Sunday, March 31, 2019


What is HTML?


What are HTML tags?

When a web browser displays a page such as the one you are reading now, it reads from a text file, and looks for special codes or "tags" that are marked by the < and > signs. The general format for a HTML tag is:
     <tag name>string of text</tag name>
As an example, the title for this section uses a header tag:
     <h3>What are HTML tags?</h3>
This tag tells a WWW browser to display the text What are HTML tags? in the style of header level 3. HTML tags may tell a web browser to bold the text, italicize it, make it into a header, or make it be a hypertext link to another web [age. It is important to note that the ending tag,
    </tag name>
contains the "/" slash character. This "/" slash tells a WWW browser to stop tagging the text. Many HTML tags are paired this way. If you forget the slash, a WWW browser will continue the tag for the rest of the text in your document, producing undesirable results (as an experiment you may want to try this later).
Unlike computer programming, if you make a typographical error in HTML you will not get a "bomb" or "crash" the system; your web page will simply look, well... wrong.

Opening Up Your Workspace

To complete the lessons in this tutorial, you should create a second web window (this allows you to keep this window with the lesson instructions and one window as your "workspace"), plus open your text editor application in a third window.
So you will want to be pretty comfortable jumping between different applications and windows on your computer. Another option is to print out the lesson instructions (but we really do not want to promote tree carnage).
Here are the steps for setting up your workspace:
  1. From the File menu of your web browser, select New Window. A second web should appear. Think of the first window as your "textbook" and the second clone window as your "workspace" for completing the HTML lessons.
    NOTE: Not all web browsers support multiple windows. The only reason to have two windows here is so that you can read the instructions for the lessons and also view your working document.
  2. Next, you need to jump out of the WWW browser and open your text editor program.
    NOTE: You will need to move back and forth between the different windows to complete these lessons. This can be a challenge depending on the size of your monitor. You may choose to resize the three windows so that they all fit on your screen or layer your windows so you can click on any of them to bring it to the front.If you are using a word processor program to create your HTML, be sure to save in plain text (or ASCII) format.

Creating Your HTML Document

An HTML document contains two distinct parts, the head and the body. The head contains information about the document that is not displayed on the screen. The body then contains everything else that is displayed.
The basic structure then of any HTML page is:
  <html>
  <head>
     ** [header info used by some web servers, not displayed] **
  </head>

  <body>
    ** [all the HTML for display] **
          :      :
          :      :
          :      :
  </body>
  </html>
Enclose all HTML work within an <html>....</html> tag. Note that your web pages will display fine on most computers without any of these tags. However by using them, your web pages will be fully compliant with International HTML standards and ensure compatibility with future web browsers.
It's good habit, like brushing your teeth.
Here are the steps for creating your first HTML file. Are you ready?
  1. Go to the text editor window.
  2. Enter the following text (you do not have to press RETURN at the end of each line; the WWW browser will word wrap all text):
         <html>
         <head>
         <title>Volcanoes!</title>
         </head>
         
         <body>
         In this lesson you will use the Internet to research 
         information on volcanoes and then write a report on 
         your results.
         </body>
         </html>
    
    NOTE: Look where the <title>...</title> tag is located. It is in the <head>...</head> portion and thus will not be visible on the screen. What does it do? The <title> tag is used to uniquely identify each document and is also displayed in the title bar of the browser window.In lesson 3 you will learn how to add a title that will appear directly on your web page.
  3. Save the document as "Volc.html" If you are using a word processor porgram to create your HTML, be sure to save in plain text (or ASCII) format.
    NOTE: For Windows 3.1 users, by DOS convention, you will have to name all HTML files with extensions of .HTM Your web browser will recognize them even when HTML refers to a file called file.html
    By using this file name extension, a web browser will know to read these text files as HTML and properly display the web page.

Displaying Your Document In a WWW Browser

  1. Return to the window you are using for your work space.
  2. Select Open File... from the File menu.
  3. Use the dialog box to find and open the file you created, "Volc.html"
  4. You should now see within the workspace window "Volcanoes!" in the title bar and the HTML text you created displayed in WWW format underneath.

Check Your Work

Compare your document with a sample of how this document should appear. After viewing the sample, use the back button on your web browser to return to this page.
If your document was different than the sample, review the text you entered in the text editor. A common mistake is "I cannot see the title!". The text within the <title>...</title> tag is NOT displayed on the web page; you will likely see it in the titlebar of the web browser window

Review Topics

  1. What are HTML tags?
  2. Why can you not see the title if you entered a title tag?
  3. What steps are involved in creating a simple HTML document?
  4. How can you display your HTML document in a WWW browser?

 Introduction to TCP/IP and Networking

What is Internet

The Internet is a global interconnected network of computers. Using the Internet you can look at documents and images even view videos or listen to sound files from anywhere in the world using your computer. You can also use the Internet to publish, so that others can look at your information in any of a number of standard file formats.
You can also use the Internet to send messages through e-mail, as long as you know the e-mail address of the recipient. The Internet can also be used to transfer files between any two people or computers. The Internet also creates new communities of individuals, belonging to newsgroups where information is shared between people with similar interests, even though individuals could be geographically dispersed. Letters and files can be posted to newsgroups, where others can share them.
Internet is the world's largest computer network, the network of networks, scattered all over the world. It was created nearly 25 years ago as a project for the U.S. Department of Defense. Its goal was to create a method for widely separated computers to transfer data efficiently even in the event of a nuclear attack. From a handful of computer and users in the 1960s, today the Internet has grown to thousands of regional networks that can connect millions of users. Any single individual, company, or country does not own this global network.

How Internet works

When you connect computers together, you get a "network" which allows computers to "talk" to each other. This communication was originally part of the "operating system" of a computer. The Internet originally arose as a bunch of UNIX-based (UNIX is an operating system) computers linked together, so a lot of the terms on the Internet have their origins in the UNIX world. This means a lot of weird cryptic terms or acronyms are used (words made up from initial letters of longer words). The standard for communicating on the Internet is called "TCP/IP" (pronounced as TCPIP without the '/') which is short for Transmission Control Protocol/Internet Protocol.
The key concept in TCP/IP is that every computer has to know or can figure out where all other computers are on the network, and can send data by the quickest route, even if part of the route is down. The reason the route is down might include a computer is shut down or a phone line disconnected or in repair. This is done by maintaining indexes of all IP addresses in a domain at multiple servers strategically spread around the country, so that messages are quickly routed along the fastest path.
TCP/IP transfers information in small chunks called "packets." Each packet includes the following information: the computer (or last few computers) the data came from, the computer to which it is headed, the data itself, and error-checking information (to ensure that the individual packet was accurately and completely sent and received). The elegance of TCP/IP is that a large file can be broken into multiple packets, each sent over different paths in the network. These packets then re-assembled at the other end into one file and saved on the destination computer.
To access the Internet you need an Internet Service Provider or "ISP". The ISP is connected to the Internet "backbone" which is the permanent cabling of the Internet. This backbone may consist of copper wire, fiber optic cable, microwave, and even satellite connections between any two points. To you it doesn't matter – the Internet's TCP/IP works this out for you. You can connect to the Internet in one of two basic ways, dialing into an Internet Service Provider's computer, or with a direct connection to an Internet Service Provider. The difference is mainly in the speed and cost.

art0001_a.gif (32001 bytes)
The previous figure gives a pictorial representation of how Internet works. You want to access a web site that is hosted on a server somewhere in the world (say USA) and you want to access the information from India. You connect (using a computer and modem - Dial up access) to your local Internet Access Provider, then you type in the address of your site. Your request is sent form the local ISP's server through the different computers in the network (Internet backbone) till it reaches the server where you have hosted your site. It is like a letter traveling though the various postal networks and reaching the addressee’s place. Then the information stored on the web site that you are trying to access is sent back to your computer so that you can access it.

Networking Basics

The Internet protocol suite is the set of protocols that implement the protocol stack on which the Internet runs. It is sometimes called the TCP/IP protocol suite, after two of the many protocols that make up the suite: the Transmission Control Protocol (TCP) and the Internet Protocol (IP), which were the first two defined. The authoritative reference on this subject is RFC 1122.
The Internet protocol suite can be described by analogy with the OSI model, which describes the layers of a protocol stack, not all of which correspond well with Internet practice. In a protocol stack, each layer solves a set of problems involving the transmission of data, and provides a well-defined service to the higher layers. Higher layers are logically closer to the user and deal with more abstract data, relying on lower layers to translate data into forms that can eventually be physically manipulated.
The Internet model was produced as the solution to a practical engineering problem. The OSI model, on the other hand, was a more theoretical approach, and was also produced at an earlier stage in the evolution of networks. Therefore, the OSI model is easier to understand, but the TCP/IP model is the one in actual use. It is helpful to have an understanding of the OSI model before learning TCP/IP, as the same principles apply, but are easier to understand in the OSI model. The following diagram attempts to show where various TCP/IP and other protocols would reside in the original OSI model:
7
Application
e.g. HTTP, SMTP, SNMP, FTP, Telnet, NFS
6
Presentation
e.g. XDR, ASN.1, SMB, AFP
5
Session
e.g. ISO 8327 / CCITT X.225, RPC, NetBIOS, ASP
4
Transport
e.g. TCP, UDP, RTP, SPX, ATP
3
Network
e.g. IP, ICMP, IGMP, X.25, CLNP, ARP, OSPF, RIP, IPX, DDP
2
Data Link
1
Physical
Commonly, the top three layers of the OSI model (Application, Presentation and Session) are considered as a single Application Layer in the TCP/IP suite. Because the TCP/IP suite has no unified session layer on which higher layers are built, these functions are typically carried out (or ignored) by individual applications. A simplified TCP/IP interpretation of the stack is shown below:
As we see on the diagram above, computers running on the Internet communicate to each other using either the Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP). When you write Java programs that communicate over the network, you are programming at the application layer. Typically, you don't need to concern yourself with the TCP and UDP layers. Instead, you can use the classes in the java.net package. These classes provide system-independent network communication. However, to decide which Java classes your programs should use, you do need to understand how TCP and UDP differ.

TCP

When two applications want to communicate to each other reliably, they establish a connection and send data back and forth over that connection. This is analogous to making a telephone call. If you want to speak to Aunt Beatrice in Kentucky, a connection is established when you dial her phone number and she answers. You send data back and forth over the connection by speaking to one another over the phone lines. Like the phone company, TCP guarantees that data sent from one end of the connection actually gets to the other end and in the same order it was sent. Otherwise, an error is reported.
TCP provides a point-to-point channel for applications that require reliable communications. The Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Telnet are all examples of applications that require a reliable communication channel. The order in which the data is sent and received over the network is critical to the success of these applications. When HTTP is used to read from a URL, the data must be received in the order in which it was sent. Otherwise, you end up with a jumbled HTML file, a corrupt zip file, or some other invalid information.
Definition:  TCP (Transmission Control Protocol) is a connection-based protocol that provides a reliable flow of data between two computers.

UDP

The UDP protocol provides for communication that is not guaranteed between two applications on the network. UDP is not connection-based like TCP. Rather, it sends independent packets of data, called datagrams, from one application to another. Sending datagrams is much like sending a letter through the postal service: The order of delivery is not important and is not guaranteed, and each message is independent of any other.
Definition:  UDP (User Datagram Protocol) is a protocol that sends independent packets of data, called datagrams, from one computer to another with no guarantees about arrival. UDP is not connection-based like TCP.
For many applications, the guarantee of reliability is critical to the success of the transfer of information from one end of the connection to the other. However, other forms of communication don't require such strict standards. In fact, they may be slowed down by the extra overhead or the reliable connection may invalidate the service altogether.
Consider, for example, a clock server that sends the current time to its client when requested to do so. If the client misses a packet, it doesn't really make sense to resend it because the time will be incorrect when the client receives it on the second try. If the client makes two requests and receives packets from the server out of order, it doesn't really matter because the client can figure out that the packets are out of order and make another request. The reliability of TCP is unnecessary in this instance because it causes performance degradation and may hinder the usefulness of the service.
Another example of a service that doesn't need the guarantee of a reliable channel is the ping command. The purpose of the ping command is to test the communication between two programs over the network. In fact, ping needs to know about dropped or out-of-order packets to determine how good or bad the connection is. A reliable channel would invalidate this service altogether.
The UDP protocol provides for communication that is not guaranteed between two applications on the network. UDP is not connection-based like TCP. Rather, it sends independent packets of data from one application to another. Sending datagrams is much like sending a letter through the mail service: The order of delivery is not important and is not guaranteed, and each message is independent of any others.
Note:  Many firewalls and routers have been configured not to allow UDP packets. If you're having trouble connecting to a service outside your firewall, or if clients are having trouble connecting to your service, ask your system administrator if UDP is permitted.

Understanding Ports

Generally speaking, a computer has a single physical connection to the network. All data destined for a particular computer arrives through that connection. However, the data may be intended for different applications running on the computer. So how does the computer know to which application to forward the data? Through the use of ports.
Data transmitted over the Internet is accompanied by addressing information that identifies the computer and the port for which it is destined. The computer is identified by its 32-bit IP address, which IP uses to deliver data to the right computer on the network. Ports are identified by a 16-bit number, which TCP and UDP use to deliver the data to the right application.
In connection-based communication such as TCP, a server application binds a socket to a specific port number. This has the effect of registering the server with the system to receive all data destined for that port. A client can then rendezvous with the server at the server's port, as illustrated here:
Definition:  The TCP and UDP protocols use ports to map incoming data to a particular process running on a computer.
In datagram-based communication such as UDP, the datagram packet contains the port number of its destination and UDP routes the packet to the appropriate application, as illustrated in this figure:
Port numbers range from 0 to 65,535 because ports are represented by 16-bit numbers. The port numbers ranging from 0 - 1023 are restricted; they are reserved for use by well-known services such as HTTP and FTP and other system services. These ports are called well-known ports. Your applications should not attempt to bind to them.

Networking Classes in the JDK

Through the classes in java.net, Java programs can use TCP or UDP to communicate over the Internet. The URL, URLConnection, Socket, and ServerSocket classes all use TCP to communicate over the network. The DatagramPacket, DatagramSocket, and MulticastSocket classes are for use with UDP.
The Internet Protocol Suite
The java.net package provides a set of classes that support network programming using the communication protocols employed by the Internet. These protocols are known as the Internet protocol suite and include the Internet Protocol (IP), the Transport Control Protocol (TCP), and the User Datagram Protocol (UDP) as well as other, less-prominent supporting protocols. Although this section cannot provide a full description of the Internet protocols, it gives you the basic information that you need to get started with Java network programming. In order to take full advantage of this chapter, you need an Internet connection.

What Is the Internet and How Does It Work?

Asking the question What is the Internet? may bring about a heated discussion in some circles. In this book, the Internet is defined as the collection of all computers that are able to communicate, using the Internet protocol suite, with the computers and networks registered with the Internet Network Information Center (InterNIC). This definition includes all computers to which you can directly (or indirectly through a firewall) send Internet Protocol packets.
Computers on the Internet communicate by exchanging packets of data, known as Internet Protocol, or IP, packets. IP is the network protocol used to send information from one computer to another over the Internet. All computers on the Internet (by our definition in this book) communicate using IP. IP moves information contained in IP packets. The IP packets are routed via special routing algorithms from a source computer that sends the packets to a destination computer that receives them. The routing algorithms figure out the best way to send the packets from source to destination.
In order for IP to send packets from a source computer to a destination computer, it must have some way of identifying these computers. All computers on the Internet are identified using one or more IP addresses. A computer may have more than one IP address if it has more than one interface to computers that are connected to the Internet.
IP addresses are 32-bit numbers. They may be written in decimal, hexadecimal, or other formats, but the most common format is dotted decimal notation. This format breaks the 32-bit address up into four bytes and writes each byte of the address as unsigned decimal integers separated by dots. For example, one of my IP addresses is 0xccD499C1. Because 0xcc = 204, 0xD4 = 212, 0x99 = 153, and 0xC1 = 193, my address in dotted decimal form is 204.212.153.193.
IP addresses are not easy to remember, even using dotted decimal notation. The Internet has adopted a mechanism, referred to as the Domain Name System (DNS), whereby computer names can be associated with IP addresses. These computer names are referred to as domain names. The DNS has several rules that determine how domain names are constructed and how they relate to one another. For the purposes of this chapter, it is sufficient to know that domain names are computer names and that they are mapped to IP addresses.
The mapping of domain names to IP addresses is maintained by a system of domain name servers. These servers are able to look up the IP address corresponding to a domain name. They also provide the capability to look up the domain name associated with a particular IP address, if one exists.
As I mentioned, IP enables communication between computers on the Internet by routing data from a source computer to a destination computer. However, computer-to-computer communication only solves half of the network communication problem. In order for an application program, such as a mail program, to communicate with another application, such as a mail server, there needs to be a way to send data to specific programs within a computer.
Ports are used to enable communication between programs. A port is an address within a computer. Port addresses are 16-bit addresses that are usually associated with a particular application protocol. An application server, such as a Web server or an FTP server, listens on a particular port for service requests, performs whatever service is requested of it, and returns information to the port used by the application program requesting the service.

Internet services

Servers in Internet provide various services, accessible by the Internet users. Examples of such services are WWW, FTP, IRC, E-Mail, etc.
Popular Internet application protocols are associated with well-known ports and wel-known Internet services. The server programs implementing these protocols listen on these ports for service requests. The well-known ports for some common Internet application protocols are:
Port
Protocol
Service description
21
File Transfer Protocol (FTP)
Transfers files
22
SSH (Secure Shell Protocol)
Allows secure remote administration through standard shell (console)
25
Simple Mail Transfer Protocol
Send email
80
HyperText Transfer Protocol (HTTP)
Accesse the WWW (World Wide Web)
110
Post Office Protocol
Receive email
The well-known ports are used to standardize the location of Internet services.

What is WWW

A technical definition of the World Wide Web is: all the resources and users on the Internet that are using the Hypertext Transfer Protocol (HTTP). A broader definition is:
"The World Wide Web is the universe of network-accessible information, an embodiment of human knowledge."
Actually, World Wide Web is a distributed information system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to other documents, as well as graphics, audio, and video files. This means you can jump from one document to another simply by clicking on hot spots. Not all Internet servers are part of the World Wide Web. World Wide Web is not synonymous with the Internet!
There are several applications called Web browsers that make it easy to access the World Wide Web; Two of the most popular being Netscape Navigator (Mozilla) and Microsoft's Internet Explorer.

Connection-Oriented Versus Connectionless Communication

Transport protocols are used to deliver information from one port to another and thereby enable communication between application programs. They use either a connection-oriented or connectionless method of communication. TCP is a connection-oriented protocol and UDP is a connectionless transport protocol.
The TCP connection-oriented protocol establishes a communication link between a source port/IP address and a destination port/IP address. The ports are bound together via this link until the connection is terminated and the link is broken. An example of a connection-oriented protocol is a telephone conversation. A telephone connection is established, communication takes place, and then the connection is terminated.
The reliability of the communication between the source and destination programs is ensured through error-detection and error-correction mechanisms that are implemented within TCP. TCP implements the connection as a stream of bytes from source to destination. This feature allows the use of the stream I/O classes provided by java.io.
The UDP connectionless protocol differs from the TCP connection-oriented protocol in that it does not establish a link for the duration of the connection. An example of a connectionless protocol is postal mail. To mail something, you just write down a destination address (and an optional return address) on the envelope of the item you're sending and drop it in a mailbox. When using UDP, an application program writes the destination port and IP address on a datagram and then sends the datagram to its destination. UDP is less reliable than TCP because there are no delivery-assurance or error-detection and -correction mechanisms built into the protocol.
Application protocols such as FTP, SMTP, and HTTP use TCP to provide reliable, stream-based communication between client and server programs. Other protocols, such as the Time Protocol, use UDP because speed of delivery is more important than end-to-end reliability.

The Client/Server Computing Model and the Internet

The Internet provides a variety of services that contribute to its appeal. These services include e-mail, newsgroups, file transfer, remote login, and the Web. Internet services are organized according to a client/server architecture. Client programs, such as Web browsers and file transfer programs, create connections to servers, such as Web and FTP servers. The clients make requests of the server, and the server responds to the requests by providing the service requested by the client.
The Web provides a good example of client/server computing. Web browsers are the clients and Web servers are the servers. Browsers request HTML files from Web servers on your behalf by establishing a connection with a Web server and submitting file requests to the server. The server receives the file requests, retrieves the files, and sends them to the browser over the established connection. The browser receives the files and displays them to your browser window.

Sockets and Client/Server Communication

Clients and servers establish connections and communicate via sockets. Connections are communication links that are created over the Internet using TCP. Some client/server applications are also built around the connectionless UDP. These applications also use sockets to communicate.
Sockets are the endpoints of Internet communication. Clients create client sockets and connect them to server sockets. Sockets are associated with a host address and a port address. The host address is the IP address of the host where the client or server program is located. The port address is the communication port used by the client or server program. Server programs use the well-known port number associated with their application protocol.
A client communicates with a server by establishing a connection to the socket of the server. The client and server then exchange data over the connection. Connection-oriented communication is more reliable than connectionless communication because the underlying TCP provides message-acknowledgment, error-detection, and error-recovery services.
When a connectionless protocol is used, the client and server communicate by sending datagrams to each other's socket. The UDP is used for connectionless protocols. It does not support reliable communication like TCP.

What is Computer Science? 

Computer Science is the systematic study of the feasibility, structure, expression, and mechanization of the methodical processes (or algorithms) that underlie the acquisition, representation, processing, storage, communication of, and access to information, whether such information is encoded in bits and bytes in a computer memory or transcribed in genes and protein structures in a human cell. The fundamental question underlying all of computing is: what computational processes can be efficiently automated and implemented? To tackle this seemingly simple question, computer scientists work in many complementary areas. They study the very nature of computing to determine which problems are (or are not) computable. They compare various algorithms to determine if they provide a correct and efficient solution to a concrete problem. They design programming languages to enable the specification and expression of such algorithms. They design, evaluate, and build computer systems that can efficiently execute such specifications. And, they apply such algorithms to important application domains.
What Computer Science Is Not… 
Computer Science is not just about building computers or writing computer programs! Computer Science is no more about building computers and developing software than astronomy is about building telescopes, biology is about building microscopes, and music is about building musical instruments! Computer science is not about the tools we use to carry out computation. It is about how we use such tools, and what we find out when we do. The solution of many computer science problems may not even require the use of computers—just pencil and paper. As a matter of fact, problems in computer science have been tackled decades before computers were even built. That said, the design and implementation of computing system hardware and software is replete with formidable challenges and fundamental problems that keep computer scientists busy. Computer Science is about building computers and writing computer programs, and much much more!

Why Computer Science?

 In 1943, Thomas J. Watson, Chairman of IBM declared: “I think there is a world market for maybe five computers.” A few billion computers later, there is a temptation to fall into Watson’s embarrassing underestimation of the potential that computing may have on our society. Indeed, in a few decades, “one computer per capita” may sound as outrageous as a “world market of five computers” sounds today. Computer scientists envision a world in which computing is pervasive and seamless. The golden age of computing (and of computer scientists) has barely begun. Students choose to major in computer science for a variety of reasons. Many of our students graduate to rewarding computer-related careers in software engineering, system administration and management, research and development in industrial and governmental laboratories. And, since computer technology has transformed almost all disciplines, many of our graduates use their computer science major (and the analytical skills it instills) to prepare them for a career in other disciplines such as medicine, law, education, physical and life sciences, social sciences, and humanities. Demand for graduates well-versed in computer science is high and is expected to continue to grow as the information age comes of age!

 How Does Computer Science Relate To Scientific Computing? 

Computers and software artifacts have become indispensable tools for the pursuit of pretty much every scientific discipline. The use of computers has enabled biologists to comprehend genetics, has enabled astrophysicists to get within microseconds of the big bang's initial conditions, and has enabled geologists to predict earthquakes. It is not surprising, then, for scientists in these disciplines to increasingly rely on a computational methodology (in addition to traditional mathematical or empirical methodologies) to make advances in their respective fields of study. Such scientists are often referred to as computational scientists. So, a computational chemist is a scientist who uses computers to make contribution to chemistry, just as a mathematical physicist uses mathematics to model atomic dynamics, or an empirical biologist uses a microscope to observe cellular behaviors. And, just like all of these scientific disciplines, advances in computer science itself often rely on the use of computers and computational processes. In that sense, among all scientific disciplines, Computer Science is unique. It is the only discipline which fuels its own advancement. Indeed it is a recursive discipline!
 How Does Computer Science Relate To Computer Engineering? 

The realization of a computing system, subject to various physical and technological constraints, is a challenging undertaking that requires a great deal of knowledge about the functionality and characteristics of the building blocks available at our disposal using today's technologies (e.g., semiconductor technologies, optical communication technologies, wireless signaling technologies, etc.) Computer engineering concerns itself with current practices in assembling hardware and software components to erect computing engines with the best cost-performance characteristics. In contrast, computer scientists worry about the feasibility and efficiency of solutions to problems in a manner that is less dependent on current technologies. As such, computer scientists work on abstractions that hide details of underlying implementations to enable the construction and comprehension of yet more complex systems. The creative process of developing, implementing, and evaluating computing abstractions is what pushes the frontiers of what computers and computations can do. For example, the pervasive use of the Web in our society is a direct result of our ability to free Internet application developers from the lower-level implementation details of moving bits and bytes over wires from one point to another. Similarly, the tremendous advances in the use of computer animation are a direct result of our ability to free programmers from having to worry about lower-level digital signal processing techniques.

  What Does It Take To Be A Successful Computer Scientist? 

Computer Science is about problem solving. Thus, the qualities of a good computer scientist include a passion for finding elegant solutions, an ability to use mathematical analysis and logical rigor to evaluate such solutions, creativity in modeling complex problems through the use of abstractions, attention to details and hidden assumptions, an ability to recognize variants of the same problem in different settings, and being able to re-target known efficient solutions to problems in new settings. If you like to solve puzzles, then computer science is for you

Computer full forms(A to Z)

A
Al – Artificial intelligence
ALGOL – Algorithmic Language
ARP – Address Resolution Protocol
ASCII – American Standard Code for Information Interchange
B
BINAC – Binary Automatic Computer
BCC – Blind Carbon CopyBin – Binary
BASIC – Beginner’s All-purpose Symbolic Instruction Code
BIOS – Basic Input Output System
Bit – Binary Digit
BSNL – Bharat Sanchar Nigam Limited
C
CC – Carbon Copy
CAD – Computer Aided Design
COBOL – Common Business Oriented Language
CD – Compact Disc
CRT – Cathode Ray Tube
CDR – Compact Disc Recordable
CDROM – Compact Disc Read Only Memory
CDRW – Compact Disc Rewritable
CDR/W – Compact Disk Read/Write
D
DBA – Data Base Administrator
DBMS – Data Base Management System
DNS – Domain Name System
DPI – Dots Per Inch
DRAM – Dynamic Random Access Memory
DVD – Digital Video Disc/Digital Versatile Disc
DVDR – DVD Recordable
DVD-ROM – DVD Read Only Memory
DVDRW – DVD Rewritable
DVR – Digital Video Recorder
DOS – Disk Operating System
E
EBCDIC – Extended Binary Coded Decimal Interchange Code
E-Commerce – Electronic Commerce
EDP – Electronic Data Processing
EEPROM – Electronically Erasable Programmable Read Only Memory
ELM/e-Mail – Electronic Mail
ENIAC – Electronic Numerical Integrator and Computer
EOF – End Of File
EPROM – Erasable Programmable Read Only Memory
EXE – Executable
F
FAX – Far Away Xerox/ facsimile
FDC – Floppy Disk Controller
FDD – Floppy Disk Drive
FORTRAN – Formula Translation
FS – File System
FTP – File Transfer Protocol
G
Gb – Gigabit
GB – Gigabyte
GIF – Graphics Interchange Format
GSM – Global System for Mobile Communication
H
HDD – Hard Disk Drive
HP – Hewlett Packard
HTML – Hyper Text Markup Language
HTTP – Hyper Text Transfer Protocol
I
IBM – International Business Machine
IM – Instant Message
IMAP – Internet Message Access Protocol
ISP – Internet Service Provider
J
JPEG – Joint Photographic Experts Group
K
Kb – Kilobit
KB – Kilobyte
KHz – Kilohertz
Kbps – Kilobit Per Second
L
LCD – Liquid Crystal Display
LED – Light Emitting Diode
LPI – Lines Per Inch
LIS – Large Scale Integration
M
Mb – Megabit
MB – Megabyte
MPEG – Moving Picture Experts Group
MMS – Multimedia Message Service
MICR – Magnetic Ink Character reader
MIPS – Million Instructions Per Second
N
NIC – Network Interface Card
NOS – Network Operating System
O
OMR – Optical Mark Reader
OOP – Object Oriented Programming
OSS – Open Source Software
P
PAN – Personal Area Network
PC – Personal Computer
PDA – Personal Digital Assistant
PDF stands for – Portable Document Format
POS – Point Of Sale
PNG – Portable Network Graphics
PPM – Pages Per Minute
PPP – Point-to-Point Protocol
PROM – Programmable Read Only Memory
PSTN – Public Switched Telephone Network
POST – Power On Self Test
PING – Packet Internet Gopher
R
RAM – Random Access Memory
RDBMS – Relational Data Base Management System
RIP – Routing Information Protocol
RTF – Rich Text Format
 S
SMTP – Simple Mail Transfer Protocol
SQL – Structured Query Language
SRAM – Synchronous Random Access Memory
SNMP – Simple Network Management Protocol
SIM – Subscriber Identification Module
T
TCP – Transmission Control Protocol
TB – Tera Bytes
U
UPS – Uninterrupted Power Supply
URI – Uniform Resource Identifier
URL – Uniform Resource Locator
USB -Uniform Serial Bus
ULSI – Ultra Large Scale Integration
UNIVAC – Universal Automatic Computer
V
VAR – Variable
VGA – Video Graphics Array
VSNL – Videsh Sanchar Nigam Limited
VDU – Visual Display Unit
W
Wi-Fi – Wireless Fidelity
WLAN – Wireless Local Area Network
WPA – Wi-Fi Protected Access
WWW – World Wide Web
WORM – Write Once Read Memory
X
XHTML – eXtensible Hypertext Markup Language
XML -eXtensible Markup language
Z
ZB – Zeta Byte
Hope you like it this full forms of computer. If you have any query comment down below.
Other Full forms are:-