Professional Documents
Culture Documents
1. Explain E-mail.
A. E-Mail is one of the fastest communication information serv ice that we use in our
daily life which give facilities like sending mails, getting mails, chatting, conference,
group mailing etc. E-mail still makes up a majority of Internet Traffic because
everyone with Internet access has an e-mail account. E-mail clients are programs
that are used to manage, read and compose e- mail.
Disadvantages:
1. Misdirection: It is far more likely that the user will accidentally sends e- mail to
an unintended recipient than it is for someone actually to intercept the mail.
2. Forgery: E- mail does not preclude a forgery that is someone impersonating the
sender, since the sender usually not authenticated in any way.
3. Overload: E- mail can also be too convenient and result in a flood of mail.
4. Junk: The process of sending junk e-mail to lots of sites simultaneously is
know n as spamming.
5. No Response: A mild f rustration sometimes associated with using e-mail is
dealing with recipients who do not read and respond to their e- mail on a
regular basis.
Despite of the disadvantages which are for the most part the same as those
associated with any communication mechanism, many people prefer using e- mail
to either using the telephone or writing a letter. E-mail is less formal than a letter
and not intrusive as a phone call. On the whole, the advantages of e- mail are
great and the disadvantages although real are acceptable when compared w ith
alternatives.
Sometimes additional sy mbols are used to flag whether or not the user has
already viewed the message. The first five lines of the message are referred to as
the e-mail header.
1. The From field indicates who sent the message and when.
2. The Date field repeats the date.
3. The To field specifies to whom the message has sent.
4. The Subject f ield prov ides a short description about the message.
5. The CC field tells us that the message was “Carbon Copied” to another user.
Long ago when a duplicate message needed to be sent, carbon paper was
used to generate the extra copy, hence the term carbon copy for a duplicate
message.
6. One field that does not appear that is worth mentioning is BCC, which stands
for “Blind Carbon Copy”. BCC is used when the user do not want one or more
of the recipients to know that someone else was copied on the message.
Structure: When the user has selected the compose button or command, the
mailer’s first field is generally To field. Here the user should enter the e-mail address
of the person to whom he/she is sending the message. Then the user w ill be
prompted to enter a short description of the message called Subject. After entering
the subject, the user can specify a file to be attached to this message in the
Attachment f ield. Most mailers use text editor for message composition. The text
editor acts as a word processor. It allows the user to type and modify the message.
Also, most mailers prov ide on-line documentation about how to use this editor.
Compose: The compose button prov ides the follow ing features
· New: Compose a message from scratch
· Reply: Replay a current message
· Forward: Pass the message on
· Vacation: The user is going away and wants automatic response to be
generated and have e- mail saved.
File: A File button has the following functionality
· Save: Save the current message into file on disk.
· Insert: Include a file in the body of the message being composed.
· Exit: Leave the mailer
· Open: Open a file from disk
· Attach: Append a file to a message.
Re ply: A Reply button usually consists of the following items
· To sender
· To all
· Forward
· Include
· Include bracketed
Forwarding: At any given point of time. People have many e- mail addresses.
Instead of reading mails from different accounts, it is often more convenient to have
all e- mail directed to only one account. This is usually possible by forwarding all e-
mails from other account to any one account. On some systems, there is a special
hidden f ile called something like . forward, w here the user can specify the e-mail
address to which the user would like the mail from that an account to be forwarded.
Bounce Features:
When the user sends an e- mail message, the mailer software sends a copy of
it over the Internet. The message has to be split up into small pieces called packets
containing appropriate header information and sequence numbers. The sequence
numbers are needed so the message can be reassembled in the correct order. The
mailer uses the destination e- mail address to identify the computer to which the
message should be routed. The receiving end must notify the server that all went
accordingly to plan and that the e-mail was delivered properly. This is necessary
because of mail sometimes bounces that is the e-mail is undeliverable. The major
reasons for a bounce are:
1. Bad user account name: The e- mail bounces after it gets to the target
systems and that system discovers the address does not exist.
2. Bad domain name: This causes an immediate bounce.
3. Domain name server is down for a number of days: If a mail server is not
working, the mail system w ill keep trying to send the message for a period of
time. Eventually, the mail system time out on retries and the e- mail w ill
bounce back.
4. Some other malf unction: If the message being mailed is too big, a warning
may be sent to notify this.
9. Explain a bout E-mail Manageme nt.
A. E-mail is a complex communication mechanism with many uses. To maintain
all features one can develop their own e- mail style for the better management of the
e-mails. For managing e-mail properly one should know or think about the follow ing
things.
· Does e- mail help you at work?
· Is e-mail a waste of your time?
· Are you flooded with e-mail from mailing lists?
· Are you constantly reading forwards jokes?
· How can e-mail make your life more enjoyable?
· How can e-mail make you more productive instead of less effective?
· Do you receive a lot of useless gossip?
When the user decides to view the e-mail, the mailer provides some sort of index
messages with the subject like displayed. Usually the messages are numbered in
sequence. The mailer typically displays the first or current message.
Action Options: We have a number of options for dealing with the message. Some
of them are:
1. You might decide based on the subject line and the address of the sender that
you want to decide the message without reading it. This is one way to deal
with junk e- mail.
2. You many decide that you do not have time to read the message right now
and that you w ill get back to it later. In this case, you could simply skip over
it or save it to a file.
3. You may decide to read the current message now. After reading the message,
you have the option of deleting the message, reply ing to it, forwarding the
message to someone else, saving the message in a file or saving the message
in the mailbox.
E-mail and Business: When working in a business environment that uses e-mail,
you should be aware that it is currently legal for an employer to read all company e-
mail. Very few companies actually do read employees e-mail, but you should be
aware that they can. A company could maintain backups of all e- mail for a long
period of time. If necessary they could go back and rev iew the e-mail message of an
employee.
Business sometimes uses e- mail f ilters. The filters can work in both directions
to limit either incoming or outgoing e- mails. The filtering mechanism examines each
message’s e- mail address before deciding whether or not to send the mail on.
Business use e-mail filters to restrict with their employees can communicate.
10. Explain the bare bones of a browser with neat diagram.
(or)
Explain about Browser Window Te rminology.
A. A Web browser is one of many software applications that function as the
interface between a user and the Internet. The browser not only sends messages to
Web servers to retrieve the page requests, but also parses and renders the HTML
code once it arrives. That is, the browser interprets the code and displays the results
on the screen. Many browsers have built-in mail clients and/or newsreaders.
Additionally, auxiliary programs such as helper applications and plug-ins can be
configured into the browser.
Popular browsers include Netscape Navigator, Microsoft’s Internet Explorer,
Mosaic, and Lynx. The first few are graphical- based Web browsers, whereas Lynx is
a text-only browser.
1. Back: The Bac k button allows you to access the most recently visited page
without typing its URL. The page is usually loaded quickly, since it is available
from cache.
2. Forward: The Forwa rd button allows you to page forward in much the same
way that the Back button operates.
3. Reloa d: The most current version of a Web page can be loaded by clicking on
the Reloa d button.
4. Home: The user can specify what Web page to load when the browser is first
activated. This page is often called the homepage. The Home button will load
the homepage that has been designated.
5. Search: Clicking on the Sea rch button brings up one of the many useful search
tools that Netscape “knows” about. Once the search tool is loaded, you can use
it to search the Internet.
6. Guide : The Guide button leads you to a mini information center (provided by
Netscape) from which you can locate all kinds of useful items. The information
displayed is updated frequently.
7. Print: You can obtain a hardcopy of the currently displayed Web page by
clicking the Print button.
8. Security : The Security button allows you to examine and specify security
options.
9. Stop: The Stop button is used to stop the transfer of a Web page. This button
also allows you to stop endlessly looping animated GIFs.
Hot Buttons:
Beneath the location area are the hot buttons (also called directory buttons) that
Netscape provides. Other browsers provide their own versions of these buttons.
These buttons include
• Internet: This button has the same effect as the Guide button of the tool bar.
• Lookup: This button contains two options: People and Yellow Pages.
• People: Various search programs that are available to locate an indiv idual.
• Yellow Pa ges: Various search programs that are available to locate a business.
• Ne w & Cool: This button contains two options: What’s Ne w and What’s Cool.
• What’s Ne w: A list of new, interesting Web pages.
• What’s Cool: A selected list of “cool” Web pages.
• Netcaster: This button takes you to information about Netscape’s Netcaster
product, which allows you to open a “channel” to receive a continuous f low of
information to your computer.
http://pubpages.uminn.edu/index.ht ml
The first part of URL is called as protocol or scheme. It tells the browser how
to deal with the file that it is about to open. One of the most common protocols is
http or Hypertext Transfer Protocol. It is used to access the web pages.
The second part of URL is the name of the server where the file is located
followed by the path that leads to the file and the file name itself. Sometimes URL
ends in a trailing forward slash w ith no file name given.
The common protocol is http. The other protocols are ftp (File Transfer
Protocol) for dow nloading f iles f rom internet, mailto for sending electronic mail and
file for accessing files on a local hard disk. A protocol is generally followed by a colon
and two forward slashes. The file protocol uses three slashes where as mailto uses a
colon without slash.
URLs are of two types:
1. Absolute URL: An absolute URL shows the entire path to the file including
the scheme, the server name and the file name.
E.g. http://www.yahoo.com/index.ht ml
2. Re lative URL: A relative URL describes the location of the desired file w ith
reference to the location of the file that contains the URL itself. The relative
URL is in the same directory as the current file is simply the file name and
extension.
E.g. index.ht ml
1. Head Tag: The Head tag, <HEAD> has no attributes. However, several tags can
be included inside it. The most important of these is the title tag.
a. Title Tag: A title tag, <TITLE>, is contained w ithin the head of the document to
prov ide a title for the document. Its corresponding ending tag is </TITLE>. Do not
include any HTML formatting within the title tag.
b. Basefont Tag: The basefont tag, <BASEF ONT >, defines the font size to be used in
the HTML document and may be included in the head of the document. It is also
possible to use the basefont tag in other locations of an HTML document. Most
browsers permit a range of font sizes. Seven different sizes are commonly available,
with the sizes ranging from 1, which is the smallest, to 7, which is the largest?
<HEAD>
<BASEFONT SIZE = "4">
</HEAD>
To increase the font one larger than the default we use the following code:
<BASEFONT SIZE = "+1">
In typing this tag, it is common practice to omit the double quotes. The ending tag
</BASEFONT > returns the font size to its default value.
c. Base Tag:
The base tag, <BASE>, is useful for setting some global parameters of an HTML
document and may be included in the head of the document. A global parameter is
an attribute that has an effect on the entire document.
<HEAD>
<T ITLE>Water Sports to Die For</TITLE>
<BASE HREF =
"http://www.yahoo.com/index.ht ml">
</HEAD>
d. Meta Tag:
Mot widely used tag inside the head tag is the Meta tag, <META>. This tag is used to
include additional information about a document and can be used to pass additional
information to a browser. There is no ending tag for <META> and a document can
have multiple <META> tags. The attributes of the Meta tag are NAME, CONTENT,
and HTTP-EQUIV. we should include a modest list of keywords, say three to five, as
the value of the CONTENT attribute. If someone is searching for a particular topic,
the page may be returned if one or more of your keywords match their search
request.
<HEAD>
<META NAME = "keywords"
CONTENT = "woodw orking, cabinet making,
handmade furniture">
</HEAD>
1. One involves straightforward color names, such as blue, cranberry, green, orange,
red, and yellow. Many browsers have a list of predefined color names.
A little computer numbering terminology is necessary first. A bit is either 0 or
the term bit stands for binary digit. Bits are useful for counting in base two.
Decima l Bina ry
0 0
1 1
2 10
4 100
5 101
29 11101
255 11111111
For example, 752 in hexadecimal represents the number 1874 in decimal, as follows:
(7 × 162 ) + (5 × 161 ) + (2 × 160 ) = 1792 + 80 + 2 = 1874
2. Body Tag:
The body is the second and main part of every HTML document. The text and
HTML code that goes between the body beginning and ending tags is rendered and
displayed in the document area of the browser’s w indow. The body tag, <BODY >,
has a number of useful attributes. The most interesting attributes deal with the
document’s text color and background color, and the properties of hyperlinks.
a. Text Color: The TEXT attribute is used to change the default text color for an
entire document. Suppose you have a document and would like to use a red colored
text. The following HTML code shows how:
<BODY TEXT = "#FF0000">
b. Background Color and Image: Two attributes to the body tag that allows the user
to add values to a Web page background are BGCOLOR and BACKGROUND.
If we have an image called marble.jpg, the follow ing HTML code would include it as a
tiled background for you:
<BODY BACKGROUND = "marble.jpg">
The following HTML code first loads in a color and then a background pattern:
<BODY BGCOLOR = "#0000FF " BACKGROUND = "marble.jpg">
c. Hyperlink Colors: Three attributes are used for changing the color of a hyperlink,
where
the color depends on the current state of the hyperlink. The three possible states
are: unv isited, visited, and currently thinking of visiting. These are defined as
follows:
LINK: Unv isited hyperlinks. The color value assigned to LINK sets the color for all
unvisited hyperlinks in the HTML document.
VLINK: Visited hyperlinks. The color value assigned to VLINK sets the color for all
visited hyperlinks, that is, hyperlinks the user has already explored
ALINK: A hyperlink the user is thinking of v isiting. The A stands for active hyperlink.
The color value assigned to ALINK sets the color of a hyperlink that the user has
moused over and depressed the mouse button on.
The following code specifies unvisited links as red, v isited links as gray,
and the active link as yellow:
<BODY BGCOLOR = "#FFFFFF"
LINK = "#FF0000"
VLINK = "#808080"
ALINK = "#FFFF00">
The SIZE attribute of the font tag is typically used to change the font size of an
indiv idual part
of a document. For example, makes the first letter of the first paragraph slightly
larger than the rest of the text. This can be accomplished with the following code:
<FONT SIZE = "+3">W</FONT >elcome my friend.
Most browsers also support a FACE attribute for the <FONT > tag,
For example,
<FONT FACE = "Arial">New font type</FONT >
e. HTML Comments: The comment tag is not <COMMENT >; it is the set of symbols
<!--
for the beginning tag and --> for the ending tag. A comment, properly included,
does not change the appearance of your Web page. To use the comment tag, place
the comment text between the pairs of dashes in the tag. For example,
<! -- This is a comment. -->
For example,
<!—This is B.Sc III Year -->
Paragraph Tag:
The paragraph tag is used to break the text into paragraphs. Most browsers
place an empty vertical space between paragraphs so they stand apart from each
other. To designate a block of text as a paragraph, enclose it within the paragraph
beginning and ending tags: <P> and </P>.
The following HTML code illustrates the use of the paragraph tag:
<P>
This is Web Technologies.
</P>
Heading Tags:
Most browsers support a hierarchy of six levels of HTML headings. The
beginning tag for heading i is <Hi>, where i can be any value f rom 1 to 6. The
corresponding ending tag, as expected, is </Hi>. The largest heading is <H1> and
the smallest is <H6>. One important attribute of the heading tag is ALIGN, which
can have values of left, center, or right.
<H1>Complete Sentences</H1>
<H2>F ragments and Run-on Sentences</H2>
Anchor Tag:
The anchor tag, <A> and </A>, is the mechanism by which hyperlinks are placed in
hypertext documents. Its syntax is more complicated than that of most other tags.
The term anchor is used because it indicates the static positioning of a hyperlink.
Mailto Hyperlinks:
Image Tag:
The image tag, <IMG>, is used for including in-line images in HTML documents.
An example of the use of the tag is:
<IMG SRC = "wheelbarrow.gif "
ALT = "Under Construction"
HEIGHT = "50"
WIDTH = "50">
The most important attribute of the image tag is SRC, which is used to specify
the image to be displayed. Any type of image can be specified, using either a relative
or an absolute URL, where the relative URL would relate to the document in which
the image appears.
When a browser retrieves a Web page, it does not automatically get the
images that go along w ith that page. Each image must be retrieved separately. To
render the document on-screen, the browser must know the sizes of the images. On
the other hand, a browser will list image dimensions as x ×y, w here x is the WIDTH
of the image and y is the HEIGHT. The HEIGHT and WIDTH attributes can also have
percentages as values, allowing them to be used to scale an image relative to the
size of the browser’s window.