Professional Documents
Culture Documents
CONTENTS
Internet & Web UNIT – 1 2-8
Page Designing Overview of Internet :
What is Internet, Internet Evolution, Advantage &
Disadvantage of Internet, Extra Net, Reference
Models, Layeys, TCP/ IP Model, Domain name
system Architecture, DNS Working.
UNIT – 2 9-17
REVISION 1.0 Internet Services & Protocols :
1 DECEMBER, 2016
Communication Services, Web Services, World
Wide Web, Video Conferencing, Internet
Protocols, TCP, IP, UDP, FTP, HTTP, Email,
IMAP, POP, Email Working, E-mail Security.
UNIT – 3 18-33
Web Designing Concepts & Hosting :
ER. Gaurav Khandelwal
Professor
Wireframe, Web Designing Tools, Web
Department of Computer Science
Development Process, Websites Hosting, Types
of Hosting, Web sites Security, World Wide Web
Evolution & Architecture, Web Browsers, Web
Server, Proxy Server, Search Engines, Usenet,
Digital Signature, Firewall Security.
UNIT – 4 34-42
HTML – Overview :
HTMl Document Structure, Basic Tags- Heading
Paragraph, Line Break, Center Etc, HTML
Elements, HTML Attributes.
UNIT – 5 42-56
HTML Formating :
Type Style, Meta Tags, Comments,
Images,Tables, Text Links, HTML Fonts etc.
KCRI COLLEGE
ALWAR 301001 RAJASTHAN
2017-2018
Internet Evolution
The concept of Internet was originated
in 1969 and has undergone several
Internet Disadvantages
Extranet Issues
Apart for advantages there are also
some issues associated with extranet.
Extranet These issues are discussed below:
Security
Additional firewall security is required
if you host extranet pages on your
own server which result in a complex
security mechanism and increase work
load.
Extranet Intranet
Internal network
Internal network
that can not be
that can be
accessed
accessed externally. PHYSICAL LAYER
externally.
The Physical layer is responsible for
Extranet is Only limited the following activities:
extension of users of a Activating, maintaining and
company's Intranet. company. deactivating the physical
For limited external connection.
Only for Defining voltages and data rates
communication
communication needed for transmission.
between customers,
within a Converting digital bits into
suppliers and
company. electrical signal.
business partners.
Deciding whether the connection
is simplex, half duplex or full
duplex.
Protocols used:
TCP/IP and UDP protocols are
employed in this layer.
INTERNET LAYER
The function of this layer is to allow
the host to insert packets into network
and then make them travel
independently to the destination.
However, the order of receiving the
packet can be different from the
sequence they were sent.
Domain
Name
Meaning Name Server
Name server contains the DNS
au Australia database. This database comprises of
in India various names and their
corresponding IP addresses. Since it is
cl Chile not possible for a single server to
maintain entire DNS database,
fr France
therefore, the information is
us United States distributed among many DNS servers.
za South Africa
Hierarchy of server is same as
uk United Kingdom hierarchy of names.
The entire name space is divided
jp Japan into the zones
es Spain
de Germany Zones
ca Canada Zone is collection of nodes (sub
domains) under the main domain. The
ee Estonia server maintains a database called
hk Hong Kong zone file for every zone.
DNS Working
DNS translates the domain name into
IP address automatically. Following
steps will take you through the steps
included in domain resolution process:
1. When we type
www.tutorialspoint.com into
the browser, it asks the local
DNS Server for its IP address.
If the domain is not further divided into Here the local DNS is at ISP end.
sub domains then domain and zone
refers to the same thing. 2. When the local DNS does not
The information about the nodes in find the IP address of requested
the sub domain is stored in the domain name, it forwards the
servers at the lower levels however; request to the root DNS server
the original server keeps reference to and again enquires about IP
these lower levels of servers. address of it.
3. The root DNS server replies with
TYPES OF NAME SERVERS delegation that I do not know
Following are the three categories of the IP address of
Name Servers that manages the www.tutorialspoint.com but
entire Domain Name System: know the IP address of DNS
1. Root Server Server.
2. Primary Server
3. Secondary Server 4. The local DNS server then asks
the com DNS Server the same
ROOT SERVER question.
Root Server is the top level server 5. The com DNS Server replies the
which consists of the entire DNS tree. same that it does not know the
It does not contain the information IP address of
about domains but delegates the www.tutorialspont.com but
authority to the other server. knows the address of
tutorialspoint.com.
PRIMARY SERVERS
Primary Server stores a file about its 6. Then the local DNS asks the
zone. It has authority to create, tutorialspoint.com DNS server
maintain, and update the zone file. the same question.
7. Then tutorialspoint.com DNS
SECONDARY SERVER server replies with IP address of
Secondary Server transfers complete www.tutorialspoint.com.
information about a zone from another
8. Now, the local DNS sends the IP
server which may be primary or
address of
secondary server. The secondary
www.tutorialspoint.com to the
server does not have authority to
computer that sends the
create or update a zone file.
request.
Communication Services S.
There are various Communication Service Description
N.
Services available that offer exchange
of information with individuals or File Transfer Protocol (FTP)
1
groups. The following table gives a Enable the users to transfer files.
brief introduction to these services:
Archie
It’s updated database of public
S. 2
Service Description FTP sites and their content. It
N. helps to search a file by its name.
Electronic Mail Gopher
1 Used to send electronic message Used to search, retrieve, and
over the internet. 3
display documents on remote
Telnet sites.
Used to log on to a remote Very Easy Rodent Oriented
2
computer that is attached to Netwide Index to Computer
internet. Achieved (VERONICA)
Newsgroup 4 VERONICA is gopher based
Offers a forum for people to resource. It allows access to the
3 information resource stored on
discuss topics of common
interests. gopher’s servers.
Internet Protocols
Transmission Control Protocol
(TCP)
User Datagram Protocol
Transmission Control Protocol (UDP)
(TCP) corresponds to the
Transport Layer of OSI Model. Like IP, UDP is connectionless and
TCP is a reliable and connection unreliable protocol. It doesn’t require
oriented protocol. making a connection with the host to
exchange data. Since UDP is
TCP offers:
unreliable protocol, there is no
o Stream Data Transfer.
o Reliability.
mechanism for ensuring that data sent Trivial File Transfer Protocol
is received.
UDP transmits the data in form of a
(TFTP)
datagram. The UDP datagram consists
Trivial File Transfer Protocol is also
of five parts as shown in the following
used to transfer the files but it
diagram:
transfers the files without
authentication. Unlike FTP, TFTP does
not separate control and data
information. Since there is no
authentication exists, TFTP lacks in
security features therefore it is not
recommended to use TFTP.
Key points
File Transfer Protocol (FTP) TFTP makes use of UDP for data
FTP is used to copy files from one host transport. Each TFTP message is
to another. FTP offers the mechanism carried in separate UDP
for the same in following manner: datagram.
FTP creates two processes such The first two bytes of a TFTP
as Control Process and Data message specify the type of
Transfer Process at both ends message.
i.e. at client as well as at server. The TFTP session is initiated
FTP establishes two different when a TFTP client sends a
connections: one is for data request to upload or download a
transfer and other is for control file.
information. The request is sent from an
Control connection is made ephemeral UDP port to the UDP
between control port 69 of an TFTP server.
processes while Data
Connection is made Telnet
between<="" b="" style="box- Telnet is a protocol used to log in to
sizing: border-box;"> remote computer on the internet.
There are a number of Telnet clients
FTP uses port 21 for the control having user friendly user interface.
connection and Port 20 for the The following diagram shows a person
data connection. is logged in to computer A, and from
there, he remote logged into
computer B.
E-mail Working
Email working follows the client server
approach. In this client is the mailer
i.e. the mail application or mail
E-mail Operations
CREATING EMAIL ACCOUNT
There are various email service
provider available such as Gmail,
hotmail, ymail, rediff mail etc. Here
we will learn how to create an account
using Gmail.
Now a welcome window appears. You should specify the correct email
Click Continue to Gmail. address; otherwise it will send an error
back to the sender.
Wow!! You are done with Once you have specified all the above
creating your email account with parameters, It’s time to send the
Gmail. It’s that easy. Isn’t it? email. The mailer program provides a
Send button to send email, when you
Now you will see your Gmail click Send, it is sent to the mail server
account as shown in the and a message mail sent
following image: successfully is shown at the above.
It floods your e-mail account Select File tab on the mail pane.
with unwanted e-mails, which
may result in loss of important Select Cleanup Tools button on
e-mails if inbox is full. account information screen.
BLOCKING SPAMS
E-mail Providers
Following ways will help you to reduce
spams: There are several email service
providers available in the market with
While posting letters to their enabled features such as
newsgroups or mailing list, use a sending, receiving, drafting, storing an
separate e-mail address than email and much more.
the one you used for your
personal e-mails. The following table shows the popular
email service providers:
Don’t give your email address on
the websites as it can easily be
spammed.
S.
Service and Description
N.
Gmail
Gmail is an email service that
1. allows users to collect all the
messages. It also offers approx 7
GB of free storage.
Hotmail
Hotmail offers free email and
2.
practically unlimited storage
accessible on web.
Yahoo Mail
Yahoo Mail offers unlimited
3. storage, SMS texting, social
networking and instant messaging
to boot.
iCloud Mail
iCloud Mail offers ample storage,
4.
IMAP access, and an elegantly
functional web application.
ATM Mail
5. ATM Mail is a free email service
with good spam protection.
Mail.com and GMX Mail
Mail.com and GMX Mail offers
6.
reliable mail service with unlimited
online storage.
Shortmail
Shortmail offers easy and fast
7.
email service but with limited 500
characters per message.
Inbox.com
Inbox.com offers 5 GB of free
8.
online storage. IMAP is not
supported by Inbox.com
Facebook Messages
9. Facebook Messages includes the
message conversation.
My Way Mail
My Way Mail offers clean and fast
10.
free email service but lacks in
secure messaging.
Calls to action
UNIT-3
Text blocks
Website Designing Wireframe can be created using program like
Visio but you can also use a pen and paper.
Concepts & Hosting
Web Designing Tools
Here is the list of tools that can be
Web designing has direct link to visual
used to make effective web designs:
aspect of a web site. Effective web
design is necessary to communicate
Photoshop CC
ideas effectively.
Illustrator CC
Coda 2
Omni Graffle
Sublime Text
GitHub
Pen and Parer
Vim
Image optim
Sketch 3
Heroku
Axure
Hype 2
Slicy
Web desinging is subset of web Framer.js
development. However these terms are Image Alpha
used interchangeably. Emmet Live Style
Key Points Hammer
Design Plan should include the Icon Slate
following: JPEG mini Lite
Bug Herd
Details about information
architecture. Web Page Anatomy
Planned structure of site.
A web site includes the following
A site map of pages
components:
Whitespace
It is also called as negative
space and refers to any area of page
that is not covered by type or
illustrations.
Before developing a web site once
should keep several aspects in mind
like:
FEATUES
Skills Required
For being a successful web developer,
Web development tools one should possess the following
Web development tools helps the skills:
developer to test and debug the web
sites. Now a days the web Understanding of client and
development tooll come with the web server side scripting.
browsers as add-ons. All web Creating, editing and modifying
browsers have built in tools for this templates for a CMS or web
purpose. development framework.
2. Go Daddy
CROSS SITE SCRIPTING (XSS)
3. Host Gator
It allows the attackers to inject client
4. just Host side script into web pages. Therefore,
while creating a form It is good to
5. Laughing Squid endure that you check the data being
6. Hivelocity submitted and encode or strip out any
HTML.
7. liquid Web
ERROR MESSAGES
8. Media TempleServInt
You need to be careful about how
9. Wired Tree much information to be given in the
error messages. For example, if the
10. Wild West Domains user fails to log in the error message
11. Wix should not let the user know which
field is incorrect: username or
12. WIPL password.
13. Big Rock
VALIDATION OF DATA
The validation should be performed on
both server side and client side.
Website Security
PASSWORDS
Considerations It is good to enforce password
Websites are always to prone to requirements such as of minimum of
security risks. Cyber crime impacts eight characters, including upper case,
your business by hacking your lower case and special character. It
website. Your website is then used for will help to protect user’s information
hacking assaults that install malicious in long run.
software or malware on your visitor’s
computer.
Hackers may also steal important customer UPLOAD FILES
data such as credit card information, destroy The file uploaded by the user may
your business and propagate illegal content contain a script that when executed
to your users. on the server opens up your website.
Security Considerations
SSL
UPDATED SOFTWARE It is good practice to use SSL protocol
It is mandatory to keep you software while passing personal information
updated. It plays vital role in keeping between website and web server or
your website secure. database.
WWW Evolution
World Wide Web was created
by Timothy Berners Lee in 1989
at CERN in Geneva. World Wide Web
came into existence as a proposal by IDENTIFIERS AND CHARACTER SET
him, to allow researchers to work Uniform Resource Identifier
together effectively and efficiently (URI) is used to uniquely identify
at CERN. Eventually it became World resources on the web
Wide Web. and UNICODE makes it possible to
The following diagram briefly defines built web pages that can be read and
evolution of World Wide Web: write in human languages.
DATA INTERCHANGE
Resource Description Framework WWW Operation
(RDF) framework helps in defining
core representation of data for web. WWW works on client- server
RDF represents data about resource in approach. Following steps explains
graph form. how the web works:
CRYPTOGRAPHY
Cryptography means such as digital
signature for verification of the origin
of sources is used.
Key Points
When client sends request for a
web page, the web server
search for the requested page if
requested page is found then it
will send it to client with an
HTTP response.
If the requested web page is not
found, web server will the send
an HTTP response: Error 404
Not found.
If client has requested for some
other resources then the web
Web Server server will contact to the
Web server is a computer where the application server and data store
web content is stored. Basically web to construct the HTTP response.
server is used to host the web sites
but there exists other web servers
also such as gaming, storage, FTP,
email etc. Architecture
Web site is collection of web pages Web Server Architecture follows the
whileweb server is a software that following two approaches:
respond to the request for web
resources. 1. Concurrent Approach
2. Single-Process-Event-Driven
Approach.
Web Server Working
Web server respond to the client CONCURRENT APPROACH
request in either of the following two Concurrent approach allows the web
ways: server to handle multiple client
requests at the same time. It can be
Sending the file to the client achieved by following methods:
associated with the requested
URL. Multi-process
Generating response by invoking Multi-threaded
a script and communicating with Hybrid method.
database
MULTI-PROCESSING (IIS)
In this a single process (parent The Internet Information Server
process) initiates several single- (IIS) is a high performance Web
threaded child processes and Server from Microsoft. This web
distribute incoming requests to these server runs on Windows NT/2000
child processes. Each of the child and 2003 platforms (and may be
processes are responsible for handling on upcoming new Windows
single request. version also). IIS comes bundled
with Windows NT/2000 and
It is the responsibility of parent 2003; Because IIS is tightly
process to monitor the load and integrated with the operating
decide if processes should be killed or system so it is relatively easy to
forked. administer it.
MULTI-THREADED Lighttpd
Unlike Multi-process, it creates The lighttpd, pronounced lighty is
multiple single-threaded process. also a free web server that is
distributed with the FreeBSD
operating system. This open
3.
HYBRID source web server is fast, secure
It is combination of above two and consumes much less CPU
approaches. In this approach multiple power. Lighttpd can also run on
process are created and each process Windows, Mac OS X, Linux and
initiates multiple threads. Each of the Solaris operating systems.
threads handles one connection. Using
Sun Java System Web Server
multiple threads in single process
This web server from Sun
results in less load on system
Microsystems is suited for
resources.
medium and large web sites.
Though the server is free it is not
Examples open source. It however, runs on
Following table describes the most Windows, Linux and UNIX
4.
leading web servers available today: platforms. The Sun Java System
web server supports various
languages, scripts and
S.N. Web Server Descriptino technologies required for Web
2.0 such as JSP, Java Servlets,
Apache HTTP Server PHP, Perl, Python, and Ruby on
This is the most popular web Rails, ASP and Coldfusion etc.
server in the world developed by
the Apache Software Foundation. Jigsaw Server
Apache web server is an open Jigsaw (W3C's Server) comes
source software and can be from the World Wide Web
1 Consortium. It is open source
installed on almost all operating
systems including Linux, UNIX, and free and can run on various
5.
Windows, FreeBSD, Mac OS X platforms like Linux, UNIX,
and more. About 60% of the web Windows, and Mac OS X Free
server machines run the Apache BSD etc. Jigsaw has been written
Web Server. in Java and can run CGI scripts
and PHP programs.
2. Internet Information Services
Proxy Server
Proxy server is an intermediary
server between client and the
interner. Proxy servers offers the
following basic functionalities:
REVERSE PROXIES
Firewall and network data In this the requests are forwarded to
filtering. one or more proxy servers and the
Network connection sharing response from the proxy server is
Data caching retrieved as if it came directly from
the original Server.
Proxy servers allow to hide, conceal
and make your network id anonymous
by hiding your IP address.
Type of Proxies
Following table briefly describes the
type of proxies:
FORWARD PROXIES
In this the client requests its internal
network server to forward to the
internet.
OPEN PROXIES
Open Proxies helps the clients to
conceal their IP address while
browsing the web.
DATABASE
Usenet (USER NETwork)
Like mailing lists Usenet is also a way
All the information on the web is of sharing information. It was started
stored in database. It consists of huge
by Tom Truscott and Jim Ellis in 1979.
web resources. Initially it was limited to two sites but
today there are thousands of Usenet
SEARCH INTERFACES sites involving millions of people.
This component is an interface
Usenet is a kind of discussion group
between user and the database. It where people can share views on topic
helps the user to search through the
of their interest. The article posted to
database.
a newsgroup becomes available to all
readers of the newsgroup.
Search Engine Working
Web crawler, database and the search Mailing list vs. Newsgroup
interface are the major component of
a search engine that actually makes
search engine to work. Search engines S.
Mailing List Newsgroup
make use of Boolean expression AND, N.
OR, NOT to restrict and widen the Messages are
results of a search. Following are the Messages are not posted to
steps that are performed by the delivered to individual
search engine: individual mailboxes but
1. mailboxes of can be viewed
The search engine looks for the subscribed by anyone who
keyword in the index for member of has subscribed
predefined database instead of group. to that
going directly to the web to newsgroup.
search for the keyword.
It then uses software to search Working with
Working with a
for the information in the mailing list is
particular
database. This software easier than
newsgroup
component is known as web 2. newsgroup. It is
requires proper
crawler. easy to compose
knowledge of
Once web crawler finds the and receive
that newsgroup.
pages, the search engine then emails.
Applications
There are several reasons to
implement digital signatures to
communications:
AUTHENTICATION
Digital signatures help to authenticate
the sources of messages. For
example, if a bank’s branch office
sends a message to central office,
requesting for change in balance of an
There are two types of Firewall system:
account. If the central office could not
One works by using filters at the
authenticate that message is sent
network layer and the other works by
from an authorized source, acting of
using proxy servers at the user,
such request could be a grave
application, or network layer.
mistake.
INTEGRITY
Once the message is signed, any
Key Points
change in the message would
invalidate the signature.
Firewall management must be
addressed by both system
NON-REPUDIATION
managers and the network
By this property, any entity that has
managers.
signed some information cannot at a
later time deny having signed it. The amount of filtering a firewall
varies. For the same firewall,
the amount of filtering may be
Firewall Security different in different directions.
Firewall is a barrier between Local
Area Network (LAN) and the Internet.
It allows keeping private resources
confidential and minimizes the
6 <h1>
This tag represents the
heading. The <!DOCTYPE>
7 <p> Declaration
This tag represents a The <!DOCTYPE> declaration tag is
paragraph. used by the web browser to
understand the version of the HTML
used in the document. Current version
of HTML is 5 and it makes use of the
To learn HTML, you will need to study following declaration –
various tags and understand how they
behave, while formatting a textual
<!DOCTYPE html>
document. Learning HTML is simple as
users have to learn the usage of
different tags in order to format the There are many other declaration
text or images to make a beautiful types which can be used in HTML
webpage. document depending on what version
of HTML is being used. We will see
World Wide Web Consortium (W3C) more details on this while discussing
recommends to use lowercase tags <!DOCTYPE...> tag along with other
starting from HTML 4. HTML tags.
<head>
We will study all the header and body <title>Heading Example</title>
tags in subsequent chapters, but for </head>
now let's see what is document
declaration tag. <body>
<h1>This is heading 1</h1>
Example
Paragraph Tag
The <p> tag offers a way to structure <!DOCTYPE html>
your text into different paragraphs. <html>
Each paragraph of text should go in
between an opening <p> and a <head>
<title>Line Break
closing </p> tag as shown below in
Example</title>
the example –
</head>
Example <body>
<p>Hello<br />
<!DOCTYPE html> You delivered your
<html> assignment ontime.<br />
Thanks<br />
<head> Mahnaz</p>
<title>Paragraph </body>
Example</title>
</head> </html>
This will produce the following result −
<body>
<p>Here is a first paragraph
of text.</p>
<p>Here is a second paragraph Centering Content
of text.</p> You can use <center> tag to put any
<p>Here is a third paragraph content in the center of the page or
of text.</p> any table cell.
</body>
Example
</html>
This will produce the following result − <!DOCTYPE html>
<html>
<!DOCTYPE html>
Example <html>
<body>
<p>The following word uses a
<b>bold</b> typeface.</p>
</body>
</html>
This will produce the following result −
Italic Text
Anything that appears
within <i>...</i> element is
displayed in italicized as shown below
−
Example
<!DOCTYPE html>
<html>
<head>
<title>Italic Text
Example</title>
</head>
UNIT-5 <body>
HTML – Formatting <p>The following word uses an
If you use a word processor, you must <i>italicized</i> typeface.</p>
be familiar with the ability to make </body>
text bold, italicized, or underlined;
these are just three of the ten options </html>
This will produce the following result − <p>The following word uses a
<strike>strikethrough</strike>
typeface.</p>
Underlined Text </body>
Anything that appears </html>
within <u>...</u> element, is
displayed with underline as shown
below –
Superscript Text
Example The content of
a <sup>...</sup> element is
<!DOCTYPE html> written in superscript; the font size
<html> used is the same size as the
characters surrounding it but is
<head> displayed half a character's height
<title>Underlined Text above the other characters.
Example</title>
</head>
Example
<body>
<p>The following word uses an
<u>underlined</u> typeface.</p> <!DOCTYPE html>
</body> <html>
</html> <head>
<title>Superscript Text
This will produce the following result − Example</title>
</head>
<body>
<p>The following word uses a
Strike Text <sup>superscript</sup> typeface.</p>
Anything that appears </body>
within <strike>...</strike> element
is displayed with strikethrough, which </html>
is a thin line through the text as This will produce the following result −
shown below –
Example
Subscript Text
<!DOCTYPE html> The content of
<html> a <sub>...</sub> element is
written in subscript; the font size used
<head> is the same as the characters
<title>Strike Text surrounding it, but is displayed half a
Example</title> character's height beneath the other
</head> characters.
<body> Example
<!DOCTYPE html>
</html>
This will produce the following result − Emphasized Text
Inserted Text Anything that
within <em>...</em> element
appears
is
Anything that appears
displayed as emphasized text.
within <ins>...</ins> element is
displayed as inserted text.
Example
Example
<!DOCTYPE html>
<!DOCTYPE html> <html>
<html>
<head>
<head> <title>Emphasized Text
<title>Inserted Text Example</title>
Example</title> </head>
</head>
<body>
<body> <p>The following word uses an
<p>I want to drink <em>emphasized</em> typeface.</p>
<del>cola</del> <ins>wine</ins></p> </body>
</body>
</html>
</html> This will produce the following result −
This will produce the following result − Marked Text
Deleted Text Anything that appears with-
Anything that appears in <mark>...</mark> element, is
within <del>...</del> element, is displayed as marked with yellow ink.
displayed as deleted text.
Example
Example
<!DOCTYPE html>
<!DOCTYPE html> <html>
<html>
<head>
<head> <title>Marked Text
Example</title>
</head> </head>
<body> <body>
<p>The following word has been <p>My best friend's name is
<mark>marked</mark> with yellow</p> <abbr title =
</body> "Abhishek">Abhy</abbr>.</p>
</body>
</html>
</html>
This will produce the following result −
This will produce the following result –
<body> Example
<p>Hello HTML5!</p> Following is an example of redirecting
</body> current page to another page after 5
seconds. If you want to redirect page
</html> immediately then do not
specify contentattribute.
Document Refreshing
A <meta> tag can be used to specify
a duration after which your web page <!DOCTYPE html>
will keep refreshing automatically. <html>
Example <head>
If you want your page keep refreshing <title>Meta Tags
after every 5 seconds then use the Example</title>
following syntax. <meta name = "keywords"
content = "HTML, Meta Tags,
Metadata" />
<!DOCTYPE html>
<meta name = "description"
<html>
content = "Learning about Meta
Tags." />
<head>
<meta name = "revised" content
<title>Meta Tags
= "Tutorialspoint, 3/7/2014" />
Example</title>
<meta http-equiv = "refresh"
<meta name = "keywords"
content = "5; url =
content = "HTML, Meta Tags,
http://www.tutorialspoint.com" />
Metadata" />
</head>
<meta name = "description"
content = "Learning about Meta
<body>
Tags." />
<p>Hello HTML5!</p>
<meta name = "revised" content
</body>
= "Tutorialspoint, 3/7/2014" />
<meta http-equiv = "refresh"
</html>
content = "5" />
</head>
HTML – Comments
<body>
Comment is a piece of code which is
<p>Hello HTML5!</p>
</body> ignored by any web browser. It is a
good practice to add comments into
</html> your HTML code, especially in complex
documents, to indicate sections of a
document, and any other notes to
<!DOCTYPE html>
<!DOCTYPE html>
<html>
<html>
<head> <!-- Document Header
<head>
Starts -->
<title>Using Image in
<title>This is document
Webpage</title>
title</title>
</head>
</head> <!-- Document Header Ends
-->
<body>
<p>Simple Image Insert</p>
<body>
<img src =
<p>Document content goes
"/html/images/test.png" alt = "Test
here.....</p>
Image" />
</body>
</body>
</html>
</html>
This will produce the following result
without displaying the content given
This will produce the following result −
as a part of comments –
You can use PNG, JPEG or GIF image
file based on your comfort but make
HTML – Images sure you specify correct image file
name in src attribute. Image name is
Images are very important to beautify always case sensitive.
as well as to depict many complex The alt attribute is a mandatory
concepts in simple way on your web attribute which specifies an alternate
page. This tutorial will take you text for an image, if the image cannot
through simple steps to use images in be displayed.
your web pages. Set Image Location
Usually we keep all the images in a
Insert Image separate directory. So let's keep HTML
You can insert any image in your web file test.htm in our home directory and
page by using <img> tag. Following create a subdirectory images inside
is the simple syntax to use this tag. the home directory where we will keep
our image test.png.
</html> <head>
This will produce the following result − <title>Set Image
Border</title>
</head>
<!DOCTYPE html>
<html> Set Image Alignment
By default, image will align at the left
<head> side of the page, but you can
<title>Set Image Width and use alignattribute to set it in the
Height</title> center or right.
</head>
Example
<body>
<p>Setting image width and <!DOCTYPE html>
height</p> <html>
<img src =
"/html/images/test.png" alt = "Test <head>
<title>Set Image
Alignment</title> </body>
</head> </html>
Example
<head>
<title>HTML Table
Header</title>
<!DOCTYPE html> </head>
<html>
<body>
<head> <table border = "1">
<title>HTML Tables</title> <tr>
</head> <th>Name</th>
<th>Salary</th>
<body> </tr>
<table border = "1"> <tr>
<tr> <td>Ramesh Raman</td>
<td>Row 1, Column 1</td> <td>5000</td>
<td>Row 1, Column 2</td> </tr>
</tr>
<tr>
<tr> <td>Shabbir Hussein</td>
<td>Row 2, Column 1</td> <td>7000</td>
<td>Row 2, Column 2</td> </tr>
</tr> </table>
</table> </body>
Example
This will produce the following result.
Here background image did not apply
<!DOCTYPE html>
to table's header.
<html>
<tr>
<td>Row 2, Column 1</td>
<td>Row 2, Column 2</td>
</tr>
</table>
Table Header, Body,
</body> and Footer
Tables can be divided into three
</html> portions − a header, a body, and a
This will produce the following result − foot. The head and foot are rather
similar to headers and footers in a
word-processed document that remain
Table Caption the same for every page, while the
The caption tag will serve as a title or body is the main content holder of the
explanation for the table and it shows table.
up at the top of the table. This tag is The three elements for separating the
deprecated in newer version of head, body, and foot of a table are –
HTML/XHTML.
<thead> − to create a separate
table header.
<body>
<table border = "1" width = Linking Documents
"100%"> A link is specified using HTML tag
<thead> <a>. This tag is called anchor
<tr> tag and anything between the
<td colspan = opening <a> tag and the closing </a>
"4">This is the head of the tag becomes part of the link and a
table</td> user can click that part to reach to the
</tr> linked document. Following is the
</thead> simple syntax to use <a> tag.
<head>
<title>Font Face</title>
</head>
<body>
<font face = "Times New Roman"
size = "5">Times New Roman</font><br
/>
<font face = "Verdana" size =
"5">Verdana</font><br />
<font face = "Comic sans MS"
size =" 5">Comic Sans MS</font><br
/>
<font face = "WildWest" size =
"5">WildWest</font><br />
<font face = "Bedrock" size =
"5">Bedrock</font><br />
</body>
</html>
This will produce the following result −