Wednesday, 8 April 2020

Project scope (Research Activity)

Project Scope 


This scope is just all the work that needs to be done to achieve the project objectives. In other words, scope involves the process of identifying and documenting project goals, outcomes, achievements, tasks, costs, and dates specific to the project objectives.

The project scope is capturing the scope of a project cannot be underestimated because, without good documentation and an agreed view, the project will not achieve the desired results. The scope development process requires a comprehensive organization and a series of steps:
  • Scope planning
  • Definition of scope
  • Scope document
  • Scope change management
The examples of project scope 

This statement will provide insight into the project. It is also important to be specific in the project scope statement. In this article, we'll go over an example project scope to help you better understand how to make a large scope statement.

For example, "The catalog will feature 100 products" is better than "The catalog will feature many products" and "The project will be completed within six months" is better than "The project will be completed within a time frame." The more specific you can be, the better.


Reference 

Examples of Project Scopes: What Should Be Included in a Scope Statement?. (2009). Bright Hub PM. Retrieved 9 April 2020, from https://www.brighthubpm.com/project-planning/57950-example-and-evaluation-of-project-scope-statements/


Greycampus. (2020). Greycampus.com. Retrieved 9 April 2020, from https://www.greycampus.com/blog/project-management/steps-involved-in-defining-project-scope


Project Scope Management: Practical Guide | monday.com Blog. (2020). monday.com Blog. Retrieved 9 April 2020, from https://monday.com/blog/project-management/practical-guide-project-scope-management/


Managing Successful Computing Project (Research Activity)


Project Management Phases

The Project management phase has 5 phases which are Project conception and initiation, Project definition and planning, Project launch or execution, Project performance and control, and Project close. Where each of the phases has the process of combining systems, techniques, and people to complete a project within set goals of time, budget, and also the quality of the project.


Project conception and initiation



The conception and initiation is the first phase of the Project Management Life Cycle, as it means starting a new project idea. in this phase, we can start a new project by studying the objectives, scope, purpose, and outcomes that can be generated or not it benefits the organisation. 

In the initiation phase, a business problem or opportunity is identified, a solution is defined, a project is formed, and the project team is appointed to build and deliver the solution to the customer. Business cases are made to determine the problem or opportunity in detail and identify the solution to be implemented.

The project charter or a project initiation document (PID) that outlines the purpose and requirements of the project. It should include business needs, stakeholders, and the business case.


Project definition and planning


The definition and planning are in the middle of a project life cycle and tells everyone involved where you went and how you were going to get there. The planning phase is when the project plan is documented, project results and requirements are defined, and the project schedule is created. It involves creating a set of plans to help guide your team through the project implementation and closing phases. Plans made during this phase will help you manage time, cost, quality, change, risk, and related issues. They will also help you control staff and external suppliers to ensure that you deliver the project on time, within budget, and within schedule.  

Project launch or execution


The launch or execution is the third phase most often associated with project management. execution is about building results that satisfy customers. Team leaders do this by allocating resources and keeping team members focused on the tasks assigned. Execution depends on the planning phase. Teamwork and effort during the implementation phase are derived from the project plan.

Project Performance and control


The Project Performance and control is the fourth phase. In this phase, the project manager will identify any areas where things do not match, take the time to make adjustments immediately. While making minor adjustments along the way, you can prevent bigger achievements and deadlines from happening.

Project close


The Project close is the last phase. In this phase is the process of finalizing all activities for the project after completing the project task. Which the Project Manager takes center stage and will check that all project work is completed and that the project has met its objectives, including work and objectives added along the way as a result of the approved change request.






References

Initiation Phase - Project Initiation Phase. (2020). Method123.com. Retrieved 8 April 2020, from https://www.method123.com/project-initiation-phase.php


(2020). Villanovau.com. Retrieved 8 April 2020, from https://www.villanovau.com/resources/project-management/5-phases-project-management-lifecycle/


Watt, A. (2014). 7. Project Initiation. Bccampus. Retrieved from https://opentextbc.ca/projectmanagement/chapter/chapter-7-project-initiation-project-management/


Peterman, R. (2016). Project Management Phases: Exploring Phase #4 – Monitoring & ControlProject-Management.com. Retrieved 8 April 2020, from https://project-management.com/project-management-phases-exploring-phase-4-monitoring-control/


Greycampus. (2020). Greycampus.com. Retrieved 8 April 2020, from https://www.greycampus.com/opencampus/project-management-professional/closing-a-project-or-phase


Demystifying the 5 Phases of Project Management. (2020). Smartsheet. Retrieved 8 April 2020, from https://www.smartsheet.com/blog/demystifying-5-phases-project-management




Monday, 25 November 2019

Class Activity website

1. Discuss the steps in designing a website.
2. Explain the following and give examples

Target Audience 

in terms of designing a website what you need to do is to know, Who's is your target audience, After identifying your target audience, we can start designing your website. Web design will be map according to your understanding of your audience e.g., what they want, expect, and how we will improve their buyer’s journey on your website.#




Sitemap 

A sitemap is a road map that is followed during the development of a website. It outlines the goals and purposes of a site, such as attracting new leads or making online sales, to give direction to your project. It also helps you provide your visitors with an enhanced user experience, like easy navigation, by establishing the hierarchy of your site’s pages at an early stage.


Wireframe 
is a way to design a website service at the structural level. A wireframe is commonly used to lay out content and functionality on a page that takes into account user needs and user journeys. are used early in the development process to establish the basic structure of a page before visual design and content is added. 




Style Guide

A style guide is a document of code standards that details the various elements and patterns of a site or application. It is a one-stop place to see all visual styles of the site such as headers, links, buttons, color pallets and any visual language that is used on the site.


Prototype
A website prototype can be any mock-up or demo of what a website will look like when it goes live. Although it may not as perfect as the final website, it can give u a really good idea of the functionality, user journey and flow through a website.





User Experience (UX)
User experience (UX) design is the process design teams use to create products that provide meaningful and relevant experiences to users. This involves the design of the entire process of acquiring and integrating the product, including aspects of branding, design, usability, and function.





User Interface (UI) 

User interface (UI) design is the process of making interfaces in software or computerized devices with a focus on looks or style. Designers aim to create designs users will find easy to use and pleasurable. UI design typically refers to graphical user interfaces.






Defining Your Target Audience | West Chester PA Web Design and Website Development. (2018). Westchesterdigital.com. Retrieved 1 December 2019, from https://www.westchesterdigital.com/2018/11/16/defining-your-target-audience/


Importance of Target Audience for Website Design | Virtuolegance. (2018). VirtuoLegance. Retrieved 1 December 2019, from https://www.virtuolegance.com/importance-of-knowing-your-audience-in-web-design/


Sitemap. (2015). Web design. Retrieved 1 December 2019, from https://stuyhsdesign.wordpress.com/web-design/sitemap/


Team, O., Team, O., & Borowska, P. (2015). Tips and Tricks: Why Web Design Matters to Your Target AudienceOnextrapixel. Retrieved 1 December 2019, from https://onextrapixel.com/tips-and-tricks-why-web-design-matters-to-your-target-audience/


Lynch, K., & Lynch, K. (2019). Style Guides for Web Design and DevelopmentBeacon Blog. Retrieved 1 December 2019, from https://www.beacontechnologies.com/blog/2015/09/style-guides-for-web-design-and-development/






Monday, 4 November 2019

Web Development Framework

Web Development Framework 

Example of Framework of JSP in server side 

Django



Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Built by experienced developers, it takes care of much of the hassle of Web development, so you can focus on writing your app without needing to reinvent the wheel. It’s free and open source.

The advantage of Django 
  • Fast: This has been designed in a way to help the developers make an application as fast as possible. From idea, production to release, Django helps in making it both cost effective and efficient. 
  • Fully Loaded: It works in a way that includes dozens of extras to help with user authentication, site maps, content administration, RSS feeds and much more such things. These aspects help in carrying out the web development process completely.
  • Secure: When you are doing it in Django, it is ensured that developers don’t commit any mistakes related to security. Some of the common mistakes include SQL injection, cross-site request forgery, clickjacking and cross-site scripting. To manage effectively usernames and passwords, the user authentication system is the key.

Advantages and Disadvantages of Django. (2017). Hackernoon.com. Retrieved 5 November 2019, from https://hackernoon.com/advantages-and-disadvantages-of-django-499b1e20a2c5


The Web framework for perfectionists with deadlines | Django. (2019). Djangoproject.com. Retrieved 5 November 2019, from https://www.djangoproject.com/



Example of Framework of Jquery in client side

Meteor


Meteor is a full stack JavaScript (JS) framework, made up of a collection of libraries and packages, bound together. in a way that makes it easy to prototype applications. Essentially, it makes web development easier. It’s flexible and requires less code, which means less bugs and typically a higher quality and more stable end result.

The advantage of Meteor

  • Meteor is easy to learn and quick to build with—making it a new favorite for many developers. 
  • Only one language,  JS both front-end and back-end
  • Meteor can be used for reactive programming out of the box



Why you should check out Meteor.js. (2019). Why Meteor.js. Retrieved 5 November 2019, from http://whymeteor.com/






Sunday, 20 October 2019

DNS and DNS Types

DNS
Domain Name Server
The purpose of DNS is to translate all the inquiries into IP address, which computers can understand. it also provides a list of mail which accept Emails for each domain name.

how DNS works 
Diagram


DNS queries also known as a DNS request is a demand for information sent from a user's computer client to a server.

The Recursive is, when DNS client directly gets the IP address of a domain, by asking the name server system to perform the complete translation.

The iterative is a request for a website name or uniform resource locator (URL) that the domain name system (DNS) server reponds to with the IP address from its zone file cache, 

The Non recursive is, when a DNS client contacts the name servers, one by one, until it finds the server, containing the needed information.
Describe 
DNS server
A DNS server are internet equivalent of a phone book. they maintain a directory of domain names and translate them to internet protocol (IP) address.


DNS Resolver 
A DNS resolver (recursive resolver), is designed to receive DNS queries, which include a human readable hostname such as "www.example.com", and is responsible for tracking the IP address for that hostname. 

DNS Root Server 
A root server is part of the supporting infrastructure of the internet, and facilitates internet use by acting as the backbone of online access. is responsible for fundamental functions when it comes to translating domain names into IP address it answers client request in the domain name system's root zone.

Authoritative Name Server
An authoritative name server provides actual answer to user DNS queries such as mail server IP address or web site IP address ( A resource record). therefore it only returns answers to queries about domain names that are installed in its configuration system.
Describe 3 types of common DNS records

  1. A (Host address) is the most basic and the most commonly used DNS record type. it is used to translate human friendly domain names such as "www.google.com" into IP-addresses such as 23.211.43.53. A record are the DNS server equivalent of the host file. 
  2. AAAA (IPv6 host address) is used to specify the IPv6 address for a host (equivalent of the A-record type for IPv4).
  3. ALIAS ( Auto resolved alias) is a virtual record type we created to provide CNAME like behavior on apex domains. 








Reference 

What Is A Domain Name Server DNS And How Does It Work | Network Solutions. (2019). Networksolutions.com. Retrieved 21 October 2019, from https://www.networksolutions.com/support/what-is-a-domain-name-server-dns-and-how-does-it-work/


DNS, M. (2019). What Is Authoritative Name Server?Dnsknowledge.com. Retrieved 21 October 2019, from https://www.dnsknowledge.com/whatis/authoritative-name-server/


What is a Root Server? - Definition from Techopedia. (2019). Techopedia.com. Retrieved 21 October 2019, from https://www.techopedia.com/definition/23702/root-server-domain-name-system-dns


background, W. (2019). What is a root server? Definition and backgroundIONOS Digitalguide. Retrieved 21 October 2019, from https://www.ionos.com/digitalguide/server/know-how/what-is-a-root-server-definition-and-background/


CNAME Record - How it Works, Alternatives & Advanced Use Cases. (2018). NS1. Retrieved 21 October 2019, from https://ns1.com/resources/cname


ALIAS-Records (Auto Resolved Alias) . (2019). Simpledns.com. Retrieved 21 October 2019, from https://simpledns.com/help/alias-records

Tuesday, 15 October 2019

WDD_LO1_MANAGE SECURE SITES

Describe how each of the following are implemented.


Keeping software up to date
Select auto-update for software on both your mobile devices and computers when possible. that keeping your security software up to date is important. because it will protect you from the hacker or latest threats in website. 

Block SQL injection
SQL is stand for Structured Query Language used to communicate with database. SQL injection is an extremely damaging attack in which hackers will attempt to access information stored in your database.
Block SQL injection is also good to avoid or prevent the hacker from access to your database or website.

Prevent XSS
XSS also known as cross site scripting is a web security vulnerability that allows an attacker to compromise the interaction that users have with a vulnerable application. prevent xss in our website is important to prevent attack from hacker. 


Providing Minimal Error Messages 
Error message are displayed with the help of dialog boxes by the operating system or application. creating a error message is an important criteria in the fields for user to be informed of the problem and to prevent error message such as Error 404 and File Not found. 

Denying File Uploads
on a website when a user uploads their file and automatically denied it, so that it can prevent the user from share an unknown file into the website.


Server Side validation/From Validation 
server side validation is necessary to check data sent to the server, ensuring incorrect or malicious data is rejected. in from validation helps ensure users fill out forms in the correct format, making sure the submitted data will work successfully with website application. 

HTTPS 
Https also known as hypertext transfer protocol secure is used for secure communication over a digital network,most often the internet. mean that https is more secure then http in website.

Passwords 
Creating a stronger password policy with a longer, stronger password that is safer on the website. so that hacker cannot easy access the information through a website. 

Website Security Tools 
With the web security tools on our website, data is safer and helps protect our web applications from hacker to steal.





Sunday, 13 October 2019

Naztech
Internet service provider
ISP : Telbru
Price :


Domain Name: Naztech.online 



Website Hosting : Bluehost

Price :
Free Domain Name for 1st Year
Free SSL Certificate included
1-Click WordPress Install
24/7 Support
Starting at $2.75/mth

The Reason for choosing bluehost because is easy to use and very user-friendly.



Website Management : Squarespace

Price :
Beginner friendly   Personal US$12/mth
Intuitive UL           Business US$18/mth
Loads of themes    Commerce US$26/mth 

CMS stand for Content management system.

The Reason for choosing this CMS because Squarespace is by far the easiest platform to use, with the cleanest interface. It’s perfect for small to midsize websites and is a breeze for clients to edit content.
Here’s why we love it…





Tuesday, 8 October 2019

WAD-LO1-Servers

Give the purpose of each of the identified server :-

The purpose of Application server is to install, operate and host applications and associated services for end users. application server also can reducing the size and complexity of the client programs. for the need to cache and control the data flow for better performance.



The purpose of Proxy Server is a special type of network node that alters packets that pass through it, masking their IP addresses and making it seem that the packets originated at the proxy system.


The purpose of Blade Server is a compact device containing a computer used to manage and distribute data in a collection of computers and systems. called a network. its role is to act as a conduit between computers, programs, applications and systems.



The purpose of Mail Server is to stores incoming mail for distribution to local users and sends out outgoing messages. 


The purpose of Virtual Server are terms used to refer to method of server hosting, which reply on the use of virtual machines to enable certain operations to work in accordance to the system it has been set up for. also to shares hardware and software resources with other operating system (OS) to creating and managing daily backup. 


The purpose of  File Server is to share information over a network without having to physically transfer files by floppy diskette or some other external storage device.



The purpose of Policy Server is to outline practices for administering servers that will ensure an acceptable risk posture against real world threats. the sim is to defend servers against cyber security threats in a practical and pragmatic manner.



The purpose of Web server is a program that uses HTTP( Hypertext Transfer  Protocol) to serve the files that from Web pages to users, in response to their requests,also used to store web site files and broadcast them over the internet.

Sunday, 6 October 2019

LO1 Exercise

Explain the following:

Domain Names is part of a network address that identifies it as belonging to a particular domain. like for example google.com so domain names are used in URLs to identify particular Web pages. URLs is the address of a World Wide Web page. 


DNS Services is stand for Domain Name Servers (DNS) are mostly is on the internet they maintain a directory of domain names and translate them to internet Protocol (IP) address. 

Communication protocols to access a website
Below are some of web communication protocols used: 

HTTP is stand for HyperText Transfer Protocol (HTTP) this is the most widely command used web communication protocol. 



FTP is stand for File Transfer Protocol (FTP) it is used to send and transfer files like for example documents, images, music and so on between remote computer.



HTTPS is stand for Hypertext Transfer Protocol Secure (HTTPS) used for secure version of website 
it's similar to HTTP but the different between HTTP and HTTPS is HTTP used for widely web communication protocol and HTTPS is more secure for client server communication over unsecure like internet.  



TelNet is used to access remote computers and terminals over the internet or a TCP/IP computer network. and also TelNet is one of the oldest communication protocol. 



IPsec, also known as the Internet Protocol Security or IP Security protocol used encrypt packets of data and send them between two computers that share the same cryptographic. 

Tuesday, 29 May 2018

L3 Computer nertwork

Learning Outcome 2: Understand the key components used in networking.

Network devices 

What is Workstation? function and diagram

  • Workstation is a computer dedicated to a user group engaged in business or professional work.
  • Workstation functions perform administrative tasks on a local or remote workstation.



What is NIC? function and diagram

  • NIC is stand for network interface card.
  • NIC is a circuit board or card that is installed in a computer so that it can be connected to a network.
  • The function is a middleman between your computer and the data network. 


Types of servers:


Print server can manages print requests and makes printer status information available to end users and network administrators. the function accepts print jobs from the computers and sends the jobs to the appropriate.

Mail server a mail transport agent is a application that receives in coming e mail from local users within the same domain and remote senders and forwards outgoing email for delivery.

Web server are a remote computers or computer programs that deliver web content like web pages to the user over the internet upon through a web browser. features of web server large data storage support, bandwidth controlling to regulate network traffic, virtual hosting and server side web scripting.

Proxy server is a dedicated computer or a software system running on a computer that acts as an intermediary between an endpoint device, such as a computer , and another server from which a user or client is requesting a service.


File server is a computer responsible for the central storage and management of data files so that other computer on the same network can access the files.

Interconnection devices 

What is Router? the purpose, features and functions 

Router is a device located at the boundary of a network that connects to other networks 
The purpose of a router is to connect multiple networks and forward packets destined either for its own networks or other network.
Features and functions 
  • Connect dissimilar networks.
  • Prevent certain types of traffic from getting to a network.




What is Switch? the purpose, features and functions 

Switch is a device that channels incoming data from any of multiple input ports to the specific output port that will take the data toward its intended destination.
The purpose of a switch is to refers a multi-port network bridge that processes and routes data at the data link of the OSI model. 
Function is used to access or OSI layer 2 to the network.
Features for switch is change a switch password and update a switch firmware.






What is Wireless Access Point? the purpose, features and functions 

Wireless Access Point is a hardware device or configured node on a local area network LAN that allows wireless capable devices and wired network to connect through a wireless standard.
The purpose of a wireless access point is
Function is to transmitting and receiving wireless signal in the network.
Features for Wireless Access Point is  can reset the access point to the factory default configuration. 



Slideshare.net. (2018). Print server. [online] Available at: https://www.slideshare.net/catacutanjcsantos/print-server-59531833 [Accessed 29 May 2018].


Lifewire. (2018). What is a Network Switch?. [online] Available at: https://www.lifewire.com/what-is-a-network-switch-2618163 [Accessed 30 May 2018].


Tech (2012). Network switches, functions & role in networks. [online] Slideshare.net. Available at: https://www.slideshare.net/irisdan/network-switches-functions-role-in-networks [Accessed 30 May 2018].


What is mail server (mail transfer/transport agent, MTA, mail router, Internet mailer)? - Definition from WhatIs.com. (2018). SearchMicroservices. Retrieved 3 June 2018, from https://searchmicroservices.techtarget.com/definition/mail-server-mail-transfer-transport-agent-MTA-mail-router-Internet-mailer


Proxy server functions. (2018). SearchSecurity. Retrieved 3 June 2018, from https://searchsecurity.techtarget.com/answer/Proxy-server-functions


What is file server? - Definition from WhatIs.com. (2018). SearchNetworking. Retrieved 3 June 2018, from https://searchnetworking.techtarget.com/definition/file-server




Monday, 7 May 2018

Wireless Technologies

1. 802.11

Description 
802.11 is a local area networks (WLANS) use the Ethernet protocol developed by a working group of the institute of electrical and electronics engineers (IEEE).

Diagram


2. Infrared

Description
Infrared technology allows computing devices to communicate via short-range wireless signals. with infrared, computers can transfer files and other digital data.

Diagram


3. Bluetooth

Description 
Bluetooth is defined as being a short range radio technology aimed simplifying communications among internet devices and between devices and the internet.

Diagram



4. 3G

Description
3G is the third generation of wireless technologies. mostly used with mobile phones and handsets as a means to connect the phone to the internet or other IP networks in order to make voice and video calls, to download and upload data, and to surf the web.

Diagram


The differences between the various types of 802.11:

  • 802.11b - is often considered the first generation.
  • 802.11g - is often considered the third generation.
  • 802.11n - is often considered the fourth generation.

Project scope (Research Activity)

Project Scope  This scope is just all the work that needs to be done to achieve the project objectives. In other words, scope involve...