Toshibasupport

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Thursday, 16 September 2010

What Is Internet and the World Wide Web?

Posted on 17:27 by Unknown
There is little historical precedent for the swift and dramatic growth of the Internet, which was originally a limited scientific communication network developed by the U.S. government to facilitate cooperation among federal researchers and the university research community. With its rapid adoption by the private sector, the Internet has remained an important research tool, and it is also becoming a vital ingredient in maintaining and increasing the scientific and commercial leadership of the United States. In the twenty-first century, the Internet will provide a powerful and versatile environment for business, education, culture, entertainment, health care and public health. Sight, sound, and even touch will be integrated through powerful computers, displays, and networks. People will use this environment to work, study, bank, shop, entertain, visit with each other, and communicate with their health care providers. Whether at the office, at home, or traveling, the environment and its interface will be largely the same, and security, reliability, and privacy will be built in. Benefits of this dramatically different environment will include a more agile economy, improved health care (particularly in rural areas), less stress on ecosystems, easy access to lifelong and distance learning, a greater choice of places to live and work, and more opportunities to participate in the community, the nation, and the world.

Internet and WWW Acronyms. People that communicate with each other electronically may not have the same "platform." "Cross-platform" means that people do not have to use the same kind of operating system to access files on a remote system. In order to access the Web there are two basic mechanisms: (1) using the telephone system to link to another computer or network that is connected to the Internet, and (2) connecting to a network; and from there into the Internet. An Internet service provider (ISP) may be required to access the Internet. An important factor regarding Internet access is bandwidth, which determines how much data a connection can accommodate and the speed at which data can be accessed.
Information on the Web is generally written in Hypertext Markup Language (HTML), which is a text-based markup language that describes the structure of a Web document's content and some of its properties. It can also be viewed as a way of representing text and linking it to other resources, such as multimedia files, graphic files, still or dynamic images files, and sound files. HTML contains the information or text to be displayed and the control needed for its display or playback.
Navigation Tools. Prior to the use of Web browsers, there were several Internet navigation tools that required more user expertise than the modern browser, including:
  • File Transfer Protocol (FTP), a cross-platform protocol for transferring files to and from computers anywhere on the Internet.
  • Gopher, a tool for browsing files on the Internet.
  • Usenet, a worldwide messaging system through which anyone can read and post articles to a group of individuals who share the same interests.
  • Wide Area Information Server (WAIS), one of a handful of Internet search tools that can be spread across the network to scour multiple archives and handle multiple data formats.
  • Hyperlink (also called link), a pointer— from text, from a picture or a graphic, or from an image map—to a page or file on the World Wide Web; hyperlinks are the primary way to navigate between Web pages and among Web sites.
Today, a Web browser is the main piece of software required by the end user to find information through Internet. Some of the most popular browsers are: Lynx, Mosaic, Netscape Navigator/Communicator, and Internet Explorer. Lynx is a text-only Web browser; it cannot display graphical or multimedia elements. Mosaic, a graphical Web browser, was the first "full-featured" graphical browser for the Web. It was developed by a team of programmers at the National Center for Supercomputing Applications (NCSA). One of these programmers, Marc Andreesen, later formed Netscape. Netscape Navigator/Communicator is one of the most popular Web browsers. Internet Explorer is Microsoft's Web browser.
Web Resources. A Uniform Resource Locator (URL) is a Web resource that describes the protocols needed to access a particular resource or site on the Web, and then point to the resource's Internet location. URLs are, in short, used to locate information on the Web.
Normally the URL is composed of six parts:
  1. The protocol or data source (i.e., ftp://, gopher://, news://, telnet://, WAIS://, http://)
  2. The domain name (for the Web server where the desired information resides)
  3. The port address
  4. The directory path (location of the Web page in the Web server's file system)
  5. The object name
  6. The spot (precise location within the file)
Protocols are the rules and formats that govern the methods by which computers communicate over a network. Protocols link clients and servers together and handle requests and responses, including making a connection, making a request, and the closing of the connection. Transmission Control Protocol/Internet Protocol (TCP/IP) is the full set of standard protocols used on the Internet. Hypertext Transfer Protocol (HTTP) is an Internet protocol specifically for the World Wide Web. It provides a way for Web clients and servers to communicate primarily through the exchange of messages.
Multipurpose Internet Mail Extension (MIME) is a technique designed to insert attachments within individual e-mail files. MIME allows a Web server to deliver multiple forms of data to the user in a single transfer. Also, when creating a Web page, it could include text files as well as nontext files, such as sound, graphics, still images, and videos.
Intersection and Information Technology and Public Health. The applications of IT in public health are numerous and varied. One particularly important example, however, is the use of Geographical Information Systems (GIS). Using GIS, public health officials can create very effective procedures to do their tasks using information technology. Doing a feedback loop they can: measure, plan, act, and measure again. In this manner, officials can identify a problem (e.g., cancer) by measuring data from a registry. Further, from the health care providers community, they can select a target population (e.g., breast cancer) and develop an implementation strategy for an intervention plan with the health care providers. Finally, by measuring again, GIS allows public health officials to evaluate the impact of the implementation plan on that data registry.
GIS is thus an information technology which can help improve health care and public health in many areas such as disease tracking, outbreak investigations, geostatistical analysis, and routing of health workers. As a means of tracking, residential zip codes of patients who appear at different clinics can be plotted with signs and symptoms of a selected diagnosis (e.g., upper respiratory infections [URI]). URIs are a marker for some toxic biological agents. Furthermore, community outbreaks of infectious diseases such as measles can be quickly analyzed then using GIS tools. Color shading can indicate areas with certain levels of morbidity probability or likeliness of getting sick. Areas that require immediate interventions such as immunizations can be depicted by a different shade. Geostatistical analysis is one of the most powerful tools available to a public health department. With a relatively small number of sampling points, predictive maps can be quickly produced to provide the likely extent of threats to public health. This mode of forecasting allows for the effective and efficient allocation of health care resources in a community.
GIS can also help create disease focused databases representing patients from a specific userdefined geographic area. In this fashion, the impact of a toxic release or exposure against a target population can be measured. GIS is a powerful tool for supplying immediate visualization of the likely geographic exposures, allows an analyst to examine the various variables that might effect the "fallout" of sprayings and to estimate its extent. Through the use of Computer Aided Design tools and GIS, medical centers as well as clinics are increasingly monitoring their patient care environments to assist managers evaluate risk for highly contagious diseases and implement control and isolation programs.
GIS helps health organizations visualizing diagnostic and geographic information simultaneously and dynamically. Over 14,000 ICD 9 and 10 codes describe medical diagnosis, treatment, and medical events worldwide. Public health clinics, hospitals, managed care, and health insurers use this application to conduct data mining on very large clinical and administrative data warehouses.
In public health education, GIS can be an analytical tool of choice for health promotions staff when deciding where to target the public health messages and warnings. GIS is also used to create interactive maps for health organizations required to publish information to the public. Health organizations require interactive maps depicting geographical areas and regions where infectious diseases and threats to the public's health are imminent.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Information Technology | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Finest Way to Repair Windows Registry
    Comprehensive Manual on How to Repair Windows Registry One of the worst things that can happen to you when you are trying to use a computer ...
  • Make Faster And Faster Your PC Windows
    Fed up with your time-consuming PC-startup times? Well, previously in  my blog  i have review about  startup blaster , a software which can ...
  • How To Select A Good Domain Name
    If you already have a busy website and you like your domain there's no need to change it but as soon as you set up a new website or if y...
  • Samsung RF510-S01 Review
    Samsung RF510-S01 , They've energy and performance? Your laptop is here. Availability Samsung RF510. This is a 15.6-inch HD (1366 x 768)...
  • What Is PayPal?
    PayPal  www.paypal.com PayPal, a subsidiary of eBay, is the most popular online payment service - operating in over 190 markets. Unfortunate...
  • Top 8 Tips To Increase YOur Web Traffic From Yahoo
    Here I am writing 8 short, easiest and interesting tips for increasing your web traffic at once 1) Selecting your domain name is the most vi...
  • Hp 4520s Review
    The HP ProBook 4520s is in actuality only a little and method institution laptop computer that replaces the more mature 4510s from last year...
  • Get 100% Free keywords Suggestion Tools
    Keywords are simply the words that people use when they search the Web and keyword research and selection is essential in any online marketi...
  • Toshiba Support
    It was heavily raining that morning when I gave birth to my little baby girl who is 2 years now. I still remember that morning fondly, first...
  • Using BuddyPress plugins How To Forum Attach?
    A few people have asked recently for a list of the plugins installed on the  CUNY Academic Commons . In the spirit of  Joe’s post , here I t...

Categories

  • About Computer
  • About Internet
  • Antivirus
  • AVG Internet Security
  • Data Protection
  • E-mail service
  • Firewall protection guides
  • Forum Attachment
  • Free Web Hosting
  • Get Free Software
  • Health and Safety Issues in Use of Digital Media
  • Hy Phy
  • Identity Protection
  • Information Technology
  • Internet Elements
  • Internet Safety Guides
  • Internet Tips And Tricks
  • Keyloggers
  • Make Money From Website
  • Messenger
  • Mobile
  • Mommy Blogs.
  • News
  • Online Children Protection
  • Password Security Guide
  • PC Hacking
  • Promote your web/blog
  • Protect Your PC
  • Search Engine
  • Server Security
  • Software
  • Technical Information
  • Tips For More Traffic
  • USB Protection
  • Windows Protection

Blog Archive

  • ►  2012 (2)
    • ►  September (2)
  • ▼  2010 (410)
    • ►  December (10)
    • ►  October (23)
    • ▼  September (377)
      • 6 Dollar Paypal Money Method, As seen on Oprah and...
      • Your Business Website
      • How To Select A Good Domain Name
      • Bloger For Students Earning
      • Get Tips For Search Engine Optimization Guideline
      • 100 Tips To Get Traffic For Free
      • Get 6 Tips To Increase Your Web Traffic
      • Generate Free Internet Traffic On Your Blog
      • Get 3 Important Ways For More Traffic
      • Top 10 Ways To Get More Traffic
      • Top 25 Tips To Speed Up Your Windows XP
      • 10 Tips Online Security
      • Top 12 Tips To Make Your PC Virus Free
      • Make A Password Protected Folder
      • Anti Virus Security Guidelines
      • 9 Steps TO Run FIreFox Correctly
      • Top 7 Tips To Start Internet Explorer Correctly
      • Top 6 Tips For Firewall Security
      • Top 7 For Internet Explorer Security
      • Browser troublemaking Security Guidelines
      • Why Web Link Is Not Working Inside The E-mail?
      • My file is too large to be sent over email.
      • You receive an error when opening messages or send...
      • An attachment you received has been blocked.
      • What is server error on sending e-mail
      • E-mail Security Guidelines
      • Internet Connection Security Guides
      • Two Firewalls Can Work At Once
      • Here is some firewall installation tips that makes...
      • How To Turn On You Firewall
      • Firewall Security guideline
      • How RAM work well?
      • RAM Protection Guideline
      • New Types of RAMs
      • RAM Is Not Working
      • Protection Of RAM
      • Why PC Show Errors On Heavy Workload?
      • 6 Steps To Protect You PC From Virus
      • Protect your PC With Spyware
      • 4 Tips To Protect Your PC
      • 4 Steps To Increase Your Online Security
      • 3 Important Hotmail Security Features
      • 4 Ways That How Spammer Find Your E-mail Address
      • 6 Steps To Save Your E-mail Address From Spammers
      • Important Guideline For Firewall Optimization
      • Top 10 Tips To Protect Your Online Network
      • Three Steps To Speed Up Your Computer
      • Top 10 Tips To Protect Your PC Online
      • Internet Security Guidelines
      • Get Suggestion For Writing An Article
      • Get 100% Free Tips To Publish Tour Article
      • Secret Of Writing An Article For You Blog/Web
      • Get Some Important Tips About WordPress Blogroll G...
      • Get 26 Tips For More Traffic
      • Tips To Increase Your Web/blog Traffic
      • Top 8 Tips To Increase YOur Web Traffic From Yahoo
      • Learn how to setting up on a chair correctly
      • What should be light conditions while using computer
      • How To Watch At Your PC Monitor
      • How to protect your Health while using computer
      • In Which Position We Should Use Computer
      • Some Important Precusiones While Working On Computer
      • Install Windows Gadgets
      • Important Keyfinder For Windows Product Keys
      • A Useful Tip To Upgrade windows 98
      • Get Top 11 Windows 98 Product Key Code 100% Free
      • Descriptions Of Magical Jelly Bean Keyfinder v2.0.8
      • Get Tips To Find The Windows Administration Password
      • Change your windows password
      • Get Top 6 Free Windows Password Recovery Tools 100...
      • Get Top 11 c r a c k i n g t o o l s 100% free
      • Get Top 10 Password Crackers
      • Put Your Desired Size To Recycle bin
      • Get Tips For How To Quick Format Vs Default Format?
      • Turn On Your Num Lock Forever
      • Learn How To Hid An Icon
      • Run The Systeminfo Utility In Windows XP
      • Control All The Open Windows By Keyboard Shortcut ...
      • Save The energy Of Your Computer
      • Select Different Sounds For Different Windows Events
      • Change Icon Spacing In Windows XP
      • Start windows programs quickly with Run Command
      • A Trick To Change The Name Of Recycle Bin
      • Put Away Undesired Users From Shown Down Key
      • Put An Image On The Folder
      • Get Windows Vista Shortcut keys For 100% Free
      • Get Your Lost Files In Computer Without Using Any ...
      • Put Shortcut Keys To Your Internet Connection
      • How to Print a document faster and faster
      • If You Are Ready for SP2 Than Your PC Will Be Safe
      • Add www And .com Automatically To Your Address Bro...
      • What Are The Requirements To Install Windows Vista
      • Word Processing Software
      • What is APPLICATION SOFTWARE?
      • Picture Yourself Using Software
      • Taking a look at chutti.pk, Pakistan's first onlin...
      • What is Plimus and 2Checkout?
      • What Is AlertPay?
      • What Is Moneybookers?
      • What Is Payoneer?
Powered by Blogger.

About Me

Unknown
View my complete profile