Web Technologiesv Engineering
Web Technologiesv Engineering
1. <!DOCTYPE html>: This is a declaration that specifies the version of HTML being
used.
2. <html>: This tag defines the start of an HTML document and contains all other elements.
3. <head>: This tag contains the document's metadata, such as the document's title, links to
stylesheets, and other important information.
4. <meta charset="utf-8">: This tag sets the character encoding used in the document.
5. <title>: This tag defines the title of the document, which appears in the browser's title
bar.
6. <body>: This tag contains the visible content of the document, such as text, images, and
links.
7. <h1>: This tag defines a heading, with h1 being the largest and most important.
8. <p>: This tag defines a paragraph of text.
9. <ul>: This tag defines an unordered list.
10. <li>: This tag defines a list item and is used inside a ul or ol tag.
Server-side script technologies are scripts that run on the server-side. Because they run on
the server-side, they are independent of the user's device capabilities and are executed by
processors on the server. These technologies include languages like PHP, Ruby, Java, and
ASP.NET. Server-side scripts are used for data processing, database operations, form
processing, and other server-side functions. Additionally, server-side scripts can perform
important security functions such as data security and transaction control.
3. Describe web-based script technologies?
Web based script technologies are used to dynamic web pages. They are responsible for
controlling the behavior and appearance of web pages, and they are used to create
dynamic and interactive web applications. Some popular web-based script technologies
include JavaScript, HTML5, and CSS3.
ASP.Net is a tool or technology for developing a powerful web and windows application
using different languages.
ASP.Net is not a coding language, It is a software that provide plate form for developing
powerful website and windows application. In ASP.Net technology we can develop both
Website and Windows application
ASP.NET Web Forms: Web Forms is a component used to build web applications. Web
Forms includes features such as drag and drop features, automatic form validation, and
automatic data binding.
ASP.NET Web API: Web API is a component for building RESTful web services. Web
API performs data sending and receiving operations using the HTTP protocol.
The architecture of Java EE consists of multiple tiers, including client tier, web tier,
business tier, and enterprise information system (EIS) tier. The client tier interacts with
the user interface, while the web tier provides a web-based interface for the user to
interact with the application. The business tier is responsible for implementing the
business logic and provides services to the web tier. The EIS tier provides access to the
data sources and other enterprise-level services.
Overall, Java EE provides a powerful and flexible platform for building and deploying
server-side applications with robustness, scalability, and security.
Atomicity: This property ensures that each transaction is treated as a single, indivisible unit of
work. Either all of the operations in the transaction are completed successfully, or none of them
are completed. If a failure occurs during the transaction, the database will be rolled back to its
original state.
Consistency: This property ensures that the database remains in a valid state after each
transaction. Each transaction should leave the database in a consistent state, meaning that all
constraints and rules are followed, and the data is valid.
Assume your bank account does not allow you to have a negative balance. You have 20 dollars in
your account and try to make a 25-dollar-purchase with your card. This purchase is considered
illegal in terms of database transactions and thus is rejected.
Isolation: This property ensures that each transaction is executed in isolation from other
transactions. Each transaction must be able to run independently, without interference from other
transactions. Isolation ensures that each transaction sees the database as it was before the
transaction began.
Consider two people are trying to purchase the same product on an e-commerce website at the
same time and there is one left in stock. If the database allows both customers to make the
purchase at the same time, there will be a problem. Isolation puts these actions in order so that
one of them must be completed for the other one to start.
Durability: This property ensures that once a transaction is committed, its changes are permanent
and will survive any subsequent failures.
The completed transactions are stored in non-volatile memory. Let’s say you have 100 dollars in
your account and transfer 20 dollars to another account. This brings your balance down to 80
dollars. After a short while, you check your balance again and see that it is 100 dollars as if the
transaction never occurred. That is a series issue and durability guarantees that such problems do
not occur.
8. Provide methods for designing web applications and discuss the assumptions of one of
Them?
9.Describe the problem of safety in Internet and Intranet?
The problem of safety in Internet and Intranet can arise due to a variety of reasons, including
unauthorized access, data theft, malware attacks, phishing scams, and more. These threats can
compromise the confidentiality, integrity, and availability of information stored in databases,
web applications, and other networked systems. Unauthorized access can occur when hackers or
other malicious actors gain access to systems or data without proper authorization. This can lead
to data theft or loss of critical information, as well as disruption of business operations.
Malware attacks, including viruses, worms, and Trojans, can infect computers and other devices
connected to the Internet or Intranet, causing damage to software and hardware components, and
compromising the security of data.
Phishing scams involve the use of fraudulent emails or websites to trick users into revealing
sensitive information, such as passwords or credit card numbers. These scams can be difficult to
detect and can lead to identity theft or financial loss.
To address these issues, organizations can implement various security measures, including
firewalls, encryption, access controls, and regular software updates. Additionally, employee
training and awareness programs can help reduce the risk of human error and improve overall
security.
1. throw – We know that if an error occurs, an exception object is getting created and then
Java runtime starts processing to handle them. Sometimes we might want to generate
exceptions explicitly in our code. For example, in a user authentication program, we
should throw exceptions to clients if the password is null. The throw keyword is used to
throw exceptions to the runtime to handle it.
2. throws – When we are throwing an exception in a method and not handling it, then we
have to use the throws keyword in the method signature to let the caller program know
the exceptions that might be thrown by the method. The caller method might handle these
exceptions or propagate them to its caller method using the throws keyword. We can
provide multiple exceptions in the throws clause, and it can be used with
the main() method also.
3. try-catch – We use the try-catch block for exception handling in our code. try is the start
of the block and catch is at the end of the try block to handle the exceptions. We can have
multiple catch blocks with a try block. The try-catch block can be nested too.
The catch block requires a parameter that should be of type Exception.
4. finally – the finally block is optional and can be used only with a try-catch block. Since
exception halts the process of execution, we might have some resources open that will
not get closed, so we can use the finally block. The finally block always gets executed,
whether an exception occurred or not.
1. Model: This component represents the application's data and the logic for manipulating
that data. It responds to requests for information from the View and updates the data
when commands are received from the Controller.
2. View: This component is responsible for displaying the data from the Model to the user.
It is typically a graphical user interface (GUI) that allows the user to interact with the
application and view the data.
3. Controller: This component manages the flow of data between the Model and the View.
It receives user input from the View, processes the data, and sends commands to the
Model to update the data as needed. The Controller also updates the View with the latest
data from the Model.
The MVC pattern is widely used in web development frameworks such as Ruby on Rails,
Django, and ASP.NET, as well as in desktop and mobile application development.
1. Separation of concerns: The client and server have different responsibilities and roles,
and their functionality is separated to ensure modularity, scalability, and maintainability.
2. Interoperability: Client and server applications from different vendors can communicate
with each other using standard protocols and interfaces.
3. Scalability: Client-Server architecture allows for horizontal and vertical scaling of the
server component to handle increasing demand and growing user base.
4. Security: Client-Server architecture provides a mechanism for authentication,
authorization, and access control to ensure the security and privacy of user data.
5. Fault tolerance: Client-Server architecture can provide redundancy and failover
mechanisms to ensure high availability and reliability of the service.
6. Performance: Client-Server architecture can optimize the use of network resources and
minimize latency to ensure fast and responsive user experience.
By following these principles, Client-Server architecture can provide a flexible, modular, and
scalable framework for developing and deploying applications that can meet the needs of a wide
range of users and use cases.
14. List and discuss basic internet services?
Communication Services. There are various Communication Services available that offer
exchange of information with individuals or groups. ...
Information Retrieval Services. ...
Web Services. ...
World Wide Web (WWW) ...
Video Conferencing.
Basic internet services refer to the fundamental services that allow users to access and
communicate over the internet. These services include:
These basic internet services form the foundation of the internet, enabling users to access and
communicate information globally.
The TCP/IP protocol stack is a set of protocols that govern communication on the Internet. It
consists of four layers:
1. Application Layer: This layer includes protocols such as HTTP, FTP, SMTP, and DNS,
which are used by applications to communicate with each other.
2. Transport Layer: This layer includes the Transmission Control Protocol (TCP) and the
User Datagram Protocol (UDP), which provide reliable and unreliable data transfer
services, respectively.
3. Internet Layer: This layer includes the Internet Protocol (IP), which is responsible for
routing packets between networks.
4. Link Layer: This layer includes protocols such as Ethernet and Wi-Fi, which are
responsible for transmitting data over physical networks.
Together, these protocols provide a standardized way for different devices and networks to
communicate with each other on the Internet.
the TCP/IP protocol stack consists of four layers, each layer consisting of one or more protocols.
A protocol is a set of rules or standards that two entities must follow so as to allow each other to
receive and interpret messages sent to them. The entities could, for example, be two application
programs in an application protocol, or the entities might be two TCP protocol layers in two
different IP hosts (the TCP protocol).
16. Event programming and website support?
Events are actions or occurrences that happen in the system you are programming, which the
system tells you about so your code can react to them.
For example, if the user clicks a button on a webpage, you might want to react to that action by
displaying an information box.
By using these methods, designers can create user interfaces that are easy to use, visually
appealing, and provide a good user experience.