Guide to the Internet and World Wide Web For Archivists and

Transcription

Guide to the Internet and World Wide Web For Archivists and
Guide to the Internet and World Wide Web
For
Archivists and Records Managers
Guide to the Internet and World Wide Web
For
Archivists and Records Managers
Published by:
Association of Commonwealth Archivists and Records Managers
c/o IRMT
Haines House, 6th Floor
21 John Street
London WC1N 2BP
www.acarm.org
© ACARM 2005
Preface
As archivists and records managers we are all finding the need to use the Internet. It
may be to find up-to-date information on a particular aspect of our profession – disposal
periods for particular records, new appraisal methodologies, latest electronic records
management standards – or it may be to communicate with fellow professionals, share
information, learn from others’ experiences. Almost every day we use the Internet but
for many the technology moves so quickly that it is difficult to keep up and, as a
consequence, we may not be able to make best use of its facilities.
This Guide provides insights into the facilities available on the Internet and gives
pointers to the seemingly endless supply of tools and information resources that help
archivists and records managers to do their jobs. It is almost wholly the work of Louisa
Venter of the National Archives of South Africa, and the Association is extremely grateful
for the undertaking.
Kelvin Smith
Hon Secretary
ACARM
June 2005
The Association of Commonwealth Archivists and Records Managers was founded
in 1984 to promote professional development in the field of records and archives
management throughout the Commonwealth. It provides a link for Commonwealth
archivists, archival institutions and records managers which is especially important
because of the common heritage of legal and administrative systems, and hence of
record keeping practices, which the countries of the Commonwealth share.
Production of this Guide has been made possible by financial assistance from the
Commonwealth Foundation.
TABLE OF CONTENT
1.
Introduction....................................................................................1
1.1
Purpose.......................................................................................3
1.2
Acknowledgements .......................................................................3
2.
What is the Internet? .......................................................................5
2.1
Introduction.................................................................................5
2.2
History ........................................................................................5
2.3
Internet Services ..........................................................................6
2.3.1
World Wide Web .....................................................................6
2.3.1.1
The public web .................................................................7
2.3.1.2
The deep web/invisible web................................................7
2.3.1.2.1
Why does the invisible web exist? ..................................8
2.3.1.3
How does the World Wide Web work? ..................................8
2.3.1.4
Web browsers ..................................................................9
2.3.1.4.1
2.3.2
Plug-ins .................................................................... 19
E-mail ................................................................................. 20
2.3.2.1
How does e-mail work?.................................................... 21
2.3.2.2
What does an e-mail message look like? ............................ 22
2.3.2.3
Reading e-mails.............................................................. 22
2.3.2.4
Sending e-mails ............................................................. 24
2.3.2.4.1
Address Books........................................................... 28
2.3.2.4.2
E-mail writing style .................................................... 29
2.3.2.4.2.1 Subject lines ......................................................... 30
2.3.2.4.2.2 Attachments.......................................................... 31
2.3.2.4.2.3 Auto signatures ..................................................... 32
2.3.3
Listservs/mailing lists ............................................................ 33
2.3.3.1
Subscribe to mailing lists/listservs..................................... 35
2.3.3.2
Unsubscribe from mailing list/listservs ............................... 39
2.3.4
Usenet Newsgroups and discussion groups ............................... 39
2.3.4.1
Subscribe to a newsgroup ................................................ 41
2.3.4.2
Setting up a group .......................................................... 42
2.3.5
Internet Relay Chat and web chatting ...................................... 42
2.3.5.1
Instant Messaging........................................................... 43
2.3.6
Channels ............................................................................. 44
2.3.7
FTP and downloading ............................................................ 44
2.3.7.1
Anonymous FTP.............................................................. 45
2.3.8
Telnet ................................................................................. 45
2.3.9
Intranet .............................................................................. 45
2.3.9.1
Intranet training ............................................................. 46
2.3.10
Internet phone ................................................................. 46
2.3.11
Video conferencing............................................................ 47
2.3.12
Blogs and Wikis ................................................................. 48
2.4
Protocols ................................................................................... 48
2.4.1
TCP/IP ................................................................................ 49
2.4.2
File retrieval protocols ........................................................... 49
2.4.2.1
FTP............................................................................... 49
2.4.2.2
Telnet ........................................................................... 49
2.4.3
Multimedia Information Protocols ............................................ 50
2.4.3.1
HTTP............................................................................. 50
2.4.3.2
UUCP ............................................................................ 50
2.4.3.3
PPP............................................................................... 50
2.4.3.4
SLIP ............................................................................. 50
2.4.4
E-mail protocols ................................................................... 51
2.4.4.1
IMAP............................................................................. 51
2.4.4.2
POP .............................................................................. 51
2.4.4.3
SMTP ............................................................................ 51
2.4.5
Address Protocols ................................................................. 51
2.4.5.1
2.4.6
Security and Privacy Protocols ................................................ 51
2.4.6.1
PCT .............................................................................. 51
2.4.6.2
S/MIME ......................................................................... 52
2.4.6.3
SSL .............................................................................. 52
2.4.7
Usenet Protocols................................................................... 52
2.4.7.1
2.5
LDAP ............................................................................ 51
NNTP ............................................................................ 52
Domain Name Service, E-mail addresses and Uniform Resource Locators
(URL’s) .............................................................................................. 52
2.5.1
IP Addresses and Domain Names ............................................ 52
2.5.1.1
Were does one obtain an IP address and Domain Name? ...... 55
2.5.2
E-mail addresses .................................................................. 56
2.5.3
URL’s .................................................................................. 56
2.6
Search Engines .......................................................................... 59
2.6.1
Types of search engines ........................................................ 60
2.6.1.1
Directories ..................................................................... 60
2.6.1.1.1
Subject directories ..................................................... 60
2.6.1.1.2
People directories ...................................................... 62
2.6.1.2
Robot Engines ................................................................ 63
2.6.1.3
Meta search engines ....................................................... 63
2.6.2
How do search engines work?................................................. 64
2.6.2.1
Web crawling ................................................................. 64
2.6.2.2
Accessing information ..................................................... 64
2.6.2.3
Relevancy ranking .......................................................... 64
2.6.3
Searching ............................................................................ 65
2.6.3.1
Keyword search.............................................................. 65
2.6.3.2
Advanced Searching........................................................ 65
2.6.3.3
Finding the invisible web.................................................. 68
2.6.4.
2.6.5
Evaluating the information found on the Internet ................... 68
Planning a search ................................................................. 71
3.
Netiquette .................................................................................... 73
4.
What do you need to connect to the Internet? ................................... 75
4.1
Computer .................................................................................. 75
4.2
Software ................................................................................... 75
4.3
Internet account......................................................................... 76
4.3.1
4.3.1.1
How would you go about connecting to the service provider? 77
4.3.1.2
Evaluating the services of Internet Service Providers ........... 77
4.3.2
5.
Internet Service Providers...................................................... 76
Internet connection............................................................... 79
Advantages and Disadvantages of using the Internet .......................... 81
5.1
Security .................................................................................... 82
5.1.1
Viruses, Worms and Trojans................................................... 83
5.1.2
Hacking............................................................................... 83
5.1.3
Phishing .............................................................................. 84
5.1.4
Spam.................................................................................. 84
6.
What would you use the Internet for? ............................................... 85
6.1
Introduction............................................................................... 85
6.2
Communication .......................................................................... 86
6.3
Marketing/Outreach .................................................................... 87
6.4
Research ................................................................................... 89
6.5
Training .................................................................................... 91
6.6
Preserving what we, our client offices and stakeholders produce for the
Internet and World Wide Web................................................................ 91
7.
8
Designing a website/Intranet site..................................................... 93
7.1
Introduction............................................................................... 93
7.2
Planning your website ................................................................. 94
7.3
Developing website content.......................................................... 95
7.4
Graphic Design........................................................................... 96
7.5
Programming your website........................................................... 97
7.6
Hosting your website................................................................... 98
7.7
Marketing/Promoting your website ................................................ 99
7.8
Maintaining your website ............................................................. 99
Understanding HTML ....................................................................... 101
8.1
HTML Documents...................................................................... 101
8.2
HTML Tags............................................................................... 102
8.3
The Basic HTML Document tags .................................................. 103
8.3.1
Starting an HTML document ................................................. 103
8.3.2
Head and title tags ............................................................. 103
8.3.3
Body tags .......................................................................... 104
8.3.3.1
Heading tags................................................................ 106
8.3.3.2
Paragraph tags ............................................................. 107
8.3.3.3
Centre paragraphs ........................................................ 108
8.3.3.4
Lists ........................................................................... 109
8.3.3.5
Preformatted text ......................................................... 111
8.3.3.6
Extended Quotations ..................................................... 111
8.3.3.7
Forced Line Breaks........................................................ 112
8.3.3.8
Horizontal line .............................................................. 112
8.3.3.9
Other commonly used tags ............................................ 112
8.3.3.10
Special characters........................................................ 113
8.3.3.11
Document Links ........................................................... 113
8.3.3.12
Images....................................................................... 115
8.3.3.13
Sounds and Animations ................................................ 117
8.3.3.14
Tables ........................................................................ 118
8.3.3.15
Forms ........................................................................ 120
8.3.3.16
Frames....................................................................... 120
Annexure A: Glossary of Terms .............................................................. 123
Annexure B: Condensed list of listservs ................................................... 131
Annexure C: List of ISO 3166 Country Codes............................................ 135
Annexure D: Internet Service Providers in some Commonwealth Countries ... 139
Annexure E: Useful Websites.................................................................. 149
Annexure F: Bibliography....................................................................... 157
Table of Figures
Figure 1: Microsoft Internet Explorer .................................................................... 10
Figure 2: Firefox ................................................................................................ 10
Figure 3: Microsoft Internet Explorer home page .................................................... 11
Figure 4: Type the URL in the location (address) bar and......................................... 11
Figure 5: Type the search term in the location (Address) bar ................................... 12
Figure 6: Browser showing favorite sites ............................................................... 12
Figure 7: History of sites visited........................................................................... 13
Figure 8: Find text on a page with the find function ................................................ 13
Figure 9: Indication of how found text is displayed on the page ................................ 14
Figure 10: Type the URL of the search engine in the ............................................... 14
Figure 11: Select the text to copy and .................................................................. 15
Figure 12: Paste the text into a word document ..................................................... 15
Figure 13: Select source from the view menu ........................................................ 16
Figure 14: HTML source code of the...................................................................... 16
Figure 15: Use the internet options command from the Tools Menu........................... 17
Figure 16: Accessing the online help functionality ................................................... 17
Figure 17: Browser home button.......................................................................... 18
Figure 18: Browser stop button............................................................................ 18
Figure 19: Browser back button ........................................................................... 19
Figure 20: Browser forward button ....................................................................... 19
Figure 21: The URL on the task bar at the bottom indicates ..................................... 20
Figure 22 Selecting an e-mail to read ................................................................... 23
Figure 23: Read an e-mail................................................................................... 23
Figure 24: To reply to an e-mail, click on the Reply button....................................... 24
Figure 25: To forward an e-mail, click on the Forward button ................................... 24
Figure 26: Launch a new e-mail message .............................................................. 25
Figure 27: New Message dialogue box .................................................................. 25
Figure 28: Type the e-mail address in the To box ................................................... 26
Figure 29: To Cc the e-mail to another user,.......................................................... 26
Figure 30: Add a subject in the subject box ........................................................... 27
Figure 31: E-mail message with subject field and ................................................... 27
Figure 32: Click on the send button to send the e-mail............................................ 28
Figure 33: Accessing the address book ................................................................. 29
Figure 34: New message dialogue box with Address Book open ................................ 29
Figure 35: Inserting an attachment ...................................................................... 31
Figure 36: Choosing a document to insert in the e-mail ........................................... 31
Figure 37: E-mail with document attached............................................................. 32
Figure 38: Example of an auto signature ............................................................... 33
Figure 39: Listserv website ................................................................................. 36
Figure 40: Joining the listserv from the website...................................................... 36
Figure 41: Instructions on how to complete the subscription .................................... 37
Figure 42: Subscription completed ....................................................................... 37
Figure 43: A listserv welcome message ................................................................. 38
Figure 44: Directory structure using the document type .......................................... 57
Figure 45: Directory structure with the subject ...................................................... 58
Figure 46: Accessing Yahoo's directory search ....................................................... 61
Figure 47: Doing a search for information ............................................................. 61
Figure 48: Finding directory information about Records Management. ....................... 62
Figure 49: Doing a web search for Records Management. ........................................ 63
Figure 50: HTML version of the ACARM Guide to the Internet ................................. 101
Figure 51: The HTML source Code of the ACARM Guide to the ................................ 102
Figure 52: Example of a document heading in HTML format ................................... 103
Figure 53: Source code of the example in figure 52 .............................................. 104
Figure 54: Example of body text in an HTML document ......................................... 105
Figure 55: HTML source code of example in figure 54........................................... 105
Figure 56: HTML source code of document in figure 54.......................................... 106
Figure 57: HTML source code of document in figure 54.......................................... 108
1
1.
Introduction
The face of archives and records management is changing. For many, the perception of
archivists is one of working in dark basements and sifting through old documents. But,
in reality, they are just as likely to be involved in putting a website on-line, organising
an exhibition or dealing with the public.
For a long time records have been unique and stored in a single place and control was
possible on site. But with the Internet these same records can now be made available
all over the world and information has to be secured against loss for technical reasons.
Whole files on magnetic tape can be lost if the tape is damaged and adequate recovery
disciplines are not in place.
Electronic records are different from traditional records. It is a known fact that
information stored on erasable media (for example, floppy disks, tapes etc.,) can be
easily modified and changes may go undetected.
about the issue of electronic records.
This leads to a host of legal concerns
As Elliot1 says, solutions depend on adopting
standards and developing “migration” methods to keep electronic information compatible
with the current technology storage and retrieval methodologies.
World-wide many studies and attempts are currently underway to ensure the longevity
and legal admissibility of electronic records. The use of the Internet and World Wide Web
however, poses a number of new challenges to archivists and records managers. It is
becoming the communication medium of choice of many government institutions, public
entities and private companies without proper records management controls being put in
place.
A number of Internet and World Wide Web preservation issues were discussed during an
International Conference on Archiving Web Resources hosted by the National Library of
Australia in November 2003. From the papers delivered at the conference it is clear that
the challenge to manage web resources includes all the traditional issues surrounding
“normal” electronic records compacted into an even more pressing problem, since the
life-span of information posted to the Internet and World Wide Web is even more
fleeting than that of other electronic records. Information about the conference
proceedings is available on http://www.pandora.nl.gov.au. Archivists and Records
1
Elliot, E.D.I., E-mail and the Internet, Proceedings ARMA 41 Annual Conference, p.217
2
Managers are forced to build strategic alliances with libraries, museums and client offices
to manage the challenge.
Preservation issues are however not the main topic of discussion in this guide. The
Internet is of considerable value to records managers and archivists. An increasing
number of records managers are discovering the Internet and are forming an on-line
community for information-sharing and communication. Records managers may use the
Internet
to
participate
in
sharing
experiences
and
insight
with
other
records
management professionals; they can conduct research using online libraries and/or
search programmes, announce job openings, download records management software
for testing and review, create a home page devoted to records management and search
sites for current information impacting records management. As Steemson clearly
defines: The Internet is a vast source of information for records and information
managers as well as industry generally. The many listserves, electronic discussion and
debating groups set up by professional and skill communities to share knowledge, air
grievances and seek guidance, fill the ‘Net with more expertise than anyone could
assimilate in a lifetime’s study.2
Information on professional issues is available through e-mail subscription, or “Listservs”
for example the records management listserv. Listservs are simply electronic mail
“reflectors” on computers that broadcast text messages across networks to the
individual computer mailboxes of persons who have subscribed for announcements, user
postings, group discussions or other bulletins. Such listservs are presently being used by
records managers and archivists to conduct extensive discussions by electronic mail
about professional issues. Information on professional issues is also available on
websites accessible through the Internet like those operated by ARMA International3,
AIIM4, PRISM5 etc. as well as by ARARM6
Information on technology developments and vendor products are among the most
advantageous features of using the Internet because almost all computing technology
vendors have well developed and informative websites that can be browsed.
2
3
4
5
6
Steemson M, The record keeping future, Records Management Bulletin, Issue No. 83, 1997 p.21.
http://www.arma.org
http://www.aiim.org
http://www.prismintl.org
http://www.acarm.org
3
1.1
Purpose
It is worthwhile discussing the resources available to the records manger and archivist
who wish to utilise the Internet for communication and information gathering (these are
treated at greater length later in this document).
This document is written with the archivist and records manager in mind. It provides
insights into the facilities available on the Internet and pointers to a wealth of tools and
relevant information repositories on the Internet. It assumes little or no familiarisation
with computers but may also be a useful source of ready reference information for the
computer-literate user. It is meant to provide guidance on the use of the Internet in
general and to provide listings of good websites related to specific records and
information management issues.
A glossary of terms is contained in Annexure A. Normally terms are explained in the
text. If not, please read up on them in the glossary.
Persons with access to the Internet will find this document - and its future adaptations retrievable from the Internet websites for the Association of Commonwealth Archivists
and Records Managers (ACARM) and the International Records Management Trust
(IRMT). Any comments the reader might have as to the document’s suitability and
possible improvements are more than welcome. An appropriate form is attached to the
appendices and this may be mailed or faxed as indicated.
1.2
Acknowledgements
We acknowledge that the publication of this guide would not have been possible without
the useful information posted on the World Wide Web. Acknowledgement to all the
websites where information was found is given in the text and/or in the Bibliography in
Annexure F.
5
2.
What is the Internet?
2.1
Introduction
The Internet is a worldwide network of computer networks, each with a unique address,
that uses phone system technology and satellite links to communicate information to
each other 24 hours a day using a common software standard. Standalone computers
and private local area networks in universities, businesses and other organisations
communicate with each other over high-speed transmission backbones owned and
operated by Internet Service Providers. Communication takes place via a dial-up modem
or a permanent network connection. The Internet basically consists of a network of
smaller networks and standalone computers. Most of the service providers connect to
one or more other service providers, thereby extending the reach of their networks.
With government organisations, commercial organisations and individuals around the
globe connecting to the Internet, and service providers continually increasing the
number of networks to which they have direct connections, the Internet is growing
exponentially.
There is no central authority that controls the Internet. There are however organizations
like the Internet Engineering Task Force (IETF7) which develop and set standards for
creating and using web applications and organisations like the International Internet
Preservation Consortium (IIPC8) that set standards for the preservation of web
resources. The Internet backbone is owned by private companies working together.
2.2
History
In 1960 the US Department of Defence funded the Advanced Research Projects Agency
(ARPA) to connect a number of computer facilities around the country. ARPA sponsored
research on how to link geographically remote computers to share data and resources.
Because the US Department of Defence was very concerned about a nuclear attack, the
ARPA Network was designed to keep working even if part of the network was bombed. It
was designed so that as soon as one part of the network stops functioning, the network
7
8
http://www.ietf.org
http://www.netpreserve.org
6
automatically reroutes the functionality and flow of information of that part to the rest of
the network.
The early 1970’s were spent developing standards for data transfer. These standards are
known as protocols. Their purpose was to support the sharing of data between
computers running on the same network to ensure the interconnection of different
computers on the networks. TCP/IP (Transmission Control Protocol and Internet
Protocol) which has been the core protocol of the Internet since 1983 was developed
between 1973 and 1978.
This computer network expanded during the 1970’s and 1980’s. At first only military
institutions, government bodies and universities were connected to communicate and
share information and resources. During the late 1980’s and early 1990’s more
companies and individuals joined the network to communicate with each other when the
US government began pulling out of network management. This allowed commercial
entities to sell Internet access to the general public.
Since then the Internet has grown into a communication backbone that provides
different services to its users like the World Wide Web, E-mail, Newsgroups, Chat rooms,
Listservs, Video conferencing, Discussion groups and Intranets.
2.3
Internet Services
The Internet consists of a variety of services namely:
2.3.1 World Wide Web
The World Wide Web (WWW) is a branch of the Internet that provides access to
hyperlinked information. Hyperlinked information constitutes information resources that
are linked to other information resources. Hyperlinks allow one to jump to the other
information resources from the current one and back. This way of exploring information
creates a world wide web of information. This document for example is a Hypertext
document. It contains links to allow you to jump from one place in the document to
another. It also contains links to other documents and websites on the Internet.
7
The World Wide Web consists of the public web i.e. the part that is available for search
engines to crawl and index, and the invisible web or deep web, in other words that part
of the web that is password protected or is protected against web crawlers and that are
not indexed by search engines.
2.3.1.1
The public web
The public web consists of electronic pages containing documents, art, music, graphics,
videos, etc. These can be political, cultural, educational, informational, religious,
governmental, etc. in nature. These pages normally have a graphical interface and are
viewed with a web browser.
Each page is linked to other pages. A collection of related pages is called a website. The
first page of a website is called a home page. This page serves as the index or content
page for the rest of the website. The home page normally consists of links to the other
pages on the website.
2.3.1.2
The deep web/invisible web
Most of the invisible web is made up of searchable databases that can be searched via
the web. Results are delivered in web pages generated in response to the queries that
are launched. These pages are not stored anywhere - they are dynamically generated
because it is cheaper to store information in databases than in pre-defined pages with all
possible answers to all possible queries. Many search engines offer separate options for
locating these databases. The Invisible-web.net9 is a website that specializes in
collecting information about such databases. By doing a search on web databases you
may be able to find other websites with links to databases.
More information about the invisible web can be found in the publication: The Invisible
Web: Finding Hidden Internet Resources Search Engines Can’t See.10
9
http://www.invisible-web.net
Sherman C and Price G: The Invisible Web: Finding Hidden Internet Resources Search Engines Can’t See,
Cyberage books, ISBN: 091096551X.
10
8
2.3.1.2.1
Why does the invisible web exist?
Computer programmes called spiders are used to crawl websites to index them so that
search engines can find them when you do a search. Searches are normally done from
static pages with URL’s. Spiders can find them and crawl their links to index them.
Website owners can choose to prevent spiders from crawling their sites by placing a
programme on the site that prevents spiders from crawling them.
Spiders cannot think - they can only follow links. If a website that is crawled does not
have a link to a database, the spider cannot follow it to index the database. Spiders
cannot do searches or queries to create dynamically generated pages to index. Since
dynamically generated pages are only generated when a query is launched they are not
kept anywhere and the spiders cannot index them.
Sites that are protected by passwords can also not be crawled because the spiders
cannot think and type passwords.
The deep web or invisible web can also consist of multimedia and image files that cannot
be crawled. Search engines normally offer separate means of searching for these types
of files.
2.3.1.3
How does the World Wide Web work?
All the computers on the Internet fall into two categories. They are either clients or
servers. Clients are computers that make requests. They are loaded with the correct
software to talk to the correct servers. In other words the e-mail software would talk to
the e-mail server; the news software would talk to the news server, etc. The e-mail
software on the client server is called an e-mail client, the news software a news client
etc.
Servers are computers that store information for use by clients. In other words they are
computers that service the requests from clients. A server may provide various Internet
services. It can be a web server, e-mail server and a news server etc. depending on the
software that is loaded on the computer. What happens in practice is that the web
browser on the client machine is programmed to talk to the web software for web
requests, the news software for news requests etc.
9
2.3.1.4
Web browsers
A browser is a programme used to locate, display, browse and view information on a
website. When you request a web page by entering the URL in the location field of the
browser, the browser contacts the web server and asks for a copy of the page. The
browser displays the page when it arrives. A browser can be text based in which case
you would only be able to view web pages in text mode or could have a graphical user
interface in which case you would be able to view the web page in graphical mode. In
general browsers allow customisation of the display by changing fonts, appearance of
hyperlinks, colour of texts and background colours, and in graphical view, allow you to
see graphics, pictures and animation.
Dozens of browsers exist and a lot of them were developed in the early days of the web.
The following are amongst those that were developed early on: Samba (1992), Mosaic
(1992-1997), Arena (1993), Cello (1993), Mozilla (1994) renamed to Firefox in 2004,
Internet Explorer (1995) and Netscape Navigator.
Evaluation copies of browsers can be downloaded from the web for a trial period after
which the user is obliged to pay a licence fee for further use. To date Microsoft Internet
Explorer11 has been offered for free of charge. It is usually distributed with the Microsoft
Windows Operating System. Firefox is an open source browser that can be downloaded
for free from http://www.mozilla.org.
Figure 1 below is a screen captured from the Microsoft Internet Explorer Browser. The
top row is a drop-down menu intended for file handling, finding and copying text from
the page displayed, customising the display using the View command as well as Help
Topics regarding use of the browser. The second row of buttons is meant for navigating
backwards and forwards, refreshing the page, stopping a search, e-mailing pages,
accessing web-mail and storing favourite site addresses to save searching time, etc. The
third row is meant for navigating the Internet by typing the URL in the location or
address field and using the Go button.
11
http://ww.internetexplorer.com
10
Figure 1: Microsoft Internet Explorer
Figure 2 below is a screen captured from the Firefox Browser, to enable you to compare
the look and feel of two different browsers. The top row is a drop-down menu intended
for file handling, finding and copying text from the page displayed and customising of
display using the View command and storing/bookmarking favourite site addresses to
save searching time. The second row of buttons is meant for navigating backwards and
forwards, refreshing the page, navigating the Internet by typing the URL in the location
or address field and using the Go button, and stopping a search. The third row is meant
for Help Topics and support regarding use of the browser.
Figure 2: Firefox
11
Browsers are set up to open on a particular web page as soon as you click on them to
connect to the web. The page that is displayed is the browser’s home page.
Figure 3: Microsoft Internet Explorer home page
The browser’s home page is normally also the home page that the service provider set
up for you. If you are part of a company or government department, your IT section will
set your browser up to open on your company or department’s home page. You don’t
have to do anything on the home page. If you want to go directly to another website you
can do so by typing the URL in the location bar (Figure 4) or by doing a search directly
from the browser if it is powered by a search engine (Figure 5). However, sometimes the
browser’s home page does contain useful links so do not ignore them totally.
Figure 4: Type the URL in the location (address) bar and
click the Go button
12
Figure 5: Type the search term in the location (Address) bar
and click the Go button
Browsers have additional functions which make the use of the World Wide Web easier.
Frequently-visited sites can have their addresses saved in a list to provide for quick
access to a page by opening the list and selecting the relevant URL (Figure 6 below).
Adding and deleting URL’s can be done at users will. A history of visited sites is also
maintained by the browser (Figure 7 below).
Figure 6: Browser showing favourite sites
13
Figure 7: History of sites visited
Searching for text on the current page is normally available as a “find” facility under the
“Edit” command on the browser (Figure 8 & 9 below).
Figure 8: Find text on a page with the Find function
14
Figure 9: Indication of how found text is displayed on the page
Another searching facility is used to access search engines on the web by typing the URL
of the search engine into the location (Address) bar and clicking on the Go button.
Figure 10: Type the URL of the search engine in the
location (address) bar and click the Go button
Current pages may be printed or saved as text files by highlighting text and copying it
by using the copy command in the Edit menu.
15
Figure 11: Select the text to copy and
select Copy from the Edit menu
The copied text can be pasted into a Word document. The text can then be edited.
Remember that text on websites is copyright protected. Remember to acknowledge your
sources when copying text.
Figure 12: Paste the text into a Word document
16
The source code of the current file displayed can be viewed on screen or downloaded.
Figure 14 below contains the HTML source code of the ACARM website’s home page.
Figure 13: Select source from the view menu
to view the source code
Figure 14: HTML source code of the
ACARM website home page
Browsers also have a facility to allow the user to modify the general properties, security,
communications and type of connection.
17
Figure 15: Use the internet options command from the Tools Menu
to change the browser settings
Specific browser facilities are usually explained in detail in the online help facility
included in the browser.
Figure 16: Accessing the online help functionality
Browsers allow you to follow links on websites and in documents, by simply pointing to
them and clicking the mouse button. Most browsers also have navigation buttons. These
are the home, stop, back and forward buttons (Figures 17, 18, 19 & 20 below). They
help you to move easily from page to page and from website to website.
18
Figure 17: Browser home button
Figure 18: Browser stop button
19
Figure 19: Browser back button
Figure 20: Browser forward button
2.3.1.4.1
Plug-ins
The functionality of browsers can be extended by adding software known as plug-ins for
handling special types of data like videos and sound files. File formats requiring plug-ins
are known as MIME (Multi Media Internet Mail Extension) files.
A common plug-in used by web browsers is Adobe Acrobat Reader that allows you to
read portable document format (PDF or .pdf) files.
20
)
Figure 21: The URL on the task bar at the bottom indicates
that the report is a .pdf document
Web browsers normally contain a standard set of plug-ins especially for playing music
files. Additional plug-ins can also be down-loaded from the browser’s website. The
browser would normally alert you if you need to download additional plug-ins.
2.3.2 E-mail
E-mail is the most popular communication method on the Internet. E-mail is an
electronic message containing information sent from one computer to another over
networks. E-mails can contain attachments such as pictures, sound files, documents,
etc. E-mail is a cheaper and faster method of communication than normal post, fax or
telephone calls. E-mail functions independently of location and time zones. It allows you
to send messages to and receive messages from anyone who is connected to the
Internet.
According to Jeff Tyson12 using e-mail is most effective when:
12
•
you don’t need an immediate answer;
•
you are communicating with a specific group of people or a single person;
•
you know with whom you wish to communicate;
•
you need to attach a file or provide extensive information.
How Newsgroups Work. http://www.howstuffworks.com/newsgroups.html
21
2.3.2.1
How does e-mail work?
E-mail passes from one computer to another via a mail server. The mail server stores
the messages in an inbox (almost like the in-tray in the paper-based environment) until
the user retrieves them. If you have a dedicated open network line that is never
disconnected, you will see incoming messages in your inbox in the e-mail software
application and you would be able to read them immediately. If you use a dial-up
connection, you will be required to download the e-mail to your computer’s hard drive.
To send and receive e-mail you must have a user account on an e-mail server. To have
an e-mail account you need an Internet connection and access to a mail server. An email server contains a database of e-mail accounts for people who can receive e-mail on
the server. When someone sends a message to a recipient on the server database the email client of that person would contact the e-mail server and pass the name of the
recipient and the message on to the server. If the recipient wants to look at his e-mail,
his e-mail client would contact the server and list the e-mails for him to read.
The server actually contains two pieces of software (also known as protocols) that act as
two different servers on one server machine. The SMTP (Simple Mail Transfer Protocol)
server handles outgoing mail. The other one is either a POP (Post Office Protocol) server
or an IMAP (Internet Mail Access Protocol) server. The SMTP and POP servers allows you
to access and read your e-mail. The POP server acts like a post office for e-mail clients
who use dial-up connections to the Internet. They would normally download the e-mail
to their computer’s hard drives. The IMAP server is used by e-mail clients with an open
Internet connection that stores and accesses their e-mail on the server without
downloading the messages to their computer’s hard drives.
To read e-mail you need have e-mail client software to translate the digital signals to
human readable text. Your e-mail client software is normally part of your computer’s
operating system like Microsoft Outlook and Outlook Express or they can be stand-alone
e-mail clients like Eudora13, Lycos Mail14 or Pegasus15.
You could also subscribe to free e-mail services like Hotmail or Yahoo. These types of
services are known as web mail. Web mail is a facility to send e-mail from a web page.
13
14
15
http://www.eudora.com
http://mail.lycos.com
http://www.pmail.com
22
Web mail is free of charge. However, web mail does not offer all the functionality that email clients have. Web mail programmes for example do not handle attachments well.
They are convenient to use when you travel.
For proper e-mail usage you need an e-mail client to
•
display message headers of all the e-mails in your inbox. The header contains the
following information
-
the sender
-
the subject
-
time and date of the message
-
size of the message
•
select and read e-mails
•
send messages
•
reply to messages or forward them to other people
•
add attachments to messages.
2.3.2.2
What does an e-mail message look like?
E-mail messages consist of two main parts namely
•
the header which contains the address information of the recipient and anyone
the message is copied to and the subject of the message. Similar to normal
paper-based mail the e-mail message should contain the correct address to be
delivered to a recipient. If the address is wrong, the e-mail is returned to the
sender. When you receive an e-mail the header tells you where it came from and
when it was sent.
•
the body which contains the message of the e-mail as well as any attachments.
Figure 23 below contains an e-mail message that was opened to be read. Can you see
the header information and the body of the message?
2.3.2.3
Reading e-mails
Reading e-mails is simple. Open your e-mail client and select the Inbox. In the Inbox
select the e-mail that you want to read and double click on the e-mail header (Figure
22). The e-mail will open and you would be able to read it (Figure 23).
23
Figure 22 Selecting an e-mail to read
Figure 23: Read an e-mail
You could reply to the e-mail that you have been reading, by clicking on the Reply
button. This will open a new e-mail message dialogue box. Then follow the steps in
paragraph 2.3.2.4 below.
24
Figure 24: To reply to an e-mail, click on the Reply button
You could also forward the e-mail to other people. This will open a new e-mail message
dialogue box. Then follow the steps in par 2.3.2.4 below.
Figure 25: To forward an e-mail, click on the Forward button
2.3.2.4
Sending e-mails
Sending e-mails is a bit more complicated. Follow the steps below:
25
Open the e-mail client. Launch a new message window by clicking on the “new” icon.
Figure 26: Launch a new e-mail message
A new message dialog box will appear.
Figure 27: New Message dialogue box
In the To box type the address of the recipient or recipients.
26
Figure 28: Type the e-mail address in the To box
If you want to copy the message to anybody else for information, type their addresses in
the Carbon copy (Cc) box. Addresses should be separated by semicolons.
Figure 29: To Cc the e-mail to another user,
type the e-mail address in the Cc box
Add the subject to the subject box.
27
Figure 30: Add a subject in the subject box
Write your message in the message box.
Figure 31: E-mail message with subject field and
message box completed
Click on the send icon or select send from the file menu. The e-mail will be sent to the
recipient.
28
Figure 32: Click on the send button to send the e-mail
If you choose too, you can set your e-mail client up to do a spell-check before you send
a message.
2.3.2.4.1
Address Books
An Address Book provides an easy way to store e-mail addresses and other contact
information for easy retrieval by programs such as Microsoft Internet Mail and News.
Typical features of an address book may include contact information: e-mail, phone,
home, business, and home page addresses.
Other facilities include:
•
Search, print, view, add, edit, or delete address book entries;
•
Sorting messages by sender, date, or subject;
•
Contacts can belong to more than one group;
•
Sending a copy of the posted message by e-mail;
•
Displaying the properties for the sender or other recipients;
•
Deleting a member from the group;
•
Deleting a member from the address book;
•
Delete a group from the address book;
•
Create more than one group;
•
Forwarding messages;
•
Sending and saving file attachments.
29
Figure 33: Accessing the address book
Figure 34: New message dialogue box with Address Book open
2.3.2.4.2
Electronic
E-mail writing style
communication,
because
of
its
speed
and
fundamentally different from paper-based communication.
broadcasting
ability,
is
Because exchange of
messages can be so fast, email is more conversational than traditional paper
30
communications. E-mail thus tends, like conversational speech, to be informal and more
ambiguous.
This saves a lot of time and energy when writing casual messages to familiar recipients,
where spelling, classical words and grammar are not issues. However, because of the
lack of vocal inflection, gestures, and shared environment, e-mail is not as rich a
communication method as a face-to-face or a telephone conversation. Recipients may
have difficulty understanding whether the senders are serious, joking, frustrated or
euphoric. Sarcasm, when used in e-mail can produce undesirable outcomes. Thus email compositions should be carefully considered.
When writing an e-mail message, the following is important to remember:
2.3.2.4.2.1
Subject lines
Subject lines are very important. Subject lines should be brief, but clearly indicate what
the message is all about. If subject lines are useless the recipients may not realize the
importance of the message and choose to read it later or not at all. E.g. which of the
following would draw your attention?
FOR YOUR INFORMATION
or
URGENT- IMMEDIATE COMPUTER DOWNTIME
If you reply to an e-mail or forward an e-mail message, the e-mail software keeps the
subject line of the original message and adds either a RE: or a FW: to the subject line.
E.g. if you reply to or forward the messages with the subject lines used above, the lines
will read:
RE: FOR YOUR INFORMATION
FW: FOR YOUR INFORMATION
or
RE:
URGENT
-
COMPUTER DOWN TIME
IMMEDIATE
FW: URGENT - IMMEDIATE COMPUTER
DOWN TIME
If you received an e-mail message with a senseless subject line and you need to reply to
or forward it you can change the subject line to something more sensible before sending
it off.
31
2.3.2.4.2.2
Attachments
The body of an e-mail message normally consists of brief textual messages while very
long textual documents, multimedia files, graphic files, spreadsheets, etc are normally
attached to the e-mails as attachments (Figure 35, 36 & 37). However, attachments
have some drawbacks, namely:
•
if the recipients do not have the necessary software on their machines, they would
not be able to read the e-mails
•
if the recipients do not have a lot of space on their servers, they will not appreciate
receiving large attachments. Some e-mail servers will automatically remove large
attachments to prevent their e-mail servers from being overloaded
•
viruses can hide in attachments and infect other people’s computers when they open
the messages.
Figure 35: Inserting an attachment
Figure 36: Choosing a document to insert in the e-mail
32
Figure 37: E-mail with document attached
2.3.2.4.2.3
Auto signatures
Sometimes you receive e-mails from people that you don’t know and that do not identify
them or their place of business properly, because the e-mail addresses are too general
e.g. [email protected] versus [email protected]. At least for the
latter you would be able to deduce from the domain name that Peter Baker is at the
Department of Communications of the Cayman Islands. For the former you would not
know where he is from, except if there is some other identifying information in the email message.
Auto signatures (Figure 38) are a way to provide recipients with alternative ways to
contact you. An auto signature could contain your:
•
Name
•
Postal address
•
Street address (optional)
•
Telephone number
•
Fax number
•
Mobile phone number
•
Website address.
33
Figure 38: Example of an auto signature
You may wonder why all this information is necessary – Sometimes other people’s e-mail
is off-line and you need to contact them urgently. A telephone number is handy in such
a case, but what if you compiled a lengthy e-mail message in reply to an e-mail received
and it is returned to you undelivered for some reason? If you cannot contact the person
telephonically because of different time zones, it could be handy to make a printout of
the e-mail and fax it to the recipient.
For more information about e-mail you could consult A Beginner’s Guide to Effective Email16
2.3.3 Listservs/mailing lists
Listservs are as old as the Internet. Many lists exist. Some are open for everyone to
access and others are closed to specific interested parties like the records management
archives and electronic records listservs.
A listserv is a facility that allows participation in ongoing discussions via e-mail. Listservs
provide a discussion forum to share information on specific topics. Joining listservs are
free. Listservs link people with common interests. Subscribers to a listserv receive email from people who have an interest in a particular subject field. With a Listserv, one
message is sent to a single address and then the message is resent to subscribers
16
http://www.webfoot.com
34
around the world. Listservs may be open to anyone who wants to subscribe or they may
be monitored by an administrator. In that case, members and/or the messages may be
monitored. There are other systems that perform the same function, but with slightly
difference command structures like the Majordomo and Almanac Servers.
The person
monitoring, or moderating, can for example stop a message from appearing on the list if
it goes against the interest of the group or send messages to the list to guide in the
development of the subjects being discussed.
Mailing lists are maintained by software (eg LISTSERV(R), LISTPROC, Majordomo, etc.).
The software automatically distributes an e-mail message from one member of a list to
all other members on that list.
Listservs are controlled by a list owner. The owner is usually the person who created the
list or who inherited the management of the list. The work of the list owner is minimal,
because most of the work is done by an automated programme running on the listserve
server. The owner has to monitor the messages and sort out any problems that may
arise. The owner is also responsible to create the WELCOME messages that new
subscribers receives. WELCOME messages contain general information about the list
like:
-
purpose
-
rules
-
special features
-
instructions to unsubscribe.
Most listservs are moderated. The moderator is the person who decides which messages
are sent out. This ensures that the discussions stays focused. The moderator and the
owner can be the same person. Depending on the volume of traffic on a listserv, the
moderator can be very busy.
According to Jeff Tyson17 listservs are most effective when:
•
you don’t need an immediate answer;
•
you want or need regularly updated information about a particular topic;
•
you want to receive information from a group of people interested in the same topic.
The following websites contains links to listservs:
Tilenet18
17
How Newsgroups Work. http://www.howstuffworks.com/newsgroups.html
35
The HelpWeb19
Unesco Archives Portal20
PADI – Preserving Access to Digital Information21
List of Mailing Lists on Archives, Records management, Museums and Related Subjects22
The Archive Skills Consultancy23
Lsoft – Catalist, the official catalogue of listservs lists24
Greater Cincinatti Library Consortium25
Government Information Systems Manager’s Forum26
For your convenience a condensed list of listservs is attached as Annexure B.
2.3.3.1
Subscribe to mailing lists/listservs
Each time you send a message, or reply to a message it is send to all subscribers on the
list. To participate in discussions about a specific topic join a list devoted to that specific
topic (e.g. the ACARM listserv on [email protected] or the Electronic
Records listserv on [email protected]).
You can join a listserv directly from the listserv website. The website normally contains
all the instructions necessary to joint the listserv.
18
http://tile.net/lists
http://www.imagescape.com/helpweb/mail/lists.html
20
http://www.unesco.org
21
http://www.nla.gov.au/padi/format/list.html
22
http://www.archimac.org/Profession/Lists/index.spml
23
http://www.archive-skills.com/links/listservs.php
24
http://www.lsoft.com/catalist.html
25
http://www.gclc-lib.org/lists/index.html
26
http://www.govis.org.nz/forums-membership
19
36
Figure 39: Listserv website
Figure 40: Joining the listserv from the website
You would receive an e-mail from the listserv server on how to complete the subscription
(Figure 41). This is used by the listserv server to verify your e-mail address.
37
Figure 41: Instructions on how to complete the subscription
Upon confirmation that you do want to subscribe, you would be notified on the website
that your subscription is complete.
Figure 42: Subscription completed
You would then receive a welcome message via e-mail.
If you know the listserv subscription address you could also subscribe by mailing the
word SUBSCRIBE to the list owner. You would then receive an e-mail with the
subscription confirmation instructions and upon confirmation you would receive a
welcome message.
38
The subscriber automatically receives a standard letter of welcome (Figure 43) with
information about the list. When you receive a welcome e-mail, keep it for future
reference. It contains information about how to unsubscribe from the list as well as other
useful information. If you accidentally did not keep the information, send an e-mail to
the [email protected] e.g. [email protected].
Figure 43: A listserv welcome message
It is normal practice that the listserve address (if the list runs on a listserver), the
request address and the address of the list manager are usually included in the welcome
message received by a new subscriber to a list. Every list has two addresses. The first is
the “list manager” address.
This is the address to which commands are sent to
subscribe or unsubscribe. These messages are processed automatically by the software.
The other address is the “list” address. This is a single address to which the messages
are sent to be received by all subscribers to the list.
On subscribing to a list, the name and e-mail address of the new subscriber are
automatically added to the list. From that time on, the subscriber will receive all mail
(postings) sent to the list by its members. A response can be made either to the list (in
which case, all members of the list will receive it), or to an individual on the list.
Some listservs have very low traffic. They receive only a few messages per week. Other
listservs, like the records management listserv, receive a lot of messages per day. It can
become very cumbersome to receive a lot of e-mail messages to read. It is advisable
39
that, if you do want to belong to a listserv, but you do not want very high e-mail traffic,
you choose either the digest option or the index option. The digest option will send you
one e-mail containing all the messages of that day. The index option will send you one
e-mail containing an index of all the messages posted that day. You then have a choice
to view only the ones you want to see. This is usually done by deleting the index
inscriptions of the ones you don’t want to read and by replying to the e-mail by sending
the index inscriptions of the messages you want to see back to the list server. You will
then receive an e-mail containing only the messages that you requested.
2.3.3.2
Unsubscribe from mailing list/listservs
A subscriber may sign-off (unsubscribe) from a list at any time. To unsubscribe, you
could either access the listserv website to unsubscribe (Figure 40 above) or you could
mail the word unsubscribe to the list owner.
When unsubscribing, mail should not be sent to the posting address, otherwise the
message will go to all members of the mailing list.
Mailing lists as a rule have an
administrative address that is different from the posting address. Nearly all mailing lists
have a request address.
2.3.4 Usenet Newsgroups and discussion groups
Usenet is a world-wide distributed system of online discussion groups in which people
continuously participate. Newsgroups allow people with a common interest to subscribe
to one or more groups for posting, reading and replying to electronic mail. They are
common areas where users can post messages for many users to view/reply to:
-
leave messages;
-
ask questions;
-
share ideas; and
-
respond to messages, questions and ideas.
According to Jeff Tyson27 they are most effective when
•
you don’t need an immediate answer;
•
you want to communicate with more than one person;
•
you want to communicate with a group of people interested in the same topic;
27
How Newsgroups Work. http://www.howstuffworks.com/newsgroups.html
40
•
you need or want to provide extensive information about that topic.
To use this service you do not need access to an e-mail address, only to the web. To use
the Newsgroup facility one needs a news client and a news server. Most browsers have a
built in news client called newsreader software. The software is normally included in the
browser software that is part of the computer’s operating system.
Newsgroups are publicly accessible and cover an enormous range of subjects, but each
individual newsgroup is dedicated to a specific topic. It is a good way of accessing expert
knowledge about a variety of areas. The content reflects a diversity of opinions.
Some newsgroups are moderated, which means that the messages must be approved
before they are posted. Most newsgroups however remain unmoderated.
Some newsgroups are very popular and have a daily readership. However, messages are
retained on the serving computer for a limited amount of time and are then
automatically deleted.
Newsgroups are normally categorized according to the topic they cover. The name of the
newsgroup
contains
an
indication
what
the
area
of
interest
is.
E.g.
comp.lang.java.programmer is a newsgroup for Java programmers. The name is read
from the general to the specific, with the topic on the right hand side. The general part
of the address indicates the broader category in which this newsgroup is located e.g. the
language section in the computer category.
Usenet sites on the Internet divide information into newsgroups or subject categories.
The following are a few examples:
•
sci: Topics relating to anything in the sciences.
•
rec: Recreation such as games, sports, hobbies, the arts and anything that’s fun.
•
soc: Covering social interests and socializing about countries, cultures, history,
religion, the single scene and so on.
•
news: Talk about net news itself (great for new users).
•
talk: Long-winded arguments about anything.
•
comp: Discussions about computers.
•
misc: Miscellaneous topics that don’t relate to any of the above (you can post
resumes here).
41
There are more non-standard hierarchies available such as:
•
alt: (Alternative) anyone can create a group under alt.
•
clari: (ClariNet news) groups of newspaper-type news offering news about events as
fast as they happen.
•
highwayl: Information about Highwayl.
•
bit: Bitnet mailing lists passed around as Usenet news.
•
biz: Business groups (more commercial than traffic in mainstream groups).
•
gnu: Develops freely available software.
•
k12: A specialist group for primary and high school students and teachers.
The infrastructure behind newsgroups is called news servers. News servers have
software that maintains a folder for each newsgroup serviced by that server. When you
access a news server with your newsreader software, the newsreader downloads the
information posted to the newsgroup. You would then read the messages and reply if
you want to. Alternatively you could start your own tread with news of your own. A tread
is an original posting with all the messages relating to it. Your newsreader sends your
message to the news server. The server saves your message in the dedicated
newsgroup folder. The news server connects to other news servers on the network to
send them the updated news. Other subscribers then read your messages and all the
others posted since they last accessed the newsgroup and reply to them. You are then
able to read the replies and other messages.
You can log into a newsgroup as a guest to find out if you are interested in participating
in a discussion. If you are, you can register to join the discussion. You have to supply a
username and password, and would be requested to complete a form with personal
details that would be available to other users when you post messages. Once you are
registered, you would be able to read and post messages to participate in discussions.
2.3.4.1
Subscribe to a newsgroup
To subscribe you need to connect to a news server. Your Internet Service Provider
normally has access to one or more news servers.
The newsreader client software that is part of your web browser will allow you to
configure or set up the news server. The software will tell you exactly what to do. When
42
the connection to the news server is set up for the first time, the news reader will show
you a list of all the news groups carried by that news server. You can then select the
news group that you are interested in and click on the subscribe button. If it takes too
long to scroll through the entire list you can use the newsreader search functionality to
search for topics that you are interested in. After subscribing to those you are interested
in, the newsreader will display them to you in a list. If you click on the name of the
newsgroup the messages will be displayed. If you have a dial-up connection, you would
have to download them to your hard drive when you want to read them.
2.3.4.2
Setting up a group
Groups covering other areas of interest can be created.
This can be a slow process
requiring a formal charter and an on-line vote by both its prospective readers and nonreaders.
To set up a newsgroup you could either set up a group in one of the existing categories
or set up a group in the alternative category. You need to know beforehand what the
topic of the group is, what its name would be and what the purpose of the group and
topic is. You should also know beforehand to which category or categories the group
should belong. With this information at hand, you would then post a Request for
Discussion to news.announce.newgroup. Other subscribers would then read your
request. They have approximately one month to discuss the viability of the new group.
After a month you can request a Call for Votes by posting a message to
news.announce.newgroup. Subscribers then have another month to vote. When the vote
closes, the moderator of the newsgroup(s) the request was posted in counts the votes
and posts the result to news.announce.newgroup. To start the group a majority of
subscribers should be in favour by 100 votes or more and there should be no serious
objections to the new group. If the vote is positive, the existence of the new group is
announced in news.announce.newgroup. At this stage you could start a discussion by
posting a statement, asking a question, etc.
2.3.5 Internet Relay Chat and web chatting
Internet Relay Chat (IRC) is one of the most popular activities on the Internet. It is a
means of having a conversation with many people on a variety of topics in real time; in
other words, all the parties to the conversation are participating simultaneously
regardless of the time zone they are in. IRC is normally a typed conversation that uses
43
streaming technology which implies that the speed with which you type is the speed at
which the message appears on the other participant’s screens.
People talk in groups. There are no restrictions to the number of people that can join a
conversation. Likewise there is no restriction on the number of conversations that you
can participate in. Conversations take place in channels. To participate in a conversation,
you need to join a channel or, if no channel exists for the topic you want to address, you
can start your own channel.
To enable you to make use of this Internet service, you need IRC client software which
would facilitate a connection to an IRC server. The IRC Server that is connected to the
Internet provides instant access to anyone who is connected to the same network.
IRC should not be confused with Web chatting. IRC is directly connected to the Internet
servers, while web chatting uses a browser as a client to enable participation in
conversations conducted in web chat rooms. A web chat room is part of a website or a
website by itself that provides an online venue where users with a common interest can
communicate sometimes in real time. Web chatting is not necessary real time in nature.
You need to use the browser’s refresh button to load the new messages to enable you to
view them.
According to Jeff Tyson28 IRC is more effective when:
•
you need an immediate answer;
•
you want to communicate with more than one person;
•
you can communicate in brief messages;
•
you want to meet new people.
2.3.5.1
Instant Messaging
This is very similar to chatting. The difference is that you maintain a list of people you
want to interact with. If that person is online, you can send a message to him/her. It
opens up a small window on the desktop where he can type in. Each of you can see the
desktop dialogue window and can have an interactive chat session.
According to Jeff Tyson29 it is most effective when:
28
29
How Newsgroups Work. http://www.howstuffworks.com/newsgroups.html
How Newsgroups Work. http://www.howstuffworks.com/newsgroups.html
44
•
you need an immediate answer;
•
you only need to communicate with a single person or a small group;
•
you know with whom you wish to communicate;
•
you need to communicate in real time.
2.3.6 Channels
Channels on the web are a pre-selected information source that can send information to
your computer automatically according to a predetermined schedule. Channels can be
programmed to send a whole lot of information to your computer to be stored on the
hard drive so that you can look at them at leisure.
Channels have the same type of information that you would normally see when
accessing the web with a browser. Channels are normally free.
2.3.7 FTP and downloading
FTP (File Transfer Protocol) allows you to copy files from one computer connected to the
Internet to another computer connected to the Internet. It allows you to download
information, upload web pages and transfer information between computers.
A lot of free software and information are available on the Internet on FTP servers. FTP
servers have special areas with programmes and data that were set aside for any user
on the Internet to download information from. This allows the free distribution of data
and software. FTP needs a client programme to function. Most browsers act as the FTP
client also. Users are often using FTP to download information from the Internet without
knowing it. When downloading, the browser automatically takes care of all the detail.
The user only needs to tell the browser where on the hard drive to save the information.
However, should you need an FTP programme to help you move files around between
computers outside of the functionality that the browser is providing, you could download
Filezilla30 from the internet. It is free of charge.
30
http://www.computeractive.co.za/downloads4
45
2.3.7.1
Anonymous FTP
This is a facility that allows you to download information from computers where you do
not have a user account.
To copy a file (i.e. a collection of data stored under a particular name) from another
computer you need permission to connect to the other computer. If the browser did not
automatically take care of this, you would be prompted to enter a username and
password to connect to the other computer. You can use the username “anonymous”
with any password of your choosing to download files from the public area.
Downloading refers to the actual transferring of a document or file from one computer to
the other. Before you start a download you should ensure that your own computer has
adequate virus protection. Viruses are deadly for the programmes and the data on your
computer.
2.3.8 Telnet
The Telnet protocol is an application that allows a remote connection to another
computer. It gives the facility to work on a remote computer while FTP protocol allows
transfer of files from one computer to another. Both computers must be connected in a
network, either a local area network or the Internet. Also both computers must support
the Telnet protocol. Access is normally allowed only to account holders. The accounts
are set up by the network administrator prior to login.
2.3.9 Intranet
There is a growing reliance on communicating information internally to the staff by using
intranets. Intranets are private networks that help an organization to share information
between departments, units and regions across a network. Publishing information to an
intranet to which all staff members have access is a quick cost-saving mechanism, since
the information is available immediately and you do not have to produce multiple copies
of the same document.
There are a number of advantages to using an intranet namely:
46
•
it does not allow outsiders to view the information, because it is a private network;
•
it can allow employees to interact via e-mail and discussion groups;
•
if properly maintained, the employees always have access to up-to-date information;
•
it is a cheap communication medium.
Intranets can, however, become a liability if not managed properly. The following are
possible problems:
•
Outdated information;
•
Irrelevant information;
•
Poorly organized information that is not easily accessible;
•
No search facility;
•
Purpose is unknown to employees;
•
No interaction with employees regarding the content;
•
Employees do not have access to computers or are not computer literate.
2.3.9.1
Intranet training
Intranets are not only useful to communicate information to all staff members in the
briefest possible time. They can also be used to provide web-based training to
employees. This is especially useful if you have employees in remote areas that need
training. Web-based intranet training allows course presenters to interact with trainees
in real time by using video conferencing facilities. One could even allow trainees to
complete tasks and submit them online or to write exams online.
You would need the following equipment to do intranet training:
•
All the hardware and software to connect to the Internet;
•
Firewall – to provide security;
•
Database – to store information;
•
Content development software;
•
Video conferencing equipment;
•
Electronic white board.
2.3.10
Internet phone
Another service connected to IRC is the Internet phone. An Internet phone allows one to
put a number of calls on the same line without sacrificing sound quality. The rates are
much lower than normal telephone lines. It allows quick real time communication that
47
allows one to speak with other users on the network. To use this facility one needs a
computer with a sound card, phone software, speakers, microphone and an Internet
connection. A video capture device is optional.
The phone software digitizes your speech as you talk and sends the digital data over the
Internet. If you have a good Internet connection you will have good quality sound.
However it is also dependent on the quality of the networks on both ends.
The Internet phone can work in full duplex mode or in half duplex mode. Full duplex
mode allows you to either speak or hear at the same time, while half duplex mode
allows you to either speak or hear. You cannot talk while another user is talking, then
you won’t hear him/her. The capacity of the sound card installed in the computer would
dictate what mode you would use.
Some service providers allow one to dial over the Internet directly to another person’s
normal phone.
According to Jeff Tyson31 this is most effective when:
•
you need an immediate answer;
•
you have the appropriate equipment;
•
the information you want to convey or are requesting is easier to convey through
talking than through text messaging.
2.3.11
Video conferencing
Video conferencing is another service connected to IRC. It allows you to chat with one or
more people in real time and/or to see live images as you speak or type. You can use it
with or without the Internet phone. Besides the normal equipment appropriate
equipment to use this service would be a microphone, speakers and a video camera. It
also allows you to share an electronic white board. You could also use a document
camera with this facility. A video conference can therefore be a true video conference or
only audio and text based.
Remember that
•
time zones are a problem when you want to chat with people world-wide in real
time.
31
How Newsgroups Work. http://www.howstuffworks.com/newsgroups.html
48
•
video conferencing with all the bells and whistles attached needs a fast Internet
connection.
According to Jeff Tyson32 video conferencing most effective when
•
you need an immediate answer;
•
you want to communicate with more than one person;
•
you can communicate the information you need to know or wish to provide in brief
messages;
•
you want to attach a file or use the whiteboard or document camera to explain
something;
•
you want to visually demonstrate or display information.
2.3.12
Blogs and Wikis
Blogs or web logs are personal web pages that contain personal thoughts and links to
other sites that are of particular interest to a blog owner. Blogs are used as a publishing
mechanism and sometimes contain personal opinions and commentaries on the events
of the day. For more information on blogs, to search the web log directory to find out
which blogs exist and to register your own blog, you could access Blogigo33.
Wikis are collaborative websites where the community participate in writing a
publication, like an encyclopaedia or a general purpose website. Wiki publications are
normally of high quality because the participants edit the errors out. An example of an
encyclopaedia written in this fashion is the Wikipedia34.
2.4
Protocols
The Internet works by connecting various computers, software and files together. To
enable this to work the Internet needs standardised rules. Those rules are called
protocols.
Developed in the 1970’s protocols are a standard set of specifications or parameters that
allows computers to send and receive data. The Internet is a packet switched network.
This means that the computers and servers on the Internet do not need a dedicated
32
33
34
How Newsgroups Work. http://www.howstuffworks.com/newsgroups.html
http://www.blogigo.co.uk
http://www.wikipedia.org
49
unbroken connection to send or receive data. It breaks the data down into small packets
and then transfers the packets over any phone or network line that is available. It can
travel over various phone and data lines at once. Each packet of data is labelled with the
addresses for the sending and receiving computer. It also carries instructions on how the
computer should put the packets together so that the data does not contain errors.
The protocols each have their own purpose for different types of Internet connections.
Web browsers use most of these protocols without the users being aware of the fact.
Protocols are highly technical in nature and you don’t need to know precisely how they
work. It is however handy to know a little about those that are most commonly used and
referred to in literature.
2.4.1 TCP/IP
The main protocol used by the Internet is TCP/IP Transmission Control Protocol
Internet Protocol that manages the flow of information on the Internet and that ensures
that data arrives without errors. This protocol keeps the millions of computers on the
Internet that are passing information back and forth running smoothly.
Other important protocols in the Internet suite of protocols are:
2.4.2 File retrieval protocols
2.4.2.1
FTP
File Transfer Protocol was one of the first protocols developed. It allows users to move
files from one computer to another, to browse, upload and download files.
2.4.2.2
Telnet
Telnet allows users to connect to remote computers and to use the applications on that
computer as if it is on their own.
Telnet was once the only means to connect to remote sites. However, the development
of other protocols made it nearly obsolete. Telnet is still used to access some library
50
catalogues and mainframe systems. It is supported by web browsers, but requires Telnet
client software to operate.
2.4.3 Multimedia Information Protocols
2.4.3.1
HTTP
Hypertext Transfer Protocol is used to define the appearance of websites and web pages.
The Hypertext Transfer Protocol is used to transfer data between web servers and web
clients or web browsers. It also allows jumping between hypertext documents.
2.4.3.2
UUCP
Unix to Unix Copy Programme allows computers using versions of the UNIX operating
system to communicate with each other and with remote computers. It allows the
copying of files between computers. It also allows the distribution of e-mail and net news
amongst UNIX computers.
2.4.3.3
PPP
Point to Point Protocol is the protocol that dial-up Internet connections use to transmit
information.
2.4.3.4
SLIP
Serial Line Internet Protocol was the first protocol designed for transmission of
information over dial-up connections. It has largely been supplanted by PPP.
51
2.4.4 E-mail protocols
2.4.4.1
IMAP
Internet Message Access Protocol that allows the mail client to access messages residing
on a mail server from any computer. It allows the mail client to manipulate the
messages on the server without having to download them.
2.4.4.2
POP
Post Office Protocol that allows a mail client to download e-mail messages to the
computer’s hard drive from the mail server.
2.4.4.3
SMTP
Simple Mail Transfer Protocol that allows an e-mail client to send messages to a mail
server. The messages are then stored on the mail server until they are picked up.
2.4.5 Address Protocols
2.4.5.1
LDAP
Lightweight Directory Access Protocol that is used by e-mail clients to query the address
directories on the Internet to find and display e-mail addresses.
2.4.6 Security and Privacy Protocols
2.4.6.1
PCT
Private Communications Technology is used to provide secure communications over the
Internet.
52
2.4.6.2
S/MIME
Secure Multipurpose Internet Mail is a protocol that is used to encrypt data for
transmission over the Internet and allows for the decryption of the information by the
intended recipient.
2.4.6.3
SSL
Secure Socket Layer provides a secure facility for programmes to pass data back and
forth between computers. When data is communicated via the web in secure mode, the
URL will start with https.
2.4.7 Usenet Protocols
2.4.7.1
NNTP
Network News Transfer Protocol is used to distribute news articles between news
servers. The servers are sometimes called NNTP servers. There are two variations of this
protocol namely one that allows communication between adjacent computers and one
for communication between clients and servers.
2.5
Domain Name Service, E-mail addresses and Uniform Resource Locators
(URL’s)
Every computer, person and resource on the Internet has their own unique address. The
computers have IP (Internet Protocol) addresses, the people have e-mail addresses and
the resources have URL’s (Universal Resource Locators).
2.5.1 IP Addresses and Domain Names
IP addresses are number strings separated by full stops e.g. 491.572.72.196. Humans
don’t understand IP addresses; therefore it is necessary to give each computer a name
that is understandable to humans. These names are called domain names. For example
www.nationalarchives.gov.uk is the domain name of the National Archives of the UK.
53
In this example
-
www is the host name (in other words the unique name given to an Internet
computer in this case a computer on the World Wide Web);
-
nationalarchives is the domain name of the organization the computer belongs to;
-
gov indicates the organizational domain of the computer; and
-
UK indicates the geographical region of the computer.
In short this is a computer in the UK on the government network belonging to the
National Archives that is connected to the World Wide Web.
Because computers on the other hand do not understand the human readable form of
the address but only the IP addresses each network on the World Wide Web has a
number of Domain Name Servers whose job it is to translate domain names into IP
addresses. Domain Name Servers are connected to a world wide distributed database
that keeps track of which domain name belongs with which corresponding IP address.
All domain names must include a top level domain. The top level domain is the last
string of letters at the extreme right of the name following the point or dot.
It is helpful to know that the most commonly used top level domains or the last two
components of a domain name indicates the type of organization and the geographic
origin of the computer.
The most common organizational domains are:
.com - Commercial
.edu - Educational
.gov - Government
.org - Non-profit organization
.mil - Military
.info - Information services
.web - Entities related to the web
.net - All sites that do not fit under one of the others.
The geographical origins are indicated by a two letter code derived from an International
Standard ISO 3166 Country Codes.
A few examples are:
54
.au - Australia
.in - India
.br - Brazil
.it- - Italy
.ca - Canada
.mx - Mexico
.fr - France
.tw - Taiwan
.il - Israel
.uk - United Kingdom
A full list of country codes is available on the ISO 3166 Country Codes website. For your
convenience a list is also attached as Annexure D.
The space to the immediate left of the top level domain is called the second level
domain. This is the space that the owner of the domain name uses to identify itself (e.g.
nationalarchives in the case of the UK, naa in the case of the National Archives of
Australia, etc.)
It is important to maintain a central list of domain names and IP addresses. The Domain
Name Service (DNS) is distributed throughout the Internet. Domain names are
maintained on a distributed database connected to Domain Name Servers (DNS) that
are distributed across the Internet. Your Internet service provider has access to the
geographically closest domain name server. DNS servers exist on their own network. If
one server does not know how to translate a domain name into an IP address it
automatically connects to other servers to do the translation. Most companies, Internet
service providers, universities and government departments have their own domain
name servers to map domain names to IP addresses.
55
2.5.1.1
Were does one obtain an IP address and Domain Name?
The Internet Corporation for Assigned Names and Numbers (ICANN)35 is a non-profit
private sector body responsible for managing and coordinating the Domain Name
System. Domain Name Registrars are licensed by ICANN to sell domain names. They
oversee the distribution of unique IP addresses and corresponding domain names.
ICANN also maintain the system and processes that ensure that each domain name is
linked to the correct IP address.
The allocation of domain names and corresponding IP addresses is managed by
accredited domain name registers. You can buy a domain name from one of these
registrars.
Domain names ending with .aero, .biz, .com, .coop, .info, .museum, .name, .net, .org or
.pro can be registered by any domain name registrar. The registrar will ask you to
provide contact and technical information that becomes part of the registration. The
registrar keeps the contact information on record and submits the technical information
to a central directory known as a domain registry. The purpose of this registry is to allow
computers to translate the domain names into IP addresses. A registration contract will
be concluded between you and the registrar.
For more information about accredited registrars for the above mentioned domains, see
the accredited registrar directory on InterNIC36 or the ICANN List of Accredited
Registrars37.
Should you wish to use the country domain as part of your domain name you need to
contact a country domain name registrar. To register a country code Top Level Domain
(ccTLD) you should contact an ICANN accredited ccTLD registrar. There are normally
restrictions on the use of ccTLD’s that should be clarified before registration, for e.g. that
they are reserved for use by the citizens of a specific country, etc. More information
regarding ccTLD registrars can be obtained from the database of ccTLD registrars on the
website of the Internet Assigned Numbers Authority (IANA38).
35
36
37
38
www.icann.org
http://www.internic.com
http://www.icann.org/registrars/accredited-list.html
http://www.iana.org/cctld/cctld.htm
56
They will host your domain name on their networks and give you space to accommodate
a few web pages until you can find a web hosting service. A web hosting service is an
organization with a web server that is connected to the Internet and the technical know
how to manage the equipment and software. They rent out space on their servers to
enable website owners to make websites available on the Internet. Internet Service
Providers normally also provide web hosting services and would be able to assist you in
registering a domain name.
2.5.2 E-mail addresses
E-mail addresses are needed to enable users to send e-mails to each other. In most
cases the e-mail addresses are assigned by Internet Service Providers.
All e-mail addresses are unique and consist of a username, the at sign @ and the
domain name of the server where the user has an e-mail address.
E.g. in the example [email protected]
-
Kelvin Smith is the username
-
@ indicates it is a user at a specific host computer
-
nationalarchives.gov.uk indicates the server of the domain where the user has his
e-mail address.
2.5.3 URL’s
Uniform Resource Locators or URL’s are addresses that point to specific resources or files
on the World Wide Web. Like domain names and e-mail addresses URL’s are unique for
each resource. URL’s are necessary to enable web browsers to know where to find a
website, web page and/or specific file.
A URL contains the protocol of the resource, a domain name for the resource, and if
pointing to a specific file the hierarchical name of the file.
E.g. the website address of the UK National Archives is http://www.nationalarchives.gov.uk.
An URL that points to a specific file or document published on this website would look
like this: http://www.nationalarchives.gov.uk/recordsmanagement/pdf/news_oct03.pdf.
57
The first part remains as explained above. The last part after the forward slash
(/recordsmanagement/pdf) points to the specific directory where the file is located on
the specific computer and the last part (/news_oct03.pdf ) is the file name and extension
of the file. The extension indicates the format of the file.
A file is a collection of data stored under a specific name. A file on a computer is what
we would normally call a document. Files on a computer are normally stored in
directories and sub-directories. Because of the amount of files on a computer you need a
way to organize them to enable you to find them again. Almost like a classification
system for paper-based records, you classify information, programmes and data on a
computer into a hierarchical structure known as a root directory. Every individual
directory folder in the root directory (i.e. the top directory assigned by the operating
system) can hold files as well as sub-directories, creating a hierarchical system of
organizing files on the computer. E.g. in the root directory on the computer you may
create a folder called my documents. You can file individual documents each with a
unique file name into that directory. When the number of documents in that directory
grows, it becomes more difficult to retrieve specific documents. To make retrieval easier
you can create sub-directories to group documents by subject or by type.
There are different ways of doing this: You can for example design a directory structure
with the document type as the point of departure which is then broken down into specific
cases:
Figure 44: Directory structure using the document type
as the point of departure
58
or with a subject as the point of departure which is then broken down into types and or
specific cases:
Figure 45: Directory structure with the subject
as the point of departure
The URL could then be explained as follows:
http://
indicates
to
the
browser
that
the
resource
contains
hypertext and that it would be found on the World Wide
Web
www
points to a specific computer on the World Wide Web
.nationalarchives
is the domain name
.gov
is the top level organizational domain
.uk
is the top level geographical domain
/records management
indicates the directory in which the files resides
/pdf
indicates a subdirectory – most probably one in which all
.pdf documents are kept
/news_oct03.pdf
is the file name and file extension
The most common file extensions that you would encounter are the following:
Extension
Definition
.html
Web page written in hypertext mark-up language
59
.htm
Web page written in hypertext mark-up language. The
computer does not allow more than three letters in the file
name extension.
.asp
Web page generated by a system called active server pages.
Active server pages are used to create interactive websites.
.gif
Picture stored in the .gif format. The GIF format is widely
used on the World Wide Web for still images and animation.
.jpg
Picture stored in the JPEG format. JPEG can compress
images to very small sizes. It transfers faster because of the
small size.
.wav
A sound or music file
.txt
Plain text file
.rtf
Rich text file
.zip
Compressed collection of files
.exe
An executable programme file
.doc
A MS Word document
.pdf
A portable document format file
If you want to read more about URL’s you could access A Beginners Guide to URL’s39.
2.6
Search Engines
There is such a lot of information on the Internet that it is difficult to find the specific
information you need because there is no central authority to organize the information
into a useful directory structure or a classification system like we know it. It is easy to
find information using a web browser if you already have the URL available, but what if
you don’t?
Search engines are programmes that can search the Internet for specific information. A
number of search engines are available on the Internet that you could use for free.
The websites in which search engines reside are called search sites. To name a few
search sites:
AltaVista40
39
40
http://archive.ncsa.uiuc.edu/demoweb/url-primer.html
http://www.altavista.com
60
Ask Jeeves41
Hotbot42
Inktomi43
Dogpile44
Google45
Yahoo46
Excite47
Lycos48
Every search engine works in a different way. It is advisable that you access all these
sites to find out what these search engines can do and how they work.
2.6.1 Types of search engines
2.6.1.1
Directories
Directories are websites that contain a large number of links. The links are classified into
subject categories or types. Directories are set up by people who view the different
websites to decide if they would be included in the directories. Website owners submit
the URL and a short description of their websites to the search engine owners. The
owner then assigns the website to a specific category within the search website.
Directories often produce focused search results. They look for matches only in the
descriptions of sites that were presented.
There are different types of directories namely:
2.6.1.1.1
Subject directories
Directories in the print environment are alphabetical or subject classified lists of
resources containing names, locations and other identifying information. Directories in
41
42
43
44
45
46
47
48
http://www.askjeeves.com
http://www.hotbot.com
http://www.inktomi.com
http://www.dogpile.com
http://www.google.com
http://www.yahoo.com
http://www.excite.com
http://www.lycos.com
61
the electronic environment are similar to the print environment, but they also go a step
further. Directories can also be web pages that are hand selected, annotated and
classified by subject. The selection and classification are done by human editors. Subject
directories are a good place to start when you want to do a general search and you
would like to get a general overview of what is available regarding your subject.
Examples of search engines that cater for directory searchers are:
Yahoo49, Altavista50 and AOL51
Figure 46: Accessing Yahoo's directory search
Figure 47: Doing a search for information about Records Management
http://www.yahoo.com
http://www.altavista.com
51
http://www.aol.com
49
50
62
Figure 48: Finding directory information about Records Management.
Note the amount of hits in the directory search
2.6.1.1.2
People directories
Yohoo People Search52
Finds people by first name, last name, address, phone number and e-mail address
Peoplefind53
Will assist in finding people, check criminal records and do background checks amongst
others.
WHOIS54 Lookup
Whois finds peoples according to their e-mail addresses. Queries are in the form first
name last name @ organisation (e.g. dean john @ ACARM).
PH servers55
PH servers is a common directory service system that is in use world-wide. This server
lets you select a site and search for people listed at that location.
52
53
54
55
http://people.yahoo.com/
http://www.peoplefind.com/
http://whois.com
http://www.emailman.com/ph/
63
411 Directory Services56
The Four 11 White Page Directory is an online service where Internet users can register
their Internet addresses (e-mail and web) and look for other Internet users.
2.6.1.2
Robot Engines
Robot engines are search engines that use spiders to crawl websites and to index them.
They use hidden Meta tags and text in the web page to index actual pages for their
listings. Meta tags are built-in descriptors that allow a website owner to have more
influence regarding the keywords that are used to index web pages and documents.
Several major search engines index the title and description Meta tags. So it is important
to use relevant keywords in titles and descriptors when a website is built.
Figure 49: Doing a web search for Records Management.
Note difference in the number of hits.
2.6.1.3
Meta search engines
They are not really search engines in the true sense of the word. They pull together
information that is listed by other search engines. They merge the results into one list of
results.
56
http://www.411locate.com/
64
2.6.2 How do search engines work?
2.6.2.1
Web crawling
Search engines use automated software programmes to go to a web page, index the
content and store the information in huge databases. They also follow all the hyperlinks
on all the web pages, look at those pages, index them and store them in the database.
This is called web crawling. This they do twenty-four hours a day seven days a week.
The search crawler is called a spider. Spiders crawl websites regularly to ensure that
they index all the updates as well as follow new links that were added to web pages.
2.6.2.2
Accessing information
The search engines allow you to access the information in their databases by using
either keyword searches or by doing advanced searching. The results of a search are
displayed in a results list. Normally the results are ranked according to relevancy. You
can select a document in the results list. When you click on it, the document is opened
and you can browse through it. Should you wish to access and study the results at a
later stage, you could save the search results list in the list of your favourite’s sites. A
results list can also be printed for later use.
2.6.2.3
Relevancy ranking
Most search engines have a relevancy ranking facility. This is a facility that the search
engine uses to indicate the document or resource in which your search term or phrase
appears most frequently. Another method that is sometimes used is if the document or
resource is frequently linked too. The reasoning being that if so many other people
consider it relevant, it may just be!
Some other search engines would use both the frequency of the search term or phrase
as well as the position of the term or phrase in the document or resource to determine
relevancy. The reasoning being that if the term or phrase appears in the header, title
and/or first few paragraphs of the document/resource and then frequently in the rest of
the text it would be more relevant than an appearance once at the bottom of the text.
65
The document or resource in which the search term or phrase appears most frequently is
considered to be the most relevant to your search. However, you need to keep in mind
that the technology is not the human brain with its intricate thought processes. What the
search engine may consider relevant may not be what you want at all!
2.6.3 Searching
2.6.3.1
Keyword search
When you type a search word into the search box of one of the search engines the
search engine software would scan the database and make a list of all the instances of
the pages with those particular keywords in them. This way of searching could result in
the retrieval of millions of web pages to be accessed and read. You would not necessarily
be able to find the information that you want. Keywords can be any words on a website.
Hence, you would not use common words as keywords for a search. Useful keywords
and key phrases are normally unique words in a piece of text. E.g. in the sentence “I
could not find the green angora sweater” you would not use the words “could not find”
as a search term. That would result in a millions of pages being returned in the results
list. You would rather use “green angora sweater” as a search phrase. This would limit
the results considerably. This is because some search engines index only parts of the
web pages that are considered important, like the title, words that are mentioned in the
beginning paragraphs of a document and/or unique words, while others index each word
in the page.
One needs to learn how to use a search engine properly to limit the search results to
find only the information which is really relevant.
If you are doing serious research on a specific topic, advanced searching is a better
option.
2.6.3.2
Advanced Searching
Most search engines offer advanced search options besides the normal keyword
searches. Advanced search options differ from search engine to search engine. They
allow you to find exact matches for certain phrases and to exclude words or phrases that
would muddy the results.
66
They also allow the use of Boolean operators to refine searches. Boolean searches allow
one to search for keywords that best describes the topic that you are searching for.
Boolean operators are the terms “AND”, “OR”, NOT, NEAR and FOLLOWED BY.
AND means that all the specified terms must appear in the document e.g. records AND
management (or in some search engines records + management) would only find those
documents in which both words appears, while electronic AND records AND management
(or electronic + records + management) would only bring back documents or pages in
which all three words appear.
OR means that at least one of the terms must appear in the document. OR broadens or
widens a search to include documents or pages that contain all the words, but not
necessarily in the same page or document. For example digital OR electronic would
return documents or pages where either the word digital or electronic appears.
You could also do a combination of AND with OR. For example digital OR electronic AND
preservation would return documents or pages in which the words digital preservation
and electronic preservation appear.
The OR operator is also useful in cases where a word has several synonyms or spellings.
For example preservation or conservation or retention which are sometimes used as
synonyms would return documents or pages in which all three words appear together or
alone. The same applies to document OR record which would return pages or documents
in which the one or the other appears.
NOT means that the specified term must not appear in the document. NOT narrows a
search so that certain words don’t appear. For example electronic NOT paper AND
records would return documents and information about electronic records but not about
paper records.
Most search engines allow for very complex searches. Normally when a search is very
complex it is a good idea to nest your search terms between brackets so that the terms
between brackets are searched for first e.g. (paper OR electronic NOT audio-visual) AND
records management would return pages or documents in which both the words paper
and electronic appear and then narrow the search to only those documents about paper
67
records management or electronic records management, not audio-visual records
management.
Most search engines also allow the use of proximity operators like ADJACENT, WITH,
FOLLOWED BY and NEAR.
NEAR means that the terms should be in close proximity to each other – you could
specify the maximum number of words between each term. FOLLOWED BY means that
the term should follow directly after the other term. ADJACENT and WITH mean that the
words should appear next to each other, while AND and OR do not require that the
words follow each other. They can be in any place in a document or page.
The Boolean search terms may differ from search engine to search engine. It would be
helpful if you access the search engine’s help file before attempting a search. Alta-Vista
and Lycos for example use + and – to include or exclude words. For tips about the most
popular search engines see the information on the website:
http://www.hamline.edu/administration/libraries/ bush/handouts/slahandout.html.
Search engines also allow you to use phrases to search by. If you want to search for a
specific phrase you need to tell the search engine so, otherwise you will retrieve
irrelevant documents which contain all the keywords in any sequence. Normally a phrase
should be enclosed in quotation marks i.e. “records management” as two separate
words. The reason behind this is that some search engines automatically default
separate words in a search string either to AND or to OR. If it defaults to AND your
search results would return pages in which the words records and management appears.
These returned pages may have nothing to do with records management per se but with
records and all sorts of other management! Should the search engine default to OR you
would have more or less the same problem in the sense that it would return pages in
which the word records appear as well as pages in which the word management appear,
without it necessarily being pages about records management.
Search engines also allow you to use truncation to search. Usually a * is used to indicate
truncation e.g. record* would also return records, recorded, recording and recordkeeping
(but not record keeping).
Every search engine has a different way of refining queries. Some even allow you to
refine a query on an existing result list if too many hits are returned. The best way to
68
learn is to practice with the different search engines until you find one that suits you
best. It may also be extremely helpful to access the search engine’s online help facility
to find out how you can optimize the search experience.
2.6.3.3
Finding the invisible web
Most directories contain links to databases e.g. the Libraries Index, Academic Info,
Infomine, About.com, Direct Search, The Invisible Web Directory, and Profusion57 are
examples of directories that link to databases on the web.
You can also search in normal search engines by using the subject term or keyword with
the word “database” or the phrases “invisible web”, “deep web”, and “hidden web”. If
the word database or any of the phrases are used in the description of the topic you
would find it.
A search for “archives and database” for example has very interesting results. For other
interesting results also visit the websites of the US Government Printing Office58 and
Search Systems59. You could also try Those Dark Hiding Places: The Invisible Web
Revealed60 for more information about the invisible web as well as links to invisible
databases.
2.6.4. Evaluating the information found on the Internet
Now that you know how to find information on the Internet and World Wide Web, it is
important that you should also know that everything published on the Internet is not
necessarily an authoritative source.
In the past, before the Internet phenomena, authoritative sources of information were
usually published by well known publishers and/or in professional journals and
magazines. To have one’s writings published required careful peer review to validate the
information as authoritative. With the advent of the Internet and the World Wide Web
and the ease of publishing to the Internet, the careful peer review before publication
57
http://lii.org,
http://academicinfo.net,
http://infomine.ucr.edu,
http://www.about.com,
http://www.freeprint.com/gary/direct.htm,
http://www.invisible-web.net,
http://www.profusion.com,
http://wwwcompleteplanet.com
58
http://www.gpoaccess.gov/multidp.html
59
http://www.searchsystems.net
60
http://library.rider.edu/scholarly/rlackie/Invisible/Inv_Web_Main.html.
69
slipped through the cracks. It is therefore very possible that some of the information so
published is dubious.
You also need to remember that some of the information on personal websites – so
called “blogs” – contains personal opinions and not necessarily facts. A big part of doing
research is to evaluate the validity of resources. You would use the same evaluation
criteria as for any other resource. The following may be helpful:
What is the source/origin of this information?
Remember domain names? Domain names have a domain suffix that gives some
sort of indication what the purpose and intended audience of a website is. You
could use this as an indication of the trustworthiness of the information contained
in those sites.
.com
Commercial sites. Information is usually promotional in nature and
tends to be on the positive aspects of products and services
advertised.
.edu
Educational institution. This includes schools and tertiary education
institutions. Information published under this domain can range
from scholars’ and students’ personal websites to peer reviewed
authoritative resources. You would not normally consider the
information on a personal website authoritative, but published
research papers on the other hand would be more trustworthy.
.gov
Government.
Government
Agencies
can
be
held
legally
accountable/liable for the information published on their websites.
There are normally
documents
websites.
and
Formal
very strict
other
rules about the content of
information
approval
for
published
publication
on
government
is
normally
a
prerequisite. Information found on these websites have high
credibility.
.org
Non-profit organizations. Care must be exercised especifically if
these organizations publish information that is biased and not
totally objective to promote a specific point of view.
70
.mil
Military. As part of government, the information is also highly
credible.
.net
All sites that do not fit under any other domain. Careful evaluation
is necessary because the information could be biased and
subjective.
How old is the information?
Also be careful of outdated information that is still available on the Internet.
Normally websites have an indication of when they were last updated. The more
frequently the site is updated, the less the chance that you may find outdated
information on those sites.
Who is the author of the information?
Resources published under the names of well-known authors and experts in their
profession would also normally be more credible than other information. If in
doubt, see if you could find something about the author and his/her credentials
on the web. If you cannot find anything about the author or any other
publications by that author, you could always check with other experts in the
field. They normally know each other or at least know about each other.
Why is this material on the Internet?
Is it advertising, lobbying, and/or networking?
Is it biased or subjective?
Is it historical fact?
Who benefits from publishing the information to the Internet?
The answers to these questions may very well give you some indication about the
trustworthiness of the information.
71
The Berkeley Library61, the
Widener University62, the USC Beaufort Library63 and the
University of Albany64 have very good information about the evaluation of web
resources.
2.6.5 Planning a search
If you are searching the Internet just for fun, it is not necessary to plan a search.
However, if you are doing it for serious research a planned approach can save you a lot
of time. The UK Berkeley Library on their web page Recommended Search Strategy:
Analyze your topic and search with peripheral vision65 recommends the following:
a.
b.
Analyze your topic and decide where to begin
•
Do you have distinctive words or phrases to search for?
•
Do you know the synonyms of all the words?
•
Do you know all variant spellings?
Pick the right starting place.
•
Are you going to use a search engine? – Remember the Boolean logic to
refine your searches?
•
Are you planning to use a subject directory? – What is the broader term or
subject of the word or phrase you are searching for?
c.
Learn from your search experience and vary your approach.
Look at the search results. Maybe you have found something that you haven’t
thought of.
d.
Don’t be bogged down by your strategy.
If the one doesn’t work, try another one.
e.
Return to previous strategies better informed.
If you switched between strategies, go back to the original strategy with what
you learned and try again! Remember there are normal search engines, meta
search engines and subject directories to use. Furthermore, you could search
http://www.lib.berkeley.edu/Teaching46/Guides/Internet/Evaluate.html
http://wwwz.widener.edu/Wolfgram-Memorial-Library/Webevaluation/Webeval.htm
63
http://www.sc.edu/beaufort/library/pages/bones/lesson5.shtml
64
http://library.albany.edu/Internet/evaluate.htm
65
http://www.lib.berkely.edu/TeachingLib/Guides/Internet/Strategies.htm
61
62
72
locally or globally on the World Wide Web or wider than that. Some pages on the
Internet are not visible as web pages. They exist as part of the deep web or
invisible web. You have to search specifically for them. If the search engine you
are using does not give you an option to search wider than the web, try using
your keyword or phrase with the word “database” as search terms or try the
invisible web directory.66
The USC Beaufort Library67 and the University of Albany68 have more information about
search strategies that could be very helpful if you plan a search.
http://www.invisible-web.net
http://www.sc.edu/beaufort/library/pages/bones/lesson6.shtml
68
http://library.albany.edu/Internet/checklist.html
66
67
73
3.
Netiquette
When you use any of the services on the Internet, you are becoming part of a new
culture with a basic set of “rules of engagement” called netiquette or net etiquette.
Netiquette is a basic set of guidelines for acceptable use of the Internet. The basic rules
are:
•
Mind the people. You are not just talking to computer but with people. Remember
that the other people don’t see you and cannot read your body language, or see
gestures and expressions. They cannot see if you are funny, serious, etc. You need
to be very careful how you express yourself so that you are not misinterpreted.
•
Mind your manners. What is unacceptable behaviour in real life is also unacceptable
on the net. Don’t launch personal attacks on other people.
•
Mind your environment. When you participate in discussion groups and listservs, try
to follow the tone of the group. If it is formal, don’t be chatty and social. You will be
shut out or even flamed (i.e. told off). Remember; don’t wander away from the topic!
If you are interested in discussing something else – take it off-line.
•
Mind the bandwidth. It is totally unacceptable to bombard people with huge e-mail
attachments, especially if they are not official in nature. Users with dial-up
connections would spend hours downloading these huge files and end up paying for
the Internet connection time.
•
Mind your language. The basic spelling and grammar rules still apply. Even if the
people on the other side don’t know you, you should still protect your image as well
as that of your institution.
•
Mind the accuracy of the information you pass on to others. The use of the Internet
is a way of sharing knowledge. Make sure of your facts before you answer
somebody’s question. You would not like to be fed bogus information, so don’t do it
to others. And remember there may be somebody else who does have the correct
facts and who would point out your incorrect facts in a very open forum!
•
And don’t be lazy. Don’t ask questions that could have been answered by doing a
simple research on the public web.
For more information on netiquette, read The Net: User Guidelines and Netiquette69
69
http://www.fau.edu/netiquette/net
75
4.
What do you need to connect to the Internet?
4.1
Computer
To make use of the wide variety of services the Internet provides the following is
recommended:
A computer with
•
An up-to-date operating system
•
A minimum of 64 Megabytes RAM. RAM is a microchip that stores data for brief
periods of time to enable the computer to run programmes and access data.
•
A minimum of 10 Megabytes free disk space. A disk is the magnetic hard drive that
stores data long term. Free disk space is unused space on the hard disk that is
available for downloading information from the Internet.
•
As a minimum a 486 or Pentium processor. The faster the processor speed, the
faster information can be downloaded.
•
An Ethernet port if available.
•
A sound card and speakers or headphone to enable you to access sound and
multimedia files.
To find out more about computers, you can download the IRMT’s publication
Understanding Computer Systems: An overview for Records and Archives Staff.70
4.2
Software
Besides the need to have an up-to-date operating system you also need the following
software:
•
Connection software to allow the computer to dial into the computers of the Internet
Service Provider. The Internet Service Provider normally supplies this software as
part of the subscription fee. Connection software must be compatible with the
computer.
•
A browser to access the information on the World Wide Web. If the computer’s
operating system does not have a built-in browser your Internet Service Provider
70
http://www.irmt.org/downloadlist/education.htm
76
would give you a choice of browser software to use. The two most known browsers
are Microsoft Internet Explorer and Netscape Navigator.
•
Plug-ins are added software that extend a browser’s capabilities. Plug-ins allow you
to access multi-media files (e.g. audio or video files) without having to exit the
browser to access another application to open the files.
4.3
Internet account
When you sign up for Internet service with an Internet Service Provider you would have
an Internet account that gives you the right to use the services offered by that Service
Provider.
But
how
do
you
go
about
opening
an
account
with
a
Service
Provider? And what type of account should you choose?
4.3.1 Internet Service Providers
Internet Service Providers can be found by visiting your local library or contacting your
telephone company for recommendations. You could also consider contacting a local
computer store or perusing local computer publications to find out which Service
Providers are operational in your area.
Service Providers normally also advertise in local news papers or in the Yellow Pages.
Should your local library have an Internet connection available, try the following
websites that contain links to Service Providers:
Tag Online WebHosting Internet Resources71
The List of ISPs72
CNet Reviews73
These sites enable you to search for Internet service providers by name or geographical
area.
A brief list of Service Providers is attached as Annexure D.
http://www.tagsys.com/Provider/provider_search.html
http://www.tagsys.com/Provider/provider_search.html
73
http://webservices.cnet.com/html/aisles/Internet_Access.asp
71
72
77
4.3.1.1
How would you go about connecting to the service provider?
The Internet Service Provider will supply you with the software that you need to connect
to the Internet, if you do not have it pre-installed as part of your operating system. They
will supply you with a brochure that contains step-by-step instructions, and/or with a
help line number where they will talk you through the process, and/or supply you with
an electronic step-by-step process.
You will need a local access number if you have a dial-up connection, or an IP address in
the case of a dedicated network line, a username and a password. The latter two would
prevent other people from using your account. Your username and password are unique.
If you choose a username that already exists on the Service Provider’s database, you
would be instructed to choose another username.
4.3.1.2
Evaluating the services of Internet Service Providers
Depending on the type of Internet connection that you want, your expectations of an
Internet Service Provider may differ.
Should you only want an Internet connection for your own personal use at home, you
may expect your Service Provider to allow multiple e-mail addresses for each family
member to have his own. You would also expect not to have periods of inaccessibility
even though it might be tolerable if the line is busy and you have to try again later.
Should you however need the Internet service for business reasons, a fast, reliable,
100% uptime Service Provider is ideal. In both cases cost and technical support are
important factors. You need to determine beforehand precisely what type of service you
want from your Service Provider.
The following are options to consider:
•
Start up fees and fee structure
¾
How much would it cost to set up your Internet account?
¾
What else would you be paying for?
¾
How much will it cost to be on-line?
78
-
Remember to find out what your local telephone rates are if you would be
using a dial-up connection
¾
Would you be paying long distance rates if you connect to remote computers
outside your local area?
•
Do they provide access to all services on their Internet? It is best if the Service
Provider supports all of them.
•
Reliability
¾
How long has the service provider been around?
¾
Are there any complaints about its services?
¾
What type of contract is it offering? Short term or long term? Does it expect
payment up front or is it a monthly subscription fee?
•
Reliable access
¾
Does it have the ability to establish connections 24 hours a day 7 days a week
especially in peak hours?
•
•
Customer support
¾
Does it have 24 hour customer support?
¾
Do they charge for customer support?
What additional services do they provide?
¾
Will they assist in registering a domain name?
¾
Will they host your e-mail on their servers?
¾
Would they be able to host your website?
To choose a Web Hosting Service that would suit your needs is also very
important. For a quick search to find a Web Hosting Service access the website
of Hostcart.com74 if the service of your Internet Service Provider does not suit
your needs.
A good Web Hosting Service
74
•
is available 24 hours a day, 7 days a week.
•
is quick to respond to questions.
•
has been around for a while and have a good customer base.
•
offers tutorials and other help facilities for beginners.
http://www.hostchart.com/hostcowizard.asp
79
•
has 100% uptime so that the website is always accessible.
•
does not have limitations on the amount of space you may use.
The University of Albany in their Internet Tutorial75 has a comprehensive list of questions
to ask a prospective Service Provider. You could also consult The Easy Guide to Selecting
an Internet Service Provider76 for more information. Even though the latter is a
commercial site, the information regarding the selection of Service Providers is well
worth reading.
4.3.2 Internet connection
An Internet connection should be as fast as possible to enable one to download
information as quickly as possible. The following types of connections are available. You
should speak to the Internet Service Provider about finding the best connection option
for you specific circumstances.
¾
Dial-up connection
A dial-up connection is an Internet connection over a standard telephone line using a
modem. A modem is a device that translates the computer’s digital signals into analogue
signals. This enables the signals to travel over a standard telephone line. A modem
connected to a computer on the other end of the line translates the analogue signals
back to digital signals so that the computer can understand them. A modem capable of
downloading information at a speed of 56 Kilobytes or more per second would work best.
The faster the modem speed the better the performance level when accessing and
downloading graphical and multimedia files. Some digital files can be extremely large.
Modems can be externally connected to the computer’s serial port or internally installed
in the computer.
¾
Broadband
Broadband is a dedicated network connection through a local area network that has an
Internet gateway to connect to other systems on a network. This connection can remain
connected to the Internet so that you don’t need to dial up when you want to access the
Internet.
75
76
http://library.albany.edu/Internet/connect.html.
http://www.cisco.com/warp/public/cc/so/cuso/cso/cm/ezgd_pl.htm
80
However in some countries other connection options are available, namely:
•
Cable Internet where the computer uses the same network cable as the television to
access Internet. To access cable Internet one needs a cable modem as well as an
Ethernet card for the computer. An Ethernet card is a special circuit board that
enables the computer to connect to networks. A cable modem is much faster than a
normal telephone line modem with a dial-up connection. A cable modem is a modem
that operates over an ordinary TV cable. For more information you could access the
Cable Modem Reference Guide.77
•
Satellite connections allow you to download Internet files via satellite connection, but
you would still need a modem to use the other features of the Internet.
•
Integrated Services Digital Network (ISDN) is a type of digital phone line that
transmits data many times faster than a modem on a normal telephone line. ISDN
allows voice and data to be transmitted simultaneously using end-to-end digital
connectivity. An ISDN connection requires an ISDN adapter and a telephone line that
can send and receive digital signals. Your local phone company should have this
equipment installed. More information is available from the ISDN tutorial78.
•
Wireless connections like cell phones, personal digital assistants (PDA’s), etc. that
are able to connect to the Internet.
•
Web TV provides Web and E-mail access through ordinary television sets through a
custom high-speed modem.
•
DSL is technology that transfers high bandwidth information over ordinary telephone
lines at a speed of ±6.1 megabits per second. It can carry data and voice signals.
The data line is continuously connected. DSL does not change into analogue signals
and back. Digital is transferred directly to the computer as digital data. A DSL or
Digital Subscriber Line requires a special modem and a network card in your
computer. Your Internet Service Provider, or local telephone company, would be able
to advise you regarding the installation price and monthly service fee. For more
information you can read The Fast Guide to DSL.79
¾
E-mail only account
With this type of account you will have access to e-mail and mailing lists but to none of
the other Internet services.
77
78
79
http://cable-modem.org/tutorial
http://www.ralphb.net/ISDN/
http://www.searchnetworking.techtarget.com/sDefinition/O,,sid7_gci213915,00.html
81
5.
Advantages and Disadvantages of using the Internet
There are a number of advantages and disadvantages of using the Internet. The
following list is not exhaustive.
ADVANTAGES
DISADVANTAGES
Rich source of information
All information not necessarily credible
Anybody can publish online
No quality control and validity check
Fast and powerful search engines
Information overload
Immediate communication
Speed takes precedence over credibility
Global communication of information
Emphasizes the digital divide
Ease of use
Viruses, hackers, logic bombs, etc.
Cost effective
Doesn’t reach people not connected
Not free
Information
available
on
any
You have to have a computer with an
computer connected
Internet connection
Information can be found quickly
Information can also disappear quickly so
that you cannot find it again
What are the specific advantages and disadvantages for the archives and records
management profession?
ADVANTAGES
DISADVANTAGES
Effective form of outreach
But only if your client base is connected
No publication cost
But take into account that you pay for
the
services
of
the Internet Service
Provider, the web host, the website
developer etc.
No residual inventory
No arrangements for exhibitions, speak-
But very labour intensive if you want to
ers, catering, invitations, etc
build interactive exhibitions
No physical security problems
But
remember
that
hackers
and
spammers and hoaxers can reach you via
the website
82
Available 24/7
Immediately updateable and
changeable
Even if there are a number of disadvantages it is better to have a web presence than to
have none at all. And remember, you don’t need to go for the big bang approach and
wait until everything is perfect before you publish a website. Even a small start is better
than no start at all. A website is a living record that is expandable, changeable and
updateable. A small beginning doesn’t have to stay small for ever.
5.1
Security
The moment you connect your computer to a network you are vulnerable to attacks by
viruses, hackers, spammers, phishers, worms and Trojans to name but a few of the
hazards that are facing an interconnected world.
It is always a good idea to install virus protection programmes and firewalls before you
connect to a network, whether it is a dial-up connection or a permanent open network
connection. A firewall is a programme that prevents unauthorised access to a computer
over a network. Anti-virus software is a programme that scans the computer for viruses,
detects them and removes them. However it only does that effectively if you are keeping
the anti-virus software up-to-date.
Normally a new computer comes with a lot of programmes pre-installed, amongst which
are the firewall software and a trial version of an anti-virus software programme. You
should enquire about the existence of this software on the computer when you buy it.
Should your computer vendor indicate that the software is not pre-installed, you should
request them to so install it. If they cannot do it as part of the cost of the computer, you
would be wise to buy this additional software to protect the data on your computer.
You can keep the anti-virus software up-to-date once you are online, by downloading
updates from the internet. You can also set the software up so that it automatically
updates itself when you connect to the internet.
Anti-virus software and firewalls are not the only things that can protect your computer.
You should be careful what you download from the internet and also about what e-mails
you open. If you receive a virus alert when downloading a document or when trying to
83
open an e-mail, you should allow your virus protection software to clean the file first. If
the virus cannot be cleaned, do not continue the download or open the e-mail.
You need to protect yourself against the following:
5.1.1 Viruses, Worms and Trojans
Computer viruses, worms and Trojans are a threat to anyone who spends time online or
who sends and receives e-mail. The can at best slow your computer down and at worst
damage and delete system files and data files from your computer and any other
computer on the network that is infected. They can also cause a lot of embarrassment
by for example causing your browser to default to porn sites on the web.
Viruses are malicious programmes that can damage the data on your computer. They
are usually hidden away in another file or programme. They usually go no further than
your own computer. A worm is much more malignant. It e-mails itself to other
computers and damages the data on both your computer as well as the other computer
that it e-mailed itself to. A Trojan is a programme that purports to be useful, but that
contains hidden viruses and worms and is therefore the nastiest of them all.
Viruses, worms and Trojans can be hidden in files that are downloaded from the
internet, but there is an easier way to distribute them. E-mails with attachments are the
biggest scapegoat.
5.1.2 Hacking
Hackers are people with an active interest in breaking through computer security. They
are normally not malicious and are only of intention to let you know that you have gaps
in your security. However, some hackers do have malicious intent. If they do manage to
get through your firewall, they can leave a Trojan on your computer that logs all the key
strokes when you enter passwords on secure sites like internet banking sites. They also
record personal information like credit card particulars and then manage to scam
internet banking users out of their money.
84
5.1.3 Phishing
Phishing is another method of obtaining personal information from unsuspecting users.
For example – You receive an e-mail from your “bank” asking you to verify or update
your personal detail on-line. When you click on the link provided, it takes you to a
website that looks a lot like the website of your bank, but which is actually a dummy site
set up to enable the phishers to capture your personal details.
The best way to protect yourself is never to enter personal particulars in an e-mailed eform, or to open the bank website from a link in an e-mail message. It is best to open
the browser and type the bank’s URL into the location bar. If the bank really wants you
to update your personal particulars, there would be a notification to that effect on the
bank’s website.
5.1.4 Spam
Unsolicited bulk e-mail is another disadvantage of having a web presence. As soon as
you have a website with an advertised e-mail address you are open to spamming. Spam
is basically junk e-mail that advertises products and services. Spam is not malicious in
intent, but bombarding an e-mail address with unsolicited e-mails can cause the e-mail
server to become overloaded and to crash.
To prevent spam is difficult. You can set up a filter on your server to recognize spam
messages and delete them, or you can complain to your Internet Service Provider. They
will then try to block the e-mails.
85
6.
What would you use the Internet for?
6.1
Introduction
How do people use the Internet? Why would you want to use the Internet?
When you are connected to the Internet and use the wide range of Internet services
available, you are able to communicate and share information easily. Using the Internet
to share and communicate information is relatively inexpensive. Sending one e-mail to
multiple recipients at the cost of one telephone call is a lot cheaper than making
individual calls.
Using the Internet will enable you to:
•
keep in touch with colleagues via e-mail, video conferencing and online chatting;
•
find information from all over the world on all kinds of topics;
•
have instant access to up to date world wide news;
•
have access to downloadable software;
•
do online transactions like banking and shopping;
•
publish information about your organization and its functions;
•
keep up to date with world wide developments in your profession; etc
•
request and provide assistance on professional issues via listservs and online chat.
But how can archivists and records managers use the Internet and World Wide Web?
The uses of the Internet and World Wide Web can be divided into the following types
namely:
a)
Communicating what you do and what you have;
b)
Marketing to draw a new audience to want what you do or what you have;
c)
Research to better your skills and knowledge; and
d)
Training.
Archivists and records managers could also use the Internet and World Wide Web for
these activities. We could however, add another type of activity namely:
e)
Managing and preserving what we, our client offices and stakeholders produce
86
6.2
Communication
Having a presence on the World Wide Web could convey information about:
-
Archives repositories
¾
where they are
¾
how to contact them
¾
how to reach them
¾
•
map of location
•
bus routes
•
parking
what they look like
•
¾
¾
-
-
-
photographs
how they operate
•
official opening hours
•
reading room rules
•
ordering procedure
brief history about repositories themselves
the holdings of the repositories
¾
description of the holdings, manuscript and special collections
¾
exhibition catalogues
¾
finding aids with keyword searching
¾
oral history transcripts
¾
newsletters
¾
news about new acquisitions
¾
online exhibits
¾
workshop announcements
other institutions with similar holdings
¾
links to other archives repositories
¾
information about genealogical research
¾
contact details of researchers
the services and products of the records management sections and could contain
¾
statutory and regulatory framework
¾
who the client offices are
¾
records management principles and standards
¾
specific records management procedures that should be followed by client offices
¾
policies, guidelines, advice, publications
¾
records retention schedules of a general nature
87
¾
circulars
There is a lot of information that one could publish to a website to develop a web
presence. However, the above suggestions are very static in nature and would most
probably only draw attention from the academics, historians, genealogists, researchers
and records management clients that already know about and use the services of the
Archives Service. You need to ask yourself if that is what you really want.
6.3
Marketing/Outreach
The purpose of a marketing/outreach campaign is to draw the attention of those people
that would not normally entertain the idea to visit an archives repository, those that do
not know the value of an Archives Service, and those that really don’t know that such a
thing even exists.
Traditional methods of outreach, namely open days, exhibitions (static and travelling),
guest lecturers, workshops, etc still have their place in society and especially in
developing countries that are not so digitally advantaged as the rest of the world.
However, this does not mean that Archives Services should not make use of
opportunities that may exist to build a presence on the web.
The traditional public perception of archives repositories is that they are dark and dusty
buildings that house old dusty documents for which the broader public has little use.
Archivists are old grey men and women that hide away in these buildings behind these
dusty documents because they are not good enough for anything else.
The perception that archives are only of value to academics and historians and that they
have little value for the public at large should be changed. As long as this perception
exists the public would feel no need to support archival and preservation actions and
records management clients would continue ignoring the value of good records
management practices. Archives Services need to use all opportunities possible to
market their services and holdings.
Marketing on the World Wide Web may have surprising results. It could lead to drawing
people to the repositories out of curiosity because they accidentally stumbled across
something interesting while they were searching for something totally different.
Broadening the audience of the Archival and Records Management profession could lead
88
to broader public support for the services they deliver. So, if you do have an opportunity
to develop an archival presence on the World Wide Web, what can you do to draw the
attention of the broader public?
Due to the interactive nature of the medium it is possible to
a)
have online exhibitions: These do not need to be only static photographs which
the users need to view by clicking through them. Consider building a more active
exhibit by
-
picking a specific theme
-
finding out what documents, photographs, moving images and sound
recordings you have about the theme
-
combining these in a online exhibit. - e.g. do you have the President’s state of
the nation address? Why not publish that with an option to listen to the radio
broadcast or view the video. An example of this type of exhibit is the Digital
Scriptorium of the University of Berkeley80.
You could also consider taking users through a virtual walk of an exhibition that is
running in the archives repository. Technology exists whereby one could make a
three-dimensional video of an existing exhibition. It allows an on-line user to
“walk” through an exhibition by pointing the cursor. It even allows one to zoom in
and out to specific parts of the exhibition. This type of exhibition is usually
combined with a sound overlay to explain the purpose of the exhibition and to
explain the exhibits themselves. Normally you would also be able to view a
textual description of the content of the exhibit.
One could even take this one level further by making a hyperlinked virtual
exhibition. One could build hyperlinks into specific parts of virtual exhibitions that
could allow one to jump to an exhibition on a totally different topic. For example:
You are doing an exhibition on the history of a specific town and you have
photographs in the exhibition of a specific building that is of architectural value.
The user zooms in on that part of the exhibition and finds the photograph of the
building. He then has a choice to continue browsing the current exhibition or to
jump to another exhibition depicting the history of that building. When viewing
the history of the building and he views the photograph of the architect, he could
have a further choice to stay with the current exhibition or to jump to an
exhibition about the architect.
80
http://sunsite.berkeley..edu/scriptorium
89
These types of on-line exhibitions are normally used by museums. An example of
these types of exhibitions is the Egyptian Tomb of Menna.81 The Birmingham
Museum and Art Gallery82 and the Malta National Museum of Archaeology83 have
similar type of exhibits.
These are only some examples of what can be done with the technology. You
should however keep in mind that building such exhibitions would be resource
and labour intensive.
b)
have searchable catalogues of the holdings on the website that allows user to do
keyword searchers. You may consider publishing the images of the records that
draw the most hits on the website too.
Examples of searchable catalogues can be found on the websites of all the
Archives Services that have a web presence.
c)
publish videos of bad record-keeping practices and backlog clearing actions for
the records management clients to get a feel for good recordkeeping practices.
Seeing the shocking condition in which some public service departments keep
their records, to which the public has a right to access, may cause public debate
and interest in recordkeeping practices and may even make the public aware of
their rights in this regard.
6.4
Research
The global nature of the World Wide Web brought a lot of valuable information on
archival and recordkeeping practices together in “one” place.
Archivists and Records Managers can, with a touch of a button, have access to the latest
information regarding their profession. They can search the web to find out what their
colleagues in other countries are doing, they can ask questions about professional issues
and offer advice to others. There is no archival or records management problem or issue
81
82
83
http://www.doc.nmu.ac.uk/Research/virtual-museum/Menna/index.html
http://www.bmag.org.uk/museum_and_art_gallery
http://www.maltavoyager.com/moa/walkthroughs/vw_intro.html
90
that has not received attention yet. All of us are battling with the same problems and
some of us have solutions or possible solutions for those problems and issues.
The best thing that could have happened to the archival and records management
profession is the knowledge base that exists on the World Wide Web, and the
opportunities for networking with experienced people that did not exist in the past.
Distance and different time zones became irrelevant in the quest for archival and records
management knowledge. One does however, need to be careful and evaluate the
relevance and authenticity of the information that is gathered via this resource.
There are a number of pages on the web that contain links to archival and records
management resources. Examples of such pages are the following:
Records Management and Archival Web Resources Links84
RIM Resources85
Archives on the Internet: Valuable Resources for Reference and Professional Inquiries86
Preservation Resources87
Useful Websites for Archivists and Records Managers88
Bibliography of Glossaries89
E-government Resources90
Electronic Records Resources and Reference Links91
Archival resources92
Selected archival and records management resources93
Records and Information Management Resource List94
Unesco Archives Portal95
Annexure E also contains links to useful websites.
http://www-library.lbl.gov/teid/tmAro/hotlinks/Arohotlinks.htm
http://www.archives.nysed.gov/
86
http://we.library.uiuc.edu/ahx/rao/swain.htm
87
http://sunsite.berkeley.edu/Preservation
88
http://www.nagara.org/clearinghouse/summer_97/slavin.html
89
http://www.archives.gov/research_room/alic/reference_desk/glossaries_for_archivists.html
90
http://www.egov.vic.gov.au/Research/WebSiteIssues/InformationManagement/infolink1.htm
91
http://useastpra.optiview.com/HTTP:/enterprise.state.wi.us/home/e-records/resource_ref_links.htm
92
http://www.cslib.org/twnclrkes.htm
93
http://www.gclc-lib.org/resources/haig-archival.html
94
http://infomgmt.homestead.com/files/site_toc.html
95
http://www.unesco.org
84
85
91
6.5
Training
Web-based training is an excellent idea to share information with other professionals and
to train students if training resources are limited. Examples of web-based training are
the NARA Digital Classroom96 and Records Management Training for Oregon County
Government97. A free manual98 on delivering education via the web can be found on the
Macromedia website. You could also access the guide Web-based Training for Archivists
and Other Historical Record Keepers99 for more information about web-based training.
6.6
Preserving what we, our client offices and stakeholders produce for the
Internet and World Wide Web
Archivists and records managers are battling with a new challenge. What are websites?
Are they records or are they publications? And does it matter what they are? How should
we preserve them as evidence of what was communicated to the world?
Websites, like other electronic records, are hardware and software dependent.
Furthermore the information published to websites tends to be very short-lived. While
web development is still in its infancy in some countries, it gives them a real opportunity
to build preservation mechanisms into the websites at an early stage.
Information regarding the debate about the preservation of websites can be found on
most of the listservs. You could learn more about archiving web resources by accessing
the archived version of the National Library of Australia’s information on the
International Archiving Web Resources Conference100 held in November 2004. You could
also do a search for information on the preservation of web resources by using the
following keywords/phrases: archiving and (web resources), preservation and (web
resources.
http://www.archives.gov/education/digital_classroom.html
http://arcweb.sos.state.or.us/banners/recmgmt.htm
98
http://www.macromedia.com/resources/learning/elearning_guide.pdf
99
http://www.coshrc.org/arc/webeducation/index.htm
100
http://www.pandora.nla.gov.au
96
97
93
7.
Designing a website/Intranet site
7.1
Introduction
The design of a website requires:
•
Thorough planning;
•
An understanding of how websites are built;
•
An understanding of what you want to achieve with the website.
Designing a website normally has stages, namely:
•
Planning;
•
Content development;
•
Graphic design;
•
Programming;
•
Hosting;
•
Marketing and promotion; and
•
Maintenance.
If you are not an expert on website design and you plan to have a very elaborate
website, it may be best if you employ a professional website developer to develop the
site for you.
You could, as a start, design a very simple website to enable you to develop a web
presence, and as the site develops over time and it becomes more complicated, employ
the necessary professional skills to maintain and update the site. For more information
about the development of a website, you could access the Web Developer’s Virtual
Library101and the Web Developers Journal102.
A basic knowledge of HTML can be very helpful when creating your own website.
101
102
http://www.wdvl.com
http://webdevelopersjournal.com
94
7.2
Planning your website
To plan a website thoroughly you need to determine the following:
¾
How would it benefit you to have a website? Building and maintaining a website is
a costly exercise. If you cannot prove a return on investment and/or that the
website would benefit your institution in one way or the other, it does not make
sense to spend the money to design the website. Remember that benefits are not
only financial in nature. If the purpose of the website is to attract more people to
the archives repository and/or to convey the message about good recordkeeping,
it can be a very successful marketing/outreach tool.
¾
What should be communicated on the website? Remember that you could start
small and gradually build up the website. You do however need to know what the
long term aim of the website is so that you could plan the sequence of the site
development properly. You also need to know what information you want publish
to start the website with;
¾
Who is the intended audience? What would be of interest to your intended
audience? How could you add value to their experience of you and your services?
Would what you plan to do with the website be very different from your normal
publications? Remember that you are not creating the website only for yourself.
You want other people to use it. You need to know who those other people are.
You also need to know beforehand if you only want to draw one type of audience
to your site or if you want to attract all types of audiences. You would for
instance plan differently for serious academic researchers, school children and
casual browsers. The bigger your intended audience is, the more creative you
need to be. The intended audience determines what would be published on the
website and what the look and feel of the site should be. For example, if your
intended audience is academics, you would not entice them to your site with
animated cartoons and daily jokes. For a good example of how professionals,
academics, students and school children were accommodated on the same site
you could visit the website of the UK National Archives;103
¾
How will the site be organised? Normally a site should be easy to maintain and it
should be very easy to find information. At this stage you should consider
drawing a schematic design of the website to enable you to “visualise” the site
¾
How sophisticated should the website be? You may need to do a bit of research
on the internet to look at different websites and how user friendly they are. If you
103
http://www.nationalarchives.gov.uk
95
see a website that you like, you could contact the webmaster (the contact
particulars are normally published on the website) to find out who the website
developer was, and how they went about drafting a terms of reference for
obtaining the services of the website developer. It would also be beneficial if you
could obtain information about the cost of the development and the maintenance
of the particular website so that you could form an idea of how much you should
budget for the development of a website.
With this information at hand you could now obtain management approval for the design
of the website and the content to be published. Websites are a very public form of
communication
and
should
be
managed
as
part
of
your
institution’s
broader
communication policy. Remember that your institution can be held legally accountable
for what is published on the website.
Management’s buy-in is however needed for a much more practical reason…. To build
the website and to keep it up-to-date requires a continued financial commitment. If
management does not buy into the website and the benefits of having a website are not
clear to them, you would not receive the necessary financial support to maintain the
website. There is however, more to it than just that. Depending on the level of
sophistication of the website you may need to employ the services of a professional
website developer. You would need to convince your management that it is necessary to
outsource the development of the website and that you would need to budget for that.
You should also remember that a website is a work in progress. It is not a once off
development. It should continue to grow with your institution and should be kept up-todate. Planning it properly from the start and having a financial commitment from the
start would definitely be beneficial for all concerned.
7.3
Developing website content
To determine what content the website should carry, you need a very clear idea what
you want to achieve with the site. Normally the idea behind a website is to let the world
know that you exist and to let them know what services you offer. You do however also
want to attract more people to use your services and to understand the value that you
add to society. You need to keep all this in mind when you plan the content of your site.
To start off with, you could develop a very simple site that fulfils the same function as a
pamphlet, display ad or newsletter. Such a site would only include contact information
96
and a very brief description of the service you offer, and would most probably not attract
additional people to use your services. It would however, serve as a convenient
mechanism to contact you if you include an e-mail address on the site.
If you want to use the site to increase awareness of the value that you add to society,
the site can become more complex in nature and would then not only include pamphlet
style listing of your address and services. It could include on-line exhibitions, interactive
catalogue searching, etc. The content of your website would then most probably be a
combination of information that you already have available and information that you
need to develop specifically for the website. It is possible that the information that you
have available already needs to be repackaged for web publishing. You need to consider
how many resources you have available in-house to assist with content development and
maintenance. The amount of resources available in-house as well as the amount of
money available to hire skilled writers should be investigated. If you have the money
available, it may be a good idea to hire the services of a skilled writer to assist with the
repackaging of the information and to write additional information for the website.
Limited resources may be one of the reasons why you would have to start small and
build the site up gradually.
It is always a good idea to workshop the content of the site with your staff. For example,
if the staff could indicate what users normally ask them most and the answers could be
posted to a frequently asked questions (FAQ) page on the website, staff would not have
to spend time on answering those frequently asked questions, but could spend time on
doing other work.
At this stage it is also necessary to give consideration to keeping the content of the
website updated. Who would be responsible for that task? Would you allocate the task to
one of your existing staff members, or would you need to hire the services of a content
manager?
7.4
Graphic Design
To make the website more attractive, it is a good idea to create a sense of continuity by
repeating a specific background and/or logo on every page of the website. You could try
to do this yourself, but because websites do have technical limitations, e.g. file sizes,
colour, screen resolutions and access speeds, it is a good idea to employ a good graphic
designer to work with the person who is developing the website.
97
It is a good idea to also workshop this aspect with the staff. They will feel more involved
and would be keener to use the site and to refer other people to the site to use it.
7.5
Programming your website
When the website is planned, the content created and the look and feel of the site
decided on, it is necessary to convert all this to a web readable form. Normally the text
files are converted to HTML format and the graphics are converted to GIF or JPEG
formats. More complicated sites however, also contain e-forms, image maps, etc. The
more complicated the planned site is, the better it is to have an expert available to write
the content to a website readable form. However, if you plan to start with an
uncomplicated text-based site, you could do some of the work yourself. You could either
write some of the text yourself using the HTML guidelines above or you could write the
text in your normal word processor and save the text as HTML104 files. You could then
use the basic HTML guidelines to test the text to make sure that the text would display
correctly in a website. You should remember that, when you have a large piece of text to
convert to HTML format, like a book for instance, it is good HTML practice to break the
text up in smaller parts that would be faster to download – almost like the chapters of
the book. It is also good practice to allow users to choose between a HTML document to
download in parts or an open source document format like PDF or to download it in its
entirety.
In this regard you could look at the National Archives of Australia’s DIRKS
Manual.
Also remember that long scrolling pages of text are not very user-friendly. Users will
lose interest very easily if they have to scroll to a large piece of text to find out what you
are all about. It is always a good idea to design a home page for your website. The
home page is the very first page of your website and should draw the attention of the
users. This does not mean that it should be very “busy”. A home page with a simple layout that immediately tells the user what the site is all about is best. The home page
serves as a table of contents for the rest of the site.
It is not necessary to convert all the information that you have available to HTML format.
You may want textual pages of limited length that allow you to download more
substantial information or publications. Should you wish to go this route, remember not
104
http://www.naa.gov.au/recordkeeping/dirks/summary.html
98
to publish your publications in proprietary formats (like MS Word, WordPerfect, etc)
because all computers do not have the software available to read them. It is better to
convert the documents to a non-proprietary format like PDF that can be read with a
reader that is freely available on the Internet.
The more complicated your site is, the more critical it is that you have a search function
on the site to enable users to search the site for information without having to drill down
into all the pages of your site to find the information that they want. Your search
function should have an easy keyword searching functionality as well as a more
advanced Boolean searching functionality.
It is very nice to include graphics in the site. You should, however, keep in mind that
graphics take longer to download and that it can be very frustrating for users with a dialup connection. If you want to include graphics, keep the file sizes small. It is also a good
idea to give users an option to view the site with or without graphics. Multi-media files
also take longer to download. If you want to include these types of files on your site, you
should also give the users the option to view them or not.
It is a good idea to add links to related sites to add value to your user’s experience.
However, you may need the permission of the owners of the other sites to include the
links on your site. Before you add a link to another site, you should contact the
webmaster of that site to obtain permission to do so.
When developing your site you should also keep copyright restrictions in mind. If you
want to re-use information or graphics that are published on other sites, you should
obtain written permission to do so from the owners of the other site. For more
information about copyright you could study the Copyright Website105
7.6
Hosting your website
Now that you have the website developed, you need to find a host for the website. You
could consider buying a web server to host your website in-house, or you could host
your site with your Internet Service Provider or with a Web Hosting Service.
105
http://www.benedict.com
99
Should you decide to host the website in-house, your system administrator should be
skilled in all aspects about web hosting. It is a good idea to do a proper risk and costing
analysis before you make a decision. You should remember that a website is the public
face of your institution and that it is meant to be available 24 hours 7 days a week.
7.7
Marketing/Promoting your website
A website is no use if nobody knows that it exists. There are various ways of marketing a
website. It can be as easy as including your website address on your business cards, in
your hardcopy publications, in your e-mail auto signature when you send out e-mail, etc.
If you have a huge marketing budget, you could even consider printing pamphlets and
leaving them with your local library to distribute or advertising in newspapers and
computer magazines.
However, there are also other ways of publicizing your website. The first one is to allow
your website to be crawled by search engines so that your site could be retrieved when
searches are done. This is a hit or miss method, that may not have the desired results.
It is better to actually register your website’s URL and a description of your site to
several search engine sites to ensure that it does show up in search results when
searches are done. A good place to start is with SubmitIT106. This site contains a form
that you can complete on-line and submit to dozens of search engines at once. You
could also submit the particulars of your site to website directories to be included in their
listings.
You could also send information about the existence of your site to the various
professional listservs. Another method would be to ask the owners of other websites
with similar interests to add a link to your website on their sites. It is also a good idea to
ask the owners of the Records and Information related portal sites to include a link to
your site on their portals.
7.8
Maintaining your website
A website needs regular upkeep; otherwise it becomes outdated very easily. If you have
a relatively uncomplicated website, it is easy to check regularly for outdated information,
if all the links are still working properly and if all the documents on the site are
106
http://www.submit_it.com
100
accessible and readable. However, when the site grows maintenance can become a full
time job. At this stage it may be a good idea to appoint a person to maintain the
website.
You should remember to budget for the cost of full time maintenance of the site,
especially if you have a very sophisticated website. To enable you to do this, it is
necessary that you design a proper maintenance strategy for your site. You need to
decide how often to update the site and how extensive the updates should be. You also
need to know how many users visit the site and what pages they are viewing. Your Web
Hosting Service should be able to provide you with the user statistics. You could use this
information to find out why you are not drawing many visitors to your site and which
pages are not accessed. You should also remember to keep proper records of all
maintenance actions on the website, because a website is an official record and its
authenticity should be able to be proven beyond any doubt.
It is a good idea to include the e-mail address and other contact particulars of the
webmaster on the website. This would allow users that experience problems accessing
information on your site to contact you and to alert you to possible problems.
101
8
Understanding HTML
8.1
HTML Documents
HTML documents are plain text documents. They are created by using either a text
editor (WYSIWYG107 editors are available) or by creating a document in a normal wordprocessing software package and saving it as text only. HTML is the authoring language
of the web. It is used to embed instructions into documents so that web browsers know
how to display them.
Figure 50 contains an HTML version of the ACARM Guide to the Internet and World Wide
Web for Archivists and Records Managers and Figure 51 contains the HTML source code
of the document.
Figure 50: HTML version of the ACARM Guide to the Internet
and World Wide Web for Archivists and Records Managers
107
WYSIWYG acronym for “What you see is what you get”
102
Figure 51: The HTML Source Code of the ACARM Guide to the
Internet and World Wide Web for Archivists and Records Managers
8.2
HTML Tags
A text document consists of various elements, for example headings, paragraphs tables,
lists, etc. These and other components of the structure of a text document are
distinguished for browser interpretation by using HTML tags. HTML tags consist of a left
angle bracket (<), a tag name, and a right angle bracket (>). Tags are usually paired
(e.g. <HI> and </HI>) to start and end the tag instruction. A slash (/) distinguishes
between the start and end tags. In general pairs of tags can be used within other pairs
provided that the end tags are in reverse order of the opening tags.
HTML is not case sensitive.
In HTML the tag <title> is equivalent to <TITLE> or
<TiTlE>.
Not all tags are supported by all World Wide Web browsers. If a browser does not
support a tag, it normally ignores it.
103
8.3
The Basic HTML Document tags
8.3.1 Starting an HTML document
<html> and </html> is placed at the start and end of a document to define the
document type.
8.3.2 Head and title tags
Each document consists of head and body text.
The head contains the title, and the
body contains the actual text or images to be displayed on screen by the browser.
The tags <head> and </head> define the header information including the title, while
the title tags <title> and </title> contain the title of the document which is displayed
somewhere on the browser window. The title tags are normally contained in the head
tags, e.g. <head> <title> type the title here </title></head>.
In this example
Figure 52: Example of a document heading in HTML format
the HTML tagging of the document will look like this:
<html>
<head> <title> type the title here </title></head>.
104
</html>
Look at the HTML source code below. Can you see the <html> <head> <title> and the
</title></head> </html> tags?
Figure 53: Source code of the example in figure 52
8.3.3 Body tags
The body of the document contains the content of the document. The body is tagged
with<body> and </body> that marks the main body of the page. The </body> or “end
body” tag is normally placed before the </html> or “end html” tag at the end of the
page.
In this example
105
Figure 54: Example of body text in an HTML document
the HTML tagging of the document will look like this:
<html>
<head> <title> type the title here </title></head>.
<body> type the content of the document here
</body>
</html>
Look at the HTML source code below. Can you see the <body> and </body> tags?
Figure 55: HTML source code of example in figure 54
indicating body tags
106
The content of a document also contains a number of other tags, namely
8.3.3.1
Heading tags
HTML has six levels of headings, displayed in larger and/or bolder fonts than normal
body text. The syntax of the heading element is:
<hx> type the text of the heading here </hx>
x is a number between 1 and 6. This indicates the size of the heading. 1 is the largest
heading and 6 the smallest.
The HTML tagging of the document will now look like this:
<html>
<head> <title> type the title here </title></head>
<body>
<h1> type the text of the heading here </h1>
type the content of the document here
</body>
</html>
Look at the HTML source code below. Can you see the <body> and </body> tags?
Figure 56: HTML source code of document in figure 54
indicating heading tags
107
8.3.3.2
Paragraph tags
In an HTML document paragraphs are delineated by paragraph tags. Unlike normal text
documents, HTML does not recognise carriage returns as paragraph breaks. Normally
multiple spaces are collapsed into a single space by your browser. All other formatting
by word processors is also ignored.
<p> and </p> defines paragraphs in a document. They mark the beginning and end of a
paragraph and automatically insert a line break. The </p> closing tag can be omitted
since the browser opens a new paragraph as soon as another <p> tag is encountered.
The HTML tagging of the document will now look like this:
<html>
<head> <title> type the title here </title></head>
<body>
<h1> type the text of the heading here </h1>
<p>
type the content of the paragraph here
<p>
type the content of the 2nd paragraph here
</p>
</body>
</html>
Look at the HTML source code below. Can you see the <p> and </p> tags?
108
Figure 57: HTML source code of document in figure 54
indicating the paragraph tags
With these tags you could create a very simple HTML document.
To make your HTML document more attractive, there are a number of other formatting
tags that you can use in the content of your document. You search on the internet to
find web pages that fulfil the criteria below. View the source code and see if you can
identify the tags.
8.3.3.3
Centre paragraphs
Paragraphs can be centred using the ALIGN= alignment attribute as follows:
<p align=centre> this is a centred paragraph </p>
It will look like this:
<html>
<head> <title> type the title here </title></head>
<body>
<h1> type the text of the heading here </h1>
<p align=centre>
<p>
type the content of the 2nd paragraph here
this is a centred paragraph
</p>
109
</body>
</html>
8.3.3.4
Lists
HTML supports unnumbered, numbered, definition and nested lists as shown below:
a)
Unnumbered bulleted list:
<ul> and </ul> defines a bulleted list. <li> and </li> defines list items and should be
placed in front of each list item between the <ul> and </ul> tags
Example:
<ul>
<li> oranges
<li> lemons
<li>grapefruit
</ul>
When viewed from a browser-
b)
•
oranges
•
lemons
•
grapefruit
Numbered Lists/ordered lists
<ol> and </ol> defines numbered lists/ordered lists and are used in combination with
the list tags <li> and </li>
Example:
<ol>
<li> oranges
<li> lemons
<li> grapefruit
</ol>
When viewed from a browser-
110
c)
1
oranges
2
lemons
3
grapefruit
Definition List
The <dl> and </dl> defines definition lists. They are used in conjunction with the
definition term <dt> and </dt> tags and the define definition <dd> and </dd> tags
Example
<dl>
<dt> IRMT
<dd> International Records Management Trust
<dt> ACARM
<dd> Association of Commonwealth Archivists and Records Managers
</dl>
When viewed from a browserIRMT
International Records Management Trust
ACARM
Association of Commonwealth Archivists and Records Managers
d)
Nested Lists
The nested list can be described as a list within another list. Both lists can be of the
same type or a combination of unnumbered, numbered or definition lists.
A nested list is created by using the list definition tags and would look like this:
Example:
<ul>
<li> Citrus fruits:
<ul>
<li> Oranges
<li> Lemons
<li> Grapefruit
111
<ul>
<li> Other types of fruits:
<ul>
<li> Apples
<li> Apricots
<li> Peaches
<ul>
</ul>
When viewed from a browser
Citrus fruits:
•
Oranges
•
Lemons
•
Grapefruit
Other types of fruits:
8.3.3.5
•
Apples
•
Apricots
•
Peaches
Preformatted text
The text between the <pre> and </pre>tag is displayed in fixed-width font. This tag
also makes spaces, new lines, and tabs significant.
The <pre> tag can be used with an optional WIDTH attribute that specifies the
maximum number of characters for a line.
Hyperlinks can be used within <pre> sections. Other HTML tags within <pre> sections
may not function properly hence usage should be avoided.
8.3.3.6
Extended Quotations
The <blockquote> tag is used to include lengthy quotations in a separate block on the
screen. Most browsers generally change the margins for the quotation to separate it
from surrounding text.
112
8.3.3.7
Forced Line Breaks
The <br> tag forces a line break. The difference between the <p> and the <br> tags is
the space between lines. After a <br> the space is narrower than the space between two
paragraphs separated by a <p> tag. This is especially useful in postal addresses for
example.
8.3.3.8
Horizontal line
The <hr> tag inserts a horizontal line the width of the browser window. A horizontal
rule is normally used to separate sections of documents.
The thickness and width of the rule can be varied using the size and width tags followed
by a number or percentage respectively.
Example
<hr size=3 width= “75%”>
8.3.3.9
Other commonly used tags
•
<dfn> for a word being defined. Typically displayed in italics.
•
<em> for emphasis. Typically displayed in italics.
•
<cite> for titles of books, films, etc. Typically displayed in italics.
•
<code> for computer code. Displayed in a fixed-width font.
•
<kbd> for user keyboard entry. Typically displayed in plain fixed-width font.
•
<samp> for a sequence of literal characters. Displayed in a fixed-width font.
•
<strong> for strong emphasis. Typically displayed in bold.
•
<var> for a variable, where you will replace the variable with specific information.
Typically displayed in italics.
•
<b>text in between is shown as bold</b>
•
<i>text in between is shown as italics</i>
•
<b><i>text in between is shown as bold and in italics</i></b>
•
<tt> typewriter text, e.g. fixed-width font.
113
8.3.3.10
Special characters
HTML does not recognize certain special characters in text. A special case sensitive
escape sequence tag covers the following characters:
< - &lt
> - &gt
& - &~
ö - &ouml
8.3.3.11
Document Links
A special feature of HTML is that it allows linking between documents or between texts in
documents. Links or hyperlinks are instructions to the browser on how to navigate to
other places in the document, other documents or other web pages.
Hyperlinks are used to connect documents, images, sound clips or video clips.
These
links can be used to connect between different parts inside the same document or to
different documents which may reside on any server on the World Wide Web.
The browser highlights the identified text or image embedded in the hyperlink which
when selected will display on screen another document or a different section of the same
document.
Hyperlinks are created by using the tag <a>, which stands for anchor. The destination
anchor is also known as a bookmark.
a)
Linking between documents in the same directory
The format for the HTML tag linking to documents in the same directory as the root
document is:
<a href= “address.html”>Addresses</a>
Here the hyperlink “Addresses” links to the document address.html, which is in the same
directory as the document containing the hyperlink.
114
b)
Links to documents in other directories
Links to documents in other directories can be made by specifying the relative path from
the
current
document
to
the
linked
document.
For
example,
<a
href=“country/address.html”>London</a> links to a file address.html located in the
subdirectory country. This is a relative link since the path to the linked file is specified
relative to the location of the current file.
c)
Links to URL’s
The World Wide Web uses URL’s to specify the location of files on other servers. The
absolute path name is the complete URL of the file. Relative links are more efficient in
accessing a server.
The advantage of using relative links is that path names remain
valid when a group of documents is moved to another location. Absolute names must be
used when linking to documents that are on other websites.
d)
Links to text in other documents
Links between sections of different documents can be done by inserting a name tag
anchor in the target file and embedding the name tag after the hash (#) mark in the
hyperlink on the source file, e.g. to link document A (docA.html) to a specific section in
another document (DocB.html):
The HTML coding for a link to a named anchor in document A. is:
<a href=“docb. html#crv”>current events </a>.
The named anchor in document B is:
<a name=“crv”>current events</a>
When a reader selects current events on document A, the browser will open document B
scrolled down such that current events on document B will appear at the top of the
browser.
115
e)
Links to text in the same document
The technique to link to specific sections within the current document is the same except
that the filename is omitted.
f)
Mailto
If “mailto:” followed by a specific e-mail address is embedded in a hyperlink a reader will
be able to send electronic mail straight from his browser. The format is:
<a href= “mailto:emailadd@hostname”>name</a>
8.3.3.12
Images
Most web browsers can display images of various formats such as GIF, or JPEG format
with text next to them. Images take time to process and slow down the initial display of
a document according to their size and number.
To include an inline image, the html code is:
<img src=imagename>
where imagename is the URL or relative address of the image file.
Note that the syntax for <img src> URLs are similar to those used in an anchor href.
a)
Image sizes
The HEIGHT and WIDTH attributes can be used to let the browser set aside the
appropriate space (in pixels) for the images as it downloads the rest of the file.
Example:
<img src=Photo.gif height=1 00 width=65>
116
b)
Aligning images
Images can be displayed separated from text and aligned to the left or right or centered.
Or an image can be aligned with text.
By default text is aligned to the bottom of an image. The ALIGN= attributes TOP and
CENTER align a line of text to the top or centre of an image.
An image can be displayed without any associated text as a separate paragraph using
the paragraph ALIGN= attribute to centre the image or adjust it to the right side of the
window thus:
<p align=centre> <1mg src = “Portrait.gif”> </p>
c)
Alternate text for images
Some World Wide Web browsers cannot display images.
loading even if their software can display images.
Some users turn off image
By including the ALT attribute
specified text can be displayed instead of an image. For example:
<img src=“UpArrow.gif”alt= “up”>
where UpArrow.gif is the picture of an upward pointing arrow displayed by graphics
enabled browsers otherwise the word Up is displayed on screen.
d)
Background images
Many web browsers can load an image and use it as a background when displaying a
page. It is important that text remains easily readable when background images are
used. The tag to include a background image is included in the <body> statement as an
attribute:
<body background=“filename.gif”>
e)
Background Colour
117
Browsers, by default, display text in black on a grey background.
The colour of text,
background, links, visited links, and active links can be changed by using attributes
within the <body> tag. For example:
<body bgcolor=“#000000” text=“#ffffff” link=“#9690CC”>
This creates a window with a black background (bicolour), white text (text), and silvery
hyperlinks (link).
The six-digit number and letter combinations represent colours by giving their RGB (red,
green, blue) value.
The six digits are an encryption of three two-digit numbers in
sequence, representing the amount of red, green, or blue as a hexadecimal value in the
range 00-FF. For example, 000000 is black or no colour at all, FF0000 is bright red, and
FFFFFF is white or full of all three colours.
8.3.3.13
Sounds and Animations
An image opens as a separate document when a reader activates a link on either a word
or a smaller inline version of the image included in a document. This is useful to prevent
slowing down the loading of the main document with large inline images.
To include a reference to an image opened as a separate document:
<a href=“Sepimage.gif”>text link anchor</a>
To use a smaller image as a link to a larger image:
<a href=“bigimage.gif”><img src=“Tinylmage.gif”5<ia>
The same syntax is used for links to animations and sounds. For example,
<a href= disney.mov”>link anchor</a>
specifies a link to a movie.
118
8.3.3.14
Tables
Text and images can be embedded in tables which use HTML tags. A table has headers
to describe what the columns/rows include, rows for information, and cells for each item.
In a table, the first column contains the header information, each row explains an HTML
table tag, and each cell contains a paired tag or an explanation of the tag’s function. The
<table> and </table> tags embeds the entire table definition. The first item inside the
table is the caption, which is optional. Then, the number of rows is defined by the <tr>
and </tr> tags.
Within a row you can have any number of cells defined by the
<td>……...</td> or <th>…..</th> tags.
Each row of a table can be formatted
independently of any row above and below it hence single cell tables can be displayed.
•
<table> ... </table>defines a table in HTML.
•
border = n displays the table with a border the width of the border depends on the
value of integer n. If n is set to zero the border will not be displayed.
•
<caption> ... </caption>defines the caption for the title of the table. The default
position of the title is cantered at the top of the table. The attribute align=bottom
can be used to position the caption below the table.
•
Any kind of markup tag can be used in the caption.
•
<tr> ... </tr>specifies a table row within a table. Default attributes may be defined
for the entire row.
•
Align (left, centre, right) and/or valign (top, middle, bottom).
•
<th> ... </th>defines a table header cell. By default the text in this cell is bold and
centred.
Table header cells may contain other attributes to determine the
characteristics of the cell and/or its contents.
•
<td> ... </td>defines a table data cell. By default the text in this cell is aligned left
and centred vertically. Table data cells may contain other attributes to determine
the characteristics of the cell and/or its contents.
The following table attributes defined within <th> ... </th> or <td> ... </td> cells
override the default alignment set in a <tr> ... </tr> tags:
•
align (left, centre, right) for horizontal alignment of cell contents
•
valign (top, middle, bottom) for vertical alignment of cell contents
•
colspan = n to specify ‘number of columns
•
rowspan = n to specify number of rows
•
nowrap = to turn off word wrapping within a cell.
119
The general format of a table includes the following tags:
<table>
the start of table definition. All other table tags are embedded between the <table>
</table> tags.
<caption> caption contents </caption>
<tr>
start of first row definition
<th> cell contents </th>
first cell in row 1 (a head)
<th> cell contents </th>
last cell in row 1 (a head)
</tr>
end of first row definition
<tr>
start of second row definition
<td> cell contents </td>
first cell in row 2
<td> cell contents </td>
last cell in row 2
</tr>
end of second row definition
<tr>
start of last row definition
<td> cell contents </td>
first cell in last row …
<td> cell contents </td>
last cell in last row
</r>
end of last row definition
</table>
end of table definition.
120
8.3.3.15
Forms
Web forms let a reader enter information, in specific fields, for posting to a web server
for some process. The forms themselves follow the same constructs as other HTML tags.
The processing of the incoming data is usually used as input to a programme written in a
language that manipulates text, files, and information.
The language may be Java,
C++, or other requiring a skilled programmer.
8.3.3.16
Frames
Frames allow multiple HTML documents to function at the same time in one browser
window. The documents in two separate frames can operate either independently, or by
interaction between the contents of another frame.
Frames are defined by the number required, size, name, and initial HTML contents.
Frame areas are defined by their row size if the requirement is to span the window
horizontally or by the column size to expand upward and downward. Frame areas are
defined by the HTML tag <frameset>. In each frameset the sizes of the frame areas can
be specified as a percentage, number of pixels, or auto-scaling. The order in which the
frames are defined determines the order in which they appear in the browser window,
and the ones defined by column width are displayed side by side.
A frame content definition is required for each frame defined. The HTML tag <frame> is
used for defining the contents of the frame. By embedding the tag src=“file.html” in the
<frame> tag the contents of the html file specified by the src tag will appear inside the
corresponding frame. The name tag in the frame tag is used to specify the frame to
interact with.
Scrolling inside the frame can be controlled by using the scrolling tag inside the frame
tag. Scrolling can have three values. Scrolling=“auto” is interpreted by the browser to
use a scroll bar if the contents do not fit in one screen. By substituting auto with yes or
no the programmer determines whether scrolling should be used.
Some browsers do not understand frame tags.
To prevent such browsers from
interpreting such tags as ordinary text, frame tags can be embedded between
<noframes> </noframes> tags.
121
If you want to practice html you can download HTML editors and file conversions
programmes from Download.com108
For more information on HTML see HTML Primer109 and A Beginner’s Guide to HTML110.
You would also find Writing Web Pages – Guidelines for Archivists111 very useful.
108
109
110
111
http://www.download.com
http://www.htmlprimer.com
http://archive.ncsa.uiuc.edu/General/Internet/WWW/HTMLPrimerPrintable.html
http://www.archivesinfo.net/forum/webguide.html
123
Annexure A: Glossary of Terms
Anchor
The highlighted text or graphic in a file which is the source or
destination of a link. Clicking a mouse on an anchor area causes
the link to be followed, leaving the anchor at the opposite end of
the link displayed. Anchors tend to be highlighted in a special way.
The destination anchor is also known as a bookmark.
Anonymous FTP
This is a facility that allows you to download information from
computers where you do not have a user account. The user logs on
as “anonymous” but does not need a password to access
documents on the server.
Anti-virus
Anti-virus software is programmes that scan the computer for
software
viruses, detects them and removes them.
Authoring
A term for the process of writing a document (referring to web
documents).
Auto signatures
Auto signatures are a little bit of text containing contact particulars
that appear at the end of e-mail messages.
Bookmark
A bookmark identifies a location or selection of text that you name
and identify for future reference, normally to add a hyperlink to.
Blogs
Blogs or web logs are personal web pages that contain personal
thoughts and links to other sites that are of particular interest to a
blog owner.
Boolean
Boolean operators are the terms “AND”, “OR”, NOT, NEAR and
operators
FOLLOWED BY. See also proximity operators.
Boolean searches
Boolean searches allow one to search for keywords that best
describe the topic that you are searching for.
Broadband
Broadband is a dedicated network connection through a local area
network that has an Internet gateway to connect to other systems
on a network.
Browser
A browser is a programme used to locate, display, browse and view
information on a website.
Cable Internet
Cable Internet is a system where the computer uses the same
network cable as the television to access the Internet.
Channels
Channels on the web are a pre-selected information source that
can send information to your computer automatically according to
124
a predetermined schedule.
Client
A computer running client software that connects to server
machines holding information; the client makes requests to a
server for documents and is responsible for displaying the
information. Normally, the browser is a client of a data server.
Client
Clients are computers that make requests. They are loaded with
the correct software to talk to the correct servers.
Country code Top
A two letter code derived from an International Standard ISO 3166
Level Domain
Country Codes that indicates geographical origins.
Database
A collection of information stored electronically.
Deep web
See invisible web.
Dial-up
A dial-up connection is an Internet connection over a standard
connection
telephone line using a modem.
Directories
Directories are websites that contain a large number of links. The
links are classified into subject categories or types.
DNS
A central list of domain names and IP addresses. The principal use
is the lookup of host IP addresses based on host names.
Document
Unit of information sent from servers to clients; a document may
contain plain or formatted text, in lined graphics, sound, other
multimedia data, or hyperlinks to other documents; often also
referred to as a file.
Domain Name
A computer name/address that is understandable to humans.
Domain
Domain Name Registrars are companies that are licensed by ICANN
Name
Registrars
to sell domain names.
Download
Retrieving files from the web by using the FTP protocol or
according to the instructions prompted by the browser in use.
DSL
Digital Subscriber Line is technology that transfers high bandwidth
information over ordinary telephone lines at a speed of ±6.1
megabits per second.
E-mail
E-mail is an electronic message containing information sent from
one computer to another over a network.
E-mail address
A unique address for each user on a network that allows the user
to send and receive e-mail.
Ethernet
The most common cabling and data delivery technology used in
Local Area Networks (LAN).
Favourites
A list of interesting websites which users save to easily re-visit
them at a later stage. Some browsers use the term bookmark to
125
name the action of listing the favourite sites.
Firewall
A firewall is a programme that prevents unauthorised access to a
computer over a network.
Forms
HTML specification of tools, which includes text fields, password
fields, multi-line text entry, checkboxes, toggles, option menus,
multiple selection lists, images, hidden fields, and submit buttons.
FTP
FTP (File Transfer Protocol) allows you to copy files from one
computer
connected
to
the
Internet
to
another
computer
connected to the Internet. It allows you to download information,
upload web pages and transfer information between computers.
Hackers
Hackers are people with an active interest in breaking through
computer security.
Hacking
Breaking into a computer over a network to test the security of the
computer and the network.
Hard disk/drive
A hard disk is the magnetic hard drive that stores data long term.
Hidden web
See invisible web.
Host
A computer on a network.
Home page
The first page of a website is called a home page. This page serves
as the index or content page for the rest of the website. The home
page normally consists of links to the other pages on the website.
HTML
An acronym for HyperText Mark-up Language which is used to
format information so that it can be structured and made
accessible to the WWW; The authoring language used by web
browsers to define the appearance of websites and web pages.
HTTP
The acronym for Hypertext Transfer Protocol. This protocol is used
to transfer data between web servers and web clients or web
browsers. It also allows jumping between hypertext documents.
Hyperlinked
Hyperlinked information is information resources that are linked to
other information resources.
Hyperlinks
Hyperlinks are links inside a document or on a website that allow
one to jump to the other information resources from the current
one and back.
Hypertext
Hypertext is piece of text that contains links to other pieces of text
or to websites.
ICANN
Internet Corporation for Assigned Names and Numbers.
IMAP
Internet Message Access Protocol allows the mail client to access
messages residing on a mail server from any computer.
126
Index
A pointer to other data; a server facility which provides pointers to
particular data as a function of a query; a table of contents of a
book in hypertext form; the action of describing electronic data to
make them accessible on the WWW.
Internet
The Internet is a worldwide network of computer networks, each
with a unique address, that uses phone system technology and
satellite links to communicate information to each other 24 hours a
day using a common software standard.
Internet account
When you sign up for Internet service with an Internet Service
Provider you would have an Internet account that gives you the
right to use the services offered by that service provider.
Internet
Service
Provider
A company that provides customer access to the internet. They
provide the users with software, a username and password and
allow users to access services like e-mail, internet access, Usenet
news, Internet Relay Chat, etc.
Internet phone
Software that allows you to use your computer to dial a normal
phone number and that converts your voice signals to digital
packets to sent over the Internet.
Intranet
Intranets are private networks that help an organization to share
information between departments, units and regions across a
network.
Invisible web
The invisible web or deep web is a part of the Internet that is
password protected or is protected against web crawlers and that is
not indexed by search engines. The invisible web cannot be
retrieved with key word or advanced searches.
IP addresses
IP addresses are computer names/addresses. They consist of
number strings separated by full stops e.g. 491.572.72.196. See
also domain names.
IRC
Internet Relay Chat (IRC) is a means of having a conversation with
many people on a variety of topics in real time; in other words all
the parties to the conversation are participating simultaneously
regardless of the time zone they are in.
ISDN
Integrated Services Digital Network is a type of digital phone line
that transmits data many times faster than a modem on a normal
telephone line.
ISO
An acronym for International Standards Organisation.
LDAP
Lightweight Directory Access Protocol is used by e-mail clients to
127
query the address directories on the Internet to find and display email addresses.
Link
A relationship between two anchors, stored in the same or different
database. A link can be “Internal”, in other words it points to the
same document or “External”, in other words it points to a different
document, or to a website.
Listserv
A listserv is a facility that allows participation in
ongoing
discussions via e-mail. Listservs provide a discussion forum to
share information on specific topics. See mailing lists.
Mailing List
Mailing lists (also called listservs, List processors, distribution lists,
mail hosts, etc.) are discussion groups formed around a specific
area of interest, which correspond via e-mail.
Meta search
Search engines that pull together information that is listed by other
engines
search engines and that merges the results into one list of results.
MIME
An acronym for Multipurpose Internet Mail Extensions (multimedia
mail standard); the proposed standard for multimedia mail formats
on the Internet.
Modem
A modem is a device that translates the computer’s digital signals
into analogue signals. This enables the signals to travel over a
standard telephone line.
Navigation
The process of moving from one information source to another
through the hypertext web.
This is normally done by following
links.
Netiquette
Netiquette is a basic set of guidelines for acceptable use of the
Internet.
Newsgroups
Newsgroups are common areas where users can post messages for
many users to view/reply to.
NNTP
Network News Transfer Protocol is used to distribute news articles
between news servers.
Operating system
A programme that runs on a computer that allows the computer to
run other programmes. The operating system performs basic tasks
like recognising the input from the keyboard, sending output to the
monitor, keeping track of files and directories on the disk,
controlling the peripheral devices like the printer, the mouse, the
scanners, etc.
Path
A hierarchical set of directories which the computer’s operating
system uses to store and find system files and data.
128
PCT
Private Communications Technology is used to provide secure
communications over the Internet.
Phishing
Phishing is a method of obtaining personal information from the
computers of unsuspecting users.
Plug-in
Plug-ins are software programs that allow you to access multimedia files (e.g. audio or video files) without having to exit the
browser to access another application to open the files.
PPP
Point to Point Protocol is the protocol that dial-up Internet
connections use to transmit information.
POP
Post Office Protocol allows a mail client to download e-mail
messages to the computer’s hard drive from the mail server.
Protocols
Protocols are a standard set of specifications or parameters that
allows computers to send and receive data.
Proximity
Proximity operators like ADJACENT, WITH, FOLLOWED BY and
operators
NEAR are also Boolean operators that allow you to refine searches.
Public web
The public web is the part of the Internet that is available for
search engines to crawl and index and that can be retrieved by
doing keyword or advanced searches.
RAM
Random Access Memory is a microchip that stores data for brief
periods of time to enable the computer to run programmes and
access data.
Relevancy
ranking
This is a facility that the search engine uses to indicate the
document or resource in which your search term or phrase appears
most frequently and which it assumes are most relevant to the
search terms(s) that you entered.
Robot engines
A search engine that uses spiders to visit your website to index the
content of your website.
Satellite
Satellite connections that allow you to download files from the
connection
Internet via a satellite connection.
Search Engines
Search engines are programmes that can search the Internet for
specific information.
Server
Servers are computers that store information for use by clients. In
other words they are computers that service the requests from
clients.
SLIP
Serial Line Internet Protocol was the first protocol designed for
transmission of information over dial-up connections.
S/MIME
Secure Multipurpose Internet Mail is a protocol that is used to
129
encrypt data for transmission over the Internet and allows for the
decryption of the information by the intended recipient.
SMTP
Simple Mail Transfer Protocol allows an e-mail client to send
messages to a mail server.
SSL
Secure Socket Layer provides a secure facility for programmes to
pass data back and forth between computers.
Surfing the Net
A method of web exploration that begins at any page of interest
and then follows that page’s links to other sites.
Source file
The file on the computer where the html code and scripts of a
specific document or web page can be found. To view the source
code of a document or web page, right click on the mouse and
select view source.
Spam
Spam is junk e-mail that advertises products and services.
Spiders
Spiders are computer programmes that are used to crawl websites
to index them so that search engines can find them when you do a
search.
Tags
Tags are computer codes used in HTML (e.g., <h1>, </h1>, <p>)
TCP/IP
Transmission Control Protocol Internet Protocol manages the flow
of information on the Internet and ensures that data arrives
without errors.
Telnet
The Internet protocol that allows a user to log into a remote
computer and use its services.
Trojan
A Trojan is a programme that purports to be useful, but that
contains hidden viruses and worms.
URL
Uniform Resource Locators or URL’s are addresses that point to
specific resources or files on the World Wide Web.
USENET
Usenet is a world wide distributed system of online discussion
groups in which people continuously participate.
UUCP
Unix to Unix Copy Programme allows computers using versions of
the UNIX operating system to communicate with each other and
with remote computers.
Video
Video conferencing allows you to chat with one or more people in
conferencing
real time and/or to see live images as you speak or type.
Viruses
Viruses are malicious programmes that can damage the data on
your computer. They are usually hidden away in another file or
programme
WWW
An acronym for the World Wide Web. The World Wide Web (WWW)
130
is a branch of the Internet that provides access to hyperlinked
information.
Web
A set of information resources interconnected by links.
Another
name for the World Wide Web.
Web chatting
Web chatting uses a browser as a client to enable participation in
conversations conducted in web chat rooms.
Web chat room
A web chat room is part of a website or a website by itself that
provides an online venue where users with common interests can
communicate sometimes in real time.
Web hosting
A web hosting service is an organization with a web server that is
service
connected to the Internet and has the technical know how to
manage the equipment and software. They rent out space on their
servers to enable website owners to make websites available on
the Internet.
Web mail
Web mail is a facility to send e-mail from a web page
Website
A collection of related web pages, normally belonging to the same
institution and covering related information is called a website.
Web TV
Web TV provides Web and e-mail access through ordinary
television sets through a custom high-speed modem.
Wikis
Wikis are collaborative websites where the community participate
in writing a publication, like an encyclopaedia or a general purpose
website.
Worm
A worm is a malignant programme that e-mails itself to other
computers and damages the data on all computers that it infects.
WYSIWYG
An acronym for What You See is What You Get.
131
Annexure B: Condensed list of listservs
AMIA-L: An Online Forum for Moving Image Archivists - http://www.amianet.org
Annotated list of mailing lists on archives, records management and museums http://www.archimac.org/Profession/Lists/index.spml
Archives forum for journalists and historical research - http://hennekam.opweb.nl/phpbb
Archives Listserv - http://[email protected]
Archives-Wales - http://www.jiscmail.ac.uk/lists/archives-wales.html
Archivi 23 - http://www.unipd.it/ammi/archivio/lista.htm
Association of Commonwealth Archivists and Records Managers – http://[email protected]
AUS-ARCHIVISTS - http://www.asap.unimelb.edu.au/asa/aus-archivists/aus-archivists.htm
Australian Archives - http://lists.archivists.org.au/pipermail/archivists.org.au/aus-archivists/
AV Media Matters - http://palimpsest.stanford.edu/byform/mailing-lists/av/
BBS on archives and records management profession http://www.archimac.org/ArchiMac/index.spml
Business Archive Discussion List http://www.gla.ac.uk/External/BusArch/
CANMUS-L - http://www.yorku.ca/caml/canmus.htm
Conservation - http://www.jiscmail.ac.uk/lists/conservation-nccr.html
Diffuse Project - http://www.diffuse.org/index.html
Digital-preservation e-mail list - http://www.jiscmail.ac.uk/lists/digital-preservation.html
Discussielijsten/Mailing lists - http://www.archiefschool.nl/links.htm#disc
Discussion Lists - http://www.archivesinfo.net/proassn.html#lists
132
Electronic Media Group - http://aic.stanford.edu/sg/emg/resources.html
E-Mail Lists of the Society of American Archivists http://www.archivists.org/listservs/arch_listserv_terms.asp
Encoded Archival Description (EAD) Electronic List http://lcweb.loc.gov/ead/eadlist.html
ERECS-L - http://www.nla.gov.au/padi/topics/70.html#list
FIAF Forum - http://www.fiafnet.org/forum/forum.cfm?lg=uk
FIAF Round Table – http://www.cinema.ucla.edu/fiaf/english/rnd.html
History-digitisation - http://www.mailbase.ac.uk/lists/history-digitisation/
IMAP Listserv - [email protected]
Infosfera - http://es.egroups.com/group/infosfera
List of Archives-Related Listservs - http://www2.ncsu.edu/ncsu/chass/history/archlist.html
List of e-mail lists - http://www.albany.edu/sisp/people/students/saa/links.html#E-mail
Listes de discussion et forums – http://www.culture.gouv.fr/culture/autserv/archives.htm#Listes
Listserv of ICA/SAE - http://www.ica-sae.org/listserv.html
Lost Art Internet Database - http://www.lostart.de/
Mailing lists - http://www.uni-marburg.de/archivschule/mailinglisten.html
Netbib - http://www.netbib.de/
Padiforum-l - http://www.nla.gov.au/padi/forum/
Progressive Archivsts (ProgArchs) - http://www.topica.com/lists/Progarchs
Rlg-primary-sources - http://lists2.rlg.org/cgi-bin/lyris.pl?enter=rlg-primary-sources
Scottish Archivists List Archive –
http://www.archives.gla.ac.uk/arcbrc/contact/enquiry.html#scotarchlist
133
Scottish Archivists Discussion List - http://www.gla.ac.uk/External/scotarch
South-East Asia Pacific Audio Visual Archive Association (SEAPAVAA) List Service http://www.screensound.gov.au/MailList.nsf/frmLogin?OpenForm
UK Archives - http://www.jiscmail.ac.uk/lists/archives-nra.html
UK Records Management - http://www.jiscmail.ac.uk/lists/records-management-uk.html
US Electronic Archives - http://listserv.albany.edu:8080/archives/erecs-l.html
US Records Management - http://lists.ufl.edu/archives/recmgmt-l.html
Video Art/e-monitor - www.videoart.suite.dk/e-monitor
VIDEOLIB - http://www.lib.berkeley.edu/VideoLib/
135
Annexure C: List of ISO 3166 Country Codes
.af Afghanistan
.io British Indian Ocean
.dk Denmark
.al Albania
Territory
.dj Djibouti
.dz Algeria
.bn Brunei Darussalam
.dm Dominica
.as American Samoa
.bg Bulgaria
.do Dominican Republic
.ad Andorra
.bf Burkina Faso
.tp East Timor
.ao Angola
.bi Burundi
.ec Ecuador
.ai Anguilla
.kh Cambodia
.eg Egypt
.aq Antarctica
.cm Cameroon
.sv El Salvador
.ag Antigua and
.ca Canada
.gq Equatorial Guinea
Barbuda
.cv Cape Verde
.er Eritrea
.ar Argentina
.ky Cayman Islands
.ee Estonia
.am Armenia
.cf Central
.et Ethiopia
.aw Aruba
Republic
.eu European Union
.ac Ascension Island
.td Chad
.fk Falkland Islands
.au Australia
.cs Czechoslovakia
.fo Faroe Islands
.at Austria
(former - non-existing)
.fj Fiji
.az Azerbaijan
.cl Chile
.fi Finland
.bs Bahamas
.cn China
.fr France
.bh Bahrain
.cx Christmas Island
.gf French Guiana
.bd Bangladesh
.cc Cocos (Keeling)
.pf French Polynesia
.bb Barbados
Islands
.tf French Southern
.by Belarus
.co Colombia
Territories
.be Belgium
.km Comoros
.ga Gabon
.bz Belize
.cg Congo, Republic of
.gm Gambia
.bj Benin
.cd Congo,
.ge Georgia
.bm Bermuda
republic of the (former
.de Germany
.bt Bhutan
Zaire)
.gh Ghana
.bo Bolivia
.ck Cook Islands
.gi Gibraltar
.ba Bosnia and
.cr Costa Rica
.gr Greece
Herzegovina
.ci Côte d'Ivoire
.gl Greenland
.bw Botswana
.hr Croatia
.gd Grenada
.bv Bouvet Island
.cu Cuba
.gp Guadeloupe
.br Brazil
.cy Cyprus
.gu Guam
.cz Czech Republic
.gt Guatemala
African
Democratic
136
.gg Guernsey
.ls Lesotho
.ne Niger
.gn Guinea
.lr Liberia
.ng Nigeria
.gw Guinea-Bissau
.ly Libyan Arab
.nu Niue
.gy Guyana
Jamahiriya
.nf Norfolk Island
.ht Haiti
.li Liechtenstein
.mp Northern Mariana
.hm Heard and
.lt Lithuania
Islands
McDonald Islands
.lu Luxembourg
.no Norway
.va Holy See (Vatican
.mo Macau
.om Oman
City State)
.mk Macedonia
.pk Pakistan
.hn Honduras
.mg Madagascar
.pw Palau
.hk Hong Kong
.mw Malawi
.ps Palestine
.hu Hungary
.my Malaysia
.pa Panama
.is Iceland
.mv Maldives
.pg Papua New Guinea
.in India
.ml Mali
.py Paraguay
.id Indonesia
.mt Malta
.pe Peru
.ir Iran
.mh Marshall Islands
.ph Philippines
.iq Iraq
.mq Martinique
.pn Pitcairn
.ie Ireland
.mr Mauritania
.pl Poland
.im Isle of Man
.mu Mauritius
.pt Portugal
.il Israel
.yt
.pr Puerto Rico
.it Italy
.mx Mexico
.qa Qatar
.jm Jamaica
.fm Micronesia
.re Reunion
.jp Japan
.md Moldova
.ro Romania
.je Jersey
.mc Monaco
.ru Russia
.jo Jordan
.mn Mongolia
.rw Rwanda
.kz Kazakhstan
.ms Montserrat
.kn Saint Kitts and
.ke Kenya
.ma Morocco
Nevis
.ki Kiribati
.mz Mozambique
.lc Saint Lucia
.kp Korea, Democratic
.mm Myanmar
.vc Saint
People's Republic of
.na Namibia
the Grenadines
.kr Korea, Republic of
.nr Nauru
.ws Samoa
.kw Kuwait
.np Nepal
.sm San Marino
.kg Kyrgyzstan
.nl The Netherlands
.st Sao Tome and
.la Lao People's
.an Netherlands Antilles
Principe
Democratic Republic
.nc New Caledonia
.sa Saudi Arabia
.lv Latvia
.nz New Zealand
.sn Senegal
.lb Lebanon
.ni Nicaragua
.sc Seychelles
Mayotte
Vincent
and
137
.sl Sierra Leone
.ch Switzerland
.sg Singapore
.sy Syrian
.sk Slovakia
Republic
.us United States
.si Slovenia
.tw Taiwan
.um United States Minor
.sb Solomon Islands
.tj Tajikistan
Outlying Islands
.so Somalia
.tz Tanzania
.uy Uruguay
.za South Africa
.th Thailand
.su USSR (former)
.gs South Georgia and
.tg Togo
.uz Uzbekistan
the South Sandwich
.tk Tokelau
.vu Vanuatu
Islands
.to Tonga
.ve Venezuela
.es Spain
.tt Trinidad and Tobago
.vn Vietnam
.lk Sri Lanka
.tn Tunisia
.vg Virgin Islands British
.sh St. Helena
.tr Turkey
.vi Virgin Islands U.S
.pm St. Pierre and
.tm Turkmenistan
.wf Wallis and Futuna
Miquelon
.tc The Turks & Caicos
Islands
.sd Sudan
Islands
.eh Western Sahara
.sr Surinam
.tv Tuvalu
.ye Yemen
.sj Svalbard and Jan
.ug Uganda
.yu Yugoslavia
Mayen Islands
.ua Ukraine
.cd Zaire
.sz Swaziland
.ae United Arab
.zm Zambia
.se Sweden
Emirates
.zw Zimbabwe
.gb United Kingdom
Arab
.uk United Kingdom
139
Annexure D: Internet Service Providers in some Commonwealth Countries
This is not an exhaustive list.
Bahamas
Fax: 88-02-863357 E-mail [email protected],
[email protected]
IBM Bahamas Ltd.
P.M.B. SS-6400
Zakaria Swapan
Nassau, Bahamas
Proshika Computer Systems
Contact: Kenneth Bethel
Proshika Bhaban
Phone: (809)322-2145
i/I-Ga, Sec-2. Mirpur
Fax: (809)322-4649
Dhaka 1216, Bangladesh
E-Mail:
Phone: +880-2-809003
[email protected]
Fax: +880-2-805811
E-mail: [email protected]
Barbados
Drik Picture Library Ltd
CaribSurf Internet Services
House 58, Road 15A (New)
Barbados External
Dhanmondi RA, Dhaka
Telecommunications Ltd.
Bangladesh
Tel :(809) 427-5200
Phone: 812954, 328332 (24 hrs)
Fax: 880 2 863470, 867647
Sunbeach Internet Service
Shahidul Alam (Director)
Barbados / BIOS, Inc.
[email protected]
Tel: (246) 426-4638
Bermuda
Bangladesh
Internet Bermuda Ltd
AGNI BBS Nawab Kabir
Tel (441) 296 1800
2nd Floor, Faridpur Mansion,
75-76 Kakrail Road, Dhaka 1000.
Botswana
Phone: 880-2-833984
BBS: 880-2-887346, 880-2-882379, 880-2-
URLICC Independent Computer
885984, 880-2-871088
Consultancy
E-Mail: [email protected]
Telephone 030-7796
Fax 030-7796
BRAC-BDMaiI Network
Email [email protected]
G. P. 0. Box: 2142, Dhaka 1000,
Bangladesh.
HealthNet
Tel : 838674
Tel 226 306655
140
Fax 226 310477
E-mail [email protected]
Grenada
http://healthnet.org/bots.Html
Grenada National College Tanteen
InfoBW
St. George’s Grenada
Tel 267 318444
Tel (809) 440-2652
Fax 267 318555
E-mail: [email protected]
E-mail: [email protected]
http://www.info.bw
Grenada Telecommunications Ltd.
(GRENTEL)
SADC
St. George’s Grenada
Tel 267 318444
Tel: 809-440-1000
Fax 267 372848
Fax: 809-444-4843
E-mail: [email protected]
E-mail: [email protected]
Fiji
Guyana
Datec Pty Ltd.
Sustainable Development Networking
Tel: +679 314411
Programme (Guyana)
http://www.datec.com.au
Tel + (592-2) 75723
E-mail: [email protected]
Telecom Fiji Ltd.
Tel: +679 210351
University of Guyana,
http://www.is.com.fi
Computer Studies
Tel: +(592) 2-63691
Cameroon
Fax: +(592) 2-54885
E-mail: [email protected]
ORSTOM
Tel 23720 1508
CompuWorks MultiMedia Ltd.
Fax 237201854
CARLTON
E-mail [email protected]
TEL: (876) 929-1048
Centre for Health Tech(CHT)
InfoChannel Ltd.
Tel 2372301 13
Tel: (876) 978-2960
Fax 237 230103
E-mail [email protected]
Jamaica
Ghana
Jamaica Online Information
Services Ltd.
Network Computer Systems
CARLTON, MONTROSE
TEL 021 220622021 772279
TEL: (876) 960-8209 978-2490
E-mail : [email protected]
141
Kenya
Jaring
Tel: +60 3-2549601
NairobiNet
http://www.jaring.My
TEL: +254 2-217406
http://www.nbnet.co.ke
Asia Connect Sdn Bhd
TEL: +60 3-2308818
Cyprus
http://www.asiaconnect.com.my
Cylink Information Services Ltd.
TEL: +357 2-317617 9-663844
Malta
http://www.cylink.com.cy
keyWORLD Internet Access
Harrisonburg.Comrk Nicosia
Service (ESI, Ltd.)
TEL:+ 1 540-8286696
TeL: +356 486199
http://www.harison.com
http://www.keyworld.net
Malaysia
Kemmunet Ltd.
TEL: +356 489002
Nasionet / Swiftcom Sdn. Bhd.
http://kemmunet.net.mt
Tel: +60 3-5821008
http://www.nasionet.net
Mauritius
Rakyat Jaya Sdn Bhd
Telecom Plus
Tel: +60 5-5458831
TEL:+230 2037272
http://www.rakyati.com
http://www.intnet.mu
Infonet Services Corp. (D)
Mozambique
TEL: +60 3-4416268
http://www.infonet.net
CIUEM
Tel 258 1 491 557
Malaysia Online
e-mail
Tel: +60 3-2014988
[email protected]
http://www.mol.net.my
http://www.uem.mz
Harrisonburg.Comrk
HealthNet
Kuala Lumpur
E-mail: [email protected]
Tel: + 1 540-8286696
http://www.healthnet.org/
http://www.harrisonburg.com
Namibia
GlobalOne Communications
Tel: +60 3-2626111
Internet World Wide Namibia
http://www.global-one.Net
Tel: +26461-250477
http://www.iwwn.com.na
142
NAMIDEF
GlobalOne Communications
Tel 264 641 610005
Tel: +64 9-3573700
Fax 264 644461004
http://www.global-one.net
E-mail [email protected]
http://www.net.na/
Deep South Networks, Ltd.
TEL: +64 3-4792078
New Zealand
http://www.deepsouth.co.nz
Cave Rock Software Ltd.
PowerLink Internet Services Ltd.
TEL: +64 3-3664242
TEL: +64 9-5255924
http://caverock.co.nz
http://www.powerlink.co.nz
Global NZ Ltd.
Net Ltd, The
TEL: +64 9-3660818
TEL: +64 647-8380066
http://www.global.co.nz
http://www.thenet.co.nz
NetLink
Manawatu Internet Services
TEL: +64 4-4955031 800-655465
TEL: +64 6-3562814
http://www.netlink.co.nz
http://www.manawatu.gen.zn
Internet Hawkes Bay
TEL: +64 6-8441488
http://www.inhb.co.nz
Web World Ltd.
TEL: +64 9-2782966
http://www.ww.co.nz
WINZ
TEL: +64 6-3709469
http://www.wiriz.co.nz
Internet Group Northland, Ltd.
TEL: +644-4381516
http://www.igrin.co.nz
Plain Communications, Ltd.
TEL: +64 3-3645888
http://www.plain.co.zn
Internet Company of New Zealand Ltd., The
TEL: +64 800-843638
http://www.iconz.co.zn
Taranaki NetSource
TEL: +64 6-7594638
http://www.netsource.co.nz
Southern Internet Christchurch
TEL: +64 3-3657059
http://www.southern.co.nz
Internet Group, Ltd.
TEL: +64 800-222225
http://www.ihug.co.nz
SineSuri Internet, Ltd.
TEL: +64 3764461
http://www.sinesurf.co.nz
Binary Brothers Ltd.
TEL: +64 9-3762202
http://www.bitz.co.nz
143
Wizkid Internet Ltd.
NetGate Communications Ltd.
Christchurch
TEL: +64 9-3023001
TEL: +64 3-373808
http://www.netgate.co.nz
http://www.wizkid.co.nz
South Net Ltd.
Voyager
VC: +64 3-2156163
TEL: +64 9-4439447
http://www.southnet.co.nz
http://www.voyager.co.nz
Pakistan
Wave Internet Services
TEL: +64 800-809283
Brain Computer Services
http://www.wave.co.nz
TEL: +92 42-7581126
http://www.brain.net.pk
Sky Surf Ltd.
TEL: +44 9-5206544
Singapore
http://www.skysurf.co.nz
Infonet Services Corp. (D)
Netbyte Internet Ltd.
VC: +65 7373889
TEL: +64 9-3094638
http://www.infonet.net
http://www.netbyte.co.nz
CyberWay Pte. Ltd.
NetAccess Internet Services, Ltd.
TEL: +65 8434833
TEL: +64 3-3488747
http://www.cyberway.com.sg
http://www.netaccess.co.nz
99com Pte. Ltd.
Interactive Internet
TEL: +65 2998055
TEL: +64 800-846327
http://www.99com.com.sg
http://www.ii.co.nz
GlobalOne Communications
TEL: +65 7374788
Earthlight Communications
http://www.global-one.net
TEL: +64 3-4790303
http://www.earthlight.co.nz
UUNet Technologies, Inc. /AlterDial
TEL: +1 703-206-5600 800-488-6383
Clear Communications, Ltd.
http://www.uu.net
TEL: +64 800-888800
http://www.clear.co.nz
Swiftech Automation Pte. Ltd.
TEL: +65 2744722
Globe.Net Communications Ltd.
http://www.swiftech.net.sg
VC: +64 800-401000
http://www.globe.co.nz
Affordable Access
TEL: +1 413-5870522
http://www.autonet.net
144
St Kitts and the Nevis
XPoint Internet Services
TEL: +27 231 -73777
CaribSurf Internet Services
http://www.xpoint.co.za
TEL: (809) 457-1901
http://www.caribsurf.com
Internet Solution, The
TEL: +27 11-4475566
St Vincent and the Grenadines
http://www.is.co.za
CaribSurl Internet Services
Smartnet
TEL: (869) 465-1000
TEL: +27 12-9985291
http://www.caribsurf.com
http://www.smartnet.co.za
Sri Lanka
CEWNet Internet Service Provider
TEL: +27 9491095 832-706838
Lanka Communications Services
http://www.cewnet.co.za
(Pvt) Ltd. TEL: +94 1-437545
http://www.lankacom.net
SANGONet / South African NGO Network
TEL: +27 11-8386943
Infonet Services Corp. (D)
http://www.wn.apc.org
TEL: +94 1-437545
http://www.infonet.net
South Africa Online
TEL: +27 31-3320640
South Africa
http://www.saol.com
Lanka Internet Services, Ltd.
TEL: ÷94 1-3430505
FutureNet
http://www.lanka.net
TEL: +27 331-428870
http://www.future.co.za
InfoDOOR
TEL: +27 11-4769424
South net
http://www.infodoor.co.za
TEL: +27 12-3424423
http://www.south.co.za
E.P. Web
TEL: +27 41-571702
lneterneXt Kimberley
http://www.epweb.co.za
TEL: +27 531-81 5570
Atlantic Internet Services (Pty) Ltd.
http://www.kimberly.co.za
TEL: +27 12-3420622
http://www.lantic.co.za
FastLight Data Distributor CC
TEL: +27 11-7060212 135-926102 12-
CyberServ CC
3772264
TEL: +27 16-9814525
http://www.fdd.net
http://www.cyberserve.co.za
145
Zanet Internet Services (Pty) Ltd.
Zomerlust Systems Design
TEL:+27 4650700
TEL: +27 21-641106
http://www.zanet.co.za
http://www.zsd.co.za
Internet Intertech (Pty) Ltd.
Gem Internet Co. Pty. Ltd. Cape Town
TEL: +27 11-3131215
TEL: +27 21-237023 11-7926083
http://www.ibi.co.za
http://www.gem.co.z
Dockside Internet
Infonet Services Corp. (D)
TEL: +27 21-41 86767
TEL: +27 11-2390000
http://www.dockside.net
http://www.infonet.net
Kingsley Technologies
M-Web Connect Pty. Ltd.
TEL: +27 21-262725
TEL: +27 12-4837100 800-032000
http://www.kingsley.co.za
http://www.mweb.co.za
Q Data Internet Ltd. (D)
Electronic Laboratory Services, CC
TEL: +27 11-2665111
TEL: +27 11-3580893
http://www.qdata.net
http://www.elab.co.za
Flashnet Internet Services
AlterNet
TEL: +27 82-9602012
TEL: +27 21-5105006
http://www.flashnet.co.za
http://www.alternet.co.za
Interweb Alley
Compuflex Networking CC
TEL: +27 11-4539914
TEL: +27 16-45531 03
http://www.interweb.co.za
http://www.compuflex.co.za
Planet Pinnacle
MD Systems (D)
TEL: +27 11-8026400
TEL: +27 11-4543760
http://www.pinnacle.co.za
http://www.mds.co.za
East Coast Access
Global Internet Access
TEL: +27 82-8881193
TEL: +27 11-8034024
http://www.eastcoast.co.za
http://www.global.co.za
GlobalOne Communications
TEL: +27 11-32255600
MegaWeb Internet Services cc
http://www.global.co.za
TEL: +27 11-4851984
http://www.megaweb.co.za
Acenet / Acetron (Pty) Ltd.
TEL: +27 11-4443311
http://www.acenet.co.za
146
Netline (Pty) Ltd.
CyberTwiga
TEL: +27 4774118
Tel 255-51-327-662
http://www.netline.co.za
Fax 255-51-865-799
E-mail: [email protected]
InterneXt
www.twiga.com
TEL: +27 57-3571184 4480362 51447371082-
ZACCOSERV
http://www.marques.co.za
Tel 255-54-32291
postmaster~znz.glcom.com
Online Welcome
TEL: +27 11-7912490
Trinidad and Tobago
http://www.onwe.co.za
Opus Network
NetActive Pty. Ltd.
PORT OF SPAIN
TEL: +27 11-4448999
TEL: (868) 625-5949
http://www.netactive.co.za
http://www.opus.co.tt
Networld
WOW. Net Ltd.
TEL: +27 21-4194430
Tel (868) 622-8865
http://www.new.co.za
http://www.wow.net
Club Internet (Pty) Ltd.
Carob-Link Ltd.
TEL: +27 11-3153476 12-47407513-
Tel (868) 628-9075
7501234
http://www.carib-link.net
http://www.lia.net
Uganda
Harrisonburg.Comrk
Cape Town, Durban,
COSTECH
Johannesburg
255-51-26211
TEL: +1 540-8286696
[email protected]
http://www.harrisonburg.com
HealthNet
Internet Connection
Tel 255-51-27081
TEL: +27 11-4476866 80-2121521
Fax 255-51-46163
http://www.icon.co.za
E-mail [email protected]
www.healthnet.org/
Tanzania
ZACCOSERV
Africa Online, Inc.
Tel 255-54-32291
Tel +255 51 -666983
[email protected]
http://www.africaonline.co.tz
147
Telecommunications Services of
HealthNet
Trinidad & Tobago, Ltd.
263-4-303211
TEL (868) 623-7840
[email protected]
http://www.tstt.net.tt
www.healthnet.org/zimbabwe.html
Interdev Ltd.
MANGO
TEL (868) 637-6862
Tel 263-4-737-301
http://www.trinidad.net
[email protected]
Uganda
Samara-Zim
Tel 263-4-708-05/9
Stardom Communications (U) Ltd.
Fax 263-4-708055
TEL +25641-343166
www.samara.co.zw
http://www.starcomm.co.ug
ZWZI MBIX
Vanuatu
Tel 263-4-303-211
Fax 263-4-732828
Datec Pty Ltd.
[email protected]
Tel +678 26933
http://www.datac.com.au
ESANET
Tel 2364 303 211
Telecom Vanuatu Ltd. (D)
E-mail [email protected]
Tel +678 22015
http://www.tvl.net.vu
IAFRICA Zim
Tel. 263-4-758-194
Zambia
Fax 263-4-758-197
E-mail [email protected]
Stardom Communications (U) Ltd.
Tel +25641-343166
PTC Zimbabwe
http://www.starcomm.co.ug
263-4-732-406
263-4-735-892
Zane Communication Systems, Ltd.
TEL: +260 1-290358
Stellar Systems
http://www.zamnet.zm
Tel 263-4-730-506
Fax 263-4-730-506
Zimbabwe
[email protected]
Internet Africa
Zl MTAP
TEL 04 75819404 758197
Tel 263-4-702-009
E-mail [email protected]
Fax 263-4-703-416
http://harare.iafrica.com/
[email protected]
148
149
Annexure E: Useful Websites
Universities and colleges
Colorado College Archives and Records Survey Project Manual http://www.cc.colarado.edu/Library/SpecialCollections/ArchiveProject/TOC.html
Edith Cowan University Archives and Records Management http://Liswww.fste.ac.cowan.edu.au/archives/
Glasgow University Archives and Business Records Centre http://www.arts.gla.ac.uk/Archives/arcbrc.htm
Heriot Watt University Archive, Records Centre and Historical Artefacts http://www.hw.ac.uk/archive/
Indiana University Electronic Records Project - http://www.indiana.edu/~libarche/
Monash University Department of Librarianship, Archives and Records http://dlar.fcit.monash.edu.au/
Oregon State University Archives http://www.orst.edu/dept/archives/ARMH/index.html
Syracuse University Archives and Records Management http://sumweb.syr.edu/archives/
University of Dundee Department of Archives and Manuscripts http://www.dundee.ac.uk/archives/
University of Illinois Archive Gopher Server gopher://musicbox.msc.jhu.edu:70/11/others/archives
University of Liverpool Archives - http://www.liv.ac.uk/~archives.home.htm
University of Warwick Library, Modern Records Centre http://www.warwick.ac.uk/services/Library/mrc/mrc.html
150
Standards organisations
American National Standards Institute (ANSI) - http://www.ansi.org/
Canadian Standards Association - http://www.csa.ca/
Digital Signature Standard - http://www.nist.gov/itl/csl/fips/fips/186.txt
International Standards Organisation (ISO) - http://www.iso.ch/welcome.html
National Fire Protection Association (NFPA) - http://llwww.nfpa.org/
Standards Australia - http://www.standards.com.au/
Professional organisations
ARMA International Home Page - http://www.arma.org/hq/
American Bar Association - http://207.49.1.6/home.html
Archives Association of British Columbia - http://www.harbour.com/AABC/
ASLI B - http://www.aslib.co.uk/aslib/
Association
for
Information
and
Image
Management
International
(AIIM)
-
(ACARM)
–
http://www.aiim.org
Association of Canadian Archivists - http://www.archives.ca/aca/index.html
Association
of
Commonwealth
Archivists
and
Records
Managers
http://www.acarm.org
Association of Records Managers and Administrators (ARMA) - http://www.arma.org
151
Australian Society of Archivists http://www.aa.gov.au/AA_WWW/ProAssn/ASA/ASA.html
Canadian Council of Archives - http://www.CdnCouncilArchives.ca/intro_e.html#top
Canadian Information and Image Management Society - http://www.ciims.ca/FID
Florida Records Management Association - http://www.frma.org/
International Council on Archives (ICA) – http://www.ica.org
International Records Management Trust – http://www.irmt.org
National
Association
of
Government
Archivists
and
Records
Administrators
-
http://www.nagara.org/
Northwest Archivists lnc. - http://www.orst.edu/Dept/archives/misc/nwa.html
PRISM: Professional Records Information Services Management http://www.prismintl.org/
Records Management Association of Australia (RMAA) - http://www.taunet.net.au/rmaa
Records Management lnstitute - http://www.dfait-maeci.gc.ca/rmi-igd.menu.htm
Records Management Society of Great Britain – http://www.rms-gb.org.uk
Scottish
University
Special
Collections
and
Archives
Group
(SUSCAG)
http://www.arts.gla.ac.uk/Archives/suscag.htm#
Society of American Archivists - http://www.archivists.org/
Society of Southwest Archivists - http://lib-04.lib.uh.edu/ssa/ssa.htm
The Academy of Certified Archivists - http://www.uwm.edu/Library/arch/aca/aca.htm
-
152
Government departments and organizations
Archives Authority of New South Wales - http://www.records.nsw.gov.au/
Arizona Department of Library, Archives and Public Records http://www.dlapr.lib.az.us/
Australian Archives - http://w.aa.gov.au/AA_WWW/AA_Home_Page.html
Australian Office of Government Information Technology - http://www.ogit.gov.au/
British Columbia Archives and Records Service http://www.bcars.gs.gov.bc.ca/bcars.html
California State Archives - http://www.ss.Ca.gov/archives/archives_home.htm
Delaware Public Archives - http://del-aware.lib.de.us/archives/
Department
of
Defence
(US)
Records
Management
Task
Force
-
Program
-
http://www.dtic.dla.mil/c3i/recmgmt.html
Department of Energy Records Management - http://www.metc.doe.gov/rm/
Environmental
Protection
Agency
-
National
Records
Management
http://www.epa.gov/nrmp/
Indiana State Archives - http://ai.org/icpr/index.html
Maryland State Archives - http://www.mdarchives.state.md.us
National Archives and Records Administration (NARA) - http://www.archives.gov
National Archives of Canada - http://www.archives.ca/
National Archives of Ireland - http://www.kst.dit.ie/nat-arch/
National Archives of Malaysia - http://arkib.gov.my/
153
National Archives of Singapore - http://www.museum.org.sg/nas/
Nevada State - Local Government Records Manual http://www.clan.lib.nv.us/docs/NSLA!RECORDS/recman.htm
Nevada State Library and Archives - http://www.clan.lib.nv.us/docs/NSLA/nsla.htm
New Hampshire Division of Records Management and Archives http://www.state.nh.us/state/archives.html
New York State Archives and Records Administration - http://unix6.nysed.gov/
Oak Ridge National Laboratory Records Management http://www.ornl.gov/records/home.html
Oregon State Archives - http://159.121.28.251/default.html
UK National Archives - http://www.nationalarchives.gov.uk
Public Record Office of Northern Ireland - http://proni.nics.gov.uk/index.htm
The Archives Authority of New South Wales http://www.records.nsw.gov.au/index.html
Utah State Archives - http://utstdpwww.state.Ut.us/~archives/
Information and Records Management (Generally)
Information management or records management?
A glossary of info-babble!
cares? - http://www.mlrsi.com/rickbarry/lMT-ARM1/IMT-ARM1.html
Records and Information Management - http://webcrafters.com/cgiwin/rmcnt.exe
Preservation Resources http://sunsite.berkeley.edu/Preservation/
Who
154
Electronic Records Management
Bibliography on Electronic Records - http://www.iis.pitt.edui@~nhprc/bibtc.html
Electronic Records Bibliography: Tom Ruller/Nancy McGovern http://http2.sils.umich.edu/HCHS/ERECS-Bib/bib.html
Resource References & Links: Administrative rule on Electronic Records –
http://useastpra.optiview.com/HTTP:/enterprise.state.wi.us/home/erecords/resource_ref_links.htm
Search Tools
Alta Vista - http://www.altavista.digital.com/
HotBot - http://www.hotbot.com/
Net Search - http://home.netscape.corn/home/Internet-search.html
Yahoo! - http://www.yahoo.com/
InterNIC - http://rs.internic.net/rs-internic.html
TIG Internet Domain-Name Database - http://horne.tig.com/cgi-bin/genobject/domaindb
Web Stuff
Farallon Home Page - http://www.farallon.corn/
Tribal Voice - http://www.tribai.com/
Welcome to Netscape - http://home.netscape.corn/
Web-Counter Home Page - http://www.digits.com/
Web-Counter Creation Page - http://www.digits.com/create.html
155
Windows95.corn Web Authoring Tools - http://www.windows95.com/apps/html.html
The Webmaster’s Guild http://www.thedaily.washington.edu/staff/martin/webrnasters.guild/
Webmaster’s Resource Center - http://www.cio.com/webmaster/wm_notes.html
Webreference.com[TM] - http://webreference.com/
The Web Masters’ Page - http://gagme.wwa.com/~boba/masters1.html
!Register-It! - Promote your Web Site! - http://www.register-it.com/
WebMaster Magazine - http://www.cio.com/WebMaster/
Welcome to Web Week Magazine – Online - http://www.webweek.com/
Home page of the IRC Chat client mlRC – lndex - http://www.mirc.co.uk/
Servers and IRC Networks you can use with mlRC - http://www.mirc.co.uk/servers.html
The mlRC pages - What is IRC - http://www.mirc.co.uk/irc.html
Search Worldwide White Pages - http://www.wyp.net/info/search/NA.html
Xenon Labs: The Universal Currency Converter - http://www.xe.net/currency/
USPS ZlP+4 Code Lookup - http://www.usps.gov!ncsc/lookups/lookup_zip+4.html
E-mail
E-mail Etiquette Guide - http://www.uwinnipeg.ca/~tss/tss/policy/etiquette.html
The Campaign to Stop Junk Email - http://www.mcs.com/~jcr/junkemail.htm
157
Annexure F: Bibliography
General
Grimes, G: 10 Minute Guide to the Internet and the World Wide Web, 2nd Edition, 1996.
HAHN, Harley: Teaches the Internet, 1999.
MacRae, K: Best Defence, Computer Active, Issue 3, March 2005.
Steemson M, The record keeping future, Records Management Bulletin, Issue No. 83,
1997 p.21.
Protocols
Internet
Technology
Overview,
June
1999
Chapter
30:
Internet
Protocols
http://www.cisco.com/univercd
How the UseNet News Protocols Works http://www.dsv.su.se
Definition and Types of Protocols http://gc.maricopa.edu
Types of Internet Protocols http://www.usg.edu
Internet History and Protocols http://webfccj.org
E-mail
How Does E-mail Work? http://www.library.yale.edu
Harness E-mail: How it Works http://www.learnthenet.com
Harness E-mail: Anatomy of an E-mail Message http://www.learnthenet.com
Harness E-mail: Step-by-step: Sending an E-mail Message http://www.learnthenet.com
Harness E-mail: Understanding E-mail Addresses http://www.learnthenet.com
158
A Beginner’s Guide to Effective E-mail http://www.webfoot.com
How E-mail Works http://www.howstuffworks.com
Everything E-mail http://everythingemail.net
Internet
Using the Internet http://www.sofweb.vic.edu.au
Enhancing Subject Area Expertise via the Internet http://oregonstate.edu
Advantages and Disadvantages of the Internet http://www.mc.edu
Advantages
and
Disadvantages
of
Using
the
Internet
for
Information
http://www.curriculumsupport.nsw.edu.au
How Does the Internet Work? http://www.fuzzylu.com/does/po2.htm
How Does the Internet Work?
http://www.theshulers.com/whitepapers/Internet_whitepaper.html
The History of the Internet http://www.daresite.com/webstation/net-history5/shtml
Internet Tutorials http://library.albany.edu/Internet/
World Wide Web
What is a Website? http://www.uic.edu/classes/cie/cie480/assign/website.htm
What is a Home Page? http://www.wou.edu
What is a Home Page?
http://english.ttu.edu/karos/2.2/features/refletions/help/pop7-54.htm
World Wide Web Definition http://www.mariosalexandrou.com/glossary.www.asp
159
World Wide Web (WWW) http://tekmom.com/buzzwords/zd.www.html
A Little History of the World Wide Web http://www.w3.org/History.html
How Web Servers Work http://computer.howstuffworks.com/webserver.htm
Build a Website http://www.learnthenet.com
What is an Active Server Page? http://www.takempis.com/asp1.asp
Those Dark Hiding Places: The Invisible Web Revealed
http://library.rider.edu/scholarly/rlackie/Invisible/Inv_Web_Main.html
The Deep Web: Surfacing Hidden Value
http://brightplanet.com/technologu/deepweb.asp
Search Engines
Search Engines http://ascsitedesign.com/promotionpopup.htm
Search Engines http://sweb.uky.edu/~wivang00/sayre/games.htm
How Does a Search Engine Work?
http://hhd.csun:edu/shelia/searchpolsummer/mollyr/tsbl004.htm
The Spider’s Apprentice http://www.monash.com/spidap4.html
Search Engines: What They Are, How They Work and Practical Suggestions for Getting
The Most Out of Them http://www.webreference.com/content/search
Definition of a Search Engine
http://academics.smcvt.edu/sburks/Definition_search_engine.htm
How Search Engines Work
http://searchenginewatch.com/webmasters/article.php/2168031
160
Tips on Popular Search Engines
http://www.hamline.edu/administration/libraries/bush/handouts/slahandout.html
Multi-subject Guides to Specialised Search Engines http://www.searchability.com
A Grab Bag of (Mainly) Free Bibliographies and Bibliographic Databases on the Web
http://www.leidenuniv.nl/ub/biv/freebase.htm
Search Engine Robots That Visit Your Website
http://www.javasoft.com/searchengines/webots.html
URLs
URL Definition http://www.edragste.com/help/urldefinition.htm
Recommended Uniform Resource Locator (URL) Reading
http://www.learnthat.com/define/u/url.shtml
Browsers
Web Browser Definition http://www.marketingterms.com/dictionary/webbrowser
Web Browser http://www.atis.org/tgzk/_web_browser.html
Web Browser
http://www.sucessfulonline.com/soe2002/attendee/glossare/web_browser.htm
Web-History Browsers http://livingInternet.com/w/w1_browser.htm
Intranet
Intranet vs Extranet http://pigseye.kennesav.edu/~adp2681/advantage.html
Disadvantages of Intranets
http://filebox.vt.edu/users/cyhiggin/Debate1/disadvantages.htm
Art, Geeks and Power Plays: How to Build Your Intranet
161
http://www.strom.com/pubwork/forbes896.html
Intranet http://www.higherweb.com/497/html/intranet.html
Equipment
Master the Basics: Making Connections http://www.learnthenet.com
How to Connect to the Internet and World Wide Web
http://www.centerspan.org.tutorial/www.htm
Basic Equipment Used in the Structure of the Internet
http://cs4.uhh.hawaii.edu.acs/recommended_equipment_required_to_connect
Master the Basics: About Modems http://www.learntheweb.com
Searching
Research Guides: Boolean Search Tips
http://www.iscc.flu.us/library/guides/boolsea.htm
Boolean Searching on the Internet http://library.albany.edu/Internet/boolean.html
Finding Information on the Internet: A Tutorial
http://www.lib.berkeley.edu/teachinglib/guides/Internet
Evaluating Web Resources
http://wwwz.widener.edu/Wolfgram-Memorial-Library/webevaluation/
Bare Bones 101: A Basic Tutorial on Searching the Web
http://www.sc.edu/beaufort/library/pages/bones.shtml
Domain Names
Domain Name System – Domain Names http://www.livinginternet.com
Where is all the Internet Domain Names Registered and Maintained?
162
http://www.howstufworks.com/question422.htm
Invisible Web
Noodle Tools: Choosing Invisible Web Databases
http://www.noodletools.com/debbie/literacies/information/5locate/advicedepth.html
The Invisible Web http://www.weblens.org/invisible.html
Internet Service Providers
What to expect from your ISP
http://www.computer-telecommunications.com/isps.htm
HTML
A Beginners Guide to HTML
http://archive.ncsa.uiuc.edu/General/Internet/WWW/HTMLPrimer.html
Instant Messaging
How Instant Messaging Works
http://www.howstuffworks.com/instant-messaging.htm
Instant Messaging http://webopedia.internet.com/TERM/:/intstant-messaging.html
Blogs and Wikis
WHG Web hosting Glossary: Blog http://www.marketingterms.com/dictionary/blog
What is Wiki? http://wiki.org/wiki.cgi?WhatIsWiki
Wiki History http://c2.com/cgi/wiki?WikiHistory
Our Favourite Technology Blogs
http://whatis.techtarget.com/definition0,,sid9_gci884512.0.html
Operation of a Large Scale: General Purpose Wiki Website
163
http://aronsson.se/wikipaper.html
Why Wikis Works http://C2.com/cgi/wiki?WhyWikiWorks
Hacking
What is a Hacker? http://www.interhack.net/hacker.html
Definition of a Hacker http://www.chiark.greenend.org.uk/~pmaydell/hacker.html