Lab Manual: Internet Fundamental Lab (Cse 214 F)
Lab Manual: Internet Fundamental Lab (Cse 214 F)
1
Check list for Lab Manual
2
Mission
Providing State – of – the art Laboratories, Workshops, Research and instructional facilities
Encouraging students to delve into technical pursuits beyond their academic curriculum.
Vision
To Nurture and Harness talent for empowerment towards self actualization in all technical domains –
3
Guidelines for the Students :
1. Students should be regular and come prepared for the lab practice.
2. In case a student misses a class, it is his/her responsibility to complete that missed experiment(s).
3. Students should bring the observation book, lab journal and lab manual. Prescribed textbook and class notes
can be kept ready for reference if required.
4. They should implement the given Program individually.
5. While conducting the experiments students should see that their programs would meet the following criteria:
Programs should be interactive with appropriate prompt messages, error messages if any, and
descriptive messages for outputs.
Programs should perform input validation (Data type, range error, etc.) and give appropriate error
messages and suggest corrective actions.
Comments should be used to give the statement of the problem and every function should indicate the
purpose of the function, inputs and outputs
Statements within the program should be properly indented
Use meaningful names for variables and functions.
Make use of Constants and type definitions wherever needed.
6. Once the experiment(s) get executed, they should show the program and results to the instructors and copy
the same in their observation book.
7. Questions for lab tests and exam need not necessarily be limited to the questions in the manual, but could
involve some variations and / or combinations of the questions.
4
LIST OF PROGRAMS(University Syllabus)
S.NO PROGRAM
Text Book:
• Fundamentals of the Internet and the World Wide Web, Raymond Greenlaw and Ellen
Hepp – 2001, TMH
• Internet & World Wide Programming, Deitel,Deitel & Nieto, 2000, Pearson Education
Reference Books:
• Complete idiots guide to java script,. Aron Weiss, QUE, 1997
• Network firewalls, Kironjeet syan-New Rider Pub.
• www.secinf.com
• www.hackers.com
• Alfred Glkossbrenner-Internet 101 Computing MGH, 1996
5
Practical beyond Syllabus
P.No. Program
6
Sample copy of file
Practical: 1
Email inner working (sending & receiving)
Email
Electronic mail, commonly known as email or e-mail, is a method of exchanging digital messages from
an author to one or more recipients. Modern email operates across the Internet or other computer networks.
Some early email systems required that the author and the recipient both be online at the same time, in common
with instant messaging. Today's email systems are based on a store-and-forward model. Email servers accept,
forward, deliver and store messages. Neither the users nor their computers are required to be online
simultaneously; they need connect only briefly, typically to an email server, for as long as it takes to send or
receive messages.
Operation overview
The diagram to the right shows a typical sequence of events that takes place when Alice composes a
message using her mail user agent (MUA). She enters the email address of her correspondent, and hits the
Send button.
7
the @ sign is a domain name or a fully qualified domain name. The MSA resolves a domain name to
determine the fully qualified domain name of the mail exchange server in the Domain Name System (DNS).
Email Inner Workings
Here we provide a simplified description of how email actually works. If we split the mailing of a letter
into three phases, in phase one, the steps you need to perform are compose , address, package, stamp, and
deposit the letter in a suitable place for pickup. In phase two, a mail person, on a fixed pickup schedule,
retrieves the letter from its place of deposit. Then the letter, if correctly addressed and with the proper postage,
is routed to its final destination mailbox. In phase three, the recipient checks for mail, and perhaps files it away.
Similar phases need to be carried out in the electronic setting.
Mailer, Mail Server, and Mailbox
Three main components (mailer, mail server, and mailbox) are necessary for the email system to work.
In reality, the system is much more complex.
Mailers: A mailer is also called a mail program, mail application, or mail client. A mailer is the
software that allows you to manage, read, and compose email. Think of the mailer as the function or system
that allows you to perform the tasks corresponding to phase one in the s-mail analogy.
Mail Servers: The mail server is a computer whose function is to receive, store, and deliver email.
Conceptually, the mail server is always “listening” for the arrival of new email. If new email has arrived for
you, the server keeps track of it. The mailer may be on the same computer that acts as a mail server.
Mailboxes: An electronic mailbox is a disk file specifically formatted to hold email messages and
information about them. Your mailbox is generally created for you by a systems administrator when you
first establish your account. It is a good idea not to delete your mailbox. On some systems, even if you do
remove your mailbox, it will automatically be regenerated for you when new email arrives. Properly
managed, the mailbox is private and only the “owner” can read from it, while everyone else can only send
email to it.
8
Figure1.2: Example of how users communicate via email in a store and forward email system
Mail Spool: The disk storage area on a mail server which is the “store” part of “store and forward”
Central Mail Spool: Another popular method by which user obtain their email is called a central mail spool
system. This type of setup is particularly useful if someone is going to accessing email from multiple
computers.
9
IMAP: It is called Interactive Mail Access Protocol. It is used to handle the complications that are arise in
the scenario. IMAP is used to transfer the massages over “IMAP LINK”. One advantage of IMAP over some
other protocols is that it encrypts” passwords. IMAP encodes the password so someone sniffing the network
cannot directly obtain his password.
Practical: 2
Introduction to Chat Rooms, how to connect and chat
Chat Rooms
The term chat room, or chatroom, is primarily used by mass media to describe any form
of synchronous conferencing, occasionally even asynchronous conferencing. The term can thus mean
any technology ranging from real-time online chat over instant messaging and online forums to fully
immersive graphical social environments.
A location on the Internet where communication can take place in ‘real time’. After you log in to a chat
room, everything you type appears on the screens of everyone else who is at that Internet location to
participate in that particular chat.
Each participant's statements are labeled with a nickname to identify who is talking. Participants choose
their own nicknames and often decide against sharing their real names, either to preserve anonymity or
to take on a new persona. Chat rooms are usually organized around a particular topic and provide a place
to “meet” people who share similar interests.
10
Meet people who share your passions.
Chat rooms are a great place to meet and communicate with friends who share your interests. You'll find
chat rooms for a world of topics from entertainment to sports, to politics and pop culture. Liven up your
chats with emoticons, custom fonts and even voice.
A Chat Room is a Web site, part of a Web site, or part of an online service such as America Online, that
provides a venue for communities of users with a common interest to communicate in real time. Forums
and discussion groups, in comparison, allow users to post messages but don't have the capacity for
interactive messaging. Most chat rooms don't require users to have any special software; those that do,
such as Internet Relay Chat (IRC) allow users to download it from the Internet.
Chat room users register for the chat room of their choice, choose a user name and password, and log
into a particular room (most sites have multiple chat rooms). Inside the chat room, generally there is a
list of the people currently online, who also are alerted that another person has entered the chat room. To
chat, users type a message into a text box. The message is almost immediately visible in the larger
communal message area and other users respond. Users can enter chat rooms and read messages without
sending any, a practice known as lurking.
Because chat room messages are spontaneous and instantly visible, there is a potential for abuse, which
may or may not be intentional. Site hosts typically post a frequently asked questions (FAQ) list to guide
users to appropriate chat room behavior, such as introducing yourself when you enter a room, making it
clear when you are directing a question or response to a specific user, and reporting disruptive users, for
example. Disruptive users may verbally abuse other chatters, monopolize the conversation, or even just
disable it by repeatedly typing the same word or phrase into the conversation, a practice (much frowned
upon) known as scrolling.
11
Chat rooms can be found that focus on virtually any aspect of human endeavor orinterest:there are
current communities based on classic movies, Irish ancestry, batontwirling, and psychic readings, for
example. Various sites, such as Yahoo, provide a directory of chat sites. Others, such as MSN Web
Communities, guide users through the room.
A chat room is a special part of a website, or even its own website, that allows people to communicate
instantly. Usually, chat rooms have a theme that attracts people
Visitors to the earliest chat rooms communicated by text only. Now, some chat rooms feature the ability
to use voice to communicate and upload images almost instantly. Most chat rooms require registration
and a password. Some chat rooms will limit who is allowed to register, such as those run by colleges
(usually only current and former students are allowed to register). It all depends on who is running the
chat room, and who is monitoring it, if anyone. Yahoo! has a long list of chat rooms by subject.
Pogo.com is a popular website that allows people to chat while playing online games.
Procedure:
1. To use a chat room, the user must first register and choose a user name, which will be displayed
while he chats. The user name is usually not the person's legal name. Once the user enter the chat.
2. To talk to these people, the user must type a message into a text box. Once the user hits the "Enter"
key, everyone else can see his or her message. Then other people may respond, and a conversation
develops. Sometimes, people enter chat rooms and just read the messages without participating in the
conversation. This is called "lurking."
12
Rules and Etiquette
Each chat room may also have its own rules and acronyms. Most chat rooms have an FAQ
section that explains the rules and acronyms. Still, there are etiquette rules that are valid in all chat
rooms. It is considered impolite in a chat room to type in all capital letters, which is like yelling at
someone. Users should never try to monopolize a conversation, insult someone personally or interrupt
another user. It is also considered impolite to stray off the topic.
Skype chat rooms, called "public chats," are a feature of the Skype Messenger that was discontinued with
the 4.0 release of the program. While public chat rooms do still exist, Skype no longer supports the
creation of new chat rooms. You can join any existing chat room to talk with other Skype users, but you
will need the HTML location of the chat room to connect.
Instructions
1. Find a public chat you wish to join. Since Skype no longer supports the creation of new public chat rooms,
you need to join a public chat that already exists. Open your Internet browser. Use a search engine to locate free
online directories of public chats, and choose a chat from the list.
2. Start Skype.
3. Return to your Internet browser. On the directory page, click the HTML link that leads to the chat room you
wish to join.
4. Chat with other Skype users once Skype connects to the public chat.
Tips & Warnings
Some public chats are moderated or require a membership to join. If you attempt to join one of these,
you may need to wait until an administrator approves your membership.
13
Figure. 2.2: Yahoo chat room
Joining a chat room on Yahoo is simple and fun. Yahoo calls their chat rooms 'Yahoo Groups.' With Yahoo
Groups, you can learn more about a subject ask questions and talk to others with a common interest
online. If you're ready to start talking, you can join a Yahoo Chat Room in just seconds.
Instructions:
2. Click the 'Sign In' link and enter your username and password in the fields provided.
4. Select a chat room that sounds like one you'd like to join by clicking on its name.
5. Enter the chat room by clicking on the 'Join This Group' link. You will be taken to a page where you'll
need to enter some brief information before joining.
6. Create a profile if you don't have one so others you are chatting with can view things like your hobbies
and your picture if you choose. However, be sure not to reveal too much personal information in your
profile, such as your phone number or address.
7. Start Chatting
14
8. Have a look around after you have registered to enter the chat room. You can view messages that other
members are leaving, read their profiles and browse archives of message histories to get to know the
chat room.
9. Say hello once you get comfortable. You can do this by clicking on 'Start Topic' and then typing your
message in the fields provided and clicking 'Send.' A simple introduction is as appropriate for your first
message in a chat room as it is at a party or anywhere else.
10. Enjoy your chatting experience! Messages are added almost constantly so there is almost always
something new to read and comment on.
2. View the Yahoo Groups Help page any time you want to learn more about an aspect of chatting on
Yahoo (see Resources below).
3. Never use foul language, advertise services or insult other users in a chat room. Many chat rooms are
moderated and you will be denied future access to a chat room if you break the rules.
4. Never give out your phone number or other personal information to people you meet online. Chat rooms
are fun but there are Internet predators who can steal from you or otherwise be of danger.
Chat rooms are available in Yahoo! Messenger 8.1, 9.0, 10 and Mac. To enter a chat room, look for "Yahoo!
Chat" in your Messenger menu. Then select the topic you want to discuss to join an already active room full
of chatters.
15
Chatting with Google Talk:
Welcome to Google Talk, a downloadable chat application by Google. Check out what Google Talk can do:
Text chat
Instant messages: share quick thoughts in real time
Status updates: see if friends are around and what they are up to
File transfer: instantly send and receive files, pictures, and more
Voice chat
Free long distance: make PC-to-PC calls to people anywhere in the world
16
Practical: 3
Working with HTML
Hyper Text Markup Language (HTML) is the main markup languagefor web page HTML elements are the
basic building-blocks of web pages.
HTML is written in the form of HTML elements consisting of tags enclosed in angle brackets (like <html>),
within the web page content. HTML tags most commonly come in pairs like <h1> and </h1>, although some
tags, known as empty elements, are unpaired, for example <img>. The first tag in a pair is the start tag, the
second tag is the end tag (they are also called opening tags and closing tags). In between these tags web
designers can add text, tags, comments and other types of text-based content.
The purpose of a web browser is to read HTML documents and compose them into visible or audible web
pages. The browser does not display the HTML tags, but uses the tags to interpret the content of the page.
HTML elements form the building blocks of all websites. HTML allows images and objects to be embedded
and can be used to create interactive forms. It provides a means to create structured documents by denoting
structural semantics for text such as headings, paragraphs, lists, links, quotes and other items. It can embed
scripts in languages such as JavaScript which affect the behavior of HTML web pages.
Web browsers can also refer to Cascading Style Sheets (CSS) to define the appearance and layout of text and
other material. The W3C, maintainer of both the HTML and the CSS standards, encourages the use of CSS over
explicitly presentational HTML markup
17
Create a simple HTML page by using some of the basic tags
<html>
<head>
<title>Web page</title>
</head>
<body background="$~Angel~$.jpg">
<marquee direction="left"><font size="5" face="arial"
color="hotpink">HELLO</font></marquee>
<marquee direction="right"><font size="5" face="arial"
color="hotpink">HAVE A GOOD DAY</font></marquee>
<font size="6" face="arial" color="yellow">Types of lists</font>
<br>
</br>
<font size="5" face="arial" color="yellowgreen">Defination Lists</font>
<dl>
<font size="5" face="arial" color="mediumorchid">
<dt>Coffee</dt>
<dd>-Black hot drink</dd>
</font>
</dl>
<font size="5" face="arial" color="green">Ordred lists</font>
<ol>
<font size="5" face="arial" color="hotred">
<li>COFFEE</li>
<li>TEA</li>
</font>
</ol>
</font>
<font size="5" face="arial" color="red">Unorderd lists</font>
<ul>
<font size="5" face="arial" color="black">
<li>COFFEE</li>
18
<li>MILK</li>
</font></body></html>
Output:
19
Practical:- 4
To create Time-Table using table tag.
Coding :
<html>
<title> It 2nd Year Time Table </title>
<BODY>
<body bgcolor="blue">
<table border="1" >
<tr>
<th>class</th>
<th>mon</th>
<th>tue</th>
<th>wed</th>
<th>thu</th>
<th>fri</th>
</tr>
<tr>
<td>1st</td>
<td>DBMS</td>
<td rowspan="2">OOPS LAB</td>
<td>DBMS</td>
<td>OOPS</td>
<td>OOPS</td>
</tr>
<tr>
<td>2nd</td>
<td>CAO</td>
<td>CAO</td>
<td>ECO</td>
<td>ECO</td>
</tr>
<tr>
<td>3rd</td>
<td>MMT</td>
20
<td>MMT</td>
<td>MMT</td>
<td>MMT</td>
<td>CAO</td>
</tr>
<tr>
<td>4th</td>
<td>IF</td>
<td>CAO</td>
<td>IF</td>
<td ROWSPAN="2">MMT LAB</td>
<td ROWSPAN="2">DBMS LAB</td>
</tr>
<tr>
<td>5th</td>
<td>OOPS</td>
<td>ECO</td>
<td>OOPS</td>
</tr>
<tr>
<td>6th</td>
<td>LUNCH</td>
<td>LUNCH</td>
<td>LUNCH</td>
<td>LUNCH</td>
<td>LUNCH</td>
</tr>
<tr>
<td>7th</td>
<td ROWSPAN="2">GP</td>
<td>DBMS</td>
<td>LIB</td>
<td>DBMS</td>
<td rowspan="2">IF LAB</td>
21
</tr>
<tr>
<td>8th</td>
<td>IF</td>
<td>ECO</td>
<td>IF</td>
</tr>
</table>
</body>
</html>
Output:
22
23
Practical: 5
To Create Frames in browser window using HTML.
Coding:
<html>
<head></head>
<frameset rows="50%,50%">
<frameset cols="50%,50%">
<frame scr="ss.html" />
<frame scr="sd.htm" />
</frameset>
<frame scr="frame_c.htm" />
</frameset>
</html>
OUTPUT:
Practical: 6
Working with JavaScript
24
JavaScript is the most popular scripting language on the internet, and works in all major browsers,
such as Internet Explorer, Firefox, Chrome, Opera, and Safari.JavaScript was designed to add interactivity
to HTML pages. JavaScript is a scripting language. A scripting language is a lightweight programming
language. JavaScript is usually embedded directly into HTML pages. JavaScript is an interpreted language
(means that scripts execute without preliminary compilation). Everyone can use JavaScript without
purchasing a license.
25
Output of confirm box:
26
Output of prompt box:
Practical: 7
Introduction to FTP and TELNET
When you want to copy files between two computers that are on the same local network, often you can simply
"share" a drive or folder, and copy the files the same way you would copy files from one place to another on
your own PC.
27
What if you want to copy files from one computer to another that is halfway around the world? You would
probably use your Internet connection. However, for security reasons, it is very uncommon to share folders
over the Internet. File transfers over the Internet use special techniques, of which one of the oldest and most
widely-used is FTP. FTP, short for"File Transfer Protocol," can transfer files between any computers that
have an Internet connection, and also works between computers using totally different operating systems.
Transferring files from a client computer to a server computer is called "uploading" and transferring from a
server to a client is "downloading".
2. Certain information about the FTP server you want to connect to:
a.) The FTP server address. This looks a lot like the addresses you type to browse web sites.
For example : Server address is "ftp.videodesk.net". Sometimes the server address will be given
as a numeric address, like "64.185.225.87".
b.) A user name and password. Some FTP servers let you connect to them anonymously. For
anonymous connections, you do not need a user name and password.
To transfer files, provide your client software (Auto FTP Manager) with the server address, user name, and
password. After connecting to the FTP server, you can use Auto FTP Manager's File Manager to upload,
download and delete files. Using the File Manager is a lot like working with Windows Explorer.
FTP and Internet Connections: FTP uses one connection for commands and the other for sending and
receiving data. FTP has a standard port number on which the FTP server "listens" for connections. A
28
port is a "logical connection point" for communicating using the Internet Protocol (IP). The standard
port number used by FTP servers is 21 and is used only for sending commands. Since port 21 is used
exclusively for sending commands, this port is referred to as a command port. For example, to get a
list of folders and files present on the FTP server, the FTP Client issues a "LIST" command. The FTP
server then sends a list of all folders and files back to the FTP Client. So what about the internet
connection used to send and receive data? The port that is used for transferring data is referred to as
a data port. The number of the data port will vary depending on the "mode" of the connection.
The FTP server may support Active or Passive connections, or both. In an Active FTP connection, the
client opens a port and listens and the server actively connects to it. In a Passive FTP connection, the server
opens a port and listens (passively) and the client connects to it. You must grant Auto FTP Manager access to
the Internet and to choose the right type of FTP Connection Mode.
Most FTP client programs select passive connection mode by default because server administrators prefer it as a
safety measure. Firewalls generally block connections that are "initiated" from the outside. Using passive
mode, the FTP client (like Auto FTP Manager) is "reaching out" to the server to make the connection. The
firewall will allow these outgoing connections, meaning that no special adjustments to firewall settings are
required.
If you are connecting to the FTP server using Active mode of connection you must set your firewall to accept
connections to the port that your FTP client will open. However, many Internet service providers block
incoming connections to all ports above 1024. Active FTP servers generally use port 20 as their data port.
29
Figure7.3:Data transfer from server to client
It's a good idea to use Passive mode to connect to an FTP server. Most FTP servers support the Passive
mode. For Passive FTP connection to succeed, the FTP server administrator must set his / her firewall to accept
all connections to any ports that the FTP server may open. However, this is the server administrator's problem
(and standard practice for servers). You can go ahead, make and use FTP connections.
Once the FTP Client manages to open the internet connections, one for command and one for data, it
starts communicating with the FTP server. You are now ready to transfer your files and folders between the
two connected computers with Auto FTP Manager.
TELNET
Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive
text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with
Telnet control information in an 8-bit byte oriented data connection over the Transmission Control
Protocol (TCP).
30
Telnet provided access to a command-line interface (usually, of an operating system) on a remote host. Most
network equipment and operating systems with a TCP/IP stack support a Telnet service for remote
configuration (including systems based on Windows NT). Because of security issues with Telnet, its use for this
purpose has waned in favor of SSH.
The term telnet may also refer to the software that implements the client part of the protocol. Telnet client
applications are available for virtually all computer platforms. Telnet is also used as a verb.To telnet means to
establish a connection with the Telnet protocol, either with command line client or with a programmatic
interface. For example, a common directive might be: "To change your password, telnet to the server, login and
run the password command." Most often, a user will be telnetting to a Unix-like server system or a network
device (such as a router) and obtain a login prompt to a command line text interface or a character-based full-
screen
manager.
Telnet is a TCP/IP protocol, triggered by user command that allows you to access a remote computer. While
obtaining files from a remote computer via FTP is common, Telnet actually goes one step further and allows
you to log on as a regular user of the computer, with access to all data and programs that may be installed on
that computer. Telnet is usually used for technical support purposes.
In the early days of the Internet, Telnet was also used to connect with something called a free-net, which is just
what it sounds like: an open-access computer system. This was in part because dial up modems were so slow,
31
whereas Telnet worked a lot faster. With the advent of high speed internet providers, however, most free-nets
have shut down.
Telnet uses software, installed on your computer, to create a connection with the remote host. The Telnet client
(software), at your command, will send a request to the Telnet server (remote host). The server will reply asking
for a user name and password. If accepted, the Telnet client will establish a connection to the host, thus making
your computer a virtual terminal and allowing you complete access to the host's computer.
Telnet requires the use of a user name and password, which means you need to have previously set up an
account on the remote computer. In some cases, however, computers with Telnet will allow guests to log on
with restricted access.
32
Practical: 8
Coding:
<html>
<head>
<script>
function a()
{
if(document.f.A.value.indexof(@)==0)
alert("Empty text");
if(document.f.B.value==0)
alert("Empty Passward");
if(document.f.C.checked==0)
alert("please select check box");
if(document.f.D.checked==0)
alert("please select radio");
}
</script>
</head>
<body>
<form name="f">
username<input type="text" name="A" value=""><p>
password<input type="password" name="B" value=""><p>
<input type="checkbox" name="c" value="">
<input type="radio" name="D">
<input type="button" value="check" onclick="a()"><p>
Gender<select name="gender">
<option>Select one</option>
<option>Male</option>
<option>Female</option>
</form>
</body>
</html>
Output:
33
Practical: 9
Program to perform four arithmetic operations viz. Addition, Subtraction, Multiplication and
Division on two numbers using Java Script
<html>
<head>
<script language="javascript">
function sum()
{
var a=prompt("enter the 1st number")
var b=prompt("enter the 2nd number")
var c= parseInt (a)+parseInt (b);
document.f.s.value=c;
}
function subtract()
{
var a=prompt("enter the 1st number")
var b=prompt("enter the 2nd number")
var c= parseInt (a)-parseInt (b);
document.f.s.value=c;
}
function multiplty()
{
var a=prompt("enter the 1st number")
var b=prompt("enter the 2nd number")
var c= parseInt (a)*parseInt (b);
document.f.s.value=c;
}
function division()
{
var a=prompt("enter the 1st number")
34
var b=prompt("enter the 2nd number")
var c= parseInt (a)/parseInt (b);
document.f.s.value=c;
}
</script>
</head>
<body>
<form name = f>
<input type= button onclick="sum()" value= add>
<input type= button onclick="subtract()" value= subtract>
<input type= button onclick="multiply()" value= multiply>
<input type= button onclick="division()" value= division>
result<input type= text name=s>
</form>
</body>
</html>
Outputs:
35
36
Practical: 10
To Create a Web Site of our College
Coding:
Index page
<html>
<head>
<title>Project</title>
</head>
<body bgcolor="#E6E6FA">
<imgsrc="hostel1.jpg" height=197 width=1320>
<table border="1" width="1320">
<tr>
<td>
<ahref="index.html"></a></td>
<td>
<ahref="Home.html"><center>Home</center></a>
</td>
<td>
<ahref="Course.html"><center>Departments</center></a>
37
</td>
<td>
<ahref="faculty.html"><center>Faculty</center></a>
</td>
<td><a href="Contact.html"><center>Contact Us</center></a>
</td>
</tr>
</table>
<hr><marquee scrollamount="2" onmouseover="stop()"
onmouseout="start()"=><td>Updates:</td><td>1.Result
Gazette</td></marquee><br><hr>
<p>
<font face="Hobo Std"><font color="Blue">BRCM CET<br></font>
Established under the aegis of BallaramHanumandas Charitable Trust, BRCM
College of Engineering & Technology started its journey in August
1999.<br>
BRCM-CET represents the manifestation of modern concepts of teaching
pedagogy related to higher technical education judiciously blended with
the ethos of Indian culture and tradition.<br> The College is duly
approved by All India Council for Technical Education (AICTE) and the
Government of Haryana and is affiliated to MaharshiDayanand University,
Rohtak for 4-year B.Tech and 2-year M.Techprogrammes.
</p><br>
<font face="Hobo Std"><font color="Blue">Principal Message<br></font>
<imgsrc="principal.jpg" height=97 width=115>
<p>Over past 10 years of service to the State of Haryana and the nation,
BRCM College of Engineering and Technology has established a distinct
place of its own among other engineering colleges in India.<a
href="Read.html">Read More</a></P>
</body>
</html>
</html>
Links:
1. Depatments
38
Coding:-
<html>
<head><title>Faculty</title></head>
<body bgcolor="#E6E6FA">
<imgsrc="hostel1.jpg" height=197 width=1320>
<table border="1" width="1320">
<tr>
<td>
<ahref="index.html"></a></td>
<td>
<ahref="Home.html"><center>Home</center></a>
</td>
<td>
<ahref="Course.html"><center>Departments</center></a>
</td>
<td>
<ahref="faculty.html"><center>Faculty</center></a>
</td>
<td><a href="Contact.html"><center>Contact Us</center></a>
</td>
</tr>
</table>
<hr><marquee scrollamount="2" onmouseover="stop()"
onmouseout="start()"=><td>Updates:</td><td>1.Result
Gazette</td></marquee><br><hr>
<center>
<h2>
Our College provides following courses:-</br></h2>
<a href="IT.html"><center>1.Information Technology</center></a>
2. Mechnical<br>
3. Civil<br>
4. Computer Science & Engineering<br>
5. Electronics and Communication<br>
6. Electrical and Electronics Engineering<br>
39
Output:
1.1 Technology:
Coding:
<html>
<head>
<title> Information Technology</title>
</head>
<body bgcolor="#E6E6FA">
<imgsrc="hostel1.jpg" height=197 width=1320>
<table border="1" width="1320">
<tr>
<td>
<ahref="index.html"></a></td>
<td>
<ahref="Home.html"><center>Home</center></a>
</td>
<td>
<ahref="Course.html"><center>Departments</center></a>
</td>
40
<td>
<ahref="faculty.html"><center>Faculty</center></a>
</td>
<td><a href="Contact.html"><center>Contact Us</center></a>
</td>
</tr>
</table>
<hr><marquee scrollamount="2" onmouseover="stop()"
onmouseout="start()"=><td>Updates:</td><td>1.Result
Gazette</td></marquee><br><hr>
<h3><font color="Blue">Information Technology:</h3></font>
<imgsrc="classroom.jpg" height=197 width=579>
<p>The Department of Information Technology is maintaining its
leadership among peer institution of its kind. Faculty members are
instrumental in organizing significant research and development
activity The faculty members continue to make significant
contribution to their area of research. IT involves computers,
software and services. Our student benefit from our ability and
willingness to take on informed position that combines in depth
knowledge of the market place with a valuable strategic thinking
process. This is a new field of science, which combines the study of
Computer Science along side Electronics & Communication Engineering.
It is the IT revolution that has made the newer concepts of wireless
communication a practical reality. </p>
<hr><marquee scrollamount="6" onmouseover="stop()"
onmouseout="start()"><font><font color="orange"><h1>TimeTable*IT*(4th
sem)<h1></font>
<table border="1" >
<tr>
<th>class</th>
<th>mon</th>
<th>tue</th>
<th>wed</th>
<th>thu</th>
41
<th>fri</th>
</tr>
<tr>
<td>1st</td>
<td>DBMS</td>
<td rowspan="2">OOPS LAB</td>
<td>DBMS</td>
<td>OOPS</td>
<td>OOPS</td>
</tr>
<tr>
<td>2nd</td>
<td>CAO</td>
<td>CAO</td>
<td>ECO</td>
<td>ECO</td>
</tr>
<tr>
<td>3rd</td>
<td>MMT</td>
<td>MMT</td>
<td>MMT</td>
<td>MMT</td>
<td>CAO</td>
</tr>
<tr>
<td>4th</td>
<td>IF</td>
<td>CAO</td>
<td>IF</td>
<td ROWSPAN="2">MMT LAB</td>
<td ROWSPAN="2">DBMS LAB</td>
</tr>
<tr>
42
<td>5th</td>
<td>OOPS</td>
<td>ECO</td>
<td>OOPS</td>
</tr>
<tr>
<td>6th</td>
<td>LUNCH</td>
<td>LUNCH</td>
<td>LUNCH</td>
<td>LUNCH</td>
<td>LUNCH</td>
</tr>
<tr>
<td>7th</td>
<td ROWSPAN="2">GP</td>
<td>DBMS</td>
<td>LIB</td>
<td>DBMS</td>
<td rowspan="2">IF LAB</td>
</tr>
<tr>
<td>8th</td>
<td>IF</td>
<td>ECO</td>
<td>IF</td>
</tr>
</table>
</marquee><hr>
</body>
</html>
43
Output:
2.Faculty:
Coding:
<html>
<head><title>Faculty</title></head>
<body bgcolor="#E6E6FA">
<imgsrc="hostel1.jpg" height=197 width=1320>
44
<table border="1" width="1320">
<tr>
<td>
<ahref="index.html"></a></td>
<td>
<ahref="Home.html"><center>Home</center></a>
</td>
<td>
<ahref="Course.html"><center>Departments</center></a>
</td>
<td>
<ahref="faculty.html"><center>Faculty</center></a>
</td>
<td><a href="Contact.html"><center>Contact Us</center></a>
</td>
</tr>
</table>
<hr><marquee scrollamount="2" onmouseover="stop()"
onmouseout="start()"=><td>Updates:</td><td>1.Result
Gazette</td></marquee><br><hr>
<center>
<center>
<h2>
Our faculty is Extremely Talanted. Some of our faculty are:-</br></h2>
1. Mr. Harish Bedi<br>
2. Mr. SudeshJakkar<br>
3. Mr. Deepak Sinwar<br>
4. Mr. Santosh Mishra<br>
5. Mrs. KavitaMeel<br>
6. Mr. DurgeshSrivastava<br>
45
Output:
3. Contact Us:
Coding:
<html>
<head><title>Contact Us</title></head>
<body bgcolor="#E6E6FA">
<imgsrc="hostel1.jpg" height=197 width=1320>
46
<table border="1" width="1320">
<tr>
<td>
<ahref="index.html"></a></td>
<td>
<ahref="Home.html"><center>Home</center></a>
</td>
<td>
<ahref="Course.html"><center>Departments</center></a>
</td>
<td>
<ahref="faculty.html"><center>Faculty</center></a>
</td>
<td><a href="Contact.html"><center>Contact Us</center></a>
</td>
</tr>
</table>
<hr><marquee scrollamount="2" onmouseover="stop()"
onmouseout="start()"=><td>Updates:</td><td>1.Result
Gazette</td></marquee><br><hr>
<center>
<h3><font color="Blue">Contact Us:</font>
47
</html>
4.Read:
Coding:
<html>
<head>
<body bgcolor="#E6E6cv">
<title> Principal Message</title></head>
BRCM CET from its inception has been playing a distinct role in the
field of engineering education. The college was established in the year
1999. These are the days of liberalization, privatization and
globalization with economy that is flourishing like never before, sunny
days are here again for the students who wish to pursue their career in
engineering and technology.<p>
48
campus so that the students are fully focussed to achieve the cherished
goal.</p>
<ahref="Home.html"><center>Home</center></a>
</body>
</html>
Output:
49