What is the distinctive feature of a WEB document? Distinctive features of a web document What are the distinctive features of a web document

Web document is an electronic document containing text, graphics and other data that is formatted taking into account the characteristics of receiving and transmitting information on the Internet. To create web documents, you can use ordinary text and graphic editors, but web editors that are used at a professional level are more effective.

The basis of web documents is hypertext – this is expanded text that includes additional elements, for example, illustrations, links, inserted objects. To place hypertext on the Internet, use the operation markings , which changes the presentation form of an electronic document by introducing special markup codes. The use of codes is subject to the rules of the text markup language. The use of markup is due to the fact that when transmitting on the Internet it is impossible to achieve absolute accuracy of reproduction of the document in its original form. In other words, the Internet does not preserve the original document formatting, so we can only talk about the functional markup of the document.

Viewing of marked electronic documents is carried out using browsers software, designed for working with web documents.

A web document presented on the Internet is called web page . Web pages related in content form website – a thematic web document that has its own network address, storage location and owner responsible for creating and maintaining the document. The materials presented on the site, or the content of the site, are called content .

In conditions of uncertainty.

In conditions of risk.

In conditions of complete certainty and information.

  1. What is the difference between neural network technologies and conventional expert systems?

Does not require analytical data processing.

They do not require programming, as they are customized to the user’s needs.

They do not require specifying priorities and restrictions.

  1. What types of neural network training do you know?

"Without a teacher."

+"With the teacher."

"With a student."

  1. What needs to be done so that the neural network can help form a solution:

Specify the withdrawal rules.

Teach with examples.

Provide formulas for calculations.

  1. What tools are used to form a decision under conditions of uncertainty?

Decision tree.

Inference tree.

Tree of goals.

  1. What tools are used to form a decision under conditions of certainty?

Inference tree.

Tree of goals.

Decision tree.

  1. What tools are used to form a decision under risk conditions?

Inference tree.

Decision tree.

Tree of goals.

  1. A set of hardware and software that allows computers to exchange data is:

Highway;

Computer network;

82. Global computer network is:

Information system with hyperlinks;

A set of local networks and computers located over long distances and connected via communication channels into a single system.

A set of host computers and file servers;

83. A set of computers connected by information transmission channels and located within the same room or building is called:

Global computer network;

Local computer network;

By email;

84. Configuration (topology) of local computer network, in which all workstations are connected to a file server, is called:

Annular;

Radial;

Tree-like;

85. Which of the following methods of connecting to the Internet provides the greatest opportunities for access to information resources:

Temporary access via telephone channels;

Permanent connection via fiber optic channel.

Permanent connection via a dedicated channel;

86. To store files intended for public access network users, used:

Host computer;

File server;

Client-server;

87. Network protocol- This:

Coordination of various processes over time;

A set of agreements on interactions in a computer network;

Rules for interpreting data transmitted over the network;

88. The exchange of information between computer networks in which different standards for presenting information (network protocols) operate is carried out using:

Email;

89. Transport protocol (TCP) provides:

Reception, transmission and delivery of one communication session;

Splitting files into IP packets during transmission and reassembling files during reception.

Delivery of information from the sending computer to the receiving computer;

90. Routing Protocol (IP) provides:

Splitting files into IP packets during transmission and assembling files during receiving;

Delivery of information from the sending computer to the receiving computer.

Saving mechanical and functional parameters physical connection on a computer network;

91. A computer connected to the Internet must have:

WEB page;

Home WEB page;

92. The modem provides:

Analog signal attenuation;

Conversion of binary code to analog signal and vice versa.

Exclusively converting analog signal to binary code;

93. Teleconference is:

Exchange of letters in global networks;

Information exchange system between computer network subscribers;

Service for receiving and transmitting files of any format;

94. Email(e-mail) allows you to send:

Exclusively text messages;

Messages and attached files.

www-pages;

95. An email subscriber's mailbox is:

Some area random access memory file server;

Part of the memory on the mail server's hard drive allocated for the user;

Part of the memory on the workstation's hard drive;

96. A distinctive feature of a Web document is:

Its compactness;

Lack of a strictly defined document presentation format.

The presence of hypertext links in it;

97. WEB pages have the extension:

98. HTML (HYPER TEXT MARKUP LANGUAGE) is:

Expert system;

A tool for creating WEB pages.

Graphic editor;

99. The threat of remote administration on a computer network means:

Threat of delivery of inappropriate content;

Threat of unauthorized control of a remote computer.

The threat of interception or substitution of data along transportation routes;

100. A computer that provides its resources to other computers when working together is called:

Adapter;

Server;

Station;

101. Network protocol is:

Rules for recording events;

A set of agreements on interactions in a computer network;

Rules for interpreting data transmitted over the network;

102. A set of hardware and software that allows computers to exchange data is:

Interface;

Computer network;

    The computers in your computer science classroom are networked. This network...

      1. Local

        Regional

        Global

    What device is needed to transmit data over telephone lines?

      1. Drive

        Modem

        Scanner

    A network printer is installed on one of the office computers. Will other students be able to use this printer from their own computers?

    Yes, if printer access is allowed

    Which type of access can be set for the My Documents folder on your computer so that other students in your office can use documents from this folder?

      1. Local

        Only for reading

        Full

5. The greatest opportunities for accessing information resources are provided by the method of connecting to the Internet:

a) terminal connection via a dial-up telephone channel;

b) remote access via telephone communication channels;

c) permanent connection via fiber optic channel;

d) permanent connection over a dedicated channel.

6. Computer telecommunications are:

a) connecting several computers into a single network;

b) transferring information from one computer to another using floppy disks;

c) remote data transfer from one computer to another;

d) exchange of information between users about the state of the computer;

7. The server is:

A) network program, which conducts a dialogue between one user and another;

b) a powerful computer to which other computers are connected;

c) an individual user’s computer connected to shared network;

d) a standard that defines the form of presentation and method of sending a message.

8. M Odem is:

a) a powerful computer to which other computers are connected;

b) a device that converts digital signals computer to analog telephone signal and vice versa;

c) a program that allows dialogue between several computers;

d) a personal computer used to receive and send correspondence.

9. Data transfer speed is:

a) the amount of information transmitted per second;

b) the number of bytes of information transmitted per minute;

c) the number of bytes of information transferred from one computer to another;

d) the number of bits of information transmitted through the modem per unit of time.

10. Addressing is:

a) a method for identifying subscribers on the network;

b) server address;

c) postal address of the network user;

d) the number of bauds (characters/sec) of information sent by your modem.

11. Local computer networks are:

a) a network to which all computers in your city are connected;

b) the network to which all computers in your country are connected;

c) the network to which the computers of your computer science classroom or one building are connected;

d) a network to which all computers are connected.

12. Network adapter is:

a) a special program through which several computers communicate;

b) special hardware for effective interaction personal computers networks;

c) a special system for managing public network resources;

d) a system for exchanging information between different computers.

13. Domain is:

a) part of the address that determines the address of the user’s computer on the network;

b) the name of the program for communication between computers;

c) the name of the device that communicates between computers;

d) unit of measurement of information.

14 . Which of the following methods of connecting to the Internet provides the greatest opportunities for accessing information resources:

a) permanent connection via fiber optic channel;

b) remote access via telephone channels;

c) permanent connection via a dedicated channel;

d) terminal connection via a dial-up telephone channel;

e) temporary access via telephone channels.

15. Information exchange between computer networks that have different standards for presenting information (network protocols) is carried out using:

a) host computers;

b) email;

c) gateways;

d) modems;

e) file servers.

16. P email subscriber's mailbox represent t by yourself:

a) ordinary Mailbox;

b) some area of ​​RAM of the file server;

c) part of the memory on the hard drive of the mail server allocated for the user;

d) part of the memory on the hard drive of the workstation;

e) special electronic device for storing text files.

17. A distinctive feature of a Web document is:

a) lack of a strictly defined document presentation format;

b) the fact that its replication is carried out by the originator of the document;

c) the presence of hypertext links in it;

d) the presence of illustrations;

d) its compactness.

18. A set of hardware and software that allows computers to exchange data is:

a) highway;

b) interface;

c) adapter;

d) computer network;

e) data buses.

19. Global computer network is:

a) information system with hyperlinks;

b) many computers connected by information transmission channels and located within the same room or building;

c) a set of host computers and file servers;

d) a system for exchanging information on a specific topic;

e) a set of local networks and computers located over long distances and connected via communication channels into a single system.

20. A set of computers connected by information transmission channels and located within the same room or building is called:

a) global computer network;

b) information system with hyperlinks;

c) local computer network;

d) email;

e) regional computer network.

21. Information resources include:

a) a set of documents on paper;

b) the entire set of individual documents, as well as all documents located in special repositories (libraries, video libraries, funds, archives);

c) all documents stored in archives;

d) books and other printed publications;

e) information stored on paper and magnetic media.

22. To store files intended for public access by network users, the following is used:

a) host computer;

b) file server;

V) work station;

d) client-server;

d) switch.

23. Network protocol is:

a) a set of agreements on interactions in a computer network;

b) sequential recording of events occurring on a computer network;

c) rules for interpreting data transmitted over the network;

d) p Rules for establishing communication between two computers and online;

e) coordination of various processes over time.

24. Activities aimed at collecting, storing, processing, transmitting and using information are called:

a) work activity;

b) sports activities;

c) information activities;

d) artistic activity;

d) scientific activities.

25. Transport protocol (TCP) provides:

a) splitting files into IP packets during transmission and assembling files during receiving;

b) reception, transmission and delivery of one communication session;

c) providing the user with already processed information;

d) delivery of information from the sending computer to the receiving computer;

e) collecting files from IP packets during file transfer.

26. Routing Protocol (IP) provides:

a) delivery of information from the sending computer to the receiving computer;

b) interpreting data and preparing it for the user level;

V) preservation of mechanical, functional parameters of physical communication in a computer network;

d) control of data transmission equipment and communication channels;

e) splitting files into IP packets during transmission and assembling files during receiving.

27. A computer connected to the Internet must have:

a) IP address;

b) WEB page;

c) home WEB page;

G) Domain name;

e) URL.

28. Electronic mail (e-mail) allows you to transmit:

a) messages and attached files;

b) exclusively text messages;

V) executable programs;

d) www pages;

e) exclusively databases.

29. WEB pages have the extension:

a) *.HTM;

b) *.THT;

c) *.WEB;

G) *. EXE;

d ) *. www.

30. HTML (HYPER TEXT MARKUP LANGUAGE) is

a) a means of creating WEB pages;

b) programming system;

V) graphic editor;

d) database management system;

d) expert system.

Test No. 6 “Informatization of society”

Answers:

Practical task.

Using any Internet search engines, find information on the following topics by option (at least 5 A4 pages):

    Application of the Internet.

    Computer of the future.

    Information society.

    Legal protection of programs and data.

    Information culture.

    Data protection.

    Classification and use of Websites.

    Internet services.

    Internet search engines.

    Application of computers in life.

Present the found information as text with the following parameters:

Font – Times New Roman.

Size – 14 Fri .

Margins – 2 cm.

Orientation – book.

Line spacing is one and a half.

Csave on your desktop under the name “Task3_Last Name” or send via local network to the teacher's computer.

A distinctive feature of the World environment Wide Web is the presence of means of transition from one document to another, thematically related to it, without explicitly indicating the address. Communication between documents is carried out using hypertext links (or simply hyperlinks). A hyperlink is a selected fragment of a document (text or illustration) with which the address of another Web document is associated. When you use a hyperlink (usually by pointing the mouse pointer over it and clicking once), the hyperlink is followed—the Web page that the link points to is opened. The hyperlink mechanism allows you to organize a thematic journey across the World Wide Web without using (or even knowing) the addresses of specific pages.

Addressing documents.

To record the addresses of Internet documents (Web pages), a form called a URL is used. The URL contains instructions for the application transfer protocol, the address of the computer, and the search path for the document on that computer. The computer address consists of several parts separated by dots, for example www.amik.ru. The parts of the address located on the right determine the network affiliation of the computer, and the left elements indicate a specific computer on this network. The conversion of a URL into the digital form of an IP address is carried out by the Domain Name Service (DNS). The slash character is always used as a delimiter in the search path of an Internet document.

Web Viewers.

Internet documents are designed to be displayed in electronic form, and the author of the document does not know what the capabilities of the computer on which the document will be displayed are. Therefore, the HTML language provides not so much document formatting as its description logical structure. Formatting and displaying a document on a specific computer is done special program– browser (from the English word browser).

Basic browser functions:

  • establishing a connection with the Web server on which the document is stored and downloading all components of the combined document;
  • tag interpretation HTML language, formatting and displaying a Web page in accordance with the capabilities of the computer on which the browser runs;
  • providing tools for displaying multimedia and other objects that are part of Web pages, as well as an extension mechanism that allows you to configure the program to work with new types of objects;
  • ensuring automation of Web page searches and simplifying access to previously visited Web pages;
  • Providing access to built-in or stand-alone tools for working with other Internet services.
  • Search engines.

    The Internet is growing at a very fast pace, and finding the necessary information among tens of millions of documents (web pages, files, etc.) is becoming increasingly difficult. To search for information, special search servers are used, which contain more or less complete, but constantly updated information about Web pages, files and other documents stored on tens of millions of Internet servers.

    Different search servers may use different search engines to find, store, and present information to the user. However, the common thing is that by the time the user makes a request, all information about Internet documents is stored in a compact form in the search server database.

    Available search engines can be divided into three groups:

  • Directories (thematic catalogues) Internet.
  • General purpose search engines (index).
  • Specialized search engines.
  • Internet Directory is analogous to a subject index in a library: it allows you to find the most significant WWW documents on a given topic. An example of such systems is the Yahoo search engine:

    http://www.yahoo.com

    General purpose search engines allow you to find documents on the WWW using keywords. The principle on which most of these systems are based is that special robot programs automatically bypass WWW servers, read and index all documents encountered, while highlighting keywords, related to a given document, and storing them along with the URL of that document in the database. Most search engines also allow the author of a new Web page to enter information into the database himself.

    By accessing such a search engine, we display one or more keywords that, in our opinion, could lead us to information of interest, and send the request with one click of the mouse to screen button, usually called Search (Submit). After a few seconds, the search engine will return us a list of URL documents in which the keywords we specified were found. An example of this search engine is Rambler:

    http://www.rambler.ru

    Specialized search engines allow us to find information on specific sciences, specializations, and areas of interest to you. An example of such a search engine is http://www.avatarsearch.com/. The AvatarSearch search engine is designed for people who are interested in issues of the occult and mysticism. Links to pages whose authors have been particularly successful in covering this topic receive a special insignia from the creators of this site.

    Fig.1 InterfaceRambler

    Since information on the Internet is constantly changing (new documents are created, old ones are deleted, etc.), search robots do not always have time to track all these changes. The information stored in the search engine database may differ from the actual state of the Internet, and therefore sometimes the user may receive a link to a document that no longer exists or has been moved.

    The interface of search engines is usually approximately the same, and

    Fig.2 Search results

    Therefore, let’s consider it using the example of the Russian search server RAMBLER ( http://www.rambler.ru).

    The search engine's home page contains a list of sections that specify the search area and a search field. In the search field, the user can enter keywords to search for a document, that is, words that, in the user's opinion, will identify the document.

    Let's set the task of finding information about computer science textbooks. However, before you enter keywords into the search field, it is advisable to narrow your search by selecting the Education category from the list of sections.

    We will select the following words as keywords: computer science, textbook, catalogue, and enter them into the search field. As a result, we will receive clearly redundant information, a list of almost 90 thousand documents, since the word computer science is contained in 519249 documents, the word textbook - in 885564 documents, and the word catalog - in 12622835.