You are on page 1of 47

ICT – 2 II Year Semester-IV B.A.

Computer Applications

Unit-I
FUNDAMENTALS OF INTERNET
Networking Concepts - Data Communication – Types of Networking, Internet and its
Services, Internet Addressing – Internet Applications – Computer Viruses and itstypes –
Browser –Types of Browsers

NETWORKING CONCEPTS
Network:
 A group of two or more computers or computing devices connected via a form of
communications technology is called network
(or)
 The collection of interconnected computers is called as a computer network.
Two computers are said to be interconnected if they are capable of sharing and
exchanging information.
 A Computer network is a group of computers that shares information across wireless or
wired technology.Computer networking requires two computers, a protocol and the
hardware to connect them.

NETWORK TOPOLOGY
Network Topology is the schematic description of a network arrangement, connecting
various nodes(sender and receiver) through lines of connection
(or)
The term “Topology” refers to the way in which the end points or stations or computers
attached to the networks or interconnected.

Depending on the requirement there are different Topologies to construct a network.


(1) Bus topology.
(2) Star topology.
(3) Ring topology.
(4) Mesh topology.
(5) Tree (Hierarchical) topology.
(6) Hybrid topology.

1.BUS Topology
Bus topology is a network type in which every computer and network device is connected
to single cable.

Features of Bus Topology


1. It transmits data only in one direction.
2. Every device is connected to a single cable
T.ANIL KUMAR, Lecture in Comp.Sci., Page 1
ICT – 2 II Year Semester-IV B.A. Computer Applications

Advantages of Bus Topology


1. It is cost effective.
2. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. Cable has a limited length.
3. It is slower than the ring topology.

2. RING Topology
In this type of topology as each computer is connected to a loop of cable, the “ring”.It has
exactly two neighbors for each device.
Features of Ring Topology
1. A number of repeaters are used for Ring topology with large number of nodes
2. The transmission is unidirectional
3. Data is transferred in a sequential manner i.e. bit by
bit
Advantages of Ring Topology
1. Cheap to install and expand
Disadvantages of Ring Topology
1. Troubleshooting is difficult
2. Adding or deleting the computers disturbs the
network activity.
3. Failure of one computer disturbs the whole network.
3. STAR Topology
In this type of topology all the computers are connected to a central device, called “hub”
through a cable. All others nodes are connected to the central node.
Features of Star Topology
1. Every node connected with hub.
2. Hub acts as a repeater for data flow.
Advantages of Star Topology
1. Fast performance with few nodes
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped

4. MESH Topology
It is a point-to-point connection to other nodes or devices. All the nodes are connected to
each other. Mesh has n(n-1)/2 physical channels to link n
devices. There are two techniques to transmit data over
the Mesh topology, they are:
1. Routing

T.ANIL KUMAR, Lecture in Comp.Sci., Page 2


ICT – 2 II Year Semester-IV B.A. Computer Applications

2. Flooding
Features of Mesh Topology
1. Fully connected.
2. Robust.
3. Not flexible.
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
Disadvantages of Mesh Topology
1. Installation and configuration is difficult.
2. Cabling cost is more.
3. Bulk wiring is required.

5. TREE Topology
It has a root node and all other nodes are connected to root node forming a hierarchy. It is
also called hierarchical topology. It should at least have three levels to the hierarchy.
Features of Tree Topology
1. Ideal if workstations are located in groups.
2. Used in Wide Area Network.
Advantages of Tree Topology
1. Extension of bus and star topologies.
2. Expansion of nodes is possible and easy.
3. Easily managed and maintained.
4. Error detection is easily done.
Disadvantages of Tree Topology
1. Heavily cabled.
2. Costly.
3. If more nodes are added maintenance is difficult.
4. Central hub fails, network fails.

6. HYBRID Topology
The hybrid topology is a combination of 2 or more topologies.
Features of Hybrid Topology
1. It is a combination of two or topologies
Advantages of Hybrid Topology
1. Reliable as Error detecting
2. Easy to trouble shoot
3. Effective
4. flexible
Disadvantages of Hybrid Topology
1. Complex in design.
2. Costly.

TYPES OF NETWORKS (OR) TYPES OF COMMUNICATION NETWORKS


Computer Networks are classified in to following types. Those are
 LAN(Local Area Networking)
 MAN(Metropolitan Area Networks)

T.ANIL KUMAR, Lecture in Comp.Sci., Page 3


ICT – 2 II Year Semester-IV B.A. Computer Applications

 WAN( Wide Area Networks)


 WLAN(Wireless Local Area Networks)
 Bluetooth or PAN(Personal Area Network)
 CAN(Campus Area Networks)
 SAN(Storage or System Area Network)
 HAN (Home-Area Networks)
 TAN (Tiny Area Network),
1. Local Area Network (LAN)
 A local area network (LAN) is a network that connects computers and devices in a
limited area such as home, school, computer laboratory, office building, or group of
buildings.
 Personal computers and workstations are connected to each other through LANs
 Each computer or device on the network is called as a “node”.
 We can use different types of topologies through LAN; these are Star, Ring, Bus, Tree
etc.

2. Metropolitan Area Network (MAN)


 It is basically a bigger version of LAN. It also uses the similar technology as LAN
 MAN is a network that interconnects computers or device with in a city, campus to form
a single large network
 It is covers physical area larger than of LAN, but smaller than a WAN
 It is mainly operated by single private company or a public company.

3. Wide Area Network (WAN)


 A wide area network (WAN) is a computer network that covers a large physical area
such as a City, Country, using a communications channel such as telephone lines, cables,
and satellitelinks.
 WAN can be private or it can be public leased network.
 It is not easy to design and maintain.
4. Wireless Local Area Network (WLAN)
 A wireless LAN (WLAN) is a LAN that uses radio signals (Wi-Fi) to connect computers
instead of cables.
5. Bluetooth (Personal Area Network)
 Bluetooth is a wireless networking technology designed for very, short-range
connections (typically just a few meters).
6. CAN (Campus Area Networks)
 Campus Area Networks are usually a connection of many small LAN networks which
are often used on university campuses and office buildings.
 Campus Area Networks allow for easy file sharing between different.

7. SAN (Storage Area Network)


 Storage Area Networks are primarily used as information databases.
 They are not usually used by large organizations or similar entities.
 They are used for the storage of information, and easy retrieval of specific pieces of
data whenever required.

8. HAN (Home-Area Networks)


 A network contained within a user’s home that connects a person’s digital devices.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 4


ICT – 2 II Year Semester-IV B.A. Computer Applications

9. TAN (Tiny Area Network)


 Tiny Area Networks are the same as LANs but smaller, means it works 2 to 3
machines only.

DATA COMMUNICATION
Data is represented by computers and other telecommunication devices using signals.
Signals are transmitted in the form of electromagnetic energy from one device to another.
Electromagnetic signals travel through vacuum, air or other transmission mediums to
travel between one point to another (from source to receiver).
Electromagnetic energy (includes electrical and magnetic fields) includes power, voice,
visible light, radio waves, ultraviolet light, gamma rays etc.

The exchange of data between two devices through a transmission medium is Data
Communication.The data is exchanged in the form of 0’s and 1’s.Data Communication has
two types Local and Remote

Types of Data Communication:


Data communication comes in two forms. They are
1. Guided media
2. Un Guided Media
1. Guided Media
In this media, the sender and receiver are directly connected and the information is
send through it. It can be further divided in to 3 types. Those are
a) Twisted Pair
 It is least expensive and most widely used.
 A twisted pair consists of 2 insulated copper wires arranged in a regular spiral apattern.
 A Wire pair acts as a single communication link.
 It is commonly used to transmit both analog and digital signals.
Twisted Pair is of two types:
1. Unshielded Twisted Pair (UTP)
2. Shielded Twisted Pair (STP)
1. Unshielded Twisted Pair Cable
It is the most common type of telecommunication when
compared with Shielded Twisted Pair Cable whichconsists of
two conductors usually copper, each with its own color plastic
insulator.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11 connector
and 4 pair cableuse RJ-45 connector.

2. Shielded Twisted Pair Cable


This cable has a metal foil or braided-mesh covering
which encases each pair of insulated
conductors.Electromagnetic noise penetration is
prevented by metal casing. It is faster the unshielded
and coaxial cable. It is moreexpensive than coaxial
and unshielded twisted pair.

b) Co-axial cable

T.ANIL KUMAR, Lecture in Comp.Sci., Page 5


ICT – 2 II Year Semester-IV B.A. Computer Applications

 It consists of a single copper conductor as its centre, encapsulated inside a plastic


layer
 It is highly preferred connecting for cable television systems and connecting the
computers within short distance to from a network.
 Coaxial cable comes in two sizes which are called thinnet (segment length up to
500m)and thicknet(segment length up to 185m)
Here the most common coaxial standards.
 50-Ohm RG-7 or RG-11 : used with thick Ethernet.
 50-Ohm RG-58 : used with thin Ethernet
 75-Ohm RG-59 : used with cable television
 93-Ohm RG-62 : used with ARCNET.

There are two types of Coaxial cables:


1. Baseband
This is a 50 ohm (Ω) coaxial cable which is used for digital transmission. It is
mostly used for LAN’s.Baseband transmits a single signal at a time with very high
speed. The major drawback is that it needs amplification after every 1000 feet.
2. Broadband
This uses analog transmission on standard cable television cabling. It transmits
several simultaneous signal using different frequencies. It covers large area when
compared with Baseband Coaxial Cable.

c) Fiber Optic Cable


 These are similar to coaxial cable. It uses electric signals to transmit data.
 At the centre is the glass core through which light travels
 The core in fiber optic cable is surrounded by glass cladding.
 This is covered with a thin plastic jacket to protect the cladding.
 In this, the Source converts (Modulates) the data signal into light using LED (Light
EmittingDiodes) or LASER diodes and send it over the Optical fiber.
 Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second)

2. UnGuided Media

T.ANIL KUMAR, Lecture in Comp.Sci., Page 6


ICT – 2 II Year Semester-IV B.A. Computer Applications

Unguided or wireless media sends the data through air (or water), which is available to
anyone who has a device capable of receiving them.It can be further classified in to following

a)Radio Waves
 These are used for multi-cast communication, such as radio and television.
 They can penetrate through walls.
 Its frequency is between 10 kHz to 1GHz

b)Micro Waves
 It travels at high frequency than the radio waves.
 It operates in a system with a low gigahertz range.
 It is mostly used for uni-cast communication such as cellular telephones and wireless
LANs.
 They cannot penetrate through walls.

There are 2 types of Microwave Transmission: Terrestrial Microwave and Satellite


Microwave
i) Terrestrial microwave
For increasing the distance served by terrestrial microwave, repeaters can be installed
with each antenna. The signal received by an antenna can be converted into transmittable
form and relayed to next antenna. It is an example of telephone systems all over the world.
There are two types of antennas used for terrestrial
microwave communication:
1. Parabolic Dish Antenna
In this every line parallel to the line of symmetry
reflects off the curve at angles in a way that
they intersect at a common point called focus.
This antenna is based on geometry of
parabola.
2. Horn Antenna
It is a like gigantic scoop. The outgoing transmissions are
broadcast up a stem and deflected outward in a series of
narrow parallel beams by curved head.

ii) Satellite Micro Wave


 In this, signals are transferred between the sender and
receiver using a satellite,i.e. typically 35400km above the
earth. Satellite can be used to relay voice, data and TV signals.
 In satellite communication, transmitting station transmits the signals to the satellite (It is
called up-linking).
 After receiving the signals (microwaves) it amplifies them and transmits back to
earthReceiving stations at different places can receive these signals(It is called down-
linking)

INTERNET
“An interconnected system of networks that connects computers around the world via
TCP/IP protocol”
(or)

T.ANIL KUMAR, Lecture in Comp.Sci., Page 7


ICT – 2 II Year Semester-IV B.A. Computer Applications

“Internet is a computer network consisting of a worldwide network of networks that use the
TCP/IP protocol to facilitate data transmission and exchange”

INTERNET AND ITS SERVICES


Internet
 The Internet is a global system of networked computers together with their users and
data.
 The Internet is a worldwide collection of computer networks, cooperating with each
otherto exchange data using a common software standard.

Internet Services:
Internet Services allows us to access huge amount of information such as text,
graphics, sound and software over the internet.

1. Communication Services
There are various Communication Services available that offer exchange of information
with individuals or groups.

Service Description
Electronic Mail Used to send electronic messages over the
internet.
Telnet Used to log on to a remote computer that is
connected to internet.
Newsgroup Offers a forum for people to discuss topics of
common interests.
Internet Relay Chat (IRC) Allows the people from all over the world to
communicate in real time.
Mailing Lists Used to organize group of internet users to share
common Information through e-mail.
Instant Messaging Offers real time chat between individuals and
group of people. Eg. Yahoo messenger, MSN
messenger

2. Information Retrieval Services


There exist several Information retrieval services offering easy access to information
present on the internet.
Service Description
File Transfer Protocol Enable the users to transfer files.
(FTP)
Archie It’s updated database of public FTP sites and
theircontent. It helps to search a file by its name.
Gopher Used to search, retrieve, and display
documentsonremote sites.
3. Web Services
Web services allow exchange of information between applications on the web. Using
web services, applications can easily interact with each other.The web services are offered
using concept of Utility Computing.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 8


ICT – 2 II Year Semester-IV B.A. Computer Applications

4. World Wide Web (WWW)


WWW is also known as W3. It offers a way to access documents spread over the several
servers over the internet. These documents may contain texts,graphics, audio, video,
hyperlinks. The hyperlinks allow the users to navigate between the documents.

INTERNET PROTOCOLS
Several protocols are used on the Internet like Electronic Mail (e-mail), File Transfer
Protocol(FTP), HTTP (World Wide Web), News (or Usenet), Gopher and Telnet.
1. E-mail
“It is used for sending and receiving messages electronically over a computer network”.
Sending messages is done by SMTP (Simple Mail Transfer Protocol) and receiving
messages is done by POP3 (Post Office Protocol 3), or IMAP (Internet Message
Access Protocol).

2. SMPT Protocol:
SMTP is a protocol used for sending mail, while IMAP and POP3 are used for
receiving. However the most popular setup for most providers is to use SMTP for
sending mail while using POP3 for receiving.
3. File Transfer Protocol:
File Transfer Protocol, or FTP, is a means of transferring a file from one computer to
another.
FTP is commonly used for uploading a web page to a web server so that may be seen
on the World Wide Web.
4. HTTP Protocol (World Wide Web):
Hyper Text Transfer Protocol, or HTTP, is the protocol used by web server to allow
web pages to be shown in a web browser.In the address bar of your web browser,
every website which you want to visit, it has prefixed “http://” in front of the address.The
http tells the browser what kind of information to expect.
5. Gopher:
Another tool of the Internet is Gopher, a menu-based program that enables you to
browse for information without knowing where the material is located.
6. Telnet:
Telnet allows the user to log in to a remote computer and make use of it.
7. Usenet
It allows automatic global distribution of news messages among thousands of user
groups,called newsgroups.

INTERNET ADDRESSING
IP address
An IP address is a unique number that identifies computers on internet.Every client,server
and network device must have a unique IP address for each network connection.We have
2 types of IP addressing formats.Those are IPv4 and IPv6.

1. IPv4
IPv4 is made up of 4 bytes(32 bit) of information expressed as four numbers between 0 to
255separated by dots. This is commonly referred to as dotted decimal notation.
Here is a simple example of an IP address:
192.168.1.1
There are two parts of an IP address:

T.ANIL KUMAR, Lecture in Comp.Sci., Page 9


ICT – 2 II Year Semester-IV B.A. Computer Applications

 Network ID
 Host ID

Class 1st Octet 2nd Octet 3rd Octet 4th Octet


A NetID HostID HostID HostID
B NetID NetID HostID HostID
C NetID NetID NetID HostID

IP addresses are divided in five classes:


Class A addresses range from 1-126
Class B addresses range from 128-191
Class C addresses range from 192-223
Class D addresses range from 224-239
Class E addresses range from 240-254
Note:
 0 is reserved and represents all IP addresses;
 127 is a reserved address and is used for loop back testing
 255 is a reserved address and is used for broadcasting purposes.

2. IPv6
Network industry is moving to adopt new version of IPv6. IPv6 have several new
features. IPv6 is 128 bits. It has eight octet pairs, each with 16 bits and written in
hexadecimal as follows:
2b63:1478:1ac5:37ef:4e8c:75df:14cd:93f2
Domain and Host Names
The name of the each host computer consists of a series of words separated by
dots.Most computers on the internet have domain names.The last part of the domain name is
called the Top-level Domain or Zone and is either 2 or 3 letters long.
The 3 letter zone indicates the type of organization and 2 letter zones indicates the
country in which the organization that owns the computer located.
Domain Description
Com commercial/Individual
Edu education
Gov government
Mil military
Net network related companies
Int international organizations
Some domains organized by country,using two character national identification codes.
Domain Description
In India
US United States
UK united Kingdom

COMPUTER VIRUSES AND ITS TYPES


A Computer Virus is a malware or a malicious automated code which replicates itself
from one computer to another and infects the operation of the machine.
Types of Computer Virus
The computer viruses can be divided into two categories:
1. Compiled viruses

T.ANIL KUMAR, Lecture in Comp.Sci., Page 10


ICT – 2 II Year Semester-IV B.A. Computer Applications

2. Interpreted viruses
1. Compiled Viruses: It is that kind of a virus whose code is converted by the compiler into
a format which can be directly executed by an operating system.
Boot Sector Virus –
 Viruses which infect DBR/MBR (Dos Boot Recorder/Master Boot Recorder) are
referred to as Boot Sector Virus.
 Boot sector is the section which is accessed at the very first when the computer is
turned on. It is used to boot the information used by the operating system.
 A Boot sector virus gains complete control over the Master Boot Record (MDR) or
the DOS by replacing the contents of the OS with errors during booting
 Michelangelo and Stones are some examples of boot sector viruses.
File Infector Virus –
 Viruses which infect executable files are referred to as File Infector Virus.
 It replace a portion of the original file with its own code, thus corrupting the file or
It attaches itself to executable programs
 The virus continues to infect files till the machine is switched-off or reboot.
 Examples of file infector virus are Cascade and Jerusalem.
Multipurpose Virus –
 These viruses have the capability to infect DBR and MBR as well as executable
files.

2. Interpreted Viruses: Interpreted virus is composed of program or code which can be


executed only by a particular application or service. These are comparatively easy to
generate.

BROWSER AND ITS TYPES


 Web Browser is application software that allows us to view and display information on
the web.
 User can request for any web page by just entering a URL into address bar.
 Web browser can show text, audio, video, animation and more.
 Earlier the web browsers were text-based while now day’s graphical-based or voice-
based web browsers are also available.
 Following are the most common web browser available today:

Browser Vendor Founded in


Internet Explorer Microsoft 1995
Google Chrome Google 2008
Mozilla Firefox Mozilla 2004
Netscape Navigator Netscape Communications 1994
Corp.
Safari Apple 2003

Types of Web Browser


There are different types of web browsers available in market.Those are
1. Internet Explorer
Internet Explorer (IE) is a popular browser developed by Microsoft. By default it
automatically loaded when you install windows family operating system and it is most

T.ANIL KUMAR, Lecture in Comp.Sci., Page 11


ICT – 2 II Year Semester-IV B.A. Computer Applications

commonly used browser in the world. This was introduced in 1995 along with Windows
95 launch.
2. Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has
grown to be the second most popular browser on the Internet.
3. Netscape
Netscape navigator, from Netscape Communication Corporation,is downloaded
from internet. Netscape was introduced in 1994.
4. Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It
was first released as a public beta in January 2003. Safari has very good support for
latest technologies like XHTML, CSS2 etc.
5. Google Chrome
It was developed by Google. Its beta and commercial versions were released in
September 2008 for Microsoft Windows.The browser options are similar to that of
Safari, the settings locations are similar to Internet Explorer 7, and the window design
is based on Windows Vista.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 12


ICT – 2 II Year Semester-IV B.A. Computer Applications

Unit - II
INTERNET APPLICATIONS
Internet Explorer, Standard Internet Explorer Buttons, Entering a Web Site Address,
Searching the Internet – Introduction to Social Networking: Twitter, Tumblr, Linkedin,
Facebook, Flickr, Skype, Yelp, Vimeo, Yahoo!, Google+, Youtube, WhatsApp, etc.

INTERNET EXPLORER
Internet explorer is graphical user interface software that provides access to World Wide Web.
It is popular browser developed in 1995 by Microsoft. By default, it is automatically loaded
when installing windows family OS. It uses toolbars, icons, menus and dialog boxes for easy
navigation.

PARTS OF INTERNET EXPLORER


The Internet Explorer window contains the following parts:
1. Title bar
The title bar displays the title of the file that is currently running. Display at the top of
the screen (normally in blue color). It contains 3 buttons such as Minimize,
Maximize/Restore, Exit, which are also called as Control buttons.
2. Menu bar
The next line below the title bar is called Menu bar. It contains several menu items like
- File, Edit, View, Favorites, Tools and help.
3. Tool bar
It is located below the menu bar. It contains small icons like – back, forward, stop,
refresh, home, history, search, print etc.
4. Address Bar
It displays the URL/address of the currently displayed webpage in IE
5. Document Area
It is a space that displays the content of the particular website.
6. Status Bar
The status bar is located at bottom of the screen. It displays information of the web and
status of the IE.

STANDARD INTERNET EXPLORER BUTTONS (OR) TOOLS OF THE INTERNET


EXPLORER
The Internet Explorer contains the following buttons:
1. Back:By clicking back button, we will come back to the previouslyvisited site.
2. Forward:By clicking forward button, we can go forward to the pages
3. Stop: It stopsthe transfer (or loading) of a page.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 13


ICT – 2 II Year Semester-IV B.A. Computer Applications

4. Refresh:
By clicking refresh button, the browser retrieves / downloads the current page again.
This is useful if the page does not load successfully or completely.
5. Home:It takes the user back to the page when first started in IE.
6. Search:It searches for words that the user enters in the search box
7. Favorites:It showsthe favorite sites.
8. History:It allows the user to view and select previously visited web pages within the
last 20 days.
9. Mail:It allows the user to read emails.
10. Print: It allows printing the current page.

INTRODUCTION TO SOCIAL NETWORKING WEBSITES


Social Networking:
Social Networking is a service that focuses on online social networks for collection of people
through medium to share thoughts, interests, and activities.There are several web based
social network services are available like Facebook, twitter,LinkedIn, Google+ etc. that used
to provide interactive interface to connect with people within the country. There are also
several mobile based social networking serviceslikeWhatsApp, hike, Line etc.

1. Facebook
Facebook is a most popular social networking website. With Facebook, members
connectand upload photos and videos to share with their friends and family.It is originally
designed for students. It was created by Mark Zukerbergin 2004.

2. LinkedIn
LinkedIn is a business oriented and professional networking website. It is used to find
jobs, recruiting new employees, getting business news etc. and touch with past colleagues. It
is developed by Reid Hoffman in December 2002, and launched in May 2003.

3. Twitter
Twitter is an online based social networking website. It allows users to send and read
short 140character messages called "tweets". Registered users can read and post tweets, but
unregistered users only read the tweets. Twitter is accessed by users using website interface,
SMS or mobile device app.Twitter was created by Jack Dorsey, Evan Williams, Biz Stone,
and Noah Glass in March 2006 and launched in July 2006.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 14


ICT – 2 II Year Semester-IV B.A. Computer Applications

4. Skype
Skype is an application that provides video chat and voice call services. It allows users
to send text, images and videomessages. It also allows users to make video conference calls.
Skype is available for Microsoft Windows, Linux, Android, Blackberry, Apple and smart
phones. Skype was created by the Swede Niklas Zennstrom and the Dane Janus Frisin
August 2003.

5. Tumblr.
Tumblr (its home page as tumblr.) is a ‘micro blogging’ (i.e. we can give very short
update) and social networking website.It allows users to post multimedia content like text,
photos, quotes, links, music and videos. Tumblr is developed by David Karp in 2007, and
owned by Yahoo! since 2013.

6. Google+
Google+ is an interest-basedsocial network owned andoperated by Google.Google+
developed in June 2011. It contains the following features like - post photos and status
updates, group different types of relationships into “Circles” ,multi-person instant messaging,
text and video chat called “Hangouts”.

7. Flickr
Flickr is a photo-sharing and video-sharing website. Users upload and tag photos,
browse other’s photos, add comments and annotations.It was created by Ludicorp in 2004
and owned by Yahoo in March 20, 2005.

8. Vimeo
Vimeo is a video-sharing website. It allows users to upload, share and view videos. It
was the first video-sharing site to support HD videos.Vimeo was developed by Jake Lodwick
and Zach Klein in November 2004.

9. WhatsApp
WhatsApp Messenger is a cross platform, encrypted instant messaging application for
smart phones. It is used to send text messages, documents, images, locations, video and
audio messages to others using mobile numbers. WhatsApp Inc. was developed by former
employees of Yahoo! Brian Acton and Jan Koum in 2009.

10. Yahoo
Yahoo Inc. (also known Yahoo!) is an American multinationaltechnology company located in
Sunnyvale, California.It is one ofthe most popular sites in the United States. It is adirectory of
websites organized in the manner of topic categories. It provides several services, likeYahoo!
Mail, Yahoo! News, online mapping, video sharing and social networking website.Yahoo was
developed by Jerry Yangand David Filo in January 1994.

11. Yelp
Yelp is an American multinational corporation located in San Francisco, California. It
developed the Yelp.com and Yelp mobile App to publish reviews about businesses and online
reservation service SeatMe and Online food delivery service Eat24. Yelp was developed by
Russel Simmons and Jeremy Stoppelman in 2004.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 15


ICT – 2 II Year Semester-IV B.A. Computer Applications

12. Youtube
YouTube is an American video sharing website located in San Bruno, California, United
States. It allows users to upload,view, rate, share, and comment on videos.It contains
videoclips, TV show clips, music videos, audio recordings, movie trailers and educational
videos.Unregistered users watch videos, andregistered users are permitted to upload an
unlimited numberof videos and add comments to videos. It was created by Steve Chen, Chad
Hurley, and Jawed Karim in February 2005. In November 2006, it was purchased by Google.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 16


ICT – 2 II Year Semester-IV B.A. Computer Applications

1. TUMBLR.
Tumblr (its home page as tumblr.) is a micro blogging and social networking website
founded by David Karp in 2007, and owned by Yahoo! Since 2013. It allows users to post
multimedia to a short-form blog.

Creating an account in Tumblr


1. Goto “www.tumblr.com”
2. The Tumblr starting page displayed on the screen.
3. For create an account, click “sign up” and then click “Get Started” button on the
screen.
4. Enter your email address, password and user name, and age then click “sign up”.
5. Choose “I’m not a robot” and click on “verify”
6. Select the interested topics like arts, gaming, music, audios, design etc.
7. Click on “Next”
8. The starting page of Tumblr. Will appear.

Make a Post and Upload a Video in Tumblr


To Make a Post:
1. Click on “Make a Post” icon on upper right corner of the screen.
2. Tumblr displays a screen with some options like Text, Photo, Quote, Link, Chat, Audio
and video
3. Now, click on “Text” to make a text message.
4. Tumblr displays empty message box, now Enter Title, Text and press “Post”
5. After few seconds the Post displays on the dashboard.

To Upload a Video:
1. Click on “Make a Post” icon on upper right corner of the screen.
2. Tumblr displays a screen with some options like Text, Photo, Quote, Link, Chat, Audio
and video
3. Now, click on “Video” to make upload a video
4. Click on “Upload a video”,
5. select a video from open dialog box, and then click on “open” and then click “Post”
6. After few seconds the uploaded video displays on your timeline.

2. LINKEDIN
LinkedIn is a business oriented social networking service. Founded on December 14,
2002, and launched on May 5, 2003, it is mainly used for professional networking.

Creating a LinkedIn account


1. Goto “www.linkedin.com”
2. The browser displays the opening screen of the LinkedIn site.
3. Enter the details like First Name, Last Name, Email or phone number and Password,
then click “Join now”.
4. Verify your phone by entering the code
5. In the next step, enter Country and Postal code, click “next”.
6. Choose “Are you Student? Yes / No” and enter the details, then click “next”.
7. Select most interested fields and click on “Follow”, otherwise click on “Skip”

T.ANIL KUMAR, Lecture in Comp.Sci., Page 17


ICT – 2 II Year Semester-IV B.A. Computer Applications

8. If we want the Linkedin App, enter the details and click on “send an SMS”, otherwise
click on “Next”
9. After few seconds LinkedIn profile will appears.

3. YELP
Yelp is an American multinational corporation located in California. It develops,
Yelp.com and the Yelp mobile app, as well as the online reservation service SeatMe and
online food delivery service Eat24. Yelp was founded in 2004 by former PayPal employees,
Russel Simmons and Jeremy Stoppelman.

Create an account in Yelp


1. Goto “www.yelp.com”
2. It displays the homepage of the Yelp
3. Click on “sign up”
4. We can create free account either by entering the details (like First Name, Last Name,
email, password, ZIP code and Date of Birth) or simply click on “Sign up with
Facebook”, to login with your Facebook account.
5. Enter your Face book username and password and then click “Log in”
6. Yelp displays homepage of your account.

4. YAHOO!
Yahoo Mail is a web based email service offered by the American company Yahoo!. It
was launched in October 8, 1997. It was the third largest web based email service as of
December 2011.

Creating an account
1. Goto www.yahoo.com
2. Click on “Mail” button
3. Click on Don’t have an account?“Sign up”
4. Enter the details (First name, last name, email address, password, Phone number and
gender)and click on “Continue”
5. Yahoo! Sends verification code to your mobile. Enter the verification code and then
click “Verify”
6. Yahoo displays the “Congratulations” screen, then click on “Let’s get started”
7. After few seconds it displays the Yahoo! Mail Homepage.

5. FLICKR
Flickr is an image hosting and video hosting website and web services suite that was
created by Ludicorp in 2004 and acquired by Yahoo on March 20, 2005.

Creating an account
1. Go to “www.flickr.com”
2. Click on “sign up”. The flickr uses the Yahoo! Account.
3. Enter the details like first name, Last name, yahoo mail , password, date of birth and
gender) and then click “Continue”
4. Login with Yahoo account.
5. Flickr displays Welcome screen. In that, Enter first name, last name, flickr screen name
and contact email and click “Next”
6. Flickr displays the homepage of your account.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 18


ICT – 2 II Year Semester-IV B.A. Computer Applications

Uploading Photos:
1. Login with flickr account.
2. Click on “You” from top of the screen and then click on “camera Roll”
3. Click on “Select files to upload”
4. Choose file which you want to upload and then click on “open”
5. The progress of uploading photos displayed
6. Finally the photos are displayed on the homepage of your account.

6. WHATSAPP
WhatsApp Messenger is an encrypted instant messaging client for smart phones. It
uses the Internet to send text messages, documents, images, video, user location and audio
messages to other users using their mobile numbers. WhatsApp Inc., was founded in 2009 by
Brian Acton and Jan Koum. It was initially released in January 2010.

Creating account:
1. Install the WhatsApp app
2. Click on “Open”
3. Click on “Agree and Continue”
4. Verify your mobile by entering the Country name and Mobile no and click on “Next”
5. Click on “ok”
6. Enter the code
7. Provide your name and profile photo and click on “Next”
8. The WhatsApp home page will appears.

Sending Text Messages:


1. On the right side of the WhatsApp main page, tap the “New Message” icon
2. From your contacts list, tap any one of the friend.
3. If you want, we can add smileys by tapping the Smiley icon.
4. After you finishing composing, press the arrow icon to send your message
5. To add pictures, videos, voice messages in your message, tap the “Attachment” icon
on the upper right corner of your screen.
Forwarding Message:
To forward a message or media from one conversation to another, we can
1. Tap and hold on the message (or) media
2. Optionally, select multiple messages to forward
3. Tap the icon for forwarding to others
4. Choose a conversation (or) friend to forward the message or media.

Send Photo/Video in WhatsApp:


1. Click the “Attachment” icon at the top of the chat
2. Choose whether you want to take a new photo (or) send a photo (or) video from your
computer
3. Click the “Gallery” icon to pick a photo (or) video from your computer. You can select
up to 10 photos or videos to send at a time.
4. Click the “camera” icon to use your computer’s camera to take a photo.
5. Click the “send” icon to send selected photos (or) videos.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 19


ICT – 2 II Year Semester-IV B.A. Computer Applications

Send Media and contacts using WhatsApp


1. Open a chat
2. Tap the “Attachment” icon
3. Choose what you want to send:
 Choose “Document” to select a document
 Choose “Camera” to take a picture with your camera
 Choose “Gallery” to select an existing image (or) video.
 Choose “Audio” to record a message or send an existing audio
 Choose “Location” to send your location or nearly place.
 Choose “Contact” to send the information of a contact saved phone’s address
book
4. Tap “send” to send media.

7. YOUTUBE
YouTube is a free video sharing website that makes it easy to watch videos at online.
You can create and upload your own videos to share with others. It was originally created in
2005 by Chad Hurley and Steven Chen.

Create an account in YouTube


1. Go to “www.youtube.com”
2. Click on “Sign in”, and then click on “create channel”
3. click on “create Account”
4. Enter necessary details like name, username, password, mobile number etc. and click
on “Next”
5. Click on “agree” and then click on “Continue to Gmail”.
6. The YouTube page will appears.
Searching for Videos
1. To search for videos, simply type what you want to look for in the “Search bar” and
click the “Search” button.
2. Result will appear below, just like as a Google Search.
3. If you want to get really detailed, click the “Filters” button below the search bar.
4. Then you can “refine your results” to search for videos by quality, length.

8. TWITTER
Twitter is an online social networking service that enables users to send and read short
140character Messages called "tweets". Registered users can read and post tweets, but
those who are unregistered can only read them. Users access Twitter through the website
interface, SMS or mobile device app.
Twitter was created in March 2006 by Jack Dorsey, Evan Williams, Biz Stone, and
Noah Glass and launched in July 2006.

Creating a Twitter Account


1. Goto “ www.twitter.com”
2. Click on “New to Twitter? Sign Up” and enter full name and phone number and then
click on “Sign Up”.
3. In next window, enter your mobile number and press enter
4. Type a password for twitter account and then click “Next”
5. Enter your email and click “Next”
6. Choose a username and click “Next”
T.ANIL KUMAR, Lecture in Comp.Sci., Page 20
ICT – 2 II Year Semester-IV B.A. Computer Applications

7. In Next step, “Select interested topics” and click “Next” and then click “Done”.
8. The Twitter home page will appears.

Tweet in a Twitter:
1. On the Twitter Homepage click on Tweet button to start a new tweet. Remember to
keep your tweet at 140 characters or less.
2. Type your tweet and when you are ready to post, click on “post”
3. The posted tweet appears immediately in the Timeline.

9. SKYPE
Skype is an application that provides video chat and voice call services. Skype allows
the creation of video conference calls.
Skype is available for Microsoft Windows, Macintosh, or Linux, as well as Android,
Blackberry, Apple and Windows smart phones and tablets. First released in August 2003,
created by the Swede Niklas Zennstrom.

Creating a Skype Account


1. Goto “www.skype.com”
2. Select “create an account”
3. Follow the directions and enter the required information like country, username,
password, mobile number etc.
4. Your account has been created, now select “Download Skype”, and then follow the
instruction to install.
5. Enter your User name and password then click “Sign in”
6. The Skype window will appears.

Making Video call in Skype:


1. Select “Contact” tab, and Click the person you want to make video call.
2. The contacts information will open at right side pane, click the “Video Call” button
3. The “Call Window” will open. The footage from your webcam will appear at the
bottom.
The footage from that person’s webcam will appear at the top.
4. At finally, click “End call” button to hang-up.

10. FACEBOOK
Facebook is a social networking website that enables you to connect and share with
your friends and family online. It is originally designed for students. It was created in 2004 by
Mark Zukerberg. By 2006, anyone over the age of 13 with a valid email address could join
Facebook.

Facebook users can


1. Find and add friends.
2. Find and follow companies, entertainers, politicians, and more.
3. Create profiles about their interests, job history, education, religion, politics,
relationship status, location, and favorite music, movies, and companies.
4. Create and share photo albums, videos, photos, and more.
5. Send instant messages and post messages to friends only.
6. Play online games.
7. Find and join groups.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 21


ICT – 2 II Year Semester-IV B.A. Computer Applications

Creating Facebook Account


1. Goto “www.facebook.com” in your browser.
2. For register, click “Sign Up” and enter personal information with desired password,
then click “Sign Up”.
3. In Next step, to find your Facebook friends, enter your email address and click “Find
Friends”. and click “Add Friend” for anyone you want to add as a friend, then click
“Save & continue”, You can also click “Skip this step” to add friends later.
4. If you want, you can add information about High School, College and Employer and
click “Save & continue”. You can also click “Skip” to add information later.
5. If you desired, you can add a profile picture. Click on either “Upload a photo” or “Take
a Photo” and then click “Save & continue”. You can also click “Skip” to add picture
later.
6. The “Welcome to Facebook” page will appears.

Post a message in Facebook:


 You can post a status update on your Facebook homepage by entering text under
“Update Status”
 In the box that asks the question “What’s on your mind?”. Begin typing and “What’s
on your mind?” will disappear.
 Type the message which you want to post and press “Post” button.

11. VIMEO
Vimeo is a video sharing website in which users can upload, share and view videos.
Vimeo was founded in November 2004 by Jake Lodwick and Zach Klein. It was the first video
sharing site to support high definition video (started in October 2007).

Creating Account:
1. Open www.vimeo.com
2. Click on “Join free”
3. Enter the details like First name and Last name, email address and password
4. We can create the account by selecting either “Join with Email” or “Join with
Facebook”
5. Click on “No thanks”
6. The Vimeo homepage will appears.

Uploading a video:
1. Login with Vimeo
2. Click on “Upload a video”
3. Click on “Choose a file to upload”
4. Choose file which you want to upload and then click on “open”
5. The progress of uploading video displayed
6. Finally the videos are displayed on the homepage of your account.

12. GOOGLE+
Google+ (pronounced and sometimes written as Google Plus) is an interest based social
network that is owned and operated by Google. Google+ launched in June 2011. Features
included the ability to post photos and status updates, group different types of relationships
into Circles, a multi person instant messaging, text and video chat called Hangouts.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 22


ICT – 2 II Year Semester-IV B.A. Computer Applications

Creating account
1. Open https://plus.google.com
2. Click on “Join Google+”
3. Click on “More options” and select “create account”. It uses the Google account.
4. Enter the details like first name, last name, email address, password, gender, current
email address and country and click on ”Next Step”
5. Click on “I Agree”
6. Click on “Continue to Google+”
7. Click on “Create Profile” and “Save”
8. The Google+ home page will appears.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 23


ICT – 2 II Year Semester-IV B.A. Computer Applications

Unit – III
Electronic Mail
Definition of E-mail - Advantages and Disadvantages – UserIds, Passwords,
Email Addresses, Domain Names, Mailers, Message Components, Message
Composition, Mail Management, Email Inner Workings

EMAIL
 Electronic mail or e-mail is one of the most commonly used services on the Internet.
 It allows people to send and receive messages to one or more recipients with an email
address.
 Email was invented by Ray Tomlinson in 1972.E-mail system was based on Simple
Mail Transfer Protocol (SMTP), used for sending e-mails from one server to another.

Advantages of Email
1. Speed:
An e-mail is fast, based upon the speed of the communication network.
2. Reliable and secure:
Although the messages are occasionally lost, this is rear. Many mail systems will notify
the sender if an email message was undeliverable.
3. Inexpensive:
Once you are online, the cost of sending a message is low.
4. Printable:
A hard copy is easy to obtain. You can keep an electronic copy of message for your
own records.
5. Global:
Every increasingly people and business all over the world is using email.
6. Generality:
Email is not only limited to text, It is also possible to send graphics, programs and
sounds with an e-mail.
7. Automated e-mails:
It is possible to send automated e-mails using special programs like “autoresponders”
8. Use of graphics:
Colorful greeting cards and interesting pictures can be sent through e-mails.
9. Advertising tool:
Now a days, many individuals and companies are using the e-mail service to advertise
their products, services, etc.

Disadvantages of Email
Apart from several benefits of E-mail, there also exist some disadvantages:
1. Forgery
E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since
sender is usually not authenticated in any way.
2. Overload
Convenience of E-mail may result in a flood of mail.
3. Misdirection
It is possible that you may send e-mail to an unintended recipient
4. Junk

T.ANIL KUMAR, Lecture in Comp.Sci., Page 24


ICT – 2 II Year Semester-IV B.A. Computer Applications

Junk emails are sometimes referred to as ‘spam’. Junk emails are undesirable and
inappropriate emails.
5. No response
It may be frustrating when the recipient does not read the e-mail and respond on a
regular basis.

USERID, PASSWORD, EMAIL ADDRESS OR NAMES AND DOMAIN NAMES


1. Userid
 A unique sequence of characters used to identify a user and allow access to
acomputer network or online account is termed as “userid”.
 It is also called as “user name”, “account name” and “Login ID”.
 A Userid is the code, used by a user to identify himself when logs into a system.

Rules for UserID:


 User IDs must be 7-14 characters
 User IDs must contain at least one letter; numbers are also allowed
 User IDs cannot contain spaces
 No special characters are allowed (such as ! @ # $ % ^ &)
 Underscore( _ ) is allowed but not required
 Do not use your Password as your User ID

2. Password
 To prevent other people from using your account, you are required to have a
password.
 A password is a secret code that authenticates the user to the system.
 A password allows you and only you to access the computer system through your
userid.
Rules for Password:
 Passwords must be 7-14 characters
 Passwords must include at least one letter and one number
 Passwords cannot contain spaces, Semicolons
 Passwords are case-sensitive
 Do not use your User ID as your Password
 If you forget your User ID or Password, you can retrieve them.

3. Email addresses
 Electronic mail must be addressed properly.
 It starts with the mail name of the person, followed by various address components,
ending with the "Top level" domain.
 Email addresses consist of 2 parts: the “User Name” and “Domain Name”, which are
separated by the character "@" (the "at” sign).
 An email address can be up to 255 characters long and contains lowercase letters
,digits and special characters ".","_" and "-" (full stop, underscore, and hyphen)
Syntax:
The basic form of the email address is as follows:
username@hostname.subdomain
Example: bhavitha@accenture.com

T.ANIL KUMAR, Lecture in Comp.Sci., Page 25


ICT – 2 II Year Semester-IV B.A. Computer Applications

This address has top level domain of “com”.The sub domain “Accenture” is a
commercial entity and bhavitha is a user who works at Accenture.

DOMAIN NAMES
 Domain name refers to a group of networks that are under the administrative control
of single entity like a company or organization.
 The DNS was developed to help people remember the computer addresses. The IP
address like 192.168.12.100 is difficult to remember but the DNS is easy to
remember. For example, www.google.com, www.yahoo.com etc.
 Most computers on the internet have domain names. The last part of the domain
name is called the Top-level Domain or Zone and is either 2 or 3 letters long.
 The 3 letter zone indicates the type of organization and 2 letter zones indicates
the country in which the organization that owns the computer located.

There are several domain names available. Some of them are generic while some of
them are country level domain names.

Generic level Domain names are:


Domain Description
Com commercial/Individual
Edu education
Gov government
Mil military
Net network related companies
Int international organizations

Country level domain names are:


Domain Description
In India
US United States
UK united Kingdom

MESSAGE COMPONENTS
The email message contains the following components:
1. Header
2. Greeting
3. Text
4. Signature

1. Header
The top part of the mail is called
header.
A header contains the following:
a) From: Indicates the sender’s
email address.
b) To: Indicates the recipient's
email address.
c) Subject: Indicates the title or
purpose of the email message.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 26


ICT – 2 II Year Semester-IV B.A. Computer Applications

d) Cc (carbon copy): Allows an email address to be send to a large number of people


separated by commas.
e) Bcc (blind carbon copy): This is a Cc, except that the recipient does not see the
list of people in the Bcc field.
2. Greeting
The opening of the actual message is called “Greeting”.
Example: Respected sir, hai friends etc.
3. Text
The main content is called the text of the message.
4. Signature
The final part of the message is known as “Signature”.
Example: yours obediently, yours sincerely etc.

MESSAGE COMPOSITION
The manner of composing a
message may vary from one mail
program to another. However the
basic elements remain same.
1. Open the email client (e.g.
Microsoft Outlook) or if using
webmail open a browser and
enter the webmail address
(e.g. http://www.gmail.com)
and log in.
2. Click 'New' or 'Compose'.
3. In the new message window,
type the e-mail addresses of
the recipients in the To field,
or use the Address book to
select one or more of the
addresses.
4. In the CC field, enter the address of anyone you want to receive a copy of the
message. Type the e-mail address or choose it from the address book.
5. Type the subject of the message.
6. Now type your message in the ‘Body’ field.
7. Finally, click on the Send button to send the mail.

MAILER FEATURES
Most mailers provide functionality for manipulating your mail box contents, composing
messages and saving messages to the disk. A typical mailer will contain a series of buttons
with names such as compose, copy, delete, edit, forward, move, and reply and so on.

Compose, File and Reply buttons:


A Compose button provides following features:
New – Compose a message.
Reply – Reply to the current message.
Forward – Pass the message on.

A File button has the following functionality:

T.ANIL KUMAR, Lecture in Comp.Sci., Page 27


ICT – 2 II Year Semester-IV B.A. Computer Applications

Save – Save the current message into a file on disk.


Insert – Include a file in the body of the message being composed.
Exit – Leave the mailer.
Open – Open a file from the disk.
Attach – Append a file to a message.

A Reply button consists of following items:


To sender
To all
Forward

E-MAIL INNER WORKING


Three mail components are necessary for the email system to work:
1. Mailer
It is also called mail program, mail application or mail client. It allows us to manage,
read and compose e-mail.
2. Mail Server
The mail Server is a computer whose function is to receive, store and deliver the email.
It is must for mail servers to be running all the time because if it crashes or is down,
email can be lost.
3. Mailbox
Mailbox is generally a folder that contains emails and information about them.

Working of Mail
1. The sender composes a message using the email client on their computer.
2. When the user sends the message, the email text and attachments are uploaded to the
SMTP (Simple Mail Transfer Protocol) server as outgoing mail.
3. All outgoing messages wait in the outgoing mail queue while the SMTP server
communicates with the DNS (Domain Name Server) to find out where the recipient’s email
server is located.
4. If the SMTP server finds the recipient’s email server, it will transfer the message and
attachments. If the recipient’s server can’t be found, the sender will get a “Mail Failure”
notification in their inbox.
5. The next time the recipient clicks “Send & Receive,” their email client will download all new
messages from their own email server. You’ve got mail!

EMAIL MANAGEMENT
Email is the second most common method of communication after the telephone and
some people receive hundreds of emails every day. Email messages can be divided into 3
main categories
a. The first category of emails, you may want to keep or delete the messages once you
have read it.
b. The second category might only require an answer
c. The third category could be a task or to-do item.
They are several ways to organize the different types of emails.
1. Check your emails on a planned, regular basis.
2. Read all of the messages on a particular topic or subject before you start
replying.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 28


ICT – 2 II Year Semester-IV B.A. Computer Applications

3. Delete unwanted messages.


It is necessary to delete junk emails and keep your mailbox clean, by deleting
the messages in spam and trash folders.
To delete a message, simply chose the message and click on “delete” button. If
you want to delete one of the messages in a conversation, click the “drop-down arrow”
in the top right corner of the message and select the “Delete this message”
4. Dealing with Spam
Usually, junk emails are automatically sent to your spam folder. Instead of
deleting messages, it is best to report them as Spam. So Gmail knows to filter them in
the future. For this click on “Report Spam”
5. Archiving Messages
Sometimes you want to remove emails from your inbox, but you don’t want
delete them. Gmail allows you to archive message, so they will no longer appear in
your inbox and it is a safer alternative to deleting.
6. Working with Labels
A label allows you to organize your messages and make easier to find. Applying
a label to a message is kind of like putting it into a folder. To create a “label “folder,
click “label” button and click on “create new” and enter the name for label.
7. Search mail
The search mail feature allows you to perform a Google search in your mail.
This means you can find any message even if you don’t remember who sent it or if you
never labeled it.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 29


ICT – 2 II Year Semester-IV B.A. Computer Applications

UNIT – IV
World Wide Web
Web Applications, Web Terminologies, Web Browsers, URL – Components of
URL, Searching WWW – Search Engines and Examples

WORLD WIDE WEB


WWW stands for “World Wide Web” or simply “Web”, is an internet based global
information system that makes available multimedia information around the world.
Web, is a system of interlinked hypertext documents accessed via the Internet. Web
commonly called as World Wide Web, it is abbreviated as WWW.
World Wide Web is an architectural framework for accessing linked documents. These
documents are spread over Internet. The web begins in European Center for Nuclear
Research at CERN in 1989.

History of WWW
Before the World Wide Web, the Internet was very difficult to navigate. The information
on it was tough to find. Locating and downloading files on the Internet needed some UNIX
skills and specialized tools to get the job done.

The concept of WWW was developed at the European Practical Research Centre
(CERN) by Tim Berners Lee in 1989.In 1993, the first graphical interface software package
called “Mosaic” was released.
The Mosaic became so popular that a year later, the author of Mosaic, ”Mark
Andresen” left the Nation Centre for Supercomputing Applications, where Mosaic was
developed forming a company called Netscape Communications Corp. This company
developed the clients, servers and other Web software.
In the year 1994, CERN and MIT of USA decided to setting up the World Wide Web
Consortium. Since, this time hundreds of universities and companies joined in the
Consortium.
In the first year of Mosaic released, the no. of WWW servers grew from 100 to
7000.The growth will be exponential in the year to come and use of internet into every walk of
life of human being.

Web Design and Applications


Web Design and Applications involve the standards for building and Rendering Web
pages, including HTML, CSS, SVG, device APIs, and other technologies for Web
Applications.
1. HTML & CSS
HTML and CSS are basic technologies for creating Web pages: HTML (html and xhtml) for
structure, CSS for style and layout, including Web Fonts.
2. JavaScript Web APIs
Standard APIs for client-side includes for Geolocation and mobile widgets. A “DOM” and
XBL technology allows creating interactive documents through scripting.
3. Graphics

T.ANIL KUMAR, Lecture in Comp.Sci., Page 30


ICT – 2 II Year Semester-IV B.A. Computer Applications

W3C is the home of the widely deployed PNG raster format, SVG vector format, and the
Canvas API. WebCGM is a more specialized format used in the fields of automotive
engineering, aeronautics.
4. Audio and Video
Some of the W3C formats that enable audio and video presentations include HTML, SVG,
and SMIL.
5. Accessibility
W3C’s Web Accessibility Initiative (WAI) has published Web Content Accessibility
Guidelines (WCAG) to help authors create content that is accessible to people with
disabilities.
6. Privacy
The Web is a powerful tool for communications and transactions. It is important to
consider privacy and security implications of the Web as part of technology design.
7. Math on the Web
W3C’s MathML enables mathematics to be served, received, and processed on the World
Wide Web, for other types of content.

WEB TERMINOLOGIES
1. Page/Web Page
A file that can be read over the World Wide Web (or) a document on the WWW
identified by URL.
2. Pages/Web Pages
The global collection of web documents associated with and accessible via the World
Wide Web.
3. Website
A global collection of web pages belonging to particular person or organization.
4. Uniform Resource Locator (URL)
A string of characters that specify the address of a web page (Or) A global Collection of
website address. URL’s are the standard way of locating and retrieving information on
the World Wide Web. They tell to browser what piece of information to retrieve, how to
get to it, and what protocol to use in the process.
5. Web Server
It is a computer connected to the internet which is responsible for storing, retrieving
and distributing some of the web files.
6. Hyperlink
A string of clickable text or clickable graphics that points to another web page or
document.
7. Web Browser
A software application tool that provides an interface between user and internet.
8. Multimedia
The Information which is in the form of graphics, audio, video or movies
9. Hypermedia
Media with links and navigational tools
10. Web Presentation
A collection of associated and hyperlinked web pages
11. Web Master
A person who maintains, creates and manages a web presentation
12. Home page
A web page that is the starting page and acts as an indexed page is home page.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 31


ICT – 2 II Year Semester-IV B.A. Computer Applications

13. Domain name


An internet address which is a character based is called a Domain name. Some most
common domains are com, edu, gov, mil, net, org, and co. Some domain names are
location based also. For Example: au for Australia, ca for Canada, in for India etc.
14. HTML
It stands for Hyper Text Markup Language that facilitates to write web document that can
be interpreted by any web browser
15. DHTML
It stands for Dynamic Hyper Text Markup Language. DHTML refers to Web content that
changes each time it is viewed.
16. WEB SCRIPTING
The process of creating and embedding scripts in a web page is known as web-scripting.
17. SCRIPT
A Script is a list of commands embedded in a web page. Scripts are interpreted and
executed by a certain program or scripting –engine.

WEB BROWSERS
A web browser is an interface that helps a user to access all the content in the Internet
and the hard disk of the computer.
The user can navigate through files, folders and websites with the help of a browser.
When the browser is used for browsing web pages, the pages may contain certain links which
can be opened in a new browser.
Multiple tabs and windows of the same browser can also be opened. There are four
leading web browsers: Explorer, Firefox, Netscape and Safari but there are many others
browsers available.

Types of Browsers:
1. Internet Explorer
Internet Explorer (formerly MicrosoftInternet Explorer, Windows internet explorer) is
developed by Microsoft. This is the most commonly used browser in the universe. This
was introduced in 1995 along with Windows 95 OS and it has passed Netscape
popularity in 1998.The recent version of internet explorer is
2. Google Chrome
This web browser is developed by Google and its beta version was first released on
September 2, 2008 for Microsoft Windows. Today, chrome is known to be one of the
most popular web browsers with its global share of more than 50%.
3. Mozilla Firefox
Mozilla Firefox (simply Firefox) is a new, free and open source web browser derived
from Mozilla Corporation. It is available for windows, Linux and also for Android
versions. It was released in 2004 under the name ‘phoenix’.
4. Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It was first
released as a public beta in January 2003. Safari has very good support for latest
technologies like XHTML, CSS2 etc.

5. Opera
Opera is smaller and faster than most other browsers, yet it is full- featured. It is Fast,
user-friendly, multiple windows, zoom functions, and more. Java and non Java-enabled
versions available.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 32


ICT – 2 II Year Semester-IV B.A. Computer Applications

6. Konqueror
Konqueror is an Open Source web browser with HTML 4, supporting Java applets,
JavaScript, CSS 1, CSS 2, as well as Netscape plug-ins. This works as a file manager
as well as it supports basic file management on local UNIX file systems, from simple
cut/copy and paste operations to advanced remote and local network file browsing.
7. Lynx
Lynx is a fully-featured World Wide Web browser for users on UNIX, VMS, and other
platforms. It does not support graphics, audio and video. Using this browser we can
navigate only text-webpages.

URL and COMPONENTS OF URL


URL stands for Uniform Resource Locator. Actually a URL is a link, which connects you to a
website. It was created in 1994 by Tim Berners-Lee and Marc Andreessen. This is a unique
address for a file that is accessible on the Internet.
The format of an URL is as follows:
http://www.gmail.co.in/login.html.
The first part of a URL specifies the protocol means the method that a computer uses
to access the file.
The next part denotes the host name of the web server. It identifies the name of the
computer where the page resides.
The last part provides the local name (usually file name) uniquely identifying the
specific page.

The URL consists of various components.


1) The scheme name or protocol followed by a colon
A scheme identifies the protocol to be used to access the resource on the Internet. It
can be HTTP (without SSL) or HTTPS (with SSL).For example, http:// or https://
2) A hostname (server name or alternatively an IP address)
a) Ahost name identifies the host that holds the resource. For example,
www.example.com.
b) Host names can also be followed by a port number. For HTTP (Port no. is ) and
HTTPS(Port no. is )
3) A path identifies the specific resource in the host that the web client wants to access.
For Example, /software/htp/cics/index.html.
4) A query string-
The query string is usually a string of name and value pairs; for example,
term=bluebird. Name and value pairs are separated from each other by an ampersand
(&);
For example, term=bluebird&source=browser-search

The scheme and host components of a URL are not defined as case-sensitive, but the path
and query string are case sensitive. Typically, the whole URL is specified in lowercase.

The components of the URL are combined and delimited as follows:


scheme://host: port/path?query
 The scheme is followed by a colon and two forward slashes.
 If a port number is specified, that number follows the host name, separated by a
colon.
 The path name begins with a single forward slash.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 33


ICT – 2 II Year Semester-IV B.A. Computer Applications

 If a query string is specified, it is preceded by a question mark.


Here is an example of an HTTP URL:
http://www.example.com/software/index.html
With a port number specified, the URL is:
http://www.example.com:1030/software/index.html

SEARCHING THE WORLD WIDE WEB (OR) INTERNET


Searching the WWW can be both beneficial and frustrating. This is where search
enginesand web directories come in.
Search engines, such as Google or Yahoo, that store and retrieve relevant website
results based on keywords.
Web directories, such as the Open Directory Project, organize the existing websites
into categories and subcategories.
Recently, search engines such as Google and Yahoo have also been providing
"sponsored links"; that appear on the first few pages of the search results and that are paid for
by advertisers.

Types of Search Engines


1. Crawlers
These types of search engines use a "spider" or a "crawler" to search the Internet.
Crawler-based search engines are good when you have a specific search topic in mind and
can be very efficient in finding relevant information in this situation. Google, AllTheWeb and
AltaVista are examples of crawler search engines.

Advantage:
o They contain a huge amount of pages.
o Ease of use.
o Familiarity. Most people who search the Internet are familiar with Google.
Disadvantages:
o Sometimes, it's just too much information.
o It is easy to trick the crawler.
o Page rank can be manipulated.

2. Directories

T.ANIL KUMAR, Lecture in Comp.Sci., Page 34


ICT – 2 II Year Semester-IV B.A. Computer Applications

Directories are human powered search engines. Human-powered directories are good
when you are interested in a general topic of search. In this situation, a directory can guide
and help you narrow your search and get refined results. Yahoo, LookSmart, Open
Directory Project and the Internet Public Library are examples of directories.

Advantages:
o Each page is reviewed for relevance and content before being included. This means
nomore surprise porn sites.
o Less result sometimes means finding what you need quicker.
Disadvantages:
o Unfamiliar design and format.
o Delay in creation of a website and its inclusion in the directory.
o May have trouble with more obscure searches.

3. Hybrids
Hybrids are a mix of crawlers and directories. Sometimes, you have a choice when you
search whether to search the Web or a directory. Other times, you may receive both human
powered results and crawler results for the same search. In this case, the human results are
usually listed first.Yahoo and MSN Search are examples of hybrid search engines.

4. Meta search engines


Meta search engines are ones that search several other search engines at once and
combines the results into one list. While you get more results with Meta search engines, the
relevancy and quality of the results may sometimes suffer. Dogpile, Mamma, Metacrawler
and Clusty are examples of Meta search engines.

SEARCH ENGINES AND EXAMPLES


A Search Engine is software that searches internet resources such as web pages,
programs, images etc on its database. It helps to locate information on World Wide Web.
User can search for any information by passing query in form of keywords. It then
searches for relevant information in its database and return to the user.

Components of Search Engine:


Generally there are three basic components of a search engine that are:
1.Web Crawler
It is also known as spider or bots. It is a software component that traverses the web to gather
information.
2.Database
All the information on the web is stored in database. It consists of huge web resources.
3.Search Interfaces
This component is an interface between user and the database. It helps the user to search
through the database.

Categories of Search Engines:


There are many search engines available on the web. Some of the popular search engines
are:
Search Engine Description
Google It was originally called BackRub. It is the most popular search

T.ANIL KUMAR, Lecture in Comp.Sci., Page 35


ICT – 2 II Year Semester-IV B.A. Computer Applications

engine globally.
Bing It was launched in 2009 by Microsoft. It is the latest web-based
search engine that also delivers Yahoo’s results.
Ask It was launched in 1996 and was originally known as Ask Jeeves. It
includes support for match, dictionary, and conversation question.
AltaVista It was launched by Digital Equipment Corporation in 1995. Since
2003, it is powered by Yahoo technology.
AOL.Search It is powered by Google.
LYCOS It is top 5 internet portal and 13th largest online property according
to Media Matrix.
Alexa It is subsidiary of Amazon and used for providing website traffic
information.

Google
Google is a web search engine owned by Google Inc., It was originally developed
Larry Page and Sergey Brin in 1997. It is most widely used search engine handling more
than 3 billion searches each day. The main purpose of the Google is to hunt for text, images
or other data in documents offered by web servers.

Yahoo
Yahoo Inc. (also known simply as Yahoo!) is an American multinational technology
company headquartered California. Yahoo was founded by Jerry Yang and David Filo in
January 1994 and was incorporated on March 2, 1995.
It is basically a directory. Yahoo indexes webpages, Usenet and email addresses. It
has 14 categories listed on its homepage. Each of these categories is divided into 7
subcategories. A search box is provided for users to search all of these options.

AltaVista
AltaVista is a search engine established in December 15,1995. It was once one of the
most popular search engines, purchased by Yahoo! in 2003.

AOL
AOL Inc. (originally known as America Online) is an American multinational mass
media corporation based in New York. The company owns and operates websites such as
The ‘Huffington Post’ and ‘TechCrunch’ and spans digital distribution of content, products, and
services, which it offers to consumers, publishers, and advertisers

Ask
Ask.com (originally known as Ask Jeeves) is a question answering-focused e-
business and web search engine founded in 1996 by Garrett Gruener and David Warthen in
Berkeley, California.

Bing
Bing is a web search engine owned and operated by Microsoft. It was launched in
June1, 2009. Bing provides a variety of search services, including web, video, image and
map search products. It uses the ASP.NET programming language.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 36


ICT – 2 II Year Semester-IV B.A. Computer Applications

UNIT – V
BASIC HTML
Basic HTML: Basic HTML – Web Terminology – Structure of a HTML Document –
HTML, Head and Body tags – Semantic and Syntactic Tags – HR, Heading, Font,
Image and Anchor Tags –Different types of Lists using tags – Table Tags,

BASICS OF HTML
HTML:
 HTML stands for Hyper Text Markup Language. It is used to create or display web
pages.
 Most of the documents on the World Wide Web were written in HTML
 HTML is a markup language, not a programming language.
 We can apply this markup language to our pages to display text, images, sound and
movie files, and almost any other type of electronic information
 HTML uses a pre-defined set of tags to identify content types.
HTML TAG:
 Atag is a name or string used to display the content in webpage.
 Tags are defined within “<” and “>” characters. These are called as angle brackets
 HTML tag comes in pairs. i.e., it contains opening or start tag and closing or end tag
 HTML tags are pre-defined tags
 HTML tags are not case sensitive.i.e.,<HEAD>,<head>,<hEaD> are equivalents
 White Spaces, tabs and new lines are ignored by browser
 Some characters are placed in the text by “Escape sequences”.
ATTRIBUTES:
 Attributes are used to provide additional information about html tags.
 The attributes are must specify in starting tag as
“attribute_name = attribute_value “
 The value of the attribute placed within single or double quotes.
 Every html tag contains attributes.

STRUCTURE OF A HTML DOCUMENT


All HTML documents follow the same basic structure.They have the root tag as <html>,
andcontain<head> tag and <body> tag. The <head> tag is used for control information by
the browser and the <body> tag contains the actual information to be displayed on the
screen. The basic structure is as follows:
<html>
<head>
<title>sample page</title>
</head>
<body>
----
----
----
</body>
</html>

<html> tag

T.ANIL KUMAR, Lecture in Comp.Sci., Page 37


ICT – 2 II Year Semester-IV B.A. Computer Applications

It indicates that the file is as HTML file.A basic html document contains opening <html> and
closing </html> tags.

Head Section
It is used to provide general information about the htmldocument. Head section is
represented by <head> tag. It contains opening <head>and closing </head> tags.
The head section contains <title> tag.

<title> tag
It is used to display the content in the title bar of the browser window. It contains opening
<title> and closing </title> tags.

Body Section
It is used to display the content of the document.It is represented by <body> tag. The body
tag contains other HTML tags like <h1> for headings,<p> for paragraphs,<br> for break
element,<hr> for horizontal ruler.

CREATING & RUN A SAMPLE WEB PAGE


Step1: Open any text editor and type html document as follow
<html>
<head>
<title>First html page</title>
</head>
<body>Welcome to the web page</body>
</html>
Step2: Save the html document with any name having “.html” as the extension.
Step3: To execute the html document, open it in any Browser.

HEAD SECTION (OR) HEAD TAG


Head section is used to provide general information about the html document. It is
representing by <head>tag. It contains opening <head> and closing <head> tags. The head
section contains only one tag called title tag (<title>……….</title>).
List of tag's inside <head> tag
1. <title>
It is used to display the content in the title bar of the browser window. It contains
opening <title> and closing </title> tags
Ex: <title>title of the webpage</title>
2. <basefont>
It is used to set all of the text to the default font size, face and color.
Ex: <basefont size=”n” color=”#rrggbb”>………….</basefont>

3. <link>
It is used to links an external file to a document (for example, CSS file).
Ex: <link rel=stylesheet” type=”text/css” href=”path of css”>
4. <meta>
It is used to control the webpage by the browser.
Ex :< meta name=”keywords” content=”c/cpp/java”>
5. <script>
It is used for writing internal css for file, JavaScript code to control our webpages.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 38


ICT – 2 II Year Semester-IV B.A. Computer Applications

Ex: <script type=”text/JavaScript” language=”JavaScript” src=”path”>


……</script>
6. <Style>
It is used for writing internal css file to decorate webpage.
Ex: <style>……………</style>
BODY SECTION (OR) BODY TAG
The body section is used to display actual information on the browser. This section is
representing by <body> tag.
List of tag's inside <body> tag
1. Heading tags:
These tags are used to perform font changes. By default, the heading tagsalign the
text in left side. Thereare six levels of heading tags (like H1, H2, H3, H4, H5 and H6). H1 is
the biggest in heading and H6 is the smallest heading. We can change the alignment of the
headings by using align attribute.
Syntax:
<h1 align=“left”|”center”|”right”>………. </h1>
Example:
<h1 align = “left”>Heading1</h1>
2. Paragraph tag (<p): It is used to display a paragraph. The <p>tag inserts an empty line
before and after the paragraph. By default, the <p> tagaligns the text in left side. We can
change the alignment of the paragraph by using align attribute.
Syntax:
<p align = “left”|”center”|”right”>……..</p>
Example:
<p align = “left”>this is a paragraph</p>

3. Horizontal tag (<hr>):


It is used to display a horizontal line across the web page. Using the <hr>, we can divide the
web page into multiple sections. The <hr> tag is an empty tag
Syntax:
<hr align = “left”|”center”|”right” width = “nn%” color = “#rrggbb” size = “n”>
Example:
<hr width = “75%” align = “center” color = “blue” size = “10”/>

SEMANTIC AND SYNTACTIC TAGS


In HTML, there are 2 types of styles.
1. Semantic based (or) Content based (or) Physical based tags
2. Syntactic based (or) Context based (or) Logical based tags
1. Semantic based styles or tags
Semantic tags are used to indicate the content of the text. These are also called as content
based styles
Ex:<em>, <strong>, <address>, <kbd>, <code>, <cite>, <small>, <big>
1. Emphasis tag - <em>
It is similar to <i> tag, used to display the text in Italics format
Ex: <em>emphasis tag</em>
2. Strong tag - <strong>
It is similar to <b> tag, used to display the text in bold face
Ex: <strong>Strong tag</strong>
3. Address Tag - <address>
T.ANIL KUMAR, Lecture in Comp.Sci., Page 39
ICT – 2 II Year Semester-IV B.A. Computer Applications

The Address tag is used to display an address.(like owner, contact details etc)
Ex: <address>Address tag</address>
4. Keyboard Tag - <kbd>
The Keyboard tag is used to display keyboard input.
Ex: <kbd>Keyboard tag</kbd>
5. Code tag - <code>
The code tag is used to specify a piece of code on a page.
Ex: <code>Code tag</code>
6. Citation tag - <cite>
The citation tag is used to specify a reference.
Ex: <cite>Citation tag</cite>
7. Big tag - <big>
The big tag is used to display a text bigger than the normal text.
Ex: <big> big text</big>
8. Small tag - <small>
The small tag is used to display a text smaller than the normal text.
Ex: <small>small text</small>
2. Syntactic based styles or tags
Syntactic based tags are used to appear the text in different ways on browser.
Ex: <b>,<i>,<u>,<tt>,<sup>,<sub>,<small>,<big>,<center>
1. Bold tag - <b>
This tag is used to display a text in bold face
Ex:<b> Bold tag</b>
2. Italic tag - <i>
This tag is use to display a text in Italics format.
Ex:<i>Italic Tag</i>
3. Underline tag - <u>
This tag is used to underline the text.
Ex:<u>Underline tag</u>
4. Typewriting Text tag - <tt>
This tag is used to display a text in teletype format. i.e., type writing format.
Ex:<tt>Type writer text tag</tt>
5. Subscript tag - <sub>
This tag is used to display a text as subscript.i.e., text will be displayed below the
normal text.
Ex:<sub>subscript tag</sub>
6. Superscript tag - <sup>
This tag is used to display a text as superscript. i.e., the text will be displayed above
the normal text..
Ex:<sup>superscript tag</sup>
9. Center tag - <center>
This tag is used to display a text in the Center of the webpage.
Ex: <center>Welcome</center>

HR, HEADING, FONT, IMAGE, ANCHOR TAGS


1. Horizontal Ruler tag - <hr>
The horizontal tag is used to display a horizontal line across the web page. Using the <hr>,
we can divide the web page into multiple sections.The <hr> tag is an empty tag
Syntax:

T.ANIL KUMAR, Lecture in Comp.Sci., Page 40


ICT – 2 II Year Semester-IV B.A. Computer Applications

<hr align = “left”|”center”|”right” width = “nn%” color = “#rrggbb” size = “n”>


Example:
<hr width = “75%” align = “center” color = “blue” size = “10”>

Attributes of <hr>:
1. Width:
Specifies the length of the Horizontal rule to be displayed in a web page. It can be
specified either in pixels or percentage.
Ex:<hr width = “300”>
<hr width = “75%”>
2. Color:
Specifies the color of the horizontal rule to be displayed in a web page.
Ex:<hr color = “red”>
3. Size:
Specifies the thickness of the horizontal rule to be displayed in a web page.
Ex:<hr size “10”>
4. Align:
Specifies the alignment of the horizontal rule. By default the horizontal rules are aligned
to center.
Ex :< hr align = “center”>

2. Heading tags:
 Heading tags are used to perform font changes.
 By default, heading tags aligns the text on left side.
 There are six levels of heading tags. H1, H2, H3, H4, H5 and H6.
 H1 is the biggest in heading and H6 is the smallest heading.
 We can change the alignment of the headings by using align attributes.
Syntax:
<h1 align=“left”|”center”|”right”>………. </h1>
Example:
<html><body>
<H1 align = “left”>Heading1</H1>
<H2 align = “left”>Heading2</H2>
<H3 align = “center”>Heading3</H3>
<H4 align = “center”>Heading4</H4>
<H5 align = “right”>Heading5</H5>
<H6 align = “right”>Heading6</H6>
</body></html>

3. Font tag
In html, the text can be altered in a number of ways.
a) <basefont> tag:
The <basefont> tag is used to apply font style, color and size for the entire
document.The sizeattribute value ranges from 1 to 7.
Syntax:<basefont size=”n”> ……</basefont>.
b) Font tag - <font>

T.ANIL KUMAR, Lecture in Comp.Sci., Page 41


ICT – 2 II Year Semester-IV B.A. Computer Applications

The font tag is used to apply a specific font style, size, and color to the content within the
tag. The size attribute specifies the size in either relative or absolute. Absolute size
values are ranges from 1 to 7. Relative size values are ranges from +/- 1 to 7.
Syntax:<font size=”+n” | “-n” color=”#rrggbb”>………</font>
Attributes of <font>:
1. Color: This attribute specifies the color of the text to be displayed.
Ex: <font color = “red”> Hello </font>
2. Size: This attribute specifies the font size to be displayed.
Ex: <font size = “10”>Hello</font>
Example:
<html><head> <font size=”7”>Large</font>
<title>Changingfont sizes</title> <font size=”+3”>t</font>
</head> <font size=”+2”>e</font>
<body> <font size=”+1”>x</font>
<h1>Changing font sizes</h1> <font size=”-1”>t</font>
<basefont size=“3”> </basefont>
<p>here, some text with size 3 </body></html>
<p>and here is some

4. Image tag - <img>


 The <img>tag is used to display an imagein the html.
 The <img> tag contains several attributes like src, height, width and alt.A source
and alt are mandatory attributes.
 An <img>tag is an empty tag.
Syntax:
<imgsrc=”URL” height=”n” width=”n” border=”n” align = “top” | “center” | “bottom” >
Attributes of<img>:
1. Src (source): This attribute specifies Address of the image.
2. Border : specifies thickness of the border. By default thickness is ‘zero’ pixels.
3. Width : specifies width of the image to be displayed in html document.
4. Height : specifies Height of the image to be displayed in html document.
5. Alt (alternate text): specifies a text to be displayed on the html document when an
image is not loaded.
Example:
<html><body><p>
<imgsrc = “smile.jpg” border = “2” width = “100” height = “100”
alt = “smile logo” ></p>
</body></html>
5. Anchor Tags - <a>
In html, link is specified by using the anchor (<a>)tag. The <a> tag interconnects two
pages with the help of page address.
Syntax:
<ahref="URL" target=”_self” | “_blank” >some text </a>
Example:
<a href = “image.html” target = “_blank”>click here</a>
Attributes of <a>:

T.ANIL KUMAR, Lecture in Comp.Sci., Page 42


ICT – 2 II Year Semester-IV B.A. Computer Applications

1. href (hyper linking reference): This attribute specifies the URL (address) of the page to
be loaded when the hyperlink is selected.
2. target: This attribute specify where to open the linked document. The default value is “
_self”.

LISTS
In html, the data can be displayed in the form of list also. HTML supports 3 types of lists.
These are
1) Ordered list
2) unordered list
3) Definition list.
1) Ordered List ( <ol> ):
 A list is said to be ordered list, if the items are displayed by using either by digits or by
Alphabets or Roman numbers.
 An ordered list is created by using the <ol> tag and each item starts with List tag <li>.
 By default,digits are used to display the ordered list.
 We can change the display of items using “type” attribute.
TYPE=”1” | ”A” | ”I” | ”a” | ”i”
Syntax: <ol type = “1” | “a” | “A” | “i” | “I” >…………………</ol>
Example: <html><body><h2>UG Courses</h2>
<ol>
<li>B .Com
<li>B.Sc
<li>B.C.A
</ul></body></html>
2)Unordered List (<ul>):
 A list is said to unordered list,ifthe items are displayed with the help of some graphical
symbols(like disc,circle,and square).
 An unordered list is a collection of related items that have no special order or
sequence.
 The unordered list is created by using <ul> tag and each item starts with the list tag
<li>.
 By default, “disc” is used to display unordered list.
 We can change the display of items using “type” attribute.
 By default “disc” is used to display unordered list.
TYPE = “Disc” | “Circle” |“Square”
Syntax: <ul type = “disc | square | circle”>……………</ul>
Example: <html><body><h2>UG Courses</h2>
<ul>
<li>B .Com
<li>B.Sc
<li>B.C.A
<li>B B.A
</ul></body></html>
3) Definition List ( <dl> ):

T.ANIL KUMAR, Lecture in Comp.Sci., Page 43


ICT – 2 II Year Semester-IV B.A. Computer Applications

A list is said to be a definition list if we provide a definition or description to every item.


The definition list is created by using <dl> tag. The <dl> tag contains two parts : <dt>
for terms, and <dd> for the definition of each term.
Example:
<dl>
<dt>HTML</dt>
<dd>HTML stands for Hyper Text Markup Language</dd>
.</dl>

TABLES
Table is one of the most useful HTML constructs. The HTML tables allow us to arrange
data like text, images, links, other tables, etc. intorows and columns of cells. The tables are
created using the <table>tag. Inside <table> tag, the table is written as row-by-row. A table
row is created using <tr>tagand column (or cell) is created using <td>tag.
1. Creating tables
In HTML, the creation of tables begin with the <table> tag and terminate with</table>
tag. Within table, rows are created by<tr> (for table row) tag and columns are created
by<td> (for table data) tag. Then the no. of rows and columns are decided by <tr> and <td>
elements.
Syntax:
<table border=”n”
align=”center” | “left” | “right”
bordercolor=”#rrggbb”
width=”n” | “nn%”
background=”filename”
bgcolor=”#rrggbb”
valign=”top” | “bottom”
cellpadding=”n”
cellspacing=”n”>…………………………..</table>
Attributes of <table>:
1. Border specifies the thickness of the border to be displayed. By default are zero
pixels.
2. Align it is used to align a table in a webpage.
3. Cellpadding specifies the space between cell content and cellborder
4. Cellspacing specifies the space between the cells andb/w the cell border &table
border.
5.Bordercolor specifies the color of the border to be displayed.
6.Bgcolor specifies a bgcolor for the table.
2. Table Row (<tr>)
The <tr> tag is used to create a table row. A table contains number of rows and each table
row is a table element itself with an opening and closing tags.The no. of <tr>tags indicates the
no. of rows in a table.
Syntax:
<tralign=”left” | “center” | “right” valign=”top” | “center” | “bottom”>………….</tr>
3. Table Cell (<td>)

T.ANIL KUMAR, Lecture in Comp.Sci., Page 44


ICT – 2 II Year Semester-IV B.A. Computer Applications

The <td> tag is used to create a column (cell) in a particular rowand display the data in normal
font.The no. of <td> tags indicates the no. of columns in a particular row.
Syntax:
<td align=”left” | “center” | “right” valign=”top” | “center” | “bottom”
colspan=”n” rowspan=”n” >……………………………………….</td>
Where, rowspan is used to merge the cells vertically (i.e. merging rows) and colspan is used
to merge the cells horizontally (i.e. merging columns)

Example:
<htm l><head> <tr>
<title>Table Example</title> <td>Rama</td>
</head> <td>5000</td>
<body> </tr>
<table border="1" cellpadding="5" <tr><td>Bhanu</td>
cellspacing="5"> <td>7000</td>
<tr> </tr>
<th>Nam e</th> </table>
<th>Salary</th> </body>
</tr> </htm l>

Internet
Internet
A global network connecting millions computers. As of 1998, the Internet has more than 100
millionusers worldwide, and that number is growing rapidly. More than 100 countries are
linked intoexchanges of data, news and opinions. Unlike online services, which are centrally
controlled, theInternet is decentralized by design. Each Internet computer, called a host, is
independent. Its operatorscan choose which Internet services to use and which local services
to make available to the global
Internet community. Remarkably, this anarchy by design works exceedingly well. There are a
varietyof ways to access the Internet. Most online services, such as America Online, offer
access to someInternet services. It is also possible to gain access through a commercial
Internet Service Provider(ISP). For most of its existence the Internet was primarily a research
and academic network. Morerecently, commercial enterprises and a vast number of
consumers have come to recognize the Internet'spotential. Today people and businesses
around the world can use the Internet to retrieve information,
communicate and conduct business globally, and access a vast array of services and
resources on-line.

ISP
Short for Internet Service Provider, a company that provides access to the Internet. For a
monthly fee,the service provider gives you a software package, username, password and
access phone number.Equipped with a modem, you can then log on to the Internet and
browse the World Wide Web andUSENET, and send and receive e-mail. In addition to serving
individuals, ISPs also serve largecompanies, providing a direct connection from the
company's networks to the Internet. ISPsthemselves are connected to one another through
Network Access Points (NAPs). ISPs are also called
IAPs (Internet Access Providers).

T.ANIL KUMAR, Lecture in Comp.Sci., Page 45


ICT – 2 II Year Semester-IV B.A. Computer Applications

Browser
Short for Web browser, a software application used to locate and display Web pages. The two
mostpopular browsers are Netscape Navigator and Microsoft Internet Explorer. Both of these
are graphicalbrowsers, which means that they can display graphics as well as text. In
addition, most modernbrowsers can present multimedia information, including sound and
video, though they require plug-insfor some formats.
URL
URLs make it possible to direct both people and software applications to a variety of
information,available from a number of different Internet protocols. Abbreviation of Uniform
Resource Locator,the global address of documents and other resources on the World Wide
Web. The first part of theaddress indicates what protocol to use, and the second part specifies
the IP address or the domain namewhere the resource is located.
protocol://domain_name.organization_type/full-path-of-filehow://where/what As an exercise,
let's look at this file's URL: http://www.netspace.org/users/dwb/urlguide.
html The scheme for this URL is "http" for the HyperText Transfer Protocol. The Internet
address of the machine is "www.netspace.org", and the path to the file is
"users/dwb/wwwauthoring.html". When working with the WWW, most URLs will appear very
similar to this one'soverall structure. Note that when using FTP, HTTP, and Gopher URLs, the
"full-path-of-file" willsometimes end in a slash. This indicates that the URL is pointing not to a
specific file, but a directory.In this case, the server generally returns the "default index" of that
directory. This might be just alisting of the files available within that directory, or a default file
that the server automatically looks forin the directory. With HTTP servers, this default index
file is generally called "index.html", but isfrequently seen as "homepage.html", "home.html",
"welcome.html", or "default.html".

WWW
A system of Internet servers that support specially formatted documents. The documents are
formattedin a language called HTML (HyperText Markup Language) that supports links to
other documents, aswell as graphics, audio, and video files. This means you can jump from
one document to anothersimply by clicking on hot spots. Not all Internet servers are part of
the World Wide Web. Short forWorld Wide Web Consortium, an international consortium of
companies involved with the Internet and
the Web. The W3C was founded in 1994 by Tim Berners-Lee, the original architect of the
World WideWeb. The organization's purpose is to develop open standards so that the Web
evolves in a singledirection rather than being splintered among competing factions. The W3C
is the chief standards bodyfor HTTP and HTML.
http
Short for HyperText Transfer Protocol, the underlying protocol used by the World Wide Web.
HTTPdefines how messages are formatted and transmitted, and what actions Web servers
and browsersshould take in response to various commands. For example, when you enter a
URL in your browser,
this actually sends an HTTP command to the Web server directing it to fetch and transmit
therequested Web page. HTTP is called a stateless protocol because each command is
executedindependently, without any knowledge of the commands that came before it. This is
the main reasonthat it is difficult to implement Web sites that react intelligently to user input.
This shortcoming ofHTTP is being addressed in a number of new technologies, including
ActiveX, Java, JavaScript andcookies. Currently, most Web browsers and servers support
HTTP 1.1. One of the main features of

T.ANIL KUMAR, Lecture in Comp.Sci., Page 46


ICT – 2 II Year Semester-IV B.A. Computer Applications

HTTP 1.1 is that it supports persistent connections. This means that once a browser connects
to a Webserver, it can receive multiple files through the same connection. This should
improve performance byas much as 20%.

hypertext
Hypertext simply means non linear text. A novel or magazine article is an example of linear
textbecause it is meant to be read from beginning to end. Non linear communication is much
harder tocreate because you must allow for the possibility of each reader accessing the
material in a differentorder.

HTML
Short for HyperText Markup Language, the authoring language used to create documents on
the WorldWide Web. Hypertext, for easy navigation among resources (e.g. HyperText Markup
Language orHTML, a standard format for describing the structure of documents for
transmission of hypermediadocuments). HTML documents are ASCII files with embedded
codes for logical markup, format (textstyles, document titles, paragraphs, tables) and
hyperlinks. Hypertext, for easy navigation among
resources (e.g. HyperText Markup Language or HTML, a standard format for describing the
structureof documents for transmission of hypermedia documents). HTML documents are
ASCII files withembedded codes for logical markup, format (text styles, document titles,
paragraphs, tables) andhyperlinks.

markup tags
The components of HTML.

web page
A document on the WWW. Every web page is identified by a unique URL (Uniform
ResourceLocator).

web site
A site (location) on the World Wide Web. Each Web site contains a home page, which is the
firstdocument users see when they enter the site. The site might also contain additional
documents andfiles. Each site is owned and managed by an individual, company or
organization.

home page
The main page of a Web site. Typically, the home page serves as an index or table of
contents to otherdocuments stored at the site.

T.ANIL KUMAR, Lecture in Comp.Sci., Page 47

You might also like