bb0014 - introduction to internet
TRANSCRIPT
Spring 2010(Jan-June)
Bachelor of Business Administration-BBA Semester III
BB0014 – Introduction to Internet – 4 Credits
(Book ID: B0009)
Assignment Set- 1 (60 Marks)
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 a. How do you connect to the Internet using Dialup networking? [4 Marks]
Ans: -
> Sign up for a dial-up Internet service if you haven't already done so. You will receive an
access number, user name and password.
> Click "Start," "All programs," "Accessories," "Communications" and then "New
Connection Wizard"to enter your dial-up connection information. Click "Next" on the "New
Connection Wizard" screen. Confirm a green dot is to the left of the option "Connect to the
Internet." Click "Next."
> Confirm a green dot is to the left of the option "Set up my connection manually." Click
"Next." Then confirm a green dot is to the left of the option "Connect using a dial-up
modem." Click "Next."
> Type the name of the ISP (Internet service provider) you are using into the "ISP name" box.
Click "Next."
> Enter the access number to dial your ISP into the box below the label "Phone number."
Enter "*70" before the ISP number if you have call waiting. This will disable the call feature
to prevent your Internet from disconnecting. Click "Next."
> Enter your user name and password in the appropriate fields, then reenter your password in
the "Confirm password" box. Confirm there are check marks next to "Use this account name
and password when anyone connects to the Internet from this computer" and "Make this the
default Internet connection." Click "Next."
> Click on the check box next to "Add a shortcut to this connection to my desktop." Click
"Finish."
> Connect a phone cable to the line jack of the modem on your computer. Double-click on
the newly created icon located on the Desktop to connect to the Internet. The modem will
dial, a connection will be established, your user name and password will be checked, and then
you will be logged on to the Internet server computer.
b. What is an URL? [3 Marks]
Ans:-
An URL (Uniform or Universal Resource Locator), is an address for information on the net.
It is not necessarily an address to web-based information, although these addresses are used
most frequently with web browsers. An URL consists of the following: [resource type]://[path
to file]. The [resource type] can be any one of the following. This is just a list of very
common resource types.
http - hyper-text transfer protocol. A website or webpage, more
or less ftp - file transfer protocol. A file or directory on a computer that is setup to transfer
files over the Internet news - USENET newsgroups. Message forums that span the world file
- any file on your machine. Yes, you can view files on your machine with a program that
supports urls. gopher - the GOPHER service. A menu-based hierarchy of information rarely
used nowadays.
The [path to file] is the exact path to the file on a system.
Note that it is recommended to use the Un*x based method of denoting directories and
subdirectories with a slash '/' instead of a back-slash '\'. If the path to file ends with a slash
instead of a filename (such as index.htm, file.exe, graphic.gif, etc.), then normally an index
file or home file will be accessed, if available. Else, this sometimes brings up a list of files in
the directory specified by the url.
c. What are the applications of Internet? [3 Marks]
Ans:
Now a days everyone is familiar with internet so it is very important to discuss various
applications of internet. Some of them may already known to you and some may be hidded
but I'll discuss all application of internet.
On-line communication : -
Human being is not completed without communication. Communication is the most
important part of ones life. Can you consider yourself alone on this planet ? Off course not.
Internet provide fastest communication means after face-to-face communication because no
mean of communication can compete with face to face communication.
E-Mail and chatting are extensively used communication means provided in an environment
of Internet. Only fraction of second is needed to pass your message, which is not possible in
any other conventional methods.
On-line Shopping : -
It is also one among the fastest growing industry or interest. It is becoming popular know a
days. Many people instead of going sound and wasting their precious time in shopping just sit
on the system and place the order for the required stuff.
Video Conferencing : -
A new emerging service on the internet which allows a group of users located in different
parts of the world to communicate with each other as if they are sitting in a single room. In
this way one can discuss any topic sitting anywhere in the world.
Advertising and Publishing : -
The internet has become the first global venue for advertising and publishing information due
to huge number of peoples that visit various sites everyday. The most important thing is that
the number of peoples who surf internet in a day is rapidly increasing so future of this type of
publishing is very bright.
Product Promotion : -
Due to less initial cost a webmaster can provide promotion to a product owner at very low
cost. A webmaster can promot a product for a cost of 5 rupees a day or even at low cost. This
is possible due to advancement in technology. Now no TV channel or even radio channel can
provide so cheap promotion so internet promotion is very popular.
Technical Support or Customer Support Service : -
One can get technical support for product one is using. Many organizations provides
customer support and most of them use internet to provide customer support via mailing list
or any other techniques because it is very cheap and require very less money.
Feedback : -
Commercial organizations are using internet to gather customer satisfaction of existing
products, market opportunities of new products and ideas for new products. This is what we
call 'On-line Survey'. There are many companies or websites which conduct online surveys
and for completing an online survey you get paid. So this is the best way to collect feedback
within lowest time and for lowest cost.
Online Registration and Examination : -
Not only business and other industries are benefited by internet but Education is also affected
by internet but in positive way. Now a days many universities and institutions provide
training and also online enrolment forms. Some companies like Thompson prometric, VUE
provides online examination for the various products of software and hardware.
Software Sharing : -
This thing or internet application is always contradictory. This has more negative points but
still have some positive points. People can upload a software which is not authorized by
them. Suppose you bought a software from a company and get product key. Then you may
also upload the same software with product key. Then the software company will loose its
money which the company might get by selling the same software to another user which is
know getting free software due to you. So it is illegal. But it has some positive points too like
many software developing organizations provides trial software versions on the internet, like
window is providing trial version of Windows 7 on his website. You may also get some open
source software on internet which are not only free but you can modify them according to
your requiremet.
Group Discussion : -
A number of Newsgroups re available on the internet which allows user to exchange views
on topics of common interest. Forums are most common newsgroup. Indiastudychannel.com
Forum is very popular forum to discuss topics related to India.
In you are familiar with any other technology or application of internet then please don't
forget to post a response here with introduction to that particular application.
Q.2 a. What are the abbreviations of the following in safe chatting rules?
i. J/K
ii. IMHO
iii. AFK
iv. A/S/L
v. BAK [5 Marks]
Ans:
i. J/K - Just Kidding
ii. IMHO - In my humble opinion
iii. AFK - Away from Keyboard
iv. A/S/L - Age, sex, location
v. BAK - Back at the keyboard
b. Write short notes on
i. TELNET
ii. FTP [5 Marks]
Ans:
i. TELNET
TELNET (TErminaL NETwork) is a network protocol used on the Internet or local area
networks to provide a bidirectional interactive text-oriented communications facility via a
virtual terminal connection. User data is interspersed in-band with TELNET control
information in an 8-bit byte oriented data connection over the Transmission Control Protocol
(TCP).
Telnet was developed in 1969 beginning with RFC 15, extended in RFC 854, and
standardized as Internet Engineering Task Force (IETF) Internet Standard STD 8, one of the
first Internet standards.
Historically, telnet provided access to a command-line interface (usually, of an operating
system) on a remote host. Most network equipment and operating systems with a TCP/IP
stack support a Telnet service for remote configuration (including systems based on Windows
NT). Because of security issues with Telnet, its use for this purpose has waned in favor of
SSH.
The term telnet may also refer to the software that implements the client part of the protocol.
Telnet client applications are available for virtually all computer platforms. Telnet is also
used as a verb. To telnet means to establish a connection with the Telnet protocol, either with
command line client or with a programmatic interface. For example, a common directive
might be: "To change your password, telnet to the server, login and run the passwd
command." Most often, a user will be telnetting to a Unix-like server system or a network
device such as a router and obtain a login prompt to a command line text interface or a
character-based full-screen manager.
ii. FTP
File Transfer Protocol (FTP) is a standard network protocol used to copy a file from one host
to another over a TCP/IP-based network, such as the Internet. FTP is built on a client-server
architecture and utilizes separate control and data connections between the client and server
applications, which solves the problem of different end host configurations (i.e., Operating
System, file names). FTP is used with user-based password authentication or with anonymous
user access.
Applications were originally interactive command-line tools with a standardized command
syntax, but graphical user interfaces have been developed for all desktop operating systems in
use today.
Q.3 a. Bring out the functions of domain addressing and IP addressing [5 Marks]
Ans:
Functions of domain addressing
The Domain Name System (DNS) is a hierarchical naming system for computers, services, or
any resource connected to the Internet or a private network. It associates various information
with domain names assigned to each of the participants. Most importantly, it translates
domain names meaningful to humans into the numerical (binary) identifiers associated with
networking equipment for the purpose of locating and addressing these devices worldwide.
An often-used analogy to explain the Domain Name System is that it serves as the "phone
book" for the Internet by translating human-friendly computer hostnames into IP addresses.
For example, www.example.com translates to 192.0.32.10.
The Domain Name System makes it possible to assign domain names to groups of Internet
users in a meaningful way, independent of each user's physical location. Because of this,
World Wide Web (WWW) hyperlinks and Internet contact information can remain consistent
and constant even if the current Internet routing arrangements change or the participant uses a
mobile device. Internet domain names are easier to remember than IP addresses such as
208.77.188.166 (IPv4) or 2001:db8:1f70:6e8 (IPv6). People take advantage of this when they
recite meaningful URLs and e-mail addresses without having to know how the machine will
actually locate them.
The Domain Name System distributes the responsibility of assigning domain names and
mapping those names to IP addresses by designating authoritative name servers for each
domain. Authoritative name servers are assigned to be responsible for their particular
domains, and in turn can assign other authoritative name servers for their sub-domains. This
mechanism has made the DNS distributed and fault tolerant and has helped avoid the need for
a single central register to be continually consulted and updated.
In general, the Domain Name System also stores other types of information, such as the list
of mail servers that accept email for a given Internet domain. By providing a worldwide,
distributed keyword-based redirection service, the Domain Name System is an essential
component of the functionality of the Internet.
Other identifiers such as RFID tags, UPC codes, International characters in email addresses
and host names, and a variety of other identifiers could all potentially utilize DNS.
The Domain Name System also defines the technical underpinnings of the functionality of
this database service. For this purpose it defines the DNS protocol, a detailed specification of
the data structures and communication exchanges used in DNS, as part of the Internet
Protocol Suite (TCP/IP).
Well a domain name server (DNS) is designed to find the IP address of a host given only its
"domain name"
e.g you go to www.google.com and DNS will translate that into Google.com's IP address that
your computer can use to connect to google.com
Functions of IP addressing
An Internet Protocol (IP) address is a numerical label that is assigned to devices participating
in a computer network, that uses the Internet Protocol for communication between its nodes.
An IP address serves two principal functions: host or network interface identification and
location addressing. Its role has been characterized as follows: "A name indicates what we
seek. An address indicates where it is. A route indicates how to get there."
The designers of TCP/IP defined an IP address as a 32-bit number and this system, known as
Internet Protocol Version 4 or IPv4, is still in use today. However, due to the enormous
growth of the Internet and the resulting depletion of available addresses, a new addressing
system (IPv6), using 128 bits for the address, was developed in 1995 and last standardized by
RFC 2460 in 1998. Although IP addresses are stored as binary numbers, they are usually
displayed in human-readable notations, such as 208.77.188.166 (for IPv4), and
2001:db8:0:1234:0:567:1:1 (for IPv6).
The Internet Protocol also routes data packets between networks; IP addresses specify the
locations of the source and destination nodes in the topology of the routing system. For this
purpose, some of the bits in an IP address are used to designate a subnetwork. The number of
these bits is indicated in CIDR notation, appended to the IP address; e.g., 208.77.188.166/24.
As the development of private networks raised the threat of IPv4 address exhaustion, RFC
1918 set aside a group of private address spaces that may be used by anyone on private
networks. They are often used with network address translators to connect to the global
public Internet.
The Internet Assigned Numbers Authority (IANA), which manages the IP address space
allocations globally, cooperates with five Regional Internet Registries (RIRs) to allocate IP
address blocks to Local Internet Registries (Internet service providers) and other entities.
b. Write the steps to install and configure TCP/IP [5 Marks]
Ans:
Installing TCP/IP
TCP/IP is installed automatically when the Windows Server 2003 setup process runs. It is not
usually necessary to install TCP/IP after the Windows Server 2003 setup process completed.
The instances when you might need to manually install TCP/IP are listed below:
TCP/IP was disabled when the Windows Server 2003 setup process executed.
TCP/IP was uninstalled from the computer.
How to install the TCP/IP protocol suite
Click Start, Control Panel, and then click Network Connections
In the Network Connections window, right-click the network connection for which
you want to install TCP/IP and then click Properties from the shortcut menu.
If you are working with the local area connection, you will use the General tab in the
following step. If you are working with any other connection, you will use the
Networking tab
Click Install, and then click Protocol.
Click Add to open the Select Network Protocol dialog box.
Click Internet Protocol (TCP/IP) in the dialog box.
Click OK
Confirm that the Internet Protocol (TCP/IP) checkbox is enabled.
Manually Assigning IP Addresses
When you manually assign IP addresses, you assign a particular IP address to a TCP/IP host
or client. This statically assigned IP address only changes via a manual configuration.
You would normally manually assign IP addresses under the following conditions:
There are no configured DHCP servers on the network and the network haves
multiple network segments.
You are configuring a computer as a DHCP server, and need to assign that computer a
static IP addresses.
You are configuring computers as important network servers such as domain
controllers, or DNS servers. You would manually assign the IP address to these
computers.
When you configure the properties of the TCP/IP protocol using the properties of a particular
network connection, you can perform the following tasks:
Assign an IP address and subnet mask
Assign the default gateway
Assign DNS servers and WINS servers.
How to manually assign IP Addresses to TCP/IP hosts or clients
Click Start, Control Panel, and then click Network Connections.
Right-click the network connection you want to work with, and then click Properties
from the shortcut menu.
If you working with the local area connection, you will use the General tab in the
following step. If you are working with any other connection, you will use the
Networking tab
On either of these tabs, select Internet Protocol (TCP/IP), and then click the Properties
button.
The Internet Protocol (TCP/IP) Properties dialog box opens.
Select the Use The Following IP Address option.
If you are working with the local area connection enter the address, subnet mask, and
default gateway in the available fields.
If you are working with any other network connection, assign the proper IP address.
If you want to configure the DNS server settings of the computer, select the Use The
Following DNS Server Addresses option, and then enter the primary and secondary
DNS server addresses in the Preferred DNS Server text box, and in the Alternate DNS
Server text box respectively.
If you want to configure a WINS server, click the Advanced button.
Click OK.
How to configure Advanced DNS settings
Click Start, Control Panel, and then click Network Connections.
Right-click the network connection you want to work with, and then click Properties
from the shortcut menu.
If you working with the local area connection, on the General tab, select Internet
Protocol (TCP/IP), and then click the Properties btton.
When the Internet Protocol (TCP/IP) Properties dialog box opens, click the Advanced
button.
The Advanced TCP/IP Settings dialog box contains four tabs (IP Settings, DNS,
WINS, Option) which you can use to either extend or override the settings from the
Internet Protocol (TCP/IP) Properties dialog box.
Click the DNS tab.
The DNS Server Addresses, In Order Of Use list displays all the DNS servers
configured for this particular client. The DNS Server Addresses, In Order Of Use list
can contain up to 20 different DNS servers. A DNS query is sent to the first server in
the list. If this DNS server is unable to service the query, the query is sent to the
second DNS server in the list, and so forth, until a DNS server returns a valid answer,
or until all DNS servers have been tried.
To add, remove, and edit DNS servers from the DNS Server Addresses, In Order Of
Use list, click the appropriate button: Add button, Edit button, Remove button.
To change the order of the DNS servers listed in the DNS Server Addresses, In Order
Of Use list, click the server whose order you want to change, and then use the Up and
Down arrows to position the server.
Click the Append Primary And Connection Specific DNS Suffixes option if you want
DNS to automatically append the primary DNS suffix and all other connection
specific suffixes when DNS requests are made.
Click the Append Parent Suffixes Of The Primary DNS Suffix checkbox if you want
the parent suffixes of the primary suffix appended.
Click the Append These DNS Suffixes (In Order) option if you want to specify the list
of suffixes for DNS, rather than using any primary and connection specific suffixes.
If you want to define a default connection suffix to append to DNS queries, enter it in
the DNS Suffix For This Connection text box.
Select the Register This Connection's Addresses In DNS checkbox if you want the
DHCP client to register its name and IP address with the closest dynamic DNS server.
Select the Use This Connection's DNS Suffix In DNS Registration checkbox if you
want the primary or connection specific DNS suffix to be used in the client
registration with the dynamic DNS service.
Click OK to close the Advanced TCP/IP Settings dialog box.
Click OK to close the Internet Protocol (TCP/IP) Properties dialog box.
Q.4 a. Answer the questions below with proper reasons. [5 Marks]
i. Do you use E-Mail? If yes why? If no how do you exchange information?
Ans:
Yes I use E-mail, because of the following reasons:-
Almost instantaneous
Email messages are transferred instantly - well almost. They move as fast as current in copper
wires or light in optical cables, which is pretty darn quick. When you send an email is leaves
your computer and arrives at the recipient's inbox immediately. You can potentially have a
conversation with a person over email - hence, the conversation view in Gmail.
Cost of sending an email is zero or negligible
If you have a 24 hour internet such as a through cable / broadband connection, the cost of
sending an email is zero or very very small. For dialup users, the maximum cost of sending
an email will be that of a phone call or a few (depending on the size of the message and the
files attached).
Emails can be sent in bulk
One email message can be sent to multiple recipients almost at the cost of a single email.
When compared to conventional postal service this is indeed a huge saving.
Email attachments - any digital document can be sent over email
As long as a document can be converted into digital format, it can be sent over email. Again,
the cost aspect comes into picture. Imagine the money you will save by sending a 500 page
document attached to an email instead of the same as hard copy printout - not only is the
postage more expensive but there is also the cost of printing and paper to consider.
And the story doesn't end with text documents. Photographs, music and audio files and even
video from a camcorder can be attached along with an email message.
Delivery is almost guaranteed
The delivery of email messages in almost guaranteed. Why do I say "almost"? Because
sometimes for reasons that are beyond the scope of this article, email can get lost in
cyberspace but this is very rare.
Request return receipt
Just like with postal and courier services, you can request a return receipt which simply
involves a click of a mouse button by the recipient. But even if the recipient doesn't get back,
you know your email has been delivered - refer point above.
Email is accessible
OK, this is one of the greatest advantages of using email - its accessible anywhere, anytime
and through a multitude of devices - computers, laptops, palmtops and even cell phones.
One can check email from any location as long as an active internet connection is available.
Also email can be sent from any place with the same requirement of an active net connection.
Built in spell checking
Most email programs (or email clients) have built in spell check dictionaries - so you have no
excuse of sending badly written messages. Spell checkers are also found in online email
services such as Hotmail and Yahoo.
Notification of new arrivals
Email programs or devices can also be set up so you get a notification through sound or a
flash of light when new messages arrive at your inbox.
Can be formal as well as informal
Email messages do not signify informality. Just because email is easy to compose and send
does not mean it cannot be used in formal and official correspondences.
Automation
Several, if not all, steps in the emailing process can be automated.
A good example is sending birthday greetings to people. An email program checks the
birthday and the name of the recipient from a list. A message (from a template) is then
formulated and sent on the specified date.
Email storage and management
Storing and managing emails you receive is very easy if you use an email program or a good
email service. Segregating messages into folders and organizing them properly is just like
cleaning your desk and filing your work. However, with email there is no usage of physical
space excepting that on your hard disk, of course. Also, any email client worth its salt has an
inbuilt search utility that hunts out the elusive email in a jiffy.
Email security
The best way to secure your email messages is to use the PGP (Pretty Good Privacy)
technology. However, most people are unaware of it but it's very much there!
These were some advantages I could think of. If you come up with others, write to me using
the form below.
It's now time to look at some disadvantages of using email.
If no, I use to exchange the informations by telephone and post.
ii. Bring out the advantages of E-Mail over general mail from your own experience.
Ans:
Advantages of E-Mail over general mail
Almost instantaneous
Email messages are transferred instantly - well almost. They move as fast as current in copper
wires or light in optical cables, which is pretty darn quick. When you send an email is leaves
your computer and arrives at the recipient's inbox immediately. You can potentially have a
conversation with a person over email - hence, the conversation view in Gmail.
Cost of sending an email is zero or negligible
If you have a 24 hour internet such as a through cable / broadband connection, the cost of
sending an email is zero or very very small. For dialup users, the maximum cost of sending
an email will be that of a phone call or a few (depending on the size of the message and the
files attached).
Emails can be sent in bulk
One email message can be sent to multiple recipients almost at the cost of a single email.
When compared to conventional postal service this is indeed a huge saving.
Email attachments - any digital document can be sent over email
As long as a document can be converted into digital format, it can be sent over email. Again,
the cost aspect comes into picture. Imagine the money you will save by sending a 500 page
document attached to an email instead of the same as hard copy printout - not only is the
postage more expensive but there is also the cost of printing and paper to consider.
And the story doesn't end with text documents. Photographs, music and audio files and even
video from a camcorder can be attached along with an email message.
Delivery is almost guaranteed
The delivery of email messages in almost guaranteed. Why do I say "almost"? Because
sometimes for reasons that are beyond the scope of this article, email can get lost in
cyberspace but this is very rare.
Request return receipt
Just like with postal and courier services, you can request a return receipt which simply
involves a click of a mouse button by the recipient. But even if the recipient doesn't get back,
you know your email has been delivered - refer point above.
Email is accessible
OK, this is one of the greatest advantages of using email - its accessible anywhere, anytime
and through a multitude of devices - computers, laptops, palmtops and even cell phones.
One can check email from any location as long as an active internet connection is available.
Also email can be sent from any place with the same requirement of an active net connection.
Built in spell checking
Most email programs (or email clients) have built in spell check dictionaries - so you have no
excuse of sending badly written messages. Spell checkers are also found in online email
services such as Hotmail and Yahoo.
Notification of new arrivals
Email programs or devices can also be set up so you get a notification through sound or a
flash of light when new messages arrive at your inbox.
Can be formal as well as informal
Email messages do not signify informality. Just because email is easy to compose and send
does not mean it cannot be used in formal and official correspondences.
Automation
Several, if not all, steps in the emailing process can be automated.
A good example is sending birthday greetings to people. An email program checks the
birthday and the name of the recipient from a list. A message (from a template) is then
formulated and sent on the specified date.
Email storage and management
Storing and managing emails you receive is very easy if you use an email program or a good
email service. Segregating messages into folders and organizing them properly is just like
cleaning your desk and filing your work. However, with email there is no usage of physical
space excepting that on your hard disk, of course. Also, any email client worth its salt has an
inbuilt search utility that hunts out the elusive email in a jiffy.
Email security
The best way to secure your email messages is to use the PGP (Pretty Good Privacy)
technology. However, most people are unaware of it but it's very much there!
These were some advantages I could think of. If you come up with others, write to me using
the form below.
It's now time to look at some disadvantages of using email.
b. How do you manage your E-mail account if you need to compose the message offline and
store until it is ready to send? [5 Marks]
Ans:
You can start writing a new email message by clicking File > New > Mail Message, by
pressing Ctrl+N when in the mail tool, or by clicking New in the toolbar.
Enter an address in the To field. If you want to enter multiple email addresses, type in the
addresses separated by comma. You can also use a contact list to send messages to multiple
recipients. Enter a subject in the Subject field, and a message in the box at the bottom of the
window. After you have written your message, click Send.
New mail message window look like this:
Sending Composed Messages Later
Evolution normally sends mail as soon as you click Send. However, can save a message to be
sent later:
If you are offline when you click Send, Evolution adds your message to the Outbox
queue. The next time you connect to the Internet and send or receive mail, that
message is sent.
Click File > Save Draft to store your messages in the Drafts folder for later revision.
If you prefer to save your message as a text file, click File > Save As, then specify a
filename.
Working Offline
Offline mode helps you communicate with remote mail storage systems like GroupWise®,
IMAP or Exchange, in situations where you are not connected to the network at all times.
Evolution keeps a local copy of one or more folders to allow you to compose messages,
storing them in your Outbox to be sent the next time you connect.
POP mail downloads all messages to your local system, but other connections usually
download just the headers, and get the rest only when you want to read the message. Before
you go offline, Evolution downloads the unread messages from the folders you have chosen
to store.
To mark a folder for offline use,
1. Right-click the folder, then click Properties.
2. Click Copy Folder Content Locally for Offline Operation.
Your connection status is shown by the small icon in the lower left corner of the Evolution
main window. When you are online, it displays two connected cables. When you go offline,
the cables separate.
To cache your selected folders and disconnect from the network,
1. Click File > Work Offline, or click the connection status icon in the lower left of the
screen.
A message pops up and asks you whether you want to go offline immediately or synchronize
folders locally before you go offline.
2. Click Synchronize to download all the messages to the folders marked for offline.
Or
Click Do not synchronize to go offline immediately, without downloading the messages
locally for offline operations.
Select Do not show this message again to switch off this popup. The default is to not
synchronize while going offline.
When you want to reconnect, click File > Work Online, or click the connection status icon
again.
Q.5 a. Write the HTML tags for the following
i. Line Break
ii. To order the given list
iii. To make a text as heading
iv. Emphasis
v. Preformatted text [5 Marks]
Ans:
(i) Line breaks are different then most of the tags we have seen so far. A line break ends the line you are currently on and resumes on the next line. Placing <br /> within the code is the same as pressing the return key in a word processor. Use the <br /> tag within the <p> (paragraph) tag.
Address:
Will Mateson
Box 61
Cleveland, Ohio
HTML Code:
<p>
Will Mateson<br />
Box 61<br />
Cleveland, Ohio<br />
</p>
ii. To order the given list
Ordered Lists
An ordered list is also a list of items. The list items are marked with numbers.
An ordered list starts with the <ol> tag. Each list item starts with the <li> tag.
<ol>
<li>Coffee</li>
<li>Milk</li>
</ol>
Here is how it looks in a browser:
Coffee
Milk
Inside a list item you can put paragraphs, line breaks, images, links, other lists, etc.
Definition Lists
A definition list is not a list of single items. It is a list of items (terms), with a description of
each item (term).
A definition list starts with a <dl> tag (definition list).
Each term starts with a <dt> tag (definition term).
Each description starts with a <dd> tag (definition description).
<dl>
<dt>Coffee</dt>
<dd>Black hot drink</dd>
<dt>Milk</dt>
<dd>White cold drink</dd>
</dl>
Here is how it looks in a browser:
Coffee
Black hot drink
Milk
White cold drink
Inside the <dd> tag you can put paragraphs, line breaks, images, links, other lists, etc.
iii. To make a text as heading
<html>
<body>
<h1>My First Heading</h1>
<p>My first paragraph.</p>
</body>
</html>
iv. Emphasis
If you learned HTML before you learned XHTML, you probably know about the bold and
italics tags. But these tags are not semantic elements because they define how the text should
look rather than information about the text. That's why they have been generally replaced by
strong (for bold) and emphasis (for italics).
The strong and emphasis elements add interest to your text. Unlike some other XHTML tags,
they are meant to look the same on all browsers. Simply surround your text with the opening
and closing tags (<em> and </em> for emphasis and <strong> and </strong> for strong
emphasis).
You can nest these tags and it doesn't matter which is the external tag. Try testing this block
of code in your HTML page:
<em>This text is emphasized</em> most browsers display it as italics.
<strong>This text is strongly emphasized</strong> most browsers display it as bold.
<strong><em>This text is both strong and emphasized</em></strong> usually displayed as
bold and italics.
v. Preformatted text
The <pre> tag defines preformatted text.
Text in a pre element is displayed in a fixed-width font (usually Courier), and it preserves
both spaces and line breaks.
Example
Preformatted text:
<pre>
Text in a pre element
is displayed in a fixed-width
font, and it preserves
both spaces and
line breaks
</pre>
b. Write an example other than that given in the SLM which shows the form element and its
different attributes. Explain without the example. [5 Marks]
Ans:
A Service Level Agreement is a documented agreement between IT and its Customer
(Internal to an Organisation), on the levels of a service being provided. In my opinion the
most important aspect of an SLA is that it is an Agreement and hence bears no contractual
weight to meet these targets but it is still a commitment. The SLA should not favour one side
but be a fair reflection of what the business wants and what IT can provide and not a smoking
gun held pointing towards IT or a method of avoiding providing an adequate service to the
business.
It does however set expectations’ of what should be provided. The obvious risk of missing
Service levels is damage to the business however one of the biggest failings of not hitting
agreed Service Levels is the effect this will have on Customer perception that can ultimately
result in Customers losing faith in IT.
Another common failing is the inability for organisations to create agreements which are
simple to read and concise. An SLA should not be twenty pages long (and my experience this
is not uncommon) but be simple, easy to read and preferably no longer than 3 to 4 sides of
A4. ITIL itself identifies ways of making this work across large organisations with multiple
services. The use of Customer based SLAs (one SLA per Customer across multiple services),
Service Based SLAs (one SLA per service), and multi-tiered SLAs where there will be
Corporate based SLAs, Customer based SLAs and then Service Based SLAs in three tier
format all offer the ability to enable the creation of simple easy to manage SLAs.
Q.6 Describe the different software utilities for multimedia [10 Marks]
Ans:
Adobe
The premier publisher of multimedia software. Products include Adobe Director (mutimedia
authoring), Dreamweaver (web publishing), PhotoShop (photo editing), and more.
Create Together
[Win] multimedia environment that integrates creation, collaboration, communication,
problem solving, and publishing in one seamless tool... Create animated games, randomly
generated puzzles, interactive simulations, searchable multimedia databases, hyperlinked
presentations and more.
Dazzler
software products for producing interactive multimedia presentations, training courses,
product catalogues and kiosk systems.
Flying Popcorn
[Win] new computer users can create multimedia contents with 3D sound effects, images,
geometrical shapes, text and movie files. Also, professional users will find abundant
application potentials and dazzling transformation capabilities to develop sophisticated
contents.
GraFX Saver Pro
[Win] create and distribute your own professional screen savers with over 30 image, video,
and audio formats.
MediaBlender
[Win, Mac] easy to use multimedia authoring package. Access MediaBlender from any
computer with Internet access, host the software on your own servers for better performance,
and load a stand-alone application on your computer for use without an Internet connection.
Mistyk Media
[Win] all-in-one software for conversion, editing, recording, burning, playback, and more for
nearly all audio, video, and graphics formats.
MovieWorks
[Win, Mac] combines simple-to-use video, sound, animation, paint and image editing tools
with a powerful time-based, object-oriented sequencing and authoring program. The five
integrated MovieWorks Deluxe production applications work together seamlessly, making it
easy to incorporate analog or digital video, buttons, photos, graphics, animations, 3D,
narration, MIDI, MP3, CD music, text and titling, and even virtual reality movies into
stunning, professional-quality multimedia productions.
Multimedia Builder
[Win] multimedia authoring system allows you to create autorun CD menus, multimedia
applications on CD-ROM, demos, presentations, MP3 players and much, much more.
Navarasa
[Win] create your CD-ROM presentations and websites in the same editor! Navarasa web
presentations are multi-platform and multi-browser compatible!
Performer
for creating projects, presentations, posters, animated stories with sound, and more.
PlayMo
authoring tool that allows the creation of highly interactive rich media content from a wide
range of source files such as still images, video clips, audio clips, 3D models, CAD models
and more. PlayMo's intuitive WYSIWYG editing functions make it easy to embed complex
interactivity into models to accurately recreate the functionality of real-world objects,
requiring no coding.
Podia
suite of multimedia delivery solutions that allow you to present your information over the
internet.
Slim Show
[Win] lets you create professional, interactive multimedia Windows programs without
writing any code.
SuperCard
[Mac] multimedia authoring environment with support for text-to-speech, speech recognition,
QuickTime, filmstrips, graphic import and export, and sound, SuperCard 4 extends further to
support motion picture MP3 playback...
Visviva Authoring Studio
authoring tool that has completely integrated distinctive elements such as object design,
animation composition, 3D modeling, image painting, vector drawing, and hypertext editing.
Vitual Cinema
[Win, Mac] an object-oriented authoring, media integration and delivery/playback tool that is
designed to work with all forms of streaming media.
Bachelor of Business Administration-BBA Semester III
BB0014 – Introduction to Internet – 4 Credits
(Book ID: B0009)
Assignment Set- 2 (60 Marks)
Note: Each question carries 10 Marks. Answer all the questions.
Q.1 a. Write short notes on Search engines. List out some of the popular search engines that
you use and explain the use of it in your own words. [5 Marks]
Ans:
Search engines
A web search engine is designed to search for information on the World Wide Web. The
search results are usually presented in a list of results and are commonly called hits. The
information may consist of web pages, images, information and other types of files. Some
search engines also mine data available in databases or open directories. Unlike Web
directories, which are maintained by human editors, search engines operate algorithmically or
are a mixture of algorithmic and human input.
List of the some popular search engines
Ask.com (formerly Ask Jeeves)
Baidu (Chinese,Japanese)
Bing (formerly MSN Search and Live Search)
Cuil
Duck Duck Go
Kosmix
Sogou (Chinese)
Yodao (Chinese)
Yahoo! Search
Yandex (Russian)
Yebol
10 Powerful Uses For Google Suggest
1. Use Google Suggest to get the correct spelling for a word. Type the first letters of a word
or write the whole word and if you see it in the list of suggestions, then your spelling is OK.
Otherwise, delete some letters from the end of the word.
2. Use Google Suggest to find words you don't remember. You know it starts with "exq" and
it means "extremely beautiful", but you don't know the word. It's exquisite.
3. Find popular songs of an artist or band. Type [name of the artist] lyrics and you'll see a list
of songs, with the most popular at the top.
4. Find the greatest mobile phones. Just type [mobile phone manufacturer] and a list of
models pops in. If you type Nokia, you'll find: 6230, 6600, 6260, 6630, 7610 and others. This
is useful when buying a new phone.
5. Find popular car models. Do the same as above: type [car brand] and you'll get a list of
models. For Porsche, the most popular models are: 911, Cayenne and Carrera GT.
6. Find popular movies. Most people that want to find a movie review go to IMDB. To do
that, search for imdb + title of the movie. To find popular movies, just type imdb and
optionally a letter or two. If you type [imdb m], the first title will be "Million Dollar Baby".
7. Find if your site is popular. No one knows why, but many people type URL addresses in
the search box. So if your site is download.com or linux.org, you'll find in the Suggest list.
8. You have a commercial software. But is it so good that people try to find cracks to use it
for free? If you type [photoshop c], you'll see "photoshop cs crack".
9. Want to go back in time? Type a year in the search box and find popular events from that
year, great cars, TV shows. In 1949 film noir was popular.
10. Autocomplete code. It's useful if you use a simple text editor that doesn't autocomplete
standard values. If you don't remember the values of the display attribute in CSS, type [css
display] and you'll get your answer. It may be display:none, display:inline or display:block.
You get the answer instantly without reading a manual or even searching with Google.
b. List the Email tips you would like to give to the new user. [3 Marks]
Ans:
1. Shut off auto-check - Either turn off automatic checking completely, or set it to something
reasonable, like every 20 minutes or so. If you’re doing anything with new email more than
every few minutes, you might want to rethink your approach. I’m sure that some of you
working in North Korean missile silos need real-time email updates, but I encourage the rest
of you to consider ganging your email activity into focused (maybe even timed) activity
every hour or three. Process, tag, respond to the urgent ones, then get the hell back to work. 2.
2. Pick off easy ones - If you can retire an email with a 1-2 line response (< 2 minutes; pref.
30 seconds), do it now. Remember: this is about action, not about cogitating and filing. Get it
off your plate, and get back to work. On the other hand, don’t permit yourself to get caught
up in composing an unnecessary 45-minute epistle.
3. Write less - Stop imagining that all your emails need to be epic literature; get better at just
keeping the conversation moving by responding quickly and with short actions in the reply.
Ask for more information, pose a question, or just say “I don’t know.” Stop trying to be
Victor Hugo Marcel Proust, and just smack it over the net—especially if fear of writing a
long reply is what slows your response time. N.B.: This does not mean that you should write
elliptically or bypass standard grammar, capitalization, and punctuation (unless you want to
look 12 years old); just that your well-written message can and should be as concise as
possible. That saves everyone time.
4. Cheat - Use something like MailTemplate to help manage answers to frequent email
subjects. Templates let you create and use boilerplate responses to the questions and requests
to which you usually find yourself drafting identical replies over and over from scratch. At
least use a template as a basis for your response, and then customize it for that person or
situation. Don’t worry—you can still let your sparkling prose and winning wit shine through,
just without having to invent the wheel 10 times each day.
5. Be honest - If you know in your heart that you’re never going to respond to an email, get it
out of sight, archive it, or just delete it. Guilt will not make you more responsive two months
from now, otherwise, you’d just do it now, right? Trust your instincts, listen to them, and stop
trying to be perfect.
c. List out a few Telnet sites. [2Marks]
Ans:
telnet://towel.blinkenlights.nl
http://www.lights.com/hytelnet/
http://synchro.net/sbbslist.html
http://www.mudconnect.com/
Q.2 a. Explain the different classes of Network [5 Marks]
Ans:
Different types of (private) networks are distinguished based on their size (in terms of the
number of machines), their data transfer speed, and their reach. Private networks are
networks that belong to a single organisation. There are usually said to be three categories of
networks:
LAN (local area network)
MAN (metropolitan area network)
WAN (wide area network)
There are two other types of networks: TANs (Tiny Area Network), which are the same as
LANs but smaller (2 to 3 machines), and CANs (Campus Area Networks), which are the
same as MANs (with bandwidth limited between each of the network's LANs).
LAN
LAN stands for Local Area Network. It's a group of computers which all belong to the same
organisation, and which are linked within a small geographic area using a network, and often
the same technology (the most widespread being Ethernet).
A local area network is a network in its simplest form. Data transfer speeds over a local area
network can reach up to 10 Mbps (such as for an Ethernet network) and 1 Gbps (as with
FDDI or Gigabit Ethernet). A local area network can reach as many as 100, or even 1000,
users.
By expanding the definition of a LAN to the services that it provides, two different operating
modes can be defined:
In a "peer-to-peer" network, in which communication is carried out from one computer to
another, without a central computer, and where each computer has the same role.
in a "client/server" environment, in which a central computer provides network services to
users.
MANs
MANs (Metropolitan Area Networks) connect multiple geographically nearby LANs to one
another (over an area of up to a few dozen kilometres) at high speeds. Thus, a MAN lets two
remote nodes communicate as if they were part of the same local area network.
A MAN is made from switches or routers connected to one another with high-speed links
(usually fibre optic cables).
WANs
A WAN (Wide Area Network or extended network) connects multiple LANs to one another
over great geographic distances.
The speed available on a WAN varies depending on the cost of the connections (which
increases with distance) and may be low.
WANs operate using routers, which can "choose" the most appropriate path for data to take to
reach a network node.
The most well-known WAN is the Internet.
b. How do you set up new connections? [5 Marks]
Ans:
In order to create a new dial-up connection to the Internet a modem must be installed and
available for use. You also need an account from an Internet service provider (ISP), and
know the dial-up telephone number, the username and the password that has been assigned to
the account.
Instructions1. Step 1
Click on "Start," in the lower left-hand portion of the desktop screen. Select "Control Panel," then "Network and Internet Connections." Select the "Network Connections" icon.
2. Step 2
Choose "Create a new connection" in the Network Tasks list and then click "Next" in the New Connection Wizard form. Click "Next" again because the radio button that is needed to connect to the Internet is already selected.
3. Step 3
Pick the middle radio button labeled "Set up my connection manually" and click "Next" since the radio button that is needed is already selected.
4. Step 4
Enter the ISP name in the textbox and click "Next." Enter the telephone number and click "Next."
5. Step 5
Type the username and password that has been assigned to this account from the ISP, then confirm the password and click "Next." The two checkboxes can be left checked unless there is a reason that no one else should know the username and password, or if this connection is a secondary connection to the Internet, such as a back-up connection for emergency uses.
6. Step 6
Select "Finish." The checkbox on this page will allow one to quickly make a connection to the Internet, so if desired it should be checked before finishing the New Connection Wizard.
Q.3 a. Write short notes on Netscape Messenger [5 Marks]
Ans:
Netscape Messenger is a standalone, multiplatform e-mail and news client that was
developed by Netscape. Announced on June 11, 2007 as Netscape Mercury, the program was
intended to accompany the web browser Netscape Navigator 9, and was based on Mozilla's
Thunderbird.
The original name Mercury was named after the Roman god Mercury, the messenger. It
replaced the former Netscape Mail & Newsgroups client included in versions 4 to 7.2.
On November 15, 2007, the alpha was released for Linux, Mac OS, and Microsoft Windows.
On December 28, 2007, Netscape developers announced that AOL would discontinue support
for Messenger along with the Navigator browser on February 1, 2008. AOL later extended
support through March 1, 2008.
Features
Netscape Messenger includes all the features of Mozilla Thunderbird 2.0.0.9, alongside
greater AIM integration. In addition, it also has a custom user interface skin, similar to that of
Netscape Navigator 9.
b. Write down the steps to create new web based free email account. Explain in your own
terms. [5 marks]
Ans:
Step 1 -Open the Gmail web site
To create your Gmail account you only need a web browser - the program you are using to
read this page - and an internet connection.
You should now get to a page that looks something like the one below. At the time of writing
Gmail offers a little over 7Gb of inbox space - though not unlimited but still more than
enough to keep any prolific emailer occupied for years.
Click on the Sign up for Gmail link that I have circled in the screenshot and then proceed to
the next page to get your free Gmail email address.
Step 2 - Enter all the required information in the "Create an Account" online form
After you click on the signup link, you shall be shown the Create an Account form with
several fields that need your inputs.
Do not worry if the screen displayed to you and the screenshot image on the left are not
exactly the same.
You now need to start filling the form. Once you have entered your first and last names, it is
time to choose a login name. This is important as your login name will decide the email
address you will get, and in case of a Gmail account, would be your-chosen-login-
[email protected]. So be sure to pick a login name, also called the username, with care.
Step 3 - How to choose a login name or username for your email address
Choosing a login name is part art and part common sense. And because it determines what
your email address will be, I suggest you spend a little time over it. Since, email addresses
need to be unique which means no two people in the world can have the same address, there
is no guarantee that your preferred login name would be available - more on this below. The
following is my advice and suggestions on how to choose a login or username.
First check if you can get a login name of your name, firstname, lastname, as firstname-
lastname or the more popular, firstname.lastname (yes, the period sign can be used in a login
name). You can also try out firstnamelastname. Getting a Gmail email address of your name
is indeed very fortunate because of the sheer number of subscribers to the service. However,
if you have a relatively uncommon name, you do stand a good chance; I don't even try this
because mine is such a common name - both my first name and lastname.
If your name doesn't work out, seek to couple your name with your profession - such as
john.webdeveloper.
Your login name needs to be catchy and at the same time describe you so people are able to
recall it without much difficulty and associate it with you. For instance, if you are a docile
accountant from a small town, choosing "hells-angels" as the login name would be unwise.
Rather, [email protected] would be a lot better - FYI, Boone is a small town in
North Carolina where I spend a day - lovely place.
I also advice against using numbers and digits in your login name unless, of course, they are a
part of your company/business name. Again, you need to have a username that is easy to
recall - you don't want people racking their brains and calling you up each time they forget
your email address.
The availability of a login or user name can be verified by entering it first in the text field and
hitting the check availability button.
Step 4 - Choosing a password for your email
Securing your Gmail email account with a strong> password is imperative. Think of the
password as the key combination to your safe and you need to give the same amount of
importance. A combination of uppercase and lowercase letters with some digits thrown in
would be a strong enough password. on the right of the textfields in which you enter your
password a sort of meter would indicate the strength of the password.
You need to enter the password twice and you can leave the "Remember me on this
computer" box unchecked.
Step 5 - Protecting your Gmail account with a security question
You now need to either select a security question from the drop down list or enter one - and
you need to provide the answer. This additional security helps in getting your email account
password if you forget it.
You may also enter a secondary email address but this field is optional, i.e. you can leave it
blank. And rightly so, because if the Gmail address is your first email account you will not
have an alternate email ID.
Step 6 - Word verification and confirmation
After providing your secondary email address - you can leave this blank, if you don't have
one - and your location, you need to enter the characters that you see in the picture above the
field in your form. Why is this required? So that Gmail knows the inputs are from a human
being and not some automated program.
Now that everything is set, you can go through the Terms of Service and click on the "I
accept. Create my account." button which will create your very own free Gmail account!
Hurrah and congratulations.
To access your Gmail account in future, you need to go to the web site (links mentioned
above) using a web browser and enter your username (login name) and password once again.
Q.4 a. <HTML>
<HEAD>
<TITLE>MY FIRST WEB PAGE</TITLE>
</HEAD>
<BODY>
<UL>
<LI> COMPUTER CONCEPTS
<LI> MS-WINDOWS
<LI> MS-EXCEL
<LI> MS-WORD
<LI> FOXPRO
</UL>
</BODY>
</HTML>
What is the result of the above HTML code? Also provide an example of the output of
the above code. [5 Marks]
Ans:
The result of the above HTML code is:-
COMPUTER CONCEPTS
MS-WINDOWS
MS-EXCEL
MS-WORD
FOXPRO
Example: > first open the notepad program (start – All Programs – Accessories - notepad)
Write all the code in the notepad file, then save the file in your any drive as any
name.html, for example (Ram.html).
After that open your internet explorer and type the path of the file in the address bar,
for example (D:\Ram.html) then press enter key. The out put will come automatically.
b. Explain the anatomy of “A” tag with a neat diagram. [5 Marks]
Ans:
Tags let you integrate Modules and Plugins into your pages
ExpressionEngine comes with nearly 20 modules (weblog modules, commenting module,
photo gallery module, etc.), as well as dozens of available plugins. Modules provide most of
EE's core features, and plugins provide small enhancements.
Each module and plugin has its own tags that enable you use its features within your pages,
so understanding Tags is a critical component of learning the system.
Important Concept: Every ExpressionEngine Tag has a corresponding Module or Plugin that
it is designed to generate content from.
Note: The Modules and Tags section of the user guide has detailed information regarding
every tag associated with each module. When you are ready to begin designing your own
templates you will reference that section of the user guide the most.
Anatomy of a Tag
A typical ExpressionEngine tag is surrounded by "curly braces" and looks like this:
{exp:weblog:weblog_name}
Tag Segments
A tag typically has 3 segments. The segments in the above example are:
exp : weblog : weblog_name
The first segment, exp, tells ExpressionEngine that this is a tag. The second part, weblog, is
the Module that the tag belongs to. The third part, weblog_name, is the specific function from
within the module that you are using.
The above tag tells ExpressionEngine to invoke the Weblog Name function from the Weblog
Module.
Most tags have three segments, although occasionally in the case of plugins, some will only
have two.
Two Types of Tags
There are two kinds of tags: single tags and tag pairs.
Single Tags
Single tags are designed to return a single piece of information. A single tag does not have a
closing tag.
This is a single tag:
{exp:weblog:weblog_name}
Tag Pairs
Tag pairs are designed to return a multiple piece of information. Tag pairs have both an
opening and closing component. This is a tag pair:
{exp:weblog:entries}
Entry content
{/exp:weblog:entries}
The above tag tells ExpressionEngine to invoke the Entries function from the Weblog
Module. You'll use this tag a lot in your templates.
Q.5 Write an HTML code to create a web page table for the employee details of ABC
Company which consists of the following details
a. Table has fields [Employee code, Name (first, mid, last), department, Gross Salary]
b. Table consists of a company logo
c. Table has got 10 employee details with a heading as Employee details
Show the output with the above data. [10 Marks]
Ans:-
<html>
<table width="100" border="2">
<TH colspan="5" scope="colgroup">ABC Company</TH>
<tr>
<td>Employee code</td>
<td>Name</td>
<td>department</td>
<td> Gross Salary</td>
</tr>
<tr>
<td>001</td> <td>Ram</td> <td>SSC</td> <td>5000</td>
</tr>
</table>
</html>
Q.6 a. What are the applications of multimedia? [5 Marks]
Ans:
Multimedia finds its application in various areas including, but not limited to, advertisements,
art, education, entertainment, engineering, medicine, mathematics, business, scientific
research and spatial temporal applications. Several examples are as follows:
Creative industries
Creative industries use multimedia for a variety of purposes ranging from fine arts, to
entertainment, to commercial art, to journalism, to media and software services provided for
any of the industries listed below. An individual multimedia designer may cover the spectrum
throughout their career. Request for their skills range from technical, to analytical, to
creative.
Commercial
Much of the electronic old and new media used by commercial artists is multimedia. Exciting
presentations are used to grab and keep attention in advertising. Business to business, and
interoffice communications are often developed by creative services firms for advanced
multimedia presentations beyond simple slide shows to sell ideas or liven-up training.
Commercial multimedia developers may be hired to design for governmental services and
nonprofit services applications as well.
Entertainment and fine arts
In addition, multimedia is heavily used in the entertainment industry, especially to develop
special effects in movies and animations. Multimedia games are a popular pastime and are
software programs available either as CD-ROMs or online. Some video games also use
multimedia features. Multimedia applications that allow users to actively participate instead
of just sitting by as passive recipients of information are called Interactive Multimedia. In the
Arts there are multimedia artists, whose minds are able to blend techniques using different
media that in some way incorporates interaction with the viewer. One of the most relevant
could be Peter Greenaway who is melding Cinema with Opera and all sorts of digital media.
Another approach entails the creation of multimedia that can be displayed in a traditional fine
arts arena, such as an art gallery. Although multimedia display material may be volatile, the
survivability of the content is as strong as any traditional media. Digital recording material
may be just as durable and infinitely reproducible with perfect copies every time.
Education
In Education, multimedia is used to produce computer-based training courses (popularly
called CBTs) and reference books like encyclopedia and almanacs. A CBT lets the user go
through a series of presentations, text about a particular topic, and associated illustrations in
various information formats. Edutainment is an informal term used to describe combining
education with entertainment, especially multimedia entertainment.
Learning theory in the past decade has expanded dramatically because of the introduction of
multimedia. Several lines of research have evolved (e.g. Cognitive load, Multimedia learning,
and the list goes on). The possibilities for learning and instruction are nearly endless.
The idea of media convergence is also becoming a major factor in education, particularly
higher education. Defined as separate technologies such as voice (and telephony features),
data (and productivity applications) and video that now share resources and interact with each
other, synergistically creating new efficiencies, media convergence is rapidly changing the
curriculum in universities all over the world. Likewise, it is changing the availibility, or lack
thereof, of jobs requiring this savvy technological skill.
Newspaper companies all over are also trying to embrace the new phenomenon by
implementing it's practices in their work. While some have been slow to come around, other
major newspapers like The New York Times, USA Today and The Washington Post are
setting the precedent for the positioning of the newspaper industry in a globalized world.
Engineering
Software engineers may use multimedia in Computer Simulations for anything from
entertainment to training such as military or industrial training. Multimedia for software
interfaces are often done as a collaboration between creative professionals and software
engineers.
Industry
In the Industrial sector, multimedia is used as a way to help present information to
shareholders, superiors and coworkers. Multimedia is also helpful for providing employee
training, advertising and selling products all over the world via virtually unlimited web-based
technology
Mathematical and scientific research
In mathematical and scientific research, multimedia is mainly used for modelling and
simulation. For example, a scientist can look at a molecular model of a particular substance
and manipulate it to arrive at a new substance. Representative research can be found in
journals such as the Journal of Multimedia.
Medicine
In Medicine, doctors can get trained by looking at a virtual surgery or they can simulate how
the human body is affected by diseases spread by viruses and bacteria and then develop
techniques to prevent it.
Document imaging
Document imaging is a technique that takes hard copy of an image/document and converts it
into a digital format (for example, scanners).
b. Explain the different elements of Multimedia in brief. [5 Marks]
Ans:
The elements of multimedia are the following:
Facsimile
Document Images
Photographics Images
Geographic information system maps
Voice command and voice synthesis
Audio messages
Video messages
Full motion stored and live video
Holographic Images
Fractals