Tuesday, September 13, 2011

Web application for making website by Internet


Web application is website that contains pages stored on a web server with partly or entirely undetermined content. The final content page is determined only when the user requests a page from the server. Because the final content of the pages varies from request to request based from web server.
A regular website comprises a set of related HTML pages and files hosted in a computer running a web server. Web server is software that serves web pages in response to requests from web browsers. A page request is generated when a user clicks a link on a web page, chooses a bookmark in a browser, or enters URL in a browser’s Address text box and click Go.
When a web sever receives a request fro a regular web page, the server sends the page to the requesting browser. But, the server reacts differently when it receives a request for dynamic pages.
An application database serves to work with server-side resources such as database. For example, a dynamic page may instruct the application server to extract data from a database and insert it into the page’s HTML.
Planning is the most developed for web application in internet for create website. We would encounter numerous problems regarding the site at the time of publishing and at the time of accessing, if we made a site without planning.

      

Sunday, September 11, 2011

Desktop publishing on computer


Desktop publishing in not only fascinating but also highly rewarding. Equipped with the knowledge of desktop publishing, a personal computer, a laser printer and a scanner, we can earn enough money to support. After reading we will be able to run own desktop publishing studio in house as desktop publishing operator.

Desktop publishing is the process of making layouts, setting pages and there after taking printouts. The desktop operator’s arsenal consists of the following equipment. Personal computer loaded with licensed copies of Windows XP, PageMaker7, CorelDraw 10 and Photoshop 7,Laser printer, Scanner, preferably and flat-bed.
Letterpress Printing:
In letterpress printing the letters and images to be printed are projected out of the so called “relief plate”. It appears letters and images are embossed on the relief plate.
Gravure:
The technique  used in gravure printing is the reverse of letterpress printing. In gravure printing, the letters and images to be printed are engraved on the plate, whereas in litho printing it appears that the letters and images are to be printed are embossed on the plate.
Hardware Requirement:
In order to start a desktop publishing studio, we should have a good personal computer with the following configuration: Microprocessor with clock speed not less than 1GHz.Motherboard with onboard multimedia circuits. Otherwise, we will have to install separate sound card, video card and so on.256MB of RAM. 40GB hard disk and Two USB ports. One laser printer.
Software Requirement:
We need licensed copies of the following software packages, in order to run a desktop publishing studio: Windows XP Professional, CorelDraw 10, Adobe Photoshop 7.0 and AdobePageMaker7.0 are examples.

  


Saturday, September 10, 2011

Transaction processing and security of the computer database



Transaction processing is the process of grouping together a set of queries sent to the computer database. Stored procedures are supported by computer database systems such as Oracle, SQL server and other server-based computer database programs. File-based systems such as access do not supported stored procedures in the strict sense.
Conditional statements:
 It allows branching the path of execution in a script based on whether a single or multiple condition evaluate to true or false. Put simply, they let test things and perform various actions based on the results.
Switches:
Switches are a good alternative to if/Else. Statement in situations where we want to check multiple values against a single variable or condition.
Ternary operator:
It is an operator, not a control structure, the ternary operator represented by “?”, can be used as shorted for simple If/Else statements.
Continue and Break statements:
Continue is used within any loop with conditional statement like if. While looping we can check the condition for each time and make actions. According to the result of the condition we can either continue loop using continue or break loop using break.
File handling:
It provides set of providence and its facts too.

   

Thursday, September 8, 2011

Cyber law in internet in Nepal



The worlds least developed countries including Nepal have rewarded themselves of the opportunity to rapidly develop education, health, agriculture, tourism, trade and various other sectors using Information Technology. With the large development of Information Technology the criminal activities are also increasing. In Nepal, Cyber crimes like Software Piracy, Hacking etc. are increasing. Corruption is seen in every field – From government to private organizations are using pirated CDs. Software CDs can be seen in the footpaths of Kathmandu, which has decreased the value, as well as violated the law of the cyberspace. People are crowding into these places because of the low price. People want just the CDs. Who cares about the quality and law?
Program CDs of great value are found all over the Kathmandu valley and prices range from Rs. 50-100 (U.S $0.70 -1.40), but original software costs 100 times more than that. Though this is not new to any Nepali citizen, it may also attract the attention of some foreigners visiting Nepal. “Not only Nepalese, Foreigners also take these CDs”, said one Footpath CDs seller in Kathmandu. Whenever anyone buys a new software CD, it is shared with all his friends and relatives. It has become a habit for all Nepali people to share CDs.
This problem is not limited only to CDs. In Cyber cafes, children of young ages can be seen using porn sites. The proprietor of the CafĂ© not caring about the law, they just want all his computers to be packed. Different hackers’ software can be found in each individual’s computer.
To control those criminal activities the ‘Electronic Transaction Act’ is declared by Ministry of Information Technology and Telecommunication in 2005 A.D. which is popularly known as Cyber Law. Laws are established and enforced by the authority, legislation, or custom of a given community, state or nation to maintain orderly coexistence. Basically, Cyber law deals with child pornography, Cyber-stalking, Cyber-scams, online fraud, software piracy and much more.
In these approximately 5 years of declaration of Cyber Law, even a single percentage of crimes are not controlled. So there are still many doubts on successful implementation. Because Nepalese think “Laws are made to be broken”. This current Cyber Law has failed to address many problems. The law is not strict enough for the holistic deception of Cyber related crimes. Problems of online media, as well as fines and imprisonment, are not as big as in the U.S. and Japan.
The effective implementation of Cyber law is now a necessity. Nepal will not be able to regulate the information technology industries without taking the international legal context into account. The main thing is that regulations are enforced. First of all, the authorities should be self-concerned before awaking the citizens. Anyway this law has provided new trust to the Information Technology (IT) sector, and computer and IT professionals are hopeful that it will create a favorable situation for conducting IT business. It contains a strong provision of punishment against Cyber crimes according to the nature of the crime. As per the provisions of law, the government is fully authorized to punish Cyber criminal, an individual or institution.
Since the computing field is a dynamic one, policies and laws related to this area need to be revised periodically to reflect the changing trends.
We cannot say that Law itself will solve all the problems, but we can also think of different solutions to different problems. First of all the government need to make the people aware of all these laws and policies as soon as possible. I suggest 3 kinds of actions to secure from Cyber crimes:-
1.CompanyshouldsecuretheirnetworkedInformation.
2.Firms,governments, and civil society should work cooperatively to strengthen legal frameworks for Cyber security.
‘Most great Cyber crime in Nepal is Software Piracy so to control this problem government and private IT Companies should aware the students to use Microsoft academic program(ELMS) or free/open sources software which is free of cost


Control Statements, Operators and Related topics in Internet


Control structures change the flow of execution in a script. If and switch statement are used to choose to between different blocks of code to execute. The same block of code can be repeated multiple times with for, for each, while, do loop, break, continue, exit () and die () stop the execution of a script or block of code. Finally, include and require functions provide a way for PHP scripts to call other PHP scripts.
Conditional statements:
It allows to branch of the path of execution in a script based on evaluate true or false.
Athematic Operators  
The symbols operator preforms athematic calculations:
Symbol
Operator
Action
+
Addition
5+6 return 11
-
Subtraction
6-3 return 3
*
Multiplication
6*3 returns 18
/
Division
6/3 returns 2
%
Module(remainder)
7%2 returns 1

Assignment Operator:
It assigns the value returned by an operation to the accumulator is called assignment operator.
Identifiers:
It identifies data and hold value in computers memory. We can pass different values to identifiers and set also.
Switches:
It is a good alternative to If/Else if/Else statement in situations where we can check multiple values against a single variable or condition.





Tuesday, September 6, 2011

Protocols of computer network


Protocol establishes standards for such transmission of data. Both sending and receiving device must be capable of communicating using the same protocols. Some common protocols are the followings:
TCP/IP(TransmissionControlProtocol/InternetProtocol):
Transmission Control Protocol(TCP) is responsible for delivering information correctly. TCP establishes a connection between sender and receiver before transferring data.
IPX/SPX:
Internet packet exchange/sequential packet exchange is the mostly commonly used with Novel Netware operating system for networking purpose. It is fast, well-established protocol; but not used on the internet.
Net BEUI:
Net BIOS extended user interface (NetBEUI) is transport protocol that is commonly founded smaller network. NetBEUI is fastest protocol than others. It is routable on internet. It can send and receives files and folders.
    

Connectors of computer network


We can’t just go out and get cables and expect to run network. First, we need some way of catch computer to the network via those cables. In other words, we now need to investigate connector possibilities.
The kind of computer we need depends on the kind of cable that we use. If we buy Ethernet T-connectors for future network, we’d better be prepared to go with an Ethernet network because Ethernet connectors won’t works with twisted-pair or fiber. Each kind of cables uses different connectors.
BNC Connectors:
We’ll use three kinds of connectors on an Ethernet bus network:
T-connectors:
link cable to the cards making T-Shape. The T-connector plugs into the card we’ve installed in computer. The cable connects to the crossbar of the T-connector.
BNC connectors:
Link cables together and connect them to T-connectors.
Terminators:
Terminate the LAN on either end. Terminators are made for either 50-ohm or 75-ohm cables; 50-ohm terminators are usually the standard. Pay attention when we are buying terminators because they won’t work if mix them up. Most coax network cable system needs 50-ohm terminators.
RJ-45:
Mist unstable twisted pair cable terminates using connectors that look like chunkier versions of the connectors used to plug telephone into the wall. These are called RJ-45, whereas telephone uses RJ-11 connectors.

   

 

LAN (Network) Topologies of Computer


Each computer or device in a network is called a node. The geometrical arrangement of computer resources, remote device and communication facilities is know as network topology. It determined data paths that may be used between any two pairs of stations of the network.
Types of network topology:
Ring network:
It is form of circle as far as the nodes are connected. Computer are linked path or in ring. It doesn’t require central host computer. Thus each nodes of ring network must have simple communication capability.
Completely connected network:
It is combined using physical link (cables). Each computer of such computer has a direct dedicated link called point-to-point link with all other computer of network.

Transmission Media:
Data required some media to travel and that cables provide this platform with help of microwaves also but it is too much expensive. Commonly the cables are used they are follows:


Coaxial cable:
It consists of many small wires/cables of copper or aluminum in a protective cover. It is able to transmit data at higher rates. It is popular cable for connecting computer terminals.


Fiber cable:
It is thin and flexible like human beings. It is useful to transfer large volume of data. It is more expensive and difficult to work and harder to install.
  

Cyber law in internet



Cyber law governs the legal issues of cyberspace. The term cyberspace is not restricted to the internet. It is very wide terms that include computers, computer networks, internet, data and software. Cyber law encompasses relating to electronic and digital signatures. Computer crime, intellectual property, data protection and privacy and telecommunication.
Electronic and Digital Signature Laws:
This laws are faster becoming the defector standard for authentication of electronic records, electronic data interchange emails. Comprehensive laws are required so that uniform standards and procedures can be established. These laws relating to electronic signatures.
Computer Crime Laws:
Our growing dependence on computers and the internet has made us all potential victims of internet threats. Some countries have enacted legislations that specially deal with computer crime and yet others have adapted their existing laws to make computer crime an offence under existing statues. These laws are under the gambit of cyber laws.
Intellectual Property Laws:
Cyber laws cover that intellectual property laws that relate to cyber space and its constituents. This includes:
Copyright Law in relation to computer software, computer source code.
Trademark Law in relation to domain names.



  

Saturday, September 3, 2011

C programming Used in Internet


C language is the high level programming languages. It was developed by Denis Ritchie and implemented at Bell laboratories in 1972. It gets existence from the development of Ken Thompson. B language which is highly flounced by Basic combined programming languages was developed in Unix operating system. C is a powerful, structured and procedural language. It emphasis on procedure rather than data. It is powerful language because it combined the features of assembly and high level language.
Features of C languages
C is the structured of languages:
It supports various programming constructs such as looping built in function. So, that it provides a shorten structure to built the programs.
C is the robused languages:
The built in function keywords operators of C which can be used in any complex program and easy and ephasiation and execute.
Portable languages:
C is a portable languages that means c programs return in any computer can be run in any other computer with little or modification.
Modular programming:
Programming in c can be cooperate or divided to different segments called function. So, that it will be easier to write as well as debug. Incase, the programming goes larger than programs can write it in different files and compile them separately.

Format specified:  
It is a special symbols star with percentage (%) and tells the c compiler, the types of value which is going to be processed (read and write).
Format specified
Meanings
%d
Integer types
%f
Floating print type
%ld
Long integer
%c
Character type
%lf
Double type
%c
String type

Pre-processor directive:
In c, #include forms preprocessor directives. It tells the c processor to look for a file and places the content of the files in the location where #include identifiers. The pre processor is a program that does some preparation for the complier before the code is complied.
Header files:
Header files are the library files which is needed to use the C library built in functions. It has file extension. It is enclosed in < >. In C it declared after #include directives and at the top of the program.
Operators:
It is a special symbol which acts upon an operand. Examples are-? +, -, /, >, <.etc. operand are the variable or constant in which operator acts upon. There are two types of operator. An operator which acts upon only one operand is called unary operator and which acts upon two operand is called binary operators.
Increment (+ +) and Decrement (- -) operators:
Increment operator increased the value of an operand 1. Decrement operator decreases the value of operand 1.
Standard Input/output functions:
C consists of several in built library functions. The functions can be used in program including an appropriate header files. One of them is standard/input/output functions which are available in <stdio.h> header files.

Control statement:
 
Till now we are writing simple and unrealities program because program do not consists of any kinds of testing or condition. In realistic program, there will be a condition to make a decision so that program control can transfer from one part of program to another part realistic program can be written control statement.
Looping:    
It is a process which allows the data to be repeated unless or until some condition has been satisfied.
Array:
An array is a collection of similar types of variables in common names. It is a user defined homogenous data structure.
String:
It a collection of characters or groups of characters which is terminated by Null character (\0). It is also known as an array of characters.
Functions:
It breaks down large computing task to into similar pieces which increases the effiency of programming. Function always returns values. C programs consist of one or more functions. Two types of function are there i.e. user defined and library functions. Library function are built in functions whereas user defined functions are created by user. C programs supports modular programming which is possible due to functions.
 C libraries:
C libraries are prewritten procedures that carry out various operations or calculations. The sources program must therefore include declaration for library functions. The required functions are stored in special sources files are called header files.
Marcos:
It is single identifiers which are equivalent to expression, complete statement or group of statement. The preprocessor directive, # define can be used to define macros.











  




 

Tuesday, August 30, 2011

Basic concept of Domain name and webhosting for making website in internet


Domain Name

Whenever it comes to internet we can’t separate domain name from the internet. Whether to browse any website or to use email we use the domain name.  Therefore domain name is a unique identification that helps to create the path to open certain website.  The entire domain name in this world has IP address. IP address can be remembered by machine but it will be hard to remember for human brain. Therefore to minimize the complexity, every time we enter the domain name, the domain name will be converted into IP address and the website will be open.  Domain name has got certain extension. .com .net .org .biz  .edu etc. For registering the domain name we have to pay certain money yearly to the domain name provider.

Web hosting

Whenever we made a website it will be limited only into your computer. Like we need hard disk to store you files, images we need a web server to store our website and make it available to the world. Today’s there are many hosting company available that will host you website with full security and they will charge certain money of it. Webhosting is one of the most essential things if we are going to start new website or self hosted word press blog. If you want to start a blog at blogger or word press.We don’t need webhosting because blogger and wordpress.com host files at their server for free.  In computer the data will be stored in the hard disk likewise the data will be store in the web server in the hard disk. Therefore each upload of  file in the web space will be occupied like our hard disk stored with the numerous files. When other people try to access to website. Our file will be executive from the web server, therefore it consumes certain bandwidth.
Some basic terms in web designing
Diskspace:
Diskspace is the space that is being used to store website or blog. Nowadays most of the webhosting offers  unlimited disk space.  That means we can store as much as data in your hosting account. The amount of diskpace may vary from different hosting companies. The diskspace is measure in MB(mega byte) and GB (Giga byte) like on hard disk spaces.
Bandwidth:
The amount of data that passes through network at a given time is called bandwidth consumes by that website. Mostly bandwidth consumes by the website is measured monthly by various hosting company. Whenever we visit a website we are accessing bandwidth of that website because to view the website, The page that you are viewing should be first downloaded on your computer.  For example if you are trying to access this page until the whole image text of this page doesn’t get downloaded on the computer you will be unable to view this website. Whenever the user interacts to website the bandwidth of your website will be consumed. So how much bandwidth will be needed for  website or blog?  Well the answer is simple it depends upon the traffic of your website. For example if we have 100 visitors per day on your  website the normal bandwidth of your website will be depend upon what the user do with your website. If the user starts viewing video that is being uploaded on your server it will consume more bandwidth if the user only interact with your website then the bandwidth will be small. If you have a large number of visitors in  website per day then you must need a good bandwidth. If the user are more than the capacity of the bandwidth of web server. Then the web server will be down therefore visitors can’t access your website. Now a day’s most of the hosting companies offer unlimited bandwidth to the users but it doesn’t mean that it will be able to enhance all the large traffic towards website. If traffic is large enough we should move blog or website towards dedicated server

Monday, August 29, 2011

Fundamental of Computer


Fundamental computer can be defined as electronic devices that can solve problems by accepting data, performing certain operations and presenting the result of those operations under the direction of detailed step-by-step information. It is totally user dependent devices too. It performs complex calculation at a very high speed.
Importance of Fundamental computer:
Fundamental computer is important because it gives information from all over the world which is available to anyone with a computer. Computer fundamental is used as networks and telecommunication too. Even political boundaries are challenged by fundamental of computer too. Fundamental of computer is important for shaking up our world. Fundamental computer or every size affects human life too. Due to fundamental computer human begins gets knowledge to prepare for working and living in a computerized society. Fundamental computer effects major technological revolution on both positive and negative too. So fundamental of computer is important all over the world and in human beings life too.
Evolution of fundamental computer:   
We will be amazed to know that this fundamental computer is sitting so closely on desk today. So it is the result of several hundreds of years of development. The computing evolution starts from the early civilization of 4000years ago. Evolution of fundamental computer means the gradual change in the concept over a long period of time and on too. So evolution of fundamental computer is very much important and essential for many years too.   
Types of fundamental of computer:
There are many types of fundamental of computer in the world. But there are three important computer mostly used in this science technology and human beings life too. They are given in following types or topics.
a} Digital computer:
Digital computer is important for fundamental of computer too. It can accept discrete data too. It counts digits which represent number or letters. They are mostly widely used types of computer. Fundamental of computer is based on binary digits i.e. 0 and 1 are called digital computer too.
b}Hybrid computer:
It is the combination of analog and digital computer. It has both features of digital and analog. It can do types of tasks of digit and analog too. It can do any types of tasks of digital and analog too. It is mostly used in scientific research, industrial, application, space craft and so on too.
c}Analog computer:
Analog computer measures continuous types of physical values such as temperature or pressure. We have seen many devices used as analog device. The accuracy of data used in an analog computer is directly related to the precision of its measurements.
Characteristics of fundamental computer:
Computer fundamental is intelligent that performs various operations in more faster, accurate and effective way. Thus it frees human to use their time in matters involving creativity and judgment. The characteristics possessed by computer fundamental can be listed as follows:
a} Speed of computer:
Computer fundamental can work at a very high speed. Time taken by the computer fundamental to execute instruction is very fast. Computer fundamental takes a few micro/nano second to execute an operation. The processing speed of computer fundamental can also be measured in megahertz.
b}Accuracy:
Though computer fundamental does its work with a very high speed, it does not make any mistake unless the user gives a wrong instruction. Computer fundamental are 100% accurate. This is also called GIGO (Garbage In Garbage Out) storage capacity
c}Storage capacity:
.Computer fundamental can store very large volume of data that can be used in the future by help of secondary storage device like; floppy disk, hard disk, compact disk, etc.





Computer Networking & Internet




Computer networking management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, computer networking management involves a distributed database, auto polling of network devices and change traffic of network topology. Computer networking management is a service that employs a variety of tools, application and devices to assist human network in monitoring and maintain networks.
Computer networking architecture uses the same basis structure and set of relationship. Computer networking architecture management entities can also poll and stations to check the values of certain variables. Simple networking management protocol  and common management information protocol  are also including.
Computer networking management tools has contributed a great deal to network standardization. Its network management model is the primary means for understanding major functions of networking management system.
The goal of performance management is to measure and make available various aspects of networking performance, so that internet work performance can be maintained at an acceptable level. Performance management involves to gathered varieties of networking administration too. Networking management entities continually monitor performance variables. Performance networking management also permits proactive methods.
The goal of configuration networking management of computer is to monitor network and system configuration information, so that the effects a network operation of various versions of hardware and software elements can be tracked and management. Each network device has a variety of version information associated with it too.
Accounting management also include in computer networking management. Such regulation minimize network problems and maximizes the fairness of network across a;; users. Some correction of course, will be required to reach optimal across practices.
Fault networking management is also detect, log, notify users of load automatically fixed problems to keep network running. It involves first determining systems and isolating the problems.
Security networking management is to control access to network resources according to local guides, so networking cannot be sabotaged. It performs several functions in computer networking management. It monitors access points to sensitive too.
Computer networking software that manages resources on network is often called network operating system (NOS). Some popular networking operating systems are Microsoft windows 2000, Novell networking operating system, Windows server 2000 and so no.
Important of computer networking is can easily and legally share information with other computer. Computer on networking access devices like printer and other connected peripherals. It facilitates backup. Security is also helpful for not providing unauthorized access.
Computer networking with good communication capacity, with sufficient memory, process capacity and NIC (Network Interface Card/Network Card). Data communication also needed in computer networking use of computer networking technology and networking protocol also uses too.
Gateway used in computer networking for large entity too. It is joined together by a high speed link. Gateway is a computer networking management point that acts as to another network too.
Direct connection a dedicated phone line is used for computer networking management too. It can operate kb per second too. It required router which automatically handle connection of computer networking management.
Frame transmission receives a transmits frame request with the accompanying address and data information from layer of LLC sub layer. Frame is assembled, actual frame transmission will depend on whether the MAC is operating in half-duplex and full duplex method.
System consideration might see that it would be no problem to upgrade an existing computer networking management or to plan a new computer networking management. The problem is two fold.
Aompus disturber is also important in computer networking management system. It facility with two or more building in a relatively small area. This control point of the computer backbone and telecom connection point with the outside world.
   
       The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW). 


COMMON USE OF INTERNET 


[1]E-mail 
The concept of sending electronic text messages between parties in a way analogous to mailing letters or memos predates the creation of the Internet. Even today it can be important to distinguish between Internet and internal e-mail systems. Internet e-mail may travel and be stored unencrypted on many other networks and machines out of both the sender's and the recipient's control. During this time it is quite possible for the content to be read and even tampered with by third parties, if anyone considers it important enough. Purely internal or intranet mail systems, where the information never leaves the corporate or organization's network, are much more secure, although in any organization there will be IT and other personnel whose job may involve monitoring, and occasionally accessing.
[2]TheWorldWideWeb

The World Wide Web is a huge set of interlinked documents, images and other resources, linked by hyperlinks and URLs. These hyperlinks and URLs allow the web-servers and other machines that store originals, and cached copies, of these resources to deliver them as required using HTTP (Hypertext Transfer Protocol). HTTP is only one of the communication protocols used on the Internet. 
Web services also use HTTP to allow software systems to communicate in order to share and exchange business logic and data. Software products that can access the resources of the Web are correctly termed user agents. In normal use, web browsers, such as Internet Explorer and Firefox access web pages and allow users to navigate from one to another via hyperlinks. Web documents may contain almost any combination of computer data including photographs, graphics, sounds, text, video, multimedia and interactive content including games, office applications and scientific demonstrations.
[3] File sharing 
Computer file can be e-mailed to customers, colleagues and friends as an attachment. It can be uploaded to a Web site or FTP server for easy download by others. In any of these cases, access to the file may be controlled by user authentication; the transit of the file over the Internet may be obscured by encryption and money may change hands before or after access to the file is given. The price can be paid by the remote charging of funds from, for example a credit card whose details are also passed—hopefully fully encrypted—across the Internet.

[4]Marketing 
The Internet has also become a large market for companies; some of the biggest companies today have grown by taking advantage of the efficient nature of low-cost advertising and commerce through the Internet, also known as e-commerce. It is the fastest way to spread information to a vast amount of people simultaneously. The Internet has also subsequently revolutionized shopping—for example; a person can order a CD online and receive it in the mail within a couple of days, or download it directly in some cases. The Internet has also greatly facilitated personalized marketing which allows a company to market a product to a specific person or a specific group of people more so than any other advertising
Examples of personalized marketing include online communities such as MySpace, Friendster, Orkut, Facebook and others which thousands of Internet users join to advertise themselves and make friends online. Many of these users are young teens and adolescents ranging from 13 to 25 years old. In turn, when they advertise themselves they advertise interests and hobbies, which online marketing companies can use as information as to what those users will purchase online, and advertise their own companies' produce these types.
Today’s internet
The Internet is a worldwide, publicly accessible series of interconnected computer networks that transmit data by packet switching using the standard Internet Protocol (IP). It is a "network of networks" that consists of millions of smaller domestic, academic, business, and government networks, which together carry various information and services, such as electronic mail, online chat, file transfer, and the interlinked web pages and other resources of the World Wide Web (WWW).