IPT 1-10

Embed Size (px)

Citation preview

  • 7/29/2019 IPT 1-10

    1/6

    Q1. What is email?

    Electronic mail, commonly known as email or e-mail, is a method of exchanging digitalmessages from an author to one or more recipients. Modern email operates across the Internet orother computer networks. Some early email systems required that the author and the recipientboth be online at the same time, in common with instant messaging. Today's email systems arebased on a store-and-forward model. Email servers accept, forward, deliver and store messages.

    Neither the users nor their computers are required to be online simultaneously; they need connectonly briefly, typically to an email server, for as long as it takes to send or receive messages.An email message consists of three components, the message envelope, the message header, andthe message body. The message header contains control information, including, minimally, anoriginator's email address and one or more recipient addresses. Usually descriptive information isalso added, such as a subject header field and a message submission date/time stamp.

    Q2. What is the structure of email?

    The header consists of lines beginning with a keyword followed by a colon (:), followed byinformation on each line. A brief explanation of each field of the header is given below. This headercontains most of the common fields.Received: These lines indicate the route that the email has taken and which systems havehandled it and the times that it was handled.

    Date: The date and time at which the message was sent including time zone.From: The sender. The part in angle brackets is a real electronic mail address. This field may beuser settable, so may not reflect the true sender. In this case, it shows the original sender of themessage.Sender: The sender. This is inserted by some systems if the actual sender is different from thetext in the From: field. This makes email more difficult to forge, although this too can be set by thesender. There are other uses for a sender field. In the example above, the sender is set to the listowner by the mailing list system. This allows error messages to be returned to the list owner ratherthan the original sender of the messageTo: Who the mail is sent to. This may be a list or an individual. However it may bear no relation tothe person that the email is delivered to. Mail systems used a different mechanism for determiningthe recipient of a message.Cc: Addresses of recipients who will also receive copies.Subject: Subject of the message as specified by the sender.

    Message-id: A unique system generated id. This can sometimes be useful in fault tracing ifmultiple copies of a message have been received.Reply-to: Where any reply should be sent to (in preference to any electronic mail address in theFrom: field if present). This may be inserted by the sender, usually when they want replies to go toa central address rather than the address of the system they are using. It is also insertedautomatically by some systems

    Q3 State different protocols of email.

    Basically, a protocol is about a standard method used at each end of a communication channel, inorder to properly transmit information. In order to deal with your email you must use a mail clientto access a mail server. The mail client and mail server can exchange information with each otherusing a variety of protocols.IMAP Protocol:

    IMAP (Internet Message Access Protocol) Is a standard protocol for accessing e-mail from yourlocal server. IMAP is a client/server protocol in which e-mail is received and held for you by yourInternet server. As this requires only a small data transfer this works well even over a slowconnection such as a modem. Only if you request to read a specific email message will it bedownloaded from the server. You can also create and manipulate folders or mailboxes on theserver, delete messages etc.

    POP3 Protocol:

    The POP (Post Office Protocol 3) protocol provides a simple, standardized way for users to accessmailboxes and download messages to their computers.

    When using the POP protocol all your email messages will be downloaded from the mail server to

    your local computer. You can choose to leave copies of your emails on the server as well. Theadvantage is that once your messages are downloaded you can cut the internet connection andread your email at your leisure without incurring further communication costs. On the other hand

  • 7/29/2019 IPT 1-10

    2/6

    you might have transferred a lot of message (including spam or viruses) in which you are not at allinterested at this point.

    SMTP Protocol:

    The SMTP (Simple Mail Transfer Protocol) protocol is used by the Mail Transfer Agent (MTA) todeliver your eMail to the recipient's mail server. The SMTP protocol can only be used to send

    emails, not to receive them. Depending on your network / ISP settings, you may only be able to usethe SMTP protocol under certain conditions (see incoming and outgoing mail servers

    HTTP Protocol:

    The HTTP protocol is not a protocol dedicated for email communications, but it can be used foraccessing your mailbox. Also called web based email, this protocol can be used to compose orretrieve emails from an your account. Hotmail is a good example of using HTTP as an emailprotocol.

    Q4. What is search engine?

    A search engine is a searchable database of Internet files collected by a computer program, calleda crawler, robot, worm, or spider. Indexing is created from the collected files, e.g., title, full text,

    date last modified, URL, language, etc. Results are ranked by relevance; this will vary amongsearch engines.

    In essence, a search engine consists of three components:

    Spider: Program that traverses the Web from link to link, identifying and reading pages Index: Database containing a copy of each Web page or other file gathered by the spider Search and retrieval mechanism: Technology that enables you to search the index and that

    returns results in a relevancy-ranked order

    First, let's look at the search engine scene

    Search engines don't index all the documents on the Web. Far from it. Here are some examples ofthe type of content that usually does not appear in your search engine results:

    Pages behind password-protected sites, such as the research databases and e-journals licensedfor use by libraries and made available only to affiliated users.

    Pages behind a firewall.

    The content of many databases - a vast amount of content on the Web.

    The very latest pages posted to the Web.

    Pages excluded from search spiders by Web server software at the host site, or by a commandwithin the Web page itself.

    Pages that are not linked to other pages, and are therefore missed by a search engine spider asit crawls from one page to the next.

    Many of the activities on the social Web - but this is changing

    Q4(a) What are the types of search engine?Typically there are two main types of search engines. These two types are crawler-based search

    engines and human-powered directories. In fact, these two types of search engines gather theirlistings in radically different ways and therefore are inherently different.Crawler-based search engines, such as Google, AllTheWeb and AltaVista, create theirlistings automatically by using a piece of software to crawl or spider the web and then indexwhat it finds to build the search base. Web page changes can be dynamically caught by crawler-based search engines and will affect how these web pages get listed in the search results.

    Crawler-based search engines are good when you have a specific search topic in mind and can bevery efficient in finding relevant information in this situation. However, when the search topic isgeneral, crawler-base search engines may return hundreds of thousands of irrelevant responses tosimple search requests, including lengthy documents in which your keyword appears only once.

    Human-powered directories, such as the Yahoo directory, Open Directory and LookSmart,depend on human editors to create their listings. Typically, webmasters submit a short descriptionto the directory for their websites, or editors write one for the sites they review, and thesemanually edited descriptions will form the search base. Therefore, changes made to individual webpages will have no effect on how these pages get listed in the search results.

  • 7/29/2019 IPT 1-10

    3/6

    Human-powered directories are good when you are interested in a general topic of search. In thissituation, a directory can guide and help you narrow your search and get refined results. Therefore,search results found in a human-powered directory are usually more relevant to the search topicand more accurate. However, this is not an efficient way to find information when a specific searchtopic is in mind.

    Q5. Write short note on DNS?

    The DNS translates Internet domain and host names to IP addresses. DNS automatically convertsthe names we type in our Web browser address bar to the IP addresses of Web servers hostingthose sites.

    DNS implements a distributed database to store this name and address information for all publichosts on the Internet. DNS assumes IP addresses do not change (are statically assigned rather thandynamically assigned).

    Q6. What is WWW?

    The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists ofall the public Web sites connected to the Internet worldwide, including the client devices (such ascomputers and cell phones) that access Web content. The WWW is just one of many applications ofthe Internet and computer networks.

    The World Web is based on these technologies:HTML - Hypertext Markup LanguageHTTP - Hypertext Transfer ProtocolWeb servers and Web browsersResearcher Tim Berners-Lee led the development of the original World Wide Web in the late 1980sand early 1990s. He helped build prototypes of the above Web technologies and coined the term"WWW." Web sites and Web browsing exploded in popularity during the mid-1990s.

    Q6(a). Explain the working of internet.

    The Internet is the largest computer networkin the world, connecting millions of computers. Anetworkis a group of two or more computer systems linked together.

    There are two types of computer networks:

    Local Area Network (LAN): A LAN is two or more connected computers sharing certain

    resources in a relatively small geographic location (the same building, for example).

    Wide Area Network (WAN): A WAN typically consists of 2 or more LANs. The computers

    are farther apart and are linked by telephone lines, dedicated telephone lines, or radiowaves. The Internet is the largest Wide Area Network (WAN) in existence.

    All computers on the Internet (a wide area network, or WAN) can be lumped into two groups:servers and clients. In a network, clients and servers communicate with one another.

    A server is the common source that :

    Provides shared services (for example, network security measures) with other machines

    .

    Manages resources (for example, one printer many people use) in a network.

    Independent computers connected to a server are called clients. Most likely, our home oroffice computer does not provide services to other computers. Therefore, it is a client.

    Clients run multiple client software applications that perform specific functions.

    For example,

    An email application such as Microsoft Outlook is client software.

  • 7/29/2019 IPT 1-10

    4/6

    Your web browser (such as Internet Explorer or Netscape) is client software.

    Servers and Clients Communicate.

    Our computer (client hardware) is running a web browser such as Internet Explorer (client

    software).

    When we want to surf the web, your browser connects to a remote server and requests a

    web page.

    The remote server (server hardware) runs web server software (server software).

    The web server sends the web page to our computer's web browser.

    Our web browser displays the page.

    Q6(b). Write short note on HTTP.

    HTTP, the Hypertext Transfer Protocol, is the application-level protocol that is used

    to transfer data on the Web. HTTP comprises the rules by which Web browsers and

    servers exchange information. Although most people think of HTTP only in the context

    of the World-Wide Web, it can be, and is, used for other purposes, such as distributed

    object management systems.

    Q6(c). Write short note on HTTPS.

    HTTPS denotes the use of HTTP with SSL (Secure Socket Layer) protocol or its

    successor protocol Transport Layer Security (TLS), a transport-layer protocol. Either of

    these protocols, which use encryption, can be used to create a secure connection

    between two machines. The browser uses SSL or TLS when connecting to a secure part

    of a website indicated by an HTTPS URL, that is, a URL with the prefix https://. Thebrowser then uses HTTP to send and receive requests over this secure connection.

    Q7. What is CSS and what are the types of CSS?CSS is a style sheet language, and is an acronym that stands for, "Cascading Style Sheets". CSS isused to control the presentation and appearance of web pages. The way we do this is by creatingStyle Rules and applying these Style Rules to the HTML page elements.

    There are three types of CSS style declarations.1. Internal (Embedded) Styles

    i. Internal Styles are placed inside the section of a particular web page. ( we use thestyle builder to accomplish this.)

    ii. These Styles can be re-used only for the web page in which they are embedded.iii. Therefore, you would need to create these styles over and over again for each web page you

    wish to style.iv. When using the style builder, Define the style in the Current Page. This will create an

    Internal Style. But, Internal Styles are not ideal.v. An External Style Sheet would be a better choice.vi. Advanced Use of Internal Styles -taking advantage of the cascade may require the use of

    internal styles. however, the main styles are best if placed on an external style sheets.Example:-

    Unlimited 1

  • 7/29/2019 IPT 1-10

    5/6

    #video-gallary{Width:350px;Padding:12px;Margin:15px auto;}

    2. Inline StylesInline Styles cannot be reused at all, period. Inline styles are placed directly inside an HTMLelement in the code. We cannot use the Style Builder to make an Inline Style. Instead, topurposely create an inline style requires you to go into the HTML code and type the style yourself.

    Therefore, the use of Inline Styles should be kept to an absolute minimum. Use Inline Styles onlyas a last resort.Example of an Inline Style:

    The style is embedded inside the HTML element using the style attribute. The above stylecannot be reused at at all. It will only target that one paragraph.

    3. External Styles

    For the most part, we will want to place the majority of our Style Rules on an External Style Sheet.This will allow us to reuse the styles as many times as we would like simply by linking the ExternalStyle Sheet to other web pages.

    It also means we only have to create the Styles one time!

    An External Style Sheet is a separate page which is then linked to the web page. Therefore, thestyles are External to, or outside of, the Web Page.

    Q7(a) What are the benefits of using CSS?

    CSS is beneficial to the designer because of the many controls they have over their web site designand how it will be appear across platforms and browsers.

    Web sites designed in CSS are faster to change and update. Because the coding is reduced thepages are more efficient and require less bandwidth. Cost saving functions like these are causingbusinesses to demand CSS from their designers which is forcing less hold-out designers to convertbecause their clients demand it.

    The main benefit to designers and to companies is that CSS speeds the time it takes to developand update site layouts. Communication is easier among multiple developers because the workflowis standardized.

    All in all, CSS is a development method that every designer will be using in the near future, andone that is very beneficial to everyone involved, from the designer through to the end user.

    Q7(b) Writ short note on Inline Graphics.

    An inline graphic is one that appears within a paragraph of text, in line with the words. You use aninlinemediaobject to place a graphic in a line of text. These elements output the graphic withoutfirst breaking the line before or after the graphic.

    Usually an inline graphic is small, such as an icon illustration, so as to not disrupt the paragraphformat too much. When an inline graphic is taller than the text, however, the text line it is sittingon must be provided extra space to avoid having the graphic intrude into the line of text above it.

    Q8. What is browser? Explain the features available in Microsoft Internet Explorer.Web browser is a software application used to locate, retrieve and also display content on theWorld Wide Web, including Web pages, images, video and other files. As a client/server model,the browser is the client run on a computer that contacts the Web server and requestsinformation. The Web server sends the information back to the Web browser which displays the

    results on the computer or other Internet-enabled device that supports a browser.Some features available in Microsoft Internet Explorer are:(a) It supports both standard and nonstandard extensions.

  • 7/29/2019 IPT 1-10

    6/6

    (b)Favicon (Favorite icon): It allows web pages to specify a 16-by-16 pixel image for use inbookmarks.

    (c) Usability and accessibility The "quick tabs" feature available in Internet Explorer 8 makes use ofthe accessibility framework provided in Windows. Internet Explorer is also a user interface forFTP, with operations similar to that of Windows Explorer. Pop-up blocking and tabbed browsingwere added respectively in Internet Explorer 6 and Internet Explorer 7. Tabbed browsing canalso be added to older versions by installing MSN Search Toolbar or Yahoo Toolbar.

    (d)Cache: Internet Explorer caches visited content in the Temporary Internet Files folder to allowquicker access (or offline access) to previously visited pages.

    (e) Security: Internet Explorer uses a zone-based security framework that groups sites based oncertain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject tothe restrictions.

    Q9. What is image map?An image map is an image that acts as a link, but instead of simply acting as a link to a singlepage, the image acts as a link to multiple pages. For instance, say you have a map of the UnitedStates that you wish to act as an image map. Then you could specify different areas of the map totake you to different pages.

    An image map consists of two parts. First, there is the image itself. This can be any image, so you

    don't need to alter the image in any way to make it act as an image map. The functionality to pointto different links comes from within the HTML code itself.

    Q10. What is hyperlink? Discuss the significance of and attributes.A hyperlink is a graphic or a piece of text in an Internet document that can connect readers toanother webpage, or another portion of a document. Web users will usually find at least onehyperlink on every webpage. The most simple form of these is called embedded text or anembedded link.

    The following is the most basic hyperlink code. To make a hyperlink, add the href attribute to theAnchor (a) tag. The href attribute can have an absolute value or a relative value.Hyperlink Code

    The TITLE attribute may be set to add information about the nature of a link. This information maybe spoken by a user agent, rendered as a tool tip, cause a change in cursor image, etc.

    The NAME attribute names the current anchor so that it may be the destination of another link.The value of this attribute must be a unique anchor name. The scope of this name is the currentdocument.

    Q10(a). What is SRC attribute used for?

    The src attribute instructs the browser where on the server to look for the web page that shouldbe presented to the user in the current frame. This may be a file in the same directory, a filesomewhere else on the same server or a file held on another server.Example:

    The src attribute loads "header.html" and "home.html" into their respective frames: