StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Web Design Issues - Assignment Example

Summary
The paper "Web Design Issues" is an outstanding example of a design and technology assignment. The title that is the home page of Jane Doe is wrong. There is no need to say that it is the index page of the website in bold letters. It could be replaced by just typing or keeping Jane Doe on the left-hand side of the website…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.7% of users find it useful

Extract of sample "Web Design Issues"

Question One 1. The title that it is the home page of Jane Doe is wrong. There is no need to say that it is the index page of the web site in bold letters. It could be replaced by just typing or keeping Jane Doe in the left hand side of the web site. 2. The ‘about me’ section is not very descriptive in the home page. It is not gathering enough depth. There will be lot of white space.Moreover, the background color should have been more professional rather than making it too childish. The Updating button could have been placed at the bottom of the home page and the links should have been placed at the top. 3. The link names should have been small and easy to follow. It should be placed at the top of the home web page. 4. The interior pages are not following the same color code as the home page which is a very bad designing concept. It is better to follow the same colors everywhere.( Jennifer Niederst Robbins) 5. The home page contains a news section describing the activity that Jane is proposing to do in the recent time. That should have been kept as a link. 6. There can be a link in the home page that will have the contact me and feedback form. It is better to allow the visitors feel safe in knowing that the person mentioned in the web site can be contacted. It can be an e-mail address also. 7. Keeping clipart inside the interior pages is not safe and if the idea was to match the writing, then photos would have been safer. Question Two The laptop computers that have been connected to the wireless security will be facing the problem of increased threat when compared with regular computers. The laptops can be very efficient inn performing tasks that the normal desktop will function. The laptops when compared with desktop are small, portable and convenient. The browsing of internet can be done using laptop without the inconvenience that has been caused by the wires. The majority of laptops will be coming out with wireless adapter. The wireless access will be having more security threats when compared with desktop. The one security that the laptop can face is called the hot spot and even though the perception is that using laptop on hotspot is safe, it is not found to be like that. The computers that will be communicating on the network will be by network protocols and these protocols can lead to security problems and if encryption is not used the security measures will collapse. The hot spot vendors has been seen to protect only the hotspot thereby leaving the airwaves open and that can cause a lot of problem when the e-mail is retrieved. The network sniffer will be able to get the data like the username and password and that can cause a lot of spam problems. The popularity of wireless network has been on rise and it has gained the popularity in vertical market. Wireless network can cause a situation of client to client attack and that means file sharing can be unsafe and there can be duplication of IP address and there will be disruption of service. There will be an easy attack on the encryption and sophisticated attacker has been found to have easily broken into wired equivalent privacy. The majority of access will have unsecured configuration and the network administrator will be making sure that the access points are configured correctly. The access points have been happening to be a very risky business. The main reason being that access points has a password system or key system and that will be shared by wireless clients with the attackers trying to compromise on the password or key and will be trying all possibilities. There is every chance that the password or key system will not be changed regularly and that can leave the system at risk when an employee leaves the company. The reverse system of managing many access points will also create a more difficult situation. The database of the company can be compromised by deploying wireless network on the system and that is not secured also. The laptop can be connected to the access point by unauthorized agent and there will not be any authorization that has been sought by the intruder. The confidentiality of the data should be ensured as the network system should be accessed by authorized users and the data should be read only to protect the data. The network resources will be causing more security problems due to sharing and there should be a good integrity system to identify integrity problem. Question three 1. A can be connected to B that can be connected to E and connected to N and then connected to P which contains the music system. The peer to peer program should be covering the exactly three clients with each hop. The time to live number is five and that means the search will be done five times as the request will be send to five computers and in this case the four computers will be connected and the search is guaranteed to be successful. 2. D should be successful by using the smallest time to live and that means every step should be taken to reach the point W that contains the music point 2.The point or time to live can be three as the request from D can be send to H first. Then it should be send to S point. From there the request should be send to the W and from there the data can be retrieved. The reason is that sending information from D to I and J will create a situation of block as the I and J point does not go further .H will be connected to R and T and that means from the R and t it will not be connected to W. Question 4 a) The lime wire will be scanning the materials as per the user request and will be blocking all copyrighted materials as described by the content owners. There has been an accusation that lime wire has or should be considered as illegal p2p download service. That has not been the case as lime wire has ensured strong foothold only after napster has been shut down. b)Secure digital music initiative has been called as the SDMI and it is a working group that has the support of more than one hundred and eight business and the specifications are meant to be cross platform and they will be compatible with hardware and software products.The main use will be the watermark and that means there will be a protection code and that can be decrypted by a special key. The not opening of the special key will also mean that the song cannot be listened to. Lime wire has been providing filters and that has blocked access to adult sensitive materials. The filtering language that has been used by in the title of the people and the main limitation is that mislabeling of the information can lead to collapse of the filtering system. That means the file may contain the virus or malware software and that can lead to collapse of system. C.The biggest disadvantage of using lime wire system in downloading files is that it does not have a virus scan build into it. That means, the files that contain .exe file extension and .vbs extension will have to be carefully downloaded as they can contain virus or malware system. The best way to prevent the computer getting loaded with virus is to run a antivirus software after lime wire has been used.(Disadvantages of Lime Wire) Reference “Disadvantages of Lime Wire”, Broadband Info, Viewed on July 22, 2009, retrived from http://www.broadbandinfo.com/high-speed-internet/online-music/what-is-limewire.html Jennifer Niederst Robbins,2006,"color and backgrounds",Web design in a nutshell,355. Read More

CHECK THESE SAMPLES OF Web Design Issues

Interaction Design Problem Analysis

The majority of researchers and system designers have the same opinion that a high-quality software or system design involves a clean breakdown of the issues and problems into manageable process modules, as well as the efficient collection of these modules in a suitable chain of commands (Scribd; Cunningham, & Cunningham, Inc.... The assignment "Interaction design Problem Analysis" focuses on the critical analysis of some of the major interaction design-related problems in technology-based systems....
7 Pages (1750 words) Assignment

Connecting Rural Residents

The paper "Connecting Rural Residents" discusses that generally speaking, the 'handle' for the umbrella is the individual user, implying that the relationship between the user and technology must be examined in order to get a 'handle' on the technology.... .... ... ... What is new about the role of the Internet in healthcare is the Internet's transition from a communications avenue for researchers to a powerful medium of connection and communications for everyone....
15 Pages (3750 words) Essay

Software Usability

Usability tries to address Web Design Issues that touch on a site's usability and offers help on how to design, plan, and evaluate the usability of a site.... The purpose of Usability is to address the need for government websites to improve the quality of user experience by enhancing their usability using user-centered web design.... The site is true to its purpose of enhancing usability of sites through user-centered web design.... The content on every page is purposely for the advancement of better web design that is adaptive to user preferences and requirements....
2 Pages (500 words) Essay

Responsive Web Design

This paper ''Responsive web design'' tells that The evolution of websites in the early 1990s brought a lot of unimaginable benefits to the world.... Responsive web design is gradually changing from being entirely device-centered into being context-focused.... In contrast, to a fixed layout that uses specified static units like pixels, points, and inches, the fluid design uses relative units and percentages (Nebeling & Norrie, 2013).... The fluid design of RWD is made to be relative to the viewpoint or window width of the browser being used....
8 Pages (2000 words) Literature review

Web site / Mobile app design Answers to FAQs MoSCoW, Wireframes, Legal Issues

om are browsing of the products categories, search for the products and its corresponding design features.... The webserver for the website will have an Apache as the web server.... In order to ensure security at all cost, the latest web development practices will be adhered to make sure that perfect Codes and Interfaces are established....
3 Pages (750 words) Essay

Connecting Rural Residents to the Nurse Practitioner via Two-Way Technology

This research paper "Connecting Rural Residents to the Nurse Practitioner via Two-Way Technology: Implications for Clinical Practice" analyzes the role of the Internet in healthcare is the Internet's transition from a communications avenue for researchers to a powerful medium of connection and communications for everyone....
16 Pages (4000 words) Research Paper

Design of Dress and Adornment Reflects the Socio Political Issues

"Design of Dress and Adornment Reflects the Socio-Political issues" paper discusses this statement based on two examples namely the leather jackets and denim jackets.... Fashion is not a 'static' thing but keeps on evolving, with the designs of the dress and other adornments reflecting the various socio-political issues, prevalent in the society in different periods of time.... ne of the key political issues that had impacted the design of the leather jackets are the World Wars, as its use by the military personnel, led to the further evolution of its designs as well as its usage....
8 Pages (2000 words) Essay

Data Analysis and Interpretations

This work called "Data Analysis and Interpretations" describes the data collection and interpretation process.... The data was collected with the help of a Likert Scale survey and has been analyzed using the statistical software SPSS.... ... ... ... The data interpretation process helps the researcher in understanding the responses gathered and the contribution of the data collection process in fulfilling the objectives of the study....
15 Pages (3750 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us