0% found this document useful (0 votes)
27 views14 pages

Web Technologiesv Engineering

Web technologies include HTML, CSS, JavaScript, PHP, Python, Ruby, and ASP.NET. HTML defines webpage structure with elements like <html>, <head>, <body>, <h1>, <p>, etc. Server-side scripts like PHP process data on the server and provide security. Client-side scripts like JavaScript control webpage behavior. ASP.NET is a Microsoft framework for building dynamic websites and web services using technologies like Web Forms and MVC. Common web application architectures include client-server, peer-to-peer, multi-tier, microservices, and serverless. Internet databases ensure properties like atomicity, consistency, isolation, and durability during transactions. Security risks on the internet include unauthorized access

Uploaded by

emel sarli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views14 pages

Web Technologiesv Engineering

Web technologies include HTML, CSS, JavaScript, PHP, Python, Ruby, and ASP.NET. HTML defines webpage structure with elements like <html>, <head>, <body>, <h1>, <p>, etc. Server-side scripts like PHP process data on the server and provide security. Client-side scripts like JavaScript control webpage behavior. ASP.NET is a Microsoft framework for building dynamic websites and web services using technologies like Web Forms and MVC. Common web application architectures include client-server, peer-to-peer, multi-tier, microservices, and serverless. Internet databases ensure properties like atomicity, consistency, isolation, and durability during transactions. Security risks on the internet include unauthorized access

Uploaded by

emel sarli
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Web Technologies Engineering

1. Describe the structure of HTML document?


Every HTML document consists of four basic structure elements: html, head, title,
and body.

The basic structure of an HTML document consists of the following components:

1. <!DOCTYPE html>: This is a declaration that specifies the version of HTML being
used.
2. <html>: This tag defines the start of an HTML document and contains all other elements.
3. <head>: This tag contains the document's metadata, such as the document's title, links to
stylesheets, and other important information.
4. <meta charset="utf-8">: This tag sets the character encoding used in the document.
5. <title>: This tag defines the title of the document, which appears in the browser's title
bar.
6. <body>: This tag contains the visible content of the document, such as text, images, and
links.
7. <h1>: This tag defines a heading, with h1 being the largest and most important.
8. <p>: This tag defines a paragraph of text.
9. <ul>: This tag defines an unordered list.
10. <li>: This tag defines a list item and is used inside a ul or ol tag.

2. Describe server-side script technologies?


Server-side scripts provide an interface to the user, limit access to proprietary data, and
help keep control of the script source code. PHP, Python, Ruby are some common
examples of server-side scripting

Server-side script technologies are scripts that run on the server-side. Because they run on
the server-side, they are independent of the user's device capabilities and are executed by
processors on the server. These technologies include languages like PHP, Ruby, Java, and
ASP.NET. Server-side scripts are used for data processing, database operations, form
processing, and other server-side functions. Additionally, server-side scripts can perform
important security functions such as data security and transaction control.
3. Describe web-based script technologies?
Web based script technologies are used to dynamic web pages. They are responsible for
controlling the behavior and appearance of web pages, and they are used to create
dynamic and interactive web applications. Some popular web-based script technologies
include JavaScript, HTML5, and CSS3.

Scripts divided main 2 groups


Client-side script responsible for interacting within a web page
It is browser depended

For examp : Online games, get data from to user browser


Server-side script:Client server doesn’t matter.
It mainly used for password protection, adding content to a web page

4. Describe ASP.NET technologies.?

ASP.Net is a tool or technology for developing a powerful web and windows application
using different languages.

ASP.Net is not a coding language, It is a software that provide plate form for developing
powerful website and windows application. In ASP.Net technology we can develop both
Website and Windows application

ASP.NET is a web application framework developed by Microsoft. ASP.NET is used


with the .NET Framework and is used to build dynamic websites, web applications, and
XML web services. ASP.NET works as a server-side technology and ASP.NET code is
run on the server and the results are sent to the web browser.
ASP.NET technologies:

ASP.NET Web Forms: Web Forms is a component used to build web applications. Web
Forms includes features such as drag and drop features, automatic form validation, and
automatic data binding.

ASP.NET MVC: MVC (Model-View-Controller) is a design pattern used to distinguish


between different layers of web applications. The MVC model makes the web application
more manageable and increases the scalability of the application.

ASP.NET Web API: Web API is a component for building RESTful web services. Web
API performs data sending and receiving operations using the HTTP protocol.

ASP.NET SignalR: SignalR is a component used to build real-time web applications.


Using SignalR, WebSocket and other technologies, it makes it possible to communicate
in real time between web applications. It makes it possible to establish real-time
communication between web applications.

5. Describe the Java EE server development platform?


//As per the Java EE (Java for Enterprise Edition) documentation, Java EE platform uses
a distributed multitiered application model for the enterprise applications. Enterprise
Applications provides tools and business logic to model real-time businesses. Java EE is
a set of specifications and APIs to address all the four layers of an Enterprise Application
as shown in the above figure.
Java EE (Java Enterprise Edition) is a platform for developing server-side applications
based on Java programming language. It is a collection of APIs (Application
Programming Interfaces) and technologies that provide an infrastructure for building and
deploying large-scale, distributed, and secure applications.

The architecture of Java EE consists of multiple tiers, including client tier, web tier,
business tier, and enterprise information system (EIS) tier. The client tier interacts with
the user interface, while the web tier provides a web-based interface for the user to
interact with the application. The business tier is responsible for implementing the
business logic and provides services to the web tier. The EIS tier provides access to the
data sources and other enterprise-level services.

Overall, Java EE provides a powerful and flexible platform for building and deploying
server-side applications with robustness, scalability, and security.

6. Describe the basic web application architectures?


A web app architecture presents a layout with all the software components (such
as databases, applications and middleware) and how they interact with each other. It
defines how the data is delivered through HTTP and ensures that the client-side server
and the backend server can understand.
Client-server architecture: This architecture involves a client (such as a web browser) that
communicates with a server to request and receive data. The server processes the request and
sends back the response to the client. This architecture is commonly used for web applications.
Peer-to-peer architecture: This architecture involves multiple clients that communicate with each
other directly, without the need for a central server. Each client can act as both a client and a
server, and data can be shared among all clients in the network.
Three-tier architecture: This architecture involves three layers: presentation layer (client),
application layer (server), and database layer. The presentation layer handles the user interface,
the application layer processes requests and responses, and the database layer stores and retrieves
data.
Microservices architecture: This architecture involves breaking down a large application into
smaller, independent services that can communicate with each other. Each service is designed to
perform a specific task and can be scaled and updated independently.
Serverless architecture: This architecture involves building and running applications without the
need for server management. The application is broken down into smaller functions that are run
in response to specific events or requests, and are hosted and managed by a third-party provider.

7. Describe the basic properties of internet databases?

Atomicity: This property ensures that each transaction is treated as a single, indivisible unit of
work. Either all of the operations in the transaction are completed successfully, or none of them
are completed. If a failure occurs during the transaction, the database will be rolled back to its
original state.
Consistency: This property ensures that the database remains in a valid state after each
transaction. Each transaction should leave the database in a consistent state, meaning that all
constraints and rules are followed, and the data is valid.

Assume your bank account does not allow you to have a negative balance. You have 20 dollars in
your account and try to make a 25-dollar-purchase with your card. This purchase is considered
illegal in terms of database transactions and thus is rejected.

Isolation: This property ensures that each transaction is executed in isolation from other
transactions. Each transaction must be able to run independently, without interference from other
transactions. Isolation ensures that each transaction sees the database as it was before the
transaction began.

Consider two people are trying to purchase the same product on an e-commerce website at the
same time and there is one left in stock. If the database allows both customers to make the
purchase at the same time, there will be a problem. Isolation puts these actions in order so that
one of them must be completed for the other one to start.

Durability: This property ensures that once a transaction is committed, its changes are permanent
and will survive any subsequent failures.
The completed transactions are stored in non-volatile memory. Let’s say you have 100 dollars in
your account and transfer 20 dollars to another account. This brings your balance down to 80
dollars. After a short while, you check your balance again and see that it is 100 dollars as if the
transaction never occurred. That is a series issue and durability guarantees that such problems do
not occur.
8. Provide methods for designing web applications and discuss the assumptions of one of
Them?
9.Describe the problem of safety in Internet and Intranet?
The problem of safety in Internet and Intranet can arise due to a variety of reasons, including
unauthorized access, data theft, malware attacks, phishing scams, and more. These threats can
compromise the confidentiality, integrity, and availability of information stored in databases,
web applications, and other networked systems. Unauthorized access can occur when hackers or
other malicious actors gain access to systems or data without proper authorization. This can lead
to data theft or loss of critical information, as well as disruption of business operations.
Malware attacks, including viruses, worms, and Trojans, can infect computers and other devices
connected to the Internet or Intranet, causing damage to software and hardware components, and
compromising the security of data.
Phishing scams involve the use of fraudulent emails or websites to trick users into revealing
sensitive information, such as passwords or credit card numbers. These scams can be difficult to
detect and can lead to identity theft or financial loss.
To address these issues, organizations can implement various security measures, including
firewalls, encryption, access controls, and regular software updates. Additionally, employee
training and awareness programs can help reduce the risk of human error and improve overall
security.

11. Describe the mechanism of handling exceptions in Java language?

1. throw – We know that if an error occurs, an exception object is getting created and then
Java runtime starts processing to handle them. Sometimes we might want to generate
exceptions explicitly in our code. For example, in a user authentication program, we
should throw exceptions to clients if the password is null. The throw keyword is used to
throw exceptions to the runtime to handle it.
2. throws – When we are throwing an exception in a method and not handling it, then we
have to use the throws keyword in the method signature to let the caller program know
the exceptions that might be thrown by the method. The caller method might handle these
exceptions or propagate them to its caller method using the throws keyword. We can
provide multiple exceptions in the throws clause, and it can be used with
the main() method also.
3. try-catch – We use the try-catch block for exception handling in our code. try is the start
of the block and catch is at the end of the try block to handle the exceptions. We can have
multiple catch blocks with a try block. The try-catch block can be nested too.
The catch block requires a parameter that should be of type Exception.
4. finally – the finally block is optional and can be used only with a try-catch block. Since
exception halts the process of execution, we might have some resources open that will
not get closed, so we can use the finally block. The finally block always gets executed,
whether an exception occurred or not.

12. Discuss the architectural pattern Model-View-Controller (MVC)?


The Model-View-Controller (MVC) is an architectural pattern used for designing software
applications. It separates an application's data, user interface, and control logic into three
interconnected components, making it easier to manage and modify each component
independently without affecting the others.

The three components of the MVC pattern are:

1. Model: This component represents the application's data and the logic for manipulating
that data. It responds to requests for information from the View and updates the data
when commands are received from the Controller.
2. View: This component is responsible for displaying the data from the Model to the user.
It is typically a graphical user interface (GUI) that allows the user to interact with the
application and view the data.
3. Controller: This component manages the flow of data between the Model and the View.
It receives user input from the View, processes the data, and sends commands to the
Model to update the data as needed. The Controller also updates the View with the latest
data from the Model.

The MVC pattern provides several benefits, including:


 Separation of concerns: Each component has a distinct responsibility, making it easier to
manage and modify each component independently.
 Reusability: The components can be reused in other applications or in different parts of
the same application.
 Testability: Each component can be tested separately, making it easier to identify and fix
bugs.
 Flexibility: Changes to one component do not affect the other components, making it
easier to modify and update the application.

The MVC pattern is widely used in web development frameworks such as Ruby on Rails,
Django, and ASP.NET, as well as in desktop and mobile application development.

Model: Manages data and business logic.

1. View: Handles layout and display.


2. Controller: Routes commands to the model and view parts.

13. Characterize the principles of Client-Server architecture?


 Front-End: This is the piece of software that interacts with users, even if they are on
different platforms with different technologies. Any front-end module in a client-server
architecture is designed to interact with all existing devices on the market. This level
contains the login screens, menus, data screens, and reports that give and take
information to/from users. For example, most development tools and frameworks allow
the creation of one version of a program that works for PCs, tablets, and phones.
 Application server: This is the server where the software modules of the application are
installed. It connects to the database (called back-end) and interacts with users (called
front-end). The application server is like the waiter on our restaurant example.
 Database server: This server contains the tables, indexes, and data managed by the
application. Searches and insert/delete/update operations are executed here.
Client-Server architecture is a computing model where the application logic is divided between a
client machine and a server machine. The client and server machines communicate with each
other over a network, and the server provides services to the client.

The principles of Client-Server architecture include:

1. Separation of concerns: The client and server have different responsibilities and roles,
and their functionality is separated to ensure modularity, scalability, and maintainability.
2. Interoperability: Client and server applications from different vendors can communicate
with each other using standard protocols and interfaces.
3. Scalability: Client-Server architecture allows for horizontal and vertical scaling of the
server component to handle increasing demand and growing user base.
4. Security: Client-Server architecture provides a mechanism for authentication,
authorization, and access control to ensure the security and privacy of user data.
5. Fault tolerance: Client-Server architecture can provide redundancy and failover
mechanisms to ensure high availability and reliability of the service.
6. Performance: Client-Server architecture can optimize the use of network resources and
minimize latency to ensure fast and responsive user experience.

By following these principles, Client-Server architecture can provide a flexible, modular, and
scalable framework for developing and deploying applications that can meet the needs of a wide
range of users and use cases.
14. List and discuss basic internet services?
 Communication Services. There are various Communication Services available that offer
exchange of information with individuals or groups. ...
 Information Retrieval Services. ...
 Web Services. ...
 World Wide Web (WWW) ...
 Video Conferencing.

Basic internet services refer to the fundamental services that allow users to access and
communicate over the internet. These services include:

1. Email: Electronic mail is a method of exchanging messages between people using


electronic devices. It is one of the most widely used internet services.
2. World Wide Web: The World Wide Web (WWW or Web) is a system of interlinked
hypertext documents accessed through the internet. It allows users to browse and access
information, media, and other resources on the internet.
3. File Transfer Protocol (FTP): FTP is a protocol used to transfer files between computers
over the internet. It is commonly used for uploading and downloading files to and from
servers.
4. Telnet: Telnet is a protocol used to remotely access and control a computer or server over
the internet.
5. Simple Mail Transfer Protocol (SMTP): SMTP is a protocol used for sending and
receiving email messages over the internet.
6. Domain Name System (DNS): DNS is a system used to translate domain names into IP
addresses. This makes it easier for users to access websites and other resources on the
internet.
7. Hypertext Transfer Protocol (HTTP): HTTP is a protocol used to transfer data between a
web server and a web browser. It is the foundation of data communication for the World
Wide Web.
8. Secure Shell (SSH): SSH is a protocol used to provide secure, encrypted access to remote
computers and servers.
9. Internet Relay Chat (IRC): IRC is a protocol used for real-time internet chat and
messaging.

These basic internet services form the foundation of the internet, enabling users to access and
communicate information globally.

15. Discuss the stack of TCP / IP communication protocols?

The TCP/IP protocol stack is a set of protocols that govern communication on the Internet. It
consists of four layers:

1. Application Layer: This layer includes protocols such as HTTP, FTP, SMTP, and DNS,
which are used by applications to communicate with each other.
2. Transport Layer: This layer includes the Transmission Control Protocol (TCP) and the
User Datagram Protocol (UDP), which provide reliable and unreliable data transfer
services, respectively.
3. Internet Layer: This layer includes the Internet Protocol (IP), which is responsible for
routing packets between networks.
4. Link Layer: This layer includes protocols such as Ethernet and Wi-Fi, which are
responsible for transmitting data over physical networks.

Together, these protocols provide a standardized way for different devices and networks to
communicate with each other on the Internet.

the TCP/IP protocol stack consists of four layers, each layer consisting of one or more protocols.
A protocol is a set of rules or standards that two entities must follow so as to allow each other to
receive and interpret messages sent to them. The entities could, for example, be two application
programs in an application protocol, or the entities might be two TCP protocol layers in two
different IP hosts (the TCP protocol).
16. Event programming and website support?

Events are actions or occurrences that happen in the system you are programming, which the
system tells you about so your code can react to them.

For example, if the user clicks a button on a webpage, you might want to react to that action by
displaying an information box.

17.Discuss the methods of user interface design in web applications?


User interface (UI) design in web applications involves creating interfaces that are visually
appealing, easy to use, and provide a good user experience. Some common methods for
designing user interfaces in web applications include:

1. Wireframing: Wireframing is a process of creating a rough sketch or blueprint of the user


interface. This helps to define the structure and layout of the web application.
2. Prototyping: Prototyping involves creating a working model of the user interface. This
helps to test and refine the interface before development begins.
3. Responsive design: Responsive design involves designing the user interface to adapt to
different screen sizes and resolutions. This ensures that the application is accessible on
various devices, including desktops, tablets, and smartphones.
4. Visual design: Visual design involves choosing colors, fonts, and other visual elements to
create an attractive and consistent interface.
5. User testing: User testing involves testing the user interface with real users to gather
feedback and identify areas for improvement. This helps to ensure that the interface is
user-friendly and meets the needs of the target audience.
6. Accessibility: Accessibility involves designing the user interface to be accessible to users
with disabilities. This includes providing alternative text for images, using color contrast
that is easy to read, and providing keyboard shortcuts for navigation.

By using these methods, designers can create user interfaces that are easy to use, visually
appealing, and provide a good user experience.

You might also like