What Is MIME
What Is MIME
Originally developed in 1992, MIME was a standard created to allow the exchange of non-ASCII content over email. Email was, and is really, an ASCII medium. MIME provides a mechanism for attaching data of non-ASCII types like images, sound files, multi-part messages, video, etc. The key feature of a MIME encoded message is that it indicates the contenttype of the encoded data. I use the word encoded, because email
was a pure ASCII medium and in order to transfer non-ASCII content, the binary data was encoded as a series of ASCII characters which could then be decoded on the other side. As long as the email program receiving the data knows what kind of file it is, it can try to do something appropriate with the data. All MIME headers indicate the contenttype of the contained data.
Q2. IMAP vs. POP What's the difference? The main difference, as far as we are concerned here, is the way in which IMAP or POP controls your e-mail inbox.
When you use IMAP you are accessing your inbox on the U of M's central mail server. IMAP does not actually move messages onto your computer. You can think of an e-mail program using IMAP as a window to your messages on the server. Although the messages appear on your computer while you work with them, they remain on the central mail server. POP does the opposite. Instead of just showing you what is in your inbox on the U's mail server, it checks the server for new messages, downloads all the new messages in your inbox onto your computer, and then deletes them from the server. This means that every time you use POP to view your new messages, they are no longer on the central mail server. Figure 1 illustrates these concepts. IMAP POP
Figure 1: Accessing your inbox, IMAP versus POP. IMAP makes it easier to view mail from home, work, and other locations Because IMAP leaves all of your messages on the central mail server, you can view these messages from any location with Internet access. This means the U of M e-mail inbox you view from home will be the same one you see at work. Since POP downloads new messages to your computer and removes them from the server, you will not be able to see those new messages on another computer when you check your inbox. Those messages exist only on the computer that downloaded them using POP. However, if you use IMAP and create e-mail folders on the server, these folders are accessible from
anywhere you read your e-mail using IMAP. If you use POP and create e-mail folders, they are stored locally, and you cannot access these folders from anywhere except the computer on which you created them. POP can create problems if you alternate between it and IMAP. There is an option in many POP e-mail programs to leave copies of the messages on the server, but this option has complications. When you leave copies of the messages on the server, then access your e-mail using WebMail or another IMAP e-mail client, the POP client may create duplicate messages next time it accesses the inbox; you will see each of the messages more than once, and you will have to clean out (delete) the unwanted ones. You may want to keep local copies While using IMAP to save e-mail on the central mail server is recommended, there are reasons to have local copies of messages (messages downloaded to the computer, as with POP). Fortuanately, IMAP allows you to keep local copies of all your messages. The option of local copies is useful when you are connecting from a dial-up connection. You may
want to download your messages, then disconnect from the Internet and work with your mail offline. Please note that while you are working offline, you cannot send or receive mail. You need to be connected to the Internet to do those tasks. You have a backup of your e-mail with IMAP The University's central e-mail servers are backed up every night. Thus, when your e-mail is stored on the U's e-mail server (as is the case with IMAP), a backup of your e-mail is made every night. These backups are used in the event of system failures or if a virus deletes your local mail. If you use POP, you lose your mail. The University cannot help you recover it because it was not stored the U's central email server. With the growing number of computer viruses and attacks from hackers, there is a greater possibility that e-mail can be deleted without your knowledge. The best insurance against loss of important e-mail is to have it on the University's e-mail server. Q3. What are the differences between rank retrieval system and extended boolean retrieval system
Anw: ranked The Boolean retrieval model contrasts with ranked retrieval models such as the retrieval models vector space model (Section 6.3), in which users largely use free text queries, free text queries that is, just typing one or more words rather than using a precise language with operators for building up query expressions, and the system decides which documents best satisfy the query. Despite decades of academic research on the advantages of ranked retrieval, systems implementing the Boolean retrieval model were he main or only search option provided by large commercial information providers for three decades until the early 1990s (approximately the date of arrival of the World Wide Web). However, these systems did not have just the basic Boolean operations (and, or, and not) that have been presented so far. A strict Boolean expression over terms with an unordered results set is too limited for many of the information needs that people have, and these systems implemented
extended Boolean retrieval models by incorporating additional operators such as term proximity 14 Boolean retrieval proximity operators. A proximity operator is a way of specifying that two terms in a operator query must occur close to each other in a document, where closeness may be measured by limiting the allowed number of intervening words or by reference to a structural unit such as a sentence or paragraph. Example 1.1: Commercial Boolean searching: Westlaw. Westlaw (http://www.westlaw.com/) is the largest commercial legal search service (in terms of the number of paying subscribers), with over half a million subscribers performing millions of searches a day over tens of terabytes of text data. The service was started in 1975. In 2005, Boolean search (called Terms and Connectors byWestlaw) was still the default, and used by a large percentage of users, although ranked free text querying (called Natural Language byWestlaw) was added in 1992. Here are some example Boolean queries onWestlaw:
Information need: Information on the legal theories involved in preventing the disclosure of trade secrets by employees formerly employed by a competing company. Query: trade secret /s disclos! /s prevent /s employe! Information need: Requirements for disabled people to be able to access a workplace. Query: disab! /p access! /s work-site work-place (employment /3 place) Information need: Cases about a hosts responsibility for drunk guests. Query: host! /p (responsib! liab!) /p (intoxicat! drunk!) /p guest Note the long, precise queries and the use of proximity operators, both uncommon in web search. Submitted queries average about ten words in length. Unlike web search conventions, a space between words represents disjunction (the tightest binding operator), & is and and /s, /p, and /k ask for matches
in the same sentence, same paragraph or within k words respectively. Double quotes give a phrase search (consecutive words); see Section 2.4 (page 36). The exclamation mark (!) gives a trailing wildcard query (see Section 3.2, page 48); thus liab! matches all words starting with liab. Additionally work-site matches any of worksite, work-site or work site; see Section 2.2.1. Typical expert queries are usually carefully defined and incrementally developed until they obtain what look to be good results to the user. Many users, particularly professionals, prefer Boolean query models. Boolean queries are precise: A document either matches the query or it does not. This offers the user greater control and transparency over what is retrieved. And some domains, such as legal materials, allow an effective means of document ranking within a Boolean model: Westlaw returns documents in reverse chronological order, which is in practice quite 1.4 The extended Boolean model versus ranked retrieval 15
effective. In 2007, the majority of law librarians still seem to recommend terms and connectors for high recall searches, and the majority of legal users think they are getting greater control by using them. However, this does not mean that Boolean queries are more effective for professional searchers. Indeed, experimenting on aWestlaw subcollection, Turtle (1994) found that free text queries produced better results than Boolean queries prepared by Westlaws own reference librarians for the majority of the information needs in his experiments. A general problem with Boolean search is that using and operators tends to produce high precision but low recall searches, while using or operators gives low precision but high recall searches, and it is difficult or impossible to find a satisfactory middle ground. Q5. What is the meaning of HTTP 401 error message? The Web server (running the Web site) thinks that the HTTP data stream sent by
the client (e.g. your Web browser or our CheckUpDown robot) was correct, but access to the URL resource requires user authentication 1) which has not yet been provided or 2) which has been provided but failed authorization tests. This is commonly known as "HTTP Basic Authentication". The actual authentication request expected from the client is defined in the HTTP protocol as the WWW-Authenticate header field. Generally this error message means you need to log on (enter a valid user ID and password) somewhere first. If you have just entered these and then immediately see a 401 error, it means that one or both of your user ID and password were invalid for whatever reason (entered incorrectly, user ID suspended etc.). Q 6. What is the IEEE standard for wireless LAN Answ: IEEE 802.11 a
Q 7. What is SSL? SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers.