You are on page 1of 6

ADMAS UNIVERSITY BISHOFTU CAMPUS

Course Title -Internet and Website Development


TITLE: GROUP ASSIGNMENT II

GROUP MEMBERS

S.No NAME ID SECTION YEAR DEPT.

1 HABTAMU H/MICHAEL 0500/17 1 3RD CoSc

2 GADISA NEGASO 0194/17 1 3RD CoSc

3 KASSAHUN TAFESE 0192/17 1 3RD CoSc

4 SEFELEGE TEREFE 0211/17 1 3RD CoSc

Submitted to Instructor: Solomon S.


June 02,2020 G.C.
INSTRUCTIONS
NB: Read duly the following instructions and act as per requirements.
o This is a group assignment. Thus, copy and paste from other groups will result in zero
values.
o You must use either MS-word or PDF format for your answers. Other forms may not
to be welcomed. In particular images using cell phone be considered at your risk.
o You must send your work using telegram via cell phone: 0936-03—86-98 only using
private telegram account for telegram users are welcomed. You cannot send via
your (students) group telegram.
o Otherwise non- telegram user may submit in person using hardcopy to your
respective department. Those who are willing to submit with hardcopy should make
sure that their handwriting is legible. Please any other way of submission is not
welcomed.
o Your final submission date is on June 25/06/2020. You can submit before the due
date. I highly value your punctuality as part of your assignment. Thus, late submission
may result in 1% punishment per delay for each day. But the submission date by no
means extends beyond June 27/06/2020.
o Neatness and clarity have its own value!

Stay Safe!

QUESTIONS:
1. What will be the output of the following code?
<!DOCTYPE html>
<html>
<head>
<style>
table, th, td {
border: 1px solid black;
}
</style>
</head>
<body>
<table >
<tr>
<th> Roll No. </th>
<th> Student Name </th>
<th> Subject Name </th>
</tr>
<tr>
<td> 1 </td>
<td>Ram</td>
<td> Physics </td>
</tr>
<tr>
<td> 2 </td>
<td> Shyam </td>
<td> Math </td>
</tr>
<tr>
<td> 3 </td>
<td> Murli </td>
<td> Chemistry </td>
</tr>
</table>
</body>
</html>
2. Explain the structure of the HTML webpage.
3. Why Meta tags are used in HTML?
4. How do you create links to sections within the same page?
5. What is Malware and list all Types
1. What will be the output of the following code?

Roll No. Student Name Subject Name


1 Ram Physics
2 Shyam Math
3 Murli Chemistry

2. Explain the structure of the HTML webpage.


< ! DOCTYPE html>
<html>
<head>
<title> </title>
</head>
<body>

</body>
</html>

✓ < ! DOCTYPE html> declaration defines that the document is an HTML 5


document
✓ <html> element is the root element of an HTML page
✓ <head> element contain meta information about the HTML page
✓ <title> element specifies a tittle for the HTML page (which is shown in the
browser’s title bar or in the page’s tab)
✓ <body> elements define the document’s body and is container for all the visible
contents such as heading, paragraphs, images, hyperlinks, tables, lists, etc……

3. Why Meta tags are used in HTML?


The <meta> tag is used to provide such additional information. This tag is an empty
element and so does not have a closing tag but it carries information within its attributes.

The <meta> tag defines metadata about an HTML document. Metadata is data
(information) about data.

<meta> tags always go inside the <head> element, and are typically used to specify
character set, page description, keywords, author of the document, and viewport
settings.
Metadata will not be displayed on the page, but is machine passable.

Metadata is used by browsers (how to display content or reload page), search engines
(keywords), and other web services.

4. How do you create links to sections within the same page?

❖ Using the id selector

In CSS, "id" is a selector that may be used to designate an area that a link
should point to, similar to anchor in HTML. The nice thing about using id is
that you can create a link to any element on the page, rather than only the top
or bottom. In the following sections, you'll see how to apply id to an HTML tag,
and then how to link to it. This example will link to the opening paragraph at
the top of this page.

✓ Use the #id selector

<p id="opening">Hyperlinks are utilized by a web


browser to move from one page to another...</p>

✓ Create a link to the selector

<a href="#opening">Take me to the opening


paragraph.</a>

Result

Take me to the opening paragraph.

✓ Or we can use another method of linking Hyperlink

❖ HTML Links - Hyperlinks

✓ HTML links are hyperlinks, you can click on a link and jump to another
document. When you move the mouse over a link, the mouse arrow will turn
into a little hand.

Syntax
<a href="url">link text</a>

5. What is Malware and list all Types


Malware is a program designed to gain access to computer system normally for benefit
of some third party without user’s permission malware includes computer viruses,
worms, Trojan horses, ransomware, spyware and other malicious programs.
Viruses
A Virus is a malicious executable code attached to another executable file. The
virus spreads when an infected file is passed from system to system.

Worms
Worms replicate themselves on the system, attaching themselves to different
files and looking for pathways between computers,

Spyware
Its purpose is to steal private information from a computer system for a third
party. Spyware collects information and sends it to the hacker.
Trojan horse
A Trojan horse is malware that carries out malicious operations under the
appearance of a desired operation such as playing an online game.

Logic Bombs
A logic bomb is a malicious program that uses a trigger to activate the malicious
code. The logic bomb remains non-functioning until that trigger event happens.

Ransomware
Ransomware grasps a computer system or the data it contains until the victim
makes a payment.

Backdoors
A backdoor bypasses the usual authentication used to access a system. The
purpose of the backdoor is to grant the cyber criminals future access to the
system even if the organization fixes the original vulnerability used to attack the
system.

Rootkits
A rootkit modifies the OS to make a backdoor. Attackers then use the backdoor to
access the computer distantly. Most rootkits take advantage of software
vulnerabilities to modify system files.
Key loggers –
Records everything the user types on his/her computer system to obtain
passwords and other sensitive information and send them to the source of the
keylogging program.

You might also like