The document discusses the architecture of ASP.NET, including its history, benefits, core components, execution model, and how ASP.NET applications are created. It covers the separation of presentation from logic in ASP.NET, the page and application lifecycles, and key components like Web Forms, Web Controls, Web.config, and Global.asax. It also provides an overview of how ASP.NET applications interface with Internet Information Server (IIS).
Microsoft� .NET and Microsoft� Office 2003Rishi Kothari
Topics to be covered
=====================================
XML capabilities in Microsoft� Excel 2003 and Microsoft� Word 2003
New Smart Tag features in Office 2003
Microsoft� Visual Studio Tools for the Microsoft Office System (Visual Studio Tools for Office)
Basics overview of C#. you can refer this link of learning more about C# interview questions
http://skillgun.com/csharp/interview-questions-and-answers
Topics Covered
==============================
Overview of .NET
Overview of ASP.NET
Creating an ASP.NET Web Form
Adding Event Procedures
Validating User Input
ABOUT DOT NET COURSE SCOPE:
The primary purpose behind this is technological innovation is becoming complicated every day with more personalized and simple to use programs. There are also changes in the purchasing styles and objectives of the clients. So all the dot net experts must update and change themselves with the modifying styles of technological innovation. They should obtain skills on enhance dot net technological innovation like ADVANCE DOT NET, ASP DOT NET with MVC etc.,
Students from Computer Science wish to create their career in programming or Software application development field, then dot net provides an excellent opportunity. Students who are willing to become a dot net developer they should be able to take into consideration that dot net has an excellent opportunity.
PROGRAM EDGES:
Our training segments are completely designed according to current IT market.
We offer regular, speed up and end of the week coaching in DOT NET training.
Our major concern is to offer DOT NET technology coaching to you so that you can be wiser and create effective programs and programs more quickly using any
After finishing DOT NET training, students can easily create and set up your own real-time DOT NET program.
Study material is provided with the course which includes ideas, illustrations and real-time illustrations.
Microsoft� .NET and Microsoft� Office 2003Rishi Kothari
Topics to be covered
=====================================
XML capabilities in Microsoft� Excel 2003 and Microsoft� Word 2003
New Smart Tag features in Office 2003
Microsoft� Visual Studio Tools for the Microsoft Office System (Visual Studio Tools for Office)
Basics overview of C#. you can refer this link of learning more about C# interview questions
http://skillgun.com/csharp/interview-questions-and-answers
Topics Covered
==============================
Overview of .NET
Overview of ASP.NET
Creating an ASP.NET Web Form
Adding Event Procedures
Validating User Input
ABOUT DOT NET COURSE SCOPE:
The primary purpose behind this is technological innovation is becoming complicated every day with more personalized and simple to use programs. There are also changes in the purchasing styles and objectives of the clients. So all the dot net experts must update and change themselves with the modifying styles of technological innovation. They should obtain skills on enhance dot net technological innovation like ADVANCE DOT NET, ASP DOT NET with MVC etc.,
Students from Computer Science wish to create their career in programming or Software application development field, then dot net provides an excellent opportunity. Students who are willing to become a dot net developer they should be able to take into consideration that dot net has an excellent opportunity.
PROGRAM EDGES:
Our training segments are completely designed according to current IT market.
We offer regular, speed up and end of the week coaching in DOT NET training.
Our major concern is to offer DOT NET technology coaching to you so that you can be wiser and create effective programs and programs more quickly using any
After finishing DOT NET training, students can easily create and set up your own real-time DOT NET program.
Study material is provided with the course which includes ideas, illustrations and real-time illustrations.
Integrating ASP.NET AJAX with SharePointRob Windsor
SharePoint provides a great infrastructure for quickly building intranet and Internet applications. ASP.NET AJAX provides a foundation for creating highly productive Web interfaces. Combined they are two great tastes that taste great together! In this session we will cover the basics of working with ASP.NET AJAX inside of SharePoint 2007. We will take a look at how to prepare a Web Application for ASP.NET AJAX, and how to use various ASP.NET AJAX tools such as the JavaScript libraries, JSON-enabled Web services, and UpdatePanels to build add rich interactivity to your SharePoint sites.
Web applications and web servers, HTML form Development, GET and POST, ASP.NET application, ASP.NET namespaces, creating sample C# web Applications, architecture, Debugging and Tracing of ASP.NET, Introduction to web Form controls. Building Web Services- web service namespaces, building simple web
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
2. Table of Contents
1. Introduction to ASP.NET
History of ASP.NET
ASP.NET Benefits
2. ASP.NET Architecture Overview
Separation of Presentation from Logic
3. ASP.NET Base Components
Web Forms
Web Controls
2
3. Table of Contents (2)
4. ASP.NET Execution Model
Application Life Cycle
Page Life Cycle
5. Internet Information Server (IIS 5.1/6.0/7.0)
6. Creating ASP.NET forms
7. Code-behind
8. Directives
3
5. History of ASP.NET
At the beginning of Internet (up to 1997)
CGI, ISAPI – C, C++
Classic ASP (1997-2002)
Based onVB Script, COM, ADO
ASP.NET 1.0 / 1.1 (2002-2005)
The First .NET based Web Development API
ASP.NET 2.0 (2005-2007) – based on .NET 2.0
ASP.NET 3.5 (2007-2009) – LINQ to SQL
ASP.NET 4.0 (2010)
5
6. ASP.NET Benefits
Separate presentation from code
Object-oriented approach
Component-based development
Event-driven architecture
Code compilation
Extensible architecture
Built-in state management
Many others (data binding, validation, master
pages, etc.)
6
8. ASP.NET Execution
ASP.NET applications are executed via a sequence
of HTTP requests and HTTP responses
Client Web browser request ASPX pages
TheWeb server executes the ASPX page and
produce XHTML + CSS + JavaScript
8
9. ASP.NET Architecture
Windows Server
Internet Information Server (IIS) ISAPI Filters (aspnet_isapi.dll)
ASP.NET runtime (aspnet_wp.dll / w3wp.dll)
XML-based
configuration
HttpApplication Cache
HttpModules
Session state Authentication …
HttpHandlers
ASP.NET pages ASP.NETWeb services …
Html Controls AJAX
Web controls User controls …
10. ASP.NET: How it Works?
Traditional Web pages (static HTML)
Consist of static HTML, images, styles, etc.
Execute code on the client side
Simple operations
ASP.NET Web Forms
Execute code on the server side
Database access
Dynamic pages
Higher security level
10
11. SeparateVisualization
from Business Logic
Traditional Web development keep HTML and
programming code in one file (PHP, ASP, …)
Hard to read, understand and maintain
Hard to test and debug
ASP.NET splits the Web pages into two parts:
.aspx file containing HTML for visualization
"Code behind" files (.cs for C#) containing
presentation logic for particular page
11
12. SeparateVisualization
from Business Logic (2)
Class generated from the
.aspx file does not derives
directly from Page class
Derives from class defined
in the "code behind", where
it is easy to add methods,
event handlers, etc.
Using "code behind"
separates the presentation
logic from UI visualization
12
System.Web.UI.Page
TestForm.aspx.cs
TestForm.aspx
13. Your First ASP.NET
Application – Sumator
Steps to create a simple ASP.NET Web
application:
1. StartVisual Studio
2. Create “New Web Site”
3. Add two text fields, a button and a label
4. Handle Button.Click and implement logic
to calculate the sum of the values in the
text fields
5. Display the results in the label
13
16. ASP.NET Base Components
Web Forms – deliver ASP.NET user interface
Web Control – the smallest part we can use in
our Web application (e.g. text box)
"Code behind" – contains the server-side code
Web.config – contains ASP.NET application
configuration
Machine.config – contains configuration for
all applications on the ASP.NET server
Global.asax – class containing application
level event handlers
16
17. ASP.NET Web Controls
ASP.NET Web controls are the smallest
component part
Deliver fast and easy component-oriented
development process
HTML abstraction, but finally everything is
HTML
17
<form runat="server" ID="frmMain">
<asp:button runat="server" ID="btn"
Text="Click me!" OnClick="btn_Click" />
</form>
18. Web.config
Main settings and configuration file for ASP.NET
Text based XML document
Defines:
Connection strings to any DB used by app
The default language for child pages
Whether debugging is allowed
18
<?xml version="1.0" encoding="utf-8" ?>
<configuration>
<system.web>
</system.web>
</configuration>
Minimal Web.config
should look like this
20. Global.asax
Also known as ASP.NET application file
Located in the Web application root folder
Exposes application and session level events
Application_Start
Application_End
Session_Start
Session_End
…
20
25. ASP.NET Application Lifecycle
1. IIS receives the HTTP request
2. IIS using ISAPI sends the request to
aspnet_wp.exe
3. ASP.NET receives request for the first time
4. Basic ASP.NET objects are created for every
request (e.g. Request, Response, etc.)
5. Request is associated with the
HttpApplication object
6. HttpApplication process the request
25
27. ASP.NET Lifecycle Events (2)
PreInit
Create or recreate controls, set the master page or theme
Init
InitComplete
PreLoad
Load
LoadComplete
PreRender
PreRenderComplete
SaveStateComplete
Unload
27
28. ASP.NET Lifecycle Events (3)
PreInit
Init
All controls are initialized
Use it to set some control properties
InitComplete
PreLoad
Load
LoadComplete
PreRender
PreRenderComplete
SaveStateComplete
Unload
28
29. ASP.NET Lifecycle Events (4)
PreInit
Init
InitComplete
Use it when you need all the control initialization done
PreLoad
Load
LoadComplete
PreRender
PreRenderComplete
SaveStateComplete
Unload
29
30. ASP.NET Lifecycle Events (5)
PreInit
Init
InitComplete
PreLoad
Some processing before Load event
After this the Page object loads the view-state
Load
LoadComplete
PreRender
PreRenderComplete
SaveStateComplete
Unload
30
31. ASP.NET Lifecycle Events (6)
PreInit
Init
InitComplete
PreLoad
Load
Here we do common processing (e.g. bind controls)
LoadComplete
PreRender
PreRenderComplete
SaveStateComplete
Unload
31
32. ASP.NET Lifecycle Events (7)
PreInit
Init
InitComplete
PreLoad
Load
LoadComplete
PreRender
Executed after data binding
Make some final changes over controls
PreRenderComplete
SaveStateComplete
Unload
32
33. ASP.NET Lifecycle Events (8)
PreInit
Init
InitComplete
PreLoad
Load
LoadComplete
PreRender
PreRenderComplete
Happens right before the page content is rendered
SaveStateComplete
Unload
33
34. ASP.NET Lifecycle Events (9)
PreInit
Init
InitComplete
PreLoad
Load
LoadComplete
PreRender
PreRenderComplete
SaveStateComplete
Any changes over the page content are ignored
Unload
34
38. IIS 5.1 / 6.0
IIS 5.1
Comes withWindows XP
Only 10 simultaneous connections
A single web site
IIS 6.0
Comes with Windows Server 2003 and
Windows XP Professional x64 edition
IPv6 support
Faster and more secure
38
39. IIS / 7.0
IIS 7.0
Comes with WindowsVista and Windows
Server 2008
No connection limit
Restricts performance based on active
concurrent requests
39
40. Internet Information Server
IIS is a traditional HTTP server
Can process static and dynamic content
(through the ISAPI interface)
Handles ASP.NET requests through ISAPI
extension for .NET Framework
aspnet_wp.exe (w3wp.exe in Server 2003)
ISAPI filter (Internet Server Application
Program Interface)
aspnet_isapi.dll
40
42. What is a Web Form
ASP.NET Web Form is a programmable Web
page (.aspx file)
Acts as a user interface (UI) of an ASP.NET
application
Consists of HTML, code and controls which are
executed on a web server
The user sees the result in the form of HTML
generated by the web server
The code and controls which describe the web
form don’t leave the server
43
43. Creating a Web Form
The functionality of the Web form is defined
by using three layers of attributes
44
<%@ Page Language="c#"
Codebehind="TestWebForm.aspx.cs"
Inherits="MyFirstWebApplication.WebForm"%>
<html>
<head><title>My First WebForm</title></head>
<body>
<form id="TestForm" method="post">
<asp:Button ...></asp:Button>
</form>
</body>
</html>
44. Creating a Web Form (2)
Page attributes define global functionality
45
<%@ Page Language="c#"
Codebehind="TestWebForm.aspx.cs"
Inherits="MyFirstWebApplication.WebForm"%>
<html>
<head><title>My First WebForm</title></head>
<body>
<form id="TestForm" method="post">
<asp:Button ...></aspButton>
</form>
</body>
</html>
45. Creating a Web Form (3)
body tags define the appearance of a web page
46
<%@ Page Language="c#"
Codebehind="TestWebForm.aspx.cs"
Inherits="MyFirstWebApplication.WebForm"%>
<html>
<head><title>My First WebForm</title></head>
<body>
<form id="TestForm" method="post">
<asp:Button ...></aspButton>
</form>
</body>
</html>
46. Creating a Web Form (4)
form attributes define how the groups of
controls are going to be processed
47
<%@ Page Language="c#"
Codebehind="TestWebForm.aspx.cs"
Inherits="MyFirstWebApplication.WebForm"%>
<html>
<head><title>My First WebForm</title></head>
<body>
<form id="TestForm" method="post">
<asp:Button ...></aspButton>
</form>
</body>
</html>
47. The <form>Tag
Defines how the controls are going to be
processed
In a Web form there can be several <form>
tags
Only one server-side <form> tag
48
HTML version
<form>…</form>
<form>…</form>
<form>…</form>
ASP.NET version (only 1)
<form runat="server">…</form>
<form>…</form>
<form>…</form>
48. <form> Attributes
id – form identifier
method - specifies the method of sending
information back to the server
GET – in the URL
POST – within the body of the HTTP request
runat - tells the parser that the tag is not an
HTML element but an ASP.NET server control
49
49. Example: WebFormTest.aspx
50
<%@ Page language="c#" Codebehind="WebFormTest.aspx.cs"
AutoEventWireup="false" Inherits="WebFormTest.WebForm" %>
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0
Transitional//EN">
<html><head>
<title>WebFormTest</title>
<meta name="GENERATOR" Content="Microsoft Visual
Studio 7.0">
<meta name="CODE_LANGUAGE" Content="C#">
<meta name="vs_defaultClientScript"
content="JavaScript">
<meta name="vs_targetSchema"
content="http://schemas.microsoft.com/intellisense/ie5">
</head><body MS_POSITIONING="GridLayout">
<form id="FormTest" method="post" runat="server">
'HTML and controls go here
</form>
</body></html>
52. Writing Code
Writing code in an ASP.NETWeb form is done
in three ways:
Mixed code method
The code is in the same file as the web content,
mixed with the HTML code
This method is not recommended as the source
code is hard to read and maintain
Inline code method
Code-behind method
53
53. Writing Code (2)
Writing code in an ASP.NET web form is done
in three ways:
Mixed code method
Inline code method
The code is separated in a SCRIPT section in the
same file
Code-behind method
54
54. Writing Code (3)
Writing code in an ASP.NET web form is done
in three ways:
Mixed code method
Inline code method
Code-behind method
The code is in the code-behind page – a separate
file from the HTML content
When usingVisual Studio .NET this is the default
method
55
57. Code-behind Model
A separate compiled file containing the
program logic of the page
Each web page has its own code-behind page
Has the same name as the web page to which
it is attached
The file extension is .aspx.cs
The two files are built into one when the
application is started
58
58. How Does Code-behind Work?
To associate an .aspx page to its code-behind
class the @Page directive is used
VS.NET adds three attributes to the @Page
directive:
Inherits – allows the .aspx page to derive
from the code-behind class
Codebehind – used internally byVisual Studio
.NET to associate the files
Src – contains the name of the code-behind
page
Used if the application is not precompiled
59
60. JIT Compilation
The Code-behind page can be either
precompiled or just-in-time (JIT) Compiled
JIT compilation
A compilation at first request
Set by the Src attribute of the @Page directive
VS.NET doesn’t add it by default
61
61. Precompilation
Precompilation
Avoids the delay at first request
Simplifies the deployment of the web
application
The source code of the code-behind class is not
necessary
62
63. Directives
Provide control over many options affecting the
compilation and execution of the web form
Important directives:
@Page – main directive of the page
@Import – imports a namespace into the
@Assembly – attaches an assembly to the form
when it is compiled
@OutputCache – controls the ability of the forms
to use cache
@Register – registers a user control to be used
in a web form
64
64. The @Page Directive
Defines a form specific (.aspx file) attributes
used by the parser and the compiler of
ASP.NET
Important attributes:
AutoEventWireup
Culture – a culture used when the page is
generated
UICulture – a culture used for the visualization
of data
65
65. The @Page Directive (2)
Important attributes:
Debug – whether the page is compiled with
debug symbols in it
EnableSessionState – whether a session is
supported
EnableViewState – whether to use "view
state“ or not
ErrorPage – a page to which to redirect in case
of unhandled exception
66
66. The @Page Directive (3)
Important attributes:
Language – states the program language used
to script the page
Codebehind – points to the code-behind file
where the page logics is stored
Smart-Navigation – improves user experience
over post backs
Persists element focus and scroll position
Avoids flickers
Supported by IE 5.5 or later
Shouldn’t use it - problematic
67
69. Homework
1. Create aWebPage
PageLoad event:TodayLabel.Text = DateTime.Now.ToLongDateString()
Khi click LoginButton :
1. Nếu NameTextBox.Text == “admin” và PasswordTextbox.Text == “password”
thì StatusLabel.Text = “Hi Admin”
2. Nếu không thì StatusLabel.Text = “Login Error”
70
Today: [TodayLabel]
Name : [NameTextBox]
Password: [PasswordTextBox]
[LoginButton]
[StatusLabel]
Editor's Notes
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*
(c) 2008 National Academy for Software Development - http://academy.devbg.org. All rights reserved. Unauthorized copying or re-distribution is strictly prohibited.*