Webforms application and to an mvc application, Computer Engineering

What is the difference among adding routes, to a webforms application and to an mvc application?

Ans) To add routes to a webforms application, we use MapPageRoute() process of the RouteCollection class, where as to add routes to an MVC application we use MapRoute() process. 

 

Posted Date: 4/4/2013 3:07:46 AM | Location : United States







Related Discussions:- Webforms application and to an mvc application, Assignment Help, Ask Question on Webforms application and to an mvc application, Get Answer, Expert's Help, Webforms application and to an mvc application Discussions

Write discussion on Webforms application and to an mvc application
Your posts are moderated
Related Questions
what is hashing in database management system?

What do you mean by numbering and addressing? Numbering and Addressing: In data networks and telephone, the end equipments are more frequently single units than multiple dev

One can change an infix expression to a postfix expression using a By using Stack you can convert infix expression to a postfix expression

What are the types of Subroutines? Internal Subroutines: The source code of the internal subroutines will be in the similar ABAP/4 program as the calling procedure (intern

Minimize the following logic function using K-maps and realize using NAND and NOR gates. F(A,B,C,D) =?_m(1,3,5,8,9,11,15) + d(2,13).

Which method do you invoke on the DataAdapter control to load  your generated dataset with data? DataAdapter.Fill(ds). The beauty of this method is it automatically implicitly

What are the roles of Internet, Intranet and extranet in e-business? Role of Internet, Intranet and extranet into e-business: The given information activities are carried

How does an authentication system differ from a firewall in functioning?   Authentication vs. firewall User Authentication and Authorization A significant advanced fi

What are the disadvantages of Linux? Learning Lack of comparable programs More technical skill required

At time t when an infected machine scans and finds a vulnerable machine, the vulnerable one will be compromised and start to scan and infect others at time t+X, where X is a r.v. f