Types of browsers, Basic Computer Science

Assignment Help:

Types of Browsers:

Line Mode Browsers: The initial browsers were line mode text browsers. These browsers were simple and used to display text line by line. They used to provide command line interface to the user on a less sophisticated computers and terminals. These browsers provided fast access to websites as they displayed only the text part. Lynx is a line mode browser.

Graphical User Interface based Browsers: These browsers run under graphic user interface systems such as Windows, Macintosh etc. A graphical browser, in addition to text can handle  images, audio, video and animation. These browsers are very easy to use - You just need a point and click device like mouse. They have good display features. 

Java enabled web browsers: These browsers include a Java Runtime Environment that support Java programming language. These browsers can dynamically load java applet from web  server to web  client.  These  browsers  are portable, extensible and secure. The example of java enabled browser is -LOBO?. It is open source software written completely in java.  


Related Discussions:- Types of browsers

Identify the critical races, 1. The standard way for debuggers to plant bre...

1. The standard way for debuggers to plant breakpoints in a program in RAM (whatever the processor instruction set) is to save the breakpointed instruction and replace it by a jump

Satellite transmission, Satellite Transmission: Satellites use microwa...

Satellite Transmission: Satellites use microwave frequencies and techniques. Satellites used for message transmission (as opposed to those, which travel around the earth on st

Erp components, What constitutes ERP? ERP typically comprises a client ...

What constitutes ERP? ERP typically comprises a client server architecture, fourth generation language, RDBMS and graphical user interface in an open systems environment. It

Php, Which of the following is NOT a type of SQL constraint?

Which of the following is NOT a type of SQL constraint?

Define Program formation process, For the formation of a program it is nece...

For the formation of a program it is necessary to follow five steps: Design of the algorithm, stage the problem to be solved is reputable and the best solution is proposed, creatin

Differentiate the client–server and peer-to-peer models of d, The client-se...

The client-server model firmly differentiates the roles of the client and server. According to this model, the client requests services that are provided by the server. The peer-to

Indexing and abstracting databases, Indexing and Abstracting Databases: ...

Indexing and Abstracting Databases: A study of growth of indexing and abstracting services over the years would show that during the past two centuries, these services have be

Cop2505, Create a program that uses a menu with options to enter student in...

Create a program that uses a menu with options to enter student information (name, ID, GPA), print student information, or quit the program. Use data files and FILE pointers to sto

Explain TCP and UDP features in detail and compare, Which applications requ...

Which applications require TCP and why? Also specify which applications require UDP and why? A4) TCP is also known as connection-oriented: setup required between client and server

Describe 3 components of a pattern, QUESTION (a) Compare the adapter pa...

QUESTION (a) Compare the adapter pattern with the façade and decorator patterns. (b) Illustrate a two-way adapter pattern. (c) Describe 3 components of a pattern. (d)

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd