Posts

Showing posts from January 9, 2011

HTML (Hyper Text Markup Language)

What is HTML? HTML is a language for describing web pages. HTML stands for H yper T ext M arkup L anguage HTML is not a programming language, it is a markup language A markup language is a set of markup tags HTML uses markup tags to describe web pages HTML Tags HTML markup tags are usually called HTML tags HTML tags are keywords surrounded by angle brackets like HTML tags normally come in pairs like and The first tag in a pair is the start tag, the second tag is the end tag Start and end tags are also called opening tags and closing tags HTML Documents = Web Pages HTML documents describe web pages HTML documents contain HTML tags and plain text HTML documents are also called web pages The purpose of a web browser (like Internet Explorer or Firefox) is to read HTML documents and display them as web pages. The browser does not display the HTML tags, but uses the tags to interpret the content of the page. Ordered Alphabetically DTD : indicates in which HTML 4.01 / XHTML 1.0 DTD the
Computer security is a branch of computer technology known as information security as applied to computers and networks. The objective of computer security includes protection of information and property from theft, corruption, or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. The term computer system security means the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively. The strategies and methodologies of computer security often differ from most other computer technologies because of its somewhat elusive objective of preventing unwanted computer behavior instead of enabling wanted computer behavior. The technologies of computer security are based on logic . As security is not necessarily the primary goal of most computer appli
Network Bridge Types Although network bridges lost popularity, they still have uses in some applications such as providing Internet services to clients restricted to a specific MAC address, and basic home networks that use software or hardware bridges for sharing Internet connections. Bridges also come in useful in token ring networks and transitional networks where both a token ring network and a traditional Ethernet network bind together through the bridge. Transparent Bridges When you use a service provider that requires you to configure a specific hardware (MAC) address on your network adapter to connect to the Internet , you use a bridge without being aware of it. This bridge gives you access to the Internet shared with other computers in the local network of your service provider, turning it into more like a traditional network than a sophisticated service provider network. Each computer uses its own MAC to identify itself and the service provider's router gives an IP addre