Skip to main content

Search Engine

                                     Search Engine

  1. Search Engine:

                  The search engine is computer program or software system  which allows to find the information  on World Wide Web.
      Ex. Google,Yahoo, bing etc
                 In this digital world we are using most of time this search engines.But we have no idea about how the search engine works?

     2.How the search engine works?

                 Each search engine works in three main steps.
                     i)Crawling
                    ii)Indexing
                   iii)Ranking

     i)Crawling:

                   In general crawling means babies are move forward on the hands and knees or by dragging the body close to the ground.This is the first step  of baby for standing up like this crawling is same first step of search engine.
                   Crawling is a process which search engine discover the web pages,sites,dead links etc.
The web crawler is also called a spider or google bot.Which hunts the website on the internet.

      ii)Indexing:

                  The next step of web search is Indexing.
                   The information which identified by the crawlers needs to be organized,sorted and stored so that it can be processed by the search engine algorithms,before made available to the end user.
                  This process is called Indexing.


       iii)Ranking:

                  Ranking is the last step.Search engine decides which pages show to in your results.What the order of this result? Its achieved using the ranking algorithms.


               Search engine is complex computer program.And its works in just few seconds.The amount of data they have to digest its enormous and the process is completed automated.
                                         
               Getting a tiny share of the overall this.
























                                        

Comments

  1. Osmm ...I would like to know how to search in technical way and get the perfect info

    ReplyDelete
  2. Osmm ...I would like to know how to search in technical way and get the perfect info

    ReplyDelete

Post a Comment

Popular posts from this blog

Piconet and Scatternet

                                 Piconet and Scatternet         Transfer a data to various people  its become most important now a days. There are a lots of methods are available to  share to data or transfer to data.But I explain here about the Bluetooth  Piconet and Scatternet. Piconet:           Piconet gets its name fro the world "pico". Pico means a very small.         A piconet is nothing but small network. Using this network we can share the data or transfer the data .Its one ad-hoc network.Which links a wireless user group of devices,using Bluetooth  technology.         Piconet is formed at least two devices such as portable PC and a cellular phone to connect. Ad maximum 8 to need to make this network.When network is established, one device act as master and other as salve.                 A piconet sometime called as PAN. Because its range just 10 Meter.    2. Scatternet:          Scatter means in various direction.          Sca

Basic Network Concepts

                           Basic Network Concept (Part 1) What is Network?  Network is two or more peoples or systems want to communicate with each other. Another  way  we can say, network is any interconnection of two or more stations that wish to communicate with each other.    2. Computer Network Computer network is connection of computers the are interconnected with each other using a single technology. In computer network not only computers are connected with each other . The resources like a printer,scanner etc.and connecting device like hub, switch also connected with each other. These interconnected device are able to the communicate with each other means share a files,folders or exchange the information.   3. Components required for Networking: For networking two types of component are required:                          Software components                         Hardware components  Software Components:        Protocol           Operati

Dumpster Diving

                                     Dumpster Diving        Attacker does not launch their attack without any information. This information gets from targets trash.        If attacker gets the information from the targets trash is called Dumpster Diving.Its belongs to the Social Engineering.      In the dumpster diving the attacker search the small data in trash and it get very sticky information like a pin number,username,password etc,.       In computer security dumpster diving is like a dumping. That means the rubbish unwanted waste,unwanted materials etc,.           How to avoid Dumpster Diving? Avoid throwing sensitive information in the trash. Company should have some polices about to destroy trash. Company should contain trash container.