HTML (Hypertext Markup Language)
HTML is one of the language that use for making the webpage:
From what I've learnt, the main rule that you have to remember in order to write the HTML script is that you have to be careful in every step.
HTML
Here is the simple language code
<HTML> </HTML> ..... always put in the initial of the writing and in the end
<Title> </Title>..... this code is when you have to make the title
<Head> </Head>...... use for writing the heading section
<Body> </Body>..... use for writing the body section
<table> </table>....use for writing the table
<td> </td> column
<tr> </tr> row
<Body bgcolor="#6digits/alphabet ofcolor code"> use for making the background in one color.
<a href="url"> </a> to make a link to the specified url or other pages
<center> </center> to put sth in the center
<div align="left/right"> </div> to make sth in the left hand side or right hand side
<IMG SRC="specific place"> to insert the image
<br> as same as click enter
<font face="font name"> </font> to change font style
<font size="+/-7"> </font> to change the font size
making a little space
there are a lot more interesting codes................
However, as I told you that writing the script need a lot of carefulness because if you miss only one letter or a slash(/) , the product from the written script will shows to a lot of mistakes and you have to rewrite it again, like me :(
Chapter 4 :: E-mail system
E-mail System
E mail must contain of 1) User ID (unique identifier) 2) Host (@hotmail.com...)
such as iluvtumblr@hotmail.com (iluvtumblr is the identifier(User ID) and @hotmail.com is the host name)
the benefits
1) Speed of delivery
2) Low cost
3) Accessibility
4) Convenience
Show how convenience it is by comparing between snail mail and e mail
Snailmail (aka traditional postal service): Contains of many many process in order to send each mail
:: SMTP (Simple Mail Transfer Protocol) mail transaction process
- Transaction initiation and sender identification
- Recipient identification
Types of mail service
POP (Post office Protocol)
1) handle all mail management function
2) The msg can be viewed only in one computer
3) Msgs are downloaded once you connected to a POP server.
IMAP (Internet Msg Access Protocol)
1) the msgs are read, composed , or marked as deleted in the client server
but the action are still take place on the server.
HTTP (Hypertext transfer protocol)
Available wherever there is the Internet access and the Web
This is the latest project from google called the google plus, click here to see more detail about it.
Warning of the day
Don’t put toothbrush near your razor. Ask Pee (Parisorn) why so.
he’s smart
You guys are so mean to him....
Academic journal on 10/6/2011
Yesterday, we had learnt about the email system. It is quite complicated somehow.
E-mail system...
-E-mail used to be one of the most popular online communication (approximately 58%)--> However, facebook are now the most popular communication social network website which use for communicate with others.
(Credibility) Source From: http://www.exacttarget.com/uploadedfiles/resources/SFF_DigitalMorning_Final.pdf)
*****************************************************************
-Most of e-mail that you received are something called spam (E-mail spam.
"One particularly nasty variant of email spam is sending spam to mailing lists (public or private email discussion forums.) Because many mailing lists limit activity to their subscribers, spammers will use automated tools to subscribe to as many mailing lists as possible, so that they can grab the lists of addresses, or use the mailing list as a direct target for their attacks."
(Credibility) Source From: http://spam.abuse.net/overview/whatisspam.shtml)
*****************************************************************
Advantages of e-mail Using
- High speed sending (when compare with sending via mail) (Remember: Snail mail VS e-mail :: sending similarly but different in speed)
- Low cost
-Easy to be accessed
- Very convenience
***************************************************************
Email address contains with two major part
- User ID
- Host name
- Name of the website
- Top Level Domain(TLD) (.com) such as @hotmail.com, <Somehow it can be the countrycode top level domain (@mahidol.ac.th)
(The User ID must be unique, no one can use the same User ID)
**(However, there is a question that "how about same user ID but with the different host name?, can it be used?") For instance, something@hotmail.com, something@gmail.com and something@yahoo.com
***************************************************************
E-mail client:: According to the handout,
The e-mail client is a program that use to
1) create and sent email message
2) Read save and Print e-mail message
3) Delete message
4) Create the folder in order to organize the messages
Obvious example of the E-mail clients are Mozzilla Thunderbird and MS Outlook
***************************************************************
E-mail Server
E-mail msgs are sent over the internet via
(i) The packet switching technology (Look at the Chapter 1 for more information)
(ii) TCP/IP to govern the communication
SMTP (Simple Mail Transfer Protocol) handles the mail transaction process
************************************************************
The Mail Transaction Process
(I) Transaction initiation and sender Identification
(i) The SMTP sender notify the SMTP server in order to start the initiation of the process
(ii) Senders provide the address of the msg's originator.
(II) Recipient (aka. Receiver) Identification
(i) Senders tell the receiver the email address of the intended (recipients) of the message.
(III) Mail transfering
(i) The sender transfer the receiver
(To sum up, the process is contained of 1) Sender identification 2) Receiver identification 3) Message transfer)
*************************************************************
E-mail servers
1) POP server (Post office Protocol)
- The client hold the mail management function
- Message can viewed only one computer
-All msgs are downloaded to the user once the user's computer connected to POP servers
2) IMAP server (Internet Message Access Protocol)
- The server hold the mail management function
- User can access with different computers
- Messages are marked as deleted, read and composed by the clients' computer. However, the action still take place on the server.
3) HTTP server (Hypertext transfer Protocol)
- Available wherever internet can be accessed
- Slow respond time
- can be accessed through web site.
****************************************************************
E-mail message contains of 1) To line 2)Carbon Copy line (CC line) 3) Blind Carbon Copy line (BCC line) 4) Subject line 5) Attachments line 6) Message Body 7) Signature
**************************************************************
Pros and Cons of e-mail
Pros
Popular use, Convenient, Send within high speed
Cons
Easy to forward, informal
**************************************************************
Etiquette for using e-mail
1) Use meaningful phrase (in order to get rid of being suspected as the spam either)
2) Greeting line should be contained
3) Message shopuld be brief and clear
4) Closing with the signature.
5) Try to avoid using the emoticons ( :), :P ) Use only at most one per sentence.
*************************************************************
In class assignment
Do and Don't for using e-mail in the workplace
Do
- Use appropriate word
- Use business word
- Put signature in the ending
- Include address
- Use full sentence
- Change protocol from http to https, in order to increasing the security.
- Change password frequently (every month)
- Choose appropriate browser such as IE but not google chrome
- Should delete your cookies every time.
- CC work to your companion.
- Checking for spam frequently.
- Save the draft many times
- Avoid the emoticons
- Avoid unclear words especially in the Subject line because it can make people suspect whether it is a spam message or not.
Should not do
- Do not use the same e-mail, you use on facebook.
- No rude word
- Do not mixing for private and public in the same e-mail account
- Do not send e-mail via facebook.
- Do not use easy password
- Do not spam your companion (Actually, not only your companions, but also others. In terms of moral and ethics)
- Do not sent the phishing or spam to your friend/ companions
- Do not click the suspected spam messages because it can spread to the computer and the account.
Academic Journal#2 2.6.2011
Plagiarism -- Plagiarism is the process to quote or using info. from the other source without giving credit to the source....
How to detect the plagiarism...
Writing style:: lower and higher than the ability
Formatting web style
Out of date cite
turnitin.com
Invisible web:: Some area of the web that can be accessed.
To be continued...........
Academic Journal
Citing::
Citing is like to give the credit to the source that you find
Quote:: must be within double quotation marks or indented
For more detail sccite.com/internet2e/ch3
There are 4 major citation format... APA CBE chicago and MLA
FOR INSTANCE::
http://www.longchamp.com
.............................................................................
MLA style
"Longchamp.com – The official Longchamp website." Longchamp.com – The official Longchamp website. N.p., n.d. Web. 2 June 2011. <http://www.longchamp.com/>.
APA style
Longchamp.com – The official Longchamp website. (n.d.). Longchamp.com – The official Longchamp website. Retrieved June 2, 2011, from http://www.longchamp.com/
Chicago style
"Longchamp.com – The official Longchamp website." Longchamp.com – The official Longchamp website. http://www.longchamp.com/ (accessed June 2, 2011).
CBE style
Longchamp.com – The official Longchamp website, n.d. Longchamp Paris. <http://www.longchamp.com>. Accessed June 2, 2011
-------------------------------------------------------------------------------
Pro and Cons of the Internet filtering or the internet censorship in Social terms.
Pro
Cons
Creditability in the country.
Could be used to discredit at the same time.
Not make the citizens in the country in chaos.
Citizens cannot realize the truth and they cannot prepare for what it will happen.
Easy for the government to govern the country, such as N.Korea.
It is not democratic, because everyone has rights to know.
Quality of citizens is better. For example, the government blog the porn websites.
Somehow citizens especially the juveniles to oppress, such as drugs, sex issues.
In the country that allowed people to access to the information It stills cannot expand in many areas, so it still continues to exist.
All in the class, academic journal 30/5/2011
1:: Google search
Today, we begin by studying how google works (Source: http://www.google.com/howgoogleworks/). Matt shows how google works amazingly, within approximately half a second, they screen many things, such as quality of web page, URL, index, spams, or even the advertisement which can search by using the program called spider. I think if all of you follow this link, it will acknowledge everyone either.
2:: Reviewing the last class (what most of you missed) You can review at the previous post
3:: Metasearch Engines
Today we learned about the comparing between search tools and metasearch engines.. It found that some search tools are better the metasearch engines. However, some case, they are opposite, For instance, Altavista and Metacrawler
4:: Advance Search
To brief the search result and specifiy to see what you really search, advance search is another alternative for you to make it more convenient. For instance, using the logic words, which are "and", "or", "not". For instance A and B, A or B, and A not B the A or B shows the highest number of results
There are online white and Yellow pages, which can show the phone numbers, some of them set it privately but some of them not
Some search engine site has the fee included, such as ChoiceTrust
5:: Ethical Issues in Internet Filtering
The Internet fltering or internet censorship is control or suppression of the publishing or accessing of information on the Internet (Source: http://en.wikipedia.org/wiki/Internet_censorship ). For instance, censoring the news aboput the coup de tat in Bangkok and Tsunamis in Phuket.
Make up class ## 2
Design and the functionality
- A first impression of the sight
-Spelling and Grammatical errors (It seems to be not reliable source isf the spelling and grammar error)
- Poor organization
- Broken links contained
(For more information (both previous journal and topic "Design and the functionality": http://www.muelearning.ic.mahidol.ac.th/file.php/310/handouts/3-Searching_the_Web.pdf)
** Check out the assignment **
We studies about the Directory::--For instance, yahoo directory
We studies about the Drilling down directory. Drilling down is the progress that you can specified the info. by choosing the given choices.
For example ::
If you want to find the programming language
Directory > Computers and Internet > Programming and Development > Languages
Then, we studies about the history of the search engine sites::
Mid 1990s :AltaVista
Recent : Google, ask.com, Bing
The Major search engine component
A Spider/Crawler/Bot ::A Program that browses the Web and automatically collect info.
Index:: It is as same as the Yellow Pages or the Index at the back of the book.
- Info is collected by bots is stored in a database on one or more server.
- Google &AltaVista contain the largest indexes involving several billion sites
Info. collected by Bots
-Page title
-URL
- Meta tag keywords (Bots read only) : a descriptive keywords coded into the page HTML
- Occurrence of keywords
-Full text searching
- Links within the page
- Number of relevancy of other pages that link to the page.
Make-up class## For those who skip classes
We learned about the objectivity for people who provide the information which are
- Whether the web page info. is fair.
- Whether any biased are started clearly.
- Whether the info. is skeewed toward commercial or political interests.
For instance about the nutritional supplements:: If it says that the this product is proved by scientific method, you cant believe it yet. Because it is not specified which method... It is kind of spinning word
Scope and Quality::
- Depth of coverage and the amount detail provided
Intended audience
-Children/Adults
-Professional/ Enthusiasts
(The curiosity is different.... the information is different)
Accurate
Research and References (These can make it more trust... However, some publish said that they site sth but actually, it is not)
-----> So, check the references everytime when you read sth in order to make sure that you are not fooled by them.
Up-to-Date:: Published and last updated date.
Compare several pages discussing the same topic-- For instance, finding the history of Pizza..
(To be continue...)
Recommended Site
This is the recommended site in order to help you understand the advance search and find it easier in google (Kind of instruction) http://www.google.co.th/support/websearch/bin/answer.py?answer=136861
Search Query # Academic Journal#2
Today, After we had quiz, We learned how to formulate the search query:: It is a question defining the information you seek (http://www.muelearning.ic.mahidol.ac.th/file.php/310/handouts/3-Searching_the_Web.pdf). It told us that the more number you specified, the less number of searching occurs. For instance, searching dog, golden retriever, Yellow Golden retriever. The number will lessen from 832 M --> 20M --> 2M
Moreover, it we put the quotation mark (Theoretically, it should be less than without the quotation mark). For instance, the word Grand Canyon National Park with and without quotation marks the difference occur. The number of the Grand Canyon national park was about 6M--> The "Grand canyon national park" is approximately 2M But, in some case, for instance, Golden Retriever is less than "Golden Retriever". The Golden retriever--20M but "Golden retriever" -- 22M (The search is from http://www.google.com)
The Advance search..
The advance search,, by using the symbol, such as hyphen, minus, plus, colon, which brings your search more accurately. For more information, you can search it in Advance search in google.
Evaluating the credibility of Search Resulrs
- Looking for accurate and/or useful information.
- Do not trust info. just because it is published on the internet
** Wikpedia is a good source of beggining to search, but it is not good for the ultimate search because the article was made by many people. Hence, we cannot trust 100% how reliable of the writers are.**
- Extra weight for the governmental and educational pages (top-level domain name is more reliable than others but doesn't mean 100% sure)
- Some domain is more reliable. For instance, .edu is better than .com in the point of view of academic research. For the normal search, .com is better than .edu because it is easily search.
The academic journal #1
Today, I've learnt about the searching on the internet. Although it iseems like it is very boring, It still useful for us. According to the post on facebook, it realizes that actually there are more sites than google, such as AOL search, wikipedia, bing.com, ask.com and so on. (http://www.google.co.th/search?hl=th&source=hp&biw=1259&bih=848&q=search+engine+sites&oq=search+engine+sites&aq=f&aqi=&aql=&gs_sm=e&gs_upl=2203l8906l0l19l19l0l7l7l0l328l1530l5.4.2.1, n.d.)
Moreover, we study about the evaluating the search tool. For instance, It is being easy to use, It returns search result quickly, It updates index continually, etc. (http://www.muelearning.ic.mahidol.ac.th/file.php/310/handouts/3-Searching_the_Web.pdf, now)
Now, I have to send the submission via muicelearning
Charlermange :) is rebirth in Medieval and Renaissance class lol
Gossip Girl