Internet Its Applications PDF
Internet Its Applications PDF
Hard disk
Motherboard
Processor
RAM
3. What is WWW?
The World Wide Web (www) is an open source information space where documents
and other web resources are identified by URLs, interlinked by hypertext links, and can be
accessed via the Internet.
4. What is a computer?
5. Define internet.
6. Define DNS.
The domain name system (DNS) is the way that Internet domain names are located
and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-
remember "handle" for an Internet address.
7. What is email?
A message distributed by electronic means from one computer user to one or more
recipients via a network.
8. Define spam.
An irrelevant or unsolicited message sent over the Internet, typically to large numbers
of users, for the purposes of advertising, phishing, spreading malware, etc.
Banking
Insurance
Education
Health care
Military
Machine language
Assembly language
High level language
Information is an organized or classified data which has some meaningful values for
the receiver. Information is the processed data on which decisions and actions are based.
A coding system using the binary digits 0 and 1 to represent a letter, digit, or other
character in a computer or other electronic device.
A byte is a unit of measurement used to measure data. One byte contains eight binary
bits, or a series of eight zeros and ones. Each byte can be used to represent 2^8 or 256
different values.
A compiler is nothing but a translator, which converts the high level programming
language into a machine readable form. It converts the set of data simultaneously.
An interpreter is system software which also converts the high level programming
language by one instruction at a time into a machine readable form.
PART – B QUESTIONS
Speed: Computer speed depends upon the type of processor and bus line
architecture used.
Accuracy: Computer performs millions of operations but within the given input
set of instructions and data, the result obtained should be precise one without any
errors.
Reliability: Reliable means that they can do their task properly and consistently.
Computer communication and components are very reliable and has very less
failure rate.
Storage: Two types of storage are used, first is primary storage (Eg: RAM) and
second is secondary storage (Eg: Hardisk).
Automation: Once a set of program is fed into the computer, then the computer
can take decision automatically without interfering with the user. Example: Pen
drives.
Diligence: Computer can work lot of hours with same speed and accuracy on each
operation, without getting tired.
All types of computers follow a same basic logical structure and perform the
following five basic operations for converting raw input data into information useful to their
users
Input Unit
This unit contains devices with the help of which we enter data into computer. This
unit makes link between user and computer.
The input devices translate the information into the form understandable by computer.
Output Unit
Output unit consists of devices with the help of which we get the information
from computer.
This unit is a link between computer and users.
Output devices translate the computer's output into the form understandable by
users.
Control Unit
This unit controls the operations of all parts of computer but does not carry out any
actual data processing operations.
The concept of a web resource is primitive in the web architecture, and is used in
the definition of its fundamental elements.
In the Semantic Web, abstract resources and their semantic properties are
described using the family of languages based on Resource Description
Framework (RDF).
The concept of a web resource has evolved during the web history, from the early
notion of static addressable documents or files.
In the early specifications of the web (1990–1994), the term resource is barely
used at all.
Basic aim of java was to solve the problem of connecting many household
machines together.
As there was another language called Oak, they decided to rename OAK. New
name was given to OAK , OAK was renamed Java in 1994
It has ability to use the Web rather than your own computer for various services.
FTP (File Transfer Protocol) - a protocol that is used to transfer and manipulate
files on the Internet
HTTP (Hypertext Transfer Protocol) - An Internet-based protocol for sending
and receiving webpage
TCP/IP (Transmission Control Protocol / Internet Protocol) - manages the
assembling of a message or file into smaller packets that are transmitted over the
Internet and received by a TCP layer that reassembles the packets into the original
message.
UDP (User Datagram Protocol) - uses a simple connectionless transmission
model with a minimum of protocol mechanism.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0
Unit – 1Answer Page 8 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012
One of the W3C’s primary goals is to make the Web universally accessible
regardless of disability, language or culture.
The full form of e-mail is Electronic Mail. It is a system for sending and receiving
messages electronically over a computer network
It is often more efficient than traditional mail which has a longer transit between
the sender and the receiver(s).
Advantages:
Email is effective in providing quick answers to yes and no, type questions.
Email is effective in finding the right person in an organization or company to
answer your question.
Email is good to make appointments for busy people.
Email can distribute information quickly to many people for the time it takes to
email one person.
Disadvantages:
As the network grew, it was used for applications beyond research, such as
electronic mail.
In the early 1980s, the current versions of the core Internet protocols, TCP and IP,
were introduced across the network.
The term Internet comes from the word inter-network - an interconnected set of
networks.
In 1992, the Center for European Nuclear Research (CERN) released the first
versions of World Wide Web software.
Subsequently, the number of Web servers has grown quickly.
PART – C QUESTIONS
Machine language
Assembly language
High level languages
MACHINE LANGUAGE
Programs and data are ultimately represented in machine language in memory and
other hardware of the computer.
Translation Free
High Speed
ASSEMBLY LANGUAGE:
They invented computer languages that are easy to remember and use.
For Example: For adding two quantities X and Y, You may code as follows.
ADD X Y
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0
Unit – 1Answer Page 12 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012
ADD is called operation code that tells the computer what operation it has to perform.
X and Y are called operation addresses.
Advantages:
Readability
Machine Independent
Easy Debugging
Easier to Maintain
Low Development Cost
Easy Documentation
Disadvantages:
There are many ways a personal electronic device can connect to the internet. They
all use different hardware and each has a range of connection speeds. Some of them are as
follows,
Here analog signal is converted to digital via the modem and sent over a
telephone lines.
DSL:
DSL stands for Digital Subscriber Line. It is an internet connection that is always
“on”.
This uses 2 lines so your phone is not tied up when your computer is connected.
DSL uses a router to transport data and the range of connection speed, depending
on the service offered, is between 128K to 8 Mbps.
Cable:
Cable provides an internet connection through a cable modem and operates over
cable TV lines.
There are different speeds depending on if we are uploading data transmissions or
downloading.
Coaxial cable provides a much greater bandwidth over dial-up or DSL telephone
lines
Wireless:
Wireless or Wi-Fi does not use telephone lines or cables to connect to the internet.
It uses radio frequency.
Wireless is also an always on connection and it can be accessed from just about
anywhere.
Speeds will vary, and the range is between 5 Mbps to 20 Mbps.
Satellite.
Satellite accesses the internet via a satellite in Earth’s orbit.
It provides a delayed connection compared to cable and DSL.
Satellite connection speeds are around 512K to 2.0 Mbps.
Cellular:
CPU:
This is the computational unit and is the computer's heart. This entity controls the
operations of the computer and performs its data processing functions.
Arithmetic Logic Unit (ALU), where all the arithmetic and logical operations are
performed.
Control Unit (CU) which coordinates with all other units for proper
systemoperation.
Memory unit (MU), which stores the instructions, data and results as well.
Input/output interface:
They are used to move data from the computer and from its external environment.
The external environment may be an input or an output device like Printer, displays,
keyboard etc.
System interconnection:
This constitutes some mechanism that provide for communication among CPU,
Memory & I/O. These can be referred to as a system BUS.
Traditionally the computer system consists of a single CPU. But some machines like
multiprocessing involves the use of multiple CPU’s and share a single memory.
Registers:
The registers are used to store the data, addresses, and flags that are in use, by the CPU.
Primary Memory:
CPU can directly access the program stored in the primary memory.
Main memory consists of a large number of semiconductor storage cells.
Each cell is capable of storing one bit of information.
Secondary Memory:
This memory type is much larger in capacity and also much slower than the main
memory.
Secondary memory stores system programs, large data files and the information
which is not regularly used by the CPU.
Sending a file:
Attaching a file to a message means sending a file along with it. An attachment
can be any type of file, such as a word-processor file, an image, or a Web page,
and it can be of any size. You can attach as many files
to a message as you'd like.
To attach a file, click File in the Attach menu. Locate and highlight the file you
want to attach, and then click Open. The file will be added to the list of file
attachments. You can repeat this process as often as you'd like.
Click Send when you want to send your message and attachments.
Receiving a file:
When someone sends you an e-mail message with an attachment, we will see an
Click this icon to display an icon of the attached file in the bottom of the window.
When we double-click this attached file icon, we will be prompted to either save
or open the file. Choose Save.
Once the file is saved, and before opening it, you might want to scan it
for viruses.
If someone sends you an e-mail message with an image or a Web page attached to
it, you will see the image or the Web page in the body of the message.
Attached Web pages will also have a hyperlink to them somewhere in the body of
the message.
-------------
Internet Intranet
Internet is wide network of computers and is Intranet is also a network of computers
open for all. designed for a specific group of users
The number of users is unlimited The number of users is limited
Intranet can be safely privatized as per the
Internet is not as safe
need
2. What is a browser?
A computer program with a graphical user interface for displaying HTML files, used
to navigate the World Wide Web.
Internet Explorer
Mozilla Firefox
Google Chrome
Opera
4. Define IRC.
5. What is newsgroup?
6. Define internet.
7. Define bandwidth.
A range of frequencies within a given band, in particular that used for transmitting a
signal.
Baud rate means the number of times a signal in a communications channel changes
state.
9. Define cookies.
A message given to a Web browser by a Web server. The browser stores the message
in a text file. The message is then sent back to the server each time the browser requests a
page from the server.
Digital Subscriber Line is defined as the way a computer connects to the Internet at
high speeds using telephone lines.
An Internet Service Provider (ISP) is a company that provides you with access to the
Internet, usually for a fee. The most common ways to connect to an ISP are by using a phone
line (dial-up) or broadband connection (cable or DSL).
A modem is a device or program that enables a computer to transmit data over, for
example, telephone or cable lines.
Uniform Resource Locator and is an address to a resource on the Internet. A URL has
three main components: Protocol, Server name and Domain name.
It is an electronic link that providing direct access from one distinctively marked
place in a hypertext or hypermedia document to another in the same or a different document.
Hypertext Markup Language, a standardized system for tagging text files to achieve
font, color, graphic, and hyperlink effects on World Wide Web pages.
PART – B QUESTIONS
The internet provides the ability of emails. Free mail service to anyone in the
country.
Platform for products like SKYPE, which allow for holding a video conference
with anyone in the world who also has access.
Things such as Yahoo Answers and other sites where kids can have readily
available help for homework.
Plug the cable modem into your computer. Make sure your computer is near a
wall cable socket.
Plug the cable modem into the wall cable socket.
Plug in the cable modem's power cord.
Test your internet connection.
It is one of most popular browser in use, despite strong competition from the likes
of Mozilla Firefox, Apple's Safari, Opera and Google Chrome.
Internet Explorer supports Java, JavaScript, ActiveX, RSS, CSS and Ajax.
It also offering features like tabbed browsing, private browsing, and built-in
malware and phishing protection.
To protect privacy and security of the information from internet, browsers setting are
useful. Some of them are as follows
General Settings - Change your home page, delete the browsing history, change search
settings, change tab settings, and customize the appearance of Internet Explorer.
Security settings - Set default and custom security levels for the Internet, intranet, and
specific websites.
Content settings - Turn on Content Advisor or change its settings, view and manage
security certificates, change AutoComplete settings, or change feed (RSS) settings.
Programs settings - Change your default web browser, e‑mail program, HTML editor,
Newsgroup reader, or Internet telephone, and manage web browser add-ons.
Error reporting mechanism: Lets end users report failures they encounter
during use.
Personal Bar: Brings a new level of personalization and convenience to Web
browsing.
Privacy enhancements: Provide the end user with control over how cookies can
be used in collecting information.
Standards Support: Internet Explorer 6 supports more features of the standards,
CSS level 1 and DOM level 1.
Microsoft is promoting the new version and its features to three target audiences:
End users: Internet Explorer is an application that enables them to view and
interact with Web-based content.
Web application developers: They use Internet Explorer as a platform for
building and deploying Web-based applications.
Stand-alone application developers: Internet Explorer 6 enables Web content to
be part of their applications.
In Newsgroup, click Discussion Help Index and click on the choices under the
basics to learn.
Click BACK to the Browse Discussion Groups page. Find the name(s) of groups
that might interest you. Write their names here: Example: biz
Spend some time reading the previous in thread and next in thread messages.
At the very top of one of the message pages in the word thread.
Think twice - first make sure that you really want to do this. Learn about the
various kinds of forums that you can create on the net, and decide which kind fits
your purposes best.
Choose your hierarchy - decide in which top-level hierarchy you want to put the
group. Different hierarchies of newsgroups have different rules for creating new
groups.
Regional or local topics - If the topic is of local or regional interest, you should
look for an appropriate national, regional or local newsgroup hierarchy.
Note: Sources of information are found at *.general or *.config group in the hierarchy
IRC enables users to connect to a server using a software program or web service
and communicate with each other live.
To connect and chat with other IRC users, we must either have an IRC client or a
web interface that connects you to IRC servers. Eg: HydraIRC program
Basic Commands
PART – C QUESTIONS
File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files
between computers on the Internet over TCP/IP connections.
A command channel for controlling the conversation and a data channel for
transmitting file content.
Using FTP, a client can upload, download, delete, and rename, move and copy
files on a server.
A user typically needs to log on to the FTP server, although some servers make
some or all of their content available without login, also known as anonymous
FTP.
FTP was originally defined in 1971, prior to the definition of TCP and IP, and has
been redefined many times.
Users can work with FTP via a simple command line interface or with a dedicated
graphical user interface (GUI).
It works well across firewalls and Network Address Translation (NAT) gateways.
FTP sessions:
In active mode, after a client initiates a session via a command channel request,
the server initiates a data connection back to the client and begins transferring
data.
In passive mode, the server instead uses the command channel to send the client
the information it needs to open a data channel.
2. Briefly explain sending messages with yahoo messenger and windows messenger.
Double-click the contact's name on your Messenger List. This will automatically
open an IM window.
Click Actions.
Type the Yahoo ID of the person you want to send a message to, and click OK.
Click the Windows Messenger icon in the status area of the taskbar.
Point to Send an Instant Message, and then click the name of the person who you
want to contact.
Type your message, and then click Send or press ENTER. Your message is then
displayed to your contact.
Internet Chat Query is an instant messaging computer program that was first
developed and popularized by the Israeli company Mirabilis in 1996.
The name ICQ stands for "I Seek You". Its ownership was passed to AOL in 1998
and to Mail.Ru Group in 2010.
Variety of themes:
Customize your ICQ! Choose from the wide variety of themes and background
colors. Bright, colorful or minimalistic - ICQ comes with themes for every mood.
File sharing:
Send any type of files to your contacts, right from your chat window. Sharing photos,
videos, audio files and any other documents in ICQ is fast and easy.
Social networks:
Connect ICQ with your social network accounts and chat with all of your friends in
one app. Messaging is so much easier with ICQ.
Unlimited calling is just a few clicks away! With free voice calls and video chat in
ICQ you can catch up and wave hello anytime and anywhere.
Chatting is more fun with ICQ stickers. Send stickers to express your mood, cheer
your friends up or for no reason at all!
A web browser is an interface that helps a computer user gain access to all the content
that is on the Internet and the hard disk of the computer. It can view images, text documents,
audio and video files, games, etc.
Internet Explorer
This was introduced in 1995 along with Windows 95 launch and it has passed
Netscape popularity in 1998.
Google Chrome
Developed by Google and its beta version was first released on September 2, 2008
for Microsoft Windows.
Today, chrome is known to be one of the most popular web browsers with its
global share of more than 50%.
Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has grown to
be the second most popular browser on the Internet.
Safari
Opera
Opera is smaller and faster than most other browsers.
Fast, user-friendly, with keyboard interface, multiple windows, zoom functions,
and more.
Java and non Java-enabled versions available.
.
-------------
1. Define E-mail.
2. Define newsgroup.
3. What is spamming?
Spam is flooding the Internet with many copies of the same message, in an
attempt to force the message on people who would not otherwise choose to receive it.
Privacy issues
Email can be encrypted
Difficult to completely erase and destroy.
Easy to get swamped (but you can filter and sort messages)
An address book is a database that stores names, addresses and other contact
information for a computer user. Address books allow easy access to the user's friends,
family, business associates and others by maintaining their email
It is a type of service available on the internet that allows you to exchange written
messages with someone else who is using the service at the same time
Bcc Cc
Replying Bcc's cannot see the receiver's reply Cc's cannot see the receiver's reply
An email attachment is a computer file sent along with an email message. One or
more files can be attached to any email message, and be sent along with it to the
recipient.
A Server is a program or computer system that stores and distributes email from
one mailbox to another, or relays email from one server to another in a network.
An email server used by more than one company or sender. Shared servers are
less expensive to use because the broadcast vendor can spread the cost over more users.
A line or two of information found in the closing of an email usually followed the
sender’s name. Signatures can include advertising information, such as a company name,
product, brand message or marketing call to action
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0
Unit – 3Answer Page 2 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012
Simple Mail Transfer Protocol, the most common protocol for sending email
messages between email servers.
Post Office Protocol, which an email client uses to send to or receive messages
from an email server.
Technique for acquiring information such as user names, passwords, credit cards,
social security numbers and other personal data by masquerading as a trusted business
like a bank or credit card company.
PART – B QUESTIONS
Instant messages - Send notes back and forth with a friend who is online
Video - Send and view videos, and chat face to face with friends
Talk - Use the Internet instead of a phone to actually talk with friends
Webmail means emails can be sent and received from any computer,
anywhere in the world, that has an Internet connection.
When an email is sent, the message is routed from server to server, all the way
to the recipient's email server.
The recipient's MTA then delivers the email to the incoming mail server
(called Mail Delivery Agent), which stores the email as it waits for the user to
accept it.
There are two main protocols used for retrieving email on an MDA:
Viruses are easily spread via email attachments (most email providers scan
emails for viruses on your behalf).
No guarantee the mail will be read until the user logs on and checks their
email.
Spam is flooding the Internet with many copies of the same message
Most spam is commercial advertising, often for dubious products, get-rich-
quick schemes, or quasi-legal services.
Spam costs the sender very little to send.
Types of Spam:
There are two main types of spam, and they have different effects on Internet users.
Usenet spam - is aimed at "lurkers", people who read newsgroups but rarely
or never post and give their address away.
Functions:
Email spam lists are created by scanning Usenet postings, stealing Internet
mailing lists, or searching the Web for addresses.
One particularly nasty variant of email spam is sending spam to mailing lists.
sci.* - There are numerous discussion newsgroups about scientific topics, all
of which would fall into the sci.* hierarchy.
soc.* - These are the newsgroups devoted to talking about social issues.
People also come to the soc.* groups for socializing with each other.
misc.* - The newsgroups are typically those that don't make sense in any of
the other Big 8 hierarchies.
Replay all:The Reply All button makes it possible to send a reply to the
sender as well as everyone else who had been put as a recipient or on copy.
Forward: Forwards the message to someone else, letting them know that the
message comes from you. The subject is generally preceded by Fwd: to
indicate that it is a forwarded message.
o the header fields, a set of lines describing the message's settings, such
as the sender, the recipient, the date, etc.
PART – C QUESTIONS
A web browser is an interface that helps a computer user gain access to all the
content that is on the Internet and the hard disk of the computer. It can view images, text
documents, audio and video files, games, etc.
Internet Explorer
This was introduced in 1995 along with Windows 95 launch and it has passed
Netscape popularity in 1998.
Google Chrome
Developed by Google and its beta version was first released on September 2,
2008 for Microsoft Windows.
Today, chrome is known to be one of the most popular web browsers with its
global share of more than 50%.
Mozilla Firefox
Firefox is a new browser derived from Mozilla. It was released in 2004 and has
grown to be the second most popular browser on the Internet.
Safari
Opera
Opera is smaller and faster than most other browsers.
Fast, user-friendly, with keyboard interface, multiple windows, zoom
functions, and more.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0
Unit – 3Answer Page 9 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012
Configurable Rules:
Most mailing list rules are configured in the List Type through a combination
of options available in the argument string.
These are extended by list-level options that control Web availability, Web
archives and Subscriber Lists.
Multiple Mailboxes
The messages can be filtered into different mailboxes and stored or processed
rather than simply forwarded.
The main mailing list mailbox is the one that receives messages submitted for
posting.
Posting rules and other configuration settings determine how the message is
then routed.
These messages are described Bounces and Automated Bounce Handling and
Mailing List Moderation.
Email services offer many features and functionality for managing e-mail.
Some of the more popular online email services are Yahoo! Mail, Gmail,
Hotmail and AOL Mail.
Email Providers:
There are several companies, which offer email service, absolutely free.
Example:
We can choose an email address and specify the address to which the
messages are to be forwarded.
So, whenever our email ID changes, we can go to the site of the service
provider and change the forwarding addresses.
Service Providers:
a) Poboxes
b) Pobox
c) iName
Reminder services:
a) Netminder
Step 1: Log in to your Gmail account so that you are on the dashboard (main page) of
your mail account.
Step 5: The subject field allows us to give the recipient an idea of the topic of our email.
Step 6: Email text can be formatted in a similar way to text in a word document.
Step 7: Type your message in the main body field of our email.
Step 8: If you want to attach some files to the composing mail, click the attachment.
Step 10: Finally, click the Send button at the bottom of the compose window.
-------------
1. Define HTML.
Hypertext Markup Language, a standardized system for tagging text files to achieve
font, color, graphic, and hyperlink effects on World Wide Web pages.
Code completion
HTML entities library
Site Explorer
Built in FTP client
Search and Replace
3. What is Tag?
HTML tags are the hidden keywords within a web page that define how the browser
must format and display the content. Most tags must have two parts, an opening and a closing
part.
Head - contains information that is useful to the Web browser and search engines.
Body - contains the information that you want the visitor to see.
background, bgcolor&text
<HTML>
<HEAD>
<TITLE> Document Title Goes Here </TITLE>
</HEAD>
<BODY>
Document content and markup go here....
</BODY>
</HTML>
Lists are block formatting elements that define a block structure. List can be classified
into three types as follows
8. Define frame.
9. Define DTD.
markup language, a client-side scripting language, a presentation definition language, and the
Document Object Model.
Extensible Markup Language (XML) is used to describe data. The XML standard is a
flexible way to create information formats and electronically share structured data via the
public Internet, as well as via corporate networks.
A table places information inside the cells formed by dividing a rectangle into rows
and columns.HTML represents a basic table using four elements.
<table>…</table>
<th>…..</th>
<tr>…..</tr>
<td>…..</td>
It is an electronic link that providing direct access from one distinctively marked
place in a hypertext or hypermedia document to another in the same or a different document.
An HTML form facilitates the user to enter data that is to be sent to the server for
processing.
HTML elements communicate to the browser to render text. When the elements are
surrounded by brackets <>, they form HTML tags. Most of the time, tags come in pair and
surround content.
Semantic HTML is a coding style. It is the use of HTML markup to reinforce the
semantics or meaning of the content. For example: In semantic HTML <b></b> tag is not
used for bold statement as well as <i></i> tag is used for italic. Instead of these we use
<strong></strong> and <em></em> tags.
Image map facilitates to link many different web pages using a single image. Itdefines
shapes in images that you want to make part of an image mapping.
Syntax:
<iframe src="URL"></iframe>
Example:
The HTML canvas element provides HTML a bitmapped surface to work with. It is used
to draw graphics on the web page.
The <canvas> element allows for dynamic and scriptable rendering of 2D shapes and
bitmap images.
PART – B QUESTIONS
HTML tags are used to format the appearance of the text on the web page are as
follows,
It is possible to align block elements (tables, images, objects, paragraphs, etc.) on the
canvas with the align attribute.
Attribute may be set for many HTML elements, its range of possible values
sometimes differs from element to element.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0
Unit – 4Answer Page 5 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012
Attribute definitions
align = left|center|right|justify
This attribute specifies the horizontal alignment of its element with respect to the
surrounding context.
Possible values:
Example:
Head: The head element contains title and meta data of a web document.
Body: The body element contains the information that you want to display on a
web page.
To make your web pages compatible with HTML, we need to add DTD before the
HTML element.
To add an image to a HTML document, <IMG> tag is used. The <IMG> element has
no ending tag.
IMG Attributes
SRC - The path and filename of the image which specifies its location.
ALT - This is a message displayed if the image could not be found.
ALIGN- Sets the image alignment.
VSPACE - The space between the image and the text above and below it in
pixels.
HSPACE- The space between the image and the text to the left and right of it in
pixels.
BORDER - Sets a border of the specified width in pixels to be drawn around the
image.
HEIGHT - The height of the image. If this is not specified, the image will be the
size as determined by the file.
WIDTH - The width of the image. If this is not specified, the image will be the
size as determined by the file.
Example:
<div style="text-align: center"
<ahref="Picture1.gif">
<imgsrc="Picture.gif" ALT="Picture1" height="20%" width="40%">
</a>
div>
The HTML <div> tag is used to group the large section of HTML elements
together.
<div> tag is a container unit which is used to encapsulate other page elements and
divides the HTML documents into sections.
The div tag is generally used by web developers to group HTML elements
together.
Eg:
</div>
Output:
Eg:
<!DOCTYPE html>
<html>
<head>
<title>This is the title</title>
</head>
<body>
This is the content of the document.
</body>
</html>
A table places information inside the cells formed by dividing a rectangle into
rows and columns.
Most cells contain data. Some cells, usually on the table contain headings.
Containsoneormorerows, <TR>…</TR>.
Each row contains cells holding a hearing, <TH> … </TH>, or data, <TD> …
</TD>.
Example:
<HTML>
<HEAD>
<TITLE>Simple Table Example</TITLE>
</HEAD>
<BODY>
<TABLE BORDER="1">
<CAPTION>Basic Fruit Comparison Chart</CAPTION>
<TR>
<TH>Fruit</TH>
<TH>Color</TH>
</TR>
<TR>
<TD>Apple</TD>
<TD>Red</TD>
</TR>
<TR>
<TD>Avocado</TD>
<TD>Green</TD>
</TR>
<TR>
<TD>Banana</TD>
<TD>Yellow</TD>
</TR>
</TABLE>
</BODY>
</HTML>
Output:
Fruit Color
Apple Red
Avacoda Green
Banana Yellow
The HTML anchor tag defines a hyperlink that links one page to another page.
The "href" attribute is the most important attribute of the HTML a tag.
The href attribute is used to define the address of the file to be linked.
Syntax:
Eg:
PART – C QUESTIONS
Lists are block formatting elements that define a block structure. HTML has three
basic forms of lists:
Ordered lists (<OL>)
Unordered lists (<UL>)
Definition lists (<DL>).
Two other rarely used list elements, <MENU> and <DIR>, are sparsely supported
and are usually treated as an unordered list.
Definition list(<DL>)
A definition list is a list of terms paired with associated definitions in other words,
a glossary.
Definition lists are enclosed within <DL> and </DL> tags.
Each term being defined is indicated by a <DT>…</DT> element, which is
derived from definition term.
Example:
<HTML>
<HEAD>
<TITLE>List Example</TITLE>
</HEAD>
<BODY>
<P>Ordered List</P>
<UL START=”1” TYPE="a">
<LI>OSS</LI>
. <LI>MM</LI>
</UL>
<P>Un-Ordered List.</P>
<UL TYPE="disc">
<LI>OSS</LI>
. <LI>MM</LI>
<UL>
<P>Defintion List.</P>
<DL>
<DT>Coffee</DT>
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0
Unit – 4Answer Page 12 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012
Frame attributes:
Attribute Description
src This attribute is used to give the file name that should be loaded in the
frame.
frameborder This attribute specifies whether or not the borders of that frame are shown
marginwidth This attribute allows you to specify the width of the space between the left
marginheight This attribute allows you to specify the height of the space between the top
and bottom of the frame's borders and its contents.
noresize The noresize attribute prevents a user from being able to resize the frame.
For example noresize="noresize".
scrolling This attribute controls the appearance of the scrollbars that appear on the
frame.
longdesc This attribute allows you to provide a link to another page containing a long
description of the contents of the frame.
Example:
<HTML>
<HEAD>
<TITLE>Simple Frame Example</TITLE></HEAD>
<FRAMESET COLS="120,*">
<FRAMESET ROWS="*,50">
</FRAMESET>
</frameset></HTML>
HTML forms are popular for collecting information from the user, so online forms
are used for user's input.
By using HTML, we can only create a form.
To collect the information from a form, we will need to use a web programming
language.
To create a form use the <form>….</form> tags.
use HTML code to create the form with the information you are requesting the user to
provide
use a web programming language (such as ASP, PHP, Perl, etc.) to process that form
Form Elements:
Appearance in
Field type HTML tag to use Description
browser
Input (text) <input type="text"> Single line text box for users to
box enter single line of data
Password <input type="password"> Single line text box that hides the *****
box text being typed.
Radio <input type="radio"> Allows the user to select a single
Checked
Button option from a predefined list
Unchecked
Check Box <input type="checkbox"> Allow the user to select zero, one
Checked
or more options
Unchecked
NAME DESCRIPTION
A anchor
ABBR abbreviated form (e.g., WWW, HTTP, etc.)
APPLET Java applet
AREA client-side image map area
B bold text style
BASE document base URI
BGSOUND background sound
BIG enlarge text style
BLINK blinking text
BLOCKQUOTE long quotation
BODY document body
BR forced line break
BUTTON push button
CENTER shorthand for DIV align=center
EM emphasis
EMBED embeds external object in HTML
FIELDSET form control group
FONT local change to font
FORM interactive form
FRAME subwindow
FRAMESET window subdivision
H1…H6 heading
I italic text style
IMG Embedded image
INPUT form control/field
LABEL form field label text
LEGEND fieldset legend
LI list item
LINK a media-independent link
MAP client-side image map
MARQUEE scrolling text field
OPTION selectable choice
P paragraph
PARAM named property value
PLAINTEXT text format
PRE preformatted text
SPAN generic language/style container
-------------
1. What is E-Marketing?
E-marketing refers to the use of the Internet and digital media capabilities to help
sell your products or services. These digital technologies are a valuable addition to
traditional marketing approaches regardless of the size and type of your business
Credit-card payments, digital cash and e-wallets, smart cards, micropayments and
electronic bill presentment and payment are methods for conducting online transactions.
4. Define E-Wallet.
E-wallets keep track of billing and shipping information so that it can be entered
with one click at participating merchants’ sites. E-wallets also store e-checks, e-cash and
credit-card information for multiple cards.
Micropayment enables ways for nominally priced products and services (such as
music, pictures, texts or videos) to be sold profitably over the Web.
Smart cards are able to hold more information than can ordinary credit cards with
magnetic strips. Smart cards enable the convenient storage of information regarding such
topics as health-care, personal identification, retail and banking.
Brand equity includes the value of tangible and intangible items, such as a brand’s
monetary value over time, customer perceptions and customer loyalty to a company, its
products or services.
Promotions can both attract visitors to a site and influence purchasing. Promotions
can also be used to increase brand loyalty through reward programs.
Log Files, ID Cards and Cookies are the different methods of consumer tracking.
A file contains data generated by site visits, including each visitor’s location, IP
address, time of visit and frequency of visits is called Log file.
A search engine is a program that scans Web sites for desired content, listing
relevant sites on the basis of keywords or other search-engine ranking criteria.
The method used by a search engine to rank a Web site will determine how
“high” a site appears on lists of search results. Businesses can customize and register
their sites to improve the sites’ positions in search-engine results.
The spider reads the meta tags, determines the relevance of the Web page’s
information and keywords and then ranks the site according to that visit’s findings.
Public relations (PR) provide customers and employees with the latest
information about products, services and such issues as company promotions and
consumer reactions.
Press releases, which announce current events and other significant news to the
press, can be delivered over the Web.
Call handling
Sales tracking
Transaction support
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0
Unit – 5Answer Page 3 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012
PART – B QUESTIONS
The publication of URLs on all direct mailings, business cards, billboards, print,
wireless advertisements.
Other media also can increase brand awareness, bringing more visitors to a site.
Online advertising can include the placement of links and banners on other
company’s websites.
Banner advertisements are similar to billboards seen along the highway, but
banners offer the additional feature of interactivity.
Public relations (PR) provide customers and employees with the latest
information.
Press releases, which announce current events and other significant news to the
press, can be delivered over the Web.
When a company is doing poorly, its public-relations department will often issue
information regarding the causes.
Internet® MasterCard® and American Express, have features that enable secure
online and offline payments.
Digital Cash
E-Wallets
E-wallets also store e-checks, e-cash and credit-card information for multiple
cards.
They process, which becomes costly when customers purchase inexpensive items.
Micropayment enables ways for nominally priced products and services to be sold
profitably over the Web.
Research can now be performed over the Internet, giving marketers a new, faster
channel
The Internet also provides a relaxed and anonymous setting to hold focus-group
discussions and distribute questionnaires.
Demographics are statistics on the human population, including age, sex, marital
status and income.
The marketer should also determine the level of personalization of the campaign.
Internet mailing lists can help marketers target customers through personalized e-
mail.
Marketers should avoid sending e-mail to people who have not shown interest in
specific products or services.
They are able to hold more information than can ordinary credit cards with
magnetic strips.
To read and update the information on a contact smart card’s computer chip, the
card must be placed in a smart card reader.
A contactless smart card contains both a coiled antenna and a computer chip,
enabling the card to transmit information
Smart cards can require users to enter passwords, thus offering a higher level of
security than credit cards.
The cards can also be enhanced with additional security features, such as
encryption and photo identification.
PART – C QUESTIONS
Credit-card payments, digital cash and e-wallets, smart cards, micropayments and
electronic bill presentment and payment are methods for conducting online
transactions.
Many companies offer products, software and services that enable monetary
transactions on the Web.
Credit-Card Payment:
Internet® MasterCard® and American Express, have features that enable secure
online and offline payments.
Digital Cash
E-Wallets
E-wallets also store e-checks, e-cash and credit-card information for multiple
cards.
Smart card
They are able to hold more information than can ordinary credit cards with
magnetic strips.
Aspects of CRM:
The maintenance of outbound and inbound calls from customers and service
representatives.
Applications of CRM:
Business analysts should review all CRM plan details and data
E-marketing refers to the use of the Internet and digital media capabilities to help
sell your products or services. These digital technologies are a valuable addition to
traditional marketing approaches regardless of the size and type of your business
Brand
Brand Equity
Brand equity includes the value of tangible and intangible items, such as a brand’s
monetary value over time, customer perceptions and customer loyalty to a company, its
products or services.
Marketing Research:
Research can now be performed over the Internet, giving marketers a new, faster
channel
The Internet also provides a relaxed and anonymous setting to hold focus-group
discussions and distribute questionnaires.
Email Marketing:
The marketer should also determine the level of personalization of the campaign.
Internet mailing lists can help marketers target customers through personalized e-
mail.
Electronic Advertisements:
4. What are search engines? Explain in detail about different search engines.
-------------