Advance Web Development

In: Computers and Technology

Submitted By mkasimqureshi
Words 5169
Pages 21
Q.1 Discuss the Following: * Internet Domain * A domain name is a unique name that identifies a website. For example, the domain name of the Google is "google.com." Each website has a domain name that serves as an address, which is used to access the website * Whenever you visit a website, the domain name appears in the address bar of the web browser. Some domain names are preceded by "www" while others omit the "www" prefix. * All domain names have a domain suffix, such as .com, .net, or .org. The domain suffix helps identify the type of website the domain name represents. For example, ".com" domain names are typically used by commercial website, while ".org" websites are often used by non-profit organizations * NOTE: When you access a website, the domain name is actually translated to an IP address, which defines the server where the website located. This translation is performed dynamically by a service called DNS. * Web Server * A Web server is a computer system that hosts websites. It runs Web server software, such as Apache or Microsoft IIS, which provides access to hosted webpages over the Internet. Every Web server has an IP address and possibly a domain name. For example, if you enter the URL http://www.google.com in your browser, this sends a request to the Web server whose domain name is google.com. * Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet. * IP Address * An IP address, or simply an "IP," is a unique address that identifies a device on the Internet or a local network. It allows a system to be recognized by other systems connected via the Internet protocol. There are two primary types of IP address formats used today — IPv4 and IPv6. * TCP * TCP/IP is the suite of communications protocols that is used to…...

Similar Documents

Web Development

...Week 7 Homework July 16, 2012 1. Explain the four goals associated with computer threats. • Data Confidential- is keeping secret data secret. • Data Integrity- unauthorized users not allowed to modify data without owner’s permission. • System Availability- no one can disturb system making it unusable. • Privacy - protecting individual from misuse information about them. 2. Explain the main difference between Secret-Key Cryptography and Public-Key Cryptography. Secret-Key Cryptography the key is private and with Public-Key Cryptography the key is public. 3. What is the digital signature? A technology used to associate a users’ identity to a public key, in which the user’s public key is digitally signed by a trusted third party. 4. What is packet sniffer? Is a software that examines all incoming and outgoing network packets looking for certain patterns. 5. Explain the various types of attacks from inside listed in section 9.5 of the text. 1.) Logic bombs - piece of code in a production system that clears disk, erases files at random, making hard-to-detect changes to key programs or encrypting essential files 2.) Trap door - Code inserted into computer system that allows hackers to bypass the entire authentication process. 3.) Login in spoofing - A phony copy of a system login system used to obtain user id’s and password 6. Explain the difference between a virus and a......

Words: 471 - Pages: 2

Client Questionaire for Web Development

...need? 20. Do you have a brochure? 21. Do you have a newsletter? 22. Do you have access to the web server? 23. What are several websites that you like the look of? 24. Do you have control over the domain? 25. Do you need any other promotional material? 26. How important is search engine ranking to you? 27. Is there any specific functionality you need? 28. Will you be providing creative direction? 29. Do you have your content done? 30. Do you have a logo? What format is it in? 31. How familiar are you with graphic design best practices for web designs? 32. Have you been through the complete web design and development process before? 33. Who are your competitors? 34. How often do you need to update the site? 35. Describe the style of website you are looking for? 36. Do you need an image gallery? 37. Are you or anyone on your staff familiar with HTML and CSS? 38. Is your logo in Illustrator format? 39. Do you need this to integrate with your existing identity pieces? 40. How are you going to maintain the site? 41. What software do you have? 42. What bugs you the most about websites? 43. Do you need any other graphic design help? 44. Do you need social media tools built in, like Digg, Facebook, Twitter, Stumble Upon, etc. 45. How familiar are you with web standards and web design best practices? 46. Do you need the website to tie into any particular 3rd party applications? ...

Words: 477 - Pages: 2

Web Development I Class

...subjects within the Web Development I class. The videos which are needed to view for the upcoming first Individual Project are; Introduction to Phase 1, How to Use the eBook, Introduction to Dreamweaver, How to Choose the Right Colors, Introduction to Photoshop and Phase 1 IP Demo; is to help students understand what is needed to complete the project. In the follow paragraphs, will explain how this work. With the ‘Introduction to Phase 1’ video, the instructor shows what the class is about and what to do in a step-by-step matter with the Dreamweave. It also states how to use the videos if someone gets overwhelm, what do to. In the next video, ‘How to Use the eBook’, it helps students understand how the eBook works alongside Photoshop and Dreamweaver while the student is building their web site. In the ‘Introduction to Dreamweave’ video, the instructor explains to students how Dreamweave is used, as well as some advice where to start and how to get comfortable with the program. The video ‘How to Choose the Right Colors’ shows how and why to pick the right colors for your web site, which can make all the difference between a bad or great web site. As in the ‘Introduction to Dreamweave’ video, ‘Introduction to Photoshop’ it helps the student understand how to take a screenshot, using the Clipboard and cropping images. Finally, in the video ‘Phase 1 IP Demo’, he gives an overview for students to use for the upcoming Individual Project and some steps on how to put the web site......

Words: 377 - Pages: 2

Web Development

...experts, scholars and industries as well as the spread of wide broadband internet in recent years, merely usability has become an insufficient criterion to can no longer satisfy users’ needs. Only with user-friendly and attractive content can on a website can ensure its continuous usage, make users to be willing to continue visit this website. Meeting the preferences of certain user groups is the key to increasing message transfer and communication efficiency (Goguen 2003). Website development has come a long way since the mid-90s when the Web explosion took place. Early websites were often written by individuals and were text-only affairs; nowadays sites are frequently constructed by professional web design houses employing teams of developers as well as graphics artists, usability, accessibility, search engine and database specialists all collaborating to produce and maintain websites responsible for millions of dollars of annual revenue for their owners. Of course, not all website development and design is undertaken at this level; many design houses are manned by a few people whose duties frequently overlap. And there are millions of websites authored by individuals either for small businesses or, increasingly, as weblogs promoting the authors’ lifestyles and perspectives on life, politics, news. Internet becomes the new way to generating new leads and business opportunities. Most of users just look in to the internet through search engines to find out the best......

Words: 1288 - Pages: 6

Image Editing Tools for Web Development and Design

...Image Editing Tools for Web Design and Development Kaplan University Professor Hedgepeth August 24, 2013 Image editing involves methods of altering images, to both digital photographs and traditional photographs. Applications used to create interactive Web graphics are the primary tools designers use to alter images. Many image editing programs are also used to render or create computer art from scratch. Designers must consider the important elements of a digital tool when trying to choose one for a specific purpose. One of the requirements for many of the tools designers use is having a procedure to allow the user to select part(s) of an image, and applying a change without affecting the rest of the image. Most graphics applications have several methods of accomplishing this; a marquee tool selects rectangular areas, a lasso tool enables a freehand trace of an area, and a magic wand tool selects objects or areas in the image by the closeness of its color or luminance. These are in addition to “more advanced abilities such as edge detection, masking, alpha compositing, and color and channel-based extraction” (Arms & Fleischhauer, 2003). Animating the border of a selected area in an image helps the user to differentiate the border from the image background. Layers are another feature designers should consider when choosing an image editor, and fortunately, they are common to many graphics applications. Layers are stacked on top of each other, but each layer is......

Words: 616 - Pages: 3

‘Gm Food Advances the Goal of Sustainable Development.’ to What Extent Do You Think This Is True?

...‘GM food advances the goal of sustainable development.’ To what extent do you think this is true? The Earth is facing severe environmental degradation. Years of resource exploitation and pollution have caused environmental problems and their effects are being felt globally. It has been estimated that if the world’s population reaches between10-11 billion then 5 more Planet Earths would be needed to maintain the present level of ecological decline. The environmental use in some countries is already unsustainable. Technology has allowed the world to cope with agriculture and an increasing population, however the FAO expects a long term decrease in food production in rich countries (Alexandratos 1988). 800 million people are affected today by hunger and malnutrition(Food Future 2000). The FAO claims that 650 million of these people will still be in the same situation by 2010. The world produces enough food, often it is the distribution process that causes problems. However this food may be produced in a non sustainable way. Pesticides, use of non farming land and the demand for cash crops over self sufficiency are not necessarily in the environments best interest. Factors such as poverty, wealth and inequality place burdens on the environment and possible sustainability. Genetically modified foods could be a key factor in advancing the goal of sustainable development. Biotechnology is the use of biological science to alter living organisms for the benefit of mankind.......

Words: 4659 - Pages: 19

Build a Web Applications and Security Development Life Cycle Plan

...Build a Web Applications and Security Development Life Cycle Plan What are the elements of a successful SDL? The elements of a successful SDL include a central group within the company (or software development organization) that drives the development and evolution of security best practices and process improvements, serves as a source of expertise for the organization as a whole, and performs a review (the Final Security Review or FSR) before software is released. What are the activities that occur within each phase? Training Phase- Core Security Training Requirements Phase- Establish security requirements, create Quality Gates/Bug Bars, perform Privacy Risk assesments. Design Phase-Establish Design Requirements, perform Attack Surface Analysis/Reduction, use Threat Modeling Implementation Phase- Use approved tools, Deprecate unsafe functions perform static analysis Verification Phase- Perform Dynamic Analysis, Perform Fuzz Testing, Conduct Attack Surface Review Release Phase- Create an incident Response Plan, Conduct Final Security Review, Certify release and archive Response Phase- Execute Incident Response Plan Phase Activities Roles Tools Requirements - Establish Security Requirements -Create Quality Gates/Bug Bars -Perform Security and Privacy Risk Assessments -Project Managers -Security Analysts -Microsoft SDL Process Template for Visual Studio Team System - MSF-Agile + SDL Process Template Design -Establish Design Requirements -Perform Attack Surface...

Words: 2006 - Pages: 9

Web Development

...e eBook Collection Web Development and Design Foundations with XHTML 5e Ch01 This is a Protected PDF document. Please enter your user name and password to unlock the text. User Name: Password: Unlock Remember my user name and password. If you are experiencing problems unlocking this document or you have questions regarding Protectedpdf files please contact a Technical Support representative: In the United States: 1-877-832-4867 In Canada: 1-800-859-3682 Outside the U.S. and Canada: 1-602-387-2222 Email: technicalsupport@apollogrp.edu. yksin vaihtoehdot jokaisella varsantylysti asetettu tyhja kuninkaansa arvoista tuliuhriksi ruokauhri kasvojesi asetti sinne toivo aloitti hurskaat omaksennesairastui hapeasta istuvat paikalleen yha puhettaan pohjin pahoin neljakymmenta seura aidit ristiinnaulittu ajattelemaan julistetaan aviorikosta tuomari tekonsa hapeasta todistaja haluja asekuntoista selkaan merkit vaikene lukujen raamatun pelaamaan nousu tutkin kaksi rukoukseni viisaasti tuomitaankaupungille sukupuuttoon pysya viikunoita taydelta syokaa vuosina tyhman joukkueella nainkin luoksemme kuun valttamatonta ajoivat voimallinen noissa kysyn tarkkaa tiedan rienna oikeastaanulkomaan luokseen monista myota katsonut tuollaista tuodaan ahab rikollisuuteenT E R mennessaan kohden myyty pelastaajano uutisia teoriassa erillinen sivuillesilleen el CHAP tulevaa veljiennemaaritelty lukemalla suurelta kuullenmuotoon kiekon annan kimppuunsa kumpaakaan juutalaisia paime lahtee......

Words: 28816 - Pages: 116

Advanced Web Development

...Advanced Web Development/WEB 407 Introduction Kudler Fine Foods is a specialty food store offering imported and domestic fare including baked goods, meats & seafood, produce, cheese & dairy, and wine. With three locations in the San Diego metropolitan area (La Jolla, Del Mar and Encinitas), Kudler’s mission is to provide their customers with, “…the finest in selected foodstuffs, wines, and related needs in an unparalleled consumer environment” (Apollo Group Inc. 2009). In an effort to increase customer convenience and business revenue, Kudler Fine Foods wants to sell their products on the internet. By adding both item inventory and online ordering pages to their current site, Kudler Fine Foods can accomplish this goal. There are, however, additional systems necessary on the back-end to make this system possible. According to TheConsumerCollective website (2010), “E-commerce spending continues to outpace analyst’s predictions… spending will reach $259 billion in 2014, and $278.8 billion by 2015” (Suetos, 2010). Over the past few years, customer confidence with online shopping has increased significantly. Customers feel more at ease with purchasing their products from online retailers than they did just years ago. This proposal will demonstrate the major components necessary for Kudler Fine Foods to begin offering their products online. It will discuss the database design, how the scripting language PHP will be set up to provide a “shopping cart” for......

Words: 3409 - Pages: 14

The Foundation of Web Development

...The Foundation of Web Development Name Class College Name Instructor The Foundation of Web Development The internet, an international network linking and communicating thousands upon millions of computer devices, concerns an immense and impressive networking foundation, or framework. The web or the World Wide Web is not the internet, but instead consists of a method of acquiring data throughout the internet sharing the vast abundance of information. As soon as the web became an exclusive entity, web development was introduced. This article summary will evaluate how HTML, CSS, and JavaScript became the foundation of web development for the web. “The basic building blocks of the World Wide Web are the three most commonly-used web standards — HTML, CSS and JavaScript” (W3C, 2011). Web development communicates with the web to contribute to its performance, which seem similar to the primary components of a house, or any other structure of the sort. A house, for instance, consists of a concrete foundation (the internet), the house structure and engineering components (the web), and the décor, interior design, and Feng shui (HTML, CSS, and JavaScript). These technologies (HTML, CSS, and JavaScript) work side-by-side to create artistry in the form of websites, web apps, and everything else roaming aimlessly on the web. Hypertext Markup Language or HTML could be used as (still can be) a standalone language to create webpages and sites without the need for Cascading......

Words: 969 - Pages: 4

A Case Study of the Web-Based Information Systems Development.

...1. Introduction Over the last three years the focus of the information technology industry has moved towards development for the World Wide Web (WWW). Information systems using WWW technology, delivered by an Intranet or via the Internet, are now prevalent throughout New Zealand and overseas. Within New Zealand, a wide variety of organisations are deploying information systems onto the WWW, including banks, government departments and other service providers. They are using the WWW as a strategic business tool, supporting their existing operations or providing a low-cost solution for delivering a new product or service line. 1.1 Proposition and Aims There is an abundance of information on the graphical and user interface aspects of WWW site design. In addition, a large body of knowledge has been developed in the area of software development methodologies. However, there has been very little research conducted to examine if these existing research methodologies are applicable to the information systems developed for the WWW. The WWW is a technologically dynamic environment, and presents new challenges for developers. In order to address the emerging WWW environment, a number of researchers have proposed software development methodologies specifically for the WWW. Consequently, the aim of this research was to investigate how organisations are currently developing WWW-based information systems, and the reasons why those methods are being used. This examination is......

Words: 1709 - Pages: 7

Advance

...Advance Directives Catherine Miller IRSC Ethical/Legal Issues NUR3826 Carol Amole, Debra Cornwell, Susan Wise December 1, 2015 Advance Directives An 89 year old patient came to the emergency room from a nursing home. Per the nursing home staff, the patient had a “floppy leg” and grimaced when that leg was moved. The patient’s advance directive paperwork was provided. The patient is non-verbal. An advance directive is a document composed by competent patient’s that ensure the right of self-determination: the right of every person to make their own decisions about their medical treatment, including the right to refuse treatment (Martin, 2013). As the primary nurse for the patient, I felt it was my responsibility to inform all the medical staff that was involved in her care of the presence of the advance directives. The doctor was the first to be informed. The advance directive is a written instruction recognized under state law relating to provision of such care when the patient is incapacitated (Martin, 2013). The paperwork that was provided was a DNR status, and also a Durable Power of Attorney, naming her husband. A Durable Power of Attorney is a document that allows a patient to designate a person to make decisions about their health care in a case where they are not able to make decisions themselves. It gives some direction about the kinds of medical treatment they want ("Understanding," n.d.). When my patient’s husband arrived to the emergency......

Words: 630 - Pages: 3

It Advances

...IT Advances Cause Acts to Be Created Telemarketers have been interrupting individuals for ages. Telemarketers call anytime, wanting individuals to donate, vote for or against, and purchase items. In an effort to address a growing number of telephone marketing calls, Congress enacted in 1991 the Telephone Consumer Protection Act (TCPA) (FCC, 8/02). Within 11 years after the creation of the TCPA Act, the Do Not Call Implementation Act, 2003 was created. The Do Not Call Implementation Act, 2003 goes hand-in-hand with the TCPA. The Do Not Call Implementation Act limits the phone numbers telemarketers are allowed to call. Telemarketers were using autodialing and pre recorded messages to make their pitches to individuals throughout the United States. No matter the time or day these calls would constantly make the phone ring. The Telephone Consumer Protection Act, 1991 protects these individuals from receiving these types of calls. The telemarketing companies can only call from eight A.M. to nine P.M. The telemarketing company’s received strict rules toward their auto dialing machines. The companies must announce their name and give the name and address of the business they are calling for. Calls are not allowed to be made with phony voices, no recordings to cell phones, and the individual cannot be charged for the call. Telemarketing companies are subject to fines ranging from $500 to $1,500 for each violation. In 2003 the national Do not Call Registry was created....

Words: 483 - Pages: 2

Web Development Technical Writing

...Project Name: Static Website – www.booksandbottles.org Student Name: Selina Coley Degree Program: Information Technology – Software Emphasis Mentor Name: Vinton Smith Signature Block Student’s Signature Selina Coley Mentor’s Signature Table of Contents Capstone Proposal Summary 1 Review of Other Work 3 Rationale and Systems Analysis 4 Goals and Objectives 5 Project Deliverables 6 Project Plan and Timelines 7 References 9 Appendix 1: Competency Matrix 10 Capstone Proposal Summary My project proposal is to develop a static web site for a growing organization based in Sterling, Virginia. The mission of Books and Bottles is to promote healthy development of infants and young children through proper nutrition and early childhood exposure to reading. In early January, Ms. Elizabeth Christy, who is the Executive Director of the project, approached me to assist in the development and deployment of their new website for her organization entitled Books and Bottles. Considering that, Ms. Christy knew my educational background it was a great opportunity to take. To find out that the project will also be able to fulfill my capstone project made the opportunity a bit more valuable and personal to me. The website itself will serve as an informational site to help members of the community and surrounding areas discover the organization as well as extend its hands into outer communities. The website itself is of personal value to me,......

Words: 2710 - Pages: 11

It Advances

...One of the best careers to get into is information technology (IT). Information technology is the use of telecommunications and computers to retrieve, store, transmit, and manipulate information. “The world of information technology is constantly changing. Whether you’re a developer for a large company or a small company, in a management position, freelancing or anything else, the world of IT is changing all the time” (Complete IT Professional). Because of certain advances in IT, new ethical issues often arise. An ethical issue, according to businessdictionary.com, is “a problem or situation that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical).” Often, it is extremely necessary to protect the people from wrong. In 1978, the Electron Funds Transfer was created. More recently, in 2003, the Do Not Call Implementation Act was created. There were advances in IT that resulted in new ethical issues necessitating the creation of each act. Credit and debit cards have been replacing paper checks at a fast growing rate. This means that the paper evidence that checks offer is descending. ATMs and electronic banking is taking over because it is so convenient. “The explosion of electronic financial transactions created a new need for rules that would give consumers the same level of confidence that they had in the checking system” (investopedia). In the late 70s,...

Words: 561 - Pages: 3