Get premium membership and access questions with answers, video lessons as well as revision papers.
Almost every item of information on the WWW can be accessed directly. That is because
every document, file and image has a specific address. These addresses are called Uniform
Resource Locators (URLs). A URL is a formatted text string used by Web browsers, email
clients and other software to identify a network resource on the Internet. Network resources
are files that can be plain Web pages, other text documents, graphics, or programs.
URLs are used by Web browser to locate and access information on the WWW. A URL is
also known as a Web address. Think of URLs as a postal addresses for the Internet.
The first part of the URL parts is known as the protocol. This is almost always http://, which
is short for Hypertext Transfer Protocol. Some URLs start with a different protocol, such as
ftp:// or news://. If you're accessing a document on your local machine instead of on the Web,
the URL will begin with file://.
The second part of the URL is known as the domain name. If you've used e-mail on the
Internet, you're probably already familiar with domains. The domain represents the name of
the server that you're connecting to. A domain name, to put it simple, is your address on the
World Wide Web. This is where you put up your website and it is what internet users will
type in their address bar in order to locate your site while online. Your domain name should
be short, simple, and easy to remember. But, one must keep in mind that domain names are
only available for one individual or business. This is to maintain uniqueness and to avoid
confusion among the millions of websites and internet users.
A most common example of a domain name is www yahoo.com. The first part, the www
identifies the server name of the domain. Yahoo, the second element, is the name of the
company, individual or organization; and the suffix .com is the domain name extension,
which identifies the purpose of the website.
The most important part of the entire domain name is the second element, which states the
unique name of an individual, an organization, or a company. This is what sets it apart from
all the other addresses present on the web, as some people would try to change a part of the
domain name in order to direct traffic to their site instead.
Another example of a domain name is www nasa.gov. This is the NASA website, and since it
is a government office, it uses the extension dot gov. Users need to bear in mind that the
domain name extensions are there for a purpose. It indicates the purpose why the website
exists.
The third part of the URL is called the directory path. This is the specific area on the server
where the item resides. Directory paths on Web servers work a lot like they do on your
desktop computer. To locate a particular file on a server, you need to indicate its directory
path first.
The fourth part of the URL is called the document file name. This indicates the specific file
being accessed. This is usually an HTML file, but it can also be an image, sound, or another
file.
Sometimes the URL contains a fifth part, known as the anchor name. This is a pointer to a
specific part of an HTML document. It's always preceded by the pound sign (#). Anchors are
especially useful for large documents
anmwat answered the question on October 1, 2018 at 11:06
- Explain memory capacity as a factor considered when buying a computer hardware(Solved)
Explain memory capacity as a factor considered when buying a computer hardware.
Date posted: September 24, 2018. Answers (1)
- State two places where robots are used(Solved)
State two places where robots are used.
Date posted: August 22, 2018. Answers (1)
- Explain three reasons why an organization may need to change a new computerized system(Solved)
Explain three reasons why an organization may need to change a new computerized system.
Date posted: August 13, 2018. Answers (1)
- State two possible advantages and one disadvantage of a star network(Solved)
State two possible advantages and one disadvantage of a star network.
Date posted: August 13, 2018. Answers (1)
- Today, electronic mail (e-mail) is used as a means of communication. Describe 3 advantages and 1 disadvantage of using e-mail.(Solved)
Today, electronic mail(e-mail) is used as a means of communication. Describe 3 advantages and 1 disadvantage of using e-mail. (4 marks)
Date posted: July 24, 2018. Answers (1)
- State three advantages and two disadvantages of e-commerce.(Solved)
State three advantages and two disadvantages of e-commerce. (5 marks)
Date posted: July 22, 2018. Answers (1)
- Explain TWO measures that could be adopted to minimize 'occupational over-use syndrome', otherwise known as 'repetitive strain injury' (RSI)(Solved)
Explain TWO measures that could be adopted to minimize 'occupational over-use syndrome', otherwise known as 'repetitive strain injury' (RSI). (4 marks)
Date posted: July 20, 2018. Answers (1)
- State the duties of the following ICT personnel.
(I) Systems Analyst
(II) Database administrator
(III) Web master(Solved)
State the duties of the following ICT personnel.
(I) Systems Analyst(3 marks)
(II) Database administrator(3 marks)
(III) Web master(3 marks)
Date posted: July 18, 2018. Answers (1)
- Define an Audit trail.(Solved)
Define an Audit trail.
Date posted: July 15, 2018. Answers (1)
- Why is CMS important in computerized graphic design?(Solved)
Why is CMS important in computerized graphic design?
Date posted: July 14, 2018. Answers (1)
- Explain two cultural challenges to the growth of e-commerce in developing countries(Solved)
Explain two cultural challenges to the growth of e-commerce in developing countries.
Date posted: July 13, 2018. Answers (1)
- Describe the main features of a distributed database system. (Solved)
Describe the main features of a distributed database system.
Date posted: July 1, 2018. Answers (1)
- Knowledge based systems (KBSs) are developed to deal with particular application domain in which alternative techniques are unable to produce reliable and manageable solutions....(Solved)
Knowledge based systems (KBSs) are developed to deal with particular application domain in which alternative techniques are unable to produce reliable and manageable solutions. Identify and discuss five aspects of human intelligence that could be used to characterize intelligent knowledge-based systems.
Date posted: June 21, 2018. Answers (1)
- Define the following terms as used in disk management : (a) Formatting a disk (b) Disk partitioning (c) Disk compressing (d) Defragmentation(Solved)
Define the following terms as used in disk management : (a) Formatting a disk (b) Disk partitioning (c) Disk compressing (d) Defragmentation
Date posted: June 19, 2018. Answers (1)
- What is the importance of a screen saver?(Solved)
What is the importance of a screen saver?
Date posted: June 18, 2018. Answers (1)
- How does the problem of scarcity affect the choice of people in consumption of goods and services?(Solved)
How does the problem of scarcity affect the choice of people in consumption of goods and services?
Date posted: June 15, 2018. Answers (1)
- How would a 1970 computer differ from the present?(Solved)
How would a 1970 computer differ from the present?
Date posted: June 10, 2018. Answers (1)
- Outline the steps that are used to remove all documents from a printer.(Solved)
Outline the steps that are used to remove all documents from a printer.
Date posted: June 7, 2018. Answers (1)
- Outline the steps that are used to pause or restart your printer.(Solved)
Outline the steps that are used to pause or restart your printer.
Date posted: June 7, 2018. Answers (1)
- Outline the steps that are used to cancel printing of a document in a computer.(Solved)
Outline the steps that are used to cancel printing of a document in a computer.
Date posted: June 7, 2018. Answers (1)