Explain the difference between the client and the server

Assignment Help Computer Network Security
Reference no: EM13302497

What is the difference between the client and the server?

What is the difference between server-side and client-side scritping? Why are they separate?

What is a web browser?

What is a regular expression?

Overview

The purpose of the project is to use most of the techniques you have learned from this course. You may choose any project as long as it meets the requirements discussed below.

The project must be a real application in the sense that the site must be hosted somewhere on the Internet. You can either arrange your own hosting or use WebHawks.

You are free to apply homework assignments toward the final project. However, the final project must be work that you have produced and not material simply copied from another source. If you do copy small portions from another source, you must cite the source and have permission to copy the material.

The final project presentation will count as the final exam for the course. You must demonstrate your completed project to the instructor during the scheduled final exam time to pass the course.

Web Site Functionality

• 1- Demonstrates mastery of a Web site using JavaScript:

o Has extra features or demonstrates techniques beyond the course
o Meets all project requirements (see above) with particularly elegant solutions
o Runs with no error conditions reported by the browser

• 2- Has all the functionality expected of a professional Web site using JavaScript:

o Demonstrates many techniques from the course
o Meets all project requirements (see above)
o Runs with no error conditions reported by the browser
o May have one minor error in the JavaScript on a page

• 3- Has most of the functionality expected of a Web site using JavaScript:

o Demonstrates some techniques from the course
o Meets all but one of the project requirements (see above)
o May have 2-3 minor errors
o Project not available on the Internet

• 4- Has some of the functionality expected of a Web site using JavaScript:

o Demonstrates some techniques from the course
o Meets at least ½ of the project requirements (see above)
o Implementation seems excessively complicated
o May have JavaScript warnings or errors in the browser

• 5- Serious functional problems but shows some effort and understanding:

o Meets at least ½ of the of the functional requirements (see above)
o Has a major error (detected by the browser) or many minor errors
o Demonstrates few techniques from the course

• 6- Web site does not run or was not presented by the specified time
Project Reporting and Presentation

• 7- Project is reported clearly and completely:

o Has extra features or demonstrates techniques beyond the course
o Student presents information in a logical and interesting sequence
o All requirements of the project were presented
o Written report was presented to instructor before the project was presented
o All project-reporting requirements were turned in
o Report is well-written and grammatically correct

• 8- Project presentation or report has minor problems:

o Student presents information in a logical sequence
o All but one of the project requirements were presented
o Some minor project-reporting requirements are missing
o Report contains spelling errors, but is otherwise clearly written

• 9- Project presentation or report has significant problems:

o Audience has difficulty following presentation because student jumps around
o At least ½ of the project requirements were presented
o At least ½ of the project-reporting requirements were turned in
o Report only submitted electronically and without a paper copy

• 10- Project presentation or report is unclear or incomplete:

o Audience cannot understand presentation because there is no logical sequence of information
o Less than ½ of the project requirements were presented
o Less than ½ of the project report was completed

Reference no: EM13302497

Questions Cloud

By how much does bradford required return exceed : By how much does Bradford's required return exceed Farley's required return? Round your answer to two decimal places.
Explain karl marxs economic theory : Karl Marx''s economic theory describe major environmental issues that must be considered when doing business in Trinidad and Tobago.
Theories on soft drink consumption can affect bone health. : Nutrition and medical professionals are concerned about the heavy consumption of soft drinks, as it may be detrimental to bone health. There are several theories associated with soft drink consumption, so please list the theories and provide an expla..
What would the dollar price of the car be : Has the price, in dollars, of the automobile increased or decreased during the 20-year period because of changes in the exchange rate?
Explain the difference between the client and the server : What is the difference between the client and the server. What is the difference between server-side and client-side scritping? Why are they separate
Our kidneys are constantly trying to maintain fluid balance : Our kidneys are constantly trying to maintain fluid balance by either excreting or retaining fluid. How is fluid primarily lost by the body, AND besides answering this question, please list the situations that can cause a signficant loss of fluid.
Locate the image of the coin : A coin 2.3 cm in diameter is held 37 cm from a concave spherical mirror of 40 cm radius of curvature. Locate the image of the coin
Find difference in mercury levels inside and outside tube : A glass tube with inside diameter of 2-mm is inserted vertically into a dish of mercury at 20°C. Determine the difference in mercury levels inside and outside the tube.
Draw a diagram showing the possible outcomes : In your diagram, be sure to label the X and Y-axis, the put option strike price, and show the possible results for a money market hedge, a forward hedge, a put option hedge, and an uncovered position.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Describe how hacker might go about cracking message

Describe how a hacker might go about cracking a message encrypted with each type of algorithm. Suggest a specific application for each type of algorithm where the advantages clearly outweigh the disadvantages.

  Intrusion detection system (ids)

concept of Data, information and knowledge in information warfare, politically motivated computer misdeeds, McClintock Manufacturing, Percentage of Windows systems that run antivirus software that is updated each day, network traffic that is evaluate..

  Explain network security management-flow diagram

Network Security Management-flow diagram, assets and detail of functions. I have completed the assets and flow diagrams and interfaces. Start systems engineering on for MIIS, based on prior homework assignments:

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Analyse potential attacks and give a method of prevention

Write a key exchange protocol for A and B to share a symmetric key. Analyse potential attacks and give a method of prevention and write a key exchange protocol for A and B to share a session key. Must consider mutual authentication, freshness, inte..

  Why one-time password system more secure authentication

Why is one-time password system considered more secure than the basic authentication system? Give at least two reasons.

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  Securing several desktop computers connected to network

Securing numerous desktop computers connected to the network. Explain the access control that you would put in place for each and explain why.

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Determine the value of the symmetric key

Discuss some of the attacks on the Diffie Hellman key exchange protocol we discussed in the lecture. Present your solution for avoiding such attacks.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd