Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

The World Wide Web (WWW or W3) 

The WWW is the multimedia part of the Internet displaying a hyper text type of structure and search facilities. It was first developed for sharing documents between the nuclear physicists of the European Particle Physics Laboratory (CERN) in Switzerland in 1989, but the first commercial Web Software by Next in 1991, popularised this form of access to the Internet. The main characteristics of the WWW organisation and structure are: 

  1. Organising documents into pieces of information (pages) using a set of rules which tag and format the documents, The Hypertext Mark up Language (HTML).
  2. Every individual document or page is assigned a unique address, called Uniform Resource Locator (URL). 
  3. Each URL can be linked with a hypertext type link to other URLs and even pieces of information within each document (buttons) can be linked to URLs to other pieces of information. 
  4. These documents can be searched through interactive interface programs which allow users to browse and navigate through the documents and are called Web browsers. 

The communication between The Web browsers and the Web servers is regulated by a common language using a standardised set of rules called Hypertext Transfer Protocol (HTTP). The H'I'I"P allows the interpretation of the HTML signs within each Web page in order to display correctly the page and to enable the transfer of files. A client programme or Web browser provides the user with control over the retrieval process and also over the links to be activated. 

It is to be noted that individuals and organisations create home pages ,to present their own information or services. A collection of home pages located on the same server is called a Web site. Access to these pages is via the uniform Resource Locator (URL) using a browser. Some examples of browsers are Lynx, Netscape, etc. these addresses link the user to the host computer and their individual files, these are then displayed on the user's terminal (workstation). With the help of appropriate software users can read documents, view pictures, listen to sound, and retrieve information. 

The hypertext structure of the Web means that retrieval is done through following the links between different web pages through browsing and navigation. In indexing terms, the hyperlinks on the WWW that form the basis of the browsing network are uncontrolled but humanly assigned indexing terms. There is no general control over which terms should be used as hyperlinks, but each hyperlink is individually coded by the creator of HTML (Hypertext Markup Language). It may be mentioned here that though browsers encourage movement through a network of linked documents, browsing is not an efficient approach to the identification of specific information. Different search tools have been devised in order to assist people in finding information on the largest repository of documents in the world. These search tools can be divided into two main categories: 'subject directories' and 'search engines.' 

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M9513383

Have any Question?


Related Questions in Management Information System

Q1 explain identification and assessment of emerging

Q1. Explain identification and assessment of emerging technologies? (APA format required, Turntin check required. Minimum 250 words essay) Q2. What criteria are used to rank current and emerging technology to get the bes ...

Managing services and securitytaskyour job in this

Managing Services and Security Task Your job in this assignment is to create two Virtual machines each running a different but the latest distribution of Linux e.g. Ubuntu Server and CentOS. Each of these VM's is to offe ...

Discussion 1security countermeasures and strategic

Discussion 1. "Security Countermeasures and Strategic Governance" Please respond to the following: • Recommend three countermeasures that could enhance the information security measures of an enterprise. Justify your rec ...

Instructionsrecently a terminated employee used his mobile

Instructions Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your ...

Q you are to analyze the strategic objectives of your

Q: You are to analyze the strategic objectives of your organization and reflect on your contribution towards achieving such objectives. Illustrate your understanding of the organization's marketing strategy, competitive ...

Respond to the following questions about the security

Respond to the following questions about the security development model, and address the following: Select 1 major component of the model, and describe the key elements. Discuss the importance of this component in the se ...

Find a systems analyst position not a business systems

Find a systems analyst position (not a business systems analyst) currently advertised near you. Dice, GlassDoor, Indeed, and Monster are good sources but Do not repeat a listing that has been used by another student. Ple ...

Please answer both questions with 250 words or more with

Please answer both questions with 250 words or more with refs. 1. IT projects are particularly challenging as we are frequently asked for cost and time estimates before we do the Requirements Phase. Write about how IT pr ...

Assignment read and use the link racism and discrimination

Assignment Read and use the link Racism and discrimination in health care: Providers and patients Question 1. Are some cultures receiving a lower level of care simply because of their culture? Question 2. What are your t ...

Question how customers could effectively use emerging

Question : How customers could effectively use emerging technology to win over its customers. APA format required. 250 words essay required. turntin check require. The response must be typed, single spaced, must be in ti ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As