Saturday, October 31, 2015

Web Services Model In ASP.NET

The Web Services Model OR architectures



The Web Services architecture is based upon the interactions between three roles:
Service provider, service registry and service requestor.

The interactions involve the publish, find and bind operations.

Roles in Web Services Architecture
There are three major roles within the web service architecture:
Service Provider
This is the provider of the web service. The service provider implements the service and makes it available on the Internet.
Service Requestor
This is any consumer of the web service. The requestor utilizes an existing web service by opening a network connection and sending an XML request.
Service Registry
This is a logically centralized directory of services. The registry provides a central place where developers can publish new services or find existing ones. It therefore serves as a centralized clearing house for companies and their services.

Operations in a Web Service Architecture
For an application to take advantage of Web Services, three behaviors must take place:
publish, find and binding.
In detail, these operations are:
Publish. To be accessible, a service description needs to be published so that the
service requestor can find it.
Find. In the find operation, the service requestor retrieves a service description directly
or queries the service registry for the type of service required
Bind. In the bind operation the service requestor invokes or initiates an interaction with the service at runtime

History of the Web Services Specification

Web Services Description Language (WSDL); Universal Description and Discovery (UDDI); and SOAP formed the original Web Services specification. This section provides a history.
Web Services Description Language (WSDL)
For our purposes, we can say that a WSDL file is an XML document that describes a set of SOAP messages and how the messages are exchanged.
The Web Services Description Language (WSDL) forms the basis for the original Web Services specification. The following figure illustrates the use of WSDL. At the left is a service provider. At the right is a service consumer. The steps involved in providing and consuming a service are:
  1. A service provider describes its service using WSDL. This definition is published to a repository of services. The repository could use Universal Description, Discovery, and Integration (UDDI). Other forms of directories could also be used.
  2. A service consumer issues one or more queries to the repository to locate a service and determine how to communicate with that service. 
  3. Part of the WSDL provided by the service provider is passed to the service consumer. This tells the service consumer what the requests and responses are for the service provider.
  4. The service consumer uses the WSDL to send a request to the service provider.
  5. The service provider provides the expected response to the service consumer.


Universal Description, Discovery, and Integration (UDDI)

Universal Discovery Description and Integration is the yellow pages of Web services. As with traditional yellow pages, you can search for a company that offers the services you need, read about the service offered and contact someone for more information. You can, of course, offer a Web service without registering it in UDDI, just as you can open a business in your basement and rely on word-of-mouth advertising but if you want to reach a significant market, you need UDDI so your customers can find you.
A UDDI directory entry is an XML file that describes a business and the services it offers. There are three parts to an entry in the UDDI directory. The "white pages" describe the company offering the service: name, address, contacts, etc. The "yellow pages" include industrial categories based on standard taxonomies such as the North American Industry Classification System and the Standard Industrial Classification. The "green pages" describe the interface to the service in enough detail for someone to write an application to use the Web service.

 

 

SOAP


SOAP at one time stood for Simple Object Access Protocol.
Soap is the communications protocol for XML Web services.
SOAP essentially provides the envelope for sending the Web Services messages. SOAP generally uses HTTP
The next figure provides more detail on the messages sent using Web Services. At the left of the figure is a fragment of the WSDL sent to the repository. It shows a CustomerInfoRequest that requires the customer's account to object information. Also shown is the CustomerInfoResponse that provides a series of items on customer including name, phone, and address items.

At the right of this figure is a fragment of the WSDL being sent to the service consumer. This is the same fragment sent to the repository by the service provider. The service consumer uses this WSDL to create the service request shown above the arrow connecting the service consumer to the service provider. Upon receiving the request, the service provider returns a message using the format described in the original WSDL. That message appears at the bottom of the figure.
XML is used to define messages. XML has a tagged message format.
Examples for Web Service

Weather Reporting: You can use Weather Reporting web service to display weather information in your personal website.

Stock Quote: You can display latest update of Share market with Stock Quote on your web site.

News Headline: You can display latest news update by using News Headline Web Service in your website.

Advantages of Web Service

Web Service messages are formatted as XML, a standard way for communication between two incompatible system. And this message is sent via HTTP, so that they can reach to any machine on the internet without being blocked by firewall.

In short
What is SOAP?

SOAP (simple object access protocol) is a remote function calls that invokes method and execute them on Remote machine and translate the object communication into XML format. In short, SOAP are way by which method calls are translate into XML format and sent via HTTP.

What is WSDL? 

WSDL stands for Web Service Description Language, a standard by which a web service can tell clients what messages it accepts and which results it will return.
WSDL contains every detail regarding using web service and Method and Properties provided by web service and URLs from which those methods can be accessed and Data Types used.

What is UDDI?

UDDI allows you to find web services by connecting to a directory.




Friday, October 30, 2015

Example of Experience Certificate

Experience Certificate




This is to certify that Mr ___________________________________ has been working with us in this hardware field as a designation of office Assistant for 5-6 month to till date. We are very much satisfied with the performance and also he is a very hard working and dedicated person. He is a very sincere and loyal person and over the period of his work with the company has proved to be an asset for the company.


 We wish his the best of luck in all his future prospects.
 
Signature: _______________________________
 

Address: ________________________________
________________________________________
Phone: __________________________________
E-mail: ____________________________________
 
 

Thursday, October 8, 2015

CANVAS DESIGN FOR GTU 7th SEM

AEIOU Summary Canvas



Empathy Summary




Ideation Canvas



Product Development Canvas



Wednesday, October 7, 2015

INTRODUCTION ABOUT COMPUTER SECURITY & CYBER SECURITY


What is Computer Security?

Computer Security is the protection of computing systems and the data that they store or access.
In a generic sense, security is "freedom from risk or danger." In the context of computer science, security is the prevention of, or protection against,
Access to information by unauthorized recipients, and intentional but unauthorized destruction or alteration of that information1
This can be re-stated: "Security is the ability of a system to protect information and system resources with respect to confidentiality and integrity." Note that the scope of this second definition includes system resources, which include CPUs, disks, and programs, in addition to information.
Component Security :-
Computer security is frequently associated with three core areas, which can be conveniently summarized by the acronym "CIA":
Confidentiality -- Ensuring that information is not accessed by unauthorized persons
Integrity -- Ensuring that information is not altered by unauthorized persons in a way that is not detectable by authorized users
Authentication -- Ensuring that users are the persons they claim to be
Computer security is not restricted to these three broad concepts. Additional ideas that are often considered part of the taxonomy of computer security include:
Access control -- Ensuring that users access only those resources and services that they are entitled to access and that qualified users are not denied access to services that they legitimately expect to receive.
Nonrepudiation -- Ensuring that the originators of messages cannot deny that they in fact sent the messages2
Availability -- Ensuring that a system is operational and functional at a given moment, usually provided through redundancy; loss of availability is often referred to as "denial-of-service"
Privacy -- Ensuring that individuals maintain the right to control what information is collected about them, how it is used, who has used it, who maintains it, and what purpose it is used for
What is Cyber Security?
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction.

Monday, October 5, 2015

Important Question Bank of C++




MOST IMP QUESTION BANK





Chapter 1 : CONCEPTS OF OOP
1)
Explain basic concepts of Object-Oriented Programming. (07 marks)
2)
How does main() function in C differ from C++? Give General format of
Class. (02 marks)





Chapter 2 : C++ BASICS
1)
What is Reference variable? What is its major use? Give Example.(04 marks)
2)
Describe various operators in C++. (07 marks)





Chapter 3 : C++ FUNCTIONS
1)
Define Function Overloading. Give proper example. (03 marks)
2)
Explain Scope Resolution Operator with example. (03 marks)
3)
What is Inline Function? In which Situation Inline Function may not work? How
does an inline function differ from a preprocessor macro? Write program using
Inline Function to find largest of three numbers. (07 marks)
4)
Describe following terms in C++ with suitable examples.
Function overloading, Inline function, Default arguments, Call by reference. (07 marks)








Chapter 4 : CLASSES AND OBJECTS , CONSTRUCTOR & OPERATOR OVERLOADING
1)
What is the purpose of Static? Write Characteristics of Static Data Member and
Static Member Function. Write a program that demonstrates the Static Data
Member And static member function. (07 marks)
2)
Create a class Account. It has three data member account id, name and balance.
Define function to assign value and display value. Define function that search
account number given by the user. If account number exists, print detail of that
account. Write a program using array of object. Declare at least 5 account and
print details. (07 marks)
3)
Define a class Time with hours and minutes as two data members, add
necessary member functions to initialize and display data of class. Do not use
constructors in a class. Define a member function sum() which adds two Time
objects. Invoke the statements like T3.sum(T1, T2) in main (). (07 marks)
OR
Define a class complex with real and imaginary as two data member, add
necessary constructors and member function to initialize and display data of
class. Class should overload the + operator to add two complex objects and
return the results. Invoke the statements like C3=C1+C2 in main ().(07 marks)

4)
Define Friend Function. Create two classes DM and DB which store the value of
distances. DM stores distances in meters and centimeters and DB in feet and
inches. Write a program that can read values for the class objects and add one
object of DM with another object of DB. Use a friend function to carry out the
addition operation. The object stores the results may a DM object or DB
object, depending on the units in which the results are required. The display
should be in the format of feet and inches or meters and centimeters depending
on the object on display.
1 Feet = 0.3048Meter 1Meter = 3.28 Feet
1 Inch = 2.54 Centimeter 1 Centimeter = 0.3937 Inch (07 marks)

OR
Explain Friend function and its characteristics. Define a class matrix with an
integer array of 3X3 as a data member. Define a friend function which adds
two matrix objects and returns resultant matrix object. (07 makrs)
5)
What is a constructor? Which are the special characteristics of constructor
functions? What is the need of “do-nothing” implicit constructor? When the
destructor function invoked? (07 marks)
6)
What is Constructor? Write the characteristics of constructor function. Define Class named point which represents 2-D Point, i.e P(x, y). Define Default constructor to initialize both data member value 5, Parameterized constructor to initialize member according to value supplied by user and Copy Constructor. Define Necessary Function and Write a program to test class Point. (07 marks)


7)
Define Operator overloading. Create class Time that has three data members
hour, minute and second and two constructor, default constructor and
parameterized constructor to initialize data member. Write a program to add two
times by overloading operator +. (07 marks)
8)
What is Type conversion? Explain Basic to class type conversion with
example. (04 marks)
OR
Explain the type conversion from basic type to class type and from class type
to basic type with proper example. (07 marks)





Chapter 5 : Inheritances
1)
Explain Visibility mode. (Marks :3)
2)
Define Inheritance. Write the types of Inheritance. Explain Inheritance with
Example. Consider Example with respect to print result of Student and Student
Details. (Marks :7)
3)
Explain Virtual base class with example. (Marks :7)



Chapter 6 : Polymorphism
1)
Explain this pointer. (Marks :3)
2)
Explain generic pointer. (Marks :2)
3)
How is Polymorphism achieved at Compile Time and Run Time. (Marks :3)
4)
Define and Discuss Pure Virtual Function. (Marks :2)
5)
How do they differ ? :
char const * ptr (Marks :2)
char * const ptr
6)
Explain pointer to objects. What is this pointer? Write a complete program to
illustrate the use of this pointer. (Marks :7)


7)
Explain Runtime polymorphism. Explain and demonstrate, how virtual
function to achieve runtime polymorphism? (Marks :7)




Chapter 7 : I/O File Management
1)
Write a program that reads a text file and creates another file that is identical
except that every character is in upper case. (Marks :7)
2)
What is a stream? Describe various stream classes for console I/O operations. (Marks :7)
3)
Explain File Pointers and functions for their manipulation. (Marks :7)



Chapter 8 : Templates , Exception and STL
1)
What is Generic Programming? How it is implemented in C++.Write General
format of class templates and function Template. Write program to swap
Number using Function Template. Function prototype is given below:
void swap(int, int , float , float ).
Swap two integer number and swap two float number. (Marks :7)
2)
What is Exception? Explain Exception HandlingMechanism.Write a program
that demonstrates use of multiple catch. Add at least three catch block in your program. (Marks :7)
3)
Explain with the help of an example why templates are used in programming? (Marks :7)
4)
What is an exception? What are the advantages of using exception handling in
a program? Illustrate C++ exception handling mechanism. (Marks :7)