Page 70 - DCAP312_WEB_TECHNOLOGIES_II
P. 70
Web Technologies-II
Notes 2. The HTML Server Controls have no mechanism of identifying the capabilities of the client
browser accessing the current page.
Version 3.0 of the .NET Framework is included with Windows Server 2008
and Windows Vista. Version 3.5 is included with Windows 7, and can also be
installed on Windows XP and the Windows Server 2003 family of operating
systems On 12 April 2010, .NET Framework 4 was released alongside Visual
Studio 2010.
Create a Web page using HTML controls.
Self Assessment Questions
Multiple Choice Questions
1. ......................to fetch fresh data and then update or add to a portion of the screen based
upon that data.
( a) Ajax (b) JavaScript
( c) Regular Expression (d) HTML
2. Web server controls are group of controls derived directly from the.....................................
( a) Registering (b) XML
( c) System (d) None of these
3. Textbox control requires the user to enter the password again to ensure they did
not.....................
( a) registering (b) mistype the original
( c) data model (d) validation control
4. The string data type with the range............................. to make sure that the value entered
falls within a specific range of characters.
( a) Required Field Validator (b) data layer support
( c) Web Server Controls (d) Validator server control
True or False
5. ASP.NET has changed this by giving us the capability to use the validation server controls
that are provided with the other new controls at our disposal.
( a) True (b) False
4.2 Validation Controls
One of the generally universal elements of Web pages is a form in which the users can payment
data that is posted back to the server. These forms are made up of different types of HTML
elements that are constructed using straight HTML, HTML server controls, or Web server controls.
A variety of HTML elements, such as text boxes, check boxes, radio buttons, drop-down lists
and more can be used in forms.
Often when our ASP.NET applications are collecting information from a user, we want to ensure
that the data that we collect is valid. Some users are not interested in spending enough time
to enter the correct information into a form, and in some cases, users might even intentionally
enter false information to gain access or get past a certain step in our application’s workflow
64 LOVELY PROFESSIONAL UNIVERSITY