Trent King CIT 436 Lab 3
.docx
keyboard_arrow_up
School
University of Phoenix *
*We aren’t endorsed by this school
Course
0102
Subject
Computer Science
Date
May 4, 2024
Type
docx
Pages
8
Uploaded by ProfWillpower13160 on coursehero.com
Trent King CIT 436 Lab 3 1/29/2024 1.
Why do you suppose Apache uses the LoadModule directive? That is, why is Apache separated into modules?
Apache uses the LoadModule directive to enable modular functionality. This modular design allows for easy customization, enabling only required features and thus optimizing performance. It's a practical approach to managing server capabilities.
2.
For each LoadModule directive, the syntax is LoadModule name file. What is the pattern for the module names? Where are all the modules located? What is the pattern for the modules’ file names?
After examining the LoadModule directives in Apache's httpd.conf, I found that module names typically start with mod_, such as mod_ssl. These modules are located in a directory /usr/lib/. The file names for these modules mirror their module names and end with a .so extension, for example, mod_ssl.so.
3.
Issue an egrep command to count the number of LoadModule directives found in httpd.conf and the number of LoadModule directives that are commented out. How many total LoadModule directives are there? How many are commented out? What can you conclude about the default version of Apache in terms of its capabilities?
After running the egrep commands on the httpd.conf file, I found that a majority of the LoadModule directives are commented out. This indicates that the default Apache configuration is streamlined for essential functionality, with many advanced features disabled to optimize performance and security. This setup allows for customization based on specific server requirements.
4.
Issue an egrep command to count the number of <IfModule> containers in the conf file. How many are there?
To count the number of <IfModule> containers in the Apache httpd.conf file, I issued the following egrep command: egrep -c '<IfModule' httpd.conf. This command counts each occurrence of the <IfModule> opening tag. It indicates that there are 25 <IfModule> containers within the configuration file. This number of containers suggests a modular and flexible Apache setup, where specific configurations are conditional on the presence of certain modules.
5.
In vi, search forward for the first <IfModule> container. What module is it testing for? What directives are applied if the module is loaded? Search backward through the LoadModule statements. Is this module loaded by default?
In httpd.conf, I found the first <IfModule> container testing mod_ssl.so for secure connections. It had relevant directives. Checking LoadModule, I confirmed mod_ssl.so is active by default, highlighting Apache's focus on security.
6.
Search forward for the second <IfModule> container. This container tests for the module that defines the directive DirectoryIndex. What does this directive do (read the comment preceding it)?
I located the second <IfModule> container, which checks for the module defining the DirectoryIndex directive. This directive specifies the default index file for directories. It determines the file displayed when accessing a directory on a web server.
7.
Imagine that you expect directories to have index files with several extensions, such as index.html, index.cgi, index.shtml and index.php. To support this, you edit this directive and add all of these other filenames. Does the order you list these matter? If so, why?
The order you specify in the DirectoryIndex directive matters. Apache serves the first listed index file it encounters.
8.
At the bottom of the first screen is a comment that describes ServerRoot. What does this comment say? Move forward one screen; what is the location of ServerRoot? In your second terminal window, cd to that location. What items do you find here?
The comment at the bottom of the first screen in the httpd.conf file describes ServerRoot as the base directory for server files and runtime data. Moving forward one screen, I found the location of ServerRoot
specified in the file. In my second terminal window, I navigated to that location using the cd command. At
this location, I found essential subdirectories and files for Apache's configuration and operation, including
directories like conf, logs, modules, and various configuration files, logs, and resources necessary for Apache to function correctly.
9.
Move forward in vi by one screen; you should see the next server directive. What is it and what does it define? It lists a port. What else could it list (hint: read the comment that precedes the directive)?
Moving forward in vi by one screen, I found the next server directive in the httpd.conf file. This directive defines the port that Apache will listen on for incoming requests. It lists a specific port number, Regarding what else it could list, the comment preceding the directive suggests that it could specify
alternative ports. This directive allows configuring Apache to listen on multiple ports to serve different types of traffic or applications.
10.
Scroll down five more screens in vi and you will reach the <IfModule> statement you were asked
about in 1c. Move down another screen and you will reach the next server directive. What is it and what is it used for? What is the default value? What should you change this to?
Moving down in vi, I found the next server directive. It's used to configure the KeepAlive feature in Apache, which controls whether multiple requests and responses can be sent over a single TCP connection. The default value is set to On, enabling KeepAlive. Depending on specific needs or performance considerations, it may be good to change this to Off in high-traffic scenarios to optimize resource usage.
11.
Move down another screen and you will find ServerName, which you should have changed in lab
2. Also on this screen is the first of a few <Directory> containers, this one for /, the root of the Linux file system. Read the comment immediately before this entry. What does this directory container do (or prevent)?
Moving down another screen in vi, I found the ServerName directive, which have been configured previously. On this screen, there's also the first <Directory> container for the root directory /. The comment before this entry explains that this directory container sets rules and configurations for the root directory, specifying how Apache should handle access and requests, effectively preventing or allowing certain actions within the root directory.
12.
On the next screen you will find DocumentRoot. What does it define and what is the location of DocumentRoot? Immediately beneath this is a <Directory> container for this location. How does this directory container differ from the one you saw in 2d?
On the next screen in vi, I found the DocumentRoot directive, which defines the location where web content files are stored. Immediately beneath it, there's a <Directory> container specific to this DocumentRoot location. This directory container differs from the one in the previous question because it focuses on controlling access and permissions for the web content stored in the DocumentRoot directory, while the previous <Directory> container had a broader scope, relating to the root directory / of the Linux file system.
13.
The next screen has another <IfModule> container. The screen after that has a <Files> container. The <Directory> container impacts all URLs for the given directory (and subdirectories). How does the <Files> container differ? (hint: this is explained in the textbook and notes) What file(s) is
this <Files> container defined for?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
1 . One of the responsibilities of the Controller in MVC is to Select proper Models for Views
True
False
2.
When MVC is applied to a Web service only, the Controller MVC component is present.
True
False
3.
Web services serve their data to a browser.
True
False
4.
One of the responsibilities of the Controller in MVC is to Displays data to the user
True
False
5.
With Web API controllers a route like /home/index tells us the Controller class name and the action method name.
True
False
6.
The most commonly used format for modern Web Services is JSON.
True
False
7.
One of the responsibilities of the Controller in MVC is to Connect to the database engine
True
False
8.
It is possible for return type in the asynchronous method to be a void .
True
False
arrow_forward
Here is the task require to develop a data-driven online client server system called “ParcelBuddy” aimed at logging and tracking parcel deliveries for a small delivery company and their drivers.
You must build the system using PHP, MySQL and HTML/CSS using an Object Oriented approach to the code and data acquisition and Model-View-Controller design pattern .
Noteworthy details :
The core PHP architecture needs to follow an Object Oriented, Model-View-Controller (MVC) Design Pattern approach.
For the system itself there should be two types of users. 1) a delivery manager who can manage parcel entries using a Create-Read-Update-Delete (CRUD) approach 2) a parcel delivery user (think similar to Evri).
The system must allow users to login before they can do anything else. As a minimum for users, each record needs to include: a unique id, a unique username, a password, and a user type. All passwords must be appropriately encrypted in the database.
A delivery point…
arrow_forward
You should focus your efforts on avoiding a debate about how well deep access performs in comparison to shallow access, and you should make the case for using deep access rather than shallow access from the perspective of a developer.
arrow_forward
What is chunking? How does chunking affect in interface designs? Give example to support your answer.
arrow_forward
Objectives:
4.REST service on ASP.NET Core
, the basics of webAPI development using ASP.NET Core. We will learn the principles of creating a webAPI project, methods of adding model classes and database context, creating controller templates using CRUD methods, configuring routing, URL paths and return values, calling webAPI using Postman.
The end result is a webAPI that allows you to work with to-do list items stored in a database.
*The source of step by step:.NET 7.0 (or later):: https://learn.microsoft.com/en-us/aspnet/core/tutorials/first-web-api?view=aspnetcore-7.0&preserve-view=true&tabs=visual-studio
.NET Core 3.1 SDK
https://learn.microsoft.com/en-us/aspnet/core/tutorials/first-web-api?view=aspnetcore-3.1&tabs=visual-studio
№
Task
1.
Run the basic WeatherForecast test application and show its operation.
2.
Develop and demonstrate a webAPI to work with to-do list items stored in a database
3.
Demonstrate the operation of a data…
arrow_forward
The _____suggests splits interfaces that are very large into smaller and more specific interface so their clients will only have to know about the methods that are of use to them. (SRP, OCP, LSP, or ISP?)
The Single Responsibility Principle (SRP)The Open-Closed Principle (OCP)The Liskov Substitution Principle (LSP)The Interface Segregation Principle (ISP)The Dependency Inversion Principle (DIP)
arrow_forward
Question
Read about Thrift and Answer the following questions. Here is the link as well: https://thrift.apache.org/
What is going on here? How is this similar or different from JSON Schema or ProtoBuf?What is the definition of type Work?
arrow_forward
Given the following web modelling problems faced by WordPress developer:
I have a WordPress site with far over 30,000 posts monthly. Unfortunately,the method of adding and editing posts in MyISAM storage engine is becoming slower for the accumulated a lot of posts. Pages loading quickly for client side, however, when writes or updates are made, the net server consumes up to 100% CPU and takes longer time to finish the tasks(often longer than PHP's 60-second timeout).
Analyze the problems faced by the developer to identify an appropriate web storage engine that can support the following requirements:
i) faster posts editing
ii) less web server processor consumption
iii) ACID transaction
Elaborate at least 3 reasons to support your answer.
arrow_forward
You should avoid arguing about how well deep access performs relative to shallow access and instead make the case for using deep access as a developer.
arrow_forward
What does Apache Web Service software charge for their service? Which two companies provide technical support for users of the Apache Web Server?
arrow_forward
The CSM Tech organization has a substantial web presence with several publicly accessible web and application servers. You have DNS servers that handle Internet queries for all your publicly accessible resources. However, after doing some statistical analysis on your public DNS servers, you find that your servers are handling recursive lookups for clients that are not within your organization. Your public DNS servers should handle recursive queries only for your internal clients, but the servers should handle iterative (nonrecursive) queries from external sources.
What do you recommend? What are the commands needed to implement the solution?
arrow_forward
What are some key differences between General Public License v2.0 and Apache License 2.0 (Apache-2.0)?
arrow_forward
Dynamo handles conflict resolution during read operations (get) to enable an always-writable data store. Why does Dynamo allow applications to handle conflict resolution instead of having the framework do it?
a) The application can choose a resolution technique that makes sense for the particular application.
b) It is more efficient to have clients handle this to offload work from the servers.
c) Dynamo is decentralized, so it is not possible to resolve conflicts at the server.
d) Dynamo can remain lightweight since not all applications care about conflicts.
arrow_forward
Task 2: Evaluation of Transcon Controls
Identify from the SAD what security controls Transcon already has in place that could assist
with the prevention of spear-phishing attacks. Hint: refer to section '7 Interfaces'.
Provide Transcon with a recommendation of a suitable technology solution to help protect the
NOMS system from spear-phishing attacks. Ensure to provide Transcon with a reason for your
recommendation and explain how it would fit in with the NOMS High-level integration diagram
displayed in Figure 7 of the SAD.
arrow_forward
Explore the concept of URI templates and their significance in RESTful API design. Provide examples of when and how URI templates are used.
arrow_forward
Salesforce Case Study 4:
Suppose that in you Salesforce Developer Org there is an custom object table Session_Speaker
containing field like Session_Date_c, Id and Session_c. Now you have to create a trigger on
creation of that record that rejects multiple booking of the speaker sessions. Develop the code for
Apex trigger in Apex programming language.
arrow_forward
A client want you to develop an online education system to facilitate the students to attend their online classes. All of the classes will be scheduled by the admin staff. And, the teachers will be allowed to manage (create, modify or delete) their online classes list and other content with respect to courses as well as class sections. Only the admin staff will be able to manage the enrollment of students, and courses details. While the teachers can only update the course contents. You are required to automate the functionality of the system in order to provide a detailed summary to the admin staff that will help to monitor the classes by status (Delivered, Missed, or Rescheduled).
Keeping in mind the above scenario, please solve the following:
Define the stakeholders/actors involved in this online education system
Define core functionalities of the whole system
Draw a use-case diagram using any tool (Online / Offline)
Provide expanded use-cases from the above system (Minimum 2)
arrow_forward
What are some of the most significant changes between the General Public License version 2.0 and the Apache License version 2.0 (Apache-2.0)?
arrow_forward
You are required to draw star schema for Happy Music House. It allows you to buy music
compact disk (CD) and provide reviews as well as ratings to other customers. This will
provide an idea of how good that CD music is. The system administrator can add new CDs,
while users can buy those CDs, and then write reviews for them. In order to buy or review
CDs, you must be a registered user for the system. Every user registration has a personal
page in the system where they can see the CDs they bought and access all the information
regarding the CDs. You may use any reasonable attribute for each dimension table.
The purpose of the system is to know what is the rating of each music CD and what
recommendation does the reviewer provide to others.
arrow_forward
Design the layout of users, domains, trusted domains, anonymoususers, etc for a start-up open source software company ABC. Theyshould have an internal CVS server, which only internal developerscan access, an anonymous CVS server for outsiders to downloadsource code, WWW servers (one for internal and one for external),and a mail server. Outsiders should not be able to access eitherinternal CVS or internal WWW servers..You should finish the following parts:a) The topology diagram for the different servers and locations andtrust domains. For example, where are the firewalls, and whereare the users located in the topology.b) The assumptions that you make for your design and the securitypolicy to achieve this assumption
Your final document should include the following parts:1. Network topology diagram and the domains of trust.2. Security related assumptions in your design, and security policy tomake this assumption valid.3. Trust assumptions about users (e.g., who could be root, what…
arrow_forward
When we created a Mongo database on a server, one way to access that database from another computer was SSH tunneling. The other way was to expose the database ports and implement users and credentials. What are some pros and cons of each of these methods? Provide a case where each one might be the preferred solution.Which of these solutions does Mongo.orgs Atlas solution seem to prefer?
arrow_forward
QUESTION 7
The term heartbeat message is an alterative term for control message that is different from data message.
True
False
QUESTION 8
In the cluster of hundreds of servers, it is a common event that a chunkserver may join or leave the cluster, change its name, fail and
restart, etc.
O True
False
QUESTION 9
It is valuable for the master server to maintain the consistent view of chunks' location.
True
False
arrow_forward
Working with spring boot, I want to import a list of users into a mySQL database from a html file. Each user has a name, age and a unique ID. This data should be parsed and stored in a MySQL database using Hibernate.
How should i go about this.
arrow_forward
Discuss the two methods about RESTful APIs that usually require identification (keys) to be sent along with the request.
arrow_forward
Explain your reasoning and the factors that led you to make each decision below. Debate whether or not the following are copyright infringements or fair uses. 1. You are adapting the popular movie "Pirates of the Caribbean" into a video game. Second, you should cite any images that were utilised in your report that were protected by copyright. Third, your capstone project should include setting up and running an Apache server. Copying and reselling original music CDs to the public after their first release. (Highlight two responses to this assertion).
arrow_forward
Using the example of making a phone call, explain the functionality of Network APIs in a concise way. Connected to sockets functionalities
arrow_forward
Apache Spark: What are some of the benefits of lazy evaluation of operations in Apache Spark?
arrow_forward
UITableView applications are heavily delegate-driven. Explain briefly three methods, with their corresponding swift code, required to configure UITableView via the data source protocol.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- 1 . One of the responsibilities of the Controller in MVC is to Select proper Models for Views True False 2. When MVC is applied to a Web service only, the Controller MVC component is present. True False 3. Web services serve their data to a browser. True False 4. One of the responsibilities of the Controller in MVC is to Displays data to the user True False 5. With Web API controllers a route like /home/index tells us the Controller class name and the action method name. True False 6. The most commonly used format for modern Web Services is JSON. True False 7. One of the responsibilities of the Controller in MVC is to Connect to the database engine True False 8. It is possible for return type in the asynchronous method to be a void . True Falsearrow_forwardHere is the task require to develop a data-driven online client server system called “ParcelBuddy” aimed at logging and tracking parcel deliveries for a small delivery company and their drivers. You must build the system using PHP, MySQL and HTML/CSS using an Object Oriented approach to the code and data acquisition and Model-View-Controller design pattern . Noteworthy details : The core PHP architecture needs to follow an Object Oriented, Model-View-Controller (MVC) Design Pattern approach. For the system itself there should be two types of users. 1) a delivery manager who can manage parcel entries using a Create-Read-Update-Delete (CRUD) approach 2) a parcel delivery user (think similar to Evri). The system must allow users to login before they can do anything else. As a minimum for users, each record needs to include: a unique id, a unique username, a password, and a user type. All passwords must be appropriately encrypted in the database. A delivery point…arrow_forwardYou should focus your efforts on avoiding a debate about how well deep access performs in comparison to shallow access, and you should make the case for using deep access rather than shallow access from the perspective of a developer.arrow_forward
- What is chunking? How does chunking affect in interface designs? Give example to support your answer.arrow_forwardObjectives: 4.REST service on ASP.NET Core , the basics of webAPI development using ASP.NET Core. We will learn the principles of creating a webAPI project, methods of adding model classes and database context, creating controller templates using CRUD methods, configuring routing, URL paths and return values, calling webAPI using Postman. The end result is a webAPI that allows you to work with to-do list items stored in a database. *The source of step by step:.NET 7.0 (or later):: https://learn.microsoft.com/en-us/aspnet/core/tutorials/first-web-api?view=aspnetcore-7.0&preserve-view=true&tabs=visual-studio .NET Core 3.1 SDK https://learn.microsoft.com/en-us/aspnet/core/tutorials/first-web-api?view=aspnetcore-3.1&tabs=visual-studio № Task 1. Run the basic WeatherForecast test application and show its operation. 2. Develop and demonstrate a webAPI to work with to-do list items stored in a database 3. Demonstrate the operation of a data…arrow_forwardThe _____suggests splits interfaces that are very large into smaller and more specific interface so their clients will only have to know about the methods that are of use to them. (SRP, OCP, LSP, or ISP?) The Single Responsibility Principle (SRP)The Open-Closed Principle (OCP)The Liskov Substitution Principle (LSP)The Interface Segregation Principle (ISP)The Dependency Inversion Principle (DIP)arrow_forward
- Question Read about Thrift and Answer the following questions. Here is the link as well: https://thrift.apache.org/ What is going on here? How is this similar or different from JSON Schema or ProtoBuf?What is the definition of type Work?arrow_forwardGiven the following web modelling problems faced by WordPress developer: I have a WordPress site with far over 30,000 posts monthly. Unfortunately,the method of adding and editing posts in MyISAM storage engine is becoming slower for the accumulated a lot of posts. Pages loading quickly for client side, however, when writes or updates are made, the net server consumes up to 100% CPU and takes longer time to finish the tasks(often longer than PHP's 60-second timeout). Analyze the problems faced by the developer to identify an appropriate web storage engine that can support the following requirements: i) faster posts editing ii) less web server processor consumption iii) ACID transaction Elaborate at least 3 reasons to support your answer.arrow_forwardYou should avoid arguing about how well deep access performs relative to shallow access and instead make the case for using deep access as a developer.arrow_forward
- What does Apache Web Service software charge for their service? Which two companies provide technical support for users of the Apache Web Server?arrow_forwardThe CSM Tech organization has a substantial web presence with several publicly accessible web and application servers. You have DNS servers that handle Internet queries for all your publicly accessible resources. However, after doing some statistical analysis on your public DNS servers, you find that your servers are handling recursive lookups for clients that are not within your organization. Your public DNS servers should handle recursive queries only for your internal clients, but the servers should handle iterative (nonrecursive) queries from external sources. What do you recommend? What are the commands needed to implement the solution?arrow_forwardWhat are some key differences between General Public License v2.0 and Apache License 2.0 (Apache-2.0)?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education