SlideShare a Scribd company logo
1 of 61
INFORMATION & COMMUNICATION TECHNOLOGY –2 (ICT-2)
Internet Fundamentals and Web Tools
Common for BA / BCom / B Sc / BBA
III Semester
(30 Hours of Teaching Learning including Lab)
Unit-I
Fundamentals of Internet : Networking Concepts, Data Communication –
Types of Networking, Internet and its Services, Internet Addressing – Internet
Applications – Computer Viruses and its types – Browser –Types of Browsers.
Unit-II
Internet applications: Using Internet Explorer, Standard Internet Explorer
Buttons, Entering a Web Site Address, Searching the Internet – Introduction to
Social Networking: twitter, tumblr, Linkedin, facebook, flickr, skype, yelp,
vimeo, yahoo!, google+, youtube, WhatsApp, etc.
Unit-III
E-mail :Definition of E-mail - Advantages and Disadvantages –
UserIds,Passwords, Email Addresses, Domain Names, Mailers, Message
Compoents, Message Composition, Mail Management,Email Inner Workings.
Unit IV
WWW- Web Applications, Web Terminologies, Web Browsers,URL –
Components of URL, Searching WWW – Search Engines and Examples
Unit-V
Basic HTML: Basic HTML – Web Terminology – Structure of a HTML
Document– HTML, Head and Body tags – Semantic and Syntactic Tags – HR,
Heading, Font, Image and Anchor Tags –Different types of Lists using tags –
Table Tags, Image formats – Creation of simple HTML Documents.
Reference Books :
1. In-line/On-line : Fundamentals of the Internet and the World Wide Web, 2/e -
by
Raymond Greenlaw and Ellen Hepp, Publishers : TMH
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 1
Lecturer in Computer Science
FUNDAMENTAL OF INTERNET
Network
 The collection of interconnected computers is called a computer network.
 Two computers are said to be interconnected if they are capable of sharing and
exchanging information.
Need of Network:
 Resource Sharing
 Reliability
 Cost Factor
 Communication Medium
Resource Sharing means to make all programs, data and peripherals available to anyone on the
network irrespective of the physical location of the resources and the user.
Reliability means to keep the copy of a file on two or more different machines, so if one of them
is unavailable (due to some hardware crash or any other) them its other copy can be used.
Cost factor means it greatly reduces the cost since the resources can be shared
Communication Medium means one can send messages and whatever the changes at one end
are done can be immediately noticed at another.
Advantages and Disadvantages of Network:
A computer network can be identified as a group of computers that are interconnected for
sharing data between them or their users. There is a wide variety of networks and their
advantages and disadvantages mainly depend on the type of network.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 2
Advantages of Computer Networking
1. Easy Communication and Speed:
It is very easy to communicate through a network. People can communicate efficiently
using a network with a group of people. They can enjoy the benefit of emails, instant messaging,
telephony, video conferencing, chat rooms, etc.
2. Ability to Share Files, Data and Information:
This is one of the major advantages of networking computers. People can find and share
information and data because of networking. This is beneficial for large organizations to maintain
their data in an organized manner and facilitate access for desired people.
3. Sharing Hardware:
Another important advantage of networking is the ability to share hardware. For an
example, a printer can be shared among the users in a network so that there’s no need to have
individual printers for each and every computer in the company. This will significantly reduce the
cost of purchasing hardware.
4. Sharing Software:
Users can share software within the network easily. Networkable versions of software are
available at considerable savings compared to individually licensed version of the same software.
Therefore large companies can reduce the cost of buying software by networking their computers.
5. Security:
Sensitive files and programs on a network can be password protected. Then those files can
only be accessed by the authorized users. This is another important advantage of networking
when there are concerns about security issues. Also each and every user has their own set of
privileges to prevent them accessing restricted files and programs
6. Speed:
Sharing and transferring files within networks is very rapid, depending on the type of
network. This will save time while maintaining the integrity of files.
Disadvantages of Networking
1. Breakdowns and Possible Loss of Resources:
One major disadvantage of networking is the breakdown of the whole network due to an
issue of the server. Such breakdowns are frequent in networks causing losses of thousands of
dollars each year. Therefore once established it is vital to maintain it properly to prevent such
disastrous breakdowns. The worst scenario is such breakdowns may lead to loss of important data
of the server.
2. Expensive to Build:
Building a network is a serious business in many occasions, especially for large scale
organizations. Cables and other hardware are very pricey to buy and replace.
3. Security Threats:
Security threats are always problems with large networks. There are hackers who are
trying to steal valuable data of large companies for their own benefit. So it is necessary to take
utmost care to facilitate the required security measures.
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 3
Lecturer in Computer Science
4. Bandwidth Issues:
In a network there are users who consume a lot more bandwidth than others. Because of
this some other people may experience difficulties.
Data communication system:
Data communication refers to the exchange of data between a source and a receiver via
form of transmission media such as a wire cable. Data communication is said to be local if
communicating devices are in the same building or a similarly restricted geographical area.
Characteristics of data communications:
1. Delivery: The data must be deliver in correct order with correct destination.
2.Accuracy: The data must be deliver accurately.
3. Timeliness: The data must be deliver in a timely manner.late delivered Data useless.
Components of data communication system
A Communication system has following components:
1. Message: It is the information or data to be communicated. It can consist of text, numbers,
pictures, sound or video or any combination of these.
2. Sender: It is the device/computer that generates and sends that message.
3. Receiver: It is the device or computer that receives the message. The location of receiver
computer is generally different from the sender computer. The distance between sender and
receiver depends upon the types of network used in between.
4. Medium: It is the channel or physical path through which the message is carried from sender to
the receiver. The medium can be wired like twisted pair wire, coaxial cable, fiber-optic cable or
wireless like laser, radio waves, and microwaves.
5. Protocol: It is a set of rules that govern the communication between the devices. Both sender
and receiver follow same protocols to communicate with each other.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 4
A protocol performs the following functions:
1. Data sequencing. It refers to breaking a long message into smaller packets of fixed size. Data
sequencing rules define the method of numbering packets to detect loss or duplication of packets,
and to correctly identify packets, which belong to same message.
2. Data routing. Data routing defines the most efficient path between the source and destination.
3. Data formatting. Data formatting rules define which group of bits or characters within packet
constitute data, control, addressing, or other information.
4. Flow control. A communication protocol also prevents a fast sender from overwhelming a slow
receiver. It ensures resource sharing and protection against traffic congestion by regulating the
flow of data on communication lines.
5. Error control. These rules are designed to detect errors in messages and to ensure transmission
of correct messages. The most common method is to retransmit erroneous message block. In such
a case, a block having error is discarded by the receiver and is retransmitted by the sender.
6. Precedence and order of transmission. These rules ensure that all the nodes get a chance to
use the communication lines and other resources of the network based on the priorities assigned
to them.
7. Connection establishment and termination. These rules define how connections are
established, maintained and terminated when two nodes of a network want to communicate with
each other.
Communication or Transmission media:
Communication medium refers to the physical channel through which data is sent and
received. Data is sent in the form of voltage levels which make up the digital signal. A digital signal
consists of 0s and 1s; essentially, a 1 corresponds to a high voltage, while a 0 corresponds to a low
voltage.
The speed of data transmission or data rate depends upon the type of medium being used
in the network. There are basically two types of networks:
 Wired network
 Wireless network
Wired Network
In a wired network, data is transmitted over a physical medium. There are three types of
physical cables used in a wired network.
1. Twisted pair cable: – It consists of two identical 1 mm thick copper wires insulated and twisted
together. The twisted pair cables are twisted in order to reduce crosstalk and electromagnetic
induction.
Advantages:
(i) It is easy to install and maintain.
(ii) It is very inexpensive
Disadvantages:
(i) It is incapable to carry a signal over long distances without the use of repeaters.
(ii) Due to low bandwidth, these are unsuitable for broadband applications.
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 5
Lecturer in Computer Science
2. Co-axial Cables: It consists of a solid wire core surrounded by one or more foil or braided wire
shields, each separated from the other by some kind of plastic insulator. It is mostly used in the
cable wires.
Advantages:
(i) Data transmission rate is better than twisted pair cables.
(ii) It provides a cheap means of transporting multi-channel television signals around metropolitan
areas.
Disadvantages:
(i) Expensive than twisted pair cables.
(ii) Difficult to manage and reconfigure.
3. Optical fiber: – An optical fiber consists of thin glass fibers that can carry information in the
form of visible light.
Advantages:
(i) Transmit data over long distance with high security.
(ii) Data transmission speed is high
(iii) Provide better noise immunity
(iv) Bandwidth is up to 10 Gbps.
Disadvantages:
(i) Expensive as compared to other guided media.
(ii) Need special care while installation?
Wireless Network
A wireless network uses radio waves as the sole medium for transmitting and receiving
data. There are no wires involved. An example is the wireless router in your home. Radio waves
are electromagnetic waves which are transverse in nature and they have the longest wavelength
on the electromagnetic spectrum.
1. Infrared: – The infrared light transmits data through the air and can propagate throughout a
room, but will not penetrate walls. It is a secure medium of signal transmission. The infrared
transmission has become common in TV remotes, automotive garage doors, wireless speakers
etc.
2. Radio Wave: – Radio Wave an electromagnetic wave with a wavelength between 0.5 cm and
30,000m. The transmission making use of radio frequencies is termed as radio-wave transmission
Advantages:
(i) Radio wave transmission offers mobility.
(ii) It is cheaper than laying cables and fibers.
(iii) It offers ease of communication over difficult terrain.
Disadvantages:
(i) Radio wave communication is insecure communication.
(ii) Radio wave propagation is susceptible to weather effects like rains, thunder storms etc.
3. Microwave Wave: – The Microwave transmission is a line of sight transmission. Microwave
signals travel at a higher frequency than radio waves and are popularly used for transmitting data
over long distances.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 6
Advantages:
(i) It is cheaper than laying cable or fiber.
(ii) It has the ability to communicate over oceans.
Disadvantages:
(i) Microwave communication is an insecure communication.
(ii) Signals from antenna may split up and transmitted in different way to different antenna which
leads to reduce to signal strength.
(iii) Microwave propagation is susceptible to weather effects like rains, thunder storms etc.
(iv) Bandwidth allocation is extremely limited in case of microwaves.
4. Satellite link: – The satellite transmission is also a kind of line of sight transmission that is used
to transmit signals throughout the world.
Advantages:
(i) Area covered is quite large.
(ii) No line of sight restrictions such as natural mountains, tall building, towers etc.
(iii) Earth station which receives the signals can be fixed position or relatively mobile.
Disadvantages:-
(i) Very expensive as compared to other transmission mediums.
(ii) Installation is extremely complex.
(iii) Signals sent to the stations can be tampered by external interference.
(iii) Signals sent to the stations can be tampered by external interference.
Network devices:
Modem: A MODEM (MOdulator DEModulator) is an electronic device that enables a computer to
transmit data over telephone lines. There are two types of modems, namely, internal modem and
external modem.
Ethernet Card: – It is a hardware device that helps in connection of nodes within a network.
Hub: A hub is a hardware device used to connect several computers together. Hubs can be either
active or passive. Hubs usually can support 8, 12 or 24 RJ45 ports.
Switch: A switch (switching hub) is a network device which is used to interconnect computers or
devices on a network. It filters and forwards data packets across a network. The main difference
between hub and switch is that hub replicates what it receives on one port onto all the other
ports while switch keeps a record of the MAC addresses of the devices attached to it.
DATA COMMUNICATION TERMINOLOGIES
Data channel :- The information / data carry from one end to another in the network by
channel.
Bits per second (bps) :- It’s used to measurement for the information carry of a
communication channel.
Measurement Units :- bit
1 Byte= 8 bits
1 KBPS ( Kilo Byte Per Second)= 1024 Bytes
1 Kbps (kilobits Per Second) = 1024 bits
1 Mbps ( Mega bits Per Second )=1024 Kbps
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 7
Lecturer in Computer Science
Bandwidth :- It is amount of information transmitted or receives per unit time.
Types of protocols are:
1. HTTP 2. FTP 3. TCP/IP
Hypertext Transfer Protocol (HTTP) is a communications protocol for the transfer of information
on the intranet and the World Wide Web. HTTP is a request/response standard between a client
and a server. A client is the end-user; the server is the web site.
FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the
Internet. The objectives of FTP are:
 To promote sharing of files (computer programs and/or data).
 To encourage indirect or implicit use of remote computers. Shield a user from
variations in file storage systems among different hosts.
 To transfer data reliably, and efficiently.
TCP/IP (Transmission Control Protocol / Internet Protocol)
TCP – is responsible for verifying the correct delivery of data from client to server. Data can be lost
in the intermediate network. TCP adds support to detect errors or lost data and to trigger
retransmission until the data is correctly and completely received.
IP – is responsible for moving packet of data from node to node. IP forwards each packet based on
a four byte destination address (the IP number). The Internet authorities assign ranges of
numbers to different organizations. The organizations assign groups of their numbers to
departments. IP operates on gateway machines that move data from department to organization
to region and then around the world.
Telnet-It is an older internet utility that lets us log on to remote computer system. It also
facilitates for terminal emulation purpose. Terminal emulation means using a pc like a mainframe
computer through networking.
Types of Networks:
There are three types of networks. They are
1. Local Area Network
2. Metropolitan Area Network
3. Wide Area Network
Local Area Network
LAN stands for Local Area Network. It normally connects the computers and other devices within
one office, building or a group of nearby buildings.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 8
Advantages of LAN :
1. Resource Sharing
Computer hardware resources like printers, modems, DVD-Rom drives and hard disks can
be shared with the help of local area networks. This will reduce cost of hardware purchases. For
example, a business organization using a Local Area Network for an office can use a single
network printer for the employees of this office.
2. Software Applications Sharing
It is cheaper to use same software over network instead of purchasing separate licensed
software for each client in a network. It will cost more to purchase a separate licensed software
for each computer in a network.
3. Easy and Cheap Communication
Data and messages can easily be transferred over networked computers. It saves a lot of
time and money.
4. Centralized Data
The data of all network users can be saved on hard disk of the server computer. This will
help users to use any workstation in a network to access their data. Because data is not stored on
workstations locally. But it is stored on a server computer. User will access their own data by
logging into their accounts from any client computer in the network.
5. Data Security
Since, data is stored on server computer centrally, it will be easy to manage data at only
one place and the data will be more secure too, because of more security for the server
computer.
6.Internet Sharing
Local Area Network provides the facility to share a single internet connection among all
the LAN users.
Disadvantages of LAN :
1. High Setup Cost
Although the LAN will save cost over time due to shared computer resources but the initial
setup costs of installing Local Area Networks is high. This is because any organization that will
setup a network, will have to purchase necessary hardware equipment for networking. It may
require a sophisticated server computer - a Mini Computer, Network LAN cards, Network Routers,
HUBS / Switches, Networking Cables (for wired networks only) and connectors etc. Additionally a
Network technician will be required for setting up a new network in an organization.
2. Privacy Violations
The LAN administrator has the rights to check personal data files of each and every LAN
user. Moreover he can check the internet history and computer use history of the LAN users.
3. Data Security Threat
Unauthorized users can access important data of an organization if centralized data
repository is not secured properly by the LAN administrator. LAN Administer is responsible for the
security of the whole data resource in an organization.LAN administrator will implement a fully
functional security policy for database safety.
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 9
Lecturer in Computer Science
4. LAN Maintenance Job
Local Area Network requires a LAN Administrator. Because, there are problems of
software installations or hardware failures or cable disturbances in Local Area Network. A LAN
Administrator is needed at this full time job.
5. Covers Limited Area
Local Area Network covers a small area like one office, one building or a group of nearby
buildings.
Metropolitan Area Network or MAN:
Introduction: MAN stands for Metropolitan Area Network.
It interconnects number of LANs using high capacity backbone technology. It is a large network
which usually spans city or large campus. It's geographic coverage is in between LAN and WAN.
Advantages of MAN:
Following are the benefits or advantages of MAN:
➨It utilizes drawbacks of both LAN and WAN to provide larger and controllable computer
network.
➨MAN requires fewer resources compare to WAN. This saves the implementation cost.
➨It helps people interface fast LANs together. This is due to easy implementation of links.
➨It provides higher security compare to WAN.
➨It helps in cost effective sharing of common resources such as printers etc.
➨Like LAN and WAN, it also offers centralized management of data and files.
Disadvantages of MAN:
Following are the disadvantages of MAN:
➨It is difficult to manage the network once it becomes large.
➨It is difficult to make the system secure from hackers and industrial espionage.
➨Network installation requires skilled technicians and network administrators. This increases
overall installation and management costs.
➨It requires more cables for connection from one place to the other compare to LAN.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 10
Wide Area Network or WAN:
A WAN connects more than one LAN and is used for larger geographical areas. WANs are
similar to a banking system, where hundreds of branches in different cities are connected with
each other in order to share their official data. A WAN works in a similar fashion to a LAN, just on
a larger scale. Typically, TCP/IP is the protocol used for a WAN in combination with devices such as
routers, switches, firewalls and modems.
Advantages of WAN :
1. It covers large geographical area therefore networks can be made between long distances.
2. Everyone on that network can access the same data. This avoids problems where some
users may have older information than others.
3. Different peripherals can be shared with all the computers in the network.
4. Shares software and resources with connecting workstations.
Disadvantage of WAN :
1. Setting up the network could be expensive.
2. Maintaining a network is a full-time job which requires network supervisors and
technicians to be employed.
3. Security is a real issue when many different people have the ability to use information
from other computers.
4. Protection against hackers and viruses adds more complexity and expense.
5. Need a good firewall to restrict outsiders from entering and disrupting the network .
INTERNET:
Advantages of Internet:
1. Online Shopping
Now today’s the trend of online shopping is growing up very fast. Users have now the facility of
shop everything what they want without going outside to stores and super markets.
2. Benefits for Students Studies
You are a student and you miss the lecture. Don’t worry internet helps students to find notes,
essay, lectures, guidelines and more than points related to your subject are available in your
books.
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 11
Lecturer in Computer Science
3. Book Tickets online
In the race of technology and companies are giving best services to their users. And almost all the
airlines are providing advantages to their customer to buy the tickets online on internet. So
people are no need to go to the agency or airline office.
4. Learn Online From Videos
Internet is the solution of many problems. If you face any problem in your mobile, laptop, cars,
television etc. You can easily find the solution on the screen with the help of video providing
website. Mostly used websites for videos upload and downloads are YouTube, Dailymotion,
tunepk, viemo and etc.
5. Play Online Games
People fond of video games are easily access to download multiple games. Also can play online
games with the help of internet connection. Without it you can’t play online either can’t
download.
6. Entertainment
Every day new movies and music lunched in every country almost. People how are fond to watch
movies or listen music. They can easily find latest music and movies on Internet and can download
it and also watch it online.
7. E-mailing
Government Departments, Private Organization, Businesses, School, Colleges and Universities etc.
And many other departments and peoples are using the e-mail services. And I’ll say that without
e-mail conversation half of word would be stop work. Because big projects, secret information
and files are shared through e-mails and this service is not possible without Internet Connection.
8. Results and Roll No
Students of Universities and Colleges now even the students of Schools are easily see their results
on internet. To access to the result you must need to put the right roll no in the search bar of
school or college website.
9.Jobs
Hundreds of mobile application, and thousands of website in every country. In their national
language provide the services to the jobless peoples to find the jobs on Internet related to their
experience and criteria.
10.Bank Accounts
Money in your bank account is now same like money in your pocket. Yes you can login to your
account and make online transactions either bank is open or close.
11.Buy and Sell
If you have second hand or new bike, car, clothes, shoes, jewelry, mobile or laptop etc. You can
place an add to website and easily can sell on reasonable price as compare to market. You can
also buy same like this by contacting the selling person.
12.24/7:
Internet is nonstop service all day all night all the time everywhere in the world.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 12
Disadvantages of Internet:
1. Shopping Quality
When you shop online on internet. The things you buy sometime the quality of these things are
very bad and will give you loss. Because you cannot see and touch the things properly during
online shopping.
2. Loss of Studies
Mostly students use the net for wrong purposes. Which are the cause of loss and big disadvantage
for student’s studies. Because they spend more time while using online activates.
3. Loss of Money
In advantages of we read that we can play online games. In disadvantages of internet we are
talking about the people who are playing online games and spend money on these games. Once
or two time you may win but not every time. People can loss their money online by playing games
and also on other activates.
4. Health Disadvantages
Before hundred years ago there was no any concept of Internet and computers etc. Now every
third person uses these things. Because of it they all the day in the home and face many health
problems and eye fatigues.
5. Viruses & Malware
During browsing the different websites in your browsers. Some scripts are automatically
download and install itself automatically. Some of them are viruses and these viruses can damage
your computer, laptop and mobiles very badly.
6. Accounts Hacking
Using of your account online may be chances of Hacking. Yes if you are using your account in
mobile application and let suppose you lose mobile. The other person can easily transfer your
money to any other account.
7. Data Stolen Chances
Another big disadvantages of internet in points. If your computer is connected to the net, in this
case hacker can come and stoles your file easily from your device.
8. Frauds
Many peoples and website on Internet that are not real and not trusted. These are fake and can
fraud you for money and other things.
Services of Internet:
Internet Services allows us to access huge amount of information such as text, graphics, sound
and software over the internet. Following diagram shows the four different categories of Internet
Services.
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 13
Lecturer in Computer Science
1.Communication Services
There are various Communication Services available that offer exchange of information with
individuals or groups. The following table gives a brief introduction to these services:
S.N. Service Description
1 Electronic Mail: Used to send electronic message over the internet.
2 Telnet: Used to log on to a remote computer that is attached to internet.
3 Newsgroup: Offers a forum for people to discuss topics of common interests.
4
Internet Relay Chat (IRC): Allows the people from all over the world to communicate in real
time.
5
Mailing Lists:Used to organize group of internet users to share common information through
e-mail.
6
Internet Telephony (VoIP): Allows the internet users to talk across internet to any PC
equipped to receive the call.
7.Instant Messaging: Offers real time chat between individuals and group of people. Eg.
Yahoo messenger, MSN messenger.
2.Information Retrieval Services
There exist several Information retrieval services offering easy access to information present on
the internet. The following table gives a brief introduction to these services:
S.N. Service Description
1 File Transfer Protocol (FTP):Enable the users to transfer files.
2
Archie:It’s updated database of public FTP sites and their content. It helps to search
a file by its name.
3 Gopher:Used to search, retrieve, and display documents on remote sites.
4
Very Easy Rodent Oriented Netwide Index to Computer Achieved (VERONICA)
:VERONICA is gopher based resource. It allows access to the information resource
stored on gopher’s servers.
3.Web Services
Web services allow exchange of information between applications on the web. Using web
services, applications can easily interact with each other.
The web services are offered using concept of Utility Computing.
4.World Wide Web (WWW)
WWW is also known as W3. It offers a way to access documents spread over the several servers
over the internet. These documents may contain texts, graphics, audio, video, hyperlinks. The
hyperlinks allow the users to navigate between the documents.
Internet Addressing:
The abbreviation URL stands for Uniform Resource Locator (lay people also call it
“address” or “web address”). The URL address and the email address make two of the most
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 14
important forms of identifications in the web directory. URLs are associated with webpages and
other web resources.
some interesting facts about URL:
 In 1995, Tim Berners-Lee, father of the World Wide Web, defined and implemented a
scheme of addressing each resource on the WWW or Internet. Such a scheme was
extremely important because WWW contained millions of items (like images, web pages,
files etc.) and each needed to be uniquely identified for Internet to work smoothly. Barnes-
Lee called these addresses as Uniform Resource Identifier (URI) — a name that was later
changed to URL.
 Today there are over 70 billion web pages and each one of these has a unique address (i.e.
URL). That’s the power and importance of URL scheme!
 A URL never contains any space.
 Mostly a URL is in lowercase — although the letter case does not really matter in URL or
email address.
 Most of the URLs begin with http://
For Example:
http://www.youtube.com
Protocol:
Every URL starts with the name of the language (geeks call it protocol) using which your computer
and the server of this site. In this example, the language is Hypertext Transfer Protocol or http.
The protocol is followed by the :// characters.
World Wide Web:
After protocol comes the famous www — in some URLs you will not find it but we will not go into
those details. www simply means that the resource you are seeking by the means of this URL
resides in the www subdomain of your domain name.
Domain name / Resource Owner
Then the name of the resource owner (i.e. domain name) comes; which is youtube in this case.
Domain extension:
Owner’s name is followed by the type of category in which the owner domain is registered. .com
means that the website which is making this resource available to you is of the commercial
nature. There are a lot of other types of categories as well. For example, .org for organizational
website, .edu for educational institutions, .gov for government websites, .mil for military
websites, .in says that the website has a connection with India. The below table shows
organizational domain names:
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 15
Lecturer in Computer Science
The below table shows Geographical domain names:
Computer Virus :
“A computer virus is a program that may disturb the normal working of a computer
system”. Virus attaches itself to files stored on floppy disks, USBs, email attachments and hard
disks. A file containing a virus is called infected file. If this file is copied to a computer, virus is also
copied to the computer.
Activation of Virus
When the computer virus starts working, it is called the activation of virus. A virus normally runs
all the time in the computer. Different viruses are activated in different ways. Many viruses are
activated on a certain data. For example, a popular virus “Friday, the 13th
” is activated only if the
date is 13 and the day is Friday.
According to Wikipedia “Computer viruses cause billions of dollars’ worth of economic damage
each year, due to causing systems failure, wasting computer resources, corrupting data, increasing
maintenance costs, etc”.
Damages caused by virus
Computer virus cannot damage computer hardware. IT may cause many damages to a computer
system. A virus can:
1. A computer virus can damage data or software on the computer.
2. It can delete some or all files on the computer system.
3. It can destroy all the data by formatting hard drive.
4. It may display a political or false message very few times.
Causes of Computer Virus
The following are the main causes of a Computer Virus.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 16
Infected Flash Drives or Disks:
Flash drives and disks are the main cause of spreading viruses. Flash drives and disks are
used to transfer data from one computer to other. A virus can also be copied from one computer
to other when the user copies infected files using flash drives and disks.
Email Attachments:
Most of the viruses spread through emails. Email attachment is a file that is sent along
with an email. An email may contain an infected file attachment. Virus can spread if the users
opens and downloads an email attachment. It may harm the computer when it is activated. It may
destroy files on the hard disk or may send the virus automatically to all email addresses saved in
the address book.
Infected websites:
Thousands of insecure websites can infect computer with viruses. Most of the websites
with pornographic materials are infected, so by visiting these websites the user’s computer also
gets infected by virus. These websites are developed to spread viruses or other unethical material.
The virus is transferred to the user’s computer when this material is downloaded. These websites
may access the computer automatically when the users visit them.
Networks
Virus can spread if an infected computer is connected to a network. The internet is an
example of such network. When a user downloads a file infected with virus from the internet, the
virus is copied to the computer. It may infect the files stored on the computer.
Pirated Software
An illegal copy of software is called pirated software. Virus can spread if user installs
pirated software that contains a virus. A variety of pirated software is available in CDs and from
the internet. Some companies intentionally add virus in the software. The virus is automatically
activated if the user uses the software without purchasing license.
Protection from Computer Virus:
Virus infects computer system if latest and updated version of an Antivirus program is not
installed. Latest Antivirus software should be installed on Computer to protect it from viruses. A
computer system can be protected from virus by following these precautions.
1. The latest and updated version of Anti-Virus and firewall should be installed on the
computer.
2. The Anti-Virus software must be upgraded regularly.
3. USB drives should be scanned for viruses, and should not be used on infected computers.
4. Junk or unknown emails should not be opened and must be deleted straightaway.
5. Unauthorized or pirated software should not be installed on the computer.
6. An important way of protection against virus is the use of back up of data. The backup is
used if the virus deletes data or modifies it. So back-up your data on regular basis. There
are some great softwares that can back up your data automatically.
7. Freeware and shareware software from the internet normally contain viruses. It is
important to check the software before using them.
8. Your best protection is your common sense. Never click on suspicious links, never
download songs, videos or files from suspicious websites. Never share your personal data
with people you don’t know over the internet.
ICT - 2 UNIT - I
Prepared By Mr.D.Sulthan Basha Page 17
Lecturer in Computer Science
Types of Computer Virus:
Viruses are designed for various intents. It might corrupt or destroy data on your computer, use
an email program to spread itself to other computers on your network or may even affect the
boot sector.
 Boot Sector Virus - As the name suggests a boot sector virus affects the boot section on your
computer. Evidently, boot sector is the section which is accessed at the very first when the
computer is turned on. It is used to boot the information used by the operating system. A
Boot sector virus gains complete control over the Master Boot Record (MDR) or the DOS by
replacing the contents of the OS with that of its own resulting in errors during booting or
‘cannot boot’ message. Michelangelo and Stones are some examples of boot sector viruses.
Earlier, before the era of modern, heavy memory computers, floppy disks were used to boot
the system. With the decline of floppy disks, boot viruses have declined as well.
 File Infector Virus - This is the most popular and most prevalent variant of compiled
computer virus. It attaches itself to executable programs such as word processors, game files,
spreadsheets applications, etc. The file infector virus fixes itself into the host file and begins
its operation whenever the file is executed. Here is a snapshot of one such threat detected by
an antivirus.
 Macro Virus - Macro is a programming language used to automate complex, repetitive
processes. Macro viruses attach themselves to application documents and spreadsheets
which cater to macro programming and use it to execute and multiply themselves. The most
popular desktop application Microsoft Office also uses macro programming. So, it is quite
easy for macro viruses to propagate through such applications. A macro virus in addition to
the current document also infects the template which the program uses to open or close a
file. This in turn corrupts all the documents catering to that particular application. Hence, a
bigger menace. Usually Macro viruses are received as attachments in emails. Whenever we
download these attachments, the macros unfurl and install on our computers. Examples of
Macro Virus are The Concept, and Melissa.
Web Browsers:
In 1991, a computer expert named Tim Berners-Lee created the first Web browser. His
creation of WorldWideWeb, later renamed Nexus, was an innovative breakthrough that gives
Internet users worldwide the opportunity to have the best online experience possible. You can
choose from many types of Web browsers, including Microsoft Internet Explorer, Mozilla Firefox,
Safari, Opera and Google Chrome. On the Web, when you navigate through pages of information,
this is commonly known as web browsing or web surfing.There are four leading web browsers −
Explorer, Firefox, Netscape, and Safari, but there are many others browsers available.
Internet Explorer:
In August 1995, Windows released "Windows 95," which included basic technologies for
connecting to the Internet, including built-in support for dial-up networking. Windows also
incorporated the Internet Explorer browser in response to the people's growing interest in the
Internet. This browser is great for easy online navigation as well as quick search queries and
Dynamic Security Technologies. Microsoft has continued to release new versions of the popular
browser every year, which include powerful privacy settings as well as a higher performance level.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 18
Google Chrome:
Google Chrome is an adaptable browsing program for PCs, Macs and other computer
operating systems. Google Chrome offers its users speed, simplicity and security. The browser is
designed to run complex applications quickly and properly. Also, the presentation of the browser
is very clean and simple. The unique scheme offers efficiency and ease of use; patrons can arrange
open tabs speedily and proficiently. The browser is known for its security benefits such as
protection from harmful phishers and malware viruses. Chrome has a bundle of useful features.
Mozilla Firefox:
Mozilla Firefox, formerly known as Mozilla, released its first major version of the browser
in 2002. Within the first year Mozilla became one of the latest open community browsers. This
browser features built-in high performance tools similar to hardware acceleration and crash
protection. These basic features create a foundation for browser users to rely on, especially
during browsing for Internet safety and security.
Safari:
Safari, a Web browser created by Apple, is a fond browser used on Macintosh systems
since 2003. Safari 1.0 was initially included as an optional Web browser on Macintosh computers,
because of a licensing-agreement with Microsoft to package Internet Explorer with new
Macintosh computers. Safari later became the exclusive browser installed on Macintosh
computers in 2005. Apple's Safari browser was the first to utilize private browsing, which is
significant for those who crave privacy on the Web. Moreover, Safari's mobile browser was the
first to display mobile Web pages identical to the desktop version. Safari is also available on the
Windows operating system.
Opera:
In 1994, the Opera browsing system was originally a research project conducted by
Norway's telecom company, Telenor. On July 14th, 1996, Jon Von Tetzchner made the first public
announcement of Opera and released version 1.0 available to all online users. In a modern
version, Opera 10, users can use the "Speed Dial" page, which allows Internet users to access their
favorite pages using a "Dial Pad" like application. Opera is a well-known browser that continues to
grow and increase its user base.
*******
ICT - 2 UNIT - II
Prepared By Mr.D.Sulthan Basha Page 19
Lecturer in Computer Science
INTERNET APPLICATIONS
INTERNET EXPLORER:
It is a web browser from Microsoft. Microsoft internet explorer is a computer
program called a browser that helps you to interact with and navigate through information
resources on the internet .The internet is a world wide network of computers that all use the
same rules(PROTOCOLS) to communicate and share information you can use internet explorer
to read publications, videos, pictures, audios, videos, etc.,, stored on a computer across the
world .Internet explorer enables you to access websites and interpret the html code which is
the computer languages that web pages are written in .It is a default web browser on all
windows operating system computer . it offers many of the same features as follows:
Features of internet explorer -11:
 Fast web browsing allows network requests to appropriate contents, connecting to information
faster than ever before, it preview can provide faster and more efficient browsing, even over slow
networks.
 Rich, hyper fast 2D and 3D experiences supports emerging web graphics library standards,
lighting up games and other interactive content, while still maintaining security, reliability, and
performance.
 Great on all your screen large and small
it supports continuous input and displays, making internet explorer-11 great for tablets [tabs] and
with side-by-side browsing, multi monitor support [multiple tabs],and high pixels per inch [PPI]
scaling, it is also great for large screens.
 Improved capability: Internet explorer-11 improves capability with web standards, other web
browsers and real world websites. There is updated support for popular web standards and
changes that prevent old websites from displaying incorrectly.
 Perfect for touch: Includes enhanced supports for consumers using touch based devices including
touch based drag-and-drop, however and activating highlighting grouping together the navigation
and tabs provides better control ,it support for up to hundred open tabs for window.
 Pinned sites: Enhanced pinned sites to support live tiles(recently opened) and your content
update dynamically.
 Click to call: automatically changes phone numbers into clickable links for apps that work with
phone number, such as Skype.
2.Internet explorer buttons:
The most recently used buttons in web browser are listed as follows:
 Forward and backward button: It moves you forward a page. It only works if you have
previously used the backward button. The backward button and forward button are called
as navigation buttons in internet explorer-11 that allows you to move between sites you
have recently visited.
 Stop: The stop button is used to stop web page from downloading. The shortcut key for
stop button is Esc key.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com
20
 Refresh: This feature is useful as it allows users do not have to download the full page
each time they visit the same site. On some sites, you may want to refresh the page to get
the latest VERSION and it is also used to reload a page that has failed to load because of an
error. Press F5 or ctrl+R.
 Home: the home button is used to return users to their default web page, the same page
that loads when the browser is first opened.
 Search: In the past, the search button was used to open user’s default search page or URL
text field.
 Full screen: this function is used to make the browser window as full screen, It temporarily
removing the toolbar, buttons and address bar. Often this view mode may be on and off by
pressing f11 key from keyboard.
 History: this feature allows users to view the pages that have been previously visited. the
shortcut key for history is Ctrl+H.
 Favourites (Bookmarks): this folders stores websites or pages chosen by users. The term
“favourites” is used with Microsoft internet explorer in other browsers this may be known
as bookmarks or hotlist.
 Zoom: it is used to increase and decrease the size of font and images. To reset the zoom
function to it’s default size, press Ctrl+0[zero],to increase the size ctrl++ and to decrease
size Ctrl--
 Tracking protection indicator: shows up each time something is blocked on the web page
you are currently on.
 Tabs: They are something like windows in window. You can have many pages open in one
window by using this option. This makes navigation between open web pages easier and
different internet explorer windows it won’t disturb task bar.
A)entering website address: to navigate to a website follow the below step.
1.type a web address, also known as a URL, into the address bar, then press enter key.
http://www.google.com
2.the website will appear.
B)searching the internet: some web browser use an address bar for conducting web searches.
internet explorer-11 combines both of these functions into address bar. Address bar with
integrated search in the place to write the address of website you want visit .for example
www.google.com, address bar remember visited address, so if you have visited
www.google.com,before,you don’t have type the whole address in address bar. Just type
“goo”and choose the address from the list .Searching is integrated in to address bar just type a
question mark(?) and then type the word or phrase you want to find on the internet. You can still
have several search providers. For example Google, Yahoo, etc..
3.SOCIAL NETWORKS:
social network sites are web-based services that allow individuals to construct a public or
semi public profile within a bounded system ,to be joined with a list of other users with whom
they share a connection, view and transfer their list of connections and those made by others
within a system. The nature and naming of these connections may vary from site to site. The
Social Networks are:
ICT - 2 UNIT - II
Prepared By Mr.D.Sulthan Basha Page 21
Lecturer in Computer Science
Twitter:
Twitter is a social network and real time communication service launched in 2006 and used
by millions of people and organisation to quickly share and discovers information. The word
twitter comes from the frequent chirping sound made by birds. Hence the bird used in twitter
logo. User can access the site via the web and mobile devices to exchange information called
“tweets” which are messages of upto 140 characters long that anyone can send or read. These
messages or tweets are public by default and visible to all those who are following the twitter.
Advantages of using twitter:
1. 1.Twitter is easy to join and use:
2. Joining into twitter is easy; you can join within a minute and start tweeting. You can also
chat following people from the starting time of joining twitter. Twitter is free from
advertisement and it’s interface is very easy to use .On twitter you want only to follow
people to get updates ,news, tweet, re-tweet.
3. Twitter is massive: twitter has billion registered users and million active users every day.
Now a days all kind of people uses twitter so you can also target audience for your
business, no matter now big or small your business.
4. 3 You can get to the point: Since you are limited to 140 characters, you need to get to the
point.
5. 4.Twitter security: it provides very high level security about user account .it has very
height kind of security policies .also it provides you option of routing your personal
information . Twitter also give you option for report spam.
Disadvantages of using twitter:
1. Twitter Is Busy: Twitter users generates 340 million Tweets per a day . your tweets are
quickly send to your followers.
2. You are limited to 140 characters: It provides only 140 characters tweet, means you can’t
use characters more than 140.
3. Not everyone can advertise : While twitter does allows for promoted tweets and profiles,
you need to be approved by the twitter you can use its promotion features.
4. Inactive and fake twitter account: Through Twitter has billion users most of them either
inactive or not used regularly .Most of twitter account are fake which are made to cheat
and harass someone.
5. Spam problem: Twitter has also spam problem like other social networking sites .Some
twitter users only tweet their products and also some users send spam messages. Twitter
also face overloading problem due to large number of unwanted messages.
TUMBLR:-
Tumblr is micro blogging platform and social networking site founded by David Karp in
2007 and owned by Yahoo since 2013 .The service allows users to post multimedia and other
content to a blog. Users can post on their boards, follow other bloggers, or search post by
keywords. By using it bloggers can post various contents such as text, photos, pictures, music
,videos, links and more. Posted content can be original or posted from others boards. Most user
choose nicknames instead of real names therefore it most impossible to find people without
knowing their username.
It can easy to register, and one can sign up for Tumblr service with a valid email id within
30sec.Once sign in Tumblr , a user can follow other users.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com
22
ADVANTAGES OF TUMBLR:
1. The best thing about Tumblr is it’s built in community. With most standard blogging platforms
you have to build your own following before you start receiving feedback from readers. With
Tumblr you can post one picture, and if it’s interesting enough you will instantly receive feedback
from the community.
2. You have the freedom to customize your Tumblr however you want. If you are a web designer
you can design your own theme.
3. Tumblr is great for artists, designers and photographers who don’t need words to describe
their work .on Tumblr you can just post a picture, tag it with the proper keywords ,and gain tons
of feedback without the need of a long term article.
4. a big part of Tumblr attraction and perhaps an even bigger reason behind its rapid uptake is
how quick it is to setup and customize
DISADVANTAGES OF TUMBLR:
1. Tumblr is mostly used for sharing images and videos.
2. It is known to have stability issues, resulting in a lot of downtime.
3. Its posts are difficult to optimize for search engine optimization.
LINKEDIN:
Linked in users with free account can do the follow:
1. Post their resume online.
2. Find and add professional contacts.
3. Find and follow companies to receive important updates about job openings, company
news and more
4. Create and join online professional networking groups by industry, location, age and
educational background
5. Find and apply for jobs
6. Give and receive recommendations.
7. Post public messages status updates similar to Facebook or Twitter.
8. Find out how many times their profile has been seen.
Disadvantages:
1.The required investment of time:- possibly one of the biggest disadvantage of linked in, as
with other social media tools ,is the investment of time required to use it most effectively.
2.Privacy concerns: One big concern with linkedIn, as with all social media sites is privacy. Your
decisions about how to manage your privacy settings will be based on your objectives in using
the site and the levels of privacy you can personally comfortable with.
FACEBOOK :
Facebook is the most popular social networking site with millions of members.It is Created
in 2004 by Mark Zuckerberg and his friends. With it we can connect with friends, find old friends
or family that they have lost contact with and even meet new friends. People can upload photos
and videos to share with their friends and family, you can even connect with people that live on
the other side of the world. You can setup a group for your business or interests and find out
other people with the same interest to join your group.
ICT - 2 UNIT - II
Prepared By Mr.D.Sulthan Basha Page 23
Lecturer in Computer Science
Benefits and features of Facebook:
1.Facebook is free to join and free to use.
2.it can be used by any one wherever they are in the world as long as they have internet access.
3.Facebook users can share messages ,videos, photographs and websites.
4.Facebook can be used as an organisational tool for planning and managing event invitation.
5.you can search by name or e-mail to find people.
6. By using various settings, users can choose to allow different people to have access to their
pages or to deny them this access.
7.Facebook is available 24 hours a day people can communicate without time zone differences
causing a problem.
FLICKR:
It is a photo sharing website where anyone can upload and tap photos, browse others
photo’s and add comments, users can create photo sets and collections to manage, connect and
participate in topical group to cultivate a sense of community. Flickr also provides a range of
privacy settings, giving users considerable over how their photos can be used.
A Yahoo! ID is required to create flickr account. You can sign up for a free Flickr account,
Which allows you to upload 1,000GB of free storage for photos and videos.
ADVANTAGES OF FLICKR: There is no storage limit. With a Flickr account you can upload as many
pictures as you want.
1. Users can include and edit photo tags, title and create photo sets.
2. Visitors can comment on your photos make notes within the pictures and watch photo slide side
shows.
3. Your visitor can subscribe to a RSS feed and your 20 latest pictures.
4. permanent backup is available for pictures.
5. Photos will resaved and resized for the web.
DISADVANTAGES:-
1. Uploading images ,Flickr doesn’t provide an official tool to batch download your pictures.
2. The Flickr websites doesn’t always do what you want. After you edit pictures, you may have
problems with link’s and title captions.
3. When watching a specific picture ,you may not be able to see the rest of the thumbnails.
4. No keyboard navigation support.
5. You can’t give multiple images the same name.
6. The thumb on the slide show are quite small.
7. No email notification if some- one has commented on your photo.
SKYPE:
Skype is an application that provides video chat and video call service. Users may
exchange such digital document as images ,text, video and may transmit both text and video
messages. Skype allows the creation of video conference call Skype is available for Microsoft
window or linux as well as android ,blackberry and both apple and window smart phones and
tablets . Skype is based on a premium model much of the service is free, by Skype credit or
subscriptions is required to call a land line or a mobile phone number.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com
24
ADVANTAGES:
1. Skype offer free communication: users of Skype can enjoy unlimited number of chats and
video conferencing .when they contact people who are also on Skype compared to mobile
communication this offers the ability of data sharing and make communication for business
viable unlike that of mobile or landline service.
2. You can communicate with the world: Since this is internet based ,you can chat with families
abroad any time you want .This can be used 24 hours a day and you can reach people who
has Skype on their computer .This is also available as a smart phone application so that instead
of placing international calls using user network provider ,you can use Skype instead as an
alternative. Connect to a wi-fi, hotspot and you can make calls all day long
3. Subscription is cheap: when you make calls using Skype ,you can call landline or mobile
numbers with cheaper rates.
4. Skype offers from screen sharing: Skype can be used for business presentation because this
allows screen sharing. If you are conducting business on an international level you can conduct
meetings using Skype and instead of projectors, what you see on your screen can be shard and
this will act as your visual presentation.
5. It allows for a group call without the need for group features: one of the best feature about
Skype is that multiple people can speak with each other on a single connection with out any
other equipment, services, or charges.
DISADVANTAGES:-
1.you need internet access to use Skype: Skype is dependent on the internet this may not be
facing emergency calls for situation that required immediate attention. In these situations, your
mobile network is still more reliable.
2.It doesn’t offer language translation : With Skype although we have the means to
communicate with another person from another country, there is a need for both of you to know
how to speak or read a common language because of its limitation in translating other languages.
3.Skype is still lacking in business tools: Although Skype offers file sharing ,call routing and
screen sharing. This is not enough if you need something that could survive other important
business tasks such as accounting.
4. Background noises are picked up rather easily: If there is anything happening in the
background of a room during a Skype call ,the microphone is going to pick up that sound and
transmit it.
5.The information that is transmitted over Skype could be interrupted: Skype is sent over the
internet ,so even though it offers a secure conversation and file sharing experience ,there is
always the chance that the information could be interrupted.
YELP:
yelp is an American multinational corporation headquartered in San Fracisco, Calfornia.
yelp was founded in 2004,by former Paypalr employees, Russel Simmons and Jeremy Stoppel
man. It develops hosts and markets yelp.com and the yelp mobile app which publish crowd –
sourced reviews about local business as well as the online reservation service, (seat me) and
online food –delivery service(eat 24). The company also trains small business in how to respond
to reviews and provides data about business ,including health inspection scores. Yelp offers a
platform for both consumers and business to find each other, especially through reviews and
ratings.
ICT - 2 UNIT - II
Prepared By Mr.D.Sulthan Basha Page 25
Lecturer in Computer Science
ADVANTAGES:
1. You can find basic information including the hours of a business ,their contact information and
their website using the site.
2. You can search for types of business in your area that you might not easily find on other local
search sites.
3. You can see feedback of other people who have gone to the place of business.
4. You can initiate discussion through the “talk”section of yelp. This lets you ask for specific or
more detailed information about the business or about the topic in general.
5. You can add your own opinions through improve site and to support the local business that
you really like.
DISADVANTAGES:
1. people get paid to write reviews on yelp they aren’t supposed to but business have been known
to pay writes to write positive reviews on site like help in order to increase business.
2. The opinions on yelp are just opinions. Many people take the information and advice on yelp as
though it is factual. It is important to remember that every one’s standard for “quick services
”differs and that you can’t assume a place is good or bad because one person says so.
3. There is often misinformation on yelp sites like Yelp and Wikipedia let anyone put information on
them. For the most part of the group moderates each other to make sure that information is
correct. However, incorrect information does appear on sites like Yelp.
VIMEO:
It is a video sharing website in which user can upload, share and view videos. It was
founded in November 2004 by Jake lodwick and Zach klein. It was the first video sharing site to
support to high definition video in October 2007.
Members can choose between Vimeos free services and a number of paid services .How
their videos appear on the internet , viemos free service allow order to enhance ,videos add music
tracks and pull from creative common licensed videos. Vimeo also provide users with a video
school to improve their own video production for long-term personal or financial gain.
ADVANTAGES:
1. Better looking higher resolution 1280*720 pixels hd player and 5000 kbit rate.
2. Less discovery competition ,limited competition for discovery with lower quality content.
3. Improved Video formatting options.
4. Due to Vimeo’s smaller scale there is less copyright security on content.
Disadvantages:
1. Best feature required a paid pre account.
2. Analytics look better visual but don’t offer the quantity of insight that youTube does.
3. Less options to customise and manage your own branding.
Yahoo:
Online portal website created to integrate a vast array of information ranging from
entertainment to finance news. Users are able to customize homepages, check email and search
the World Wide Web. Yahoo was founded in 1994 by Jerry-Yang and David Filo. Yahoo is
headquartered in Sunnyvale, California.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com
26
Advantages:
E-mail like a pro: with Yahoo mail service you can send e-mail, receive it, manage contacts and
maintain calendar. All Yahoo mails encrypted 100%.
Explore advanced communication methods: Although you can send instant message (IM) from
your Yahoo mail page. You have the option to install Yahoo message on your computer and
mobile phone. With it, you can chat with others via voice and webcam. Messenger supports sms
and IM, and share photos and large files with chat partner.
Go social using Yahoo : Thumblr and Flickr, once independent blog and photo sites, now belong
to Yahoo. Sign up for a Thumblr ID to create your own blog, posts and share them with the world.
Top into a massive answer pool: if you have a question it’s possible that one of the millions of
Yahoo users has answered it at Yahoo‘s answers site. visit these site and browser categories ask
questions and view an answers people have asked and answered. If you sign up for a Yahoo ID
,you can answer the questions.
Put the world on your my page: when you type “Yahoo” into your browsers address bar and
press “enter” you arrive at a page that appears to discuss every possible subject. in addition to
current headlines ,you will see a trending now section that shows you hot topics that are
trending as you visit the page. Yahoo allowed and you to customise your own my Yahoo page
also.
Search the web using Yahoo: Like Google, Yahoo indexes the web and makes information from
web pages available to web the web search. If you sign up for a Yahoo account you gain
additional benefits, such as the ability to view your search history.
WHATSAPP:
WhatsApp is a chatting software developed for smart phones.It is an instant messaging
service for phone. The sevice is available for iPhones ,Blackberry, Android phones and Nokia
smart phones. User can exchange text, image ,video and audio messages at free of cost.
WhatsApp provides group chat and location sharing options.
WhatsApp has become the largest messaging platform all over the world.It was found by
Jan Koum and Brain Acton.
Advantages:
1. No need to manually add any contact because this app automatically imports the contacts
from your sim card phone and tells you that how many of you friends are using WhatsApp.
2. Save money on SMS because it send free messages to any part of the world without any
charges .
3. All tools provided by WhatsApp are very easy to use.
4. Easy to create group chat.
5. You can share your location, photos and status with your friends.
Disadvantages:
1. This app must have access to internet to send and receive messages for free and the messages
are also not sent to the phone inbox .
2. Your profile picture is visible to every person having your contact number and using this app,
whether known by you or not.
3. If you upload picture in the chat with your friends or group it automatically save the picture
into your friends phone.
ICT - 2 UNIT - II
Prepared By Mr.D.Sulthan Basha Page 27
Lecturer in Computer Science
GOOGLE PLUS :
It is a social networking service from Google launch in 2011, the world’s largest search
engine company, and integrated into every product service, such as Search, YouTube, Chrome...It
offers multiple ways to share your content with an interested audience. Its free video chat
service, personalized virtual relationships in a manner that is educational, entertainment, etc..
Advantages:
1.Google Plus provides you to follow stream as you defined in your circles and it is easy to follow
the people at the right time.
2. Google Plus provides you latest Google news.
3. It provides you to make business deals easily with face to face and gaining more trust with
your clients rather than Skype calling.
Disadvantages:
1. Google + not helping in organic results as peoples were think.
2. Right now it is only seems like for professional work rather than entertainment social network
site as Facebook.
3. It is still not available for everyone.
4. It not provides you to synchronize different services like Twitter, LinkedIn and Facebook as
well.
YOUTUBE:
Launched in 2005, It allows millions of people to discover, watch and share originally
created videos. It provides a forum for people to connect, inform and inspire across the globe
and act as distribution platform for original content creators and advertisers large and small. It is
created to share videos. Every minute of every day more than 35 hours of video is uploaded to
YouTube.
Advantages:
1. Fast and easy video sharing.
2. Privacy features.
3. Quick access to various videos.
4. Safe browsing.
5. Easy rating and feedback system.
Disadvantages:
1. No parental controls.
2. Video length is limited to 10 minutes.
3. No restrictions on comments language, violent threats.
4. Video size is limited to 1024 MB.
5. There could be issues of privacy invasion.
6. There could be copyright issues.
*******
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 28
Electronic-mail (E-mail)
Network:
A Connection between each computer or connecting a computer with another computer
by using some physical components is called as network.
Internet: Network of networks.
Introduction to e-mail:
Electronic mail is popularly known as email where textual messages are sent to the
receiver through telecommunication links. Here, computer terminals are, connected together in a
network to transfer message from one to one or one to many. The sender first types the message
on a computer screen and then sends to the receiver.
The respective message is dropped in the receiver’s mailbox and receiver can read the
message and answer if required. Both sending and receiving of email are processed and directed
by mail server computers which are connected through a network.
Mail components: There are five major parts involved in an e-mail exchange. They are
1. mail user agent (MUA) :A mail user agent (MUA) is a program that allows you to receive and send
e-mail messages; it's usually just called an e-mail program. To use an MUA such as Eudora or
Microsoft Outlook, you install the MUA program on your computer and then use it to download
and store e-mail messages to your computer; it will also allow you to read or write messages
offline. Web-based MUAs, such as Hotmail and Yahoo, store messages on their own mail servers
and allow access to them through a Web page. An MUA is sometimes called an e-mail agent or an
e-mail client.
2. message transfer agent (MTA) :A message transfer agent (MTA) is a software application used
within an Internet message handling system (MHS). It is responsible for transferring and routing
an electronic mail message from the sender’s computer to the recipient’s computer. The basic
platform for an MTA is an exchange system with client/server architecture.
3. mail server (or email server) :A mail server (or email server) is a computer system that sends and
receives email. In order for a computer system to function as a mail server, it must include mail
server software. This software allows the system administrator to create and manage email
accounts for any domains hosted on the server.
Mail servers send and receive email using standard email protocols. For example, the
SMTP protocol sends messages and handles outgoing mail requests. The IMAP and POP3
protocols receive messages and are used to process incoming mail. When you log on to a mail
server using a webmail interface or email client, these protocols handle all the connections behind
the scenes.
4. Domain Name System : Domain Name System (or Service or Server), an Internet service that
translates domain names into IP addresses. Because domain names are alphabetic, they're easier
to remember. The Internet however, is really based on IP addresses. Every time you use a domain
name, therefore, a DNS service must translate the name into the corresponding IP address. For
example, the domain name www.example.com might translate to 198.105.232.4.
Advantages of e-mail:
E-mail has prooved to be powerful and reliable medium of commmunication. Here are the
benefits of E-mail:
ICT - 2 UNIT - III
Prepared By Mr.D.Sulthan Basha Page 29
Lecturer in Computer Science
 Reliable
 Convenience
 Speed
 Inexpensive
 Printable
 Global
 Generality
Reliable
Many of the mail systems notify the sender if e-mail message was undeliverable.
Convenience
There is no requirement of stationary and stamps. One does not have to go to post office. But all
these things are not required for sending or receiving an mail.
Speed
E-mail is very fast. However, the speed also depends upon the underlying network.
Inexpensive
The cost of sending e-mail is very low.
Printable
It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an e-mail can also be saved
for records.
Global
E-mail can be sent and received by a person sitting across the globe.
Generality
It is also possible to send graphics, programs and sounds with an e-mail.
Disadvantages:
Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:
 Forgery
 Overload
 Misdirection
 Junk
 No response
Forgery
E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since sender is
usually not authenticated in any way.
Overload
Convenience of E-mail may result in a flood of mail.
Misdirection
It is possible that you may send e-mail to an unintended recipient.
Junk
Junk emails are undesirable and inappropriate emails. Junk emails are sometimes referred to as
spam.
No Response
It may be frustrating when the recipient does not read the e-mail and respond on a regular basis.
Composing and Sending Email:
Before sending an email, we need to compose a message. When we are composing an email
message, we specify the following things:
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 30
 Sender’s address in To field
 Cc (if required)
 Bcc (if required)
 Subject of email message
 Text
 Signature
You should specify the correct email address; otherwise it will send an error back to
the sender.
Once you have specified all the above parameters, It’s time to send the email. The mailer
program provides a Send button to send email, when you click Send, it is sent to the mail
server and a message mail sent successfully is shown at the above.
Reading Email:
Every email program offers you an interface to access email messages. Like in Gmail, emails
are stored under different tabs such as primary, social, and promotion. When you click one of
tab, it displays a list of emails under that tab.
In order to read an email, you just have to click on that email. Once you click a particular
email, it gets opened.
The opened email may have some file attached with it. The attachments are shown at the
bottom of the opened email with an option called download attachment.
Replying Email:
After reading an email, you may have to reply that email. To reply an email, click Reply option
shown at the bottom of the opened email.
Once you click on Reply, it will automatically copy the sender’s address in to the To field.
Below the To field, there is a text box where you can type the message.
Once you are done with entering message, click Send button. It’s that easy. Your email is sent.
Forwarding Email:
It is also possible to send a copy of the message that you have received along with your own
comments if you want. This can be done using forward button available in mail client
software.
The difference between replying and forwarding an email is that when you reply a message to
a person who has send the mail but while forwarding you can send it to anyone.
When you receive a forwarded message, the message is marked with a > character in front of
each line and Subject: field is prefixed with Fw.
Deleting Email
If you don’t want to keep email into your inbox, you can delete it by simply selecting the
message from the message list and clicking delete or pressing the appropriate command.
Some mail clients offers the deleted mails to be stored in a folder called deleted items or trash
from where you can recover a deleted email.
ICT - 2 UNIT - III
Prepared By Mr.D.Sulthan Basha Page 31
Lecturer in Computer Science
Parts of e-mail address:
 User Name:
The first part of an email address is the user name, which identifies you personally on the
mail server that you use. Each user name on a server must be different and consists of
letters, numbers or special characters such as underscores or periods. Your user name
might be your first initial and last name, a business name or anything else you want to use
to identify yourself on the Internet.
 @ Symbol
The symbol "@", called the "at" symbol, connects the user name of an email address to
the mail server, or domain. It tells the Internet that your user name can be found at that
domain.
 Domain Name
The domain name in an email address appears after the @ symbol and identifies the
Internet domain that handles your email. It can be further broken down into two parts: the
name of the computer or server that handles the mail and the top-level domain, often
"com," "gov" or "edu," which stand for commercial business, government agency and
educational institution, respectively, according to St. Edward's University. An example of a
domain name is "SKU.com."
 Etiquette:
The term etiquette refers to conventional rules of personal behavior. But while
communicating via email, we cannot know about the body language and tone of voice etc.
Therefore a set of guidelines for acceptable behavior on email that have been evolved is
known as Email Netiquette.
 Here are set of guidelines that should be followed while working with email:
 Try to make your message as short as possible. It will make your message easy to read and
understood.
 Be careful about spelling and grammar while typing a message.
 Use emoticons, smiles when required.
 Email address entered must be correct.
 The subject heading of a message should be clear and descriptive.
 Follow the same rules as if you are writing a letter or a memo.
 Sending a message that has already been forwarded or replied many times may contain
many angled brackets. It is better to remove the angled brackets from the message.
 While sending mails to multiple persons, specify their email addresses in the BCC: field so
that the spammers cannot come to know about addresses of other recipients to whom
you have sent a copy.
 Keep size of attachment as small as possible.
 Always add your signature at the end of email.
 Before you send, make it sure everything is fine because you cannot call back a sentmail.
Message Componenets:
Email
Email is a service which allows us to send the message in electronic mode over the internet. It
offers an efficient, inexpensive and real time mean of distributing information among people.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 32
E-Mail Address
Each user of email is assigned a unique name for his email account. This name is known as E-mail
address. Different users can send and receive messages according to the e-mail address.
E-mail is generally of the form username@domainname.
For example, webmaster@tutorialspoint.com is an e-mail address where webmaster is username
and tutorialspoint.com is domain name.
 The username and the domain name are separated by @ (at) symbol.
 E-mail addresses are not case sensitive.
 Spaces are not allowed in e-mail address.
E-mail Message Components
E-mail message comprises of different components: E-mail Header, Greeting, Text, and Signature.
These components are described in the following diagram:
E-mail Header
The first five lines of an E-mail message is called E-mail header. The header part comprises of
following fields:
 From
 Date
 To
 Subject
 CC
 BCC
ICT - 2 UNIT - III
Prepared By Mr.D.Sulthan Basha Page 33
Lecturer in Computer Science
From: The From field indicates the sender’s address i.e. who sent the e-mail.
Date: The Date field indicates the date when the e-mail was sent.
To:The To field indicates the recipient’s address i.e. to whom the e-mail is sent.
Subject: The Subject field indicates the purpose of e-mail. It should be precise and to the point.
CC: CC stands for Carbon copy. It includes those recipient addresses whom we want to keep informed but
not exactly the intended recipient.
BCC: BCC stands for Black Carbon Copy. It is used when we do not want one or more of the recipients to
know that someone else was copied on the message.
Greeting: Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc.
Text: It represents the actual content of the message.
Signature:This is the final part of an e-mail message. It includes Name of Sender, Address, and Contact
Number.
Message composition:
Follow these step-by-step instructions to send an email
Step 1: Log in to your Gmail account so that you are on the dashboard (main page) of your mail
account.
Step 2: Click Compose.
Step 3: A new blank email window will open up. In the ‘To’ box, type in the email address of the
recipient.
Step 4: You might want to include someone else in your email to ‘keep them in the loop’. You can
do this by clicking Cc or Bcc, which will open another field. ‘Cc’ means ‘carbon copy’ and ‘Bcc’
means ‘blind carbon copy’. Adding an email address to the ‘Cc’ field means that that person will
receive a copy of the email and all the other recipients will see their email address. If an email
address is put into the 'Bcc’ field, the person will get a copy of the email but no other recipient will
see that address.
If you are sending the same email to lots of different people, it’s a good idea to put all the
email addresses in the ‘Bcc’ field to keep your ‘mailing list’ confidential. That way, there’s no
chance that it could fall into the hands of a spammer or hacker.
Step 5: The subject field allows you to give the recipient an idea of the topic of your email, like a
heading. You don’t have to put anything in the subject box, but it can help when viewing and
sorting email.
Step 6: Enter text to send recipient.
Step 7:click the blue Send button at the bottom of the compose window.
Step 8: The email you’ve sent will now be stored in the ‘Sent Mail’ folder on your Gmail
dashboard. You may have to run your mouse pointer over the Inbox folder link to see the other
folders.
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com 34
Netiquette:
Emails are often written in an informal style, and are generally brief.
The text of an email is entered in the main body of the message. The most important tip for
writing an email message is brevity (netiquette). People typically get so many emails in a day that
a long email often doesn't get read until later -- sometimes much, much later, if at all. Remember
that you can copy text from a document or another email and paste it into a new email, so you
don't have to retype text. Many email programs will also let you paste pictures and documents
directly into your message. Email is more informal than paper mail because it is used with more
frequency and immediacy. Unless it is a personal letter, email usually gets right to the point
without a lengthy introduction. Many people don't include a "Dear Sir" clause, and often do not
include a signoff, letting the "To:" and "From:" fields speak for themselves. Signatures can also
include a standard signoff. Make sure that you have turned off any word wrap options that cut
lines into standard lengths by inserting carriage returns, since these are unnecessary and cause
formatting problems with most modern email programs. You can avoid having the formatting of
your email get messed up by putting your email in Text Standard Format.
E-mail System
E-mail system comprises of the following three components:
 Mailer
 Mail Server
 Mailbox
ICT - 2 UNIT - III
Prepared By Mr.D.Sulthan Basha Page 35
Lecturer in Computer Science
Mailer
It is also called mail program, mail application or mail client. It allows us to manage, read and
compose e-mail.
Mail Server
The function of mail server is to receive, store and deliver the email. It is must for mail servers to
be sunning all the time because if it crashes or is down, email can be lost.
Mailboxes
Mailbox is generally a folder that contains emails and information about them.
Working of E-mail
Email working follows the client server approach. In this client is the mailer i.e. the mail
application or mail program and server is a device that manages emails.
Following example will take you through the basic steps involved in sending and receiving emails
and will give you a better understanding of working of email system:
 Suppose person A wants to send an email message to person B.
 Person A composes the messages using a mailer program i.e. mail client and then select
Send option.
 The message is routed to Simple Mail Transfer Protocol to person B’s mail server.
 The mail server stores the email message on disk in an area designated for person B.
The disk space area on mail server is called mail spool.
 Now, suppose person B is running a POP client and knows how to communicate with B’s
mail server.
 It will periodically poll the POP server to check if any new email has arrived for B.As in this
case, person B has sent an email for person B, so email is forwarded over the network to
B’s PC. This is message is now stored on person B’s PC.
The following diagram gives pictorial representation of the steps discussed above:
*******
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com
36
WWW [WORLD WIDE WEB]
Introduction:
The World Wide Web is an information retrieval system based on hypertext. In hypertext
selected words or areas on the screen are expandable; leading to more details about subject. A
hypertext allows you to view information without using complex commands and without even
using source of information. When a hyperlink [link to another page] is attached to the text is
called as hypertext.
A Browser is a client application used to access the information on WWW [W3]. The
Browser displays WebPages and makes the connection necessary to follow hypertext links. W3 is a
global hypertext system that uses the internet as its transmission medium. The WWW enables
you to access information on the internet without the use of complicated commands. By linking
resources throughout the internet the web browsing [searching] a collection of information to
your doorstep.
The W3 could be very simple defined as a universal database of knowledge. Information
i.e. easily accessible to people around the world and links easily transfer to other pieces of
information. These allow any user quickly to find the things. It is an internet resource where one
can get the information about different topics such as types of networks, types of computers,
types of OS, etc.
Origins of the WWW:-
Like many internet technology the W3 has its origins in the research community. The web
is based on “ HTTP ”, the hypertext transfer protocol which was developed at “ CERN ” (Conseil
Européen pour la Recherche Nucléaire), the European laboratory for particle physics in
Switzerland. Web technology developed virginally to health areas searches access information and
shares their work via the internet.
Today there are thousands of web servers throughout the world. Web browsers, who are
available for just about every type of computer made enable millions of people to use the W3.
Here the web provided with a single mechanism for information retrieval, regardless the type of
computer and the type of resource. After CERN established specifications for the web, software
for web services and clients developed quickly on the internet.
The two main uses of the World Wide Web are to retrieve resources and to publish
information on the internet. You can access almost any internet resource using the W3. You can
publish your own hypertext documents on W3. Web documents are written in “HTML”( Hypertext
mark up language). Simplify the task of creating documents that contain hyperlinks to other
information.
______________________________________________________________________________
2.W3 gateways to other services:-
Through the W3 you have access not just to web hypertext documents or pages but also to
other internet resources. The web connects directly to some of these resources.
A gateway is a link between two systems that performs a similar function but work
differently the gateway translates address and protocols between two systems so that they can
work together.
ICT - 2 UNIT - IV
Prepared By Mr.D.Sulthan Basha Page 37
Lecturer in Computer Science
Working of W3:
1) User sends request
2) Browser interprets user’s selection or request and makes request from appropriate server.
3) Server accepts and process request from browser.
4) Server sends requested files to browser, browser to be interpreted.
5) User receives file displayed by the browser.
3.Web terminologies:
a. Webpage:-
A document, generally written in HTML, which is almost always accessible via HTTP, A
protocol that transfers information from the web server to display in the users web
browser.
b. Website :-
A collection of web pages , images ,videos or other digital assets, that is hosted (located)
on one or several web servers, usually accessible via the internet, cell phone or LAN i.e.,
LOCAL AREA NETWORK, etc.
c. Web server :-
A computer that is only used to display web sites and web pages based on user given
request.
d. Web browser:-
A computer program (such as internet explorer, Mozilla Firefox, opera mini etc). That
enables internet users to access, navigate (operate), and search W3 sites. Browsers
interpret hyper text links and allow documents formatted in hypertext makeup language
(HTML) to be viewed on the computer Screen and provide many other services including e-
mail and downloading, uploading of data, audio and video files.
e. URL:-
URL stands for “uniform resource locater “. Uniform resource locater is the global address
of documents and other resources on the World Wide Web.
The first part of the URL is called a protocol identifiers and it indicates what protocol to
use,and the second part is called a resource name and its specifies IP address or the Domain
name were the resource is located. The protocol identifiers and the resource name are
separated by a colon (:) and two forward slashes(//).
For example:- consider the following URL http://www.google.com
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com
38
f. Home page:-
The default entry page to a website or starting page of the website is called as Home page.
If a user only inputs a domain name (name of the website) in a browser, the browser will
began downloading the Homepage.
g. HTML:-
HTML means hypertext Mark up Language. It is a standard mark up coding language for
creating web pages. It is also the source code that the computer reads to create the web
page.
h. HTTP:-
HTTP means Hyper Text Transfer Protocol. It is standard protocol for addressing hyper
text web pages on the web.
i. HYPER TEXT:-
Electronic document text, i.e.., connected (hyper linked) through the other link of the text
to which the reader or user is transferred by a mouse click. It is usually deferred from the
normal text by a different colour by underlining or by both hyper texts is non –linear, i.e.,
the reader can jump from anywhere to anywhere while pursuing a chain of thought.
j. HYPER MEDIA:-
Hyper media is a term derived from hypertext, extended the notation of the hypertext link
to include links among any set of multimedia objects, including sound, motion video and
virtual reality. It can also connect a high-level of user or network with the help of
hypertext.
4.Searching the W3:-
The web is a World Wide resource of a information a primary reason that people use the
web is to search for specific information including text, pictures, music and video. The first step in
successing searching is to identify the main idea or concept in the topic about which your seeking
information. Determine any synonyms, alternate spellings or variant world forms for the topic.
Then, use a search tool to locate the information.
Two types of search tools are search engines and subject directives
1) A search engines is a program that finds websites, web pages, images, videos, news,
maps and other information related to a specific topic.
2) A subject directives classifies webpage’s in an organized set of categories, such as
sports or shopping and related sub categories.
Search engine and it’s types:-
Search engine is a web software programme or web based script available over the
internet that searching documents and files keywords and returns the list of results containing
those keywords today, therefore no of different search engines available on the internet, each
with their own technique and specialties. Search engine optimization technique to improve
visibility of a website in search engine.
In search engine industry archive was the first search engine, which was used to search for
FTP (file transfer protocol) files and in the other side the first text based “search engine” is known
as“Veronica”. Because large search engines contain millions and sometimes billions of pages,
many search engines are not only just searching the pages but also display the results depending
upon their importance. This importance is commonly determined by using various algorithms’
there are currently different types of search engines available like Google, yahoo, ask.com etc.
The working of search engine is divided into two parts
ICT - 2 UNIT - IV
Prepared By Mr.D.Sulthan Basha Page 39
Lecturer in Computer Science
1) Crawling
2) Indexing
A crawler is a programme that retrieves web pages, commonly for use by search engines.
In crawling process, spider or crawler visits the pages that will be included in the search and grabs
(Retrieve) the contended of each of those pages after the crawling creases indexing process is
started in data base. Often this involves stripping out stop words, grabbing (to gather the
information) the location of each of the words in the page, the relevancy they Acer, back links to
other pages, images and so on. This data is used to rank the page and is the primary method of a
search engine uses to determine if a page should be shown and in what order finally, once the
data has been processed it is often broken up into one or servers, or loaded into primary memory
where it can be accessed when users perform a search.
Web crawlers follow links from one page to another and index the content search engine is
divided in to following types.
1) Crawler based search engine:-
Crawler based search engines used automated software programs to survey categorize
web pages. The program used by the search engines to access your web pages are called
spider, crawlers, robots, bots.
A spider will find a webpage, download it and analyse the information presented on the
web page. This is a continuous seamless process. The web pages will then be added to the
search engines database. Then when a user performs a search engine will check if
database of web pages for the keywords the user search onto present a list of link results.
The results (list of suggested links to go to), are listed on pages by order of which is closest
(as defined by the bots), to what the user wants to find online.
Crawler-based search engines are constantly searching the internet for new web
pages and updating their database of information with these new or altered pages.
Example of crawler-based search engines are ‘Google’ ( www.google.com), Ask Jives
(www.ask.com)
2) Directory :-
A directory uses human editors. Who besides what category the site belongs to, they place
websites with in specific categories’ in the “directories database”. The human editors
comprehensively check the website and rank kit based on the information they find, using a
predefined set f rules. There are two major directives at the time of writing: yahoo directories
(www.yahoo.com) and open directory (www.dmoz.org).
3) Hybrid search engines:-
Hybrid search engines use a combination of both crawler based results and directory
results more and more search engines these days are moving to a hybrid based model. E.g.
of hybrid search engines are yahoo(www.yahoo.com), Google (www.google.com).
4) Meta search engine :-
Meta search engines take the results from all the other search engines results, and
combine them into one large listing. E.g. of meta search engines includes: Meta crawler
(www.metacrawler.com) and dog pile (www.dogpile.com).
*******
Department of Computer Science & Applications SSGS-DC-GTL
If you found any queries please contact with sulthanbasha4students@gmail.com
40
BASIC HTML
Introduction:
HTML stands for Hyper Text Markup Language, which is the most widely used language on
Web to develop web pages. HTML was created by Berners-Lee in late 1991 but "HTML 2.0" was
the first standard HTML specification which was published in 1995. HTML 4.01 was a major
version of HTML and it was published in late 1999. Though HTML 4.01 version is widely used but
currently we are having HTML-5 version which is an extension to HTML 4.01, and this version was
published in 2012. HTML stands for Hypertext Markup Language, and it is the most widely used language
to write Web Pages. The definition of HTML is HyperText Markup Language.
 HyperText is the method by which you move around on the web — by clicking on special
text called hyperlinks which bring you to the next page. The fact that it is hyper just means
it is not linear — i.e. you can go to any place on the Internet whenever you want by
clicking on links — there is no set order to do things in.
 Markup is what HTML tags do to the text inside them. They mark it as a certain type of
text (italicised text, for example).
 HTML is a Language, as it has code-words and syntax like any other language.
Originally, HTML was developed with the intent of defining the structure of documents like
headings, paragraphs, lists, and so forth to facilitate the sharing of scientific information between
researchers.
Now, HTML is being widely used to format web pages with the help of different tags
available in HTML language.
Features of HTML:
 It is a formatting language for text and images.
 It allows us to read the content nonlinearly by using hyperlinks to a file.
 HTML is an application of SGML.
 HTML uses markup tags to describe web pages
 It is not case sensitive i.e. code can be written in small case or uppercase letters.
 All the HTML documents have “.html” or “.htm” extension.
 HTML documents can be edited using editors such as notepad or front page.
The advantages of HTML:
 It allows embedding scripts, to generate dynamic content
 It can incorporate images and sounds with the help of HTML tags.
 It facilitates Moving and layered text
 It allows framed documents
 It allows absolute positioning of text and image.
 Spreadsheets, video clips, pdf files can be embedded in HTML documents with the support of
third party plug-ins.
The disadvantages of HTML:
 HTML can produce only static content
 It does not facilitate headers, footers, footnotes.
 Mathematical typesetting is difficult
 Browser Dependent
 No tabs and other automatic character spacing
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses
SULTHAN's ICT-2 for UG courses

More Related Content

What's hot (20)

Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
os - Copy
os - Copyos - Copy
os - Copy
 
Computer Network Unit I RGPV
Computer Network Unit I RGPV Computer Network Unit I RGPV
Computer Network Unit I RGPV
 
internet
internetinternet
internet
 
Computer Network
Computer NetworkComputer Network
Computer Network
 
Data Processing
Data ProcessingData Processing
Data Processing
 
raymart aborque
raymart aborqueraymart aborque
raymart aborque
 
Fundamentals of DBMS
Fundamentals of DBMSFundamentals of DBMS
Fundamentals of DBMS
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Ipt Syllabus Changes Communications Systems
Ipt Syllabus Changes   Communications SystemsIpt Syllabus Changes   Communications Systems
Ipt Syllabus Changes Communications Systems
 
7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics7312334 chapter-7 a-networking-basics
7312334 chapter-7 a-networking-basics
 
Tìm hiểu về internet và các giao thức phổ biến
Tìm hiểu về internet và các giao thức phổ biếnTìm hiểu về internet và các giao thức phổ biến
Tìm hiểu về internet và các giao thức phổ biến
 
POLITEKNIK MALAYSIA
POLITEKNIK MALAYSIAPOLITEKNIK MALAYSIA
POLITEKNIK MALAYSIA
 
Database Management System
Database Management SystemDatabase Management System
Database Management System
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Note -02
Note -02Note -02
Note -02
 
Note 01
Note 01Note 01
Note 01
 
320 324
320 324320 324
320 324
 
Computer Networking.
Computer Networking.Computer Networking.
Computer Networking.
 

Similar to SULTHAN's ICT-2 for UG courses

Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notesRavi Rajput
 
Computer Networks and Topologies.pptx
Computer Networks and Topologies.pptxComputer Networks and Topologies.pptx
Computer Networks and Topologies.pptxneymarjr65
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networkingJyoti Kumari
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationGambari Amosa Isiaka
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptxsairakesh41
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptxAkshayIngole17
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenĐô GiẢn
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptxmusfirafatima3
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksPankaj Gautam
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1Mukesh Tekwani
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XIIFernando Torres
 

Similar to SULTHAN's ICT-2 for UG courses (20)

Presentation1 Networking.pptx
Presentation1 Networking.pptxPresentation1 Networking.pptx
Presentation1 Networking.pptx
 
Computer network unit 1 notes
Computer network unit  1 notesComputer network unit  1 notes
Computer network unit 1 notes
 
Computer Networks and Topologies.pptx
Computer Networks and Topologies.pptxComputer Networks and Topologies.pptx
Computer Networks and Topologies.pptx
 
Seminar report-networking
Seminar report-networkingSeminar report-networking
Seminar report-networking
 
Internet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentationInternet, Intranet and Extranet presentation
Internet, Intranet and Extranet presentation
 
1 computer networks basic
1 computer networks basic1 computer networks basic
1 computer networks basic
 
Note 1
Note 1Note 1
Note 1
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Unit2[1]
Unit2[1]Unit2[1]
Unit2[1]
 
Network Fundamentals1.pptx
Network Fundamentals1.pptxNetwork Fundamentals1.pptx
Network Fundamentals1.pptx
 
10 New Web Application and Security.pptx
10 New Web Application and Security.pptx10 New Web Application and Security.pptx
10 New Web Application and Security.pptx
 
Ex 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chenEx 1 chapter02-communicating-network-tony_chen
Ex 1 chapter02-communicating-network-tony_chen
 
Unit I Networking.pptx
Unit I Networking.pptxUnit I Networking.pptx
Unit I Networking.pptx
 
Computer Communications
Computer CommunicationsComputer Communications
Computer Communications
 
Computer network
Computer networkComputer network
Computer network
 
Computer Networks.pptx
Computer Networks.pptxComputer Networks.pptx
Computer Networks.pptx
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Data communications ch 1
Data communications   ch 1Data communications   ch 1
Data communications ch 1
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 

Recently uploaded

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

SULTHAN's ICT-2 for UG courses

  • 1.
  • 2.
  • 3. INFORMATION & COMMUNICATION TECHNOLOGY –2 (ICT-2) Internet Fundamentals and Web Tools Common for BA / BCom / B Sc / BBA III Semester (30 Hours of Teaching Learning including Lab) Unit-I Fundamentals of Internet : Networking Concepts, Data Communication – Types of Networking, Internet and its Services, Internet Addressing – Internet Applications – Computer Viruses and its types – Browser –Types of Browsers. Unit-II Internet applications: Using Internet Explorer, Standard Internet Explorer Buttons, Entering a Web Site Address, Searching the Internet – Introduction to Social Networking: twitter, tumblr, Linkedin, facebook, flickr, skype, yelp, vimeo, yahoo!, google+, youtube, WhatsApp, etc. Unit-III E-mail :Definition of E-mail - Advantages and Disadvantages – UserIds,Passwords, Email Addresses, Domain Names, Mailers, Message Compoents, Message Composition, Mail Management,Email Inner Workings. Unit IV WWW- Web Applications, Web Terminologies, Web Browsers,URL – Components of URL, Searching WWW – Search Engines and Examples Unit-V Basic HTML: Basic HTML – Web Terminology – Structure of a HTML Document– HTML, Head and Body tags – Semantic and Syntactic Tags – HR, Heading, Font, Image and Anchor Tags –Different types of Lists using tags – Table Tags, Image formats – Creation of simple HTML Documents. Reference Books : 1. In-line/On-line : Fundamentals of the Internet and the World Wide Web, 2/e - by Raymond Greenlaw and Ellen Hepp, Publishers : TMH
  • 4.
  • 5. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 1 Lecturer in Computer Science FUNDAMENTAL OF INTERNET Network  The collection of interconnected computers is called a computer network.  Two computers are said to be interconnected if they are capable of sharing and exchanging information. Need of Network:  Resource Sharing  Reliability  Cost Factor  Communication Medium Resource Sharing means to make all programs, data and peripherals available to anyone on the network irrespective of the physical location of the resources and the user. Reliability means to keep the copy of a file on two or more different machines, so if one of them is unavailable (due to some hardware crash or any other) them its other copy can be used. Cost factor means it greatly reduces the cost since the resources can be shared Communication Medium means one can send messages and whatever the changes at one end are done can be immediately noticed at another. Advantages and Disadvantages of Network: A computer network can be identified as a group of computers that are interconnected for sharing data between them or their users. There is a wide variety of networks and their advantages and disadvantages mainly depend on the type of network.
  • 6. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 2 Advantages of Computer Networking 1. Easy Communication and Speed: It is very easy to communicate through a network. People can communicate efficiently using a network with a group of people. They can enjoy the benefit of emails, instant messaging, telephony, video conferencing, chat rooms, etc. 2. Ability to Share Files, Data and Information: This is one of the major advantages of networking computers. People can find and share information and data because of networking. This is beneficial for large organizations to maintain their data in an organized manner and facilitate access for desired people. 3. Sharing Hardware: Another important advantage of networking is the ability to share hardware. For an example, a printer can be shared among the users in a network so that there’s no need to have individual printers for each and every computer in the company. This will significantly reduce the cost of purchasing hardware. 4. Sharing Software: Users can share software within the network easily. Networkable versions of software are available at considerable savings compared to individually licensed version of the same software. Therefore large companies can reduce the cost of buying software by networking their computers. 5. Security: Sensitive files and programs on a network can be password protected. Then those files can only be accessed by the authorized users. This is another important advantage of networking when there are concerns about security issues. Also each and every user has their own set of privileges to prevent them accessing restricted files and programs 6. Speed: Sharing and transferring files within networks is very rapid, depending on the type of network. This will save time while maintaining the integrity of files. Disadvantages of Networking 1. Breakdowns and Possible Loss of Resources: One major disadvantage of networking is the breakdown of the whole network due to an issue of the server. Such breakdowns are frequent in networks causing losses of thousands of dollars each year. Therefore once established it is vital to maintain it properly to prevent such disastrous breakdowns. The worst scenario is such breakdowns may lead to loss of important data of the server. 2. Expensive to Build: Building a network is a serious business in many occasions, especially for large scale organizations. Cables and other hardware are very pricey to buy and replace. 3. Security Threats: Security threats are always problems with large networks. There are hackers who are trying to steal valuable data of large companies for their own benefit. So it is necessary to take utmost care to facilitate the required security measures.
  • 7. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 3 Lecturer in Computer Science 4. Bandwidth Issues: In a network there are users who consume a lot more bandwidth than others. Because of this some other people may experience difficulties. Data communication system: Data communication refers to the exchange of data between a source and a receiver via form of transmission media such as a wire cable. Data communication is said to be local if communicating devices are in the same building or a similarly restricted geographical area. Characteristics of data communications: 1. Delivery: The data must be deliver in correct order with correct destination. 2.Accuracy: The data must be deliver accurately. 3. Timeliness: The data must be deliver in a timely manner.late delivered Data useless. Components of data communication system A Communication system has following components: 1. Message: It is the information or data to be communicated. It can consist of text, numbers, pictures, sound or video or any combination of these. 2. Sender: It is the device/computer that generates and sends that message. 3. Receiver: It is the device or computer that receives the message. The location of receiver computer is generally different from the sender computer. The distance between sender and receiver depends upon the types of network used in between. 4. Medium: It is the channel or physical path through which the message is carried from sender to the receiver. The medium can be wired like twisted pair wire, coaxial cable, fiber-optic cable or wireless like laser, radio waves, and microwaves. 5. Protocol: It is a set of rules that govern the communication between the devices. Both sender and receiver follow same protocols to communicate with each other.
  • 8. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 4 A protocol performs the following functions: 1. Data sequencing. It refers to breaking a long message into smaller packets of fixed size. Data sequencing rules define the method of numbering packets to detect loss or duplication of packets, and to correctly identify packets, which belong to same message. 2. Data routing. Data routing defines the most efficient path between the source and destination. 3. Data formatting. Data formatting rules define which group of bits or characters within packet constitute data, control, addressing, or other information. 4. Flow control. A communication protocol also prevents a fast sender from overwhelming a slow receiver. It ensures resource sharing and protection against traffic congestion by regulating the flow of data on communication lines. 5. Error control. These rules are designed to detect errors in messages and to ensure transmission of correct messages. The most common method is to retransmit erroneous message block. In such a case, a block having error is discarded by the receiver and is retransmitted by the sender. 6. Precedence and order of transmission. These rules ensure that all the nodes get a chance to use the communication lines and other resources of the network based on the priorities assigned to them. 7. Connection establishment and termination. These rules define how connections are established, maintained and terminated when two nodes of a network want to communicate with each other. Communication or Transmission media: Communication medium refers to the physical channel through which data is sent and received. Data is sent in the form of voltage levels which make up the digital signal. A digital signal consists of 0s and 1s; essentially, a 1 corresponds to a high voltage, while a 0 corresponds to a low voltage. The speed of data transmission or data rate depends upon the type of medium being used in the network. There are basically two types of networks:  Wired network  Wireless network Wired Network In a wired network, data is transmitted over a physical medium. There are three types of physical cables used in a wired network. 1. Twisted pair cable: – It consists of two identical 1 mm thick copper wires insulated and twisted together. The twisted pair cables are twisted in order to reduce crosstalk and electromagnetic induction. Advantages: (i) It is easy to install and maintain. (ii) It is very inexpensive Disadvantages: (i) It is incapable to carry a signal over long distances without the use of repeaters. (ii) Due to low bandwidth, these are unsuitable for broadband applications.
  • 9. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 5 Lecturer in Computer Science 2. Co-axial Cables: It consists of a solid wire core surrounded by one or more foil or braided wire shields, each separated from the other by some kind of plastic insulator. It is mostly used in the cable wires. Advantages: (i) Data transmission rate is better than twisted pair cables. (ii) It provides a cheap means of transporting multi-channel television signals around metropolitan areas. Disadvantages: (i) Expensive than twisted pair cables. (ii) Difficult to manage and reconfigure. 3. Optical fiber: – An optical fiber consists of thin glass fibers that can carry information in the form of visible light. Advantages: (i) Transmit data over long distance with high security. (ii) Data transmission speed is high (iii) Provide better noise immunity (iv) Bandwidth is up to 10 Gbps. Disadvantages: (i) Expensive as compared to other guided media. (ii) Need special care while installation? Wireless Network A wireless network uses radio waves as the sole medium for transmitting and receiving data. There are no wires involved. An example is the wireless router in your home. Radio waves are electromagnetic waves which are transverse in nature and they have the longest wavelength on the electromagnetic spectrum. 1. Infrared: – The infrared light transmits data through the air and can propagate throughout a room, but will not penetrate walls. It is a secure medium of signal transmission. The infrared transmission has become common in TV remotes, automotive garage doors, wireless speakers etc. 2. Radio Wave: – Radio Wave an electromagnetic wave with a wavelength between 0.5 cm and 30,000m. The transmission making use of radio frequencies is termed as radio-wave transmission Advantages: (i) Radio wave transmission offers mobility. (ii) It is cheaper than laying cables and fibers. (iii) It offers ease of communication over difficult terrain. Disadvantages: (i) Radio wave communication is insecure communication. (ii) Radio wave propagation is susceptible to weather effects like rains, thunder storms etc. 3. Microwave Wave: – The Microwave transmission is a line of sight transmission. Microwave signals travel at a higher frequency than radio waves and are popularly used for transmitting data over long distances.
  • 10. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 6 Advantages: (i) It is cheaper than laying cable or fiber. (ii) It has the ability to communicate over oceans. Disadvantages: (i) Microwave communication is an insecure communication. (ii) Signals from antenna may split up and transmitted in different way to different antenna which leads to reduce to signal strength. (iii) Microwave propagation is susceptible to weather effects like rains, thunder storms etc. (iv) Bandwidth allocation is extremely limited in case of microwaves. 4. Satellite link: – The satellite transmission is also a kind of line of sight transmission that is used to transmit signals throughout the world. Advantages: (i) Area covered is quite large. (ii) No line of sight restrictions such as natural mountains, tall building, towers etc. (iii) Earth station which receives the signals can be fixed position or relatively mobile. Disadvantages:- (i) Very expensive as compared to other transmission mediums. (ii) Installation is extremely complex. (iii) Signals sent to the stations can be tampered by external interference. (iii) Signals sent to the stations can be tampered by external interference. Network devices: Modem: A MODEM (MOdulator DEModulator) is an electronic device that enables a computer to transmit data over telephone lines. There are two types of modems, namely, internal modem and external modem. Ethernet Card: – It is a hardware device that helps in connection of nodes within a network. Hub: A hub is a hardware device used to connect several computers together. Hubs can be either active or passive. Hubs usually can support 8, 12 or 24 RJ45 ports. Switch: A switch (switching hub) is a network device which is used to interconnect computers or devices on a network. It filters and forwards data packets across a network. The main difference between hub and switch is that hub replicates what it receives on one port onto all the other ports while switch keeps a record of the MAC addresses of the devices attached to it. DATA COMMUNICATION TERMINOLOGIES Data channel :- The information / data carry from one end to another in the network by channel. Bits per second (bps) :- It’s used to measurement for the information carry of a communication channel. Measurement Units :- bit 1 Byte= 8 bits 1 KBPS ( Kilo Byte Per Second)= 1024 Bytes 1 Kbps (kilobits Per Second) = 1024 bits 1 Mbps ( Mega bits Per Second )=1024 Kbps
  • 11. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 7 Lecturer in Computer Science Bandwidth :- It is amount of information transmitted or receives per unit time. Types of protocols are: 1. HTTP 2. FTP 3. TCP/IP Hypertext Transfer Protocol (HTTP) is a communications protocol for the transfer of information on the intranet and the World Wide Web. HTTP is a request/response standard between a client and a server. A client is the end-user; the server is the web site. FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the Internet. The objectives of FTP are:  To promote sharing of files (computer programs and/or data).  To encourage indirect or implicit use of remote computers. Shield a user from variations in file storage systems among different hosts.  To transfer data reliably, and efficiently. TCP/IP (Transmission Control Protocol / Internet Protocol) TCP – is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. IP – is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world. Telnet-It is an older internet utility that lets us log on to remote computer system. It also facilitates for terminal emulation purpose. Terminal emulation means using a pc like a mainframe computer through networking. Types of Networks: There are three types of networks. They are 1. Local Area Network 2. Metropolitan Area Network 3. Wide Area Network Local Area Network LAN stands for Local Area Network. It normally connects the computers and other devices within one office, building or a group of nearby buildings.
  • 12. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 8 Advantages of LAN : 1. Resource Sharing Computer hardware resources like printers, modems, DVD-Rom drives and hard disks can be shared with the help of local area networks. This will reduce cost of hardware purchases. For example, a business organization using a Local Area Network for an office can use a single network printer for the employees of this office. 2. Software Applications Sharing It is cheaper to use same software over network instead of purchasing separate licensed software for each client in a network. It will cost more to purchase a separate licensed software for each computer in a network. 3. Easy and Cheap Communication Data and messages can easily be transferred over networked computers. It saves a lot of time and money. 4. Centralized Data The data of all network users can be saved on hard disk of the server computer. This will help users to use any workstation in a network to access their data. Because data is not stored on workstations locally. But it is stored on a server computer. User will access their own data by logging into their accounts from any client computer in the network. 5. Data Security Since, data is stored on server computer centrally, it will be easy to manage data at only one place and the data will be more secure too, because of more security for the server computer. 6.Internet Sharing Local Area Network provides the facility to share a single internet connection among all the LAN users. Disadvantages of LAN : 1. High Setup Cost Although the LAN will save cost over time due to shared computer resources but the initial setup costs of installing Local Area Networks is high. This is because any organization that will setup a network, will have to purchase necessary hardware equipment for networking. It may require a sophisticated server computer - a Mini Computer, Network LAN cards, Network Routers, HUBS / Switches, Networking Cables (for wired networks only) and connectors etc. Additionally a Network technician will be required for setting up a new network in an organization. 2. Privacy Violations The LAN administrator has the rights to check personal data files of each and every LAN user. Moreover he can check the internet history and computer use history of the LAN users. 3. Data Security Threat Unauthorized users can access important data of an organization if centralized data repository is not secured properly by the LAN administrator. LAN Administer is responsible for the security of the whole data resource in an organization.LAN administrator will implement a fully functional security policy for database safety.
  • 13. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 9 Lecturer in Computer Science 4. LAN Maintenance Job Local Area Network requires a LAN Administrator. Because, there are problems of software installations or hardware failures or cable disturbances in Local Area Network. A LAN Administrator is needed at this full time job. 5. Covers Limited Area Local Area Network covers a small area like one office, one building or a group of nearby buildings. Metropolitan Area Network or MAN: Introduction: MAN stands for Metropolitan Area Network. It interconnects number of LANs using high capacity backbone technology. It is a large network which usually spans city or large campus. It's geographic coverage is in between LAN and WAN. Advantages of MAN: Following are the benefits or advantages of MAN: ➨It utilizes drawbacks of both LAN and WAN to provide larger and controllable computer network. ➨MAN requires fewer resources compare to WAN. This saves the implementation cost. ➨It helps people interface fast LANs together. This is due to easy implementation of links. ➨It provides higher security compare to WAN. ➨It helps in cost effective sharing of common resources such as printers etc. ➨Like LAN and WAN, it also offers centralized management of data and files. Disadvantages of MAN: Following are the disadvantages of MAN: ➨It is difficult to manage the network once it becomes large. ➨It is difficult to make the system secure from hackers and industrial espionage. ➨Network installation requires skilled technicians and network administrators. This increases overall installation and management costs. ➨It requires more cables for connection from one place to the other compare to LAN.
  • 14. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 10 Wide Area Network or WAN: A WAN connects more than one LAN and is used for larger geographical areas. WANs are similar to a banking system, where hundreds of branches in different cities are connected with each other in order to share their official data. A WAN works in a similar fashion to a LAN, just on a larger scale. Typically, TCP/IP is the protocol used for a WAN in combination with devices such as routers, switches, firewalls and modems. Advantages of WAN : 1. It covers large geographical area therefore networks can be made between long distances. 2. Everyone on that network can access the same data. This avoids problems where some users may have older information than others. 3. Different peripherals can be shared with all the computers in the network. 4. Shares software and resources with connecting workstations. Disadvantage of WAN : 1. Setting up the network could be expensive. 2. Maintaining a network is a full-time job which requires network supervisors and technicians to be employed. 3. Security is a real issue when many different people have the ability to use information from other computers. 4. Protection against hackers and viruses adds more complexity and expense. 5. Need a good firewall to restrict outsiders from entering and disrupting the network . INTERNET: Advantages of Internet: 1. Online Shopping Now today’s the trend of online shopping is growing up very fast. Users have now the facility of shop everything what they want without going outside to stores and super markets. 2. Benefits for Students Studies You are a student and you miss the lecture. Don’t worry internet helps students to find notes, essay, lectures, guidelines and more than points related to your subject are available in your books.
  • 15. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 11 Lecturer in Computer Science 3. Book Tickets online In the race of technology and companies are giving best services to their users. And almost all the airlines are providing advantages to their customer to buy the tickets online on internet. So people are no need to go to the agency or airline office. 4. Learn Online From Videos Internet is the solution of many problems. If you face any problem in your mobile, laptop, cars, television etc. You can easily find the solution on the screen with the help of video providing website. Mostly used websites for videos upload and downloads are YouTube, Dailymotion, tunepk, viemo and etc. 5. Play Online Games People fond of video games are easily access to download multiple games. Also can play online games with the help of internet connection. Without it you can’t play online either can’t download. 6. Entertainment Every day new movies and music lunched in every country almost. People how are fond to watch movies or listen music. They can easily find latest music and movies on Internet and can download it and also watch it online. 7. E-mailing Government Departments, Private Organization, Businesses, School, Colleges and Universities etc. And many other departments and peoples are using the e-mail services. And I’ll say that without e-mail conversation half of word would be stop work. Because big projects, secret information and files are shared through e-mails and this service is not possible without Internet Connection. 8. Results and Roll No Students of Universities and Colleges now even the students of Schools are easily see their results on internet. To access to the result you must need to put the right roll no in the search bar of school or college website. 9.Jobs Hundreds of mobile application, and thousands of website in every country. In their national language provide the services to the jobless peoples to find the jobs on Internet related to their experience and criteria. 10.Bank Accounts Money in your bank account is now same like money in your pocket. Yes you can login to your account and make online transactions either bank is open or close. 11.Buy and Sell If you have second hand or new bike, car, clothes, shoes, jewelry, mobile or laptop etc. You can place an add to website and easily can sell on reasonable price as compare to market. You can also buy same like this by contacting the selling person. 12.24/7: Internet is nonstop service all day all night all the time everywhere in the world.
  • 16. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 12 Disadvantages of Internet: 1. Shopping Quality When you shop online on internet. The things you buy sometime the quality of these things are very bad and will give you loss. Because you cannot see and touch the things properly during online shopping. 2. Loss of Studies Mostly students use the net for wrong purposes. Which are the cause of loss and big disadvantage for student’s studies. Because they spend more time while using online activates. 3. Loss of Money In advantages of we read that we can play online games. In disadvantages of internet we are talking about the people who are playing online games and spend money on these games. Once or two time you may win but not every time. People can loss their money online by playing games and also on other activates. 4. Health Disadvantages Before hundred years ago there was no any concept of Internet and computers etc. Now every third person uses these things. Because of it they all the day in the home and face many health problems and eye fatigues. 5. Viruses & Malware During browsing the different websites in your browsers. Some scripts are automatically download and install itself automatically. Some of them are viruses and these viruses can damage your computer, laptop and mobiles very badly. 6. Accounts Hacking Using of your account online may be chances of Hacking. Yes if you are using your account in mobile application and let suppose you lose mobile. The other person can easily transfer your money to any other account. 7. Data Stolen Chances Another big disadvantages of internet in points. If your computer is connected to the net, in this case hacker can come and stoles your file easily from your device. 8. Frauds Many peoples and website on Internet that are not real and not trusted. These are fake and can fraud you for money and other things. Services of Internet: Internet Services allows us to access huge amount of information such as text, graphics, sound and software over the internet. Following diagram shows the four different categories of Internet Services.
  • 17. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 13 Lecturer in Computer Science 1.Communication Services There are various Communication Services available that offer exchange of information with individuals or groups. The following table gives a brief introduction to these services: S.N. Service Description 1 Electronic Mail: Used to send electronic message over the internet. 2 Telnet: Used to log on to a remote computer that is attached to internet. 3 Newsgroup: Offers a forum for people to discuss topics of common interests. 4 Internet Relay Chat (IRC): Allows the people from all over the world to communicate in real time. 5 Mailing Lists:Used to organize group of internet users to share common information through e-mail. 6 Internet Telephony (VoIP): Allows the internet users to talk across internet to any PC equipped to receive the call. 7.Instant Messaging: Offers real time chat between individuals and group of people. Eg. Yahoo messenger, MSN messenger. 2.Information Retrieval Services There exist several Information retrieval services offering easy access to information present on the internet. The following table gives a brief introduction to these services: S.N. Service Description 1 File Transfer Protocol (FTP):Enable the users to transfer files. 2 Archie:It’s updated database of public FTP sites and their content. It helps to search a file by its name. 3 Gopher:Used to search, retrieve, and display documents on remote sites. 4 Very Easy Rodent Oriented Netwide Index to Computer Achieved (VERONICA) :VERONICA is gopher based resource. It allows access to the information resource stored on gopher’s servers. 3.Web Services Web services allow exchange of information between applications on the web. Using web services, applications can easily interact with each other. The web services are offered using concept of Utility Computing. 4.World Wide Web (WWW) WWW is also known as W3. It offers a way to access documents spread over the several servers over the internet. These documents may contain texts, graphics, audio, video, hyperlinks. The hyperlinks allow the users to navigate between the documents. Internet Addressing: The abbreviation URL stands for Uniform Resource Locator (lay people also call it “address” or “web address”). The URL address and the email address make two of the most
  • 18. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 14 important forms of identifications in the web directory. URLs are associated with webpages and other web resources. some interesting facts about URL:  In 1995, Tim Berners-Lee, father of the World Wide Web, defined and implemented a scheme of addressing each resource on the WWW or Internet. Such a scheme was extremely important because WWW contained millions of items (like images, web pages, files etc.) and each needed to be uniquely identified for Internet to work smoothly. Barnes- Lee called these addresses as Uniform Resource Identifier (URI) — a name that was later changed to URL.  Today there are over 70 billion web pages and each one of these has a unique address (i.e. URL). That’s the power and importance of URL scheme!  A URL never contains any space.  Mostly a URL is in lowercase — although the letter case does not really matter in URL or email address.  Most of the URLs begin with http:// For Example: http://www.youtube.com Protocol: Every URL starts with the name of the language (geeks call it protocol) using which your computer and the server of this site. In this example, the language is Hypertext Transfer Protocol or http. The protocol is followed by the :// characters. World Wide Web: After protocol comes the famous www — in some URLs you will not find it but we will not go into those details. www simply means that the resource you are seeking by the means of this URL resides in the www subdomain of your domain name. Domain name / Resource Owner Then the name of the resource owner (i.e. domain name) comes; which is youtube in this case. Domain extension: Owner’s name is followed by the type of category in which the owner domain is registered. .com means that the website which is making this resource available to you is of the commercial nature. There are a lot of other types of categories as well. For example, .org for organizational website, .edu for educational institutions, .gov for government websites, .mil for military websites, .in says that the website has a connection with India. The below table shows organizational domain names:
  • 19. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 15 Lecturer in Computer Science The below table shows Geographical domain names: Computer Virus : “A computer virus is a program that may disturb the normal working of a computer system”. Virus attaches itself to files stored on floppy disks, USBs, email attachments and hard disks. A file containing a virus is called infected file. If this file is copied to a computer, virus is also copied to the computer. Activation of Virus When the computer virus starts working, it is called the activation of virus. A virus normally runs all the time in the computer. Different viruses are activated in different ways. Many viruses are activated on a certain data. For example, a popular virus “Friday, the 13th ” is activated only if the date is 13 and the day is Friday. According to Wikipedia “Computer viruses cause billions of dollars’ worth of economic damage each year, due to causing systems failure, wasting computer resources, corrupting data, increasing maintenance costs, etc”. Damages caused by virus Computer virus cannot damage computer hardware. IT may cause many damages to a computer system. A virus can: 1. A computer virus can damage data or software on the computer. 2. It can delete some or all files on the computer system. 3. It can destroy all the data by formatting hard drive. 4. It may display a political or false message very few times. Causes of Computer Virus The following are the main causes of a Computer Virus.
  • 20. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 16 Infected Flash Drives or Disks: Flash drives and disks are the main cause of spreading viruses. Flash drives and disks are used to transfer data from one computer to other. A virus can also be copied from one computer to other when the user copies infected files using flash drives and disks. Email Attachments: Most of the viruses spread through emails. Email attachment is a file that is sent along with an email. An email may contain an infected file attachment. Virus can spread if the users opens and downloads an email attachment. It may harm the computer when it is activated. It may destroy files on the hard disk or may send the virus automatically to all email addresses saved in the address book. Infected websites: Thousands of insecure websites can infect computer with viruses. Most of the websites with pornographic materials are infected, so by visiting these websites the user’s computer also gets infected by virus. These websites are developed to spread viruses or other unethical material. The virus is transferred to the user’s computer when this material is downloaded. These websites may access the computer automatically when the users visit them. Networks Virus can spread if an infected computer is connected to a network. The internet is an example of such network. When a user downloads a file infected with virus from the internet, the virus is copied to the computer. It may infect the files stored on the computer. Pirated Software An illegal copy of software is called pirated software. Virus can spread if user installs pirated software that contains a virus. A variety of pirated software is available in CDs and from the internet. Some companies intentionally add virus in the software. The virus is automatically activated if the user uses the software without purchasing license. Protection from Computer Virus: Virus infects computer system if latest and updated version of an Antivirus program is not installed. Latest Antivirus software should be installed on Computer to protect it from viruses. A computer system can be protected from virus by following these precautions. 1. The latest and updated version of Anti-Virus and firewall should be installed on the computer. 2. The Anti-Virus software must be upgraded regularly. 3. USB drives should be scanned for viruses, and should not be used on infected computers. 4. Junk or unknown emails should not be opened and must be deleted straightaway. 5. Unauthorized or pirated software should not be installed on the computer. 6. An important way of protection against virus is the use of back up of data. The backup is used if the virus deletes data or modifies it. So back-up your data on regular basis. There are some great softwares that can back up your data automatically. 7. Freeware and shareware software from the internet normally contain viruses. It is important to check the software before using them. 8. Your best protection is your common sense. Never click on suspicious links, never download songs, videos or files from suspicious websites. Never share your personal data with people you don’t know over the internet.
  • 21. ICT - 2 UNIT - I Prepared By Mr.D.Sulthan Basha Page 17 Lecturer in Computer Science Types of Computer Virus: Viruses are designed for various intents. It might corrupt or destroy data on your computer, use an email program to spread itself to other computers on your network or may even affect the boot sector.  Boot Sector Virus - As the name suggests a boot sector virus affects the boot section on your computer. Evidently, boot sector is the section which is accessed at the very first when the computer is turned on. It is used to boot the information used by the operating system. A Boot sector virus gains complete control over the Master Boot Record (MDR) or the DOS by replacing the contents of the OS with that of its own resulting in errors during booting or ‘cannot boot’ message. Michelangelo and Stones are some examples of boot sector viruses. Earlier, before the era of modern, heavy memory computers, floppy disks were used to boot the system. With the decline of floppy disks, boot viruses have declined as well.  File Infector Virus - This is the most popular and most prevalent variant of compiled computer virus. It attaches itself to executable programs such as word processors, game files, spreadsheets applications, etc. The file infector virus fixes itself into the host file and begins its operation whenever the file is executed. Here is a snapshot of one such threat detected by an antivirus.  Macro Virus - Macro is a programming language used to automate complex, repetitive processes. Macro viruses attach themselves to application documents and spreadsheets which cater to macro programming and use it to execute and multiply themselves. The most popular desktop application Microsoft Office also uses macro programming. So, it is quite easy for macro viruses to propagate through such applications. A macro virus in addition to the current document also infects the template which the program uses to open or close a file. This in turn corrupts all the documents catering to that particular application. Hence, a bigger menace. Usually Macro viruses are received as attachments in emails. Whenever we download these attachments, the macros unfurl and install on our computers. Examples of Macro Virus are The Concept, and Melissa. Web Browsers: In 1991, a computer expert named Tim Berners-Lee created the first Web browser. His creation of WorldWideWeb, later renamed Nexus, was an innovative breakthrough that gives Internet users worldwide the opportunity to have the best online experience possible. You can choose from many types of Web browsers, including Microsoft Internet Explorer, Mozilla Firefox, Safari, Opera and Google Chrome. On the Web, when you navigate through pages of information, this is commonly known as web browsing or web surfing.There are four leading web browsers − Explorer, Firefox, Netscape, and Safari, but there are many others browsers available. Internet Explorer: In August 1995, Windows released "Windows 95," which included basic technologies for connecting to the Internet, including built-in support for dial-up networking. Windows also incorporated the Internet Explorer browser in response to the people's growing interest in the Internet. This browser is great for easy online navigation as well as quick search queries and Dynamic Security Technologies. Microsoft has continued to release new versions of the popular browser every year, which include powerful privacy settings as well as a higher performance level.
  • 22. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 18 Google Chrome: Google Chrome is an adaptable browsing program for PCs, Macs and other computer operating systems. Google Chrome offers its users speed, simplicity and security. The browser is designed to run complex applications quickly and properly. Also, the presentation of the browser is very clean and simple. The unique scheme offers efficiency and ease of use; patrons can arrange open tabs speedily and proficiently. The browser is known for its security benefits such as protection from harmful phishers and malware viruses. Chrome has a bundle of useful features. Mozilla Firefox: Mozilla Firefox, formerly known as Mozilla, released its first major version of the browser in 2002. Within the first year Mozilla became one of the latest open community browsers. This browser features built-in high performance tools similar to hardware acceleration and crash protection. These basic features create a foundation for browser users to rely on, especially during browsing for Internet safety and security. Safari: Safari, a Web browser created by Apple, is a fond browser used on Macintosh systems since 2003. Safari 1.0 was initially included as an optional Web browser on Macintosh computers, because of a licensing-agreement with Microsoft to package Internet Explorer with new Macintosh computers. Safari later became the exclusive browser installed on Macintosh computers in 2005. Apple's Safari browser was the first to utilize private browsing, which is significant for those who crave privacy on the Web. Moreover, Safari's mobile browser was the first to display mobile Web pages identical to the desktop version. Safari is also available on the Windows operating system. Opera: In 1994, the Opera browsing system was originally a research project conducted by Norway's telecom company, Telenor. On July 14th, 1996, Jon Von Tetzchner made the first public announcement of Opera and released version 1.0 available to all online users. In a modern version, Opera 10, users can use the "Speed Dial" page, which allows Internet users to access their favorite pages using a "Dial Pad" like application. Opera is a well-known browser that continues to grow and increase its user base. *******
  • 23. ICT - 2 UNIT - II Prepared By Mr.D.Sulthan Basha Page 19 Lecturer in Computer Science INTERNET APPLICATIONS INTERNET EXPLORER: It is a web browser from Microsoft. Microsoft internet explorer is a computer program called a browser that helps you to interact with and navigate through information resources on the internet .The internet is a world wide network of computers that all use the same rules(PROTOCOLS) to communicate and share information you can use internet explorer to read publications, videos, pictures, audios, videos, etc.,, stored on a computer across the world .Internet explorer enables you to access websites and interpret the html code which is the computer languages that web pages are written in .It is a default web browser on all windows operating system computer . it offers many of the same features as follows: Features of internet explorer -11:  Fast web browsing allows network requests to appropriate contents, connecting to information faster than ever before, it preview can provide faster and more efficient browsing, even over slow networks.  Rich, hyper fast 2D and 3D experiences supports emerging web graphics library standards, lighting up games and other interactive content, while still maintaining security, reliability, and performance.  Great on all your screen large and small it supports continuous input and displays, making internet explorer-11 great for tablets [tabs] and with side-by-side browsing, multi monitor support [multiple tabs],and high pixels per inch [PPI] scaling, it is also great for large screens.  Improved capability: Internet explorer-11 improves capability with web standards, other web browsers and real world websites. There is updated support for popular web standards and changes that prevent old websites from displaying incorrectly.  Perfect for touch: Includes enhanced supports for consumers using touch based devices including touch based drag-and-drop, however and activating highlighting grouping together the navigation and tabs provides better control ,it support for up to hundred open tabs for window.  Pinned sites: Enhanced pinned sites to support live tiles(recently opened) and your content update dynamically.  Click to call: automatically changes phone numbers into clickable links for apps that work with phone number, such as Skype. 2.Internet explorer buttons: The most recently used buttons in web browser are listed as follows:  Forward and backward button: It moves you forward a page. It only works if you have previously used the backward button. The backward button and forward button are called as navigation buttons in internet explorer-11 that allows you to move between sites you have recently visited.  Stop: The stop button is used to stop web page from downloading. The shortcut key for stop button is Esc key.
  • 24. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 20  Refresh: This feature is useful as it allows users do not have to download the full page each time they visit the same site. On some sites, you may want to refresh the page to get the latest VERSION and it is also used to reload a page that has failed to load because of an error. Press F5 or ctrl+R.  Home: the home button is used to return users to their default web page, the same page that loads when the browser is first opened.  Search: In the past, the search button was used to open user’s default search page or URL text field.  Full screen: this function is used to make the browser window as full screen, It temporarily removing the toolbar, buttons and address bar. Often this view mode may be on and off by pressing f11 key from keyboard.  History: this feature allows users to view the pages that have been previously visited. the shortcut key for history is Ctrl+H.  Favourites (Bookmarks): this folders stores websites or pages chosen by users. The term “favourites” is used with Microsoft internet explorer in other browsers this may be known as bookmarks or hotlist.  Zoom: it is used to increase and decrease the size of font and images. To reset the zoom function to it’s default size, press Ctrl+0[zero],to increase the size ctrl++ and to decrease size Ctrl--  Tracking protection indicator: shows up each time something is blocked on the web page you are currently on.  Tabs: They are something like windows in window. You can have many pages open in one window by using this option. This makes navigation between open web pages easier and different internet explorer windows it won’t disturb task bar. A)entering website address: to navigate to a website follow the below step. 1.type a web address, also known as a URL, into the address bar, then press enter key. http://www.google.com 2.the website will appear. B)searching the internet: some web browser use an address bar for conducting web searches. internet explorer-11 combines both of these functions into address bar. Address bar with integrated search in the place to write the address of website you want visit .for example www.google.com, address bar remember visited address, so if you have visited www.google.com,before,you don’t have type the whole address in address bar. Just type “goo”and choose the address from the list .Searching is integrated in to address bar just type a question mark(?) and then type the word or phrase you want to find on the internet. You can still have several search providers. For example Google, Yahoo, etc.. 3.SOCIAL NETWORKS: social network sites are web-based services that allow individuals to construct a public or semi public profile within a bounded system ,to be joined with a list of other users with whom they share a connection, view and transfer their list of connections and those made by others within a system. The nature and naming of these connections may vary from site to site. The Social Networks are:
  • 25. ICT - 2 UNIT - II Prepared By Mr.D.Sulthan Basha Page 21 Lecturer in Computer Science Twitter: Twitter is a social network and real time communication service launched in 2006 and used by millions of people and organisation to quickly share and discovers information. The word twitter comes from the frequent chirping sound made by birds. Hence the bird used in twitter logo. User can access the site via the web and mobile devices to exchange information called “tweets” which are messages of upto 140 characters long that anyone can send or read. These messages or tweets are public by default and visible to all those who are following the twitter. Advantages of using twitter: 1. 1.Twitter is easy to join and use: 2. Joining into twitter is easy; you can join within a minute and start tweeting. You can also chat following people from the starting time of joining twitter. Twitter is free from advertisement and it’s interface is very easy to use .On twitter you want only to follow people to get updates ,news, tweet, re-tweet. 3. Twitter is massive: twitter has billion registered users and million active users every day. Now a days all kind of people uses twitter so you can also target audience for your business, no matter now big or small your business. 4. 3 You can get to the point: Since you are limited to 140 characters, you need to get to the point. 5. 4.Twitter security: it provides very high level security about user account .it has very height kind of security policies .also it provides you option of routing your personal information . Twitter also give you option for report spam. Disadvantages of using twitter: 1. Twitter Is Busy: Twitter users generates 340 million Tweets per a day . your tweets are quickly send to your followers. 2. You are limited to 140 characters: It provides only 140 characters tweet, means you can’t use characters more than 140. 3. Not everyone can advertise : While twitter does allows for promoted tweets and profiles, you need to be approved by the twitter you can use its promotion features. 4. Inactive and fake twitter account: Through Twitter has billion users most of them either inactive or not used regularly .Most of twitter account are fake which are made to cheat and harass someone. 5. Spam problem: Twitter has also spam problem like other social networking sites .Some twitter users only tweet their products and also some users send spam messages. Twitter also face overloading problem due to large number of unwanted messages. TUMBLR:- Tumblr is micro blogging platform and social networking site founded by David Karp in 2007 and owned by Yahoo since 2013 .The service allows users to post multimedia and other content to a blog. Users can post on their boards, follow other bloggers, or search post by keywords. By using it bloggers can post various contents such as text, photos, pictures, music ,videos, links and more. Posted content can be original or posted from others boards. Most user choose nicknames instead of real names therefore it most impossible to find people without knowing their username. It can easy to register, and one can sign up for Tumblr service with a valid email id within 30sec.Once sign in Tumblr , a user can follow other users.
  • 26. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 22 ADVANTAGES OF TUMBLR: 1. The best thing about Tumblr is it’s built in community. With most standard blogging platforms you have to build your own following before you start receiving feedback from readers. With Tumblr you can post one picture, and if it’s interesting enough you will instantly receive feedback from the community. 2. You have the freedom to customize your Tumblr however you want. If you are a web designer you can design your own theme. 3. Tumblr is great for artists, designers and photographers who don’t need words to describe their work .on Tumblr you can just post a picture, tag it with the proper keywords ,and gain tons of feedback without the need of a long term article. 4. a big part of Tumblr attraction and perhaps an even bigger reason behind its rapid uptake is how quick it is to setup and customize DISADVANTAGES OF TUMBLR: 1. Tumblr is mostly used for sharing images and videos. 2. It is known to have stability issues, resulting in a lot of downtime. 3. Its posts are difficult to optimize for search engine optimization. LINKEDIN: Linked in users with free account can do the follow: 1. Post their resume online. 2. Find and add professional contacts. 3. Find and follow companies to receive important updates about job openings, company news and more 4. Create and join online professional networking groups by industry, location, age and educational background 5. Find and apply for jobs 6. Give and receive recommendations. 7. Post public messages status updates similar to Facebook or Twitter. 8. Find out how many times their profile has been seen. Disadvantages: 1.The required investment of time:- possibly one of the biggest disadvantage of linked in, as with other social media tools ,is the investment of time required to use it most effectively. 2.Privacy concerns: One big concern with linkedIn, as with all social media sites is privacy. Your decisions about how to manage your privacy settings will be based on your objectives in using the site and the levels of privacy you can personally comfortable with. FACEBOOK : Facebook is the most popular social networking site with millions of members.It is Created in 2004 by Mark Zuckerberg and his friends. With it we can connect with friends, find old friends or family that they have lost contact with and even meet new friends. People can upload photos and videos to share with their friends and family, you can even connect with people that live on the other side of the world. You can setup a group for your business or interests and find out other people with the same interest to join your group.
  • 27. ICT - 2 UNIT - II Prepared By Mr.D.Sulthan Basha Page 23 Lecturer in Computer Science Benefits and features of Facebook: 1.Facebook is free to join and free to use. 2.it can be used by any one wherever they are in the world as long as they have internet access. 3.Facebook users can share messages ,videos, photographs and websites. 4.Facebook can be used as an organisational tool for planning and managing event invitation. 5.you can search by name or e-mail to find people. 6. By using various settings, users can choose to allow different people to have access to their pages or to deny them this access. 7.Facebook is available 24 hours a day people can communicate without time zone differences causing a problem. FLICKR: It is a photo sharing website where anyone can upload and tap photos, browse others photo’s and add comments, users can create photo sets and collections to manage, connect and participate in topical group to cultivate a sense of community. Flickr also provides a range of privacy settings, giving users considerable over how their photos can be used. A Yahoo! ID is required to create flickr account. You can sign up for a free Flickr account, Which allows you to upload 1,000GB of free storage for photos and videos. ADVANTAGES OF FLICKR: There is no storage limit. With a Flickr account you can upload as many pictures as you want. 1. Users can include and edit photo tags, title and create photo sets. 2. Visitors can comment on your photos make notes within the pictures and watch photo slide side shows. 3. Your visitor can subscribe to a RSS feed and your 20 latest pictures. 4. permanent backup is available for pictures. 5. Photos will resaved and resized for the web. DISADVANTAGES:- 1. Uploading images ,Flickr doesn’t provide an official tool to batch download your pictures. 2. The Flickr websites doesn’t always do what you want. After you edit pictures, you may have problems with link’s and title captions. 3. When watching a specific picture ,you may not be able to see the rest of the thumbnails. 4. No keyboard navigation support. 5. You can’t give multiple images the same name. 6. The thumb on the slide show are quite small. 7. No email notification if some- one has commented on your photo. SKYPE: Skype is an application that provides video chat and video call service. Users may exchange such digital document as images ,text, video and may transmit both text and video messages. Skype allows the creation of video conference call Skype is available for Microsoft window or linux as well as android ,blackberry and both apple and window smart phones and tablets . Skype is based on a premium model much of the service is free, by Skype credit or subscriptions is required to call a land line or a mobile phone number.
  • 28. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 24 ADVANTAGES: 1. Skype offer free communication: users of Skype can enjoy unlimited number of chats and video conferencing .when they contact people who are also on Skype compared to mobile communication this offers the ability of data sharing and make communication for business viable unlike that of mobile or landline service. 2. You can communicate with the world: Since this is internet based ,you can chat with families abroad any time you want .This can be used 24 hours a day and you can reach people who has Skype on their computer .This is also available as a smart phone application so that instead of placing international calls using user network provider ,you can use Skype instead as an alternative. Connect to a wi-fi, hotspot and you can make calls all day long 3. Subscription is cheap: when you make calls using Skype ,you can call landline or mobile numbers with cheaper rates. 4. Skype offers from screen sharing: Skype can be used for business presentation because this allows screen sharing. If you are conducting business on an international level you can conduct meetings using Skype and instead of projectors, what you see on your screen can be shard and this will act as your visual presentation. 5. It allows for a group call without the need for group features: one of the best feature about Skype is that multiple people can speak with each other on a single connection with out any other equipment, services, or charges. DISADVANTAGES:- 1.you need internet access to use Skype: Skype is dependent on the internet this may not be facing emergency calls for situation that required immediate attention. In these situations, your mobile network is still more reliable. 2.It doesn’t offer language translation : With Skype although we have the means to communicate with another person from another country, there is a need for both of you to know how to speak or read a common language because of its limitation in translating other languages. 3.Skype is still lacking in business tools: Although Skype offers file sharing ,call routing and screen sharing. This is not enough if you need something that could survive other important business tasks such as accounting. 4. Background noises are picked up rather easily: If there is anything happening in the background of a room during a Skype call ,the microphone is going to pick up that sound and transmit it. 5.The information that is transmitted over Skype could be interrupted: Skype is sent over the internet ,so even though it offers a secure conversation and file sharing experience ,there is always the chance that the information could be interrupted. YELP: yelp is an American multinational corporation headquartered in San Fracisco, Calfornia. yelp was founded in 2004,by former Paypalr employees, Russel Simmons and Jeremy Stoppel man. It develops hosts and markets yelp.com and the yelp mobile app which publish crowd – sourced reviews about local business as well as the online reservation service, (seat me) and online food –delivery service(eat 24). The company also trains small business in how to respond to reviews and provides data about business ,including health inspection scores. Yelp offers a platform for both consumers and business to find each other, especially through reviews and ratings.
  • 29. ICT - 2 UNIT - II Prepared By Mr.D.Sulthan Basha Page 25 Lecturer in Computer Science ADVANTAGES: 1. You can find basic information including the hours of a business ,their contact information and their website using the site. 2. You can search for types of business in your area that you might not easily find on other local search sites. 3. You can see feedback of other people who have gone to the place of business. 4. You can initiate discussion through the “talk”section of yelp. This lets you ask for specific or more detailed information about the business or about the topic in general. 5. You can add your own opinions through improve site and to support the local business that you really like. DISADVANTAGES: 1. people get paid to write reviews on yelp they aren’t supposed to but business have been known to pay writes to write positive reviews on site like help in order to increase business. 2. The opinions on yelp are just opinions. Many people take the information and advice on yelp as though it is factual. It is important to remember that every one’s standard for “quick services ”differs and that you can’t assume a place is good or bad because one person says so. 3. There is often misinformation on yelp sites like Yelp and Wikipedia let anyone put information on them. For the most part of the group moderates each other to make sure that information is correct. However, incorrect information does appear on sites like Yelp. VIMEO: It is a video sharing website in which user can upload, share and view videos. It was founded in November 2004 by Jake lodwick and Zach klein. It was the first video sharing site to support to high definition video in October 2007. Members can choose between Vimeos free services and a number of paid services .How their videos appear on the internet , viemos free service allow order to enhance ,videos add music tracks and pull from creative common licensed videos. Vimeo also provide users with a video school to improve their own video production for long-term personal or financial gain. ADVANTAGES: 1. Better looking higher resolution 1280*720 pixels hd player and 5000 kbit rate. 2. Less discovery competition ,limited competition for discovery with lower quality content. 3. Improved Video formatting options. 4. Due to Vimeo’s smaller scale there is less copyright security on content. Disadvantages: 1. Best feature required a paid pre account. 2. Analytics look better visual but don’t offer the quantity of insight that youTube does. 3. Less options to customise and manage your own branding. Yahoo: Online portal website created to integrate a vast array of information ranging from entertainment to finance news. Users are able to customize homepages, check email and search the World Wide Web. Yahoo was founded in 1994 by Jerry-Yang and David Filo. Yahoo is headquartered in Sunnyvale, California.
  • 30. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 26 Advantages: E-mail like a pro: with Yahoo mail service you can send e-mail, receive it, manage contacts and maintain calendar. All Yahoo mails encrypted 100%. Explore advanced communication methods: Although you can send instant message (IM) from your Yahoo mail page. You have the option to install Yahoo message on your computer and mobile phone. With it, you can chat with others via voice and webcam. Messenger supports sms and IM, and share photos and large files with chat partner. Go social using Yahoo : Thumblr and Flickr, once independent blog and photo sites, now belong to Yahoo. Sign up for a Thumblr ID to create your own blog, posts and share them with the world. Top into a massive answer pool: if you have a question it’s possible that one of the millions of Yahoo users has answered it at Yahoo‘s answers site. visit these site and browser categories ask questions and view an answers people have asked and answered. If you sign up for a Yahoo ID ,you can answer the questions. Put the world on your my page: when you type “Yahoo” into your browsers address bar and press “enter” you arrive at a page that appears to discuss every possible subject. in addition to current headlines ,you will see a trending now section that shows you hot topics that are trending as you visit the page. Yahoo allowed and you to customise your own my Yahoo page also. Search the web using Yahoo: Like Google, Yahoo indexes the web and makes information from web pages available to web the web search. If you sign up for a Yahoo account you gain additional benefits, such as the ability to view your search history. WHATSAPP: WhatsApp is a chatting software developed for smart phones.It is an instant messaging service for phone. The sevice is available for iPhones ,Blackberry, Android phones and Nokia smart phones. User can exchange text, image ,video and audio messages at free of cost. WhatsApp provides group chat and location sharing options. WhatsApp has become the largest messaging platform all over the world.It was found by Jan Koum and Brain Acton. Advantages: 1. No need to manually add any contact because this app automatically imports the contacts from your sim card phone and tells you that how many of you friends are using WhatsApp. 2. Save money on SMS because it send free messages to any part of the world without any charges . 3. All tools provided by WhatsApp are very easy to use. 4. Easy to create group chat. 5. You can share your location, photos and status with your friends. Disadvantages: 1. This app must have access to internet to send and receive messages for free and the messages are also not sent to the phone inbox . 2. Your profile picture is visible to every person having your contact number and using this app, whether known by you or not. 3. If you upload picture in the chat with your friends or group it automatically save the picture into your friends phone.
  • 31. ICT - 2 UNIT - II Prepared By Mr.D.Sulthan Basha Page 27 Lecturer in Computer Science GOOGLE PLUS : It is a social networking service from Google launch in 2011, the world’s largest search engine company, and integrated into every product service, such as Search, YouTube, Chrome...It offers multiple ways to share your content with an interested audience. Its free video chat service, personalized virtual relationships in a manner that is educational, entertainment, etc.. Advantages: 1.Google Plus provides you to follow stream as you defined in your circles and it is easy to follow the people at the right time. 2. Google Plus provides you latest Google news. 3. It provides you to make business deals easily with face to face and gaining more trust with your clients rather than Skype calling. Disadvantages: 1. Google + not helping in organic results as peoples were think. 2. Right now it is only seems like for professional work rather than entertainment social network site as Facebook. 3. It is still not available for everyone. 4. It not provides you to synchronize different services like Twitter, LinkedIn and Facebook as well. YOUTUBE: Launched in 2005, It allows millions of people to discover, watch and share originally created videos. It provides a forum for people to connect, inform and inspire across the globe and act as distribution platform for original content creators and advertisers large and small. It is created to share videos. Every minute of every day more than 35 hours of video is uploaded to YouTube. Advantages: 1. Fast and easy video sharing. 2. Privacy features. 3. Quick access to various videos. 4. Safe browsing. 5. Easy rating and feedback system. Disadvantages: 1. No parental controls. 2. Video length is limited to 10 minutes. 3. No restrictions on comments language, violent threats. 4. Video size is limited to 1024 MB. 5. There could be issues of privacy invasion. 6. There could be copyright issues. *******
  • 32. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 28 Electronic-mail (E-mail) Network: A Connection between each computer or connecting a computer with another computer by using some physical components is called as network. Internet: Network of networks. Introduction to e-mail: Electronic mail is popularly known as email where textual messages are sent to the receiver through telecommunication links. Here, computer terminals are, connected together in a network to transfer message from one to one or one to many. The sender first types the message on a computer screen and then sends to the receiver. The respective message is dropped in the receiver’s mailbox and receiver can read the message and answer if required. Both sending and receiving of email are processed and directed by mail server computers which are connected through a network. Mail components: There are five major parts involved in an e-mail exchange. They are 1. mail user agent (MUA) :A mail user agent (MUA) is a program that allows you to receive and send e-mail messages; it's usually just called an e-mail program. To use an MUA such as Eudora or Microsoft Outlook, you install the MUA program on your computer and then use it to download and store e-mail messages to your computer; it will also allow you to read or write messages offline. Web-based MUAs, such as Hotmail and Yahoo, store messages on their own mail servers and allow access to them through a Web page. An MUA is sometimes called an e-mail agent or an e-mail client. 2. message transfer agent (MTA) :A message transfer agent (MTA) is a software application used within an Internet message handling system (MHS). It is responsible for transferring and routing an electronic mail message from the sender’s computer to the recipient’s computer. The basic platform for an MTA is an exchange system with client/server architecture. 3. mail server (or email server) :A mail server (or email server) is a computer system that sends and receives email. In order for a computer system to function as a mail server, it must include mail server software. This software allows the system administrator to create and manage email accounts for any domains hosted on the server. Mail servers send and receive email using standard email protocols. For example, the SMTP protocol sends messages and handles outgoing mail requests. The IMAP and POP3 protocols receive messages and are used to process incoming mail. When you log on to a mail server using a webmail interface or email client, these protocols handle all the connections behind the scenes. 4. Domain Name System : Domain Name System (or Service or Server), an Internet service that translates domain names into IP addresses. Because domain names are alphabetic, they're easier to remember. The Internet however, is really based on IP addresses. Every time you use a domain name, therefore, a DNS service must translate the name into the corresponding IP address. For example, the domain name www.example.com might translate to 198.105.232.4. Advantages of e-mail: E-mail has prooved to be powerful and reliable medium of commmunication. Here are the benefits of E-mail:
  • 33. ICT - 2 UNIT - III Prepared By Mr.D.Sulthan Basha Page 29 Lecturer in Computer Science  Reliable  Convenience  Speed  Inexpensive  Printable  Global  Generality Reliable Many of the mail systems notify the sender if e-mail message was undeliverable. Convenience There is no requirement of stationary and stamps. One does not have to go to post office. But all these things are not required for sending or receiving an mail. Speed E-mail is very fast. However, the speed also depends upon the underlying network. Inexpensive The cost of sending e-mail is very low. Printable It is easy to obtain a hardcopy of an e-mail. Also an electronic copy of an e-mail can also be saved for records. Global E-mail can be sent and received by a person sitting across the globe. Generality It is also possible to send graphics, programs and sounds with an e-mail. Disadvantages: Apart from several benefits of E-mail, there also exists some disadvantages as discussed below:  Forgery  Overload  Misdirection  Junk  No response Forgery E-mail doesn’t prevent from forgery, that is, someone impersonating the sender, since sender is usually not authenticated in any way. Overload Convenience of E-mail may result in a flood of mail. Misdirection It is possible that you may send e-mail to an unintended recipient. Junk Junk emails are undesirable and inappropriate emails. Junk emails are sometimes referred to as spam. No Response It may be frustrating when the recipient does not read the e-mail and respond on a regular basis. Composing and Sending Email: Before sending an email, we need to compose a message. When we are composing an email message, we specify the following things:
  • 34. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 30  Sender’s address in To field  Cc (if required)  Bcc (if required)  Subject of email message  Text  Signature You should specify the correct email address; otherwise it will send an error back to the sender. Once you have specified all the above parameters, It’s time to send the email. The mailer program provides a Send button to send email, when you click Send, it is sent to the mail server and a message mail sent successfully is shown at the above. Reading Email: Every email program offers you an interface to access email messages. Like in Gmail, emails are stored under different tabs such as primary, social, and promotion. When you click one of tab, it displays a list of emails under that tab. In order to read an email, you just have to click on that email. Once you click a particular email, it gets opened. The opened email may have some file attached with it. The attachments are shown at the bottom of the opened email with an option called download attachment. Replying Email: After reading an email, you may have to reply that email. To reply an email, click Reply option shown at the bottom of the opened email. Once you click on Reply, it will automatically copy the sender’s address in to the To field. Below the To field, there is a text box where you can type the message. Once you are done with entering message, click Send button. It’s that easy. Your email is sent. Forwarding Email: It is also possible to send a copy of the message that you have received along with your own comments if you want. This can be done using forward button available in mail client software. The difference between replying and forwarding an email is that when you reply a message to a person who has send the mail but while forwarding you can send it to anyone. When you receive a forwarded message, the message is marked with a > character in front of each line and Subject: field is prefixed with Fw. Deleting Email If you don’t want to keep email into your inbox, you can delete it by simply selecting the message from the message list and clicking delete or pressing the appropriate command. Some mail clients offers the deleted mails to be stored in a folder called deleted items or trash from where you can recover a deleted email.
  • 35. ICT - 2 UNIT - III Prepared By Mr.D.Sulthan Basha Page 31 Lecturer in Computer Science Parts of e-mail address:  User Name: The first part of an email address is the user name, which identifies you personally on the mail server that you use. Each user name on a server must be different and consists of letters, numbers or special characters such as underscores or periods. Your user name might be your first initial and last name, a business name or anything else you want to use to identify yourself on the Internet.  @ Symbol The symbol "@", called the "at" symbol, connects the user name of an email address to the mail server, or domain. It tells the Internet that your user name can be found at that domain.  Domain Name The domain name in an email address appears after the @ symbol and identifies the Internet domain that handles your email. It can be further broken down into two parts: the name of the computer or server that handles the mail and the top-level domain, often "com," "gov" or "edu," which stand for commercial business, government agency and educational institution, respectively, according to St. Edward's University. An example of a domain name is "SKU.com."  Etiquette: The term etiquette refers to conventional rules of personal behavior. But while communicating via email, we cannot know about the body language and tone of voice etc. Therefore a set of guidelines for acceptable behavior on email that have been evolved is known as Email Netiquette.  Here are set of guidelines that should be followed while working with email:  Try to make your message as short as possible. It will make your message easy to read and understood.  Be careful about spelling and grammar while typing a message.  Use emoticons, smiles when required.  Email address entered must be correct.  The subject heading of a message should be clear and descriptive.  Follow the same rules as if you are writing a letter or a memo.  Sending a message that has already been forwarded or replied many times may contain many angled brackets. It is better to remove the angled brackets from the message.  While sending mails to multiple persons, specify their email addresses in the BCC: field so that the spammers cannot come to know about addresses of other recipients to whom you have sent a copy.  Keep size of attachment as small as possible.  Always add your signature at the end of email.  Before you send, make it sure everything is fine because you cannot call back a sentmail. Message Componenets: Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people.
  • 36. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 32 E-Mail Address Each user of email is assigned a unique name for his email account. This name is known as E-mail address. Different users can send and receive messages according to the e-mail address. E-mail is generally of the form username@domainname. For example, webmaster@tutorialspoint.com is an e-mail address where webmaster is username and tutorialspoint.com is domain name.  The username and the domain name are separated by @ (at) symbol.  E-mail addresses are not case sensitive.  Spaces are not allowed in e-mail address. E-mail Message Components E-mail message comprises of different components: E-mail Header, Greeting, Text, and Signature. These components are described in the following diagram: E-mail Header The first five lines of an E-mail message is called E-mail header. The header part comprises of following fields:  From  Date  To  Subject  CC  BCC
  • 37. ICT - 2 UNIT - III Prepared By Mr.D.Sulthan Basha Page 33 Lecturer in Computer Science From: The From field indicates the sender’s address i.e. who sent the e-mail. Date: The Date field indicates the date when the e-mail was sent. To:The To field indicates the recipient’s address i.e. to whom the e-mail is sent. Subject: The Subject field indicates the purpose of e-mail. It should be precise and to the point. CC: CC stands for Carbon copy. It includes those recipient addresses whom we want to keep informed but not exactly the intended recipient. BCC: BCC stands for Black Carbon Copy. It is used when we do not want one or more of the recipients to know that someone else was copied on the message. Greeting: Greeting is the opening of the actual message. Eg. Hi Sir or Hi Guys etc. Text: It represents the actual content of the message. Signature:This is the final part of an e-mail message. It includes Name of Sender, Address, and Contact Number. Message composition: Follow these step-by-step instructions to send an email Step 1: Log in to your Gmail account so that you are on the dashboard (main page) of your mail account. Step 2: Click Compose. Step 3: A new blank email window will open up. In the ‘To’ box, type in the email address of the recipient. Step 4: You might want to include someone else in your email to ‘keep them in the loop’. You can do this by clicking Cc or Bcc, which will open another field. ‘Cc’ means ‘carbon copy’ and ‘Bcc’ means ‘blind carbon copy’. Adding an email address to the ‘Cc’ field means that that person will receive a copy of the email and all the other recipients will see their email address. If an email address is put into the 'Bcc’ field, the person will get a copy of the email but no other recipient will see that address. If you are sending the same email to lots of different people, it’s a good idea to put all the email addresses in the ‘Bcc’ field to keep your ‘mailing list’ confidential. That way, there’s no chance that it could fall into the hands of a spammer or hacker. Step 5: The subject field allows you to give the recipient an idea of the topic of your email, like a heading. You don’t have to put anything in the subject box, but it can help when viewing and sorting email. Step 6: Enter text to send recipient. Step 7:click the blue Send button at the bottom of the compose window. Step 8: The email you’ve sent will now be stored in the ‘Sent Mail’ folder on your Gmail dashboard. You may have to run your mouse pointer over the Inbox folder link to see the other folders.
  • 38. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 34 Netiquette: Emails are often written in an informal style, and are generally brief. The text of an email is entered in the main body of the message. The most important tip for writing an email message is brevity (netiquette). People typically get so many emails in a day that a long email often doesn't get read until later -- sometimes much, much later, if at all. Remember that you can copy text from a document or another email and paste it into a new email, so you don't have to retype text. Many email programs will also let you paste pictures and documents directly into your message. Email is more informal than paper mail because it is used with more frequency and immediacy. Unless it is a personal letter, email usually gets right to the point without a lengthy introduction. Many people don't include a "Dear Sir" clause, and often do not include a signoff, letting the "To:" and "From:" fields speak for themselves. Signatures can also include a standard signoff. Make sure that you have turned off any word wrap options that cut lines into standard lengths by inserting carriage returns, since these are unnecessary and cause formatting problems with most modern email programs. You can avoid having the formatting of your email get messed up by putting your email in Text Standard Format. E-mail System E-mail system comprises of the following three components:  Mailer  Mail Server  Mailbox
  • 39. ICT - 2 UNIT - III Prepared By Mr.D.Sulthan Basha Page 35 Lecturer in Computer Science Mailer It is also called mail program, mail application or mail client. It allows us to manage, read and compose e-mail. Mail Server The function of mail server is to receive, store and deliver the email. It is must for mail servers to be sunning all the time because if it crashes or is down, email can be lost. Mailboxes Mailbox is generally a folder that contains emails and information about them. Working of E-mail Email working follows the client server approach. In this client is the mailer i.e. the mail application or mail program and server is a device that manages emails. Following example will take you through the basic steps involved in sending and receiving emails and will give you a better understanding of working of email system:  Suppose person A wants to send an email message to person B.  Person A composes the messages using a mailer program i.e. mail client and then select Send option.  The message is routed to Simple Mail Transfer Protocol to person B’s mail server.  The mail server stores the email message on disk in an area designated for person B. The disk space area on mail server is called mail spool.  Now, suppose person B is running a POP client and knows how to communicate with B’s mail server.  It will periodically poll the POP server to check if any new email has arrived for B.As in this case, person B has sent an email for person B, so email is forwarded over the network to B’s PC. This is message is now stored on person B’s PC. The following diagram gives pictorial representation of the steps discussed above: *******
  • 40. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 36 WWW [WORLD WIDE WEB] Introduction: The World Wide Web is an information retrieval system based on hypertext. In hypertext selected words or areas on the screen are expandable; leading to more details about subject. A hypertext allows you to view information without using complex commands and without even using source of information. When a hyperlink [link to another page] is attached to the text is called as hypertext. A Browser is a client application used to access the information on WWW [W3]. The Browser displays WebPages and makes the connection necessary to follow hypertext links. W3 is a global hypertext system that uses the internet as its transmission medium. The WWW enables you to access information on the internet without the use of complicated commands. By linking resources throughout the internet the web browsing [searching] a collection of information to your doorstep. The W3 could be very simple defined as a universal database of knowledge. Information i.e. easily accessible to people around the world and links easily transfer to other pieces of information. These allow any user quickly to find the things. It is an internet resource where one can get the information about different topics such as types of networks, types of computers, types of OS, etc. Origins of the WWW:- Like many internet technology the W3 has its origins in the research community. The web is based on “ HTTP ”, the hypertext transfer protocol which was developed at “ CERN ” (Conseil Européen pour la Recherche Nucléaire), the European laboratory for particle physics in Switzerland. Web technology developed virginally to health areas searches access information and shares their work via the internet. Today there are thousands of web servers throughout the world. Web browsers, who are available for just about every type of computer made enable millions of people to use the W3. Here the web provided with a single mechanism for information retrieval, regardless the type of computer and the type of resource. After CERN established specifications for the web, software for web services and clients developed quickly on the internet. The two main uses of the World Wide Web are to retrieve resources and to publish information on the internet. You can access almost any internet resource using the W3. You can publish your own hypertext documents on W3. Web documents are written in “HTML”( Hypertext mark up language). Simplify the task of creating documents that contain hyperlinks to other information. ______________________________________________________________________________ 2.W3 gateways to other services:- Through the W3 you have access not just to web hypertext documents or pages but also to other internet resources. The web connects directly to some of these resources. A gateway is a link between two systems that performs a similar function but work differently the gateway translates address and protocols between two systems so that they can work together.
  • 41. ICT - 2 UNIT - IV Prepared By Mr.D.Sulthan Basha Page 37 Lecturer in Computer Science Working of W3: 1) User sends request 2) Browser interprets user’s selection or request and makes request from appropriate server. 3) Server accepts and process request from browser. 4) Server sends requested files to browser, browser to be interpreted. 5) User receives file displayed by the browser. 3.Web terminologies: a. Webpage:- A document, generally written in HTML, which is almost always accessible via HTTP, A protocol that transfers information from the web server to display in the users web browser. b. Website :- A collection of web pages , images ,videos or other digital assets, that is hosted (located) on one or several web servers, usually accessible via the internet, cell phone or LAN i.e., LOCAL AREA NETWORK, etc. c. Web server :- A computer that is only used to display web sites and web pages based on user given request. d. Web browser:- A computer program (such as internet explorer, Mozilla Firefox, opera mini etc). That enables internet users to access, navigate (operate), and search W3 sites. Browsers interpret hyper text links and allow documents formatted in hypertext makeup language (HTML) to be viewed on the computer Screen and provide many other services including e- mail and downloading, uploading of data, audio and video files. e. URL:- URL stands for “uniform resource locater “. Uniform resource locater is the global address of documents and other resources on the World Wide Web. The first part of the URL is called a protocol identifiers and it indicates what protocol to use,and the second part is called a resource name and its specifies IP address or the Domain name were the resource is located. The protocol identifiers and the resource name are separated by a colon (:) and two forward slashes(//). For example:- consider the following URL http://www.google.com
  • 42. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 38 f. Home page:- The default entry page to a website or starting page of the website is called as Home page. If a user only inputs a domain name (name of the website) in a browser, the browser will began downloading the Homepage. g. HTML:- HTML means hypertext Mark up Language. It is a standard mark up coding language for creating web pages. It is also the source code that the computer reads to create the web page. h. HTTP:- HTTP means Hyper Text Transfer Protocol. It is standard protocol for addressing hyper text web pages on the web. i. HYPER TEXT:- Electronic document text, i.e.., connected (hyper linked) through the other link of the text to which the reader or user is transferred by a mouse click. It is usually deferred from the normal text by a different colour by underlining or by both hyper texts is non –linear, i.e., the reader can jump from anywhere to anywhere while pursuing a chain of thought. j. HYPER MEDIA:- Hyper media is a term derived from hypertext, extended the notation of the hypertext link to include links among any set of multimedia objects, including sound, motion video and virtual reality. It can also connect a high-level of user or network with the help of hypertext. 4.Searching the W3:- The web is a World Wide resource of a information a primary reason that people use the web is to search for specific information including text, pictures, music and video. The first step in successing searching is to identify the main idea or concept in the topic about which your seeking information. Determine any synonyms, alternate spellings or variant world forms for the topic. Then, use a search tool to locate the information. Two types of search tools are search engines and subject directives 1) A search engines is a program that finds websites, web pages, images, videos, news, maps and other information related to a specific topic. 2) A subject directives classifies webpage’s in an organized set of categories, such as sports or shopping and related sub categories. Search engine and it’s types:- Search engine is a web software programme or web based script available over the internet that searching documents and files keywords and returns the list of results containing those keywords today, therefore no of different search engines available on the internet, each with their own technique and specialties. Search engine optimization technique to improve visibility of a website in search engine. In search engine industry archive was the first search engine, which was used to search for FTP (file transfer protocol) files and in the other side the first text based “search engine” is known as“Veronica”. Because large search engines contain millions and sometimes billions of pages, many search engines are not only just searching the pages but also display the results depending upon their importance. This importance is commonly determined by using various algorithms’ there are currently different types of search engines available like Google, yahoo, ask.com etc. The working of search engine is divided into two parts
  • 43. ICT - 2 UNIT - IV Prepared By Mr.D.Sulthan Basha Page 39 Lecturer in Computer Science 1) Crawling 2) Indexing A crawler is a programme that retrieves web pages, commonly for use by search engines. In crawling process, spider or crawler visits the pages that will be included in the search and grabs (Retrieve) the contended of each of those pages after the crawling creases indexing process is started in data base. Often this involves stripping out stop words, grabbing (to gather the information) the location of each of the words in the page, the relevancy they Acer, back links to other pages, images and so on. This data is used to rank the page and is the primary method of a search engine uses to determine if a page should be shown and in what order finally, once the data has been processed it is often broken up into one or servers, or loaded into primary memory where it can be accessed when users perform a search. Web crawlers follow links from one page to another and index the content search engine is divided in to following types. 1) Crawler based search engine:- Crawler based search engines used automated software programs to survey categorize web pages. The program used by the search engines to access your web pages are called spider, crawlers, robots, bots. A spider will find a webpage, download it and analyse the information presented on the web page. This is a continuous seamless process. The web pages will then be added to the search engines database. Then when a user performs a search engine will check if database of web pages for the keywords the user search onto present a list of link results. The results (list of suggested links to go to), are listed on pages by order of which is closest (as defined by the bots), to what the user wants to find online. Crawler-based search engines are constantly searching the internet for new web pages and updating their database of information with these new or altered pages. Example of crawler-based search engines are ‘Google’ ( www.google.com), Ask Jives (www.ask.com) 2) Directory :- A directory uses human editors. Who besides what category the site belongs to, they place websites with in specific categories’ in the “directories database”. The human editors comprehensively check the website and rank kit based on the information they find, using a predefined set f rules. There are two major directives at the time of writing: yahoo directories (www.yahoo.com) and open directory (www.dmoz.org). 3) Hybrid search engines:- Hybrid search engines use a combination of both crawler based results and directory results more and more search engines these days are moving to a hybrid based model. E.g. of hybrid search engines are yahoo(www.yahoo.com), Google (www.google.com). 4) Meta search engine :- Meta search engines take the results from all the other search engines results, and combine them into one large listing. E.g. of meta search engines includes: Meta crawler (www.metacrawler.com) and dog pile (www.dogpile.com). *******
  • 44. Department of Computer Science & Applications SSGS-DC-GTL If you found any queries please contact with sulthanbasha4students@gmail.com 40 BASIC HTML Introduction: HTML stands for Hyper Text Markup Language, which is the most widely used language on Web to develop web pages. HTML was created by Berners-Lee in late 1991 but "HTML 2.0" was the first standard HTML specification which was published in 1995. HTML 4.01 was a major version of HTML and it was published in late 1999. Though HTML 4.01 version is widely used but currently we are having HTML-5 version which is an extension to HTML 4.01, and this version was published in 2012. HTML stands for Hypertext Markup Language, and it is the most widely used language to write Web Pages. The definition of HTML is HyperText Markup Language.  HyperText is the method by which you move around on the web — by clicking on special text called hyperlinks which bring you to the next page. The fact that it is hyper just means it is not linear — i.e. you can go to any place on the Internet whenever you want by clicking on links — there is no set order to do things in.  Markup is what HTML tags do to the text inside them. They mark it as a certain type of text (italicised text, for example).  HTML is a Language, as it has code-words and syntax like any other language. Originally, HTML was developed with the intent of defining the structure of documents like headings, paragraphs, lists, and so forth to facilitate the sharing of scientific information between researchers. Now, HTML is being widely used to format web pages with the help of different tags available in HTML language. Features of HTML:  It is a formatting language for text and images.  It allows us to read the content nonlinearly by using hyperlinks to a file.  HTML is an application of SGML.  HTML uses markup tags to describe web pages  It is not case sensitive i.e. code can be written in small case or uppercase letters.  All the HTML documents have “.html” or “.htm” extension.  HTML documents can be edited using editors such as notepad or front page. The advantages of HTML:  It allows embedding scripts, to generate dynamic content  It can incorporate images and sounds with the help of HTML tags.  It facilitates Moving and layered text  It allows framed documents  It allows absolute positioning of text and image.  Spreadsheets, video clips, pdf files can be embedded in HTML documents with the support of third party plug-ins. The disadvantages of HTML:  HTML can produce only static content  It does not facilitate headers, footers, footnotes.  Mathematical typesetting is difficult  Browser Dependent  No tabs and other automatic character spacing