Submitted Questions

  • How will you provide security to your J2EE project?

    • Jan 28th, 2018

    Implement OWASP security standards.
    Provide Token implementation,
    Direct URL interceptor,
    Antisamy etc.


    • Oct 4th, 2012

    Security roles can be applied at application level by either declarative method or programatically. Users or Groups are binded during application deployment by administrator.

  • Common Design Pattern

    What is command design pattern? Explain this pattern based on below scenario Map m=new HashMap(); HashMap m=new HashMap(); What is difference between Map m=new HashMap(); HashMap m=new HashMap();

    Thomas John

    • Sep 22nd, 2015

    Command decouples the object that invokes the operation from the one that knows how to perform it. To achieve this separation, the designer creates an abstract base class that maps a receiver (an obje...

    Ganesh Bhat

    • Apr 3rd, 2015

    Map m = new HashMap(); here the reference of interface Map holds the object of HashMap, this is called Liscov Substitution Principle. OO Principles encourages to write implementation to interfaces tha...

  • How to remove some keys in ArrayList

    Hi. This a class Employee containes eid and ename are datamembers. when these employee class objects are stored in arrary list i want to remove eid containes 100 and 1000 plz replay to me


    • Mar 14th, 2014

    Use varray or nestet table to store the array list.
    the if want to remove use DELETE(n) method to specify the element to remove from the list.