Вы находитесь на странице: 1из 10

1. Differentiate between WWW, Hypertext and Hypermedia ?

Answer : The term World Wide Web (WWW) refers to the collection of
public Web sites connected to the Internet worldwide, together with
the client devices such as computers and cell phones that access its content.
For many years it has become known simply as "the Web."

Origination and Early Development of the World Wide Web:

Researcher Tim Berners-Lee led the development of the World Wide Web in
the late 1980s and early 1990s.

He helped build prototypes of the original core Web technologies and coined
the term "WWW." Web sites and Web browsing exploded in popularity
during the mid-1990s and continue to be a key usage of the Internet today

About Web Technologies:

The WWW is just one of many applications of the Internet and computer
networks. It is based on these three core technologies:

 HTML - Hypertext Markup Language. HTML originally supported


only text documents, but with enhancements during the 1990s grew
capable of handling frames, style sheets and plugins for general
purpose Web site content publishing.
 HTTP - Hypertext Transfer Protocol. HTTP finally made it to
version 2.0 after 20 years, indicative of how well the protocol
accommodated the Web's growth.
 Web servers and Web browsers. The original Netscape has given
way to many other browser applications, but the same concepts of
client-server communication still apply.

Although some people use the two terms interchangeably, the Web is built
on top of the Internet and is not the Internet itself. Examples of popular
applications of the Internet separate from the Web include

 email
 Peer to Peer (P2P) networks like BitTorrent
 TOR and other Dark Web (darknet) systems
Hypertext : Hypertext is a special type of database system, invented by
Ted Nelson in the 1960s, in which objects (text, pictures, music, programs,
and so on) can be creatively linked to each other. When you select an object,
you can see all the other objects that are linked to it. You can move from
one object to another even though they might have very different forms. For
example, while reading a document about Mozart, you might click on the
phrase Violin Concert in A Major, which could display the written score or
perhaps even invoke a recording of the concert. Clicking on the
name Mozart might cause various illustrations of Mozart to appear on
the screen. The icons that you select to view associated objects are
called Hypertext link or buttons.

Hypermedia:

Hypermedia is an extension to what is known as hypertext, or the ability


to open new Web pages by clicking text links on a Web browser.
Hypermedia extends upon this by allowing the user to click images, movies,
graphics and other media apart from text to create a nonlinear network of
information. The term was coined by Fred Nelson in 1965.
Hypermedia allows links to be embedded in multimedia elements like
images and videos. You can tell if something is hypermedia by hovering the
mouse cursor over the image or video - if the element is hypermedia, the
cursor changes, usually into a small hand.

Although the Internet is the best example of the use of hypermedia, there is a
lot of software that makes use of both hypermedia and hypertext. A lot of
word processing, spreadsheet and presentation software like Microsoft
Office allow hypermedia and hypertext to be embedded into the documents
created. For example, in Microsoft Word, users can add hyperlinks to any
word and even add links to pictures. Microsoft PowerPoint has the same
feature for hypermedia.
2.Write a note on URL, explain ?

Answer:

A URL (Uniform Resource Locator) is a form of URI and is a


standardized naming convention for addressing documents accessible over
the Internet and Intranet. An example of a URL is
http://www.computerhope.com, which is the URL for the Computer Hope
website.
URL strings consist of three parts (substrings):

1. protocol designation
2. host name or address
3. file or resource location

These substrings are separated by special characters as follows:

URL Protocol Substrings:

The 'protocol' substring defines a network protocol to be used to access a


resource. These strings are short names followed by the three characters '://'
(a simple naming convention to denote a protocol definition). Typical URL
protocols include HTTP (http://), FTP (ftp://), and email (mailto://).

URL Host Substrings:

The 'host' substring identifies a destination computer or other network


device. Hosts come from standard Internet databases such as DNS and can
be names or IP addresses. The host names of many Web sites refer to not just
a single computer but rather groups of Web servers.

URL Location Substrings:


The 'location' substring contains a path to one specific network resource on
the host. Resources are normally located in a host directory or folder. For
example, some Web sites may have a resource like /2016/September/word-
of-the-day-04.htm to organize content by dates.
3. Explain the technique for instant message and internet chat ?

Answer:

Instant messaging, often shortened to simply "IM" or "IMing," is the


exchange of text messages through a software application in real-time.
Generally included in the IM software is the ability to easily see whether a
chosen friend, co-worker or "buddy" is online and connected through the
selected service. Instant messaging differs from ordinary e-mail in the
immediacy of the message exchange and also makes a continued exchange
simpler than sending e-mail back and forth. Most exchanges are text-only,
though popular services, such as AOL, MSN Messenger, Yahoo! Messenger
and Apple's iChat now allow voice messaging, file sharing and even video
chat when both users have cameras.

For IMing to work, both users must be online at the same time and the
intended recipient must be willing to accept instant messages, as it is
possible to configure the IM client to reject chat sessions. An attempt to send
an IM to someone who is not online, or who is not willing to accept IMs,
will result in notification that the transmission cannot be completed. If the
online software is set to accept IMs, it alerts the recipient with a distinctive
sound, a window that indicates that an IM has arrived and allowing the
recipient to accept or reject it, or a window containing the incoming
message.

In the past, both users had to be using the same software. Many current
clients, however, allow interoperability between networks, including
Microsoft's recently developed Live Messenger.
4. Discuss two protocols used for transmitting data securely over the World
Wide Web ?

Answer:

SMTP and Electronic Mail

Another commonly used Internet service is electronic mail. E-mail uses an


application level protocol called Simple Mail Transfer Protocol or SMTP.
SMTP is also a text based protocol, but unlike HTTP, SMTP is connection
oriented. SMTP is also more complicated than HTTP. There are many more
commands and considerations in SMTP than there are in HTTP.
When you open your mail client to read your e-mail, this is what typically
happens:

1. The mail client (Netscape Mail, Lotus Notes, Microsoft Outlook, etc.)
opens a connection to it's default mail server. The mail server's IP address or
domain name is typically setup when the mail client is installed.
2. The mail server will always transmit the first message to identify itself.
3. The client will send an SMTP HELO command to which the server will
respond with a 250 OK message.
4. Depending on whether the client is checking mail, sending mail, etc. the
appropriate SMTP commands will be sent to the server, which will respond
accordingly.
5. This request/response transaction will continue until the client sends an
SMTP QUIT command. The server will then say goodbye and the
connection will be closed.
6. A simple 'conversation' between an SMTP client and SMTP server is
shown below. R: denotes messages sent by the server (receiver) and S:
denotes messages sent by the client (sender).
5. Distinguish between buffering and caching ?

Answer:

Buffering is the process of holding data in a region of the memory until the
data is transported from one place to another. This region of memory that
holds the data is called a buffer. Buffering is used when there is a difference
between the speed in which the data is received and the speed in which the
data is processed. Even though buffering can be implemented using
hardware buffers or software buffers, most widely used are the software
buffers. Buffering is widely used in printer spooler, online video streaming
and telecommunication (when transferring data from one device to another).
Most of the time, buffering is done by writing data in to a queue in one
speed and reading the data from the queue in another speed.

Caching is the process of storing data in a separate place (called the cache)
such that they could be accessed faster if the same data is requested in the
future. When some data is requested, the cache is first checked to see
whether it contains that data. If data is already in the cache, it is called a
cache hit. Then the data can be retrieved from the cache, which is much
faster than retrieving it from the original storage location. If the requested
data is not in the cache, it is called a cache miss. Then the data needs to be
fetched from the original storage location, which would take a longer time.
Caching is used in different places. In the CPU, caching is used to improve
the performance by reducing the time taken to get data from the main
memory. In web browsers, web caching is used to store responses from
previous visits to web sites, in order to make the next visits faster.
6. Differentiate between Telnet and FTP ?

Answer:

The main difference between FTP and Telnet is that FTP is used when
transferring files from one computer to another, while Telnet allows users to
remotely log in to another computer, and once logged in, users can issue
commands remotely. Both FTP (file transfer protocol) and Telnet are protocols
that enable computers to communicate with each other.

1. It is possible to use FTP with a dedicated application, a command line and a


majority of web browsers, while Telnet is confined to a command line.

2. There are secure ways to utilize FTP (SSH File Transfer protocol), but Telnet
will always be unsecure.

3. FTP is widely used to upload files to Web servers; however, Telnet is mostly
used to diagnose network services.

4. FTP systems are usually encoded and transmit data in binary sets, thus
enabling faster data transfer. In Telnet, the communication is non-coded.

5. Aside from the fact that they are both communication protocols, Telnet and
FTP are both two-way systems. FTP can be used to upload files from clients to
servers and also to transfer files from servers to clients. Telnet can be used to
transfer files between two computers.

Open-source FTP applications like FileZilla are used to upload web files to web
servers.
6. Discuss different types of Wabpages?

Answer: there are 5 types of webpages,

1. Advocacy:

An advocacy webpage is one sponsored by an organization to influence


opinion. The URL address of this type of page frequently ends in .org.
Examples of advocacy pages: Democratic Party, Green Party, Human Rights
Council, Amnesty International.

2. Business and Marketing:

A business or marketing webpage is one sponsored by a commercial


enterprise that is typically trying to sell or market their services/products.
The URL address frequently ends in .com. Examples of business Webpages
are: Ford Motor Co., Hewlett Packard, Amazon.com.

3. News:

A news webpage is one whose purpose is to provide timely information


about current events and issues. The URL address frequently ends in .com.
For example: San Francisco Chronicle, CNN, MSNBC.

4. Informational:

An information webpage's purpose is to present factual information. This


includes reports, research findings, and general topical information. The
URL address frequently ends with .edu or .gov. For example: San Jose Sate
University, State of California, United States Department of Defense.

5. Personal:

A personal webpage is created by an individual for his/her own personal


need. The URL frequently has a tilde (~) somewhere in the address.
7. How are HTML form and javascript related?

Answer:

A webform, web form or HTML form on a web page allows a user to enter data that is
sent to a server for processing. Forms can resemble paper or database forms because web
users fill out the forms using checkboxes, radio buttons, or text fields. For example,
forms can be used to enter shipping or credit card data to order a product, or can be used
to retrieve search results from a search engine.

1. text input — a simple text box that allows input of a single line of text (an
alternative, password, is used for security purposes, in which the character
typed in are invisible or replaced by symbols such as *)
2. radio — a radio button
3. file — a file select control for uploading a file
4. reset — a reset button that, when activated, tells the browser to restore the
values to their initial values.
5. submit — a button that tells the browser to take action on the form
(typically to send it to a server)
6. textarea — much like the text input field except a textarea allows for
multiple rows of data to be shown and entered
7. select — a drop-down list that displays a list of items a user can select
from
8. The sample image on the right shows most of these elements:
9. a text box asking for your name
10. a pair of radio buttons asking you to pick your sex
11. a select box giving you a list of eye colors to choose from
12. a pair of check boxes to click on if they apply to you
13. a text area to describe your athletic ability
14. a submit button to send it to the server

These basic elements provide most common graphical user interface (GUI)
elements, but not all. For example, there are no equivalents to a combo box,
tree view, or grid view.

Javascript wears many hats. You we use JavaScript to create special effects.
We can use JavaScript to make your HTML pages "smarter" by exploiting
its decision-making capabilities. And we can use JavaScript to enhance
HTML forms. This last application is of particular importance. Of all the
hats JavaScript can wear, its form processing features are among the most
sought and used.
Nothing strikes more fear in the heart of a Web publisher than these three
letters: C-G-I. CGI (which stands for common gateway interface), is a
mechanism for safely transporting data from a client (a browser) to a server.
It is typically used to transfer data from an HTML form to the server.

With JavaScript at our side, you can process simple forms without invoking
the server. And when submitting the form to a CGI program is necessary, we
can have JavaScript take care of all the preliminary requirements, such as
validating input to ensure that the user has dotted every i.

Вам также может понравиться