession session = request.getSession();
session.setAttribute("student", student);
Which of the following statements will allow us to access a
session attribute and store it as a local variable?
C) Student student = (Student) session.getAttribute("student");
To store a cookie on the client, add it to the request object
and, to retrieve a cookie from the client, you retrieve it off of
the response object.
FALSE
Multiple cookies can be carried at one time by a request.
TRUE
Which of the following statements can be used to create a
cookie that will be sent to the client?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Cookie nameCookie = new Cookie("nameCookie", studentNam
e);
response.addCookie(nameCookie);
Which of the following servlet methods is the best place to
include code that will retrieve servlet initialization
parameters?
init()
Which of the following statements will retrieve a servlet
initialization paramater and store it as a serlvet instance
variable?
this
.
title
=
config
.getInitParameter(
"Title"
);
MVC QUIZ
When setting up a servlet, we need to create a ___________ to
the servlet that will be used to set up any hyperlinks or form
actions so that they will send a request for the servlet.
Question 1 options:
hyperlink
action submission
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
URL mapping
method
Which of the following Java commands will declare and
instance of a Java model class called User when included
within a JSP or servlet file?
Question 2 options:
<%@ page import="model.User" %>
<%= user.declare() %>
user == instanceOf User
User user = new User();
The request and response objects need to be declared before
we can use them within our JSP code.
Question 3 options:
FALSE
Which of the following are created when the Web Server
receives a request to hold any data that is sent from the
client?
Question 4 options:
Data Object
Request Object
Session Object
Response Object
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
With the MVC design pattern, which of the following server side separation of concerns will be
generally implemented using Java Servlets?
Question 5 options:
Modeling our business components
Handle client-side behavior.
Create the appropriate response to send to the client.
Receive a request and control which components act on the request.
Suppose that a user enters the value 21 into a textbox called
age. This value is sent along with the request to a JSP file.
When the value is retrieved using the
request.getParameter("age") method, what is the default data
type for this method?
Question 6 options:
String
int
request
text
When you submit a form using the HTTP _________ method,
any data in the form is concatenated to the URL shown in the
browser.Correct.
Question 7 options:
get
post
.getParameter()
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
.getAttribute()
Which of the following delimiters in a JSP file signals to the
server that some Java code is included in the file?
Question 8 options:
<...>
<!-- ... -->
</.../>
<%...%>
What is the name of the servlet method that will execute when
the following html form is received?
<form name="guessForm" action="guess" method="post"
>
<label>
First Name:
</label>
<input type="text" name="fName" value="" />
<br />
<input type="submit" name="guessButton" value="Go" /
>
</form>
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 9 options:
doGet()
setName()
submit()
doPost()
The request and response objects are available to the doGet()
and doPost() methods because they are passed as parameters
for these methods by the Web server.
Question 10 options:
True
False
A JSP is capable of acting as both the controller and the view
component of the MVC design pattern, but it is often used just
to handle the view.
Question 11 options:
True
False
Which of the following are valid default file names for the
welcome file of an Eclipse Java Dynamic Web Application?
Select all that apply.
Question 12 options:
index.html
index.jsp
Index.html
Index.jsp
default.jsp
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
page1.jsp
What is the name of the servlet method that will execute when
the following html form is received?
<form name="guessForm" action="guess" method="get" >
<label>
First Name:
</label>
<input type="text" name="fName" value="" />
<br />
<input type="submit" name="guessButton" value="Go" /
>
</form>
Question 13 options:
submit()
setName()
doGet()
doPost()
With the MVC design pattern, which of the following server
side separation of concerns will be generally implemented
using plain old java objects (POJOs)?
Question 14 options:
Receive a request and control which components act on the request.
Modeling our business components
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Handle client-side behavior.
Create the appropriate response to send to the client.
Which of the following delimiters in a JSP file signals to the
server that that a Java expression will be printed to the
response object?
Question 15 options:
<!-- ... -->
<%= ... %>
<% ... %>
</.../>
Which of the following are created when the Web Server
receives a request to hold the results that are to be sent back
to the client?
Question 16 options:
Request Object
Response Object
Session Object
Data Object
When you submit a form using the HTTP _________ method,
any data in the form is added to the HTTP request message
but not visible in the browser.
Question 17 options:
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
post
.getParameter()
.getAttribute()
get
The request and response objects persist as long as the user continues to send requests to the
server side application.
Question 18 options:
True
False
Previous PageNext Page
With the MVC design pattern, it is possible to include multiple JSPs to provide different view
options.
Question 19 options:
True
False
Previous PageNext Page
Which of the following Java statements can be used to retreive
the data submitted by the textbox on this form as a String?
<form name="guessForm" action="guess" method="get" >
<label>
First Name:
</label>
<input type="text" name="fName" value="" /><br />
<input type="submit" name="guessButton" value="Go" /
>
</form>
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 20 options:
String fName = request.getParameter("text");
String fName = request.getString("fName");
String fName = request.getParameter("fName");
String fName = request.getString("text");
Which of the following is a valid URL mapping annotation that
appears in a servlet?
Question 21 options:
doPost(urlPattern)
doGet(urlPattern)
@annotation(urlPatterns = { "/guess" })
@WebServlet(urlPatterns = { "/guess" })
For our purposes, Apache Tomcat serves as the Web Server
component for testing our applications, locally.
Question 22 options:
True
False
When adding a servlet to an Eclipse Dynamic Web Project,
where is the best place to store the servlet within the project?
Question 23 options:
directly in the src folder
a package in the src folder
Java Libraries
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Web Content folder
A servlet is capable of handling both the controller and view
concerns but it is best at handling the controller concern.
Question 24 options:
True
False
With the MVC design pattern, which of the following server
side separation of concerns will be generally implemented
using JSPs?
Question 25 options:
Handle client-side behavior.
Modeling our business components
Create the appropriate response to send to the client.
Receive a request and control which components act on the request.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help