Professional Documents
Culture Documents
Table of Contents
Chapter Title
Acknowledgements
List of Tables
List of Charts
Product Profile
II Objectives
Methodology
Limitations
III Analysis
IV Findings
Suggestions
Bibliography
Questionnaire
List of Tables
1) Profession Vs Awareness
2) Profession Vs Time spent
3) Profession Vs Frequency
4) Profession Vs Amount
5) Profession Vs Purpose
6) Profession Vs Facilities
7) Profession Vs Problems
8) Browsing Centre Vs No. of systems available
9) Browsing Centre Vs No. of Users
10) Browsing Centre Vs Time spent
11) Browsing Centre Vs Browsing Charge
12) Browsing Centre Vs Facilities available
13) Internet user Vs Purpose of browsing
14) Browsing centre Vs Account Type
15) Browsing centre Vs Best ISP
16) Benefits of Internet over other communication media
List of Charts
1) Profession Vs Awareness
2) Profession Vs Time spent
3) Profession Vs Frequency
4) Profession Vs Amount
5) Profession Vs Purpose
6) Profession Vs Facilities
7) Profession Vs Problems
8) Browsing Centre Vs No. of systems available
9) Browsing Centre Vs No. of Users
10) Browsing Centre Vs Time spent
11) Browsing Centre Vs Browsing Charge
12) Browsing Centre Vs Facilities available
13) Internet user Vs Purpose of browsing
14) Browsing centre Vs Account Type
15) Browsing centre Vs Best ISP
16) Benefits of Internet over other communication media
Internet which was almost non-existent during 1960 s has now shown tremendous strides that no
other can match to its development, growth and performance. The large part of stories of success in the
internet over longer periods is always based on emerging technology in hardware and software
business.
The immense growth of information and technology within a short expense of time has
prompted many to utilize it as a medium of communication. This idea has now been put into pragmatic
usage by means of Internet. Internet can be considered as millions of people constantly communicating
about every topic under the sun.
The process of accessing information on Internet is called Browsing the web. The web has
become the easy medium to project different products to end users in a fast, effective and economical
means.
Due to the immense growth of business in the Internet, study on Internet Browsing centre was
taken for a report study under the motive of finding the awareness, time and frequency spent in
Browsing centers.
Product Profile
Contents
☯ Introduction
☯ Origin of Internet
☯ About Networks
☯ Connecting to Internet
☯ Cost of Internet implementation
☯ E-Mail program
☯ E-Mail address
☯ Pseudo Internet Address
☯ Domain Names Allotment
☯ World wide web
☯ Linking of documents in www
☯ Uniform resource locator
☯ Websites
☯ Major categories of websites over internet
☯ Browsing the web
☯ Starting the browser
☯ Getting and viewing the document
☯ Browser operations
☯ Searching for information
☯ Internet access tools – Gopher
☯ Usenet
☯ telnet
☯ Archie
☯ wais
☯ TCP/IP
☯ FTP
☯ Veronica
Introduction
The immense growth of information and technology within a short expanse of time has
prompted many to utilize it as a medium communication. This idea has now been put into pragmatic
usage by means of internet. The internet also called as the net, is the world’s largest networks
connected together in such a way that data can be transmitted back and any other individual data
network with equal ease. Internet can be considered as millions of people constantly communication
about every topic under the sun.
The internet is similar to peer-to-peer connectivity. The net delivers data from one place to
another. It provides interesting services like E-Mail, file retrieval and other internet tools. Several
computers all over the world are networked together. Unlike other communications, internet provides
easy access to all. We can share data, ideas without any discretion to age, creed and country. Internet is
also a source of software. A new services or software can be downloaded within a few minutes. We can
write internet applications that are compatible with all internet software. The windows internet
software available are Mosaic, Gopher, Eudora and Trumpet. The net is expanding fast providing new
resources.
Origin of Internet
ARPANET (Advanced Research Projects Administration NET) is the ancestor of the internet. The
ARPA agency is called DARPA (D stands for Defense).
Unable to use the ARPANE, the NSF built its own NSFNET. This NSFNET was connected to the
regional network which in turn was connected to user in different regions. The NSFNET in the United
States provides services for education and research only. The other services can be controlled by
Commercial IP (Internet Protocols) services. These commercial services connected to the regional
networks and provide direct connection. The first international IP network connections were established
in 1973 between England and Norway. The term Internet First appeared in 1982 with DARPA’s launch of
the Internet Protocol (IP).
About Networks
A Network Topology is the represent of physical connectivity of the computers. The most
common network topologies are:
☯ Hierarchical
☯ Horizontal
☯ Star
☯ Ring
Internet comprises several thousands of data networks. It is possible to go from any networks to
any other either directly over a direct inter connection or by traversing over another network or
networks till one reaches a network that has direct connection to the destination network.
Data Network
Data Network
2
4
Data Network
Data Network
Data Network
3
5
The diagram explains that if data is to be sent from data network 1 to Data network 4, it may
either be sent directly over the direct inter connecting link between Networks 1 and 2, or if the same is
out of service, through Data network 2 via 1-2-4 route, or if the interconnecting data link between
Networks 2 and 4 is broken, via the route 1-2-3-4, or in case the Network 2 is out of bounds, via 1-3-4
route.
Definition of Internet
Internet is defines as
Connecting to Internet
The data is transmitted in the form of digital signals. These signals are analog transmission. The
process is called modulation. The process of transforming the analog signal into digital representation at
the receiving end is called demodulation. Thus the modification of frequency to carry data is called
modulation. The device used for this purpose is called a modem.
Internet connectivity is handled by the so called internet service providers or ISPs. ISPs register
themselves with Inter NIC and obtain rights to allot internet addresses to their customers. Besides the
access code they also acquire connectivity to some “Internet Access Points “. The ISPs establish an
Internet Gateway (IG) and connect it to an Internet Access Point (IAP) which is usually with a large
international carrier like MCI or Sprint. Vides Sanchar Nigam Limited, the international carrier of India,
and the department of Telecommunication (DOT) are the two ISPs in India.
☯ Dial-up Connectivity.
☯ Lease line connectivity.
☯ Internet Access Point.
☯ Internet Gate Way.
☯ Internet Service Provider.
These five kinds of connectivity’s can be viewed in two groups- one group that is directly
connected to the ISP and the other group that is connected through another network. The group that is
directly connected to the ISP are sort of direct customers on the Net where as the group that is
connected through an interim network are members of another data network which may either be
Packet Switched Public Data Network (PSPDN) or Integrated Service Digital Network (ISDN) and in that
sense are indirect customers of Net.
Various Types of Connectivity’s to Internet shell account connectivity allows only text-based
access on host of the ISP. In shell account the computer terminal or the user’s PC works like a dumb
terminal connected to the host.
TCP/IP connectivity permits direct connection of the user computer to the Net. Thus all user
operations per for min this connectivity result in download of information directly on user’s PC. TCP/IP
account permits full graphics based access.
Internet accounts got are prone to, misuse. There is, therefore, a need to guard yours password
carefully. Besides taking other measures like selecting a combination of alphabetic and numeric
characters for password, you should change your password frequently so as to avoid its tracking on the
net.
The cost of the internet access depends on the type, flexibility and speed of the connection. The
cost factor is mainly influenced by the type of connection chosen by the user. The two factors that
determine the cost of an internet connection are.
Win socks
Win socks is expanded as Windows Sockets. It is a set of function for the Windows internet
application. The design of this internet package is based on the UNIX package (Sockets) and hence it is
called as windows sockets.
Terminal Emulation Software usually comes with the computer or with the modem. When we
connect to the Net through a host, terminal emulation software is used. This software enables our
computer to act as a terminal.
Free Nets
Free Nets are a kind of local connectivity computer system or free computing systems. This
system usually has a link to the Net. They provide local community information and limited access to the
Telnet. They provide local community information and limited access to the Telnet and FTP (File Transfer
Protocol).
Introduction
Electronic Mail, sometimes called email, is a computer based method of sending messages from one
computer user to another. These messages usually consist of individual pieces of text which you can
send to another computer user even if the other user is not logged in (i.e. using the computer) at the
time you send your message. The message can then be read at a later time. This procedure is analogous
to sending and receiving a letter.
Originally, email messages were restricted to simple text, but now many systems can handle more
complicated formats, such as graphics and word processed documents.
When mail is received on a computer system, it is usually stored in an electronic mailbox for the
recipient to read later. Electronic mailboxes are usually special files on a computer which can be
accessed using various commands. Each user normally has their individual mailbox.
It is straightforward to send electronic mail between users of different computer systems which are
connected to major networks. Most major academic and research institutions and companies
throughout the world can now be reached by electronic mail. In addition, a growing number of
individuals can be contacted in this way. In the UK, most academic and research institutions are linked
by a network called JANET (or Super JANET). This is effectively part of the Internet, so email can be
exchanged with most national and international networks.
E-Mail Program
Mozilla Thunderbird
It is an e-mail and news cross-platform client software package by Mozilla Foundation. Thunderbird can
manage multiple e-mail, newsgroup and RSS accounts and supports multiple identities within accounts.
Features like quick search, saved search folders , advanced message filtering, message grouping, and
labels help manage and find messages. Just like Firefox, the tons of extensions and themes for this client
makes it very secure and flexible to to enhance your productivity.
Claws Mail
Claws Mail is a free, GTK+-based, open source email and news client. It is very light
lightweight. Like Firefox , the wide variety of plug-ins for this email client makes it very flexible
and secure. Claws Mail runs on Windows, Mac OS X and Unix-like systems such as Linux,
BSD, and Solaris.
Spicebird
Update: Ed - 23/June/2010 ~ Spicebird client is no longer supported on Mac OS X. We will
replace this email client with another supported product shortly.
Spicebird is a collaboration client that provides integrated access to email, contacts, calendaring
and instant messaging in a single application. It provides easy access to various web services
while retaining all the advantages of a desktop application. It is developed by an Indian company
called Synovel. It is a free, open source and cross-platform software.
Sylpheed
Sylpheed is a free, GTK+-based, open source email and news client. It is very light lightweight.
Sylpheed runs on Windows, Mac OS X and Unix-like systems such as Linux, and BSD.
E-Mail Address
Email addresses (both for senders and recipients) are two strings separated by the character "@" (the
"at sign"):
user@domain
The right-hand part describes the domain name involved, and the left-hand part refers to the user who
belongs to that domain. One or more mail servers (MX records in the Domain Name System) correspond
to each domain.
An email address can be up to 255 characters long and can include the following characters:
Digits
The characters ".","_" and "-" (full stop, underscore, and hyphen)
In practice, an email address often looks something like this:
firstname.lastname@provider.domain
This address is given to the systems that do not have permanent connections to the Net. The
address looks similar to the standard internet address.
The top level Domains go with the type or organization intending to go up on the net. The
registration of second level domain names is co-ordinated by the inter NIC registry under the authority
of the Internet Assigned Numbers Authority (IANA), allocates blocks of IP address space to ISPs so that
they can allot the same name to their customer. The domain names are registered and maintained at a
nominal fee.
he Domain Name System (DNS) is a hierarchical naming system built on a distributed database
for computers, services, or any resource connected to the Internet or a private network. It
associates various information with domain names assigned to each of the participating entities.
Most importantly, it translates domain names meaningful to humans into the numerical
identifiers associated with networking equipment for the purpose of locating and addressing
these devices worldwide.
An often-used analogy to explain the Domain Name System is that it serves as the phone book
for the Internet by translating human-friendly computer hostnames into IP addresses. For
example, the domain name www.example.com translates to the addresses 192.0.32.10 (IPv4) and
2620:0:2d0:200::10 (IPv6).
The Domain Name System makes it possible to assign domain names to groups of Internet
resources and users in a meaningful way, independent of each entity's physical location. Because
of this, World Wide Web (WWW) hyperlinks and Internet contact information can remain
consistent and constant even if the current Internet routing arrangements change or the
participant uses a mobile device. Internet domain names are easier to remember than IP
addresses such as 208.77.188.166 (IPv4) or 2001:db8:1f70::999:de8:7648:6e8 (IPv6).
Users take advantage of this when they recite meaningful Uniform Resource Locators (URLs)
and e-mail addresses without having to know how the computer actually locates them.
The Domain Name System distributes the responsibility of assigning domain names and
mapping those names to IP addresses by designating authoritative name servers for each domain.
Authoritative name servers are assigned to be responsible for their particular domains, and in
turn can assign other authoritative name servers for their sub-domains. This mechanism has
made the DNS distributed and fault tolerant and has helped avoid the need for a single central
register to be continually consulted and updated.
In general, the Domain Name System also stores other types of information, such as the list of
mail servers that accept email for a given Internet domain. By providing a worldwide, distributed
keyword-based redirection service, the Domain Name System is an essential component of the
functionality of the Internet.
Other identifiers such as RFID tags, UPC codes, International characters in email addresses and
host names, and a variety of other identifiers could all potentially utilize DNS.[1]
The Domain Name System also defines the technical underpinnings of the functionality of this
database service. For this purpose it defines the DNS protocol, a detailed specification of the data
structures and communication exchanges used in DNS, as part of the Internet Protocol Suite.
Using E-Mail
1. Email is effective in providing quick answers to yes and no, type questions. eg. Do you
do international delivery?
2. Email is effective in finding the right person in an organisation or company to answer
your question.
3. Email is good to make appointments for busy people.
4. Email can distribute information quickly to many people for the time it takes to email one
person.
More and more individuals are receiving more emails than they can digest and because it is
physically more difficult to read on a computer screen, email writing is different from other
styles of letter writing.
In business it is important that emails do not become so burdensome, that more time is spent
answering email that doing work. Emails must be prioritized, and accurate subject lines chosen.
Skimming emails is common, so make sure that the major point in your email is handled first.
Make a decision whether it is best to divide the email into multiple emails with different subject
lines, because this is often easier and quickier to reply to and also because many people will read
one point in the email and totally miss another point.
Email security
Do not open an attachment or click on a link in an email from someone you don't know. If the
content of the email looks suspicious, but it is from someone you know - don't open until you
clarify it with the sender first. Trust your intuition or you may end up infected with a computer
virus.
Most honest people do not realize that email addresses are easily forged. This is because the
domain name system does not do a DNS check with the registrar of the domain, when email is
sent. So, even if you get an email appearing to be from a bank or person you know, if it looks
suspicious, email them and if they reply to the email, you know that they really did send the
email.
The Sender Policy Framework (SPF) is an attempt to control forged emails by editing the zone
file of a domain name, but since only a small number of domain name registrants enter the SPF
records into their zone file and not all mail servers subscribe to that policy, the policy is itself, a
work in progress. Banks and hosting companies, increasingly request users to login, to send
secure mail because they cannot be certain that an email address is not being forged.
Lastly, never open attachments of forwarded emails that are offered for inspiration or
amusement. Among friendship groups emails may be forwarded that seem funny. The first
person in the loop may have been sent a message that they believed was from someone they
knew and this person becomes an innocent distributer of malware. Malware is malicious code
that is designed to steal confidential information. eg. login details to internet banking.
Use of Mailing Lists
Email is a highly effective medium of communication but a wise company needs to treat the
recipient like a person not a number on a mailing list. Email needs to be personal or else it is
regarded as SPAM and sent off to the recycling bin or blocked by the customer.
SPAM is unsolicited mail. Because it is easy and inexpensive to send email, it is also easy and
inexpensive to send junk email.
Just because a person joins your mailing list does not necessarily mean that he or she wants to be
bombarded with useless information or made feel as you are using the mailing list purely for
profit.
Email can look really impressive by adopting a brochure format, but unless the pictures are there
for a reason and the email engages the reader by providing useful information, then it is better to
send a text based email. If you need to display products, then a link inside an email to the page
on your web site where the product is displayed is in my opinion a better option. This leads the
person back to your web site. An email formatted like a brochure is uninviting because it
resembles advertising but by providing a link, you are giving the customer a choice to view your
product. This empowerment is the difference between informative email and advertising.
Informative email is inviting, email that resembles advertising is pushy.
Email needs to tread the line of being personal yet business like. It is a way of building good
customer relationships.
Email used well can make people feel as though they matter.
Relationships are the key to any business and it can make for a rewarding experience.
If the desire is to serve the customer, you will certainly be well in front of your competition by
responding to every email, promptly and politely.
Introduction
The World Wide Web, abbreviated as WWW and commonly known as the Web, is a system of
interlinked hypertext documents accessed via the Internet. With a web browser, one can view
web pages that may contain text, images, videos, and other multimedia and navigate between
them by using hyperlinks. Using concepts from earlier hypertext systems, English engineer and
computer scientist Sir Tim Berners-Lee, now the Director of the World Wide Web Consortium,
wrote a proposal in March 1989 for what would eventually become the World Wide Web.[1] At
CERN in Geneva, Switzerland, Berners-Lee and Belgian computer scientist Robert Cailliau
proposed in 1990 to use "HyperText [...] to link and access information of various kinds as a web
of nodes in which the user can browse at will",[2] and publicly introduced the project in
December.[3]
"The World-Wide Web (W3) was developed to be a pool of human knowledge, and human
culture, which would allow collaborators in remote sites to share their ideas and all aspects of a
common project."
What is WWW?
The terms Internet and World Wide Web are often used in every-day speech without much
distinction. However, the Internet and the World Wide Web are not one and the same. The
Internet is a global system of interconnected computer networks. In contrast, the Web is one of
the services that runs on the Internet. It is a collection of interconnected documents and other
resources, linked by hyperlinks and URLs. In short, the Web is an application running on the
Internet.[21] Viewing a web page on the World Wide Web normally begins either by typing the
URL of the page into a web browser, or by following a hyperlink to that page or resource. The
web browser then initiates a series of communication messages, behind the scenes, in order to
fetch and display it.
First, the server-name portion of the URL is resolved into an IP address using the global,
distributed Internet database known as the Domain Name System (DNS). This IP address is
necessary to contact the Web server. The browser then requests the resource by sending an
HTTP request to the Web server at that particular address. In the case of a typical web page, the
HTML text of the page is requested first and parsed immediately by the web browser, which then
makes additional requests for images and any other files that complete the page image. Statistics
measuring a website's popularity are usually based either on the number of page views or
associated server 'hits' (file requests) that take place.
While receiving these files from the web server, browsers may progressively render the page
onto the screen as specified by its HTML, Cascading Style Sheets (CSS), or other page
composition languages. Any images and other resources are incorporated to produce the on-
screen web page that the user sees. Most web pages contain hyperlinks to other related pages and
perhaps to downloadable files, source documents, definitions and other web resources. Such a
collection of useful, related resources, interconnected via hypertext links is dubbed a web of
information. Publication on the Internet created what Tim Berners-Lee first called the
WorldWideWeb (in its original CamelCase, which was subsequently discarded) in November
1990
Over time, many web resources pointed to by hyperlinks disappear, relocate, or are replaced with
different content. This makes hyperlinks obsolete, a phenomenon referred to in some circles as link rot
and the hyperlinks affected by it are often called dead links. The ephemeral nature of the Web has
prompted many efforts to archive web sites. The Internet Archive, active since 1996, is one of the best-
known efforts.
☯ Yahoo
☯ Google
Uniform Resource Locator (URL)
Websites contain enormous information spread over several levels, each with varying degrees of
detail. The manner of information of dissemination, the rate of refreshment of information and the
depth of information handled are far more advanced in websites is so vast and deep that it has become
impossible to think of internet without the web. Websites are easier to create and equally easier to
update. A regular Net surfer would notice how quickly the data on websites is updated. Not only the text
but also the graphics are refreshed with great regularity. This availability of latest data facilitates better
and faster decision making by targeted group.
Websites are easier to create and have the ability to refresh information quickly, all at a small
cost. Websites are a facilitator of market research. Website owner can collect a number of statistics
from their sites which can be used by them to fine. Tune their production and marketing activities.
Websites are a multi-dimensional tool for mass communication and information dissemination.
Major Categories of websites over Internet
Almost all walks of life are represented on internet. The major site holders are educational
institutions, research laboratories and libraries; corporate houses and business organizations; tourism-
related business; and the entertainment industry.
Browsing
Google.com
After the document has been invoked, it takes some time before it is displayed on the PC screen.
This time is taken by the PC is sending a request to the website containing the addressed document and
waiting for its response. The time taken to fetch the document depends upon the relative congestion in
the inter connecting telecommunication lines. The congestion may also occur at the accessed website
due to a large number of simultaneous enquiries. Whatever be the time taken to fetch the invoke
information, the browser keeps the user informed about the goings on the Net, so that one does not
experience the feeling of being “lost” on the Net!.
The extent of information downloaded from the Net is displayed continuously in the bottom
most line of the display. This line displays several messages like “Connecting…” or “Waiting for reply” or
“document done” etc. The quantum of document received at any instant is also continuously displayed.
If a document is particular received, the percentage of the document received is displayed in the same
window. The extent of document downloaded is continuously updated with the same speed as the
receipt of the document. The same is also displayed graphically in the small window in the right- most
bottom of the screen by a gradually growing horizontal bar which fills the window completely.
Most sites contain documents that do not fit into one PC screen. Therefore there is a
requirement to move downloaded document in upwards and downwards directions. These tasks are
performed by the scrolling tabs located in the right margin of yahoo search site. By ‘Clicking’ on up
marked tab, one can see the upper portion of the document, i.e., the document scrolls down and
‘Clicking’ on the down arrow marked tab displays the lower part of the document meaning there by that
the document scrolls up. Different documents have different lengths. While some documents may fit in
one A4 size page, others may require several such pages. There is a sliding tab to indicate the amount of
information already perused or scrolled up and that yes to be seen or still to be displayed on the PC
screen the sliding tab positions itself right below the ‘up’ arrow marked tab after receipt of the home
page from a site. The in between position of the sliding tab in the sliding window is an indication of the
quantum of information still to be displayed on the screen.
Browser operations
The Net resolution has caught up with the business as well as the general public, with more and
more dot com companies creating BB and BC portals in the web
The web has become the easy medium to project different products to end-users in a fast,
effective and economical means. And the consumer finds himself in a better position to buy quality
products from a wide variety of products than be used before.
Browsing centers are the fastest nodes, which provide internet access for end users, who wish
to purchase some commodity, or some vital information, as in student community. The browsing
centers provide a cheaper alternative for the Net user compacted to the capital investment in terms of
Hardware/Software to be incurred by individuals.
The Browsing centers at Madurai have tremendous potential, considering the hectic business
activity in Madurai and existence of numerous educational institutions in and around Madurai. The
objective of this project is to study, the frequency of usage, time and amount ready to spend at the
Browsing Centers by the net users of Madurai.
Introduction
Gopher
UseNet
Telnet
TCP/IP
FTP
Anonymous FTP
ARCHIE
Archie is a program or a tool helps in locating a file anywhere on the net. Archie server exists all
over the worlds and we should select the one that is closer to us. This will help in minimizing the traffic
on the Net. We can access the archive servers in different ways as below.
VERONICA
Veronica is a search tool that facilitates searching for information over gopher space by the
more user friendly mechanism of ‘Keywords’ based search instead of menu-by-menu access provided by
gopher. Veronica searches for the desired information through thousands of gopher sites, locates
directories and sub-directories containing the desired keywords, fetches them and places them in a
temporary gopher menu for easy retrieval by the user. The conventional gopher access manner.
WAIS
WAIS stands for Wide Area Information Server. It is a search tool that searches for information
stored on computers running WAIS software. WAIS also searches for information by using keywords. It is
a distributed text- searching system. It works on the basis of identification of keywords embedded in
each document. When the user wants information on a particular topic, it enters the corresponding
keywords. WAIS then searches through databases accessible by it and matches the keywords with those
contained on the documents and identifies them for user’s perusal.
Objectives
Methodology
The moral “Method “indicates the mode of accomplishing an end only through methodical and
systematic procedure. If one has to think of accurate and clear-cut conclusions, there is no discipline
without a method. The methodology adopted in this study is discussed in brief below.
Research type
Data Collection
Sample plan
The total number of sample was taken to be for browsing centre and of
users. The samples were classified under status as student, employees and individuals.
Sample Element
The main sample elements were browsing centers and the users.
Nature of Data
Scope
The study was basically focused on the internet browsing centers. The study gives an idea of
how far students, employees and individuals are aware of internet. The study also gives an idea about
the purpose of using internet and also the Time, Frequency, Cost they are able to spend for internet. The
study also focuses on the advantages of internet over other communication media.
Limitations.
To send E-Mail =
For Chatting =
For Job Search =
For Information Collection =
Analysis
The study is basically oriented towards the samples, classified based on profession, browsing
center, internet users and communication media.
The analysis part of the study involves the percentage calculations. Various factor like
Awareness, Time Spent, Frequency, Charge, Facilities, Purpose and Problems were compared with
profession, Browsing center, Internet users and communication media.
The sample size taken for analysis was for Browsing centers and for Internet users. It
was classified based on profession. The number of samples containing students was calculated as
and Non Student i.e. Individuals, Employees etc as .
From the students sample the awareness through Education was calculated to be %
through friend’s %, through advertising media %.
A similar calculation was done with Non Students and the result was found to be % for
education, % for friends, % for advertising media.
The results thus obtained were tabulated under relative heads and the values were represented
graphically using charts like vertical bar.