All Cards Flashcards
Revision for Semester 2 Web Development Exam with Mr. Tom Brett
What is the W3C?
The World Wide Web Consortium (W3C) is the main international standards organization for the World Wide Web (abbreviated WWW or W3).
Purpose: Developing protocols and guidelines that ensure long-term growth for the Web.
What is a Web Server?
- Web servers are computers that deliver (serves up) Web pages.
- Every Web server has an IP address and possibly a domain name.
- For example, if you enter the URL http://www.pcwebopedia.com/index.html in your browser, this sends a request to the Web server whose domain name is pcwebopedia.com. The server then fetches the page named index.html and sends it to your browser.
- Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet.
- There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.
What is IMAP?
- Internet Message Access Protocol
- a protocol for retrieving e-mail messages.
- The latest version, IMAP4, is similar to POP3 but supports some additional features.
- For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
- IMAP was developed at Stanford University in 1986.
- An IMAP server typically listens on well-known port 143.
What is a Web Architect?
Responsibilities:
- Creating Application Architectures
An application architecture is a framework or template that is used as the basis for the design of an application. Ideally more than one application as this promotes reuse and better apps over time.
- Design Solutions
Each project requires a solution that meets the customers requirements in terms of cost, time and effort. The architect will use the Application Architecture as the basis for the production of an application design that meets the customers requirements. Typically there are tradeoffs depending on the cusotmers priorities. The architect needs to be able to communicate these tradeoffs clearly to the customer so that the impacts of these trade-offs can be understood. The design produced should specify clearly:
> the overall structure of the application
> details of the the key components of the application
> details of all interfaces to other systems
> details of user interfaces
- Consultancy
Architects are often assigned to projects as consultants or mentors to assist the project teams in coming up with good designs for their sites and applications.
What is CAPTCHA?
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a challenge-response system test designed to differentiate humans from automated programs. A CAPTCHA differentiates between human and bot by setting some task that is easy for most humans to perform but is more difficult and time-consuming for current bots to complete.
Describe the tag?
The tag specifies an inline frame.
An inline frame is used to embed another document within the current HTML document.
- An iframe is used to display a web page within a web page.
What is DNS?
Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they’re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.
The DNS system is, in fact, its own network. If one DNS server doesn’t know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.
What are Server Side Technologies?
- Technologies that exist at the server side
- Where the real work occurs
Examples: Common Gateway Interface (CGI) Fast CGI Mod Perl Active Server Pages (ASP) Personal Home Pages (PHP) Cold Fusion Java Servlets Java Server Page (JSP)
Common Features:
- Read data submitted by the user
- Generate HTML dynamically based on user input
- Determine information about the client browser
- Access database systems
- Exploit the HTTP protocol
What is a Mime?
Short for Multipurpose Internet Mail Extensions, a specification for formatting non-ASCII messages so that they can be sent over the Internet. Many e-mail clients now support MIME, which enables them to send and receive graphics, audio, and video files via the Internet mail system. In addition, MIME supports messages in character sets other than ASCII.
There are many predefined MIME types, such as GIF graphics files and PostScript files. It is also possible to define your own MIME types.
In addition to e-mail applications, Web browsers also support various MIME types. This enables the browser to display or output files that are not in HTML format.
MIME was defined in 1992 by the Internet Engineering Task Force (IETF). A new version, called S/MIME, supports encrypted messages.
What is Ontology?
In information technology, an ontology is the working model of entities and interactions in some particular domain of knowledge or practices, such as electronic commerce or “the activity of planning.” In artificial intelligence ( AI ), an ontology is, according to Tom Gruber, an AI specialist at Stanford University, “the specification of conceptualizations, used to help programs and humans share knowledge.” In this usage, an ontology is a set of concepts - such as things, events, and relations - that are specified in some way (such as specific natural language) in order to create an agreed-upon vocabulary for exchanging information.
What is XML?
- XML was designed to transport and store data.
- HTML was designed to display data.
- XML stands for EXtensible Markup Language
- XML is a markup language much like HTML
- XML was designed to carry data, not to display data
- XML tags are not predefined. You must define your own tags
- XML is designed to be self-descriptive
- XML is a W3C Recommendation
How should web content be displayed differently to a typical academic essay?
Academic essays typically adopt a pyramid approach starting with a broad introduction to the topic which is gradually distilled into a narrower argument or exposition in the body. In Web Development this is not appropriate. Rather, the essential information should be presented immediately with the option of digging deeper if desired. This approach looks more like and inverted pyramid and the idea is inspired from journalistic styles of writing.
What is a proxy server?
A proxy server is a server (computer system or application) that acts as a middleman between a client making a request and a server hosting that request. Originally, proxy servers were designed to add structure and encapsulation to distributed networks. Today proxy servers are commonly used to provide anonymity to users wishing to hide their location.
There are three main types of proxy:
Forward: The intranet proxy sends a request to the internet.
Reverse: The intranet proxy receives a request form the clients on the internet.
Open Proxy: Accessible by any internet user.
How can proxy servers benefit internet access?
1) Proxy servers can be used to authenticate a request made by a client before allowing the query to reach a companies internal servers.
2) Proxy servers can also be used to analyse the users geo-locations so that they can be given access to geo-tailored content.
3) Secure and Private Browsing: A proxy server conceals the internal clients from the external network. As the proxy server is in the vanguard, your identity is hidden. This means you are protected from spam and hacker attacks. Most proxy servers do not use cookies; this means that there is no way your info is stored anywhere in their databanks.
4) Caching: This feature reduces your bandwidth use. When proxy servers cache data, work is speeded up. For example, let’s suppose User A has opened site xyz, and it takes 12 seconds for it to load. When User B tries to access the same site, the server will give him the cached page which means it will take hardly 5-6 seconds for the site to load, and it will not use any bandwidth. Overall the delivery of web content is far more efficient. Proxy servers basically, reduce the time you need for a site to be ‘fetched’.
5) Admin: This is very useful for large businesses, where several users are trying to access the Internet through one proxy server. The administrator can easily set firewalls and block sites (porn, social networking, gaming sites and the like) for all users. Filtering content is one of the most common uses of proxy servers.
What are the similarities between XML and XHTML?
- Both languages are created using tags but with XML you pretty much create your own and is only a form of data storage.
- HTML and XML are both markup languages that are used on the web
- HTML and XML can be read by software, but people use internet browsers.
What is Rule #1 of XML?
XML Rule #1: Making a Declaration
Computers are dumb. They need instructions. That is where the XML declaration comes into play.
‹?xml version= “1.0”›
This is the bare essential declaration statement and the first line of every XML document. The declaration is a processing instruction that tells the browser, “Watch for XML.”
What is Rule #2 of XML?
XML Rule #2: Root Elements
All XML documents must have one root element that contains all other elements. Think of the root element as a filing cabinet. A filing cabinet keeps all the files together so there is no chaos. Essentially, that is the job of the root element too. A root element is a container that packages the individual elements of the XML document. For this example, the root element is ‹message.
‹?xml version= “1.0”›
‹message›- root element
What is a proxy server?
A proxy server is a server (computer system or application) that acts as a middleman between a client making a request and a server hosting that request. Originally, proxy servers were designed to add structure and encapsulation to distributed networks. Today proxy servers are commonly used to provide anonymity to users wishing to hide their location.
What is Rule #1 of XML?
XML Rule #1: Making a Declaration
Computers are dumb. They need instructions. That is where the XML declaration comes into play.
‹?xml version= “1.0”›
This is the bare essential declaration statement and the first line of every XML document. The declaration is a processing instruction that tells the browser, “Watch for XML.”
What is Rule #2 of XML?
XML Rule #2: Root Elements
All XML documents must have one root element that contains all other elements. Think of the root element as a filing cabinet. A filing cabinet keeps all the files together so there is no chaos. Essentially, that is the job of the root element too. A root element is a container that packages the individual elements of the XML document. For this example, the root element is ‹message.
‹?xml version= “1.0”›
‹message›- root element
What is Rule #3 of XML?
All Elements Must have an Opening and Closing Tag
XML documents work as in hierarchical structure, what is often referred to as a tree structure. What opens must close; this means all opening tags must also have closing tags.
‹?xml version= “1.0”›
‹message›- root element
‹/message› - root element closing tag
Most web browsers will forgive the closing tag transgression in HTML. In XML, it is absolute. If you fail to incorporate a closing tag into the structure of your XML, you will confuse the computer. The name of the element in the closing tag must match the opening tag exactly.
‹MESSAGE›
‹message›
‹/messages›
XML sees all three of these tags differently. It will only recognize open and closing tags that match precisely.
Other Rules of XML?
All tags must be a container tag or non-empty tag
How can proxy servers benefit internet access?
Proxy servers can be used to authenticate a request made by a client before allowing the query to reach a companies internal servers. These proxy servers can also be used to analyse the users geo-locations so that they can be given access to geo-tailored content.
i.
Describe the outcome.
HTML forms are used to pass data to a server.
An HTML form can contain input elements like text fields, checkboxes, radio-buttons, submit buttons and more. A form can also contain select lists, textarea, fieldset, legend, and label elements.
The tag is used to create an HTML form.
The id attribute defines a CSS selector that will help style the form.
The name attribute identifies this particular form for use in the PHP script that handles the form.
The method attribute specifies how to send form-data (the form-data is sent to the page specified in the action attribute).
The form-data can be sent as URL variables (with method=”get”) or as HTTP post transaction (with method=”post”).
Notes on GET:
Appends form-data into the URL in name/value pairs
The length of a URL is limited (about 3000 characters)
Never use GET to send sensitive data! (will be visible in the URL)
Useful for form submissions where a user want to bookmark the result
GET is better for non-secure data, like query strings in Google
Notes on POST:
Appends form-data inside the body of the HTTP request (data is not shown in URL)
Has no size limitations
Form submissions with POST cannot be bookmarked
The action attribute specifies where to send the form-data when a form is submitted.
hardware