All Cards Flashcards

Revision for Semester 2 Web Development Exam with Mr. Tom Brett

1
Q

What is the W3C?

A

The World Wide Web Consortium (W3C) is the main international standards organization for the World Wide Web (abbreviated WWW or W3).
Purpose: Developing protocols and guidelines that ensure long-term growth for the Web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Web Server?

A
  • Web servers are computers that deliver (serves up) Web pages.
  • Every Web server has an IP address and possibly a domain name.
  • For example, if you enter the URL http://www.pcwebopedia.com/index.html in your browser, this sends a request to the Web server whose domain name is pcwebopedia.com. The server then fetches the page named index.html and sends it to your browser.
  • Any computer can be turned into a Web server by installing server software and connecting the machine to the Internet.
  • There are many Web server software applications, including public domain software from NCSA and Apache, and commercial packages from Microsoft, Netscape and others.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is IMAP?

A
  • Internet Message Access Protocol
  • a protocol for retrieving e-mail messages.
  • The latest version, IMAP4, is similar to POP3 but supports some additional features.
  • For example, with IMAP4, you can search through your e-mail messages for keywords while the messages are still on mail server. You can then choose which messages to download to your machine.
  • IMAP was developed at Stanford University in 1986.
  • An IMAP server typically listens on well-known port 143.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Web Architect?

A

Responsibilities:

  1. Creating Application Architectures

An application architecture is a framework or template that is used as the basis for the design of an application. Ideally more than one application as this promotes reuse and better apps over time.

  1. Design Solutions

Each project requires a solution that meets the customers requirements in terms of cost, time and effort. The architect will use the Application Architecture as the basis for the production of an application design that meets the customers requirements. Typically there are tradeoffs depending on the cusotmers priorities. The architect needs to be able to communicate these tradeoffs clearly to the customer so that the impacts of these trade-offs can be understood. The design produced should specify clearly:
> the overall structure of the application
> details of the the key components of the application
> details of all interfaces to other systems
> details of user interfaces

  1. Consultancy

Architects are often assigned to projects as consultants or mentors to assist the project teams in coming up with good designs for their sites and applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is CAPTCHA?

A

A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a challenge-response system test designed to differentiate humans from automated programs. A CAPTCHA differentiates between human and bot by setting some task that is easy for most humans to perform but is more difficult and time-consuming for current bots to complete.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe the tag?

A

The tag specifies an inline frame.

An inline frame is used to embed another document within the current HTML document.

  • An iframe is used to display a web page within a web page.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DNS?

A

Short for Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they’re easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4.
The DNS system is, in fact, its own network. If one DNS server doesn’t know how to translate a particular domain name, it asks another one, and so on, until the correct IP address is returned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Server Side Technologies?

A
  • Technologies that exist at the server side
  • Where the real work occurs
Examples:
Common Gateway Interface (CGI)
Fast CGI
Mod Perl
Active Server Pages (ASP)
Personal Home Pages (PHP)
Cold Fusion
Java Servlets
Java Server Page (JSP)

Common Features:

  • Read data submitted by the user
  • Generate HTML dynamically based on user input
  • Determine information about the client browser
  • Access database systems
  • Exploit the HTTP protocol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Mime?

A

Short for Multipurpose Internet Mail Extensions, a specification for formatting non-ASCII messages so that they can be sent over the Internet. Many e-mail clients now support MIME, which enables them to send and receive graphics, audio, and video files via the Internet mail system. In addition, MIME supports messages in character sets other than ASCII.
There are many predefined MIME types, such as GIF graphics files and PostScript files. It is also possible to define your own MIME types.
In addition to e-mail applications, Web browsers also support various MIME types. This enables the browser to display or output files that are not in HTML format.
MIME was defined in 1992 by the Internet Engineering Task Force (IETF). A new version, called S/MIME, supports encrypted messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Ontology?

A

In information technology, an ontology is the working model of entities and interactions in some particular domain of knowledge or practices, such as electronic commerce or “the activity of planning.” In artificial intelligence ( AI ), an ontology is, according to Tom Gruber, an AI specialist at Stanford University, “the specification of conceptualizations, used to help programs and humans share knowledge.” In this usage, an ontology is a set of concepts - such as things, events, and relations - that are specified in some way (such as specific natural language) in order to create an agreed-upon vocabulary for exchanging information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is XML?

A
  • XML was designed to transport and store data.
  • HTML was designed to display data.
  • XML stands for EXtensible Markup Language
  • XML is a markup language much like HTML
  • XML was designed to carry data, not to display data
  • XML tags are not predefined. You must define your own tags
  • XML is designed to be self-descriptive
  • XML is a W3C Recommendation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How should web content be displayed differently to a typical academic essay?

A

Academic essays typically adopt a pyramid approach starting with a broad introduction to the topic which is gradually distilled into a narrower argument or exposition in the body. In Web Development this is not appropriate. Rather, the essential information should be presented immediately with the option of digging deeper if desired. This approach looks more like and inverted pyramid and the idea is inspired from journalistic styles of writing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a proxy server?

A

A proxy server is a server (computer system or application) that acts as a middleman between a client making a request and a server hosting that request. Originally, proxy servers were designed to add structure and encapsulation to distributed networks. Today proxy servers are commonly used to provide anonymity to users wishing to hide their location.

There are three main types of proxy:

Forward: The intranet proxy sends a request to the internet.

Reverse: The intranet proxy receives a request form the clients on the internet.

Open Proxy: Accessible by any internet user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can proxy servers benefit internet access?

A

1) Proxy servers can be used to authenticate a request made by a client before allowing the query to reach a companies internal servers.
2) Proxy servers can also be used to analyse the users geo-locations so that they can be given access to geo-tailored content.
3) Secure and Private Browsing: A proxy server conceals the internal clients from the external network. As the proxy server is in the vanguard, your identity is hidden. This means you are protected from spam and hacker attacks. Most proxy servers do not use cookies; this means that there is no way your info is stored anywhere in their databanks.
4) Caching: This feature reduces your bandwidth use. When proxy servers cache data, work is speeded up. For example, let’s suppose User A has opened site xyz, and it takes 12 seconds for it to load. When User B tries to access the same site, the server will give him the cached page which means it will take hardly 5-6 seconds for the site to load, and it will not use any bandwidth. Overall the delivery of web content is far more efficient. Proxy servers basically, reduce the time you need for a site to be ‘fetched’.
5) Admin: This is very useful for large businesses, where several users are trying to access the Internet through one proxy server. The administrator can easily set firewalls and block sites (porn, social networking, gaming sites and the like) for all users. Filtering content is one of the most common uses of proxy servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the similarities between XML and XHTML?

A
  • Both languages are created using tags but with XML you pretty much create your own and is only a form of data storage.
  • HTML and XML are both markup languages that are used on the web
  • HTML and XML can be read by software, but people use internet browsers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Rule #1 of XML?

A

XML Rule #1: Making a Declaration

Computers are dumb. They need instructions. That is where the XML declaration comes into play.

‹?xml version= “1.0”›

This is the bare essential declaration statement and the first line of every XML document. The declaration is a processing instruction that tells the browser, “Watch for XML.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Rule #2 of XML?

A

XML Rule #2: Root Elements

All XML documents must have one root element that contains all other elements. Think of the root element as a filing cabinet. A filing cabinet keeps all the files together so there is no chaos. Essentially, that is the job of the root element too. A root element is a container that packages the individual elements of the XML document. For this example, the root element is ‹message.

‹?xml version= “1.0”›
‹message›- root element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a proxy server?

A

A proxy server is a server (computer system or application) that acts as a middleman between a client making a request and a server hosting that request. Originally, proxy servers were designed to add structure and encapsulation to distributed networks. Today proxy servers are commonly used to provide anonymity to users wishing to hide their location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Rule #1 of XML?

A

XML Rule #1: Making a Declaration

Computers are dumb. They need instructions. That is where the XML declaration comes into play.

‹?xml version= “1.0”›

This is the bare essential declaration statement and the first line of every XML document. The declaration is a processing instruction that tells the browser, “Watch for XML.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Rule #2 of XML?

A

XML Rule #2: Root Elements

All XML documents must have one root element that contains all other elements. Think of the root element as a filing cabinet. A filing cabinet keeps all the files together so there is no chaos. Essentially, that is the job of the root element too. A root element is a container that packages the individual elements of the XML document. For this example, the root element is ‹message.

‹?xml version= “1.0”›
‹message›- root element

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Rule #3 of XML?

A

All Elements Must have an Opening and Closing Tag

XML documents work as in hierarchical structure, what is often referred to as a tree structure. What opens must close; this means all opening tags must also have closing tags.

‹?xml version= “1.0”›
‹message›- root element
‹/message› - root element closing tag

Most web browsers will forgive the closing tag transgression in HTML. In XML, it is absolute. If you fail to incorporate a closing tag into the structure of your XML, you will confuse the computer. The name of the element in the closing tag must match the opening tag exactly.

‹MESSAGE›
‹message›
‹/messages›

XML sees all three of these tags differently. It will only recognize open and closing tags that match precisely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Other Rules of XML?

A

All tags must be a container tag or non-empty tag

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How can proxy servers benefit internet access?

A

Proxy servers can be used to authenticate a request made by a client before allowing the query to reach a companies internal servers. These proxy servers can also be used to analyse the users geo-locations so that they can be given access to geo-tailored content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

i.

Describe the outcome.

A

HTML forms are used to pass data to a server.

An HTML form can contain input elements like text fields, checkboxes, radio-buttons, submit buttons and more. A form can also contain select lists, textarea, fieldset, legend, and label elements.

The tag is used to create an HTML form.

The id attribute defines a CSS selector that will help style the form.

The name attribute identifies this particular form for use in the PHP script that handles the form.

The method attribute specifies how to send form-data (the form-data is sent to the page specified in the action attribute).

The form-data can be sent as URL variables (with method=”get”) or as HTTP post transaction (with method=”post”).

Notes on GET:

Appends form-data into the URL in name/value pairs
The length of a URL is limited (about 3000 characters)
Never use GET to send sensitive data! (will be visible in the URL)
Useful for form submissions where a user want to bookmark the result
GET is better for non-secure data, like query strings in Google

Notes on POST:

Appends form-data inside the body of the HTTP request (data is not shown in URL)
Has no size limitations
Form submissions with POST cannot be bookmarked

The action attribute specifies where to send the form-data when a form is submitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What should Developers be aware of with regard to Proxy servers?

A

Although caching does increase the speed of access, because you are accessing the material locally it may not be current. If the material was changed on the remote server on the internet then the material on your local proxy server will not match this new content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Make a small table in HTML with rows, headings, and data

A

Firstname
Lastname
Points

Eve
Jackson
94

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What methods are available for getting comments from a visitor of a webpage?

A
  1. Python
  2. C#
  3. PHP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

How do hyperlinks work?

A

Hyperlinks work by encapsulating url addresses inside click-able text or images. Clicking on such an image/text passes the hidden url to the web browser. Hyperlinks can also link videoclips and audio as well as webpages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Discuss hyper-links with reference to tags..

A

The hyper-link tag is:
<a>The click-able text goes here</a>

The tag has a few commonly used attributes>

1) href: specifies the URL of the page to be visited.
2) target: specifies how the link should be opened, as a tab or on the same page etc…
3) download: new to HTML 5, specifies that the target will be downloaded once the link is clicked on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the different types of links?

A

1) Relative Links
2) Site Relative Links
3) Absolute Links

Relative link rely on the path of the file they are located in.
To go up a directory you need to do the following:

<a>Go To Page 2</a>

To go down a directory you must do this:

<a>Go To Page 3</a>

Absolute links do not relate to the path of the file they are in. Instead - clicking on the example link will take you directly to the page - no matter what file it is placed in.
Most absolute links begin with “http://” and follow this simple format:
<a>Go To My Site</a>

For site relative links we use a slash / to signify the root od the site. Thus the following urls are equivalent:

<a>Go To Page 4</a>

and…

<a>Go To Page 4</a>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Advantages of Python for retrieving info from webpage

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

i.

Describe the outcome.

A

HTML forms are used to pass data to a server.

An HTML form can contain input elements like text fields, checkboxes, radio-buttons, submit buttons and more. A form can also contain select lists, textarea, fieldset, legend, and label elements.

The tag is used to create an HTML form.

The id attribute defines a CSS selector that will help style the form.

The name attribute identifies this particular form for use in the PHP script that handles the form.

The method attribute specifies how to send form-data (the form-data is sent to the page specified in the action attribute).

The form-data can be sent as URL variables (with method=”get”) or as HTTP post transaction (with method=”post”).

Notes on GET:

Appends form-data into the URL in name/value pairs
The length of a URL is limited (about 3000 characters)
Never use GET to send sensitive data! (will be visible in the URL)
Useful for form submissions where a user want to bookmark the result
GET is better for non-secure data, like query strings in Google

Notes on POST:

Appends form-data inside the body of the HTTP request (data is not shown in URL)
Has no size limitations
Form submissions with POST cannot be bookmarked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

ii. Enter Name

Describe the outcome.

A

The tag defines a label for an element.

The element does not render as anything special for the user. However, it provides a usability improvement for mouse users, because if the user clicks on the text within the element, it toggles the control.

The for attribute of the tag should be equal to the id attribute of the related element to bind them together.

This code snippet simply labels the text to accompany the input box where the user should input their name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Write a short note on the protocols under which hyper-links operate?

A

???

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

iii.
web
<br></br>

hardware

A

This code snippet simply labels and creates radio buttons for users to pick a module. The first module option (given a value of ‘1’) is for Web modules. The second radiobutton option (that has a value of ‘2’) is for Hardware modules. Both radiobutton options have CSS id selectors associated with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the typical problems that arise with hyperlinks, their causes and their solutions?

A

The three most common problems with hyperlinks is that they 1) stop working, 2) or go to the wrong location. Also, a convention which is commonly ignored is the colouring of visited links. This is highly useful and time savining guiding users through the content on your site.

Hyperlinks going the wrong locationis simply human error and may the result of carelessness. Broken hyperlinks may be a result of moving a files location inside the directory. Websites use site relative links and if a file is moved to another directory or its name is changed then this will affect any hyperlinks associated with that page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Describe 5 different job roles in a Web Development team.

A

The archetypal web team involves the following roles:

  1. Senior Management Team (SMT) -approves online strategy, monitors high-level adherence to business goals and provides resource.
  2. Web Steering Group (WSG) - expedites online strategy by co-ordinating development priorities among all departments with a stake in the web and reports progress to the Senior Management Team.
    - sets internal web standards (e.g. coding, online branding, etc.), monitors development on a cyclical basis and acts as a ‘Court of Last Resort’ for inter-departmental web conflict.
  3. Web Manager - co-ordinates day-to-day maintenance required to ensure the site operates to a minimum acceptable standard.
    roject manages the implementation of all development activity approved by the WSG.
    The Web Manager monitors performance based on approved KPIs and ensures all activity conforms with required standards.
  4. Content Producer - The role of a Content Producer is to create & maintain high quality online content - be that plain text, video, podcasts, twitter updates, etc.
  5. Designer -To assist with defining the organisation’s web design standards.
    To produce highly usable and visually engaging templates.
    To adhere to content production and development schedules, based on the advice of the Web Manager.
  6. Developer - To assist with defining code standards.
    To expedite coding in support of maintenance and project requirements.
    To assist with technical activity in conjunction with other service providers, in particular hosting.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is SEO?

A

Search Engine Optimization is the process of improving the visibility of a website on organic (“natural” or un-paid) search engine result pages (SERPs), by incorporating search engine friendly elements into a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Advantages of SEO:

A

FREE TARGETED TRAFFIC
The primary advantage of SEO over any other type of internet marketing. Once your site is ranked in the top 10 for your keyword phrase, you should be able to keep it there with a minimum of fuss. This means that you will receive free traffic as long as you keep it up

Superb ROI
Return on investment is one of the major advantages of SEO over paid advertising.A site takes some time to get rank and after the site ranked, the ROI will be great.

COST EFFECTIVENESS
SEO is one of the most cost-effective ways of marketing. If the site is properly designed and optimized then it has a longer standings s compared to the Pay Per Click Advertising.

BETTER USABILITY
The site is easily available to the large portion of the online users. A better optimized and designed website always attracts lot of visitors

HIGHER SALES
Increased visibility, cost effectiveness and accessibility leads to the higher sales.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Aspects of web design that increase SEO:

A
  1. Add a blog
  2. Add Google Analytics to each page
  3. Reduce code bloat
  4. Make each page unique
  5. Use meta description tags
  6. Remove repetitive wording from the website layout
  7. Add footer links to every page
  8. Create a separate web page for each keyword or keyword phrase
  9. Use keyword rich title tags on each page
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the difference between a directory search and a keyword search?

A

A search engine, such as Yahoo or Google, is an online tool that helps users of the Internet find the sites and information they’re looking for. Most search engines use automated programs (sometimes called spiders) to look for relevant information based on keywords entered by the user.

A search directory, such as Yahoo Directory, is a catalog of websites organized by category to allow users to easily browse for the information they need. Unlike search engines, which locate and display relevant information based on a formula or algorithm using an automated software program, search directories are organized by real people who discover new sites and relevant information by exploring the Internet themselves and by reviewing submitted sites.

Both search engines and directories can help drive customers to your website. Neither guarantees that your site will be included in their listings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is CSS and what advantages does it offer web developers when it comes to accessibility and SEO.

A

1) CSS decreases the code to content ratio making it easier to crawl, leading to a better search index. CSS reduces the overall size of a website and therefore increases download speeds.
2) Using standard html tags such as <h1> make important content easily identifiable
3) CSS allows you to put your content higher up in the HTML document making it more prominent to crawlers. Using CSS you can then style the content so that appears anywhere on the site, even though it remains on top of the HTMl doc.

WARNING: One should never hide text using CSS; showing user-friendly text to the user and showing a different more crawler friendly version of the text to the crawlers. This can be seen as spamming and can result in penalization or banning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is Scope Creep?

A

work with a new client starts off as well as you would expect, but over time the project seems to get bigger and bigger while your price remains the same. The client either (a) seems to think

that the “extra”work is within the scope of the original agreement, or (b) simply doesn’t realize that he or she is asking for more than was originally agreed. Either way, you’re losing money.

AKA
scope creep is the process by which a project grows beyond its originally anticipated size.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

How can you avoid the monster that is Scope Creep?

A

Step 1: Understand the Outcome
Step 2: Be Critical of Your Client’s Ideas
Step 3: Clearly Define the Scope of Works
Step 4: Price Right - breaking down projects into their smallest constituent parts and ensuring that everything is accounted for
Step 5: Get It in Writing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What does IT refer to?

A

Information Technology refers to all aspects of managing and processing information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

List 6 IT roles

A
  1. Website designer
  2. Web application developer
  3. Web architect
  4. Web site manager
  5. DBA
  6. Network engineer
  7. SEO analyst
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What does Ontology refer to in a business context?

A

Ontology is the study of how a particular domain, or system, is organized. In business, ontology describes the flow of information through a business hierarchy.
- Web Ontology Language (OWL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the importance of standards in IT?

A

Standards help govern with ease which information can be exchanged and understood between people, businesses and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

ISO 9000

A

International Organization for Standardization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

W3C

A

World Wide Web Consortium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

IEFT

A

Internet Engineering Task Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

IEEE

A

Institute of Electrical and Electronics Engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

TIA

A

Telecommunications Industry Association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is Crowdsourcing?

A

a task ordinarily performed by one person is

outsourced to a large group or community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What is understood by the term ‘collective intelligence’?

A

– the ability of a group to exhibit a greater
degree of intelligence by solving problems collaboratively compared
to the intelligence of an individual member

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

List some common technologies and tools.

A
  1. Ajax - – enables Web applications to interact with users in much the same way they do with desktop applications
  2. Wikis - Web pages that can be viewed and
    modified by anybody with a Web browser and
    access to the Internet
  3. Folksonomy - – tagging of online contentso non‐technical users can classify and find information
  4. Web feed services - content publicly available to users via
    Web feeds(e.g., RSS,Atom);
    syndication
  5. Podcasts - audio/videodigital‐media files
    distributed throughWeb feedsto subscribed
    users
  6. Semantic Web - Web data thatis
    contextualized with the addition of machine‐
    readable metadata
  7. Mash-ups - Web pages that integrate content and scripts from
    multiple Web sites to create new applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What does a ‘Blog’ refer to?

A

Blog (shortfor “Web log”) – a collection of personal thoughts posted on a public Web site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is a Network?

A

– two or more computers linked together so they can communicate, share resources and
exchange information

59
Q

What are networks used for?

A
  • Networks allow users to:
  • Access shared programs and data
  • Transfer data fromone computer to another
  • Share peripheral devices such as printers
  • Share storage devicesto store data for backup
  • Use programs to communicate with other users
  • Access the Internet
60
Q

What is the Client/Server Model?*

A

– a network structure in which individual
computers and devices interact with one another through a central
server,to which they are all connected
• Client – an individual computer connected to a network
• Server – a computer that manages network resources
• Node – an individual computer or other device connected to a network

61
Q

What is a LAN?

A

Local Area Network. A group of computers connected within a confined geographic area. E.g. An organization owns all network components.

62
Q

What is a WAN?

A

Two or more connected LANs that span a wide geographic area.
The organization typically leases some of the
components needed to transmit data,such as high‐speed telephone lines or wireless transmission equipment

63
Q

What is the Internet?

A

• Internet – a vast network of LANs and WANs that electronically connects millions of people worldwide
• The Internet was formed in 1969 by ARPA, whose network, ARPANET,
featured multiple servers and connections

64
Q

What is a web browser?

A

– a software application that enables users to easily access, view and navigate Web pages on the Internet

65
Q

What is TCP/IP?

A
  • Transmission Control
    Protocol/Internet Protocol(TCP/IP)
    • TCP/IP – software that makes Internet communication possible
66
Q

What components are necessary for a connection to the Internet?

A
  • Six elements are required to connect to the Internet:
  • Computer
  • Operating system
  • TCP/IP
  • Clientsoftware
  • Internet connection (directthrough an ISP)
  • Internet address
67
Q

What is HTTP?

A

• Hypertext Transfer Protocol(HTTP) – used to transfer Web pages from
a Web server to a Web client (Web browser)

68
Q

What is HTTPS?

A
  • Used to access a secure web server
69
Q

What is FTP?

A

Used to transfer files between computers on the Interent.

70
Q

What is SMTP?

A

Simple Mail Transfer Protocol. Used to transfer e‐mail messages to others with an outgoing mailserver

71
Q

What is POP?

A
– used to receive e‐mail from an
incoming mail server
• Forces you to download e‐mail messages before reading
and managing them
• Current version is POP3
72
Q

What is IMAP?

A
– used to receive e‐
mail from an incoming mail server
• Allows you to manage e‐mail messages while they reside
on the server
• Current version isIMAP4
73
Q

What is DNS?

A

Resolves IP addresses easily into recognizable names

74
Q

What is Cloud Computing?

A

a paradigm in which users access software and services remotely over the Internet

75
Q

What are the characteristics of Cloud Computing?

A
  • Reliance on only a Web browser to access services
  • No browser preference
  • No operating system preference
76
Q

What is a URL?

A

Uniform Resource Locator. URLs typically include the protocol, the Internet resource (server or
host name) and the domain name

77
Q

What is a Proxy Server (Take 2)?

A

Proxy servers are placed between corporate networks and the Internet:

  • Web document caching
  • Corporate firewall access
78
Q

What is JavaScript?

A

An event‐driven scripting language

designed to react whenever events occur

79
Q

What is a plug-in?

A

Plug-ins are programs designed to extend basic browser functionality.
They provide efficient integration of multimedia formats with browser and computer.

80
Q

What is a Database?

A

An organized collection of information that pertains to a particular subject or purpose.

81
Q

What’s the difference between Search Engines and Information Portals?

A

• Search engine – uses a robot or spider program to browse the Web following hyperlinks, and index the
content that it finds
• Information portal – only finds Web sites based on manual submissions
- More likely to find high-quality content form Information Portals

82
Q

Difference between a Keyword Search and Directory Search.*

A

Directory search – search engine displays a list of categories and subcategories that you can browse to find information
• Keyword search – you enter keywords in a search engine to query an index

83
Q

What is a MIME?

A

Multipurpose Internet Mail Extensions - – enables operating

systems to map file name extensions to corresponding applications

84
Q

SMIME

A

Secure MIME. Adds encryption to MIME data.

85
Q

Name 3 types of encryption.

A
  1. Symmetric (private-key) encryption - the same key is used to encrypt and decrypt messages.
  2. Asymmetric (public and private key) - Two keys are used to encrypt and decrypt messages - a public key and a private key.
  3. Hash (one-way) encryption - Uses hashes to verify the integrity of transmitted messages.
86
Q

What is SSL?

A

Secure Sockets Layer. A protocol for secure exchanges.

  • Authenticates using digital certificates.
  • Provides for data encryption
87
Q

What is TLS?

A

Transport Layer Security. Provides for encryption and authentication.

88
Q

What is Typosquatting?

A

Registering a domain name similar to a high‐
volume site hoping to receive traffic from users seeking the
high‐volume site who mistakenly enter an incorrect URL in
the browser
- Also known as URL hi-jacking

89
Q

What is a Firewall?

A

– a collection of hardware,software and
corporate policies that prevents unauthorized
access to or from private networks

90
Q

What is a List Server?

A

Collects and distributes information to and from listserve groups

91
Q

What is a list server group?

A

Participants who subscribe to a mailing list through a list server.

92
Q

Virtual Network Computing (VNC)

A

Allows you to control a computer at a remote location as if you were sitting in front of it

93
Q

What is a Peer-to-Peer (P2P) network?

A

On the internet, a P2P network allows a group of users to connect with each other an directly share files among their HDs. Therefore, each computer has both client and server capabilities.
- Inexpensive
-Allow users to share bandwidth
Example, BitTorrent

94
Q

What is proprietary software?

A

Software that is owned by an author or entity

95
Q

What is a EULA?

A

End User License Agreement. A legal contract between the author of a software and the end user who uses the s/w

96
Q

What is meant by ‘Scope Creep’?

A

Gradual increases in project scope that occur in small increment over time.

97
Q

What are the phases of Project Management?

A
  1. Initiating phase
  2. Planning phase
  3. Execution phase
  4. Controlling phase
  5. Closing phase
98
Q

What is SGML?

A

Standard Generalized Markup Language.

• Originally created by IBM in 1986
• A metalanguage, meaning it is used to create other languages
• The basis for HTML, XHTML and XML
• You create your own document rules using a
Document TypeDefinition (DTD)

99
Q

What is XML?

A
  • Extensible Markup Language (XML)
  • A subset of SGML, also a metalanguage
  • XML describes data instead of formatting
  • HTML or XHTML provides formatting and document structure
100
Q

What are the benefits of following standards?

A

Benefits of following standards include:
• Code will render as expected in more browsers
• Pages will be more scalable (as you addmore
sophisticated content, you will not run into
problems)
• Pages are more likely to be available to disabled
users

101
Q

What is ADA?

A

Americans with Disabilities Act(ADA)
• Enforced by the U.S.Justice Department
• Requires Web designersto create “reasonable
accommodations” for disabled users:
• Ensuring that all images have text‐based descriptions
• Providing text‐based alternatives to all non‐text content (e.g.,
Java applets and Flash presentations)
• Providing easy‐to‐read forms

102
Q

What are the advantages of CSS?

A

– Less‐cluttered HTML code, making it easier to read and maintain
– The ability to change the look of a whole site by changing a single file
– Greater control over the way page elements look

103
Q

What does the Cascading in CSS mean?

A

The cascade in CSS refers to the way that rules are added
together and applied cumulatively.

As a basic principle, style rules that appear
lower down in a style sheet or block
override any previous rulesin the case of a
direct conflict.

104
Q

List 4 types of stylesheet specifications.

A
  1. Linked
  2. Embedded
  3. Imported
  4. Inline
105
Q

Difference between GET and POST method.

A

Get – The Form data is appended to the url.
– User can see the data being sent in url in cleartext.
•• Post – The form data is posted to the url
• The data being sent is hidden from the user, It is more intensive,
but can generally send more characters.
• Whether you use get or post will also dictate how
the parser receives the data!
– $HTTP_GET_VARS[formItem ‘]
– $HTTP_POST_VARS[‘formItem’]

106
Q

What were the goals of HTML5?

A
  1. Reduced need for plugins
  2. New features should be based on HTML, JS, CSS, and DOM
  3. Error handling should be easier
  4. Should be device independent
  5. Development process visible to the piblic
107
Q

What’s semantic markup?

A

The use of markup in a meaningful way to the browser and developer.

108
Q

Advantages of mySQLi over mySQL.

A
  1. Supports both object-oriented and procedural programming methods
  2. Supports multiple statements
  3. Enhanced debugging capabilities
  4. Support for prepared methods
109
Q

What is PHP?

A

PHP Hypertext Preprocessor.

Server-side scripting language.

Helps create dynamic webpages.

Integrated support for interfacing with databases (mySQL)

110
Q

Difference between Client-side scripting and Server-side scripting.

A

Client-side: Example, Javascript. Code is executed on the users machine when it is downloaded or called upon. Common tasks: pop up windows, animations, drop-down menus.

Server-side scripting language: Performed on sites hosting server before page is delivered to user.
Changes that must be made by script require a page refresh.
Common tasks; user authentication, saving changes to database, retrieving entries for display.

111
Q

Adv of server-side scripting?

A

Independent of client’s browser

112
Q

What is a Mash-up?

A

In web development, is a web page, or web application, that uses content from more than one source to create a single new service displayed in a single graphical interface. For example, you could combine the addresses and photographs of your library branches with a Google map to create a map mashup.[1] The term implies easy, fast integration, frequently using open application programming interfaces (open API) and data sources to produce enriched results that were not necessarily the original reason for producing the raw source data.

113
Q

Who founded HTML?

A

Tim Berners-Lee founded HTML - his effort to weld hypertext to a markup language in an attempt to make communication of research between himself and his colleagues simpler

114
Q

Describe four types of CSS selectors.

A
  1. Class - modify an element or group of elements. In CSS, a class selector’s name is prefixed by a period. Ex.

.warningText {
color: red;
}

  1. ID - can be used only once on each page. In HTML, you apply a unique identifier to a HTML element with the id attribute. Styles using a hash mark.

Note: Classes be used multiple times on a webpage but IDs cannot.

Typically, IDs are used to define one-off page elements such as structural divisions, whereas classes are used to define the style for multiple items.
3. Grouped - setting property values for a number of different selectors, you can use the grouped selector. Ex.

h1, h2, h3, h4, h5 {
color: green;
}
4. Contextual - Advanced CSS; contextual selectors define property values for HTML elements depending on context.

115
Q

DTD

A

Document Type Definition. A Doctype declaration - indicates to a web browser what markup you’re using

3 types.

  1. XHTML Strict - does not allow use of presentational markup or deprecated elements.
  2. XHTML Transitional - Can use deprecated elements.
  3. XHTML Frameset - Frame-specific DTD
116
Q

What’s the universal selector?

A

Selector whose styling applies to all elements on a webpage.

  • {
    margin: 0;
    padding: 0;
    }
117
Q

tracert command-line tool

A

helps visualize the path traffic takes between your computer and a web server

traceroute sends a sequence of packets using the ICMP protocol (the same protocol used for the ping command.)

118
Q

Cache

A

Saves content locally. Speeds up internet.

119
Q

Codec

A

A codec is a device or computer program capable of encoding or decoding a digital data stream or signal. The word codec is a portmanteau of “coder-decoder” or, less commonly, “compressor-decompressor”

120
Q

What’s the purpose of the a web browser?

A

To read HTML documents and display them as web pages. Ex. Chrome, IE, Firefox, Safari.

121
Q

What does the meta tag do?

A

Provides metadata about the HTML document. Metadata will not be displayed on the page, but will be machine parsable.

122
Q

Block-level vs Inline elements.

A

Block-level elements are things like heading, and paragraphs. Inline elements involve strong, em, and underline tags that do not defect from the flow of content.

123
Q

Cookies

A

A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is a small piece of data sent from a website and stored in a user’s web browser while the user is browsing that website. Every time the user loads the website, the browser sends the cookie back to the server to notify the website of the user’s previous activity.[1] Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items in a shopping cart) or to record the user’s browsing activity (including clicking particular buttons, logging in, or recording which pages were visited by the user as far back as months or years ago).

124
Q

DOM

A

Document Object Model. DOM is a W3C standard.

The DOM defines a standard for accessing documents:

“The W3C Document Object Model (DOM) is a platform and language-neutral interface that allows programs and scripts to dynamically access and update the content, structure, and style of a document.”

The W3C DOM standard is separated into 3 different parts:

Core DOM - standard model for all document types
XML DOM - standard model for XML documents
HTML DOM - standard model for HTML documents

125
Q

TLD

A

A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address.

A TLD identifies something about the website associated with it, such as its purpose, the organization that owns it or the geographical area where it originates. Each TLD has a separate registry managed by a designated organization under the direction of the Internet Corporation for Assigned Names and Numbers (ICANN).

126
Q

FTP PORT

A

20

127
Q

SSH PORT

A

22

128
Q

Telnet

A

23

129
Q

NNTP

A

The Network News Transfer Protocol (NNTP) is an application protocol used for transporting Usenet news articles (netnews) between news servers and for reading and posting articles by end user client applications

Port 119

130
Q

DNS

A

53

131
Q

HTTP

A

80

132
Q

POP3

A

110

133
Q

HTTPS

A

443

134
Q

ICAAN

A

Internet Corporation for Assigned Names and Numbers

135
Q

PPP

A

Point-to-Point - – allows a computer to connect to the Internet
over a phone line

136
Q

PPPoE

A

Point‐to‐Point Protocol over Ethernet (PPPoE) – implements PPP over
Ethernet (Ethernet is a LAN network standard that allows computers in a
network to communicate)
• PPPoE connects an entire network to the Internet

137
Q

IPV4 A class. What range?

A

0.0.0.0 - 127.225.225.225

138
Q

Shared domain

A

a hosting service that allows
multiple entities to share portions ofthe same
domain name

139
Q

IPV A class. What range?

A

0.0.0.0 - 127.0.0.0

140
Q

IPV4 B class. What range?

A

128.0.0.0 - 191.225.225.225

141
Q

IPV4 C class.What range?

A

192.0.0.0 - 223.225.225.225

142
Q

IPV4 D class. What range?

A

224.0.0.0 - 239.255.255.255

143
Q

What are the basic functions of a web browser?

A
  1. Provide a way for users to access and navigate web pages.
  2. Display web pages properly
  3. Provide technology to enable multimedia features
  4. Provide access to Internet services (e.g. ftp, email)
  5. Perform authentication and encryption functions.
144
Q

URL

A

URLs typically include the protocol, the Internetresource (server or
host name) and the domain name