Anglais G3 MP&MI
Anglais G3 MP&MI
ISP BUNIA
TECHNICAL ENGLISH III
G3 MP&MI 2020-2021
Moses NGADJOLE KABONA
Assistant
15 hours theory
30 hours
15 hours practice
I. Teaching objectives
The course aims to
enhance students’ understanding of some technical terminologies related to
mathematics computing and physics as well as some grammar points in
English.
Develop student’s listening, speaking, reading and writing skills in English.
II. Learning outcomes
By the end of the course, students will develop:
a sound understanding and the use of the adjectives and pronouns in English
grammar;
tutorials
self-directed study
cours attendance 10 %
final examination: 50 %
V. Course outline
Section one: SOME GRAMMAR POINTS
1. ADJECTIVES
1.1 Introduction
1.2 The comparison of the Adjectives
2. PRONOUNS
2.1 Personal and possessive pronouns
2.2 Reflexive and Emphatic pronouns
2.3 Reciprocal pronouns
2.4 Demonstrative pronouns
2.5 Interrogative pronouns
2.6 Relative pronouns
2.7 Numerical pronouns
Section two: MATHEMATICS
1. INTERGER EXPONENTS
2. QUADRATIC EQUATION
BIBLIOGRAGY
3
Example:-
The grey dog barked.( the adjective grey describes the noun “dog”).
The good news in that the form of an adjective does not change. It does not matter if
the noun being modified is male or female, singular or plural, subject or object.
Some adjectives give us factual information about the noun- age, size, color etc. (fact
adjectives – can’t be argued with). Some adjectives show what something or
somebody. – nice, horrid, beautiful etc.( opinion adjectives- not everyone may agree).
If you are asked questions with which, whose, what kind, or how many, you need an
adjective to be able to answer.
Ammu is tall.
Job is taller than Abu.
Mohan is the tallest of the three.
4
In the second sentence, the word’ taller’ is the comparative form of the adjective. The
comparative form of the adjective denotes a higher of the adjective ‘ tall’ when two
people or things are compared.
In the third sentence, the word ‘ tallest’ is the superlative form of the adjective
denotes the highest degree of the adjective ‘ tall’ when more than two people or
things are compared.
Here are some simple rules to keep in mind when forming comparatives and
superlatives.
Rule 1
For most adjectives,’er’ is added for the comparative form and ‘est’ for the
superlative form.
Rule 2
For adjectives ending with ‘e’, ‘r’ is added for the comparative and ‘st’ for the
superlative form.
Rule 3
For adjectives ending with ‘y’, ‘y’ is removed and ‘ier’ is added for comparative form
and ‘iest’ for the superlative form.
Lazy- lazier- laziest
5
Rule 4
Usually for longer adjectives, ‘more’ + adjectives is used for comparative form and
‘most’ + adjective is used for the superlative form.
Rule 5
Irregular adjectives: There are some irregular adjectives for which the comparative
and the superlative form follow no particular rule.
Examples:
1.2 PRONOUNS
Pronoun is word which is used instead of a noun or phrase. It is a word that replaces
a noun for referring to a person or thing that has been mentioned earlier. The word
‘pronoun’ derives from Latin ‘pro’ meaning for and ‘nomen’ meaning name.
Singular Plural
Examples.
This English course is very easy to learn. (adjective – near the speaker)
That pen is not yours. (adjective – some distance from the speaker)
These watches must be sold. (adjective – plural of this)
Those students are intelligent (adjective – plural of that)
This is your English course (Pronoun)
That belongs to your Headmaster. (Pronoun)
Examples.
Who said you were going to fail the statistical course.
Who is the youngest student among you?
What type of final exam do you suggest?
Which car do you like? A sport, a family or a utility car?
8
Relative Pronouns
Relative Adverbs
These sentences are correct, but they are very short and simple. You can use
relative clauses to make your sentences in English sound more fluent and natural:
Examples
The teenager (to whom) I talked to said he was sorry about what happened.
The University (from which) I graduated was one of the best institutions in America.
The exam (in which) most students failed is known.
The radio station (which/that) I listen to is the BBC (British Broadcasting
Corporation).
The house (which/that) was sold was not good.
The woman- she lives next door- is a doctor.
10
( )
3
2x 2x 2 x 2 x
notion. Similarly we can write ∙ ∙ = ,
3 3 3 3
and ( x +2 y )( x +2 y )( x +2 y ) ( x +2 y ) as ( x +2 y )4.
Exponential notion can be used to express the product of any expression that is used
repeatedly as a factor.
Definition of Natural Number Exponents
In the expressionb n,b is the base, n is the exponent, and b nis the nth power
of b
()
3
2 4 4 1
a. 3 b. (−5 ) c.−5 d.
2
Solution
a. 32=3 ∙ 3=9
b. (−5 ) 4=(−5 ) (−5 ) (−5 ) (−5 )=625
c. −5 4 = −¿ ( 5 ∙5 ∙ 5 ∙5 ) =−625
()
3
1 1 1 1 1
d. =¿ . . =
2 2 2 2 8
Remark
Notice the difference between (−5 ) 4=625 and −5 4=−625 . The parentheses in
(−5¿¿ 4)¿indicates that the base is −5; however, the expression −5 4 means −(5) 4.
This time the base is5.
Consider the sequence:
4
5 =625
3
5 =125
2
5 =25
12
1
5 =5
0
5 =?
−1
5 =?
−2
5 =?
Notice that each power divided by the base 5 yields the power in the row below it.
For example, 625 ÷ 5=125 and 125 ÷ 5=25 . To continue this pattern, the powers 50 ,
−1 −2
5 , and 5 must be defined as
0
5 =3÷ 5=1
−1 1 1
5 =1÷ 5= = 1
5 5
−2 1 1 1 1
5 = ÷5= ∙ = 2
5 5 5 5
These observations suggest the following definitions.
Definition of b 0
For any nonzero real number b , b 0=1
Any nonzero real number raised to the zero power equals 1.
0
For example, 7 =1
1 =1
2
0
() 0
(−3 )0 =1 π 0=1 ( a 2=1 ) =1
Definition of b−n
if b ≠ 0 and n is any natural number, b−n=¿ 1/b n and 1/b−1=b n
This definition says that a factor is raised to a negative power, then that factor can be
raised to a positive power by moving the factor from the numerator to the dominator
or vice versa. For example,
−2 1
−2 1 1 1 3 5 7 7
3 = = , −3 =4 =64 , −1 = 2 =
3
2
9 4 7 5 25
Restriction agreement
The expression 0 0 , 0n where n is a negative integer, and x /0 are all undefined
expressions. Therefore, all values of valuables in this text have been restricted to
0 −3
x y
avoid any of these undefined expressions. For example in the expression: it
z−4
should be assumed that x ≠ 0 , y ≠ 0 ,∧z ≠ 4, whether or not these restrictions are
specifically stated.
The associative property of multiplication can be used to simplify expressions of the
type b n ∙ bn where m and n are integers. For example,
13
n n
b ∙ b =( b ∙ b∙ b ) ∙ ( b ∙ b ) by definition
¿ b ∙ b ∙ b ∙b ∙ b associative property of multiplication
5
¿b
This process can also be applied if the integers are negative. For example,
−2 −3 1 1 1 1 −5
c ∙c = ∙ = = 5 =c
c∙c c ∙c∙c c ∙c∙c∙c∙c c
These examples suggest the following property of exponents.
Product Property of Exponential Expressions
If m and n are integers and b ≠ 0, then b n ∙ bm +n
The product property shows that multiplication of powers with like bases can be
accomplished by adding the exponents. For example, 2−2 ∙25 =2(−2 )+2=23
Remark: 25 ∙3 4 cannot be simplified using the product property because the bases are
not the same.
The definition of negative exponents are the product property can be used to
discover a quotient property for exponents.
m
b m −n m+ ( −n ) m−n
n
=b ∙ b =b =b
b
Quotient Property of Exponential Expressions
If m and n are integers and b ≠ 0, then b m /bn=¿ bm−n ¿
The quotient property demonstrates that division of powers with like bases can be
accomplished by subtracting the exponents. For example,
3 3
5 3−1 2 y 3− (−1 ) 4
1
=5 =5 =25 and −1 = y =y
5 y
The definition of exponents and the product property can be used to simplify powers
2
raised to powers. For example, ( 43 ) = ( 4 3 )( 4 3 )=46 =4 3∙ 2. The power property is a
generalization of the above result
2.2 QUADRATIC EQUATION
−b ± √ b2−4 ac
x=
2a
The quadratic formula for the roots of the general quadratic equation
In algebra, a quadratic equation (from the Latin quadratus for "square") is any
equation that can be rearranged in standard form as
2
a x +bx +c=0
The values of x that satisfy the equation are called solutions of the equation, and
roots or zeros of the expression on its left-hand side. A quadratic equation has at
most two solutions. If there is only one solution, one says that it is a double root. If all
the coefficients are real numbers, there are either two real solutions, or a single real
double root, or two complex solutions. A quadratic equation always has two roots, if
complex roots are included and a double root is counted for two. A quadratic
equation can be factored into an equivalent equation
ax +bx +c=a(x−r)(x−s)=0
where r and s are the solutions for x. Completing the square on a quadratic equation
in standard form results in the quadratic formula, which expresses the solutions in
terms of a, b, and c. Solutions to problems that can be expressed in terms of
quadratic equations were known as early as 2000 BC.
Because the quadratic equation involves only one unknown, it is called "univariate".
The quadratic equation contains only powers of x that are non-negative integers, and
therefore it is a polynomial equation. In particular, it is a second-degree polynomial
equation, since the greatest power is two.
15
A quadratic equation with real or complex coefficients has two solutions, called roots.
These two solutions may or may not be distinct, and they may or may not be real.
Factoring by inspection
For most students, factoring by inspection is the first method of solving quadratic
equations to which they are exposed.[2]:202–207 If one is given a quadratic equation in
the form x2 + bx + c = 0, the sought factorization has the form (x + q)(x + s), and one
has to find two numbers q and s that add up to b and whose product is c (this is
sometimes called "Vieta's rule"[3] and is related to Vieta's formulas). As an example,
x2 + 5x + 6 factors as (x + 3)(x + 2). The more general case where a does not equal 1
can require a considerable effort in trial and error guess-and-check, assuming that it
can be factored at all by inspection.
The process of completing the square makes use of the algebraic identity
x2 + 2hx + h2 =(x + h) 2,
16
which represents a well-defined algorithm that can be used to solve any quadratic
equation.[2]:207 Starting with a quadratic equation in standard form, ax2 + bx + c = 0
1. x2 + 2x − 2 = 0
2. x2 + 2x = 2
3. x2 + 2x + 1 = 2+1
4. (x + 1) 2 = 3
5. x +1=± √ 3
6. x=−1 ± √ 3
Completing the square can be used to derive a general formula for solving quadratic
equations, called the quadratic formula.[5] The mathematical proof will now be briefly
summarized.[6] It can easily be seen, by polynomial expansion, that the following
equation is equivalent to the quadratic equation:
( )
2 2
b b −4 ac
x+ = 2
2a 4a
−b ± √ b2−4 ac
x=
2a
A number of alternative derivations can be found in the literature. These proofs are
simpler than the standard completing the square method, represent interesting
applications of other frequently used techniques in algebra, or offer insight into other
areas of mathematics.
A lesser known quadratic formula, as used in Muller's method provides the same
roots via the equation
2c
x=
−b ± √ b2−4 ac
This can be deduced from the standard quadratic formula by Vieta's formulas, which
assert that the product of the roots is c/a.
One property of this form is that it yields one valid root when a = 0, while the other
root contains division by zero, because when a = 0, the quadratic equation becomes
a linear equation, which has one root. By contrast, in this case, the more common
formula has a division by zero for one root and an indeterminate form 0/0 for the
other root. On the other hand, when c = 0, the more common formula yields two
correct roots whereas this form yields the zero root and an indeterminate form 0/0.
2
x + px +q=0
18
where p = b/a and q = c/a. This monic polynomial equation has the same solutions as
the original.
The quadratic formula for the solutions of the reduced quadratic equation, written in
terms of its coefficients, is:
1 ❑
x= (−p ± √ p −4 p )
2
2
or equivalently:
−p
x= ± √ ¿ ¿.
2
Discriminant
In the quadratic formula, the expression underneath the square root sign is called the
discriminant of the quadratic equation, and is often represented using an upper case
D or an upper case Greek delta:[9]
2
∆=b −4 ac
A quadratic equation with real coefficients can have either one or two distinct real
roots, or two distinct complex roots. In this case the discriminant determines the
number and nature of the roots. There are three cases:
−b+ √ ∆ −b−√ ∆
and ,
2a 2a
both of which are real numbers. For quadratic equations with rational coefficients, if
the discriminant is a square number, then the roots are rational—in other cases they
may be quadratic irrationals.
−b
,
2a
sometimes called a repeated or double root.
19
If the discriminant is negative, then there are no real roots. Rather, there are
two distinct (non-real) complex roots
−b √ ∆ −b √ ∆
+i and −i
2a 2a 2a 2a
which are complex conjugates of each other. In these expressions i is the
imaginary unit.
Thus the roots are distinct if and only if the discriminant is non-zero, and the roots are
real if and only if the discriminant is non-negative.
Summary
EXERCISE
In the early 1970s ARPANET’s Network Control Protocol (NCP) a standard that used
packet switching by then, developed into a more sophisticated standard known as
TCP/IP (Transmission Control Protocol/Internet Protocol). This Transmission
Standard TCP enabled TCP enabled messages to be broken down into smaller
“packets” sent across the network and when it reached the destination, it was
reassembled into the original message before it could be opened. The IP (Internet
Protocol) part of this standard was responsible for all the addressing of the messages
to the various nodes (terminal op point in network)
It enabled messages to be transmitted across various networks using multiple
communication standards.
Originally, ARPANET was designed to enable scientists and researchers enjoy long
distance computing, but as time went by, they started using it for sending and
receiving personal mails and news articles. By then, they had started owning
personal user accounts and addresses for electronic mails thus the start of the
electronic Post Office.
The internet that was originally developed as a means of only transferring files has
grown to be a very useful tool that can accomplish the following roles:
· File transfer using the FTP protocol
· Electronic message transfer in form of emails and instant messages on
various protocols
· Medium of news exchange through Usenet newsgroups and
· Document presentation and storage media (web) using HTTP (Hypertext
Transfer Protocol) in HTML Hyper Text Mark- up Language).
The internet has not been to accomplish these roles but it does continue to facilitate
and enable other roles as they are developed for the internet.
3.3 File Transfer Over the Internet
With the development of the internet, it was now possible to communicate easily
across regions. This further enabled the exchange of the information and ideas
between the sparsely distributed scientists. This information exchange was facilitated
by FTP (File Transfer Protocol) a command line protocol that enables the easier
transmission of files on computers over the Internet.
The FTP protocol is one of those application protocols that are commonly used to
download files from ETP sites/servers. FTP uses the TCP/IP protocol to transfer
23
information over the internet. Before accessing and downloading a file from a
location, one has to log-on that particular server and this is accomplished by use of
another application protocol known as Telnet. Telnet is an application protocol that is
used to logon, to remote servers including the FTP, anonymous FTP it is possible to
access other public servers that are not protected.
connection to remote computer sites: a terminal emulation program that allows
computer users to connect interactively to a server and access remote sites, e.g.
on the Internet
Today, FTP is widely used to transfer large files from one server to another most
specially in the transfer of web files by clients from their computers to their ISP’s
servers, which host them on the Internet. Thus it is also possible to use FTP and
manage files by perform simple tasks like delete, copy, rename and move on a
remote server as if it were on your computer.
3.4 Electronic Messaging
Electronic messaging can be traced as far back during the days of ARNAPET when
scientist using the facility started sending personal mails outside their research work.
This was later picked on as a mainstream use of the Internet and electronic
messaging that came to be known as e-mail started.
E-mails are electronic messages sent over a communication network and unlike
document files; these are more personal i.e. they are directed o specific individuals.
An e-mail message is composed or generated and then sent to a specific location
where it is downloaded for viewing.
Originally, e-mail or sms (instant messages) were transmitted over networks by the
use of POP (Post Office Protocol) protocol probably derived from analogous of post
office. With the arrival of internet, there was a need for transferring these messages
not only a network but also a consonant work.
This resulted into the development of SMTP (Simple Mail Transfer Protocol) a
protocol that could transfer files over the internet. Although this protocol was suitable
for transferring messages over the internet, it had limitations in that it could not cue
properly messages on the receiver’s side a function that POP did very well.
Therefore SMTP was used in the transfer while POP was used in the receiving of
these messages.
24
Today most of the software applications used for e-mail use another protocol IAMP
instead of POP3 PROTOCOl. Therefore, email applications use SMTP over TCP/IP
to send and receive messages of internet and POP3 (newer version of POP) or IMAP
to download and save the received message on mail servers. The arrival of ESMTP
(Extended Simple Mail Transfer Protocol) it is now possible to deliver large
multimedia files as e-mails.
3.5.1 E-mail Message Addresses
Emails can be compared to the normal post office mails that are sent to specific
addresses. Usually when a person communicate a message through the usual post
office he/she sends say a post card that contains the message being communicated,
the address of the recipient and the address of the sender.
Similarly, email messages are sent electronically with the messages being
communicated, the address of the receiver, and the address of the sender. However,
unlike of the post office where the address refers to the post office box number with
emails, the electronic mail address is used. Email addresses are personal
connections to the internet that can be used to send receive electronic messages.
Each email address on the internet is unique in lettering from the rest.
Typical email account/address consists of a user name, a server name separated by
@ sign. The user name could be a person’s name, word or just letters and numbers.
This depends on the system being used. For example an email account (address) on
a LAN could be you user name John whereas in an international setting the server
name and country initials may be a prerequisite.
Normally email account takes up the general form of [email protected]
initials of site category. For example an email addresses such the one below:
[email protected]
indicate that a user name mapenzi at a server known as yahoo, which is a
commercial site (.com) category. Alternatively, email addresses like
[email protected] indicates that a user name is at a server known idsoft which is a
company (.co) in Uganda (.ug)
Whether it is a POP3 or IMAP email address, it has various advantages associated
with them in comparison to conversional post office or telephone message
· With an email address, on can send any size of message at just the cost of a
local call.
25
· Email messages can be sent at any time of the day and the results are almost
instantaneous because messages can reach their destinations in less than a
minute anywhere in the Globe.
· It is also a lot more convenient and cheaper to communicate using instant
messages (which are always on line) over the internet than the local post
office mail service.
· http://www.hotmail.com
· http://www.excite.com
In addition to these addresses being free, you also get benefit like
· Free information about any opportunities and upcoming event in a field of your
interest from all over the world (If you indicate to be informed about such)
· The opportunity to have access to your email address from any computer in
the world so long as it is connected to the internet, which makes them
resemble mobile phone numbers
· You get to know a lot more about things you would have never known? This is
because your address is constantly being updated with interesting topics sent
to you as mails.
Like the saying goes “free things are never free” probably it is so, because whenerver
you retrieve or send an email message it carries with it additional advertising
information. Probably, the main advantage of these free addresses to the hosts is
that they act the media of advertising and the users to get to know about what is
available. Although this may be irritating if official document appear to customers with
foreign adverts. Therefore, these types of “free emails” are not recommended for
business transactions.
Usually in most cases several informative messages are sent to these free emails yet
they are almost meaningless to the recipient. In such cases, they are regarded as
junk mails or simply spam.
3.5.4 Spam emails
Spam emails are described as unsolicited bulk mails sent to a recipient email
address. The major description of spam mail is that the recipient email addressee
does not request for it and it is sent in bulk i.e. to several other recipients. Senders of
spam use list servers to send the same message to several email addresses.
Technically, an electronic message is spam if it meets the following conditions:
· If the recipient personal identity and context are irrelevant because the
message is equal applicable to many other potential recipients and that
· The recipient has not verifiably granted deliberate, explicit, and still revocable
permission for it to be sent.
27
Currently spam is illegal and has been banned in several countries. Most ISPs use
anti-Spam applications like spamhaus’ to block the unsolicited mails in which case
they return to the sender as bounced emails.
3.5.5 Bounced emails
Emails may bounce due to several reasons like non-existence server or miss-spelled
mail address. Generally email message will bounce if it does not reach its destination
and this is classified as a specific type of bouncing.
· Soft bounce
· Hard bounce
3.5.6 Hard bounce
A hard bounce is classified as a type of an email bouncing after it fails to locate the
destination server. Normally, when an email message is sent to an email address,
the sending server tries to locate the receiving server if it is found then it delivers the
email to the receiving server. The receiving server checks the email to determine if it
will be able to receive it. It first checks if the server address corresponds and then
checks the email to determine if the originating address of the message is not spam.
If these entire checks permit it to accept the message then the receiving server will
accept the message and search for the username and then deliver the email.
Therefore if the delivering server fails to locate the destination server or if it locates
the destination server and it rejects the email probably, it suspected Spam then this
email is sent back as a hard bounced email.
3.5.7 Soft Bounce
According to the previous description of message acceptance, if the receiving server
fails to locate the actual recipient of the email for example the username was
misspelled or is non existing then it will reject the email and send it back to the
sender’s email address and this is what is known as a soft bounce.
For every message that bounces, it is sent back to the sender’s email address with a
notice as to why it was never delivered. Therefore, the sender’s email address should
always be indicated for every message that is sent out.
3.5.8 Instant Messaging and Chat-rooms language
Apart from email the Interne has, various interesting features that it facilitates among
these are the chat rooms (Instant messages). In a chat room, people across the
World login on a special site (chat room) and start contributing views about a
particular topic or interact with other specific persons and begin asking questions
28
Typical acronyms
EMOTION MEANING
BBIAF Be Back in a few minutes
BRB Be right back
BCNU Be seeing you
BTW By the way
FTF Face to face
FWIW For what is worth
FYI For your information
FOAF Friend of a friend
HAND Have a nice day
29
In addition to using acronym one can also type words to reveal the expression of
temper, for example:
· When words are typed in upper case letters, it implies that the words are being
emphasized as speaking out with seriousness.
· If words are bolded then this indicates that the send with anger. Therefore,
words uppercase and bold are typical of a person who is bitter.
· Words in lowercase letters imply that the sender is calm and talking normally
like a conversation. (This is the most recommended way of writing over the
net).
is known as a home page from where you can access all the other pages of the site.
Analogously a home page, which contains all the links to other pages, can be
compared to a table of contents page in a book and a web site is just like the entire
book.
The web began in the late 1980s as a European project that proposed a system of
using documents that had links to other related documents on several computers.
These links could guide one from one computer to another using facility of the
internet. This created a virtual “web” of connections. In most cases, the word
“Internet” and “World Wide Web” (www or web) are used synonymously yet they do
not actually refer to the same thing.
The internet consists of the physical hardware (cables, dishes, and computers)
connections of the global network that is also known as the network of networks
using various means of data transfer known as protocols. Yet the world-wide-web
(web) is one of those services facilitated by the internet. Other services facilitated by
the internet are electronic mail messaging, file transfer usually FTP and newsgroup
discussion using UseNet. In addition, the web, which is the largest service of the
Internet, is a collection of documents Interlinked to one another by URL’s (Uniform
Resource Locators). The Interlinked documents are accessed over the Internet by
application interfaces known as web browser. Therefore, the Web refers to the data
and information that is made available over the global network.
3.6.1 Web Browsers
Although the Internet was originally developed for scientific and military purposes,
various academicians soon picked interest in it, since it offered easier means of
transferring research papers, ideas and ails from one destination to another, which
made the Internet, grow even bigger. It was at this time that the business community
discovered a very big market potential of their products and services worldwide. They
soon discovered that it was the easiest way of availing product information,
advertising, and providing customer support intentionally. Again, the Internet grew
even much bigger.
By then accessing data on the Internet required one to be conversant with the many
commands and text interfaces, which were the platform of the easier web browsers
(programs used to interface between the web and humans), this was too
cumbersome to many individuals.
31
The command driven interface was replaced by an easier to use protocol known as
Gopher. The Gopher protocol was designed in 1991 by Paul Linder and Mark
McCahill to act as a distributed search and retrieval protocol used over the Internet.
This protocol used a menu system that was a direct pointer to the source document
on a Gopher server hence an easier means of accessing information over the
Internet.
The Gopher protocol, which was free software eventually declined in popularity as
HTTP protocol emerged when the owners of Gopher decided to charge a license fee.
It was further discovered that HTTP was easier to use that Gopher and that Gopher
server had a security exposure that made it incompatible with the current browsers.
Today, Gopher is more of vintage item than a mainstream Internet browser.
3.6.3 The HTTP protocol
In 1993, Marc Andreessen (a student by then) developed a new web browser called
Mosaic. This browser that enabled users to access the Internet via graphical user
interface integrated the HTTP (Hypertext Transfer Protocol), URL (Uniform Resource
Locators), and HTML (Hypertext Markup Language) data access standards, which
were developed by Tim Berners-Lee. This user-friendly web browser soon became
very popular among Internet. The user only had to point-and-click, a process that
was much easier than typing commands in their rights syntax or accessing menus in
Gopher.
3.6.4 Accessing Web Information
The World Wide Web is a network designed around the architecture of a client-server
(see computer networks). When we are surfing the Internet using a web browser, we
are the clients and the computers that have the information are the servers called
web servers. In order to be able send and receive web pages with each other, the
client and server use a language called Hypertext Transfer Protocol (HTTP). It is for
this reason that most web document addresses begin with the letters “http”.
All the documents and web sites on the internet have unique Internet addresses
associated with them known as IP (Internet Protocol) address. To access a web page
you have to specify its IP address in the browsers address bar. Most of web pages
contain links known as hyperlinks to other related documents. Theses hyperlinks are
32
the ones that contain the Internet addresses to those specific documents. In most
cases, these Internet addresses contained within web pages are referred to as URLs
(Uniform Resource Locators). Therefore, to access any site on the internet, you must
know its URL. A typical URL will always consist of four parts.
1. The first part refers to the protocol that is being used when accessing HTTP
server. This type of control is so far the most widely used.
· HTTP: (Hypertext Transfer Protocol) is used when accessing HTTP
server. This type of protocol is so far the most widely used.
· FTP: (File Transfer Protocol) is used to download files from FTP
servers list documents as files, which a user selects and downloads
before opening for the information in the document.
· News : This protocol is mainly used to access Internet new sites
especially the Usenet news groups that has several specific discussion
forums on various topics
· Gopher : This was a protocol, which was previously used to access
documents as menus over the Internet. Today it has been superseded
by document as hyperlinks.
2. The second part of the URL specifies the type of location of the document.
This specifies whether it is located as a web therefore has the “www”
characters or as an ftp hence has the ftp characters.
3. The third part describes the site name or domain name that is usually a name
of the organisation or persons responsible. This could be names like NASA,
Microsoft, or any other name.
4. The fourth part is usually initials that describe the type off site. These initials
normally have designation like;
Designation implication
.com For commercial site
.edu For education related institutions
.gov For government sites
.mil For military related sites
.org NGOs or other non-profit organizations
.co.ug A company in Uganda
33
Search engines work by looking on each available web page for the topic (word or
phrase) that is entered and instructed to search. When a search engine finds the
corresponding topic from various web pages, it rearranges the web sites listing those
with the most count of such phrase at the top of the list.
34
SYMBOLS IN MECHANIC
BIBLIOGRAPHY
Alexander L.G (2000). Longman English Grammar practice. Longman House. Burnt
Mill: Harlow.
Howard Sargeant. (2007). Basic English Grammar for
English Language Learners Book 2. Saddleback
Educational Publishing, Ltd Singapore
J. Merker,(2007) Du trinome du second degré à la theorie de Galois, Presss
universitaires de Franche-comte (ISBN 2848672056)
Murphy,R. (2005) .English Grammar in Use. Cambridge: C. U. P.3rd Ed.
Washington, Allyn J. (2000). Basic Techniccal Mathematics with Calculus,
Seventh Edition. Addison Westley Longman, inc. ISBN 978-0-201-35666-3