0% found this document useful (0 votes)
19 views8 pages

Internet - Technolgies - E1

Uploaded by

priya h.p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views8 pages

Internet - Technolgies - E1

Uploaded by

priya h.p
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Internal Assessments

Subject - Internet Technologies

1. What does HTML stand for? Write the basic structure of the HTML template? Name
some new features which were not present in HTML but are added to HTML5?

HTML stands for HyperText Markup Language.

Basic Structure of HTML


An HTML document's basic structure consists of5 elements:
 <!DOCTYPE>
 <html>
 <head>
 <title>
 <body>

New Features in HTML5


HTML5 introduced several new features and improvements that were not present in
earlier versions of HTML. Some key features include:
 Semantic Elements: New elements that provide meaning to the structure of a
webpage, such as <header>, <footer>, <article>, <section>, and <nav>.
 Form Controls: Enhanced form controls like <input type="date">, <input
type="email">, <input type="range">, and <input type="color"> that provide
better user input options.
 Multimedia Elements: Native support for audio and video with <audio> and
<video> elements, reducing the need for third-party plugins.
 Canvas: The <canvas> element allows for dynamic, scriptable rendering of 2D
shapes and bitmap images, useful for drawing graphics via JavaScript.
 SVG Integration: Support for Scalable Vector Graphics (SVG) allowing for
vector-based graphics to be embedded directly into HTML.
 Local Storage: Introduction of Web Storage API with localStorage and
sessionStorage for storing data on the client side, offering a more flexible
alternative to cookies.
 Geolocation API: Allows web applications to request the geographic location
of a user.
 Web Workers: Support for background threads, allowing for more efficient
execution of scripts and improved performance of web applications.
 Offline Capabilities: The Application Cache (deprecated) and Service Workers
(preferred) for creating offline web applications.
 New Document Structure Elements: New structural elements such as
<figure>, <figcaption>, and <aside> to better describe and organize content.
 Microdata: A way to add semantic meaning to HTML elements, allowing for
better integration with search engines and other data-consuming
applications.
=================================================================
2. What is JavaScript? What are JavaScript Data Types?

JavaScript is a high-level, interpreted programming language that is widely used in web


development to create interactive and dynamic content on websites. It's an essential part
of modern web technology, along with HTML and CSS. JavaScript runs in the browser,
enabling you to manipulate the Document Object Model (DOM) and interact with users
through dynamic effects and responsive designs.

JavaScript Data Types


JavaScript has several built-in data types, which are categorized into two
main groups: primitive and non-primitive (or reference) types.

1. Primitive Data Types


 These are basic types that represent single values and are immutable.
 Number: Represents both integer and floating-point numbers. For example,
42, 3.14, or -7.
 String: Represents a sequence of characters enclosed in quotes. For example,
"Hello, world!" or 'JavaScript'.
 Boolean: Represents a logical value, either true or false.
 Undefined: Represents a variable that has been declared but not assigned a
value. For example, let x; leaves x as undefined.
 Null: Represents a deliberate non-value or an empty value. For example, let y
= null;.
 Symbol (introduced in ES6): Represents a unique and immutable value often
used as object property keys. For example, const sym =
Symbol('description');.
 BigInt (introduced in ES11/ES2020): Represents integers with arbitrary
precision, useful for very large integers. For example, const bigInt =
1234567890123456789012345678901234567890n;

2. Non-Primitive (Reference) Data Types


These types can hold collections of values and are mutable.
 Object: Represents a collection of key-value pairs. Objects can include arrays,
functions, and other objects.
For example:

 Array: A special type of object used to store ordered collections of values.


Arrays can hold elements of any type

 Function: A type of object designed to perform a task or calculate a value.


Functions can be assigned to variables and passed around like other values.

 Date: An object that represents a single moment in time.


 RegExp: An object that represents a regular expression used for pattern
matching in strings.

Each of these data types has its own set of operations and methods.
Understanding these types is fundamental for effective JavaScript
programming, as they form the basis for handling data and performing
operations in your code.

=================================================================
3. What do you mean by Web Service? Explain different types of Web Services.
Write the difference between API and Web services.

A web service is a standardized way for applications to communicate with each other
over the internet or a network. It allows different systems, often running on different
platforms or written in different programming languages, to interact with one another
by exchanging data and commands.
Here are some key points about web services:
 Interoperability: Web services enable different systems to work together,
regardless of their underlying technology. This is crucial in a diverse
technological environment.
 Protocols and Formats: Web services typically use protocols such as HTTP or
HTTPS and formats like XML or JSON to send and receive data. This
standardization ensures that data can be interpreted correctly by different
systems.
 APIs (Application Programming Interfaces): Web services are often accessed
through APIs. These APIs define the methods and data formats that
applications use to request and exchange information.
 SOAP and REST: There are two main types of web services:
 SOAP (Simple Object Access Protocol): A protocol that uses XML for
messaging and typically relies on HTTP for transmission. It is known for its
robustness and strict standards.
 REST (Representational State Transfer): An architectural style that uses
standard HTTP methods (GET, POST, PUT, DELETE) and is more flexible and
easier to use compared to SOAP. It often uses JSON for data interchange.
 Use Cases: Web services are used in various scenarios, such as integrating
disparate systems, enabling functionalities in web and mobile applications,
and facilitating communication between different software components.
 Overall, web services are a fundamental part of modern software
development, enabling diverse systems to work together seamlessly.

Different types of Web Services:


1. SOAP: Protocol-based, XML-based, strong standards, and suited for
enterprise-level applications with complex requirements.

2. REST: Architectural style, flexible, uses standard HTTP methods, and is


widely used for web and mobile APIs.
3. GraphQL: Query language, flexible and efficient data fetching, uses a single
endpoint, and is popular in modern app development.

Difference between Web Services and APIs:

Web Services Web API

APIs are application interfaces,


Web services are a type of API,
implying that one application can
which must be accessed
communicate with another
through a network
application in a standardized
connection.
manner.

Web service is used for REST,


API is used for any style of
SOAP and XML-RPC for
communication.
communication.

All Web services are APIs. APIs are not web services.

It doesn’t have lightweight It has a light-weight architecture


design, needs a SOAP furthermore, useful for gadgets
convention to send or which have constrained
receive data over the transmission capacity like smart
system. phones.

It provides support for the HTTP/s


It provides supports only for
protocol: URL Request/Response
the HTTP protocol.
Headers, and so on.

It is not open source, however,


can be devoured by any It is an open source and also ships
customer that with .NET framework.
comprehends xml.

Web service supports only


API supports XML and JSON.
XML.

Web Services can be hosted on Web API can be hosted only on IIS and
IIS. self.

==============================================================
4. What is a Firewall and why is it used? What are the steps to set up a firewall?

A firewall is a network security device or software that monitors, filters, and controls
incoming and outgoing network traffic based on predetermined security rules. Its primary
purpose is to create a barrier between a trusted internal network and untrusted external
networks, such as the internet. By doing so, it helps protect the internal network from
unauthorized access, cyberattacks, and other potential security threats.

Why Firewalls Are Used


 Prevent Unauthorized Access: Firewalls block unauthorized users from
accessing internal networks or sensitive information.
 Protect Against Cyberattacks: They help defend against various types of
attacks, such as hacking attempts, viruses, and malware.
 Monitor Traffic: Firewalls can log and analyze network traffic, which helps in
detecting and responding to potential security incidents.
 Control Network Usage: Organizations can use firewalls to manage and
restrict internet access based on users, applications, or time.
 Regulate Data Flow: Firewalls can be configured to permit or deny traffic
based on specific rules, ensuring that only legitimate communication is
allowed.
 In essence, firewalls are a crucial component of network security, helping to
maintain the integrity and safety of data and systems by controlling and
monitoring the traffic that enters and leaves a network.

Steps to set up a firewall:

Setting up a firewall involves several steps, which can vary depending on whether
you're using a hardware firewall, a software firewall, or a cloud-based firewall.
Here’s a general guide to help you get started:
1. Define Your Security Policy
 Identify Needs: Determine what you need to protect (e.g., servers,
applications, data).
 Set Objectives: Establish the security goals and what kind of traffic should be
allowed or blocked.
 Determine Rules: Outline rules for inbound and outbound traffic based on IP
addresses, ports, and protocols.
2. Choose the Right Firewall
 Hardware Firewall: Ideal for larger networks; provides robust protection.
 Software Firewall: Suitable for individual computers or smaller networks.
 Cloud Firewall: Best for cloud-based environments and applications.
3. Install the Firewall
 Hardware Firewall:
o Connect the firewall to your network according to the manufacturer’s
instructions.
o Typically involves placing it between your modem and router or
directly at the network edge.
 Software Firewall:
o Download and install the firewall software on the computer or server
you wish to protect.
o Follow the installation wizard and default settings, or customize as
needed.
 Cloud Firewall:
o Configure the firewall through the cloud service provider’s interface.
o Integrate it with your cloud infrastructure as per the provider’s
guidelines.
4. Configure Firewall Rules
 Create Rules: Set up rules for allowed and denied traffic. Common rules
include:
o Allow: Specify traffic from trusted IP addresses or ranges.
o Deny: Block traffic from untrusted sources or certain IP addresses.
o Port Rules: Control traffic based on ports (e.g., HTTP on port 80,
HTTPS on port 443).
o Protocol Rules: Define rules based on protocols (e.g., TCP, UDP).
 Set Up Zones: If applicable, create and configure different zones (e.g.,
internal, external) and define traffic policies between them.
 Enable Logging: Activate logging to monitor and review firewall activity. This
helps in identifying potential threats or misconfigurations.
5. Test the Configuration
 Validate Rules: Ensure that the firewall is enforcing the rules correctly and
that legitimate traffic is flowing as expected.
 Check Access: Test access to services and applications to confirm they’re
working as intended.
 Verify Security: Use tools or services to scan your network for vulnerabilities
and ensure the firewall is providing the necessary protection.
6. Monitor and Maintain
 Regular Reviews: Periodically review and update firewall rules to adapt to
changing security needs and network changes.
 Monitor Logs: Regularly check firewall logs for unusual activity or potential
security incidents.
 Update Software: Ensure that firewall software and firmware are kept up to
date with the latest patches and updates.
7. Document the Configuration
 Record Rules: Maintain documentation of firewall rules and policies for
future reference.
 Create a Backup: Save a backup of the firewall configuration to quickly
restore settings if needed.
8. Educate Users
 Train Staff: Ensure that network users are aware of the firewall policies and
understand how to comply with them.
 Promote Best Practices: Encourage good security practices, such as avoiding
suspicious links and using strong passwords.

=================================================================
5. What is the relationship between Enterprise JavaBeans and JavaBeans? JavaBeans
has mechanisms like bound properties for data transfer between components.
Why is the Info Bus necessary?

Enterprise JavaBeans (EJB) and JavaBeans are related concepts in Java, but they serve
different purposes and operate at different levels of the Java ecosystem.
JavaBeans
JavaBeans is a specification for writing reusable software components in Java.
These components, known as JavaBeans, follow certain conventions:
 Properties: JavaBeans use getter and setter methods to manage properties.
 Events: JavaBeans can generate and listen for events, following a standard
pattern.
 Serialization: JavaBeans are serializable, allowing their state to be saved and
restored.
 No-argument Constructor: JavaBeans require a no-argument constructor for
instantiation.
 JavaBeans are typically used for simple data encapsulation and manipulation,
often as part of Java applications or libraries.

Enterprise JavaBeans (EJB)


EJB is a specification for building distributed, transactional, and multi-tiered
enterprise applications. EJBs are more complex than JavaBeans and are
designed to handle enterprise-level requirements, such as:
 Transaction Management: EJBs provide built-in support for managing
transactions.
 Concurrency: EJBs handle concurrent access to resources.
 Security: EJBs support declarative security to control access to enterprise
beans.
 Remote Access: EJBs can be accessed remotely, making them suitable for
distributed applications.
 EJBs are typically used in enterprise applications where you need robust
transaction support, security, and scalability. They are managed by an EJB
container, which provides the necessary runtime environment and services.
Relationship
 JavaBeans are a general concept for reusable components in Java, while EJB
is a specific technology for building enterprise-level applications.
 EJBs are an advanced form of JavaBeans designed to address the needs of
enterprise applications, with additional support for transactions, security, and
remote communication.
 Both use similar underlying Java technologies, but EJBs offer more features
and are used in different contexts compared to standard JavaBeans.
6.

Why is the Info Bus necessary:


The InfoBus is a technology designed to address some of the limitations of JavaBeans,
particularly in the context of data transfer and synchronization between components.
Here’s why the InfoBus is considered necessary despite the capabilities of JavaBeans:
1. Dynamic Data Binding and Synchronization: JavaBeans supports bound
properties, allowing components to listen to changes in other components’
properties. However, this mechanism is often limited to the scope of a single
component or a simple interaction between two components. The InfoBus
extends this capability to a broader range of components, enabling more
dynamic and flexible data binding and synchronization across multiple
components in a distributed or complex user interface.
2. Decoupling of Components: JavaBeans can establish direct relationships
between components (such as listeners and event sources). This direct
coupling can become cumbersome as the number of components increases.
The InfoBus provides a decoupled architecture where components do not
need to know about each other directly. Instead, they interact through a
shared data bus, which simplifies the management of data flows and reduces
dependencies.
3. Centralized Data Management: In systems with many interconnected
components, managing and updating data across all components can become
complex. The InfoBus offers a centralized mechanism to manage data
updates and notifications. Components can publish data to the InfoBus, and
interested components can subscribe to receive updates, making it easier to
ensure consistency and coherence across the system.
4. Scalability and Flexibility: As applications grow in complexity, managing
interactions and data flows between numerous components becomes
increasingly challenging. The InfoBus provides a scalable solution by allowing
components to dynamically discover and interact with each other through
the bus, rather than hardcoding dependencies and interactions.
5. Improved Maintainability: With the InfoBus, changes to one component or
its data don’t necessitate changes to other components directly. This reduces
the risk of introducing bugs when modifying components and makes it easier
to maintain and evolve the system over time.
In summary, while JavaBeans offers foundational mechanisms for component
interaction, the InfoBus enhances these capabilities by providing a more
flexible, decoupled, and scalable approach to managing data and
interactions in complex systems.

==============================================================
===

You might also like