< CIW Certification < Study Guides

SKILLS MEASURED

A CIW Application Developer creates interactive Web pages using client-side and server-side Web applications; accesses relational database systems from Web applications; implements applications using component technology; and creates parameters for environment variables. Skills measured in the 1D0-430 exam include but are not limited to the following:

Plan and implement application development projects.

Identify and use various server-side development environments (Perl, ASP, PHP, SSJS, JSP).

Identify and use various development platforms (UNIX, Windows 2000, and Macintosh).

Identify and use various communication protocols (HTTP and others).

Perform server-side and client-side scripting.

Define the application development process.

Define CGI and its significance to the World Wide Web.

Use the HTTP GET and POST request methods.

Define Perl and its distinct benefits to CGI programming.

Write and use Perl scripts and Perl elements.

Incorporate HTML into Perl.

Define PHP, and identify platforms and Web servers that support it.

Define PHP page structure and PHP string functions.

Identify and use variables, data types, and variable functions.

Identify and use operators, conditional statements, loops, arrays, functions and pattern matching.

Define database basics, including database structure, schemas and SQL.

Use the MySQL database server, and create databases and database tables using MySQL and PHP.

Identify errors and perform error handling.

Identify PHP security issues, including safe mode.

Identify and use ASP files and ASP-based applications, including the Web servers that support ASP applications.

Define virtual directories, including benefits to server script developers.

Define ODBC, OLE DB, ADO, Global.asa file, and the structure of ASP technology.

ASP intrinsic objects, including properties and methods of ASP components.

Insert, update and delete records in a database using ASP and ADO.

Construct databases, including data integrity.

Define and use encryption, including the different protocols used in applying encryption to various situations.

This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.