Website Development: Features of Internet Technologies

2775 words (11 pages) Essay in Information Technology

08/02/20 Information Technology Reference this

Disclaimer: This work has been submitted by a student. This is not an example of the work produced by our Essay Writing Service. You can view samples of our professional work here.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UK Essays.

Contents

Introduction

The System Development Life Cycle (SDLC) of Web Development

Features of internet Technologies

HTTP

HTML

CSS

SGML

XHTML

XSLT transformations

DNS

Benefits of xml using the UN/CEFACT

Cookies

Web authentication

Programming control Structures

Oop And UML

STANDARDS

Copyleft

Intellectual Property

Copyright

References

Introduction

The report states the knowledge and understanding of the web site development and the areas related to the topics mentioned below.

The System Development Life Cycle (SDLC) of Web Development

SDLC or the Software Development Life Cycle is a process which produces software with the uppermost quality and lowermost cost in the quickest time. SDLC houses a complete way to develop, adjust, modify, sustain, and exchange a software system.

SDLC encompasses numerous individual phases, comprising planning, design, building, testing, and deployment. Widespread SDLC models incorporate the waterfall model, spiral model, and Agile model.

  • Problem

The design / development “procedure” that is being followed by a lot of organizations is no process at all resulting multiple overpriced amendments, and a trend toward non-adherence to any well-known benchmarks or resolutions, if in fact, such benchmarks and resolutions even endure.

  • Objective

To assume a procedure of iterative “ponytail” evolution to complete convenient, effective project and expansion on forthcoming projects.

  • Solution

Determining a organized methodology for design and improvement of fresh websites and online applications will prevent excessive time and money. The most effective way to do this is to apply a System Development Life Cycle model.

Website / Application Requirements Outline

  1. Analysis / Requirements-Gathering
  2. Design
  3. Design Approval
  4. Development
  5. Prototype Test / Approval
  6. Launch
  7. Review / Revise

Features of internet Technologies

HTTP

The Hypertext Transfer Protocol (HTTP) is an application-level convention for conveyed, community oriented, hypermedia data frameworks. This is the establishment for information correspondence for the World Wide Web (i.e. web) since 1990. HTTP is a conventional and stateless convention which can be utilized for different purposes too utilizing augmentations of its demand strategies, mistake codes, and headers.

There are three fundamental highlights that make HTTP a basic however great convention:

•                      HTTP is connectionless: The HTTP customer, i.e., a program starts a HTTP ask for and after a demand is made, the customer disengages from the server and sits tight for a reaction.

•                      HTTP is media independent: It implies, any sort of information can be sent by HTTP as long as both the customer and the server know how to deal with the information content.

•                      HTTP is stateless: As made reference to above, HTTP is connectionless and it is an immediate aftereffect of HTTP being a stateless convention. The server and customer know about one another just amid a current demand.

HTML


HyperText Markup Language (HTML) is the designing dialect for a hypertext or hypermedia record, perceptible with an internet browser, for example, Firefox and Internet Explorer. HTML reports are plain ASCII message and can be made with a content tool, yet they contain organizing codes and connections to different records and media (counting pictures and sounds) which can be pursued utilizing the internet browser.

CSS

CSS stands for Cascading Style Sheets. The styles characterize how to show HTML components and are typically put away in Style Sheets (.css). Outside Style Sheets are put away in CSS documents and can spare you a great deal of work. Different style definitions will course into one. HTML labels were initially intended to characterize the substance of an archive. They should state “This is a header”, “This is a passage”, “This is a table”, by utilizing labels like <h1>, <p>, <table>, et cetera. The design of the archive should be dealt with by the program, without utilizing any organizing tags. As the two noteworthy programs – Netscape and Internet Explorer – kept on including new HTML labels and traits (like the <font> tag and the shading property) to the first HTML detail, it turned out to be increasingly hard to make Web destinations where the substance of HTML records was plainly isolated from the report’s introduction format. 

 SGML

XHTML

XHTML (eXtensible HyperText Markup Language) is the W3C’s new form of HTML. It is the reformulation of HTML 4.0 as an utilization of XML, containing a group of current and future archive composes and modules that replicate and expand the abilities of HTML. When all is said in done you can escape with all the more alternate routes, and potentially even less work by utilizing HTML rather then XHTML anyway it is prescribed to utilize XHTML code in your Website due to throughout the entire the term benefits.

XSLT transformations

XSL remains for Extensible Stylesheet Language though XSLT remains for XSL Transformations. The World Wide Web Consortium (W3C) began to create XSL in light of the fact that there was a requirement for a XML-based template dialect. XSLT is a dialect used to change XML records into different arrangements, as XHTML. It is intended for use as a feature of XSL, or, in other words dialect for XML. Notwithstanding XSLT, XSL incorporates a XML vocabulary for determining organizing. XSL indicates the styling of a XML record by utilizing XSLT to portray how the report is changed into another XML archive that uses the designing vocabulary.

DNS

Domain Name Servers (DNS) are what might as well be called a telephone directory. They keep up a registry of area names and make an interpretation of them to Internet Protocol (IP) addresses. Data from all the area name servers over the Internet are assembled and housed at the Central Registry. Host organizations and Internet Service Providers interface with the Central Registry on a general calendar to get refreshed DNS data. When you compose in a web address, e.g., www.jimsbikes.com, your Internet Service Provider sees the DNS related with the area name, makes an interpretation of it into a machine neighbourly IP address (for instance 216.168.224.70 is the IP for jimsbikes.com) and guides your Internet association with the right site.

 Benefits of xml using the UN/CEFACT

In this paper a technique is displayed to create web forms for business records specifically from XML compositions. XML Schemas that depend on the UN/CEFACT Naming and Design Rules might be kept up by industry associations or arranged reciprocally between exchanging accomplices. In points of interest, constructions may contrast per colleague and process execution, and change after some time. The ease of use of screen frames is particularly subject to their spread out and on highlights like inscriptions, pre-filled qualities, intelligent trustworthiness checks and component arrangement. Business process qualities, yet in addition organization strategy and individual client inclinations, decide the manner in which highlights ought to be executed. Present shape usage demonstrates a gigantic upkeep trouble.

Cookies

At the point when a server gets a HTTP ask for in the reaction, it can send a Set-Cookie header. The program places it into a treat container, and the treat will be sent alongside each demand made to a similar beginning in the Cookie HTTP header. To utilize treats for confirmation purposes, there are a couple of key rules that one must pursue.

•                      Always utilize HttpOnly treats

•                      Always utilize marked treats

Web authentication

HTTP Basic confirmation is a strategy for the customer to give a username and a secret word when making a demand.

This is the least difficult conceivable approach to implement get to control as it doesn’t require treats, sessions or whatever else. To utilize this, the customer needs to send the Authorization header alongside each demand it makes. The username and secret word are not scrambled, but rather developed along these lines:

•                      username and secret word are connected into a solitary string: username: secret word

•                      this string is encoded with Base64

•                      the Basic keyword is put before this encoded esteem

Programming control Structures

A control structure determines the order in which statements are executed in a program. The control constructions any program will need are: –

  • Sequential Execution
  • Loops
  • Two-way Decisions

Successive execution is when explanations are executed in a steady progression all together. You don’t have to do anything extraordinary for this to occur. Circles are performed utilizing the DO…LOOP control structure. Two-way choices are performed utilizing the IF…THEN…ELSE …END IF structure.

OOp And UML

UML is a standard dialect for determining, imagining, building, and reporting the antiques of programming frameworks. UML was made by the Object Management Group (OMG) and UML 1.0 detail draft was proposed to the OMG in January 1997.OMG is persistently endeavouring attempt to make a genuinely industry standard. UML remains for Unified Modelling Language. UML is not the same as the other basic programming dialects, for example, C++, Java, COBOL, and so forth. UML is a pictorial dialect used to make programming diagrams.

Following are some basic ideas of the OO realm −

Objects − Signify an entity and the basic building block.

Class – Represents the blue print of an object.

Abstraction −Signifies the character of a real world entity.

Encapsulation − Signifies the method of attaching the data together and isolating them from the outside world.

Inheritance – Represents the method of making new classes from prevailing ones.

Polymorphism – Represents the methodology to exists in distinctive forms.

STANDARDS

W3C principles characterize an Open Web Platform for application improvement that has the uncommon potential to empower engineers to assemble rich intuitive encounters, controlled by huge information stores, that are accessible on any gadget. In spite of the fact that the limits of the stage keep on advancing, industry pioneers talk almost as one about how HTML5 will be the foundation for this stage. Yet, the full quality of the stage depends on numerous more innovations that W3C and its accomplices are making, including CSS, SVG, WOFF, the Semantic Web stack, XML, and an assortment of APIs. W3C builds up these specialized determinations and rules through a procedure intended to augment agreement about the substance of a specialized answer, to guarantee high specialized and publication quality, and to acquire support by W3C and the more extensive network

Copyleft

Copyleft is a general technique for making a program (or other work) free (in the feeling of opportunity, not “zero cost”), and requiring all adjusted and stretched out renditions of the program to be free too. The least complex approach to make a program free programming is to place it in general society space, uncopyrighted. This enables individuals to share the program and their upgrades, on the off chance that they are so disapproved. Be that as it may, it additionally enables uncooperative individuals to change over the program into exclusive programming.

Intellectual Property

As indicated by the World Intellectual Property Organization (WIPO), protected innovation: “… alludes to manifestations of the psyche, for example, innovations; scholarly and creative works; outlines; and images, names, and pictures utilized in trade.” It is a sweeping term for an assortment of benefits made by the mind generally named impalpable property. The rights to the protected innovation can be asserted solely by the maker or beneficiary of possession exchange and covers the outflow of a thought instead of the thought itself.

Copyright

Copyright, at that point, is the security reached out to the maker of a unique work. It gives the sole rights to the utilization and dissemination of the work and ordinarily closes after a particular timeframe. After the time is up, the copyright can be recharged, or the work will go into people in general space where it lawfully might be utilized without pulling out of the first maker and without the requirement for reward to the previous proprietor. A copyright can likewise be sold and the proprietorship exchanged to an alternate element which is then the beneficiary of any reward from its utilization and holds sole rights for utilize and circulation. Copyrights ensure a wide assortment of articulations of a thought including:

  • Books and literary works
  • Written and recorded music
  • Works of art
  • Photographs and images
  • Plays

References

  • Stackify. (2018). What is SDLC? Understand the Software Development Life Cycle. [online] Available at: https://stackify.com/what-is-sdlc/ [Accessed 12 Oct. 2018].
  • www.tutorialspoint.com. (2018). HTTP Overview. [online] Available at: https://www.tutorialspoint.com/http/http_overview.htm [Accessed 12 Oct. 2018].
  • Visualcplusdotnet.com. (2018). Brief information on HTML, DHTML, XHTML, XML, XSL, XSD, XSLT, DOM. [online] Available at: https://www.visualcplusdotnet.com/xmlhtmlxsdxsldom.html [Accessed 12 Oct. 2018].
  • van Blommestein, F. and Broeksema, B. (2018). [online] Available at: https://www.researchgate.net/publication/221443598_UNCEFACT_Core_Components_as_the_basis_for_structured_business_communication_by_SMEs_employing_auto-generated_user_adjustable_forms [Accessed 12 Oct. 2018].
  • Nemeth, G. (2018). Web Authentication Methods Explained | RisingStack. [online] RisingStack Engineering – Node.js Tutorials & Resources. Available at: https://blog.risingstack.com/web-authentication-methods-explained/ [Accessed 12 Oct. 2018].
  • Chortle.ccsu.edu. (2018). Control Structures. [online] Available at: https://chortle.ccsu.edu/QBasic/chapter15/bc15_2.html [Accessed 12 Oct. 2018].
  • W3.org. (2018). World Wide Web Consortium (W3C). [online] Available at: https://www.w3.org/ [Accessed 12 Oct. 2018].
  • Law, V. (2018). What is the Difference Between Copyright and Intellectual Property?. [online] Info.vethanlaw.com. Available at: https://info.vethanlaw.com/blog/2015/10/what-is-the-difference-between-copyright-and-intellectual-property [Accessed 12 Oct. 2018].
Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Find out more

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have the essay published on the UK Essays website then please:

McAfee SECURE sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses and online scams Prices from
£124

Undergraduate 2:2 • 1000 words • 7 day delivery

Order now

Delivered on-time or your money back

Rated 4.6 out of 5 by
Reviews.co.uk Logo (187 Reviews)