logo

College of Computing and Informatics | Assignment-2

   

Added on  2022-08-23

9 Pages2152 Words27 Views
Assignment 2
Deadline: Saturday 21/03/2020@ 23:59
[Total Mark for this Assignment is 5]
College of Computing and Informatics
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words,
hide characters, use different character sets or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the
question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
E-Portals Development
Student Details:
Name: ###
CRN: ###
ID: ###

College of Computing and Informatics
1.5 Mark

Pg. 2 Question FourQuestion Four
Question Two
What are the advantages and disadvantages of using HTTP POST for web
service calls?
Answer:-
In the POST process, the information is directing to the server as a set in a
separate statement with the dispensation script. Data directed over the POST technique
will not be observable in the URL. The authentic function executed by the POST
technique is applied by the server and is generally reliant on the Request-URI. The
posted object is subsidiary to that URI in a similar method that a file is a subsidiary to
a directory comprising it (Chen et al. 2016). A news article is a subsidiary to a
newsgroup to which it is sending, or data is secondary to a database.
Advantages:-
It is more protected than GET because user-entered evidence is not ever
observable in the link query sequence or the server records.
There is a much more significant perimeter on the number of documents that
can be accepted. Someone can send typescript evidence as well as binary
information using POST.
1.5 Marks
Learning
Outcome(s):
Recognize the
main elements of
portals
development.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Computing and Informatics Assignment
|5
|1472
|23

Computing and Informatic docx.
|9
|2172
|15

College of Computing And Informatics Reports
|5
|1761
|16

College of Computing and Informatics
|9
|1897
|16

Assignment Template | Document
|5
|1485
|69

College of Computing and Informatics Assignment
|6
|1733
|22