Navigation
For my website, I have linked all of my pages together by using HYPERLINKS, also I have made sure that all of text that I have written is easily legible and easy to get to as well.
Hierarchy
Hierarchy is a tool that separates every part of the page from each other and from the most important parts of the page, this will include Text, Size, Font or Shape. For example using "WELCOME TO THE KINGSWOOD FILM CLUB" and this image is the biggest sign and it will go on the home page. This will help the user understand what the website is for sure and it should be bigger than the rest of the text because it is the main banner and it will try to get other users attention. This separates Headings from Sub-Headings because of the size, shape and colour of the heading and with the sub-heading, these help to ensure that it is easier to navigate around the website if there are sub-headings and therefore acknowledging the hierarachy structure and also making the heading much more important than sub-headings.
HTML FormsThe HTML Forms are mainly used for making the language barrier between pages while on the internet, also it is used for every website that is on the internet and while I was creating my website I used this language to embed a PAYPAL button to my payments page of my website.
Audio/ Visual Elements
For the Audio and the Visual Elements, this is where all of the videos and of the sound clips are used on the websites, for my website I have used a form of the Audio and Visual Elements because I have included film trailers into my website and i have included 9 film trailers into my website
dale crane
Monday, 13 May 2013
Thursday, 9 May 2013
M3
As you can see from the 2 Screenshots above I have made amendments to my website because i have added a a box where people can select there chosen film.
As you can see from the 2 Screenshots above I have made amendments to my website from where I have included an enter button onto my website
Tuesday, 23 April 2013
Thursday, 28 March 2013
P2, P3
User Side Factors
Download Speed
Download speed form the User side is how long it would the selected webpage to load, once requested. The measurements for the time it would take to load the page and the speed of the page is completely different web pages but on the same internet connection. for example having slow internet connection or having a computer that has a lot of information stored on it it is more likely for it to run more slowly than it should and maybe causing the webpage to time out, and so its best to get the best connection possible and even if it has to cost more to run but it is more likely to give you much more, quicker and stronger download speed. If the download speed is running slowly because you have be downloading too much you can make this better by getting a new processor.
PC Performance
Server-side factors
Web server capacity
A Web server is a program that, using the client/server model and the World Wide Web's Hypertext Transfer Protocol, serves the files that form Web pages to Web users (whose computers contain HTTP clients that forward their requests). Every computer on the Internet that contains a Web site must have a Web server program. Two leading Web servers are Apache , the most widely-installed Web server, and Microsoft's Internet Information Server. A way that you could increase the capacity of the web server is to upgrade your server to a better server like GOOGLE CHROME or FIREFOX but if the user has already got either one of the said browsers then start deleting everything that you have downloaded from the internet.
Bandwidth
With computer networking and the computer science, the words "Bandwidth", "Data Bandwidth" or "Digital Bandwidth" are terms that are used to refer to various measures and they represent the available or consumed data in the communication resources and they are expressed in Bits Per Second or multiples of it, for example: bit/s, kbit/s, Mbit/s, Gbit/s, etc.) The size of the bandwidth can affect the connection speed of the internet so the higher the bandwidth the more money that your have to pay for a better internet providers.
Executions
Executions in a computer and a software engineering program is the process by which the computer or any virtual machine can carry out certain instructions of a computer program. When the instructions are activated they trigger (in the program) sequences of simple actions on the selected machine and those actions produces effects that are according to the instruction and the semantics of the instructions in the program. In some cases programs for a computer may be executed in a Batch Process without someone interacting with that program or a user with type commands into an interactive session of an interpreter.
Security
Website designers can get protected from people from copying their work, the screenshots below shows the copyright law fro businesses and it states that people cannot claim the details of the businesses work that is on their website and also the other screenshot shows the terms and conditions of Argos, which states certain conditions and the acknowledgement of the product that you are about to purchase.
This screenshot shows the website copyright law which means that you are not allowed take any information without consent.
This screenshot shows the terms and conditions and it lets the user know what will happen to the product and to the purchaser.
Website designers can protect their websites by placing firewalls, SSL's and a very strong password, these will help stop people breaking into their computer and stealing any useful information that they find on there and selling it on to someone else. Also businesses that have websites they have to be weary about identity theft because if that happens someone can steal an employees name and steal whatever is on that computer and all of its information, including personal information (names of employees) bank details of customers.
Website holders must make sure that they know the risks that will follow and those risks will include, hacking, viruses and identity theft. Websites can stop these from happening by placing a certain code into the software that makes the browser close down or you could place an error message that will appear when the hacker has done something wrong.
This image is representing what a firewall is supposed to do.
This image is supposed to represent someone who has tried to hack into someone else's computer.
Download Speed
Download speed form the User side is how long it would the selected webpage to load, once requested. The measurements for the time it would take to load the page and the speed of the page is completely different web pages but on the same internet connection. for example having slow internet connection or having a computer that has a lot of information stored on it it is more likely for it to run more slowly than it should and maybe causing the webpage to time out, and so its best to get the best connection possible and even if it has to cost more to run but it is more likely to give you much more, quicker and stronger download speed. If the download speed is running slowly because you have be downloading too much you can make this better by getting a new processor.
PC Performance
Cache Memory
Cache Memory is in the short term for a RAM that the CPU can access easier and more quicker then it would with a normal RAM, the CPU will use the Cache Memory to store the instructions that will be required to the run the applications/programs. You can find larger caches and that will and can operate at higher and specific speeds, also these are now considered to be the core of the CPU. Other caches on the other hand can be simpler and differ and also they will be slower. Your computer will start to run more slowly because the cache memory is getting too full, you can improve this by gaining a better cache memory bank
Processor Speed
Processor speed is the speed of which the microprocessor gives out instructions. the CPU has got a fixed number of ticks in which it has to operate the instructions, so the faster the clock the better as the more instruction it gets and can be executed. For example 2 CPU's may have the same clock speed but it may not perform the same as some will run faster than others and some will have faster microprocessor, which means that a single calculation can be performed in just 1 tick, but when the technology advances some of the Microprocessors are not even superscalers, which means that they can produce more than one instruction per clock cycle. Also if you wish to increase the speed of the processor then you can upgrade your processor and you could clean out the history that is on your computer.
Server-side factors
Web server capacity
A Web server is a program that, using the client/server model and the World Wide Web's Hypertext Transfer Protocol, serves the files that form Web pages to Web users (whose computers contain HTTP clients that forward their requests). Every computer on the Internet that contains a Web site must have a Web server program. Two leading Web servers are Apache , the most widely-installed Web server, and Microsoft's Internet Information Server. A way that you could increase the capacity of the web server is to upgrade your server to a better server like GOOGLE CHROME or FIREFOX but if the user has already got either one of the said browsers then start deleting everything that you have downloaded from the internet.
Bandwidth
With computer networking and the computer science, the words "Bandwidth", "Data Bandwidth" or "Digital Bandwidth" are terms that are used to refer to various measures and they represent the available or consumed data in the communication resources and they are expressed in Bits Per Second or multiples of it, for example: bit/s, kbit/s, Mbit/s, Gbit/s, etc.) The size of the bandwidth can affect the connection speed of the internet so the higher the bandwidth the more money that your have to pay for a better internet providers.
Executions
Executions in a computer and a software engineering program is the process by which the computer or any virtual machine can carry out certain instructions of a computer program. When the instructions are activated they trigger (in the program) sequences of simple actions on the selected machine and those actions produces effects that are according to the instruction and the semantics of the instructions in the program. In some cases programs for a computer may be executed in a Batch Process without someone interacting with that program or a user with type commands into an interactive session of an interpreter.
Security
Website designers can get protected from people from copying their work, the screenshots below shows the copyright law fro businesses and it states that people cannot claim the details of the businesses work that is on their website and also the other screenshot shows the terms and conditions of Argos, which states certain conditions and the acknowledgement of the product that you are about to purchase.
This screenshot shows the website copyright law which means that you are not allowed take any information without consent.
This screenshot shows the terms and conditions and it lets the user know what will happen to the product and to the purchaser.
Website designers can protect their websites by placing firewalls, SSL's and a very strong password, these will help stop people breaking into their computer and stealing any useful information that they find on there and selling it on to someone else. Also businesses that have websites they have to be weary about identity theft because if that happens someone can steal an employees name and steal whatever is on that computer and all of its information, including personal information (names of employees) bank details of customers.
Website holders must make sure that they know the risks that will follow and those risks will include, hacking, viruses and identity theft. Websites can stop these from happening by placing a certain code into the software that makes the browser close down or you could place an error message that will appear when the hacker has done something wrong.
This image is representing what a firewall is supposed to do.
This image is supposed to represent someone who has tried to hack into someone else's computer.
Wednesday, 20 March 2013
P1 M1 D1
ISP
The ISP (Internet Service Provider) is an organisation that provides access to the internet and this is directly connected with the clients by using copper wiring, wireless or by fiber-optic connections. Different organisations of the Internet Service Providers may be organised in many different forms, like;
The ISP (Internet Service Provider) is an organisation that provides access to the internet and this is directly connected with the clients by using copper wiring, wireless or by fiber-optic connections. Different organisations of the Internet Service Providers may be organised in many different forms, like;
- Commercial
- Community-owned
- Non-profit
- Privately-owned
Web Hosting Services
This basically allows anyone (people or organisations) to make and design their own website and this is accessible by the World Wide Web. Also all web host companies that provide space on a server that is owned or leased for use by the clients that they have bought or leased for. As well as providing internet connections. This is what they call a "Data Centre", web hosts also provide data spaces and connectivity for other services that are located in the Data Centre.
Domain Structure
A domain structure is a cluster of computers which maintains it's own security and accounts management locally, i.e.-on the primary domain controller. All logins for local accounts are done within the domain, and it has its own file and application servers for locally logged on users. A database domain is a support for goods and services domain along with a client domain and even a client domain for data programmers/software engineers.
Domain Name Registrars
A domain name registrar is an organization or commercial being that manages the reservation of internet domain names. A domain name registrar must be authourised by a top-level domain registry. The management is done in accordance with the guidelines of the designated domain name registries and to offer such services to the public.
Worldwide Web
Blogs
Domain Structure
A domain structure is a cluster of computers which maintains it's own security and accounts management locally, i.e.-on the primary domain controller. All logins for local accounts are done within the domain, and it has its own file and application servers for locally logged on users. A database domain is a support for goods and services domain along with a client domain and even a client domain for data programmers/software engineers.
Domain Name Registrars
A domain name registrar is an organization or commercial being that manages the reservation of internet domain names. A domain name registrar must be authourised by a top-level domain registry. The management is done in accordance with the guidelines of the designated domain name registries and to offer such services to the public.
Worldwide Web
The World Wide Web is a system of interlinked hypertext documents accessed through the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them through hyperlinks.
Mail Clients
Mail Clients is a computer program that used for accessing the users Email and allows them to manage their emails. Clients can refer to any system that is capable of handling the users email and regardless of it being a mail user agent, a relaying server or a person typing manually on a terminal. Also a web application that provides message management, composition and reception functions is sometimes considered an email client but is more commonly known as webmail. popular email clients include: Microsoft Outlook, IBM Lotus Notes, Pegasus Mail, Mozilla's Thunderbird, KMail in the Kontact suite, Evolution and Apple Inc.'s Mail.
Components
Hardware
Web browsers are more commonly known as Browsers, and it is a software application for retrieving, presenting and traversing information resources on the Worldwide Web. An information source will be identified as an Uniform Resource Identifier (URI) and this maybe a webpage, image, video or any other piece of informational content. Hyperlinks are also presented into resources and enable the users to easily navigate their selected browsers to the related resource. Also a web browser can also be defined as an software application or a program that is designed to enable easy access for the users to get, send and view information or any other resources that come form the internet.
Hub
A Hub is a device that allows multiple Ethernet devices to be connected together and allowing them to create a single network segment, also it has many input/output ports then after then a signal is introduced at the input port and any port that appears on the output except the original incoming. Also the device works as a physical layer of the OSI model, and it forms a multiple repeater and the repeater hubs can also participate in collection detection, forwarding a jamming signal to all ports if it detects a collisions.
Web Server
Web Servers can also be referred as hardware on a computer or a software application on the computer, this helps to deliver web content to the Client and it can be accessed through the internet and the most common used of the web servers are called 'websites' but other web servers that offer that same as website and they are applications such as 'gaming', 'data storage' or running enterprise applications. The primary function of a web server is to deliver web pages on the request to clients using the HTTP. This means that the delivery of the HTML documents and any additional content that may be included by a document, such as images, style sheets and scripts.
Web 2.0
Web 2.0 was created in 1999 and it was used to describe websites that uses technology that was beyond the static pages of the previous websites. Although it suggests that the updated version of the Worldwide Web doesn't refer to an update to any of the technical specification but they will have changed by the software developers and the end-users that use the web. A Web 2.0 site allows users to interact and collaborate with others in social networking sites, such as Facebook and Twitter, their dialogue creators of user-generated content in a virtual community.
Blogs
Blogs are discussions or informational online sites that get published on the internet and that these documents consists of entries (posts). Also these are posted in the typically displayed way of being in reverse chronological order (when the most recent will appear first). Up-till 2009 these posts were posted individually or on occasion in small groups of 3/4 and often covered by the same subject and even more recently 'multi-author blogs' 'MAB's' have been developed and with posts that were written in large numbers of authors and that it professionally edited. MAB's from newspapers, other media outlets, universities, think tanks, institutions and similar accounts of ever increasing number of blogs being released onto the internet. The rise of Social Networking sites like Facebook and Twitter and 'Mircoblogging' systems they help to migrate the MAB's and single bloggers into societal mainstreams.
Online Applications
Online Applications (Web Applications) is an application that is accessed by the user that is on a network such as the 'internet' or the 'intranet'. The term Web Application may also mean a computer software application that is coded in a web-browser-supported program language (like JavaScript and combined with rendering-browsers in the make-up language like HTML). A majority are interactive, allowing visitors to leave comments and even message each other via GUI widgets on the blogs, and it is this interactivity that distinguishes them from other static websites, also blogging can be seen as a form of social networking. Many blogs provide commentary on a particular subject, others function like personal online diaries, others function more as online brand advertising of a particular individual or company.
Cloud Computing
Cloud Computing is use of computer resources in both hardware and software that is delivered as services over networkds (like the internet). Also the name comes from theuse of the Cloud-Shaped symbol as an abstraction for a complex infrastructure that contains it in the system diagram and Cloud Computing trusts any remote services with the users data, software and computation. End users access cloud-based applications through a web browser or a light-weight desktop or mobile app while the business software and user's data are stored on servers at a remote location.
Protocols
Transport and Addressing
Internet Protocol (IP) Addresses are the universally-used main form of addressing on a TCP/IP network. These Network-layer Addresses are uniquely eidetic from each of the networks interfaces, these sever as the mechanics by which the data is routed to the correct network on the internet work and there will be the correct device on that network. some people do not realise that there is an additional level of addressing that will occur at the point of the transport layer which is called TCP/IP. Above is the IP address. both of the TCP/IP transport protocols TCPs and the UDP use concepts of ports and sockets for the virtual software addressing and that will enable the different functions of many different applications simultaneously on an IP device to work properly.
The image below shows various layers of the TCP/IP suite of protocols. At the top will be the application layer that consists of the application. Next will come the Transport layer UDP and the TCP, after will come the network layer that will contain the network (hardware) interface. Finally the hardware layer and that contains all of the Physical Network. When the Application needs to send any type of data to another application which is on another host then the applications will send the information down to the transport level protocols to prepare the information for transmission.

Internet Protocol (IP) Addresses are the universally-used main form of addressing on a TCP/IP network. These Network-layer Addresses are uniquely eidetic from each of the networks interfaces, these sever as the mechanics by which the data is routed to the correct network on the internet work and there will be the correct device on that network. some people do not realise that there is an additional level of addressing that will occur at the point of the transport layer which is called TCP/IP. Above is the IP address. both of the TCP/IP transport protocols TCPs and the UDP use concepts of ports and sockets for the virtual software addressing and that will enable the different functions of many different applications simultaneously on an IP device to work properly.
The image below shows various layers of the TCP/IP suite of protocols. At the top will be the application layer that consists of the application. Next will come the Transport layer UDP and the TCP, after will come the network layer that will contain the network (hardware) interface. Finally the hardware layer and that contains all of the Physical Network. When the Application needs to send any type of data to another application which is on another host then the applications will send the information down to the transport level protocols to prepare the information for transmission.

Tuesday, 12 March 2013
Subscribe to:
Comments (Atom)











