The design and development of a websites structure is the framework for site.The structure of site is composed of different section of website and navigation within these sections.It is the framework that shapes the site and define website navigation scheme.The basic structure of webpage :
As the diagram below shows a website structure is a network of link composed of three main website section.
1. The home page
2. The main section
3. The subsections
navigation and website structure The key of the success of designing structure is the easy with which visitors can navigator the site and how will they provided with opportunities for user interaction.A generqal rule of thumb is that it should take no more than two clicks for a visitor to find what they are looking for when they enter your website.
HTML stands for Hypertext Markup Language>Immediately after the doctype comes the html element this is root element of the document tree and everything that follows is a descendent of that root element.HTML :
A webpage could be considered as a document tree that can contain any number of branch.There are rules as to used what items each branch can contain.To understand concept of a document tree. It's useful to consider a simple webpage with typical content features along its tree view as show in figure,Explain the Document tree of Webpage :
My Awesome Webpageb
This is lovely webpage
I am a begineers of html That is emphasis Tag
There are the six seasons of bangladesh
We are the nations of bangladesh
My country is so awesome
If we look at this comparion, we can see that the html element infact contain has two elements 1.head 2.body Head has two subbranches a meta element and a title Body contain number of heading paragraphs and blockquotes There's some symmetry in the way the tags are opended and closed. For example, the paragraph that reads, "It has lots of lovely content.....".Contain's three text nodes the second which is wrapped in an emphasis element. The paragraph is closed after the content has ended and before the next element in th tree begins, placing the closing after the blockquote would break the tree's structure.
The function of web browser :1. Web browser functions are provided the resource or information to the user when asked by them. 2. It processes the user inputs in the form of URL link http://www.google.com in the browser and allow the access to that page. 3. URL is used to identify the resources and fetch them from the server and display it to the client. 4.It allows the user to internet with the web pages and dynamic content like surveys forms etc. 5.It also allows the user to navigate through the complete web page and see its source code in the HTML format.
The !doctype :- The first item is to appear in the source code of a webpage is the doctype declaration.This provided the web browser with information about the type of markup language in which the page is written, which may or may not effect the way the browser renders the content.It may look a little scary at first glance but the good news in that most WYSIWYG web editors will create the doctype for automatically after selected from a dialog the type of document creating. The doctype look like this :-Explain the necessity of !doctype in webpage design/ structure of a webpage :
All tag will start < and end > thanExplain tag with example :
Explain different type of meta tag why meta tag used in website :Ans : There are many meta tag and html tag. title , keyword and the description meta tag are very important. The mot important meta tags and how to use them : 1. title relevant and attractive phrases/title - The title is the first phrases you see as a search result. 2. meta name="keywords" content="words" -A description of your website in 3 of 4 sentences. 3. meta name="keywords" content="words" - The keywords are the important words "uses on 1 specific page". 4. meta name="robots" content="selection" - How far do you allow robots to spider through your website. 5. meta name="revisit-after" charset="period" - How after do you went the spiders to come back and index your website again.
Symtoms of virus attack in computer :1. The computer takes longer time than usual to boot in the process of booting sometimes switches off automatically. 2. The system displays strange colours and unrequest files come up screen and can even be deleted in the process. 3. Message can be sent from the email account to other email addresses unrequested.Similarly, strange messages can also be received which most cases are virus infected. 4. computer occasionally freezes as a result of opening a file or in the process of booting in most cases the entire system has to be short down before re-booting.In some serious cases the computer may not switch on until after a very long time. 5. When on the internet, browser becomes very slow & insome cases it switches to other sites automatically.Sites displayed can look very interesting, but it may be a trap in disguise as this may be a sponsored into a pc. 6. When vital and confidential files and progress are not longer accessible.This could be as result of a computer. 7. It could result to h/w malfunctioning.A situation when for example a DVD drive open and closed by itself.There could also the occurence of strange h/w noise.
The common features of web server :Virtual hosting :- -to eerver many websites using one IP address. Large file support :- - to be able to server files where size is greater than 2GB on 32bit OS. Bandwidth throatting :- -to limit the spped of response in order to not saturate the network and to be able to server more clients. Server-Side-Scripting :- -to generate dynamic web pages, still keeping web server and website implementations separate from each other.
The function of w3/www function :W3/WWW :- The w3 stands for would wide web is a system of interlinked typetext documents accessed via the internet.With a web browser, one can view web pages that may conatin text, images, videos and other multimedia and navigate between them via hyper links. The function of W3 function :- The terms internet and world wide web are often used in everyday speech without much distinction.however, the Internet and the WWW are not one and the same. The Internet is a global system of interconnected computer networks. In contrast, the web is one of the services that runs on the internet.it is a collection of text documents and other resources, linked by hyperlink and URL.Usually accessed by web browser from web servers. Viewing a webpage on the world wide web normally beings either by typing the URL of the page into a web browser.The web browser then intiates a series of communication messages in order to fetch and display it. An example, consider accessing a page with the URL- http://example.org/wiki/world wide web First the browser resolves the server-name portion of the URL(example.org) into an internet protocol address using the globally distributed database known as DNS (Domain Name System); This lookup returns an IP address such as. 22.214.171.124
The client/server model is a computing model that acts as a distributed application which partitions tasks or workloads between the providers of a resource or server, requesters called client.Client Server Side Architecture with figure :
Often client and servers communicate over a computer network on separate hardware, but client and server may reside in the same system.
A server machine is a hest that is running one or more server programs which share their resources with clients.A client does not share any of its resources, but requests a server content or service function.
The client/server characteristics describes the relationship of co-operating programs in an application.The server component provides a function or service to one or many clients, which initiates requests for such services.functions such as email exchange, web access and database access are built on the client/server model.
The interaction between client and server is often described using sequence diagrams.The united modeling language has supported for sequence diagrams.
Specify types of clients include- Web browsers email clients and Online chat clients Specify types of clients include - Web servers ftp servers application servers Mail servers file servers Database servers Name servers Print servers terminal servers
The problem created by Hoaxes and spyware :Hoaxes :- Hoaxes layer is dedicated to debanking email hoaxes, thwartting Internet scammers cembating spam and educating web users about email and internet security issues. Hoaxes layer allows Internetn user to check the veracity of common email hoaxes and arms to counteract criminal activity by publishing information about common types of Internet scams. Hoaxes layer also includes anti-spam tips computer and email security information articles about true email forwards and much more.New articles are added to the hoaxes layer website every week. Spyware :- Spyware is a type of malware(Malicious Software) installed on computers that collects information about users without their knowledge. The presence of spyware is typically hidden from the user and can be difficult to detect. Some spyware as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users. Spyware can collect almost any type of data, including personal information like Internet surfing habits, user login, and bank or credit account information. Some spyware can change computer setting, which can result in slow internet connection speeds un-authorized changes in browser setting or changes to software settings.
Computer virus :-A computer virus is a computer program that can replicate itself and spread from one computer to another. The term virus is also commonly, but erronearsly, used to refer to other types of malware including but not limited to adware and spyware programs that do not have a reproductive ability. Malware includes computer viruses, computer worms, trojan horses, most root kits, spyware, dishonest adware and other malicious or unwanted software including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can security vulner abilities to spread itself automatically to another computers through network, while a Trojan horse is a program that appears harmless but hides malicious functions. Extra :- Pop-ups:- The word "pop-up" to any internet browser window what is launched without specific permission.They are almost always falsely advertisements trying to either sell something or get to type in informartion such as-email address or zipcode.