IT405: E-Portals Development Assignment 2 - Proxy, HTTP, LINQ, AJAX
VerifiedAdded on 2022/08/23
|9
|2152
|27
Homework Assignment
AI Summary
This document presents a comprehensive solution for IT405 Assignment 2, focusing on E-Portals Development. The assignment addresses key concepts including content proxy servers, HTTP POST methods, LINQ to SQL, and the advantages of combining multiple AJAX calls. The solution explains how a content proxy improves load times, the advantages and disadvantages of using HTTP POST, the full form and functionality of LINQ to SQL, and the benefits of combining AJAX calls. The answers provided include detailed explanations and references to support the analysis of each question. The document is a valuable resource for students studying e-portals development, offering insights into the technical aspects and practical applications discussed in the assignment.

Assignmen
t 2
College of Computing and Informatics
Student Details:
Name: ###
CRN: ###
ID: ###
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words,
hide characters, use different character sets or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the
question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
E-Portals Development
IT405
t 2
College of Computing and Informatics
Student Details:
Name: ###
CRN: ###
ID: ###
Instructions:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on
Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words,
hide characters, use different character sets or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover
page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the
question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
E-Portals Development
IT405
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

College of Computing and Informatics
Question One
Question One

Pg. 2 Question FourQuestion Four
Question Two
What are the advantages and disadvantages of using HTTP POST for web
service calls?
Answer:-
In the POST process, the information is directing to the server as a set in a
separate statement with the dispensation script. Data directed over the POST technique
will not be observable in the URL. The authentic function executed by the POST
technique is applied by the server and is generally reliant on the Request-URI. The
posted object is subsidiary to that URI in a similar method that a file is a subsidiary to
a directory comprising it (Chen et al. 2016). A news article is a subsidiary to a
newsgroup to which it is sending, or data is secondary to a database.
Advantages:-
It is more protected than GET because user-entered evidence is not ever
observable in the link query sequence or the server records.
There is a much more significant perimeter on the number of documents that
can be accepted. Someone can send typescript evidence as well as binary
information using POST.
Learning
Outcome(s):
Recognize the
main elements of
portals
development.
1.5 Marks
Question Two
What are the advantages and disadvantages of using HTTP POST for web
service calls?
Answer:-
In the POST process, the information is directing to the server as a set in a
separate statement with the dispensation script. Data directed over the POST technique
will not be observable in the URL. The authentic function executed by the POST
technique is applied by the server and is generally reliant on the Request-URI. The
posted object is subsidiary to that URI in a similar method that a file is a subsidiary to
a directory comprising it (Chen et al. 2016). A news article is a subsidiary to a
newsgroup to which it is sending, or data is secondary to a database.
Advantages:-
It is more protected than GET because user-entered evidence is not ever
observable in the link query sequence or the server records.
There is a much more significant perimeter on the number of documents that
can be accepted. Someone can send typescript evidence as well as binary
information using POST.
Learning
Outcome(s):
Recognize the
main elements of
portals
development.
1.5 Marks
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Pg. 3 Question FourQuestion Four
One of the possible benefits of declaring in our form that the post techniques be
applied is to get the user browser to tie to the server. The Post directs the
documents of the form fields in an unconditionally undetectable, discreet
method, at least in the address block of the browser.
Disadvantages:-
Meanwhile, the evidence sent by the POST performance is not perceptible in
the link, so it is not probable to bookmark the page with a specific query.
POST needs are never hidden.
POST needs do not stay in the browser history.
When the server applies that favorite, the information can be sent the first time
from a form that will no extensive be accessible (Harari 2019). Therefore, the
outcome the will get will no longer be affordable. It will be similar.
One of the possible benefits of declaring in our form that the post techniques be
applied is to get the user browser to tie to the server. The Post directs the
documents of the form fields in an unconditionally undetectable, discreet
method, at least in the address block of the browser.
Disadvantages:-
Meanwhile, the evidence sent by the POST performance is not perceptible in
the link, so it is not probable to bookmark the page with a specific query.
POST needs are never hidden.
POST needs do not stay in the browser history.
When the server applies that favorite, the information can be sent the first time
from a form that will no extensive be accessible (Harari 2019). Therefore, the
outcome the will get will no longer be affordable. It will be similar.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Pg. 4 Question FourQuestion Four
Question Three
What is the full form of LINQ? Explain LINQ to SQL.
Answer:-
The full form of LINQ is Language Integrated Query.
LINQ:-
It is an identical query syntax in VB.NET and C to repossess information from
different resources and layouts (Wong et al. 2016). It is incorporating in VB or C, thus
eliminating the discrepancy between databases and programming languages, as well as
delivering a particular querying interface for diverse categories of information
resources. It also permits to delete, update, and insert documents. Still, the only
disadvantage from which it suffers is its restriction to the SQL database.
SQL:-
The SQL is a domain-specific language applied in programming and intended
for handling information held in an interactive database management system, or for
stream handling in an interpersonal information stream managing system (Floratou,
Minhas and Özcan 2014). The standard SQL commands like as can be applied to
Learning
Outcome(s):
Recognize the
main elements of
portals
development.
1 Mark
Question Three
What is the full form of LINQ? Explain LINQ to SQL.
Answer:-
The full form of LINQ is Language Integrated Query.
LINQ:-
It is an identical query syntax in VB.NET and C to repossess information from
different resources and layouts (Wong et al. 2016). It is incorporating in VB or C, thus
eliminating the discrepancy between databases and programming languages, as well as
delivering a particular querying interface for diverse categories of information
resources. It also permits to delete, update, and insert documents. Still, the only
disadvantage from which it suffers is its restriction to the SQL database.
SQL:-
The SQL is a domain-specific language applied in programming and intended
for handling information held in an interactive database management system, or for
stream handling in an interpersonal information stream managing system (Floratou,
Minhas and Özcan 2014). The standard SQL commands like as can be applied to
Learning
Outcome(s):
Recognize the
main elements of
portals
development.
1 Mark

Pg. 5 Question FourQuestion Four
achieve almost everything that one wants to do with a database. It can execute requests
against a database and also can generate stored actions in a database.
achieve almost everything that one wants to do with a database. It can execute requests
against a database and also can generate stored actions in a database.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Pg. 6 Question FourQuestion Four
Question Four
What are the advantages of combining multiple Ajax calls into one call? Write
any TWO.
Answer:-
The augmented user knowledge delivered by AJAX is the leading benefit.
AJAX permits webpages to inform serially by replacing a minor amount of
documents with the server. This method is probable to update portions of a
webpage without reloading the entire page (Wu et al. 2017). Official webpages
should reload the whole page and are unwieldy. AJAX raises the browser’s
presentation and services faster-browsing swiftness, thereby delivering reactive
user knowledge.
AJAX applies client-side scripting to interconnect with the webserver and
modify information using JavaScript. By AJAX, the user can eliminate network
load and bandwidth usage and regain only the information that is compulsory to
give the user quicker interfaces and better receptive times. Response time is
rapid, therefore performance and rapidity are improved (Yang 2014). The
asynchronous document can be completed by using XML Http Demand, the
strength of AJAX applications. Therefore, requests are controlled successfully,
Learning
Outcome(s):
Evaluate the
effectiveness of
portals
1 Mark
Question Four
What are the advantages of combining multiple Ajax calls into one call? Write
any TWO.
Answer:-
The augmented user knowledge delivered by AJAX is the leading benefit.
AJAX permits webpages to inform serially by replacing a minor amount of
documents with the server. This method is probable to update portions of a
webpage without reloading the entire page (Wu et al. 2017). Official webpages
should reload the whole page and are unwieldy. AJAX raises the browser’s
presentation and services faster-browsing swiftness, thereby delivering reactive
user knowledge.
AJAX applies client-side scripting to interconnect with the webserver and
modify information using JavaScript. By AJAX, the user can eliminate network
load and bandwidth usage and regain only the information that is compulsory to
give the user quicker interfaces and better receptive times. Response time is
rapid, therefore performance and rapidity are improved (Yang 2014). The
asynchronous document can be completed by using XML Http Demand, the
strength of AJAX applications. Therefore, requests are controlled successfully,
Learning
Outcome(s):
Evaluate the
effectiveness of
portals
1 Mark
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Pg. 7 Question FourQuestion Four
and dynamic content loading is carried to higher elevations by improving the
performance significantly.
References:-
Aghaei-Foroushani, V. and Zincir-Heywood, A.N., 2015, January. A proxy identifier
based on patterns in traffic flows. In 2015 IEEE 16th International Symposium on High
Assurance Systems Engineering (pp. 118-125). IEEE.
Chen, L., Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R. and
Smith-Tone, D., 2016. Report on post-quantum cryptography (Vol. 12). US
Department of Commerce, National Institute of Standards and Technology.
Floratou, A., Minhas, U.F. and Özcan, F., 2014. Sql-on-hadoop: Full circle back to
shared-nothing database architectures. Proceedings of the VLDB Endowment, 7(12),
pp.1295-1306.
Harari, J.V., 2019. Textual strategies: Perspectives in post-structuralist criticism.
Cornell University Press.
Sathiyamoorthi, V., 2016. A novel cache replacement policy for web proxy caching
system using web usage mining. International Journal of Information Technology and
Web Engineering (IJITWE), 11(2), pp.1-13.
and dynamic content loading is carried to higher elevations by improving the
performance significantly.
References:-
Aghaei-Foroushani, V. and Zincir-Heywood, A.N., 2015, January. A proxy identifier
based on patterns in traffic flows. In 2015 IEEE 16th International Symposium on High
Assurance Systems Engineering (pp. 118-125). IEEE.
Chen, L., Chen, L., Jordan, S., Liu, Y.K., Moody, D., Peralta, R., Perlner, R. and
Smith-Tone, D., 2016. Report on post-quantum cryptography (Vol. 12). US
Department of Commerce, National Institute of Standards and Technology.
Floratou, A., Minhas, U.F. and Özcan, F., 2014. Sql-on-hadoop: Full circle back to
shared-nothing database architectures. Proceedings of the VLDB Endowment, 7(12),
pp.1295-1306.
Harari, J.V., 2019. Textual strategies: Perspectives in post-structuralist criticism.
Cornell University Press.
Sathiyamoorthi, V., 2016. A novel cache replacement policy for web proxy caching
system using web usage mining. International Journal of Information Technology and
Web Engineering (IJITWE), 11(2), pp.1-13.

Pg. 8 Question FourQuestion Four
Sysel, M. and Doležal, O., 2014. An educational HTTP proxy server. In Modern
Trends and Techniques in Computer Science (pp. 541-547). Springer, Cham.
Wong, G.R., Lau, D.H., Middeldorp, M.E., Harrington, J.A., Stolcman, S., Wilson, L.,
Twomey, D.J., Kumar, S., Munawar, D.A., Khokhar, K.B. and Mahajan, R., 2016.
Feasibility and safety of Reveal LINQ insertion in a sterile procedure room versus
electrophysiology laboratory. International journal of cardiology, 223, pp.13-17.
Wu, E., Psallidas, F., Miao, Z., Zhang, H., Rettig, L., Wu, Y. and Sellam, T., 2017,
January. Combining Design and Performance in a Data Visualization Management
System. In CIDR.
Yang, S., 2014, May. A Research on Dynamic Forms Verification Technology Based
on PHP+ Ajax. In 2nd International Conference on Teaching and Computational
Science. Atlantis Press.
Sysel, M. and Doležal, O., 2014. An educational HTTP proxy server. In Modern
Trends and Techniques in Computer Science (pp. 541-547). Springer, Cham.
Wong, G.R., Lau, D.H., Middeldorp, M.E., Harrington, J.A., Stolcman, S., Wilson, L.,
Twomey, D.J., Kumar, S., Munawar, D.A., Khokhar, K.B. and Mahajan, R., 2016.
Feasibility and safety of Reveal LINQ insertion in a sterile procedure room versus
electrophysiology laboratory. International journal of cardiology, 223, pp.13-17.
Wu, E., Psallidas, F., Miao, Z., Zhang, H., Rettig, L., Wu, Y. and Sellam, T., 2017,
January. Combining Design and Performance in a Data Visualization Management
System. In CIDR.
Yang, S., 2014, May. A Research on Dynamic Forms Verification Technology Based
on PHP+ Ajax. In 2nd International Conference on Teaching and Computational
Science. Atlantis Press.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 9
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





