Professional Documents
Culture Documents
Marks –30
UNIX OPERATING SYSTEMS
Root
IT
MBA
BSc-IT Finance
MCA
Marketing
UNIX
Ans ->
1 cd /IT/BSc-IT
2 pwd
3 cd
4 mkdir /IT/BSc-IT/UNIX
5 rmdir
6 mv UNIX NUNIX
2. Use cat command to:
Display text “Welcome Home” on your screen
Redirect the text “Welcome Home” to file called file-1
Append text “Friends” to the contents of file-1
1. Define Process. Which is the command used to find out currently executing Process
in UNIX?
Ans-> A process is simply an instance of a running program. A process is said to be born
when the program starts execution and remains alive as long as the program is active.
$ Ps -e
2. What is the output of :
$ ps-e
$ ps-a commands
Ans->
1 All processes including user and system processes
2 Processes of all user excluding process not associated with terminal
4. Say you have three Process P1, P2 and P3 running in background. You want to
assign priorities to them, which command is suitable give its syntax?
Ans-> $ nice
Import java.io.*;
Import java.net.*;
Class websrv {
Public static void main (String args []) {
Serversocket srvsock = null;
Socket clisock=null;
Int connection = 0;
Try {
Srvsock = new serversocket(60337, 5);
While (connects <3) {
clisock = srvsock.accept ();
Serviceclient (clisock);
Connects++;
}
Srvsock.close();
} catch (IOException e) {
System.out.println (“error in simple webserver: “+e);
}
}
Public static void serviceclient (socket client)
Throws IOException {
Datainputstream inbound = null;
Dataoutputstream outbound = null;
Try {
Inbound = new Datainputstream (client.getinputstream());
Outbound = new Dataoutputstream
(client.getoutputstream());
StringBuffer buffer = prepareoutput();
String inputLine;
While ((inputLine = inbound.readline()) !=null) {
If (inputline.equals (“”)) {
Outbound.writebytes (buffer. to string ());
System.out.println (“wrote buffer to “+ client);
//sleep (500); for slow win 95
break;
}
}
} finally {
System.out.println (“cleaning up connection: “+ client);
Outbound.close ( );
Inbound.close ( );
Client.close ( );
Client.close ( );
}
}
Public static stringbuffer prepare output ( ) {
Stringbuffer outputbuffer = newstring buffer ( );
Outputbuffer.append (“<HTML>\n<HEAD>\n<TITLE>Test HTML
Document </TITLE>\n”);
outputBuffer.append (“</HEAD>\n”);
outputBuffer.append (“</BODY>\n This is a
<STRONG>test</STRONG>HTML Document!\n” );
outputBuffer.append (“</BODY>\n”);
outputBuffer.append (“</HTML>\n”);
stringbuffer headerbuffer = new stringbuffer ( );
headerBuffer.append (“HTTP/1.0 200 ok\r\n”);
headerBuffer.append (“content.type: text/html\r\n”);
headerBuffer.append (“content-length: ” + outputbuffer.length( ));
headerBuffer.append (“\r\n\r\n”);
headerBuffer.append (“outputbuffer.tostring() );
return headerbuffer;
}
}
example.
Two tier client server architecture: - @-tier architecture, RPC’s or SQL are
typically used to communicate between the client and server. The server is
likely to have support for stored procedures and trigger. These mean that the
server can be programmed to implement business rules that are better suited
to run on the client, resulting in a much more efficient overall system.
Since 1992 software vendors have
developed and brought to market toolsets to simplify development of
application for the 2-tier client/server architecture. The best known of
these tools are Microsoft’s visual basic Borland’s Delphi, and Sybase’s
power Builder
These modern, powerful tools combined with literally million of
developer who to use them that the 2-tiered client/server approach is a
good and economical solution for certain classes of problems.
The 2-tiered client/server architecture has
proven to be very effective in solving workgroup problems.
“Workgroup”, as used here, is loosely defined as a dozen to 100 people
interacting on a LAN. For bigger, enterprise -class problems and/or
application that distributed over a WAN, use of this 2-tier approach has
generated some problem.
Three tier client/server architecture:- The client can deliver its request
to the middle layer, disengage and be assured that a proper response
will be forthcoming at a later time. In addition, the middle layer add
synonymous in this context .There’s no free lunch, however, and the
price for this added flexibility and performance has been a
development environment of 2-tiered applications.
The most part type of middle layer (and the oldest, the concept on
mainframes dating from the early 1970’s) is the transaction processing
monitor or TP Monitor.
TP monitor as a kind of message queuing service. The client connects
to the TP monitor instead of the database server.
The transaction is accepted by the monitor, which queues it and then
takes responsibility for managing it to correct completion.
The net
result of using a 3-tier/server architecture with a TP monitor is that the
resulting environment is FAR more scalable than a 2-tier approach with
direct client to server connection. For really large (10, 00 user)
application, a TP monitor is one of the most effective solutions.
*Basic Topologies:-
There are three basic physical: bus,
ring and star. Each topology is dictated by the LAN frame technology.
For example-
Ethernet network, by definition, have
historically used star topologies. The introduction of frame-level
switching in LANs is changing this. Frame-switched LANs, regardless of
frame type or access method, are topologically similar. Switched can
now be added to the long-standing triad of basic LAN topologies as a
distinct, fourth topology.
*Bus topology:-
A bus topology feature all networked
nodes interconnected peer-to-peer using a single, open-ended cable.
These ends must be terminated with a resistive load- that is,
terminating resistors. This single cable can support only a single
channel. The cable is called the bus. For example-
One exception to this was the IEEE’s
802.4 Token Bus LAN specification. This technology was fairly robust
and deterministic, and bore many similarities to a Token Ring LAN. The
primary difference, obviously, was that Token Bus was implemented on
a bus topology.
*Ring topology:-
The ring topology started out as a
simple peer-to-peer LAN topology. Each networked workstation has
connections: one to each of its nearest neighbors. THE interconnection
had to form a physical loop, or ring. Data was transmitted
unidirectional around the ring. Each workstation acted as a
*star topology:-
Star topology LANs have
connections to networked devices that radiate out from a common
point- that is, the hub. Unlike ring topologies, physical or virtual, each
network device in a star topology can access the media independently.
These devices have to share the hub’s available bandwidth for
example-
A small LAN with a star topology features connections that
out form common points. Each connected device can initiate access
independent of the other connected devices. Star topologies have
become the dominant topology type in contemporary LAN’s. They are
flexible, scalable, and relatively inexpensive compared to more
sophisticated LANs with strictly regulated access methods. Star have
all made buses and ring obsolete in LAN topologies and have formed
the basis for the final LAN topology: switched.
*switched topology:-
A switch is a multiport data layer
(OSI Refer Model Layer 2) device. A switch” learns” MAC addresses and
stores them in an internal lookup table.
Temporary, switched paths created between the
frame’s originator and its intended recipient, and the frames are
frames are forwarded along that temporary path.
The typical LAN with a switched topology features multiple connections
to a switching hub. Each port, and the device it connects to, has its
own dedicated bandwidth. Although originally switch forwarded
frames, based its upon the MAC address, technological advances are
rapidly changing this. Switches are available. Today that can switch
cells (a fixed-length, Layer 2 data-bearing structure).Switches can also
be triggered by Layer 3 protocols, IP addresses, or even physical ports
on the switching hub. For example-
A switched Ethernet hub with 8 port contains 8
separate collision domains of 10Mbps each, for an aggregate of
80Mbps of bandwidth
The TCP header includes both source and destination port fields for
identifying the applications for which the connection is established.
The sequence and acknowledgment number fields under the
positive acknowledgement and retransmission technique. Integrity
checks are accommodator using the checksum field.
IP: In contrast to TCP, it is a connectionless type service
and operates at third layer of OSI reference model. That is prior to
transmission of data, no logical connection is needed. This type of
protocol is suitable for the sporadic transmission of data to a
number of destinations. This has no functions like sequence control,
error recovery and control, flow control but this identifies the
connection with port number.
1 Open any text editor and write above code and save this file with
extension .java.
2 A compiler converts the java program into an intermediate language
representation called
Byte code(file.class).Using javac filename on command prompt.
3 on command prompt write java file.class after calling this command
all control take under
JVM(java virtual Machine).with the help of jvm your program
successfully run.
Taking the example of a human being and a elephant, both are Kind-of
mammals. As human beings and elephants are Kind-of mammals, they
share the attributes and behaviors of mammals. Human being and
elephants are subsets of the mammals class. The following figure show
this.
Is A-Relationship
Peter Human
Mammal
Being
Is-A
Part-Of-Relationship:-
Has-A-Relationship:-
Human Heart
Being
Has-A
The try block governs the statements that are enclosed within it and
defines the scope of the exception handlers associated with it. In other
words if an exception occurs within try block the appropriate
exception-handler that is associated with the try block handles
The exception. A try block must have at least one catch block that
follow it immediately. The try statement can be nested. That is a try
statement can be inside the block of another try. Each time a try
statement is entered, the context of that exception is pushed on the
stack. If an inner try statement does not have a catch handler for a
particular exception the stack is unwound and the next try statement‘s
catch handlers are inspected for a match.
Example:
Class Nesttry{
public static void main(String args[])
try{
int a =args.length;
int b=42/a;
System.out.println(“a=”+a);
try{
if(a==1) a=a/(a-a);
if (a==2){
int c[]={1};
c[42]=99;
}
}
catch(ArrayIndexOutOfBoundsException e )
{
}
}
catch(ArithmeticException e)
{
System.out.println(“Divide by 0:” + e);
}
}
}
Ans ->
import javax.swing.*;
import java.awt.*;
public class FrameMaker extends JFrame
{
JPanel FirstPanel,LastPanel,MainPanel;
JTextField Num1,Num2,Result;
JButton Badd,Bsub,Bmul,Bdiv,Bexit;
JLabel Lnum,Lnum1,Rslt;
Color c;
public FrameMaker(String x)
{
setTitle(x);
Lnum=new JLabel("Enter First Number",JLabel.CENTER);
Lnum1=new JLabel("Enter Second Number",JLabel.CENTER);
Rslt=new JLabel("The Result",JLabel.CENTER);
Num1=new JTextField(20);
Num2=new JTextField(20);
Result=new JTextField(20);
FirstPanel=new JPanel();
LastPanel=new JPanel();
FirstPanel.setLayout(new GridLayout(5,2,40,40));
LastPanel.setLayout(new GridLayout(7,1,40,20));
MainPanel=new JPanel(new BorderLayout());
MainPanel.add(FirstPanel,BorderLayout.CENTER);
MainPanel.add(LastPanel,BorderLayout.LINE_END);
setContentPane(MainPanel);
FirstPanel.add(new JLabel(""));FirstPanel.add(new JLabel(""));
FirstPanel.add(Lnum);FirstPanel.add(Num1);FirstPanel.add(Lnum1);
FirstPanel.add(Num2);FirstPanel.add(Rslt);FirstPanel.add(Result);
FirstPanel.add(new JLabel(""));FirstPanel.add(new JLabel(""));
Badd=new JButton("Add");Bsub=new JButton("Sub");
Bmul=new JButton("Multiply");Bdiv=new JButton("Divide");
Bexit=new JButton("Exit");
LastPanel.add(new JLabel(""));
LastPanel.add(Badd);LastPanel.add(Bsub);
LastPanel.add(Bmul);LastPanel.add(Bdiv);LastPanel.add(Bexit);
LastPanel.add(new JLabel(""));
Dimension d=Toolkit.getDefaultToolkit().getScreenSize();
setBounds((d.width-700)/2,(d.height-500)/2,700,500);
setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
setVisible(true);
c=new Color(120,120,240);
}
public static void main(String[] s)
{
FrameMaker ss=new FrameMaker("Calculator");
}
public Insets getInsets()
{
setBackground(c);
return new Insets(100,80,80,80);
}
}
class Main
{
public static void main(String arg[]) throws IOException
{
InputStreamReader byteIn= new InputStreamReader(System.in);
BufferedReader kbin= new BufferedReader(byteIn);
System.out.println("Enter First Number");
int n1=Integer.parseInt(kbin.readLine());
System.out.println("Enter First Number");
int n2=Integer.parseInt(kbin.readLine());
Arithmetic a=new Arithmetic();
System.out.println("1 For Add");
System.out.println("2 For Subtraction");
class Main
{
public static void main(String arg[]) throws IOException
{
InputStreamReader byteIn= new InputStreamReader(System.in);
BufferedReader kbin= new BufferedReader(byteIn);
System.out.println("Enter 10 digit Number");
String nm=kbin.readLine();
Arithmetic a=new Arithmetic();
if(a.manuplate(nm)==0)
System.out.println("Please enter 10 digit number");
else
switch(a.manuplate(nm))
{
case 92:
System.out.println("TataIndicom Service provider");
break;
case 98:
System.out.println("Reliance Service provider");
break;
case 97:
System.out.println("AirTel Service provider");
break;
case 99:
System.out.println("Idea Service provider");
break;
default:
System.out.println("Invalied service provider");
}
}
}
a. Public
b. Private
c. Protected
Ans->Public
Data member and function access inside as well as out the program
i.e. within a package or outside the package.
Private
Data member and function access only within a class.
Protected
Data member and faction access only through inheritance outside the
package.
5. Explain the following Exception Types in Java:
a. Arithmetic
b. Null Pointer
c. ArrayIndexOutofBounds
Ans->
Arithmetic:-
This exception is thrown when an exceptional arithmetic condition has occurred.
For example, a division by zero generates such an exception.
Null Pointer
This exception is thrown when an application attempts to use null where an
object is required. An object that has not been allocated memory holds a null value.
The situations in which an exception is thrown include:-
*Using an object without allocating memory for it.
* Calling the methods of a null object.
* Accessing or modifying the attributes of a null object
ArrayIndexOutOfBounds: -
The exception ArrayIndexOutOf Bounds exception is thrown when an
attempts is made to access an array elements beyond the index of the array. For
example, if you try to access the eleventh element of an array that’s has only ten
elements, the exception will be thrown
BSC-IT (NEW) V Semester Assignments for August 2008
Session
Ans. A practical and secure crypto system needs keys that cannot be
guessed. There should be no way for an outsiders to predict what keys
are being used, or even to guess approximately which keys might have
been used. A good key generator will produce keys that cannot be
guessed even if attackers know how the generator works.
Ans. Many frauds are carried out with some inside knowledge or
access, and ATM fraud turns out to be no exception. Banks in the
English speaking world dismiss about one percent of their staff every
year for disciplinary reasons, and many of these sackings are for petty
thefts in which ATMs can easily be involved.
Ans. Any key management scheme that can scale to the number of
nodes possible in the internet must be based on an underlying
authenticated public key based infrastructure. These public keys can
be authenticated using a variety of mechanisms, such as public key
certificates, a secure directory server, and so on . ITU standard X.509
provides an example of authentication public keys using certificates.
Secure domain name security (DNS) provides an example of
authentication public keys (and other resources) using a secure
directory service. Still another example of authentication public keys is
the web-of-trust “introducer” model, best exemplified in the pretty
Good Privacy (PGP) secure e-mail software package.
There are two ways authenticated RSA public
keys can be used to provide authenticity and privacy for a datagram
protocol, such as IP.
1. Session-oriented key-management or authenticated session key
2. Stateless key-management scheme
The first is to use out-of band establishment of an authenticated
session key, using one of several session key establishment protocols
prior to communication. This session key is the used to encrypt or
authenticate IP data traffic. This secure management of the Pseudo-
session State is further complicated by crash recovery considerations.
Session-oriented key-management, implemented at the IP layer,
breaks many of the properties that have made IP successful as an
internet protocol.
Ans. The main concerns with centralized approaches are the danger of
implosion and the existence of a single point of failure. It is thus
attractive to search for a distributed solution for the key management
problem. This solution was found in completely distributing the key
database of the Centralized Flat approach, such that all participants
are created equal and nobody has complete knowledge. As in the
Centralized Flat approach above, each participant only holds keys
matching its ID, and the collaboration of multiple participants is
required to propagate changes to the whole group. There is no
dedicated group manager; instead, every participant may perform
admission control operations.
Since there is no Group manager knowing about the IDs in use, the IDs
need to be generated uniquely in a distributed way. Apparent solutions
would be to use the participant’s network address directly or to apply a
collision-free hash function. This scheme is the most resilient to
network or node failures because of its inherent self-healing capability,
but is also more vulnerable to inside attacks than the others, it offers
the same security to break in attacks as the schemes discussed above;
thanks to its higher resilience to fail8ures, it can be considered
stronger against active attacks.
Secret Key: In this scheme both the sender and recipient possess the same
key, to encypt and decrypt the data. The most popular secret-key crypto-
system in use today is known as DES, the Data Encryption Standard. In secret
key, some drawbacks are available, that is:-
Both parties must agree upon a shared secret key.
If there are “n” correspondent one have to keep track of n-different secret
keys. If the same key is used by more than one correspondent, common key
holders can read each other’s mail.
Symmetric encryption schemes are also subjected to a authenticity problems.
Because, sender & recipients have same secret key identity of originator or
recipient cannot be proved. Both can encrypt or decrypt the message.
Public Key: This scheme operates on double key called pair of keys, one of
which is used to encrypt the message and only the other one in the pair is
used to decrypt. This can be viewed as two part, one part of the key pair,
called private key known only by the designated owner, the other part, called
the public key, is published widely but still associated with owner.
Books ID : B0045
It is clear that the security f the system depends on keeping the PIN
key absolutely secret. The usual strategy is to supply a ‘terminal key’
to each ATM in the form of two printed components, which are carried
to the branch by two separate officials, input at the ATM keyboard, and
combined to from the key. The PIN key, encrypted under this terminal
key, is then sent to the ATM by the bank’s central computer.
Keeping keys secret is only part of the problem. They must also; be
available for use at all times by authorized processes. The PIN key is
needed all the time to verify transactions, as are the current working
keys; the terminal keys and Zone keys are less critical, but are still
used once a day to set up new working keys.
Traffic between the server and the browser follows a protocol called
HTTP which uses the TCP transport protocol. Retrieving a page always
starts with the browser being given the URL. Typically a URL comes
from a hypertext ink on a previously retrieved web page. Each URL
contains three major fields: the protocol field, the server name and the
page’s file name on the server.
The protocol field could indicate one of the several one of the several
TCP/IP application protocols, but it will way “http” if are retrieving a
web page. When the user with the browser selects a URL (possibly via
a hypertext link). The URL is passed to the web server for retrieval. The
server sends the page back. Each file is retrieved via a separate
connection. The browser uses the server name to open a TCP
connection to that server. Once the connection is open, the browser
sends an HTTP GET command that includes the URL and a list of data
formats the browser will accept. If the server can fulfill the browser’s
request, it sends web page back to the browser via the same TCP
connection. The server closes the connection as the entire page has
been sent. Many pages include references to the graphical files to be
displayed on the page. The browser retrieves these files by repeating
the connection process for each file.
9 Q. Write a note on Centralized Flat key management scheme.
The table contains 2W KEYS, two keys for exact bit, corresponding to
the two values that bit can take. The key associated with bit b having
value v is referred to as kb.v(“Bit keys”). While the keys in the table
could be used to generate a tree-like keying structure, they can also be
used independently of each other.
The results are very similar to the tree based control from, but the key
space is much smaller: for an id length of w bits, only 2W+1 key are
needed, independent of the actual number of participants. The number
of participants is limited to 2w, so a value of 32 is considered a good
choice. To allow for the separation of participants residing; on the
same machine the id space can be extended to 48 bits, thus including
port number information. For ipv6 and calculated ids, a value of 128
sh8ould be chosen to avoid collisions. This still keeps the number of
keys and the size of change messages small. Besides reducing the
storage and communication needed, this approach has the advantage
that nobody needs to keep track of who is currently a member, yet the
group manager is still able to expel an unwanted participant.
10 Q. What is Digital Signature? Explain how digital signature
is produce.
Set-I – 40 Marks
1. What is MODEM?
Ans: Modems have become so common that they are standard
equipment on most computers sold today. Indeed, anyone who
has ever used the Internet or a fax machine has used a modem.
In addition to modems, several devices are used to connect small
LANs into larger wide area networks (WANs). Each of these
devices has its own function along with some limitations. They
can be used simply to extend the length of network media or to
provide access to a worldwide network over the Internet. Devices
used to expand LANs include repeaters, bridges, routers, and
gateways.
A modem is a device that makes it possible for computers to c
ommunicate over a telephone line.
Basic Modem Functions
Computers cannot simply be connected to each other over a
telephone line, because computers communicate by sending
digital electronic pulses (electronic signals), and a telephone line
can send only analog waves (sound). Figure 7.1 shows the
difference between digital computer communication and analog
telephone communication.
2. What is Router and Gateway?
Ans: Routers
In an environment that consists of several network segments
with differing protocols and architectures, a bridge might be
inadequate for ensuring fast communication among all
segments. A network this complex needs a device that not only
knows the address of each segment, but can also determine the
best path for sending data and filtering broadcast traffic to the
local segment. Such a device is called a "router.
Routers work at the network layer of the OSI reference model.
This means they can switch and route packets across multiple
networks. They do this by exchanging protocol-specific
information between separate networks. Routers read complex
network addressing information in the packet and, because they
function at a higher layer in the OSI reference model than
bridges, they have access to additional information.
Routers can provide the following functions of a bridge:
Filtering and isolating traffic
Connecting network segments
Routers have access to more of the information in packets than
bridges have and use this information to improve packet
deliveries. Routers are used in complex networks because they
provide better traffic management. Routers can share status and
routing information with one another and use this information to
bypass slow or malfunctioning connections.
Gateways
Gateways enable communication between different architectures
and environments. They repackage and convert data going from
one environment to another so that each environment can
understand the other environment's data. A gateway repackages
information to match the requirements of the destination
system. Gateways can change the format of a message so that it
conforms to the application program at the receiving end of the
transfer. For example, electronic-mail gateways, such as the
X.400 gateway, receive messages in one format, translate it, and
forward it in X.400 format used by the receiver, and vice versa.
A gateway links two systems that do not use the same:
Communication protocols.
Data-formatting structures.
Languages.
Architecture.
Gateways interconnect heterogeneous networks; for example, they
can connect Microsoft Windows NT Server to IBM's Systems Network
Architecture (SNA). Gateways change the format of the data to
make it conform to the application program at the receiving end.
Ans: Variables are just boxes in memory that are used to store
data. Each variable need a unique name. Variables are classified as
For Each l in d
MsgBox d.Item (1)
Next
End Sub
-->
</SCRIPT>
<Input Type = “Button” NAME=”cmdchange”
VALUE=”Click Here”><p>
</BODY>
</HTML>
Ans. The Open Shortest Path First (OSPF) protocol is another example
of an interior gateway protocol. It was developed as a non-
proprietary routing alternative to address the limitations or RIP.
OSPF provides a number of features not found in distance vector
protocols. Support for these features has made OSPF a widely
-deployed routing protocol in large networking environments. In
fact, RFC 1812-Requirements for IPv44 Routers, lists OSPF as
the only required dynamic routing protocol. The following features
contribute to the continued acceptance of the OSPF standard:
* Equal cost load balancing: The simultaneous use of multiple
paths may provide more efficient utilization of network
resources.
* Logical partitioning of the networl: This reduces fthe
propagation of outage information during adverse conditions. It
also provides the ability to aggregate routing announcements
that limit the advertisement of unnecessary subnet information.j
* Support for authentication: OSPF supports the authentication of
any node transmitting rout advertisements. This prevents
fraudulent sources from corrupting the routing tables.
* Faster convergence time: OSPF provides instantaneous
propagation of routing changes. This expedites the convergence
time required to updated network topologies.
* Support for CIDR and VLSM: This allows the network
administrator to efficiently allocate IP address resources.
* Backbone area and area 0: All OSPF networks contain at least
one area.
This area is known as area 0 o9r the backbone area. Additional
areas may be created based on network topology or other design
requirements.
* Intra-area, area border and AS boundary routers: There are
three classifications of routers in an OSPF network.
Intra-Area Routers: This class of router is logically located
entirely within an OSPF area. Intra-area routers maintain a
topology database for their local area.
Area Border Routers (ABR): This class of router is logically
connected to two or more areas. One area must be the backbone
area. An ABR is used to interconnect areas. They maintain a
seprate topology database for each attached area. ABRs also
execute separate instances of the SPF algorithm for each area.
AS Boundary Routers (ASBR): This class of router is located
at the periphery of an OSPF internet work. It functions as a
gateway exchanging reach ability between the OSPF network
and other routing environments. ASBR’s are responsible for
announcing AS external link advertisements through the AS.
4. What is a packet? Show the process of Packets.
H1 - It means that this style sheet will affect every text that is in
HEADING1 format, so, now you don't have to write the same
commands obvert and over again.
!--:- These tags ensure that the styles won't cause errors in older
browsers. Older browsers that do not support style sheets will
simply ignore it.
Font size - This is one of the attributes of the style sheet. I think
that you know what it means.
Font-style & font-family - two other attributes of this style sheet.
Altogether they will make the text size 12, font courier, and style
bold
To make it easier to remember you can use this pattern:
TAG {attributes; attribute; attribute}
In general, a style sheet specification or style sheet is simple a
collection of rules. These rules include an HTML element, class or
id, more generally called a selector, which is bound to a style
property such as font-family, followed by a colon and the value(s)
for that style property. Multiple style rules may be included in a
style specification by separating them with semicolons. Currently
there are more than 50 properties specified under CSS1 that
effect the presentation of an HTML document. Unfortunately, not
all of them are supported consistently across the major browsers.
Style sheets alone do nothing; first you must bind the rule to a
tag(s) or class of HTML objects.