Question

In: Computer Science

Consider a scenario where a web portal uses cookies to track the users and provides a...

Consider a scenario where a web portal uses cookies to track the users and provides a customized view to the individual user based on the previously visited sites. The web portal sends a cookie to the browser, which is stored in the browser at the client’s side along with the visited sites. This helps to keep track the previously visited pages of a client from different sites. Prepare a diagram illustrating how the cookie is used between a browser and the web portal when a user revisits the web portal and how the pages are retrieved from different web servers to provide a customized view to the user. Consider two different web servers for two visited sites, a web portal and a client in your diagram. Explain the steps of your diagram. How would I draw the following scenarios?
SCENARIO 1: How the cookie is used between a browser and the web portal
SCENARIO 2: the web portal when a user revisits the web portal
SCENARIO 3: How the pages are retrieved from different webservers

PLEASE READ THE SCENARIOS I AM LOOKING FOR

Solutions

Expert Solution

Internet will keep data to track our interests.

they do this to target the right ads to us based on our previous search history without our permission. First of all, we will look at some history of cookies and then we look about its working. the cookies are created on1994 by an employee of Netscape communications, the company that made the web browser. the employee try to create an online shop and he didn't want to store the contents of the shopping cart on the server since it is wastage of memory and thus decrease its performance, thus instead he wants to store the same data on user's systems. In 1994 they implemented this in the Netscape browser later internet explorer also followed.

Now, let's look at how cookies work:-

lets consider we have a website that user need to log in to see the contents when user send the correct username and password to the server will send back the required data to them once if verified. However, there is a small limitation. The HTTP protocol - which is what we use to browse the internet - is stateless. That means that when you make another request to that same server, it has forgotten who you are and will ask you to log in again.

Can you imagine how time-consuming it would be to browse around a site like Facebook and
having to log in again every time you click on something?

Thus we use cookies !!

you now log into the website, the server will verify your credentials. If everything checks out, however, the server not only returns with the content but also sends a cookie to your browser. The cookie is then saved on your computer and submitted to the server with every request

you make to that website. the cookie will contain a unique identifier that lets the server to “remember” who you are and keep you always logged in. Besides keeping you logged in, cookies can also be used to store your settings and web pages consider you browse a site and sort the data to be viewed in alphabetical order since the sort is just temporary settings the chances for saving this in cookies are very much high and efficient too.\

next scenario is: how can companies use cookies to track us around the internet?

although the cookie on a website cannot be read by others. we wonder how facebook contains the ad of the same product that we read about in a blog recently.the the whole tracking starts when we log in to our Facebook account we can look through it step by step:-

1.you log in to Facebook.

2. Facebook stores a cookie on your computer, nothing unusual about that, many other sites do the same thing.

3.facebook.com can read what’s in the cookie.

4.you browse away and you land on someone’s blog.

The blog cannot read your Facebook cookie, and the scope prevents that. Facebook also can’t see that you’re on this blog.

5.let’s now assume that the owner of the blog places a Facebook like button(or google ads) on his website.

6. To show this like button, your browser has to download some code from the Facebook servers, and when it’s talking to facebook.com, it sends along with the cookie that Facebook set earlier.

7. Facebook now knows who you are and that you visited this blog.

this is how entire cookie flow works

this is a simple diagram that explains all the explanations


Related Solutions

How can websites keep track of users? Do they always need to use cookies?
How can websites keep track of users? Do they always need to use cookies?
Creative Web Design uses a job-order costing system to track the costs of its web design...
Creative Web Design uses a job-order costing system to track the costs of its web design projects. The company provides complete website design and hosting services. The following table provides data concerning the three design projects that were in process during May. There was no work in process at the beginning of May: Project Car City Jan’s Flowers Happy Daycare   Designer-hours 90 70 25   Direct labour cost $ 2,430 $ 1,960 $ 950 Actual overhead costs were $4,750 for May....
Using a combination of HTML/PHP, implement a web page where the users can upload a text...
Using a combination of HTML/PHP, implement a web page where the users can upload a text file, exclusively in .txt format, which contains a string of 400 numbers, such as: 71636269561882670428 85861560789112949495 65727333001053367881 52584907711670556013 53697817977846174064 83972241375657056057 82166370484403199890 96983520312774506326 12540698747158523863 66896648950445244523 05886116467109405077 16427171479924442928 17866458359124566529 24219022671055626321 07198403850962455444 84580156166097919133 62229893423380308135 73167176531330624919 30358907296290491560 70172427121883998797 Your code should contain a PHP function that, accepting the string of 400 numbers in input, is able to find the greatest product of four adjacent numbers in all the...
Consider a scenario with two hosts, Hind and Sarah. A web server running on Hind's device...
Consider a scenario with two hosts, Hind and Sarah. A web server running on Hind's device is trying to send data to a browser on Sarah’s device. For each TCP connection, Hind has a buffer of 512 bytes and Sarah has a buffer of 1024 bytes. Assume TCP sequence numbers began at 0. A. Sarah received up to byte 560 in order from Hind, although her browser has only read and delivered up to the first 60 bytes. What will...
Consider the following linear program where X1, X2, and X3represent the number of gourmet cookies, brownies,...
Consider the following linear program where X1, X2, and X3represent the number of gourmet cookies, brownies, and cakes sold by Litton’s Bakery on a weekly basis. They profit $25 from cookies, $15 from brownies, and $35 per cake. The bakery has the following constraints. • They are limited to 500 pounds of flour • They must use at least 450 grams of sugar (or else it will go bad) • They cannot use more than 400 oz of oil •...
Consider a scenario where steel is covered with a metallic gold coating with no scratches on...
Consider a scenario where steel is covered with a metallic gold coating with no scratches on the surface and steel unexposed. Explain the corrosion process.
consider a scenario where a company has to automate its systems and wants to store the...
consider a scenario where a company has to automate its systems and wants to store the details of its employees with their empno, name, emailid, salary, DoB ,age ,gender,and address to be stored .Emailid is the primary key. every employee works on multiple projects (pno ,pname, ) and one project may involve many employees who belong to various departments ( dname,loc ) . each employee many have dependents ( depno, depname,relationship) . the depno ia unique among the dependants of...
10. Consider the simplified scenario for genetic determinants of height in humans, where there are three...
10. Consider the simplified scenario for genetic determinants of height in humans, where there are three genes (A/B/C) with varying numbers of alleles (3/3/2) affecting height, and with different effects in males and females. (Assume additive contributions, thus the effect of having genotype A1A2 is +0.1” + +0.2” = +0.3”). Average height for men and women is 69” and 64”. Gene Allele Male(effect Female(effect A 1 +0.1 +0.1 2 +0.2 +0.2 3 41.3 41.5 B 1 +0.5 +.3 2 40.4...
Consider the scenario where two teams are looking to trade. The acquiring team can offer a...
Consider the scenario where two teams are looking to trade. The acquiring team can offer a high price or a low price. The trading team can offer a high quality player or a low quality player - the acquiring team can't differentiate between these player types before the trade is completed, though they can figure it out later. The table reflects the payoffs to each strategy for each team. Offer High Price Offer Low Price Trade High Quality Player 200,000...
Consider a scenario where Host A and Host B want to send messages to Host C....
Consider a scenario where Host A and Host B want to send messages to Host C. Hosts A and C are connected by a channel that can lose and corrupt (but not reorder) messages. Hosts B and C are connected by another channel (independent of the channel connecting A and C) with the same properties. The transport layer at Host C should alternately deliver M (M>1) consecutive messages received from A to its application layer and N (N>1) consecutive messages...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT