a.
Components of URL:
URL refers to the uniform resource locator. It has four components. These components are,
- A scheme that may be hyper text transfer protocol or hyper text transfer protocol secure
- Mnemonic address
- Directory or path of file that is to be accessed.
- Name of file that is to be accessed.
A scheme is collection of rules that must be followed by files while transferring. Mnemonic address is the address of the machine that contains the required file.
b.
Components of URL:
URL refers to the uniform resource locator. It has four components. These components are,
- A scheme that may be hyper text transfer protocol or hyper text transfer protocol secure
- Mnemonic address
- Directory or path of file that is to be accessed.
- Name of file that is to be accessed.
A scheme is collection of rules that must be followed by files while transferring. Mnemonic address is the address of the machine that contains the required file.
c.
Components of URL:
URL refers to the uniform resource locator. It has four components. These components are,
- A scheme that may be hyper text transfer protocol or hyper text transfer protocol secure
- Mnemonic address
- Directory or path of file that is to be accessed.
- Name of file that is to be accessed.
A scheme is collection of rules that must be followed by files while transferring. Mnemonic address is the address of the machine that contains the required file.
Want to see the full answer?
Check out a sample textbook solutionChapter 4 Solutions
Computer Science: An Overview (12th Edition)
- Please watch the two videos in the link below. These videos are parts of a 2-part PBS show called: Uranium-Twisting the Dragons Tail! Uranium: Twisting the Dragon's Tail.Links to an external site. If you can't open the videos in the above link, just use the version in the below link: Uranium: Twisting Dragon's Tail - Part 1Links to an external site. Uranium: Twisting Dragon's Tail - Part 2Links to an external site. Uranium: Twisting Dragon's Tail - Part 3Links to an external site. All I want is a comprehensive list of YOUR "OH" moments as you watch these videos. (about 20 moments) These moments can be numbered-bulleted-or written out in paragraphs. Just include WHY you thought this was so incredible!arrow_forwardEvaluate different design models DEEPLY PLEASE here some useful links https://reaper.com/blog/item/16-website-design-4-models-so-many-possibilities#:~:text=There%20are%204%20basic%20models,a%20Frame%20and%20Full%20Screen https://www.linkedin.com/pulse/what-web-design-how-many-types-chawhan-venu NO SIMILARITY NO HANDWRITINGarrow_forwardHands-On Exercises #7 Superglobals $_GET and $_POST Source: Source: Connolly, R. and Hoar, R., (2018), Fundamentals of Web Development Before you do the exercises If you haven’t already done so, you should create a folder in your personal drive for all the exercises. This set of exercises requires a functioning webserver to interpret the PHP code. Exercise 7-1 Checking for POST 1. 2. Test lab7‐exercise7-1.php in a browser and notice that it contains a simple one field form that posts the results back to itself. The first thing to do is detect whether the page was reached through a get (a link followed) or whether the page was arrived by the form being posted. Edit the displayPostStatus() function as follows and test. function displayPostStatus() { if ($_SERVER["REQUEST_METHOD"] == "POST") { echo "Post detected"; } else { echo "No Post Detected"; } } Now when you post the form you see the post detected, and when you enter the URL and hit enter (GET) it does not see the POST. Next, let…arrow_forward
- HTML CODE AS FOLLOWS. Do it quicklyarrow_forwardWatch the video: https://www.youtube.com/watch?v=70cDSUI4XKE Read this article: https://www.forbes.com/sites/zakdoffman/2021/04/17/do-you-need-to-stop-using-google-maps-on-your-apple-iphone-after-chrome-and-gmail-backlash/?sh=32e6fdf985e4 Answer the following question: What do you think the key issues are in regards to location privacy? (a few sentences) Are you personally concerned about the data breach mentioned in the article above? About privacy in general in regards to location? (a few sentences) Do you think the government should regulate how location data is collected/used? (a few sentences)arrow_forwardI need help linking this as a web source in html http://www.example.com/leisureroomarrow_forward
- By referring to the specifications given below, use HTML code and JavaScript to create the form as shown in Figure 6. WEBINAR REGISTRATION FORM Name : Contact Number : Email : Webinar Title : Select Webinar Date : dd/mm/yyyy Time : 10am - 12pm O 2pm - 4pm Number of participants : 1 Total Registration Fees(RM) : 0.00 O Add me to your mailing list for upcoming webinars. Submit Cancel Figure 6 Specifications: Create the form by assigning suitable id and name. Add a legend containing the text "WEBINAR REGISTRATION FORM" and use inline style to design the legend. Use to arrange the form elements. Create different form elements/controls with proper data for their attributes such as name, id, value and type. There is no need to create element for each form element. Set Webinar Title as a selection list that consists of 4 options: Select Webinar, Web for Beginners (RM100), Web for Intermediate (RM200) and Web for Advanced (RM300). Set Number of participants as a spinner control with range…arrow_forwardHTML CODE AS FOLLOWS.arrow_forwardRead ALL of the instructions carefully before starting the exercise!Dear Colleague,Earlier today I built my third website using HTML5. Based on what we had learned in Exercises 1through 9, I wanted my website to try out four forms as shown in Figure 1 (below). However,after giving it my best effort, things once again didn’t turn out the way I wanted (see the codeprovided). I’ve been told that there are exactly 20 things wrong with the code. Can you help mespot all of the errors?Hint: You should not add ANY LINES to the code. There will never be more than one set of (ortype of errors) per line.To complete this assignment, update only the file named c2_broken.html contained in thec2_broken directory. Also, create a MS Word file describing what you did. Specifically, create abulleted list describing your improvements and be sure to include the line numbers. Save thissecond file as c2_notes_LastName.docx and add this file to the c2_broken directory. Whendone, rename c2_broken to…arrow_forward
- How to Create the Product webpage of Chapter 11 working with images and icons. Halloween 11 Create a product page In this exercise, you’ll create a product page that uses a variety of features for working with images. When you’re through, the page should look similar to this: Specifications • To create the product page, you can copy the index.html file you worked on in exercise 7 to the products folder and rename it cat.html. Then, you can delete the content from the section, modify the URLs on the page as necessary, and add the content shown above. • Create a new style sheet named product.css for the product page, and copy the styles you need from the main.css file to this style sheet. Then, modify the link element for the style sheet in the cat.html file so it points to the correct style sheet. • Modify the horizontal navigation menu so it indicates that no page is current. • In the section, float the image to the left of the text. In addition, set the left margin for the text so…arrow_forwardjust make a table like this by using HTML, put all information like exactly in the table like in the photo, don't change any thing I'm okay with same tablearrow_forwardhttps://www.youtube.com/watch?v=q1RqoJUIdHI https://www.youtube.com/watch?v=mA8pNpPvrr0 Please do watch the youtube link below and write your insight and opinion on what have you've watched.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education