Академический Документы
Профессиональный Документы
Культура Документы
Answer : The term World Wide Web (WWW) refers to the collection of
public Web sites connected to the Internet worldwide, together with
the client devices such as computers and cell phones that access its content.
For many years it has become known simply as "the Web."
Researcher Tim Berners-Lee led the development of the World Wide Web in
the late 1980s and early 1990s.
He helped build prototypes of the original core Web technologies and coined
the term "WWW." Web sites and Web browsing exploded in popularity
during the mid-1990s and continue to be a key usage of the Internet today
The WWW is just one of many applications of the Internet and computer
networks. It is based on these three core technologies:
Although some people use the two terms interchangeably, the Web is built
on top of the Internet and is not the Internet itself. Examples of popular
applications of the Internet separate from the Web include
email
Peer to Peer (P2P) networks like BitTorrent
TOR and other Dark Web (darknet) systems
Hypertext : Hypertext is a special type of database system, invented by
Ted Nelson in the 1960s, in which objects (text, pictures, music, programs,
and so on) can be creatively linked to each other. When you select an object,
you can see all the other objects that are linked to it. You can move from
one object to another even though they might have very different forms. For
example, while reading a document about Mozart, you might click on the
phrase Violin Concert in A Major, which could display the written score or
perhaps even invoke a recording of the concert. Clicking on the
name Mozart might cause various illustrations of Mozart to appear on
the screen. The icons that you select to view associated objects are
called Hypertext link or buttons.
Hypermedia:
Although the Internet is the best example of the use of hypermedia, there is a
lot of software that makes use of both hypermedia and hypertext. A lot of
word processing, spreadsheet and presentation software like Microsoft
Office allow hypermedia and hypertext to be embedded into the documents
created. For example, in Microsoft Word, users can add hyperlinks to any
word and even add links to pictures. Microsoft PowerPoint has the same
feature for hypermedia.
2.Write a note on URL, explain ?
Answer:
1. protocol designation
2. host name or address
3. file or resource location
Answer:
For IMing to work, both users must be online at the same time and the
intended recipient must be willing to accept instant messages, as it is
possible to configure the IM client to reject chat sessions. An attempt to send
an IM to someone who is not online, or who is not willing to accept IMs,
will result in notification that the transmission cannot be completed. If the
online software is set to accept IMs, it alerts the recipient with a distinctive
sound, a window that indicates that an IM has arrived and allowing the
recipient to accept or reject it, or a window containing the incoming
message.
In the past, both users had to be using the same software. Many current
clients, however, allow interoperability between networks, including
Microsoft's recently developed Live Messenger.
4. Discuss two protocols used for transmitting data securely over the World
Wide Web ?
Answer:
1. The mail client (Netscape Mail, Lotus Notes, Microsoft Outlook, etc.)
opens a connection to it's default mail server. The mail server's IP address or
domain name is typically setup when the mail client is installed.
2. The mail server will always transmit the first message to identify itself.
3. The client will send an SMTP HELO command to which the server will
respond with a 250 OK message.
4. Depending on whether the client is checking mail, sending mail, etc. the
appropriate SMTP commands will be sent to the server, which will respond
accordingly.
5. This request/response transaction will continue until the client sends an
SMTP QUIT command. The server will then say goodbye and the
connection will be closed.
6. A simple 'conversation' between an SMTP client and SMTP server is
shown below. R: denotes messages sent by the server (receiver) and S:
denotes messages sent by the client (sender).
5. Distinguish between buffering and caching ?
Answer:
Buffering is the process of holding data in a region of the memory until the
data is transported from one place to another. This region of memory that
holds the data is called a buffer. Buffering is used when there is a difference
between the speed in which the data is received and the speed in which the
data is processed. Even though buffering can be implemented using
hardware buffers or software buffers, most widely used are the software
buffers. Buffering is widely used in printer spooler, online video streaming
and telecommunication (when transferring data from one device to another).
Most of the time, buffering is done by writing data in to a queue in one
speed and reading the data from the queue in another speed.
Caching is the process of storing data in a separate place (called the cache)
such that they could be accessed faster if the same data is requested in the
future. When some data is requested, the cache is first checked to see
whether it contains that data. If data is already in the cache, it is called a
cache hit. Then the data can be retrieved from the cache, which is much
faster than retrieving it from the original storage location. If the requested
data is not in the cache, it is called a cache miss. Then the data needs to be
fetched from the original storage location, which would take a longer time.
Caching is used in different places. In the CPU, caching is used to improve
the performance by reducing the time taken to get data from the main
memory. In web browsers, web caching is used to store responses from
previous visits to web sites, in order to make the next visits faster.
6. Differentiate between Telnet and FTP ?
Answer:
The main difference between FTP and Telnet is that FTP is used when
transferring files from one computer to another, while Telnet allows users to
remotely log in to another computer, and once logged in, users can issue
commands remotely. Both FTP (file transfer protocol) and Telnet are protocols
that enable computers to communicate with each other.
2. There are secure ways to utilize FTP (SSH File Transfer protocol), but Telnet
will always be unsecure.
3. FTP is widely used to upload files to Web servers; however, Telnet is mostly
used to diagnose network services.
4. FTP systems are usually encoded and transmit data in binary sets, thus
enabling faster data transfer. In Telnet, the communication is non-coded.
5. Aside from the fact that they are both communication protocols, Telnet and
FTP are both two-way systems. FTP can be used to upload files from clients to
servers and also to transfer files from servers to clients. Telnet can be used to
transfer files between two computers.
Open-source FTP applications like FileZilla are used to upload web files to web
servers.
6. Discuss different types of Wabpages?
1. Advocacy:
3. News:
4. Informational:
5. Personal:
Answer:
A webform, web form or HTML form on a web page allows a user to enter data that is
sent to a server for processing. Forms can resemble paper or database forms because web
users fill out the forms using checkboxes, radio buttons, or text fields. For example,
forms can be used to enter shipping or credit card data to order a product, or can be used
to retrieve search results from a search engine.
1. text input — a simple text box that allows input of a single line of text (an
alternative, password, is used for security purposes, in which the character
typed in are invisible or replaced by symbols such as *)
2. radio — a radio button
3. file — a file select control for uploading a file
4. reset — a reset button that, when activated, tells the browser to restore the
values to their initial values.
5. submit — a button that tells the browser to take action on the form
(typically to send it to a server)
6. textarea — much like the text input field except a textarea allows for
multiple rows of data to be shown and entered
7. select — a drop-down list that displays a list of items a user can select
from
8. The sample image on the right shows most of these elements:
9. a text box asking for your name
10. a pair of radio buttons asking you to pick your sex
11. a select box giving you a list of eye colors to choose from
12. a pair of check boxes to click on if they apply to you
13. a text area to describe your athletic ability
14. a submit button to send it to the server
These basic elements provide most common graphical user interface (GUI)
elements, but not all. For example, there are no equivalents to a combo box,
tree view, or grid view.
Javascript wears many hats. You we use JavaScript to create special effects.
We can use JavaScript to make your HTML pages "smarter" by exploiting
its decision-making capabilities. And we can use JavaScript to enhance
HTML forms. This last application is of particular importance. Of all the
hats JavaScript can wear, its form processing features are among the most
sought and used.
Nothing strikes more fear in the heart of a Web publisher than these three
letters: C-G-I. CGI (which stands for common gateway interface), is a
mechanism for safely transporting data from a client (a browser) to a server.
It is typically used to transfer data from an HTML form to the server.
With JavaScript at our side, you can process simple forms without invoking
the server. And when submitting the form to a CGI program is necessary, we
can have JavaScript take care of all the preliminary requirements, such as
validating input to ensure that the user has dotted every i.