In: Computer Science
Give four ways in which information in web logs pertaining to the web pages visited by a user can be used by the web site.
Log documents contain data about User Name, IP Address, Time Stamp, Access Request, number of Bytes, Result Status, URL that Referred and so on. The log records are kept up by the web servers. By investigating these log records gives a slick thought regarding the client.
The Ways in which information in web logs pertaining to the web pages visited by a user can be used by the web site are :
Client name
This recognizes who had visited the site. The recognizable proof of the client generally would be the IP address that is appointed by the Internet Service provider (ISP). This might be a brief location that has been appointed. The unique ID of the client is slacking. In some sites the client distinguishing proof is made by getting the client profile and permits them to get to the site by utilizing a username and password. In this sort of access the client is being recognized exceptionally so that the return to of the client can likewise be distinguished.
Visiting Path
The way taken by the client while visiting the site. This might be by utilizing the URL legitimately or by tapping on a link or box an internet searcher.
Page last visited
The page that was visited by the client before the person leaves the site.
Time stamp
The time spent by the client in each page while surfing through the site. This is distinguished as the session.
These are the information present in the log document. These log document subtleties are utilized in the event of web use mining measure. As per web utilization mining it mines the profoundly used site. The use would be the as often as possible visited site or the site being used for longer time length