asp外文翻译---ASP技术在电子商务中的运用
asp名词解释

asp名词解释ASP(Active Server Pages),又称为动态网页,是一种基于服务器端的网页技术,用于动态生成网页内容。
ASP可以让网站在用户请求页面时,动态地生成网页内容并发送给用户,使网站能够根据用户需求和数据变化实时更新网页内容。
ASP是一种脚本语言,它使用VBScript或JScript来编写脚本代码,通过与服务器交互,生成可响应用户请求的HTML网页。
ASP的工作原理是通过在服务器上安装ASP引擎,将ASP页面中的脚本代码解释和执行,然后将生成的HTML页面发送给请求页面的浏览器,浏览器再将页面显示给用户。
ASP脚本代码可以嵌入在HTML页面中,使用尖括号(<% 和 %>)将其包围起来。
脚本代码可以执行各种操作,如查询数据库、处理用户输入、生成动态内容等。
ASP的特点是灵活、可扩展和易于维护。
由于ASP使用脚本语言编写,使得开发人员可以方便地修改和调试程序,从而实现灵活的网页内容生成。
ASP还支持与其他技术的集成,如数据库、XML、COM组件等,使得开发人员能够轻松地获取和处理数据,实现更复杂的功能。
与静态网页相比,ASP生成的网页内容可以根据用户的请求和数据的变化进行实时更新,使得网站具有更强的交互性和动态性。
此外,ASP还提供了丰富的内置对象和方法,用于处理用户请求、操作数据库、验证用户输入等,方便了开发人员的工作。
ASP在Web开发中的应用非常广泛。
它可以用于创建各种类型的网站,如电子商务网站、社交媒体网站、论坛、博客等。
ASP的应用范围也涵盖了企业内部的应用开发,如办公系统、人力资源管理系统、客户关系管理系统等。
另外,ASP还可以与其他技术和平台集成,如、PHP、Java等,实现更复杂的应用。
总之,ASP是一种服务器端的网页技术,通过动态生成网页内容,实现了网页的实时更新和动态交互。
它具有灵活、可扩展和易于维护的特点,广泛应用于网站开发和企业应用开发中。
ASP的名词解释

ASP的名词解释ASP(Active Server Pages)是一种用于动态构建和交互网页的技术。
它是一种服务器端脚本语言,常用于开发Web应用程序,尤其是在动态内容处理方面。
本文将对ASP的名词进行解释,介绍ASP的相关概念和功能。
1. ASPASP指的是Active Server Pages,它是一种基于服务器端脚本的技术。
与传统的静态网页不同,ASP网页可以根据用户请求动态生成内容。
其基本原理是将ASP代码嵌入到HTML页面中,当访问ASP页面时,服务器会对ASP代码进行解析和执行,最后将生成的HTML代码发送给用户的浏览器。
2. IISIIS(Internet Information Services)是微软开发的Web服务器软件,用于托管和管理ASP网页。
IIS提供了对ASP的全面支持,能够解析和执行ASP代码。
它还提供了一套功能强大的管理工具,用于配置和维护Web服务器。
3. ASP对象模型ASP对象模型是ASP技术的一个重要概念。
它定义了一系列对象和属性,用于实现ASP页面的功能。
常用的ASP对象包括Request对象、Response对象、Server对象等。
这些对象可以通过ASP代码进行操作,实现与用户交互、数据处理、文件操作等功能。
4. ASP脚本语言ASP脚本语言指的是在ASP页面中使用的脚本语言。
ASP最初采用VBScript作为默认的脚本语言,后来也逐渐支持JScript等其他脚本语言。
脚本语言用于编写ASP页面中的逻辑代码,与HTML代码相互嵌入,实现动态内容的生成和处理。
5. 数据库连接ASP可以方便地与数据库进行连接和操作。
通过使用数据库连接对象和查询语言,ASP可以从数据库中读取数据,并将其展示在网页上。
常用的数据库连接方式包括ADO(ActiveX Data Objects)和ODBC(Open Database Connectivity)等。
6. Session和CookieASP提供了Session和Cookie这两个机制,用于实现用户状态的存储和传递。
电子商务中几种通用的网络技术

电子商务中几种通用的网络技术电子商务现在可以被广泛地应用与推广,最根本的就是就是强大的网络信息技术,下面YJBYS店铺为大家搜索整理了关于电子商务中几种通用的网络技术,欢迎参考阅读,希望对大家有所帮助!想了解更多相关信息请持续关注我们应届毕业生培训网!一、ASP技术ASP是Active Server Page的缩写,意为“活动服务器网页”。
ASP是微软公司开发的代替CGI脚本程序的一种应用,它可以与数据库和其它程序进行交互,是一种简单、方便的编程工具。
与HTML相比,ASP网页具有以下特点:1.利用ASP可以实现突破静态网页的一些功能限制,实现动态网页技术;2.ASP文件是包含在HTML代码所组成的文件中的,易于修改和测试;3.服务器上的ASP解释程序会在服务器端制定ASP程序,并将结果以HTML格式传送到客户端浏览器上,因此使用各种浏览器都可以正常浏览ASP所产生的网页;4.ASP提供了一些内置对象,使用这些对象可以使服务器端脚本功能更强。
例如可以从web浏览器中获取用户通过HTML表单提交的信息,并在脚本中对这些信息进行处理,然后向web浏览器发送信息;5.ASP可以使用服务器端ActiveX组件来执行各种各样的任务,例如存取数据库、发现哦那个Email或访问文件系统等。
6.由于服务器是将ASP程序执行的结果以HTML格式传回客户端浏览器,因此使用者不会看到ASP所编写的原始程序代码,可防止ASP程序代码被窃取。
二、流媒体技术流媒体技术也称流式媒体技术.所谓流媒体技术就是把连续的影像和声音信息经过压缩处理后放上网站服务器,让用户一边下载一边观看、收听,而不要等整个压缩文件下载到自己的计算机上才可以观看的网络传输技术。
该技术先在使用者端的计算机上创建一个缓冲区,在播放前预先下一段数据作为缓冲,在网路实际连线速度小于播放所耗的速度时,播放程序就会取用一小段缓冲区内的数据,这样可以避免播放的中断,也使得播放品质得以保证。
电子商务系统设计与实现实验报告

电子商务系统设计与实现实验报告实验一:认识Web开发方法1.HTML(HyperT extMark-upLanguage)即超文本标记语言,是WWW的描述语言。
html或者htm是一种静态的页面格式,也就是说不需要服务器解析其中的脚本,或者说里面没有服务器端执行的脚本。
htm(和html性质是一样的)其实是静态的网页文件,它只包含简单的网页语言,不包含服务器脚本或指令Active Server Pages(ASP,活动服务器页面)是一个编程环境,在其中,可以混合使用HTML、脚本语言以及组件来创建服务器端功能强大的Internet应用程序。
ASP是一种服务器端脚本编写环境,可以用来创建和运行动态网页或Web应用程序。
ASP网页可以包含HTML标记、普通文本、脚本命令以及COM组件等。
利用ASP可以向网页中添加交互式内容(如在线表单),也可以创建使用HTML网页作为用户界面的web应用程序。
asp是解释性编程框架,而是编译性框架,无论是从执行效率和安全上都远远超过asp,而文件上也是有差异的asp的后缀是.asp 而则是.aspx和.aspx.cs ,实现了代码分离。
可以说让代码管理更加直观。
ASP是解释性编程框架,而是编译性框架,无论是从执行效率和安全上都远远超过ASP,而文件上也是有差异的ASP的后缀是.asp 而则是.aspx 和.aspx.cs ,实现了代码分离。
可以说让代码管理更加直观。
2.1) Cork’d - 是一个分享好酒、酒文化、酒故事的网站。
深棕色和淡棕色的颜色搭配很协调,再配上漂亮的插画,显得整个布局更加充实。
2) Newsvine - Newsvine是一个社会性新闻站点,它是一个用来阅读、撰写和分享新闻的场所。
3) digg - digg也是一个社会性新闻网站,它的网站创意不仅吸引了很多的人,而且它设计也非常大气,以致于越来越多的网站来模仿它的设计。
4) Blurb - Blurb 提供图书设计及出版软件。
外文翻译---ASP的开发准则及安全管理

附录外文原文:The exploitation criteria and security management of the asp Exploitation criteria :Application servers have been, or ultimately will be used in Web server, which usually operate in the IIS ASP page computer. ASP is the only object of your client. It offers specialized systems and security considerations. While many of the Web sites use ASP simply not components, but in this article that ASP is the Internet as a bridge between the client and components. The following ASP components Guidelines (English) :ASP and the division of services between componentsASP server in the most commonly used building for the client to use HTML or XML documents, so we focused on the use of the program. This leads to a common problem, if ASP page on the server, then they are part of the operational level? Components in the world, the answer usually is not. Although the ASP server is in operation, but may be related to space applications in the same server, but it can not make it a part of the business logic. With user interface development tool, or as the opening of more business to operational programs with the clear distinction will be tremendous returns.Let us look at some of the most important operational level and that level division guidelines :Separation of the UI code and business logic. This includes preparation coupled with the UI code, such as the use of ASP components MTS internal target it with the business logic code separation, as in a different DLL.affair will be separated with the ASP page. Services ASP in certain cases beyond compare, but the components and multi-storey applications will change this situation. Components should not be dependent on the client layer to manage their affairs and business logic semantics.Will be expressed components (use solicit and responsive components) and Web server on the same machine and / or tenor. If the use of ASP internal components of the target objects on remote machines, then all of the internal components will be available in retail form. Server client access is COM+ server, which significantly reduced the performance and security of complicated. These markings will be lay in COM+ applications mark as "library activated" .ASP exist in server, ASP pages must be consistent with resource sharing rules, andremember to flexibility. Look at the following details :In the "conversation", management should avoid user specific state. Keep ASP stateless and where possible to allow resources pool.Mode operation:In evaluating whether a code of business logic layer or expressed, may I ask myself: "If I have to use click-phone applications to replace my ASP page, then the code are there?</FONT></SPAN></P><P class=MsoNormal style="TEXT-JUSTIFY: inter-ideograph; MARGIN: 0cm0cm0pt; TEXT-ALIGN: justify"><SPAN lang=EN-US><FONT face="Times New Roman" size=3>"If the answer is" yes ", then it could try to business logic code into machine code or user interface to help.If changed after the client code can not be used, or if it is constructed with the help of the user interface, the code is expressed services layer. It ASP page, or in the internal components usedASP components. It does not belong to the operational targets of components. Understanding of the distinction between desktop and ASP clientIt was modular incumbent engine,different table's top' tradition uniline ran win32 application from that asp. Key distinction generalize as follows: Thread management : ASP is a multi-client threads. This means that it can have many activities in the operation, perhaps at the same time dealing with different ASP page. This shows that it is not the only pseudo-objects to exclusive system users. This may be unexpected reactions, for example, into a bad habit : the object stored in ASP application variables or conversation.Security environment : ASP is the Web site of the Internet Information Services 5.0 implementation, a low, medium, high three separate degrees. The Web site can even have different security setup, or refuse to allow anonymous access, for customer and so on. All these have generated a lot of programs, namely, the use of different end-user account is your object.Easy rose : This is not a technical issue, but Web applications provide facilities Deputy effect. Traditionally, the increase in user base for desktop applications, the number of requests carefully planned well known to the client transferred. ASP has changed the process in motion and operational, ASP-Visual Basic applications can be conveniently opened for local or worldwide for all staff, all business partners and customers all use. This approach can be used to describe - owned super links individual e-mail users can make a tenfold increase in the base. To prepare for yourapplications?The only way to understand the intensity of Web sites for testing to obtain the expected value of the actual performance. Detailed information on the intensity of the test, please refer to the "application life cycle" section.In the use of Visual Basic ASP should target? In the context of the establishment and abolition of pages of your audience.In other words, as far as possible so that no state ASP pages only in a state of dependence conversation or temporary applications variables. Not to target storage applications in English or variables. This will lock in your conversation ASP systems, the expected value of flexibility may cancel all. In other words, the Web servers handle no more than a few dozens of users. If required, in English or applications stored content, please turn it into the data rather than objects. There are many other criteria can be observed. We recommend that you read MSDN V oices, .J.D. Meier compose the column "Servin<SPAN style="mso-spacerun: yes"></SPAN>It Up. "The column includes a lot of technology, practice and skills development can contribute to the expansion and reliable ASP components and applications.Not to be quoted or applications memory at conversation all the inserted object components are Visual Basic 6.0 "cell thread", that is to say they are operating in the Inter module. This means that if the thread established targets, then the object of all resources must use the same threads. Many threads (from it Web site users) use the same examples Agency targets, raises a series of activities, the application process may become bottlenecks.In addition, in conversation with Server .Create Object stored within the object STA to be implemented threads can be effectively linked to the current user, thus it will be the largest applications to give users a few restrictions the 20xN (N = number of processors).Mode operation:If you according to our suggest to take object stateless, are not used for storage of a client, and stored in the context of their applications. Client will be able to establish an independent, use and cancellation of their own target. This reduces the need for maintaining conversation - because they do not retain the skills unique to the state. Recommended approach is to target a state, it needs a database or other storage area to visit (such as cookies and LDAP). If applications require the use of English or the scope of the data, the data should instead deal with the subject of data stored in it. The dispose of the you could begin one genera,came encapsulation versus desirable value.ASP security management :The basic concept of security managementSafety management is based on information and ASP solution to manage the security strategy has set the security level definition process. Including management of the response to violations of the security act. ASP can be controlled without fear of attack and ASP clients business continuity, so to be able to deal with malicious attacks could really an art.Safety management in large measure dependent on the security strategy. These strategies could produce from different sources. To be considered when designing security strategy are :Service level agreement on the definition of external customer needs external security law requires external suppliers within the ASP security strategy and security strategy in the ASP environment integrated customer circumstances, the internal / external security strategy, For each solution, ASP must be defined security strategy. The strategy should be based on the various aspects of the most reliable Hop. According to customer needs, and even the basic structure will be very different design. Usually use three safety design:The dedicated network joint of the both asp solution and safety precautions completeness by asp proceed end-to-end Control usually,these purport asp versus proprietary basic structure subassembly possess full control,include asp and client of compartment.Public : ASP solutions and security measures by ASP component control. Usually, this means that within the ASP is in control of its own website, but does not guarantee to provide solutions to the public network with control. However, the ASP can be used as "virtual private network" (VPN) to carry out such technical links between ASP and client security.Mixed : the solution is a combination of the previous two. "dedicated" and "common" solutions are used. In ensuring security solutions, and also involves ASP customers.There are five dimensions of the process needed to improve the MOF model : planning : planning activities including in customer requirements, as well as internal and external strategies based on the legitimate demands of the SLA security component. In a dialogue with clients at the same time, it may be necessary to establish or adjust internal security strategy. Of course we should decide whether to do so by the ASP. This resulted in a level of security planning, including all aspects of the security strategy and design (infrastructure, personnel, steps, the environment, basic contracts, etc.).Implementation : Put stratification plane execute possession necessary safety precautions,withal observe SLA suffer have definitive security part for in force. at a pinch,this phase return should put make ultra internal security policy over in force..Assessment : Assessment is essential to end security management process. It involves determining the strategy and measures adopted by the state and effectiveness.Maintenance : maintenance based on the following security measures on the basis of : the results of regular inspections, the risk of changes in the situation clearly, and SLA or other conditions change.Control : control activities can organize and guide the security management process itself. Definition of a process control activities, functions, roles, responsibilities assigned, organizational structure and reporting structure. It is a continuing process and to ensure the engine improvements.Security management process must be continuous self improvement. New solutions, new technologies, new personnel, new steps, negligence may lead to the installation of integrated security attackers solution.ASP security configuration tool, ASP configuration tool for security managers should be very familiar with, because the system was associated with all aspects of information security, it is essential.These tools should be very easy for you to answer the following questions : "My computer security?<SPAN style="mso-spacerun: yes"></SPAN>"or" My network security?<SPAN style="mso-spacerun: yes"></SPAN>". These tools should allow for the definition of security strategy has covered all aspects of configuration and analysis, such as : account strategy. Installation or alteration visit strategies, including domain or local password strategies, domain or local domain Kerberos account lock strategy and tactics (where applicable).Local strategy. Of the local audit strategies, a wide range of user competence and the distribution of security option, such as diskettes, CD-ROM such control. Restricted group.To be embedded in the group and the allocation of any other specific group or modify designated members of the group (such as Administrators, Server Operators, Backup Operators and Power Users, etc.). This should not be used as a management tool to use general members-only used to control specific groups (with sensitive functions assigned to them). System services. Distribution system installed in different services (including network transmission services such as TCP/IP, NetBIOS, CIFS document sharing, printing, etc.) security. If we do not use will be stopped TCP/IP outside services. The detailed information, please refer to/technet/Document or folder sharing. Distribution systems and document services Reorientation of equipment services devices installed. This includes visiting various networks, the sharing of documents and the closure of anonymous visits opening packet signatures and security of the option.System Registry : installation or modification of the system of security of the Register. Storage systems : a local system or to modify the document tree inventory volumes and safety. Preparation : ASP for customers and prepare a secure environment for users to establish secure, and documents. These tools should also help to monitor security strategy has been defined in all its aspects, such as : account strategy - passwords, lock and Kerberos installation.The all these figure of the use, closed loop video frequency grade of the both the access control of the start-up mode and access control of the policy of the mount of the both local policy-look through, user purview and security option. Event log-system, application, security and directory services log has reference to security option. event log-system, application, security and directory services log 'mount. restricted group-compose a person engaged in some field of activity. System service-system service.registry key- key. File system-file and documentary access control.Physics visit system-versus equipment drawing visit, calorie type key. These instrument return ought to could analysis block policy,all the while descend solstice subscriber stage. command rest instrument came analyses surveillance course suffer make a raise of. These instrument usually in particular trust statistical technique to.The ASP managers can use Windows 2000 "Windows 2000 security configuration tool set" for the following components of some or all of the above security. "security templates" management module. "security templates" management module is an independent Microsoft management control (MMC) management module, which can create templates based on the text document that includes all aspects of security for security."security configuration and analysis" management module. "security configuration and analysis" management module is independent MMC management module, or it can analysis of the security of the Windows 2000 operating system. Based on its operational use "security templates" management modules security templates to establish the content.Secedit.exe. Secedit.exe is a "security configuration and analysis" of the ordermanagement module line version. It enables security configuration and analysis in the absence of graphical user interface (GUI) of the implementation.Group strategy for the security of expansion. "security configuration tool set" also includes a group of the expansion strategy editorial management modules for configuration and local security policy domain or organizational unit (OU) security strategy. Local security strategy include only the " Account number Strategy" and "local strategy" security. Domain or OU for the definition of security strategy may include all security.外文资料翻译译文:ASP的开发准则及安全管理开发准则:应用程序服务器被,或最终将被Web 服务器所使用,它通常是运行ASP 页面的IIS 计算机。
ASP外文翻译+原文

ASP外文翻译+原文ENGLISHE:Develop Web application program using ASP the architecture that must first establish Web application. Now in application frequently with to have two: The architecture of C/S and the architecture of B/S.Client/server and customer end / server hold the architecture of C/S.The customer / server structure of two floor.Customer / server ( Client/Server ) model is a kind of good software architecture, it is the one of best application pattern of network. From technology, see that it is a logic concept, denote will a application many tasks of decomposing difference carry out , common completion is entire to apply the function of task. On each network main computer of web site, resource ( hardware, software and data ) divide into step, is not balanced, under customer / server structure, without the client computer of resource through sending request to the server that has resource , get resource request, so meet the resource distribution in network not balancedness. With this kind of structure, can synthesize various computers to cooperate with work, let it each can, realize the scale for the system of computer optimization ( Rightsizing ) with scale reduce to melt ( Downsizing ). Picture is as follows:It is most of to divide into computer network application into two, in which the resource and function that part supports many users to share , it is realized by server; Another part faces every user , is realized by client computer, also namely, client computer is usual to carry out proscenium function , realizes man-machine interaction through user interface , or is the application program of specific conducted user. And server usually carries out the function of backstage supporter , manages the outside request concerning seting up, accepting and replying user that shared. For a computer, it can have double function , is being certain and momentary to carve to act as server , and again becomes client computer in another time.Customer / server type computer divide into two kinds, one side who offers service is called as server , asks one side of service to be called as customer. To be able to offer service, server one side must have certain hardware and corresponding server software; Also, customer one side must also have certain hardware and corresponding customer software.There must be a agreement between server and customer, both sides communicate according to this agreement.Apply customer / server model in Internet service , the relation betweencustomer and server is not immutable. Some Internet node offers service on the one hand , also gets service on the other hand from other node; It is even in one time dialogue course, mutual role also exchanges probably. As in carry out file transmission , if be called as one side who offers file server, is called as one side who gets file customer, when using get or mget order since another node takes file, can think that what self use and it is client computer , is using put or mput order to another node dispatch file can again think the machine that used self is server.Multilayer customer / server structureAlong with the development of enterprise application, recently, have again arisen a kind of new multilayer architecture, it applies customer end to divide into two minutes: Customer application and server apply. Customer application is the part of original customer application , is another and partial to have been transfered to server to apply. New customer application takes the responsibility for user interface and simple regular business logic and new server application resident core , changeable business logic. Therefore its structure has become new ( Client application + Server application )/Server structure. Following picture shows:This kind of structure has solved traditional Client/Server can expand problem, have reduced customer end business logic , and have reduced the requirement of customer end for hardware. At the same time because of a lot of business logic concentrations have gone to unitary application server on, the maintenance work of application system had been also concentrated together, have eliminated the problem in the traditional structure of Client/Server that software distributes. This kind of structure is called as the architecture of B/S.Browser/Server and browser / server hold the architecture of B/S. On essence, Browser/Server is also a kind of structure of Client/Server, it is a kind of from the traditional two levels of structural development of Client/Server come to thethree-layer structural special case of Client/Server that applied on Web.In the system of Browser/Server, user can pass through browser to a lot of servers that spread on network to send request. The structure of Browser/Server is maximum to have simplified the work of client computer, on client computer, need to install and deploy few customer end software only , server will bear more work, for database visit and apply program carry out will in server finish.Under the three-layer architecture of Browser/Server, express layer( Presentatioon ) , function layer ( Business Logic ) , data layer ( Data Service ) have been cut the unit of 3 relative independences:It is the first layer of to express layer: Web browser.In expressing layer contain system show logic, locate in customer end. It's task is to suggest by Web browser to the certain a Web server on network that service is asked , after verifying for user identity, Web server delivers needed homepage with HTTP agreement to customer end, client computer accept the homepage file that passed , and show it in Web browser on.Second layer function layer: Have the Web server of the application function of program extension.In function layer contain the systematic handling of general affairs logic, locate in Web server end. It's task is the request concerning accepting user , need to be first conducted and corresponding to expand application program and database to carry out connection , passes through the waies such as SQL to database server to put forward data handling to apply for, then etc. database server the result of handling data submit to Web server, deliver again by Web server to return customer end.The number of plies of 3th according to layer: Database server.In data layer contain systematic data handling logic, locate in database server end. It's task is to accept the request that Web server controls for database, realization is inquired and modified for database , update etc. function, submit operation result to Web server.Careful analysis is been easy to see , the architecture of Browser/Server ofthree-layer is the handling of general affairs of the two levels of structure ofClient/Server logic modular from the task of client computer in split , from the first floor of individual composition bear the pressure of its task and such client computer have alleviated greatly, distribute load balancedly and have given Web server, so from the structural change of Client/server of original two floor the structure ofBrowser/Server of three-layer. This kind of three-layer architecture following picture shows.This kind of structure not only client computer from heavy burden and the requirement of performance that rises continuously for it in liberation come out , also defend technology people from heavy maintenance upgrading work in free oneself. Since client computer handles general affairs , logic partial minutes have given function server, make client computer right off " slender " a lot of, do not take the responsibility for handling complex calculation and data again visit etc. crucial general affairs, is responsible to show part, so, maintenance people do not rush about again for the maintenance work of program between every client computer, and put major energy in the program on function server update work. Between this kind of three-layer structural layer and layer, the mutually independent change of any first floor does not affect the function of other layer. It has changed the defect of the two levels of architecture of Client/Server of tradition from foundation, it is the transform with deep once in application systematic architecture.The contrast of two architecturesThe architecture of Browser/Server and the architecture of Client/Server compare with all advantages that not only have the architecture of Client/Server and also have the architecture of Clinet/Server the unique advantage that place does not have:Open standard: The standard adopted by Client/Server only in department unification for but, it's application is often for special purpose.It is lower to develop and defend cost: It need to be implemented on all client computers that the application of Client/Server must develop the customer end software for special purpose, no matter installation and disposition escalate still, have wasted manpower and material resources maximumly. The application ofBrowser/Server need in customer end have general browser , defend and escalate to work in server end go on , need not carry out any change as customer holds , have reduced the cost of development and maintenance so greatly.It is simple to use , interface friendly: The interface of the user of Client/Server is decided by customer end software, interface and the method of its use are not identical each, per popularize a system of Client/Server ask user study from the beginning, is hard to use. The interface of the user of Browser/Server is unified on browser, browser is easy to use , interface friendly, must not study use again other software, the use of a Lao Yong Yi that has solved user problem.Customer end detumescence: The customer end of Client/Server has the function that shows and handles data , as the requirement of customer end is a client computer " it is fat " very high. The customer of Browser/Server holds the access that not takes the responsibility for database again and the etc. task of complex data calculation, need it only show , the powerful role that has played server fully is so large to have reduced the requirement for customer end, customer end become very " thin ".System is flexible: The 3 minutes of the system of Client/Server, in modular, have the part that need to change to want relation to the change of other modular, make system very difficult upgrading. The 3 minutes of the system of Browser/Server modular relative independence, in which a part of modular change, other modular does not get influence, it is very easy that system improve to become, and can form the system with much better performance with the product of different manufacturer.Ensure systematic safety: In the system of Client/Server, directly join with database server because of client computer, user can very easily change the data on server, can not guarantee systematic safety. The system of Browser/Server has increased a level of Web server between client computer and database server , makes two not to be directly linked again, client computer can not be directly controled for database, prevent user efficiently invade illegally.The architecture of Browser/Server of three-layer has the advantage that a lot of traditional architectures of Client/Server does not have , and is close to have combined the technology of Internet/Intranet, is that the tendency of technical development tends to , it application system tape into one brand-new develop times. From this us option the configuration of B/S the architecture that develops as system.what are C/S with B/SFor " C/S " with the technology of " B/S " develop change know , first,must make it clear that 3 problems.( 1 ) What is the structure of C/S.C/S ( Client/Server ) structure, the server structure and client computer that all know well. It is software systematic architecture, through it can hold hardware environment fully using two advantage, realize task reasonable distribution to Client end and Server end , have reduced systematic communication expense. Now, the most systems of application software are the two levels of structure of the form of Client/Server , are developing to the Web application of distribution type since current software application is systematic, Web and the application of Client/Server can carry out same business handling , apply different modular to share logic assembly; Therefore it is systematic that built-in and external user can visit new and existing application , through the logic in existing application system, can expand new application system. This is also present application system develop direction. Traditional C /S architecture though adopting is open pattern, but this is the openness that system develops a level , in specific application no matter Client end or Server end the software that need to still specify support. Because of the software software that need to develop different edition according to the different system of operating system that can not offer the structure of C/S and the open environment of user genuine expectation , besides, the renovation of product is very rapid, is nearly impossible to already meet the 100 computer above users of local area network at the same time use. Price has low efficiency high. If my courtyard uses , Shanghai exceed the orchid company's management software " statistics of law case" is typical C /S architecture management software.( 2 ) What is the structure of B/S.B/S ( Browser/Server ) structure browser and server structure. It is along with the technology of Internet spring up , it is for the structure of improvement or a kind of change of the structure of C/S. Under this kind of structure, user working interface is to realize through WWW browser, lose the logic of general affairs very much in front( Browser) realization, but the major logic of general affairs in server end( Server) realization, form the three-layer claimed 3-tier structure. So, have simplified customerend computer load greatly , have alleviated system to defend workload and the cost with upgrading , have reduced the overall cost of user ( TCO ). With present technology see , local area network the network application that establishes the structure of B/S , and under the pattern of Internet/Intranet, database application is easy to hold relatively , cost also is lower. It is that oneness goes to the development of position , can realize different people, never same place, with difference receive the way of entering ( for example LAN, WAN, Internet/Intranet etc.) visit and operate common database; It can protect data platform efficiently with management visit limits of authority, server database is also safe. Now in my courtyard, net ( Intranet ) , outer net ( Internet ) with Beijing eastern clear big company " law case and the management software of official business " is the structural management software of B/S , policemen each working station in local area network pass through WWW browser can realize working business. Especially in JAVA step platform language appearance after, the configuration management software of B/S is more facilitated , is shortcut, efficient.( 3 ) The management software technology of main stream.The technology of main stream of management software technology is as management thought , have also gone through 3 develop period. First, interface technology goes to Windows graph interface ( or graph user interface GUI ) from last century DOS character interface, till Browser browser interface 3 differences develop period. Secondly, today own the browser interface of computer, is not only visual and is easy to use , what is more major is that any its style of application software based on browser platform is as, make the requirement of choosing a person for the job for operating training not high and software operability is strong , is easy to distinguish; Moreover platform architecture the file that also goes to today from past single user development /server ( F /S ) system and client computer /server ( C /S ) system and browser /server ( B /S ) system.The comparison of C/S and B/SC/S and B/S is the now world two technologies of main stream of developing pattern technical configuration. C/S is that American Borland company researches and develop most early, B/S is that American Microsoft researches anddevelop. Now this two technologies with quilt world countries grasp , it is many that domestic company produce article with C/S and the technical development of B/S. This two technologies have the certain market share of self , is with customer crowd , each domestic enterprise says that own management software configuration technical function is powerful, advanced, convenient , the customer group that can lift , have a crowd scholar ink guest to shake flag self cry out , advertisement flies all over the sky , may be called benevolent to see kernel, sage sees wisdomC/S configures inferior position and the advantage of software( 1 ) Application server operation data load is lightcomparatively.The database application of the most simple architecture of C/S is become by two partial groups, customer applies program and database server program. Both can be called as proscenium program and the program of backstage supporter respectively. The machine of operation database server program is also called as application server. Once server program had been started , waits the request concerning responding customer program hair at any time; Customer application program operation can be called as customer computer on the own computer of user, in correspondence with database server, when needs carry out any operation for the data in database, customer program seeks server program voluntarily , and sends request to it, server program is regular as basis intends to make to reply, send to return result, application server operation data load is lighter.( 2 ) Data store management function relatively transparent.In database application data store management function, is carried out respectively independently by server program and customer application program , is regular as proscenium application can violate , and usually those different( no matter is have known still unknown ) operations data, in server program, do not concentrate realization, for instance visit limits of authority, serial number can be repeated , must have customer talent establishment the rule order. It is these to own , for the last user that works on proscenium program is " transparent ", they need not be interest in ( can not usually also interfere ) the course of behind, can complete own all work. In the application of customer server configuration proscenium program not is very " thin ",troublesome matter is delivered to server and network. In the system of C/S take off , database can not become public really , professionally more competent storehouse, it gets independent special management.( 3 ) The inferior position of the configuration of C/S is high maintenance cost make investment just big.First, with the configuration of C/S, will select proper database platform to realize the genuine "unification" of database data, make the data synchronism that spreads in two lands complete deliver by database system go to manage, but the logically two operators of land will directly visit a same database to realize efficiently , have so some problems, if needs establishment the data synchronism of " real time ", the database server that must establish real time communication connection between two places and maintains two lands is online to run , network management staff will again want to defend and manage for customer end as server defends management , maintenance and complex tech support and the investment of this high needs have very high cost, maintenance task is measured.Secondly, the software of the structure of C/S of tradition need to develop the software of different edition according to the different system of operating system , is very rapid because of the renovation of product, price is working needs high with inefficient already do not meet. In JAVA step platform language appearance after, the configuration of B/S is more vigorous impact C/S , and forms threat and challenge for it. .The advantage of B/S configuration software( 1 ) The Maintenance of inferior position and upgrading way are simple.Now upgrading and the improvement of software system more and more frequently, the product of the configuration of B/S embodies more convenient property obviously. For one a little a little bit big unit , if systematic administrator needs , between hundreds of 1000 even last computers round trip run , efficiency and workload is to can imagine, but the configuration of B/S software needs management server have been all right , all customer ends are browser only, need not do any maintenance at all. No matter the scale of user has , is what , has how many branch will not increase any workload of maintenance upgrading , is all to operate needs to aim at server to go on;If need differently only, net server connection specially , realize long-range maintenance and upgrading and share. So client computer more and more " thin ", and server more and more " fat " is the direction of main stream of future informative development. In the future, software upgrading and maintenance will be more and more easy , and use can more and more simple, this is for user manpower , material resources, time and cost save is obvious , it is astonishing. Therefore defend and escalate revolutionary way is the client computer " it is thin ", " is fat " server.( 2 ) Cost reduction, it is more to select.All know windows in the computer of top of a table on nearly one Tong world, browser has become standard disposition, but on server operating system, windows is in absolute dominance position not. Current tendency is the application management software that uses the configuration of B/S all , need to install only in Linux server on , and safety is high. The so server option of operating system is many, no matter choosing those operating system, can let the most of ones use windows in order to the computer of top of a table of operating system does not get influence, this for make most popular free Linux operating system develop fast, Linux except operating system is free besides, it is also free to link database, this kind of option is very pupular.Say, many persons on daily, "Sina website" nets , so long as having installed browser for can , and what need not know the server of " Sina website " to use is that what operating system, and in fact the most of websites do not use windows operating system really, but the computer of user is most of as installing to be windows operating system.( 3 ) Application server operation data load value comparatively.Since B/S configures management, software installation in server end ( Server ) on, it is been all right that network administrator need to manage server only, the user interface major logic of general affairs in server ( Server ) end pass through WWW browser completely realization, lose the logic of general affairs very much in front( Browser) realization, all customer ends has only browser, network administrator need to do hardware maintenance only. But application server operation data load is heavier, once occuring " server collapse " to wait for problem,consequence is unimaginable. Therefore a lot of units have database to stock server , are ready for any eventuality.原文翻译:利用ASP开发Web应用程序首先必须确立Web应用的体系结构。
asp介绍 外文翻译

毕业论文外文翻译ASP from A to ZNancy Winnick ClutsDeveloper Technology EngineerMicrosoft CorporationOctober 22, 1998ContentsIntroductionWhat ASP IsHow ASP WorksASP from A to ZBibliographyIntroductionThere's lots of helpful information about Active Server Pages (ASP) available on this site and other sites. If you have plenty of time to search for the information, you can find answers to most of your questions. But if you want to find out what tools you can use to debug ASP or how to handle errors, you need to do some digging. This article provides an easy way to find information that pertains to ASP, including a short definition of what ASP is, how ASP works, and an alphabetical list of terms and tips that relate to ASP. In the A-to-Z list, you will see a brief description as well as pertinent links to more detailed information (when that information is available). This article is meant to be a "living" document. That means that I plan on updating it with new tips and removing tips that no longer apply. If you are an ASP developer and have a "juicy" tip, send it to me. If I publish it here, you'll get credit and the everlasting gratitude of throngs of other ASP developers.What ASP IsActive Server Pages is a programming environment that provides the ability to combine HTML, scripting, and components to create powerful Internet applications that run on your server. If you are already creating Web sites that combine HTML, scripting, and some reusable components, you can use ASP to glue these items together. You can create an HTML interface for your application by adding script commands to your HTML pages and you can encapsulate your business logic into reusable components. These components can be called from script or other components.How ASP WorksWhen you incorporate ASP into your Web site, here's what happens:1.The user brings up a Web site (like MSDN Library) where the default page has the extension .asp.2.The browser requests the ASP file from the Web server.3.The server-side script begins to run with ASP.4.ASP processes the requested file sequentially (top-down), executes any script commands contained in thefile, and produces an HTML Web page.5.The Web page is sent to the browser.Because your script runs on the server, the Web server does all of the processing and standard HTML pages can be generated and sent to the browser. This means that your Web pages are limited only by what your Web server supports. Another benefit of having your script reside on the server is that the user cannot "view source" on the original script and code. Instead, the user sees only the generated HTML as well as non-HTML content, such as XML, on the pages that are being viewed.ASP from A to ZThis section contains a list of terms and tips to help you understand ASP. They are listed in alphabetical order. Scroll down to the topic that interests you or click the letter in the alphabet below to jump down to the section containing the topic. I cribbed, er, I mean, compiled these tips and definitions from a number of sources, including technical articles (listed in the bibliography below), Knowledge Base articles, and a beta version of the Microsoft® Internet Information Server (IIS) 5.0 documentation (I'm so lucky!).A B C D E F G I J L M O P Q R S T V W X ADOActive Data Objects (ADO) provides a programming model for an OLE-DB data source. It is the database model that ASP uses; however, ASP can use other database access mechanisms. ADO supports the following installable objects, which are often used in ASP files: Command, Connection, Recordset, Field, and Error. Refer to the ADO Web site at /data/ado/ for more information than you can shake a stick at.ApplicationsASP is not just for prototyping. When using ASP as a solution, design your solution as an application instead of designing stand-alone ASP pages. As far as objects are concerned, it's best to take a look at what you need to accomplish and decide what you need, then whether you can buy the objects or will need to create the objects yourself. Take into consideration caching, scalability, reusability, security, and consistency.BottlenecksIdentify your bottlenecks (that is, the database, network card, or network connection) using the tools available: WCAT, NetMon, and performance counters. To improve server performance, take a look at all parts of the system for potential bottlenecks, including hardware configuration and software settings. This way, if you are ever asked to scale the project larger, you will know where the work needs to be done.Browser ConnectionIn IIS 4.0, use the Response.IsClientConnected property to determine if the browser is still connected. If the browser is not connected, you can conserve CPU cycles by ceasing the processing of the ASP page. Refer to the Knowledge Base article Use IsClientConnected to Check if Browser is Connected.BufferingTurn buffering ON. By default it is OFF in IIS 4.0; in IIS 5.0, buffering is ON by default. You should buffer your ASP files so that you can abort sending a Web page. This might happen if the script being processed runs into a problem or if a user does not have appropriate security credentials. If this happens, and if you are using IIS 5.0, you can transfer the user to another page using Server.Transfer, or clear the buffer (using the Clear method of the Response object) to send different content to the user.C++If you are creating page-level components, you can use server scriptlets, Visual Basic®, V isual J++™, and VisualC++®. If you are writing components that will be in application or session state, we recommend that you write them in C++ or Java so you can create them as both-threaded. Visual Basic is apartment-threaded. See the section below on threading for more details.CachingIf your application sends pages to the client via a proxy server, the proxy server may cache pages to return them more quickly to the client. This reduces the load on the network and the Web server. To prevent a browser from caching ASP pages, set Response.Expires to some negative number. This will force the cached pages to expire immediately. If you set Response.Expires to 0, and if your browser clock is behind by a few minutes, the page won't expire immediately. If your Web site contains objects that do not expire often, such as images, set the expiration to some time in the future. This will greatly increase the speed at which a page is refreshed or downloaded. Proxy caching via pragma:nocache is already done for you by IIS, so you don't have to set this in your headers. More information about caching can be found in Got Any Cache?Client-Side ScriptsDistribute the work on your Web site by providing script on both the client and the server. See Client-Side and Server-Side Objects.COM Object DebuggingIf you create a COM object and use it through ASP with Server.CreateObject, you cannot go back into your development environment and recompile the COM DLL without restarting the IIS Admin and W3SVC (Web server) service. Otherwise, the COM DLL will be locked. To restart these services, do the following:1.At a command prompt, type net stop iisadmin /y. Please note that this will shut down IIS' parent service,IIS Admin. This will also shut down FTP and other services that are children of IIS Admin. If you type only net stop w3svc, inetinfo.exe will not be unloaded.2.At a command prompt, type net start w3svc. This will restart IIS Admin and the W3SVC service (Webserver).3.You may recompile at any point after Step 1. Once you refer to an object that loads your DLL, you must repeatStep 1 before building the component successfully.ComponentsUse components to encapsulate the business logic in your ASP applications. You can create your own components or buy them "off the shelf." Once you have a component, you can reuse it wherever you need it. Develop your components using C++ or Java. Because Visual Basic is not marked as both-threaded, you cannot use Visual Basic components within application scope. If you design your own components, be sure to design components that are stateless (that is, the methods you define take parameters, rather than having a script set properties then call the method without the parameters).Stateless components are far more flexible and reusable. In addition, if you have areas in your script where you have more than 100 lines of contiguous script, consider turning that script into a server scriptlet. More information about creating components can be found in the Active Server Components section of the Server area of the MSDN Library.A comprehensive list of third-party components available for ASP can be found in the ASP Component Catalog. ConnectionsPool your connections for optimal performance. By pooling your connections, your resources are allocated more efficiently. For support of multiple logons, provide one connection for read-only access and one connection forread/write access. In general, avoid putting ADO connections in session state. ODBC (version 3.0 and later) automatically does connection pooling for you, and OLE-DB provides session pooling.Cookie MungerASP uses cookies to store the session identifier (ASP SessionID). For machines that have cookies turned off, the Cookie Munger tool can be used to strip out cookies and put the information in a URL. This enables the use of "cookies" without actually sending out cookies. For more information, see Simulating Cookies with the Cookie Munger.CPUDesign for scalability. Stress your ASP applications at 100% CPU to determine how to best allocate your resources. Use WCAT or a third-party tool such as Mercury's LoadRunner to tune your performance.Data Access ComponentsRead Improving the Performance of Data Access Components in IIS 4.0 for a detailed explanation of the techniques that you can use to improve performance.DatabaseUse ADO for adding database access to your Web pages via components. ADO can be used to create small components that connect to any OLE-DB compliant data source, whether it's relational or non-relational. This includes spreadsheets, databases, or e-mail directories.DebuggingThere are many tools available for debugging, including the Microsoft Script Debugger. The Script Debugger lets you run your server-side scripts one line at a time, monitor the value of variables, properties, or array elements during execution, and trace procedures.Important:Once you have finished debugging your Web site, don't forget to turn off debuggingon your live servers. This will increase performance.Dictionary ObjectThe Dictionary object enables you to look up and store arbitrary key-data pairs rapidly. The Dictionary object gives you access to items in the array by key, so it is faster to find things that aren't stored contiguously in memory. Instead, you use a key rather than having to know where in the array the object is stored.Disconnected RecordsetsDisconnecting a Recordset means you can view the Recordset's data after severing the connection to the data store that generated the Recordset. You can create a disconnected ADO Recordset in-process with a Recordset whose CursorLocation property is adUseClient and whose ActiveConnection property is set to NULL/Nothing. You can then put the Recordset into ASP application state and use the Recordset Clone method to share and access the Recordset in your ASP files. You can then pass this Recordset to a remote client using either RDS or DCOM (or both together). Read the Knowledge Base articles HOWTO: Getting ADO Disconnected Recordsets in VBA/C++/Java and INFO: Disconnected Recordsets with ADO or RDS for detailed information.Error HandlingYou can use the ASPError object to obtain information about an IIS 5.0 error condition that has occurred in an ASP file. The ASPError object is returned by the Server.GetLastError method. If the error condition generates an exception and you are using VBScript, use OnErr. In JScript™, use the try…catch method. Detailed information about error handling can be found in the article Microsoft JScript Version 5.0 Adds Exception Handling, by Michael Edwards.Flow ControlFlow control is the ability to set the flow of your ASP application. Flow is controlled through Response methods and two new Server methods (for IIS 5.0). Using Response.Redirect causes posted data to be lost. The Response.End method causes ASP to stop when an error is found. You do not need to call this method after callingResponse.Redirect. The Server.Transfer method is the same as Response.Redirect, except that the work is done on the server and posted data is not lost. The Server.Execute method will flow into a nested ASP call and return execution to where you were before the error occurred.FileSystem ObjectThe FileSystem object blocks on files. If you are running a high-volume Web site, don't use the FileSystem object because the performance of accessing a single file will degrade. If you are using multiple files that are not being accessed at the same time, use of the FileSystem object will not result in a performance hit.Global.asaThe Global.asa file is an optional file in which you can specify event procedures and declare objects that have session or application scope. It is not a content file displayed to the users; it stores event information and objects used globally by the application. This file must be named Global.asa and must be stored in the root directory of the application. An application can have only one Global.asa file. Instead of using the ASP FileSystem object to read files on a page, load the file(s) into an Application level array in Global.asa.GlueUse ASP for the glue and components for the business logic. If you have 100 or more lines of consecutive script, turn it into a component using server scriptlets (bearing in mind that server scriptlets have the same limitations as Visual Basic components).InetLoadThe InetLoad tool can be used to tune your Web site. This tool generates customizable loads on various Internet services, over a broad range of Internet protocols, including HTTP, SMTP, POP3, and LDAP. You can use this tool to simulate traffic on your Web site. InetLoad is available at /software/internet/IN00470.htm. See also WCATW and Mercury LoadRunner for tuning tools.InternationalizationIf you are providing a Web site that will be viewed in countries other than the United States, you can use the CODEPAGE tag within the <% %> delimiters to specify the proper code page. Alternatively, you can use the Session.CodePage property. Read all about it at /library/en-us/dnasp/html/nextgen.asp. In addition to CODEPAGE, you can also use the Local Language Identifier (LCID) to determine the language that the user has set as her preference. Detailed information about LCID can be found in the IMultiLanguage Reference.IsolationYou can separate IIS, ASP, and components into different processes for better performance. The drawback to putting these in different processes is the cross-process communication performance hit. You can put IIS, ASP, and your components in one process. This is the fastest method, but if your component goes down, it can bring down ASP and IIS. You can put IIS in one process and ASP with your components in another so that IIS will not crash if your component or ASP crashes. You can put IIS and ASP in one process and your component in another process. This is slower than the previous option due to all of the cross-process communication; however, it does insulate IIS and ASP from a buggy component. The slowest but "safest" option is to put IIS, ASP, and your components all in separate processes. If one crashes, nothing else will, but the performance will be very, very slow. It's a better idea to test your components really well.Component Configuration Protection SpeedIIS, ASP, and components in one process 1 4IIS in one process, ASP and components in another process 2 3IIS and ASP in one process, components in another process 3 2IIS in one process, ASP in one process, components in one process 4 1Legend: 1 = Least, 4 = MostJavaUse Java (or C++) to write components. Java is a powerful language that you can use to create components that are both-threaded.LoggingYou can turn on URI_Query extended logging to log ASP failures. This is not turned on by default. Turning it on is tricky, so here are the steps:1.Select a Web or FTP site and open its property sheets.2.Enable logging if it is disabled and select the W3C Extended log file format.3.Click Properties.4.On the Extended Properties property sheet, select the fields you want to log (in this instance, URI_Query).By default, Time, Client IP Address, Method, URI Stem, and HTTP Status are enabled.5.Click Apply.You can also log to the Windows NT® Server Event Log; however, logging to the Windows NT Server Event Log is not a good idea if you've got lots of errors or are in debugging mode because you can fill up the log quickly. Using the Windows NT Performance Monitor, you can log a variety of error conditions, including how many ASP requests have failed and how many errors occurred during the script run-time.MailUse Collaboration Data Objects (CDO) to send mail for Windows NT Server. CDO is a lightweight version of CDO for Exchange. It works on SMTP or Exchange. If you are using another e-mail protocol, use a third-party component. A comprehensive list is at /workshop/server/components/catalog.asp.<OBJECT> tagIf you need to refer to objects that may not be used, instantiate them by using the <OBJECT> tag rather than using Server.CreateObject. Using Server.CreateObject causes the object to be created immediately. If you don't use that object later, you end up wasting resources.译文内容介绍什么是ASPASP怎样工作图书目录介绍ASP有很多有用的信息被用在这个网站或者其它网站。
外文翻译---提高字符串处理性能的ASP应用程序

的。
这是一个设有一个可配置的字符串缓冲区并且管理新文本插入到该缓冲区,只有当文本长度超过字符串缓冲区的长度时,才产生字符串的充足。
微软网框架免费地提供了这种类别。
(System.Text.StringBuilder)。
这是在那种环境下进行串联操作所推荐的。
在ASP和传统的Visual Basic的世界中,我们无权使用此类别,因此我们需要建立我们自己的一个类别。
以下是一个范例是用Visual Basic 6.0创建的StringBuilder类(错误处理代码为了简便已省略)。
Option Explicitdefault initial size of buffer and growth factorPrivate Const DEF_INITIALSIZE As Long = 1000Private Const DEF_GROWTH As Long = 1000buffer size and growthPrivate m_nInitialSize As LongPrivate m_nGrowth As Longbuffer and buffer countersPrivate m_sText As StringPrivate m_nSize As LongPrivate m_nPos As LongPrivate Sub Class_Initialize()set defaults for size and growthm_nInitialSize = DEF_INITIALSIZEm_nGrowth = DEF_GROWTHinitialize bufferInitBufferEnd Subset the initial size and growth amountPublic Sub Init(ByVal InitialSize As Long, ByVal Growth As Long)If InitialSize > 0 Then m_nInitialSize = InitialSizeIf Growth > 0 Then m_nGrowth = GrowthEnd Subinitialize the bufferPrivate Sub InitBuffer()m_nSize=-1m_nPos=1End Subgrow the bufferPrivate Sub Grow(Optional MinimimGrowth As Long) initialize buffer if necessaryIf m_nSize = -1 Thenm_nSize = m_nInitialSizem_sText = Space$(m_nInitialSize)Elsejust growDim nGrowth As LongnGrowth = IIf(m_nGrowth > MinimimGrowth,m_nGrowth, MinimimGrowth)m_nSize = m_nSize + nGrowthm_sText = m_sText & Space$(nGrowth)End IfEnd Subtrim the buffer to the currently used sizePrivate Sub Shrink()If m_nSize > m_nPos Thenm_nSize = m_nPos - 1m_sText = RTrim$(m_sText)End IfEnd Subadd a single text stringPrivate Sub AppendInternal(ByVal Text As String) If (m_nPos + Len(Text)) > m_nSize Then Grow Len(Text) Mid$(m_sText, m_nPos, Len(Text)) = Textm_nPos = m_nPos + Len(Text)End Subadd a number of text stringsPublic Sub Append(ParamArray Text())Dim nArg As LongFor nArg = 0 To UBound(Text)AppendInternal CStr(Text(nArg))Next nArgEnd Subreturn the current string data and trim the bufferPublic Function ToString() As StringIf m_nPos > 0 ThenShrinkToString = m_sTextElseToString = ""End IfEnd Functionclear the buffer and reinitPublic Sub Clear()InitBufferEnd Sub使用这个类别的基本原理是一个类别级的变量(m_sText)被保留,这个变相相当于一个字符串缓冲区,而这个缓冲区的大小设定是靠使用Space$功能来对其填充空格符号。
asp技术外文翻译

原文:(一)An Active Server Page (ASP)1. This paper firstly introduces multi-tier B/S Architecture and Web-related technology .Based on them , this paper presents system objection, system demand, main feather and system design solution ,particularly describes system design and implement in detail. In system design and implement,and key points in other sub-system are also analyzed further .This paper also introduces mostly technology of system . Lastly, this paper makes a summery and figures out some problem which need to be improved.2. computing has brought about a whole new standard of corporate computing productivity, but at the same time it has introduced many new problems for corporate IT organizations.The advent of low-cost desktop computers makes B/S possible. No longer is it necessary for users to wait even seconds to interact with their corporate data. With their own computer on their desktop they do not need to wait for the mainframe to respond.All of this cheap computer power has also made it possible to support computation- intensive graphical interfaces, which are much easier for users to understand.In order for B/S to work, the application program which used to reside entirely on the mainframe has been split into two pieces, the client piece and the server piece.The portion of the application that resides in the Client personal computer includes logic for the presentation of information to the user and mechanisms for accepting user input. It also includes logic for data interaction at the Client, such as changing the appearance of the graphical interface as the user make various choices.The Client software often includes corporate business rules that allow data to be validated before it is sent to the server.The portion of the application that remains on the Server is usually just the portion that stores data at a central location, accessible to other users. The once mighty mainframes have been reduced to database servers, while the rest of the application has migrated out to the clients.This migration has caused many problems. The Client machines have become "fat". As the complexity of applications has risen it has become necessary to supply users with more and more powerful computers with faster processors, more disk storage, and more RAM. It is true that personal computer manufacturers have been able to deliver better and better computers for the same amount of money, but the constant upgrades required are costly for corporations. It takes more people and time to upgrade hundreds or thousands of personal computers than it used to take to just upgrade the mainframes.Setting aside the cost of Client equipment, the proliferation of corporate applications, including business logic, to hundreds or thousands of machines has become a major cost factor for corporations. Where IT staffs used to be able to maintain all the corporate software assets in one central location, they now need to maintain corporate software spread all across the corporation, often housed in computers that are out of IT control.There are many estimates available that the cost of Client/Server computing is eight or more times the cost of the equipment alone. Several companies offer large, expensive systems that have the sole purpose of maintaining corporate software spread out all over the corporation.The issue here is not personal-productivity software such as word processors and spreadsheets. Personal software products have enabled knowledge workers to attain new heights of productivity. The issue is the maintenance of corporate software, such as order-entry and accounting. Imagine the difficulty of making a schema change in a corporate database, and synchronizing that change with the updating of thousands of copies of the corresponding Client software.It is true that the use of department-level LANs can bring down the number of copies that need to be updated to hundreds, instead of thousands. The size of the LANs must be limited, because the large size of the fat client software requires a responsive LAN or else the users will just copy the enterprise software to their own machines, bringing us back to thousands of copies to be maintained.The task of making simultaneous changes to even hundreds of copies of client software is still a daunting one.3. which in turn serves it back to the client in your personal computer, which displays the information for you.The client/server model has become one of the central ideas of network computing. Most business applications being written today use the client/server model. So does the Internet's main program, TCP/IP. In marketing, the term has been used to distinguish distributed computing by smaller dispersed computers from the "monolithic" centralized computing of mainframe computers. But this distinction has largely disappeared as mainframes and their applications have also turned to the client/server model and become part of network computing.In the usual client/server model, one server, sometimes called a daemon, is activated and awaits client requests. Typically, multiple client programs share the services of a common server program. Both client programs and server programs are often part of a larger program or application. Relative to the Internet, your Web browser is a client program that requests services (the sending of Web pages or files) from a Web server (which technically is called a Hypertext Transport Protocol or HTTP server) in another computer somewhere on the Internet. Similarly, your computer with TCP/IP installed allows you to make client requests for files from File Transfer Protocol (FTP) servers in other computers on the Internet.Other program relationship models included master/slave, with one program being in charge of all other programs, and peer-to-peer, with either of two programs able to initiate a transaction.ASP is also an abbreviation for application service provider.An Active Server Page (ASP) is an HTML page that includes one or more scripts (small embedded programs) that are processed on a Microsoft Web server before the page is sent to the user. An ASP is somewhat similar to a server-side include or a common gateway interface (CGI) application in that all involve programs that run on the server, usually tailoring a page for the user. Typically, the script in the Web pageat the server uses input received as the result of the user's request for the page to access data from a database and then builds or customizes the page on the fly before sending it to the requestor.ASP is a feature of the Microsoft Internet Information Server (IIS), but, since the server-side script is just building a regular HTML page, it can be delivered to almost any browser. You can create an ASP file by including a script written in VBScript or JavaScript in an HTML file or by using ActiveX Data Objects (ADO) program statements in the HTML file. You name the HTML file with the ".asp" file suffix. Microsoft recommends the use of the server-side ASP rather than a client-side script, where there is actually a choice, because the server-side script will result in an easily displayable HTML page. Client-side scripts (for example, with JavaScript) may not work as intended on older browsers.For Web service applications, Microsoft provides a new version of ASP support called .4. Browser/Server is a trademark for the new paradigm of corporate computing that is now possible using technology developed for the World Wide Web.At the present time the Web is used by the many corporations to distribute marketing materials. The corporate Web Server is usually just a Brochure Server for the Marketing department.The potential exists for using Web Browsers and Severs for much more, especially behind the corporate firewall. Browser/Server technology can be used to enhance most corporate computing systems, not just the system used for marketing.To understand the important new role that Browser/Server technology can play within a company it is useful to examine the previous paradigms that have paved the way for Browser/Server computing.Computers were first used in Batch mode. End users had little interaction with the corporate computing systems. Inputs would be gathered in a "batch" and keyed into punch cards, which were fed by operators into the mainframe computer when the computer was done running previous batch jobs. When the mainframe processed the job it usually produced printed output which eventually made its way to the end user. The batch process included no user interaction, and the only recourse a user had after discovering errors in the batch run was to go through the cycle, which often took hours or even days, again and again.The addition of dumb terminals to the mainframe gave the users direct, hands-on, connections to the corporate computer. Users no longer had to wait for a computer operator to run their jobs, they could enter the data and initiate processing themselves. There were still delays involved. Dumb terminals were useful for inputting and displaying information, but because they had no processing ability it was necessary for the user to interact with the mainframe in order to interact with their data. Batch jobs previously could be run one-by-one if necessary, but mainframes had to deal with all attached terminals seemingly at once. This lead to delays as users waited for the mainframe to "turn around" their terminal messages while they interacted with their data.Still, the delays were now down to seconds or minutes, instead of hours or days.Client/Server computing has brought about a whole new standard of corporate computing productivity, but at the same time it has introduced many new problems for corporate IT organizations.The advent of low-cost desktop computers makes Client/Server possible. No longer is it necessary for users to wait even seconds to interact with their corporate data. With their own computer on their desktop they do not need to wait for the mainframe to respond.All of this cheap computer power has also made it possible to support computation- intensive graphical interfaces, which are much easier for users to understand.In order for Client/Server to work, the application program which used to reside entirely on the mainframe has been split into two pieces, the client piece and the server piece.The portion of the application that resides in the Client personal computer includes logic for the presentation of information to the user and mechanisms for accepting user input. It also includes logic for data interaction at the Client, such as changing the appearance of the graphical interface as the user make various choices.The Client software often includes corporate business rules that allow data to be validated before it is sent to the server.The portion of the application that remains on the Server is usually just the portion that stores data at a central location, accessible to other users. The once mighty mainframes have been reduced to database servers, while the rest of the application has migrated out to the clients.This migration has caused many problems. The Client machines have become "fat". As the complexity of applications has risen it has become necessary to supply users with more and more powerful computers with faster processors, more disk storage, and more RAM. It is true that personal computer manufacturers have been able to deliver better and better computers for the same amount of money, but the constant upgrades required are costly for corporations. It takes more people and time to upgrade hundreds or thousands of personal computers than it used to take to just upgrade the mainframes.Setting aside the cost of Client equipment, the proliferation of corporate applications, including business logic, to hundreds or thousands of machines has become a major cost factor for corporations. Where IT staffs used to be able to maintain all the corporate software assets in one central location, they now need to maintain corporate software spread all across the corporation, often housed in computers that are out of IT control.There are many estimates available that the cost of Client/Server computing is eight or more times the cost of the equipment alone. Several companies offer large, expensive systems that have the sole purpose of maintaining corporate software spread out all over the corporation.The issue here is not personal-productivity software such as word processors and spreadsheets. Personal software products have enabled knowledge workers to attain new heights of productivity. The issue is the maintenance of corporate software, such as order-entry and accounting. Imagine the difficulty of making a schema change in acorporate database, and synchronizing that change with the updating of thousands of copies of the corresponding Client software.It is true that the use of department-level LANs can bring down the number of copies that need to be updated to hundreds, instead of thousands. The size of the LANs must be limited, because the large size of the fat client software requires a responsive LAN or else the users will just copy the enterprise software to their own machines, bringing us back to thousands of copies to be maintained.The task of making simultaneous changes to even hundreds of copies of client software is still a daunting one.The split-up of the corporate applications is different for Browser/Server . The user interface and the data interaction components are still run on the user machine, but the business logic usually remains on the Server, usually in a special Server called an Application Server.The user interface and data interaction components do run on the Client, but they are not ultimately stored there. They are most probably Java applets stored in a corporate Intranet Web Server, and they are automatically loaded into the Browser software on the user machine as they are needed. If a newer version becomes available, then that version is automatically loaded.We have achieved the same benefits as with Client/Server, but without the enormous distribution and maintenance problem. The only software that the user machine needs, besides an operating system and personal productivity software, is a Web Browser that runs Java applets.Since much of the "fat" of the application resides in the business logic Application Server, the need to constantly upgrade the user machines is greatly reduced. There is no need to spend precious time and hard disk space installing corporate software on thousands of user machines, or hundreds of departmental LANs.Corporate software assets now all reside in corporate servers, under IT control. Updates to systems are now easily coordinated.So exactly what is Browser/Server technology? Browser/Server is an important adaptation of modern network-centric computing that optimizes the performance of mission critical enterprise applications deployed via the corporate intranet and/or World Wide Web.Browser/Server accomplishes these performance gains with customized multi-tiered infrastructure and application designs that produce production solutions with reduced network requests and increased user interaction.(二)SOFTWARE QUALITY ASSURANCEThe activity of software quality assurance is closely related to verification and validation activities carried out at each stage of the software life cycle[1].Indeed,in many organizations there is no distinction made between these activities.However,quality assurance and other verification and validation activities are actually quite separate,with quality assurance being a management function and verification andvalidation being part of the process of software development[2].An appropriate definition of software quality assurance is provided by Bersoff(1984):Quality assurance consists of those procedures,techniques and tools applied by professionals to ensure that a product meets or exceeds prespecified standards during a products development cycle[3];and without specific prescribed standards,quality assurance entails ensuring that a product meets or exceed a minimal industrial and / or commercially acceptable level of excellence.This definition is,of course[4],a fairly general one and it suggests that,firstly,software standards can be established and,secondly,the level of excellence of a software product can be estimated.The development of software engineering project standards is an extremely difficult process. A standard is some abstract representation of a product which defines the minimal level of performance,robustness,organization,etc.,which the developed product must attain[5].At the time of writing,some software standards have been developed by the IEEE,ANSI and military organizations.These standards describe configuration management plans,documentation,specification practices,software comparisons,etc.Other standards which are currently under development include standards for reliability,measurement,the use of Ada as PDL[6],software testing and others.Bransta d and Powell(1984)describe both existing and planned software standards as well as discussing standardization in more general terms.The problem with national software standards is that they tend to be very general in nature. This is inevitable as,unlike hardware,we are not yet capable of quantifying most software characteristics.Effective quality assurance within an organization thus requires the development of more specific organizational standards.Of course,the problem which arises in developing software standards for quality assurance and which makes the assessment of the level of excellence of a software product difficult to assess is the elusive nature of software quality.Boehm et al.(1978)suggest that quality criteria include but are not limited to:Economy Correctness ResilienceIntegrity Reliability UsabilityDocumentation Modifiability ClarityUnderstandability Validity MaintainabilityFlexibility Generality PortabilityInteroperability Testability EfficiencyModularity ReusabilityExactly how some of these criteria may be quantified is not clear.Furthermore,as Buckley and Poston(1984)point out,parts of this definition may have no value for a particular product.It may be possible to transfer a system from a microcomputer to a large mainframe but this is often a nonsensical thing to do.Assessment of software quality thus still relies on the judgement of skilled individuals although this does not mean that it is necessarily inferior to quantitative assessment.After all,we cannotassess a painting or a play quantitatively yet this does not preclude a judgement of its quality.Within an organization,quality assurance should be carried out by an independent software quality assurance team who reports directly to management above the project manager level.The quality assurance team should not be associated with any particular development group but should be responsible for quality assurance across all project groups in an organization.The activity of quality assurance involves sitting in on design reviews[7],program walkthroughs,etc. ,and reporting on the overall quality of the product as it is developed.It also involves checking that the finished product and its associated documentation conform to those standards which exist.The quality assurance team may also assess if the different representations of a product(requirements,design,code)are consistent and complete.Notice that quality assurance is not the same as system testing.It is the development or testing team’s responsibility to validate the system,with the quality assurance team reporting on both the validation and the adequacy of the validation effort.This naturally involves quality assurance being closely associated with the final integration testing of the system.Software quality assurance is now an emerging subdiscipline of software engineering[8].As Buckly and Poston point out,effective software quality assurance is likely to lead to an ultimate reduction in software costs.However,the major hurdle in the path of software management in this area is the lack of usable software standards.The development of accepted and generally applicable standards should be one of the principal goals of research in software engineering.(三)SOFTWARE TESTING1. Purpose of TestingNo matter how capably we write programs,it is clear front the variety of possible errors that we should check to insure that our modules are coded correctly.Many programmers view testing as a demonstration that their programs perform properly.However,the idea of demonstrating correctness is really the reverse of what testing is all about.We test a program in order to demonstrate he existence of an error.Because our goal is to discover errors,we can consider a test successful only when an error is discovered.Once an error is found,“debugging”or error correction is the process of determining what causes the error and of making changes to the system so that the error no longer exists.2.Stages of TestingIn the development of a large system,testing involves several stages.First,each program module is tested as a single program,usually isolated from the other programs in the system.Such testing,known as module testing or unit-testing,verifies that the module functions properly with the types of input expected from studying themodule design.Unit testing is done in a controlled environment whenever possible so that the test team can feed a predetermined set of data to the module being tested and observe what output data are produced[1].In addition,the test team checks the internal data structures,the logic,and the boundary conditions for the input and output data.When collections of modules have been unit-tested,the next step is to insure that the interfaces among the modules are defined and handled properly.Integration testing is the process of verifying that the components of a system work together as described in the program design and system design specifications.When collections of modules have been unit-tested,the next step is to insure that the interfaces among the modules are defined and handled properly.Integration testing is the process of verifying that the components of a system work together as described in the program design and system design specifications.Once we are sure that information is passed among modules according to the design prescriptions,we test the system to assure that it has the desired functionality.A function test evaluates the system to determine if the functions described by the requirements specification are actually performed by the integrated system [2].The result,then,is a functioning system.Recall that the requirements were specified in two ways:first in the customer’s terminology and again as a set of software and hardware requirements.The function test compares the system being built with the functions described in the software and hardware requirements.Then,a performance test compares the system with the remainder of the software and hardware requirements.If the test is performed in the customer’s actual working environment,a successful test yields a validated system.However,if the test must be performed in a simulated environment,the resulting system is a verified system.When the performance test is complete,we as developers are certain that the system functions according to our understanding of the system description.The next step is to confer with the customer to make certain that the system works according to the customer’s expectations.We join with the customer to perform an acceptance test in which the system is checked against the customer’ s requirements description.When the acceptance test is complete,the accepted system is installed in the environment in which it will be used;a final I nstallation test is performed to make sure that the system still functions as it should.Fig. 8-2 illustrates the several stages of testing.Although systems may differ in size,the type of testing described in each stage is necessary for assuring the proper performance of any system being developed.译文:(一) asp技术1. 本文首先介绍了课题研究所用的技术:浏览器/服务器结构以及Web应用的相关数据库访问技术。
ASP相关外文翻译

原文:The first. Origin of ASPThe research to ASP mode and ASP enterprise's origin can proceed with two respects , one to in terms of business and technology , is it carry on research to come from ASP developing history that business commit; Another one is studies the origins of ASP enterprises and evolution course at present in terms of organization's development.Whether stand up synthetically above-mentioned developing stage, to put it briefly, present ASP history and development path of provider can simple to describe as:The first, developed from the past ISP, rounded the infrastructure and communication function, cooperate with software manufacturer, increase the business scope, develop into the present IDC (the data centre of Internet);The second,the past ISV (independent software provider ) and V AR (the trader that resells value-added service ), at Internet age , changed the marketing way in the past , would rely mainly on sale of the software product to change direction to rely mainly on the fact that right to use is leased in the past, bale from physics carrier encapsulation way change direction and long-range operation way main fact now, through the cooperation with network operator , realize the transition to ASP;The third ,IT service departments and traditional advisory companies of traditional large-scale organization, at the foundation known deeply in Internet , depend on long-term experience, is it carry on systematic design and implementation of scheme for other customer to begin, through establish in with trader who operates network and alliance relation between the application software manufacturer, realize the ASP provider that appears in the capacity of system integration trader.The second. The developing history and classification of ASPSeen from the present, ASP is as emerging and proposing formally it is only a thing from the end of 1998 to the beginning of 1999 of a kind of mode. And untilfrom the end of 1999 to the beginning of 2000 to a great extent, ASP field relevant outstanding behaviours at the capital market of Company just cause people's extensive concern. In fact speaking from the intension and essence of ASP mode, it is not the brand-new things, but the mode that had once had, has been given the new vitality at Internet age. During this festival, we will review the course that ASP produce development and develop, in order to help the essence of better deep understanding ASP. At the end, we will concentrate on introducing the situation which enterprises divide from different standards in ASP field at present.The third. The development foundation of ASP modeASP as one brand-new concept, proposition and it takes shape to be just time for more than half a year of it, but in U.S.A. and other fast-developing countries of IT industry, ASP is becoming a kind of new developing business mode of leading e-commerce in the future, main maturity based on following IT technology of precondition that ASP produces and develops: Popularization of Internet: Internet deepens people's life progressively , a large number of solutions based on Web are emerging constantly, all these make long-range application scheme based on host computer become possible; The bandwidth is increasing and dropping with the price constantly constantly: Communication performance and bandwidth expenses reduced continuously increased, make the application program at the host computer able to visit through Internet and tight client; Whether client / server can use by sharing under the environment. The remote access in ASP concept , users have already been accustomed to under the enviroment of client / the server, this make remote access and is it is it become acceptable first business mode to use to share; The browser becomes figure interface application program accepting extensively: The wide application and development of the technology of the browser have gathered enough technology and human resources for the calculation based on the calculation of Web and thin client, and good user' s foundation; Potentiality of e-commerce solution: Advanced e-commerce solution, has shared a lot of thorny business and technological question together with concept of ASP, such as systematic security and dependability. So, the enormous motive force of e-commerce is promoting the advancing of ASP.THE forth. China ASP market's overviewIn 2000, the total sales amount of China ASP market was 33 million dollars, accounted for 0.3% of global total sales amount. IDC is expected, the annual average rate of increase of the large China district ASP market will be 64% from 2000 to 2004, by 2004, the capacity of the large China district ASP market will reach 243 million dollars. China ASP market began to sprout when the beginning of 2000, remains the market for an unripe initial stage now, it show as the market store medium and small-scale specializing in using and serving Company that comes up to a large number in, it is mainly those traditional independent software developers , system integration trader and .com Company. But company these possess heavy competitiveness too at ability and Company scale that itself provide service.Internet of our country develops after going through fanatically, begins to tend towards reason and norm this year. It is exactly while summarizing and adjusting website's industry's development path now, we need to think and know Internet's own characteristic and advantage again for this. Its characteristics, such as high-efficient, simple and direct, individualized, resource-sharing, crossing over space-time and relatively cheap cost, etc., it is the motive power that it must use high-speed development. At the present, those companies specializing in offering service of using still face the challenge. First of all, in among being IT trade, is it is it serve these kind of mode far accept by masses even to use to sell, because most traditional trades have not realized yet that ASP way can bring the interests to them; Secondly, how to sell the application program in a kind of way which is similar to the whole solution, it is all important problems that ASP manufacturers face how to make pricing system; Finally, how be through offer application program service and traditional software sell mode participate in the competition, it is a question that China ASP should be pondered deeply too. And at present, the operation principles of most websites are remote from above-mentioned advantage and characteristic in Internet, the trains of thought of operation of websites seem that still stays in management mode and management theory in old era. But at the same time, the current situation of the Chinese market is that the competition is being aggravated constantly amongenterprises, e-commerce is developed rapidly and ten millions of small and medium enterprises all generally lack the fund and well-trained job IT personnel, these reasons will promote the development in China of this kind of mode of ASP too. The scale of website of this kind of mode is like large-scale enterprises or large-scale company too, we can say although the sparrow is small, the five internal organs are available. A key job of believing that in the near future , the content will be made and the customer service will become websites. Even make the respect in the content, needn't make personnel totally regular and centralized either. The most emerging technology has already made us able to finish the organization, exchange of the webpage, format and transplanting in the twinkling of an eye on Internet directly, the huge administration in website's company and personnel management organization will have passed out of existence; With the progress of the society, human life will be closely linked with Internet , website company is it invest a large amount of manpower and huge fund is it cover the sky and the earth , promote get households of propaganda of type to go on to need; And Chinese enterprise choose factor that ASP consider especially at the manufacturer concentrate on data security guarantee , professional IT quality respect of personnel too. Meanwhile, because such new service form confidence insufficient to ASP, reliance of degree one quite general phenomenon too to ASP manufacturer prestige. Rank choice factor after the factor these include the price , implement speed and expansibility of application program ,etc. also. But we are looking forward to, ASP service business that will be developed soon, will offer sectional system integration of the module service for website's construction. It can make individual set up homepage with perfect function need to set foot in any technological development even. So website operation can get rid of huge technological development and maintain organization from then on, this is the developing direction of ASP and trend of the market in the future. If we call it as making the undertaking totally all living key of websites to the future, that will not exaggerate at all. IDC thinks that in two years in the future, ASP market of China will move to maturity progressively, certainly will eliminate a batch of commercial modes in the unclear or company that one's own ability is worse too, by 2003, China ASP market will demonstrate the trendof steady growth. And in coordination with the applied software market, vertical trade ASP market, SCM applied software market, CRM applied software market will be that China's development will be very fast in the following two years, field of having more commercial opportunities.译文:1.ASP的起源对于ASP模式和ASP企业起源的研究,我们可以从两个方面入手,第一个是从技术和业务的角度分析,主要是从ASP业务构成的发展历史来进行研究;另一个是从ASP企业起源的组织机构发展的角度分析,从而来研究目前ASP企业的由来、发展和演化的一个过程。
什么是ASP服务

什么是ASP服务?
ASP是英文Application Service Provider的缩写,通常中文译为应用服务提供商,它是指配置、租赁和管理应用解决方案,为商业、个人提供服务的专业化服务公司。
ASP最早出现于1998年,它具有以下特点:
1. ASP以应用为业务核心,出售应用访问,为客户提供对应用的访问和管理。
客户不需要为自身的应用需求在设备、软件、人员等方面再做投资。
通过使用ASP服务,并按使用周期付费,可以极大地降低企业应用系统的投资风险和初期投入;
2.ASP对多个客户服务,进行集中管理。
ASP提供一套标准化应用包,为多个不同的客户提供专业化的应用服务,一般在一个中心位置进行集中管理,客户通过互联网进行远程访问所需的应用;
3. 与传统公司内部运作的应用软件相比较,ASP使其安全性、可靠性和可伸缩性大为增强。
客户不必再考虑维护和升级的问题,成本大大降低。
ASP服务的优势
ASP被认为是继ISP、ICP、电子商务之后的互联网应用的第四阶段,也是传统产业与互联网结合的最佳方式。
1. 满足了分布式公司对远距离办公的需求,具有普适性,只要在能够访问Internet 的地方就能够享受到ASP 服务。
2. ASP服务实现异地同步和协同管理:跨地域的应用,有效地解决了集团型企业和分销模式企业异地信息整合和协同管理需要。
3. ASP模式使客户花最少的钱,就能够接触到先进的IT技术,将精力集中于企业的核心业务。
免费ASP英文翻译

1.所译外文资料:①作者:②书名:Tutorial Home Page③出版社:④出版时间(或刊号):2004⑤所译页码:2.译成中文:Session and Application本页我们将学习如何将用户信息保持在我们的站点里(用Session 方法)和用户间如何共享信息用(Application方法)。
这仅仅是对初学者的基本指南,因此只阐述了基本的用法。
Session 方法当某个用户首次访问我们站点的页面时,会引起建立连接和断开连接的事件发生。
在该过程中,服务器和客户端将通过互发信息来确认对方。
通过信息的互发,服务器将能够识辨某个指定的用户,并把特定的信息给赋给特定的用户。
计算机之间的这种关系称为会话-session.在会话活动期间,可以用Session方法把信息赋给特定的用户。
下面我们将用例子来解释这个方法:假设我们想允许特定的用户来访问我们站点或目录上的信息,而且我们想在用户访问的所有页面上显示他的用户名。
在这种情况下我们将使用Session方法。
在这个例子中,我们用index.asp 页面要求用户输入用户名。
respondtoforms.asp<% IF Request.form="" THEN %><html><title>Our private pages</title><body>In order to access this pages fill the form below:<BR><form method="post" action="index.asp">Username: <input type="text" name="username" size="20"><BR>Password: <input type="password" name="password" size="15"><BR><input type="Submit" value="Submit"></form></body></html><% ELSE %><%IF Request.form("username")="Joe" AND Request.form("password")="please" THEN %><%Session("permission")="YES"Session("username")="Joe"%><html><title>Our private pages</title><body>Hi <% =Session("username") %>, you are allow to see these pages: <BR><A HREF="page1.asp">Page 1</A><BR><A HREF="page2.asp">Page 2</A></body></html><% ELSE %>Error in username or password<% END IF %><% END IF %>123456789101112131415161718192021222324252627282930313233343536373839404142让我来解释一下这个页面如何运作的?第一行的语句是用来检验用户是否通过表单提交信息的。
ADO NET数据集ASP技术应用程序中英文资料外文翻译文献

中英文资料外文文献及翻译:On the ASP to maintain the security of applicationsabout DataSet and the parallel implementation of 【abstract】 DataSetsTheDataSetobject is central tosupporting disconnected, distributed data scenarios with . TheDataTableCollectionAn DataSetcontains acollection of zero or more tables represent ed byDataTableobjects.Properly configured security settings to protect your ASP applications will not be unauthorized user access and tampering. The ASP provides a wide range of application of safeguard procedures.【keyword】 DataSet,asp,Security,web server DataSetsTheDataSetobject is central tosupporting disconnected, distributed data scenarios with A . TheDataSetis a memory-residentrepresentation of data that provides a consistent relational programming modelregardless of the data source. It can be used with multiple and differing datasources, with XML data, or to manage data local to the application. TheDataSetrepresents acomplete set of data, including related tables, constrai nts, and relationshipsamong the tables. The following illustration shows theDataSetobject model.DataSetobject mo del The methods andobjects in aDataSetare consistent with those in the relational databasemodel.TheDataSetcan al so persist andreload its contents as XML, and its schema as XML schema definition language(XSD) schema.ASP is a server-side scripting environment, through such an environment, users can create and run dynamic, interactive Web server applications. ASP's ActiveX technology is based on the use of open design environment, users can create their own definitions and components by adding them to their own dynamic web site with almost unlimited capacity to expand. ASP can also use ADO to access the database quickly and easily, allowing the development of applications based on the WWW possible. DataSet and the parallel implementation of TheDataTableCollectionAn DataSetcontains acollection of zero or more tables represented byData Tableobjects. TheDataTableCollectioncontains all theDataTableobjects in aDataSet.ADataTableis defined in theSy stem.Datanamespace andrepresents a single table of memory-resident data. It contains a collection ofcolumns represented by aDataColumnCollection, and constraintsrepresented by aConstraintCollection, which together define the schema of thetable.ADataTablealso contains a collection of rows represented by theDataRowCollection, which contains thedata in the table. Along with its current state, aDataRowretains both itscurrent and original versions to identify changes to the values stored in therow. TheDataView ClassADataViewenables you tocreate different views of the data stor ed in aDataTable, a capability thatis often used in data-binding applications. Using aDataView, you can expose the data in a table with different sort orders, and you can filter the data by rowstate or based on a filter expression. Th eDataRelationCollectionADataSetcontains relationshipsin itsDataRelationCollectionobject. A relationship, represe nted bytheDataRelationobject, associates rows inoneDataTablewith rows in anotherDataTable.A relationship isanalogous to a join path that might exist between primary and foreign keycolumns in a relatio nal database. ADataRelationidentifies matchingcolumns in two tables of aDataSet.Relationships enablenavigation from one table to another in aDataSet. The essentialelements of aDataRelationare the name of the relationship, the name of the tablesbeing related, and the related columns in each table. Relationships can bebuilt with more than on e column per table by specifying an array ofDataColumnobjects as the keycolumns. When you add a relationship t o theDataRelationCollection, you can optionallyadd aUniqueKeyConstraintand aForeignKeyConstraintto enforce i ntegrityconstraints when changes are made to related column values. XMLYou can fill aDataSetfrom an XMLstre am or document. You can use the XML stream or document to supply to theDataSeteither data, schemainformation , or both. The information supplied from the XML stream or documentcan be combined with existing data or sche ma information already present in theDataSet. ExtendedPropertiesTheDataSet,DataTable, andDataColumnall hav e anExtendedPropertiesproperty.ExtendedPropertiesis aPropertyCollectionwhere you can placecustom information , such as the SELECT statement that was used to generate theresult set, or the time when the data was generated. T heExtendedPropertiescollection ispersisted with the schema information for theDataSet.LINQ toDataSetLINQ to DataSetprovides language-integrated querying capabilities for disconnected data sto redin a DataSet. LINQ to DataSet uses standard LINQ syntax and providescompile-time syntax checking, static ty ping, and IntelliSense support when youare using the Visual Studio IDE.5、Side-by-Side Execution in Side-by-sideexecution in the .NET Framework is the ability to execute an ap plication on acomputer that has multiple versions of the .NET Framework installed,exclusively using the version f or which the application was compiled.An applicationcompiled by using one version of the .NET Framework can r un on a differentversion of the .NET Framework. However, we recommend that you compile a versionof the applic ation for each installed version of the .NET Framework, and runthem separately. In either scenario, you should be aware of changes in between releases that can affect the forward compatibility or backwardcompatibilit y of your application.ForwardCompatibility and Backward CompatibilityForward compatibilitymeans that an application can be c ompiled with an earlier version of the .NETFramework, but will still run successfully on a later version of the .NETFramework. code written for the .NET Framework version 1.1 is forwardcompatible with later versio ns.Backwardcompatibility means that an application is compiled for a newer version of Framework, but c ontinues to run on earlier versions of the .NET Frameworkwithout any loss of functionality. Of course, this will no t be the case forfeatures introduced in a new version of the .NET Framework. The .NETFramework Data Provider for ODBCStarting with version1.1, the .NET Framework Data Provider for ODBC (System.Data.Odbc) is include d as apart of the .NET Framework. The ODBC data provider is available to .NETFramework version 1.0 developer s as a Web download from theDataAccess andStorageDeveloperCenter.The namespace forthe downloaded .NET Framework Data Provider for ODBC isMicrosoft.Data.Odbc.If you have anapplication developed for the .NET Framework version 1.0 that uses the ODBCdata provider to connect to your data source, and you want to run thatapplication on the .NET Framework version 1.1 or a later version, you m ustupdate the namespace for the ODBC data provider toSystem.Data.Odbc. You then mustrecompile it for the new er version of the .NET Framework.If you have anapplication developed for the .NET Framework version 2.0 or lat er that uses theODBC data provider to connect to your data source, and you want to run thatapplication on the .NE T Framework version 1.0, you must download the ODBC dataprovider and install it on the .NET Framework versi on 1.0 system. You then mustchange the namespace for the ODBC data provider toMicrosoft.Data.Odbc, and reco mpile theapplication for the .NET Framework version 1.0. The .NETFramework Data Provider for OracleStarting with version1.1, the .NET Framework Data Provider for Oracle (System.Data.OracleClient) is included as apart of the .NET Framework. The data provider is available to .NET Frameworkversion 1.0 developers as a Web downloa d from theData AccessandStorageDeveloperCenter.If you have anapplication developed for the .NET Framework version 2.0 or later that uses thedata provider to connect to your data source, and you want to run thatapplication o n the .NET Framework version 1.0, you must download the dataprovider and install it on the .NET Framework ver sion 1.0 system. CodeAccess SecurityThe .NET Frameworkdata providers in the .NET Framework version 1.0 (S ystem.Data.SqlClient,System.Data.OleDb) are required to runwith FullTrust permission. Any attempt to use the .N ET Framework k dataproviders from the .NET Framework version 1.0 in a zone with less thanFullTrust permissio n causes aSecurityException.However, startingwith the .NET Framework version 2.0, all of the .NET Framework data providerscan be used in partially trusted zones. In addition, a new security feature wasadded to the .NET Fram ework data providers in the .NET Framework version 1.1.This feature enables you to restrict what connection strin gs can be used in aparticular security zone. You can also disable the use of blank passwords for aparticular security zone. For more informationBecause eachinstallation of the .NET Framework has a separate Security.config file, th ereare no compatibility issues with security settings. However, if yourapplication depends on the additional securit y capabilities of includedin the .NET Framework version 1.1 and later, you will not be able to distribut eit to a version 1.0 system. SqlCommandExecutionStarting with Framework version 1.1, the way thatEx ecuteReaderexecutes commands atthe data source was changed.In the .NET Frameworkversion 1.0,ExecuteReader executed all commands in the context of thesp_executesqlstored procedure. Asa result, commands that affect the state of the connection (for example, SETNOCOUNT ON), only apply to the execution of the current command. Th e state ofthe connection is not modified for any subsequent commands executed while theconnection is open.In the .NETFramework version 1.1 and later,ExecuteReaderonly executes acommand in the context of thesp_executesqls tored procedure if the command containsparameters, which provides a performance benefit. As a result, if a comm andaffecting the state of the connection is included in a non-parameterizedcommand, it modifies the state of the co nnection for all subsequent commandsexecuted while the connection is open.Consider thefollowing batch of comm ands executed in a call toExecuteReader.In the .NET Frameworkversion 1.1 and later, NOCOUNT will remain ON for any subsequent commandsexecuted while the connection is open. In the .NET Framework version 1.0, NOCO UNTis only ON for the current command execution.This change canaffect both the forward and backward compati bility of your application if youdepend on the behavior ofExecuteReaderfor either version of the .NET Framework. For applications thatrun on both earlier and later versions of the .NET Framework, you can writeyour code to mak e sure that the behavior is the same regardless of the versionyou are running on.If you want to make sure that a command modifies the stateof the connection for all subsequent commands, we recommend that you executeyour command usingExecuteNonQuery. If you want to make sure that a command does not modifythe connection for all subsequent commands, we recommend that you include thecommands to res et the state of the connection in your command. For example: MicrosoftSQL Server Native ClientMicrosoft SQL ServerNative Client contains the SQL OLE DB provider and SQL ODBC driver in onenative dynamic link library (DLL) supporting applications using native-codeAPIs (ODBC, OLE DB andADO)to Microsoft SQL Server. SQL Server Native Client should be used rather thanMicrosoft Data Access Components (MDAC) to create new applica tions or enhanceexisting applications that need to take advantage of features that wereintroduced in SQL Server 20 05, such as Multiple Active Result Sets (MARS),Query Notifications, User-Defined Types (UDT), and XML data type support. MicrosoftData Access Components (MDAC)The .NET Frameworkdata providers for OLE DB and ODBC require MDAC 2.6 or a later version in allversions of the .NET Framework, and MDAC 2.8 SP1 is recomm ended. Although thisrequirement introduces no side-by-side execution issues, notice that MDAC doesnot currently support side-by-side execution.Therefore, it is important toverify that your application will continue to function correctly with the newversio n before upgrading the MDAC components for your installation.For more informationabout MDAC, see theData A ccess andStorageDeveloperCenter. WindowsData Access Components (Windows DAC)Windows Data AccessCo mponents (Windows DAC) 6.0 is a set of technologies included in Windows Vistato provide access to information across the enterprise. These technologiesinclude the latest versions of the data access technologies included in MD AC:Microsoft ActiveX Data Objects (ADO), OLE DB, and Microsoft Open DatabaseConnectivity (ODBC).On the ASP to maintain the security of applicationsDuring the process of the DataSet and the parallel implementation of ,the ASP to maintain the security of applications is especially important.First, NTFS permissionsYou can separate the application of NTFS file and directory access permissions to protect document ASP applications. NTFS permissions We b server is the basis of security, which defines one or a group of users to access files and directories at different levels. When Windo ws NT has a valid account of a user tries to access restricted documents, the computer will check the file access control table. The table definition of the different users and user groups have been given permission. If the user account has permissions to open the file, the computer allows the user to access files.Second, To maintain the security of GlobalasaIn order to fully protect the ASP application, the application must document the Globalasa the appropriate user or group setting NTFS file permissions. If Globalasa contains information to the browser to return to the command and you do not have the protection of Global asa file, then information will be returned to the browser, even if the application of other documents to be protected. Moreover, the application must be on the uniform application of the NTFS file permissions.Third, Web server permissionsCan configure the Web server permissions to restrict users to view all the running and operation of the way ASP pages. Unlike NTFS permissions to control the provision of application-specific user access to files and directories the way, Web server permissions apply to all users, and do not distinguish between the type of user account. To run for your ASP applications users, in the setting Web server permissions must be guided by the following principles:Asp file containing the virtual directory to allow "read" or "script" permissions; of asp file and other script file that contains the virtual directory to allow "read" or "script" permissions; to include asp files and other "executive" privileges to run the virtual directory of the document to allow "read" and "executive" authority.Fourth, Script mapping fileScript mapping applications to ensure that the Web server does not accidentally download the source code asp file. For example, even if your asp file contains a directory set up a "read" permission, as long as the asp file is part of a script mapping applications, then your Web server the file will not return to the source code to the user .Fifth, Cookie securitySessionID cookie to track the use of ASP Application or conversation during the visit to the Webbrowser-specific information. This means that the cookie with the HTTP request is considered to be from the same Web browser. Web Server Se ssionID cookies can be used to configure user-specific session information with the ASP application.However, do not take the correct configuration of the importance of security settings. If you do not correctly configure the security settings, not only make your ASP application to unnecessary tampering, and would hamper legitimate users access to your asp file. Web server to provide a variety of methods to protect your ASPapplications will not be unauthorized user access and tampering. DataSet与 的并行执行在ASP技术应用程序中的安全性论证【摘要】DataSet包含由DataTable对象表示的零个或多个表的集合。
外文翻译--开发一个ASP网站所运用的工具

中文3400字ASP development of a site by the use of tools1. DreamweaverMacromedia Dreamweaver is a professional HTML editor for visually designing and managing web sites and pages. Whether you enjoy the control of hand-coding HTML or prefer to work in a visual editing environment, Dream weaver makes it easy to get started and provides you with helpful tools to enhance your Web design experience.Dreamweaver includes many coding tools and features: an HTML, CSS, and JavaScript reference, a JavaScript debugger, and code editors (the Code view and Code inspector) that allow you to edit JavaScript, XML technology imports HTML documents without reformatting Macromedia’s Roundtrip HTML technology imports HTML documents without reformatting the code and you can set Dream weaver to clean up and reformat HTML when you want it to .Dreamweaver’s visual editing features also let you quickly add design and functionality to your pages without writing a line of code. You can view all your site elements or assets and drag them from an easy-to-use panel directly into a document. Streamline your development workflow by creating and editing images in Macromedia Fireworks, then importing them directly into Dream weaver, or by adding Flash objects you create directly in Dreamweaver.Dreamweaver is fully customizable. Use Dreamweaver to create your own objects and commands, modify keyboard shortcuts, and even write JavaScript code to extend Dreamweaver’s capabilities with new behaviors, property inspectors and site reports.The Dreamweaver work areaLet’s start with a brief overview of the Dreamweaver work area.If you haven’t already launch Dreamweaver, double-click the Dream weaver icon to launch it.The Dreamweaver work area accommodates different styles of working and levels of expertise.When you launch Dreamweaver, the following work area items open:The Document window displays the current document as you create and edit it.The Objects panel contains icons you click to insert objects in you document.Dreamweaver provides many floating panels, such as the HTML Styles panel and the code inspector which enable you to work with other Dreamweaver elements.The Launcher bar contains buttons for opening and closing your most frequently used inspectors and panels.The Property inspector displays properties for the selected object or text, and lets you modify those properties.(Which properties appear in the inspector depend on the object actively selected in the document.)To open Dreamweaver’s windows, inspectors and panels, use the Win dow menu. A check mark next to an item in the Window menu indicates that the named item is currently open(though it may be hidden behind other windows). To display an item that isn’t currently open, choose the item name from the menu or use its keyboard shortcut.Working in DreamweaverDreamweaver can display a document in three ways: in Design view, in Code view, and in a split view that shows both the design and code.(To change the view in which you’re working ,select a view in the Dream weaver toolbar.)B y default, Dreamweaver displays the document window in design view.In addition, you can work with Dreamweaver’s design view in two different ways in layout view and standard view.( You select these views in the view category of the objects panel.) In layout view you can design a page layout. Insert graphics, text, and other media; in standard view, in addition to inserting graphics text and media, you can also insert layers, create frame documents, create tables, and apply other changes to your page-options that aren’t available in layout view.2.DatabaseYou know that a database is a collection of logically related data elements that maybe structured in various ways to meet the multiple processing and retrieval needs of organizations and individuals. There’s nothing new about databases-early ones were chiseled in stone, penned on scrolls, and written on index cards. But now databases arecommonly recorded on magnetically media, and computer programs are required to perform the necessary storage and retrieval operations.You’ll see in the following pages that complex data relationships and linkages maybe found in all but the simplest databases. The system software package that handles the difficult tasks associated with creating, accessing, and maintaining database records is called a database management system(DBMS).The programs in a DBMS package establish an interface between the database itself and the users of the database.(These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements from the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unpla nned questions that aren’t available in regular reports.These questions might initially be vague and/or poorly defined, but people can “browse” through the database until they needed information. In short, the DBMS will “manage” the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t programmers. Ina file-oriented system, users needing special information may communicate their needs to programmer, who, when time permits, will write one or more prepare the information.The availability of a DBMS, however, offers users a much faster alternative communications path.3. SQL AND SQL SERVERIBM invented a computer language back in the 1970s designed specifically for database queries called SEQUEL; those letters stand for Structured English QUERY for queries, but can also build databases and manage the database engine’s security. Because of this heritage you can pronounce it “sequel” or spell it out “S-Q-L.” There are various versions of SQL used in today’s database engines. Microsoft SQL Server uses a version called Transact-SQL, or T-SQL, which stands for Transaction SQL.⑴What Is SQL Server?SQL Server is a client/server relational database management system (RDBMS)that use Transact-SQL to send requests between a client an SQL Server.⑵Client/Server ArchitectureThe terms client, server, and client/server can be used to refer to very general concepts or to specific items of hardware or software. At the most general level, a client is any component of a system that requests services or resources from other components of a system. A server is any component of a system that provides services or resources to other components of a system.For example, when you print a document from your workstation on a network, the workstation is the client and the machine that does the print spooling is the server.Any client/server data-base system consists of the following components:The server—A collection of data items and supporting objects organized and presented to facilitate services, such as searching ,sorting , recombining ,retrieving, updating ,and analyzing data.. The database consists of the physical storage of data and the data base services. All data access occurs through the server; the physical data is never accessed directly by the client.The client—A software program that might be used interactively by a person or that could be an automated process. This includes all software that interacts with the server, either requesting data from or sending data to the database.The communication between the client and the server---- The communication between the client and the server depends largely on how the client and server are implemented. Both physical and logical layers of communication can be identified.When you communicate with someone using the telephone, the telephone system is the physical layer and a spoken natural language is the logical layer of communication. For a data-based system, the physical layer can be a network if the server and the client are on different computers. It can be intercrosses communication if the server and the client are on the same computer. The logical communication structure of the physical layer may be low-level operating system calls, a proprietary data access language, or the open structured query language (SQL)4. IISInternet Information Server is the acronym (IIS) is a World Wide Web server. Gopher server and FTP server all inclusive inside. IIS means that you can publish web pages, andthere are ASP (Active Server Pages), JAVA, VBscript generated pages, with some extensions. IIS support some interesting things, like the editorial environment interface (FRONTPAGE), a full-text search function (INDEX SERVER), a multimedia capabilities (NET SHOW)Secondly, IIS is with Windows NT Server 4.0 to provide the documents and application server, Windows NT Server is built on the basic Internet server components. Windows NT Server and its fully integrated, allowing the use of Windows NT Server built-in security, and the NTFS file system build a powerful and flexible Internet / Intranet site.IIS (Internet Information Server, Internet Information Services) is a Web (Web) services components, including Web server, FTP server, NNTP server and the SMTP server, were used for web browsing, file transfer, mail and news services and so on It makes the network (including the Internet and LAN) on the release of information has become a very easy matter.IIS is the abbreviation for Internet Information Server, Microsoft is pushing the main server, the latest version is included Windows2000 inside the IIS 5, IIS and WindowNT Server fully integrated together, so users can use Windows NT Server and NTFS (NT File System , NT file system) built-in security features, building a strong, flexible and secure Internet and Intranet sites.IIS support HTTP (Hypertext Transfer Protocol, Hypertext Transfer Protocol), FTP (File Transfer Protocol, file transfer protocol) and SMTP protocol, through the use of CGI and ISAPI, IIS can be a high degree of expansion.IIS support has nothing to do with the language of the script preparation and components, through the IIS, developers can develop a new generation of dynamic, full of charm of the Web site. IIS does not require developers to learn new scripting language or compiler applications, IIS full support for VBScript, JScript software development and Java, it also supports the CGI and WinCGI, and the expansion and ISAPI filter.IIS is designed to establish a set of integrated server services to support HTTP, FTP and SMTP, it can provide quick and integration of existing products, while expansion of the Internet server.IIS highly relevant, while the consumption of system resources is at least, IIS installation, configuration and management are very simple, it is because IIS and Windows NT Server network operating system closely integrated with the other, IIS also use the Windows NT Server the same as the SAM (Security Accounts Manager, Security Account Manager), the administrators, IIS, such as the use of Performance Monitor and SNMP (Simple Nerwork Management Protocol, SNMP) such as the NT has management tools.IIS support for ISAPI, ISAPI to expand the use of server functions, and the use of ISAPI filter can be pre-treatment and post-processing stored in the IIS on the data. For 32-bit Windows applications can be extended to the Internet FTP, SMTP and HTTP-placed and easy to use task focus of the interface, the interface will be the use of Internet applications greatly simplified, IIS also supports MIME (Multipurpose Internet Mail Extensions, More for Internet Mail Extensions), it can access the Internet applications provide a simple registration of.IIS is an important characteristic to support ASP. IIS 3.0 version after the introduction of the ASP, can easily display dynamic content and the development of Web-based applications. For such as VBScript, JScript development of software, or from Visual Basic, Java, Visual C + + development system, and the existing WinCGI CGI scripts and applications developed, IIS provide strong local support.开发一个ASP网站所运用的工具1. DreamweaverMacromedia Dreamweaver 是为视觉上设计并且管理网络站点和网页的一个专业的HTML编辑器。
ASP论文外文翻译---从底层了解ASPNET的结构

原文1A low-level Look at the ArchitectureAbstract is a powerful platform for building Web applications that provides a tremendous amount of flexibility and power for building just about any kind of Web application. Most people are familiar only with the high level frameworks like WebForms and WebServices which sit at the very top level of the hierarchy. In this article I’ll describe the lower level aspects of and explain how requests move from Web Server to the runtime and then through the Http Pipeline to process requests.What is Let’s start with a simple definition: What is ? I like to define as follows: is a sophisticated engine using Managed Code for front to back processing of Web Requests.It's much more than just WebForms and Web Services… is a request processing engine. It takes an incoming request and passes it through its internal pipeline to an end point where you as a developer can attach code to process that request. This engine is actually completely separated from HTTP or the Web Server. In fact, the HTTP Runtime is a component that you can host in your own applications outside of IIS or any server side application altogether. The runtime provides a complex yet very elegant mechanism for routing requests through this pipeline. There are a number of interrelated objects, most of which are extensible either via subclassing or through event interfaces at almost every level of the process, so the framework is hig hly extensible. Through this mechanism it’s possible to hook into very low level interfaces such as the caching, authentication and authorization. You can even filter content by pre or post processing requests or simply route incoming requests that match a specific signature directly to your code or another URL. There are a lot of different ways to accomplish the same thing, but all of the approaches are straightforward to implement, yet provide flexibility in finding the best match for performance and ease of development.The entire engine was completely built in managed code and all of the extensibility functionality is provided via managed code extensions. This is a testament to the power of the .NET framework in its ability to build sophisticated and very performance oriented architectures. Above all though, the most impressive part of is the thoughtful design that makes the architecture easy to work with, yet provides hooks into just about any part of the request processing.With you can perform tasks that previously were the domain of ISAPI extensions and filters on IIS –with some limitations, but it’s a lot closer than say ASP was. ISAPI is a low level Win32 style API that had a very meager interface and was very difficult to work for sophisticated applications. Since ISAPI is very low level it also is very fast, but fairly unmanageable for application level development. So, ISAPI has been mainly relegated for some time to providing bridge interfaces to other application or platf orms. But ISAPI isn’t dead by any means. In fact, on Microsoft platforms interfaces with IIS through an ISAPI extension that hosts .NET and through it the runtime. ISAPI provides the core interface from the Web Server and uses the unmanaged ISAPI code to retrieve input and send output back to the client. The content that ISAPI provides is available via common objects like HttpRequest and HttpResponse that expose the unmanaged data as managed objects with a nice and accessible interface.The ISAPI ConnectionISAPI is a low level unmanged Win32 API. The interfaces defined by the ISAPI spec are very simplistic and optimized for performance. They are very low level –dealing with raw pointers and function pointer tables for callbacks - but they provide he lowest and most performance oriented interface that developers and tool vendors can use to hook into IIS. Because ISAPI is very low level it’s not well suited for building application level code, and ISAPI tends to be used primarily as a bridge interface to provide Application Server type functionality to higher level tools. For example, ASP and both are layered on top of ISAPI as is Cold Fusion, most Perl, PHP and JSP implementations running on IIS as well as many third party solutions such as my own Web Connection framework for Visual FoxPro. ISAPI is an excellent tool to provide the high performance plumbing interface to higher level applications, which can then abstract the information that ISAPI provides. In ASP and , the engines abstract the information provided by the ISAPI interface in the form of objects like Request and Response that read their content out of the ISAPI request information. Think of ISAPI as the plumbing. For the ISAPI dll is very lean and acts merely as a routing mechanism to pipe the inbound request into the runtime. All the heavy lifting and processing, and even the request thread management happens inside of the engine and your code.As a protocol ISAPI supports both ISAPI extensions and ISAPI Filters. Extensions are a request handling interface and provide the logic to handle input and output with the Web Server –it’s essentially a transaction interface. ASP and are implemented as ISAPI extensions. ISAPI filters are hook interfaces that allow the ability to look at EVERY request that comes into IIS and to modify the content or change the behavior of functionalities like Authentication. Incidentally maps ISAPI-like functionality via two concepts: Http Handlers (extensions) and Http Modules (filters). We’ll look at these later in more detail.ISAPI is the initial code point that marks the beginning of an request. maps various extensions to its ISAPI extension which lives in the .NET Framework directory:本文摘自/presentations/howaspnetworks/howaspnetworks.asp译文1从底层了解的结构·摘要是一个用于构建Web程序的强大平台,提供了强大的柔性和能力以至于它可以构建任意的Web程序。
计算机外文翻译--ASP技术在电子商务中的运用

外文文献阅读与翻译英文原文ASP technology in the use of E-commerceBased on ASP technology in e-commerce application of the preliminary study, in connection with reality, given the ASP pages in the design of some of the key technologies and methods.Today, information technology and network technology is the rapid development and wide application of these technologies on business applications have a more profound impact, is also changing people's work and living, learning and modes of communication, e-commerce applications of Health, through the electronic Business for more useful information and necessary commodities are generally concerned about the issue, the paper on this preliminary study.1. ASP Technical OverviewASP full name of Active Server Pages (dynamic pages) is a Microsoft introduced to replace the CGI (Common Gateway Interface Common Gateway Interface) of the new technology. At present, Internet on many Windows-based platform for most of the Web site of ASP technology to develop. ASP is a server-side script in the operating environment, the adoption of the environment, users can create and run dynamic, interactive Web server applications, greatly facilitate the managers and viewers.Under normal circumstances, the user through the web browser that most of a static (static) the content of the Internet browser when the HTTP protocol to the site server requests for home contents, site server receipt of the request, after the original transmission Has been designed static HTML documents and data for the browser, users see the staff through the server for good content Home. A "static" site, Home To update the contents of the site must be in the server-side management to update its manual with the HTML document data, real-time worse.With the development of Web applications, the user would like to see on request and dynamically generated Home, for example, respond to the requirements of users query the database to generate statements. In such circumstances, when users fill in the browser on the data submitted in the form of content, to provide an HTTP request, the site received calledfor the implementation of server applications, the form of input data, the results will be implemented HTML format to send to the browser, users will be able to see real-time data and content.ASP use ActiveX technology based on open design environment, users can create their own definitions and components by adding them to their own dynamic pages with almost unlimited expansion of capacity. ASP and common dynamic in the Client-Home technologies such as Java applet, ActiveX Control, VBScript, javascript, and so different, ASP Script in orders and statements by the server to explain the implementation and outcome of the implementation of dynamically generated Web page Surface and sent to the browser, while the technology-Client Script is by the order to explain the implementation of the browser.ASP is due to explain the implementation of the server side, the developers can not consider the browser whether to support the ASP; because of its server-side implementation, developers do not have to worry about other people download programs for the theft of programming logic. ASP called by suffix. Asp to achieve the ASP document, a. Asp document equivalent to an executable file, it must be placed on Web servers are enforceable under the authority of the directory.When a user from the browser entered. Asp files after the address, the browser will request the URL to Web Server, if the Web Server tops the ASP, called on the ASP. ASP read out accordingly. Asp paper to explain and enforce an order to generate a dynamic HTML pages to return a Web Server, Web Server and then send the results to the browser.ASP and HTML document similar to the production and the development of integrated and HTML, in the same process can be completed, the ASP will be able to use the implementation of the scripts embedded in HTML documents (HTML files will be changed to the name suffix. Asp), which makes HTML documents The preparation and development of the script together. ASP through the built-in objects, the server component (Server Component) can be completed very complicated task, but users can also use their own or others to complete the development of the server component of specialized tasks.Comparing the gateway server and ASP expansion mode has the following advantages: (1) ASP VBScript used by the scripting language from the VB, easy to learn. (2) directly into the HTML scripting language, do not need to compile and can connect directly to explainoperation. (3) the use of ADODB components easy access to the database. (4) Object-oriented programming, which can be expanded ActiveX Server component functions, in theory, can achieve any function. (5) does not exist browser compatibility problems, ASP is in the process of server-side run. (6) can be hidden code, the protection of labor results.2.E-commerce data accessIn e-commerce systems, Web provides customers with an effective means of communication, the use of Web technology, and Web servers and database system connected to complete the processing of the data query, the user can operate easy to learn through the browser to query Address the needs of various data.ASP is a realization of Web server and database connectivity middleware technology, but on the Windows platform it is relatively gateway and server model has a larger expansion of the merits. Gateway is the most important feature of its platform-independent, but Gateway are normally difficult to prepare and change. Gateway process usually is an independent process, and not HTML document together, it needs such as C, C + +, VB, and other languages to write a standalone application, and ASP applications to change this. ASP can be used not only to read the Access and SQL Server database, but also can read other ODBC (Open Database Connect open Internet database)-compliant database. In ASP access the database through the ADO (ActiveX Database Object activity data object) and transaction processing to achieve the statement. ADO is a Microsoft operating supported by the database approach is a scalable and easy-to-use database access will be added to the Web page of the technology. ADO objects and the use of DAO (Data Access Object), RDO (long-distance data object) similar to the way. In ASP, ADO can be seen as a server component, more simple, is a series of targets, the application of these powerful objects, you can easily complete the complex operation of the database, to achieve the purpose of access to data.3. ASP in the application of e-commerceIn e-commerce, to users, on-line information for the purpose of the search for the needs of their products or services, and for goods or services provider, its objective is to sell their customers the products or services. Therefore, through the browser allows users to query the server back-end database is that many Web service providers must have services, ASP ADODB through built-in component to achieve this function. ADO can be used to preparecompact concise script to connect to ODBC-compliant database and OLEDB compliant data source. Specific steps can be summarized in the following steps:(1) create a database of sources (DSN) ADODB through ODBC work, to set up ODBC DSN (data sources). Open Windows "Control Panel", double-click "ODBC" the icon, then select "System DSN" attributes page, click <Add>, the choice of database-driven process, then click the "next step", according to the screen Type the instructions of the data source file name, then click the "next step", then click "Finish" create a data source.(2) Links to create a database maintained on some of the data are visiting the dynamic information and links to information. ADODB function of the members of the previous Open and set the DSN with the database connection, the syntax is as follows: SetConnect = Server.Cre-ateObject ( "ADODB.Connection") 'created a link object Connect. Connect.Open ( "DSN = dsnname; UID = userID; PWD = password") 'Open link. dsnname as a data source; userID for the user name; password for the user passwords.(3) create a data object in the ADO object data is usually kept by the query results. ADO RecordSet is the most complex objects, many of the properties and methods, flexibility in the use, can achieve many good results. Its creation as follows: Set RecordSet = Connect.Execute (sqtStr) 'to create and open the object RecordSet, sqtStr is a string, on behalf of a standard SQL statement. For example: sqlStr = "SELECT * FROM b1" Set RecordSet = Connect.Execute (sqlStr) after the implementation of this statement, in the RecordSet object on the preservation of the b1 of all records.(4) Execute operation database can be used to facilitate the implementation of the data insert, modify, delete and other operations. Insert the implementation of operations such as: sqlStr = "Insert Into b1Values (1,2)" Connect.Execute (sqlStr)(5) closing data objects and links in the use of the ADO object, the object must be closed and data links. In ASP by calling the close approach to achieve closure. Close to create the data objects: <% Redata.Close () Set Redata = Nothing%>ASP is using the database to the entire process, due to application of object-oriented thinking, all operations are relatively simple, users need only pay attention to the understanding of the data structure, the current target and operated by the object's properties, and so on, as long as these are A clear understanding, coupled with the power of ASP, the use of databases on the Internet, and users and the exchange of information between thepages, it is not what a difficult task.4. Concluding remarksInto the 21st century, with the Web-use and development of Intranet-based e-commerce systems will undoubtedly have a more traditional business prospects for greater application, how to improve e-commerce in this system of data access efficiency and handling capacity still matters Is the people's concerns. This paper is only in this area conducted a preliminary study, put forward some of their own point of view, is inspired to beginners.汉语翻译ASP技术在电子商务中的运用本文通过对ASP技术在电子商务中应用的初步探讨,结合实际,给出了ASP技术在网页设计时的一些关键技术和实现方法。
aspnet外文翻译--常见的ASPNET代码技术

外文翻译译文:常见的代码技术:技巧,教程,代码——Scott Mitchell利用集合大多数现代编程语言提供支持某种类型的对象,可以容纳一个可变数目的元素。
这些对象被称为集合,他们可以轻易地添加和删除元素,而不必担心适当的内存分配。
如果你使用经典ASP编程之前,你就可能已经熟悉了脚本,字典对象,采集对象的每个元素包含一个参考文本的关键。
这种方式存储对象的集合被称为一个哈希表。
有许多类型的集合,除了哈希表。
每一种类型的集合是相似的目的:它作为一种手段来存储不同数量的元素,提供一种简单的方法,在最小程度上添加和删除元素。
每一个不同类型的集合是唯一的方法储存、检索并借鉴它的各种因素,而.NET框架提供了很多的集合类型为开发人员使用。
事实上,整个的命名空间系统集合是专门从事集合类型和辅助课程。
这些类型的集合都可以存储对象类型的元素。
因为在.NET中所有的原始数据类型的字符串,整数,日期/时间,阵列,都是从目标类派生的,这些集合可以从字面上存储任何东西。
例如,你可以使用一个单一的收集,存储一个整数,一个典型的COM组件,字符串,日期/时间,和自定义编写的.NET组件的两个实例,一个实例的组合。
大多数的例子在本节中使用集合来容纳原始数据类型(字符串,整数,双打)。
然而,集合表明集合类型存储为它的每个元素的整个集合。
在本节中,我们将研究5个集合的.NET框架为开发人员提供数组列表,哈希表,可排序列表,队列,堆栈。
当你学习这些集合时,就会意识到他们有许多相似之处。
例如,每一个类型的集合可以通过元素与元素的迭代使用每个在VB中的下一个循环(或在C#中的每一个循环)。
每个集合类型都有一定数量的同样的函数名执行同样的任务。
例如,每个集合类型都有一个明确的方法,从集合中移除所有元素集和属性来返回集合中的元素的数量。
事实上,过去的”相似性的集合类型”的共同特点就是来考察所发现的集合类型。
使用数组列表第一种收集我们要看的是数组列表。
ASP商业模式有哪些类型

ASP商业模式有哪些类型ASP(Application Service Provider,应用服务提供机构),是一种新型的网络服务形式,是国际上主流软件公司(例如美国的微软公司的“软件服务战略”)新的战略方向。
那么ASP商业模式有哪些类型?ASP的商业模式分为以下几种:ASP商业模式类型:在线软件销售商(Online Software Vendor,OSV)---- 它是ASP最简单的形式,独立的网络软件开发商通过网络直接向用户出租他们的应用软件,也有一些OSV通过服务提供商伙伴向用户提供它们的软件。
ASP商业模式类型:ASP批发商(ASP Wholesaler)---- 一些ASP成为在线软件销售商的批发商。
它们在主机上安装了各种OSV的软件,通过直接出租或与合作伙伴合作的方式,负责促销、销售、收款、实施等工作。
ASP商业模式类型:门户ASP(Portal ASP)---- 门户ASP把内容、应用和服务打包,向一个有特殊兴趣的细分市场提供连贯的服务。
通常,它们将自己的内容及应用与第三方的产品及服务结合,打自己的品牌或者成为第三方服务的门户站点。
ASP商业模式类型:商业ASP(Business ASP)---- 一些ASP把一系列的应用打包提供给中小企业,这些 ASP有来自电信公司和大ISP公司的支持,一些银行也建立了这种ASP的服务手段。
ASP商业模式类型:企业ASP(Enterprise ASP)---- 这些ASP只为有限的大企业提供电子商务应用服务,同时提供网络服务、电子邮件及桌面效率软件。
ASP商业模式类型:应用外包提供商(Application Outsourcing Provider)---- 这些ASP提供外包的IT服务。
ASP商业模式类型:增值ASP转售商(Value Added ResellerASP)---- 指一些解决方案提供商或增值转售商。
它们对一些行业(如医疗、零售或保险)非常熟悉,或者对一些地区很熟悉,且可以提供增值服务。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
外文文献阅读与翻译英文原文ASP technology in the use of E-commerceBased on ASP technology in e-commerce application of the preliminary study, in connection with reality, given the ASP pages in the design of some of the key technologies and methods.Today, information technology and network technology is the rapid development and wide application of these technologies on business applications have a more profound impact, is also changing people's work and living, learning and modes of communication, e-commerce applications of Health, through the electronic Business for more useful information and necessary commodities are generally concerned about the issue, the paper on this preliminary study.1. ASP Technical OverviewASP full name of Active Server Pages (dynamic pages) is a Microsoft introduced to replace the CGI (Common Gateway Interface Common Gateway Interface) of the new technology. At present, Internet on many Windows-based platform for most of the Web site of ASP technology to develop. ASP is a server-side script in the operating environment, the adoption of the environment, users can create and run dynamic, interactive Web server applications, greatly facilitate the managers and viewers.Under normal circumstances, the user through the web browser that most of a static (static) the content of the Internet browser when the HTTP protocol to the site server requests for home contents, site server receipt of the request, after the original transmission Has been designed static HTML documents and data for the browser, users see the staff through the server for good content Home. A "static" site, Home To update the contents of the site must be in the server-side management to update its manual with the HTML document data, real-time worse.With the development of Web applications, the user would like to see on request and dynamically generated Home, for example, respond to the requirements of users query the database to generate statements. In such circumstances, when users fill in the browser on the data submitted in the form of content, to provide an HTTP request, the site receivedcalled for the implementation of server applications, the form of input data, the results will be implemented HTML format to send to the browser, users will be able to see real-time data and content.ASP use ActiveX technology based on open design environment, users can create their own definitions and components by adding them to their own dynamic pages with almost unlimited expansion of capacity. ASP and common dynamic in the Client-Home technologies such as Java applet, ActiveX Control, VBScript, javascript, and so different, ASP Script in orders and statements by the server to explain the implementation and outcome of the implementation of dynamically generated Web page Surface and sent to the browser, while the technology-Client Script is by the order to explain the implementation of the browser.ASP is due to explain the implementation of the server side, the developers can not consider the browser whether to support the ASP; because of its server-side implementation, developers do not have to worry about other people download programs for the theft of programming logic. ASP called by suffix. Asp to achieve the ASP document, a. Asp document equivalent to an executable file, it must be placed on Web servers are enforceable under the authority of the directory.When a user from the browser entered. Asp files after the address, the browser will request the URL to Web Server, if the Web Server tops the ASP, called on the ASP. ASP read out accordingly. Asp paper to explain and enforce an order to generate a dynamic HTML pages to return a Web Server, Web Server and then send the results to the browser.ASP and HTML document similar to the production and the development of integrated and HTML, in the same process can be completed, the ASP will be able to use the implementation of the scripts embedded in HTML documents (HTML files will be changed to the name suffix. Asp), which makes HTML documents The preparation and development of the script together. ASP through the built-in objects, the server component (Server Component) can be completed very complicated task, but users can also use their own or others to complete the development of the server component of specialized tasks.Comparing the gateway server and ASP expansion mode has the following advantages: (1) ASP VBScript used by the scripting language from the VB, easy to learn.(2) directly into the HTML scripting language, do not need to compile and can connectdirectly to explain operation. (3) the use of ADODB components easy access to the database. (4) Object-oriented programming, which can be expanded ActiveX Server component functions, in theory, can achieve any function. (5) does not exist browser compatibility problems, ASP is in the process of server-side run. (6) can be hidden code, the protection of labor results.2.Web server-side security technology(1) Directory file protection1) NTFS permissions.NTFS file system provides more security than the Fat32 file management, file access control through a table (ACL) defines the user access to files and directory-level permissions, if the user has permissions to open the file, the computer allows the user to access files . Directories and files by setting access rights, the prohibition has nothing to do users of the directory file copy, modify, delete, etc. operations, restrict the invasion of the system.2) Virtual directory and its property.Virtual directory hide the directory structure on the site of important information, in the Asp environment, a safer approach is to Asp separate scripts and HTML files stored in different directory, will be stored as HTML files read-only attribute will be stored Asp script directory attribute is set to implement.3) To prevent the document view Asp.IIS or Code.asp own Showcode.asp document, you can view the source code of Asp procedures in order to steal information. Web server can delete or disable access to the documents stored in the files.(2) Restrict access to technology1) IP address restrictions.IIS will authorize or reject a specific IP address of their visit, by refusing a visit to a specific IP address in order to exclude interference invasion. The setting: A start ISM (Internet Service Manager); B start page Web Properties "Advanced" tab; C for the specified IP address control settings.2) User Access Control.IIS site provides resources for anonymous access and authentication control settings, Web server set up on the basis of the identity of the user authentication to prevent unauthorized users with restricted content Http connection. Specific settings: in the Web site of the "Directory Security" property page, select the "Anonymous access and authentication control" for editing. Allow anonymous access to client account IUSR-Computername to establish a connection with the Web server (to provide a random password). Fornon-anonymous access, there are three types of authentication: basic authentication, allows the user name and password unencrypted (clear) is sent; summary authentication, only domain controller in the domain has been supported by the network to send its value after a mixed (that is, to use "hashing" the message digest calculation) rather than password authentication. Integrated Windows authentication, the use of Secure Sockets Layer (SSL) automatically encrypted user name and password.3) firewall technology.The purpose of the firewall for internal network or host to provide security, prevent unauthorized access to information resources, mandatory for all connections to go through this protective layer. Including the packet filtering firewall and proxy two, packet filtering is a specific IP address for the services provided by the host, and its basic principle is that in the IP network layer and IP packet intercepted exchanges of information, to determine whether to forward this IP packet. Acting on the basic principles of Web services to construct a single agent, does not allow clients directly interact with the server, it is necessary to be both agent interaction information. In the actual build, it is usually provided by the filter the first-class security protection, and then from the proxy server to provide more advanced security mechanisms.(3) Auditing and monitoring technology.Responsible for safety audits of all kinds of surveillance systems and security-related incidents, generating security logs, and provide strategy, designated to review the types of security incidents. Specific settings: in the "Administrative Tools - Local Security Policy - Local Policies - Audit Policy" to open the necessary audit. In addition to the security log, system log and application log monitoring tools are also very good, and they record the user from the registry until the whole process for network security and provide a reliable basis for analysis.(4) SSL security mechanism.SSL (Secure Socket Layer) is a run on Http and TCP layer between layers of security protocols to ensure that the transmission of information security. SSL is in the public key and private key on the basis of, any user can access the public key to encrypt data, but data must be decrypted by the corresponding private key. Currently, SSL has been on the Internet as a Web browser and server standard security measures. SSL technology has been established as a result of all the major browsers and Web server process, therefore, only the installation of a digital certificate or server certificate on the server functionality can be activated. After the establishment of SSL security mechanism, and only allow SSL clients and SSL in order to allow the Web site to communicate, use the browser to connect to Https: / / address, rather than the URL of the agreement.1671.3.E-commerce data accessIn e-commerce systems, Web provides customers with an effective means of communication, the use of Web technology, and Web servers and database system connected to complete the processing of the data query, the user can operate easy to learn through the browser to query Address the needs of various data.ASP is a realization of Web server and database connectivity middleware technology, but on the Windows platform it is relatively gateway and server model has a larger expansion of the merits. Gateway is the most important feature of its platform-independent, but Gateway are normally difficult to prepare and change. Gateway process usually is an independent process, and not HTML document together, it needs such as C, C + +, VB, and other languages to write a standalone application, and ASP applications to change this. ASP can be used not only to read the Access and SQL Server database, but also can read other ODBC (Open Database Connect open Internet database)-compliant database. In ASP access the database through the ADO (ActiveX Database Object activity data object) and transaction processing to achieve the statement. ADO is a Microsoft operating supported by the database approach is a scalable and easy-to-use database access will be added to the Web page of the technology. ADO objects and the use of DAO (Data Access Object), RDO (long-distance data object) similar to the way. In ASP, ADO can be seen as a server component, more simple, is a series of targets, the application of these powerful objects, you can easily complete the complex operation of the database, to achieve the purpose of access to data.4. ASP in the application of e-commerceIn e-commerce, to users, on-line information for the purpose of the search for the needs of their products or services, and for goods or services provider, its objective is to sell their customers the products or services. Therefore, through the browser allows users to query the server back-end database is that many Web service providers must have services, ASP ADODB through built-in component to achieve this function. ADO can be used to prepare compact concise script to connect to ODBC-compliant database and OLEDB compliant data source. Specific steps can be summarized in the following steps:(1) create a database of sources (DSN) ADODB through ODBC work, to set up ODBC DSN (data sources). Open Windows "Control Panel", double-click "ODBC" theicon, then select "System DSN" attributes page, click <Add>, the choice of database-driven process, then click the "next step", according to the screen Type the instructions of the data source file name, then click the "next step", then click "Finish" create a data source.(2) Links to create a database maintained on some of the data are visiting the dynamic information and links to information. ADODB function of the members of the previous Open and set the DSN with the database connection, the syntax is as follows: SetConnect = Server.Cre-ateObject ( "ADODB.Connection") 'created a link object Connect. Connect.Open ( "DSN = dsnname; UID = userID; PWD = password") 'Open link. dsnname as a data source; userID for the user name; password for the user passwords.(3) create a data object in the ADO object data is usually kept by the query results. ADO RecordSet is the most complex objects, many of the properties and methods, flexibility in the use, can achieve many good results. Its creation as follows: Set RecordSet = Connect.Execute (sqtStr) 'to create and open the object RecordSet, sqtStr is a string, on behalf of a standard SQL statement. For example: sqlStr = "SELECT * FROM b1" Set RecordSet = Connect.Execute (sqlStr) after the implementation of this statement, in the RecordSet object on the preservation of the b1 of all records.(4) Execute operation database can be used to facilitate the implementation of the data insert, modify, delete and other operations. Insert the implementation of operations such as: sqlStr = "Insert Into b1Values (1,2)" Connect.Execute (sqlStr)(5) closing data objects and links in the use of the ADO object, the object must be closed and data links. In ASP by calling the close approach to achieve closure. Close to create the data objects: <% Redata.Close () Set Redata = Nothing%>ASP is using the database to the entire process, due to application of object-oriented thinking, all operations are relatively simple, users need only pay attention to the understanding of the data structure, the current target and operated by the object's properties, and so on, as long as these are A clear understanding, coupled with the power of ASP, the use of databases on the Internet, and users and the exchange of information between the pages, it is not what a difficult task.5. Concluding remarksInto the 21st century, with the Web-use and development of Intranet-basede-commerce systems will undoubtedly have a more traditional business prospects for greater application, how to improve e-commerce in this system of data access efficiency and handling capacity still matters Is the people's concerns. This paper is only in this area conducted a preliminary study, put forward some of their own point of view, is inspired to beginners.汉语翻译ASP技术在电子商务中的运用本文通过对ASP技术在电子商务中应用的初步探讨,结合实际,给出了ASP技术在网页设计时的一些关键技术和实现方法。