Take a screen shot of one webpage

Assignment Help Basic Computer Science
Reference no: EM131312742

Part 1: Determine your I/P address

Look up the difference between public and private IP addresses.  Create a word processor document and explain, in your own words, the difference between the two.  Then determine your public and private IP addresses.  Take screen shots of each.  Paste into your word document and circle each IP address.  (Remember to have no fill inside the circle so the addresses aren't wiped out.)

Save XXIP in the XXAssign2 local folder and transfer it to the XXAssign2 folder on the Student Web Server.  These folders were created in Assignment 1.

Part 2: Find an example of a bad web site

Create a word processing document called XXWebsite.  Browse the Internet and find an example of a bad website, not included in the examples in this module. 

  • Take a screen shot of one webpage of the website and paste it to XXWebsite
  • Add a functional link (one that works) to the website underneath the screen shot
  • Write a couple of paragraphs (about 150 words) as to what is bad about the website.

Part 3: Find an example of a good web site

Browse the Internet and find an example of a good website, not included in the examples in this module. 

  • Take a screen shot of one webpage of the website and paste it to XXWebsite
  • Add a functional link (one that works) to the website underneath the screen shot
  • Write a couple of paragraphs (about 150 words) as to what is good about the website.
  • Save XXWebsite in the XXAssign2 local folder and transfer it to the XXAssign2 folder on the Student Web Server.

Reference no: EM131312742

Questions Cloud

Employee becomes disgruntled : After being fired, an employee becomes disgruntled. The managers never disabled his login information, and his best friend still works at the company. The disgruntled employee gives his friend his login information for the company's private networ..
Discribe the transportation security administration : Write a minimum of 250 words with an explanation of whether you think the Transportation Security Administration organization will survive. Please cite your references and use in APA format. this is a criminal justice course.
Describe specific security concerns or risks that your os : Describe the specific security concerns or risks that your chosen operating system is exposed to and how you plan to mitigate the risk that each one presents.
Several ways by which loss of initial preload can be reduced : Name several ways by which the loss of initial preload can be reduced ? Roughly how much embedment relaxation could we expect from new parts used in a non-gasketed, steel joint?
Take a screen shot of one webpage : Take a screen shot of one webpage of the website and paste it to XXWebsite Add a functional link (one that works) to the website underneath the screen shot Write a couple of paragraphs (about 150 words) as to what is bad about the website.
Perform various operations extracted from the user : Design and implement a complete program that uses the Postfix Calculator ADT to perform various operations extracted from the user
What is the net income for this firm : Billy’s Exterminators, Inc., has sales of $646,000, costs of $286,000, depreciation expense of $38,000, interest expense of $29,000, and a tax rate of 35 percent. What is the net income for this firm?
Name some of the problems created by incorrect torque : How much torque versus initial preload can you expect to encounter when tightening a group of unlubricated, as received, steel bolts?
Explain your job duties to the new network administrator : Explain your job duties to the new network administrator. Include an explanation about the differences between the role of the system administrator and the role of the network administrator.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find a formula connecting the moment generating function

The moment generating function is defined to be E(eSx ). Show that it actually generates (i.e. has coefficients) the moments divided by factorials. Find a formula connecting the moment generating function with the p.g.f.

  Successful implementation efforts

List and define the factors that are important to successful implementation efforts.

  Substitute the appropriate city and api key

Create a free account on http://openweathermap.org and get an API key. Use the following URL and substitute the appropriate city and API key to return results:

  Multiple instances of execution

In what module, multiple instances of execution will yield the same result even if one instancy has not terminated before the next one has begun?

  List and describe four categories of models

Q.1. List and briefly describe the steps of the AHP data mining process with an example that is not in your study material. Q.2. List and describe four categories of models. Give examples in each category.

  How does it affect program readability

What is white space? How does it affect program execution? How does it affect program readability?

  Derive an efficient method for computing ranking cube

Extend your framework to handle more advanced measures. One such example could be as follows. Consider an organization donation database, where donors are grouped by "age," "income," and other attributes. Interesting questions include: "Which age ..

  Design and implement a concurrency abstraction

Combining monitors and transactions. Design and implement a concurrency abstraction that combines the abilities of monitors and transactions. That is, it has the ability to wait and notify, and also the ability to abort without changing any state...

  Practice with defining and using python module

Design a Python module by incorporating the two functions, greatest_trivial_factor andisPalindrome,  you defined in previous lab assignments. In other words, your Python module will contain ONLY those two functions. Name your module file aslib_yourfi..

  New software application or business web app

Design two forms for a new software application or business web app that will collect data from its user. All you have to design is the format for two text entry pages (4 to 6 data elements each).

  Overview of information security

A brief overview of information security and how it can impact the company. Potential threats and business impacts. Benefits of a strong company security posture

  Determine the computational burden of the algorithm

Determine the computational burden of the algorith

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd