Methodologies
Define Your Site
Creation
Web Security
Legal vs Ethical
100
This web design methodology begins by identifying user needs and behaviors.
Bottom-up Web Design
100
What is a concise statement of the web site's main goals, the vision it has of its presence in the online world.
The web site vision statement
100
After you have developed a strong web site vision statement and a strategy and tactics to implement it, you need to create a site _________: a detailed description of the key considerations and components that go into the making of the site.
specification
100
What is defined as a way to trick people into revealing confidential information?
Social Engineering
100
The law is only a ________ for the conduct you should observe when creating a web site.
baseline
200
What are the five Ds of web site production?
Discover, Define, Design, Develop, Deliver
200
To ensure mutual understanding, the vision statement should contain an explicit value and what kind of a goal?
A measurable goal
200
The ________ component of the specification defines the look and feel of the site: layout, colors, typography, images, spacing, page widgets, etc.
design
200
How do Denial Of Service (DOS) attacks cripple a server?
By consuming all of their network bandwidth, forcing them to deny service to their users.
200
True or False: Some practices are technically legal, but ethically unacceptable
TRUE
300
In top-down design, you begin with the whole and work down to the __________.
Parts
300
To make your vision a reality, you need to develop an effective ___________and a set of tactics to implement this _____________ . (same word in both blanks)
strategy
300
Web site specifications vary considerably in content and style. They run the gamut from long formal documents to collaborative white board sketches. Their main requirement is to answer WHAT QUESTION clearly and precisely?
What kind of site are we going to create?
300
A _________________occurs when someone hacks straight into a server without any specific insider knowledge about the server.
brute-force attack
300
Ethics establish basic values for __________ actions and practices within that community.
responsible
400
The main advantage of the bottom-up approach is that it does what?
Places the users' needs at the head of the designer's priorities.
400
True or False: Just like mass media devices such as television or publishing, the web can not address individual customer needs.
False - the web can address individual customer needs.
400
The final step in site development is _________your site to the web
publishing
400
What are some ways to create a strong password?
Avoid using common words or names, include a mix of uppercase and lowercase letters and at least one number or symbol.
400
What is defined as: "unsolicited bulk e-mail"
Spam
500
Which design methodology uses cross-functional teams working collaboratively to create a product?
Agile Design
500
The _______ you use to implement your strategy need to emerge from the specifics of that strategy.
tactics
500
To make your site available to Internet users, it must reside on a web _______.
server
500
. If a user does not need to view or modify anything in specific server partition, _______ their access to that partition.
block
500
True or False: You can commit an ethical violation and no authority has the government-sanctioned right to punish you for it.
TRUE