glossary.php

Web Design and Development Glossary

Learn all of the web design and development terms, and buzzwords with the ultimate website design and development glossary from VOCSO.

categories

What is Above the Fold?

The term “”Above the Fold”” was initially used to describe the content on the front page of a printed newspaper, visible when it’s folded horizontally. In Web Design, it refers to the area of the web page that is visible to the users without scrolling the web page. Sections of a web page accessible after the scroll is called “”Below the fold””.

It’s a proven fact that visitors engage more with the content and elements above the fold. That’s why designers are adviced to place the key elements such as primary business goals, value proposition and primary Call to Action ( CTA ) above the fold in order to have maximum engagement.

There is no fixed size or height that defines the area above the fold. This varies based on the computer or mobie device, operating system, browsers, browser toolbars and the screen resolution. It’s upto the designers to use responsive website design techniques to ascertain the key elements are visible above the fold.

ICO or Initial Coin Offering

ICO is the abbreviation for Initial Coin Offering. And as you can guess, it allows companies to create their coince/currency. It’s a strategy used by new cryptocurrency companies to offer some units of a new cryptocurrency or crypto-token in exchange against popular cryptocurrencies like Bitcoin or Ethereum. It’s been a trend since last few years to gather funds for the development of new cryptocurrencies. Ethereum ICO’s success encouraged more and more upcoming cryptocurrency companies to offer their pre-created tokens to be traded on cryptocurrency exchanges.

ICO’s are usually integrated into the actual development project. Ripple is suggested to be the first ICO based cryptocurrency platform, which sold around 100 billion XRP ( Ripple ) token to fund their Ripple payment system development.

ICO has become an ideal choice for raising funds without giving away the ownership, like it happens in traditional approach like Bank or VC funding.

What is Payment Gateway?

Payment Gateway is a secure merchant service for eCommerce platforms to make or receive online payment from any digital channel. This is acts as a bridge between the Bank and the Merchant Website. It transfers payment for a merchant on a secure internet connection and then transfers the payment to the merchant’s bank account. All this work is done with the user’s permission.
Although there are many payment gateways to help you in online shopping or bill payment, there are some of the most used gateways includes PayPal, EBS, VISA, and Master Card.

What is API and how to create and use in php

What is API: API stands for “Application Programming Interface”. It is a set or rules that allows one piece of software application to talk to another. Those “rules” can include create, read, update and delete operations.

Where we can use API: REST(“REpresentational State Transfer”) API can be used by any application that can connect to the internet. If data from an application can be created, read, updated or deleted using another application, it usually means a REST API is used.

What is SQL Injection?

SQL Injection(SQLi), a technique used by attackers to execute malicious SQL Code or extracting sensitive data from platform which could be anything from User lists, customer private data or company sensitive information. This is mainly possible from placing malicious code in SQL Statement in SQL Statements via web page input.

How it Happen?

SQL Injection usually happens at the time when the user is asked to input his authorization information, like their username/user id, but in this case, the attacker would put SQL Statement in input field instead of user id which would then run on your database without any suspicion. Simple example of SQL Injection could be as simple as setting password field to ‘password OR 1=1’.

How can you come to know if you are Vulnerable?

This could be accomplished by searching through source code for all the request calls to external sources and then examining each and every call carefully to be sure that every input field is filtered for checking SQL injections. Developers can be creative in their way by using SQL Parameters for running Queries. SQL parameters are added to an SQL query at its execution time, thus making the system secured from SQL Injections.