Web Development and Database Administration Level-III
Web Development and Database Administration Level-III
Administration Level-III
Acronym
ACL -----------------------------------------------Access control lists
OS ------------------------------------------------Operating System
An ISP has the equipment and the telecommunication line access required to have
a point of presence on the internet for the geographic area served.
ISPs make it possible for customers to access the internet while also providing additional
services such as email, domain registration and web hosting.
ISPs may also provide different internet connection types, such as cable and fiber.
Connections can also come in the form of high-speed broadband or non-broadband.
Web hosting is a service that allows organizations and individuals to post a website or
web page onto the Internet.
Web hosting is a necessity for any website it is the physical location of your website on
the Internet, an online storage center that houses the information, images, video, and
other content that comprises your website.
A web hosting service is a type of Internet hosting service that allows individuals and
organizations to make their website accessible via the World Wide Web.
Web hosts are companies that provide space on a server owned or leased for use by
clients, as well as providing Internet connectivity, typically in a data center.
Web hosting is the place where all the files of your website live. It is like the home of
your website where it actually lives.
Figure 1.1: web hosting features
A server is a computer that connects other web users to your site from anywhere in the world.
Characteristics of a good web hosting company
I. Good reputation
A good web hosting company must have a good and excellent reputation in the web hosting
business circles.
A good web hosting service provider should have been in existence for some reasonably long
time.
The other major characteristic that a good web hosting company should offer is that they should
have the ability to provide all the technical support where and when you need it. phone calls on a
24 hours basis.
When you are looking for a web hosting service provider be sure to select that which will offer
customized services to you..
V. Quality machinery and hardware
VI. Security
Email hosting is the service of renting out and managing email servers. The server is a space
where you can send, receive and store emails. With email hosting, you can set up professional
email addresses on your domain name.
Web-hosting email services allow you to send and receive mail and manage email accounts
through webmail and email clients.
It’s not advised to use free email hosting , Professional (paid) email hosting services are most
likely to fit the needs of a growing business better.
Cloud servers are always kept up-to-date with the latest security patches and recent
technological advancements. Benefits include increased bandwidth requirements and firewall
settings for additional security, among many others. A final benefit to consider is that email lives
on the Internet, so if your system goes down, everything is safely backed up.
A variety of factors can interrupt service, from temporary disruptions to longer-term incidents or
degradations. Common points of failure could be major ISPs, DNS providers, CDN providers,
hosting or infrastructure vendors, or even APIs for information exchange.
1.5. Security technologies assessment
Web server scripting languages and frameworks are essential tools for system administrators
who want to create dynamic and interactive web applications..
I. Project requirements.
Selecting the right Internet Service Provider (ISP) hosting service for your business is crucial for
ensuring a reliable online presence. Here are key client selection criteria to consider when
evaluating ISP hosting services:
Servers are essential components of modern IT infrastructures and provide services such as
email, web hosting, database management, and other applications.
Monitoring servers is important because it lets you detect problems early, preventing
downtime and data loss. There are several ways to monitor server performance, from simple
tools to complex solutions.
I. Availability/Uptime Monitoring
V. Log Monitoring
v. Think Ahead
Self-Check-2
Part-I: Say True or False
An operating system is a system software program that distributes and manages the server's
resources. It acts as a communication bridge between user's and computer's hardware hence,
prioritizes user's request and programs.
The two most popular ones used for running websites are Linux and Windows-based OS.
LINUX They are very secure, and the OS is constantly updated with security patches,
WINDOWS Windows is the most popular OS used globally and has been around since 1985
Budget
Requirements
Technical Knowledge
Support
Compatibility
3.2. Web-host server for dynamic websites
Dynamic sites use a server-side programming language to connect with a database to enable
interactive features and alter the content.
Dynamic sites use a server-side programming language to connect with a database to enable
interactive features and alter the content. Their common use cases include forums, social media
platforms, and eCommerce sites.
Depending on the scripting language, there are two types of dynamic websites.
Client-Side Scripting
Server-Side Scripting
Dynamic web pages require complex software and additional scripting language, making them
more difficult to develop than static websites.
Easier maintenance.
Content personalization
More features.
In the ever-growing world of e-commerce, securing payment transactions has become a top
priority for businesses and consumers.
The online payment ecosystem comprises several components that enable seamless and secure
payment transactions. The primary components of this ecosystem are:
Customers: The y initiate transactions by
choosing the goods or services they want to purchase and providing their payment
details.
Payment Gateways: They act as intermediaries between the merchant website and the
payment processor. Payment gateways encrypt customer payment details and transmit
them securely to the payment processor.
Payment Processors: They receive, validate, and process payment information from
the payment gateway, acquiring the funds from the issuing bank and depositing them
into the merchant's account.
Issuing Banks: Financial institutions that issue credit or debit cards to consumers on
behalf of the card networks (e.g., Visa or Mastercard).
To ensure secure transactions, all these components must work together cohesively and
implement security measures that protect sensitive customer data.
Securing payments should be among the top priorities for any e-commerce business. Here are
some compelling reasons why secure payments are essential for e-commerce:
Prevent Fraud:
Reduce Chargebacks
Implementing the best practices for securing payments in e-commerce helps businesses comply
with security regulations and reduces the likelihood of security breaches and fraud attempts.
Here are some best practices that e-commerce
merchants should consider:
B. Encryption All sensitive data transmitted over public networks, such as payment details,
should be encrypted using SSL (Secure Sockets Layer) or TLS (Transport Layer
Security). This ensures that attackers cannot easily decipher intercepted data.
E. System Monitoring
Self-Check-3
Part-I: Choose the correct answer
1. Which of the following is an open-source operating system known for security and
constant updates?
A. Windows C. Linux
B. macOS D. Android
2. What is one advantage of choosing Linux for web hosting?
A. Limited customization options
B. Expensive licensing fees
C. Open-source with no cost restrictions
D. Compatibility issues with software
3. When considering the right OS for web hosting, what does technical knowledge refer to?
A. User interface familiarity C. Internet connection speed
B. Programming and coding skills D. Number of installed applications
4. Which factor is NOT mentioned as a consideration when choosing a website hosting
operating system?
A. Technical knowledge C. Compatibility
B. Server color D. Budget
5. Why is securing payments essential for e-commerce?
A. Increase charge C. Encourage online fraud
B. Build trust and confidence D. Decrease customer satisfaction
Part-II: Matching Questions
A B
1. Payment Gateways C A. Financial institutions issuing cards
2. SSL/TLS Encryption D B. Website or app developed by a merchant
3. Issuing Banks A C. Intermediaries between merchant and processor
4. Dynamic Websites E D. Technology for securing data transmission
5. Merchant Websites/Apps B E. Websites content-based user interactions
Before we delve into how to efficiently manage data usage, it is important to understand the
concept of peak and off-peak hours. Internet service providers often categorize certain times of
the day as peak hours, where network traffic is at its highest due to a surge in user activity.
These peak hours usually coincide with periods of heavy internet usage, such as evenings when
people return from work or school.
During peak hours, network congestion may occur, resulting in slower internet speeds and
buffering.
off-peak hours refer to the times when internet usage is relatively lower, leading to a smoother
and faster online experience.
Now that we understand the basics, let's explore some practical tips to optimize data usage
during peak hours:
4.1.4. Mastering Your Data Plan: Maximize Value during Peak and Off-Peak
Times
With more and more people relying on smartphones,
tablets, and other connected devices, it's essential to optimize your data usage and ensure that
you get the most out of your plan.
Whether you are a heavy data user or simply want to avoid unnecessary charges, understanding
how to master your data plan will help you save money and have a smoother online experience.
In this article, we will explore different strategies to maximize the value of your data plan during
peak and off-peak times.
The first step to mastering your data plan is to keep a close eye on your data consumption. Most
smartphones provide built-in tools to monitor your data usage, allowing you to track how much
data you've used and which apps are consuming the most. By regularly monitoring your usage,
you can identify any data-hungry applications and take necessary action.
Use data tracking apps to gain more detailed insights into your data usage.
Set up data usage alerts to receive notifications when you reach certain thresholds.
Review your data usage regularly and adjust your habits as needed.
Connecting to Wi-Fi networks whenever possible is one of the easiest ways to conserve your
precious mobile data. By using Wi-Fi, you can enjoy faster speeds and avoid using your cellular
data altogether. Take advantage of Wi-Fi networks available at home, work, cafes, or public
places to limit your reliance on the cellular network.
Many apps have settings that allow you to control how they consume data. By tweaking these
settings, you can minimize their impact on your data plan.
Streaming music and videos can quickly eat into your data allowance. However, by making
smart choices, you can still enjoy your favorite content without draining your plan.
Off-peak times, typically during the late night or early morning hours, often offer faster and
more stable network speeds. By scheduling your data-intensive activities during these periods,
you can make the most of your data plan without experiencing any slow-downs or congestion.
A backup of a server is often created in order to be able to restore data if the original server
crashes or becomes inaccessible. This is especially important in organizations for legal or
business reasons.
The process of backups is done by making an exact copy of the server’s data storage device in
order to prevent data loss. This operation can be done manually by copying all files onto an
external storage device. This can be also done automatically by setting up a scheduled process.
The backup process is much more complex in action. It requires a lot of time, expertise, and
caution to be successful. There are different factors a system administrator should take into
account in order not to lose any data, especially when it’s done manually.
Here are some tips when choosing your e-mail and collaboration platform to create a digital
workplace for your business:
Pay attention that an integrated backup system is always preferred over third-party
solutions,
Make sure that you back up all of the important data on a regular basis relying on a real-
time backup plan,
Off-site backups are a good way to protect your data from natural disasters,
The amount of time and effort required to implement the backup plan,
Lastly, if the backup system is optimized to
work in your environment for better performance.
The following are several types of support services that companies can use to maintain their IT
infrastructure and other procedures to increase their effectiveness:
I. Data storage
II. HR and people management.
III. Computer support
IV. Administration support
Other support services companies often use include those that help assist in the administrative
process within their organizations. There are several small duties required for these tasks, which
can take up an administrative professional's time. Examples of available services in this
department include updating customer databases, inputting data and responding to
correspondence from clients and employees.
V. Customer service
Customer service is a popular support service that many organizations rely on to keep their
customers happy. If there aren't enough in-house customer service employees to handle
customer needs, customers may feel as though the company cannot meet their needs. Third-party
customer service support programs make sure clients receive optimal support in a timely
manner.
VI. Web development
Website development and maintenance are important components of support services and help
manage various aspects of web-related tasks, including customer service and inventory
management. These support services can decrease the time that site owners spend on
troubleshooting and fixing issues on their website. There are several resources that can keep
systems and websites functioning and reduce the need for employees to regularly manage the
company's sites.
VII. Sales and revenue generation
One way to increase sales and revenue generation is to use support services focused on
increasing brand awareness and loyalty. These services typically involve assisting customers in
determining the help they require. Services may also include assisting customers in finding
products and services that meet their needs and preferences.
To understand QoS, you must understand the traffic types it measures. Measurements of concern
to QoS are:
1. Bandwidth (maximum rate of transfer) — the speed of a link
2. Throughput (actual rate of transfer)
3. Latency (delay) — the amount of time it takes for a packet to traverse the network, from
source to destination
4. Jitter (variance in latency) — when packets don’t arrive in the same order they were sent
Ongoing service level monitoring, adjustments and tuning of QoS policies should always follow
a successful QoS policy deployment. Business conditions are always changing, so organizations
must adapt the QoS deployment cycle accordingly. This can include:
Starting the QoS deployment cycle over
Redefining objectives
Testing and tuning designs
Deployment of new designs
Monitoring
Depending on the provider, the above services and controls can be managed and consolidated
down to a single box. Such is the case for QoS via Palo Alto Networks firewalls. Thus, to
communicate QoS measures and classification outside the box and downstream network
infrastructure, Differentiated Services Code Point (DSCP) can be implemented. DSCP marks
each packet based on its classification and communicates this to each box the packet travels
through, ensuring a consistent implementation of QoS policy.
Self-Check-3
Part-I: Choose the correct answer
1. What is the main challenge during peak hours for internet users?
A) Slow device updates
B) Network congestion and slower speeds
C) Limited streaming options
D) Off-peak discounts
2. Why is tracking data usage important in mastering your data plan?
A) To increase data charges
B) To identify data-hungry applications
C) To disable Wi-Fi networks
D) To avoid off-peak times
3. When is it advisable to schedule data-intensive activities for optimal performance?
A) Peak hours
B) Random times during the day
C) Off-peak times
D) Weekends