0% found this document useful (0 votes)
42 views13 pages

Assessment Task 1 (1)

Uploaded by

hansaka.flash11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views13 pages

Assessment Task 1 (1)

Uploaded by

hansaka.flash11
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Assessment Task 1: Knowledge

Questions
Course code and ICT50220 Diploma of Information Technology
title
Unit code and ICTWEB513 Build Dynamic Website
title
Due date 15 /12/2023
Resources  Learner resource
required  Access to computer and internet
 Access to ICTWEB513_ICTWEB517 Moodle Site
Decision making To achieve an overall satisfactory result for this assessment task:
rules
 All questions must be answered satisfactorily
Learner This task involves answering 15 questions.
instructions For this task you will:
 Complete it individually.
 Write answers to all questions.
 Have time to read and review the assessment task in class.
 Complete it in your own time and submit your answers electronically
via Moodle by the due date.
 Save the document as Assessment Task 1 StudentID.docx.
You must agree with the assessment submission terms and conditions by
clicking on the ‘I confirm’ radio button in Melbourne Polytechnic Moodle
prior to the submission.
If you have any questions about the task or concerns about your ability to
complete the task, please discuss this with your Assessor.
Knowledge Questions

1 What is programming control? Include in your response the 3 design structures.


(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

Programming for a dynamic website is also called a scripting  


language, such as JavaScript and PHP. Programming control is
used to control the flow through the program in a structured
programming (scripting).

All high-level programming languages have control


structures. PHP is a high-level programming, the design
structure follows the three categories of programming
controls:
 sequence
 conditional
 Iterative

For example, to create a web page to display a weekly


(Monday to Sunday) menu of a restaurant:

 sequence – breakfast, lunch, dinner


 conditional – if the day is Monday, the page shows the
menu on Monday; if the day is Sunday, then the page
shows the menu on Sunday
 Iterative – repeat the process in the following week.
2 Explain the importance of authentication and web security.

2 (30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

Web security is also known as cyber security. It is the practice  


of defending computers, servers, other devices and data
from malicious attacks. It is important to keep your server
secure when creating a website that has a connection with a
database.

Web security includes components like Authentication it is a


mechanism that can be used to control access which will help
maintain integrity and confidentiality of data. Web security,
including authentication mechanisms, help defend against
various cyber-attacks, like unauthorized access, data
breaches, and identity theft.it is also important in building
trust and confidence among users.

3 Explain the difference between HTTP and HTTPS.

3 (30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

HTTP (Hypertext Transfer Protocol): HTTP is a standard  


protocol used to transfer data over world wide web. It is a
stateless protocol means that each command is executed
independently without reading previous commands. Also HTTP
doesn’t provide any encryption or security measures when
transmitting data making the data to be vulnerable.

HTTPS (Hypertext Transfer Protocol Secure): HTTPS is the


secure version of HTTP. Unlike HTTP, HTTPS uses encryption to
secure the data transmission between the client and the
server. This encryption typically achieved via encryption
protocols such as SSL (Secure Sockets Layer) or its successor,
TLS (Transport Layer Security).

Explain the difference between stateless and stateful applications.


4
4 (30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

Stateful and stateless are adjectives used to define whether a  


computer or a program is designed to note and remember one
or more proceeding events or information in a sequence of
interactions with a user. Stateful and stateless are derived
from the usage of state as a set of conditions at a moment in
time.

Stateful – defines the computer or program keeps track of the


state of interaction, usually by setting values in a storage field
designated for that purpose.

Stateless - means there is no record of previous interactions


and each interaction request has to be handled based entirely
on information that comes with it.
Provide an overview of the typical steps an organisation would require you to follow
5 when developing a website.
5
(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

 First step is to identify and understand the organization’s  


goals, values and target audience then converting them
according to the website’s design and functionality.

 Then the time frame in which the website will be


converted should be defined.

 Identify the industry standards and best practice, along


with the target audience needs and the legislative
obligations.

 Create a design brief that will guide the entire web design
process

 Identify the website’s goals and objectives, its intended


purpose.

 Web development should take place adhering to the W3C


standards

 Test the website components according to organizational


procedures, and across multiple browsers and devices.

 Confirm website security by addressing bugs then collect


feedbacks from clients and stakeholders for further
evaluation.
6 What cyber security protocols can be used to protect your website? Give 3 examples and
provide an explanation for each.
6 (50-100 words)

ANSWER SATISFACTORY UNSATISFACTORY

 

1. Firewall:

Firewall acts as a barrier between an internal network and


external network such as the internet. Firewall monitors and
controls incoming and outgoing network traffic by using
predetermined security rules.

2. Encryption:

Encryption is the process of converting readable data into


unreadable data in order to prevent unauthorized access.
Implementing encryption protocols like SSL/TLS ensures that
data is transmitted between the website and its users are
secure and protected

3. Incident Response Protocol :

In an instance of data breach or a cyber- attack the procedures


to be followed is included in the incident response protocol.
These procedures include identifying, responding and
mitigating security breach incidents.

What is a session in a web application, when would you use it?


7
(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

A session in a web application is defined as the process of  


handling multiple requests to a web application securely this
can also be a service from a single user or entity. Typically
initiated when a user authenticates themselves.

Sessions are useful to keep track of data between browser


requests. Specifically useful when needed to maintain
information about a user’s interaction with the web-
application

As conclusion sessions are to allow web applications to keep


user specific information in order to maintain continuity across
different interactions providing more personalized user
experience.

What is hypertext mark-up language? How can it help you as a web developer?
8
(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

 

Hypertext Mark-up Language (HTML) is the standard language


used to create and design web based applications. It is
significant for the web developers as it allows them to
structure content on a web page. It has features to define the
meanings and structures of the content like headings,
paragraphs, links, and other elements, which are then used by
web browsers. HTML also incorporates other technologies like
CSS and JavaScript for interactivity and exclusive features.

HTML is fundamental for web developers as it is the


fundamental language designed to create well-structured and
accessible web content all while laying groundwork for
effective web development.
What are cascading style sheets? How can they help you as a web developer?
9
(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

CSS is a style sheet language used to describe the visual  


presentation of a document written in HTML or XML. It defines
visual appearance and layout of HTML elements on a web page
including colours, fonts, spacing, and positioning.

As a web developer, CSS helps in many ways some of them are,


it helps to define consistent styles across multiple web pages.
It also helps in separating (HTML) content from the design
(CSS) making it easier to maintain. CSS helps in enhancing
accessibility by controlling the visual presentation of content.

Good website design includes being visually pleasing and consistent across all pages.
10 Why is this important?

(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

Consistency in design and visual appealing websites enhances  


user experience as it provides familiar interface. For example
when elements such as menus, buttons, and layouts are
consistent users can easily navigate through the website
making it easier to maintain and carry out updates. It also
enhances the credibility of the website. It also helps in
reinforcing the brand identity and its message as using visually
pleasing and consistent design creates a professional image for
the organization.
Why do you create a sitemap and navigation design during the design stage of website
11 development?

(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

Creating a sitemap and navigation design during the design  


stage of website development is crucial because it helps to
make the user experience easier as it provides clear pathways
to navigate through website. Sitemaps helps to organize
content of the website in a logical and a hierarchical manner.
Also providing a client with a sitemap and a navigation design
allows the client to give feedback and make changes early
during the design process.

In conclusion creating sitemaps and navigation design during


design stage is essential as it optimize user experience, helps in
organizing content, ensures consistency and facilitate client
involvement and collaboration.

Explain the importance of user inter-face design.


12
(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

User inter – face design is crucial for its overall impact on the  
user experience and the success of the website. The reason
being it directly influences the user experience a well-designed
interface ensures easy usability. Also a visually appealing UI is
important to create a positive first impression and engage or
lure users in to the site.

Along with many more crucial facts like user experience, visual
appeal, navigation, consistency, accessibility, engagement, and
overall satisfaction for both clients and users is why User
interface design is important for a web application.
What is the purpose of the W3C standards?
13
(30-60 words)

ANSWER SATISFACTORY UNSATISFACTORY

The main purpose of W3C standards is to establish guidelines  


and rules that is required to promote consistency and best
practices in web development. The key objectives of purpose
of W3C standards include:

 Consistency in Web Design


 Outline web accessibility and ensure that search engines
can efficiently access index webpages
 promote the use of CSS (Cascading Style Sheets) for design
for easy modification of design features
 Outlines compliance with copyright legislation, privacy
laws, and regulations related to the website components in
order to maintain legal and ethical standards

How are the following features and functions of web applications important to user
14
experience?

 Mobile friendly
 Social integration
 Push notifications
 Live chat
 Payments

(10-30 words per response)

ANSWER SATISFACTORY UNSATISFACTORY

 Mobile Friendly: having a mobile-friendly application is  


crucial nowadays since the use of mobile devices increases
all across the world day by day. And providing a seamless
functioning and accessible web- application to users on
smartphones and tablets is essential for overall user
experience satisfaction and success of the web application.

 Social Integration: social integration is allowing users ro


connect their social media accounts to share content from
the web application. It is crucial for the user experience as
it enhance user engagement, provide personalized user
experience social interaction and can also contribute to
viral marketing.

 Push Notifications: push notification enables real time


communication with the users. It is crucial for overall user
experience as it keep users updated while maintaining
personalized user experience, enhance user engagement,
retention and etc.

 Live Chat: live chat is essential to provide immediate


support and services to users, enhancing customer service
and user satisfaction. It typically allows users to ask
questions, seek help and receive real time solutions
creating more interactive environment.

 Payments: promoting seamless and secure payment is


crucial for e commerce and other transactional web
applications. A smooth payment experience and secure
transition is essential to gain users’ trust that leads to
satisfactory user experience.
What are the advantages and disadvantages of hypertext transfer protocol (HTTP)?
15
(100-200 words)

ANSWER SATISFACTORY UNSATISFACTORY

 
 Advantages of HTTP:

1. HTTP assigns IP addresses with readable names making it easier


for the audience to identify websites on the World Wide Web.

2. During data transmission HTTP has the ability to download


extensions or Plugins and then display data.

3. HTTP downloads files via independent connection which


minimize the chance of interception.

4. HTTP Mark-up language is coded in a plain text editor making it


easier to execute.

 Disadvantages of HTTP:

1. Lack of encryption options in HTTP makes data within the


database insecure and vulnerable.

2. Absence of encryption causes hackers to intercept HTTP requests


and view information

3. HTTP is not suitable for IOT devices as it increases power


consumption.

4. After receiving data a client’s pc doesn’t take close connections


further impacting server availability for other user
Assessment Task Summary – Task 1: Knowledge Questions
TRAINER/ASSESSOR TO COMPLETE THE FOLLOWING: YES NO
Needs to be customised for the tasks

THE LEARNER:
1. Satisfactorily answered all questions  
FEEDBACK

OVERALL TASK RESULT


Satisfactory
Not Satisfactory (resubmission required) – Due date: ____________________________

DATE ASSESSMENT RETURNED

TRAINER/ASSESSOR NAME

TRAINER/ASSESSOR SIGNATURE

X
LEARNER DECLARATION: Please read, tick and sign below

I, ___________________________have been advised of the outcome of this assessment task.


PRINT NAME

LEARNER DATE
SIGNATUR
E X

You might also like