A domain name is used, as without domain names it would mean that people would find it difficult to locate which would mean that not as many people would visit the site. Also it is more practical to use instead of IP connections. For example www.google.com would be easier to remember than “2188.8.131.525”. A domain can be a maximum of 63 characters with one character minimum.
-38100537210A site map is used to show a systematic view of the website and it is used to make is easier for the person using the website. It can also be a page which includes links to sub sections and major sections of a website. This can allow the visitor or search engine to get to a popular section of the website or see what the website has to offer.
A hyperlink is used to reference data. This can be used in documents so the reader can click on the hyperlink and it can take them to the origin of the data. It can also be used in websites to take the user of the website to other parts of the website. They are also used to connect to other websites without knowing the actual URL of the website.
A navigation bar is used in websites to help the visitor find the information they are looking for. They are used in file browsers and web browsers or even as a design element for some websites. Websites will most likely have a primary and a secondary navigation bar to access more popular parts of a website.
center109220Core features include top banner which includes a logo of the organisation. Main content which is easy to read and is clear and user friendly. Navigation bar for the user to access different part of the website and to find relevant information of what the user is looking for. The Navigation bar can be either on the top of the page under the header or banner or it can be on the side. Widgets can be used to connect to social media.
Core features include top banner which includes a logo of the organisation. Main content which is easy to read and is clear and user friendly. Navigation bar for the user to access different part of the website and to find relevant information of what the user is looking for. The Navigation bar can be either on the top of the page under the header or banner or it can be on the side. Widgets can be used to connect to social media.
left4445Webpages for different browsers + devices
Webpages for different browsers + devices
Webpages will need to have capability with all browsers. This is so that any user using different browsers can use that specific site. The sites should also have a layout for the different devices such as smartphones, tablets, laptops and TV’s. Browser rendering is used to covert the HTML code into a visual webpage which can include pictures, videos and main text.
The World Wide Web Consortium is an international community where member organisations, the public and fulltime staff to work together to create web standards. Their aims are to make sure that the web is available and accessible for everyone to use despite the type of software, hardware, language and mental ability. Web developers use these standards to make sure that everyone had the same sort of accessibility for a website.
-85725142240Storage of Data
Storage of Data
Storage of data is when personal and private information is stored. For the information to be stored securely they would have to be stored in databases. A database is a collection of information which is kept securely but can be accessed and managed easily. Encryption is used to keep the data secure.
-38100159385Methods of user interaction
Methods of user interaction
User interaction will mean that the website will need to be accessible for all user using either a touchscreen device, mouse, stylus. Also the language used will be important as there will need to be a country widget which allows the user to read the page in their language.
There are lots of security that is needed when creating a website to prevent personal information and other sensitive data from being accessed by anyone. One threat is SQL injection. SQL is a domain specific language which is used in websites for managing and designing the data base. SQL injection is when an attacker will inject malicious SQL statements into the data base in which the attacker can then gain control of the site and access all of the sites data. Another threat is interception of data this is when the attacker uses hacking software to gain access to the information. This will mostly include packet sniffing software which will retrieve passwords and text documents with bank details etc.