Jumat, 25 November 2011

Differences between LAN and WAN




The differences between LAN and WAN is as follows:
LAN (Local Area Network)

1.

LAN is used to connect computers at one place, in one room or a building.
2.

LAN covers small and limited area.

3.

Data transfer speed is very fast in LAN because of small distance.

4.
Local Area network speed is normally form 1 to l00 Mbps.
5.

LAN is less costly.

6.

LAN is usually connected through wires.

7.

Normally, the   connection    in    a    LAN    is permanent using wires.

8.

LAN is used for sharing data, information, files and hardware like printers, hard disk, modem etc.

9.

LAN has   less   possibility   of data transmission error.

10.
LAN is used to transfer data over small distances.
11
LAN is easy to install and configure.
12
LAN is easy to troubleshoot.
WAN (Wide Area Network)
1
WAN is used to connect computers anywhere in the world.
2
WAN can cover larger area. It can cover cities, countries and even continents.

3
Data transfer speed is slower in WAN.

4
Transmission     speeds     are     normally 56 kbps to 45 Mbps.
5
The hardware needed for a WAN is more expensive.

6
WAN is usually connected through telephone lines, fiber optic cable or through wireless media.

7
The    connection    in    WAN    may not be permanent.

8
WAN is used to share only data and information like Email and file transfer

9
WAN has more possibility of data transmission error because of long distance.

10
WAN is used to transfer data over long distances.
11
WAN is difficult to install and configure due to connecting computers at multiple and distant sites.
12
WANs are difficult to troubleshoot.

Kamis, 24 November 2011

Types Of Computer Networks

Explain different types of computer networks:(LAN,WAN,MAN)

Main types of computer networks are:
1.    LAN - Local-Area Network
2.    WAN - Wide-Area Network
3.    MAN - Metropolitan-Area Network

1)LAN (Local Area Network)
LAN stands for Local Area Network. It covers a small area. Most LANs are used to connect computers in a single building or group of near buildings. Hundreds or thousands of computers may be connected through LAN. LANs are used in office buildings, college or university campus etc. Local Area Networks can transfer data at a very high speed. Data transmission speeds of LAN are 1 to 100 megabits per second.
Examples:
Following are two examples of LAN:
  • LAN is used in a computer lab to connect computers. The students can share software, files and data in the lab.
  • In Internet cafe, many computers can be connected through LAN. These computers can share single connection of Internet.
  • Local Area Network can be used in an office to share common data and a network printer and any other software or hardware.
  • A local area network in a digital library can provide access to centralized collection of digital books for many readers using different computers in library building.
2)WAN (Wide Area Network)
WAN stands for wide area network. It covers a large area. WAN connects computers in different cities, countries and continents. So, Wide Area Networks are used to transfer data over very long distances across cities, countries or even in whole world. WANs are used to connect LANs and other types of networks together, so that users and computers in one location can communicate with users and computers in other locations.
Computers in WAN are often connected through leased lines telephone lines. They can also be connected through satellites. Transmission rate of WAN is 56 kbps to 45 Mbps. WAN is expensive than LAN. WAN is not as fast as LAN. There is a possibility of error in data transmission due to very long distance they cover. The largest WAN  is the Internet. With the help of internet, we can send our data in any part of the world.
Examples of WAN
  • In air line ticketing system, many offices of an air line company can be joined together using WAN. A person can get a ticket from any office in the country.
  • A bank with many branches in different cities can connect its branches through WAN. The customer can use his account from any branch.
3)MAN (Metropolitan-Area Network)
A metropolitan area network (MAN) is a network that covers an area of the size of a city. So, a MAN is larger than a local area network but it is smaller than a WAN. A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities. MANs can use communications channels of moderate-to-high data transfer rates. It may use fiber Optic cable for fast speeds.
A MAN typically includes one or more LANs but cover a small area than WAN. A MAN often acts as a high-speed network.
Example:
  • Mobile phones systems often use MAN.
  • Many local ISPs manage MAN with the help of cable modems within a city.
  • Local cable TV networks also uses MAN technologies.

Rabu, 23 November 2011

How To Protect Your Computer From Spyware And Viruses

How to protect your computer from spyware and viruses? If your computer is still experiencing slow performance problems after cleaning your hard drive, you may need to do a scan with anti virus or anti-spyware. Negative computer viruses can slow down your computer by changing the user's data or information without permission or without the knowledge of real users.

Spyware collects personal information without telling you and without asking for permission. From the web site you visit where you enter your username and passwords, spyware can steal your confidential information. In addition to privacy concerns, spyware can hamper your computer's performance. To remove spyware, scan your PC security of Windows Live OneCare. Scanning This is a free service and will help to check and remove viruses. Apart from the above that can throw garbage on your computer, it should also prevent viruses and spyware from your computer, here are some tips & tricks to prevent viruses and spyware:

1. Always activate the anti-virus and anti-spyware, and keep updated on a regular basis. So, your computer will be protected. You will get a warning when the program detects something wrong. You can schedule regular updates to ensure the program is updated regularly to prevent the new virus.

2. Do not open e-mails that are not known to the sender, and always scan email attachments before downloading, even if you know the sender of the message, because sometimes the email accounts of your friends have been hacked to deliver viruses.

3. Do not install anything suspicious. Sometimes you'll see a popup window that appears from your browsing. Do not download anything before you scan with antivirus them thoroughly.

4. Minimize use via USB drive or external hardware. Viruses can be carried from one computer to another computer with a USB stick.

5. Always backup your important data so that data if you have a virus, there is still a backup.

Similarly, Ways to Protect Your Computer From Spyware and Viruses may be useful.

Computer Network Security

Computer Network Security, especially if we connect a computer as a computer lab in the office or home computer network. Network security involves access authorization data in the network, which is controlled by the network administrator. Users select or have an ID and password or other authentication information that allows them access to information and programs within their authority. Network security includes a variety of computer networks, both public and private, which are used in daily work and communication transactions between businesses, government agencies and individuals.

If observed on the security of computer network security can be reviewed in terms of its form is as follows:

- Hardware Security
Security-related hardware hardware used in computer networks. Security hardware is often overlooked but is key to maintaining the network to remain stable. In the security hardware, servers and data storage should be a major concern. Physical access to servers and critical data should be limited as much as possible.

It would be easier for thieves to take the hard drive or tape backup of servers and data storage instead of having to press the software from the network. Garbage should also be considered because many hackers who come to the garbage company to find information on its computer network. One way to secure the hardware is placed in a room that has good security. Airways hole needs to be given attention because people just get into the server room through the channel. Cable networks should be protected so as not easy for hackers to bypass the cable and then connect to the computer.

Access to computers can also be restricted by security settings on the BIOS level that would prevent access to a computer, format the hard drive, and change the contents of the Main Boot Record (where the partition information) hard drive. The use of smart cards and hardware autentifikasiseperti fingerprint detector is also worth considering to improve security.

- Security Software
As the name suggests, it must be guaranteed is the software. The software we mean here can include operating systems, application systems, data and information stored in computer networks especially on the server. For example, if the server is only responsible to the router, do not need web server software and an FTP server installed. Limit the installed software will reduce the conflict between the software and limit access, for example if the router is also equipped with an FTP server, then people from outside with anonymous logins may be able to access the router.

Software to be installed must also have good security arrangements. The ability of encryption (data scrambling) is a specification that must be owned by the software to be used, mainly because the encryption 128 bit encryption with 56-bit systems should be solved with ease today. Some software has a security hole is the sendmail mail server and telnet applications. Sendmail has a weakness that can ditelnet without logging in port (25) and accessor can create an email with a fake address. Telnet application has deficiencies transmit data without encryption (data scrambling) so that when it can be tapped will be very easy to get the data.

The second thing to note is the password. Should set the minimum password length fatherly complicate memcahkan password hacker. The password will also be better if it does not consist only letters or angak, small or capital letters, but must be combined. Encryption can improve network security by randomizing passwords and usernames, either in the notes to the host as well as password and username that is passed the current network to log into another computer.

Routing can not be separated from security breaches. Disorder that often arises is the provision of false information about the routing path (routing in the IP header). Giving false information is usually meant to be a datagram-datagram can be tapped. To prevent such a thing, the router must be set to not allow source routing and routing protocols are included in or some sort of password authentication for routing information is obtained only from trusted routers.

Similarly introductory Computer Network Security, may be useful.

Selasa, 22 November 2011

Explain Advantages Of Networks

Define Network with examples. Give importance of Computer Network.

COMPUTER NETWORK

We can define a Computer Network as a set of two or more connected computers to share information and other resources (data, files, printers, hard disk, modem, CD-Rom Drive, CD-Writer, DVD-Rom Drive, DVD-Writer etc.). The computers in a network can share:
Data, Information, Files
Software
Hardware (printers, disk, modems)etc.

EXAMPLES OF COMPUTER NETWORK

  • Computer network can be used in an office. Different people in the office can share common information and printer.
  • Net Cafes use Computer Network for internet sharing. Net Cafe Owners can save money by sharing one DSL Routers / Modem and a single Internet Connection.
  • Computer Network is used in Computer Laboratories of Schools, Colleges and other educational institutes.
  • Internet, is also an example of a computer network. Internet is a network of millions of computers connected through phone lines. People can share information, files and talk with one another through internet.




    ADVANTAGES OF COMPUTER NETWORKS

    Following are some important advantages of computer networks:

    1. Data and Information Sharing

    Different employees of an organization can share common information with the help of computer network.

    2. Software Sharing

    Different software can be shared with the help of computer networks.

    3. Hardware Sharing

    Different hardware can be shared with the help of computer networks. For example, if there are five computer users in an office, we can save cost by using only one printer with the help of computer networking. In a computer network, only one computer will manage all printing needs of the computer users in a small office. In addition, we can share other hard ware devices like hard disks, CD-Rom Drives / Writers, modems, routers and scanners etc.

    4. Money Saving

    We can save a lot of money by using computer networking, because of sharing the same software and hardware in a network.

    5. Internet Sharing

    We can buy only one DSL internet connection and share it with in whole organization with the help of computer networking.

    6. Easy Communication Within Organization

    We can send and receive messages and files through network. In this way, a file can be moved to one place to another within an organization without the need of a physical worker to take and carry the files to a destination. With the help of a command in a computer we can transfer file within seconds from one room to another.

    7. Easy Communication Outside Organization

    We can send and receive emails and share files with other people outside organization using internet.

    Computer Security Software

    For security software can be done with actions/specific settings. But the question that arises is: Where is the setting you need and which ones are not? If you use certain programs where the program? The problem, is a more secure system should have a comfort level decreases. Why is that?

    If you want to improve computer security by installing a firewall, of course, the system is more secure thanks to a wall of fire. But of course, comfort is reduced because of warnings that often arise, the system is also getting heavier because of too many doing the screening process. That's why people think 1024 times before installing a firewall. But, that does not mean security is not important. Security remains important. It's just a different level for each use of the computer.

    The question now, the level of security you need? If the computer is used is limited only by your own home of course you do not have to bother switching to another operating system just to get security. Quite simply optimize the security settings in your PC and adjust to the conditions you face.

    The following are various options to secure and optimize the Windows operating system. The setting overall there is no necessity for you to do because the setting will have its own consequences, although the possibility was very small. Our advice before trying something

    1. Make your first system restore order if something goes wrong the system can go back to the starting position.

    2. Also did backup for a registry editor for guard duty

    3. Read carefully about the purpose and how to do every settings you will do

    Are the first three points above, and other security types I describe in the next article.

    Senin, 21 November 2011

    Types Of Scanners Input Device

    Scanner / Optical Scanner

    A scanner is an input device for computer. It can scan any printed document with text as well as images. It will :
    • Read any printed paper or picture,
    • Convert text or images into digital form
    • Saves this converted digital file into computer storage for later use

    Uses Of Optical Scanners

    You can scan your documents or pictures to:
    1. Store into computer memory.
    2. To save lot of effort and time because if you type the whole text on printed page, it will take effort as well as time).
    3. Show image or text on computer screen or on a multimedia projector's screen.
    4. In addition, you can send this scanned document or image to your friends all over the world with the help of Internet & Email.
    5. You can publish the scanned documents or images on your website or blog.
    6. You can apply online and send the scanned images of your academic documents in any part of the world within minutes.
    7. If your scanner supports OCR - Optical Character Recognition, you can scan a page with printed text and save it in an editable computer file. You can change or add more contents in this scanned file.

    Types Of Optical Scanners

    There are different types of scanners:

    1. Flat Bed Scanner




    A flatbed scanner is the most common type of optical scanners used to scan printed text and images and save into computer storage as a digital file. It works on the principle of a photo copier machine. We pickup the cover of the scanner and place the printed page on the glass surface of the scanner. Now we will instruct scanner through computer software to start scanning. The scanner will scan with the help of light and save the digital file into computer storage. If you have an OCR scanner, you can save your text into editable form. This will save a lot of hard work and time to enter text by keyboard too. It is widely used in offices, schools, colleges, universities and homes for common scanning needs. If a book is very rare or difficult to find, we can scan its all pages one by one. Later on we can take prints of these scanned pages through a color printer.

    2. Sheet Fed Scanner




    A sheet fed scanner works like a fax machine mechanism. In a sheet fed scanner, pages are entered into scanner like a fax machine.

    Advantages of Sheet Fed Scanner

    1. A feet shed scanner is relatively smaller in size.
    2. It is more portable.
    3. It takes less space.

    Disadvantages Of Sheet Fed Scanner

    1. It requires separate pages to scan. But, it cannot scan a book because of its binding. 
    2. It can scan normal papers with normal thickness only. 

    3. Hand Held Scanner




    Hand Held scanner is a small, light weight scanner and portable scanner. It is used to scan small amount of data like short articles from news papers. It is held in hand and is moved over the text page or image slowly and smoothly from start to end. Its scan quality may be lower than flat bed or sheet fed scanner but it can used to capture small amounts of text or small images, quickly.

    SkyPix Hand held Scanner




    This is a portable, cordless hand held scanner that is used to scan and save important documents, letters, or pictures. It records scanned documents in its memory card. you can transfer these scanned documents on yor computer for later use. You can scan and save important news from the news papers or interesting articles from magazines.

    4. Drum Scanners




    Drum scanners are used by the Publishers to scan images with details. Drum scanners use photomultiplier tube technology. In drum scanners, the document to be scanned is mounted on a glass cylinder. At the center of the cylinder is a sensor that splits light bounced from the document into three beams. Each beam is sent through a color filter into a photomultiplier tube where the light is changed into an electrical signal. And in this way a complete image with immense details can be obtained. Drum scanners are widely used in publishing industry.

    Kamis, 17 November 2011

    Uses Of Computer In Science

    Today, computers are being used in every field of life. Here we discuss Uses of Computers in Science:

    Data Collection

    Scientists use computers to collect data and make hypotheses on the basis of collected data.

    Analysis and Testing Of Data

    Scientists use computers to analyze collected data and test their hypotheses.

    Exchanging Information

    Scientists use computers to exchange information with their colleagues. Different Researches all over the world can share their research with one another. This will be helpful for research because this will increase the rate of completion of research projects.

    Simulation of Different Events

    Scientists may use computers for simulation of complex events. For example, they can use computer simulation to predict about the affects of earthquake on buildings in a particular area. They may use computer simulation to know the effects of rapid population increase on weather conditions. In fact, computer simulation of such complex events will save time as well as cost. Computer simulation can also provide a feasible solution to many problems.

    Use Of Computer in Medical Science

    Computers may also be used to simulate the functions of parts of human body. For example, computers may simulate cell division, internal structure of molecules, a virus or bacteria attack etc.

    Uses of Computer in Space Science

    Computers are playing an important role to explore the outer space. The computers are mostly used to collect space data, perform experiments and prepare results. Computers are used to operate certain machines and robots to collect information from space and send it back on earth.

    Benefits Of The New Antivirus Download

    When a computer is infected by the virus, then there will be questions. Why and how. Why does this happen? And how does that happen? Viruses can be transmitted through various doors. USB, Internet, CD, network, and so on. This happens because in our computer does not install an antivirus program. While free antivirus available on the internet and available for download at no cost. Well the question now, where download new antivirus?

    Computer Viruses
    Computers such as humans. Computers can be 'sick'. Computers also can be 'injured'. If the pain associated with computer hardware, may be detected. For example the keyboard is broken, its hard drive speakers, as long as can be seen with the eye. However, if your computer harm associated with the software, we are going to be difficult to diagnose. What's wrong with this computer, why does not want to go, or why computers often life and death.

    The virus is not similar to a virus that infects humans. Computer viruses to destroy computers undermine the system. So that some programs can not run, or a file in it be damaged. When the computer has been infected with this problem, of course, the computer was infected with a virus. And the virus must be eradicated. If he cannot, interfere in the work of our computers. And often can damage the whole system of the computer, without exception.

    Computer Antivirus
    Many antivirus computer offered and provided by antivirus providers on the internet. Antivirus generally free or free. Although there is an offer to buy paid antivirus. Paid antivirus certainly have differences with the free version Antivirus. Examples of antivirus on the internet which can be downloaded for free are as follows.

    - Avast!info can be found at http://www.avast.com/
    - BitDefender info can be found at http://www.bitdefender.com/
    - AVG Anti-Virus info can be found at http://www.avg.com/
    - ThreatFire info can be found at http://www.threatfire.com/
    - PC Media Anti Virus info can be found at http://www.pcmav.biz/
    - Kaspersky Antivirus info can be found at http://www.kaspersky.com/avupdates
    - ANSAV info can be found at http://www.ansav.com/
    - Symantec Norton AntiVirus info can be found at http://www.symantec.com/
    - AVI info can be found at http://www.infokomputer.com/
    - McAfee VirusScan info can be found at http://www.mcafee.com/

    Tips to Reduce the Risk of Computer Viruses
    At least there are a few tips you can use to reduce the risk of your computer is exposed to computer viruses. Tips include the following.

    - Install an antivirus on your computer. Whatever it is either paid or free, your computer must be immersed in it an antivirus program. Do not wait until the computer you are exposed to the virus, and then install an antivirus program.

    - First scan anything that goes in your computer. Whether it's flash, CD, card reader, and so on.

    - Updates to your antivirus regularly. This is useful for updating of the virus database.

    - Scan the entire computer system regularly. Try it once a week. This is to prevent the virus escaped from our observation that "deceived" and capable of "breed", as well as scattered in the system.

    If we have done various points above, at least your computer will be safe from the threat of computer viruses. So, Do you embedded computer antivirus program? If not, what are you waiting for? Do not just install an antivirus after your computer is infected by computer viruses.

    Selasa, 15 November 2011

    System Software and Application Software:Differences

    Q. Differentiate between system software and application software

    System Software:

    System software is a set of programs to control all components of computer and to manage overall operations of computer system. System software is used as a base to install and run all application software. Examples of system software include:
    1. Operating Systems, like Microsoft Windows, DOS, Unix and Linux
    2. Device Drivers like Device driver software of a Printer (found on CD normally provided with the printer)
    3. Utility Programs like AVAST anti virus, Disk Scanners and File Viewers etc.

    Differences between system software and application software

      Application Software:

      Users can use Application Software to perform different applications on computer. Application Software generally performs a specific task for a computer user. Examples of Application software include:
      1. Wordprocessors like Microsoft Word
      2. Spreadsheet Software like MS Excel
      3. Database software like Microsoft Access etc.
      Difference between System & Application Software
      System Software

      Application Software

      1. It is a set of programs to control computer components and operations.

      1. It is used to solve particular problems of user.

      2.  It is general-purpose software.

      2. It is specific purpose software.

      3. It executes all the time in computer. Because it controls overall operations and components of computer.

      3. It executes as and when required. For example, if we need to write a letter, we will open Microsoft Word - an application software. And after we have written and printed the letter, we will close Microsoft Word.

      4. The number of system software is less than application software.

      4. The number of application software is much more than system software.

      5. System software is essential for a computer to work. Without System software (like operating systems), a computer is useless. We cannot use computer hardware without system software. That is why we install an operating system first of all, after buying a new computer.

      5. Application software is not essential for a computer to work. For example, if we need to play some games then we buy a game CD or download games from internet, and install in our computer.

      6. Examples are: Windows, Dos, Unix, Linux, Norton Antivirus etc.
      6. Examples are: MS Word, MS Excel, MS Power point etc.

      Customized and Packaged Software

       

      Q. Explain Customized software and Packaged software.

      a) Customized Software




      Customized software is a type of application software that is designed for a particular customer or organization. When packaged software does not fulfill needs of an organization then a programmer / software developer / software engineer is hired. The programmer will develop needed custom software for that organization according to the organizations specific needs and requirements.
      Student Information software developed for Govt. Post Graduate College of Commerce, Rahim Yar Khan is an example of customized software.  It will be used to store all related data about students, admissions and examinations etc.

      b) Packaged Software




      Packaged software is a type of application software that is developed for sale to the general public. It is also known as off-the-shelf software or Pre-Written software. It facilitates the people to perform day-to-day activities. Examples of packaged software are word processing software and spread sheet software.
      For example, Microsoft Office is a packaged software. Microsoft Office ia set of different application software like Microsoft Word, Microsoft Excel, Microsoft Access and Microsoft Power Point.

      Sabtu, 12 November 2011

      Norton Removal Tool 2012, Uninstall Norton Products Clean Up

      For users of Norton Antivirus products have a special application for uninstalling to clean all of the Norton Antivirus software is the Norton Removal Tool 2012. Norton Removal Tool 2012 is now available for download to wipe the slate clean of Norton software products ranging from 2003 to 2012. You can use the Norton Removal Tool 2012 this if there are problems in uninstalling norton products from feature windows, Add or Remove programs.


      Things to consider before running the Norton Removal Tool 2012
      Norton Removal Tool will remove the artificial setting of the program, the file is quarantined, product key, with nornton terasosiaasi files, folders and registry keys. For your users with the original norton serial key, make sure the first backing up the file before running this apliaksi. Uninstall PCAnywhere or WinFax before running this tool and don’t forget to backup databases of ACT or WinFax before uninstall if you use.

      How to use the Norton Removal Tool 2012

      First Download the removal tool and save to your Computer, Then Run it and follow the instructions on the screen, Last Restart your Computer.

      Click below to get it...

      Download Norton Removal Tool 2012

      Rabu, 09 November 2011

      Few Stories About Antivirus

      What antivirus is the best?
      Before asking it should do the following steps:
      1. Open a browser favorite
      2. type www.google.com
      3. Then in the search field type in "Antivirus What is the best?" Without quotes.

      Now look at the SERP (Search Engine Result Page), or with rough language search results from search engines. There is a ± 150,000 search results are obtained by inserting the phrase "what is Antivirus is the best?" To the smart uncle (Google). Do you still want to ask again?

      And a site called toptenreviews.com has provided reviews on 10 popular antivirus especially in this world complete with prices, excellence and amenities. But whether to use or install any antivirus that will make your computer safe and will never be exposed to the virus again?

      Virus, from time to time to evolve with various new variant. many new names emerging virus with different types of infections. Antivirus was not able to recognize when there is a new virus variants or which arise due to a database of the antivirus has not been updated, therefore it was the antivirus should be updated regularly. And you should learn first of facilities, how to use and side effects of antiviral agents would be used. Do not already installed then cried out this why? it's really out? ga can really open it? why his computer so slow? why its so on the missing files? really want this program can not run it?

      Then what the virus was deliberately created by antivirus companies, in order to sell their products? Who knows?

      Minggu, 06 November 2011

      PC Virus Protection from Avast Free Antivirus 2012

      Day by day, inside the course of all formation point in time to technological nearby us, they're totally a great deal of criminalities which often can be will also growing to be intended most apparent introduced via the people. One of the main a favorite criminalities is very much PC’s disease cases. Nowadays, locate which means some malware which could be presently apply to irresponsibility exercise a lot of times have much of our PC’s overall staying reduced versus before. Well, in order to protect your own laptop and PC, I suggest you should install New Avast Free Antivirus.

      By installing antivirus, actually you can save your budget in protecting your PC or laptop. Not only have that, Avast also gives the best protection both in scanning speed and quality and also security features. This is showed by the fastest free antivirus achievement that is given by the independent antivirus testing labs. This free antivirus gives you the minimum protection for every PC or it is often called as antivirus with anti-spyware.

      But, unfortunately this Avast free antivirus can’t protect you when you want to access the online shop or online bank and also it can’t really protect you to secure your entire identity and data. This free antivirus also has other weakness which it can’t help you to stop some bothering SPAMs. But, still even though it has so many weaknesses, you still get the best protection for your PC by downloading this free antivirus at http://www.avast.com/free-antivirus-download and install this antivirus immediately to secure your daily activity.

      Sabtu, 05 November 2011

      Define Web Server, Web Browser, WWW, ISP

      Q. Write notes on the following:
      WWW, ISP, WEB PAGE, WEB SITE, WEB SERVER, WEB BROWSER



      WWW

      WWW stands for World Wide Web. It is also called web. It is the collection of all connected web documents stored on different web servers. These documents contain information in the form of text, pictures, audio and video clips. WWW has many advantages:
      · finding a job
      · searching information
      · advertisement for business
      · weather forecast
      · entertainment
      · education

      Difference between Internet and World wide web:


      The main difference between internet and World Wide web is that World Wide Web is only a service provided by internet. It provides access to web documents. While internet provides many other services also like FTP, TELNET and chatting etc.

      ISP (Internet Service Provider) OR IAP (Internet Access Provider

      ISP stands for internet service provider. It is a company that provides internet connections to users. For example WOL net, PAK net, CYBER net etc. are ISPs. To connect to internet, users have to get internet connection from an ISP. These days, internet scratch cards are also available. ISP will provide you a user name, password. It will also provide a telephone number to connect to internet.
      There are many ISPs these days in every big city of the country. A good ISP has the following features:
      · Low rate
      · Fast browsing
      · Fast downloading and uploading
      · Good customer support

      WEB PAGE

      A document created by HTML and found on web is a web page. A web page contains information in the form of text, pictures, audio and video clips. These web pages are stored on special computers called WEB SERVERS.

      WEB SITE

      A collection of related and interlinked web pages is called a web site. A web site may have many pages. Each web page will provide different information. For example, a web site for a College can have a Home page, Faculty page, Courses page, Games page and contact page. Home page is the main page of any web site. We can see all other pages by links provided in home page. Each web site has a unique address. For example web address of Baha-ud-din Zakaria University is www.bzu.edu.pk.

      WEB SERVER

      Web documents are stored on special and powerful computers called WEB SERVERS. Web servers are permanently connected to internet. When we type address of a web site in a browser (internet explorer), then web server fulfills this request. They provide requested information in the form of web page.

      WEB BROWSER

      A browser is software that is used to view web pages on internet. Many web browsers are available. But Mozilla Firefox, Google Chrome and Internet explorer are the most popular. We type address of any web site in address bar of browser and press ENTER key. Then first page called HOME PAGE of web site is displayed in browser window.