SlideShare uma empresa Scribd logo
1 de 9
1-"The web is an indispensable
technology". Justify

   Web is an indispensable technology
as it has no end and the new
technologies are invented and with it,
it users are also increasing day by
day.
   It has became indispensable in the
field of business, commerce,
communication, education, engineering,
entertaintment, finance, government,
industry, media, medicine, politics,
science, transportation,etc.
   The use of web is increasing day by
day in each of the field and it has
also made a person's life as modern
life.
   Web satisfies many of the needs in
a human's life so its use is
increasing day by day in each and
every field. As a same time, it has no
end.
   For e.g. In earlier, there was html
to develop web sites then javascript
introduced then ahead css, thus
technology developed and it has no
end.
   Each user uses different
technologies to satisfy their needs
and which is available on web, which
are accessed and used by the different
users.
   It also has a great impact on the
modern world.
   Thus web is an indispensable
technology.


2-Describe web as a different
technology.

   Web is considered as a different
technology, as it is indispensable
technology and the uses of each
different technologies is increasing
day by day as per the need of the
users.
   The different users uses different
technologies to satisfy their needs.
   It has changed the ways in which we
buys products(e-commerce), meet
people(online datting), understanding
world(portals), acquires our
news(online media), voice our
opinions(blogs), entertaintment
ourselves(everything from music
downloads to online casinos), go to
school(online learning), etc.
   The each and every different users
the different technologies of web to
satisfy their own needs.
   For e.g buyers buy their products
on web, students learn online, etc
   Thus, web is a different
technology.


3-What do you mean by active and
passive conversion?

   In a passive conversion, we select
the information that is to be
presented, but have no direct control
over its volume,type,or structure.

   In an acitive conversation, we
provide input so that the information
that is presented is customized to
meet our specially.
4-what is web server?
   A web server is the combination of
computer and the program installed on
it. Web server interacts with the
client through a web browser. It
delivers the web pages to the client
and to an application by using the web
browser and   HTTP protocols
respectively.




5-what is web client server?
    A client serevr is a computer
application, such as a web browser,
that runs on a user's local computer
or workstation and connects to a
server as necessary.

6-What is web application?
   An application that acquires
information, structures it, builds a
package presentation and delivers it
is called web application.

7-what is web-based system?
The term Web-Based system refers to
those applications or services that
are resident on a server that is
accessible using a Web browser and is
therefore accessible from anywhere in
the world via the Web.

8-what is internet?
   Internet is a global network of
interconnected computers over world
wide web. It allows individuals to
communicate with each other.


9-what is intranet?
   An intranet is a computer network
that uses Internet Protocol technology
to securely share any part of an
organization's information or network
operating system within that
organization. It is the connection of
computer networks in a local area


10-what is extranet?
   An extranet is a private network
that uses Internet technology and the
public telecommunication system to
securely share part of a business's
information or operations with
suppliers, vendors, partners,
customers, or other businesses.

11-Explain web application attributes.

  They are as under:

   i} Network intensiveness:- Each and
every web application resides on a
network and must serve the needs of a
diverse community of clients.

   ii} Concurrency:- A large number of
users may access the web application
at a time.
   for e.g At a time crores of users
may access google’s app's.

   iii} Unpredictable load:- The
number of users of the web application
may vary by order of magnitude from
day to day.

   iv} Performance:- As thousands of
users uses a particular web
application at a time, its performance
becomes slightly lower. If a web
application users wait too long for
access, for server-side processing,
etc then user should find alternative
way.

   v} Availability:- The web
applications on servers are available
at any time as accessed. The
expectations of 100% availability is
unreasonable.

   vi} Data driven:-The primary
function of many web application is to
use hypermedia to present text,
graphics and video content to the end
user. In addition, web application are
commonly used to access information
that exists on databases that are not
an integral part of web-based
environment.

   vii} Content sensitive:- The
quality aesthetic nature of content
remains an important determinant of
the quality of a web application.
viii} Continuous evolution:- Web
applications evolves continuously. It
must be updated on time, day by day,
or second per second. Each new
technology must be updated.

   ix} Immediacy:- Each new technology
or software should be get to market
quickly. Web engineers must use
methods of planning, analysis, design,
implementation and testing have been
adapted to the compressed time
schedules requires for WebApp
development.

   x} Security:- As, web application
are available via network access, it
is difficult, if not impossible, to
limit the population of end users who
may access the application.

   for e.g. Many of the applications
provides user name and password to
access personal data.

   xi} Aesthetics:- An undeniable part
of the appeal of a WebApp is its look
and feel. When an application has been
designed to market or sell products or
ideas or provide services that should
be attractive and in a proper manner.


12-what is web?

   The term Web is associated with web
applications that facilitate
participatory information sharing,
interoperability, user-centered design
and collaboration on the World Wide
Web.

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

CYBER SECURITY audit course report
CYBER SECURITY audit course reportCYBER SECURITY audit course report
CYBER SECURITY audit course report
 
Unit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing ArchitectureUnit 2 -Cloud Computing Architecture
Unit 2 -Cloud Computing Architecture
 
IOT Platform Design Methodology
IOT Platform Design Methodology IOT Platform Design Methodology
IOT Platform Design Methodology
 
M2M technology in IOT
M2M technology in IOTM2M technology in IOT
M2M technology in IOT
 
Cyber Security 2017 Challenges
Cyber Security 2017 ChallengesCyber Security 2017 Challenges
Cyber Security 2017 Challenges
 
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptxIOT DATA MANAGEMENT AND COMPUTE STACK.pptx
IOT DATA MANAGEMENT AND COMPUTE STACK.pptx
 
OS Fingerprinting
OS FingerprintingOS Fingerprinting
OS Fingerprinting
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Admission control
Admission controlAdmission control
Admission control
 
Campus Area Network Security
Campus Area Network SecurityCampus Area Network Security
Campus Area Network Security
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
Chapter 9
Chapter 9Chapter 9
Chapter 9
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Network attacks
Network attacksNetwork attacks
Network attacks
 
Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough? Will Internet of Things (IoT) be secure enough?
Will Internet of Things (IoT) be secure enough?
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 
Security vulnerability
Security vulnerabilitySecurity vulnerability
Security vulnerability
 
CLE Unit - 1 - Introduction to Cyber Law
CLE Unit - 1 - Introduction to Cyber LawCLE Unit - 1 - Introduction to Cyber Law
CLE Unit - 1 - Introduction to Cyber Law
 
Wsn in iot updated
Wsn in iot updatedWsn in iot updated
Wsn in iot updated
 

Destaque

Anchored data type
Anchored data typeAnchored data type
Anchored data typeJay Patel
 
Tech pp
Tech ppTech pp
Tech ppCjd002
 
Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2bigpinots
 
Acampada
AcampadaAcampada
Acampadapiko217
 
Presentation1
Presentation1Presentation1
Presentation1Jay Patel
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software toolsJay Patel
 
More than yea or nay day 1 0
More than yea or nay day 1 0More than yea or nay day 1 0
More than yea or nay day 1 0Becknell
 
Mírame a los ojos
Mírame a los ojosMírame a los ojos
Mírame a los ojospiko217
 
More than yea or nay day 2 0
More than yea or nay day 2 0More than yea or nay day 2 0
More than yea or nay day 2 0Becknell
 
Selection sort
Selection sortSelection sort
Selection sortJay Patel
 

Destaque (15)

Inwork-johdanto 3.12.2013
Inwork-johdanto 3.12.2013Inwork-johdanto 3.12.2013
Inwork-johdanto 3.12.2013
 
Anchored data type
Anchored data typeAnchored data type
Anchored data type
 
Tech pp
Tech ppTech pp
Tech pp
 
V.social campaign
V.social campaignV.social campaign
V.social campaign
 
Images
ImagesImages
Images
 
Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2
 
Acampada
AcampadaAcampada
Acampada
 
Presentation1
Presentation1Presentation1
Presentation1
 
Codd rules
Codd rulesCodd rules
Codd rules
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software tools
 
More than yea or nay day 1 0
More than yea or nay day 1 0More than yea or nay day 1 0
More than yea or nay day 1 0
 
Codd rules
Codd rulesCodd rules
Codd rules
 
Mírame a los ojos
Mírame a los ojosMírame a los ojos
Mírame a los ojos
 
More than yea or nay day 2 0
More than yea or nay day 2 0More than yea or nay day 2 0
More than yea or nay day 2 0
 
Selection sort
Selection sortSelection sort
Selection sort
 

Semelhante a Assignment 1(web)

Empowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxEmpowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxCatherineBotardo3
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxJerome Bigael
 
Empowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxEmpowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxJoseph Camarote
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptxJasonPDelosSantos
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry AnalysisRAJEEV RANJAN
 
Verinote internet growth
Verinote internet growthVerinote internet growth
Verinote internet growthVerinote
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities ManagementOmer Dawelbeit
 
Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1SheilaBungalan1
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxEMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxJerickRemoyan
 
Building Construction Project Summary
Building Construction Project SummaryBuilding Construction Project Summary
Building Construction Project SummaryMichelle Madero
 

Semelhante a Assignment 1(web) (20)

Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of ThingsTowards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
 
Empowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxEmpowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptx
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Empowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxEmpowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptx
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry Analysis
 
Verinote internet growth
Verinote internet growthVerinote internet growth
Verinote internet growth
 
EMPO ICT.pptx
EMPO ICT.pptxEMPO ICT.pptx
EMPO ICT.pptx
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities Management
 
LESSON1 (1).pptx
LESSON1 (1).pptxLESSON1 (1).pptx
LESSON1 (1).pptx
 
Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxEMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
 
Building Construction Project Summary
Building Construction Project SummaryBuilding Construction Project Summary
Building Construction Project Summary
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 

Mais de Jay Patel

Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)Jay Patel
 
Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)Jay Patel
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)Jay Patel
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)Jay Patel
 
I assignmnt(oops)
I assignmnt(oops)I assignmnt(oops)
I assignmnt(oops)Jay Patel
 
Inline function(oops)
Inline function(oops)Inline function(oops)
Inline function(oops)Jay Patel
 
1 unit (oops)
1 unit (oops)1 unit (oops)
1 unit (oops)Jay Patel
 
Mutlimedia authoring tools
Mutlimedia authoring toolsMutlimedia authoring tools
Mutlimedia authoring toolsJay Patel
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 textJay Patel
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 textJay Patel
 
Hypertext and hypermedia
Hypertext and hypermediaHypertext and hypermedia
Hypertext and hypermediaJay Patel
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software toolsJay Patel
 
Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02Jay Patel
 
Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01Jay Patel
 
Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01Jay Patel
 

Mais de Jay Patel (20)

Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)
 
Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)
 
Quiz(web)
Quiz(web)Quiz(web)
Quiz(web)
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)
 
I assignmnt(oops)
I assignmnt(oops)I assignmnt(oops)
I assignmnt(oops)
 
Inline function(oops)
Inline function(oops)Inline function(oops)
Inline function(oops)
 
1 unit (oops)
1 unit (oops)1 unit (oops)
1 unit (oops)
 
Unit1
Unit1Unit1
Unit1
 
Cursor
CursorCursor
Cursor
 
Mutlimedia authoring tools
Mutlimedia authoring toolsMutlimedia authoring tools
Mutlimedia authoring tools
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 text
 
Sound
SoundSound
Sound
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 text
 
Hypertext and hypermedia
Hypertext and hypermediaHypertext and hypermedia
Hypertext and hypermedia
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software tools
 
Cursor
CursorCursor
Cursor
 
Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02
 
Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01
 
Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 

Assignment 1(web)

  • 1. 1-"The web is an indispensable technology". Justify Web is an indispensable technology as it has no end and the new technologies are invented and with it, it users are also increasing day by day. It has became indispensable in the field of business, commerce, communication, education, engineering, entertaintment, finance, government, industry, media, medicine, politics, science, transportation,etc. The use of web is increasing day by day in each of the field and it has also made a person's life as modern life. Web satisfies many of the needs in a human's life so its use is increasing day by day in each and every field. As a same time, it has no end. For e.g. In earlier, there was html to develop web sites then javascript introduced then ahead css, thus
  • 2. technology developed and it has no end. Each user uses different technologies to satisfy their needs and which is available on web, which are accessed and used by the different users. It also has a great impact on the modern world. Thus web is an indispensable technology. 2-Describe web as a different technology. Web is considered as a different technology, as it is indispensable technology and the uses of each different technologies is increasing day by day as per the need of the users. The different users uses different technologies to satisfy their needs. It has changed the ways in which we buys products(e-commerce), meet people(online datting), understanding world(portals), acquires our
  • 3. news(online media), voice our opinions(blogs), entertaintment ourselves(everything from music downloads to online casinos), go to school(online learning), etc. The each and every different users the different technologies of web to satisfy their own needs. For e.g buyers buy their products on web, students learn online, etc Thus, web is a different technology. 3-What do you mean by active and passive conversion? In a passive conversion, we select the information that is to be presented, but have no direct control over its volume,type,or structure. In an acitive conversation, we provide input so that the information that is presented is customized to meet our specially.
  • 4. 4-what is web server? A web server is the combination of computer and the program installed on it. Web server interacts with the client through a web browser. It delivers the web pages to the client and to an application by using the web browser and HTTP protocols respectively. 5-what is web client server? A client serevr is a computer application, such as a web browser, that runs on a user's local computer or workstation and connects to a server as necessary. 6-What is web application? An application that acquires information, structures it, builds a package presentation and delivers it is called web application. 7-what is web-based system?
  • 5. The term Web-Based system refers to those applications or services that are resident on a server that is accessible using a Web browser and is therefore accessible from anywhere in the world via the Web. 8-what is internet? Internet is a global network of interconnected computers over world wide web. It allows individuals to communicate with each other. 9-what is intranet? An intranet is a computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization. It is the connection of computer networks in a local area 10-what is extranet? An extranet is a private network that uses Internet technology and the public telecommunication system to
  • 6. securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. 11-Explain web application attributes. They are as under: i} Network intensiveness:- Each and every web application resides on a network and must serve the needs of a diverse community of clients. ii} Concurrency:- A large number of users may access the web application at a time. for e.g At a time crores of users may access google’s app's. iii} Unpredictable load:- The number of users of the web application may vary by order of magnitude from day to day. iv} Performance:- As thousands of users uses a particular web application at a time, its performance
  • 7. becomes slightly lower. If a web application users wait too long for access, for server-side processing, etc then user should find alternative way. v} Availability:- The web applications on servers are available at any time as accessed. The expectations of 100% availability is unreasonable. vi} Data driven:-The primary function of many web application is to use hypermedia to present text, graphics and video content to the end user. In addition, web application are commonly used to access information that exists on databases that are not an integral part of web-based environment. vii} Content sensitive:- The quality aesthetic nature of content remains an important determinant of the quality of a web application.
  • 8. viii} Continuous evolution:- Web applications evolves continuously. It must be updated on time, day by day, or second per second. Each new technology must be updated. ix} Immediacy:- Each new technology or software should be get to market quickly. Web engineers must use methods of planning, analysis, design, implementation and testing have been adapted to the compressed time schedules requires for WebApp development. x} Security:- As, web application are available via network access, it is difficult, if not impossible, to limit the population of end users who may access the application. for e.g. Many of the applications provides user name and password to access personal data. xi} Aesthetics:- An undeniable part of the appeal of a WebApp is its look and feel. When an application has been
  • 9. designed to market or sell products or ideas or provide services that should be attractive and in a proper manner. 12-what is web? The term Web is associated with web applications that facilitate participatory information sharing, interoperability, user-centered design and collaboration on the World Wide Web.