Eexploring and getting familiar with the website

Assignment Help Basic Computer Science
Reference no: EM13847381

-3-2 (20 points) Introduction to HTML and PHP websites:

1. (4pts) Go to the website www.w3schools.com and spend about 20 to 30 minutes looking around, exploring and getting familiar with the website.  From this exploration answer the following questions, from your perspective:

  1. What did you think about the website in general?
  2. What kind of information did you find in the website?

2. (4pts) Go to the website www.tizag.com do the following and spend about 20 to 30 minutes looking around, exploring and getting familiar with the website.  From this exploration answer the following questions, from your perspective.

  1. What did you think about the website in general?
  2. What kind of information did you find in the website?

3. (4pts) Based on your review, use, etc. up to this time, what are the differences, pros and cons of each of the web sites discussed above.

Answer the following questions about HTML, HTML tags, and HTML in general.  If you get your answer from any other source, location, or website than www.w3schools.com or www.tizag.com please reference your source(s). Note, for this assignment, I want you to go beyond your text book.

 

4. (1pt) What does HTML stand for.

5. (2pts) What is HTML editor in general and it purpose:

6. (1pt) List a minimum three different HTML editors.

7.  (1pt) What is a HTML tag:

8. (1pt) What is the internet:

9. (1pt) What is the web, World Wide Web, WWW:

10. (1pt) What is a browser (reference a software package):

  • Write out definitions, list of bullets, etc. to define and differentiate the above terms/concepts. 
  • Minus 1 point for sourcing your references.  
  • Please save this assignment in WORD format, and label it A-3-3-YourLastName and post it to the drop box.

Reference no: EM13847381

Questions Cloud

Representations of sign and magnitude : 1 Give the data representation of each of the following integers assuming 16 bits and each of the representations of sign and magnitude, one's complement, and two's complement. The answers must be expressed in hexadecimal. a. 5159c. -11111
Prepare the journal entries to record pension expense : 1) Determine pension expense for the year. 2) Prepare the journal entries to record pension expense and funding for the year.
Research and pick one organization : Research and Pick ONE organization that can you conduct a risk assessment on. It can be any organization or company of choice. For the case study, you are pretty much creating your risk assessment report.  Case Study 1 is the first section of that re..
Recruitment of females and veterans of the u.s. military : Recruitment of Females and Veterans of the U.S. Military
Eexploring and getting familiar with the website : 1. (4pts) Go to the website www.w3schools.com and spend about 20 to 30 minutes looking around, exploring and getting familiar with the website.  From this exploration answer the following questions, from your perspective:
Look up the programming design/troubleshooting tool : You will have to look this up on the web.  I recommend use the following key words: Desk check Programing
Ultrasonic and electrical capacitance tomography sensor : Use of ultrasonic and electrical capacitance tomography sensor for characterisation of multiphase flow in subsea metering
Isolating aspartame transmigrate : You have a mixture of 3 proteins, listed in the table below with their relevant properties. You areinterested in isolating aspartate transaminase using ion exchange chromatography with DEAE resin. Giventhe values in the table below: 1) what pH would ..
Determine pension expense for the year : Determine pension expense for the year. Prepare the journal entries to record pension expense and funding for the year.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Change of the image to that of a different image

The documents must display an image and three buttons. The buttons should be labeled simply 1, 2, and 3. When pressed, each button should change of the image to that of a different image.

  How many frames are destroyed

In a Standard Ethernet LAN, the average size of a frame is 1000 bytes. If a noise of 2 ms occurs on the LAN, how many frames are destroyed? Also repeat this problem with Gigabit Ethernet LAN.

  Write a java method which takes an integer

Write a Java method which takes an integer array parameter and locates the minimum value in the array and outputs that value using System.out.printf. Use an enhanced for loop to process the array. You only need one loop to do this!

  What variables exist in memory just before the statement

During the execution of the program above, what variables exist in memory just before the statement "printf("a[0] = %d, b = %d\n", a[0], b);" executes, and what are their values?

  Determine general security architecture for the company

Determine the most important assets of the company, which must be protected, Determine general security architecture for the company

  Determining contents of memory of specified address

Find the contents of memory from address 0x1800 up to, but not including, 0x1809, after this code is executed.

  List the three actions we could take upon receiving a signal

list three disadvantages for using signals as a means of interprocess comm.

  You have been asked to develop uml diagrams to graphically

you have been asked to develop uml diagrams to graphically depict and describe the architecture of two 2 unrelated

  Secure encrypted communications

Transmitting personal and business data and information over secure communication channels is critical. In some cases it is required, especially when personally identifiable information is being transmitted. Credit card numbers, Social Security Numbe..

  Process of preparing the truth table

After the fourth clock pulse, the machine has to be again in the reset state, ready for the next sequence. Minimize the number of states needed.

  General area of network security is obviously of enormous

The general area of network security is obviously of enormous corporate and national importance. And there's no doubt that intrusion detection and prevention is a principal concern. Lately there have been a number of concerted security attacks on maj..

  Explain computer etiquette for effective communication

Each day we should be careful to insure that personal information is not compromised. Computer etiquette is difficult for effective communication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd