answersLogoWhite

0

📱

Web Programming

Web Programming is the category for programming for the Internet and World Wide Web. Q&A's include coding in technologies used for Browser, applet based applications, and more.

584 Questions

What set of frameworks or libraries would you use for creating an Ajax web application?

There's no debate that JavaScript is the most widely used language client-side on the Web. We are using JavaScript for everything, from form validations to full Ajax applications. Client side java script (CSJS) Frameworks/Libraries for creating an Ajax web applications:ReactJSAngularJS.

  • ReactJS
  • AngularJS

Is MileyWorld safe?

Yes! Mileyworld is super safe. It also has a hacker protector on the site as well so you can be carefree! Miley Cyrus herself is on Mileyword (Obviously) Your personal details will be between you and Miley Cyrus!

Have fun on Mileyworld x

___________________________________________________________________

Hi what about the credit card & details i know she says ... but im worried and my parents wont let me WHY DOES SHE DO THIS!!!!!! >:(

Which language do you use if you are creating an application to be deployed via a network?

Deployment methods are not integral to any programming language. You can use any suitable programming language to write the actual program, but how you deploy it is entirely up to you. However, there are installation tools that can assist with your deployment strategy.

What is the Model View Controller Design Pattern?

The Model-View-Controller architecture compartmentalizes the data and business logic (model) from the presentation (view) from the user action interpreter (controller). This pattern is the hardest on the exam. The idea is closely related to the recent move from two-tier to three-tier architectures. The 3 tiers in a MVC Architecture of a J2EE Application are:

1. Model - Usually JavaBeans

2. View - Usually JSPs

3. Controller - Usually Servlets

This pattern is a clear functional separation of roles. It is a formalization of the data-business-presentation movement that dominated three-tier architectures over the last decade.

This pattern is very abstract. It is not simply a front end to a datasource connection.

This would be like an automobile. The speed of a car is affected by the accelerator pedal (Controller), the speed is shown by the speedometer (View), and the speed is determined by the engine power (Model).

I am trying to validate a website but it says it can't validate because on line 2 it contained one or more bytes that it cannot interpret as utf-8 I What does this mean?

UTF-8 is a variable-length text encoding scheme. Standard ASCII characters are represented by a single byte with a value in the range 0 to 127 (0x00 through 0x7F). Bit-7, the most significant bit, is never used in standard ASCII and is always zero in 8-bit encodings. Bit-7 can be used to signify one of 128 characters in the extended ASCII character set, however this set of characters depends on which code page is currently in use, and limits the total number of character representations to 256. To overcome this limit, UTF-8 uses bit-7 to signify that a multi-byte character follows.

The most-significant bits are used to determine how many continuation bytes will follow the leading byte:

0xxxxxxx -- one-byte standard 7-bit ASCII character

110xxxxx -- two-byte UTF-8 character

1110xxxx -- three-byte UTF-8 character

11110xxx -- four-byte UTF-8 character

Each of the continuation bytes take the form 10xxxxxx. This ensures a clear distinction between standard ASCII characters, leading bytes and continuation bytes. Note that the number of high-order 1 bits in the leading byte can also be used to determine how many bytes are used to represent a UTF-8 character code, including the leading byte (two for two-byte encodings, three for three-byte encodings and four for four-byte encodings).

Multi-byte UTF-8 encodings have to be decoded to produce a 24-bit code point:

2-bytes: 0x000080 through 0x0007FF

3-bytes: 0x000800 through 0x00FFFF

4-bytes: 0x010000 through 0x10FFFF

These code points map to code points in the UNICODE character set (UTF-8 is often mistaken for UNICODE for this reason).

As a result of the encoding method, certain bit sequences become invalid under UTF-8. For instance, any bit sequence with 11111xxx in the leading byte is invalid because it does not match any of the UTF-8 leading byte configurations. Similarly, any continuation byte of the form 0xxxxxxx or 11xxxxxx is invalid. However, there are older UTF-8 specifications that use some of these sequences.

Some applications (including Windows Notepad) add a byte-order mark (BOM) at the start of the file, even though this is unnecessary in UTF-8 encoding (the high-order byte always comes first). If a BOM is present, the first three characters will be 0xEF, 0xBB and 0xBF. These will translate to three garbage characters in applications that do not take account of the BOM. Many programmers mistakenly believe it is impossible to reliably detect UTF-8 without testing for a leading BOM which is not the case at all. A simple search through multi-byte sequences to ensure their validity is enough to validate the encoding. Even if randomly generated, the chances of finding 7 valid UTF-8 encodings is lower than the chance that the first three random character form a UTF-8 BOM.

To sum up, either the file is (pseudo) randomly-generated and just happens to have a UTF-8 BOM at the beginning, or the file was encoded using an older UTF-8 specification. If the file is valid, a text editor that supports these older encodings should help you determine which encoding was used. UTF-8 files used by websites must contain a plain-text ASCII header which will tell you precisely how the remainder of the file was encoded. If no such header exists then it is not UTF-8 encoded, it's either UNICODE (in which case the BOM will indicate which encoding was used) or it is standard ASCII. If the latter, the data may include extended ASCII encodings but you'd need to know which code page was used to generate the data in order to decode it correctly. It's not possible to determine this from encoding alone, but the code page should be included in the header. If not, the file should be treated as being corrupt.

Advantages of computers in entertainment?

The proportion of advantages to disadvantages, we can say it as 1:2.

We can play puzzle games, learning games which provides some knowledge. Even we should not play them for more time.

A wide question with a big answer, computers and their interactivity have opened many new kinds of entertainment, games, massively multi-player games, WII, Conect, Xbox, Nintendo, computer games. The computer has also added a myriad of different ways of producing entertainment with motion capture, CGI , computer generated video and sound and animation.

FACEBOOK and other social media could be classed as entertainment. The computer has decimate the music CD business in favor of downloads, they same is happening to cable tv and dvd sales.

What will heppen if an image drawn out of the window coordinate in Java?

ACM Java graphics programs run in a window called the graphics window. If the location is outside of the graphics window then the object is not visible.

What are the advantages disadvantages of testing APIs i.e application programming interface in cplusplus?

Advantages: * Absolute minimum barrier to use - By not using encryption or special authentication methods, anyone with access to the Internet should be able to begin working with your API quickly. * Easily distributed code - Login accounts or developer key programs that make use of your API can be widely distributed and used right out of the box. * Less to worry about - If you aren't managing user accounts or development keys, it's one less thing to keep track of, and your code efforts can concentrate solely on developing the API itself. Disadvantages: * No control - Anyone, anywhere, can use the API, and while this may sound like the goal of web services, it drastically limits your response if abuse requests begin pouring in. If those requests are coming from an application on a single machine, it is easy enough to recognize the requests and block them at the firewall. But should an application that behaves poorly reach wide distribution, you will have a very difficult time dealing with the requests. * No encryption - All requests and responses are visible to anyone between the requesting server and the API server. * Can't contact developers - Because anyone anywhere can access the API without any prior registration, you are left without any method of directly engaging developers using the API. You may want to contact developers in situations where their application is being abusive, when changes are being made to the API that will affect their application, or to seek suggestions on how to improve the API itself. * Abuse - Unfortunately today, systems with little or no security or authentication make prime targets for abuse by some less ethical elements out there.

What does CGI stand for?

Most often, CGI stands for Common Gateway Interface. Some web servers allow Common Gateway Interface bins (or something of that sort), in which CGI scripts can be placed in, and executed from a brower. "CGI scripts" are common programming langues, such as Python. Less often, a CGI stands for a Computer Generated Image. Computer Generated Images/Imaging.

How do you use a server side variable as a client side element?

var clientSideVar = <%=serverSideVar%>; // if it's number

var clientSideVar = '<%=serverSideVar%>'; // if it's string

var clientSideVar = <%=serverSideVar.ToString().ToLower()%>; / if it's boolean

Sorting numbers using user-defined functions in C programming?

Assume your numbers are into an array. Then write any user-defined function implementing any kind of sorting. I am giving example of bubble sort.

  1. void bubble(int a[],int n){
  2. int i,j,t;
  3. for(i=n-2;i>=0;i--){
  4. for(j=0;j<=i;j++){
  5. if(a[j]>a[j+1]){
  6. t=a[j];
  7. a[j]=a[j+1];
  8. a[j+1]=t;
  9. }
  10. }
  11. }
  12. }

How do you make a Photo or text clickable?

Assuming html, wrap it in an anchor tag (ex. <a href="http://www.yoursite.com/yourpage><img src="image.jpg /></a>

Http www learn to be green com HTML?

You mean the source code?

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

<html>

<head>

<title>Coming Soon...</title>

<meta name="robots" content="noindex">

<script language="Javascript">

/*

function writeframe() {

var domain = location.hostname;

// write the frame

document.write('<frameset rows="100%,*" frameborder="no" border="0" framespacing="0"><frame src="http://www.ztomy.com?dn=' + domain + '&pid=5PO815561"></frameset>');

}

*/

</script>

</head>

<body bgcolor="#FFFFFF" topmargin="0" leftmargin="0" marginheight="0" marginwidth="0" onload="writeframe()">

<script>writeframe();</script>

</body>

</html>

How do you display a header image only on the homepage without using php?

There are many ways to do such a thing.

One would be to give the header a unique id on the home page and use CSS specify it's background image. Of course, if you're doing that, you might as well just add an image tag to it anyway.

If you're looking to add an image on that particular page, without modifying the element into which it's inserted, you could also do it using javascript:

<script type="text/javascript">

var URL = window.location.pathname;

var pageName = URL.substring(URL.lastIndexOf('/') + 1);

if(pageName == 'index.HTML'){

header = document.getElementById('pageHeader');

header.innerHTML = header.innerHTML + '<img src="headerimage.jpg">;

}

</script>

Is it a common myth that meta tags seriously improve search engine rankings?

When search engines crawl your site they often look for the meta-tags to give them a better idea of what the website is about. In terms of search engine optimization, the following meta tags are the top meta tags to use, when trying to get your website indexed with major search engines.

Read more: How_are_meta_tags_helping_in_a_website's_rankings_on_major_search_engines

How can you write a script for changing pictures?

You change the src attribute of the picture. For example:

function changeMyPicture()

{

var myPicture=document.getElementsByTagName("img")[0];

//The line of code above refers to the first img element in the

//page; Change it to refer to the picture you want to change.

var newPictureURL="http:\/\/example.com/example.png";

//The line of code above refers to the URL of the picture you

//want to change the original picture to.

myPicture.src=newPictureURL;

}

What is the size of a webpage background?

The background for a web page can be any size. The size is often determined as a result of the design for the overall page. If the window is larger than the image, it will be tiled to repeat indefinitely in both directions, to fit the window.

Because the size of the browser window can vary greatly, most web backgrounds are tiled so they can repeat indefinitely without noticeable "seams" where the image begins/ends.

In the 90s it was customary to use square images of about 256x256 pixels, reminiscent of

the backgrounds used for desktop wallpaper. Modern site design prefers instead a thin, long image which is tiled to give the appearance of a simpler repeated pattern, such as diagonal stripes or gradients. These images can range between 1-10 pixels for the short side and as long as the pattern calls for on the long side. CSS can be used to stretch the image to the width and/or height of the window and remain fixed with respect to the browser window.

There is also a tradeoff to consider when deciding on a background image size -- smaller images can be transferred across the network faster, but larger images can provide more detail.

What system do websites like ebookers.com and hotels.com use to know that hotels have rooms available?

Nearly all online travel agencies (OTA's) use one of the component systems of the Global Distribution System (GDS) such as Sabre, Worldspan, Galileo, Pegasus, or Amadeaus. This allows real-time inventory availability with all of the major hotel chains. Hotels negotiate "distressed" inventory rates with various OTA's and Third Party Intermediaries (TPI's) at a discounted rate which is then marked up and sold to the consumer. The rates offered by hotels to TPI & OTA's can vary based on weather the consumer will see the rate and know the hotel in advance of the booking (typically lower rates are offered if the consumer cannot choose the hotel). An interesting note regarding sites that "guarantee" the lowest rate is that many of the hotel chains official sites also offer an online lowest rate guarantee. In my experience...use hotels.com or travelocity.com to find the best deal...if you don't care which hotel you end up at book the package or opaque rate. If you are going to choose the specific hotel, find the best deal and then head over to the hotel's offical site to book. You won't pay the booking fee/service charge and if your plan's change the hotels are a little more flexible when you booked through them directly vs. an online site. Additionally, many hotel loyalty programs do not award points/credits if you book with a TPI or OTA. FYI - ebookers.com (owned by Orbitz.com) uses Pegasus hotels.com (owned by Expedia.com) uses Worldspan

What search engine was founded in 1993?

Aliweb and JumpStation were both created/founded in 1993

What is 'use' in Perl?

The "use" command is the way to request additional features in perl.

For example, the statement

use Date::Parse;

will include the Date/Parse.pm module which provides two functions to parse date strings.

There are thousands of modules available and you may easily write your own modules for code that you use in several programs.

This answer naturally leads on to follow-on questions:

How do I know which features have been added by a particular "use" statement?

For standard modules (such as Date::Parse) that are usually installed on your computer, try the command

perldoc Date::Parse

on the command line. This should give you the documentation of the installed module. If this fails, go on to the next question.

For non-standard modules, you have to find the file Date/Parse.pm and look into it for documentation (this is not always informative).

Which modules are available for free?

Many Perl modules are distributed as free software. Go to http://www.cpan.org/ or http://search.cpan.org/ and browse/search the CPAN (Comprehensive Perl Archive Network).

Most likely you will initially be overwhelmed by the pure number of available modules --- but in most cases you will find that somebody has already posted some code for features that you need.

Documentation is included The "use" command is the way to request additional features in perl.

For example, the statement

use Date::Parse;

will include the Date/Parse.pm module which provides two functions to parse date strings.

There are thousands of modules available and you may easily write your own modules for code that you use in several programs.

This answer naturally leads on to follow-on questions:

How do I know which features have been added by a particular "use" statement?

For standard modules (such as Date::Parse) that are usually installed on your computer, try the command

perldoc Date::Parse

on the command line. This should give you the documentation of the installed module. If this fails, go on to the next question.

For non-standard modules, you have to find the file Date/Parse.pm and look into it for documentation (this is not always informative).

Which modules are available for free?

Many Perl modules are distributed as free software. Go to http://www.cpan.org/ or http://search.cpan.org/ and browse/search the CPAN (Comprehensive Perl Archive Network).

Most likely you will initially be overwhelmed by the pure number of available modules --- but in most cases you will find that somebody has already posted some code for features that you need.

Documentation is included

What is the difference between a search engine and meta search engine?

A meta-search engine is a search tool that sends user requests to several other search engines and/or databases and aggregates the results into a single list or displays them according to their source. Metasearch engines enable users to enter search criteria once and access several search engines simultaneously.

What is the correct HTML for making a a text input field?

the Answer is
To make a text input field, you can use

or