Webdev Reviewer
Webdev Reviewer
1. Client-Server Architecture - follow the client-server 4. Web Server - serves HTML files, images, videos,
model, where clients request and display web content. and other resources to users' browsers when they request
to access and view web content. 5. APIs (Application Programming Interfaces) - APIs
3. Web Servers - computers or software that store and allow different software components to communicate
4. HTTP and HTTPS: HyperText Transfer Protocol - THE ADVANTAGES OF USING WEB-BASED APPLICATIONS
foundation of data communication on the web. FOR BUSINESS
5. HTML, CSS, and JavaScript - are fundamental
- cross-platform and universally accessible.
technologies for building web content.
- allow you to invest less money in software
CURRENT TRENDS AND TECHNOLOGIES IN WEB development.
functions well across different screen sizes and - great at storing your data.
orientations. - secure.
2. Progressive Web Apps (PWAs) - combine the best of - deployment is easy, cost-effective, and fast.
web & mobile apps and offer fast loading, offline access. - easy to update and maintain.
management, allowing developers to focus solely on applications that require user authentication and access
6. WebRTC (Web Real-Time Communication) - enables User Interface (UI) - displays the login form, which
real-time audio and video communication. prompts users to enter their credentials to gain access to
including HTTPS adoption, content security policies. Credentials - provide their credentials include a
combination of a username or email address and a
WHAT CAN A WEB-BASED APPLICATION DO?
password.
- tracking performance records of individual workers. Data Submission - users submit the information by
- managing passenger or cargo transportation. clicking a "Login" button.
- monitoring financial processes. Server-side Validation - server receives the user's
- working with payroll. credentials and performs validation checks.
Authentication - if the provided credentials match the USER REGISTRATION - is a series of steps that allow
records in the database, the system considers the user individuals to create accounts and become users.
authenticated.
Session Management - session token is usually stored in a Registration Form Display - this form collects essential
cookie or as part of the web application's state. information from users to create their accounts.
Access Control - the user gains access to specific resources Required Information - The registration form typically
and functionalities based on their assigned permissions and requires users to provide certain mandatory information,
roles. such as:
Security Considerations - implementing secure practices is ✓ Username or email address: This will serve as the
vital to prevent unauthorized access and data breaches. user's unique identifier for logging in.
Failed Login Handling - system might display an error ✓ Password: A secure password that meets specified
message informing the user that the login was criteria to protect the account.
unsuccessful. ✓ Personal details: Depending on the website's
Logout - users can choose to log out of the system, which requirements, this may include name, date of birth,
invalidates their session token and revokes their access to gender, etc.
restricted areas. Optional Information - fields for optional details, such as
profile pictures, contact information, interests, and
preferences.
HOMEPAGE/LANDING PAGE - is the initial webpage that Email Verification - users submit the registration form, they
users encounter when they visit a website. often receive an email containing a verification link.
Header and Navigation - contains the website's logo, Account Activation - verifying the user's identity through a
branding elements, and a navigation menu. phone number or an additional security step.
Hero Section - often includes a captivating image, video, or Password Security - strong passwords, and the system
visual element. should enforce password complexity requirements.
Value Proposition - features a concise and compelling Privacy and Terms Acceptance - required to accept the
statement that outlines the main benefits. website's terms of use and privacy policy.
Features or Services Showcase - section highlighting the Validation and Error Handling - validation checks to ensure
key features, products, or services the website provides. that the entered information is in the correct.
Testimonials and Social Proof - testimonials, reviews, or Confirmation Message - users are typically shown a
user success stories add credibility to the website's claims. confirmation message or redirected to a welcome page.
Call-to-Action (CTA) Buttons - encourage visitors to take Login Option - given the option to log in immediately using
specific actions. the credentials they just created.
About Us or Company Information - its mission, values, and Account Management - where they can update their
team member. profile information, change passwords, and manage
Featured Content or Blog Posts - recent blog posts, articles, communication preferences.
or other relevant content. Security Measures - the system should implement security
Visual Elements and Imagery - high-quality images, icons, measures such as CAPTCHA to prevent automated spam
and graphics help create an appealing and visually engaging registrations.
homepage.
Contact Information - displaying contact details, such as an
email address, phone number, or a contact form. AUDIT TRAIL / LOG HISTORY - is a record of all activities,
Social Media Links - links to the website's social media events, and transactions.
profiles. Event Logging - an audit trail captures a wide range of
Footer - typically contains additional navigation links, events, including user logins, data modifications, file
copyright information, privacy policy links. uploads.
User Activity Tracking - audit trail keeps track of user Key Performance Indicators (KPIs) - KPI widgets that
interactions, allowing administrators to see who performed highlight the most critical metrics for the user's goals or
what actions and when. responsibilities.
Timestamps - is associated with a timestamp that indicates Drill-down Capability - some widgets may allow users to drill
the exact date and time when the event occurred. down into more detailed data.
Retention and Archival - retained for a specified period, PHP Data Objects (PDO)
which can vary depending on regulatory requirements. - is a PHP extension that provides a consistent interface for
Access Control - restricted to authorized personnel to accessing databases.
prevent tampering or unauthorized modifications.
- PDO is an acronym for PHP Data Objects.
Search and Reporting - allow administrators to filter and
- It's an extension in PHP that provides a consistent and high-
query logs based on different criteria.
level interface for connecting to databases.
Alerts and Notifications - configured to trigger alerts or
- PDO allows you to use a unified set of functions for
notifications for specific types of events, such as failed login
interacting with various databases.
attempts or critical system changes.
MySQL Database
Integration with Security Tools - provide a centralized view
of events across the entire IT infrastructure. - is an open-source relational database management system.
PHP SCRIPT (READ.PHP) - that retrieves data from the HTML Form
database and displays it.
The provided code is a PHP script that connects to a
database, retrieves data from a table named "users," and
displays the data in an HTML table on a web page.
HTML Form
HTML Form
HTML Output:
SQL Syntax for Delete