Q1) Explain Denial of Service attack

Denial of Service attack involves flooding the target resource with external communication requests. This overload prevents the resource from responding to legitimate traffic, or slows its response so significantly that it is no longer usable.

Q2) Give examples of different web browsers.

  • Google Chrome
  • Internet explorer
  • Mozilla Firefox
  • Safari
  • Opera
  • Q3) Why is it important to test your websites in multiple web browsers?

    This is because your website may be working in chrome, but may have issues in internet explorer. Make sure it is working in multiple web browsers will improve the traffic of the website

    Q4) What are the popular streaming technologies?

    Youtube – stream videos

    Dailymotionstream videos

    Twitch TV – Stream live channels

    Q5) What are the commonly used image formats that support compression?

  • JPG –
  • TIF
  • PNG
  • GIF
  • Q6) Discuss the difference between lossless and lossy compression.

    With lossless compression, every single bit of data that was originally in the file remains after the file is uncompressed.

    Lossy compression reduces a file by permanently eliminating certain information, especially redundant information.

    Q7) Define a plug-in.

    Plug-in applications are programs that can easily be installed and used as part of your Web browser. Plug Ins are used to customize and enhance your web brower to you preferred settings

    Q8) Explain FTP.

    Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring Web pages from a server to a user’s browser.

    Q9) Describe the privacy regulations or law you must follow.

    Privacy is about respecting and valuing a people’s personal boundaries and space.

  • Confidentiality act
  • Privacy of clients, customers and employees
  • Information security
  • Providing up to date and accurate information
  • Q10) Discuss the copyright law in Australia.

    Copyright is stealing ideas, thoughts, designs etc. this is illegal and can result in large fines and lawsuits. This is good for businesses and people trying to make new innovations which could change the world. Businesses must copyright all their information so that businesses cannot use the information of other businesses to make them stronger.


    Last updated: Sep 2023

    Page 1

    is good for businesses and people trying to make new innovations which could change the world. Businesses must copyright all their information so that businesses cannot use the information of other businesses to make them stronger.

    Q11) Explain security principles normally used within servers.

    Hardware Firewalls, Software Firewalls, IP SEC, NAT File ring, Load Balancers, IP Restriction, etc at all ways to secure a web server. Many people also implement data encryption and Disable remote connections on SQL servers to maximize security.

    Q12) What is the difference between client side scripting and server side scripting?

    The client-side environment used to run scripts is usually a browser. The processing takes place on the end users computer.

    The server-side environment that runs a scripting language is a web server. A user’s request is fulfilled by running a script directly on the web server to generate dynamic HTML pages.

    Q13) Why can’t you rely solely on client side validation when creating forms that post to dynamic web pages or CGI scripts?

    This is not secure. People could easily bypass the validation and therefore, have complete access to the forms that are posted onto the web pages or CGI Scripts.

    Q14) What are the events for objects in web document than can be captured by client side scripting?

    Objects that represent windows, menus, pop-ups, dialog boxes, text areas, anchors, frames, history, cookies, and input/output.

    Q15) Give examples of different client side scripting languages

    PHP, ASP.NET, Java, ColdFusion, Perl, Ruby, Go, Python, and server-side JavaScript

    Q16) Why is technical documentation of code important?

    The idea of auto-generating documentation is attractive to programmers for various reasons. For example, because it is extracted from the source code itself (for example, through comments), the programmer can write it while referring to the code, and use the same tools used to create the source code to make the documentation. This makes it much easier to keep the documentation up-to-date.

    Q17) What are the reasons of identifying the requirements of a client side script before coding it?

    This is important to make sure that the coding is accurate and reliable when you begin. If the requirements are not identified, the code may not be appropriate or accurate for the requirements.

    Q18) What are the organizations that set standards for websites?

  • World Wide Web Consortium (W3C)
  • International Organization for Standardization (ISO)
  • Ecma International (formerly ECMA)
  • Q19) How does industry specific standard work?

    Industry standards are standards that have been set to be specific to an industry, for example, marketing industry specific standards, accounting industry standards etc. The provide more accurate and specific examples that the businesses can follow.

    Q20) Explain organisational compliance

    The term compliance describes the ability to act according to an order, set of rules or request. Organisational…


    Last updated: Sep 2023

    Page 2

    You've reached the end of your free preview.

    Want to read all pages?