Upload
jigaro71
View
215
Download
0
Embed Size (px)
Citation preview
8/7/2019 kuk_Internet_fundamentals_practicle_file
1/23
PRACTICALFILE
OFINTERNET
FUNDAMENTA
L
8/7/2019 kuk_Internet_fundamentals_practicle_file
2/23
EXPERIMENT NO.2AIM:To prepare the list of marks obtained
by students in different subjects &showwith the help of graph theaverage,min.&max. marks in each subject
NAMES PHYSICS MATHS CHEMISTRY TOTAL %AGE
Ankita 67 85 80 23277.3333
333Aashima 82 78 90 250
83.33333
Ishita 74 78 82 234 78Nancy 80 70 75 225 75Charu 70 78 68 216 72Garima 94 100 97 291 97
Kirti 87 93 92 27290.6666
7
Shalini 82 88 90 26086.6666
7
8/7/2019 kuk_Internet_fundamentals_practicle_file
3/23
EXPERIMENT NO.3
AIM:To prepare a presentationexplaining the facilities, infrastructureavailable in SIET college
8/7/2019 kuk_Internet_fundamentals_practicle_file
4/23
To become a Centre of Excellence for global leadership and learning setting the standards by
which others are measured to Shivalik Institute of Engineering & Technology comes into existence
to provide Teacher Education of highest standard in several fields and specializations.
To be identified as one of the best among the Teacher Education Institutes.
To train professionals imbibing skills, competence and positive attitude with focus on the
needs of the society.
To forge stronger links with the system of Education and also with the community weserve.
To develop an Education System based on application & intelligence
EXPERIMENT NO.4AIM: Create a new document that takes
the format of a business letter. Combine
We have very well established and organized Physics and Chemistry Laboratories that notonly cover complete syllabus as recommended by KU University, but also motivatestudents to learn much more than is generally required. This extra mileage at SIET helpsour students not only to develop complete depth of the subject, but also. gives themenormous confidence. In pursuance to our aim of imparting very good quality education,the students are given sets of very good quality laboratory instruction, quizzes and notes,besides their syllabus books at a very reasonable cost Our newly set-up language
Laboratory helps students to improve their listening comprehension and spoken English.Since professional communication skills add to ones personality, we feel that our state-of-the-art multimedia platform will help to create an altogether new environment of improvingthe communication skills and hence student personality.
8/7/2019 kuk_Internet_fundamentals_practicle_file
5/23
and
tags to properly separateseparate the different parts of
thedocuments.
Buisness Letter
BUISNESS LETTER
Shivalik group of institutes
Aliyaspur
27th August,08
XYZ Company
Delhi
Subject : Need Of Computers
Dear Sir,
We need to purchase computers of best quality.So send ur list of rates with all details as earliest
as possible.
You can contact at site www.shivalikinstitues.com
With Regards
Registrar
8/7/2019 kuk_Internet_fundamentals_practicle_file
6/23
OUTPUT:BUISNESS LETTER
Shivalik group of institutesAliyaspur
27th August,08
XYZ Company
Delhi
Subject : Need Of Computers
Dear Sir,
We need to purchase computers of best quality.So send ur list of rates with all
details as earliest as possible.You can contact at site www.shivalikinstitues.com
With Regards
Registrar
EXPERIMENT NO. 5
8/7/2019 kuk_Internet_fundamentals_practicle_file
7/23
AIM:Beginning with an ordered list.Create a list that
nest both an unordered list and a definition list.
Preparation Of OL,UL And DL
Three Subjects Of B.Tech 3rd
Semester
Data Base Management System
Attributes
Composite AttributeIt can be divided into smaller subparts which represent more basic attributes with independent
meanings.
Single-Valued AttributeMost attributes have a single value for a particular entity such attributes are single-valuedattributes.
Data Structures
8/7/2019 kuk_Internet_fundamentals_practicle_file
8/23
OUTPUT:
Three Subjects Of B.Tech 3rd Semester
1. Data Base Management System
o Attributes
Composite AttributeIt can be divided into smaller subparts which represent more basic attributes with
independent meanings.
Single-Valued Attribute
Most attributes have a single value for a particular entity such attributes are single-valued attributes.
2. Data Structures
o Arrays
1-D ArrayA one-dimensional array is one in which only one subscript specification is needed to
specify a particular element of array.
2-D ArrayA two-dimensional array is that in which two subscripts is needed to specify the
particluar elements of array.
3. Internet Fundamental
o Topology
Bus TopologyIt consist of a main run of cable with a terminator at each end.All nodes are connected
to the linear cable.
Star TopologyIt is designed with Each node Connected directly to a central Network hub.
Tree Topology
It combines characteristics of linear bus and star topologies.
8/7/2019 kuk_Internet_fundamentals_practicle_file
9/23
EXPERIMENT NO. 6AIM:Create a table of contents style
page(using regular and section links) thatloads a different document for eachchapter or section of the document.
Creating A Table With Hyperlinks
Index
Chapter 1: Introduction
Chapter 2: Web Browser
Chapter 3: World Wide Web
Chapter 4: Security
Chapter 5: Privacy
Chapter 6: Internet
Chapter 7: Search Engines
Chapter 8:Hyper Text Markup language
Glossary
8/7/2019 kuk_Internet_fundamentals_practicle_file
10/23
OUTPUT:
IndexChapter 1: Introduction
Chapter 2: Web BrowserChapter 3: World Wide Web
Chapter 4: Security
Chapter 5: PrivacyChapter 6: Internet
Chapter 7: Search Engines
Chapter 8:Hyper Text Markup language
Glossary
http://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%201.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%202.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%203.htmlhttp://c/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%204.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%205.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%206.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%207.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%208.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/Glossary.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%201.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%202.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%203.htmlhttp://c/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%204.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%205.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%206.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%207.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%208.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/Glossary.html8/7/2019 kuk_Internet_fundamentals_practicle_file
11/23
EXPERIMENT NO. 7AIM: Create a seven item ordered list using
ROMAN numerals. After the fifth item,
increase the next list value by 5.
Preparation Of Ordered List
Names Of Students
NamitaBhawna
Neetu
Deepti
Kanika
Neha
Akshra
8/7/2019 kuk_Internet_fundamentals_practicle_file
12/23
OUTPUT:Names Of Students
I. Namita
II. Bhawna
III. Neetu
IV. DeeptiV. Kanika
I. Neha
II. Akshra
8/7/2019 kuk_Internet_fundamentals_practicle_file
13/23
EXPERIMENT NO. 8AIM: Design web pages containing
information of department.
Creating a form
Name :
Password :
Course :
B.TechB.Ed
MCA
Polytechnic
MBAM.Tech
Branch :
CSEIT
ECEMechan
Civil
Chemic
Hobbies :
Dancing
Travelling
Swimming
Reading
Teasing
Listening Songs
Sleeping
Watching T.V
Terms and Conditions :
This is to bring in your kind notice that we are assuming that you have filled in your correct
information.
8/7/2019 kuk_Internet_fundamentals_practicle_file
14/23
for filling this form it is required that you are of 18 years of age or above.you are yourself
responsible for any wrong information that you have filled. Only eligible candidates are required tofill up this form.
OUTPUT:
Name :
Password :
Course :
Branch :
CSE IT ECE Mechanical Civil Chemical
Hobbies :
Dancing
Travelling
Swimming
Reading
Teasing
Listening Songs
Sleeping
Watching T.V
Terms and Conditions :This is to bring in your kind notic
for filling this form it is required
CLICK TO SUBMIT
8/7/2019 kuk_Internet_fundamentals_practicle_file
15/23
AIM: Use the ALIGN attribute of an image
tag to align another image to the top of thefirst image.
Use of ALIGN attribute
Three Images
8/7/2019 kuk_Internet_fundamentals_practicle_file
16/23
OUTPUT: Three Images
8/7/2019 kuk_Internet_fundamentals_practicle_file
17/23
EXPERIMENT NO. 10AIM: Add names(mail-ids) in your address
book, compose and search and search anelement.
CREATION OF ADDRESS BOOK
Quick Add Contact[Move to the Top of the Page ]
First Name: Last Name: Email
Phone Nickname
Add
Mail Addresses Calendar Notepad Import/Export - Options
Save Save and Add Another Cancel
http://in.address.yahoo.com/yab/?.rand=544363771&v=SA&A=x&A2=2&stC=All&stP=1&stP2=1&stT=v&stI=0&stA=0http://in.address.yahoo.com/yab/?.rand=544363771&v=SA&A=x&A2=2&stC=All&stP=1&stP2=1&stT=v&stI=0&stA=0http://in.rd.yahoo.com/ab_in/pimnav/mail/*http:/mail.yahoo.co.inhttp://in.rd.yahoo.com/ab_in/pimnav/mail/*http:/mail.yahoo.co.inhttp://in.rd.yahoo.com/ab_in/pimnav/ab/*http:/in.address.yahoo.com/yab/inhttp://in.rd.yahoo.com/ab_in/pimnav/cal/*http:/in.calendar.yahoo.comhttp://in.rd.yahoo.com/ab_in/pimnav/np/*http:/in.notepad.yahoo.comhttp://in.address.yahoo.com/?A=Bhttp://in.address.yahoo.com/?A=ohttp://in.address.yahoo.com/yab/?.rand=544363771&v=SA&A=x&A2=2&stC=All&stP=1&stP2=1&stT=v&stI=0&stA=0http://in.rd.yahoo.com/ab_in/pimnav/mail/*http:/mail.yahoo.co.inhttp://in.rd.yahoo.com/ab_in/pimnav/ab/*http:/in.address.yahoo.com/yab/inhttp://in.rd.yahoo.com/ab_in/pimnav/cal/*http:/in.calendar.yahoo.comhttp://in.rd.yahoo.com/ab_in/pimnav/np/*http:/in.notepad.yahoo.comhttp://in.address.yahoo.com/?A=Bhttp://in.address.yahoo.com/?A=o8/7/2019 kuk_Internet_fundamentals_practicle_file
18/23
Add Contact
Primary Information
Name:
First Middle Last
Nickname:
Use a Nickname in Yahoo! Mail as a shortcut to this contact's full email address. [Learn More]
Email:
Alternate Email:
Messenger ID:
Add this person to my Messenger List
Category:
Phone
[Hide]
Phone Numbers:
Home Work Mobile
Other Pager Fax
Primary Number:
Enter phone, fax and pager numbers.
Home
[Hide]
Home Address: opp.power house red road ladw a.
Street
City State Zip/Postal Code
Country
Personal Web Site:
Enter home address and personal website location.
http://help%28%27http//help.yahoo.com/help/in/ab/context/context-01.html')http://help%28%27http//help.yahoo.com/help/in/ab/context/context-01.html')8/7/2019 kuk_Internet_fundamentals_practicle_file
19/23
EXPERIMENT NO. 11AIM: Study of e-mail system
E-MAILWhat is e-mail?
In its simplest form, e-mail is an electronic message sent from one computer to
another. You can send or receive personal and business-related messages with
attachments, such as pictures or formatted documents. You can even send music and
computer programs.
Short for electronic mail, the transmission of messages over communications
networks. The messages can be notes entered from the keyboard or electronic files
stored on disk. Most mainframes, minicomputers, and computer networks have an e-
mail system. Some electronic-mail systems are confined to a single computer system
or network, but others have gateways to other computer systems, enabling users to
send electronic mail anywhere in the world. Companies that are fully computerized
make extensive use of e-mail because it is fast, flexible, and reliable
Email has changed the way we do business. Sure, people complain
about the amount of Email they receive. But when all is said
and done, using Email has impacted business in a positive way
and has the edge over other methods of communication.
Advantages of e-mail:-1. Managing Email is Easy
8/7/2019 kuk_Internet_fundamentals_practicle_file
20/23
You can manage all your correspondence on screen and so can your
customers. Your proposal can be answered, revised, stored, and sent to
others, all without reams of paper involved.
2. Email is Fast
Mail is delivered instantly...from your office to anywhere in
the world. No other method of delivery can provide this service.Timely buying and selling decisions can be made in a heartbeat.
3. Email is Inexpensive
Compared to telephone calls, faxes, or over night courier
service, Email is less expensive.
4. Email is Easy to Filter
The subject line on an Email makes it easy to prioritize
messages. The reader can identify ritical correspondence
quickly and dealt with it immediately. Unlike regular mail
which needs to be opened and reviewed, or voice mail which
requires you to either listen to or scan all your messages
for those that require immediate attention.
5. Transmission is Secure and Reliable
The level of security in transmitting Email messages is very
high, and the industry continues to strive to develop even
tighter security levels. Email is private. Often telephone and
fax messages are not. If the address information is correct,
rarely does an Email go astray. Fax machines can be out of
order or out of paper and this prevents an important message
from being delivered in a timely manner.
6. Email is an Internet marketing tool that is fast, easy to use.
inexpensive and effective. Email levels the playing field
between the big corporations and small businesses. No longer
is it just the big boys who have the resources to access the
big advertising houses. Anyone can get their word out there
using Email as the method of delivering the message.
8/7/2019 kuk_Internet_fundamentals_practicle_file
21/23
Disadvantage:-Security and privacy are quite low with e-mail. The majority of the e-mails
are delivered to the correct addressee without intervention. Sometimes,
however, messages may be intercepted by individuals other than the sender
or recipient. This could occur because of an incorrect address, systemadministrator intervention, or transmission error.
As we have seen, one of the biggest disadvantages of email is the capability
for misunderstanding. Email has some other disadvantages as well. It can
be used to talk to more than one person at a time, but the means for doing
so can be a bit cumbersome. At its core, email is a one - to - one
communication medium. Email requires active participation. You have to
check your email to get messages. If you do not check your email, you will
never know that somebody has contacted you.
WORKING OF E-MAIL:-
Working of e-mail is quite easy and simple. First of all we have to type the message.
Than, key in the recipients e-mail address. After that press send button of the given e-mail program.
Once the e-mail is send, it gets encoded by a modem and is send through
the phone line as an analog signal. The e-mail message arrives at thesenders services
provider. If it is recognizes the e-mail address as valid, the mail will be sent via theInternet. The recipients provider will receive the mail, which is than sent to the
providers mail server. After that it is delivered to recipients mailbox and it will
remain there until recipients check it. Finally, the recipients modem and computer
decode the data and the recipient can read the e-mail message.
Create your own mail-id in yahoo and indiatimes.com
THEORY FOR CREATING AN EMAIL-ID
8/7/2019 kuk_Internet_fundamentals_practicle_file
22/23
1. OPEN THE WEBSITE www.mail.yahoo.com or
www.indiatimes.com.
2. CLICK ON new user OPTION.
3. FILL THE NEW E-MAIL ID.
4. TYPE THE PASSWORD.
5. FILL THE PERSONAL INFORMATION.
6. CLICK ON SUBMIT OPTION.THEN, AN ID IS CREATED
Aim: Assigning of IP address
The IANA (Internet Assigned Number Authority) registers several different classes ofnetwork addresses for the availability of IP addresses. The idea behind the different
classes is to create a network of varying size suitable for the different organizations
and applications .The classes are marked as A,B,C,D,E.
BASIS OF
DIFFERENCE
CLASS A
CLASS B
CLASS C
CLASS D CLASS E
Network
Address bits
Host address bits
Mask in
unsubnetted n/w
Addreess begin
with
(binary)
First byte values(decimal)
8 bits
24 bits
255.0.0.0
0
0-127
16 bits
16 bits
255.255.0.0
10
128-191
24 bits
8 bits
255.255
.255.0
110
192-223
Not applicable Not applicable
Not applicable Not applicable
Not applicable Not applicable
1110 11110
224-239 240-255
TYPES OF IP ADDRESS:-
http://www.mail.yahoo.com/http://www.mail.yahoo.com/8/7/2019 kuk_Internet_fundamentals_practicle_file
23/23
REGISTERED IP ADDRESS :-
One of the thing that we can get only from the ISP ,apart from the internet
connection itself ,is the IP address that the internet systems will use .Every
client system connected to the internet must have an IP address , but only the
systems with the registered addresses are visible from internet .ISP obtain the
registered address either from IANA or from their own service providers andsublet them to their clients.
UNREGISTERED IP ADDRESS :-
For a private network that is not connected to internet ,it is not necessary to
register the network addresses. For a network that is completely isolated from
the internet ,administrator can use any IP address the wish ,as long as there are
no duplicate address on the same network . if any of the computers in
network connect to the internet by any means, there is a potential for conflict
between internal address and the system on the internet for which address
was registered .
Class A 10.0.0.0 THROUGH 10.255.255.255
Class B 172.16.0.0 THROUGH 172 .16.255.255Class C 192.168.0.0 THROUGH 192.168.255.255