Download as pdf or txt
Download as pdf or txt
You are on page 1of 0

MC0081 . (DOT) Net Technologies Roll No.

XXXXXXXXX

Fall 2013
Master of Computer Application (MCA) Semester 5
MC0081 . (DOT) Net Technologies


1. Explain the following terms in ASP.Net
a) View state
b) Control state
c) Hidden fields
d) Cookies
e) Query strings

Ans:
a) View State
The View State property provides a dictionary object for retaining values between multiple
requests for the same page. This is the default method that the page uses to preserve page and
control property values between round trips.
When the page is processed, the current state of the page and controls is hashed into a string and
saved in the page as a hidden field, or multiple hidden fields if the amount of data stored in the
View State property exceeds the specified value in the Max Page State Field Length property.
b) Control State
Control-state data is order for a control to work properly. For example, if we have written a
custom control that has different tabs that show different information, in order for that control to
work as expected, the control needs to know which tab is selected between round trips. The View
State property can be used for this purpose, but view state can be turned off at a page level by
developers, effectively breaking your control. To solve this, the ASP.NET page framework
exposes a feature in ASP.NET called control state.
c) Hidden Fields
ASP.NET allows you to store information in a Hidden Field control, which renders as a standard
HTML hidden field. A hidden field does not render visibly in the browser, but we can set its
properties just as we can with a standard control. When a page is submitted to the server, the
content of a hidden field is sent in the HTTP form collection along with the values of other
controls.



MC0081 . (DOT) Net Technologies Roll No. XXXXXXXXX

d) Cookies
A cookie is a small amount of data that is stored either in a text file on the client file system or
in-memory in the client browser session. It contains site-specific information that the server
sends to the client along with page output. Cookies can be temporary (with specific expiration
times and dates) or persistent.
e) Query Strings
A query string is information that is appended to the end of a page URL. A typical query string
might look like the following example:
http://www.contoso.com/listwidgets.aspx?category=basic&price=100

In the URL path above, the query string starts with a question mark (?) and includes two
attribute/value pairs, one called "category" and the other called "price." Query strings provide a
simple but limited way to maintain state information.





2. Describe about web service clients and web service proxies.

Ans:
Web Service Clients
Web service clients that is applications that use or consume, Web methods. Its easy to write
Web services. Writing Web service clients is even easier, thanks to some high-level support lent
by the .NET Framework class library (FCL) and a code-generator named Wsdl.exe. If we have a
WSDL contract describing a Web service (or the URL of a DISCO file that points to a WSDL
contract) we can be making calls to that Web service in no time.
Web Service Proxies
The key concept to grasp when writing Web service clients is that of the Web service proxy. A
Web service proxy is an object that provides a local representation of a remote Web service. A
proxy is instantiated in the clients own application domain, but calls to the proxy flow through
the proxy and out to the Web service that the proxy represents. The Wsdl.exe utility that comes
with the .NET Framework SDK (and that is integrated into Visual Studio .NET) generates Web
service proxy classes from WSDL contracts. Once a proxy is created, calling the corresponding
Web service is a simple matter of calling methods on the proxy, as shown here:

MC0081 . (DOT) Net Technologies Roll No. XXXXXXXXX

CalculatorWebService calc = new CalculatorWebService ();
int sum = calc.Add (2, 2);
The methods in the proxy class mirror the Web methods in the Web service. If the Web service
exposes Web methods named Add and Subtract, the Web service proxy also contains methods
named Add and Subtract. When we call one of these methods, the proxy packages up the input
parameters and invokes the Web method using the protocol encapsulated in the proxy (typically
SOAP). The proxy insulate from the low-level details of the Web service and of the protocols
that it uses. It even parses the XML that comes back and makes the result available as managed
types.





3. Write short notes on:
a) IIS Request Processing Models
b) IIS services

Ans:
a) I I S Request Processing Models
Worker process isolation mode is the new IIS request processing model. In this application
isolation mode, you can group Web applications into application pools, through which we can
apply configuration settings to the worker processes that service those applications. An
application pool corresponds to one request routing queue within HTTP.sys and one or more
worker processes.
Worker process isolation mode enables you to completely separate an application in its own
process, with no dependence on a central process such as Inetinfo.exe to load and execute the
application. All requests are handled by worker processes that are isolated from the Web server
itself. Process boundaries separate each application pool so that when an application is routed to
one application pool, applications in other application pools do not affect that application. By
using application pools, you can run all application code in an isolated environment without
incurring a performance penalty.
b) I I S services
Internet Information Services (IIS), which runs on all editions of the Microsoft Windows
Server operating system, provides a new architecture that offers flexibility in the choice of two
application isolation modes. The new architecture helps to run a faster Web service that is more

MC0081 . (DOT) Net Technologies Roll No. XXXXXXXXX

reliable and secure. IIS provides a redesigned World Wide Web Publishing Service (WWW
service) architecture that can help achieve better performance, reliability, scalability, and security
for Web sites, whether its run on a single server running IIS or on multiple servers.
IIS runs a server in one of the two distinct request processing models, called Application
Isolation Modes. Application Isolation is the separation of applications by process boundaries
that prevents one application or Web site from affecting another and reduces the time that you
spend restarting services to correct problems related to applications.
In IIS, application isolation is configured differently for each of the two IIS application isolation
modes. Both modes rely on the HTTP protocol stack (also referred to as HTTP.sys) to receive
Hypertext Transfer Protocol (HTTP) requests from the Internet and return responses. HTTP.sys
resides in kernel mode, where operating system code, such as device drivers, runs. HTTP.sys
listens for, and queues, HTTP requests. The new request-processing architecture and application
isolation environment enables individual Web applications, which always run in user mode, to
function within a self-contained worker process.





4. Discuss the following:
a) Forms Authentication
b) Windows Authentication

Ans:


Remaining answers are available in the full assignments (in MS-WORD format).

For full assignments Contact us:
Mobile: (+91) 8002302323 / 8404855800
Email:assignments.prakash@gmail.com/ info@assignmentsclub.com
Website:www.assignmentsclub.com



MC0081 . (DOT) Net Technologies Roll No. XXXXXXXXX

Note: Sample papers are available in Portable Document Format(.pdf) with a
watermark of our Website. Full assignments will be in MS-WORD(.docx) format
without any watermark...

Assignments are solved as per new guidelines. In the sample (pdf) page limit is not
considered but in full assignments (.docx) all guidelines (page limit, word limit, etc.)
are followed. Contact us for Full assignments

You might also like