The test will be three hours but you should only need half that time to complete the test.
The test will be CLOSED book.
There will be 10 short answer questions based on material covered in class.
You are responsible for the material explicitly referenced as “Lecture Notes” for each class in the class schedule. All the material is available on-line at: http://www.site.uottawa.ca/~lpeyton/csi5380schedule.html as well as for download within webct.
You are also responsible for understanding the architecture and design principles that you applied in the course project (part 1) : http://www.site.uottawa.ca/~lpeyton/csi5380project.html . You will have to read and understand simple Java Servlet and JSP code for the test … but you will not have to write any code for the test.
In answering the questions it is expected that you will demonstrate you understand the definitions of key terms and acronyms introduced in this course, and can discuss the relevant issues for electronic commerce and apply the appropriate architectural principles. Listed below are the key terms and acronyms you are expected to know:
Lecture 1
Electronic Commerce Architecture, J2EE
Communication, Document, Data, Firewall
Business, Law, Technology
Value-added Services, scalability, security, international
B2B / B2C / C2C / G2B /G2C
System, Architecture, Package Diagram, Architecture Framework, Design Pattern, Model-View-Controller,
Separation of Concerns in JSP file: Java, Client-side JavaScript, Cascading Style Sheets, HTML
Lecture 2
SOAP, WSDL, UDDI, Web Service
HTML, XML, DTD, XSLT, DOM, StAX
HTTPServlet, HTTPSession, HTTPRequest, HTTPResponse, Cookie
HTTP Get, HTTP Post
Comparison of REST and SOAP for web services.
Lecture 3
Transaction, JDBC, JTA, ACID (atomic, consistency, isolation, durability), deadlock
Comparison of Business vs Object vs Database transaction
Scalibility (throughput vs. performance), processes, threads
Synchronized method, caching, connection pools, string operations, system calls
Test Framework plus Benchmarks
Server Cluster architecture, reliability, failover, Cloud Computing Architecture
Data Access Object pattern, Front Controller pattern, Login Filter pattern, Transfer Object Pattern
Lecture 4
J2EE: Client Tier, Web Tier, EJB or Business Tier, EIS or Data Services Tier
JMS, RMI, JNDI
AJAX, HTTP Packet, DHTML, XMLHTTP, XMLDOM objects, validating inputs, Cookie
W3C Accessibility Initiative Guidelines
Accessibility, HTML Validation
Lecture 6
Business Matching Service Scenario
Receipts, Contracts, Legally binding business scenario, Audit trail, Non-repudiation
Security, Firewalls, VPN, HTTPS
Authentication, identification, authorization, ACL, declarative vs programmatic Security
Public Key Infrastructure
Internationalization vs Localization,
Locale, character set, resource bundles, ASCII, Unicode, UTF encoding,
Text, error messages, currency, taxes, date formatting, collating
Database localization versus Resource Bundles Versus locale specific web pages.
Lecture 8
Enterprise Java Beans (Entity, Session, Message), Remote vs Local Container
Encapsulation of business logic for remote access, distributed deployment, security and scalability configuration
Security and Scalability of EJB vs support for heterogeneous clients and firewall tunneling in Web Services
Lecture 9
Consumer Tracking Service Scenario
Privacy, P3P, PIPEDA, personal information = identifying + characteristic, implicit versus explicit consent
Cookie Synchronization, HTTP Redirect, 1 Pixel Image
The following are not on the test:
WAF, Templates
Permissioned Marketing, Ad servers, personalization
Data mining, Association, Classification, Decision Trees, Rules, Predictive Accuracy, Lift, Return on Investment (ROI),
Value Proposition, Personalization, User Profile, Customer Segment, Promotion, Cross Sell, Up Sell, Click Through Rate
Business Process Management (BPEL), BPMN, Orchestration, Choreography(WS-CDL), Service Level Agreement (SLA)
Service Oriented Architecture, Model-Driven Architecture, XForms, ebXML, Semantic Web Services (OWL-S), Ontology
EIS, Connector, Integration Strategies (Data, Synchronous, Asynchronous, Legacy), JNI, J2EE Connector Architecture
Federated Identity Management, Liberty Alliance, OpenID, anonymous vs pseudononymous vs veronymous
Search Engine, recall %, precision%, Page Rank algorithm, web crawler, links, anchors, document index
Search Service Scenario
Social networking sites, reputation systems
Mobile e-commerce, wireless networks (Sensor Networks, WiMax, …)