Archives: Theory

Computer Misuse Act 1990

The Computer Misuse Act 1990 was created to close a loophole in UK law regarding the intentional malicious use of computers. It is designed to protect computer users against deliberate attacks and theft of information. The…

Testing and Test Data

It is important to test algorithms to check how they perform under a range of conditions. This includes testing any validation you have created to ensure it performs as expected. When creating a testing plan,…

Arrays

An array is a data structure that is capable of storing more than one item of data (value) at a time. To achieve this, each piece of data in an array is given an index…

Uniform Resource Locator (URL)

A uniform resource locator (URL) is the address that is used in the web browser to request a resource (web page) from the world wide web. E.g. http://www.bbc.co.uk/index.html It can be broken down into three…

HTML Structure and Presentation

Web pages are typically created using three components, HTML, CSS and JavaScript. HTML Provides the content and structure of each page CSS A presentation language used to style the HTML content JavaScript A scripting language…

Hypertext Transfer Protocol (HTTP)

HTTP is a protocol (set of rules) used when transmitting files (data) over the world wide web. When you browse the WWW using a web browser, you are using the HTTP protocol. Often, you will…

IP and MAC addresses

People often get confused trying to understand the difference between IP and MAC addresses. An IP address is the location of your device on the internet, whilst a MAC address identifies the actual device. What…

Cookies

Cookies are text files.  They are stored on a user’s computer by a web browser, at the request of the web server. A cookie is limited to a small amount of data and can only…