Академический Документы
Профессиональный Документы
Культура Документы
http is hyper text transfer protocol which is responsible for transmitting and receiving
information across the Internet where as https is secure http, which is used exchanging
confidential information with a server, which needs to be secured in order to prevent
unauthorized access.
https, or secure http, was developed by Netscape corporation to allow authorization and secured
transactions. the default port for http is 80 and https is 443.Https is used in many situations, such
as log-in pages for banking, forms, corporate log ons, and other applications in which data needs
to be secure.
A simple exchange between the client machine and Web server goes like this:
1. The client's browser dissects the URL in to a number of separate parts, including address, path
name and protocol.
2. A Domain Name Server (DNS) translates the domain name the user has entered in to its IP
address, a numeric combination that represents the site's true address on the Internet (a domain
name is merely a "front" to make site addresses easier to remember).
3. The browser now determines which protocol (the language client machines use to
communicate with servers) should be used. Examples of protocols include FTP, or File Transfer
Protocol, and HTTP, HyperText Transfer Protocol.
4. The server sends a GET request to the Web server to retrieve the address it has been given.
For example, when a user types http://www.example.com/1.jpg, the browser sends a GET 1.jpg
command to example.com and waits for a response. The server now responds to the browser's
requests. It verifies that the given address exists, finds the necessary files, runs the appropriate
scripts, exchanges cookies if necessary, and returns the results back to the browser. If it cannot
locate the file, the server sends an error message to the client.
5. The browser translates the data it has been given in to HTML and displays the results to the
user.
This process is repeated until the client browser leaves the site.
JPEG stands for "Joint Photographic Experts Group".Benefits of jpeg are Small image size,
viewable from the internet , uses millions of colors and is the perfect format for images.
downfalls of jpeg are high compression loss and Every time a JPEG is saved, it loses more and
more of the picture.
GIF images are truly the internet standard for any type of small, simple file. GIF stands for
Graphics Interchange Format. The most common use for a GIF is for menu buttons or icons for a
webpage. The reason being that GIFs are extremely tiny in file s ize and have no complex colors,
so they load almost instantly on any webpage. Benefits of gif are Supported by all web browsers
,Very small file size,Quick to load.Only basic colors can be used. Downfalls of gif are Makes
complex pictures look horrible,No detail allowed in images
A dynamic link library (DLL) is a collection of small programs, any of which can be called when
needed by a larger program that is running in the computer. The advantage of DLL files is that,
because they don't get loaded into random access memory together with the main program, space
is saved in RAM. When and if a DLL file is needed, then it is loaded and run. For example, as
long as a user of Microsoft Word is editing a document, the printer DLL file does not need to be
loaded into RAM. If the user decides to print the document, then the Word application causes the
printer DLL file to be loaded and run.
Exe files can be anything. Almost everything you run on your computer is started by an exe file.
They contain executable code for a computer to run and can do anything.exe runs on its own and
the dll file is linked or referenced to the exe at run time. An EXE can run independently, whereas
DLL will run within an EXE. DLL is an in-process file and EXE is an out-process file. exe use
by End User like-Client
.Dll can not use by End User.
msi file is created by Windows Installer for a silent (unattended) installation. It contains a record
of all the keystrokes required to complete the installation. MSI stands for MicroSoft Installer.
Msi files are windows installer files. MSI files can only be installations. EXE files can be
literally anything that can run on your computer.
7. What is spyware?
Spyware is any software or malware used to spy or track your computer activity. spyware
may come bundled with downloads of free software or come in the form of a cookie via a
website and this spyware may track your internal activity or may steal secret account
usernames and passwords and credit card numbers. Because of the spyware in the system the
system performance may be decreased and also annoying popups may come on ur pc.
Worms are like malware with destructive codes. Worms are able to mutate or replace their
own code by automatically which makes worms very dangerous, difficult to find and hard to
delete. Similar to viruses, worms can spread to other computers by secretly and automatically
emailing themselves to other internet users in your address book.Main difference between
worms and viruses is that a worm will replace your computer files rather than simply
inserting their code into your files so a worm is somewhat difficult to remove when
compared to virus.
9.What is a trojan?
Trojans install themselves secretly onto your computer, most often through your
downloading a simple mail attachment often .avi , .pif, .exe, .jpgMost Trojans are able to
gain complete control over you pc after installation. With this control the the Trojan and the
hacker behind it may change your system settings, delete important files and steal your
passwords and watch your computer activity.
.wav is a older format designed by microsoft to play short snippets of sound on any audio
enabled computer. They are bulky, simple and any computer can play them. for playing these
.wav files no software is not needed. MP3 are good files and compressed when compared to
.wav files. They are easy for uploading. MP3 are for quicker transfer over the internet. it is a
lossy data compression and insignificant data is removed and there by decreasing the file size
to 1/7 of the file size of .wav file. Generally the size of .wav file is 40 to 50 mb.
11. What is a cookie and what are the advantages and disadvantages ?
A message given to a web browser by a web server The browser stores the message in a text file
The message is then sent back to the server each time the browser requests a page from the
server. When you enter a website using cookies, you may be asked to fill out a form providing
such information as your name and interests. This information is packaged into a cookie and sent
to your Web browser which stores it for later use. The next time you go to the same Web site,
your browser will send the cookie to the web server. The server can use this information to
present you with custom Web pages.
The disadvantage of cookies are because the user information is stored in a text file in the
computer so it is easy for any spyware program to track the cookies which were present in the
computer.
Temporary Internet Files is a directory on microsoft windows computer systems. The directory is
used by internet explorer to cache pages on websites visited by the user. This allows such
websites to load quicker the next time they are visited
Each time a user visits a website using Microsoft Internet Explorer, files downloaded with each
web page (including html images cascading style sheets and java scripts ) are saved to the
Temporary Internet Files folder, created a cache of the web page on the local computer's
harddisk. The next time the user visits the cached website, only changed content needs to be
downloaded from the Internet; the unchanged data is available in the cache.
Despite the name 'temporary', the cache of a website remains stored on the hard disk until the
user manually clears the cache. This is often regarded as a privacy issue because anyone with
access to the computer can view the cache.
C:/ documents and settings /user name /local settings / temporary interent files .
A server that sits between a client application such as a web browser and a real server. It
intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards
the request to the real server.
proxy servers are specialized web servers that allow web browsers to receive web pages from
web servers without communicating with them directly. Proxy servers are often used to provide
more secure web access in organizations; the proxy server is allowed to connect to the Internet,
but the individual web browsers are only allowed to "talk" to the proxy server. When there are
many users sharing a single proxy server, the proxy server can also speed up web browsing by
caching popular pages.
17.How do you access or change the username and password of a particular user in windows
operating system?
To create any user in windows operating systems we should go to the computer management tool
which can be opened by going to run and type compmgmt.msc or right click on my computer
and then manage and then go to local users and groups and click users form there create a new
user account and give the password.
A message given to a web browser by a web server The browser stores the message in a text file
The message is then sent back to the server each time the browser requests a page from the
server. The cookie stores all the user information like username, password, and address and all
the information which was given by the user .
Windows editor is nothing but the registry editor which contains all software, hardware and all
system settings and all the configuration information of the computer. We can open registry
editor by going to c:/windows/system32/regedit
Or go to run from start menu and then give regedit.
go to tools option in internet explorer and then select internet options and then go to security tab
and then click internet web content zone and then select custom level and then scroll down to
scripting section and then click disable under active scripting and scripting of java applets and
again click ok.
Go to mycomputer properties and then go to the advanced tab then click the environment
variables and then click new and give the variable name and variable value of the software you
are setting the path.
You cannot simply open up an .EXE like a text file and start editing. If you want to change
something in an EXE file, you may be able to do this by changing its resources with Resource
Tuner. This way, you can change the interface of the program in that EXE file. You may also
want to translate a program to your native language. But you will not be able to modify the
actual code in any way.
Resource Tuner lets you open Windows executable files such as .EXE, .DLL, Device Drivers
(.SYS), OCX Controls, and several others. Once inside, you can change the look of the icons,
cursors, dialogs, buttons, sounds, animations and other elements of the Windows user interface
by editing and replacing resources in the executable files. EXE files are not plain ASCII files that
you can easily edit.
A hex editor (or binary file editor or byte editor) is a type of computer program that allows a user
to manipulate binary (normally non-plain text) computer files. Hex editors that were designed to
edit sector data from floppy or hard disks were sometimes called sector editors or disk editors.
FlexHex is an awesome hex editor program specially designed to help you securely edit binary
files, OLE compound files, logical devices, and physical drives. This is a well designed, rock
solid piece of software, with tons of features and an excellent, easy to use interface.
In many cases, it is desirable or necessary to export data from your MS Access Database to a MS
Excel Spreadsheet format. To get the appropriate data, the data you want on the Excel
spreadsheet, from a table in Access, the first step is to create a query. A query is nothing more
than a command given to the database requesting the information you are asking for
In this database, the table "contacts" is where we are going to query our data. The following
picture shows the Datasheet View of the table Contacts.
To create a query, open the Database Window, shown below. Click on the queries button. This
will show all the queries in the database and two other Create Query selections in the window.
Along the top tool bar there are also three other choices; Open, Design and New. Click the New
button.
You will now be asked a series of questions. The first box to appear will give you five choices.
Highlight the top choice, Design View and click OK. Two boxes will now open. The first one is
the query; the second one is asking which table(s) you wish to use in the query. Where it is
possible to use more than one table in a query, for this example we will only select the Contacts
table. Highlight Contacts and click the Add button, then click the Close button. This will leave
the query window open with a small window representing the table in the upper portion of the
query window.
In the small window that represents the table Contacts, you will see that each column of data is
represented. The lower half of the query window represents the data that the query will "show".
Double click on each of the data points that you will ultimately export to your Excel spreadsheet
and to your Mail M Merge Wizard. Your query should now look like this:
To test the query, press the "!" button on the tool bar. The data from the table will be shown to
you in datasheet view. If the data is correct, this is almost what your spreadsheet will look like.
Save the query as "qry_addbook".
The next step is to build a macro. On your database window, select Macros. Click the New
button on the tool bar. This will open the new macro in Design View. Click on the first Action
Item drop down box. Select OutputTo. The arguments will appear in the bottom half of the form.
Select the following Action Arguments:
For ease of use, it is desirable to create an easy way to run this new macro. A button on a
database's Main Form or Switchboard is a common way to accomplish this. Close the macro
window and open the Main Form or Switchboard of the database.
16. can you open ie4, ie5, ie6, ie7 simultaneously on a single computer ? or how to run
multiple versions of ie on a single computer ?
. Using both Internet Explorer 6 and 7 might be useless to a normal user but very helpful to a
web developer who needs to make sure his or her sites are compatible with different browsers.
To have both IE6 and IE7 version installed on your computer, you need to install the standalone
versions of Internet Explorer. By that I mean there are automatic standalone IE installers that you
can download and install to get different version of Internet Explorer running on your PC in no
time. Here are the two possible download scenarios:
If you have installed IE7 on your computer and would like to install older versions of IE, you
should download the multiple installer. This program can install your choice of standalone IE3
IE4.01 IE5 IE5.5 and IE6.
If you already have Internet Explorer 6 installed and wish to install IE7 while keeping IE7 then
you should download Internet Explorer 7 standalone Installer. Simply download and run the
program and it will automatically install standalone IE7.
The Registry is a database used to store settings and options for the 32 bit versions of Microsoft
Windows including Windows 95, 98, ME and NT/2000. It contains information and settings for
all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to a
Control Panel settings, or File Associations, System Policies, or installed software, the changes
are reflected and stored in the Registry.
The physical files that make up the registry are stored differently depending on your version of
Windows; under Windows 95 & 98 it is contained in two hidden files in your Windows
directory, called USER.DAT and SYSTEM.DAT, for Windows Me there is an additional
CLASSES.DAT file, while under Windows NT/2000 the files are contained seperately in the
%SystemRoot%\System32\Config directory. You can not edit these files directly, you must use a
tool commonly known as a "Registry Editor" to make any changes.
Registry Editor is an advanced tool for viewing and changing settings in your system registry,
which contains information about how your computer runs. Windows stores its configuration
information in a database (the registry) that is organized in a tree format. Although Registry
Editor enables you to inspect and modify the registry, normally you do not need to do so, and
making incorrect changes can break your system. The navigation area of the Registry Editor
displays folders, each of which represents a predefined key on the local computer.
16. what is the difference between web server and web browser ?
A Web browser is a software application that enables a user to display and interact with text,
images, and other information typically located on a web page at a website on the www or a lan .
Text and images on a Web page can contain hyperlinks to other Web pages at the same or
different website. Web browsers allow a user to quickly and easily access information provided
on many Web pages at many websites by traversing these links. Web browsers format html
information for display, so the appearance of a Web page may differ between browsers.
Examples of web browsers are internet explorer, firefox, netscape, opera, safari etc.
A Web Server is a computer on the World Wide Web (connected to the Internet Backbone) that
stores HTML documents that can be retrieved via a Web browser.
A computer that delivers (serves up) Web pages. Every Web server has an IP address and
possibly a domain name. For example, if you enter the URL
http://www.pcwebopedia.com/index.html in your browser, this sends a request to the server
whose domain name is pcwebopedia.com. The server then fetches the page named index.html
and sends it to your browser. Any computer can be turned into a Web server by installing server
software and connecting the machine to the Internet.
Examples of web server softwares are for linux operating system the apache web server is used
and for windows operating sytem internet information server is used.
By freeing disk space, you can improve the performance of your computer. The Disk Cleanup
tool helps you free up space on your hard disk. The utility identifies files that you can safely
delete, and then enables you to choose whether you want to delete some or all of the identified
files.
•
Remove temporary Internet files.
•
Remove downloaded program files (such as Microsoft ActiveX controls and Java
applets).
•
Empty the Recycle Bin.
•
Remove Windows temporary files.
•
Remove optional Windows components that you don't use.
•
Remove installed programs that you no longer use.
Tip: Typically, temporary Internet files take the most amount of space because the browser
caches each page you visit for faster access later.
1 Click Start, point to All Programs, point to Accessories, point to System Tools,
. and then click Disk Cleanup. If several drives are available, you might be
prompted to specify which drive you want to clean.
Disk Cleanup calculates the amount of space you will be able to free.
2 In the Disk Cleanup for dialog box, scroll through the content of the Files to
. delete list.
Choose the files that you want to delete.
3 Clear the check boxes for files that you don't want to delete, and then click OK.
.
4 When prompted to confirm that you want to delete the specified files, click Yes.
.
After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your
computer cleaner and performing better.
Disk fragmentation slows the overall performance of your system. When files are fragmented,
the computer must search the hard disk when the file is opened to piece it back together. The
response time can be significantly longer.
Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your
computer's hard disk so that each occupies a single space on the disk. With your files stored
neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.
When to Run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals, optimally monthly, certain events
warrant running the utility outside of the monthly rule of thumb.
•
You add a large number of files.
•
Your free disk space nears 15 percent.
•
You install new programs or a new version of
Windows.
To use Disk Defragmenter:
1 Click Start, point to All Programs, point to Accessories, point to System Tools,
. and then click Disk Defragmenter.
2 In the Disk Defragmenter dialog box, click the drives that you want to
. defragment, and then click the Analyze button.
After the disk is analyzed, a dialog box appears, letting you know whether you
should defragment the analyzed drives.
Tip: You should analyze a volume before defragmenting it to get an estimate of
how long the defragmentation process will take.
3 To defragment the selected drive or drives, click the Defragment button.
. After the defragmentation is complete, Disk Defragmenter displays the results.
6 To close the Disk Defragmenter utility, click the Close button on the title bar of
. the window.
In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your
computer, you can check the integrity of the files stored on your hard disk by running the Error
Checking utility.
As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk
performance and sometimes make data writing (such as file saving) difficult, or even impossible.
The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to
see whether certain files or folders are misplaced.
If you use your computer daily, you should try to run this utility weekly to help prevent data loss.
Important: Be sure to close all files before running the Error-Checking utility.
2 In the My Computer window, right-click the hard disk you want to search for bad
. sectors, and then click Properties.
5 In the Check Disk dialog box, select the Scan for and attempt recovery of bad
. sectors check box, and then click Start.
In most circumstances, select Scan for and attempt recovery of bad sectors.
Spyware collects personal information without letting you know and without asking for
permission. The information that spyware collects ranges from a list of Web sites that you visit
to usernames and passwords. In addition to privacy concerns, spyware can hamper your
computer's performance.
1. click start then click run and then type sysdm.cpl in the open box
2. click the advanced tab and then click settings under performance
3. click the advanced tab and then use one of the following methods
under processor scheduling
click programs to assign more processor resources to the foreground
program than the background program
click background services to assign equal amounts of processor resources
to all programs.
background program A background program is a program that runs
while the user is working on another task. The computer's
microprocessor assigns fewer resources to background programs than to
foreground programs.
The application log contains events logged by programs. For example, a database
program may record a file error in the application log. Events that are written to the
application log are determined by the developers of the software program.
• Security log
The security log records events such as valid and invalid logon attempts, as well as events
related to resource use, such as the creating, opening, or deleting of files. For example,
when logon auditing is enabled, an event is recorded in the security log each time a user
attempts to log on to the computer. You must be logged on as Administrator or as a
member of the Administrators group in order to turn on, use, and specify which events
are recorded in the security log.
• System log
The system log contains events logged by Windows XP system components. For
example, if a driver fails to load during startup, an event is recorded in the system log.
Windows XP predetermines the events that are logged by system components.
16. difference between internet and www ?
Many people use the terms Internet and World Wide Web (a.k.a. the Web) interchangeably, but
in fact the two terms are not synonymous. The Internet and the Web are two separate but related
things.
The World Wide Web, or simply Web, is a way of accessing information over the medium of the
Internet. It is an information-sharing model that is built on top of the Internet. The Web uses the
HTTP protocol, only one of the languages spoken over the Internet, to transmit data. Web
services, which use HTTP to allow applications to communicate in order to exchange business
logic, use the the Web to share information. The Web also utilizes browsers , such as internet
explorer or netscape to access Web documents called Web pages that are linked to each other via
hyperlinks Web documents also contain graphics, sounds, text and video.
Firefox allows you to surf the Internet safer and faster, and it displays the Internet the way that it
was intended to be. Firefox also gives you more web page viewing space so that you can see
more than you would with other browsers. Firefox gives you more web page space to view more
of a web page without a lot of scrolling, and the text is clearer in Firefox.
Also, since IE comes automatically with most Windows installations, and because most people
lack the [inclination/expertise] to switch to a non-IE browser, ~95% of PC users use IE. So
whenever someone wants to write malicious code (spyware, virus , etc...), they will write it for
the widest installed base.
As a result, many bad things that happen on the 'net don't affect PCs browsing with Firefox. Most
crackers usually find it not worth the hassle to find hidden flaws in 5% of PCs when you can
easilly exploit the many publicly-known security holes in 95% of PCs.
16. difference between application server and web server ?
Web Server serves static HTML pages or gifs, jpegs, etc., and can also run code written in CGI,
JSP etc. A Web server handles the HTTP protocol. Eg of some web server are IIS or apache.
An Application Server is used to run business logic or dynamically generated presentation code.
It can either be .NET based or J2EE based (BEA WebLogic Server, IBM WebSphere, JBoss.
In most cases, the server exposes this business logic through a component API, such as the EJB
(Enterprise JavaBean) component model found on J2EE (Java 2 Platform, Enterprise Edition)
application servers. Moreover, the application server manages its own resources. Such
gate-keeping duties include security, transaction processing, resource pooling, and messaging.
Like a Web server, an application server may also employ various scalability and fault-tolerance
Bottom of Form
When Task Manager is first opened the dialog box shown below appears. It has four tabs. (There
is also a Users tab if you are using Fast User Switching but I prefer to turn this off.) The default
tab "Applications" is a list of the applications that are running in the foreground. These are
programs that you can see on the desktop or on the taskbar and that are not running hidden in the
background.
All the tab windows have information at the bottom showing the number of processes that are
running, how much the CPU is being used, and how much memory resources are committed. The
Applications window also has a button "New Task" in the lower right corner
A common use for Task Manager is to end a program that has become frozen or hung. Select an
application and click the button "End Task". Another way is to right-click on a program entry,
which brings up the context menu shown below. It includes an entry "End Task". There is also
an entry "Go to Process" that will take you to the actual process that is running a selected
program. A new window will open listing all the processes.
Task Manager is a Windows system utility that displays the tasks or processes currently running
on your computer. To open Task Manager, press Ctrl+Alt+Del. The Applcations tab lists the
applications currently running on your computer. A single application may actually consist of
several running processes, and many programs that run in the background are not listed (you can
see icons for some of these programs in the System Tray).
The Processes tab displays a comprehensive list of all the processes currently running on your
computer. This can be very useful for monitoring your system. The process tab displays
information about the processor useage and memory usage of each process. The problem is, how
to identify a process. Below is a list of some processes you may see in Task Managers Processes
list.
"System Idle Process" is basically another name for the time when Windows is doing nothing.
There are hundreds of thousands of processes that run on a computer, so you will definitely find
names of many other processess that are not listed above. For a list of well known processes,
visit www.answersthatwork.com/Tasklist_pages/tasklist.htm. You can also learn about almost
any task by using it's name as a search term in google.
Task Manager can also be used to tweak your system if it's running slow. The Performance tab
displays running graphs of your computers CPU and memory usage. If the CPU usage seems to
be running over 80 percent most of the time, or if the memory usage seems to be running higher
than the total physical memory, you may want to shut down some applications or processes.
On the Process tab, you can identify processes that are consuming a lot of processor time. Click
twice on the CPU column heading to sort the CPU column so the processes hogging the most
CPU time on top. You can sort the "Mem Usage" column the same way.
On the Application tab, if you right click on the name of an application and, in the popup menu
that appears, choose "Go To Process", Task Manager will open the Processes tab and highlight
the process that runs the application. On the Processes tab, if you right-click on the name of a
process, you can choose "SetPriority" and promote the priority of the process you need (or
demote the priority of a different process to free up some resources).
If you go to the Application tab and shut down an application, you will shut down any processes
related to that application. Or, you might choose to shut down a background process that you can
identify. To shut down an application or process, click on it's name in the list to highlight it, then
click on the End Task button.
On the Processes tab, if you right click on the name of a process, you can choose "End Process
Tree" to kill the process and any sub-processes started by the process.