SlideShare ist ein Scribd-Unternehmen logo
1 von 9
1-"The web is an indispensable
technology". Justify

   Web is an indispensable technology
as it has no end and the new
technologies are invented and with it,
it users are also increasing day by
day.
   It has became indispensable in the
field of business, commerce,
communication, education, engineering,
entertaintment, finance, government,
industry, media, medicine, politics,
science, transportation,etc.
   The use of web is increasing day by
day in each of the field and it has
also made a person's life as modern
life.
   Web satisfies many of the needs in
a human's life so its use is
increasing day by day in each and
every field. As a same time, it has no
end.
   For e.g. In earlier, there was html
to develop web sites then javascript
introduced then ahead css, thus
technology developed and it has no
end.
   Each user uses different
technologies to satisfy their needs
and which is available on web, which
are accessed and used by the different
users.
   It also has a great impact on the
modern world.
   Thus web is an indispensable
technology.


2-Describe web as a different
technology.

   Web is considered as a different
technology, as it is indispensable
technology and the uses of each
different technologies is increasing
day by day as per the need of the
users.
   The different users uses different
technologies to satisfy their needs.
   It has changed the ways in which we
buys products(e-commerce), meet
people(online datting), understanding
world(portals), acquires our
news(online media), voice our
opinions(blogs), entertaintment
ourselves(everything from music
downloads to online casinos), go to
school(online learning), etc.
   The each and every different users
the different technologies of web to
satisfy their own needs.
   For e.g buyers buy their products
on web, students learn online, etc
   Thus, web is a different
technology.


3-What do you mean by active and
passive conversion?

   In a passive conversion, we select
the information that is to be
presented, but have no direct control
over its volume,type,or structure.

   In an acitive conversation, we
provide input so that the information
that is presented is customized to
meet our specially.
4-what is web server?
   A web server is the combination of
computer and the program installed on
it. Web server interacts with the
client through a web browser. It
delivers the web pages to the client
and to an application by using the web
browser and   HTTP protocols
respectively.




5-what is web client server?
    A client serevr is a computer
application, such as a web browser,
that runs on a user's local computer
or workstation and connects to a
server as necessary.

6-What is web application?
   An application that acquires
information, structures it, builds a
package presentation and delivers it
is called web application.

7-what is web-based system?
The term Web-Based system refers to
those applications or services that
are resident on a server that is
accessible using a Web browser and is
therefore accessible from anywhere in
the world via the Web.

8-what is internet?
   Internet is a global network of
interconnected computers over world
wide web. It allows individuals to
communicate with each other.


9-what is intranet?
   An intranet is a computer network
that uses Internet Protocol technology
to securely share any part of an
organization's information or network
operating system within that
organization. It is the connection of
computer networks in a local area


10-what is extranet?
   An extranet is a private network
that uses Internet technology and the
public telecommunication system to
securely share part of a business's
information or operations with
suppliers, vendors, partners,
customers, or other businesses.

11-Explain web application attributes.

  They are as under:

   i} Network intensiveness:- Each and
every web application resides on a
network and must serve the needs of a
diverse community of clients.

   ii} Concurrency:- A large number of
users may access the web application
at a time.
   for e.g At a time crores of users
may access google’s app's.

   iii} Unpredictable load:- The
number of users of the web application
may vary by order of magnitude from
day to day.

   iv} Performance:- As thousands of
users uses a particular web
application at a time, its performance
becomes slightly lower. If a web
application users wait too long for
access, for server-side processing,
etc then user should find alternative
way.

   v} Availability:- The web
applications on servers are available
at any time as accessed. The
expectations of 100% availability is
unreasonable.

   vi} Data driven:-The primary
function of many web application is to
use hypermedia to present text,
graphics and video content to the end
user. In addition, web application are
commonly used to access information
that exists on databases that are not
an integral part of web-based
environment.

   vii} Content sensitive:- The
quality aesthetic nature of content
remains an important determinant of
the quality of a web application.
viii} Continuous evolution:- Web
applications evolves continuously. It
must be updated on time, day by day,
or second per second. Each new
technology must be updated.

   ix} Immediacy:- Each new technology
or software should be get to market
quickly. Web engineers must use
methods of planning, analysis, design,
implementation and testing have been
adapted to the compressed time
schedules requires for WebApp
development.

   x} Security:- As, web application
are available via network access, it
is difficult, if not impossible, to
limit the population of end users who
may access the application.

   for e.g. Many of the applications
provides user name and password to
access personal data.

   xi} Aesthetics:- An undeniable part
of the appeal of a WebApp is its look
and feel. When an application has been
designed to market or sell products or
ideas or provide services that should
be attractive and in a proper manner.


12-what is web?

   The term Web is associated with web
applications that facilitate
participatory information sharing,
interoperability, user-centered design
and collaboration on the World Wide
Web.

Weitere ähnliche Inhalte

Was ist angesagt?

A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital ForensicsManik Bhola
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to CryptographyMd. Afif Al Mamun
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidencerakesh mishra
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography FundamentalsDuy Do Phan
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DESchatsiri
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Anas Rock
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxHardik Manocha
 
Figure 2.2.doc.doc
Figure 2.2.doc.docFigure 2.2.doc.doc
Figure 2.2.doc.docbutest
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Cyber forensics question bank
Cyber forensics   question bankCyber forensics   question bank
Cyber forensics question bankArthyR3
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hackingAmbuj Kumar
 
Digital Signature
Digital SignatureDigital Signature
Digital Signaturesaurav5884
 
Digital forensics
Digital forensics Digital forensics
Digital forensics vishnuv43
 

Was ist angesagt? (20)

A brief Intro to Digital Forensics
A brief Intro to Digital ForensicsA brief Intro to Digital Forensics
A brief Intro to Digital Forensics
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 
Cryptography Fundamentals
Cryptography FundamentalsCryptography Fundamentals
Cryptography Fundamentals
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Cryptography
CryptographyCryptography
Cryptography
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)Information Security Cryptography ( L02- Types Cryptography)
Information Security Cryptography ( L02- Types Cryptography)
 
Advanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution BoxAdvanced Encryption Standard (AES) with Dynamic Substitution Box
Advanced Encryption Standard (AES) with Dynamic Substitution Box
 
Figure 2.2.doc.doc
Figure 2.2.doc.docFigure 2.2.doc.doc
Figure 2.2.doc.doc
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Cyber forensics question bank
Cyber forensics   question bankCyber forensics   question bank
Cyber forensics question bank
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 

Andere mochten auch

Anchored data type
Anchored data typeAnchored data type
Anchored data typeJay Patel
 
Tech pp
Tech ppTech pp
Tech ppCjd002
 
Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2bigpinots
 
Acampada
AcampadaAcampada
Acampadapiko217
 
Presentation1
Presentation1Presentation1
Presentation1Jay Patel
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software toolsJay Patel
 
More than yea or nay day 1 0
More than yea or nay day 1 0More than yea or nay day 1 0
More than yea or nay day 1 0Becknell
 
Mírame a los ojos
Mírame a los ojosMírame a los ojos
Mírame a los ojospiko217
 
More than yea or nay day 2 0
More than yea or nay day 2 0More than yea or nay day 2 0
More than yea or nay day 2 0Becknell
 
Selection sort
Selection sortSelection sort
Selection sortJay Patel
 

Andere mochten auch (15)

Inwork-johdanto 3.12.2013
Inwork-johdanto 3.12.2013Inwork-johdanto 3.12.2013
Inwork-johdanto 3.12.2013
 
Anchored data type
Anchored data typeAnchored data type
Anchored data type
 
Tech pp
Tech ppTech pp
Tech pp
 
V.social campaign
V.social campaignV.social campaign
V.social campaign
 
Images
ImagesImages
Images
 
Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2Taking The Plunge In Blogging 2
Taking The Plunge In Blogging 2
 
Acampada
AcampadaAcampada
Acampada
 
Presentation1
Presentation1Presentation1
Presentation1
 
Codd rules
Codd rulesCodd rules
Codd rules
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software tools
 
More than yea or nay day 1 0
More than yea or nay day 1 0More than yea or nay day 1 0
More than yea or nay day 1 0
 
Codd rules
Codd rulesCodd rules
Codd rules
 
Mírame a los ojos
Mírame a los ojosMírame a los ojos
Mírame a los ojos
 
More than yea or nay day 2 0
More than yea or nay day 2 0More than yea or nay day 2 0
More than yea or nay day 2 0
 
Selection sort
Selection sortSelection sort
Selection sort
 

Ähnlich wie Assignment 1(web)

Empowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxEmpowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxCatherineBotardo3
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxJerome Bigael
 
Empowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxEmpowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxJoseph Camarote
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptxJasonPDelosSantos
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry AnalysisRAJEEV RANJAN
 
Verinote internet growth
Verinote internet growthVerinote internet growth
Verinote internet growthVerinote
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities ManagementOmer Dawelbeit
 
Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1SheilaBungalan1
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxEMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxJerickRemoyan
 
Building Construction Project Summary
Building Construction Project SummaryBuilding Construction Project Summary
Building Construction Project SummaryMichelle Madero
 

Ähnlich wie Assignment 1(web) (20)

Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of ThingsTowards Future Internet: Web 3.0, Internet of Services & Internet of Things
Towards Future Internet: Web 3.0, Internet of Services & Internet of Things
 
Empowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptxEmpowerment Technologies Lesson 1.pptx
Empowerment Technologies Lesson 1.pptx
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Introduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptxIntroduction to Empowerment Technology.pptx
Introduction to Empowerment Technology.pptx
 
Powerpoint.pptx
Powerpoint.pptxPowerpoint.pptx
Powerpoint.pptx
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Empowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptxEmpowerment Technology Lesson 1.pptx
Empowerment Technology Lesson 1.pptx
 
V5I6-0559
V5I6-0559V5I6-0559
V5I6-0559
 
empowerment technology 12.pptx
empowerment technology 12.pptxempowerment technology 12.pptx
empowerment technology 12.pptx
 
G 2 Industry Analysis
G 2 Industry AnalysisG 2 Industry Analysis
G 2 Industry Analysis
 
Verinote internet growth
Verinote internet growthVerinote internet growth
Verinote internet growth
 
EMPO ICT.pptx
EMPO ICT.pptxEMPO ICT.pptx
EMPO ICT.pptx
 
Information Technology for Facilities Management
Information Technology for Facilities ManagementInformation Technology for Facilities Management
Information Technology for Facilities Management
 
LESSON1 (1).pptx
LESSON1 (1).pptxLESSON1 (1).pptx
LESSON1 (1).pptx
 
Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1Empowerment Technologies Quarter 3 Module 1
Empowerment Technologies Quarter 3 Module 1
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptxEMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
EMPTECH-LESSONnkkkkkhkhkkhbnnknmn-1.pptx
 
Building Construction Project Summary
Building Construction Project SummaryBuilding Construction Project Summary
Building Construction Project Summary
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 

Mehr von Jay Patel

Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)Jay Patel
 
Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)Jay Patel
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)Jay Patel
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)Jay Patel
 
I assignmnt(oops)
I assignmnt(oops)I assignmnt(oops)
I assignmnt(oops)Jay Patel
 
Inline function(oops)
Inline function(oops)Inline function(oops)
Inline function(oops)Jay Patel
 
1 unit (oops)
1 unit (oops)1 unit (oops)
1 unit (oops)Jay Patel
 
Mutlimedia authoring tools
Mutlimedia authoring toolsMutlimedia authoring tools
Mutlimedia authoring toolsJay Patel
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 textJay Patel
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 textJay Patel
 
Hypertext and hypermedia
Hypertext and hypermediaHypertext and hypermedia
Hypertext and hypermediaJay Patel
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software toolsJay Patel
 
Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02Jay Patel
 
Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01Jay Patel
 
Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01Jay Patel
 

Mehr von Jay Patel (20)

Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)
 
Unit 3(rdbms)
Unit 3(rdbms)Unit 3(rdbms)
Unit 3(rdbms)
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)
 
Quiz(web)
Quiz(web)Quiz(web)
Quiz(web)
 
Assignment 2(web)
Assignment 2(web)Assignment 2(web)
Assignment 2(web)
 
I assignmnt(oops)
I assignmnt(oops)I assignmnt(oops)
I assignmnt(oops)
 
Inline function(oops)
Inline function(oops)Inline function(oops)
Inline function(oops)
 
1 unit (oops)
1 unit (oops)1 unit (oops)
1 unit (oops)
 
Unit1
Unit1Unit1
Unit1
 
Cursor
CursorCursor
Cursor
 
Mutlimedia authoring tools
Mutlimedia authoring toolsMutlimedia authoring tools
Mutlimedia authoring tools
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 text
 
Sound
SoundSound
Sound
 
Lecture6 text
Lecture6   textLecture6   text
Lecture6 text
 
Hypertext and hypermedia
Hypertext and hypermediaHypertext and hypermedia
Hypertext and hypermedia
 
Multimedia software tools
Multimedia software toolsMultimedia software tools
Multimedia software tools
 
Cursor
CursorCursor
Cursor
 
Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02Lecturestacks 110802115132-phpapp02
Lecturestacks 110802115132-phpapp02
 
Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01Introductionofdatastructure 110731092019-phpapp01
Introductionofdatastructure 110731092019-phpapp01
 
Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01Applicationsofstack 110805072322-phpapp01
Applicationsofstack 110805072322-phpapp01
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Assignment 1(web)

  • 1. 1-"The web is an indispensable technology". Justify Web is an indispensable technology as it has no end and the new technologies are invented and with it, it users are also increasing day by day. It has became indispensable in the field of business, commerce, communication, education, engineering, entertaintment, finance, government, industry, media, medicine, politics, science, transportation,etc. The use of web is increasing day by day in each of the field and it has also made a person's life as modern life. Web satisfies many of the needs in a human's life so its use is increasing day by day in each and every field. As a same time, it has no end. For e.g. In earlier, there was html to develop web sites then javascript introduced then ahead css, thus
  • 2. technology developed and it has no end. Each user uses different technologies to satisfy their needs and which is available on web, which are accessed and used by the different users. It also has a great impact on the modern world. Thus web is an indispensable technology. 2-Describe web as a different technology. Web is considered as a different technology, as it is indispensable technology and the uses of each different technologies is increasing day by day as per the need of the users. The different users uses different technologies to satisfy their needs. It has changed the ways in which we buys products(e-commerce), meet people(online datting), understanding world(portals), acquires our
  • 3. news(online media), voice our opinions(blogs), entertaintment ourselves(everything from music downloads to online casinos), go to school(online learning), etc. The each and every different users the different technologies of web to satisfy their own needs. For e.g buyers buy their products on web, students learn online, etc Thus, web is a different technology. 3-What do you mean by active and passive conversion? In a passive conversion, we select the information that is to be presented, but have no direct control over its volume,type,or structure. In an acitive conversation, we provide input so that the information that is presented is customized to meet our specially.
  • 4. 4-what is web server? A web server is the combination of computer and the program installed on it. Web server interacts with the client through a web browser. It delivers the web pages to the client and to an application by using the web browser and HTTP protocols respectively. 5-what is web client server? A client serevr is a computer application, such as a web browser, that runs on a user's local computer or workstation and connects to a server as necessary. 6-What is web application? An application that acquires information, structures it, builds a package presentation and delivers it is called web application. 7-what is web-based system?
  • 5. The term Web-Based system refers to those applications or services that are resident on a server that is accessible using a Web browser and is therefore accessible from anywhere in the world via the Web. 8-what is internet? Internet is a global network of interconnected computers over world wide web. It allows individuals to communicate with each other. 9-what is intranet? An intranet is a computer network that uses Internet Protocol technology to securely share any part of an organization's information or network operating system within that organization. It is the connection of computer networks in a local area 10-what is extranet? An extranet is a private network that uses Internet technology and the public telecommunication system to
  • 6. securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses. 11-Explain web application attributes. They are as under: i} Network intensiveness:- Each and every web application resides on a network and must serve the needs of a diverse community of clients. ii} Concurrency:- A large number of users may access the web application at a time. for e.g At a time crores of users may access google’s app's. iii} Unpredictable load:- The number of users of the web application may vary by order of magnitude from day to day. iv} Performance:- As thousands of users uses a particular web application at a time, its performance
  • 7. becomes slightly lower. If a web application users wait too long for access, for server-side processing, etc then user should find alternative way. v} Availability:- The web applications on servers are available at any time as accessed. The expectations of 100% availability is unreasonable. vi} Data driven:-The primary function of many web application is to use hypermedia to present text, graphics and video content to the end user. In addition, web application are commonly used to access information that exists on databases that are not an integral part of web-based environment. vii} Content sensitive:- The quality aesthetic nature of content remains an important determinant of the quality of a web application.
  • 8. viii} Continuous evolution:- Web applications evolves continuously. It must be updated on time, day by day, or second per second. Each new technology must be updated. ix} Immediacy:- Each new technology or software should be get to market quickly. Web engineers must use methods of planning, analysis, design, implementation and testing have been adapted to the compressed time schedules requires for WebApp development. x} Security:- As, web application are available via network access, it is difficult, if not impossible, to limit the population of end users who may access the application. for e.g. Many of the applications provides user name and password to access personal data. xi} Aesthetics:- An undeniable part of the appeal of a WebApp is its look and feel. When an application has been
  • 9. designed to market or sell products or ideas or provide services that should be attractive and in a proper manner. 12-what is web? The term Web is associated with web applications that facilitate participatory information sharing, interoperability, user-centered design and collaboration on the World Wide Web.