Unit 2 Notes
Unit 2 Notes
Answer:
Keyword Searching
Use a keyword search to search all parts of a source for the words you
enter in the search box. This type of searching uses "natural language"
and is one you're probably already familiar with--you simply enter
words or phrases into a search box that you think are relevant to your
topic. Click on the "Keyword Searching" page for more information.
Boolean Searching
Boolean searching is a search technique which uses Boolean operators to
help bring back search results faster and with more precision. The most
common Boolean operators are AND, OR, and NOT. These are logic-
based words that help search engines narrow down or broaden search
results. Click on the "Boolean Searching" page for more information.
Subject Searching
Within a database or online catalog, subject searching allows you to
search by categories, which are found in the subject field of an item
record. Subject terms are pre-defined and used for all items within a
database or source that relate to that term. Click on the "Subject
Searching" page for more information.
Limiters
Many databases allow users to limit their search results by certain
criteria. These options are often located somewhere on the database
search page or results list as drop down menus or check boxes. Some
common and useful limiters include date of publication, material type,
full text, and more. Click on the "Limiters" page for more information.
Phrase Searching
When you search for a phrase like corporate social responsibility the
search engine will bring back any results that have those words in them.
However, if you put quotation marks around the phrase, "corporate
social responsibility", the search engine will only bring back results that
have all those words, exactly in the order you have them. This can also
be useful when you're searching for the title of a book or other
resource. Click on the "Phrase Searching" page for more information.
Types of SEO
SEO can be classified into two types: White Hat
SEO and Black Hat or Spamdexing
White Hat SEO
An SEO tactic, technique or method is considered as White
Hat if it follows the followings
If it conforms to the search engine's guidelines.
If it does not involves any deception.
It ensures that the content a search engine indexes and
subsequently ranks is the same content a user will see.
It ensures that a Web Page content should have been
created for the users and not just for the search engines.
It ensures the good quality of the web pages.
It ensures the useful content available on the web pages.
Black Hat or Spamdexing:
An SEO tactic, technique or method is considered as Black Hat
or Spamdexing if it follows the followings:
Try to improve rankings that are disapproved of by the
search engines and/or involve deception.
Redirecting users from a page that is built for search
engines to one that is more human friendly.
Redirecting users to a page that was different from the page
the search engine ranked.
Serving one version of a page to search engine spiders/bots
and another version to human visitors. This is
called Cloaking SEO tactic.
Using Hidden or invisible text or with the page background
color, using a tiny font size or hiding them within the
HTML code such as "no frame" sections.
Repeating keywords in the Meta tags, and using keywords
that are unrelated to the site's content. This is called Meta
tag stuffing.
Calculated placement of keywords within a page to raise
the keyword count, variety, and density of the page. This is
called Keyword stuffing.
Creating low-quality web pages that contain very little
content but are instead stuffed with very similar key words
and phrases. These pages are called Doorway or Gateway
Pages
Mirror web sites by hosting multiple web sites all with
conceptually similar content but using different URLs.
Mirror web sites by hosting multiple web sites all with
conceptually similar content but using different URLs.
Creating a rogue copy of a popular web site which shows
contents similar to the original to a web crawler, but
redirects web surfers to unrelated or malicious web sites.
This is called Page hijacking.
Question: Tags.
o If you have used an open tag <tag>, then you must use a
Head tag: The head tag is used to contain all the head
elements in the HTML file. It contains the title, style, meta,
… etc tag.
Syntax:
<head> Statements... </head>
Syntax:
<h1> Statements... </h>
<h2> Statements... </h2>
<h3> Statements... </h3>
<h4> Statements... </h4>
<h5> Statements... </h5>
<h6> Statements... </h6>
<h1>Heading 1 </h1>
<h2>Heading 2 </h2>
<h3>Heading 3 </h3>
<h4>Heading 4 </h4>
<h5>Heading 5 </h5>
<h6>Heading 6 </h6>
Output :
Syntax:
<img>
Link tag: It is used to link the content from an external
source.
Syntax:
<link>
Horizontal rule tag: It is used to display the horizontal line
in an HTML document.
Syntax:
<hr/>
Meta tag: It is used to specify the page description. For
example last modifier, authors, … etc.
Syntax:
<meta> Statements ... <meta>
Table tag: A table tag is used to create a table in an HTML
document.
Syntax:
<table> Statements... </table>
Tr tag: It is used to define a row of an HTML table.
Syntax:
<tr> Statements... </tr>
th tag: It defines the header cell in a table. By default, it set
the content with the bold and center.
Syntax:
<th> Statements ... </th>
Td tag: It defines the standard cell in an HTML document.
Syntax:
<td> Statements ... </td>
Form tag: It is used to create an HTML form for the user.
Syntax:
<form> Statements ... </form>
Submit input tag: It is used to take input from the user.
Syntax:
<input type="Submit" value="Submit">
you can also store image elements with hyperlinks. In this case, the start and end tag
of the a elements surround the HTML code in order to embed the graphic.
The high link popularity shows that more people are connected to your site and it
contains useful content and information. So, it is one of the important factors for
the search engines to rank websites in search engine result pages, i.e. if there are
two websites with same level of search engine optimization, the site with higher
link popularity will be ranked higher than the other by the search engine.
However, the links to your site should be quality backlinks. A quality backlink is a
link that has content that relates to your site as well as has high popularity.
Anchor text also helps in determining the quality of a backlink. It tells what the
link is all about. There are few guidelines you may follow before you look for link
partners.
Question: Residence time of website.
Question: Frames.
HTML Frames are used to divide the web browser window into multiple sections
where each section can be loaded separately. A frameset tag is the collection of
frames in the browser window.
Creating Frames: Instead of using body tag, use frameset tag in HTML to use
frames in web browser. But this Tag is deprecated in HTML 5. The frameset tag
is used to define how to divide the browser. Each frame is indicated by frame
tag and it basically defines which HTML document shall open into the frame. To
define the horizontal frames use row attribute of frame tag in HTML document
and to define the vertical frames use col attribute of frame tag in
HTML document.
<!DOCTYPE html>
<html>
<head>
<title>Example of HTML Frames using row
attribute</title>
</head>
Question: Scripts.
The process of creating and embedding scripts in a web page is known
as web-scripting. A script or a computer-script is a list of commands that are
embedded in a web-page normally and are interpreted and executed by a
certain program or scripting engine.
Web Scripting
Client-Side Scripts :
Session cookie
Persistent cookie
Supercookie
Flash cookie
Flash cookies or "local shared objects" [LSOs] are data files that
are stored on computers by websites that use Adobe® Flash®.
Like browser cookies, Flash cookies can store user information
in Flash applications. Flash cookies are sometimes used by sites
as "backup" once the browser cookie is deleted.