ASM1 1st WebsiteDesignDevelopment BH00704
ASM1 1st WebsiteDesignDevelopment BH00704
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a false declaration is a form of malpractice.
Grading grid
P1 P2 P3 P4 M1 M2 M3 D1
Summative Feedback: Resubmission Feedback:
The Root Zone: is at the top of the hierarchy, denoted by the dot (.) and administered by a centralized body known as the Internet Assigned Numbers body
(IANA). The Root Zone holds information on top-level domains (TLDs) and the authoritative name servers that are associated with them.
TLDs (Top-Level Domains): TLDs are found underneath the Root Zone. TLDs are further classified into two types:
Generic Top-Level Domains (gTLDs): These TLDs are not particular to any country or area. Examples include ".com," ".org," ".net," ".info," and ".biz,"
as well as newer gTLDs such as ".app," ".blog," and ".guru."
TLDs connected with certain nations or territories are known as country-code top-level domains (ccTLDs). Each ccTLD is associated with a certain country
or region, for as ".uk" for the United Kingdom.
Subdomains: are optional and can be used to further arrange the structure of a domain name. Subdomains can represent certain areas or functionalities
inside a website and appear to the left of the SLD. In "blog.example.com," for example, "blog" is a subdomain of "example.com."
Domain Name Extensions: Some domain names have additional extensions that convey information about the website's nature or purpose. These
extensions can include ".edu" for educational institutions, ".gov" for government websites, ".org" for non-profit organizations, and industry-specific
extensions such as ".museum."
4. How the domain name is managed
The management of domain names involves overseeing the registration, assignment, and maintenance of
domain names within the Domain Name System (DNS). It encompasses a variety of tasks and
responsibilities to ensure the proper functioning and organization of domain names on the internet.[4]
Here's a definition of how domain name management works:
Domain Name Management:
Domain name management refers to the processes and practices involved in the administration,
registration, assignment, and maintenance of domain names on the internet. It ensures the efficient and
systematic allocation of domain names, allowing users and organizations to use human-readable
addresses to access online resources.
Registration: Domain names are registered with accredited domain registrars or registries. These organizations are in charge of taking registration
requests from people, businesses, or organizations and updating the central domain name databases with the required information.
Assignment: Once a domain name is registered, it is assigned to the registrant. This assignment involves associating the domain name with specific
DNS records, such as IP addresses and mail server information, to make the domain accessible online.
Renewal: Domain names have expiration dates and are normally renewed annually to maintain ownership. To prevent their domain names from
becoming available for registration by others, registrants must ensure regular renewals.
Transfer: Domain name management enables the transfer of domain name ownership or management from one registrant to another or from one
registrar to another. This procedure must follow certain criteria and frequently requires authorization from the current registrant.
DNS Configuration: Domain name administration entails configuring DNS records to provide the IP addresses of web servers, mail servers, and other
domain services. This setting guarantees that the domain name resolves to the correct web destination.
WHOIS Data: Maintaining the accuracy of WHOIS data, which includes contact information for domain registrants, administrative contacts, and
technical contacts, is another aspect of domain name management. WHOIS data accuracy is critical for communication and conflict resolution.
5. Purpose of DNS
The Domain Name System (DNS) performs several key functions in the operation of the internet. Its principal
function is to convert human-readable domain names into numerical IP (Internet Protocol) addresses, hence
enabling access to online resources. The following are the primary goals of DNS:
Domain Name to IP Address Mapping: DNS's principal function is to map domain names (for example,
www.example.com) to their corresponding IP addresses (for example, 192.0.2.1). This translation enables
users to access websites and online services by typing in simple domain names rather than long numerical
addresses. [5]
Internet Navigation Simplified: DNS makes internet navigation easier by delivering user-friendly, human-
readable domain names. Instead of remembering numerical IP addresses, users can access websites, emails,
and other internet services by typing familiar domain names into web browsers.
Load Balancing: DNS can divide network traffic over many servers by responding to DNS queries with
distinct IP addresses. By minimizing overloading on a single server, this load balancing strategy improves the
performance and dependability of online services.
Redundancy and Failover: DNS allows for the creation of multiple DNS records for a single domain,
providing redundancy. In the event of a server or network failure, DNS can redirect traffic to backup servers
or alternate IP addresses, ensuring service continuity.
Dynamic IP Address Assignment: DNS can accommodate dynamic IP address changes, which is crucial for
internet service providers (ISPs) and businesses with dynamic IP addresses. Dynamic DNS (DDNS)
automatically updates DNS records when a device's IP address changes. [5]
6. Type of DNS
Within the DNS infrastructure, there are numerous types of DNS servers and services that perform diverse duties. Here are some
examples of common DNS:
DNS Recursive Server: Internet Service Providers (ISPs) or network operators often supply these servers. Their major job is to
answer DNS queries for end users. When you type a domain name into your web browser, the recursive DNS server consults
other DNS servers to determine the IP address associated with that domain.
Authoritative DNS Servers: These servers are in charge of storing official DNS records for specified domains. When a domain
is requested, they return information such as IP addresses, mail server settings, and other DNS data. Typically, organizations run
their own authoritative DNS servers.
Root DNS: servers are at the top of the DNS hierarchy and store information about top-level domains (TLDs). They are critical in
directing DNS queries to the correct TLD DNS servers.
TLD DNS Server: These servers are in charge of handling and maintaining the DNS records for certain TLDs. They supply
information about domain names registered under their respective TLDs.
Caching DNS Server: Caching DNS servers store DNS records temporarily in order to speed up subsequent requests. By
sending cached responses to frequently visited domain names, these servers help to minimize the pressure on authoritative DNS
servers.
Reverse DNS Server: A reverse DNS server maps IP addresses to domain names. They are especially important for security,
email authentication, and other reasons that require the source of an IP address to be identified.
7. How does Dns works.
Step 1: The user inputs the URL or domain name into the browser.
+ Step 2: The browser sends a message to the network known as a recursive DNS
query in order to determine the IP or network address to which the domain name
matches.
+ Step 3: The query is sent to a recursive DNS server, also known as a recursive
Resolver, which is typically controlled by an internet service provider (ISP). If the
address is found, the recursive resolver returns it to the user, and the web page
loads.
+ Step 4: If the recursive DNS server does not receive an answer, it will ask the
following servers in the following order: There is authority in the DNS root name
server, top-level domain (TLD) name server, and name server.
Step 5: The three types of servers work together to divert traffic until they find the
DNS record holding the requested IP address. It recursively sends this information
to the DNS server and loads the page the user is seeking for. DNS root name
servers and TLD servers mostly redirect inquiries and rarely give standalone
solutions.
+ Step 6: The server stores the A record for the domain name containing the IP
address recursively. When it receives a request for that domain in the future, it can
respond directly to the user rather than searching other servers.
+ Step 7: An error message is returned if the query is sent to the authoritative
server and no information is discovered.
Explain the purpose and relationships between communication protocols, server
hardware, operating systems and web server software with regards to designing,
publishing and accessing a website. (P2)
1.Web comunication protocols
The majority of the time, people use a web browser to access the internet. A web
browser is a software tool used to retrieve, display, and navigate information resources
on the World Wide Web. A Uniform Resource Identifier (URI) identifies an
information resource, which can be a web page, image, video, or other piece of
material.[6]
A web browser allows your computer to communicate with web servers all over the
world, providing you with the information you need with only a few clicks. Different
web browsers retrieve information in different ways, but one thing they all have in
common is online communication protocols.
Web communication protocols are a type of technology that is used to convey data
across the internet. A web browser, for example, employs these protocols to request
information from servers.[6]
HTTP (Hypertext Transfer Protocol): HTTP is the backbone of web-based data
2. WEB COMMUNICATION transfer. It enables communication and information exchange between web
PROTOCOLS USED: 01 browsers and servers. It employs a request-response model in which a client
(often a web browser) submits an HTTP request to a web server, which
answers with data, which is frequently in the form of web pages or resources.
02 networks like the internet. HTTPS protocols are most commonly used on
ecommerce websites that request personal financial information such as credit
card details. When you see "https://" in the web address shown in your
browser's Address field, you know a website is employing HTTPS protocols.
03 connecting two rooms. The data can only travel between the two rooms.
IPSec protocols are used in Virtual Private Networks, which enable
employees to connect to their company's secure network via a public network
(for example, from home or a coffee shop).
3. WEB COMUNICATION PROTOCOL’S
PURPOSE
Web communication protocols serve several important purposes in the
context of the World Wide Web and internet communication:
• Data Transfer: The primary purpose of web communication protocols like HTTP
and HTTPS is to facilitate the transfer of data between clients (e.g., web browsers)
and servers. This includes web pages, images, videos, scripts, and other resources
required to display web content.
• Resource Retrieval: Web communication protocols allow clients to request and
retrieve resources hosted on web servers. These resources can be static (e.g., HTML
files, images) or dynamic (e.g., database-driven content generated by web
applications).
• Standardization: Protocols provide a standardized way for clients and servers to
communicate, ensuring that web content can be accessed and displayed consistently
across different devices, operating systems, and browsers.
• Security: Some protocols, like HTTPS (an extension of HTTP), are designed to
enhance security. They provide encryption and data integrity mechanisms to protect
sensitive information from eavesdropping, tampering, and unauthorized access.
4. Sever hardware
A server is a computer system that distributes data, information, and other resources
to other computer systems or network devices. Server hardware is the physical
component of a server system that allows for data processing, management, and
storage.
A server system consists of the computer chassis, power supply, motherboard, CPU,
memory, storage devices, and network interface cards. It is intended to support
essential corporate applications, services, and processes by providing high
processing power, dependability, and security.
Server hardware differs from ordinary computer hardware in that it is designed to
accommodate numerous users, programs, and processes at the same time.
A server system often has more processing power, more memory capacity, and more
storage devices to meet the demands of several users accessing the system at the
same time. [2]
COMPONENTS IN
SEVER HARDWARE.
• Processor (CPU): The central processing unit (CPU) is the "brain" of the server, responsible for
executing instructions and performing computations. Servers often use multi-core processors for
increased performance and multitasking capabilities.
• Memory (RAM): Random Access Memory (RAM) is crucial for server performance. Servers typically
have a larger amount of RAM compared to desktop computers to accommodate multiple users and data-
intensive applications simultaneously.
• Storage Devices: Servers use various storage devices, including hard disk drives (HDDs), solid-state
drives (SSDs), and in some cases, enterprise-grade storage solutions like SAN (Storage Area Network)
or NAS (Network Attached Storage) for data storage and redundancy.
• RAID Controllers: Redundant Array of Independent Disks (RAID) controllers are used to manage
multiple hard drives for data redundancy and performance improvement. They can be integrated into the
server's hardware or added as separate expansion cards.
• Network Interfaces: Servers have multiple network interfaces (NICs) to provide network connectivity.
Dual or multiple NICs offer redundancy and load balancing for network traffic.
• Motherboard: The server's motherboard houses the CPU, RAM, and other critical components. It also
provides expansion slots for additional hardware, such as RAID controllers or network adapters.
• Power Supply Unit (PSU): Servers often have redundant power supplies to ensure continuous operation.
If one power supply fails, the server can continue running on the backup power supply.
5. WHAT ARE THE BENEFITS OF SERVER HARDWARE?
Durability - Granted not everyone has an identical experience but server grade
equipment seems to last a bit longer than their desktop counterparts. But even for
prolonged (and stressful) usage, server hardware tends to hold up to the demands
under the specifications provided by the manufacturer.
Scalable - The majority of most core server hardware (motherboards, CPU, RAM)
anticipate upgrades to one degree or another. Most desktops do not anticipate a
larger quantity of resources. This is usually a function of the motherboard chipset
more than anything, but server chipsets are significantly different from desktops.
WHAT IS AN OPERATING SYSTEM?
The operating system is a type of system software. It essentially manages
all of the computer's resources. An operating system serves as a bridge
between software and various computer components or hardware. The
operating system is constructed in such a way that it can handle the
computer's overall resources and functions.
The operating system is a completely integrated group of specialized
applications that handles all computer functions. It manages and monitors
the execution of all other programs that reside on the computer, including
application programs and other computer system software. Windows,
Linux, and Mac OS are examples of operating systems.
An Operating System (OS) is a collection of software that manages
computer hardware resources and provides common services for computer
programs. The operating system is the most important type of system
software in a computer system.[8]
SOME OPERATING SYSTEM
1 2 3 4
BATCH OPERATING
PROCESS MANAGEMENT MEMORY MANAGEMENT SECURITY
SYSTEM
The operating system controls and The operating system is responsible The operating system manages The operating system provides a secure
distributes memory, CPU time, and for starting, stopping, and managing the computer’s primary memory environment for the user, applications,
other hardware resources across the processes and programs. It also and provides mechanisms for and data by implementing security
computer's many programs and controls the scheduling of processes optimizing memory usage. policies and mechanisms such as access
tasks. and allocates resources to them. controls and encryption.
WHY USE AN OPERATING SYSTEM?
The operating system contributes to the advancement of both computer software and
hardware. It became extremely difficult for any application to be user-friendly in the
absence of an operating system. The operating system provides a user interface that
makes any application appealing and easy to use. The operating system includes a
vast number of device drivers that allow OS services to be accessed by the hardware
environment. The Operating System is required by all applications in the system.
The operating system serves as a conduit for communication between system
hardware and system software. The operating system allows an application to
interface with a hardware component without understanding the actual hardware
configuration. It is one of the most significant components of the system, thus it may
be found in any device, large or small.[7]
OPERATING SYSTEMS COMPONENTS
• File Management
A file is a collection of connected information that contains programs,
source forms, object forms, and data. A data file might be numeric,
alphabetic, or alphanumeric in nature. The following are some file
management features:
• File and directory creation and deletion.
• File and directory manipulation.
• File mapping to secondary storage.
• File backup on a stable storage media.
2. Process Management
The process management component is used to manage the various processes that are
running on the operating system at the same time. Process management oversees all
running processes and ensures that they function smoothly. It also makes use of the
memory allotted to them and shuts them down as necessary.
A process's execution must be done in such a way that at least one instruction executes on
its behalf. Process management has the following characteristics:
• Process creation and deletion.
• Processes can be paused and resumed.
• Process synchronization
• Creating communication channels with and between processes.
3.I/O Device Management
I/O device management hides the variations of some hardware devices from the user. Following are the
features of I/O device management:
• Buffers caching system
• Provides general device driver code
• Provides drivers for particular hardware devices.
• Helps know the individualities of a device.
4.Network Management
Network management administers and manages computer networks. Its services include performance
management, fault analysis, network provisioning, and service quality management.
Network management helps connect the network fully or partially so that users can design routing and
connection strategies with no connection and security issues.
Following are the features of network management:
• It offers user access to the various resources that the network shares.
• We can access shared resources. These help speed-up computation and offer data availability and
reliability.
• We can access different computing resources that vary in size and function like microprocessors,
minicomputers, and many general-purpose computer systems with the help of distributed systems.
5.Main memory management
Main Memory comprises large amounts of storage or byte where each storage and byte has an address.
In order to conduct the process of memory management a sequence of reads or writes of specific
memory addresses is used. We map it to absolute addresses and load it inside the memory in order to
execute a program.
6. Secondary-Storage Management
- Programs help access data in the main memory during execution. The
main memory is too small and cannot store all the data and programs
permanently. Thus, secondary storage acts as a backup to the main
memory. Assemblers and compilers are stored on the disk until they are
loaded into the memory and use the disk for processing.
- Following are the features of secondary-storage management:
• Allocates storage
• Manages free space
• Disk scheduling
7. Security Management
- It is necessary to protect the processes from each other’s activities.
Security management ensures that the operating files, memory, CPU,
and other hardware resources have proper authorization from the OS.
No process can do its own I/O, this maintains the integrity of peripheral
devices.
6.WEB SERVER SOFTWARE
Web server software (Web server software) is a type of software that is installed and run on a
server (server) to serve websites and web applications for requests from personal computers or
devices. accessed via HTTP (Hypertext Transfer Protocol). Web cam server software is
responsible for processing and sending back convenient web pages, applications or multimedia
documents to the user's browser. It provides and facilitates the exploitation of the computing
power of server facilities for use with a wide range of high-end computing functions and
services. [6]
POPULAR WEB SERVER SOFTWARE
Apache HTTP Server (Apache): Apache is one of the most popular and
widely used open-source web server software. It is known for its stability,
extensibility, and cross-platform support. Apache's modular architecture
allows it to be highly customizable and widely adopted for hosting websites.
Nginx: Nginx is another highly popular open-source web server and reverse
proxy server. It is known for its performance and scalability, making it a
popular choice for high-traffic websites and web applications. Nginx is also
often used as a load balancer.
Criteria
Design and publishing Accessing
-Communication protocols, such as HTTP (Hypertext Transfer Protocol) and -When users access a website, their web browsers use communication protocols like
HTTPS (HTTP Secure), define the rules for transmitting data over the internet. HTTP or HTTPS to initiate requests to the web server hosting the site.
Communication
Websites are designed with these protocols in mind, ensuring that web content is The communication protocol specifies how data is Transmitted between the client
protocols (browser) and the server, including the format of requests and the structure of
structured and formatted to be transmitted effectively.
-HTTP is the foundation for web communication, dictating how web browsers responses.
and servers exchange information, request resources, and handle responses.
The selection of server hardware is an important aspect during website design - During the access phase, server hardware handles user requests. To handle these
and publication. The performance, capacity, and dependability of the requests efficiently, the hardware allocates resources such as CPU and memory.
Server hardware hardware have a direct impact on the website's ability to handle traffic and The server hardware is critical for delivering web information quickly and keeping
resource demands. The server's CPU, memory (RAM), storage devices, and the website up and running.
network interfaces are all factors to consider. Proper hardware selection
ensures the stability and responsiveness of the website.
The server hardware's operating system (OS) serves as the foundation for server In the access phase, the OS manages server resources, allocates CPU and memory to
Operating Systems
software, including web server software. It is critical that the operating system processes (including web server software), and handles I/O operations. It ensures the
and web server software work together. server's stability, security, and efficient resource utilization.
Discuss the capabilities and relationships between front-end
and back-end website technologies. (P3)
Different between static and dynamic websites
1. Static Websites
Definition: Static websites are comprised of web pages with fixed, unchanging content. Each
page is written in HTML and is delivered to the user exactly as it was created. These sites do
not rely on databases or server-side scripting to generate content; instead, all the information
is hardcoded into the HTML files. [13]
Pros:
• Simplicity: Static sites are easy to create and maintain. You don't need much technical
expertise to build them.
• Speed: Static sites load quickly because there is no need for server-side processing or
database queries.
• Security: These websites are less vulnerable to hacking and security threats because they
lack server-side processing.
• Cost-Effective: Hosting and maintaining static sites is usually cheaper, as they require
fewer server resources.
• Reliability: They are more reliable because they are not dependent on databases or server-
side code.
Cons:
• Limited Interactivity: Static sites are not well-suited for interactive features like user
logins, comments, or e-commerce functionalities.
• Scalability: Updating a large static site can be time-consuming and labor-intensive.
• Content Management: It's challenging to manage and update content across multiple
pages without a content management system (CMS).
2. Dynamic website
Definition: Dynamic websites generate content on the server-side and deliver it to the user's
browser. They use server-side scripting languages, databases, and content management
systems to create and display content based on user interactions and inputs. [13]
Pros:
Interactivity: Dynamic sites can offer rich user experiences, including user accounts,
comments, e-commerce functionality, and personalized content.
Efficient Content Management: Using a CMS, it's easy to update and manage content
across the site.
Scalability: Dynamic sites can easily scale as they grow, with the ability to add new content
and features without much hassle.
Search Engine Optimization (SEO): Dynamic sites can be optimized for search engines by
dynamically generating meta tags and URLs.
Cons:
Complexity: Dynamic sites require more technical expertise to build and maintain due to
the need for server-side scripting and databases.
Slower Load Times: Dynamic sites tend to load more slowly because they rely on server-
side processing, which can create delays.
Security Risks: Dynamic sites are more susceptible to security vulnerabilities and attacks,
particularly if not properly secured.
Cost: Hosting and maintaining dynamic sites can be more expensive due to the need for
server resources and database management.
Relationships between front-end and back-end
website technologies
Front-End Technology
Front-end refers to the part of a website or web application that the user interacts with
directly. It encompasses the visual and interactive elements that users see and interact with in
their web browsers. Front-end development focuses on creating an engaging user interface,
implementing interactive features, and ensuring a seamless user experience.
Front-end development involves using languages such as HTML, CSS, and JavaScript to
structure, style, and add interactivity to web pages. HTML (Hypertext Markup Language)
defines the content and structure of the page, CSS (Cascading Style Sheets) controls the
visual presentation and layout, and JavaScript enables dynamic and interactive elements.
Front-end developers focus on creating visually appealing and user-friendly interfaces,
ensuring that the website is responsive and works well across different devices and screen
sizes. They also optimize the performance of the front-end code to ensure fast page load times
and smooth user interactions. [10]
Some Front-end technology , advantages and disadvantages
• HTML (Hypertext Markup Language)
RESTful API or GraphQL: To format and manage the HTTP requests, the back-
end typically provides a RESTful API (or GraphQL API) to the front-end. This API
defines the resources and methods that the front-end can access to interact with data
and functionality from the back-end.
Ajax and Fetch API: In the front-end, tools like Ajax or the Fetch API are used to
make HTTP requests to the back-end. This allows the front-end to send data to the
back-end and receive data from the back-end without the need to reload the web page
or application.
Authentication and Authorization: To ensure security and control access rights, the
front-end needs to authenticate users with the back-end and verify access
permissions (authorization) before allowing them to perform operations.
Website Builders:
Wix: A user-friendly website builder with a drag-and-drop
interface, offering a range of templates and customization
options.
Weebly: Similar to Wix, Weebly provides a straightforward
website builder with various templates and e-commerce
capabilities.
Squarespace: Known for its elegant and visually appealing
templates, Squarespace is an excellent choice for creative
websites.
Website Hosting Services: Content Management Systems (CMS):
Bluehost: A popular web hosting provider that offers a WordPress: The most widely used CMS, offering
website builder and one-click WordPress installation. flexibility, a vast selection of themes and plugins, and
SiteGround: Known for its speed and performance, great community support.
SiteGround also provides website building tools and Joomla: A robust and extensible CMS suitable for a
WordPress hosting. range of websites, from small blogs to large e-
commerce platforms.
Drupal: A powerful and highly customizable CMS
often used for complex and enterprise-level websites.
Comparison criterla
Online website creation tools Custom built sites
- Limited Customization: Most online website construction tools have customization Flexibility: Custom-built websites provide an infinite number of design and
limitations. You must follow the platform's existing templates and functionality. functionality alternatives. You have complete control over how your website appears
- Ease of Use: Most online website builders are simple to use and require no or little and functions, and it may be customized to meet your specific needs.
Flextibility coding knowledge. They frequently have drag-and-drop interfaces and pre-designed - Scalability: As your business or project grows, custom websites are more easily
templates, making them usable by people with minimum technical skills. adaptable. As needed, you can add features and functionalities.
- Economical: Many online website builders provide free or low-cost subscriptions. You - Price: Custom-built websites often have a higher price tag. Development costs can be
may build a simple website without spending a lot of money. higher, and continuing maintenance and hosting fees are the website owner's burden.
-Performance Consistency: Because they are hosted on well-maintained servers, - Performance Optimization: Custom-built websites allow for fine-grained
website builders frequently deliver dependable and consistent performance. This can performance optimization. Developers can optimize code, databases, and server
result in faster loading times and fewer technical difficulties. configurations to ensure optimal performance.
- Optimization: Many website builders handle basic optimization, such as picture - Customization: With custom sites, you can build performance-enhancing features,
compression and code minification, for you. This can assist to improve page load times, such as content caching, content delivery networks (CDNs), and database
particularly for visitors with poor internet connections. optimizations.
Performance -Scalability: While website builders may be suitable for smaller websites, they can be -Server Control: With custom websites, you have control over the choice of hosting
less scalable as your site grows. As you add more content and features, performance can providers and server configurations. This allows you to select hosting environments
degrade, and you may face limitations in terms of customization tailored to your performance requirements.
Third-Party connectors: Many website builders have pre-built connectors for common -Development Quality: The performance of a custom website largely depends on the
features such as contact forms, e-commerce, and social media. These have the potential quality of development and adherence to best practices. Poorly coded custom sites can
to improve performance and functionality. suffer from performance issues
Differences between online website creation tools and custom-built sites
Entire Design Control: Custom-built websites provide you entire control over the
Website builders: often offer a range of pre-designed themes that are often
UI design. Designers and developers may create one-of-a-kind, totally customized
visually beautiful and user-friendly. These templates include pre-made UI user interfaces that complement your brand identity and project objectives.
elements including buttons, menus, and forms. - Improved UI Performance: Custom development allows for fine-tuning of the
- Drag-and-Drop Interfaces: Website builders provide simple, drag-and- user interface for performance optimization, resulting in faster load times and
drop interfaces that allow users to organize UI components and elements on smoother interactions.
User Interface (UI) web pages without requiring coding knowledge. -Brand Identity: With a custom-built website, you have the freedom to design a
- Limited modification: While website builders provide some UI element user interface that reflects your brand identity and distinguishes you from
modification, there may be limits to how much you can change the design competitors. This can help to create a more memorable user experience.
and layout. As a result, you may have less influence over the user interface. - Advanced UI components: Custom development enables the incorporation of
- Consistency: Online website creation tools often maintain design advanced and interactive UI components such as complex animations, one-of-a-kind
navigation systems, and specialized user interactions.
consistency, ensuring that UI elements are coherent and aligned with the
- Responsive Design: Custom development gives you complete control over
chosen template.
responsive design.
CONCLUTION
As we draw this comprehensive presentation to a close, it is evident that the knowledge and
insights we've shared today are not just tools for understanding web technologies but also
the building blocks for success in an ever-evolving digital landscape.
For our junior staff, the understanding of basic web technologies, hosting, website
management, and server technologies is not merely an entry point into the world of web
development. It is the foundation upon which they can construct a career filled with growth
and innovation. These fundamental concepts are the keys to unlocking the potential of web
design, functionality, management, and performance. Armed with this knowledge, they can
tackle projects with confidence, ensuring our clients receive the best possible web services.
For our senior staff, the more technical segment of our presentation equips them with the
expertise needed to make informed decisions, explore the vast world of front-end and back-
end technologies, and select the right tools and techniques for our upcoming projects. It is
an invitation to harness their experience and deep dive into the intricacies of website
development. With this knowledge, we become not just web developers but architects of
digital experiences.
In closing, let us remember that learning and adapting are lifelong processes, and our team's
collective expertise will continue to evolve with the ever-changing web technologies. I look
forward to seeing the incredible websites and digital solutions we will create together,
driven by the knowledge and insights we've gained today. Thank you for your time and
dedication in this pursuit of excellence.
Reference
1. Anon, (n.d.). What is the best server hardware? + server hardware types. [online] Available at: https://n6host.com/blog/what-is-
server-hardware/.
2. Gillis, A.S. (2020). What is a Web Server and How Does it Work? [online] WhatIs.com. Available
at:https://www.techtarget.com/whatis/definition/Web-server.
3. Duy, T.T. (2023). Website là gì? Trang web là gì? Tìm hiểu về Website từ A- Z. [online] Available at: https://mikotech.vn/website-
la-gi/ [Accessed 22 Oct. 2023].
4. Pope, M.B., Warkentin, M., Mutchler, L.A. and Luo, X. (Robert) (2012). The Domain Name System—Past, Present, and
Future. Communications of the Association for Information Systems, [online] 30. doi:https://doi.org/10.17705/1cais.03021.
5. Al-kasassbeh, M. and Khairallah, T. (2019). Winning tactics with DNS tunnelling. Network Security, 2019(12), pp.12–19.
doi:https://doi.org/10.1016/s1353-4858(19)30144-8.
6. Naik, N., Jenkins, P., Davies, P. and Newell, D. (2016). Native Web Communication Protocols and Their Effects on the
Performance of Web Services and Systems. [online] IEEE Xplore. doi:https://doi.org/10.1109/CIT.2016.100.
7. www.solarwinds.com. (n.d.). What Is a Web Server and How Does It Work? - IT Glossary | SolarWinds. [online] Available at:
https://www.solarwinds.com/resources/it-glossary/web-server.
8. Williams, L. (2019). System Call in OS: Types and Examples. [online] Guru99.com. Available at:
https://www.guru99.com/system-call-operating-system.html.
9. John Moore, (n.d.). Server Hardware Guide to Architecture, Products and Management. [online] Available at:
https://www.techtarget.com/searchdatacenter/Server-hardware-guide-to-architecture-products-and-management.
10. Pastorino, M. (2022). Frontend vs Backend: What’s The Difference? [online] www.pluralsight.com. Available at:
https://www.pluralsight.com/blog/software-development/front-end-vs-back-end.
11. Margaret Rouse, (2019). What is the Application Layer? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/6006/application-layer.
12. Margaret Rouse, (2019). What is the Presentation Layer? - Definition from Techopedia. [online] Available at:
https://www.techopedia.com/definition/8955/presentation-layer.
13. Thakur, S. (n.d.) (2023). Difference Between Static And Dynamic Web Page // Unstop (formerly Dare2Compete). [online]
unstop.com. Available at: https://unstop.com/blog/difference-between-static-and-dynamic-web-pages