Create four web pages about ANY topic related to CS (e.g., Software Development
ID: 3701620 • Letter: C
Question
Create four web pages about ANY topic related to CS (e.g., Software Development Life Cycle Methodologies, Programming Languages, Operating Systems, Virus, etc).
Rubric:
The main page provides a general overview of a the topic
15pts
The remaining three pages should include more detailed information about a sub-topic.
Paraphrase instead of copying the content from an external site
15pts
A navigation menu that links each page to each other.
15pts
Each page should include at least one graphic
15pts
An external CSS file with at least 20 CSS rules.
10pts
Hyperlinks to the sources where you obtained the information
10pts
Use at least two HTML tags and two CSS properties NOT used in Lab 1.
Include as part of your post the new tags and properties used.
10pts
Validate your HTML code at https://validator.w3.org/.
Include screenshots of each page HTML validation (without errors)
10pts
Requirements PointsThe main page provides a general overview of a the topic
15pts
The remaining three pages should include more detailed information about a sub-topic.
Paraphrase instead of copying the content from an external site
15pts
A navigation menu that links each page to each other.
15pts
Each page should include at least one graphic
15pts
An external CSS file with at least 20 CSS rules.
10pts
Hyperlinks to the sources where you obtained the information
10pts
Use at least two HTML tags and two CSS properties NOT used in Lab 1.
Include as part of your post the new tags and properties used.
10pts
Validate your HTML code at https://validator.w3.org/.
Include screenshots of each page HTML validation (without errors)
10pts
Explanation / Answer
//main page is saved with name main_page.html.
<!DOCTYPE html>
<head>
<title>Home page</title>
<link rel="stylesheet" href="main.css">
</head>
<body>
<div class="main-head">
<div class="home">
<a href="main_page.html">HOME</a>
</div>
<h1 class="title">Four Computer Science Topics:</h1>
</div>
<table class="topics">
<tr>
<td><a href="SDLC.html" target="blank">Software Development Life Cycle Methodologies</a></td>
<td><a href="DBMS.html" target="blank">Database Management System</a></td>
</tr>
<tr>
<td><a href="OS.html" target="blank">Operating Systems</a></td>
<td><a href="VIRUS.html" target="blank">Virus</a></td>
</tr>
</table>
</body>
</html>
//first page is saved with name SDLC.html
<!DOCTYPE html>
<head>
<title>SDLC Methodologies</title>
<link rel="stylesheet" href="main.css">
</head>
<body>
<div class="main-head">
<div class="home">
<a href="main_page.html">HOME</a>
</div>
<h1 class="title"> DSoftwareevelopment Life Cycle Methodologies</h1>
</div>
<div class="content">
<h2>Introduction:</h2><hr>
<p>Software development life cycle (SDLC) is a series of phases that provide a common understanding of the software building process. How the software will be realized and developed from the business understanding and requirements elicitation phase to convert these business ideas and requirements into functions and features until its usage and operation to achieve the business needs. The good software engineer should have enough knowledge on how to choose the SDLC model based on the project context and the business requirements.
Therefore, it may be required to choose the right SDLC model according to the specific concerns and requirements of the project to ensure its success. I wrote another article on how to choose the right SDLC, you can follow this link for more information.
In this article, we will explore the different types of SDLC models and the advantages and disadvantages of each one and when to use them.<br>
</p><hr>
<p>
Types of Software developing life cycles (SDLC)
Waterfall Model<br>
V-Shaped Model<br>
Evolutionary Prototyping Model<br>
Spiral Method (SDM)<br>
Iterative and Incremental Method<br>
Agile development<br>
</p>
<br>
<b>Link:<a href="https://melsatar.blog/2012/03/15/software-development-life-cycle-models-and-methodologies/">DSoftwareevelopment Life Cycle Methodologies</a></b>
</div>
</body>
</html>
//second pate is saved with name DBMS.html
<!DOCTYPE html>
<head>
<title>Database Management System</title>
<link rel="stylesheet" href="main.css">
</head>
<body>
<div class="main-head">
<div class="home">
<a href="main_page.html">HOME</a>
</div>
<h1 class="title"> Database Management System</h1>
</div>
<div class="content">
<h2>Introduction:</h2><hr>
<p><br>
A DBMS makes it possible for end users to create, read, update and delete data in a database. The DBMS essentially serves as an interface between the database and end users or application programs, ensuring that data is consistently organized and remains easily accessible.
The DBMS manages three important things: the data, the database engine that allows data to be accessed, locked and modified -- and the database schema, which defines the database’s logical structure. These three foundational elements help provide concurrency, security, data integrity and uniform administration procedures. Typical database administration tasks supported by the DBMS include change management, performance monitoring/tuning and backup and recovery. Many database management systems are also responsible for automated rollbacks, restarts and recovery as well as the logging and auditing of activity.
The DBMS is perhaps most useful for providing a centralized view of data that can be accessed by multiple users, from multiple locations, in a controlled manner. A DBMS can limit what data the end user sees, as well as how that end user can view the data, providing many views of a single database schema. End users and software programs are free from having to understand where the data is physically located or on what type of storage media it resides because the DBMS handles all requests.
The DBMS can offer both logical and physical data independence. That means it can protect users and applications from needing to know where data is stored or having to be concerned about changes to the physical structure of data (storage and hardware). As long as programs use the application programming interface (API) for the database that is provided by the DBMS, developers won't have to modify programs just because changes have been made to the database.
</p><hr>
<p>
<b>Advantages of a DBMS</b><br>
Using a DBMS to store and manage data comes with advantages, but also overhead. One of the biggest advantages of using a DBMS is that it lets end users and application programmers access and use the same data while managing data integrity. Data is better protected and maintained when it can be shared using a DBMS instead of creating new iterations of the same data stored in new files for every new application. The DBMS provides a central store of data that can be accessed by multiple users in a controlled manner.
Central storage and management of data within the DBMS provides:
Data abstraction and independence
Data security
A locking mechanism for concurrent access
An efficient handler to balance the needs of multiple applications using the same data
The ability to swiftly recover from crashes and errors, including restartability and recoverability
Robust data integrity capabilities
Logging and auditing of activity
Simple access using a standard application programming interface (API)
Uniform administration procedures for data
Another advantage of a DBMS is that it can be used to impose a logical, structured organization on the data. A DBMS delivers economy of scale for processing large amounts of data because it is optimized for such operations.
A DBMS can also provide many views of a single database schema. A view defines what data the user sees and how that user sees the data. The DBMS provides a level of abstraction between the conceptual schema that defines the logical structure of the database and the physical schema that describes the files, indexes and other physical mechanisms used by the database. When a DBMS is used, systems can be modified much more easily when business requirements change. New categories of data can be added to the database without disrupting the existing system and applications can be insulated from how data is structured and stored.
Of course, a DBMS must perform additional work to provide these advantages, thereby bringing with it the overhead. A DBMS will use more memory and CPU than a simple file storage system. And, of course, different types of DBMSes will require different types and levels of system resources.
</p>
<br>
<b>Link:<a href="https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0ahUKEwjStI7Hq6XaAhVBN48KHY17DlcQFggvMAI&url=http%3A%2F%2Fsearchsqlserver.techtarget.com%2Fdefinition%2Fdatabase-management-system&usg=AOvVaw1djIvH7q3K0tgZVA6XLjSh">Database Management System</a></b>
</div>
</body>
</html>
//third page is saved with name OS.html
<!DOCTYPE html>
<head>
<title>Operating System</title>
<link rel="stylesheet" href="main.css">
</head>
<body>
<div class="main-head">
<div class="home">
<a href="main_page.html">HOME</a>
</div>
<h1 class="title"> Operating System</h1>
</div>
<div class="content">
<h2>Introduction:</h2><hr>
<p><br>
An Operating System (OS) is an interface between a computer user and computer hardware. An operating system is a software which performs all the basic tasks like file management, memory management, process management, handling input and output, and controlling peripheral devices such as disk drives and printers.
Some popular Operating Systems include Linux, Windows, OS X, VMS, OS/400, AIX, z/OS, etc.
<b>Following are some of important functions of an operating System.</b><br>
Memory Management<br>
Processor Management<br>
Device Management<br>
File Management<br>
Security<br>
Control over system performance<br>
Job accounting<br>
Error detecting aids<br>
Coordination between other software and users<br>
<hr>
</p><hr>
<p>
<b> Important Activities</b><br>
Security ? By means of password and similar other techniques, it prevents unauthorized access to programs and data.
Control over system performance ? Recording delays between request for a service and response from the system.
Job accounting ? Keeping track of time and resources used by various jobs and users.
Error detecting aids ? Production of dumps, traces, error messages, and other debugging and error detecting aids.
Coordination between other softwares and users ? Coordination and assignment of compilers, interpreters, assemblers and other software to the various users of the computer systems.
</p>
<br>
<b>Link:<a href="https://www.tutorialspoint.com/operating_system/os_overview.htm">Operating System</a></b>
</div>
</body>
</html>
//last page is saed with name VIRUS.html
<!DOCTYPE html>
<head>
<title>Virus</title>
<link rel="stylesheet" href="main.css">
</head>
<body>
<div class="main-head">
<div class="home">
<a href="main_page.html">HOME</a>
</div>
<h1 class="title"> Virus</h1>
</div>
<div class="content">
<h2>Introduction:</h2><hr>
<p>A computer virus is a program, script, or macro designed to cause damage, steal personal information, modify data, send e-mail, display messages, or some combination of these actions.
When the virus is executed, it spreads by copying itself into or over data files, programs, or boot sector of a computer's hard drive, or potentially anything else writable. To help spread an infection, the virus writers use detailed knowledge of security vulnerabilities, zero days, or social engineering to gain access to a host's computer.
Note: In most cases, a computer virus cannot infect a CD or DVD disc, as most CDs or DVDs are locked after being created, preventing additional files from being put on that disc.
Which operating systems are susceptible to viruses?
How to protect your computer from a virus
What can a virus do to a computer?
Examples of computer viruses
Can a virus physically damage my computer?
When was the term "Virus" first coined?
What was the first computer virus ever created?
What is the full form of "virus" or what is it short for?
Related computer virus pages
Computer virus help and support
Which operating systems are susceptible to viruses?
All of the major operating systems can contract a computer virus. Whether you use Microsoft Windows, macOS, or a Linux variant, your computer can be at risk.
How to protect your computer from a virus
You can protect your computer from viruses by installing an antivirus protection program. Once installed on a computer an antivirus monitors, detects, and cleans any computer viruses by looking for virus signatures.
How does an antivirus work?
What are the current available antivirus programs?
How does a computer get infected with a virus or spyware?
What can a virus do to a computer?
What a virus does to a computer once it has infected the computer depends on the type of virus. Typically most computer viruses will delete data, overwrite information, display messages, and add itself to other files on the computer. Almost all computer viruses only damage the data contained on the computer and do not physically harm the computer or its hardware. More sophisticated viruses like Stuxnet can cause physical damage.<br>
<br>
<b>Link:<a href="https://www.computerhope.com/jargon/v/virus.htm">Virus</a></b>
</div>
</body>
</html>
//and css file is saved with name main.css
.home{
color:white;
position:absolute;
top:10px;
left:0px;
}
.main-head{
position:absolute;
top:5px;
width:1350px;
height:50px;
background-color:black;
border:2px solid yellow;
border-radius:5px;
text-align:center;
}
.title{
color:white;
font-size:30px;
font-style:italic;
}
.topics
{
position:absolute;
top:100px;
left:350px;
width:650px;
height:250px;
}
td{
background-color:blue;
text-align:center;
font-size:30px;
}
a{
color:white;
}
td:hover{
background-color:black;
color:white;
}
.content{
position:absolute;
top:60px;
width:1350px;
height:500px;
border:1px solid black;
}
//make all the file in same path i mean keep the all files in same folder.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.