Dynamic Web Design A Database A1
Dynamic Web Design A Database A1
ASSESSMENT 1 TASK
This page should be on the front of your assessment and needs to be easily accessible.
STUDENT DECLARATION
I hereby certify that:
1. This assessment task is my own work based on my personal study/research and not the work of
another student and/or source.
2. I have acknowledged all material and sources used to prepare this assessment task.
3. I have not plagiarised or copied any part of this assessment task from the work of any other student
or source either. (I know the penalties for plagiarism include $200 re-assessment fee)
4. This assessment task has not previously been submitted.
5. I am aware of the requirements set by my Trainer & Assessor.
6. I have retained a copy of this assessment task for my own records.
7. I have completed all my assessments, tasks & activities (on Moodle®) successfully.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 2 of 18
Student instructions
This assessment must be based on where you work (or have worked most recently).
This Assessment is designed to test the knowledge that you have acquired throughout the unit. Use the
following tips to help you answer the questions:
Read each question carefully. Check with your trainer or assessor if you are not sure what the question is
asking.
HINT: Use these questions as subheadings to create a business style report to answer your assessment
Your response to each question should aim to provide enough information to answer the question. In most
cases, this can be done with just a few paragraphs. Don’t forget to refer to attachments under the heading
(question) applicable, e.g. ‘See attached email’.
Important: Your assessment must contain this coversheet and your own coversheet (for your “report”)
Your answers & assessment submission must be professional in style (Business), content and format.
Maximum font size 11 points: Font Arial or Times New Roman; single spacing; clear paragraphs with
appropriate punctuation, spellchecking and final submission will need to be proof-read. (i.e. few missing
words or typo’s)
In particular:
- Use clear, non-discriminatory language
- Avoid the use of jargon
- Write clearly using plain English
- Consider your target audience
- Ensure that your responses meet the needs of the target audience (in this case your trainer or
assessor).
- All of your work must be original.
Performance Evidence
/conversion/tmp/activity_task_scratch/845445466.docx
Page 3 of 18
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
- web programming concepts, including:
o authentication and web security
o hypertext transfer protocol (HTTP)
o session management
o stateless programming
- types of technologies, including:
o programming control structures
o hypertext mark-up language (HTML) and mark-up languages
o cascading style sheets (CSS)
o syntax and uses of programming languages
- client and server-side scripting and its application to dynamic web page design
- data storage requirements
- debugging methods
- coding techniques
- cyber security protocols and procedures
- legislative and organisational procedures and standards applicable to creating dynamic web pages.
Assessment Conditions
Skills in this unit must be demonstrated in a workplace or simulated environment where the conditions are
typical of those in a working environment in this industry.
This includes access to:
- technical requirements
- a development environment
- a server
- a database server
- web browsers and devices
- web page testing and debugging tools required for creating dynamic web pages
- hardware, software and its components required for creating dynamic web pages.
- Assessors must satisfy NVR/AQTF assessor requirements.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 4 of 18
ICTDBS502 – Design a Database
Performance Evidence
Knowledge Evidence
To complete the unit requirements safely and effectively, the individual must:
- process for conducting data analysis, data types and data structures, query and report design
- data modelling procedures related to conceptual data model development
- data redundancy identification methodologies
- database management system (DBMS) design phase fundamentals
- encryption and authentication database security features
- functions and features of data types and data structures, and of databases
- logical design concepts, including those for data structures, queries screens and reports
- object model design concepts, including those for data structures, queries, screens and reports
- database scalability.
Assessment Conditions
Skills in this unit must be demonstrated in a workplace or simulated environment where the conditions are
typical of those in a working environment in this industry.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 5 of 18
Marking and Criteria guide:
Assessor and student must read this carefully before assessment.
- All parts of the assessment must be completed successfully in accordance with the guidance provided
in the Marking guide for the student to achieve competence in this unit.
- Students & assessors must note that professionally critical aspects/concepts must be included (e.g.
develop an action plan).
- All parts (criteria) in the marking guide must be completed successfully for the student to achieve
competence in this unit
EDUCATOR to complete
6. The student has described what is Ameer has described what is syntax. (word count
syntax. (word count of 50 words)
S of 50 words)
7. The student described the uses of Ameer described the uses of syntax in
syntax in programming languages. S programming languages. (word count of 50
(word count of 50 words) words)
/conversion/tmp/activity_task_scratch/845445466.docx
Page 6 of 18
8. The student has described what is Ameer has described what is HTML (word count
HTML (word count of 50 words)
S of 50 words)
9. The student has described what is Ameer has described what is CSS (word count of
CSS (word count of 50 words)
S 50 words)
10. The student has explained the Ameer has explained the difference between
difference between server-side server-side technology and client-side technology.
technology and client-side S (word count of 75 words)
technology. (word count of 75
words)
12. The student has determined what Ameer has determined what does it mean by data
does it mean by data storage storage requirements? (word count of 75 words)
requirements? (word count of 75
S
words)
13. The student has reported on the Ameer has reported on the different debugging
different debugging techniques and S techniques and methods. (word count of 75
methods. (word count of 75 words) words)
14. The student has reported on the Ameer has reported on the different types of
different types of coding coding techniques. (word count of 75 words)
techniques. (word count of 75
S
words)
15. The student has determined what Ameer has determined what cyber security and
cyber security and security security protocols are used in the protection of a
protocols are used in the protection S website environment. (word count of 100 words)
of a website environment. (word
count of 100 words)
16. The student has reported on the You need to review the tutorials and do research
standards (legislation and regarding the current ICT Legislation as well as for
organisational procedures) that NS Web Development.
applicable when creating a website
/conversion/tmp/activity_task_scratch/845445466.docx
Page 7 of 18
20. The student has answered the Ameer has answered the question what does it
question what does it mean by S mean by reporting design?
reporting design?
21. The student has answered the Ameer has answered the question what is the
question what is the different types different types of model design processes for a
of model design processes for a
S database?
database?
22. The student has answered the Ameer has answered the question what does it
question what does it mean by data S mean by data redundancy?
redundancy?
23. The student has answered the Ameer has answered the question what is meant
question what is meant by S by identification methodologies?
identification methodologies?
24. The student has answered the Ameer has answered the question what is a
question what is a database S database management system (DBMS)?
management system (DBMS)?
25. The student has given 2 examples Ameer has given 2 examples of a DBMS.
of a DBMS.
S
26. The student has answered the Ameer has answered the question what does it
question what does it mean to use mean to use encryption and authentication in a
encryption and authentication in a
S database?
database?
27. The student has answered the Ameer has answered the question what does it
question what does it mean by S mean by Database Scalability?
Database Scalability?
28. The student has answered the Ameer has answered the question what is a Data
question what is a Data Dictionary?
S Dictionary?
Practical Checklist
Assessor to complete:
Did you observe the student? Yes
Assessor Comments
Ameer has answered all the questions satisfactory in order to determine the rest of the
project requirements and to gather previous knowledge and to understand ICT Terminology
but needs to implement information regarding the current ICT Legislation. Keep up the
good work Ameer and resubmit.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 8 of 18
Task 1 – Q & A – Dynamic Web Pages
Authentication:
In simple words, authentication is a process or action to prove whether the something’s identity is true or not. It is
genuine or real. It is cycle of confirming the identity of client whether it belongs to this system or not.
In web programming, authentication as mentioned here it is a cycle of confirming the identity of client r. It is
combination of client’s id and password. The Id is unique for each user. It is the traditional logic that a user enters his
email id and password and then using the programming logic, it is checked whether this Client presents in the data base
or not. If he exists, he allows to use this system else not. There are also verifying providers like OpenID and Oath
which provides the service of authentication.
Web Security:
Web security means to secure the system and make a defensive parameter against the external attacks from the
attackers. It includes various type of attacks from the attackers. There basic aim is to steal the data from this. There are
different tools and techniques available to provide web security. The bank hire third parties which provide them web
security for their web system.
HTTP:
HTTP is an application-level convention. HTTP (Hypertext Transfer Protocol) is the plan of rules for moving
archives, for instance, text, reasonable pictures, sound, video, and other blended media records, on the
World Wide Web. At the point when a web customer opens their web program, the customer is in an indirect
way using HTTP. HTTP is an application show that unexpected spikes sought after for top of the TCP/IP set-
up of conventions (the foundation conventions for the Internet).
The default port is TCP 80, anyway various ports can be used moreover. It gives a standardized way to deal
with PCs to talk with each other. It is connectionless, media autonomous and stateless, HTTP is
connectionless, and it is a prompt outcome of HTTP being a stateless show. The worker and customer think
around each other simply during a current solicitation
/conversion/tmp/activity_task_scratch/845445466.docx
Page 9 of 18
The HTTP convention is a requesting/response show reliant on the customer/worker-based designing where
web programs, robots and web lists, etc act like HTTP customer and the Web worker carries on like a
worker.
Server:
The HTTP customer sends a solicitation to the worker as a solicitation methodology, URL, and show
variation, followed by a MIME-like message containing request modifiers, customer information, and possible
body content over a TCP/IP affiliation.
Client:
The HTTP worker responds with a status line, including the message's show structure and a victory or botch
code, followed by a MIME-like message containing worker information, substance meta information, and
possible component body content.
Session management:
Web applications are very superior and normally handle complex activities which take more than one sets of
request/response to finish, this expects something to follow the current situation with activity. These
applications additionally present custom-made substance to every client. This requires distinguishing a client
over different request. HTTP uses customer worker plan and uses TCP as its transmission convention and
different solicitations can be sent over just a single TCP affiliation, yet these are similarly seen as free by
customer and worker. Destinations and projects use HTTP to pass on, and a gathering is a movement of
HTTP solicitation and trades began by a comparative customer.
Seek parameter: Token that speaks to the present status of a multistep cycle or discriminates client can be
put away by the server on the site page in a structure field, which will be auto-presented each time client
plays out an activity. Token have data of info fields. This can be submitted as either a GET or a POST
request parameter. The request parameter in GET uses URL history to store and POST boundaries demand
as a body and doesn’t store URL history
Cookies: Cookies are name-esteem matches that are put away on the program and submitted consequently
in ensuing solicitations. The server produces them and sends them to the client by utilizing "set-cookies"
HTTP header. Cookies is submitted utilizing "cookies" Header .The most widely recognized limits are-
territory, way and ends while the orders are – "secure" and "http only.
Stateless programming:
Stateless writing computer programs is a model wherein the errands (limits, methods, techniques, whatever
you call them) you execute are not fragile to the state of the count. That infers all the data used in a
movement are passed as commitments to the action, and all the data used by whatever undertakings
summoned that action are passed back as yields. Before long, this suggests the program must have Value
semantics (it isn't permitted to alter shared/related data structures, and things don't have a character), must
not use worldwide or class components, and all information/yield must be managed uncommonly, (for
/conversion/tmp/activity_task_scratch/845445466.docx
Page 10 of 18
instance, through monads or by hanging an I/O state through any bits of the estimation that perform I/O).
Exclusion managing may similarly make the count dignified.
The benefits of stateless programming join the way that you never need to consider what else an action you
have to use does, other than what it says. In a stateless program, what a movement does is what it returns.
A resulting advantage is that stateless counts are much less difficult to parallelize; since no part of the
figuring will change any data structures, you don't get data races.
Sequence
Sequential logic as the name proposes follows a chronic or successive stream where the stream
depends upon the plan of rules given to the machine. But in the event that new bearings are given, the
modules are executed in the prominent plan.
Conditional
Selection Logic incorporates different conditions or limits which picks one out of a couple of made
modules. The structures which use such a reason are known as Conditional Structures and these are
Single Alternative
Double Alternative
Multiple Alternative
Iterative
The Iteration justification uses a circle which incorporates an intermittent enunciation followed by a
module known as the body of a circle. There are two kind of structures and these are
Syntax:
Syntax is a linguistic structure of sentences. The configuration wherein words and expressions are ordered
to make sentences is called syntax and it is sample on which sentences are written, readable and
understandable so every language contains its syntax for inscrutability and provide ease to vendors.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 11 of 18
7. Describe the uses of syntax in programming languages. Answers to this
question is to have a word count of 50 words
Uses of syntax:
Every language has its own rules and arrangements and specific methods to define its implementation and
workings, so every language uses different syntax to define its rule. Syntax made it easier to understand,
readable, writeable and etc. By understanding the syntax programmers can easily identify the language.
HTML:
HTML represents Hypertext Mark-up Language .It allows the customer to make and structure regions,
entries, headings, joins, and fastens for pages and applications. HTML (Hypertext Mark-up Language) does
not make websites functions dynamic and it is like that writing something on MS word and arranging it
statically.
CSS:
CSS represents Cascading Style Sheets. It serves HTML how to display the content and design the page
and content that how it will look like which colour will be suited and which style is preferable for the specific
area and text. It is only responsible of how Html elements will show.
Server-side technology is used at the backend, where the source code isn't discernible or concealed at the
customer side (program). Of course, customer side innovation is used at the front end which customers can
see from the program.
Exactly when a worker side substance is dealt with it confers to the worker and roll out powerful
improvements. As against, customer side innovation needn't bother with mess with any worker association
and limit the heap.
A customer side Dynamic page gauges the page using HTML code runs in program as it loads. JavaScript
and other code choose the way wherein the HTML in the got content is render into the Document Object
Model.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 12 of 18
12. Determine what does it mean by data storage requirements? Answers to this
question is to have a word count of 75 words
Data Capacity prerequisites is an advancement comprising of PC fragments and recording media used to
store robotized data. It is a focal limit and most computers. A computer's CPU is what checks data by
performing figuring. Generally, all computers utilize a progressive system of limit that puts quick yet costly
and hardly any stock options close to the processor and slower yet better decisions.
The technique which is used to find and resolve the error from any program is called debugging. There is a
lot of techniques which is used to debug the program by using different tools and some are listed here
14. Report on the different types of coding techniques. Answers to this question
is to have a word count of 75 words
Coding Techniques:
The first and the most fundamental tip, is to keep your code as straightforward and coherent as could
reasonably be expected. As individuals develop and gain insight as coders, they will in general overlook one
of the most fundamental tips that they got in their beginning of programming leave remarks. Be your own
instructor and attempt to investigate as much as could be expected under the circumstances. Firstly, dry run
the code then code it on editor.
15. Determine what cyber security and security protocols are used in the
protection of a website environment. (word count of 100 words)
Cyber security and security protocols are used in the protection of a website
Environment:
Website security shields a site from digital dangers on the web. Extensive site security
incorporates ensuring a site's information base, applications, source code, and records. Much the same as
network safety, site security can likewise be utilized as an umbrella term to depict the different programming,
instruments, and approaches one can take to ensure their site. Cyber security protocols are plans,
conventions, activities and measures that intend to protect your attachment from malignant assaults,
/conversion/tmp/activity_task_scratch/845445466.docx
Page 13 of 18
information breaks and other security episodes. By applying restrictions and checks on our sources we can
avoid all of these attacks.
16. The student has reported on the standards (legislation and organisational
procedures) that applicable when creating a website. Answers to this
question is to have a word count of 75
Minimize the risk of user-generated content: to provide the credibility and authority to a website.
Obtain the necessary licenses for content: It depends upon the content you want to display and it
avoids Plagiarism.
Privacy policy: It should be displayed by the website that which kind of data it is collecting and for
which purpose the data will be used.
Copy Rights of the content used: The Data must be unique and copy righted which is used in the
website
17. What is the process for conducting data analysis? Answers to this question
is to have a word count of 50 words
First of all, we should define our questions clearly and then breakdown the process into sub processes
and set a goal and focus on it how to achieve it. Collect the data from all the resources and analysing the
data carefully and interpret the result whether it accomplished the goal or not.
18. Explain the different types of data types and data structures. Answers to this
question is to have a word count of 75-250 words
Data type:
A data type is a nature of data which tells the compiler (or interpreter) how the designer
intends to use the data. Data Type is the sort or type of a variable which is being utilized all through the
program. It characterizes that the specific variable will uses the estimations of the given information type as it
were. That whole information can be spoken to utilizing an object and can be utilized all through the whole
program. It can hold values and not information
Data Structure:
An information structure is an assortment of information type 'values' which are put away and composed so
that it considers productive access and alteration. Sometimes an information structure can turn into the basic
/conversion/tmp/activity_task_scratch/845445466.docx
Page 14 of 18
usage for a specific information type. Data Structure is the assortment of various types of data.
Implementation through Data Structures are called solid execution. It can hold distinctive kind and sorts of
data inside one single article. There are various type of data structures which are listed here.
19. Explain what is a query? Answers to this question is to have a word count of
50 words.
In database terms, an inquiry predicts to the activity of recovering data from the information base.
Questions are something that make information bases so ground-breaking. It is a solicitation for information
results, and for activity on information. For instance, you may just need to perceive the number of people in
your information base live in a given city.
20. What does it mean by reporting design? Answers to this question is to have
a word count of 50 words.
Reporting design means finding and organizing data. It involves classifying the data. Basically,
it is the organized aftereffect of information base questions and contains valuable information for dynamic
and investigation. Most great business applications contain an inherent announcing apparatus; this is just a
front-end interface that gets back to or runs end information base questions that are organized for simple
application utilization.
21. What are the different types of model design processes for a database?
Answers to this question is to have a word count of 70 words.
The database design is the term we used in the databases is that the data design is the process of producing
a detailed data of a database which contains all the needed logical and physical choices.
There are two strategies which exists while evaluation of the database design.
22. What does it mean by data redundancy? Answers to this question is to have
a word count of 50 words.
A condition made inside an information base or information stockpiling innovation in which a
similar bit of information is held in two separate spots. This can mean two distinct fields inside a solitary
information base, or two unique spots in different programming conditions or stages is called data
redundancy.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 15 of 18
23. What is meant by identification methodologies? Answers to this question is
to have a word count of 50 words.
The identification methodologies mean that the methods to identify the database. There are a lot of
methodologies related to it like inspection method, which inspect the database the database attributes and
the values inside it. These inspection methodologies are the very effective when we talk about the integrity of
database.
MySQL
PostgreSQL
SQL Server
Oracle
28. What is a Data Dictionary? Answers to this question is to have a word count
of 50 words.
/conversion/tmp/activity_task_scratch/845445466.docx
Page 16 of 18
References:
Rescorla, E. (2000). Http over tls.
Silberschatz, A., Korth, H. F., & Sudarshan, S. (1997). Database system concepts (Vol. 5). New York:
McGraw-Hill.
Bertino, E., & Sandhu, R. (2005). Database security-concepts, approaches, and challenges. IEEE
Transactions on Dependable and secure computing, 2(1), 2-19.
Pratt, P. J., & Adamski, J. J. (2011). Concepts of database management. Cengage Learning.
Banerjee, J., Hsiao, D. K., & Baum, R. I. (1978). Concepts and capabilities of a database computer\. ACM
Transactions on Database Systems (TODS), 3(4), 347-384.
Kumpati, M. (1988). U.S. Patent No. 4,774,661. Washington, DC: U.S. Patent and Trademark Office.
Jones, W. P., Kaufmann, A. F., Luck, C., & Saukkonen, J. I. (1997). U.S. Patent No. 5,689,698. Washington,
DC: U.S. Patent and Trademark Office.
Wang, S. V., Schneeweiss, S., Berger, M. L., Brown, J., de Vries, F., Douglas, I., ... & Nguyen, M. D. (2017).
Reporting to improve reproducibility and facilitate validity assessment for healthcare database studies V1.
0. Value in health, 20(8), 1009-1022.
Tabb, L., & Herrmann, C. (1997). U.S. Patent No. 5,603,025. Washington, DC: U.S. Patent and Trademark
Office.
Westaby, S., Archer, N., Manning, N., Adwani, S., Grebenik, C., Ormerod, O., ... & Wilson, N. (2007).
Comparison of hospital episode statistics and central cardiac audit database in public reporting of congenital
heart surgery mortality. Bmj, 335(7623), 759.
Maxwell, J. E., McDowell, I. D. J., & Schaefle, S. W. (1997). U.S. Patent No. 5,675,784. Washington, DC:
U.S. Patent and Trademark Office.
McKay, C., Skillcorn, S., & Douvikas, J. (2004). U.S. Patent Application No. 10/350,326.
https://www.motocms.com/blog/en/website-legal-requirements/
/conversion/tmp/activity_task_scratch/845445466.docx
Page 17 of 18
Specifications
/conversion/tmp/activity_task_scratch/845445466.docx
Page 18 of 18