Website Development and Security Report: QMPongo Website Analysis
VerifiedAdded on 2025/04/26
|19
|3251
|179
AI Summary
Desklib provides past papers and solved assignments for students. This report analyzes the QMPongo website.

Table of Contents
List of Figure...................................................................................................................................1
List of Table.....................................................................................................................................2
Assessment Task 1...........................................................................................................................3
Two server tools aviable in QMPongo website...........................................................................3
Task Requirement........................................................................................................................3
Data Synchronization...................................................................................................................4
Estimation for Budget of this Project..........................................................................................5
Server Load & Operation Management System..........................................................................5
Server Tools for testing...............................................................................................................8
Assignment Task 2..........................................................................................................................9
Review of website........................................................................................................................9
Information Security while Communication with Client & Server...........................................11
Accessibility of Event in a disaster............................................................................................12
QMPongo Search Engine..........................................................................................................12
Checking number of visitors for their website..........................................................................13
Google Analytics.......................................................................................................................13
Three software that analyses broken sites.................................................................................15
Orphan files...............................................................................................................................17
Report Documentation...............................................................................................................17
Summarization...........................................................................................................................17
References......................................................................................................................................19
List of Figure
Figure 1: Xampp Apache Server Start.............................................................................................6
List of Figure...................................................................................................................................1
List of Table.....................................................................................................................................2
Assessment Task 1...........................................................................................................................3
Two server tools aviable in QMPongo website...........................................................................3
Task Requirement........................................................................................................................3
Data Synchronization...................................................................................................................4
Estimation for Budget of this Project..........................................................................................5
Server Load & Operation Management System..........................................................................5
Server Tools for testing...............................................................................................................8
Assignment Task 2..........................................................................................................................9
Review of website........................................................................................................................9
Information Security while Communication with Client & Server...........................................11
Accessibility of Event in a disaster............................................................................................12
QMPongo Search Engine..........................................................................................................12
Checking number of visitors for their website..........................................................................13
Google Analytics.......................................................................................................................13
Three software that analyses broken sites.................................................................................15
Orphan files...............................................................................................................................17
Report Documentation...............................................................................................................17
Summarization...........................................................................................................................17
References......................................................................................................................................19
List of Figure
Figure 1: Xampp Apache Server Start.............................................................................................6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 2: Apache Log Viewer.........................................................................................................6
Figure 3: Opening Apache GUI.......................................................................................................7
Figure 4: Loading File Management System...................................................................................7
Figure 5: HTTPs Checking..............................................................................................................8
Figure 6: Dynamic Serving............................................................................................................13
Figure 7: Google Analytics............................................................................................................14
Figure 8: Proxy Methods...............................................................................................................15
Figure 9: Screaming Frog Spider SEO..........................................................................................16
List of Table
Table 1: Task Requirement & Implementation Table.....................................................................4
Table 2: Estimation for Budget of this Project4..............................................................................5
Table 3: Client Requirement..........................................................................................................17
Figure 3: Opening Apache GUI.......................................................................................................7
Figure 4: Loading File Management System...................................................................................7
Figure 5: HTTPs Checking..............................................................................................................8
Figure 6: Dynamic Serving............................................................................................................13
Figure 7: Google Analytics............................................................................................................14
Figure 8: Proxy Methods...............................................................................................................15
Figure 9: Screaming Frog Spider SEO..........................................................................................16
List of Table
Table 1: Task Requirement & Implementation Table.....................................................................4
Table 2: Estimation for Budget of this Project4..............................................................................5
Table 3: Client Requirement..........................................................................................................17

Assessment Task 1
Two server tools aviable in QMPongo website
Here, below are the names of two server tools which are available in QMPongo website and
these are as follows:
SQL Database
Apache Logs Monitoring
SQL database
Sql database is named as the sequential query language. It is also known as database query
language which is mainly used for handling & managing the database of Relational Database. It
is one of most famous language which is used at braod commercial level with introduction of
E.F. Codd relational database. SQL is having the permission for performing all different types of
data operations into RDBMS.
Apache Logs Monitoring
Mainly log data is created by using the Apache HTTP server which is containing large amount of
information. With the help of this information, you can easily maintain & judge the server with
the point of interest. It is also able for monitoring the different web logs, system logs with
application & log storage files also. Advantages are as follows:
Highly web analysis of information.
Can easily take the decision for business development.
Easily measure the web application with the script error.
High & tight security aspects (Naigo 2009).
Task Requirement
Here, this below mentioned table is explaining the task name as well as explanation also for their
use & need and how you can implement:
Table 1: Task Requirement & Implementation Table
Task Name Need & Requirement How you can implement?
Two server tools aviable in QMPongo website
Here, below are the names of two server tools which are available in QMPongo website and
these are as follows:
SQL Database
Apache Logs Monitoring
SQL database
Sql database is named as the sequential query language. It is also known as database query
language which is mainly used for handling & managing the database of Relational Database. It
is one of most famous language which is used at braod commercial level with introduction of
E.F. Codd relational database. SQL is having the permission for performing all different types of
data operations into RDBMS.
Apache Logs Monitoring
Mainly log data is created by using the Apache HTTP server which is containing large amount of
information. With the help of this information, you can easily maintain & judge the server with
the point of interest. It is also able for monitoring the different web logs, system logs with
application & log storage files also. Advantages are as follows:
Highly web analysis of information.
Can easily take the decision for business development.
Easily measure the web application with the script error.
High & tight security aspects (Naigo 2009).
Task Requirement
Here, this below mentioned table is explaining the task name as well as explanation also for their
use & need and how you can implement:
Table 1: Task Requirement & Implementation Table
Task Name Need & Requirement How you can implement?
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Tracking of
customer with
profiling also
It is required for maintaining
the customer information and
data for further government
security aspects & other
defective aspects
By implementation of this customer
can easily maintain their profile on
server as well as on cookies for other
site also.
Database
Connectivity
Adding the dynamicity feature
to this website
Here, PHP script is used for
establishing the database connectivity
for dynamicity over server & client
web browser.
Safe Transaction Sensitive information like
payment details like bank detail,
card holder name, OTP, account
number, IFAC, NEFT and so on
are maintained inside this
transaction which are
completely safe from such
defective things
We can implement this by using
various security feature like HTTPs,
SSL, and AES & RES algorithm.
HTTPs is standing for the hypertext
transfer protocol & s is for
completely secure network.
Delivery & Mode
of Payment
It is playing a important role for
e commerce business in which
online payment is one of the
important need.
There are a lot of platforms for online
transaction like Pay Pal, EFT, B Pay
and so on.
Data Synchronization
Data synchronization is defined as the way of establishing the consistency for two or more than
two database for sequencing of information. In this, it is followed by the process of
harmonization on the time which are performed in sequence manner. In this, it is having
following the previous page information by carrying them into the latest or destination final
page.
Here, is the list of the data synchronisation for this website. In this website, it is having card
adding system. In this home page, it is having list of products and we can add them into cart.
This product are added into cart and if user is already logged in then it is redirected to user home
page and if not then it is redirected to login & sign up credential page. These id of product is
carried out at the last of page feature which is cart. So, this is following up for data
synchronization (Data 2019).
customer with
profiling also
It is required for maintaining
the customer information and
data for further government
security aspects & other
defective aspects
By implementation of this customer
can easily maintain their profile on
server as well as on cookies for other
site also.
Database
Connectivity
Adding the dynamicity feature
to this website
Here, PHP script is used for
establishing the database connectivity
for dynamicity over server & client
web browser.
Safe Transaction Sensitive information like
payment details like bank detail,
card holder name, OTP, account
number, IFAC, NEFT and so on
are maintained inside this
transaction which are
completely safe from such
defective things
We can implement this by using
various security feature like HTTPs,
SSL, and AES & RES algorithm.
HTTPs is standing for the hypertext
transfer protocol & s is for
completely secure network.
Delivery & Mode
of Payment
It is playing a important role for
e commerce business in which
online payment is one of the
important need.
There are a lot of platforms for online
transaction like Pay Pal, EFT, B Pay
and so on.
Data Synchronization
Data synchronization is defined as the way of establishing the consistency for two or more than
two database for sequencing of information. In this, it is followed by the process of
harmonization on the time which are performed in sequence manner. In this, it is having
following the previous page information by carrying them into the latest or destination final
page.
Here, is the list of the data synchronisation for this website. In this website, it is having card
adding system. In this home page, it is having list of products and we can add them into cart.
This product are added into cart and if user is already logged in then it is redirected to user home
page and if not then it is redirected to login & sign up credential page. These id of product is
carried out at the last of page feature which is cart. So, this is following up for data
synchronization (Data 2019).
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Estimation for Budget of this Project
Here, below is the list of the cost details with their service specifically as well as repayment
recurrence like monthly or yearly or day wise and these are as follows:
Table 2: Estimation for Budget of this Project4
Service Name of
Instrument
Estimated
Cost
Specification Repayment
Recurrence
Server Hosting (user
panel)
50 $ Depending on the traffic
over the network cellular
devices
Monthly basis charges
MySQL Database 3000 $ It is on the enterprise
broad level
Yearly basis plan.
Digital Marketing &
Social Media
Marketing
600 $ On this different market
techniques are used for
digital & social media like
bulk messaging & bulk
emailing.
Monthly
MS IIS Already
included into
hosting
Used for managing
database & integrated with
SQL Database
Monthly
Domain Name 120 $ Here, for this website
domain name is .com field
yearly
Server Load & Operation Management System
Here, below are the steps for loading the server for any of the file management system with
security aspect & these are as follows:
First of all major step is that you have to follow the xampp apache server.
Here, below is the list of the cost details with their service specifically as well as repayment
recurrence like monthly or yearly or day wise and these are as follows:
Table 2: Estimation for Budget of this Project4
Service Name of
Instrument
Estimated
Cost
Specification Repayment
Recurrence
Server Hosting (user
panel)
50 $ Depending on the traffic
over the network cellular
devices
Monthly basis charges
MySQL Database 3000 $ It is on the enterprise
broad level
Yearly basis plan.
Digital Marketing &
Social Media
Marketing
600 $ On this different market
techniques are used for
digital & social media like
bulk messaging & bulk
emailing.
Monthly
MS IIS Already
included into
hosting
Used for managing
database & integrated with
SQL Database
Monthly
Domain Name 120 $ Here, for this website
domain name is .com field
yearly
Server Load & Operation Management System
Here, below are the steps for loading the server for any of the file management system with
security aspect & these are as follows:
First of all major step is that you have to follow the xampp apache server.

Figure 1: Xampp Apache Server Start
Figure 2: Apache Log Viewer
Now, student have to load the SQL server into software.
Figure 2: Apache Log Viewer
Now, student have to load the SQL server into software.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Figure 3: Opening Apache GUI
Now, you have to load any one of the file management system for analysing & checking
the source information with security aspects also:
Figure 4: Loading File Management System
Now, you have to check either the encryption is implemented or not for checking the HTTPs
protocol feature like hyper - text transfer protocol. It is followed by SSL which is security layer
used for sending & retrieving the information in a secure manner. This protocol is used for
checking all the security aspects.
Now, you have to load any one of the file management system for analysing & checking
the source information with security aspects also:
Figure 4: Loading File Management System
Now, you have to check either the encryption is implemented or not for checking the HTTPs
protocol feature like hyper - text transfer protocol. It is followed by SSL which is security layer
used for sending & retrieving the information in a secure manner. This protocol is used for
checking all the security aspects.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Figure 5: HTTPs Checking
Server Tools for testing
Here, below is the details of server tools which are used for analysing the performance of system
as well as website also and these are as follows:
OP Manager
Google Analytics
Server Tools for testing
Here, below is the details of server tools which are used for analysing the performance of system
as well as website also and these are as follows:
OP Manager
Google Analytics

Assignment Task 2
Review of website
a. Creating a user
Here, below is the code which is used for creating a user when a user click on register
button. After that a form will be opened with having some important credentials like
username, email, password, confirm password and membership option. There is register
button at below and when you click on register button then it will check all the
credentials by validating them and get their values.
<? php
if(isset($_POST ['register']))
{
session_start ();
$username = mysql_real_escape_string ($_POST ['username']);
$email = mysql_real_escape_string ($_POST ['email']);
$password = mysql_real_escape_string ($_POST ['password']);
$confirmpassword = mysql_real_escape_string ($_POST ['confirmpassword']);
$membership = mysql_real_escape_string ($_POST ['Membership']);
After that it will have for matching the confirm password & reconfirm password. If the
password are matched then it go on to the SQL insert query which is mentioned below
and if the query is executed then data is stored into database & if not then try again
message will show.
if($password == $confirmpassword)
{
Review of website
a. Creating a user
Here, below is the code which is used for creating a user when a user click on register
button. After that a form will be opened with having some important credentials like
username, email, password, confirm password and membership option. There is register
button at below and when you click on register button then it will check all the
credentials by validating them and get their values.
<? php
if(isset($_POST ['register']))
{
session_start ();
$username = mysql_real_escape_string ($_POST ['username']);
$email = mysql_real_escape_string ($_POST ['email']);
$password = mysql_real_escape_string ($_POST ['password']);
$confirmpassword = mysql_real_escape_string ($_POST ['confirmpassword']);
$membership = mysql_real_escape_string ($_POST ['Membership']);
After that it will have for matching the confirm password & reconfirm password. If the
password are matched then it go on to the SQL insert query which is mentioned below
and if the query is executed then data is stored into database & if not then try again
message will show.
if($password == $confirmpassword)
{
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

$password = md5($password);
$sql = "INSERT INTO `members` (`Username`". “, `Password`". “, `Membership
Type`". “, `Email`". ") VALUES (' $username'“. ", ' $password'". ", ' $membership'". ", '
$email')";
mysqli_query ($conn, $sql);
On the successfully login into website the session feature is maintained in which it will
allow user for not signing up again and again, if a user is already logged in into the
website and didn’t log out till now. So, after closing the browsing window we are able to
log in automatically without logging again and again.
$_SESSION ['message'] = "Login successful!";
$_SESSION ['username'] = $username;
$page_content = '.. /Content_Pages/Content_Home.php';
}
else
{
$_SESSION ['message'] = "Both passwords did not match." . "Please try again." ;
}
}
?>
b. Price Changing based on Membership
By using this we can easily price of product shoes based on their membership card. I am
having the php source code file named as shoes. php which is having the list of shoes
with price also. However, for using this current page scenario into this page, we use by
following the below mentioned manner & scenario by adding one more measurability
$sql = "INSERT INTO `members` (`Username`". “, `Password`". “, `Membership
Type`". “, `Email`". ") VALUES (' $username'“. ", ' $password'". ", ' $membership'". ", '
$email')";
mysqli_query ($conn, $sql);
On the successfully login into website the session feature is maintained in which it will
allow user for not signing up again and again, if a user is already logged in into the
website and didn’t log out till now. So, after closing the browsing window we are able to
log in automatically without logging again and again.
$_SESSION ['message'] = "Login successful!";
$_SESSION ['username'] = $username;
$page_content = '.. /Content_Pages/Content_Home.php';
}
else
{
$_SESSION ['message'] = "Both passwords did not match." . "Please try again." ;
}
}
?>
b. Price Changing based on Membership
By using this we can easily price of product shoes based on their membership card. I am
having the php source code file named as shoes. php which is having the list of shoes
with price also. However, for using this current page scenario into this page, we use by
following the below mentioned manner & scenario by adding one more measurability
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

that is including the master page also. Master page is used for loading the current
page_content or other page_content information on other place when there is need &
requirement.
<?php
$page_content = '../Content_Pages/Products/Shoes.php';
include ("../Master_Page/Master_Page.php");
?>
Information Security while Communication with Client & Server
Here, there are mainly three techniques which are used for validating the requests, coming from
the user computer or system when it is going to the server. Such that, no extra load is there on the
server and effective with fastest execution of response will be generated and these are as follows:
HTTPs Encryption Techniques
SSL Encryption
VPN
HTTPs Encryption Techniques
HTTPs is standing as the extension for the secure version of the hyper - text transfer protocol
mainly designed & used for secure communication in between the user computer & server. It is
used as computer network on the internet at the broad level. The communication protocol is
encrypted with the help of TLS which is the transport layer security. It is completely working for
the user level & server. This website is also completely secure because it is following by the
HTTPs layer because at URL it is having HTTPs://.... Which shows its HTTPs encryption .
SSL Encryption
SSL is standing for the secure sockets layer which is used for security technology aspects. It is
used for establishing the encryption link for checking the security in between the server and
client computer’s local internet browser. This link is giving the insurance that all the information
which is passing through the web server and internet browser are completely personal to personal
page_content or other page_content information on other place when there is need &
requirement.
<?php
$page_content = '../Content_Pages/Products/Shoes.php';
include ("../Master_Page/Master_Page.php");
?>
Information Security while Communication with Client & Server
Here, there are mainly three techniques which are used for validating the requests, coming from
the user computer or system when it is going to the server. Such that, no extra load is there on the
server and effective with fastest execution of response will be generated and these are as follows:
HTTPs Encryption Techniques
SSL Encryption
VPN
HTTPs Encryption Techniques
HTTPs is standing as the extension for the secure version of the hyper - text transfer protocol
mainly designed & used for secure communication in between the user computer & server. It is
used as computer network on the internet at the broad level. The communication protocol is
encrypted with the help of TLS which is the transport layer security. It is completely working for
the user level & server. This website is also completely secure because it is following by the
HTTPs layer because at URL it is having HTTPs://.... Which shows its HTTPs encryption .
SSL Encryption
SSL is standing for the secure sockets layer which is used for security technology aspects. It is
used for establishing the encryption link for checking the security in between the server and
client computer’s local internet browser. This link is giving the insurance that all the information
which is passing through the web server and internet browser are completely personal to personal

with integrated form. SSL is defined as the industry standard with used at widely by billions of
website for their secure transaction either card transaction by their customers (symantec 2017).
VPN
A virtual private network is defined as the private network over the public network by enabling
the customer for sending & retrieving data or information over the public networks, however
computer devices are connected via private network.
Accessibility of Event in a disaster
There are always some secure techniques which are allowing the user for accessing the website
or resources in term of any disaster of any eventual task. Just take an example user can change
their password if they feel there is need of changing the password. If yes, then go to profile &
setting for changing the password. And, another method is click on forget password &
confirmation link will be sent to your mail id and change of password is done. Your added
product or order are still same as previous one. There will be no effect on the changing of the
password on your order as well as added products also.
QMPongo Search Engine
Search engine is the way of optimization in which some keyword are defined inside the
meta tag which allowed them for searching keyword on Google platform for providing
their website link at most level. This website is having the different Meta tags keyword
with their synonym for each and every web page. It is not having any repetition of
phrases, however having some unique keywords for identification. Here, below is the
sample for meta code and these are as follows:
<meta name="keywords"
Content = "KEYWORD1 KEYWORD2 KEYPHRASE1 etc. About 30 to 40
unique words">
<meta name = "description"
Content = "An accurate, keyword-rich description about 150
characters">
This website is having the cloaking technique in which one version for search engine
optimization either spiders or bots are on the other human visitors.
website for their secure transaction either card transaction by their customers (symantec 2017).
VPN
A virtual private network is defined as the private network over the public network by enabling
the customer for sending & retrieving data or information over the public networks, however
computer devices are connected via private network.
Accessibility of Event in a disaster
There are always some secure techniques which are allowing the user for accessing the website
or resources in term of any disaster of any eventual task. Just take an example user can change
their password if they feel there is need of changing the password. If yes, then go to profile &
setting for changing the password. And, another method is click on forget password &
confirmation link will be sent to your mail id and change of password is done. Your added
product or order are still same as previous one. There will be no effect on the changing of the
password on your order as well as added products also.
QMPongo Search Engine
Search engine is the way of optimization in which some keyword are defined inside the
meta tag which allowed them for searching keyword on Google platform for providing
their website link at most level. This website is having the different Meta tags keyword
with their synonym for each and every web page. It is not having any repetition of
phrases, however having some unique keywords for identification. Here, below is the
sample for meta code and these are as follows:
<meta name="keywords"
Content = "KEYWORD1 KEYWORD2 KEYPHRASE1 etc. About 30 to 40
unique words">
<meta name = "description"
Content = "An accurate, keyword-rich description about 150
characters">
This website is having the cloaking technique in which one version for search engine
optimization either spiders or bots are on the other human visitors.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 19
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.