by Carmen Holotescu
Collaborate comes from the Latin words laborare (to work) and com (with), and so literally means to work together. Collaboration occurs when a group of people with a common and well-defined goal integrate their individual knowledge and skills to deliver on that goal.
For the students in Computer Science to learn how to work in groups is a key issue, that lies in the necessity of experiencing real-world working practices: in IT field the firms often use geographically distributed teams ( larger than co-located teams ).
In fact in an online course, the instructor models the learners, provides them a pattern for their future activity, and this must be a good one. This can happen only if the instructor has a solid background not only in teaching, but also in practice.
His goal is to foster healthy group participation, achieving a state in which, as Aristotle put it, "The whole is more than the sum of its parts; the part is more than a fraction of the whole."
The sense of group can be built from the beginning of the course, choosing a funny, attractive name for each group, and also creating for them in the group area a conference for socializing.
It is important the online learning environment facilities to offer the possibility of collaboration and also co-operation modes of learning ( of course the two modes partially overlap ):
Here can be included Case Studies or searching additional materials for a given topic.
form of a public conference that would give students the chance to share their thoughts and feelings regarding group work skills.
the end of the course, students can be asked to provide a culminating description
of what they learned from their collaborative group
|General Approach and Structure:|
This case can be used as a group project in a course of Web Technology. It is suitable both for a f2f or an online course.
It should be preceded by lessons on:
constitutes the fundament of many Internet applications.
|Case Study - Password Authentication|
It's a warm evening of spring. The breeze carries the lilac perfume. A little swallow stays on the laboratory's sash window.
Maria, Victor and Tudor don't observe it. Sitting in front of the computers, they are decided to finish their important job.
In two weeks, all the members of the mountaineering group have to meet at Balea Lake. Till then, so many details must be solved...
- I sent yesterday an e-mail to all telling that tomorrow we will be able to communicate via the Bulletin Board of our site The Best Mountaineer. It's Maria's voice, a little angry. Tudor, will you find the mistake in that silly CGI script or you are decided to keep us here for ten more hours?
They all are very good and old friends. The four years of university, with so many and interesting group projects, the many mountains climbed together and their two common dreams to reach the seven top peaks and to have the best software firm, made them a real team.
A few weeks ago they designed together the site of their mountaineering group: stories and pictures from expeditions, precious memories of their teacher and leader, Dan, who climbed the Everest, many links. Dan was very proud of them and all in the Computer Science Department appreciated the site.
Then, it appeared the plan to go to Balea Lake, in the South Carpathians, in the Easter Holidays. E-mails for organizing...
Ten days ago, Tudor, boring of sending e-mails, came with the idea to put a Bulletin Board on the site. This was not a difficult task, as they adapted the well written WWWBoard of Matt Wright - the author of a free scripts archive.
Then Maria told it would be better if only the Best Mountaineer-s could enter in the forum, they have customs and secrets, as in any group.... So appeared the problem of using passwords. They work hard, together, at a few variants, using the knowledge from the Web Technology course. New ideas, searches, tests, hours of work... Still, something is wrong, but where?
-Eureka! Eureka! I find, I find, cries Tudor. Look, Maria and Victor, I commented by mistake this line of CGI, now it's working!
After two hours, all the members have received their usernames and passwords. In the e-mail, Maria tells them they can change the passwords, and also is no problem if they forget them... Maria, Victor and Tudor thought at everything.
the mouse with his left hand, Victor
makes to appear on the monitor the table summarizing the variants they
and password are unique for all
lthe protection is very low - everybody can visualize the source code of the page and so to find the username and password
- done by the web server itself;
.htaccess file - with the authentication instructions is placed in the protected web directory
|uWhenever someone tries to access a web page in that directory, their browser presents a pop-up box that asks for their username and password;||n Easy to implement||l.htpasswd
file must be edited off-line with all the usernames and passwords
l the passwords remain fix
lusernames and passwords are sent over the web "in the clear"- are not encrypted; it's possible for someone to run a "packet sniffer" (a program that intercepts internet traffic) to get them; not if a secure server is used (https:// url)
Authentication via Database
The module mod_auth_mysql
.CGI script automatically adds users to the database
uCan be added scripts for support those who forgot or want to change their passwords
elegant and efficient solution
nCan be used in other Internet applications
|l A lot of work - but this can be an advantage :-)|
-It was hard, but how sweet is the taste of the success! meditates Tudor. And also, our Study Case for Web Technology project is ready!
don't dream! Look on the monitor! A posting from Casey!
She asks us if .........
|Quiz Questions: ( press the right answer )|
variant assures a better protection:
2. What permits the adopted solution:
Design, implement, and test the three variants described in the Case Study. Appropriately argue your design and comment your code.
Compare the solutions with PHP-Based User Authentication.
[ Back ]