Upload
vishal-iyer
View
9
Download
0
Embed Size (px)
DESCRIPTION
javascript
Citation preview
Introduction to UI Concepts and Web Technologies
Education, Training and Assessment We enable you to leverage knowledge anytime, anywhere!
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Copyright Guideline 2014 Infosys Limited, Bangalore, India. All Rights Reserved.
Infosys believes the information in this document is accurate as of its publication date; suchinformation is subject to change without notice. Infosys acknowledges the proprietary rights ofother companies to the trademarks, product names and such other intellectual property rightsmentioned in this document. Except as expressly permitted, neither this documentation norany part of it may be reproduced, stored in a retrieval system, or transmitted in any form or byany means, electronic, mechanical, printing, photocopying, recording or otherwise, without theprior permission of Infosys Limited and/ or any named intellectual property rights holdersunder this document.
2
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Confidential Information This Document is confidential to Infosys Limited. This document contains information and data that
Infosys considers confidential and proprietary (Confidential Information). Confidential Information includes, but is not limited to, the following:
Corporate and Infrastructure information about Infosys Infosys project management and quality processes Project experiences provided included as illustrative case studies
Any disclosure of Confidential Information to, or use of it by a third party, will be damaging to Infosys. Ownership of all Infosys Confidential Information, no matter in what media it resides, remains with
Infosys. Confidential information in this document shall not be disclosed, duplicated or used in whole or in part
for any purpose other than reading without specific written permission of an authorized representative of Infosys.
This document also contains third party confidential and proprietary information. Such third party information has been included by Infosys after receiving due written permissions and authorizations from the party/ies. Such third party confidential and proprietary information shall not be disclosed, duplicated or used in whole or in part for any purpose other than reading without specific written permission of an authorized representative of Infosys.
3
3
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Course Information
Course Code: CCFP4.0-IUWT
Course Name: Introduction to UI Concepts and Web Technologies
Document Number: IUWT-01
Version Number: 4.0
4
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Course Objectives5
Introduction to UI and Web
Technologies
Identify the Internet components, protocols and their functionality
Create a static web page with standard look and feel using
HTML and CSS
Introduce all three ways of specifying styles
(external, embedded, inline)
Validate web page using JavaScript
Add interactivity to a web page using
JavaScript
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Topics Internet Basics
Types of network, Topologies, Connecting devices
Network Architecture
TCP/IP reference model
IP Address
Web Fundamentals Browser, URL, DNS, HTTP, Web servers, Types of Web Content
HTML and Cascading Style Sheets (CSS) Formatting tags, List, Links, Tables, Images and Forms
JavaScript Introduction to JavaScript
Client side validations
Introduction to Document Object Model (DOM)
6
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Impact of Web 7
We all are living in the web era. Do you know what makes it tick?
1.28 billion
active users
Guided Activity : Assignment 1
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Information and Collaboration
8
Uses of Web
Chat
E-mailSocialnetwork
Distributeinformation Resource
share
Load share
Guided Activity : Assignment 2
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Web: An overview9
HTTP HTML DNS PROXY
TCP/IPNETWORKS ROUTER
Browser URL
IP AddressServer
Under the hood:Networks
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
11
Computer Networks Collection of computers interconnected to exchange information and share
resources
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Local Area Network (LAN)
12
Computer Networks Collection of computers interconnected to exchange information and share
resources
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
13
Computer Networks Collection of computers interconnected to exchange information and share
resources
Mexico
Mysore Mangalore
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
14
Computer Networks Collection of computers interconnected to exchange information and share
resources
Mexico
Mysore Mangalore
Wide Area Network (WAN)
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Computer Networks Based on geographical spread15
Local Area Network
Interconnects computers within a limited area such as building or campus
Owned by single organization
Data transfer rate is high and high reliability
Implementation cost is low
Wide Area Network
Interconnects computers across different locations within cities, countries or continentsOwned by multiple organizations or peopleRelatively lower data transfer rate and low reliabilityHigher implementation cost compared to LAN
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Computer Networks Based on data flow16
Dedicated communication channel is established between the nodes
Guarantees availability, bandwidth of the channel and remains connected throughout the session
Acts as if the nodes are physically connected Also known as connection oriented type Example: Telephone switching systems
Circuit Switched
No need for dedicated connection between the communicating nodes
Data is fragmented into packets Each packet has the information such as source
and destination address, size of data etc. and can traverse through different paths
Also known as connectionless type
Packet Switched
Under the hood:Network Topologies
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Network Topology Refers to how the computers are connected in a network either physically or logically Geometric representation of relationship of all the computer and interconnecting
devices Examples of Network Topologies are:
BUSBUS
MESHMESH
STARSTAR
RINGRING
Choice of topologies is based on communication cost, installation cost, and reliability
18
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Bus Topology
Overview Nodes connected through shared communication cable called Bus
Nodes are connected to the bus by drop lines
- Simple, reliable and easy to use, especially in smaller networks
- Less expensive
Advantages
- A break in the bus brings the entire network down- Not very much scalable- Only one node can transmit at a time
Disadvantages
19
Under the hood:Interconnecting Devices
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Interconnecting Devices There are many different devices for interconnecting networks.
Repeaters
Bridges
Routers
Gateway
Router/Switch
Gateway
Bridge
Repeater
X.25
NetworkIP network
LAN
LAN LAN
LAN
21
LAN
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Repeaters A Repeater enables signals to travel
longer distances over a network.
It works at the OSI's Physical layer.
Repeaters do not translate anything.A repeater regenerates the
received signals and then
retransmits the regenerated
signals on other segments.
Repeater
Weakened Signal Regenerated Signal
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Bridges It works at the Data Link Layer of the OSI model.
A bridge can join segments or workgroup LANs. It can also divide a network to isolate traffic or problems.
Uses:
Expand the distance of a segment.
Provide for an increased number of computers on the network.
Reduce traffic bottlenecks resulting from an excessive number of attached computers.
As traffic passes
through the bridge,
information about
the computer
addresses is then
stored in the bridge's
RAM. The bridge will
then use this RAM to
build a routing table
based on source
addresses.
Host Host HostHost
Host
Host
Host
Bridge
Segment 1
Segment 2
Network
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Routers
A complex network needs a device,which not only knows the address ofeach segment, but also candetermine the best path for sendingdata and filtering broadcast traffic tothe local segment. Such device iscalled a Router.
It works at the Network layer of the OSI model
Routers can switch and route packets across multiple networks.
Network 1
Network 1
Network 2
Router
10.0.1.0/255.255.255.0
10.1.0.0/255.255.0.0
10.2.1.0/255.255.255.0
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Gateway Gateways make communication
possible between differentarchitectures and environments.
Repackages information to match therequirements of the destinationsystem.
Change the format of a message sothat it will conform to the applicationprogram at the receiving end of thetransfer.
A gateway links two systems that do not use the same:
Communication protocols Data formatting structures Languages Architecture
Host A
Host B
Host C
Gateway
Network
NetworkRouter
Guided Activity : Assignment 3
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Gateway Vs RoutersGateway Routers
NetworksGateways regulate traffic
between two dissimilar networks
Routers regulate traffic between
similar networks
Packets Less information in packetsRouters have access to more
information in packets
Complexity Simple Networks Complex Networks
DestinationLooks at the destination node
addressLooks at the network address
Efficiency Low High
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Interconnecting devices27
Connects two segments of a network cable Receives, amplifies and retransmits signals in both the directions Enables signals to travel longer distance and useful in larger networks
Repeater
Store-and-forward device Connects two homogeneous networks Divides a large network into smaller segment and filters network traffic
Bridge
Directs packets between different networks along the most optimal route Connects LANs and WANs using a routing table Provides congestion control
Router
Connects two or more entirely different networks Connects networks with different communication protocols Translates information between different network data formats or
network architecturesGateway
Guided Activity : Assignment 4
Under the hood:Network Architecture -
TCP/IP Model
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
29
Need for a layered architecture
Predefined dependencies exists among the services which requires
establishing hierarchical relationships
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Network Architecture
Overview Defines the design and implementation of computer networks
Has a layered approach which helps in- Reducing the design complexity- Shielding the implementation details of the services
Each layer provides services to the layer above
Different layers use different protocols
Two popularly referenced architectures are,- ISO OSI Reference Model- TCP/IP Model
Corresponding layers in sender and receiver follow the same protocol
30
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
TCP/IP reference model
Application
Transport
Internet
Network Access
HTTP, SMTP, FTP, Telnet
TCP, UDP
IP, ICMP, DHCP, RIP
MAC Protocols: Ethernet (CSMA/CD), CSMA/CA, Token ring, Token Bus
Routing and delivery of data across networks
31
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
TCP/IP layers Functions and Protocols32
Allows access to network for communication Important functions include domain to IP address translation, data
encryption and synchronization Protocols include HTTP, FTP, SMTP etc.
Application layer
Provide end to end communication Important functions include defining level of service and reliability Protocols include TCP, UDP, RTP etc.
Transport
layer
Packs data into data packets known as IP datagrams which contains source and destination IP addresses
Important functions include routing and congestion control Protocols include IP, ICMP, ARP etc.
Internet
layer
Provides details about how data is physically sent Important functions include node to node delivery, error and flow
control Protocols include Ethernet, token ring, RS-232C etc.
Network Access layer
Under the hood:IP Address
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Internet Protocol Address
Overview A 4-byte addressing scheme used by the IP layerWithin a private or closed network, one can assign any IP address
Every Internet host must have a distinct IP address across the globeIt has two components Network ID Host IDIP addresses are provided by ICANN to the ISPs which in turn provide addresses to the end users
Due to shortage of IP addresses, there is need to switch from IP version 4 (IPv4) to IP version 6 (IPv6)
34
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
IP address35
This component of an IP address helps to uniquely identify a given network
Network ID
This component of an IP address helps to identify a given computer on a network identified by the previous component
Host ID
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
36
IP address
1 0 0 0 0 0 1 0 1 1 0 0 0 0 1 1 1 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1
w x y z
NETWORK ID HOST ID
EXAMPLE: 130.195.128.25
130 195 128 25
IP version 4 (IPV4)
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
IP Address IP address of a machine or device in a network has to be unique under all
circumstances
37
IP Address, once assigned, is fixed for a device in a network and it doesnt change
Used for servers, routers, printers, etc. Allocated by the system administrators
Static address
All devices are not connected to the network all the time IP address for devices are allocated only when the devices
are connected to the network IP addresses are limited and need to be managed efficiently DHCP server is used to allocate an IP address to the
connected device
Dynamic address
Guided Activity : Assignment 5
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
IP address - Types38
LAN
Server
2. Another client
DHCPserver
1. Computerboots up
Dynamic IP for LAN users
STATIC IP CASE
LAN
OtherComputerson Network.
Sys Admin Ensuresthat IP address is unique
for all nodes
Server
IBM Compatible
Network administrator ensures that a unique IP address is assigned to a hostcomputerExample: IP addresses of serversClient computer
Static IP for LAN users
Above the hood:Web Fundamentals
39
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Web A system made up of hypertext documents interlinked to each other and
accessible through Internet
A computer can access an information from web with the help of web browser and Internet connection
40
Hypertext documents
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Web fundamentals41
Retrieves and presents information resources available on a local or remote computer
Browser uses http protocol by default E.g. Internet Explorer, Mozilla Firefox, Google Chrome
Web Browser
Request-response protocol and Stateless (session state is not tracked across requests)
Standardized (allows any HTTP client to communicate with any HTTP server)
Hyper Text Transfer Protocol
(HTTP) Uniquely identifies a particular resource on the Internet Contains protocol, host, port and path E.g. http://www.infosys.com
Uniform Resource
Locator (URL)
DNS server converts the domain names to IP addresses E.g. www.infosys.com 216.251.50.51
Domain Name System (DNS)
Understands HTTP protocol and is able to service concurrent requests
E.g. Apache TomcatWeb Server
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
42
Working of a web server
PC
Web Browser
Web Server(Internet)
my.mydomain.com202.68.33.47
DNS Server(Local Network)
TheInternet
1. User Invokes URL
http://my.mydomain.com/te
st.html
2. Translate DNS Name to
IP address
3. Cannot Resolve
Locally? Resolve from
other DNS
4. Returns IP Addr
202.68.33.47
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
43
Working of a web server
PC
Web Browser
Web Server(Internet)
my.mydomain.com202.68.33.47
DNS Server(Local Network)
TheInternet
1. User Invokes URL
http://my.mydomain.com/te
st.html
2. Translate DNS Name to
IP address
3. Cannot Resolve
Locally? Resolve from
other DNS
4. Returns IP Addr
202.68.33.47
Above the hood:Web Content
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Types of content45
Static content
Content resides in a file Author determines the
content at the time of creation
Each request will return exactly the same content
Ex: HTML files, gif/jpeg files, etc.
Dynamic content
Created on the fly through execution of predefined business logic by a web server upon a request to reflect the current information
Content for the same resource may vary for each request
Ex: Account statement page in Net banking
Requires more processing power on the server
Active content
Server returns executable code as part of the response
Browser executes the program locally on the client machine
Ex: JavaScript's, Java Applets, Active-X controls for IE
There is a potential security risk
HTML is used to design and develop simple static web pages
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Types of Content A Sample Web Page4646
Web Page
includes
Dynamic
Active
StaticStatic Content
Dynamic
Content
Active
ContentGuided Activity : Assignment 6
Introduction to HTML Hyper Text Markup
Language
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
HTML
Overview HTML stands for Hyper Text Markup LanguageIt is used to design and develop Web Pages
Communication on the web happens through HTTP
HTML is1. A Simple mark up language (NOT a programming language)2. Browser/Platform Independent (plain ASCII text format)3. Not Case Sensitive4. HTML is Interpreted by browser (NOT compiled)5. A medium for Graphical User Interface (GUI)
48
Video Link
http://coursesweb.net/html/video-tutorials_t2 - HTML Document Structure
Video Link
http://coursesweb.net/html/video-tutorials_t2 - HTML Document Structure
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Structure of HTML page
49
An HTML file can be created by using a simple text editor viz notepad, text pad, Eclipse IDE editor. HTML file must have an extension .htm or .html.
Contents
Title of the Web Page
Demo 1: Structure of HTML Document
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Building Blocks to create contents in HTML Page50
Building Blocks
are Formatting Tags
Lists
Links
Images
Tables
Forms
Character Entities
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
HTML Text Formatting Tags Defines the font color, face and size Displays the specified text in italics Underlines the specified text
Specifies bold text Aligns text to center
51
Summary: Text Formatting tags helps to define the presentation style of textual content for
better readability, look and feel. To achieve consistency in formatting across pages, each page has to be
modified individually across pages which is tedious for large application. The best way of achieving consistency is through style sheets.
To insert a single line break (new line)
Places the text in a new paragraph
Prints horizontal line
Defines HTML Headings, , , , ,
To define subscripts and superscripts and
Demo 2: Text Formatting Tags
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Text Formatting using Cascading Style Sheets (CSS)52
Style Properties are defined and placed in an external file and is saved with extension .css
These files are then included with the HTML Documents as follows
Example:
This way of including style properties to HTML is called as External Style Sheets
Other ways of including CSS (Inline, Embedded) will be discussed later
Demo 3: Text Formatting using Style Sheets
HTML files provide structure to the content and CSS provides style
(formatting) to the content
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Syntax for CSS
selector refers to the HTML tag for which we need to apply the style Example: h3
Any HTML tag can be a CSS selector Example: h3,h4,h5,body,p etc.
property is the attribute of the html tag we need to modify Example: font-family, color
Each attribute takes a value Example: Verdana, #8598CC
53
Example :
h3 {
font-family: Verdana;
color: #8598CC;
font-style: italic;
text-align: center;
}
General Syntax:
selector {
property: value;
}
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Text formatting in CSS Arial, Verdana, Monospace, .font-family Normal, italic, obliquefont-style normal, small-capsfont-variant x-small, small, medium, largefont-size normal, bold, bolder, light, x-largefont-weight
54
Demo 4: Text Formatting Tags
CSS measurement units:
inches (in) point size (pt) centimeters (cm) pixels (px) millimeters (mm)
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Container tags in CSS - tag is used for creating logical divisions within a page. It defines a
generic container to set up tags as a group Example:
55
In the above example tag groups heading, list and link content The id of tag is contenttext specified inside tag as follows :
All the properties defined for the contenttext in .css file is applicable to all the
content existing within the (heading, list and link)
Properties of div id contenttext cascades into all the tags inside it.
Properties of div id contenttext cascades into all the tags inside it.
Guided Activity : Assignment 7
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Container tags in CSS - is an inline element used to provide style properties to selective
content Example:
EasyShop
56
In the above example tag provides style properties to EasyShop word alone
The id of is EasyShopWord
All the properties defined for the EasyShopWord in .css file is applicable to EasyShop word alone
Demo 5: Div and Span
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Defining IDs in CSS IDs are unique identifiers for HTML tags which are used to specify the style
properties within the CSS file
In CSS files, IDs are defined by prefixing # with the ID names
Example:
57
#EasyShopWord{font-family: Cursive;color: #8598CC;font-size:20px;}
#contenttext {border:1px solid;border-color:#8598CC;width: 580px;padding:10px;font-family:Arial;margin-left:auto;margin-right:auto;}
div is block level tag whereas span is an inline tag
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Defining Classes in CSS Classes are used to specify the style properties to HTML element s within the
CSS file
In CSS files, classes are defined by prefixing . with the ID names
58
.EasyShopWord{font-family: Cursive;color: #8598CC;font-size:20px;}
.contenttext {border:1px solid;border-color:#8598CC;width: 580px;padding:10px;font-family:Arial;margin-left:auto;margin-right:auto;}
In html file, classes are specified as follows :
Thanks for using EasyShop Manager.
Use IDs to apply style for content which occurs only once per page. Use classes to apply
style more than once per page
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Chaining of selectors in CSS It is possible to add tags within a div tag in HTML.Example:
Thanks for using EasyShop Manager.For any clarification you may contact anyone of us.
Chaining of tags is required to apply style properties to the tags within the div.Example:#contenttext h4{
font-size:12px;font-family:Verdana;color: #8898CC;
}
59
Usage of h4 tag inside
div tag
Here h4 is chained
with div id
contenttext
Demo 6: Chaining of Selectors
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Chaining of selectors in CSS Grouping: Elements may be grouped into a comma-separated list.
Universal selector: The universal selector, written "*", matches the name of any element type.
Type selectors : A type selector matches every instance of the element type in the document tree.
60
h1, h2, h3 { font-family: sans-serif }
*.warning and .warning are equivalent*#myid and #myid are equivalent
h1 { font-family: sans-serif }
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Chaining of selectors in CSS Descendant selectors: A selectors to match an element that is the descendant
of another element in the document tree.
Child selectors: A child selector matches when an element is the child of some element. A child selector is made up of two or more selectors separated by ">".
Adjacent sibling selectors: F element immediately preceded by a sibling element E
61
This headline is very important
h1 em { color: blue }
body > P { line-height: 1.3 }
h1 + h2 { margin-top: -5mm }
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Chaining of selectors in CSSPattern Meaning
* Matches any element
E Matches an element of type E
E F Matches any F element that is a descendant of an E
E > F Matches any F element that is a child of an element E
E:first:-child Matches element E when E is the first child of its parent.
E:link
E:Visited
Matches element E if E is the source anchor of a hyperlink of which the
target is not yet visited (:link) or already visited (:visited).
E:active
E:hover
E:focus
Matches E during certain user actions.
E + F Matches any F element immediately preceded by a sibling element E.
DIV.warning Language specific. (In HTML, the same as DIV[class~="warning"].)
E#myid Matches any E element with ID equal to "myid".
62
Guided Activity: Assignment 8
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Text Properties in CSS (Self Study) measurement (px/cm)word-spacing measurement (px/cm)letter-spacing None, underline, overline, line-through text-decoration none, capitalize, uppercase, lowercase text-transform top, text-bottom, super, subvertical-align measurementtext-indent
left, right, center, justifytext-align
63
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Lists in HTML64
Demo 7: Lists
Defines the ordered list Order can be numerical or
alphabetical
Defines the unordered or bulleted list
Define a description list, and
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
List Properties in CSS (Self Study)
disc, circle, square, decimal, lower-roman, upper-roman, lower-alpha, upper-alphalist-style-type
url(*.gif)list-style-image
Inside, outsidelist-style-position
65
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Links in HTML66
The following link opens CreateUser.html and name of the link is Add User.
Add User
The following link opens CreateUser.html in a new web page.
Add User
Demo 8: Links
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Properties of Links in CSS Links can be styled with any CSS property (e.g. color, font-family, background,
etc.). In addition, links can be styled differently depending on what state they are in.
The four links states are:
67
a normal, unvisited linka:link
a link the user has visiteda:visited
a link when the user hover mouse pointer over ita:hover
a link the moment it is clickeda:active
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Embedding Images in HTML68
tag
Supports JPG, GIF and PNG image formats
ALT attribute was set to provide alternative text for browsers that did not display images. ALT attribute can be used as a tool tip or placeholder information in image-based browsers
=url SRC
= n BORDER
= n (in pixels)WIDTH
= n (in pixels)HEIGHT
= Alternate Text ALT
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Embedding Images in CSS69
Guided Activity: Assignment 9
Demo 9: Images
#cartimage {background-image:url(../images/Cart.jpg);background-repeat:no-repeat;float:right;height:80px;width:80px;margin-right:20px;margin-top:20px;}
Properties of Cart Image defined in
style.css
Properties of Cart Image defined in
style.css
Using Cart Image in .htmlUsing Cart Image in .html
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Summary Computer networks Types of Network Network Topology Interconnecting Devices TCP/IP Architecture Web Fundamentals
HTML and CSS Text Formatting Tags and tag Lists
Links
Images
70
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Self Study71
Study Material - Computer Networks and Web Fundamentals
Videos in Portal- http://coursesweb.net/html/video-tutorials_t2
Computer Networks
Network Topologies
Connecting Devices
TCP/IP Model
IP Address
Types of Web content
Links - Computer Networks and Web Fundamentalshttp://compnetworking.about.com/od/basicnetworkingconcepts/http://compnetworking.about.com/od/networkdesign/a/topologies.htmhttp://compnetworking.about.com/od/workingwithipaddresses/l/blip.htmhttp://docwiki.cisco.com/wiki/Internetworking_Basics
Copyright 2013-2014, Infosys Limited ConfidentialConfidential
Self Study72
Links - HTMLHTMLhttp://www.w3schools.com/ http://www.w3.org/http://www.w3.org/wiki/HTML/Elements/
2013 Infosys Limited, Bangalore, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to changewithout notice. Infosys acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Exceptas expressly permitted, neither this documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing,photocopying,recording or otherwise, without the prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.
Thank You