IT405: E-Portals Development Assignment 2 - College of Computing

Verified

Added on  2022/08/23

|9
|1897
|16
Homework Assignment
AI Summary
This assignment solution addresses key concepts in E-Portals Development (IT405). The solution explores the role of content proxy in improving load times, detailing its function as an intermediary server and its impact on security and confidentiality. It then analyzes the advantages and disadvantages of using HTTP POST for web service calls, comparing it to GET and highlighting security aspects and limitations. The document further explains LINQ and LINQ to SQL, describing their function in querying data from various sources. Finally, the assignment examines the advantages of combining multiple AJAX calls into one call, focusing on improved user experience and reduced network load. The solution includes relevant references to support the presented information.
Document Page
College of Computing and Informatics
Assignment 2
Deadline: Saturday 21/03/2020@ 23:59
[Total Mark for this Assignment is 5]
Student Details:
Name: ###
CRN: ###
ID: ###
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between
words, hide characters, use different character sets or languages other than English or any kind of
manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by
the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
College of Computing and Informatics
Question One
Content proxy is a web service on your server that can fetch data from external
URLs and return it to the browser. How does the proxy improve the load time
for users?
Answer:-
A proxy server performs as an entrance between the internet and the user. It
deliver varying stages of safety, functionality, and confidentiality, depending on the user
use case, requirements, or business strategy (Sathiyamoorthi 2016). If the user is
applying a proxy server, internet traffic runs over the proxy server on its technique to
the location they demanded. It is an intermediate server splitting end operators from the
websites they use. The appeal then comes back over that same proxy server. Then it
forwards the documents received from the webpages to the user.
A proper proxy server possesses operators and the internal network sheltered
from the corrupt material that exists out in the rough internet (Aghaei-Foroushani and
Zincir-Heywood 2015). Finally, proxy servers can deliver an exceptional level of
confidentiality. It is essentially a processer on the internet with its protocol address that
the user processor identifies. When the user sends a web invitation, user appeal drives
to the proxy server rapidly. These server then creates user website requests on the user's
behalf. It also gathers the reply from the website server, and onwards user the website
page documents so people can observe the browser page.
Learning
Outcome(s):
Evaluate the
effectiveness of
portals.
1.5 Mark
Document Page
Pg. 02 Question One
There are some categories of miss requests such as bad or good miss. Good
desires will cause the proxy to save copies of the miss substances, and the copies will be
retrieved again when demanded by customers in the upcoming (Sysel and Doležal 2014).
Wrong demands are those appeals that to root the proxy to save copies of the miss
entities, but the copy will not be retrieved again earlier. It is emitting from the cache.
The server might be the most straightforward method for developing the presentation of
Web-based structure by keeping Web objects. The web objects are expecting to be
applied again when demanded in the upcoming location nearer to the Internet operator.
It is positioning between the users and the internet that act to deliver facilities between
the Internet and users. It is decreasing the number of requirements sent through the
Internet to unusual servers.
Document Page
Pg. 03 Question Two
Question Two
What are the advantages and disadvantages of using HTTP POST for web
service calls?
Answer:-
In the POST process, the information is directing to the server as a set in a
separate statement with the dispensation script. Data directed over the POST technique
will not be observable in the URL. The authentic function executed by the POST
technique is applied by the server and is generally reliant on the Request-URI. The
posted object is subsidiary to that URI in a similar method that a file is a subsidiary to a
directory comprising it (Chen et al. 2016). A news article is a subsidiary to a newsgroup
to which it is sending, or data is secondary to a database.
Advantages:-
It is more protected than GET because user-entered evidence is not ever
observable in the link query sequence or the server records.
There is a much more significant perimeter on the number of documents that can
be accepted. Someone can send typescript evidence as well as binary information
using POST.
One of the possible benefits of declaring in our form that the post techniques be
applied is to get the user browser to tie to the server. The Post directs the
Learning
Outcome(s):
Recognize the
main elements of
portals
development.
1.5 Marks
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Pg. 04 Question Two
documents of the form fields in an unconditionally undetectable, discreet method,
at least in the address block of the browser.
Disadvantages:-
Meanwhile, the evidence sent by the POST performance is not perceptible in the
link, so it is not probable to bookmark the page with a specific query.
POST needs are never hidden.
POST needs do not stay in the browser history.
When the server applies that favorite, the information can be sent the first time
from a form that will no extensive be accessible (Harari 2019). Therefore, the
outcome the will get will no longer be affordable. It will be similar.
Document Page
Pg. 05 Question Three
Question Three
What is the full form of LINQ? Explain LINQ to SQL.
Answer:-
The full form of LINQ is Language Integrated Query.
LINQ:-
It is an identical query syntax in VB.NET and C to repossess information from
different resources and layouts (Wong et al. 2016). It is incorporating in VB or C, thus
eliminating the discrepancy between databases and programming languages, as well as
delivering a particular querying interface for diverse categories of information
resources. It also permits to delete, update, and insert documents. Still, the only
disadvantage from which it suffers is its restriction to the SQL database.
SQL:-
The SQL is a domain-specific language applied in programming and intended
for handling information held in an interactive database management system, or for
stream handling in an interpersonal information stream managing system (Floratou,
Minhas and Özcan 2014). The standard SQL commands like as can be applied to achieve
almost everything that one wants to do with a database. It can execute requests against
a database and also can generate stored actions in a database.
Learning
Outcome(s):
Recognize the
main elements of
portals
development.
1 Mark
Document Page
Pg. 06 Question Four
Question Four
What are the advantages of combining multiple Ajax calls into one call? Write
any TWO.
Answer:-
The augmented user knowledge delivered by AJAX is the leading benefit. AJAX
permits webpages to inform serially by replacing a minor amount of documents
with the server. This method is probable to update portions of a webpage without
reloading the entire page (Wu et al. 2017). Official webpages should reload the
whole page and are unwieldy. AJAX raises the browser’s presentation and
services faster-browsing swiftness, thereby delivering reactive user knowledge.
AJAX applies client-side scripting to interconnect with the webserver and modify
information using JavaScript. By AJAX, the user can eliminate network load and
bandwidth usage and regain only the information that is compulsory to give the
user quicker interfaces and better receptive times. Response time is rapid,
therefore performance and rapidity are improved (Yang 2014). The
asynchronous document can be completed by using XML Http Demand, the
strength of AJAX applications. Therefore, requests are controlled successfully,
and dynamic content loading is carried to higher elevations by improving the
performance significantly.
Learning
Outcome(s):
Evaluate the
effectiveness of
portals
1 Mark
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Pg. 07 Question Four
References:-
Aghaei-Foroushani, V. and Zincir-Heywood, A.N., 2015, January. A proxy identifier
based on patterns in traffic flows. In 2015 IEEE 16th International Symposium on High
Assurance Systems Engineering (pp. 118-125). IEEE.
Chen, L., Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R. and
Smith-Tone, D., 2016. Report on post-quantum cryptography (Vol. 12). US
Department of Commerce, National Institute of Standards and Technology.
Floratou, A., Minhas, U.F. and Özcan, F., 2014. Sql-on-hadoop: Full circle back to
shared-nothing database architectures. Proceedings of the VLDB Endowment, 7(12),
pp.1295-1306.
Harari, J.V., 2019. Textual strategies: Perspectives in post-structuralist criticism.
Cornell University Press.
Sathiyamoorthi, V., 2016. A novel cache replacement policy for web proxy caching
system using web usage mining. International Journal of Information Technology and
Web Engineering (IJITWE), 11(2), pp.1-13.
Sysel, M. and Doležal, O., 2014. An educational HTTP proxy server. In Modern
Trends and Techniques in Computer Science (pp. 541-547). Springer, Cham.
Wong, G.R., Lau, D.H., Middeldorp, M.E., Harrington, J.A., Stolcman, S., Wilson, L.,
Twomey, D.J., Kumar, S., Munawar, D.A., Khokhar, K.B. and Mahajan, R., 2016.
Document Page
Pg. 08 Question Four
Feasibility and safety of Reveal LINQ insertion in a sterile procedure room versus
electrophysiology laboratory. International journal of cardiology, 223, pp.13-17.
Wu, E., Psallidas, F., Miao, Z., Zhang, H., Rettig, L., Wu, Y. and Sellam, T., 2017,
January. Combining Design and Performance in a Data Visualization Management
System. In CIDR.
Yang, S., 2014, May. A Research on Dynamic Forms Verification Technology Based
on PHP+ Ajax. In 2nd International Conference on Teaching and Computational
Science. Atlantis Press.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]