Unit-1 (Compatibility Mode)
Unit-1 (Compatibility Mode)
Cyber Space
• Cyberspace is the notional environment in which
communication over computer networks occurs.
• E-mail
• File transfer [File Transfer Protocol (FTP)]
• Voice
o ce ttraffic
a c [[Network
et o Voiceo ce Protocol
otoco ((NVP)]
)]
• Password protection
World Wide Web
• The World Wide Web (WWW/ W3) is an
information space where documents and other
web resources are identified by URLs,
interlinked by hypertext links, and can be
accessed via the Internet.
• B
Because domain
d i names are alphabetic,
l h b ti th
they're
'
easier to remember. The Internet however, is
really based on IP addresses.
addresses
• HTTP is i the
th underlying
d l i protocol
t l usedd byb
the World Wide Web and this protocol defines
how messages are formatted and transmitted,
transmitted
and what actions Web Server and browsers
should take in response
p to various commands.
</body>
</html>
</body>
y
</html>
• Step 3: Save the HTML Page
• Save the file on your computer. Select File > Save as in the
Notepad menu
menu.
• Name the file "index.htm" and set the encoding to UTF-8 (which is
the preferred encoding for HTML files).
• Step 4: View the HTML Page in Your Browser
• Open the saved HTML file in your favorite browser
(double click on the file, or right-click - and choose "Open
with").
• The result will look much like this:
• HTML Tags
• The first tag in a pair is the start tag, the second tag is
the end tag.
• The end tag is written like the start tag, but with a
forward slash inserted before the tag name
name.
• HTML Versions
• Since the early days of the web, there have been many
versions of HTML:
• Version Year
• HTML 1991
• HTML 2.0 1995
• HTML 33.2
2 1997
• HTML 4.01 1999
• XHTML 2000
• HTML5 2014
• HTML Headings
• HTML headings are defined with the <h1> to <h6> tags.
tags
• <h1> defines the most important heading. <h6> defines
the least important heading
Example:-
<html>
<body>
y
<h1>This is heading 1</h1>
<h2>This is heading 2</h2>
<h3>This is heading 3</h3>
<h4>This is heading 4</h4>
<h5>This is heading 5</h5>
<h6>This is heading 6</h6>
</body>
</html>
• HTML Paragraphs
• HTML paragraphs are defined with the <p> tag
Example:-
p
<html>
<body>
<p>This is a paragraph.</p>
<p>This
Thi is
i another
th paragraph.</p>
h /
</body>
</html>
• HTML Links
• Example:-
<html>
<body>
<a href="https://www.w3schools.com">This
h f "htt // 3 h l " Thi is
i a link</a>
li k /
</body>
</html>
• HTML Images
• HTML images are defined with the <img> tag.
tag
• Example
<html>
<body>
body
<img src="w3schools.jpg" alt="W3Schools.com"
width="104" height="142">
</body>
</html>
• HTML Line Breaks
• Example:-
<html>
<body>
body
<p>This is<br>a paragraph<br>with line breaks</p>
</body>
</html>
• HTML Background Color
• Example:-
<html>
<body>
<h1 style="color:blue;">This is a heading</h1>
<p style="color:red;">This
t l " l d " Thi iis a paragraph.</p>
h /
</body>
</html>
• HTML Fonts
• Example
<html>
<body>
<h1
h1 style="font-family:verdana;">This
t l "f t f il d " Thi iis a h
heading</h1>
di /h1
<p style="font-family:courier;">This is a paragraph.</p>
</body>
</html>
• HTML Text Size
• Example
<html>
<body>
<h1
h1 style="font-size:300%;">This
t l "f t i 300% " Thi iis a h heading</h1>
di /h1
<p style="font-size:160%;">This is a paragraph.</p>
</body>
</html>
• HTML Text Alignment
• Example
<html>
<body>
<h1
h1 style="text-align:center;">Centered
t l "t t li t " C t d Heading</h1>
H di /h1
<p style="text-align:center;">Centered paragraph.</p>
</body>
</html>
• IP address
• An Internet Protocol address (IP address) is a
numerical label assigned to each device connected to
a computer network that uses the Internet Protocol for
communication.
• An IP address is analogous
g to a street address or
telephone number in that it is used to uniquely identify an
entity.
• For example,
example 11.160.10.240
160 10 240 could be an IP address
address.
• Within an isolated network, you can assign IP addresses
at random as long as each one is unique
unique.
• Ab
brief
i f history
hi t off email
il
• Email as a concept predates the internet by a wide
margin.
@ symbol,
• The “@” y , which was probably
p y his most enduring
g
contribution to the internet.
• Indicating a destination for a message became as
simple as addressing it: “username@name
username@name of computer”
computer ,
which is essentially how email has been addressed ever
since.
• When the user sends the message, the email text and
attachments are uploaded to the SMTP (Simple Mail
Transfer Protocol) server as outgoing mail.
mail
• The next time the recipient clicks “Send & Receive,” their
email client will download all new messages from their
own email server. You’ve got mail!
• Format of e-mail:-
• The general format of an email address
is localpart@domain, and a specific example
is [email protected].
p
• Social media facilitate the development of online social
networks by connecting a user's profile with those of
other individuals and/or groups.
• Twitter:-
• Twitter is an online social networking service that
enables users to send and read short 280-
character messages called "tweets".
• Through twitter any one can follow you, and you can
follow anyone.
• The site,
site which is available in 37 different languages
languages.
• Marketplace
p - allows members to p
post, read and respond
p
to classified ads.
• G
Groups - allows
ll members
b whoh h
have common iinterests to
find each other and interact.
• Events - allows members to publicize an event, invite
guests and track who plans to attend
attend.
• Pages
g - allows members to create and ppromote a p
public
page built around a specific topic.
• In March 2004,
2004 Facebook expanded to the universities
of Columbia, Stanford, and Yale.
• 56 percent of U.S.
U S online users ages 65 and up use
Facebook.
• In
I 2014 WhatsApp
Wh t A was acquired
i d by
b Facebook.
F b k
• Features of WhatsApp:-
• Texts
• Group chat
• Whatsapp voice and video calls
• Whatsapp on web and desktop
• Photos and videos
• Documents
• Voice messages
• End-to-end encryption
– Security by Default
– Some of your most personal moments are shared on WhatsApp
WhatsApp,
which is why we built end-to-end encryption into the latest
versions of our app. When end-to-end encrypted, your messages
and calls are secured so only
y you
y and the person
p yyou're
communicating with can read or listen to them, and nobody in
between, not even WhatsApp.
How does end-to-end encryption work?
• WhatsApp is available in over 40 languages (up to 60 on
Android) As a general rule
Android). rule, WhatsApp follows the
language of your phone.
• In late 2002
2002, Reid recruits a team of old colleagues from
SocialNet and PayPal to work on a new idea.
• News "Signals“
Signals
• Tags
• "Get Introduced“
• Recommendations
• Opinions
• Discussions
• Job Seeking
• New Clients
• Old Connections
• Y
You have
h tto manage your reputation
t ti byb managing
i your
conversations
• Exposing
p g Too Much Information
• A Network Topology
p gy is the arrangement
g with which
computer systems or network devices are connected
to each other.
• Topologies
T l i may d define
fi b both
th physical
h i l and
d llogical
i l
aspect of the network.
• Point-to-Point
• Bus Topology
• Star Topology
• Ring Topology
• Mesh Topology
• Tree Topology