Question

In: Computer Science

Consider a scenario where a web portal uses cookies to track the users and provides a...

Consider a scenario where a web portal uses cookies to track the users and provides a customized view to the individual user based on the previously visited sites. The web portal sends a cookie to the browser, which is stored in the browser at the client’s side along with the visited sites. This helps to keep track the previously visited pages of a client from different sites. Prepare a diagram illustrating how the cookie is used between a browser and the web portal when a user revisits the web portal and how the pages are retrieved from different web servers to provide a customized view to the user. Consider two different web servers for two visited sites, a web portal and a client in your diagram. Explain the steps of your diagram. How would I draw the following scenarios?
SCENARIO 1: How the cookie is used between a browser and the web portal
SCENARIO 2: the web portal when a user revisits the web portal
SCENARIO 3: How the pages are retrieved from different webservers

PLEASE READ THE SCENARIOS I AM LOOKING FOR

Solutions

Expert Solution

Internet will keep data to track our interests.

they do this to target the right ads to us based on our previous search history without our permission. First of all, we will look at some history of cookies and then we look about its working. the cookies are created on1994 by an employee of Netscape communications, the company that made the web browser. the employee try to create an online shop and he didn't want to store the contents of the shopping cart on the server since it is wastage of memory and thus decrease its performance, thus instead he wants to store the same data on user's systems. In 1994 they implemented this in the Netscape browser later internet explorer also followed.

Now, let's look at how cookies work:-

lets consider we have a website that user need to log in to see the contents when user send the correct username and password to the server will send back the required data to them once if verified. However, there is a small limitation. The HTTP protocol - which is what we use to browse the internet - is stateless. That means that when you make another request to that same server, it has forgotten who you are and will ask you to log in again.

Can you imagine how time-consuming it would be to browse around a site like Facebook and
having to log in again every time you click on something?

Thus we use cookies !!

you now log into the website, the server will verify your credentials. If everything checks out, however, the server not only returns with the content but also sends a cookie to your browser. The cookie is then saved on your computer and submitted to the server with every request

you make to that website. the cookie will contain a unique identifier that lets the server to “remember” who you are and keep you always logged in. Besides keeping you logged in, cookies can also be used to store your settings and web pages consider you browse a site and sort the data to be viewed in alphabetical order since the sort is just temporary settings the chances for saving this in cookies are very much high and efficient too.\

next scenario is: how can companies use cookies to track us around the internet?

although the cookie on a website cannot be read by others. we wonder how facebook contains the ad of the same product that we read about in a blog recently.the the whole tracking starts when we log in to our Facebook account we can look through it step by step:-

1.you log in to Facebook.

2. Facebook stores a cookie on your computer, nothing unusual about that, many other sites do the same thing.

3.facebook.com can read what’s in the cookie.

4.you browse away and you land on someone’s blog.

The blog cannot read your Facebook cookie, and the scope prevents that. Facebook also can’t see that you’re on this blog.

5.let’s now assume that the owner of the blog places a Facebook like button(or google ads) on his website.

6. To show this like button, your browser has to download some code from the Facebook servers, and when it’s talking to facebook.com, it sends along with the cookie that Facebook set earlier.

7. Facebook now knows who you are and that you visited this blog.

this is how entire cookie flow works

this is a simple diagram that explains all the explanations


Related Solutions

How can websites keep track of users? Do they always need to use cookies?
How can websites keep track of users? Do they always need to use cookies?
Creative Web Design uses a job-order costing system to track the costs of its web design...
Creative Web Design uses a job-order costing system to track the costs of its web design projects. The company provides complete website design and hosting services. The following table provides data concerning the three design projects that were in process during May. There was no work in process at the beginning of May: Project Car City Jan’s Flowers Happy Daycare   Designer-hours 90 70 25   Direct labour cost $ 2,430 $ 1,960 $ 950 Actual overhead costs were $4,750 for May....
Using the combination of HTML and PHP, implement a web page where the users can upload...
Using the combination of HTML and PHP, implement a web page where the users can upload a text file, exclusively in .txt format, which contains a string of 1000 numbers, such as: 71636269561882670428252483600823257530420752963450 85861560789112949495459501737958331952853208805511 65727333001053367881220235421809751254540594752243 52584907711670556013604839586446706324415722155397 53697817977846174064955149290862569321978468622482 83972241375657056057490261407972968652414535100474 82166370484403199890008895243450658541227588666881 96983520312774506326239578318016984801869478851843 12540698747158523863050715693290963295227443043557 66896648950445244523161731856403098711121722383113 05886116467109405077541002256983155200055935729725 16427171479924442928230863465674813919123162824586 17866458359124566529476545682848912883142607690042 24219022671055626321111109370544217506941658960408 07198403850962455444362981230987879927244284909188 84580156166097919133875499200524063689912560717606 62229893423380308135336276614282806444486645238749 73167176531330624919225119674426574742355349194934 30358907296290491560440772390713810515859307960866 70172427121883998797908792274921901699720888093776 Your code should contain a PHP function that, accepting the string of 1000 numbers in input, is able to: 1) Find the 5 adjacent numbers that multiplied together...
Using a combination of HTML/PHP, implement a web page where the users can upload a text...
Using a combination of HTML/PHP, implement a web page where the users can upload a text file, exclusively in .txt format, which contains a string of 400 numbers, such as: 71636269561882670428 85861560789112949495 65727333001053367881 52584907711670556013 53697817977846174064 83972241375657056057 82166370484403199890 96983520312774506326 12540698747158523863 66896648950445244523 05886116467109405077 16427171479924442928 17866458359124566529 24219022671055626321 07198403850962455444 84580156166097919133 62229893423380308135 73167176531330624919 30358907296290491560 70172427121883998797 Your code should contain a PHP function that, accepting the string of 400 numbers in input, is able to find the greatest product of four adjacent numbers in all the...
Consider the following linear program where X1, X2, and X3represent the number of gourmet cookies, brownies,...
Consider the following linear program where X1, X2, and X3represent the number of gourmet cookies, brownies, and cakes sold by Litton’s Bakery on a weekly basis. They profit $25 from cookies, $15 from brownies, and $35 per cake. The bakery has the following constraints. • They are limited to 500 pounds of flour • They must use at least 450 grams of sugar (or else it will go bad) • They cannot use more than 400 oz of oil •...
Consider a scenario with two hosts, Hind and Sarah. A web server running on Hind's device...
Consider a scenario with two hosts, Hind and Sarah. A web server running on Hind's device is trying to send data to a browser on Sarah’s device. For each TCP connection, Hind has a buffer of 512 bytes and Sarah has a buffer of 1024 bytes. Assume TCP sequence numbers began at 0. A. Sarah received up to byte 560 in order from Hind, although her browser has only read and delivered up to the first 60 bytes. What will...
Consider a circuit-switching scenario in which Ncs users, must share a link of capacity 150 Mbps....
Consider a circuit-switching scenario in which Ncs users, must share a link of capacity 150 Mbps. Each user alternates between periods of activity when the user generates data at a constant rate of 20 Mbps and periods of inactivity when he generates no data. Suppose further that he is active only 20% of the time. Assume a circuit switched TDM. What is the maximum number of circuit-switched users that can be supported? Assume packet switching is used for the remaining...
Consider a scenario where steel is covered with a metallic gold coating with no scratches on...
Consider a scenario where steel is covered with a metallic gold coating with no scratches on the surface and steel unexposed. Explain the corrosion process.
consider a scenario where a company has to automate its systems and wants to store the...
consider a scenario where a company has to automate its systems and wants to store the details of its employees with their empno, name, emailid, salary, DoB ,age ,gender,and address to be stored .Emailid is the primary key. every employee works on multiple projects (pno ,pname, ) and one project may involve many employees who belong to various departments ( dname,loc ) . each employee many have dependents ( depno, depname,relationship) . the depno ia unique among the dependants of...
10. Consider the simplified scenario for genetic determinants of height in humans, where there are three...
10. Consider the simplified scenario for genetic determinants of height in humans, where there are three genes (A/B/C) with varying numbers of alleles (3/3/2) affecting height, and with different effects in males and females. (Assume additive contributions, thus the effect of having genotype A1A2 is +0.1” + +0.2” = +0.3”). Average height for men and women is 69” and 64”. Gene Allele Male(effect Female(effect A 1 +0.1 +0.1 2 +0.2 +0.2 3 41.3 41.5 B 1 +0.5 +.3 2 40.4...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT