Ans 1 CAP 214

download Ans 1 CAP 214

of 10

Transcript of Ans 1 CAP 214

  • 8/8/2019 Ans 1 CAP 214

    1/10

    FUNDAMENTS OF WEB

    PROGRAMMINGCAP 209

    ASSIGNMENT# 1

    SUBMITTED TO: SUBMITTED

    BY:

    Mr. Rajeev Kanday Rupesh Rimal

    Reg: 10904918

    Sec: RD 3901, G2

    Roll: B 36

  • 8/8/2019 Ans 1 CAP 214

    2/10

    PART A

    ANS 1

    Various components of a Search Engine are as

    follows:

    A. Content component: Your web page text

    B. Link component: How you link your pages together

    C. Link Popularity component: The in-bound links to your site

    1.The Content Component (Web Page Text)

    The most important part of the content component (of a search engine

    algorithm) is keyword selection and where you place keywords on your web

    pages. In order for your target audience to find your site on the search

    engines, your web pages must contain keyword phrases that match the

    phrases your target audience is typing into search queries. Finding these

    keywords that your target audience uses to find your product is

    accomplished by conducting keyword research.

    2.The Link Component (Internal Linking)

    The strategy of placing keyword-rich text on your web pages is useless if the

    search engine spiders have no way of finding that text. The way your web

    pages are linked to each other has huge impact on your site's search engine

    positioning. Be sure to link your pages together with your keywords within

    your links.

    3.The Link Popularity Component (Acquiring In-

    Bound Links)

    The Link Popularity component of a search engine algorithm analyzes how

    many web sites link to your website. 95% of the battle of getting high

  • 8/8/2019 Ans 1 CAP 214

    3/10

    rankings at the search engine is acquiring quality and relevant links pointing

    to your web site.

    Ever since Google has entered in the race of the search engine market, all

    the major Search Engines have started using links as the primary way they

    rank web sites. This is known as web site's "Link Popularity" or in Google'scase it's called "PageRank".

    For example, the heart of Google's algorithm is PageRank, a system for

    ranking web pages developed by Google founders Larry Page and Sergey

    Brin at Stanford University. "PageRank relies on the uniquely democratic

    nature of the web by using its vast link structure as an indicator of an

    individual page's value. In essence, Google interprets a link from page A to

    page B as a vote, by page A, for page B. But, Google looks at more than the

    sheer volume of votes, or links a page receives; it also analyzes the page

    that casts the vote.

    Steps Needed To Be Followed To Get Good Search

    Results:

    1. We should identify the important concepts of our search.2.Then we should choose the keywords that describe these concepts of the

    search.

    3. We should determine whether there are synonyms, related terms, orother variations of the keywords that should be included or not.

    4. We should determine which search features may apply, includingtruncation, proximity operators, and Boolean operators.

    5. We should choose a good search engine.6. We should read the search instructions on the search engine's home

    page.7. We should look for sections entitled Help, Advanced Search and

    Frequently Asked Questions.8. We should create a search expression, using syntax, which is appropriate

    for the search engine.

    9. Evaluation of the results must be done.10. If the results arent relevant to the given query then modify the search

    if needed.11. Then go back to steps 2-4 and revise the query to make much more

    efficient.12. The same steps are to be followed for any of the search engine

    available.

  • 8/8/2019 Ans 1 CAP 214

    4/10

    ANS 2Purposes of FTP (File Transfer Protocol)

    FTP is an Application layer protocol used to send and receive files thru

    TCP/IP.

    FTP is built on client-server architecture and utilizes separate control and

    data connections between the client and server applications, which solve

    the problem of different end host configurations.

    FTP is also a standard network protocol used to copy a file from one hostto another over a TCP/IP-based network, such as the Internet.

    FTP is used with user-based password authentication or with anonymous

    user access.

    FTP VS TELNETFTP (File Transfer Protocol) TELNET

  • 8/8/2019 Ans 1 CAP 214

    5/10

    FTP (File Transfer Protocol) is a

    communication protocol between

    two computers for the purpose of

    uploading and downloading,

    deleting files.

    Telnet gives us command line access to

    a remote computer. While we can

    transfer files via telnet, its main

    differences is you can execute

    commands to more advanced things

    like starting/restarting services and

    such.

    FTP is a protocol used specifically

    for transferring files to a remote

    location

    Telnet allows a user to issue commands

    remotely

    FTP can be used with a command

    line, a dedicated application and

    even with most web browsers.

    Telnet is restricted to the command line

    There are ways to use FTP in a

    secure environment.

    Telnet will always be unsecured when

    used.

    FTP is a well-known and reliable

    method of uploading files to web

    servers

    Telnet is now commonly used in

    diagnosing network services.

    ANS 3

    WWW (World Wide Web)

    The World Wide Web shortened as WWW is commonly known as the Web, is

    a system of interlinked hypertext documents accessed thru the Internet.

    With a web browser, one can view web pages that may contain text, images,

    videos, and other multimedia and navigate between them by using

    hyperlinks.

    Facilities provide by WWW are as follows:-

    World Wide Web (WWW) is capable of displaying basic style sheets,

    downloading and opening any file type supported by the NeXT system

  • 8/8/2019 Ans 1 CAP 214

    6/10

    (PostScript, movies and sounds), browsing newsgroups, and

    spellchecking.

    Worldwide Web was able to use different protocols: FTP, HTTP, NNTP, and

    local file.

    Worldwide Webs navigation panel contained Next and Previous

    buttons that would automatically navigate to the next or previous link on

    the last page visited, similar to Opera's Rewind and Fast Forward buttons;

    i.e., if one navigated to a page from a table of links, the Previous button

    would cause the browser to load the previous page linked in the table

    which is useful for web pages which contained lists of links.

  • 8/8/2019 Ans 1 CAP 214

    7/10

    PART B

    ANS 4

    MIME

    MIME stands for Multipurpose Internet Mail Extensions which helps the e-mail

    protocols to permit the users to transfer any kind of image, sound, and

    program as attachment in email across the World Wide Web. It is because of

    MIME only that we can send the audios, videos and software programs toother users through email attachments as it is the format of non-text email

    attachments.

    MIME used to extend the format of email

    Non-text attachments such as images, videos, audios and other multi-

    media messages.

    Ability to send multiple objects within a single message.

    Character sets other than US-ASCII

    Writing header information in non-ASCII character sets

    Text with unlimited length

  • 8/8/2019 Ans 1 CAP 214

    8/10

    ANS 5

    Browsers use plugins because:

    It helps to enable third-party developers to create capabilities which

    extend an application

    It helps to support easily adding new features.

    It helps to reduce the size of an application.

    It helps to separate source code from an application because of

    incompatible software licenses.

  • 8/8/2019 Ans 1 CAP 214

    9/10

    COOKIES VS PLUGINS

    COOKIES PLUGINS

    A cookie is a small text file that a

    Web server creates and stores on

    our computers hard drive

    Plug-in is a set of software

    components that adds specific

    capabilities to a larger software

    application.

    Many Web sites use cookies to

    make their sites easier to

    navigate.

    It is integrated browser software that

    the browser uses to display or play a

    specific file that we request.

    A cookie is not a program and it

    can only store information that

    we provide to the Web site that

    creates it

    Plugins does their work inside the

    browser. When we install a Web

    browser, many popular plugins are

    often installed with it.

    Navigator stores cookies in a file

    named cookies.txt on the users

    hard drive.

    Plugins are stored inside browsers.

    ANS 6

    Yes it is possible to messages to the USENET thru email. Usenet is a set of

    protocols for generating, storing and retrieving news "articles" which

  • 8/8/2019 Ans 1 CAP 214

    10/10

    resemble Internet mail messages and for exchanging them among a

    readership which is potentially widely distributed.

    These protocols most commonly use a flooding algorithm which propagates

    copies throughout a network of participating servers.

    Whenever a message reaches a server, that server forwards the message to

    all its network neighbours that haven't yet seen the article. Only one copy of

    a message is stored per server, and each server makes it available on

    demand to the (typically local) readers able to access that server.

    The collection of Usenet servers has thus a certain peer-to-peer character in

    that they share resources by exchanging them, the granularity of exchange

    however is on a different scale than a modern peer-to-peer system and this

    characteristic excludes the actual users of the system who connect to the

    news servers with a typical client-server application, much like an emailreader.

    Usenet has support for automated removal of a posting from the whole

    network by creating a cancel message in cases where unsuitable content has

    been posted, although due to a lack of authentication and resultant abuse,

    this capability is frequently disabled.