0% found this document useful (0 votes)
55 views5 pages

Internet Application and Application

This document contains details about an individual named MOHAMUD MOHAMED KHALID enrolled in the unit INTERNET APPLICATION AND APPLICATION with unit code CISY 311. It includes responses to 8 questions related to technologies used to build dynamic websites such as PHP, MySQL, JavaScript, CSS, HTML5 features, video conferencing, chat, blogs, cloud computing, and VoIP. It also discusses risks of using the internet like cyber predators, phishing, and malware and provides controls to address each risk.

Uploaded by

Kiki Kyms
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views5 pages

Internet Application and Application

This document contains details about an individual named MOHAMUD MOHAMED KHALID enrolled in the unit INTERNET APPLICATION AND APPLICATION with unit code CISY 311. It includes responses to 8 questions related to technologies used to build dynamic websites such as PHP, MySQL, JavaScript, CSS, HTML5 features, video conferencing, chat, blogs, cloud computing, and VoIP. It also discusses risks of using the internet like cyber predators, phishing, and malware and provides controls to address each risk.

Uploaded by

Kiki Kyms
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

NAME : MOHAMUD MOHAMED KHALID

REG NO : CIS-0268-1-2020

UNIT NAME : INTERNET APPLICATION AND APPLICATION

UNIT CODE: CISY 311


1 PHP, MySQL, JavaScript, and CSS are the wonderful way in which they all work
together to produce dynamic web content. Describe the specific role each play in that
context.
[5 marks]
 PHP is a server-side scripting language that allows the client to receive output on the
processing that happens within the server. Since this processing is completed by using the
resources of the server, when a request is filed, it sends the HTML back to the browser
thanks to the PHP programming.
 MySQL is a relational database management system based on SQL – Structured Query
Language. The application is used for a wide range of purposes, including data
warehousing, e-commerce, and logging applications. The most common use for MySQL
however, is for the purpose of a web database.
 JavaScript helps web developers to make web pages dynamic and interactive by
implementing custom client-side scripts. At the same time, the developers can also use
cross-platform runtime engines like Node.js to write server-side code in JavaScript. They
can even combine JavaScript, HTML5 and CSS3 to create web pages that look good
across browsers, platforms, and devices.
 CSS allows you to easily link to other documents in a website. With the help of CSS, you
can have a control over the various elements in different web pages of your site. CSS
only defines the structure and content presentation of a website. It has nothing to do with
the design of a website.
2 Explain main features of HTML5 that makes it different from the former html
[5
marks]
 Video and audio are the new tags which allow to embed a video in the website.
 The nav element is used for the part of an internet site that links to different pages at the
website. The hyperlinks can be organized a number of approaches.
 Canvas is a tag of HTML which is newly introduced in HTML5. It is used to draw the
images on the fly. It can be used for visual images, rendering graphs, game graphics.
 Input is an attribute which is an old attribute but in HTML5, it is reintroduced with new
values like email, month, number, range, search, tel, color, week, url, time, date,
datetime-local etc.
 Placeholders - This feature in html5 has provided the assistance to many new users. It
gives the hint to what is to be inserted in a particular field of the form. It is there when the
user has not started writing something in the input field. It is sometime also called
dummy text. It is present temporarily.

3 Explain the working of the following technologies [5 marks]


i) Video conferencing - Video conferencing is a live video-based meeting between
two or more people in different locations using video-enabled devices. Video
conferencing allows multiple people to meet and collaborate face to face long
distance by transmitting audio, video, text and presentations in real time through
the internet.
ii) Chat – chat may refer to any and of communication over the internet that offers a
real-time transmission of text messages from sender to receiver. It is a process of
communicating, interacting or exchanging messages over the internet. A real-time
communication via keyboard between two or more users on a local network.
iii) Blog- blog is a discussion or informational website published on the World Wide
Web consisting of discrete, often informal diary-style text entries. Posts are
typically displayed in reverse chronological order, so that the most recent post
appears first, at the top of the web page.
iv) Cloud-cloud computing means having the ability to store and access data and
programs over the internet instead of on a hard drive.
v) VoIP -, is a technology that allows you to make voice calls using a broadband
Internet connection instead of a regular (or analog) phone line.
4. Identify at least four main risks of using internet and, for each of these risks, suggest
some appropriate controls that can be put in place to counter the risk. [5 marks]

 Cyber Predators -These days sexual and other predators often stalk children on the
internet, taking advantage of their innocence, lack of adult supervision and abusing their
trust. The best protection is regularly talking to your children about what is going on in
their day-to-day lives.
 Phishing is what cyber security professionals call the use of emails that try to trick people
into clicking on malicious links or attachments. Avoid clicking on emails or texts from
strangers and to be wary of messages that appear to be from their friends but seem “off”
or have no genuine personal message attached.
 Accidentally Downloading Malware- Malware is computer software that is installed
without the knowledge of permission of the victim and performs harmful actions on the
computer. Buy a security protection can help safeguard your computer against any
malware that sneaks into it
4 Distinguish among CSS tag, class and id selectors. Show how you define and apply on a
webpage. [2 marks]
 An internal CSS is defined in the <head> section of an HTML page, within a <style>
element. The following example sets the text color of ALL the <h1> elements (on that
page) to blue, and the text color of ALL the <p> elements to red.

ii) Steve wishes to create CSS file which contains styles for his website. Describe how
you help Steve accomplish this task by defining at least three styles using tag, class
and id selector. Further show how you link to web pages and apply to the pages.

[3 marks]
 You can link this external file (. Css file) to your HTML document file using the < link >
tag. You can place this < link > tag Within the < head > section, and after the < title >
element of your HTML file. The value of the rel attribute must be style sheet. Example;
<html>
<head>
<title>Example</title>
<link rel=”stylesheet” type=”text/css” href=”styles.css” />
</head>
<body>
<h1>Embedded Style Sample testing</h1>
<h2>Next Line</h2>
</body>
</html>

7 a) What are the roles of JavaScript in a web page. [2 marks]

 Allows dynamic content to get execute in a webpage. JavaScript can make the website
more interactive and user- friendliness of JavaScript helps easy navigation of the website
and helps designers to guide the visitors with additional information or guide them
through walkthroughs. Visual effects can also be achieved with JavaScript. JavaScript
can be used effectively to create special effects like rollover for images.

b) Show how you can use JavaScript to validate form entries. [3 marks]

 If a form field (fname) is empty, this function alerts a message, and returns false, to
prevent the form from being submitted:
Example
<form name=”myForm” action=”/action_page.php” onsubmit=”return validateForm()”
method=”post”>
Name: <input type=”text” name=”fname”>
<input type=”submit” value=”Submit”>
</form>

8. a) What is the prerequisite of executing php [1 mark]

 It is highly recommended that one should have at least a basic working knowledge of
HTML and CSS.

b) Write a simple php that prints some text if someone is above18 years and a different
text if below. [2 marks]

<!DOCTYPE html>

<html>
<body
<?php
Echo “ someone is above18 years ”;
?>
</body>
</html>

c) Enter some text through a form text box, Using php dbx commands post the text to a
database and retrieve to print on the screen. [3 marks]

<form action=”” method=”post”>


<label>Please enter your Name:</label><input type=”text” name=”Name” value=’<?php echo
$name; ?>’/><br><br>
<input name=”form” type=”submit” value=”Submit”/><br><br>
</form>

You might also like