Assignment Task:
Theoretical Issues in Enterprise Computing Architecture IT Assignment Help

 

Description

In this assignment, you are to address some theoretical issues in the area of enterprise computing architecture. You will need to demonstrate your understanding of these theoretical issues or competence to apply these theoretical issues. These theoretical issues have been introduced by this unit through the textbook, weekly lectures or tutorials/labs. You will need to review these learning materials to address the following questions and prepare to do personal research if necessary

Question 1

Write Java code for 2 entities: Patient and Appointment. The entities should have the necessary information about a patient and the patient’s appointments and doctors. The ORM strategy for such a relationship mapping between Patient and Appointment is one-to-many unidirectional, which uses a joint column.

 

Question 2

Explain how an EJB container treats an EJB and a POJO differently and why EJB containers can support one of the Java EE goals: ease of use.

 

Question 3

The following is a Java class of simplified shopping cart, which has a number of attributes and methods.

Theoretical Issues in Enterprise Computing Architecture - Java Code - EJB Container - POJO - IT Assignment Help

Assume that the Cart object needs to be made into an EJB, which can be called remotely by EJB clients.

1. Write a remote interface for the EJB by using relevant annotations.

2. Use EJB annotations to modify the Cart object into an EJB.

3. Write a Java standalone application to call the addItem() method of the Cart EJB.

 

Question 4

On completion of the lab projects of Week 7, answer the following questions related to EJB security.

1. What security roles are declared in the project, where are they declared in the project, and what will be authorised by the role declaration?

2. You have used GlassFish management console to create a security group ‘Enterprise’ and add user ‘student’ and ‘staff’ to the group. You can use a GlassFish command to achieve the same goal. What will be the command? Make your personal research if necessary.

3. Explain how a security role is mapped by the project

4. Describe EJB authentication and authorisation when the security user ‘student’ run the Main() method of the project.

5. Describe the steps to declare a security role ‘admin’ that is the only role to access the deleted book() method of ItemEJB. Describe the steps to configure the project and GlassFish to assign the role to the user/role ‘Stephen’.

 

Question 5

On completion of the lab projects of Week 12, answer the following questions related to JMS

1. In this project who is message producer, message provider, message consumer and message destination.

2. What type of messaging: synchronous or asynchronous messaging is used in this project. Justify your answer.

3. If you wish to change the messaging to the other type that is different from the one used in the above (point 2), what do you need to change with the message consumer?

4. Describe the difference between the point-to-point (P2P) model and the publish-subscribe (pub-sub) model.

5. Describe your understanding of the goal that JMS tries to achieve for enterprise computing

 

This IT Assignment has been solved by our IT experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Eureka! You've stumped our genius minds (for now)! This exciting new question has our experts buzzing with curiosity. We can't wait to craft a fresh solution just for you!

  • Uploaded By : Mitchell Lee
  • Posted on : December 05th, 2018

Whatsapp Tap to ChatGet instant assistance