What are the different web browser tools available to accelerate the speed of the web page?
Correct Answer
- Web accelerators are used to increase the loading of the web page faster and by providing extra features of caching, etc - There are tools that are provided like internet accelerator of browser accelerator that provides security from the spyware and adware programs - The security from the programs are required as they are harmful for the computer and the tools uses the strategies of pre-caching in which the data is automatically cached and when the website is opened again then the fetching is being done from the place where the content is saved - Registry tweaks are used to improve the performance offering the risk management techniques for downloading the resources
Technology problems
Search Results
1. What are the reasons for slow loading of the web page?
Correct Answer: - The web pages that are loading slowly might be using heavy scripts or might be getting loaded on an overloaded server - If the content like flash is used then the web page performs really slowly in comparison to the normal pages that get created - If the caching is inactive on the web browsers and the same web page is getting loaded again and again then the performance get degraded - Web pages load slowly due to the content on that page as if it is text it loads faster then the site that is made up of large photographs - It takes longer time for a picture to get rendered and the transmission time also remains higher then the text
2. What are the different types of components involved in URI?
Correct Answer: URI is known as Uniform Resource Identifier as it identifies the resources requested by clients and fetches them from the server The components that are used in URI are as follows: - http: is the first thing that is used in a URL and it is used to tell what kind of resource that needs to be retrieved over the server This includes the server details and it is itself a protocol known as Hypertext Transfer Protocol (HTTP) that is used to fetch the information - Web browsers sometimes use the secure protocol that is represented using HTTPs used in case of secure transaction over the internet - FTP: is also a protocol that is known as File Transfer Protocol that allows the transfer from a file from local computer to server
Correct Answer: - Web browser is used to run the software application that allows retrieving, presenting and traversing the information from one place to another - Web browser provides the resources using the WWW (World Wide Web) this can be identified by URI (Uniform Resource Identifier) - Web browser fetches the data like web page, image, video or other piece of content from the server and displays it accordingly - Web browser uses hyperlinks to display the resources and allow the users to navigate their browsers according to the resources - Web browser defines the application software that is designed for the user to access and retrieve the documents using the Internet
4. What is the use of providing web hosting services?
Correct Answer: - Web hosting services provide internet hosting and its services that provide organization to build the websites - The web hosting services also allow the individuals to access the websites through the World Wide Web - Web hosting provides the space to put their content and allow the clients to provide the Internet connectivity - It provides the data center that allows the use of higher space and connectivity properties for the Internet users - It provides tools to allow the website to run on the servers and easily accessible from the outside world using the browser
5. What are the different types of hostings that exist?
Correct Answer: There are different types of hosting provided to upload and share their files using the web or Internet - Free web hosting service: It provides limited services and offers it to companies in that it offers advertisements and other services with limitations - Shared web hosting service: where a server shares many websites all placed at one place having the range from few to hundred * The domains are most probably remains shared with a common pool of resources that is based on the server like RAM and CPU - Reseller web hosting: This is the web hosting that allows clients to provide web hosting to others This includes individual domains that are listed using the affiliated with a reseller - Virtual Dedicated Server: This is also known as also known as a Virtual Private Server (VPS) This provided the divided server resources in the virtual servers and the method that doesn?t relate directly to the hardware - Home server: This is a single machine server that can be thought as a personal server that is used to host one or more web sites using the connection
6. What is the procedure to configure the web browser to accept or reject cookies?
Correct Answer: - The web browser visits a website using the HTTP and then it keeps the track of the identity of the user visiting the web page - The cookies of HTTP get stored with the personal information of the user and it doesn?t accept the information - Users accept the cookies as by rejecting all the cookies will load the web page in longer time and it will not be desired by the users - Even if the cookie is being rejected a session cookie is being kept for use as it is the provision given to the web browser to use it - The cookies gets stored temporary basis depending on the user of accepting or rejecting it and it basically saves the session so that the duration of the page load can be reduced
7. What are the ways to change the cookie setting using the web browser?
Correct Answer: The cookie settings include the enabling and disabling of the services that are used with the web browsers The following steps are taken to set the cookies: - The TOOLS menu is being opened on web browser and the privacy tab is selected from where the privacy of individual user can be managed - Using the ADVANCED tab the options to set the cookies will be visible and it will allow the overriding of cookie - The cookies can be accepted by checking the first party cookies or the third party cookies Out of these choices the first party cookies provide more security - Check the checkbox for "Always allow session cookies" so that the session cookies can be maintained
8. What is the primary function of the Web browsers?
Correct Answer: - Web browser functions are to provide the resources or information to the user when asked by them - It processes the user inputs in the form of URL like https://wwwgooglecom in the browser and allows the access to that page - URL is used to identify the resources and fetch them from the server and displays it to the client - It allows the user to interact with the web pages and dynamic content like surveys, forms, etc - It also allows the user to navigate through the complete web page and see its source code in the HTML format - It provides security to the data and the resources that are available on the web that is by using the secure methods
9. What are the principles in providing the security for the computer programs?
Correct Answer: - The principle of least privilege is used to provide more security to the computer programs - The principle allows the designing of the program such that any unauthorized access is not allowed and only the person who owns the program will be able to access it - The services provided should be able to access only those products that need the services - Web servers that are involved in responding the queries of the web users provide only accessing to the HTML files that will serve the purpose of the programs - Computer programs should be made such that it provides secure features of logging into the program with proper authentication
Correct Answer: - Fail-safe approach defines the level that divides the security such that it is safe even in case the system is failed - The fail safe approach doesn?t allow an attacker to take the advantage by breaking in the system and crashes out - This approach allows the web server to perform the routines even if the system runs out of the memory in case of any attack - The system in attacks doesn?t skip the access to the control check or it doesn?t skip serving any document requested - Fail safe approach can force the web server to run of the memory and have a DoS attack