Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Engineering Expert

problem1. Consider the following XML document that contains information on people, books and literature prizes: 

 
  Nadine Gordimer
  J M Coetzee
 
    The Conservationist
  
 

 
    Life and Times of Michael K
  
 

 
    Disgrace
  
 

  
    The Nobel Prize in Literature
   
    1991
   
  

 

 
    The Booker Prize
    1974
    1983
    1999
 

The above representation captures facts such as the Nobel Prize in Literature was awarded to Nadine Gordimer in 1991 and the Booker Prize was awarded for the book with title "Disgrace" in 1999.

(i) prepare a DTD fragment which comprises element and attribute declarations for the elements person, award and author.

(ii) prepare an XSLT template rule which will produce an HTML table of awards of the Booker Prize. The table should have two columns: the first containing the year of the award, the second containing the title of the book that won the prize in that year.

problem2. Discuss three properties of the WebService attribute.

problem3. Discuss three properties of the WebMethod attribute.

problem4. describe how the following protocols are used to invoke an XML Web Service:

(i)  HTTP-Get

(ii)  HTTP-Post

(iii)  SOAP.

problem5. Using a diagram, illustrate how SOAP serialization  / deserialization works when implementing a Web Service.

problem6. prepare a .NET Web Service to create a currency converter that converts US Dollar to the following currencies:

England:   0.686

Canada:    1.603

EURO:     1.118

The Parameter inputs are: Country and Amount.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M95286

Have any Question? 


Related Questions in Computer Engineering

Think about a time when you were required to accomplish a

Think about a time when you were required to accomplish a new or nonroutine task at work that had the potential to cause injury or illness. Discuss how a management of change process could be used to reduce the risks. Wh ...

1 why was vbscript not very popular2 the biggest script

1. Why was VBScript not very popular? 2. The biggest script security threat has always been the acceptance of untrusted data. What is the best way for scripts to accept data and preserve the trust?

Al was an attorney in a small town and was very well

Al was an attorney in a small town and was very well respected. A couple retained Al to represent them on the purchase of a home. Before closing, Al informed the couple of payments that they were required to make by chec ...

1 for each mux show the values of its data output during

1. For each Mux, show the values of its data output during the execution of this instruction and these register values. 2. For the ALU and the two add units, what are their data input values? 3. What are the values of al ...

Read the summary of business rules published by the guide

Read the summary of business rules published by the GUIDE Business Rules Project (1997) and the article by Gottesdiener (1997). Search the Web for additional information on business rules. Then write a three-page executi ...

The next day at sls found everyone in technical support

The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop computer ...

Assume that our network never corrupts loses or duplicates

Assume that our network never corrupts, loses, or duplicates packets. We are only concerned about flow control. We do not want the sender to overwhelm the receiver with packets. Design an FSM to allow the sender to send ...

Define a class whose instances represent request and reply

Define a class whose instances represent request and reply messages as illustrated in Figure 4.13. The class should provide a pair of constructors, one for request messages and the other for reply messages, showing how t ...

1 what are kerberos authentication path how do they solve

1. What are Kerberos authentication path? How do they solve the problem of remote authentication? 2. The Kerberos system has several bugs that pose potential security risks. Study the Kerberos ticketing service and discu ...

We consider certificate generation with ca-generated keys

We consider certificate generation with CA-generated keys. Assume the second transmission of (CertA, kpr,A) takes place over an authenticated but insecure channel, i.e., Oscar can read this message. 1. Show how he can de ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen