100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

BTEC Level 3 IT (Extended Diploma) Unit-28 Web Production

Rating
-
Sold
-
Pages
55
Grade
A+
Uploaded on
14-06-2023
Written in
2022/2023

BTEC Level 3 IT (Extended Diploma) Unit-28 Web Production. A. Internet service provider (ISP): An Internet Service Provider is a service that offers companies and home users access to the Internet. You wouldn't have been able to shop online, access Facebook or read this page without an ISP. Specific telecommunications, routing, and networking equipments are needed to connect to Internet. ISP enables users to access networks containing the necessary equipment, which enables users to create Internet connectivity. Responsible for providing access to the Internet, routing Internet traffic, resolving domain names and maintaining a network infrastructure that facilitates Internet access. Examples of ISP: • Etisalat • Du B. Web Hosting Service: Refers to services that make your website accessible to your users Many businesses specialize in web hosting so that they can work, and customers can focus on their core business. Examples: Go Daddy, Bluehost, just host • Types of Services: 1. Online Control Panel 2. Online Traffic Statistics 3. Database Management System 4. 24/7 FTP Access 5. 24/7 Support • Types of Web Service: 1. Collocated Hosting 2. Dedicated Hosting 3. Reseller Hosting 4. Shared Hosting Page 6 of 54 BTEC Level 3 IT UKCBC 5. Free Hosting C. Domain Structure: The domain names are used to describe an or more IP address and are used to identify Web pages specific to the URLs. That domain name has a suffix indicating which toplevel TLD domain it belongs to. Only a limited number of those domains exist. Domain names are essential because without them the Internet addressing scheme isn't very successful. Examples: a. Gov: Government agencies b. Edu: Educational institutions c. Org: Organisation (non-profit) d. Mil: Military e. Com: Commercial Business f. Net: Network Organization g. US: United states of America h. AE: United Arab Emirates D.Domain Name Registers It’s a utility that lets you enter the preferred Domain name of web site legally and it becomes exclusive and no one can do anything to you. Previously, there’s been only 1 business which was able to enter the domain. Page 7 of 54 BTEC Level 3 IT UKCBC Importance: • It influences SEO • expresses your brand Examples: • GoDaddy • host gator • Namecheap • Dreamhost • Bluehost • Shopify E. Worldwide Web: generally known as the Web, accessible thru the Internet which contains lots of information like photographs, videos, pages and other online information. The users are called a web browser by using software applications to access information from World wide web. The World Wide Web is the internet's very essential aspect, as without the, communicating with one another is very difficult. When there are no ties, there's nothing we can do much more. World Wide Web can be achieved by connections in this era. The internet is also the fastest way we can reach the end of the world and learn world knowledge so we can be knowledgeable enough. Page 8 of 54 BTEC Level 3 IT UKCBC F. Hardware components like (Web Server, Mail server, Proxy Server): 1. Web server: A Software which uses “Hypertext Transfer protocol” along with other protocols to handle user action that is created across over internet, it can also track the way user intercepts the host files. This is done by a “Domain Name” in website which ensures the website content is passed on the customer. Examples: • Apache • Oracle 2. Mail server: Is a device system that sends or receives by telephone, where one computer incorporates “Web Server” to server of mail. However, big ISPs and public email services like Outlook & Gmail can use specialized hardware system to send and receive an email. Page 9 of 54 BTEC Level 3 IT UKCBC Types of mail server: • SMPT - Is a move protocol for delivering the mail • IMAP - Is used for retrieving mails from the receiver side • POP3 - Is a standard Internet application-layer protocol used by email clients to access email from a mail server. POP version 3 is the widely used version 3. Proxy server: It is a highly technical software or program setup running on a network which functions like intermediate among being the end point source, including pc and other server that a user wants a service from. There may be a proxy server on them network as firewall server or it is on different server that transfer messages thru the firewall. Types of proxy server: • Distorting Proxy • High Anonymity Proxy • Transparent proxy • Anonymous Proxy Page 10 of 54 BTEC Level 3 IT UKCBC G.Routers: Receiving, storing and moving incoming packets to another network is hardware device called “Router”. this may also be used to move the packets to another network interface, can also handle several other network devices. Below is a screenshot of wireless router device called “Linksy” usually can be found in homes. Types of routers: • Virtual • Core • Edge • Wireless • Brouter Page 11 of 54 BTEC Level 3 IT UKCBC H.Software Components like (Browser, Email) 1. Browers: Commonly are software application that helps the user to access the internet or a website as mainly to search and access information, its uses generated language called “HTML” and other is “XML” format. Types of Browers: • Google chrome • Firefox • Safari • Microsoft Edge 2. Email: It's an information that are collected in a PC which shared through telecommunication between two user, they come as a document which contains files, text, pictures and another addition sent to a designated person or group of individual via thru network. Types of the email: • Microsoft outlook • Gmail Page 12 of 54 BTEC Level 3 IT UKCBC Explain the benefits of server-side capabilities for a company website: A. User side factors: 1. Download speed: The Internet speed generally determines whether your online output is good. The speed has two key factors for internet source and the site of your user, if your provider does not offer enough download speed and upload speed, then your internet speed is slower than the ones above. Nevertheless, some carriers offer fast connection speed and bandwidth, but their results are slower / lower due to the speed affecting where you are located. 2. PC performance factors (CPU/RAM): i. CPU: Speed will be influenced as though the processor is moderate, at that point it will take more time for the machine to load and view the website page, as the information processor needs to process the information. Also, if you run more than each site in turn, for example, a music site and a person to person communication site, this is the place a quick processor is required to perform the two undertakings. ii. RAM: If your framework has a limited quantity of RAM, at that point making reserve space (temp memory) for the site can take some time for your framework, making transferring the site progressively slow. On the off chance that your framework has a lot of RAM, at that point it requires some investment to transfer the site because the web records as of now have reserve space that speeds up/execution. B. Server-side factors: 1. Web server capacity (bandwidth): Is The amount of data traffic which able to download every second thru a website. the data traffic operates as some traffic we understand, on the off chance that they're heaps of vehicles out and about you'll find a good pace need to go much slower than if you were the main vehicle out and about. Moreover, when you’re the major downloader user the download speed of your PC from a site would be a lot quicker as you can utilize most of the accessible information for downloading. 2. Number of hits a total hit upon web-site pages can small alter the yield of the Website page. On the off chance that many individuals are at the same time on a similar landing page, at that point it can block the servers and hinder the presentation of the site. Most network Page 13 of 54 BTEC Level 3 IT UKCBC server is equipped for this, to have enormous serves that can withstand several hits without a moment's delay. 3. File type (bitmap, vector, mp3): Utilizing the correct sort of document is significant when it originates by which the quick the program is loading. There are variety of different of records used for different programs such as JPG, PNG, GIF, MP3, MP4. Which can be used to open specific file that has sound or image and video. a. Bitmap: An Image / Illustration composed of “Bits”. The resolution can be seen if you zoom in the picture. This is not possible if you zoom out the image or are a distance from it. JPEG, TIFF, GIFS. Are all types of Bitmap forms. b. Vector: For other images type/graphics, are used to describe paths. Vector is another term for images of this kind. Such images can be extended or sized without any loss of quality or resolution. Page 14 of 54 BTEC Level 3 IT UKCBC c. Mp3: It is a document structure comprising of the sound. The music tracks are a case of an mp3 record. 4. Media files (avi, Mp4): a. AVI: It is interleaving software for audio recording. It is a video file that complies with the requirements of the Microsoft Windows Resource Interchange File Format (RIFF). It is a big file, which requires Microsoft windows native memory. It requires a special player that may be included with the Web browser but can be played by most PCs. b. Mp4: It is a holding position that considers the maintenance of a determination of sound, video, captions and still pictures in a single record. It additionally permits intuitive highlights, for example, 3D illustrations, menus and intelligence for clients. It very well may be utilized in various mixed media applications. It improves quality. It likewise permits internet gushing which implies the client can watch it on the web. Page 15 of 54 BTEC Level 3 IT UKCBC Explain the security risks and protection mechanisms involved in website performance: A. Security issues (hacking, virus, identity theft): 1. Hacking: It's an attempted to hack a computer system or a private network inside a system. To simply put, the unauthorized access to or control of computer network security systems is for some illegal purpose. Risks: • Spam: Send emails that are not approved. Such emails typically contain announcements • Computer fraud: Intended fraud using computer systems for personal gain. • ATM Fraud: It includes the collection of information of ATM cards such as account numbers and PIN numbers, which are then used to withdraw funds from the intercepted account. • Violation of privacy: Sharing personal information on social media, blogs, etc. such as email addresses, phone number, account details etc. • Electronic money laundering: It includes using the machine for money laundering. • Identity Theft: Trying to steal someone's personal details and trying to impersonate the user. • Sharing files / information copyrighted: This involves distributing protected files such as eBooks and computer programs etc. 2. Virus: A PC infection is a vindictive program that are stacked into a client's PC without the comprehension of the client and performs pernicious activities. Page 16 of 54 BTEC Level 3 IT UKCBC Risk: • Slow performance of the computer • Computer crashes occur • Erratic behaviour in computers

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
June 14, 2023
Number of pages
55
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

BTEC Level 3 IT (Extended
Diploma) Unit-28 Web Production

,Table of Contents
Introduction .......................................................................................... 5
Role and Importance: ............................................................................ 5
A. Internet service provider (ISP):.......................................................... 5
Examples of ISP: ................................................................................ 5
B. Web Hosting Service: ....................................................................... 5
• Types of Services: ......................................................................... 5
• Types of Web Service: ................................................................... 5
C. Domain Structure:............................................................................ 6
Examples:.......................................................................................... 6
D. Domain Name Registers .................................................................... 6
Importance: ....................................................................................... 7
Examples:.......................................................................................... 7
E. Worldwide Web: ............................................................................... 7
F. Hardware components like (Web Server, Mail server, Proxy Server): ....... 8
1. Web server: .................................................................................. 8
Examples:.......................................................................................... 8
2. Mail server: .................................................................................. 8
Types of mail server: ........................................................................... 9
3. Proxy server: ................................................................................ 9
Types of proxy server: ......................................................................... 9
G. Routers: ........................................................................................ 10
Types of routers: ............................................................................... 10
H. Software Components like (Browser, Email) ........................................ 11
1. Browers: ..................................................................................... 11
Types of Browers: .............................................................................. 11
2. Email: ......................................................................................... 11
Types of the email: ............................................................................ 11
Explain the benefits of server-side capabilities for a company website: 12
A. User side factors: ............................................................................ 12
1. Download speed: .......................................................................... 12
2. PC performance factors (CPU/RAM): ............................................... 12
B. Server-side factors: ......................................................................... 12
1. Web server capacity (bandwidth): .................................................. 12
2. Number of hits ............................................................................. 12
3. File type (bitmap, vector, mp3): ..................................................... 13

Page 1 of 54
BTEC Level 3 IT UKCBC

, 4. Media files (avi, Mp4): .................................................................. 14
Explain the security risks and protection mechanisms involved in
website performance: ........................................................................... 15
A. Security issues (hacking, virus, identity theft): .................................... 15
1. Hacking: ..................................................................................... 15
2. Virus: ......................................................................................... 15
3. Identity theft: .............................................................................. 16
B. Security protection mechanisms (firewalls, SSL, strong passwords, Legal
Policies & guidelines): ........................................................................... 16
1. Firewalls: .................................................................................... 16
2. SSL: ........................................................................................... 17
3. Strong password: ......................................................................... 17
4. Legal policies & guidelines: ............................................................ 18
Web architecture's role in Website communications: ............................ 19
A. Web 2.0: ....................................................................................... 19
Examples of web 2.0: ......................................................................... 20
Features: .......................................................................................... 20
B. Blogs: ............................................................................................ 20
The Advantages of Blogs are: .............................................................. 21
The Disadvantage of Blogs are:............................................................ 21
C. Online application: .......................................................................... 21
Example of an online application are: ................................................... 22
Advantage of an online application are:................................................. 22
Disadvantage of an online application are: ............................................ 22
D. Cloud computing: ............................................................................ 22
Examples of cloud computing are: ........................................................ 23
Advantage of cloud computing are: ...................................................... 23
Disadvantage of cloud computing are: .................................................. 24
Compare and discuss the various of different kind of application layer
protocol HTTP, HTTPS, SMPT and detail of technical explanation of
application level in relation to TCP/IP protocol: ................................... 24
TCP/IP: ............................................................................................... 24
TCP/IP protocols that are linked are: .................................................... 24
TCP/IP model layers: .......................................................................... 25
Reference ............................................................................................. 26
Part-2 ................................................................................................... 29
Introduction ......................................................................................... 29

Page 2 of 54
BTEC Level 3 IT UKCBC

, Wire frame design properly annotated to design the site and
requirements and purpose of the site: .................................................. 30
Wire Frame design: ............................................................................... 30
Requirements and purpose of the site: .................................................... 31
Creation of live model the website: ...................................................... 31
Explain clearly the techniques you have employed while building your
website: ............................................................................................... 31
a. Design tools: .................................................................................. 31
i. Concept designing like storyboarding: ............................................. 31
ii. Layout techniques like table, DIVs: ................................................. 31
iii. Inline container (span) .................................................................. 32
iv. Templates: .................................................................................. 32
v. Colour schemes: .......................................................................... 33
vi. Screen designs: ........................................................................... 34
vii. Outline of content: ..................................................................... 34
b. Software: ....................................................................................... 36
i. Mark-up languages like HTML: ....................................................... 36
ii. Client-side scripting languages like VBScript: ................................... 36
c. features and advantages of software languages and the scope of software
development environment: .................................................................... 36
Pros and features of software languages: .............................................. 36
Software development environment: .................................................... 37
d. Various structures: .......................................................................... 37
i. Layout of page: ............................................................................ 37
ii. Navigation: .................................................................................. 38
iii. Format of content and cascading style sheets (CSS): ........................ 38
iv. Interactive features like catalogue of products, shopping cart: ............ 39
v. Images: ...................................................................................... 41
vi. Animation: .................................................................................. 41
e. Evidence that make sure I used contents: .......................................... 42
i. Proofed: ...................................................................................... 42
ii. Correct and appropriate: ............................................................... 43
iii. Information source mentioned: ...................................................... 43
iv. Structured for purpose like prose, bullets, table: ............................... 43
f. Evidence for the use of various tools and techniques used: ................... 43
i. Navigation diagram (example- linear, hierarchy or matrix):................ 43
ii. Building interactivity tools like pseudocode for client server scripting: .. 45

Page 3 of 54
BTEC Level 3 IT UKCBC

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
STUDYLAB2023 Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
775
Member since
3 year
Number of followers
624
Documents
5428
Last sold
2 weeks ago
STUDYLAB 2022/2023

Here you will find reliable study resources that will help you prepare, revise and pass your examinations for all majors and modules. For assistance with online tutoring and Help with Class assignments, thesis, dissertations and essay writing with a guaranteed PASS & QUALITY reach out: . Good Luck.

3.8

149 reviews

5
71
4
23
3
27
2
7
1
21

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions