Professional Documents
Culture Documents
Page 1 of 149
Higher Nationals
Internal verification of assessment decisions 3 BTEC (RQF)
• Constructive?
Y/N
• Linked to relevant assessment criteria?
Y/N
• Identifying opportunities for improved
performance?
Y/N
• Agreeing actions?
Y/N
Page 2 of 149
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Page 3 of 149
LO1. Explain server technologies and management services associated with hosting and managing websites.
LO3. Utilise website technologies, tools and techniques with good design principles to create a multipage
website.
Pass, Merit & Distinction P5 P6 M4 D2
Descripts
LO4. Create and use a Test Plan to review the performance and design of a multipage website.
Pass, Merit & Distinction P7 M5 D3
Descripts
Resubmission Feedback:
Page 4 of 149
Assignment Feedback
Formative Feedback: Assessor to Student
Action Plan
Summative feedback
Page 5 of 149
Pearson
Higher Nationals in
Computing
Unit 10: Web Design and Development
Assignment 01
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment.
Use previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom, right margins and 1.25” for the left margin of each page.
Page 6 of 149
1. The font size should be 12 point and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment
No, and Page Number on each page. This is useful if individual sheets become detached
for any reason.
5. Use word processing application spell check and grammar check function to help editing
your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the
body except for the before mentioned compulsory information will result in rejection of
your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late
submissions will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as
illness, you may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade.
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You
will then be asked to complete an alternative assignment.
9. If you use other people9s work or ideas in your assignment, reference them properly
using HARVARD referencing system to avoid plagiarism. You have to provide both in-
text citation and a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade
could be reduced to A REFERRAL or at worst you could be expelled from the course.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely, to use another’s work and
to present it as my own without attributing the sources in the correct way. I further
understand what it means to copy another’s work.
Page 7 of 149
Assignment Brief
Student Name /ID Number Niluksha Dulmina / E126643
Unit Number and Title Unit 10- Web Design and Development
Unit Tutor
Page 8 of 149
Issue Date
Submission Date
Submission Format:
Part 1.
Report- Submit a professional report with appropriate report formatting and guidelines followed. All the
research data should be referenced along with in-text citations using Harvard referencing system.
Part 2
A fully functional web solution
LO1 Explain server technologies and management services associated with hosting and managing
websites.
LO2 Categorize website technologies, tools and software used to develop websites.
LO3 Utilize website technologies, tools and techniques with good design principles to create a
multipage website.
LO4 Create and use a Test Plan to review the performance and design of a multipage website.
Page 9 of 149
Develop a web-based solution for the above scenario and produce a report covering
the following tasks.
Task 1 - Server technologies and management services associated with hosting and managing
websites (LO1)
Page 10 of 149
1.1 Explain and differentiate the different web technologies such as communication protocols,
server hardware, operating systems, and web server software with regards to designing,
publishing and accessing the Hospital Management System (HMS).
1.2 Identify and define the types of DNS and the uses of it, with clarifications on how domain
names are structured. Review the effect of search engines on website performance. Provide
evidence-based support for improving a site’s index value and rank of the Hospital
Management System (HMS) through search engine optimization.
1.3 Identify and explain the common web development technologies and frameworks. Explain
the tools and techniques chosen to develop the above web application and justify your
choice by providing valid evidence.
Task 2 - Categories website technologies, tools and software used to develop websites
(LO2)
2.1 Considering the requirements given in the above scenario define the relationships between
front-end and back-end website technologies and discuss how the front-end and the back
end relate to presentation and application layers.
2.2 Discuss the differences between online website creation tools and custom-built web
sites by considering the
Task 3 - Utilize website technologies, tools, and techniques with good design
principles to create a multipage website (LO3)
3.1 Design a suitable web application solution for the given scenario using PHP, JS and MySQL
(Screenshots of important code lines with proper comments and user interfaces filled with
sample data must be attached to the documentation). Apply a database design for the
proposed system and provide the well normalized database design of the proposed system.
Provide evidences of the design, multipage website supported with fidelity wireframes and
a full set of client and user requirements.
3.2 Compare and contrast the multipage website created to the design document. Use your
design document with appropriate principles, standards, and guidelines to produce a
branded, multipage website supported with realistic content and critically evaluate the
Page 11 of 149
web design, development process against your design document analysing any technical
challenges you faced during the development.
Note - Synthesize client and the server-side functionalities in the proposed design.
Task 4 - Create and use a Test Plan to review the performance and design of a
multipage website (LO4)
4.1 QA process is expected to discover design issues and development errors while testing a
product’s user interface (UI) and gauging the user experience (UX). Evaluate the
Quality Assurance (QA) process and review how it was implemented during your design
and development stages.
4.2 Create a suitable test plan for the developed system and critically evaluate the results
of your Test Plan. Include a review of the overall success of your multipage website;
use this evaluation to explain any areas of success and provide justified
recommendations for areas that require improvements.
Grading Rubric
Grading Criteria Achieved Feedback
Page 12 of 149
Page 13 of 149
Observation Sheet
Page 14 of 149
Comments:
Page 15 of 149
Student ID : E126643
Page 16 of 149
Table of Contents
1 Task ............................................................................................................................ 18
Server technologies and management services associated with hosting and managing
websites (LO1) ................................................................................................................... 18
1.1 Explain and differentiate the different web technologies such as communication
protocols, server hardware, operating systems, and web server software with regards to
designing, publishing and accessing the Hospital Management System (HMS)........... 18
1.1.1 What are web technologies? ........................................................................ 18
1.1.2 About Communication Protocols ................................................................. 18
1.1.3 About Server Hardware ............................................................................... 28
1.1.4 About Operating systems ............................................................................. 34
1.1.5 About Web Server Software ........................................................................ 44
1.1.6 About Web Browsers ................................................................................... 49
1.1.7 Uniform Resource Locator (URL) ............................................................... 52
1.1.8 PC Hardware and Server Hardware ............................................................. 62
1.1.9 Publishing the Application ........................................................................... 63
1.2 Identify and define the types of DNS and the uses of it, with clarifications on
how domain names are structured. Review the effect of search engines on website
performance. Provide evidence-based support for improving a site’s index value and
rank of the Hospital Management System (HMS) through search engine optimization.
64
1.2.1 What is the DNS?......................................................................................... 64
1.2.2 How Does DNS Work? ................................................................................ 64
1.2.3 How domain names are structured ............................................................... 69
1.2.4 Search engine optimization .......................................................................... 70
1.2.5 Web Development Technologies ................................................................. 81
1.3 Web Development Framework ........................................................................... 89
1.3.1 Web Development Techniques .................................................................... 91
1.3.2 Web Development Tools ............................................................................. 93
1.3.3 Why we would Develop Web Applications? ............................................... 95
1.3.4 Web Application advantages ....................................................................... 95
2 Task ............................................................................................................................ 98
2.1 Considering the requirements given in the above scenario define the
relationships between front-end and back-end website technologies and discuss how
the front-end and the back end relate to presentation and application layers. ............... 98
2.1.1 Difference between Frontend and Backend ............................................... 101
2.1.2 PRESENTATION LAYER ....................................................................... 101
Page 17 of 149
Page 18 of 149
1 Task
• Computers are like humans in that they communicate through rules and protocols.
These protocols are designed for efficiency and are based on computer-specific
conventions and regulation. Each rule is defined in its own way and has its own
name. These protocols define and define communication standards. Data Transfer
Operations: There are many different protocols, and some more examples of these
various protocols include, but are not limited to, TCP/IP, PPP, SMTP. Protocols
Page 19 of 149
such as HTTP, HTTPS, FTP, SNMP, RTP, and IMAP are common
communication protocol.
TCP/IP Protocol
• The communication protocol known as TCP enables applications and computing
devices to exchange messages over a network. TCP stands for Transmission
Control Protocol. It is made to effectively move data and messages through
networks and send data packets over the Internet. Is one of the key standards
established by the Internet Engineering Task Force that establishes the regulations
of the Internet (IETF). It is one of the most popular protocols for end-to-end data
transport on digital networks.
• Data is organized by TCP for transmission between servers and clients. It ensures
the accuracy of data transmitted through the network. TCP establishes a
Page 20 of 149
connection between the source and destination before sending data and makes
sure that the connection is kept open until data is sent. Then, in order to maintain
data integrity throughout the process, it separates huge volumes of data into
smaller packets.
Page 21 of 149
HTTP Protocol
Page 22 of 149
• The first text-based, interactive web browser, the original World Wide Web, was
developed alongside HTML. The protocol is still one of the main ways to access
the Internet today.
Page 23 of 149
FTP Protocol
• FTP stands for <File Transfer Protocol" and refers to a set of rules that govern
how computers transfer files from one system to another over the Internet.
Businesses use his FTP to send files between computers, while websites use his
FTP to upload and download files from his website's servers.
File transfer protocols allow individuals and businesses to share electronic files
with others even when they are not in the same location. This can be done using
an FTP client or the cloud. Both sides require an active internet connection
regardless of the option.
Page 24 of 149
• Data Connection: Because data types might vary, The Data Connection
employs highly complicated rules. Between data transmission operations, a data
link is created. When a command to transfer a file is received, the data connection
begins, and it shuts when the file has been sent.
Advantages of FTP
❖ Speed: FTP has a lot of benefits, including speed. One of the quickest
methods for transferring files from one computer to another is using FTP.
❖ Efficient: We don't have to finish all the procedures to retrieve the whole
file, therefore it is more efficient.
❖ Security: To access the FTP server, we need to login with the username
and password. Therefore, we can say that FTP is more secure.
❖ Back & forth movement: We can move files back and forth via FTP.
Assume you are the firm management, and you transmit information to all
of the employees, who then send information back to you on the same
server.
Disadvantages of FTP
❖ All FTP transfers must adhere to the industry norm of being encrypted.
But not all FTP providers are created equal, and not all providers support
encryption. We must thus keep an eye out for FTP services that offer
encryption.
Page 25 of 149
❖ FTP performs both sending and receiving huge files over a network, or
two actions. The maximum size of the file that may be delivered is 2GB,
though. Additionally, you are unable to send transfers to numerous
receivers at once.
❖ Clear text transmission of passwords and file contents makes unauthorized
listening possible. It is therefore extremely possible for attackers to use a
brute strength assault to attempt to guess the FTP password.
SMTP Protocol
• Email is sent and received via SMTP, which is occasionally used in conjunction
with IMAP or POP3 to handle incoming messages. SMTP generally transmits
messages to servers for forwarding. Although SMTP can transmit and receive
mail, it is typically delegated to other protocols because of its poor queuing
capabilities. Although proprietary systems like Gmail use their own servers and
have their own mail exchange protocol, they nonetheless transmit email via the
tried-and-true SMTP standard.
Page 26 of 149
• The SMTP model is of two types: End-to-end method & Store-and- forward
method
Advantages of SMTP
• It enables mail messages sent from one computer to another to be sent across the
internet.
• It is a trustworthy way to communicate. It resends unsuccessfully sent messages
until the recipient gets them.
• Additionally, it enables bulk email marketing, which enables the simultaneous
sending of emails to a huge number of recipients.
PPP Protocol
Page 27 of 149
Components of PPP
▪ Encapsulation Component
▪ Link Control Protocol
▪ Authentication Protocols
▪ Network Control Protocols
Page 28 of 149
• Some server hardware decisions you will need to make include the following:
• Another implication could be that the machine has special hardware designed for
servers that are more reliable than normal computer hardware, plus additional
monitoring tools that are useful for managing/maintaining/monitoring servers but
completely useless for normal computers (Generally) computer. Tower servers,
rack servers, and blade servers are the three types of server hardware available.
Page 29 of 149
Rack Servers
• A rack server, also known as a rack server, rack server, or rack computer, is a
computer designed to fit in a rectangular structure called a server rack.
• Advantages of server racks include space savings in rack servers, increased
expandability, maximum airflow when combined with cooling systems, and ease
of routine computer maintenance and diagnostics. put them out. Rugged rack
servers are often used to support military and industrial applications.
Page 30 of 149
Page 31 of 149
Tower Servers
Page 32 of 149
single tower rather than spread across several workstations. However, they could
need extensive cabling in addition to a personal display and a KVM for
administration.
• Since tower servers have the processing ability to handle a range of activities,
from managing corporate networks to general database administration, small
organizations typically choose them. While Dual CPU (two-socket) Tower
Servers offer a wider range of functionality to support more demanding
operations, Single CPU (one socket) Tower Servers are a more cost-effective
solution to handle basic office workload.
• Component density is lower than other servers due to the simplified architecture.
Tower Servers become simpler to cool as a result, lowering the risk of damage
from overheating.
• Tower Servers may be added in an endless number to a current network and are
easily recognized on the network. Businesses, for instance, may easily add more
servers to accommodate growth or rising demand.
• Customisable / upgradable. Tower Servers are easy to update if new features are
needed. Alternatively, you may configure your server to precisely meet your
requirements based on those demands.
• Compared to rack servers, tower servers are quieter. Again, this is a result of a
lesser frequency and less fans.
Blade Servers
• Blade servers are designed to overcome the space and energy constraints of a
typical data centre environment. Blade enclosures, also called enclosures, serve
the power, cooling, networking, and management needs of each blade. Each blade
server in an enclosure can be dedicated to one application.
Page 33 of 149
• Basic components of server and personal computer hardware. Of course, they all
start from the motherboard. A system that connects all the organs of the human
body and communicates information between them. The central processing unit is
the brain.
• The nervous system is pictured as the main board, and the brain is unable to
separate the pulsing electrons that make up the human body into meaningful data,
instructions, and rules and transfer them to other components as needed. works
when it's impossible to remember keys or general knowledge. Use the user manual
to your advantage. As a result, every server, computer, and other device has a
memory device. The static or persistent storage component is the final crucial
element. This memory is a hard disk or other type of hard disk storage that is
present in computers. Use a man as an example; it's comparable to someone
holding a notebook in their hand. Refer it if necessary. These are the distinctions
between the hardware of servers and other computers.
Page 34 of 149
• Software that controls computer operations and guides program handling (as
by assigning storage space in memory and controlling input and output
functions)
Page 35 of 149
Security: In order to safeguard user data, the operating system employs password
protection. It also guards against unwanted access to applications and user data. However,
in order to use external functionality, we must install virus protection software.
Control over system performance: The operating system keeps track of the
configuration of the entire system to aid in performance improvement. It also keeps track
of how quickly the system responds to service calls so that it can get a full picture of the
system. Through the provision of critical data required for problem-solving, this can assist
in enhancing performance.
Job Accounting: Operating systems always keep track of time and resources that are
used by various tasks and users, this information can be used to track resource usage for a
particular user or a group of users.
Error detecting aids: Operating systems continuously monitor the system, enabling
us to both identify flaws and prevent computer system failure.
Processor Management: The OS controls which programs access the CPU first and
how long each process must remain in the multi - programming environment to do its
work. It's known as process scheduling.
Page 36 of 149
File Management: For easy navigation and use, a file system is organized into
directories. These folders include additional directories and files.
Page 37 of 149
• The system will take less time overall to complete all the programs.
• Multiple users can share the Batch Operating System.
Page 38 of 149
• Each process is given an equal amount of time, which means that each process
has an equal chance of succeeding.
• Most of the time, the CPU will be busy, which is a good thing.
Page 39 of 149
Page 40 of 149
Page 41 of 149
• Hard Real-time: In this case, even a minor delay might result in significant
change. As a result, when time is of the essence, we employ Hard Real-time.
• Soft Real-time: The time limitation is not as critical here, but we are dealing with
real-time data.
Microsoft Windows: Since the 1980s, the Windows operating system has gone through
various iterations and upgrades (including Windows 95, Windows Vista, Windows
7/8/10, and so on). Microsoft Windows is a popular operating system that comes standard
with most new PCs. Microsoft continues to focus on enhancing its customers' experience,
hardware, and software with each new Windows update or release, making Windows
more accessible and simpler to use.
Microsoft Windows has a control panel, a desktop and desktop assistant, disk cleanup, an
event viewer, and other features. Many customers favor Microsoft Windows because it is
said to be compatible with a wide range of other software. Because Microsoft develops
many computer programs, they work best on Microsoft Windows.
Page 42 of 149
Apple macOS: Apple's macOS competes head-to-head with Microsoft Windows. Both
macOS and Windows are instances of proprietary operating systems, which denote that
the business created, developed, and is now selling its own OS. They are created and
marketed by the businesses; users are not supposed to mess with or modify them. The
exclusive macOS and OS X operating systems, the first of which was released 20 years
ago, power Apple and Macintosh computers. There are also earlier iterations or revisions,
such as:
Kodiak (OS X 10 Beta)
Lion (OS X 10.7)
Page 43 of 149
Google's Android OS: Based on the Linux operating system and other free and open-
source software, Google and other businesses use this OS to power their Android
smartphones and tablets. The main operating system for Google's mobile devices,
including tablets and smartphones, is Android. Since its debut as a competitor to Apple's
iOS for smartphone users, Android has grown in popularity and is still growing thanks to
new upgrades and intriguing features.
Page 44 of 149
Linux Operating System: Linux is distinct from Windows and Apple in that it is a
family of open-source systems rather than a proprietary one. In other words, it is open to
modification and distribution. Although it may not be the most well-known option on our
list, Linux is free and has a variety of open-source variants. Linux is well-liked because
it's simple to customize and gives users who know how to use it a wide range of
possibilities. Linux is a great option if you know how to alter and work with operating
systems. And if you find programming and back-end work intriguing, it could be a good
idea to get a Linux machine and start playing around with it.
• A web server is software and hardware that responds to client requests over the
World Wide Web using HTTP (Hypertext Transfer Protocol) and other protocols.
A web server's primary function is to show website content by storing, processing,
and distributing webpages to users. Web servers, in addition to HTTP, support
SMTP (Simple Mail Transmission Protocol) and FTP (File Transfer Protocol),
which are used for email, file transfer, and storage.
• Web server hardware is linked to the internet and allows data to be transferred
with other connected devices, whilst web server software regulates how a user
Page 45 of 149
accesses hosted content. The web server process is an example of the client/server
concept. Web server software must be installed on all machines that host websites.
• Web server software is accessed via website domain names and guarantees that
the site's content is delivered to the requesting user. There are various components
on the software side, including at least an HTTP server. The HTTP server
understands HTTP and URLs. A web server is a machine that holds web server
software as well as other website-related items such as HTML texts, pictures, and
JavaScript files.
• When a web browser, such as Google Chrome or Firefox, requires a file housed
on a web server, the browser will send an HTTP request to the server. When the
web server receives the request, the HTTP server will accept it, retrieve the
content, and provide it to the browser through HTTP.
• More specifically, when a browser requests a page from a web server, several
actions will occur. First, a URL will be entered into a web browser's address bar.
The IP address of the domain name will then be obtained by the web browser
either by translating the URL through DNS (Domain Name System) or by
searching in its cache. This directs the browser to a web server.
There is many different web server software are available and some of
different web server software include Apache http server, Apache tomcat
server, Lighttptd server, Jigsaw server:
Page 46 of 149
• Apache http server: The Apache HTTP Server is a free and open-source web
server that distributes online content across the internet. It is often referred to as
Apache, and it soon became the most used HTTP client on the web following its
inception. It is often assumed that the term Apache comes from its development
history and method of improvement through patches and modules, although this
was corrected in 2000. The term was discovered to have arisen from the Native
American tribe's reverence for its tenacity and longevity.
• Apache tomcat server: Apache Tomcat is a web server. It enables users to run
Servlet and JAVA Server Pages based web applications. It may function as an
HTTP server. The Tomcat server's performance is inferior to that of the specified
web server. It is a standalone product with its own internal Web server. It may
also work in tandem with other Web servers such as Apache, Microsoft Internet
Information Server, and Microsoft Personal Webserver.
Page 47 of 149
Page 48 of 149
Page 49 of 149
Mozilla Firefox: Mozilla was originally the code name for Netscape Navigator, the
company's initial alligator-like mascot. Mozilla stood for "Mosaic Killer," since Netscape
desired to be the dominant browser, which it was for a while. In 1998, the whole
Netscape Communicator package's source code was made accessible to developers, and
Mozilla.org was established to serve as a clearing house for contributions. With the
assistance of AOL's Netscape business, it was transformed into the Mozilla Foundation in
2003 to give support for open-source initiatives. See also Firefox, Netscape Navigator,
and Netscape Communicator.
Mozilla Firefox is known for its speed. Though the Firefox browser needs a lot of
memory for operating efficiently. It may limit the multiple tasking of computers.
However, it provides better network security. It has advanced security options that protect
your system from spyware and malwares. It has strong popup broker and authentication
protocols which makes it safe from potential attackers using any unauthorized codes.
Further to enhance security users can use enhanced security options like No Script and
Flash block. It enables user to execute advanced code so that certain new features which
can make the browser more Intuitive.
Page 50 of 149
Google Chrome: The open-source Chromium project serves as the foundation for the
Google Chrome Web browser. Google Chrome was introduced in 2008, and it receives
numerous upgrades each year. It is compatible with Windows, Mac OS X, Linux,
Android, and iOS. The Google Chrome browser approaches Web security through
sandboxing. Each open webpage operates as its own process, preventing harmful malware
from influencing other pages (or the computer operating system at large). HTML5 and
cascading style sheets are also supported by the browser.
Google designed Chrome OS, an operating system for Web-based apps, to appear like the
Chrome Web browser. Chrome was the first major Web browser to integrate the search
box with the address bar, a feature that has subsequently been copied by other
competitors. Users may also sign in using their Google accounts, allowing them to sync
bookmarks and open Web sites across various devices. Google established the Chrome
Web Store in 2010, an online marketplace where users can purchase and install Web-
based programs that run within the browser. These programs are accessible as browser
extensions or as website links.
Page 51 of 149
Apple Safari: Safari first appeared in Mac OS X Panther in January 2003, and as of
2021, it had gone through fifteen major versions. The third iteration (January 2007) added
iPhone connectivity through iPhone OS 1, while the Macintosh edition boasted the
quickest browser performance at the time. The fifth edition (June 2010) added a less
distracting page reader, extensions, and development tools, as well as being the final
version for Windows. It gained functionality for Intelligent Tracking Prevention in the
eleventh version (September 2017). The thirteenth edition introduced several privacy and
application upgrades, including FIDO2 USB security key authentication and online Apple
Pay compatibility.
Op
era Mini: The Opera Mini web browser was derived from the Opera web browser.
Opera Mini accesses web pages using the compression proxy server provided by Opera
Software. Before transferring requested web pages to the mobile phone, the compression
server analyzes and compresses them. The compression ratio is 90%, and as a result, the
transfer speed is boosted by two to three times. The pre-processing improves
interoperability with web pages that are not optimized for mobile phones. However,
interactive sites that rely on a JavaScript-processing device do not function properly.
Opera Software announced in July 2012 that Opera Mini has 168.8 million users as of
March 2012. Opera announced 300 million unique Opera Mini active users and 150
billion page views supplied in February 2013. This represented a 25 million gain.
Page 52 of 149
About URL
Page 53 of 149
A URL can optionally include the following information after the domain:
URL history
• Data retention for Web activity has become a major privacy problem. The public
has increasing pressure on search engine and application service providers to be
honest about the information they gather, keep, and sell.
• For example, Google modified its Chrome privacy policy in March 2019. It
mentions that the search engine keeps information locally on your machine in its
basic browser mode. This data comprises browsing history, including URLs of
visited pages, as well as a cache of text, pictures, and other resources from those
pages. Google, on the other hand, captures and stores data for varying amounts of
time.
Page 54 of 149
• Servers are the heart of every data center. These modular, boxy components have
all the computing power required to route and store data for each imaginable use
case.
• Depending on the size of the data center, organizations use blade, rack, or tower
servers. This allows managers to scale up the number of servers as needed,
maintain the hardware effectively, and keep them cool.
• Whether a data center utilizes rack, blade, or tower servers, the fundamental
server hardware components are the same and help to allow concurrent data
processing at any size. Here is a quick reminder of a server's essential components
and how they help move data from point A to point B.
Processor: The logic circuitry that reacts to and executes the fundamental commands
that power a computer is known as a processor (CPU). Given that it interprets the
majority of computer orders, the CPU is regarded as the primary and most important
integrated circuits (IC) chip in a computer. The majority of fundamental operations in
logic, I/O, and arithmetic are carried out by CPUs, which also distribute commands to
other processors and parts of the computer.
Although technically speaking, the central processing unit (CPU) is not the sole processor
in a computer, the terms processor and CPU are frequently used interchangeably. The
graphics processing unit (GPU) is the most prominent example, although a computer's
hard disk and other components also carry out some processing on their own. However,
the CPU is typically considered to be the processor when the phrase is used. PCs,
smartphones, tablets, and other devices all have processors. Intel and AMD are the two
primary rivals in the CPU business.
Page 55 of 149
Motherboard: The primary printed circuit board (PCB) of a computer is called the
motherboard. All components and external peripherals connect to a computer's
motherboard, which serves as its main communications hub.
Virtually all computers, notably desktop and laptop PCs, include motherboards. They link
to chipsets, central processing units (CPU), and memory, among other components. Wi-
Fi, Ethernet, and graphics cards with the graphics processing unit, or GPU, are examples
of external peripherals.
Acer, ASRock, Asus, Gigabyte Technology, Intel, and Micro-Star International are some
of the motherboard makers.
Page 56 of 149
Random Access Memory (RAM): One of the key factors affecting the performance of
your system is computer random access memory (RAM). RAM provides apps with a
location to temporarily store and access data. It saves the data that your computer is now
utilizing so that it may be readily accessible.
You'll need more the more apps your machine is executing. Solid state drives, or SSDs,
are additional crucial parts that will aid in maximizing the performance of your system.
Your system's performance and speed are closely correlated with the amount of installed
RAM. Your system may be sluggish and slow if it lacks insufficient RAM. On the other
hand, installing too much might have little to no extra advantage. There are methods for
determining whether your computer needs extra memory and for ensuring that the
memory you buy is compatible with the other parts of your system. Components are often
made to the best standards possible at the time of manufacturing, but with the
understanding that technology may evolve over time.
Modules for each generation of memory technology are physically distinct to prevent
users from putting incompatible memory. These physical variations are typical across the
memory sector.
Random access memory, or RAM, is one of the most basic components of computers.
RAM is a short-term memory pool where your computer keeps information it needs to
access fast. RAM maintains information readily available so that your processor may
swiftly access it and carry out urgent processing operations without first accessing long-
term storage.
Page 57 of 149
Hard Disk Drive: All digital material is stored on a computer's hard drive, which is a
non-volatile piece of hardware. It stores data like as music, films, photographs,
documents, and program files.
Hard drives are non-volatile, thus even if power is removed, no data is lost. As long as
they aren't destroyed or corrupted, they enable computers to store files and other data for
extended periods of time. n this article, I will cover the different types of hard drives so
you can choose the best for your computer.
Page 58 of 149
Another type of measure for discussing how well network components link to one another
is network connectivity. The structure and composition of the network as a whole are
described by the term "network topology," which is related.
There are several distinct network topologies, such as hub, linear, tree, and star
configurations, each of which is set up in a particular way to ease communication
between computers or devices. Each has advantages and disadvantages about network
connectivity.
• One of the easiest methods to discover a new job or even a new role in your
present firm is to use your network. Why is networking crucial? It frequently boils
down to one word: recommendations.
Page 59 of 149
Power supply: In order to deliver electricity, a power supply must convert one voltage
to another, more practical value. From the output back to the input, power supplies are
created. Since they were created after the amplification stages, it is tempting to consider
them an afterthought; in fact, several commercial goods exhibit this mentality. Realizing
that an amplifier is just a modulator that regulates the energy flow from the power supply
to the load is crucial. The most exquisitely constructed amplifier will be worthless if the
power source is subpar and does not have enough energy to fulfill the peak demands of
the amplifier.
Page 60 of 149
GPU: For both consumer and corporate computers, the graphics processing unit, or
GPU, has emerged as one of the most significant categories of computing technology.
The GPU, which was created for parallel processing, is employed in a variety of tasks,
including generating images and videos. Despite being best recognized for their gaming
capabilities, GPUs are being used in artificial intelligence and creative output (AI).
GPUs were first created to speed up 3D visual rendering. They improved their capacities
as they become more adaptable and programmable. This made it possible for graphic
designers to produce more eye-catching visual effects and realistic scenarios using
cutting-edge lighting and shadowing methods. In order to significantly speed up extra
tasks in high performance computing (HPC), deep learning, and other areas, other
developers also started to take advantage of GPU capability.
• Although the phrases graphics card (or video card) and GPU are sometimes used
interchangeably, there is a little difference between the two. Like how a
motherboard houses the CPU, a graphics card is an add-in board that houses the
Page 61 of 149
GPU. The vast array of parts needed for the GPU to operate and link to the rest of
the system are also included on this board.
• There are two main categories of GPUs: integrated and discrete. An integrated
GPU is built right into the CPU, rather than being provided on a separate card. An
individual chip installed on its own circuit board and commonly connected to a
PCI Express slot is known as a discrete GPU.
Page 62 of 149
Page 63 of 149
• Applications that have been published operate virtually but have the same features
as those that have been installed locally.
• Application remoting is the technique of distributing published programs, in
which the application is physically placed on a different device, such a server in a
data center, and virtualization software displays it on an endpoint. Depending on
the endpoint operating system being used, this software, such as Citrix XenApp or
VMware Horizon, can offer published apps for both Windows and Linux.
• Users can use published applications in the same manner they use native ones to
start and access them. IT can distribute published apps to consumers' Windows,
Linux, and mobile devices. Users of Windows PCs can access the published
programs via shortcuts or the Start menu. Although published apps are more
prevalent with RDSH, both Remote Desktop Session Host (RDSH) and VDI
technologies support application remoting.
Page 64 of 149
1.2 Identify and define the types of DNS and the uses of it, with
clarifications on how domain names are structured. Review the
effect of search engines on website performance. Provide evidence-
based support for improving a site’s index value and rank of the
Hospital Management System (HMS) through search engine
optimization.
• The public IP addresses linked to the names of the websites that an IP address
directs a user to are stored in a database on a computer known as a DNS server.
DNS functions as an online phonebook. The DNS determines the correct IP
address whenever users input domain names like Fortinet.com or Yahoo.com into
the address bar of web browsers. The device is directed to the proper location to
access the site's data by the IP address of the website.
• When the DNS server discovers the right IP address, browsers use it to transfer
data to origin servers or edge servers of content delivery networks (CDNs). The
user will then be able to view the website's information. Finding the matching IP
address for a website's uniform resource locator is how the DNS server begins the
procedure (URL).
DNS recursor: The DNS client sends the query to the DNS recursor, which is also
referred to as a DNS resolver. The correct IP address is then discovered by interacting
with other DNS servers. The resolver then behaves as a client itself after retrieving the
request from the client. While doing this, it issues requests to the root nameservers,
authoritative nameservers, and top-level domain (TLD) nameservers.
Root nameservers: The DNS root zone of the internet is served by the root nameserver.
Its responsibility is to respond to queries for records located in the root zone. When a
request is made, it replies with a list of the trustworthy nameservers associated with the
relevant TLD.
Page 65 of 149
TLD nameservers: The second-level domain's IP address is kept within the TLD name
by a TLD nameserver. After that, it releases the website's IP address and sends the request
to the nameserver for the domain.
Authoritative nameservers: The genuine response to your DNS query comes from an
authoritative nameserver. An authoritative nameserver can be either a master server, also
known as the primary nameserver, or a slave server, also known as the secondary
nameserver. The zone records' original copies are kept on the master server, whereas the
slave server is a precise duplicate of the master server. It distributes the burden on DNS
servers and serves as a fallback in case the primary server malfunctions.
Uses of DNS.
DNS is used to underlie many other types of Internet communication in addition to
transforming domain names into IP addresses. like.
• DNS has altered during the past two decades. Thanks to advanced traffic routing
features offered by next-generation DNS systems like NS1, DNS has found new
applications.
• Migration of data centers and clouds - Managing traffic from on-premises to cloud
resources.
• Internet traffic management involves preventing gridlock and directing traffic in
the most effective way to the most appropriate resource.
• Geographical routing: Users should be routed to the nearest resource based on
their location and where they are in relation to it.
Page 66 of 149
• Root Level
• Top Level Domains
• Second Level Domains
• Sub-Domain
• Host
Page 67 of 149
In the DNS hierarchy tree, the root zone is at the top. The root zone's name server is the
root name server. It responds to queries for records in the root zone and to queries for
additional information by supplying a list of authoritative name servers for the relevant
TLD (top-level domain). The root nameservers are crucial because they are the initial
stage in domain name resolution. The DNS root zone is served by these authoritative
nameservers.
Top level domains are the next tier in the DNS system. There are now a lot of TLDs
accessible. As you can see, there are two subcategories for TLDs. Geographic hierarchy
and organizational hierarchy are these. Let's examine each one closely.
Domain Purpose
com Commercial organizations
edu Educational institutions
gov Government institutions
mil Military groups
net Major network support centers
org Nonprofit organizations and others
int International organizations
The Second Level Domains make up the next level of the DNS system. This is the
domain that follows the tld exactly. The primary component of the domain name is this. It
may change depending on the buyer. As the tlds, there are no restrictions here. When a
domain becomes accessible, anyone can buy it. The best choice is the same 2nd level
name with other tlds if the domain is currently unavailable.
Page 68 of 149
Sub-domain
• The following level in the DNS hierarchy is the sub-domain. The domain that is a
subdomain of the main domain is referred to as the sub-domain. The root domain
is the only domain that is not also a subdomain. Think of two areas. Examples a
and b are websites. In this case, example.com is the primary domain, while both
other domains are subdomains of the com top-level domain.
Hosts
• A host is a computer or other device on a network that connects to other hosts
(also known as a "network host"). On a network, clients and servers are hosts that
transmit or receive data, services, or applications. Hosts seldom contain
intermediate network components like switches and routers, which are referred to
as nodes. While a host needs an IP address, a node is a more general term that
refers to everything connected to a network. In other words, network nodes are
hosts until they require an IP address in order to operate, whereas all hosts are
network nodes.
• On a TCP/IP network, every host has a host number that, when paired with a
network identification, yields a unique IP address for that host. At the Open
Systems Interconnection (OSI) architecture, communication between hosts is
handled via protocols in the transport layer, commonly referred to as Layer 4.
Users can communicate between hosts using the User Datagram Protocol and the
Transmission Control Protocol (TCP) (UDP).
Page 69 of 149
▪ metadata for robots It implies that a search engine searches for the
meta robot’s name when it crawls a page. This tag informs them if they
can index this page or not.
▪ Robots.txt is a crucial tool for enabling or disabling search engines'
mass crawling of websites. It is kept in the website's root directory.
Page 70 of 149
▪ The art and science of search engine optimization (SEO) involves raising a page's
search engine ranking in Google and other search engines. A website's traffic may
rise as a result of ranking better in search results as this is one of the primary ways
users find material online.
▪ The results page in Google and other search engines frequently has sponsored
advertisements at the top of the page, followed by the standard results, or what
search marketers refer to as the "organic search results." To distinguish it from
traffic obtained through sponsored search, traffic obtained through SEO is
frequently referred to as "organic search traffic." Pay-per-click (PPC) and search
engine marketing (SEM) are other names for paid search (PPC).
Page 71 of 149
Search engines like Google and Bing utilize bots to move between websites, acquire
information about them, and index them in order to crawl internet pages. Think of the
index as a massive library where a librarian might quickly call up a particular book (or
web page) to help people find it.The algorithms that look at sites in the index while taking
into account thousands of ranking factors or signals then decide in what order pages
should show in the search results for a certain query. The librarian in our imagined library
has read every book there and knows which one would offer the answers to our issues.
We may consider the various user experience components to be substitutes for our SEO
success factors. This is how search engine bots evaluate how well a website or web page
can deliver the results a user is looking for.
Unlike paid search advertising, greater organic search rankings cannot be purchased, thus
SEO experts must put in the required work. We are here in answer.
In our Periodic Table of SEO Factors, the criteria are divided into six main groups and
given weights depending on their relative importance to SEO. For instance, although
content quality and keyword research are essential elements of content optimization,
crawlability and speed are significant site design characteristics.
The freshly updated SEO Periodic Table also includes a list of Toxins that impair SEO
best practices. These are shortened versions of techniques or methods that, in the past,
when search engine algorithms were less complex, would have been enough to guarantee
a high rank. They could even just momentarily work right now.
We also have a new niches section where we go into great detail on the SEO success
criteria for three key topics: local SEO, news/publishing, and e-commerce SEO. Even
while our basic SEO Periodic Table will provide you the best practices, knowing the
nuances of SEO for each of these Niches will help us succeed in search results for a small
business, food blog, and/or online store. The goal of the search algorithms is to provide
consumers with an effective search experience by surfacing reliable, relevant pages. If we
optimize our site and content with these factors in mind, our pages could rank higher in
the search results.
Page 72 of 149
For each query, search engines like Google utilize an algorithm or set of rules to decide
which sites to display. To decide the ranks of their SERPs, these algorithms, which have
become incredibly complicated over time, consider hundreds or even thousands of
distinct ranking indicators. Search engines, however, base their evaluation of a site's
quality and where it should rank on three key metrics:
Links: The ranking of a website in Google and other search engines is significantly
influenced by links from other websites. Due to the fact that website owners are unlikely
to link to low-quality websites, a link can be viewed as a vote of approval from other
websites. In the view of search engines, websites that receive links from several other
websites gain authority (referred to as "PageRank" by Google), particularly if the
websites linked to them are also authoritative.
Content: Search engines examine a webpage's content in addition to its links to evaluate
if it would be relevant for a particular search query. Making content that is focused on the
keywords that users of search engines are looking for is a big aspect of SEO.
Page structure: Page structure makes up the third essential element of SEO. Because
HTML is the language used to create webpages, the way the HTML code is organized can
affect how well a search engine understands a page. Site owners may take steps to
enhance the SEO of their website by include pertinent keywords in the page's title, URL,
and headers and by ensuring that a site is crawlable.
Page 73 of 149
pieces of content. Because Google and other search engines place a premium on
high-quality content, it's important to research what content is already out there
and create a compelling piece of content that provides a positive user experience
and has a chance of ranking higher in the search engine results. Good content also
has a greater chance of being shared on social media and attracting links.
• Link building - Because links from external websites (called "backlinks" in SEO
parlance) are one of the core ranking factors in Google and other major search
engines, obtaining high-quality backlinks is one of the main levers that SEO has.
This can involve promoting good content, reaching out to other websites and
building relationships with webmasters, submitting websites to relevant web
directories, and getting press to attract links from other websites.
• Site architecture optimization - External links are not the only thing that matters
for SEO, internal links (the links within one's own website) play a large role in
SEO as well. Thus, a search engine optimizer can improve a site's SEO by making
sure key pages are being linked to and that relevant anchor text is being used in
those links to help improve a page's relevance for specific terms. Creating an
XML sitemap can also be a good way for larger pages to help search engines
discover and crawl all of the site's pages.
• Semantic markup - Another SEO strategy that SEO experts utilize is optimizing
a website's semantic markup. Semantic markup (such as Schema.org) is used to
Page 74 of 149
describe the meaning behind the content on a page, such as helping to identify
who the author of a piece of content is or the topic and type of content on a page.
Using semantic markup can help with getting rich snippets displayed in the search
results page, such as extra text, review stars and even images. Rich snippets in the
SERPs doesn't have an impact on search rankings, but can improve CTR from
search, resulting in an increase in organic traffic.
URL Optimization: Website URL structure should be short and keyword rich; Dynamic
URL's structure should be avoided. First, 3 to 5 words in a URL structure is more
important as it contributes more weight to the website. Using keywords in a URL can be
referred as one of the best practices. Proper structuring of URL with specific keywords
will definitely give you a good page rank in search engines like Google and others.
Meta Tags: Meta Tags is the most important factor of On Page SEO. It has four
fundamental components: Meta Title, Meta Description, Meta Keywords, and Meta
Robots Tag.
While the Meta Title is used to describe or convey the contents of a page on to the search
engines and users, Meta Description is a short description that tells the search engines and
users about page concepts. Meta Robots is a tag that tells the search to follow a specific
page in the website, and Meta Keywords describe the list of keywords and their
relevance.
Header Tags: Header Tags are pieces of HTML Code that allow us to make certain
keywords stand out on a web page. It tells the user what the page is about and also
determine whether continue to read it or not. It also helps to improve search engine
placement.
Page 75 of 149
As a web development company, Spec bee ensures effective and result-oriented SEO
services. Team up with our vast experience in SEO and other development services;
generate more web-traffic with your page rank going higher in search engines.
2. Google’s algorithm is getting smarter all the time, but it still needs
help.
An SEO article is optimized for search so that it can help search engines better understand
what the topic is about (see Google’s Webmaster Guidelines for more on this). This
increases the chance it will be considered relevant to a query and show up on Page 1 of
the search results.
Search Engine Optimization is about helping search engines understand and present
content.
Page 76 of 149
Creating compelling and useful content will likely influence your website more than any
of the other factors discussed here. Users know good content when they see it and will
likely want to direct other users to it. This could be through blog posts, social media
services, email, forums, or other means. Organic or word-of-mouth buzz is what helps
build your site’s reputation with both users and Google, and it rarely comes without
quality content.
Page 77 of 149
That said, before you write an article, make sure you have at least one of the following:
From Google’s SEO Starter Guide, here are two pieces of sage advice:
Expertise and authoritativeness of a site increases its quality. Be sure that content on your
site is created or edited by people with expertise in the topic. For example, providing
expert or experienced sources can help users understand articles’ expertise. Representing
well-established consensus in pages on scientific topics is a good practice if such
consensus exists.
Page 78 of 149
Also:
Avoid:
3 Writing sloppy text with many spelling and grammatical mistakes.
3 Awkward or poorly written content. …
For instance, Bruce Clay’s WordPress SEO plugin helps content creators get SEO data
before, during and after the writing process. So articles are optimized with best practices
for a specific search query (not blanket best practices that aren’t that useful).
In its SEO Starter Guide, Google explains the very basics of keyword research:
Think about the words that a user might search for to find a piece of your content. Users
who know a lot about the topic might use different keywords in their search queries than
someone who is new to the topic. For example, a long-time football fan might search for
[FIFA], an acronym for the Fédération International de Football Association, while a new
fan might use a more general query like [football playoffs]. Anticipating these differences
in search behavior and accounting for them while writing your content (using a good mix
of keyword phrases) could produce positive results.
You want to have at least one primary search term you optimize your article with, and up
to two secondary keyword phrases. Does that mean you have to use more than one? No.
But it can be an advanced strategy for some.
Page 79 of 149
At this point, it’s worth noting that an article will be naturally optimized when you write
it. That’s because if you write enough (quality) words on a subject, the words you use will
describe the content well.
So why optimize? To help your great content better compete in the search results. When
you use specific keyword queries in your content, it can signal to Google that your
content is more relevant to the searcher’s query than other content like it out there.
For more, see our article on optimizing page content, and try our free keyword suggestion
tool to get started.
Once you have your keywords, you can begin a competitive analysis. Using the right SEO
tools, you can find out which pages are ranking in the top spots on Google for your search
query.
This is where things get good. Armed with that data, you are not blindly following
general SEO best practices (<It must be 1,000 words!=) for your article. You are
optimizing specifically to be on par with 4 or even exceed 4 the top results for that
keyword.
For example, Bruce Clay’s WordPress SEO plugin examines your competition and
presents data such as:
Page 80 of 149
You want your keywords to show up naturally in the content. So the first step is to
identify where you might be able to switch up a few words or phrases with your key
terms.
Rule No. 1: Always make sure it reads well. Slapping your keywords any old place
without regard to grammar can make your article look spammy to Google and annoy
readers.
Optimize content for your users, not search engines … Designing your site around your
visitors’ needs while making sure your site is easily accessible to search engines usually
produces positive results.
Avoid:
3 Inserting numerous unnecessary keywords aimed at search engines but are annoying or
nonsensical to users. …
In general, you want your keywords to be evenly distributed throughout the content from
top to bottom. For more on this, see our in-depth article on how to use keywords in
content, and check out our handy and printable.
Keep in mind that if you are accepting guest posts, you should hold that content to the
same standards as the content you produce in-house. Not doing so can have serious
implications for the quality of your site.
Page 81 of 149
As an example, guest posts done wrong can cause a site to get hit with a manual penalty
from Google.
Using Google Analytics or an SEO tool like our WordPress SEO plugin, you can view
how an SEO article is performing in search. You’ll want to look at things like:
• The term "web technologies" describes the use of markup languages in computer
and device communication. It involves Utilizing hypertext markup language, it is
communication over the internet and the creation, delivery, or management of
web content (HTML).
A web page is an HTML (hypertext markup language) document that is published
online. It is said to have reduced the globe to a small town where people and
objects may interact with each other without difficulty. Information that was
previously unavailable or could have been challenging to discover is now
accessible thanks to the www.
Page 82 of 149
Web professionals refer to the two main non-design aspects of building Web
sites4authoring markup and coding4as "web development." Web development
can employ content management systems (CMS) to make content revisions easier
and more accessible to users with just minimal technical skills.
For bigger businesses and organizations, teams of web developers may number in
the hundreds and build websites utilizing standardized methods like Agile
procedures. Smaller companies may just require a single permanent or contract
developer, or they may assign extra staff to positions that are comparable to the
developer, such as graphic designer or information systems technician. Web
development may include departmental collaboration as opposed to being the
responsibility of a certain department.
• Protocol
• Internet Protocol (IP) Address
• HTTP
Page 83 of 149
• XML
• Gateway
• API
➢ Browsers.
➢ HTML and CSS.
➢ Programming Languages.
➢ Frameworks.
➢ Web Servers.
➢ Databases
➢ API
➢ Protocols.
➢ Lastly, data Formats.
❖ Browsers.
After making a request, browsers provide us information that we can comprehend. Think
of them as the interpreters of the internet. Some of the most well-liked are listed below:
Examples: The company's most popular browser right now is Google Chrome.
Page 84 of 149
• The WYSIWYG editors that are still in use today were developed by WordPress
using PHP. It is also used by Facebook, Wikipedia, and other well-known
websites.
❖ Java
The object-oriented, class-based, general-purpose programming language Java was
created to have fewer implementation requirements. It is an application development
platform for computers. Java is consequently quick, safe, and trustworthy. For creating
Java applications, it is widely used in laptops, data centers, game consoles, scientific
supercomputers, and mobile devices.
❖ JavaScript
Along with HTML and CSS, the computer language known as JavaScript, or JS, is one of
the foundational elements of the World Wide Web. 98% of websites will utilize
Page 85 of 149
JavaScript for client-side webpage behavior by the year 2022, frequently including third-
party libraries.
❖ C++
❖ C#
Frameworks:
Web development frameworks are a good place to start for tools that a developer may
utilize to start working right away rather than undertaking simple or boring jobs.
Examples:
One of the most recent web technologies, Angular, is made exclusively for creating
dynamic online apps. Without the usage of other frameworks or plugins, you may quickly
construct front-end-based apps using this framework.
Page 86 of 149
To build real-time web apps for several platforms, use Meteor JS, which is developed in
Node.js. With Meteor JS, the framework for building straightforward websites for
personal usage truly shines out
Java EE
Previously known as Java Platform, Enterprise Edition and Java 2 Platform, Enterprise
Edition, Jakarta EE is a collection of standards that adds enterprise capabilities like
distributed computing and web services to Java SE.
Page 87 of 149
Asp.Net
Dynamic web pages are developed using the open-source ASP.NET framework for
server-side web applications. For programmers to construct dynamic websites,
applications, and services, Microsoft invented it. The technique is known as Active
Server Pages Network Enabled Technologies.
Web Servers:
Web servers provide client and server-to-client communication. The most popular servers
are as follows
Page 88 of 149
Databases:
Both relational and non-relational databases, such as MongoDB, can be used. Web
applications store data that is used to show on web pages in databases of all types. The
most popular databases are shown below.
Protocols:
Protocols are the instructions on how to transfer data back and forth between computers
and other devices.
• HTTP
Each website may reach the browser because of this protocol. The protocol asks Google's
server for the website, which is then returned together with the website's HTML, CSS,
and JavaScript.
• DDP
establishes a reliable connection between the client and the server using WebSocket.
Therefore, you receive real-time website changes without having to reload the browser.
• REST
This protocol, which is mostly used for APIs, provides common methods like GET,
POST, and PUT that enable information sharing between apps.
Page 89 of 149
Data Formats:
A format for storing and transmitting data is called JSON, or JavaScript Object Notation
(just like XML). It is quickly overtaking all other data formats in popularity.
XML: Previously the most widely used data format, it is now mostly utilized by
Microsoft systems.
Web services, web resources, and web APIs may all be created more easily with the aid
of a software framework known as a web framework (WF) or web application framework
(WAF). A standardized process for developing and delivering web applications on the
Internet is provided by online frameworks. Web frameworks make an effort to lighten the
administrative load brought on by typical web development duties. Many web
frameworks, for instance, come with libraries for session management, templating
frameworks, and database access, and they usually promote code reuse. They apply to
static websites as well, despite the fact that they typically concentrate on the development
of dynamic websites.
Examples:
▪ ASP.NET
▪ A server-side web application framework that is open-source and used to
build dynamic web pages is known as ASP.NET. For programmers to
construct dynamic websites, applications, and services, Microsoft invented it.
The technique is known as Active Server Pages Network Enabled
Technologies.
Page 90 of 149
▪ Java EE.
▪ Jakarta EE, formerly known as Java Platform, Enterprise Edition and Java 2
Platform, Enterprise Edition, is a set of standards that enhance Java SE with
enterprise features including distributed computing and web services.
▪ WebObjects
• Web2py
▪ The open-source Web2py framework for web applications was developed using
Python. Web2py enables Python programmers to create dynamic online content.
• Catalyst
• Rails by Ruby
▪ Ruby on Rails is a framework for server-side web applications that was developed
in Ruby and distributed under the MIT License. Databases, online services, and
Page 91 of 149
• Django
▪ Django is a model-template-views-based web framework that is free and
open-source that uses Python. The Django Software Foundation, a private
company registered in the US as a 501 non-profit, oversees keeping it up
to date.
• Zend Framework
▪ The Laminas Project is a PHP 7-based, open source, object-oriented web
application framework that is covered under the New BSD License.
Basically, the framework is a collection of expert PHP-based programs.
• Symfony.
▪ A collection of reusable PHP component libraries and a free and open-
source PHP web application framework are both known as Symfony. On
October 18, 2005, it was made available as free software under the MIT
license.
• Cake PHP
▪ An open-source web framework is Cake PHP. It is designed in PHP, using
the model-view-controller design pattern, is based on the ideas of Ruby on
Rails, and is available under the terms of the MIT License.
Maintaining Consistency
Maintaining a site's color, layout, and font somewhat consistently is a smart idea. The
transition from one page to the next on your website should be seamless. To ensure
consistency, your site's typeface, color, and layout structure should essentially be the
Page 92 of 149
No Stock Photography
The glamorous photos no longer pique people's curiosity. They want a far more accurate
representation of what a product represents or portrays. Stock images on a plain white
backdrop are categorically out of style. People are searching for individuality and stories.
On your website, only use photos that have meaning.
Now, designers can make responsive layouts, which are known to support a range of
image sizes and resolutions. Designers can now create graphics that are mobile-optimized
and perfect for tiny devices, and they can create copies in greater resolution for bigger
screens. For varying picture sizes based on screen width, you may utilize JavaScript and
hit access files.
Page 93 of 149
the information they're looking for. The navigation system needs to be simple to use and
understand.
Usability
It's critical to remember that a website's usability, not its aesthetic design, determines its
success. If you want to create a website that will generate revenue, it is important to
employ a user-centric design. A website's usability is crucial to its success because if
consumers can't utilize it, it's pointless to have one at all. Using eye-catching 1-2-3-done
steps or sizable buttons with eye-catching visual effects is completely acceptable. The
user must be able to easily see every feature that is offered. Effective user interface design
includes feature exposure. Visitors ought to be able to easily engage with the system.
The Chrome browser comes with a complete set of developer tools called Chrome
Developer Tools. With the use of these technologies, you may create better websites more
rapidly and edit web pages in real time. But you can still make use of Developer Tools
even if you're not a developer.
jQuery.
A quick, compact, cross-platform JavaScript library that aims to streamline the frontend
procedure emerged. jQuery gave developers more freedom to add plug-ins, create
animations, or even just navigate around documents by abstracting a lot of the
functionality that was often left for them to figure out independently.
And it’s obviously effective jQuery was by far the most widely used JavaScript library in
2015, having been installed on 65% of the top 10 million most popular websites on the
internet at the time.
GitHub.
Page 94 of 149
• You may examine any modifications you've made to your project by rolling it out
with the service, or even return to a prior state (making pesky mistakes a thing of
the past). There are several explanations for why GitHub is essential to
developers. In addition to offering a variety of additional features like bug
tracking, feature requests, task management, and wikis for each project, the
repository hosting service also offers a thriving open-source development
community that makes team collaboration simple as pie.
• Now is the ideal moment to sign up because many employers will want well-
honed Git abilities. Additionally, it's a terrific opportunity to get engaged and
learn from the best because there are so many open-source projects to work on.
Code Pen.
• An online community called Code Pen allows users to test and display HTML,
CSS, and JavaScript code snippets. Developers may write and test code snippets,
known as "pens," in this online code editor and open-source learning environment.
Sass.
• Learn about the CSS pre-processor, a tool that will enable you to create more
manageable, future-proof code while also writing less CSS (keeping it DRY).
Sass, an eight-year-old open-source project that essentially established the genre
of contemporary CSS pre-processors, is perhaps the most well-known of them all.
Sass's mixture of variables, nesting, and mixings will produce simple CSS when
compiled, making your stylesheets more legible while initially being a little
challenging to understand.
Angular.js.
• enters an open-source web framework. With Google's AngularJS, you can expand
the HTML syntax in your application, creating a more expressive, legible, and
quick-to-develop environment that would not have been possible with only
HTML.
Although some feel that this type of data binding results in a cluttered, non-
separated code, we still believe it is a vital ability to have in your frontend
toolbox. The project is not without its detractors.
Page 95 of 149
• An application program known as a web application (Web app) is one that is kept
on a distant server and made accessible through the Internet by means of a
browser interface. Web services, which are what most websites have but not all,
have web apps. Any component of a website that provides a service to the user is
referred to as a web app, according to Jarell Remick, editor of Web App Storm.
Everyone, from individuals to businesses, has access to web apps, which may be
created for a range of functions. Webmail, online calculators, and online stores are
a few examples of frequently used web apps. All browsers can access most Web
applications; however, some are exclusively available in a certain browser.
• Easier To Develop
▪ Businesses who wish to create both a website and a mobile application
must do it separately, which may call for the use of extra developers and
resources. Additionally, if you want to go native and have your app
available on both the Play Store and the Apple App Store, you'll need
additional resources. Web apps deal with these problems by leveraging a
single codebase. This brings up the next issue.
Page 96 of 149
• Easier Maintenance
▪ It is simpler and more effective to upgrade your web application when you
simply need to update the server(s).
• Easy Access
▪ With web apps, it doesn't really matter whether device your users are using
to visit your page4whether they are using computers, tablets, or
smartphones4as they will be able to do so. With any operating system,
your users will be able to utilize the multi-platform website if they have a
reliable internet connection.
• Convenience
• Users can save space on their device by using your web application without
having to download anything if you make it available to them. Some
individuals just enjoy having fewer apps clog up their displays and take up
space. Perhaps we don't give it much attention because our smartphones
provide more and more capacity every year.
• Easier To Develop
• Businesses who want to construct both a website and a mobile app will need to produce two
separate items, perhaps requiring additional developers and resources. Additionally, you'll
need extra resources if you want to go native and want your app to be available on both the
Play Store and the Apple App Store. By utilizing a single codebase, web apps address these
issues. This brings up the following point.
Page 97 of 149
• Easier Maintenance
• It is simpler and more effective to upgrade your web application when you simply need to
update the server(s).
Page 98 of 149
2 Task
About Frontend
The front end of a website is the section that the user interacts with directly. It's also
referred to as the application's 'client side.' Everything that users see directly is included:
text colors and styles, photos, graphs and tables, buttons, colors, and the navigation menu.
The languages used for Front End development are HTML, CSS, and JavaScript. Front-
end developers provide the structure, appearance, behavior, and content of everything that
appears on browser displays when websites, web applications, or mobile apps are opened.
The Front End's major objectives are responsiveness and performance. The developer
must guarantee that the site is responsive, meaning that it works properly on devices of all
sizes. No part of the website should behave abnormally irrespective of screen size.
Frontend Development:
The front end of a website refers to the area that users interact with directly. It is
sometimes referred to as the application's "client side." It covers everything that users see
and interact with immediately, such as button colours, text styles, photos, graphs, and
tables. For front-end development, three languages are used: HTML, CSS, and
JavaScript. Front end developers put into practice the structure, design, behaviour, and
content of everything seen on browser displays when websites, web applications, or
mobile apps are opened. The Front End's primary goals are responsiveness and
performance. The website's developer must make sure that it is responsive, meaning that
it displays properly on all types of devices and shouldn't act strangely depending on the
size of the screen.
Page 99 of 149
• CSS stands for Cascading Style Sheets, which is a simple language meant to make
the process of making web pages presentable easier. Styles can be applied to web
pages using CSS. More crucially, CSS allows you to do so without having to
worry about the HTML code that makes up each web page.
• JavaScript is a well-known programming language that is used to create magic on
websites in order to make them more interactive for users. It's utilized to improve
a website's functionality and run exciting games and web-based software.
• React: JavaScript is used to create the UI development library React. It is
controlled by Facebook and an open-source development community. Despite
being a library and not a language, react is widely used in web development. One
of the most used frontend frameworks for web development, the library was
released in May 2013.
• jQuery: A popular and well-known JavaScript framework and application
development environment is jQuery. It has characteristics that make the job of a
JavaScript application developer much easier and is smaller, faster to load, and
filled with functionality. JavaScript is no longer grafted onto stateless HTML as
an afterthought. From PCs to tablets and smartphones, it is increasingly employed
as the basis and the main engine for web development and application
development.
What is Backend?
• The server-side of a website is called the backend. It also ensures that everything
on the client side of the website functions properly while storing and organizing
data. It is the portion of the website that you are unable to view and use. It is the
part of the program that consumers do not directly interact with. Users indirectly
access the components and features created by backend designers through a front-
end application. The backend also includes tasks like writing APIs, building
libraries, and interacting with system elements devoid of user interfaces or even
systems of scientific programming.
Backend Development:
• The server-side of a website is called the backend. It also ensures that everything
on the client side of the website functions properly while storing and organizing
data. It is the portion of the website that you are unable to view and use. It is the
part of the program that consumers do not directly interact with. Users indirectly
access the components and features created by backend designers through a front-
end application. The backend also includes tasks like writing APIs, building
libraries, and interacting with system elements devoid of user interfaces or even
systems of scientific programming.
PHP: The server-side scripting language PHP was created primarily for building
websites. PHP is referred to be a server-side scripting language since it executes code on
the server.
Python: Python is a programming language that enables rapid work and more effective
system integration.
Node.js: JavaScript code may be executed outside of a browser using the open-source,
cross-platform runtime environment known as Node.js. You must keep in mind that
NodeJS is not a programming language or a framework. Most folks are perplexed and
realize it's a computer language or framework. For creating back-end services like APIs
for web apps or mobile apps, we frequently employ Node.js. Large corporations like
PayPal, Uber, Netflix, Walmart, and others employ it in their manufacturing.
• While both the frontend and backend are essential to the operation of a website,
they different in terms of functionality. Regardless of their differences, they are
like two sides of the same coin. The former refers to what a user sees and interacts
with, while the latter refers to what a user is unable to see. The client-side of an
FRONTEND BACKEND
• Frontend refers to the client side of the application Backend refers to the server
side of the application
• It is the part of the website users can see and interact with It constitutes
everything that happens behind the scenes
• It typically includes everything that attributes to the visual aspects of websites It
generally includes a web server that communicates with database to server
requests that the frontend presents
• It forms the basis of what users can touch and experience on their web browsers It
is the brain of the website that is never visible to the end users
• The essentials of frontend web development include HTML, CSS, and JavaScript
the essential of backend development include Ruby, Python, Java, .Net, etc.…
• Data transferred across the network is formatted and encrypted by the presentation
layer.
• This layer ensures that the data is transmitted in a way that the recipient will
comprehend it and be able to use it effectively and efficiently.
• This layer controls the abstract data structures and permits the development or
exchange of high-level data structures, such as banking records.
• At the transmitter and receiver, this layer performs encryption and decryption,
respectively.
• This layer applies data compression to lower the transmission bandwidth of the
data (the primary goal of data compression is to reduce the number of bits which
is to be transmitted).
• Since different computers employ various encoding techniques, this layer oversees
ensuring interoperability (the capacity of computers to exchange and use
information).
• This layer mostly handles the data display aspect.
• Data compression, or reducing the number of bits used in transmission, is done by
the presentation layer, which also increases data performance.
• Additionally, this layer addresses the problems with string representation.
• The integration of all formats into a uniform format for effective and efficient
communication is another duty of the presentation layer.
• For communication between different systems, this layer encrypts the message
from the user-dependent format to the common format and vice versa.
• The syntax and semantics of the messages are handled by this layer.
• This layer also makes sure that the messages that must be delivered to the top and
lower layers are accurate and presented in a consistent manner.
• The translation, formatting, and transmission of information for processing or
display are also the responsibilities of the presentation layer.
• Users can forward multiple emails using the application layer's feature, which also
offers storage.
• Users can access, retrieve, and manage files on a distant computer using this layer.
• Users can sign on as a remote host.
• This layer gives users access to worldwide data on different services.
• Email, file transfers, results distribution to the user, directory services, network
resources, and other services are all provided by this layer.
• It offers protocols that let computer programs transmit and receive data and
provide consumers useful information.
• It deals with concerns like resource allocation, network transparency, and other
things.
• Users and application processes can access network services through this layer.
• Although it performs application layer functions, the application layer is
fundamentally not a function.
• The shared protocols and interface techniques used by hosts in a communication
network are specified by the application layer, which is essentially an abstraction
layer.
• Application Layer aids in coordinating communication and identifying
communication partners.
• Users can communicate with other software programs through this layer.
• Since the material is presented visually in this layer, consumers are better able to
comprehend it than when it is remembered or shown as binary (0s or 1s).
• By interacting with the operating system (OS), this application layer essentially
further safeguards the data in an appropriate way.
Examples:
• WordPress
• 21 capitals
• Land Rover
• Capital Harvest
• Mastercard
Custom built website Pros:
• specialized to the business
• countless designs
• Updates are always possible
• improved SEO rankings
• adaptable as firms expand
• Highly responsive and mobile-friendly
Custom built website Cons:
• Expensive
• Time-consuming
• The website is dependent on the skill of the developer
• Template Website
3 Task
3.1 Design a suitable web application solution for the given scenario
using PHP, JS and MySQL (Screenshots of important code lines
with proper comments and user interfaces filled with sample data
must be attached to the documentation). Apply a database design
for the proposed system and provide the well normalized database
design of the proposed system. Provide evidence of the design,
multipage website supported with fidelity wireframes and a full set
of client and user requirements.
Functional requirements
Login: Users must be able to sign into the system by entering their username and
password in the login module.
Patient Registration: The front desk staff members have access to add new patients and
their data to the database thanks to permission from the hospital management.
Authentication: The HMS gives front desk staff the ability to create a unique ID for
every patient, which is then placed to the patient's record sheet. The patients can use the
ID during their whole stay in the hospital.
Patient Information: The patient's ID, name (first and last), address, phone number, the
doctor's information, ward name, and medical history are all included in the report that
the hospital administration system generates for each patient.
Room Availability: Additionally, the hospital management system helps with the
creation of reports on the scheduling of wards and rooms, including details on room
availability, bed numbers, vacant or occupied bed details, ward name, staffing, and
operating room scheduling.
Update patient information: Users of the hospital management system are able to
update patient information, including patient bills and records of their medical history.
Erase information: If a user makes a mistake, the hospital management system allows
them to delete the patient's or doctor's information.
Doctor updates reports: The system should enable doctors to read patient records and
submit any necessary patient advice or new prescriptions.
Non-Functional Requirements
System Requirements
Hardware Specifications Software Specifications
3.1.2 ER Diagram
Main Cording
• Java Script
• Invoice
• Operation
• Patient UPDATE
• Patient SELECT
4 Task
Quality Assurance (QA) makes sure that end users have the greatest possible user
interface and experience when using a website. It examines a website to check for issues
that were overlooked throughout the design and development phase.
The QA team evaluated the user experience and system user interface It is hoped that the
procedure would reveal design and development errors. the QA testers responsible for
carrying out several duties within the QA process, such as evaluation monitoring
compliance with all customer requests and requirements. They develop a test approach as
well.to test the system, as well as test scenarios. On the other hand, quality assurance
often involves testing of requirements, designs, and functionality.
Requirement testing: considers both the customer's stated demands and any design
documents that have been approved by the client. The system's design and prototype are
evaluated by the QA testers using a list of criteria that they create. To ensure that the
project team completes all of its mission goals, requirement testing is important
throughout the development process. The QA testers complete the document and create a
test plan to test the system after confirming that the requirements document's quality is
guaranteed and maintained. Among the browsers that work with the website are
Microsoft Edge, Google Chrome, Opera, and Mozilla Firefox.
Testing the functionality- Design testing is concentrated on the aesthetics. When testing
the design, the QA tester determines if the website's look and feel adhere to the intended
design and overall layout. The process of design testing has several facets and includes
activities like browser testing. On the other side, the site's user interfaces have undergone
extensive testing, and everything from the typography to the images to the color of the
interfaces works as it should. The design may be tested using a number of approaches,
such as tree testing, card sort testing, and A/B testing. To ensure the quality of the
product, a design test is run on several browsers.
4.2 Create a suitable test plan for the developed system and critically
evaluate the results of your Test Plan. Include a review of the
overall success of your multipage website: use this evaluation to
explain any areas of success and provide justified recommendations
for areas that require improvements.
Test plan
using HTML, CSS, JavaScript, PHP, and MySQL. The Arogya Healthcare
Hospital Management System gives employees and doctors all necessary and
fundamental information on patients, as well as information about daily
schedules, patient invoicing, and room availability.
• Purpose- Basic tasks are now carried out manually in this area, however
building a fully automated system is the major goal. Patients may register and
log in to the system here, and administrators can update information and check
the availability of rooms, among other capabilities that have largely been
added to the system. Another is that the system enables patients to schedule
appointments, another is that administrators can figure out how much to
charge for visits, and the last is that people may look for physicians based on
speciality. These are the system's primary few functions. Therefore, the main
goal is to develop an automated system with these features.
• Goals- The major objective of the test is to discover flaws in the system while
also ensuring user usability. And provide a permanent remedy for their bugs;
moreover, after the testing, the system should be easy to use and beautiful;
additionally, after the testing, the system's users should be able to easily
accomplish their tasks effectively.
From all these test cases we were able to obtain the expected results
Based on test findings and other testing techniques, the Arogya healthcare hospital
management system has been a significant success in this area. Although the system is
more attractive, several functions still need to be included. Based on the test results, the
built system may be regarded as a good system. It is also more user-friendly. The system
works well because it performs well and meets expected needs. The system may be
referred to be efficient since user operations take less time, and the security level is the
most crucial component of the system because all user information is completely
protected. These are the main causes of the system's effectiveness.
The developed system does have several shortcomings. The first is that you cannot add a
profile photo when you register. There is no option to add a photo to the patient profile
while registering as a patient. These types of qualities are more appealing to most people
now than ever before. Lack of good communication among system users is the second
problem. Users don't like that the only way to contact us is through contact us. User
engagement will increase if a chat system is used to connect people as required. Another
illustration is this website, which is exclusively accessible to subscribers.
5 Referents