Sample Questions for the Final Exam


  1. Answer the Sample Questions for the Mid-Term Exam .

  2. Describe protection domains in J2ME. Make sure you discuss permission types and the role that is played by code signing.

  3. Explain the difference between server authentication and client authentication.

  4. Explain the difference between a (simple) file system and a record management system (as it is implemented in J2ME).

  5. Complete the following getAllEmailAddresses() method. It must:
    1. Return a Vector of String objects that contains the name and email address of all of the Contact objects in a ContactList that have a non-empty EMAIL field.
    2. Check to see if all of the fields you use are supported by the PIM on the device.
    public Vector getAllEmailAddresses()
    {
      ContactList    contacts;
      Vector         result;
    
      try 
      {
        contacts = (ContactList) PIM.getInstance().openPIMList(PIM.CONTACT_LIST, 
                                                               PIM.READ_WRITE);
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
    
       } 
       catch (PIMException e)
       {
        // An error occurred so return null
       }
    
       return result;
     }
    
    }
    

  6. Illustrate, using a UML statechart diagram, the way in which an explicit (non-orthogonal) persistant object store is normally used.

  7. Write a MIDlet that:
    1. Allows the user to enter the URL (of an HTML file on an HTTP server) in a TextField on a Form that looks something like the following:
    2. Allows the user to initiate a download of the file at the given URL.
    3. Downloads the HTML page (from the HTTP server specified in the URL).
    4. Displays the downloaded file in a TextBox.

  8. Modify your implementation of the Translator class from the Sample Questions for the Mid-Term Exam so that it uses a translation algorithm on another device (i.e., a translation server).

  9. Describe three different approaches to mobile client-server computing [as, for example, in Jing et al. (1999)].

  10. Describe (using whatever technique you think is most appropriate) the Bluetooth discovery process.

Copyright 2007