Professional Documents
Culture Documents
Unit-1(Fundamentals of Internet)
Networking Concepts:
1. DEFINITION OF A COMPUTER NETWORK:
A computer network is defined as the interconnection of two or more
computers. It is done to enable the computers to communicate and share
available resources.
2. APPLICATIONS:
i. Sharing of resources such as printers
Switches
Sharing
Connectivity
5. SHARING RESOURCES:
HARDWARE:
A network allows users to share many hardware devices such as printers,
modems, fax machines, CD ROM, players, etc.
SOFTWARE:
Sharing software resources reduces the cost of software installation, saves
space on hard disk.
6. ADVANTAGES OF COMPUTER NETWORK:
Increased speed
Reduced cost
Improved security
Centralized software managements
Electronic mail
Flexible access
7. Disadvantages of Networks:
High cost of installation
Requires time for administration
Failure of server
Cable faults
Data Communication:
Data communication refers to the exchange of data between a source and a
receiver. Data communication is said to be local if communicating devices are
in the same building or a similarly restricted geographical area.
The meanings of source and receiver are very simple. The device that transmits
the data is known as source and the device that receives the transmitted data is
known as receiver.
Data can exist in a variety of forms such as numbers, text, bits and bytes. The
Figure is an illustration of a simple data communication system.
A data communication system may collect data from remote locations through
data transmission circuits, and then outputs processed results to remote
locations.
A data communication system has five components:
· Message: The message is the information to be communicated. A popular
form of information includes text, numbers, pictures, audio and video.
· Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
· Receiver: The receiver is the device that receives the message. It can be a
computer, workstation, telephone handset, television, and so on.
· Transmission Medium: The transmission medium is the physical path by
which a message travels from sender to receiver. Some examples of
transmission media include twisted-pair wire, coaxial cable, fibre-optic cable,
and radio waves.
· Protocol: A protocol is a set of rules that governs data communications. It
represents an agreement between the communication devices. Without a
protocol, two devices may be connected but not communicating.
Types of Networking:
Classification of Area by Their Geography:
NETWORK
It is in between LAN & WAN technology that covers the entire city.
It uses similar technology as LAN.
It can be a single network such as cable TV network, or a measure of
connecting a number of LAN’s o a large network so that resources can be
shared LAN to LAN as well as device to device.
The Internet uses the TCP/IP (Transmission Control Protocol" (TCP) and
the "Internet Protocol" (IP)) developed in 1982 which are set of specifications
and protocols originates from work done at the US-Department of Defence in
the late 1960s. This allows the integration of a large number of different
computers into one single network with highly efficient communication
between them. This way, the user can access information on all kinds of host
computers from a desktop PC, Macintosh, or whatever he/she have available.
The first version of the Internet was built by the DoD in 1969 and
consisted of just 4 computers (Davidson, 1988, p. 2).
1.Communication services
2. Information services.
Internet Addressing:
Because the Internet is a global network of computers each computer connected
to the Internet must have a unique address. Internet addresses are in the form
nnn.nnn.nnn.nnn where nnn must be a number from 0 - 255. This address is
known as an IP address. (IP stands for Internet Protocol)
The picture below illustrates two computers connected to the Internet; your
computer with IP address 1.2.3.4 and another computer with IP address 5.6.7.8.
If you connect to the Internet through an Internet Service Provider (ISP), you
are usually assigned a temporary IP address for the duration of your dial-in
session. If you connect to the Internet from a local area network (LAN) your
computer might have a permanent IP address or it might obtain a temporary one
from a DHCP (Dynamic Host Configuration Protocol) server. In any case, if
you are connected to the Internet, your computer has a unique IP address.
Protocol Stacks and Packets
So your computer is connected to the Internet and has a unique address. How
does it 'talk' to other computers connected to the Internet? An example should
serve here: Let's say your IP address is 1.2.3.4 and you want to send a message
to the computer 5.6.7.8. The message you want to send is "Hello computer
5.6.7.8!". Obviously, the message must be transmitted over whatever kind of
wire connects your computer to the Internet. Let's say you've dialed into your
ISP from home and the message must be transmitted over the phone line.
Therefore the message must be translated from alphabetic text into electronic
signals, transmitted over the Internet, and then translated back into alphabetic
text. How is this accomplished? Through the use of a protocol stack. Every
computer needs one to communicate on the Internet and it is usually built into
the computer's operating system (i.e. Windows, UNIX, etc.).
The protocol stack used on the Internet is referred to as the TCP/IP protocol
stack because of the two major communication protocols used. The TCP/IP
stack looks like this:
Protocol Layer Comments
Application Protocols Layer Protocols specific to applications such
as WWW, e-mail, FTP,
etc.
Transmission Control Protocol TCP directs packets to a specific
Layer application on a computer
using a port number.
Internet Protocol Layer IP directs packets to a specific
computer using an IP address.
Hardware Layer Converts binary packet data to
network signals and back.
(E.g. ethernet network card, modem
for phone lines, etc.)
If we were to follow the path that the message "Hello computer 5.6.7.8!" took
from our computer to the computer with IP address 5.6.7.8, it would happen
something like this:
· The message would start at the top of the protocol stack on your computer and
work it's way downward.
· If the message to be sent is long, each stack layer that the message passes
through may break the message up into smaller chunks of data. This is because
data sent over the Internet (and most computer networks) are sent in
manageable chunks. On the Internet, these chunks of data are known as packets.
· The packets would go through the Application Layer and continue to the TCP
layer. Each packet is assigned a port number. We need to know which program
on the destination computer needs to receive the message because it will be
listening on a specific port.
· After going through the TCP layer, the packets proceed to the IP layer. This is
where each packet receives its destination address, 5.6.7.8.
· Now that our message packets have a port number and an IP address, they are
ready to be sent over the Internet. The hardware layer takes care of turning our
packets containing the alphabetic text of our message into electronic signals and
transmitting them over the phone line.
· On the other end of the phone line your ISP has a direct connection to the
Internet. The ISPs router examines the destination address in each packet and
determines where to send it. Often, the packet's next stop is another router.
· Eventually, the packets reach computer 5.6.7.8. Here, the packets start at the
bottom of the destination computer's TCP/IP stack and work upwards.
· As the packets go upwards through the stack, all routing data that the sending
computer's stack added (such as IP address and port number) is stripped from
the packets.
· When the data reaches the top of the stack, the packets have been re-assembled
into their original form, "Hello computer 5.6.7.8!"
Internet Applications:
1. Search engine:
It can be used to search anything and everything. Most popular
search engines are Google and Yahoo searches.
2. Shopping:Shopping has become easier with the advent of internet. You can
buy or sell online.
3. Communication:This is a major role of the internet. It helps people to
communicate either with the use of social networking websites or through e
mails. Even chatting is a major use of the internet.
4. Job search:
Nowadays, many people search for their jobs online as it is quicker
and there is a larger variety of job vacancies present.
5. Hobbies:
Those who are having certain hobbies can try to improve on it by
reading up on many aspects of their hobby.
7. Studying:
Now right from kinder garden children are exposed to internet and
computers. They find many useful things to learn on the internet (though with
supervision). Upto doctorate level education, people rely on internet for their
education. Online educational books have even reduced the need for a library.
These are only some of the uses of the internet. There are so many more that
will can be listed forever. There are also negative aspects of the internet. But the
onus is on the user to make use of the internet for its benefits and leave all the
negative aspects.
Computer Viruses and its types:
It is a program designed to replicate itself into other files or programs stored on
your device. Viruses can cause programs to operate incorrectly or corrupt a
computer's memory.
3. Multipartite Virus - cross between a file virus and a boot sector virus.
4. Network Virus- uniquely created to quickly spread throughout the local area
network and generally across the Internet as well. Typically moves within
shared resources like drives and folders.
5. Macro Virus
- infects program files that use macros in the program itself, such as
word processors.
6. E-mail Virus
- generally this is a macro virus which multiplies by sending itself to
other contacts in your address book, in hopes they'll activate the virus as well.
Browser and its types:
Web Browsers are software installed on your PC. To access the Web, you need
a web browser, such as Netscape Navigator, Microsoft Internet Explorer or
Mozilla Firefox.
There are four leading web browsers − Explorer, Firefox, Netscape, and Safari,
but there are many others browsers available. You might be interested in
knowing Complete Browser Statistics. Now we will see these browsers in bit
more detail.
Internet Explorer
Internet Explorer (IE) is a product from software giant Microsoft. This is the
most commonly used browser in the universe. This was introduced in 1995
along with Windows 95 launch and it has passed Netscape popularity in 1998.
Google Chrome
This web browser is developed by Google and its beta version was first
released on September 2, 2008 for Microsoft Windows. Today, chrome is
known to be one of the most popular web browser with its global share of more
than 50%.
Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has
grown to be the second most popular browser on the Internet.
Safari
Safari is a web browser developed by Apple Inc. and included in Mac OS X. It
was first released as a public beta in January 2003. Safari has very good
support for latest technologies like XHTML, CSS2 etc.
Opera
Opera is smaller and faster than most other browsers, yet it is full- featured.
Fast, user-friendly, with keyboard interface, multiple windows, zoom
functions, and more. Java and non Java-enabled versions available. Ideal for
newcomers to the Internet, school children, handicap and as a front-end for
CD-Rom and kiosks.
UNIT-2
Understanding URL's
URL - definition URL stands for Uniform Resource Locator. It is the Web
Address of a web page, or some other kind of document, that is available on the
Internet. It is the instruction to your browser regarding the exact location on the
Internet of the page you want to visit.
Some are very short.
o For example; http://www.cnn.com
Some are long and somewhat complicated.
o For example;
http://www.mcsk12.net/admin/tlapages/entry_level_pc_index.htm
The address of an index that contained a link to the page like the one you are
reading now is: http:// www.mcsk12.net/ admin/ tlapages/
entry_level_pc_index.htm
Back - Gently click one time with the left side of your mouse button to go
back to the page that you were looking at before you followed the link to take
you to the current page.
Back history - Gently click one time with the left side of your mouse button
on the down arrow just to the right of the Back button. That brings up a list of
the sites you have visited using this browser window. To avoid clicking the
Back button three times to get back to " Entry Level Computer Skills for
Windows ," slide the mouse pointer down to that entry and click one time with
the button on the left side of your mouse. These entries are in chronological
order with the most recently visited site at the top of the list.
Forward - This button will not be available unless you have used the Back
button at least once. If you have used the back button, and the forward button is
not grayed out, clicking one time on the Forward button will take you to the
page you just left when you clicked on the Back button.
Forward history - Gently click one time with the left side of your mouse button
on the down arrow just to the right of the Forward button. That brings up a list
of the sites you have visited and then used the Back button to return from using
this browser window. To avoid clicking the Forward button three times to get
back to " A tutorial on saving for new users ," slide the mouse pointer down to
that entry and click one time with the button on the left side of your mouse.
These entries are in chronological order with the most recently visited site at the
top of the list.
Stop - Select this button to stop the current download. If you tried to follow a
link and the IE logo in the top right corner of your window is still spinning, the
browser is still trying to complete your request. If too many seconds pass and
you do not get to the page, put the tip of your mouse pointer on the Stop button
and click one time with the left side of your mouse. Try the link again. Often
this allows you to see the page quicker than if you just waited for your first click
on the link to finish.
Refresh - Place the tip of your mouse pointer on the Refresh button and click
one time with the left side of your mouse. This asks for the most recent version
of the page that you are on. There are several reasons for using this button
If you used the stop button before all of the page downloaded, use Refresh to
get a complete page
If you know the page has changed since the last time you visited it, use
Refresh to see the newest version of the page.
If you are on a page which updates frequently (like CNN), use Refresh to see
the most recent information
Home - The page that is displayed when you first launch Internet Explorer is
known as the Home page. No matter how many pages you have visited in your
Internet session, you can instantly get back to that first page by placing the tip
of your mouse pointer on the Home button and clicking one time with the left
side of your mouse.
Favourites - This toolbar button opens a pane of sites on the left side of your
browser window. Placing the tip of your mouse pointer on a listing in the
favourite sites and clicking one time with the left side of your mouse will take
you to that Internet page. An entire page will be devoted to instructions
regarding this feature of Internet Explorer. If you want to get rid of the pane and
see Internet pages full size, click one time on the X in the top right of the
Favourites pane with the left side of your mouse. That closes the Favourites
pane.
There are several different online social networks, but for our purposes, we’ll
focus on the three that tend to be used the most by learning professionals–
Facebook, LinkedIn and Twitter. Each of these networks has its own unique
style, functionality and patterns of usage. You will also find that different
people are active in these different networks.
Blog:
Twitter:
Twitter is known as the real-time, public
microblogging network where news breaks
first. Most users loved it for its iconic 140-
character limit and unfiltered feed that
showed them absolutely everything.
Twitter has changed dramatically over the
years, and today it's criticized a lot for
going the way of looking and functioning
almost exactly like Facebook. Besides
Twitter Card integration, which now
makes it easy to share all sorts of
multimedia content in tweets, you can
expect to see algorithmic timelines coming
to Twitter soon as well.
Facebook combines the personal and the professional. Members can play
games, join groups, share photos, and send each other virtual ―gifts.‖ This is the
network where you’re most likely to see both pictures of someone’s weekend
activities, as well as a link to their online portfolio or professional website.
Many companies are using Facebook as a recruitment tool for Gen Y, while
college and university professors are exploring it’s use for their classes.
Flickr:
Skype is for doing things together, whenever you’re apart. Skype’s text, voice
and video make it simple to share experiences with the people that matter to
you, wherever they are.
With Skype, you can share a story, celebrate a birthday, learn a language, hold a
meeting, work with colleagues – just about anything you need to do together
every day. You can use Skype on whatever works best for you - on your phone
or computer or a TV with Skype on it. It is free to start using Skype - to speak,
see and instant message other people on Skype for example. You can even try
out group video, with the latest version of Skype.
If you pay a little, you can do more things, in more ways, with more people –
like call phones, access WiFi or send texts. You can pay as you go or buy a
subscription, whatever works for you. And in the workplace, this means you can
bring your entire ecosystem of workers, partners and customers together to get
things done. Try Skype out today and start adding your friends, family and
colleagues. They won’t be hard to find; hundreds of millions of people are
already using Skype to do all sorts of things together.
Yelp:
One of the more popular social networking sites that focus on reviewing
businesses and sharing information about them is Yelp.com. Founded in 2004 in
San Francisco, Calif., the Web site is like a large online bulletin board featuring
user-generated content, all geared toward personal reviews based on
experiences at local businesses. Yelp takes a Web 2.0 approach to their sites,
where members run the show as far as sharing, reviewing and communicating is
concerned. Although the company is based out of San Francisco, its set up
online communities in every major city in the United States and can be found in
several other countries, too. Yelp has recently expanded its reach to Canada,
Ireland and the United Kingdom.
When you go to a new restaurant and have a good experience, it's likely that you
won't keep the place a secret. After all, when people enjoy a great meal,
exceptional service or a pleasant atmosphere, they typically make an effort to
tell other people about it. Many of us, particularly city dwellers, are naturally
curious about what's new, popular or just plain good around town, and sharing
with others is one of the easier and more reliable ways of establishing the best
locations. The same goes for many other types of businesses or services --
drivers often recommend a good mechanic to people looking for affordable,
honest work on a car, while someone in need of a new doctor might ask around
for recommendations.
Vimeo:
Members can choose between Vimeo's free service and a number of paid
services aimed at helping organizations control how their videos appear on the
Internet. Vimeo's free services allow members to employ a number of creative
tools in order to enhance videos, add music tracks and pull from Creative
Commons-licensed videos. Vimeo also provides users with a video school to
improve their own video production for long-term personal or financial gain.
Paid services from Vimeo.com include Vimeo Plus, Vimeo PRO and Vimeo for
Business. Vimeo for Business gives users better search engine visibility,
removes third-party advertisements and allows for Drop box integration.
Google+ :
Making its debut in the early summer of 2011, Google+ became the fastest
growing social network the web has ever seen. After failing a couple times
already with Google Buzz and Google Wave, the search giant finally succeeded
at creating something that stuck... kind of. Nobody really needed another
Facebook clone, so Google+ had always been widely criticized for being a
social network that nobody really used. In late 2015, a brand new Google+ was
rolled out to put more emphasis on its Communities and Collections features to
help differentiate the platform a bit more and give existing users more of what
they wanted.
YouTube:
WhatsApp:
The ability to create a Profile page–this is your main ―home‖ on the network.
Different networks offer varying abilities to personalize your page in terms of
look and feel. They may also differ in terms of the types of information you
would include, such as name, location, education, etc. Facebook, for example,
asks for your relationship status (because it’s more ―social‖), while on
LinkedIn, which is primarily for professional use, does not.
The ability to send public and private messages–In Ning and Facebook, you can
communicate with your connections either by sending a private message or
―writing on their wall.‖ On LinkedIn, you communicate via person-to-person
messages. Ning also provides Forums where members can interact with one
another on specific topics (you’re reading this in one of the Ning forums).
Social media sites like Facebook have become an inevitable part of modern
life. It helps you to connect with your friends instantly and in real time. Users
can interact, reconnect and socialize.
Social media like LinkedIn has become a major resource of employment.
More than 89% recruitments take place by using Linkedin and company
websites.
140 word tweet contains a world of information. It keeps you informed
about the world and your interest.
Many users’ use social media for time pass but excessive and uncontrolled use
can lead to severe addiction. This is because of the stimulation of pleasure
centre in our brain with social media activity. Though the centre and the
production of dopamine is triggered by other activities as well but its secretion
goes to entirely different level, in online communication and interaction.
Excessive use of Internet can lead to the deterioration in concentration. While
working on social media you constantly keep switching form one task to
another. Your ability to concentrate on one task gets impaired. Such an activity
also tires your brain. Information abundance leads to brain fatigue and stress.
You must have noticed that whenever you start your work or do something over
Internet, the first thing you do is checking your personal profiles especially
Facebook. It actually wastes lots of productive time.
Social media has opened up the possibility of identity theft, data theft, cyber
fraud, hacking and virus attacks. You are left with no privacy if you have
updated your address, phone number, work place, information about your
family on any of the social media sites. We generally add our pictures of day to
day life on Facebook. One has to be very cautious while doing so as the pictures
and other information can be misused the bad elements of the society.
One has to be very careful while using social media because it may put you in
danger and odd situation. Two girls in Mumbai were arrested for putting a
question on Facebook regarding the shutdown in the city for Shiv Sena patriarch
Bal Thackeray's funeral. The girls were sent to 14-day judicial custody but
granted bail after furnishing personal bonds.
Air India cabin crew members Mayank Mohan Sharma and KVJ Rao were
arrested for sharing rude jokes about politicians, making derogatory comments
against I and disrespecting national flag in comments.
Not only in India but such examples are available all across the world. Jake
Newsome was jailed for six weeks for Facebook comments he made about
murdered school teacher in West Yorkshire.
UNIT-3
E-Mail:
Short for electronic mail, e-mail or email is information stored on a computer
that is exchanged between two users. More plainly, e-mail is a message that
may contain text, files, images or other attachments sent through a network to a
specified individual or group of individuals. Email was born in 1971 when a
computer engineer began using the @ symbol to designate which computer a
message should go to. At its core, an email is simply a text message from one
user to another. Advancing technology has added extra features along the way
of course like image and file attachments, links and embedded maps. E-mail can
be distributed to lists of people as well as to individuals. When you send and
receive email, you use an email client which allows you to create and interact
with emails from other computer users. Your email client can be web-based,
meaning you check it through your web browser (examples include Hotmail,
Gmail, or Yahoo Mail) or it can be an application on your computer (like
Outlook, Thunderbird or Mail).
HOW DOES EMAIL WORK?
To send or receive email you have to access what is formally called an "email
client." You may know some well-known email clients by their more familiar
name such as Outlook, Gmail or AOL Mail.
Step 2: User presses send and the message along with any attachments are
uploaded to what is called a "Mail Server" (POP3, SMTP) where it gets in line
as outgoing mail.
Step 3: The mail server then communicates with a Domain Name Server
(DNS) which serves as a virtual directory to find which mail server your
recipient is using. Once the mail server is located, the text and attachments of
your message are transferred to the recipient's mail server.
Step 4: The next time the recipient accesses his email client, it will download
your message from the mail server and be viewable.
Email is based around the use of electronic mailboxes. When an email is sent,
the message is routed from server to server, all the way to the recipient's email
server. More precisely, the message is sent to the mail server tasked with
transporting emails, called the MTA (Mail Transport Agent) to the recipient's
MTA. On the Internet, MTAs communicate with one another using the protocol
SMTP, and so are logically called SMTP servers (or sometimes outgoing mail
servers).
The recipient's MTA then delivers the email to the incoming mail server (called
the MDA (Mail Delivery Agent), which stores the email as it waits for the user
to accept it. There are two main protocols used for retrieving email on an MDA:
POP3 (Post Office Protocol), the older of the two, which is used for
retrieving email and, in certain cases, leaving a copy of it on the
server.
IMAP (Internet Message Access Protocol), which is used for
coordinating the status of emails (read, deleted, moved) across multiple
email clients. With IMAP, a copy of every message is saved on the
server, so that this synchronization task can be completed.
ADVANTAGES OF E-MAIL:
(i) Emails are easy to use. You can organize your daily correspondence, send
and receive electronic messages and save them on computers.
(ii) Emails are fast. They are delivered at once around the world. No other
form of written communication is as fast as an email.
(iii) The language used in emails is simple and informal.
(iv) When you reply to an email you can attach the original message so
that when you answer the recipient knows what you are talking about.
This is important if you get hundreds of emails a day.
(v) It is possible to send automated emails with a certain text. In such a way
it is possible to tell the sender that you are on vacation. These emails are
called auto responders.
(vi) Emails do not use paper. They are environment friendly and save a
lot of trees from being cut down.
(vii) Emails can also have pictures in them. You can send birthday cards
or newsletters as emails.
(viii) Products can be advertised with emails. Companies can reach A lot
of people and inform them in a short time.
DISADVANTAGES OF E-MAILS:
(i) Emails may carry viruses. These are small programs that harm your
computer system. They can read out your email address book and send
themselves to a number of people around the world.
(ii) Many people send unwanted emails to others. These are called spam
mails. It takes a lot of time to filter out the unwanted emails from those that
are really important.
(iii)Emails cannot really be used for official business documents. They may
be lost and you cannot sign them.
(iv)Your mailbox may get flooded with emails after a certain time so you
have to empty it from time to time.
There are several rules that an e-mail address must follow to be valid:
1. As mentioned earlier, an e-mail must have a username followed by an
@ (at sign) which is followed by the domain name with a domain suffix.
2. The username cannot be longer than 64 characters long and the domain
name cannot be longer than 254 characters.
3. There should be only one @ sign in an e-mail address.
4. The space and special characters: ( ), : ; < > \ [ ] are allowed.
Occasionally, a space, backslash and quotation mark work but must be
preceded with a forward slash. Although valid, some e-mail providers
do not allow these characters.
5. The username and e-mail addresses as a whole cannot begin or end with
a period. The e-mail must not have two or more consecutive periods.
User ID is something that user put in order to get in that certain site. Email
is something like an address, that somebody can send an email. In most part,
when user log-in to user email, user email address serves as user's User ID and
password together. In other word, the user id will allow user to enter to email.
In the digital world, a username identifies who you are, while your email
address shows both who (your username) and where you are (the rest of your
email address or domain name).
DOMAIN NAMES
Domain names are used to identify one or more IP addresses. Domain
names are used in URLs to identify particular Web pages. For example, in the
URL http://www.pcwebopedia.com/index.html, the domain name is
pcwebopedia.com.
Every domain name has a suffix that indicates which top level domain
(TLD) it belongs to. There are only a limited number of such domains. For
example:
gov - Government agencies
edu - Educational institutions
org - organisations(non profit)
mil - Military
com - commemial business
net - Network organizations
ca - Canada
th - Thailand
Email working follows the client server approach. Here, client is the
mailer i.e. the mail application or mail program and server is a device that
manages emails. Following the basic steps involved in inner workings of email
system:
Suppose person A wants to send an email message to person B.
Person A composes the messages using a mailer program i.e. mail client
and then select Send option.
The message is routed to Simple Mail Transfer Protocol to person B's
mail server.
The mail server stores the email message on disk in an area ,designated
for person B
The disk space area on mail server is called mail spool.
Now, suppose person B is running a POP client and knows how to
communicate with B's mail server.
It will periodically poll the POP server to check if any new email has
arrived for B. As in this case, person B has sent an email for person B, so
email is forwarded over the network to B's PC. This is message is now
stored on person B's PC.
The following diagram gives pictorial representation of the steps
discussed above:
UNIT-IV
WWW
The Web or World Wide Web is basically a system of Internet servers that
support specially formatted documents. The documents are formatted in a
markup language called HTML (Hyper Text Markup Language) that supports
links to other documents, as well as graphics, audio and video files. Users can
jump from one document to another simply by clicking on hot spots. User never
needs to know where the information is located or to learn any obscure
commands to access it. A WWW hypertext document is usually called a web
page. An operation on the WWW is based on a client/server model.
WEB APPLICATIONS
In computing, a web application or web app is a client—server software
application which the client (or user interface) runs in a web browser. These
applications use web documents written in a standard format such as HTML and
JavaScript, which are supported by a variety of web browsers. Web applications
are computer programs allowing website visitors to submit and retrieve data
to/from .a database over the Internet using their preferred web browser. The
data is then presented to the user within their browser as information is
generated dynamically (in a specific format, e.g. in HTML using CSS) by the
web application through a web server.
Web applications can be considered as a specific variant of client—server
software where the client software is downloaded to the client machine when
visiting the relevant web page, using standard procedures such as HTTP.
Client web software updates may happen each time the web page is visited.
During the session, the web browser interprets and displays the pages, and acts
as the universal client for any web application. Common web applications
include webmail, online retail sales, online auctions, wikis, instant messaging
services etc.
WEB TERMINOLOGIES
Internet
A world-wide grid of inter-linked (networked) computers.
Intranet
A closed network of inter-linked computers. Often using the same technologies
as the Internet. Used by organisations for sharing internal information.
Domain
A group of computers and devices on a network.
Domain name
WWW
World Wide Web or simply Web. A subset of the Internet, which uses a
combination of text, graphics, audio and video (multimedia) to provide
information on most every subject imaginable.
WEB BROWSERS
A web browser is a computer application that allows you to view 'pages
of information -available on the WWW. These pages can be linked together
allowing you to follow ideas or routes in a non-linear way.
A browser is used for displaying HTML files. These files were designed
for use on the Internet but can be stored 'locally' on your computer's hard disk
or on a floppy disk. The two most popular browsers are Netscape navigator
and Microsoft's Internet Explorer.
Web pages (often grouped together as Web Sites) each have their own
address. These addresses are published in all sorts of places such as adverts,
articles in the media and on the letterheads of people or organizations that
write to you. You can find Web pages by using Search engines, which are
introduced later.
(iv) A filename: The filename is the name of the Web page being requested
by the browser.
The scheme and host components of a URL are not defined as case-
sensitive, but the path and query string are case-sensitive. Typically, the whole
URL is specified in lowercase. The components of the URL are combined and
delimited as follows:
scheme://host:port/path?query
The scheme is followed by a colon and two forward slashes.
If a port number is specified, that number follows the host name, separated
by a colon.
The path name begins with a single forward slash.
If a query string is specified, it is preceded by a question mark.
SEARCHING WWW
Search engines allow people to access online information on the Web. As
such. search engines provide great benefits to individuals, organizations, and
society. There are two reasons why most people log on to the internet. One is
for communication and the secondly it is to search for information on relevant
products and services offered by various businesses. The popular search engines
include Yahoo and Google. The information that is updated into the websites is
beneficial to both the site owner and the visitors. Visitors need to log on a
certain keyword in the search engines like Yahoo. Google or Bing and an entire
list of relevant websites pertaining to that keyword will appear. The site owner
on the other hand has an opportunity to provide useful information to the
visitors. The most important part being that they get to promote their products
and services online.
search engines are
Google
Bing
Yahoo