You are on page 1of 2

Section 15.

1
Identify Web mastering tools
Identify Web server maintenance techniques
Describe the importance of backups
Section 15.2
Identify guidelines for updating a site
Edit and update a web page
Use FrontPage reports
Check for broken hyperlinks
Section 15.3
Control access to a Web site
Create a login screen
Monitor Web site traffic using FrontPage Usage reports
Section 15.1 Vocab/Notes
Hot-swappable hard drives: Storage system used by some Web servers
that contains multiple hard drives; allows a Webmaster to replace one drive
for another in case of failure of the drive.
Hard drive mirroring: Storage method in which data are written to more
than one hard drive at the same time; helps keep Web servers fully functional
at all times.
Backup: A copy of a specific set of data, usually stored in a different place
such as a tape, CD-ROM, or another hard drive.
Incremental Backup: Copies only the data that has changed since the last
full backup to the backup device.
Section 15.2 Notes/Vocab:
File management: The process of creating, naming, moving, updating, and
deleting files on a computer system.
Direct server update: The act of updating or revising a Web sites files
directly on the Web server where the site resides.
Local client update: The process of revising Web pages by copying the files
from the Web server to a local (client) workstation, updating the files on the
local workstation, and uploading the revised files to the Web server.
Archiving: The process of saving and storing old Web pages and their
components.
Section 15.3 Notes/Vocab:
Access control: A security measure in which a sites availability is restricted
to a specific set of authorized users.
Password: A set of letters or numbers that a user enters to gain access to a
Web site.

User Authentication: The process of checking the password the user enters
against the one assigned to the user.
Global access control: A security measure in which groups of users are
granted or denied access to a computer system data, different groups of
users are often given different levels of access to system data.

You might also like