kuk_Internet_fundamentals_practicle_file

Embed Size (px)

Citation preview

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    1/23

    PRACTICALFILE

    OFINTERNET

    FUNDAMENTA

    L

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    2/23

    EXPERIMENT NO.2AIM:To prepare the list of marks obtained

    by students in different subjects &showwith the help of graph theaverage,min.&max. marks in each subject

    NAMES PHYSICS MATHS CHEMISTRY TOTAL %AGE

    Ankita 67 85 80 23277.3333

    333Aashima 82 78 90 250

    83.33333

    Ishita 74 78 82 234 78Nancy 80 70 75 225 75Charu 70 78 68 216 72Garima 94 100 97 291 97

    Kirti 87 93 92 27290.6666

    7

    Shalini 82 88 90 26086.6666

    7

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    3/23

    EXPERIMENT NO.3

    AIM:To prepare a presentationexplaining the facilities, infrastructureavailable in SIET college

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    4/23

    To become a Centre of Excellence for global leadership and learning setting the standards by

    which others are measured to Shivalik Institute of Engineering & Technology comes into existence

    to provide Teacher Education of highest standard in several fields and specializations.

    To be identified as one of the best among the Teacher Education Institutes.

    To train professionals imbibing skills, competence and positive attitude with focus on the

    needs of the society.

    To forge stronger links with the system of Education and also with the community weserve.

    To develop an Education System based on application & intelligence

    EXPERIMENT NO.4AIM: Create a new document that takes

    the format of a business letter. Combine

    We have very well established and organized Physics and Chemistry Laboratories that notonly cover complete syllabus as recommended by KU University, but also motivatestudents to learn much more than is generally required. This extra mileage at SIET helpsour students not only to develop complete depth of the subject, but also. gives themenormous confidence. In pursuance to our aim of imparting very good quality education,the students are given sets of very good quality laboratory instruction, quizzes and notes,besides their syllabus books at a very reasonable cost Our newly set-up language

    Laboratory helps students to improve their listening comprehension and spoken English.Since professional communication skills add to ones personality, we feel that our state-of-the-art multimedia platform will help to create an altogether new environment of improvingthe communication skills and hence student personality.

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    5/23

    and
    tags to properly separateseparate the different parts of thedocuments.

    Buisness Letter

    BUISNESS LETTER

    Shivalik group of institutes
    Aliyaspur

    27th August,08

    XYZ Company
    Delhi

    Subject : Need Of Computers

    Dear Sir,

    We need to purchase computers of best quality.So send ur list of rates with all details as earliest

    as possible.
    You can contact at site www.shivalikinstitues.com

    With Regards

    Registrar

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    6/23

    OUTPUT:BUISNESS LETTER

    Shivalik group of institutesAliyaspur

    27th August,08

    XYZ Company

    Delhi

    Subject : Need Of Computers

    Dear Sir,

    We need to purchase computers of best quality.So send ur list of rates with all

    details as earliest as possible.You can contact at site www.shivalikinstitues.com

    With Regards

    Registrar

    EXPERIMENT NO. 5

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    7/23

    AIM:Beginning with an ordered list.Create a list that

    nest both an unordered list and a definition list.

    Preparation Of OL,UL And DL

    Three Subjects Of B.Tech 3rd

    Semester

    Data Base Management System

    Attributes

    Composite AttributeIt can be divided into smaller subparts which represent more basic attributes with independent

    meanings.

    Single-Valued AttributeMost attributes have a single value for a particular entity such attributes are single-valuedattributes.

    Data Structures

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    8/23

    OUTPUT:

    Three Subjects Of B.Tech 3rd Semester

    1. Data Base Management System

    o Attributes

    Composite AttributeIt can be divided into smaller subparts which represent more basic attributes with

    independent meanings.

    Single-Valued Attribute

    Most attributes have a single value for a particular entity such attributes are single-valued attributes.

    2. Data Structures

    o Arrays

    1-D ArrayA one-dimensional array is one in which only one subscript specification is needed to

    specify a particular element of array.

    2-D ArrayA two-dimensional array is that in which two subscripts is needed to specify the

    particluar elements of array.

    3. Internet Fundamental

    o Topology

    Bus TopologyIt consist of a main run of cable with a terminator at each end.All nodes are connected

    to the linear cable.

    Star TopologyIt is designed with Each node Connected directly to a central Network hub.

    Tree Topology

    It combines characteristics of linear bus and star topologies.

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    9/23

    EXPERIMENT NO. 6AIM:Create a table of contents style

    page(using regular and section links) thatloads a different document for eachchapter or section of the document.

    Creating A Table With Hyperlinks

    Index

    Chapter 1: Introduction
    Chapter 2: Web Browser

    Chapter 3: World Wide Web
    Chapter 4: Security

    Chapter 5: Privacy
    Chapter 6: Internet
    Chapter 7: Search Engines

    Chapter 8:Hyper Text Markup language
    Glossary

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    10/23

    OUTPUT:

    IndexChapter 1: Introduction

    Chapter 2: Web BrowserChapter 3: World Wide Web

    Chapter 4: Security

    Chapter 5: PrivacyChapter 6: Internet

    Chapter 7: Search Engines

    Chapter 8:Hyper Text Markup language

    Glossary

    http://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%201.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%202.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%203.htmlhttp://c/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%204.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%205.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%206.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%207.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%208.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/Glossary.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%201.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%202.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%203.htmlhttp://c/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%204.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%205.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%206.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%207.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/CHAPTER%208.htmlhttp://c/Documents%20and%20Settings/Administrator/Desktop/%20C:/Documents%20and%20Settings/Internet%20Fundamental/Desktop/Glossary.html
  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    11/23

    EXPERIMENT NO. 7AIM: Create a seven item ordered list using

    ROMAN numerals. After the fifth item,

    increase the next list value by 5.

    Preparation Of Ordered List

    Names Of Students

    NamitaBhawna

    Neetu

    Deepti

    Kanika

    Neha

    Akshra

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    12/23

    OUTPUT:Names Of Students

    I. Namita

    II. Bhawna

    III. Neetu

    IV. DeeptiV. Kanika

    I. Neha

    II. Akshra

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    13/23

    EXPERIMENT NO. 8AIM: Design web pages containing

    information of department.

    Creating a form

    Name :

    Password :

    Course :

    B.TechB.Ed

    MCA

    Polytechnic

    MBAM.Tech



    Branch :

    CSEIT

    ECEMechan

    Civil

    Chemic



    Hobbies :

    Dancing

    Travelling
    Swimming

    Reading
    Teasing
    Listening Songs

    Sleeping

    Watching T.V

    Terms and Conditions :

    This is to bring in your kind notice that we are assuming that you have filled in your correct

    information.

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    14/23

    for filling this form it is required that you are of 18 years of age or above.you are yourself

    responsible for any wrong information that you have filled. Only eligible candidates are required tofill up this form.



    OUTPUT:

    Name :

    Password :

    Course :

    Branch :

    CSE IT ECE Mechanical Civil Chemical

    Hobbies :

    Dancing

    Travelling

    Swimming

    Reading

    Teasing

    Listening Songs

    Sleeping

    Watching T.V

    Terms and Conditions :This is to bring in your kind notic

    for filling this form it is required

    CLICK TO SUBMIT

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    15/23

    AIM: Use the ALIGN attribute of an image

    tag to align another image to the top of thefirst image.

    Use of ALIGN attribute

    Three Images

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    16/23

    OUTPUT: Three Images

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    17/23

    EXPERIMENT NO. 10AIM: Add names(mail-ids) in your address

    book, compose and search and search anelement.

    CREATION OF ADDRESS BOOK

    Quick Add Contact[Move to the Top of the Page ]

    First Name: Last Name: Email

    Phone Nickname

    Add

    Mail Addresses Calendar Notepad Import/Export - Options

    Save Save and Add Another Cancel

    http://in.address.yahoo.com/yab/?.rand=544363771&v=SA&A=x&A2=2&stC=All&stP=1&stP2=1&stT=v&stI=0&stA=0http://in.address.yahoo.com/yab/?.rand=544363771&v=SA&A=x&A2=2&stC=All&stP=1&stP2=1&stT=v&stI=0&stA=0http://in.rd.yahoo.com/ab_in/pimnav/mail/*http:/mail.yahoo.co.inhttp://in.rd.yahoo.com/ab_in/pimnav/mail/*http:/mail.yahoo.co.inhttp://in.rd.yahoo.com/ab_in/pimnav/ab/*http:/in.address.yahoo.com/yab/inhttp://in.rd.yahoo.com/ab_in/pimnav/cal/*http:/in.calendar.yahoo.comhttp://in.rd.yahoo.com/ab_in/pimnav/np/*http:/in.notepad.yahoo.comhttp://in.address.yahoo.com/?A=Bhttp://in.address.yahoo.com/?A=ohttp://in.address.yahoo.com/yab/?.rand=544363771&v=SA&A=x&A2=2&stC=All&stP=1&stP2=1&stT=v&stI=0&stA=0http://in.rd.yahoo.com/ab_in/pimnav/mail/*http:/mail.yahoo.co.inhttp://in.rd.yahoo.com/ab_in/pimnav/ab/*http:/in.address.yahoo.com/yab/inhttp://in.rd.yahoo.com/ab_in/pimnav/cal/*http:/in.calendar.yahoo.comhttp://in.rd.yahoo.com/ab_in/pimnav/np/*http:/in.notepad.yahoo.comhttp://in.address.yahoo.com/?A=Bhttp://in.address.yahoo.com/?A=o
  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    18/23

    Add Contact

    Primary Information

    Name:

    First Middle Last

    Nickname:

    Use a Nickname in Yahoo! Mail as a shortcut to this contact's full email address. [Learn More]

    Email:

    Alternate Email:

    Messenger ID:

    Add this person to my Messenger List

    Category:

    Phone

    [Hide]

    Phone Numbers:

    Home Work Mobile

    Other Pager Fax

    Primary Number:

    Enter phone, fax and pager numbers.

    Home

    [Hide]

    Home Address: opp.power house red road ladw a.

    Street

    City State Zip/Postal Code

    Country

    Personal Web Site:

    Enter home address and personal website location.

    http://help%28%27http//help.yahoo.com/help/in/ab/context/context-01.html')http://help%28%27http//help.yahoo.com/help/in/ab/context/context-01.html')
  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    19/23

    EXPERIMENT NO. 11AIM: Study of e-mail system

    E-MAILWhat is e-mail?

    In its simplest form, e-mail is an electronic message sent from one computer to

    another. You can send or receive personal and business-related messages with

    attachments, such as pictures or formatted documents. You can even send music and

    computer programs.

    Short for electronic mail, the transmission of messages over communications

    networks. The messages can be notes entered from the keyboard or electronic files

    stored on disk. Most mainframes, minicomputers, and computer networks have an e-

    mail system. Some electronic-mail systems are confined to a single computer system

    or network, but others have gateways to other computer systems, enabling users to

    send electronic mail anywhere in the world. Companies that are fully computerized

    make extensive use of e-mail because it is fast, flexible, and reliable

    Email has changed the way we do business. Sure, people complain

    about the amount of Email they receive. But when all is said

    and done, using Email has impacted business in a positive way

    and has the edge over other methods of communication.

    Advantages of e-mail:-1. Managing Email is Easy

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    20/23

    You can manage all your correspondence on screen and so can your

    customers. Your proposal can be answered, revised, stored, and sent to

    others, all without reams of paper involved.

    2. Email is Fast

    Mail is delivered instantly...from your office to anywhere in

    the world. No other method of delivery can provide this service.Timely buying and selling decisions can be made in a heartbeat.

    3. Email is Inexpensive

    Compared to telephone calls, faxes, or over night courier

    service, Email is less expensive.

    4. Email is Easy to Filter

    The subject line on an Email makes it easy to prioritize

    messages. The reader can identify ritical correspondence

    quickly and dealt with it immediately. Unlike regular mail

    which needs to be opened and reviewed, or voice mail which

    requires you to either listen to or scan all your messages

    for those that require immediate attention.

    5. Transmission is Secure and Reliable

    The level of security in transmitting Email messages is very

    high, and the industry continues to strive to develop even

    tighter security levels. Email is private. Often telephone and

    fax messages are not. If the address information is correct,

    rarely does an Email go astray. Fax machines can be out of

    order or out of paper and this prevents an important message

    from being delivered in a timely manner.

    6. Email is an Internet marketing tool that is fast, easy to use.

    inexpensive and effective. Email levels the playing field

    between the big corporations and small businesses. No longer

    is it just the big boys who have the resources to access the

    big advertising houses. Anyone can get their word out there

    using Email as the method of delivering the message.

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    21/23

    Disadvantage:-Security and privacy are quite low with e-mail. The majority of the e-mails

    are delivered to the correct addressee without intervention. Sometimes,

    however, messages may be intercepted by individuals other than the sender

    or recipient. This could occur because of an incorrect address, systemadministrator intervention, or transmission error.

    As we have seen, one of the biggest disadvantages of email is the capability

    for misunderstanding. Email has some other disadvantages as well. It can

    be used to talk to more than one person at a time, but the means for doing

    so can be a bit cumbersome. At its core, email is a one - to - one

    communication medium. Email requires active participation. You have to

    check your email to get messages. If you do not check your email, you will

    never know that somebody has contacted you.

    WORKING OF E-MAIL:-

    Working of e-mail is quite easy and simple. First of all we have to type the message.

    Than, key in the recipients e-mail address. After that press send button of the given e-mail program.

    Once the e-mail is send, it gets encoded by a modem and is send through

    the phone line as an analog signal. The e-mail message arrives at thesenders services

    provider. If it is recognizes the e-mail address as valid, the mail will be sent via theInternet. The recipients provider will receive the mail, which is than sent to the

    providers mail server. After that it is delivered to recipients mailbox and it will

    remain there until recipients check it. Finally, the recipients modem and computer

    decode the data and the recipient can read the e-mail message.

    Create your own mail-id in yahoo and indiatimes.com

    THEORY FOR CREATING AN EMAIL-ID

  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    22/23

    1. OPEN THE WEBSITE www.mail.yahoo.com or

    www.indiatimes.com.

    2. CLICK ON new user OPTION.

    3. FILL THE NEW E-MAIL ID.

    4. TYPE THE PASSWORD.

    5. FILL THE PERSONAL INFORMATION.

    6. CLICK ON SUBMIT OPTION.THEN, AN ID IS CREATED

    Aim: Assigning of IP address

    The IANA (Internet Assigned Number Authority) registers several different classes ofnetwork addresses for the availability of IP addresses. The idea behind the different

    classes is to create a network of varying size suitable for the different organizations

    and applications .The classes are marked as A,B,C,D,E.

    BASIS OF

    DIFFERENCE

    CLASS A

    CLASS B

    CLASS C

    CLASS D CLASS E

    Network

    Address bits

    Host address bits

    Mask in

    unsubnetted n/w

    Addreess begin

    with

    (binary)

    First byte values(decimal)

    8 bits

    24 bits

    255.0.0.0

    0

    0-127

    16 bits

    16 bits

    255.255.0.0

    10

    128-191

    24 bits

    8 bits

    255.255

    .255.0

    110

    192-223

    Not applicable Not applicable

    Not applicable Not applicable

    Not applicable Not applicable

    1110 11110

    224-239 240-255

    TYPES OF IP ADDRESS:-

    http://www.mail.yahoo.com/http://www.mail.yahoo.com/
  • 8/7/2019 kuk_Internet_fundamentals_practicle_file

    23/23

    REGISTERED IP ADDRESS :-

    One of the thing that we can get only from the ISP ,apart from the internet

    connection itself ,is the IP address that the internet systems will use .Every

    client system connected to the internet must have an IP address , but only the

    systems with the registered addresses are visible from internet .ISP obtain the

    registered address either from IANA or from their own service providers andsublet them to their clients.

    UNREGISTERED IP ADDRESS :-

    For a private network that is not connected to internet ,it is not necessary to

    register the network addresses. For a network that is completely isolated from

    the internet ,administrator can use any IP address the wish ,as long as there are

    no duplicate address on the same network . if any of the computers in

    network connect to the internet by any means, there is a potential for conflict

    between internal address and the system on the internet for which address

    was registered .

    Class A 10.0.0.0 THROUGH 10.255.255.255

    Class B 172.16.0.0 THROUGH 172 .16.255.255Class C 192.168.0.0 THROUGH 192.168.255.255