Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Now that you have almost completed the course, use your newly acquired knowledge

ID: 3891804 • Letter: N

Question

Now that you have almost completed the course, use your newly acquired knowledge to reexamine the following question:

1. PHP, MySQL, Ajax and other current web technologies are required in order for the World Wide Web as we know it to function. What role do these technologies play?

There is a lot of debate about emerging technologies. Some of the most popular technologies include Web 2.0/3.0, HTML 5.0, and cloud computing. This Discussion will help you understand what these technologies are and what they mean to you as a web developer.

1. Briefly explain the features of Web 2.0 and Web 3.0. What are some of the advantages and disadvantages of Web 2.0 as compared to Web 3.0?

2. What are some of the advantages and disadvantages of HTML 5.0 as compared to Adobe Flash? Which one would you prefer to use for web development? Why?

3. Cloud computing may pose significant challenges for Internet users. What do you think some of these challenges are, and how can they be managed?

Explanation / Answer

Q1) Briefly explain the features of Web 2.0 and Web 3.0. What are some of the advantages and disadvantages of Web 2.0 as compared to Web 3.0?

Web 2.0: - Web 2.0 is a new-age web application, which encourages interactivity, information sharing, and collaboration on the Internet. It is quite opposite of a website, where users can take a passive view of the content. Web 2.0 is based on user interaction. All social networking sites, video sharing sites, blogs, forums, wikis etc. are examples of web 2.0 application. Web 2.0 technologies have brighter and wider features. It can be implemented on any platform at the convenience of the business house. If you are present in social media like Twitter or Facebook, you can directly interact with your customers.

Web 3.0 - Web 3.0 will be based on semantic web. This is a technology, where information and data are stored in such a way that the computer systems understand them. It may give birth to a next-gen artificial intelligence. It can lead to a virtual web. With the advent of web 3.0 and virtual games, it is clearly evident that it will discover a new web, based on a virtual world. Web 3.0 may bring the concept of personal desktop. It will give you the option to save your data and access it from anywhere of the world. You just need to login to your account from same browser. It is assumed that web 3.0 will allow users to drag and drop files from their desktop to the internet browser. A number of features such as 3D, seamless animation, high-definition graphics, audio, and video are expected to be imbibed in web 3.0.

advantages and disadvantages of Web 2.0 as compared to Web 3.0?

The advantages of Web 2.0 are:-
• The web 2.0 allows users to read and write for interacting, which focuses on communities in sharing contents, such as blogs, wikis, tagging or web.
• The web 2.0 works as platforms that are efficient to sales strategies in overall scale.
• The web 2.0 can be used to control a positive business’s image by hiring bloggers.
• The web 2.0 community sites are effective in sharing success stories, employee collaboration and satisfaction of employees, and also used to get product feedback as well as aiming valuable marketing resources.

The disadvantages of Web 2.0 are:-
• The web 2.0 is usually run by uneducated people.
• The web 2.0 depends on internet connection.
• Many free web 2.0 services are not well protected.

Q2) What are some of the advantages and disadvantages of HTML 5.0 as compared to Adobe Flash?

HTML 5.0 has been developed by many developers and it is more upgraded and unique than Flash which is owned by Adobe. Flash also runs very slowly on some platforms such as Linux and Mac OS X since it does not have access to Graphics Processing Unit (GPU) processing. What this means is that the graphics processing is performed on the CPU (Central Processing Unit) and this causes the application to slow down immensely. Adobe Flash is also not supported by iOS and so a Flash file cannot run on an iOS device such as iPad and iPhone. One of the other key drawbacks of Flash is that in order to play a SWF file, you will need to install Adobe Flash and so you need to ensure that the device and the operating system are compatible with Flash.

When it comes to running on Linux and Mac OS X, HTML5 excels and it has been shown that HTML5 content outshines Flash by running 58% faster than Flash apps. It has also been shown that Flash is not great for mobile devices and laptops whereas HTML5 takes the lead in these areas. Adobe Flash also consumes more power and is not compatible with a touch screen. Because of this, Flash causes a device to heat up. HTML5 on the other hand is compatible with touch screens and it does not have any issues with any device.

I will go for HTML 5.0 as with HTML 5.0 codes, we can decide what a user will see when they enter a website, a blog or any other online links. With HTML, we are also able to embed animations, video clips and other multimedia tools with a text file. HTML5 also support multimedia content and provides features for allowing the scriptable rendering of 2D shapes.

Q3) Cloud computing may pose significant challenges for Internet users. What do you think some of these challenges are, and how can they be managed?

When evaluating potential providers of cloud-based services, we should keep these top five security concerns in mind:-

1. Secure data transfer. All of the traffic travelling between your network and whatever service you’re accessing in the cloud must traverse the Internet. Make sure your data is always travelling on a secure channel; only connect your browser to the provider via a URL that begins with ”https.” Also, your data should always be encrypted and authenticated using industry standard protocols, such as IPsec (Internet Protocol Security), that have been developed specifically for protecting Internet traffic.

2. Secure software interfaces. The Cloud Security Alliance (CSA) recommends that you be aware of the software interfaces, or APIs, that are used to interact with cloud services. ”Reliance on a weak set of interfaces and APIs exposes organizations to a variety of security issues related to confidentiality, integrity, availability, and accountability,” says the group in its Top Threats to Cloud Computing document. CSA recommends learning how any cloud provider you’re considering integrates security throughout its service, from authentication and access control techniques to activity monitoring policies.

3. Secure stored data. Your data should be securely encrypted when it’s on the provider’s servers and while it’s in use by the cloud service. Few cloud providers assure protection for data being used within the application or for disposing of your data. Ask potential cloud providers how they secure your data not only when it’s in transit but also when it’s on their servers and accessed by the cloud-based applications. Find out, too, if the providers securely dispose of your data, for example, by deleting the encryption key.

4. User access control. Data stored on a cloud provider’s server can potentially be accessed by an employee of that company, and you have none of the usual personnel controls over those people. First, consider carefully the sensitivity of the data you’re allowing out into the cloud. Second, follow research firm Gartner’s suggestion to ask providers for specifics about the people who manage your data and the level of access they have to it.

5. Data separation. Every cloud-based service shares resources, namely space on the provider’s servers and other parts of the provider’s infrastructure. Hypervisor software is used to create virtual containers on the provider’s hardware for each of its customers. But CSA notes that ”attacks have surfaced in recent years that target the shared technology inside Cloud Computing environments.” So, investigate the compartmentalization techniques, such as data encryption, the provider uses to prevent access into your virtual container by other customers.

Please let me know in case of any clarifications required. Thanks!

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Chat Now And Get Quote