Anda di halaman 1dari 21

What is Internet

is the global system of interconnected computer networks that


use the Internet protocol suite (TCP/IP) to link devices
worldwide. It is a network of networks that consists of private,
public, academic, business, and government networks of local to
global scope, linked by a broad array of electronic, wireless,
and optical networking technologies. The Internet carries a vast
range of information resources and services, such as the inter-
linked hypertext documents andapplications of the World Wide
Web (WWW), electronic mail, telephony, and file sharing.

How Does the Internet Work?

The Internet has one very simple job: to move computerized


information (known asdata) from one place to another. That's it!
The machines that make up the Internet treat all the information
they handle in exactly the same way. In this respect, the
Internet works a bit like the postal service. Letters are simply
passed from one place to another, no matter who they are from or
what messages they contain. The job of the mail service is to
move letters from place to place, not to worry about why people
are writing letters in the first place; the same applies to the
Internet.

Just like the mail service, the Internet's simplicity means it


can handle many different kinds of information helping people to
do many different jobs. It's not specialized to handle emails,
Web pages, chat messages, or anything else: all information is
handled equally and passed on in exactly the same way. Because
the Internet is so simply designed, people can easily use it to
run new "applications"—new things that run on top of the basic
computer network. That's why, when two European inventors
developed Skype, a way of making telephone calls over the Net,
they just had to write a program that could turn speech into
Internet data and back again. No-one had to rebuild the entire
Internet to make Skype possible.

What is the difference between the dial up connection and direct


connection?
The difference between a dial up connect and a direct connection
is that a dial up requires a connection from a phone line to a
PC and the data capacity is smaller. A direct connection can
transmit large amounts of data at higher speeds.
List some of the activities that You Can Do On The Internet
1. Shopping
Who isn’t aware of the word online shopping nowadays? It is
becoming prominent in our lives. The lifestyle is turning
towards sedentary habits and so is our style of shopping. Many
people choose scrolling a webpage for a product instead of
strolling the shops. Online shopping has a major advantage of
being accessible 24*7. Another advantage is discreet shopping.
There are certain items we hesitate to buy , but online shopping
being discreet makes it easy.
2. Intelligent Personal Assistants
Siri, a favorite thing of iphone users, is a highly developed
technological tool which is supported by internet. Ask Siri
about anything and the query gets analysed with the help of
voice recognition. It is processed further and looked up on
google and Siri provides results. Therefore, Siri is an
automated tool which works as knowledge navigator. Siri answers
questions, makes recommendations and performs actions. It was
introduced for iOS platform in year 2010.
3. Source of relaxation
In today’s rat race, we rarely have time for a sigh of relief.
There are certain websites which focus on accomplishing this
objective. These websites have soothing effect on mind and
therefore removes the stress. Various calming videos and
soundtracks with breath taking images provides the much needed
relaxation. These websites help you get a break and improve
productivity.
4. Entertainment
Internet is the hub of entertainment. Are you a music lover? You
can search and download any song from internet. Are you addicted
to movies? You can watch any movie online or download and watch
it later. Internet has a profound effect on entertainment. It
has changed the meaning of entertainment. Television series,
games, novels, movies, songs, articles and blogs are a part of
domain of entertainment. You can now see a live cricket match on
internet. Internet has provided Entertainment creators with
another avenue to explore.
5. Exploring the world
Internet is a blessing for travelers. People can read about
different places in the world. Not just this, Google Earth
allows you to visit places virtually. So, except a few places
which are prohibited on Google Earth, anybody can visit places
on this earth virtually. Although, this web service doesn’t
allow high level of magnification but provides a rough idea of
various places on this earth. Various videos are also available
which have been shot in difficult parts of world.
6. Blogging
Blogging refers to the act of writing about an event, situation
or a topic and publishing it on your own. If that’s a hit and
loved by people , you are appreciated. It is not just about
appreciation but money too. Moreover, it is critically examined
by various people. You get the feedback and get to know your
target traffic. A blog can also attract people, who would want
to invest in your blog and make it a big venture.
7. Job Hunt
Newspapers, flyers, recommendations, job boards and networking,
the traditional methods of searching a job have been now over
ruled by online hunt for jobs. By using the internet you can
apply for job opportunities across the globe. To find a job, you
need to be in right place at the right time and posting your
resume helps you achieve this objective. The best part is you
can choose from various options available as most of the
websites filter the opportunities and display the ones which
suit you best. This method is also faster than traditional
methods.
8. Online booking
Gone are the days when people used to go to train station in
order to book a ticket, now is the era of online booking. Sit
back and reserve tickets while sipping a cup of tea instead of
waiting in long queues. Movies, hotels, concerts, exhibitions,
railways and airlines, tickets of everything is available
online. The biggest advantage of online reservation is its 24*7
accessibility to every customer. It also minimizes the burden of
employees. Moreover, a customer can also compare prices and buy
the best.
9. Research
World Wide Web is something every modern student turns to while
researching. Internet research is a practice of looking out for
facts and information on a particular topic but in context to
different cultures and countries. It is more advantageous than
researching in a library as you can get references from
different parts of world on internet. Internet is a tremendous
resource, but must be used carefully and critically. Before
researching we should know to determine the credibility and
reliability of source.
10. Communication
Be it a neighbor living across the door or a friend living
beyond continents, internet can bring people together and form a
strong link in communication. Messages, e-mails, e-cards, voice
calls, video calls are various roads that connect people all
around the world with the help of internet. Not just this, the
whole lot of social networking websites help us to have a
glimpse of important events occurring in the lives of important
people. Conferences can also be conducted using the internet.
Chat rooms and group discussions are other methods of
communicating via internet.
11. Financial Transactions
E- commerce, an amazing service has become popular in many parts
of world now. E- commerce stands for a type of business model
which involves online transactions. It can be thought of as a
more advanced form of mail order purchasing through a catalog.
Books, grocery, clothes and footwear, everything can be bought
and online transactions can be made to lessen the hassle. It is
a method of efficient distribution of products and services.
12. Education
Who says having books is necessary in order to gain knowledge?
With the advent of technology, we can quench our thirst of
knowledge using the internet too. Soft copy of many books are
available, you can read them online. There are various
educational websites which make learning a fun activity. Such
websites are available for all, from preschoolers to doctorates.
Distant courses can also be taken up. We can gain knowledge and
experience from others by reading blogs. By participating in
chat-rooms, one can share ideas, seek solutions and also learn
about many diverse cultures out there. A teacher can teach
multiple students living in different places at the same time
using internet. Internet is a boon for parents too, as they can
monitor their child’s activities in school while doing their
work at home or office.
What are the different protocols available on the internet?

Different protocols often describe different aspects of a single


communication; taken together, these form a protocol stack. The
terms "protocol" and "protocol stack" also refer to the software
that implements a protocol.
Most recent protocols are assigned by the IETF for internet
communications, and the IEEE, or the ISO organizations for other
types. The ITU-T handles telecommunications protocols and
formats.
Index page for network protocols and protocol layers,
categorised by the nearest matching layers of the OSI seven
layer model.
Systems engineering principles have been applied to design
network protocols.
Common Internet protocols

Common Internet protocols include TCP/IP (Transmission Control


Protocol/Internet Protocol), UDP/IP (User Datagram
Protocol/Internet Protocol), HTTP (HyperText Transfer Protocol)
and FTP (File Transfer Protocol).
TCP/IP
TCP/IP is a stream protocol. This means that a connection
is negiotated between a client and a server. Any data
transmitted between these two endpoints is guaranteed to
arrive, thus it is a so-called lossless protocol. Since the
TCP protocol (as it is also refered to in short form) can
only connect two endpoints, it is also called a peer-to-
peer protocol.
HTTP
HTTP is the protocol used to transmit all data present on
the World Wide Web. This includes text, multimedia and
graphics. It is the protocol used to transmit HTML, the
language that makes all the fancy decorations in your
browser. It works upon TCP/IP.
FTP
FTP is the protocol used to transmit files between
computers connected to each other by a TCP/IP network, such
as the Internet.

What is TCP/IP and how does it work?

The Internet works by using a protocol called TCP/IP, or


Transmission Control Protocol/Internet Protocol. TCP/IP is the
underlying communication language of the Internet. In base
terms, TCP/IP allows one computer to talk to another computer
via the Internet through compiling packets of data and sending
them to right location.

Defining TCP

As indicated in the name, there are two layers to TCP/IP. The


top layer, TCP, is responsible for taking large amounts of data,
compiling it into packets and sending them on their way to be
received by a fellow TCP layer, which turns the packets into
useful information/data.

Defining IP

The bottom layer, IP, is the locational aspect of the pair


allowing the packets of information to be sent and received to
the correct location. If you think about IP in terms of a map,
the IP layer serves as the packet GPS to find the correct
destination. Much like a car driving on a highway, each packet
passes through a gateway computer (signs on the road), which
serve to forward the packets to the right destination.

What is HTTP and how does it work

HTTP is a connectionless text based protocol. Clients (web


browsers) send requests to web servers for web elements such as
web pages and images. After the request is serviced by a server,
the connection between client and server across the Internet is
disconnected. A new connection must be made for each request.
Most protocols are connection oriented. This means that the two
computers communicating with each other keep the connection open
over the Internet. HTTP does not however. Before an HTTP request
can be made by a client, a new connection must be made to the
server.

What is FTP and how does it work?

File Transfer Protocol


Is a standard network protocol used for the transfer of
computer files between a client and server on a computer
network.
FTP is built on a client-server model architecture and uses
separate control and data connections between the client and the
server.[1] FTP users may authenticate themselves with a clear-
text sign-in protocol, normally in the form of a username and
password, but can connect anonymously if the server is
configured to allow it. For secure transmission that protects
the username and password, and encrypts the content, FTP is
often secured with SSL/TLS (FTPS) or replaced with SSH File
Transfer Protocol (SFTP).
How does File Transfer Protocol Work?

When files are transferred through FTP, one of two actions is


happening – uploading or downloading. Uploading involves
transferring files from a personal computer to a server.
Downloading involves transferring a file from a server to a
personal computer. FTP uses TCP/IP (Transmission Control
Protocol/Internet Protocol) to transfer your files. TCP/IP is
basically the language that the Internet uses to carry out
commands.

If you are going to use File Transfer Protocol in order to


download files, you should keep security concerns in mind. Files
downloaded from the Internet may have viruses that can harm your
computer.

One way to use FTP is to go through an FTP client. FTP clients


may make it safer for your computer to download/upload files and
help you avoid malware and viruses. Some FTP clients are pricey,
while some are completely free. Using an FTP client is not a
Necessary step for transferring folders, but it may make
uploading and downloading files easier to do.

How are addresses defined on the internet?

The IP address is the core component on which the networking


architecture is built; no network exists without it. An IP
address is a logical address that is used to uniquely identify
every node in the network. Because IP addresses are logical,
they can change. They are similar to addresses in a town or city
because the IP address gives the network node an address so that
it can communicate with other nodes or networks, just like mail
is sent to friends and relatives.

The numerals in an IP address are divided into 2 parts:

 The network part specifies which networks this address


belongs to and
 The host part further pinpoints the exact location.

What is URL
Uniform Resource Locator (URL), colloquially termed a web
address,[1] is a reference to a web resource that specifies its
location on acomputer network and a mechanism for retrieving it.
A URL is a specific type of Uniform Resource
Identifier (URI),[2] although many people use the two terms
interchangeably.[3][a] URLs occur most commonly to reference web
pages (http), but are also used for file transfer (ftp), email
(mailto), database access (JDBC), and many other applications.

What is a domain name and how is it different from a IP


address?
A domain name is your website name. A domain name is the address
where Internet users can access your website. A domain name is
used for finding and identifying computers on the Internet.
Computers use IP addresses, which are a series of number.
However, it is difficult for humans to remember strings of
numbers. Because of this, domain names were developed and used
to identify entities on the Internet rather than using IP
addresses.

An Internet Protocol, or IP, address is different than a domain


name. The IP address is an actual set of numerical instructions.
It communicates exact information about the address in a way
that is useful to the computer but makes no sense to humans. The
domain name functions as a link to the IP address. Links do not
contain actual information, but they do point to the place where
the IP address information resides. It is convenient to think of
IP addresses as the actual code and the domain name as a
nickname for that code. A typical IP address looks like a string
of numbers. It could be 232.17.43.22, for example. However,
humans cannot understand or use that code. To summarize, the
domain name is a part of the URL, which points to the IP
address.

WHAT IS THE DIFFERENCE BETWEEN GOPHER AND WIAS?

Gopher is a menu-driven text-based tool for browsing through


files and directories across the Internet. When a user selects a
Gopher menu item, Gopher retrieves the specified file and
displays it appropriately. This means that if a file is
compressed, Gopher automatically uncompresses it; if it's a GIF
image, Gopher automatically runs a GIF viewer. Standalone Gopher
clients are now rare, but many web browsers support the Gopher
protocol, and Gopher servers can be an efficient way of
providing access to non-HTML documents for users of web
browsers. A Gopher server is provided as part of Microsoft's
Internet Information Server (IIS) while the WAIS indexes large
text databases so that they can be searched efficiently by
simple keywords or more complicated Boolean expressions. For
example, you can ask for all the documents that mention
"firewalls" or all the documents that mention "firewalls" but
don't mention "fire marshals". (You might do this to make sure
you don't get documents about literal firewalls.) WAIS was
originally developed at Thinking Machines as a prototype
information service and, for a while, was widely used on the
Internet for things like mailing list archives and catalogs of
various text-based information (library card catalogs, for
example). It is now much more common for people to provide
search engines on web pages using CGI, instead of using WAIS
directly as an access protocol. Some web browsers will speak the
WAIS protocol, but WAIS servers are quite rare these days.

What is Telnet
Telnet is a protocol used on the Internet or local area
network to provide a bidirectional interactive text-oriented
communication facility using a virtual terminal connection. User
data is interspersed in-band with Telnet control information in
an 8-bit byte oriented data connection over theTransmission
Control Protocol (TCP).

WHY IS A WEB BROWSER SUCH AS INTERNET EXPLORER OR LYNX


NECESSARY FOR THE INTERNET?

Because Lynx does not support graphics, web bugs that track user
information are not fetched; therefore, web pages can be read
without the privacy concerns of graphic web browsers.[10] However,
Lynx does support HTTP cookies,[6] which can also be used to
track user information. Lynx therefore supports
cookie whitelisting and blacklisting, or alternatively cookie
support can be disabled permanently.

Describe the World Wide Web. How is it different from the


internet?

The Web is just one of the ways that information can be


disseminated over the Internet. The Internet, not the Web, is
also used for email, which relies on SMTP, Usenet news
groups, instant messaging and FTP. So the Web is just a portion
of the Internet, albeit a large portion, but the two terms are
not synonymous and should not be confused.

What is a browser and how does it work?

The World Wide Web is a system of Internet servers that support


specially formatted documents. Web browsers are used to make it
easy to access the World Wide Web. Browsers are able to
displayWeb pages largely in part to an underlying
Web protocol called HyperText Transfer Protocol (HTTP). HTTP
defines how messages are formatted and transmitted, and what
actions Web servers and browsers should take in response to
various commands. It is what allows Web clients and Web servers
to communicate with each other. When you enter a Web address
(URL) in your browser, this actually sends an HTTP command to
the Web server directing it to fetch and transmit the requested
Web page and display the information in your browser. All Web
servers serving Web sites and pages support the HTTP protocol.
Example: The URL to reach the definition of browser on Webopedia
is: http://www.webopedia.com/browser.html

What is the difference between Netscape and Lynx?

Lynx is a text based browser. Lynx uses the keyboard and “Arrow”
keys for interaction. Lynx is used to login remotely. Netscape
is a browser that uses a graphical interface to displays text
and pictures. Netscape uses the keyboard and mouse for
interaction. Go to Miscellaneous question index.

What are helper applications and why are they important?

A helper application is an external viewer program launched to


display content retrieved using a web browser. Some examples
includeJPEGview, Windows Media Player, QuickTime Player, Real
Player and Adobe Reader. Unlike a plugin whose full code is
included into the browser's address space, a helper application
is a standard application, typically an image viewer or similar
type lacking full save functionality.
The use of helper applications was more common in the early days
of the World Wide Web, when HTML and file formats were still
becoming standardized and computers were less powerful. Users of
a slower computer could configure their browser to hand off all
images using a helper application, which would cause the browser
to display a standard icon as a placeholder. The user could
click the icon only for images they wished to view, thus saving
time and bandwidth. In addition, it was considered important for
early browsers to be able to keep an image illustrating a figure
or graph on screen while scrolling through a long scientific
paper and having the image displayed in an external window while
the browser window was scrolled allowed that.

What is HTML and what is its importance?

HTML is the acronym for Hyper Text Markup Language. It is a form


of programming language that is used to make web pages on the
internet viewable. So it can be said that it is because of HTML
that web pages are interesting to look at, but the importance of
HTML is often taken for granted.

Prior to the introduction of HTML, the designing of a web page


was limited to a notepad and the use of your imagination. As
there were no HTML editors, web developers had to learn a coding
language by going to school, which was a rather tedious and
lengthy procedure. The first HTML editor was Nexus, which was
written by Tim Berners Lee in Object C. However, when compared
to todays standards of HTML, Nexus is considered rather
primitive.
With the introduction of HTML code, there was no need to type in
HTML from scratch. Since then, many HTML editors have emerged,
and the most popular ones today are Front Page and Dreamweaver.
Though these editors have their pros and cons, they are both
very efficient when it comes to HTML coding

Why is it important to learn HTML? Although HTML editors are


supposed to do the necessary HTML coding, you have to remember
that that they are not perfect and can make mistakes. This is
the main reason why you have to learn HTML. You have to make
adjustments when the HTML editors put in unnecessary codes and
do your own HTML coding in case they crash. Sometimes, you may
also face situations where the editor does not provide what you
seek. When this happens, you can work to reach your desired
solutions if you know HTML.

What are web indexes and search engines?

Web indexing (or Internet indexing) refers to various methods


for indexing the contents of a website or of the Internet as a
whole. Individual websites or intranets may use a back-of-the-
book index, while search engines usually use keywords
and metadata to provide a more useful vocabulary for Internet or
onsite searching. With the increase in the number
of periodicals that have articles online, web indexing is also
becoming important for periodical websites.

Search engine indexing collects, parses, and stores data to


facilitate fast and accurate information retrieval. Index design
incorporates interdisciplinary concepts from linguistics,
cognitive psychology, mathematics, informatics, and computer
science. An alternate name for the process in the context
of search engines designed to find web pages on the Internet
is web indexing.

What is IRC and how does it work?

Internet Relay Chat (IRC) is an application layer protocol that


facilitates communication in the form of text. The chat process
works on a client/server networking model. IRC clients are
computer programs that users can install on their system or web
based applications running either locally in the browser or on
3rd party server. These clients communicate with chat servers to
transfer messages to other clients.[1] IRC is mainly designed
for group communication in discussion forums,
called channels,[2] but also allows one-on-one communication
via private messages[3] as well aschat and data
transfer,[4] including file sharing.
Client software is available for every major operating system
that supports Internet access.[6] As of April 2011, the top 100
IRC networks served more than half a million users at a
time,[7] with hundreds of thousands of channels[7] operating on a
total of roughly 1,500 servers[7] out of roughly 3,200 servers
worldwide.[8] IRC usage has been declining steadily since 2003,
losing 60% of its users (from 1 million to about 400,000 in
2012) and half of its channels (from half a million in 2003).
What is an e-mail?
Electronic mail (email or e-mail) is a method of exchanging
messages ("mail") between people using electronic devices.
Invented by Ray Tomlinson, email first entered limited use in
the 1960s and by the mid-1970s had taken the form now recognized
as email. Email operates across computer networks, which today
is primarily the Internet. Some early email systems required the
author and the recipient to both be online at the same time, in
common with instant messaging. Today's email systems are based
on a store-and-forward model. Email servers accept, forward,
deliver, and store messages. Neither the users nor their
computers are required to be online simultaneously; they need to
connect only briefly, typically to a mail server or
a webmail interface, for as long as it takes to send or receive
messages.
How does an e-mail work?

An email server is the physical device that stores, organizes,


and transfers emails from one user to another. Email servers are
critical to the entire email system. On its most basic level,
the email server is just a large hard drive or computer that has
been specifically setup to handle emails for millions of users
simultaneously. Of course, email hosting companies do not use
just one email server for their entire system but instead use
hundreds or even thousands of email servers that all connect to
each other to transfer emails from one person to another.

Why use an email?

Because it have these uses and professionally it is been used


through business people for their own products like in simple
words it is been called email marketing.

How private is your email?

Email is very private, however, it is possible that a system


administrator at the company hosting your email could
potentially read your mail. In addition, email moves through the
Internet on servers controlled by thousands of government,
education and private sector organizations. It is possible,
though unlikely, that a system administrator somewhere in that
path could capture and read email. It would be difficult and
random, as individual emails move across the Internet in
different paths. These servers are secure and maintained by IT
professionals, so it would be highly unusual for an individual
email to be read. Nonetheless, abuses have been known to happen.
Structure of an Email

An email has three basic parts. The first is the header, a set
of lines containing information about the message's
transportation, such as the sender's address, the recipient's
address, or timestamps showing when the message was sent by
intermediary servers to the transport agents (MTAs), which act
as a mail sorting office. The header begins with theFrom line
and is changed each time it passes through an intermediary
server. Using headers, you can see the exact path taken by the
email and how long it took each server to process.

The message itself, made up of the two following elements:


the header fields, a set of lines describing the message's
settings, such as the sender, the recipient, the date, etc.

An email includes at least the three following headers: From,


showing the sender's email address; To, showing the recipient's
email address; and Date, showing the date when the email was
sent.

It may contain the following optional fields: Received, showing


various information about the intermediary servers and the date
when the message was processed; <bold>Reply-To, showing a reply
address; subject showing the message's subject; message-ID,
showing a unique identification for the message; or the message
body, containing the message, separated from the header by a
line break.

How will you compose, reply and forward an email message?

To compose a message:

 Click the New Mail icon in the Quick Actions menu in the
upper-left corner of the Convergence UI, or
 Click Write in the Messages section of the Convergence UI.

The Compose tab consists of the following parts:

 Toolbar menu

The toolbar menu contains the following icons:

 Send: Sends the message to the respective recipients.


 Attach: Attaches a file to the message.
 Save: Saves the message as a draft which you can refer
later.
 Bcc: Enables you to send a blind copy of the message
to recipients.
 Options: Enables you to add more features to your
messages.
 Cancel: Closes the current tab and returns to the
Messages view.
 From: This field contains a drop-down list with all the
configured sender profiles you have for this account. This
field is not displayed if you have not configured external
POP accounts. This list includes the name followed by the
email address of each configured external account.
Convergence enables you to collect email from other POP
accounts in addition to the default account.

This feature enables you to receive, send, reply, or


forward email from or to other email accounts that support
POP access. To know more about how to set up external
accounts in Convergence.

 To and Cc fields to include receivers email addresses.


 Subject field.
 Message format menu bar.

To compose and send a new message:

1. Click the Write icon on the center panel to display the


Compose tab.

The Compose tab contains the To, Cc and Subject fields.

2. Enter the email addresses of the recipients who should


receive your message in the To field. Use a comma to
separate multiple addresses.

Alternatively, click the Address Book icon next to the To


field to select the email address. To send a copy to a
recipient, enter the email addresses in the Cc field or
click the Address Book icon next to the Cc field to select
email addresses.

Convergence provides an address book auto completion


feature. This feature needs to be enabled at the back-end
Convergence server. When enabled, enter the first few
characters of the display name of the recipient. The list
of entries that closely match the entered characters from
the Address Book appear in a drop-down list.

3. To send a blind copy to a recipient, click the Bcc icon.


Optionally, click the Address Book icon next to the Bcc
field to select email addresses from the saved list.

The Bcc field appears. Enter the email address in


the Bcc field.

4. Enter the subject of your message in the Subject field.


5. Click the Options icon in the top toolbar.

The expanded message icons are shown.

6. From the priority drop-down list, select the required


priority.

The priorities are Normal, Urgent, and Low. By default, the


messages are sent with normal priority.

7. From the Receipt drop-down list, select an option.


what are the advantages of using address book, signature and
file attachment facility?

Advantages
 Emails are delivered extremely fast when compared to traditional
post.
 Emails can be sent 24 hours a day, 365 days a year.
 Webmail means emails can be sent and received from any computer,
anywhere in the world, that has an Internet connection.
 Cheap - when using broadband, each email sent is effectively
free. Dial-upusers are charged at local call rates but it only
takes a few seconds (for conventional email, eg text only) to
send an email.
 Emails can be sent to one person or several people.

What are emoticons and why and where they are used

Emoticons are ASCII glyphs originally designed to show an


emotional state in plain text messages. Over time they have
turned into an art form as well. In most cases, emoticons are
constructed to be viewed by tilting your head left so the right
side of the emoticon is at the bottom of the “picture.” These
simple emoticons have, over time, merged with artwork produced
as ASCII characters. This site does not catalog that. If
interested, perform a Google search on the term “ASCII art” and
you should find multiple sites that host such collections.

 Basic smiley face; used for humor and sometimes sarcasm

 Basic frowney face; used for sadness or anger

 Half-smiley or winkey face; more often used for sarcasm


 :-/ Wry face; used for wry humor

What are free email providers

1. Gmail

Gmail is arguably the best free email service provider at the


moment. Gmail is simple and user-friendly. It offers over 10GB
of free storage, has excellent spam filter and enables access
via mobile devices. Its built-in chat allows voice and video
chat as well the regular chatting by text. It offers search
capability to find lost or old messages. Also, Gmail messages
are grouped nicely with relevant replies such that you can read
messages in the context.
2. Zoho Mail

Zoho mail is aimed at professionals. It features calendar, task


manager, notes and instant chat as well as other business app
found in Google apps for business. It is easy to set up and
manage. Impressively, Zoho mail does not display adds to protect
your privacy. Email messages are not even scanned for keywords
for the purpose of marketing.

3. Outlook.com (Reinvented Hotmail)

Outlook.com is the new, reinvented Hotmail.com email service. It


builds off the power of Outlook on PCs and Macs, and it features
more tidy user interface without display ads. It is built based
on the latest trends in Internet communication.

4. Mail.com

Mail.com offers most of the important email features that you


might be thinking about. Most importantly, you can select the
email domain name that will suit you best from over 200 domain
names e.g. yourname@consultant.com, yourname@journalist.com,
yourname@engineer.com, yourname@lawyer.com,
yourname@cheerful.com, yourname@contractor.com and so on.
However, the default one is yourname@mail.com.

5. Yahoo! Mail

The new Yahoo! mail stands among the best free email services
available on the web and mobile devices. They offer unlimited
email storage, social networking, instant messaging and SMS
texting.
6. GMX

GMX is not so popular, but it offers quite reliable email


service. Spams and viruses are well filtered . It provides
unlimited email storage and allows up to 50MB of attachment. You
can manage all your email accounts using their email collector.
You can manage your emails on the web and mobile.

7. Fastmail

You should also consider using FastMail. They have been online
for 10 years now. They boast of reliable junk mail protection,
temporary secure SMS passwords, web folders for photos and files
and much more. Their free or guest plan offers 25MB email
storage, IMAP and 120 days inactivity time

8. Hushmail

Hushmail is another lovely email service you should put into


consideration. They allow up to 25MB of free storage on their
free account. It is well integrated with Android, BlackBerry,
iPhone and other mobile devices. You can also integrate outlook
to your Hushmail.

9. Inbox.com

Inbox.com provides 5GB free storage space for your emails. You
can easily change the layout of your inbox with their drag n
drop tool. You can also select RSS feeds that suits your need.

10. ShortMail (Discontinued)

Think of Shortmail as your private Twitter account. All emails


are limited to 500 characters, and attachments are not allowed.
Messages are expected to be concise for faster, more effective
communication. It works on iPhone, Android and other mobile
apps.

What are free email providers? Name a few.

1. Gmail
2. Outlook
3. Yahoo Mail
4. ProtonMail
5. Zoho

What are free email forwarding service? Name a few organization.


1. Mailgun

If you use a transactional email service provider such


as Mailgun, they also have the ability to setup mail forwarding
and routing rules. This is personally what I use for all of my
email forwarding.
2. Pobox

Pobox is by far my favorite premium email forwarding


service. $34 a year and you can create as many aliases as you
want on all of your domains and then forward the emails to your
primary Google email account.
3. ForwardMX

ForwardMX is a great cheap solution. For example, perhaps you


don’t have that many domains but still need more functionality
than other free tools. ForwardMX has great smaller plans,
starting at $9/year for 5 domains.
4. ImprovMX

ImprovMX is 100% free and great for smaller projects. Simply


point your MX records and forwarding everything from one domain
to any email address you want.

What are an email reminder service?

Google Calendar, Twitter, Google Gears, MilkSync for


BlackBerry
What are mailing lists and how do they work?

Configurable Rules

Most mailing list rules are configured in the List Type through
a combination of options available in the ezmlm-make argument
string and the ezmlmrc rules file. These are extended by list-
level options that control Web availability, Web archives and
Subscriber Lists. Since all Kavi Mailing List Manager lists use
the same default ezmlmrc file, the help focuses on the ezmlm-
make arguments. The only reason you need to be aware of the
ezmlmrc file is that your organization may have a custom List
Type that uses a custom ezmlmrc file, although this is not
common. If you are managing or troubleshooting a mailing list
based on a List Type with a custom ezmlmrc file, the behavior
described in the help won't necessarily apply. Consult the List
Type description for an explanation of the behavioral
differences.

Multiple Mailboxes

Mailing lists use multiple mailboxes so that messages can be


filtered into different mailboxes and stored or processed rather
than simply forwarded. For example, when a message is posted to
the mailing list it is forwarded to all subscribers, but if the
digest feature is enabled, the message is also sent to a digest
mailbox where it is eventually processed into a digest and sent
to addresses on the Digest Subscriber List.

Multiple Subscriber Lists

Unlike an alias, a mailing list can have several different kinds


of Subscriber Lists, and apply different rules when it receives
an email message depending on which of the Subscriber Lists
the envelope sender's address appears upon (e.g., Regular
Subscriber, Digest Subscriber, Moderator, Allow or Deny). So in
the previous example, when a message is posted it is immediately
sent to the email addresses on the Regular Subscriber List. When
the digest is ready to send out, it is sent to the addresses on
the Digest Subscriber List. See the Concepts document Subscriber
Lists for more information.

Incoming Message Processing

Since the primary task of a mailing list is to receive email


messages and forward them to subscribers, many of the
configurable rules govern the message posting process. The main
mailing list mailbox is the one that receives messages submitted
for posting. When the mailing list receives a message at this
address it takes the appropriate action based on its configured
posting rules, possibly factoring in which Subscriber List the
sender's address is on. Posting rules and other configuration
settings determine how the message is then routed. For instance,
if this is a moderated mailing list, the message may be sent to
the moderation queue. For more information on posting rules, see
the Concepts document Access Control and Posting Access in the
Appendix.

Mailing lists can do more than filter and post email messages.
Users can send an email message to a specific email command
address to subscribe or unsubscribe, change their subscription
type or retrieve archives. As with posting access, access to
email commands is governed by configurable rules that may be
applied according to the user's Subscriber Level. For more
information, see the Concepts document Email Commands.

Forwarding and Generation of Outgoing Messages

Besides forwarding posted messages to subscribers, mailing lists


can send messages in response to email commands, send moderation
messages to moderators and as part of the automated bounce
handling process. These messages are described in more detail
in Bounces and Automated Bounce Handling and Mailing List
Moderation. These standard ezmlm messages use default text that
can be customized through the Super Admin tool Edit Mailing List
Text.

what are the major newsgroup classification

1. Extracting features from text files.


Text files are actually series of words (ordered). In order to
run machine learning algorithms we need to convert the text files
into numerical feature vectors.

2. Loading the data set in jupyter.


The data set will be using for this example is the famous “20
Newsgoup” data set. About the data from the original website:

3. Prerequisite and setting up the environment


The prerequisites to follow this example are python
version 2.7.3 and jupyter notebook. You can just
install anaconda and it will get everything for you
In partial fulfilment
Of the requirements

Bachelor of Science
In Agriculture

Submitted by:
Ambillay, Ivy A.

Submitted to:
Mrs. Viernes Lety

July 26, 2018

Anda mungkin juga menyukai