Ans 1 CAP 214
-
Upload
anupkhanal08 -
Category
Documents
-
view
216 -
download
0
Transcript of Ans 1 CAP 214
-
8/8/2019 Ans 1 CAP 214
1/10
FUNDAMENTS OF WEB
PROGRAMMINGCAP 209
ASSIGNMENT# 1
SUBMITTED TO: SUBMITTED
BY:
Mr. Rajeev Kanday Rupesh Rimal
Reg: 10904918
Sec: RD 3901, G2
Roll: B 36
-
8/8/2019 Ans 1 CAP 214
2/10
PART A
ANS 1
Various components of a Search Engine are as
follows:
A. Content component: Your web page text
B. Link component: How you link your pages together
C. Link Popularity component: The in-bound links to your site
1.The Content Component (Web Page Text)
The most important part of the content component (of a search engine
algorithm) is keyword selection and where you place keywords on your web
pages. In order for your target audience to find your site on the search
engines, your web pages must contain keyword phrases that match the
phrases your target audience is typing into search queries. Finding these
keywords that your target audience uses to find your product is
accomplished by conducting keyword research.
2.The Link Component (Internal Linking)
The strategy of placing keyword-rich text on your web pages is useless if the
search engine spiders have no way of finding that text. The way your web
pages are linked to each other has huge impact on your site's search engine
positioning. Be sure to link your pages together with your keywords within
your links.
3.The Link Popularity Component (Acquiring In-
Bound Links)
The Link Popularity component of a search engine algorithm analyzes how
many web sites link to your website. 95% of the battle of getting high
-
8/8/2019 Ans 1 CAP 214
3/10
rankings at the search engine is acquiring quality and relevant links pointing
to your web site.
Ever since Google has entered in the race of the search engine market, all
the major Search Engines have started using links as the primary way they
rank web sites. This is known as web site's "Link Popularity" or in Google'scase it's called "PageRank".
For example, the heart of Google's algorithm is PageRank, a system for
ranking web pages developed by Google founders Larry Page and Sergey
Brin at Stanford University. "PageRank relies on the uniquely democratic
nature of the web by using its vast link structure as an indicator of an
individual page's value. In essence, Google interprets a link from page A to
page B as a vote, by page A, for page B. But, Google looks at more than the
sheer volume of votes, or links a page receives; it also analyzes the page
that casts the vote.
Steps Needed To Be Followed To Get Good Search
Results:
1. We should identify the important concepts of our search.2.Then we should choose the keywords that describe these concepts of the
search.
3. We should determine whether there are synonyms, related terms, orother variations of the keywords that should be included or not.
4. We should determine which search features may apply, includingtruncation, proximity operators, and Boolean operators.
5. We should choose a good search engine.6. We should read the search instructions on the search engine's home
page.7. We should look for sections entitled Help, Advanced Search and
Frequently Asked Questions.8. We should create a search expression, using syntax, which is appropriate
for the search engine.
9. Evaluation of the results must be done.10. If the results arent relevant to the given query then modify the search
if needed.11. Then go back to steps 2-4 and revise the query to make much more
efficient.12. The same steps are to be followed for any of the search engine
available.
-
8/8/2019 Ans 1 CAP 214
4/10
ANS 2Purposes of FTP (File Transfer Protocol)
FTP is an Application layer protocol used to send and receive files thru
TCP/IP.
FTP is built on client-server architecture and utilizes separate control and
data connections between the client and server applications, which solve
the problem of different end host configurations.
FTP is also a standard network protocol used to copy a file from one hostto another over a TCP/IP-based network, such as the Internet.
FTP is used with user-based password authentication or with anonymous
user access.
FTP VS TELNETFTP (File Transfer Protocol) TELNET
-
8/8/2019 Ans 1 CAP 214
5/10
FTP (File Transfer Protocol) is a
communication protocol between
two computers for the purpose of
uploading and downloading,
deleting files.
Telnet gives us command line access to
a remote computer. While we can
transfer files via telnet, its main
differences is you can execute
commands to more advanced things
like starting/restarting services and
such.
FTP is a protocol used specifically
for transferring files to a remote
location
Telnet allows a user to issue commands
remotely
FTP can be used with a command
line, a dedicated application and
even with most web browsers.
Telnet is restricted to the command line
There are ways to use FTP in a
secure environment.
Telnet will always be unsecured when
used.
FTP is a well-known and reliable
method of uploading files to web
servers
Telnet is now commonly used in
diagnosing network services.
ANS 3
WWW (World Wide Web)
The World Wide Web shortened as WWW is commonly known as the Web, is
a system of interlinked hypertext documents accessed thru the Internet.
With a web browser, one can view web pages that may contain text, images,
videos, and other multimedia and navigate between them by using
hyperlinks.
Facilities provide by WWW are as follows:-
World Wide Web (WWW) is capable of displaying basic style sheets,
downloading and opening any file type supported by the NeXT system
-
8/8/2019 Ans 1 CAP 214
6/10
(PostScript, movies and sounds), browsing newsgroups, and
spellchecking.
Worldwide Web was able to use different protocols: FTP, HTTP, NNTP, and
local file.
Worldwide Webs navigation panel contained Next and Previous
buttons that would automatically navigate to the next or previous link on
the last page visited, similar to Opera's Rewind and Fast Forward buttons;
i.e., if one navigated to a page from a table of links, the Previous button
would cause the browser to load the previous page linked in the table
which is useful for web pages which contained lists of links.
-
8/8/2019 Ans 1 CAP 214
7/10
PART B
ANS 4
MIME
MIME stands for Multipurpose Internet Mail Extensions which helps the e-mail
protocols to permit the users to transfer any kind of image, sound, and
program as attachment in email across the World Wide Web. It is because of
MIME only that we can send the audios, videos and software programs toother users through email attachments as it is the format of non-text email
attachments.
MIME used to extend the format of email
Non-text attachments such as images, videos, audios and other multi-
media messages.
Ability to send multiple objects within a single message.
Character sets other than US-ASCII
Writing header information in non-ASCII character sets
Text with unlimited length
-
8/8/2019 Ans 1 CAP 214
8/10
ANS 5
Browsers use plugins because:
It helps to enable third-party developers to create capabilities which
extend an application
It helps to support easily adding new features.
It helps to reduce the size of an application.
It helps to separate source code from an application because of
incompatible software licenses.
-
8/8/2019 Ans 1 CAP 214
9/10
COOKIES VS PLUGINS
COOKIES PLUGINS
A cookie is a small text file that a
Web server creates and stores on
our computers hard drive
Plug-in is a set of software
components that adds specific
capabilities to a larger software
application.
Many Web sites use cookies to
make their sites easier to
navigate.
It is integrated browser software that
the browser uses to display or play a
specific file that we request.
A cookie is not a program and it
can only store information that
we provide to the Web site that
creates it
Plugins does their work inside the
browser. When we install a Web
browser, many popular plugins are
often installed with it.
Navigator stores cookies in a file
named cookies.txt on the users
hard drive.
Plugins are stored inside browsers.
ANS 6
Yes it is possible to messages to the USENET thru email. Usenet is a set of
protocols for generating, storing and retrieving news "articles" which
-
8/8/2019 Ans 1 CAP 214
10/10
resemble Internet mail messages and for exchanging them among a
readership which is potentially widely distributed.
These protocols most commonly use a flooding algorithm which propagates
copies throughout a network of participating servers.
Whenever a message reaches a server, that server forwards the message to
all its network neighbours that haven't yet seen the article. Only one copy of
a message is stored per server, and each server makes it available on
demand to the (typically local) readers able to access that server.
The collection of Usenet servers has thus a certain peer-to-peer character in
that they share resources by exchanging them, the granularity of exchange
however is on a different scale than a modern peer-to-peer system and this
characteristic excludes the actual users of the system who connect to the
news servers with a typical client-server application, much like an emailreader.
Usenet has support for automated removal of a posting from the whole
network by creating a cancel message in cases where unsuitable content has
been posted, although due to a lack of authentication and resultant abuse,
this capability is frequently disabled.