Web Technology Questions

Q:

What are the different objects used in JavaScripts?

Answer

JavaScripts uses a hierarchical structure that applies to the objects in a document. There are some objects that show the relationship of one object to another using the language.

Window object: This is the topmost object in the hierarchy. It represent the content area of browser window that consists of HTML documents. Each frame is also a window that has some actions inside it.


Document object: This object gets loaded in a window and consists of objects of different kind in the model. It consists of the content that will be written in the script.

Form object: Form objects are used for more interaction with the users. It represents the form elements inside <FORM>...</FORM> tag.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1375
Q:

How to set the cursor to wait in JavaScript?

Answer

The cursor can set to wait in JavaScript by using the property ‘cursor’ property. The following example illustrates the usage.


window.document.body.style.cursor = "wait"; 

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1374
Q:

How to create arrays in JavaScript?

Answer

Arrays are created by using new Array() in Java Script.


For example : var employees = new Array();


The elements to this array is assigned as follows :


employees[0] = "Kumar"


employees[1] = "Fedrick"

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1374
Q:

Where are cookies actually stored on the hard disk?

Answer

The storage of cookies on the hard disk depends on OS and the browser. The Netscape navigator on Windows, the file cookies.txt contains all the cookies. The path is :


c:\Program Files\Netscape\Users\username\cookies.txt


 


The Internet Explorer stores the cookies on a file by name username@website.txt is


c:\Windows\Cookies\username@Website.txt

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1371
Q:

What is the use of IP based hosting?

Answer

The web hosting on the server can be accomplished by using the IP based hosting that provides resources and services as follows:


- IP based hosting provides dedicated IPs that consists of virtual hosts and having the different IP address. 


- Web server is configured with different and multiple physical network interfaces using the same physical interface. 


- Web server uses this IP address to connect the client with the server to determine the web site that provides the client a view of it. 


- IP addresses provide the resources that are required in order to use the SSL certificates and other resources rather than shared certificate.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1371
Q:

What is the use of Name based hosting?

Answer

- Name based is the virtual hosting that allows the virtual hosts to serve multiple hostnames that runs on single machine and having only one IP address.


- This is used when the web browser is used to request the resource from the server then the server respond using the hostname. 


- Web server uses HTTP protocol to respond to the requested hostname as the part of the request. 


- The server contains all the information of the website and the user that requests for the resources given. 


- Name based web hosting includes the resources and services that need to be given at the time of client’s request.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1355
Q:

Which method is used to draw an image on the canvas?

Answer

drawImage(image,x,y) method is used to draw an image on the canvas.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1354
Q:

What are the different web browser tools available to accelerate the speed of the web page?

Answer

- Web accelerators are used to increase the loading of the web page faster and by providing extra features of caching, etc. 


- There are tools that are provided like internet accelerator of browser accelerator that provides security from the spyware and adware programs. 


- The security from the programs are required as they are harmful for the computer and the tools uses the strategies of pre-caching in which the data is automatically cached and when the website is opened again then the fetching is being done from the place where the content is saved. 


- Registry tweaks are used to improve the performance offering the risk management techniques for downloading the resources.

Report Error

View answer Workspace Report Error Discuss

Subject: Web Technology

0 1351