Free Essay

Computer Management

In:

Submitted By sukhman
Words 1501
Pages 7
1) Introduction to HTML:
It stands for hyper text markup language. It was created by Tim Berners-Lee at CERN, the European Laboratory for Practical Physics in Geneva. HTML is a special formatting language that defines the appearance and contents of a webpage. Its specific syntax rules allow you to define the placement and format of the text, graphics, sound and videos on the webpage. HTML is one of the most commonly used interface language used now a days for the web.

2) Terminology:
a) Hypertext: It refers to the text which acts a link. You can jump to any page on the Internet by simply clicking at the link.
b) Hypermedia An extension to hypertext which supports linking graphics, sound, and video elements in addition to text elements. The World Wide Web is a partial hypermedia system since is supports graphical hyperlinks and links to sound and video files. New hypermedia systems under development will allow objects in computer videos to be hyperlinked.
c) Web Client The client, or user, side of the Web. It typically refers to the Web browser in the user's machine. It may also refer to plug-ins and helper applications that enhance the browser to support special services from the site. The term may imply the entire user machine or refer to a handheld device that provides Web access.
d) Web Server Web servers are computers that deliver (serves up) Web pages. Every Web server has an IP address and possibly a domain name. Web pages to browsers as well as other data files to Web-based applications. The Web server includes the hardware, operating system, Web server software, TCP/IP protocols and site content (Web pages, images and other files).
For example, if you enter the URL http://www.pcwebopedia.com/index.html in your browser, this sends a request to the Web server whose domain name is pcwebopedia.com.
e) URL
• It stands for Uniform Resource Locator.
• The first part of the URL is called a protocol identifier and it indicates what protocol to use, and the second part is called a resource name and it specifies the IP address or the domain name where the resource is located. The protocol identifier and the resource name are separated by a colon and two forward slashes.
• The address that defines the route to a file on an Internet server (Web server, FTP server, mail server, etc.). URLs are typed into a Web browser to access Web pages and files, and URLs are embedded within the pages themselves as hypertext links. The URL contains the protocol prefix, port number, domain name, subdirectory names and file name.
f) HTML Tools
• HTML Editor: An HTML editor is a software application for creating web pages. Although the HTML markup of a web page can be written with any text editor, specialized HTML editors.
Example: Notepad, Adobe GoLive
• Browser It is the program which is used to display HTML pages . A browser is also known as web client. It is the software invention used to access the web. It is the most important internet software in use. The major browser used to net are:-
• Microsoft Internet Explorer
• Netscape Navigator
g) Absolute Path: Absolute paths are called that because they refer to the very specific location, including the domain name. The absolute path to a Web element is also often referred to as the URL. For example, the absolute path to this Web page is:
Example: file:///C:/Users/sukhvir/Desktop/Holidays_India.jsp.htm
h) Relative Path The most useful URL path is the relative path! The relative URL points to a file or directory in relation to the present file or directory (folder). Relative URL's help in web site maintenance. It is easy to move a file from one directory (folder) to another, or a web site from one domain name to another. And you don't have to worry about updating the link(s) or the image source path(s).
i) Document Type Definition: The declaration must be the very first thing in your HTML document, before the tag. The declaration is not an HTML tag; it is an instruction to the web browser about what version of HTML the page is written in. In HTML 4.01, the declaration refers to a DTD, because HTML 4.01 was based on SGML. The DTD specifies the rules for the markup language, so that the browsers render the content correctly.

3) Tags:

i. : The declaration must be the very first thing in your HTML document, before the tag. The declaration is not an HTML tag; it is an instruction to the web browser about what version of HTML the page is written in. In HTML 4.01, ii. The entire HTML document is enclosed within and tags. It actually tells the web browser where the webpage starts and where it ends. iii. The head section specifies the descriptive information about the web documents. It is marked by an opening tag and a closing tag. It consist of information such as the title of the webpage, the keywords used, linking information about the webpage etc. iv. The tag serves two (2) important purposes:
 The text is shown in the top (blue-bar) of the browser window, so it gives the user a quick summary of your page, product, or service.
 Most search engines display the text from your Title tag in their search results.
v.
The tag defines the document's body. The element contains all the contents of an HTML document, such as text, hyperlinks, images, tables, lists, etc. The body element contains the actual contents of the HTML document that can be seen by the end user, when the web page is loaded in the browser’s window.
Syntax: ………….. vi. It is used to display the text bold. The Text written between and is displayed as bold than the normal text. Syntax: Text.......... vii. It is uses for emphasizing on text or code. It emphasizes on text, which is present in and tag. viii. The ......... tag indicates a citation or reference to another source. ix. In HTML, a marquee is a small section of the browser window that displays text that rolls across the screen. This tag works only in Internet Explorer.
Attribute Value Description behavior scroll slid alternate Defines the type of scrolling. bgcolor Bgcolor=” color name” Deprecated - Specifies the background color. direction up down left right Defines the direction of scrolling the content. height pixels or % Defines the height of marquee.

x.
The HTML tag is used for indicating preformatted text. The code tag surrounds the code being marked up. Browsers normally render pre text in a fixed-pitched font, with whitespace in tact, and without word wrap. xi. This tag will display a blank line both on the top & bottom of the paragraph.
Value Description left Left-align text right Right-align text center Center-align text justify Stretches the lines so that each line has equal width (like in newspapers and magazines) xii. It is a HTML tag, which is used for changing the view of your text which will display on view page.

Attribute Value Description color rgb(x,x,x)
#xxxxxx
colorname Deprecated. Use styles instead.
Specifies the color of text face font_family Deprecated. Use styles instead.
Specifies the font of text size number Deprecated. Use styles instead.
Specifies the size of text

Example: This is Table. xiii. The tag inserts a single line break. The tag is an empty tag which means that it has no end tag. xiv. The comment tag is used to insert comments in the source code. Comments are not displayed in the browsers. User can use comments to explain your code, which can help you when you edit the source code at a later date. This is especially useful if you have a lot of code.
Syntax:
xv. An HTML tag that defines the location of a graphic image such as a GIF or JPEG file.
Attribute Value Description alt text Specifies an alternate text for an image src URL Specifies the URL of an image

xvi. The tag creates a horizontal line in an HTML page. The element can be used to separate content in an HTML page.

4) List: Lists are used to group related pieces of information together, so they are clearly associated with each other and easy to read. In modern web development lists are workhorse elements, frequently used for navigation as well as general content. Lists are good from a structural point of view as they help create a well-structured, more accessible, easy-to-maintain document.
There are three list types in HTML:
 unordered list — used to group a set of related items, in no particular order.
 ordered list — used to group a set of related items, in a specific order.
 description list — used to display name/value pairs such as terms and their definitions, or times and events.
Advantages of using Lists:
• Making sense out of context
• Assisting in usability
• Further reading

Similar Documents

Free Essay

Computer 200 Management

...as structured records of transactions. o Information is a message to change the way the receiver perceives something to have an impact on his or her judgment or behavior. • Ex. Your doctor tells you are on the verge of being obese. If you do not want to increase your risk of heart disease or diabetes, then you need to change your eating habits. • What are the reference disciplines in information systems: o Computer Science- Computer Science is the discipline that seeks to build a scientific foundation for topics like computer design, computer programming, information processing, algorithmic solutions or problems, and the algorithmic process itself. o Management Science-The discipline using math and other analyzed methods to help make better decisions in business. Field includes- decision analysis, probability, and math modeling. • Management Science body of knowledge – uses quantitative approaches to decision making and is referred to as management science, operations research, and decisions science. • What do processors do: o A processor interprets computer program instructions and processes data. • Moore’s Law- Moore’s Law state that processor speeds will double every 18 months • The different kinds of storage memory are: kilobyte, megabyte, gugabyte, terabyte, petabyte, exabyte, and zeltabyte • The difference between a bit and a byte are: o A bit is a single numeric value either a 0 or 1. A byte is a sequence of bits, usually 8 bit=1 byte. For example 00110101 ...

Words: 6356 - Pages: 26

Premium Essay

Computer Management

...process. Every organization has some unique set of assumptions and values while preforming procedures like tracking systems or creating new interest point of views. 2.) Technology: Managers have to be able to use an assortment of tools that are useful in finding solutions while running a business. Some of these tools consist of the usage of computer hardware. Computer hardware consists of all shapes and sizes, a variety of information inputs and outputs. Computer software all preprogramed in detail with that coordinate all the hardware controls throughout the information system. Then you have data management technology that helps with the organization of physical media storage. 3.) People: Every type of business may only work as good as the employee’s that run it. What this means; is that the business runs only accordingly to how well skilled the employees have been trained to use these information systems and the information achieves. This will also be affected by how well the employees work according to their attitude state may be. Depending on the employees skill level will make a difference in management. This has to do with how well the employee manages to achieve success through how well coordinate and resourceful...

Words: 322 - Pages: 2

Premium Essay

Computers and Recreation Management

...With all the technology we have today computers are vastly changing the way we do things and how jobs are run. Computers up grade things that at times make things more efficiently ran, and at times cut down on the time it takes to do a project. It changes the way we do things and makes things easier to understand with some work fields that people are in today. With some fields of work computers would not really help out that much but in my field it helps out a lot. Just from the tools that we use it is mostly a computer base thing. My major is Recreation Management. So it is basically and outdoor type of major that deals with things like forest, agriculture, animals, and the land in general. So from the classes I have this year I am learning that computers are vastly becoming a part of my major. We use things like Geo II Explorer, and the Garmin E-Trex. Those to are computer-based object that you need to up load and transfer your data to and from the computer. The Geo II Explorer with creates maps and plots the points of where you have been and how to get to one point to another. It is all ran off satellite information that you get signaled back to your receiver. Then the Garmin E-Trex with give you directions to and from places let you plot points of where you have been and store them right on it in a little hard drive that is installed in it. These two tools are what are mostly used for the field that I am going into. I will be outside most of the time for mine so I defiantly...

Words: 905 - Pages: 4

Premium Essay

Computer Updating and Security Management

...Computer Updating and Security Management Once again the IT Administrators have asked to clarify certain points to them on the implementation of the new network being installed. This takes in account that they know the basics of Server 2008 for windows, and have some knowledge working it. Let us then answer their questions on computer updating and security management. The first thing to address is the software and service Microsoft Server 2008 had in place for centralized updates. IT has a program called WSUS that allows all updates to be centralized from one place. It allows update support for a lot of computers up to 100,000, which leaves more than enough room for the school to grow. Since the main office will be the center I would set up a standard Hierarchy of WSUS (Moskowitz, n.d.). An upstream server which is located in the main office will approve and deploy the updates. The downstream server would be located at the school site. They will download the updates from the upstream server and parceled out to the computers/clients allowed. This will be a good fit for updates that are deemed unnecessary or not wanted by the organization and easily managed from a central location. The security measures in place will be of course IPSec. The communications from the main office to the school will be using Layer Two Tunneling Protocol or L2TP (Freelancer, 2008). This will ensure a secure connection at the highest possible setting. Group policies will be in place in order to...

Words: 591 - Pages: 3

Premium Essay

Computer Security Management

...CSE 4482 Computer Security Management: Assessment and Forensics Introduction to Information Security Instructor: N. Vlajic, Fall 2010 Learning Objectives Upon completion of this material, you should be able to: • Define key terms and critical concepts of information security. List the key challenges of information security, and key protection layers. Describe the CNSS security model (McCumber Cube). Be able to differentiate between threats and attacks to information. Identify today’s most common threats and attacks against information. • • • • Introduction “In the last 20 years, technology has permeated every facet of the business environment. The business place is no longer static – it moves whenever employees travel from office to office, from office to home, from city to city. Since business have become more fluid, …, information security is no longer the sole responsibility of a small dedicated group of professionals, …, it is now the responsibility of every employee, especially managers.” http://www.businessandleadership.com/fs/img/news/200811/378x/business-traveller.jpg http://www.businessandleadership.com/fs/img/news/200811/378x/businesshttp://www.koolringtones.co.uk/wp-content/uploads/2010/01/mobile-phones.jpg http://www.koolringtones.co.uk/wp- content/uploads/2010/01/mobile- Information Technology • Information Technology – enables storage and transportation of information from one business unit to another in many organizations...

Words: 4051 - Pages: 17

Premium Essay

Information Management & Computer

...Chapter7 ANSWERS TO DISCUSSION QUESTIONS How is e-business “redefining old business models, with the aid of technology, to maximize customer value? e-business is more than just buying and selling of products and services through the means of digital media. Whereas e-commerce concentrates on buying and selling, e-business encompasses e-commerce and a whole lot more. For example, e-business includes both front – and back-office applications that form the engine for modern business. e-business is redefining old business models through the aid of technology, to maximize customer value. e-business is the use of the Internet and other networks and information technologies to support electronic commerce, enterprise communications and collaboration, and Web-enabled business processes both within an internetworked enterprise, and with its customers and business partners. 2. Why is there a trend toward cross-functional integrated enterprise systems in business? Cross-functional information systems are integrated combinations of business information systems that share information resources across the functional units of an organization. Integrated systems allow the same data to be used for multiple applications; information output from one function can easily become data input to another function. Only one integrated database needs to be maintained. Many organizations are using information technology to develop integrated cross-functional enterprise systems that cross...

Words: 1723 - Pages: 7

Free Essay

Computer Management System

...Name: |Period: | | |Date: | | SCIENCE FAIR: PROPOSAL OUTLINE This outline will help you organize your science fair proposal. Use the attached report as an example. You will use this outline to write your proposal in paragraph form. |1. |TITLE: Write a sentence that connects the independent and dependent variables of the investigation. Example: The effect of (independent variable) | | |on the (dependent variable). | | | | |2. |INTRODUCTION: Give a brief summary of the investigation and describe the rationale, problem, and hypothesis. | |a. |Summary. Briefly describe the project in 2-4 sentences. | | | | |b. |Why do you want to conduct the experiment? (Rationale) | | |...

Words: 430 - Pages: 2

Premium Essay

Computer Ethics

...Computer Ethics-NDex Danielle E. Maire-Jackson IS535ON: Managerial Applications of Information Technology 12-5-10 Professor McElyea TABLE OF CONTENTS I. Definition of Computer Ethics 3 II. Background of NDex 4 III. Discussion of Business Issues 5 IV. Proposed Solution 6 V. Recommendations for the Executive Committee 8 VI. References 11 I. DEFINITION OF COMPUTER ETHICS “Ethics is a set of moral principles that govern the behavior of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society”. (Brotman, 2001). Ethics vary from one individual to another. Laws are written rules that govern. Ethics and information services have become very important. Computer ethics are key in today's modernized world. Social rights and the computer. This is really saying or giving you rights. For example, right to privacy. This allows your personal information to be kept just what it is, personal. Right to computer access, right to computer skills, etc. (Gorniak-Kocikowska, 1996). Code of ethics states what conduct is allowed and what is not allowed. There must always be a plan on how to maintain ethical practices in the business world. Many times people have valuable information to be stored into computer systems and therefore we...

Words: 2376 - Pages: 10

Free Essay

Sales and Marketing Executive

... CHRISTIAN HOBBIES : LISTENING TO GOSPEL MUSIC LANGUAGES : ENGLISH, NYANJA&TONGA CONTACT No : +260950254807, +260968793352, EMAIL : bcchimusb562@gmail.com EDUCATIONALBACKGROUND 2012: Bachelor of Business Administration in CMIS; Rusangu University. 2005:Grade10-12; Namwala High School. 2002:Grade9; Itezhi-Tezhi Basic School. 2001:Grade1-8; Mujika Basic School, Monze. PROFESSIONAL QUALIFICATIONS * Candidate-Master’s Degree of Science in Information Technology * Candidate- Cisco Certified Network Associate * Certified Fiber Optic Technician * SMB Account Manager * BBA-Computer and Management Information Systems WORKEXPERIENCE * Am currently working with Smartnet Network Limited as Technical Sales and Marketing Engineer and assigned to the following tasks: * Searching for new clients, visiting them and developing long-term relationships with them through managing and interpreting their requirements. * Persuading clients to buy products or services * Deliver the purchased Items on time and issue out the delivery note. * Assessment of Tender requests, attending tender...

Words: 858 - Pages: 4

Premium Essay

Eparking

...Introduction With the rapid development of the auto industry, the number of cars in increasing. Car parking as an important part of the traffic management system, people’s requirements in parking management and continuously improve. It has been shown that over 40% of the total traffic volume in urban areas is composed of vehicles cruising for parking ( Shoup, 2006 ). E-Parking system is a modern parking system which combine the computer system with the parking management.E-parking system is a new technology platform. The definition of E-parking system is use the advanced technologies to help driver found the location, parking the cars, pay the parking fees ( Caroline, 2010). The scholar Kun-Chan Lana ( 2013) has explain how the e-parking works. When the motorists want to parking the car in somewhere like superstore, first they can go to the parking website, check whether there is a free parking space. And then they can book the parking space, after that they need print a certificate with bar code. Before they go, they can pay the parking fees auto in the parking. Many researchers through their research shows that e-parking system has great benefits. Thompson and Bonsall (1997) found that e-parking system can reduce parking facility queue lengths. The E-parking system also can enhances existing spatial the use and the management, reduces the parking search time and reduce the urban traffic jams ( Hodel and Cong, 2003). 2.0 E-Parking system implementation 2.1 where need...

Words: 1228 - Pages: 5

Free Essay

Maple Retreat

...991 - HCL Technologies Limited was originally incorporated on 12th November, as "HCL Overseas Limited". The certificate of commencement of business was received on 10th February, 1992. On July 14, 1994, the name of the Company was changed to "HCL Consulting Limited". The Company changed its name to "HCL Technologies Limited" on 6th October 1999 to better reflect the line of activities of the Company. - HCL provides new technology development services to its clients. 1996 - The 50:50 joint venture with Perot Systems Corporation in the year, provided access to high value client base of Perot Systems. - The Company has one of the largest software development infrastructures in India. This state-of-the-art infrastructure, which comprises seven software factories, is designed to take advantage of the high productivity and scalability as well as the relatively lower cost of software development in India. 1998 - The Company started addressing the markets in Europe and Asia Pacific. - The company has a rich heritage in technologies like the Internet and e-Commerce, networking and internetworking, Internet telephony, telecom, embedded software, ASIC/VLSI design and testing, satellite communication, wireless communication and component based object technologies like COM, DCOM and CORBA. - The Company has the capability to work with a wide variety of computing platforms ranging from Open Client Server systems comprising all flavors of UNIX, Microsoft platforms, AS/400...

Words: 4787 - Pages: 20

Premium Essay

Is Vct

...MASTER OF TECHNOLOGY ADVANCED ELECTIVES SELECTION For Semester II 2014/2015 ATA/SE-DIP/TS-11/V1.34 Master of Technology in Software /Knowledge Engineering and Enterprise Business Analytics Table of Contents. MTECH ADVANCED ELECTIVES 1. INTRODUCTION. 1.1 Overview. 1.2 Courses. 1.3 Assessment. 1.4 Elective Selection Process. 2 2 2 2 3 3 2. SCHEDULE FOR ADVANCED ELECTIVES OFFERED DURING SEMESTER II 2014/2015. 2.1 MTech SE and KE Students. 2.2 MTech EBAC Students. 5 5 9 3. CURRICULUM. 12 4. DESCRIPTION OF COURSES. 4.1 Department of Electrical & Computer Engineering. 4.2 School of Computing. 4.3 Institute of Systems Science. 4.4 Department of Industrial & Systems Engineering. 4.5 Division of Engineering & Technology Management. 12 15 23 31 32 34 ATA/SE-DIP/TS-11/V1.34 page 1 of 35 Master of Technology in Software /Knowledge Engineering and Enterprise Business Analytics MASTER OF TECHNOLOGY Advanced Electives 1. INTRODUCTION 1.1 Overview All students that expect to have passed four core courses and eight basic electives after completing the scheduled examinations in November, and also have or expect to pass their project/internship, will be entitled to commence their Advanced Electives in NUS Semester II 2014/2015, which starts on 12 January 2015. However, it should be noted that a student’s registration for the Advanced Electives will be withdrawn if they either: 1. 2. 3. 4. 5. Fail any elective examination in November. Do not successfully...

Words: 15607 - Pages: 63

Premium Essay

Technolgy to Advance Sales for Nutz an Boltz Hardware Corporation

...Technology to advance sales for Nutz n Boltz Hardware Corporation Mohsin Ahsan Managerial Applications of Information Technology 535 Keller Graduate School of Management August 1, 2013 Professor Jorge Echavarria Technology to advance sales for Nutz n Boltz Hardware Corporation 1.0 Abstract This paper will address the role of information systems in a new startup hardware store, Nutz n Boltz Corporation. The company intends to utilize its ability to use information technology and ability to implement corporate strategies and achieve its corporate goals as well. The company has decided to invest heavily in information systems to achieve several strategic objectives: operational excellence, services, customer and supplier intimacy, improve decision making, competitive advantage, and survival. In order for the start-up hardware business to be successful, the company will have to overcome several obstacles. There are several methods and options that the company can choose from. This paper addresses each problem and then discusses the best solutions that will tackle each problem. These solutions will allow the company to be successful. 2.0 Brief Company Background Nutz n Boltz Corporation is a hardware store located in downtown Los Angeles, California. The business is a startup. Their mission is to put their customers first by providing the best customer service, most complete selection, and the highest in stock level at the right price through friendly, motivated...

Words: 2828 - Pages: 12

Free Essay

Student

...helps an organization to perform effectively.       Moreover, it also aimed at appraising the possible problems encountered in the installation and structural framework of information and communication technology systems as well as analyzing the socio-economic and indigenous cultural factors that affects the stream (flow) of information in Nigeria business organization.       It has been observed that information and communication technology contribute greatly to the success of business organization in Nigeria.       It has been deduced from the research that individual peculiar culture does not affect information system in functioning effectively.       Finally, in other to make an organization to perform effectively and function well, management should allow flow of information and communication technology system in an organization. Introduction The world is in the mist of the most radical and rapid transformation of commerce and society since the invention of the automobile. During the next few years, electronic markets will grow and begin operating over cheap, accessible public networks, the so-called electronic highway. Whole industries will be destroyed and new ones born. Productivity will leap and competitive advantage shift in the direction of small business. Thousands of jobs will become obsolete and disappear, and thousands of others will be created. The electronic frontier, like the frontiers that preceded it, is at once a realm of boundless opportunity and a harsh...

Words: 5955 - Pages: 24

Premium Essay

Uuyv

...Computing BTEC Level 3 90-credit Diploma In Information Technology (QCF) Unit no: 2 | Learner group: C2250, C0183, C0177, C0186, C0184, C0185, | Unit title: Computer Systems | Learner name: | Date issued: W/C 26th January 2016 | Assessor name: Mark Dollan | Completion date: W/E 1st Feb 2016 | Written by: M Dollan | Submitted on: | Verified by: Karl Indans | Assignment title: System Software & Configuration (ref: L3-CS02) | In this assessment you will have opportunities to provide evidence against the following criteria. Indicate the page numbers where the evidence can be found also PPD (Personal and Professional Development) and EE | Grading Criteria | Criteria ref | To achieve the criteria the evidence must show that the student is able to: | Task | Evidence | Page | P2 | Explain the purpose of operating systems | 1 | Written | | P3 | Explain the purpose of different software utilities | 3 | Written | | P6 | Configure a computer system to meet user needs | 5 | Practical | | P7 | Test a configured computer system for functionality | 6 | Practical | | M1 | Compare the features and functions of different operating systems | 2 | Written | | M3 | Evaluate the performance of a computer system | 7 | Written | | D1 | Explain how software utilities can improve the performance of computer systems | 4 | Written | | This is an official course assessment and you must make a good attempt at all criteria available, you must also make sure that...

Words: 2093 - Pages: 9