IT1001/GEM1511K Introduction to Computing

 

Tutorial 4

 

 

  1. Interprete the following url and identify the different parts: Protocol, Domain name, Folder, Filename https://www.comp.nus.edu.sg/~it1001/LectTutExam.htm#Examination

Besides the protocol identified from the above url, list 5 other protocols that you have come across.

 

2.      What is a proxy server and what is it used for? In light of the recent implementation of proxy server authentication in NUS (ie, the need to supply username and password when a web browser is opened), some people allege this as a violation of privacy. Do you agree? Why?

 

3.      The web is a vast information resource and search engines are used to help users sieve out relevant information. Some examples of search engines are Google (http://www.google.com) and Excite (http://www.excite.com). Use your imagination or do some research to find out how search engines answer search queries effectively.

 

4.      What is the term commonly used to address search engines like CicadaSearch (http://www.cicadasearch.com), Metacrawler (http://www.metacrawler.com) and Dogpile (http://www.dogpile.com)? What are the advantages and disadvantages of such search tools as compared to the traditional search engine?

 

5.      List all newsgroups under the NUS domain, e.g. nus.rec.saleswap.