+ All Categories
Home > Education > class 10 IT Reader

class 10 IT Reader

Date post: 23-Jun-2015
Category:
Upload: harini-gunasekaran
View: 572 times
Download: 5 times
Share this document with a friend
Description:
cbse 10 IT reader
147
Information Information Level 2 Students Handbook Class X 2013-2014 Technology CENTRAL BOARD OF SECONDARY EDUCATION Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India
Transcript
Page 1: class 10 IT Reader

Information Information Level 2

Students Handbook

Class X

2013-2014

Technology

CENTRAL BOARD OF SECONDARY EDUCATIONShiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

Page 2: class 10 IT Reader
Page 3: class 10 IT Reader

Inform

ation

Technolog

y Level -2

CLASS

X

Students Handbook

2013-2014

Information Information Level 2

Technology

CENTRAL BOARD OF SECONDARY EDUCATIONShiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

Page 4: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

Information Technology Level - 2Students Handbook - Class X

PRICE:

First Edition 2013, CBSE, India

Copies:

Published By : The Secretary, Central Board of Secondary Education,

Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092

Design, Layout : Multi Graphics, 8A/101, WEA Karol Bagh, New Delhi-110005

Phone: 011-25783846

Printed By :

"This book or part thereof may not be reproduced byany person or agency in any manner."

Page 5: class 10 IT Reader

Hkkjr dk lafo/ku

ewy dÙkZO;

mísf'kdk1ge] Hkkjr ds yksx] Hkkjr dks ,d lEiw.kZ ¹izHkqRo&laiUu lektoknh iaFkfujis{k yksdra=kkRed x.kjkT;º cukus ds fy,] rFkk

mlds leLr ukxfjdksa dks%

lkekftd] vkfFkZd vkSj jktuSfrd U;k;]

fopkj] vfHkO;fDr] fo'okl] /eZ

vkSj mikluk dh Lora=krk]

izfr"Bk vkSj volj dh lerk

izkIr djkus ds fy,

rFkk mu lc esa O;fDr dh xfjek2vkSj ¹jk"Vª dh ,drk vkSj v[kaMrkº

lqfuf'pr djus okyh ca/qrk c<+kus ds fy,

n<+ladYi gksdj viuh bl lafo/ku lHkk esa vkt rkjh[k 26 uoEcj] 1949 bZñ dks ,rn~ }kjk bl lafo/ku dks vaxhÑr]

vf/fu;fer vkSj vkRekfiZr djrs gSaA1- lafo/ku (c;kyhloka la'kks/u) vf/fu;e] 1976 dh /kjk 2 }kjk (3-1-1977) ls ¶izHkqRo&laiUu yksdra=kkRed x.kjkT; ds LFkku ij izfrLFkkfirA

2- lafo/ku (c;kyhloka la'kks/u) vf/fu;e] 1976 dh /kjk 2 }kjk (3-1-1977) ls ¶jk"Vª dh ,drk ds LFkku ij izfrLFkkfirA

Hkkx 4 d

51 d- ewy dÙkZO; & Hkkjr ds izR;sd ukxfjd dk ;g dÙkZO; gksxk fd og &

(d) lafo/ku dk ikyu djs vkSj mlds vkn'kksZa] laLFkkvksa] jk"Vªèot vkSj jk"Vªxku dk vknj djs_

([k)Lora=krk ds fy, gekjs jk"Vªh; vkanksyu dks izsfjr djus okys mPp vkn'kksZa dks ân; esa latks, j[ks vkSj mudk ikyu djs_

(x)Hkkjr dh izHkqrk] ,drk vkSj v[kaMrk dh j{kk djs vkSj mls v{kq..k j[ks_

(?k)ns'k dh j{kk djs vkSj vkg~oku fd, tkus ij jk"Vª dh lsok djs_

(Ä)Hkkjr ds lHkh yksxksa esa lejlrk vkSj leku HkzkrRo dh Hkkouk dk fuekZ.k djs tks /eZ] Hkk"kk vkSj izns'k ;k oxZ ij vk/kfjr lHkh

HksnHkko ls ijs gksa] ,slh izFkkvksa dk R;kx djs tks fL=k;ksa ds lEeku ds fo#¼ gSa_

(p)gekjh lkekfld laLÑfr dh xkSjo'kkyh ijaijk dk egÙo le>s vkSj mldk ifjj{k.k djs_

(N)izkÑfrd i;kZoj.k dh ftlds varxZr ou] >hy] unh] vkSj oU; tho gSa] j{kk djs vkSj mldk lao/Zu djs rFkk izkf.kek=k ds izfr

n;kHkko j[ks_

(t)oSKkfud nf"Vdks.k] ekuookn vkSj KkuktZu rFkk lq/kj dh Hkkouk dk fodkl djs_

(>)lkoZtfud laifÙk dks lqjf{kr j[ks vkSj fgalk ls nwj jgs_

(×k)O;fDrxr vkSj lkewfgd xfrfof/;ksa ds lHkh {ks=kksa esa mRd"kZ dh vksj c<+us dk lrr iz;kl djs ftlls jk"Vª fujarj c<+rs gq, iz;Ru

vkSj miyfC/ dh ubZ mapkb;ksa dks Nw ys_1(V);fn ekrk&firk ;k laj{kd gS] Ng o"kZ ls pkSng o"kZ rd dh vk;q okys vius] ;FkkfLFkfr] ckyd ;k izfrikY; ds fy;s f'k{kk ds

volj iznku djsA

1- lafo/ku (N;klhoka la'kks/u) vf/fu;e] 2002 dh /kjk 4 }kjk (12-12-2002) lsa var% LFkkfirA

Page 6: class 10 IT Reader

THE CONSTITUTION OF INDIA

PREAMBLE

1WE, THE PEOPLE OF INDIA, having solemnly resolved to constitute India into a [SOVEREIGN

SOCIALIST SECULAR DEMOCRATIC REPUBLIC] and to secure to all its citizens :

JUSTICE, social, economic and political;

LIBERTY of thought, expression, belief, faith and worship;

EQUALITY of status and of opportunity; and to promote among them all 2FRATERNITY assuring the dignity of the individual and the [unity and integrity of the Nation];

IN OUR CONSTITUENT ASSEMBLY this twenty-sixth day of November, 1949, do HEREBY ADOPT,

ENACT AND GIVE TO OURSELVES THIS CONSTITUTION.

THE CONSTITUTION OF INDIA

Chapter IV A

FUNDAMENTAL DUTIES

ARTICLE 51A

Fundamental Duties - It shall be the duty of every citizen of India-

(a) to abide by the Constitution and respect its ideals and institutions, the National Flag and the National Anthem;

(b) to cherish and follow the noble ideals which inspired our national struggle for freedom;

(c) to uphold and protect the sovereignty, unity and integrity of India;

(d) to defend the country and render national service when called upon to do so;

(e) to promote harmony and the spirit of common brotherhood amongst all the people of India transcending religious, linguistic and regional or sectional diversities; to renounce practices derogatory to the dignity of women;

(f) to value and preserve the rich heritage of our composite culture;

(g) to protect and improve the natural environment including forests, lakes, rivers, wild life and to have compassion for living creatures;

(h) to develop the scientific temper, humanism and the spirit of inquiry and reform;

(i) to safeguard public property and to abjure violence;

(j) to strive towards excellence in all spheres of individual and collective activity so that the nation constantly rises to higher levels of endeavour and achievement;

1(k) who is a parent or guardian to provide opportunities for education to his/her child or, as the case may be, ward between age of six and forteen years.

1. Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "Sovereign Democratic Republic” (w.e.f. 3.1.1977)

2. Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "unity of the Nation” (w.e.f. 3.1.1977)

1. Ins. by the constitution (Eighty - Sixth Amendment) Act, 2002 S.4 (w.e.f. 12.12.2002)

Page 7: class 10 IT Reader

Inform

ation

Technolog

y Level -2

The national curriculum Framework, 2005, recommends that children’s life at school must

be linked to their life outside the school. This principle make a departure from the legacy of

bookish learning which continues to shape our systems and caused a gap between the

school home, community and the workplace.

The student workbook on information Technology (IT) is a part of qualification package

developed for the implementation of National Vocational Education Qualification

Framework (NVEQF), an initiative of Ministry of Human Resource Development (MHRD),

Government of India to set common principles and guidelines for a nationally recognised

qualification system covering the school’s vocational education and training institutions,

technical education institutions, college and universities. It is envisaged that the NVEQF

will promote transparency of qualifications, cross-sect oral learning, student

qualifications, thus encouraging life-long learning.

This student workbook, which forms a part of vocational qualification package for

student’s who have passed class IX or equivalent examination, was created by group of

experts. The IT-ITes skill development council approved by the national occupation

standards (NOS). The national occupation standards are a set of competency standards

and guidelines endorsed by the representatives of IT industry for recognized and

assessing skills and assessing skills and knowledge needed to perform effectively in the

workplace.

The CBSE has developed materials (units) for the vocational qualification package in

IT/ITes sector for NVEQF levels 1 to 4; level 2 is equivalent to class X. Based on Nos

occupation related core competencies (Knowledge, skills and abilities) were identified for

development of curriculum and learning modules (units).

This student workbook attempts to discourage rote learning and to bring about necessary

flexibility in offering of courses necessary for breaking the sharp boundaries between

different subjects areas. The workbook attempts to enhance this endeavour by giving

higher priority and space to opportunities for contemplation and wondering, discussion in

small groups and activities requiring hands on experience.

Any suggestions, feedback from the readers for improvement in the future editions of the

volume shall be heartily welcomed.

Vineet Joshi

Chairman, CBSE

Preface

Page 8: class 10 IT Reader
Page 9: class 10 IT Reader

Inform

ation

Technolog

y Level -2

Contents

Preface

Acknowledgement

1

23

40

62

79

103

o

o

o

o

o

o

Networking Fundamentals

Digital Documentation - Advanced Word Processing

Digital Data Analysis - Advanced Operations on Spreadsheet

Advanced Digital Presentation

Digital Content Creation - Web Designing Fundamentals (HTML)

Computer Systems Care

Page 10: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

Unit Code Unit Title

ITCC-201 Networking Fundamentals

Evolution of Networking and Need for Networking

Transmission of Data through different Switching Techniques

Data Communication Terminologies

Transmission Medium and Network Devices

Network Types and Layouts

ITDC-202 Digital Documentation - Advanced Word Processing

Reviewing and editing documents with Track Changes

Connecting Data from Spreadsheet with the Document using

Mail Merge Feature

Object Embedding and Linking

Language Correction

Securing Document

ITDC-203 Digital Data Analysis - Advanced Operations on Spreadsheet

Managing Multiple Spreadsheets and Workbooks

Organising and handling Spreadsheet Data

Creating Charts

Creating and Using Macros

Securing Spreadsheets

ITDC-204 Advanced Digital Presentation

Standardization of Slides

Multimedia Components in Presentation

Using Tables

Using Charts

Presentation Delivery

Securing Presentation

Page 11: class 10 IT Reader

Inform

ation

Technolog

y Level -2

ITDC-205 Digital Content Creation - Web Designing Fundamentals (HTML)

Basics of Webpage and HTML

HTML - Basic Tags

Paragraphs and Tables

Web Page Layout

Forms

Multimedia Content in WebPages

ITOC-206 Computer Systems Care

Hardware Safety and Security

Software Safety, Security and Care

Page 12: class 10 IT Reader

Inform

ation

Technolog

y Level -2

1.1 Evolution of Networking and Need for Networking

As you know, networking is widely used for accessing and sharing information;

examples include web browsing, downloading & uploading, file sharing, printer

sharing, etc. Today networking is popular with private and business users across the

globe.

In today's world, it can be extremely difficult to live without networks, since resource

sharing (printers, shared folders etc) and Internet connectivity have become an

integral part of our daily activities.

A computer network, often simply referred to as a network, is a collection of

computers and other hardware components interconnected by communication

channels that allow sharing of resources and information.

Networking is widely used for sharing of resources and information & for

communication purposes. Networks can also help in reducing costs; for example you

can buy a single printer and share it across multiple users.

Network consists of one or more computers or devices connected in order to provide

and access resources. Resources include a range of devices (example, Printer,

CDROM, Hard Drives, etc.) and services (example, web service, mail service, etc.).

Networks based on size are classified into LAN & WAN.

LAN: Local Area Network refers to group of computers networked within a

limited geographical area such as schools, colleges, offices, etc.

WAN: Wide Area Network refers to computers networked across geographical

areas, in other words they connect LAN's between different locations. For

example, computers or devices in a branch office could connect to the computer

networks at the head office through telephone lines or satellites.

This session introduces you to the basic fundamental concepts of networking and

Internet and using different types of Internet connection.

o

o

1

Networking Fundamentals

1Unit-

Page 13: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

2

There are several ways to form a network as listed below:

Use a cross-over cable (also referred to as Peer-to-peer cable)

Use Serial and Parallel ports

Use Bluetooth

Use Wi-Fi (for more than two computers)

Use Hub or Network Switch (for more than two computers)

SOHO Router or Wi-Fi Router (Commonly found in home & small business

networks)

Networks are designed using the following architecture:

Networks in which all computers have an equal status are called peer to peer

networks. Generally in such a network each terminal has an equally competent CPU.

Peer-to-Peer Network

Networks in which certain computers have special dedicated tasks, providing

services to other computers (in the network) are called client server networks.

The computer(s) which provide services are called servers and the ones that use

these services are called clients.

Client-Server Network

Note: Clients are referred to as "Service Requestors" and Servers as "Service Providers".

Any machine that request a service is called as the client and machines that fulfill the

requests is called the client.

Ways to form a computer Network

Peer-to-peer (P2P)

Client- Server

o

o

o

o

o

o

Page 14: class 10 IT Reader

Inform

ation

Technolog

y Level -2

3

Networks can have a combination of both Client/Server models and Peer-to-Peer.

For example, you may be using a centralized mail server and/or access files from

other machines in the network.

The Internet is a global system of interconnected computer networks that use the

standard Internet protocol suite to serve billions of users worldwide. It is a network

of networks that consists of millions of private, public, academic, business, and

government networks.

Internet is one of the most useful technologies of modern times which help us in our

daily, personal and professional life. Internet is widely used by students, educational

institutes; scientist and professionals to gather information for research and

general information. Businesses use the Internet to access complex databases

such as financial database. The Internet is the largest encyclopedia for all age

groups. The Internet helps in maintaining contact with friends and relatives

who live across different locations via Internet chatting systems and email

software. Internet is also becoming a major source of entertainment for the general

public.

Intranet refers to private computer network used by organizations for sharing

resources; Intranets can be simple within a building or very large spread across the

globe connected through various networking technologies. Intranets help employees

of an organization to locate information much faster resulting in increased

productivity. Though popularly referred to a company's internal website or portal,

Intranet usually employs other protocols such as POP3, SMTP, FTP, etc. and may even

offer a variety of services (you will read more about these in later sessions).

Extranet is a computer network used outside the Intranet. For example, an

organization may allow a vendor to view or access their resources such as their

internal website for updating a product catalog or training material. However, this is

highly restricted to Internet users (public). Extranets are usually accessed using

VPNs (you will read more about this protocol later).

World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a

Internet

Intranet

Extranet

World Wide Web

Page 15: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

4

system of interlinked hypertext documents accessed via the Internet. With a web

browser, one can view web pages that may contain text, images, videos, and other

multimedia, and navigate between them via hyperlinks.

Information is stored on web servers referred to as web pages are retrieved by using a

web browser such as Firefox on the local computer. A Web Browser is software used

to view websites and acts as an interface between the user and the World Wide Web.

A Web server is a computer that stores web sites and their related files for viewing on

the Internet.

Some of the advantages associated with networking are:

Data Sharing: One of the most important uses of networking is to allow the

sharing of data. Users can send text files, spread sheets, documents,

presentations, audio files, video files, etc. to other users.

Hardware Sharing: Hardware components such as printers, scanners, etc.

can also be shared. For example, instead of purchasing 10 printers for each user,

one printer can be purchased and shared among multiple users thus saving

cost.

Internet Access Sharing: You can purchase a single Internet connection and

share it among other computers in a network instead of purchasing multiple

Internet connection for each computer. This is very commonly found in

Internet café (browsing centres), schools, colleges, companies, etc.

Usage of network based applications such as web browsers, email clients,

chat application, audio & video calling, etc is another advantage.

Data can be transferred over a network using the following techniques:

Circuit Switching: In this method, a dedicated path is established between the

endpoints before the data is transferred. Once a dedicated path is established, no

other devices can use the circuit. Example: Dial-Up, ISDN.

Packet Switching: In this method, data is divided into blocks referred to as

packets. Multiple packets can be sent via different paths allowing more than two

devices to communicate at the same time. Modes of operation can be

connectionless or connection-oriented.

o

o

o

o

o

o

Data Transmission methods

Page 16: class 10 IT Reader

Inform

ation

Technolog

y Level -2

5

In connectionless mode, packets have source & destination address for

routing that may take different paths. Example: Ethernet, IP, UDP.

In connection-oriented mode, connection is defined (a virtual circuit is

created) before a packet is transferred. Packet switching supports variable

packet sizes. Example: X.25, Frame Relay, TCP.

Cell Switching: Cell switching method is similar to that of packet switching but

has a fixed size for the cells transmitting data. Cell switching is efficient when large

amounts of data need to transferred. Example: ATM.

Having talked of data transfer and the Internet, have you ever wondered how sitting

in one corner of the world, you get information from another distant area in a

few seconds?

In very simple language, let's see what happens to a piece of data, say a Web page,

when it is transferred over the Internet:

The data is broken up into bits of same sized pieces called packets.

A header is added to each packet explaining where the data has come from,

where it should end up and where it fits in with the rest of the packets.

Each packet is sent from computer to computer until it finds its destination.

Each computer on the way decides where next to send the packet. All

packets may not take the same route.

At the destination, the packets are examined. If any packets are missing or

damaged, a message is sent asking for them to be re-sent. This continues until

all packets have been received intact.

The packets are now reassembled into their original form. All this done in

seconds! To access the Internet, you need an active internet connection. You

need to gather and understand your requirement carefully before subscribing

to an internet connection plan. In this exercise, you will learn how to

choose an Internet connection.

Some of the common questions that help you in your decision are:

What is the purpose of getting this connection?

Will you use the connection regularly?

?

?

o

o

o

o

o

o

o

o

Data transfer on the Internet

Page 17: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

6

How much data will be downloaded on an average per month?

How much speed do you need?

What technology is available in your particular area?

What are the different plans available from the ISP?

Is there any limitation or catch for the selected plan?

To access Wi-Fi, you need an access point with an active Internet connection.

Usually when you subscribe to an Internet connection, the ISP provides options

to purchase or rent a Wi-Fi router that can act as both an internet connectivity

device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network

requires technical expertise; however, you can access the Wi-Fi network by

connecting to an access point that is already setup for use. On computers that run

Windows XP, you can view the list of wireless networks available by using the

following procedure:

Right-Click on the Wireless Icon in the system tray and Click View Available

Wireless Networks.

Windows XP will display the list of available Wi-Fi networks; you can choose any of

the connection from the list. Select by Double-clicking on the name displayed in

the list.

Note: You may be prompted to enter a password if the selected network is secure. You

will receive a confirmation that you are connected to a wireless network. Now the

system is ready to be used for network related applications such as Firefox, Chrome,

Skype, etc.

o

o

o

o

o

o

Page 18: class 10 IT Reader

Inform

ation

Technolog

y Level -2

7

In a network, communication happens between devices or computers through

electrical, optical or radio-wave signals. Methods of signaling are widely categorized

into baseband and broadband.

Baseband: Data is sent as digital signals by using entire bandwidth of the media

(Single Channel), supporting single communication at a time. Signals are sent

over co-axial, twisted pair or fiber optic cables. Baseband supports higher

transfer rates as compared to broadband; however, baseband is limited with

distance. Baseband uses TDM (Time Division Multiplexing) to send multiple

signals over a single cable. Example: Ethernet, Token Ring & FDDI.

Broadband: Data is send as analog signals by using portion of a bandwidth.

Broadband supports use of multiple signals at different frequencies (multiple

channels). Signals are split into channels by using FDM (Frequency Division

Multiplexing). Example: xDSL, where telephone lines are used for both voice

(telephone) calls and data (Internet connectivity).

Baseband vs. Broadband

Channel operation refers to the mode of communication between connected devices

or computers. Channel operation can be simplex, half-duplex or fullduplex. Simplex is

a one way communication, similar to that of a radio. Halfduplex is a two way

communication but only one way at a time, similar to that of a walkie-talkie. Full-

duplex is two way simultaneous communication (data can be received and sent at the

same time), similar to that of a telephone.

When multiple devices or computers are connected in a network, they use multiple

signals that are combined at the source and separated at the destination by use of a

Terminolgies and Technologies

Signaling Methods

Channel Operation

Multiple Signaling Methods

o

o

Single Channel

FrequencyFrequency

C1 C2 C

Page 19: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

8

technique called multiplexing. For multiplexing, a device called the multiplexer is

used for multiplexing / demultiplexing signals. Types of multiplexing include:

TDM (Time Division Multiplexing) is a method in which multiple signals are

combined and send over a single transmission media such as wires or radio

waves. This is achieved by use of time sharing; multiple signals are transmitted

for a defined amount of time in cycles. For example, a device sends and receives

signals every alternate second.

FDM (Frequency Division Multiplexing) is a method in which multiple signals

are transmitted at different frequencies. Multiple signals can be sent at the same

time over a single channel using this technique. For example, a device sends

multiple signals at the same time using different frequencies similar to that of a

radio (FM) or cable TV and the end device receives by tuning in to a particular

channel.

To use the Internet, you need an Internet connection. Internet connections are

provided by Internet Service Providers such as Bharat Sanchar Nigam Limited

(BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc.

An Internet service provider (ISP) is an organization which provides you with

access to the Internet via a dial-up (using modem) or direct (hard wired) or

wireless connection.

Choosing connectivity depends on the availability of a particular technology,

speed and connection type in your area. Usually small and medium business

users, home users use connectivity types such as DSL, cable modem, dial-up,

broadband wireless, WiMAX or 3G. Medium to large business users or customers

with more demanding requirements may use high speed connectivity such as

DSL (High Speed), ISDN, etc.

Á modem is a device that converts digital computer signals into a form (analog

signals) that can travel over phone lines. It also re-converts the analog signals back

into digital signals. The word modem is derived from its function MOdulator/

DEModulator.

o

o

Getting access to the Internet

Internet Service Provider

Modem

Page 20: class 10 IT Reader

Inform

ation

Technolog

y Level -2

9

Channel access methods refer to how devices communicate using a shared medium

such as bus networks, star networks, ring networks, hub networks & wireless

networks. When multiple devices or computers are used in a shared medium, a pre-

defined method of transmission needs to be defined. Channel access methods in

circuit switching networks include FDM, TDM, etc and in packet switching networks

include CSMA/CD, CSMA/CA, Token passing, etc.

Ethernet is a family of computer networking technologies for local area networks

(LANs) and has largely replaced competing wired LAN technologies. Ethernet

standard defines how communication happens between network interface cards,

hub, switches, repeaters, etc. Devices on Ethernet networks use frames or Ethernet

frames for communication. IEEE 802.3 standard defines the Media Access Control

(MAC) portion of the data link layer and the physical layer of the OSI model. Ethernet

protocols are covered by this standard.

CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as per IEEE 802.3

standard is a mechanism that defines how transmission takes place in a network.

Only one device in the collision domain may transmit at any one time, and the other

devices in the domain listen to the network before sending any packets in order to

avoid data collisions. Collisions also decrease network efficiency on a collision

domain. If two devices transmit simultaneously, a collision occurs, and both devices

device will wait for a random amount of time before attempting to transmit again.

Collision domains are found in a hub environment where each host segment connects

to a hub that represents only one collision domain and only one broadcast domain.

Modern wired networks use a network switch to eliminate collisions. By connecting

each device directly to a port on the switch, either each port on a switch becomes its

own collision domain (in the case of half duplex links) or the possibility of collisions is

eliminated entirely in the case of full duplex links. Collision domains are also found in

wireless networks such as Wi-Fi.; CSMA/CA is used in wireless networks.

Carrier sense multiple access with collision avoidance (CSMA/CA) is a network

multiple access method in which nodes attempt to avoid collisions by transmitting

Channel Access Methods

Ethernet

CSMA/CD

CSMA/CA

Page 21: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

10

only when the channel is sensed to be "idle". It is particularly important for wireless

networks, where the collision detection of the alternative CSMA/CD is unreliable due

to the hidden node problem.

Token passing is a channel access method where a signal called a token is passed

between nodes that authorize the node to communicate. The most well-known

examples are token ring and ARCNET.

When multiple computers or devices are connected in a network, signals can be

addressed as unicast, multicasts or broadcasts. Unicast refers to one-to-one

communication, for example signal is sent from one computer to another.

Multicast refers to one-to-may communication, for example signal from one

computer or device is sent to selective set of computers or devices. Broadcast refers

to one-to-all communication, for example single from one computer or device is sent

to all devices and computers in a network.

There are different types of Internet Connectivity available today; it can be widely

categorized into wired and wireless access. Following table is a summary of different

types of Internet connectivity categorized into wired and wireless:

Dial-Up Wired

DSL Wired

Cable Internet Access Wired

3G Wireless

WiMAX Wireless

Wi-Fi Wireless

Some of the commonly used Internet connectivity are:

Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities

of the public switched telephone network (PSTN) to establish a connection to an

Internet service provider (ISP) via telephone lines using a device called MODEM.

Users dial a particular number provided by the ISP and gain access to the Internet.

Token Passing

Addressing methods

Types of Common Internet Connectivity

Technology Type of Connectivity

Page 22: class 10 IT Reader

Inform

ation

Technolog

y Level -2

11

Dial-up connections are extremely slow and in most cases, it is replaced by a high

speed connection such as DSL or Cable Modem.

DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data

over wires of a local telephone network. DSL service is delivered along with wired

telephone service on the same telephone line. On the customer premises, a DSL

filter removes the high frequency interference, enabling simultaneous use of the

telephone and data transmission. For using a DSL connection, you need a DSL modem

and a subscription.

Cable Internet Access: Cable Internet Access is a form of broadband Internet access

that uses the cable television infrastructure. Cable Internet Access is provided

through existing cable TV networks; this is similar to DSL that is provided over

existing telephone lines.

3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and

mobile telecommunication services and networks. High-Speed Downlink Packet

Access (HSDPA) is 3G mobile telephony communications protocol that allows higher

data transfer speeds and capacity. If support for 3G is available on your mobile phone,

you can subscribe to the 3G connectivity with your ISP in order to get high speed

Internet connection on your phone.

WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless

communications standard designed to provide mobile broadband connectivity

across cities and countries through a variety of devices. WiMAX is a long range

system, covering many kilometres and is typically used where DSL or Cable

Internet Access cannot be used; this could be difficulty in laying out cables for home

or offices located in remote locations but need access to the Internet.

WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as

computers or mobile phones to exchange data wirelessly over a network, including

high-speed Internet connections. Wi-Fi devices such as personal computer,

smartphones, video game console, etc. can connect to a network resource such as

Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used

here cables cannot be run (such as old buildings, outdoor areas) to provide network

and Internet access. Wi-Fi can also be used where users require mobile connectivity.

Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically

for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid Wi-

Fi access to the Internet for their customers.

Page 23: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

12

Types of Cables for Internet

Twisted-pair Ethernet cables can be wired "straight-through" or "Crossover".

To connect a network interface card to a switch, hub or router, straight-through or

patch cables are used.

To connect similar devices (network interface card on computer to another network

interface on another computer, hub to hub or switch to switch), crossover cables are

used.

Fiber Optic: A fiber optic cable is a cable containing one or more optical fibers. Fiber-

Optic cables are ideal for transmitting data over very long distances at great speeds as

light is used for the medium for transmission. Fiber optic cables are not susceptible to

any EMI, Near-end Crosstalk (NEXT), or Far-end Crosstalk (FEXT).

Note that you require special network interface cards & network switch that support

the fiber optic interface which is usually expensive and common only in large

enterprise networks or locations that are susceptible to EMI such as factories that

use heavy machineries.

Fiber-Optic cables consist of a high quality glass or plastic strands and a plastic jacket

made of Teflon or PVC that protects the cable.

Two types of Fiber-Optic cable exist: Single-Mode Fiber (SMF) used for longer

distances and Multi-Mode Fiber (MMF) used for shorter distances. Signals are

transmitted as light signals from source to destination. Either LED or Laser is used. In

multi-mode fiber, light signals are transmitted in numerous dispersed path (single-

mode fiber use single light source) and making it un-suitable for long distance

transmissions.

1. Core, 2. Cladding, 3. Buffer, 4. Jacket Fiber Optic Cable

In some cases, plenum rated cables are used that have a special jacket to protect

against fire and emit less smoke than normal cables. However, this is rare and often

seen only in industrial or manufacturing sites.

Page 24: class 10 IT Reader

Inform

ation

Technolog

y Level -2

13

Network Hardware

On computers that have support for networking, a list of utilities is available to

configure and troubleshoot network related issues. Often referred to as TCP/IP

utilities, these utilities are bundled along with the operating system. Though the

names of the utilities could vary in spelling, the underlying function is almost the

same across operating systems. Given below is a list of utilities (with simple

description) You will learn more about them in later sessions.

IPCONFIG Internet Protocol Configuration Utility

GETMAC View MAC or Physical Address of an NIC

PING Test network connectivity

TRACERT Trace Route from source to destination

ARP Resolve IP address to MAC address

Host name View computer name or hostname

NETSTAT View TCP/IP statistics

Nbtstat View NetBIOS over TCP/IP statistics

Nslookup View DNS related information

Route View or modify routing table

Pathping Trace packets and view detailed packet information

Note: Use /? for additional help/syntax for each command listed here. For example to

know more about IPCONFIG, type IPCONFIG /?

Network devices such as NIC, hub, bridge, switch & routers are devices that help

computers to network and communicate. There are a variety of network devices

equipped with a wide range of functions.

Network cards are devices that connect computers to the network. Network cards are

both Layer 1 (Physical) & 2 (Data Link) devices as they provide physical access to the

medium and also provide physical addressing through the MAC Address.

TCP/IP Utilities

Network Interface Card (NIC)

Utility Description

Page 25: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

14

Network Interface Cards are available for desktop, laptop and server computers.

A variety of interface such as PCI, CardBus, USB are available today. Most desktops,

laptops, servers and motherboards have built-in NIC.

View Network Interface card installed on a computer

A hub is a device that connects multiple computers using a twisted-pair cable. Hubs

operate at Layer 1 (Physical). The number of computers that can be connected to a

hub depends on the number of ports available (typically 4 to 8). Whenever it receives

data from one port, the hub broadcast data to all the devices connected to it, leading

to collisions. Hence hubs are referred to as multiport repeaters. Since the evolution of

SOHO routers and network switches, hubs are rarely used and considered obsolete.

Bridge is a device that can connect network segments and separate network traffic

based on broadcasts. Bridges examine the frames and selectively transfer frames

according to their MAC address. Bridges operate at Layer 2 of the OSI Model.

Switch is a device that allows multiple computers to be connected using twisted pair

cable. Switches (operating at Level 2 - OSI) manage traffic based on MAC (Media

Access Control) addresses and are efficient in large networks. Switches are

intelligent as they can build a table of MAC Addresses of all the devices connected to

ports on the switch and create a virtual circuit for each attached device. Once a packet

is received, it is analyzed and forwarded to only the destined station with matching

MAC address based on the table.

Lab

Hub

Bridge

Switch

PCI Ethernet Card for use

in Desktops

Cardbus Ethernet Card for

use in older laptops

USB Ethernet Card

(USB Ethernet converter)

Page 26: class 10 IT Reader

Inform

ation

Technolog

y Level -2

15

Using switches can eliminate collision as each port in the switch acts as a collision

domain. Since switches isolate collision domains, they are referred to as multiport

bridges. When forwarding frames, switches use Store and forward, cut through,

Fragment free or Adaptive switching methods.

Unlike a hub that uses half-duplex communication, a network switch can send and

receive at the same time (full-duplex mode) resulting in faster performance.

Number of computers that you can connect to a switch depends on the number of

ports available (Typically 4 or 8 on SOHO switches designed for use in home and

small business networks and 8 - 32 or 64 on switches designed for use in an

enterprise network.). The networks can be extended by adding additional switches

usually cascaded from the primary switch. Switches designed for larger networks are

cascaded through a special port called the Uplink port.

Simple Small Office Home Office Network Setup

An Enterprise network with a variety of networking devices

Page 27: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

16

Categories of switches include:

Unmanaged switches are network switches used typically for homes or small

offices requiring no administrative configuration.

Managed switches are widely used in enterprise networks and ISP's. These need

to be configured by the network administrator before it is used in a network.

A single layer-2 network can be partitioned to create multiple distinct broadcast

domains, enabling data to be exchanged only between the computers within the

domain. This is referred to as VLAN or Virtual LANs. This is created for two primary

reasons:

to reduce collisions

to implement security.

For example if all the computers in an organization are connected to a single switch,

you can isolate them by creating VLAN's for each department resulting in restricted

access across departments with maximum access between computers within

departments. VLANs can be configured only on Managed switches.

Separate VLANs for marketing & finance team connected to a single switch

PoE describes a standardized system to provide electrical power supply through

Ethernet cables; generally, UTP cables carry only signals necessary for data

communication. Switches that have support for PoE are generally expensive and in

some cases only limited number of Ethernet ports are capable of supporting PoE.

Advantages of PoE include the ability to provide power up to 25 watts and distance

factor that allows devices to be connected up to 100 meters from the switch.

o

o

o

o

VLAN

Power over Ethernet

VLAN 1, Marketing Team VLAN 2, Finance Team

Page 28: class 10 IT Reader

Inform

ation

Technolog

y Level -2

17

Routers are Layer 3 devices that allow packets to be routed to different logical

networks. Routers can discover and transfer packets based on routing table that are

pre-determined or self-discovered. Routing tables are either managed by an

administrator by manually defining the routes or automated through special

configuration to exchange the routing tables with other routers on a logical network.

Most common type of routers includes the SOHO router used at home or small office

for sharing Internet connection; sophisticated routers are widely used in enterprise

networks and ISP's. Similar to SOHO switches, SOHO routers do not need to be

configured and routers designed for use in large networks require to be configured

before they can be used.

In general, a combination of several routers and switches are used in large networks.

Notable manufacturers of routers include Cisco, Nortel Networks, Avaya, HP, Dell,

Huawei, etc.

Routing is the process of selecting paths in a network when sending or receiving

packets across computers or devices. Imagine if you are planning to send a parcel to

someone; the parcel will travel through different offices, change routes if roadblocks

are detected and finally be delivered to the recipient. Similarly when you browse the

internet or send an email, packets take different routes (from your computer to your

ISP, from your ISP to the next ISP, etc.) until it reaches its destination.

Also referred to as a residential gateway, SOHO (Small Office Home Office) routers are

devices designed for use in small to medium sized networks. Most SOHO routers have

combinations of a switch, DSL or cable modem and an access point for Wi-Fi

connectivity. These devices are used for two primary purposes:

Connecting desktops & laptops across home or office.

Router

Routing

SOHO Router

o

SOHO Router Enterprise Router

Page 29: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

18

Sharing a single Internet connection across desktops & laptops.

Some models include support for connecting peripherals such as printers, USB hard

disk drives, etc. through USB ports.

Wireless network refers to a computer network that is not connected by any cables.

Typically Wireless networking is used where wired connectivity is not possible or

feasible due to technology costs or availability. Wireless telecommunications

networks are implemented and administered using a transmission system called

radio waves. This implementation takes place at the physical level (layer) of the OSI

model network structure.

Wireless personal area network (WPANs) interconnect devices within a

relatively small area usually within a person's reach. For example, usage of

Bluetooth to connect a mobile phone to a laptop.

Wireless metropolitan area network (WMANs) is a wireless network that

connects several wireless LANs. WiMAX is a type of Wireless MAN and is

described by the IEEE 802.16 standard.

Wireless wide area network (WWANs) is a wireless network that covers large

areas, such as one between neighboring towns and cities, or city and its suburbs.

This network can connect branch offices of business or function as a public

internet access system. The wireless connections between access points are

usually point to point microwave links using parabolic dishes on the 2.4 GHz

band, rather than Omnidirectional antennas used with smaller networks.

Omnidirectional antennas are types of antenna that radiates radio waves equally

in all directions. Omnidirectional antennas oriented vertically are widely used

for nondirectional antennas as they radiate equally in all horizontal directions.

Note: Though there are a variety of Wireless Networks, this course focuses only on

Wireless LAN.

Instant messaging (IM) is a form of communication over the Internet that offers an

o

o

o

o

Wireless Networking

Instant Messaging

Introduction to Wireless Networking, RF Communication

Types of wireless networks

Page 30: class 10 IT Reader

Inform

ation

Technolog

y Level -2

19

instantaneous transmission of text-based messages from sender to receiver. Most

instant messaging software include the option for performing file transfers,

audio chat, video calling and conferencing, sharing desktops, etc. apart from

standard text chat. Instant messaging software is widely used for personal and

commercial use. In this session, you will be introduced to the concept of instant

messaging, the steps to create an instant messaging account and also work with

instant messaging software.

Unlike email, instant messaging happens in real-time and the response from

participants can be spontaneous. Some instant messaging software allows users to

view messages received when they are not logged on. These are called "Offline

Messages".

For utilizing audio and video chat or conferencing, you need to have

microphones and headsets or speakers and web cameras so that users can talk or see

each other.

Key features of an instant messaging are as follows:

Text Messages can be sent to one or more person (Similar to SMS)

Audio calling and conferencing.

Video calling and conferencing.

File transfers (Not limited to documents, spread sheets, audio files, video

files, etc.)

Message history (Save messages for future reference).

Participants messaging to each other need to be signed in to the same instant

messaging software. To use instant messaging software, a user must have a

valid instant messaging account.

Instant messaging accounts differ in formats; some instant messaging software such

as Yahoo Messenger, Windows Live Messenger use email addresses for managing

the account and software such as Skype use standard names.

There are two kinds of instant messaging software - application based and Web

based.

o

o

o

o

o

Instant Messaging Account

Instant Messaging Services

Page 31: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

20

Application based instant messaging software is downloaded and installed on

user's computer. Some of the popular instant messaging software are:

Google Talk

Yahoo! Messenger

Skype

Windows Live Messenger

Rediff Bol, etc.

Web based instant messaging software is accessed using browsers such as

Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web

based instant messaging software are:

Meebo

Yahoo! Messenger for the Web

MSN Web Messenger

IMO, etc.

In this exercise, you will learn to create an instant messaging account for using

Google Talk.

Google Talk is an instant messaging service that provides both text and voice

communication developed by Google Inc. Google Talk can also be used for

making video calls and to view updates from Gmail mailbox.

Google Talk is free and is available as application based (users need to

download and install Google Talk application to their desktops, mobiles or

laptops) and web based (users can use Google Talk through a browser after

signing into their Gmail account).

Before you start using Google Talk, a Gmail account is required. You have

learned how to create a Gmail account earlier. In this exercise, you will learn how to

use Google Talk.

Note: You need to download and install Google Talk application from

www.google.com/talk prior to this exercise.

o

o

?

?

?

?

?

?

?

?

?

Creating an instant messaging account

Page 32: class 10 IT Reader

Inform

ation

Technolog

y Level -2

21

To launch Google Talk, Click Start >

Programs > Google Talk > Google Talk.

You can also double-click on the Google Talk

icon on the desktop if available.

You need to have a list of contacts that are available

for chat. If you don't have any contacts, you can add

their Gmail account to your contact list by sending

an invite.

If you don't have a Gmail account already you can create a new Gmail account.

To use Google Talk, you need to sign in with your account details.

After signing in into your Google Talk account, you should see a window similar to the

one displayed below. Now the Google Talk application is ready for use.

There are two major types of network Local Area Network (LAN) and Wide Area

Network (WAN).

A local area network (LAN) is one which connects computers and devices in a

limited geographical area such as home, school, computer laboratory, office

building, or closely positioned group of buildings.

Launching Google Talk

Signing in into your Google Talk Account

Local Area Network

o

o

Types of networks

Page 33: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

22

Usually local area networks offer very high speeds and are used for connecting

computers and peripherals such as printers, scanners, etc.

A wide area network (WAN) is one which covers a broad area (i.e., any network that

links across metropolitan, regional, or national boundaries). The Internet is the

most popular WAN, and is used by businesses, governments, non-profit

organizations, individual consumers, artists, entertainers, and many others.

Online shopping is a form of electronic commerce where customers can buy or sell

goods over the Internet. Customers need to have an active internet connection

for viewing goods or services offered by a seller; customers can pay online using a

credit, debit card.

Online shopping could be useful in situations when:

A customer does not have sufficient time to visit stores.

Visiting a store is more expensive than purchasing a product online.

A product or service that is not available in the local market is available

online.

Some of the popular online transaction websites are:

IRCTC, an online portal for booking flight and train tickets.

Flipkart, an online shopping portal for buying consumer products.

EBay, an online portal for buying and selling goods.

Redbus, an online portal for booking bus tickets.

To perform an online transaction, all you need is a web browser and an active internet

connection. In some cases where purchasing is involved, you will need a valid credit

card, debit card or online banking support referred to as Net Banking Subscription.

Some websites even allow COD (Cash on delivery) where the users can pay once they

receive the product or service.

Wide Area Network

Online Transactions

o

o

o

o

o

o

o

Page 34: class 10 IT Reader

Inform

ation

Technolog

y Level -2

23

Digital Documentation Advanced Word Processing

You have already learnt the basics of word processing. Now consider a situation when you

write a lengthy article that spans several pages, and you need to make it easier for the

readers to read it? Look at the following example:

What is Culture and Gender Sensitization? Culture in simple terms refers to our values,

the way we speak, behave, think, dress, religious beliefs, the music we like, our

interactions, and the food we eat. Diversity is a commitment to recognizing and

appreciating the variety of characteristics that make individuals unique in an

atmosphere that promotes and celebrates individual and collective achievement.

Many people mistakenly use such phrases as "Indian culture," "white/black culture," or

"Western/Eastern culture," to describe a particular culture but these people fail to

acknowledge the presence of cultural diversity, or the presence of multiple cultures

and cultural differences within a society. In reality, many different cultural groups

exist today in India and most developing and developed countries. Diversity in the

workforce means employing people without discrimination on the basis of gender, age

and ethnic or racial background. Since globalization is the current overwhelming trend

in business, diversity in the workplace is a better accepted and applied concept now

more than ever. There are different kinds of diversity that one encounters at the

workplace. These include diversity of gender, age, psychology, education, language and

culture.

Is the content presented above easy to read? Now, look at the formatted sample below:

What is culture and gender sensitization?

Culture in simple terms refers to our values, the way we speak, behave, think, dress,

religious beliefs, the music we like, our interactions, and the food we eat. Diversity is a

commitment to recognizing and appreciating the variety of characteristics that make

individuals unique in an atmosphere that promotes and celebrates individual and

collective achievement.

2Unit-

Page 35: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

24

Many people mistakenly use such phrases as "Indian culture," "white/black culture," or

"Western/Eastern culture," to describe a particular culture but these people fail to

acknowledge the presence of cultural diversity, or the presence of multiple

cultures and cultural differences within a society. In reality, many different cultural

groups exist today in India and most developing and developed countries.

Diversity in the workforce means employing people without discrimination on the

basis of gender, age and ethnic or racial background. Since globalization is the current

overwhelming trend in business, diversity in the workplace is a better accepted and

applied concept now more than ever. There are different kinds of diversity that one

encounters at the workplace. These include diversity of gender, age, psychology,

education, language and culture.

Using paragraphs you can break continuous text to one or more sentences. This way, it is lot

easier for the readers to understand and enjoy the content. In this exercise, you will learn

to work with paragraphs and layouts.

Have you tried to make a professional looking resume? One important part of working with

a resume involves alignment. For the sake of both professional appearance and

accessibility, it is conventional for similar parts of a resume to all line up along the same

vertical axis. So that all the bullet points are aligned, and so are the headers, and sections.

You may come across situations where some bullet points don't line up, or where there are

many empty spaces that complicate editing and revising. So now what do you do?

1. Open a new document in word processor. Click on the Page Layout tab on the Ribbon.

2. Click on the icon under Paragraph group, as shown below.

3. The Paragraph dialog box appears. You can see the options for automatic alignment,

spacing, etc. that you can setup while composing the document itself instead of doing

the alignment towards the end.

Page Layout

Page 36: class 10 IT Reader

Inform

ation

Technolog

y Level -2

25

4. Click on Tabs... button, Tabs dialog box appears.

5. You can specify the tab stop position by mentioning the stopping position in the Tab

stop position box. After specifying the tab stop position click on Set button and the

Tabs window appears.

Note: You can also the set the initial tab stop position value from the default value (0.5")

by specifying the new value under Default tab stops. You may specify the value at

which the tab stops by giving the value specified along with the unit (like 7cm, etc.)

6. Click OK. The ruler of the document will be marked with a L shaped symbol at 2",

meaning that the tab stop position has been set at that position. Now when you press

the tab key, the cursor will automatically jump from its initial position to the next tab

stop position. And this solves your problem too!

Note: You can also set the tab stop position by clicking at the required point on the

ruler. Now open a new document, type some text and press Enter. Notice that the

continuous text is automatically formatted as paragraphs, with the size that you have

specified in the Tabs Dialog box.

Headers are text or images included at the top of the page. They usually contain important

information such as company or department name, logo, page numbers, name of the

author, etc. separated from the work or actual document area.

Look at the following example:

Managing Headers

Page 37: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

26

Notice the header in the above document; the title "Application From, June 2012" will be

included on all pages of this document. In this exercise, you will learn to include a header to

a document.

To understand and work with headers, open a new document in word processor

1. Click on the Insert tab on the Ribbon.

2. Click on the option Header in the Header & Footer group, as shown below.

3. A drop down list appears which lists predefined header options (Figure below).

Now try inserting any of the predefined options from the list and observe the changes

at the header area of the document.

You can insert the page number at any position within the header area by selecting

the alignment option under Page Number. You can also change the number format

for page numbers by clicking Format Page Numbers... under Page Number options.

The Page Number Format dialog box appears as shown below.

Insert Header

Page 38: class 10 IT Reader

Inform

ation

Technolog

y Level -2

27

You can insert date and time by clicking the Date & Time option available under

Insert Group. You can choose the date and time format from the available formats.

You can also insert a picture or clipart within the header. This option can be useful in

situations when you need to insert company's or an event's logo. Try inserting a

picture or a clipart into the header using the Picture and Clip Art option under Insert

Group; observe the changes made to the document.

Footers are text or image included at the bottom of the page and may repeat in all pages of

the document. The procedure for creating a footer is similar to that of headers.

For example, if you wanted to create a text book, you can include the name of the text book

using the headers and the page numbers using the footer option. This makes the document

look neat and organized.

To insert footer to a document, open a new document in Word processor

1. Click on the Insert tab on the Ribbon.

2. Click on the option Footer in the Header & Footer group, as shown below.

Managing Footers

Insert Footer

Page 39: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

28

3. A drop down list appears which lists collection of predefined Footer options.

Now try inserting date and time, page numbers, pictures and clip arts in the footer

area and observe the changes.

Styles or Style sets are pre-defined or customized options used for creating good

looking professional documents with least efforts. You can find a number of styles

available within word processor that can be applied to a document. In this exercise, you

will learn to apply and manage styles.

To work with styles, open a new word document in word processor,

1. To view list of styles, locate the Style group under Home tab (Figure below)

2. If you would like to view the list of style sets available, point to Style Set under

Change Styles option. A drop-down with different styles will be displayed (Figure

below).

Select any of the styles listed by clicking it. The entire document will change to the

specified font or color automatically.

Managing Styles

Page 40: class 10 IT Reader

Inform

ation

Technolog

y Level -2

29

Document Template

Templates or document templates refer to a sample fill-in-the-blank document that

can help in saving time. Usually templates are customized documents that may have

sample content, themes, etc. For example, if you want to create a resume you can use a

resume template and modify only the sections that require changes.

In this exercise, you will learn to work with document templates.

To view sample templates available with your word processor,

1. Go to File > New. You will be displayed with different types of templates (Figure

below). For example, if you would like to create a letter, you can select the Letters

option under Office.com Templates section.

Suppose you need to create certificates for a recently held competition, you can select the

Certificates option. You will be displayed with a list of Certificate templates.

Now select any of the templates by double-clicking on it.

A sample certificate window similar to the one below appears. Now you can use this

template and customize the contents by replacing the school name, student name,

etc.

You can also download other types of templates from websites. Some of the websites that

offer free templates are:

office.microsoft.com/templates

www.thepapermillstore.com

openoffice.blogs.com/openoffice/templates/

www.docstoc.com

You can visit the above mentioned websites to search, download and use a template that

suits your needs.

Creating a new document based on a template can save you time and effort because all the

work it takes to design the document has already been done. You may use the templates

that come with word processing software, or downloading templates created by

other people, or you can also create and save your own templates for future use. First

of all, you need to create a document that will serve as the template.

Note: You create the template as a normal document, but the magic step is where you save it.

Click on File >Save As, and give the template a name. Select Word Template from the Save

as type: drop down list.

o

o

o

o

Page 41: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

30

Notice that there is a Templates folder within Microsoft Word. If you save your template

there, then we'll be able to see the template in the My templates category. So select that and

click Save.

Now to use the template, click on the File > New. Go to My templates, and as you scroll

down, you will find the file {your name}_Invoice , the template you just created. Select that

and click OK.

Notice that this is a new document and it's not the template. So, we've just created a new

document based on one of your own templates. Now when you save this document, it gets

saved as a normal .docx file.

Page and Section breaks can be used to separate a document into sections.

If you would like to start a new page in a document,

you can use a page break.

To separate a section in a document, you can use the

section break. For example, you can lay out part of

a single-column page as two columns. You can

separate the chapters as separate sections in your

document so that the page numbering for each

chapter begins at 1. You can also create a different

header or footer for a section of your document.

For example, if you are creating a textbook and you

can create different sections for digital literacy,

word processing, spread sheets, etc.

To work with breaks, open a new document in the

word processor and type some contents. If you need

another fresh page, choose the page break option in

the Page Layout tab.

a) Click on the Page Layout tab on the Ribbon.

b) Click on the option Breaks in the Page Setup group (Figure below).

c) A dropdown list with options for different types of breaks appears. An explanation is

given for each type of page or section break.

Working with Page and Section Breaks

Page 42: class 10 IT Reader

Inform

ation

Technolog

y Level -2

31

A page break can be inserted anywhere in a document to force the end of a page and the

beginning of a new one.

To create a new page, you can keep pressing enter and the cursor moves from line to line till

a new page starts. But if you add content to the previous page, the content of the new page

will automatically shift!

To avoid such problems, there is an easier method - use a page break and start a fresh page!

You may also use a page break when you want to be sure that a new chapter or sub-heading

automatically starts at the top of its own page.

Section breaks add flexibility to formatting your document. Using them, you can create

different headers and footers, different footnote numbering, change the layout of

columns, change page borders for different pages, and even change page layouts in the

same document! Using section breaks is like having mini-documents in one large

document.

A section break controls the formatting of the document content that precedes it, until it

reaches another section break. For example, if you have a 10 page document, with a section

breaks on page 3 and on page 8, the section break on page 3 controls the formatting of

pages 1, 2, and 3 while the section break on page 8 controls the formatting for pages

4 to 8.

You need to be able to see where your section breaks or page breaks are inserted in order

to see where the formatting stops and ends or to delete them. To see a section/page break,

click the Show/Hide button on the Home tab in the Paragraph section. The section/page

breaks are displayed in your document.

1. Click on the section/page break.

2. Press Delete on your keyboard and the section/page break is removed.

Anytime you need to add a page border to a single page or have a table in Landscape

orientation with the rest of the document in Portrait orientation, try using section breaks

to make the task easier!

If you are creating a textbook with scientific content, you need to use special

formatting for some characters. Character formatting can be applied to a single

character or word.

In this session, you will learn to perform character formatting.

Applying Character Formats

Page 43: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

32

A

A

abc

Working with character Formatting

To work with character formatting,

a. Open a new document in word processor and type the following paragraph:

Water is a chemical substance with the chemical formula H O. A water molecule 2

contains one oxygen and two hydrogen atoms connected by covalent bonds.

Water is a liquid at ambient conditions, but it often co-exists on Earth with its

solid state, ice, and gaseous state (water vapor or steam). Water also exists in a 3liquid crystal state near hydrophilic surfaces. The density of water is 1,000 kg/m .

Now to make changes, you may need to format the characters as shown below. You

will notice that some words of this paragraph are in bold, some are in Italics, some are

underlined, some are in colour and some are changed in its position

(superscript & subscript).

b. In order to apply formatting to the contents in the document you must select the

concerned word or group of words.

Use the following options to make changes to a character or word:

Font Face: After selecting the text you need to click Font Name in the Font group to

select the particular font style from the fonts listed.

Font Size: After selecting the text you need to click Font Size in the Font group

to select the particular font size from the values given.

Water is a chemical substance with the chemical formula H O. A water molecule 2

contains one oxygen and two hydrogen atoms connected by covalent bonds.

Water is a liquid at ambient conditions, but it often co-exists on Earth with its solid

state, ice, and gaseous state (water vapor or steam). WATER also exists in a liquid 3crystal state near hydrophilic surfaces. The density of water is 1,000 kg/m .

Grow Font: After selecting the text you need to click the icon in the Font group to

make the font size larger than the current font size by the specified point.

Shrink Font: After selecting the text you need to click the icon in the Font group

to make the font size smaller than the current font size by the specified point.

Strikethrough: After selecting the text you need to click the icon in the Font

group to make a strike through the middle of the selected text.

Subscript: After selecting the text you need to click the icon in the Font group to

make the selected text lower than the normal text position.

X2

Page 44: class 10 IT Reader

Inform

ation

Technolog

y Level -2

33

Superscript: After selecting the text you need to click the icon in the Font group

to make the selected text higher than the normal text position.

Clear Formatting: Clear Formatting is used to clear the character formatting (such as

Bold, Italics ,Underline, font face & size, superscript & subscript etc.) of the selected

text. To remove the character formatting, select the text and click on icon in the

Font group.

Text Highlight Colour: Use this option to change the background colour. To do

so, select the text and click on icon in the Font group. You can choose the

background colour by clicking on the down arrow on the icon.

Font Colour: Use this option to change the colour of the text. To do so, select the text

and click on icon in the Font group. You can choose the text colour by clicking on

the down arrow on the icon.

Change Case: Word processor helps us to change the text case to capital letters or

small letters. You can also capitalize each word in the sentence and capitalize the

starting word of the sentence using Change Case under Font Group. To do so, after

selecting the text you need to click the icon in the Font group

Sentence Case: On selecting this option from the dropdown list, the first character in

the first word of the selected sentence will be converted to Capital Letter

(Uppercase).

Lowercase: On selecting this option from the dropdown list, the selected text will be

converted to Small Letters (Lowercase).

Uppercase: On selecting this option from the dropdown list, the selected text will be

converted to Capital Letters (UPPERCASE).

Capitalize Each Word: On selecting this option from the dropdown list, the

first character in all the words of the selected sentence will be converted to Capital

Letter (Uppercase).

Toggle Case: On selecting this option from the dropdown list, the small letters in the

selected text will be converted into capital letters and capital letters will be

converted into small letters.

Often when you write a technical report, or a newsletter or even letter to friends, including

some form of graphics makes the document more interesting!

Insert Graphical Objects and Illustrations

2X

Aa

ab

A

Aa

Page 45: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

34

In a technical report, you may want to incorporate a graph of corporate performance or a

technical illustration. While in a newsletter or letter to family and friends, you enjoy

sharing memorable events that are represented by photos or maybe even cartoons. The

facility to blend these graphics into the document is part of the charm and power of every

major word processing program.

But not only can we blend graphic images into our message, but Word, WordPerfect and

OpenOffice also allow us to blend in other special features. These features are generally

known as "objects". These objects can be almost any form that can begenerated as a

computer file. Sounds, Music, drawings, documents spreadsheets, etc. are all examples of

possible objects that you can include in a document, or link to a document.

Note: Embedding an object makes it part of the document while linking an object does not

include the object file into the document files. Readers trying to access the linked object must

also have direct access to the separate file that forms that object. That may mean they have

to have access to your hard drive in order to see the linked object.

Most Word processors has support for inserting illustrations in the form of Clip Arts,

Shapes, pictures, charts, etc.

Clip Art can help in making a document look colourful and presentable. Clip arts are pre-

defined images available for use in documents. For example, if you would like to create a

greeting card for your friend, you can use clip arts such as balloon, flowers, etc. along with

text message.

You can use the clip art gallery built-in within the word processor; you can also

download clipart from websites. Some of the websites that have free clip arts are:

www.openclipart.org

www.pdclipart.org

www.clker.com

www.freeclipartnow.com

www.wpclipart.com

In this exercise, you will learn to use Clip Arts.

To insert a clip art in a document,

a) Open a new document in word processor

1. Click on the Insert tab on the Ribbon.

2. Click on the option Clip Art in the Illustrations group (Figure below).

o

o

o

o

o

Page 46: class 10 IT Reader

Inform

ation

Technolog

y Level -2

35

Clipart search results for “School bag”

3. The Clip Art Task Pane appears. Enter the clipart category name in the search box

and Click Go. For example, if you want to insert a logo, type logo in the search box

and Click "Go".

4. Once you click Go (Figure 17), a window appears along with list of clip arts

matching the search keyword (Figure 18).

Select the clipart that you want to use, double-click on it and it will be inserted into

your document. Sometimes, you may need clip arts that may not be available within

the word processor application. In such cases, you can visit websites that offer

clip arts such as OpenClipart.org.

Now, you will learn to download a clip art from a website and use it in your document.

b) To download a clip art from www.openclipart.org

1. Open the web browser, Type www.openclipart.org in the address bar and press

Enter

You can use the search box available on the website for viewing the list of clip arts to

suit your needs. For example, Type School Bag in the search box and Click Search You

will be displayed with list of clip arts matching the keyword School bag, similar to the

one below.

Insert Clip Art

Page 47: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

36

Now you can select the clip art you like, download it to your computer and insert it

using the photo option in the word processor.

You have learnt to insert graphics and illustrations in the last exercise. How do you want

the text to fit to the picture? Do you want a graphics to stand alone with text above it and

below it? Do you want the text to be along one side of the graphics? Do you want to have the

text message split so that part of the text is on the left side and then continue on the right

side of the graphics? Do you want the text to run right across the graphics? All these options

are possible depending on the text wrap options you choose.

What if the graphic image is too large, or too small? This is a problem you may face

when placing graphic images into a document. In all word processing software, if you

select the image (left mouse click on it) control handles will appear on the sides and on the

corners of the graphics. When you place your mouse on these handles, the cursor

changes to a double headed arrow and you can click and drag the handle in or out to

decrease or increase the size of the picture. In this exercise, you will learn to use text

wrapping.

Open a new word document and type the following:

Apache OpenOffice Writer is the word processor component of the OpenOffice

package. It is free and is available for a variety of Operating Systems including

Windows, Linux, FreeBSD and Solaris. It is capable of opening and saving documents in

a variety of formats.

You can either include a screenshot of the OpenOffice Writer or search for a picture in your

computer.

To take a screen shot, simultaneously press <Shift> and <Print Screen> keys. Place the

cursor on the right of the text and simultaneously press <Ctrl> and <V> keys.

To search for a picture, place the cursor before the text, click Insert Tab, and click

Picture under Illustrations. Browse for the picture and click Insert.

Once you have inserted the picture, you can wrap the text by using the Wrap Text

option under Text section of the Insert Tab after double-clicking on the picture

(Figure below). If you are working on Word, select the picture then select the

Text Wrapping dropdown arrow in the Arrange group under the Format tab.

Text Wrapping

o

Page 48: class 10 IT Reader

Inform

ation

Technolog

y Level -2

37

Now try selecting different Wrap Text options such as Square, Tight, Through, etc.

and observe the changes made to the wrapping. A screen shot when the Square

option was used is shown below:

In addition to graphic images, to add a personal touch to a special message or to

illustrate a special feature, you may want to embed sound files or maybe even actual files

from other software applications in your document. For example, you can insert a PDF file

or a spread sheet within the word processor.

In this exercise, you will learn about inserting objects in a document.

To insert an object,

Open a new word document

Select Insert Tab

Click Object under Text section. A dialog box will be displayed, as shown in

figure 23.

Select Create from File Tab

Click Browse and select a file such as a spread sheet or a PDF document that is

available on your computer, Click Open and Click OK

Notice the document is available embedded within your word document.

Note: If you would like to edit the embedded document, double-click on it. It will

automatically open it for editing using respective application.

Inserting Objects

o

o

o

o

o

o

Page 49: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

38

Now try inserting different types of document using the procedure mentioned above.

Note:

1. The embedded objects cannot be printed.

2. The person opening your document must have the relevant software loaded on

their computer to operate the embedded file.

3. If you embed an object, the size of your document increases significantly and this may

cause problems in emailing the document as an attachment.

4. If you link an object, the person opening that document must have a direct

connection to the original file location of the object.

You can insert objects that have different shapes such as lines, basic geometric shapes,

arrows, equation shapes, flowchart shapes, stars, banners, and callouts using the shape

option.

In this exercise, you will learn to work with shapes in a word document.

To work with shapes, open a new document in word processor,

1. Click on the Insert tab on the Ribbon.

2. Click on the option Shapes in the Illustrations group, as shown in figure 24.

3. Once you click the Shapes option a dropdown list with pre-defined shape such as box,

circle, etc. appears.

4. You can select the shape from the list of shapes available and draw the shape by

dragging the mouse with the left button clicked. For example, if would like to insert a

square, select the box shaped item from the list, click and drag the shape to draw a

square.

Insert Shapes, Symbols and Special Characters

Insert Shapes

Page 50: class 10 IT Reader

Inform

ation

Technolog

y Level -2

39

Now try inserting other shapes from the list available and work with them by changing

colors or adding content inside them.

In some cases, you may need to insert special characters or symbols in documents such as

currency sign of a different country, copyright or trademark symbols, etc. In this exercise,

you will learn to insert symbols or special characters.

To work with symbols or special characters, open a new document in word processor.

1. Click on the Insert tab on the Ribbon.

2. Click on the option Symbol in the Symbols group, as shown in figure 25.

3. A dropdown list appears (figure 26).

Select a symbol from the list and double-click on to insert the symbol into the

document.

If you would like to view more symbols and special characters for inserting

into a document, click on the More Symbols option in the Symbols Dropdown list.

Insert Symbol

Page 51: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

40

Digital Data Analysis - Advanced Operations on Spreadsheet

Use Autosum in Cells

You have learnt to navigate in a spreadsheet, populate cells, and perform calculations. As

you know, a spread sheet offers various mathematical functions to perform the

calculations. Sum is one of the functions available in the spread sheet to perform addition

of selected numbers in the sheet. In this exercise, you will learn how to use autosum

function to perform addition in a spread sheet.

Autosum is used for adding the values given in cells automatically without writing the

formula to perform the operation.

Open a new spread sheet and enter the following data.

Now to total the marks of each of the students, do the following:

Go to cell G2. While the cell G2 is selected, click on the AutoSum option available

under Editing Group in the Home tab.

o

AutoSum

3Unit-

Page 52: class 10 IT Reader

Inform

ation

Technolog

y Level -2

41

o

o

The values in the cells from c2 to f2 will be automatically selected as shown below.

Press Enter.

The total marks of Abhas appears in cell G3.

Similarly, calculate the total marks of the rest of the students.

Note: Autosum automatically selects the values around the cells either horizontally or

vertically. In the above example you want to perform addition of numbers listed from

left to right, after finding the total of two persons when you try to perform autosum for

another person the values on top of the current cell get selected. In that case, you have to

select the cell values that you want to perform addition.

Now change the marks of one of the students in one or more subjects. The total marks

of that student will get calculated automatically. Automatic calculation of formulas is

one of the most powerful features of electronic spreadsheets.

Conditional formatting allows you to change the formatting (font color, border,

shading) of the cells based on the values in it. Yes, you can do that manually, but it can be a

tiresome task if you have a huge amount of data. So, you specify a condition for the values

?

?

Conditional Formatting

Page 53: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

42

in the cell, and if the condition is satisfied then automatically the formatting of the

cell changes. This feature would be very useful if you were working on a profit and loss

spreadsheet, or a temperature variance spreadsheet, or a marksheet. You could

highlight cells that have values are greater than a defined rule with one color and those less

than another with a different color.

Basically, you can select one or more cells, and create rules (conditions) for when and how

those cells are formatted. The conditions can be, based on the selected cell's

contents, or based on the contents of another cell.

You can control the following formats:

Number format

Font, font style, and font colour (but not font size)

Fill colour and fill pattern

Border colour and border style (but not border thickness)

Open a new spreadsheet and enter the following data.

Now to apply conditional formatting for the data do the following.

Select all the cells you want to format conditionally.

o

o

o

o

o

Page 54: class 10 IT Reader

Inform

ation

Technolog

y Level -2

43

Now to apply conditional formatting for the data do the following.

Select all the cells you want to format conditionally.

Click on Conditional Formatting option available under Styles group in the Home

tab. A drop down list appears.

Click on Highlight Cells Rules option, a submenu appears.

Note: you can select the condition listed according to your needs. In this example

if you want to highlight the values that are greater than 75, select "Greater

Than..." available under the submenu. A dialog box appears.

Specify the value in the box and click on the down arrow next to the with field and

select a predefined format for the condition from the drop down list. If you want to

highlight the cell contents with your own formatting style click Custom Format

option in the dropdown list.

A Format Cells dialog box appears. You can select a different font color under Font

tab, border style and color under Border tab and fill color under Fill tab.

Go ahead and create the data below and format it in the manner displayed.

Note: Similarly you can set various conditions for the selected value like less than,

equal to, between etc.

o

o

o

o

o

o

Page 55: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

44

Optionally, you can also specify the cell address where the value is stored. This can be very

helpful as simply changing the value in one place can change the conditional

formatting all over the previously selected range. An example is shown in the figure

below.

The result is displayed below.

Sometimes you have data in rows and columns which are needed for formulas or

charts, but you do not want the data to be visible. A very handy feature of a

spreadsheet is the ability to hide a row/column that is not to be shown to the end

user. The data in hidden row/column is available for calculations though not visible!

Freezing rows and columns is another helpful feature in a spreadsheet. When you are

dealing with a huge amount of data that spans several rows or columns, you may want the

headers to remain constant (frozen) while you scroll through the data so that you can see

the identifying names of the rows/columns.

Hide / Unhide / Freeze Rows and Columns

Page 56: class 10 IT Reader

Inform

ation

Technolog

y Level -2

45

Open a new spreadsheet. To hide a row or column, do the following:

In order to hide any row or column you can either select the particular row or column

that is to hidden or just one cell in the corresponding row or column (for example

B3).

Click on Format option available under Cells group in the Home tab.

A dropdown list appears as shown below.

Click on Hide & Unhide > Hide Rows. The spread sheet will be displayed as shown

below.

Note: Alternatively, you can select the row/column, right click and select Hide.

Note: In this example the cell in the 3rd row of the spread sheet was selected and then Hide

Rows option was selected. So, the 3rd row is hidden. What would have happened if you had

selected Hide Columns instead?

In order to unhide the row or column that is hidden you have to select any cells before

and after the cell that is hidden then click Unhide Rows in the Format option

available under Home tab.

To freeze the rows or columns do the following.

Open a new spread sheet.

In order to freeze rows or columns click on Freeze Panes option available

under Window group in View tab.

A drop down list appears as shown below. Click on Freeze Panes. Doing so will

freeze all the rows above and all the columns to the left of the selected cell. Scroll your

mouse in the spreadsheet the frozen rows and columns remain constant.

Note: The panes are formed where your cursor is placed. Select the option again and notice

the change in the available options! Go ahead and try the other options too. You can also

freeze the entire row or column by selecting the entire row or column and click "Freeze

Panes" to freeze the entire row or column.

To print a worksheet with the exact number of pages that you want, you can adjust the

page breaks in the worksheet before printing it. This feature is very useful especially

when printing huge sheets. You can use the Page Break view to see how other

changes (e.g. changing row height/column width) affect the automatic page breaks.

o

o

o

o

o

o

o

o

Set Page Breaks

Page 57: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

46

In this exercise you will learn how to set page breaks in the spreadsheet. Open a new

spread sheet and create the sheet below. On the View tab, in the Workbook Views group,

click Page Break Preview.

Now to set the page break do the following.

To insert a vertical page break, select the row below where you want to insert the

page break. To insert a horizontal page break, select the column to the right of

where you want to insert the page break.

Click on Breaks down arrow under Page Setup group in the Page Layout tab. A

dropdown appears as shown below.

Click on Insert Page Break option. The spread sheet will be displayed as shown

below. The content you have typed comes in the first page and you can print it.

To move a page break, simply drag the page break to the desired location.

o

o

o

o

Page 58: class 10 IT Reader

Inform

ation

Technolog

y Level -2

47

Note: You can also remove the page breaks by clicking the Remove Page Break option in

Breaks drop down list.

To return to Normal view after you finish working with the page breaks, click Normal in

the Workbook Views group under the View tab.

If you have a worksheet that contains a huge amount of data with many charts and you

want a professional looking printout, what would you do? Spread sheet software

provides various page layout options for organizing pages using the Page Layout option. In

this exercise, you will learn how to set the page layout options in the spread sheet

application. Open a new spread sheet.

To set the page layout options, do the following:

Click on Page Layout option under Workbook Views group on View tab. The

spreadsheet will be displayed as shown below. You can set the

Margins

Orientation

Page headers and footers

Hide or display grid lines

Size of the page

Define the print area

Specify the background

Click on Margins option under Page Setup group, a dropdown list appears as shown

in figure.

Set Page Layout

o

o

?

?

?

?

?

?

?

Page 59: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

48

o

o

o

o

o

o

o

You can either select anyone of the predefined margin option available or else you can

define your own margin settings by clicking Custom Margins.. option.

A dialog box appears.

You can set the margin values manually from the options available under the dialog

box.

You can set the orientation of the page to either Portrait or Landscape by clicking the

Orientation option under Page Setup group in the Page Layout tab.

You can set the size of the page by clicking the Size option under Page Setup group in

the Page Layout tab.

You can specify the area to be printed by selecting the area and then clicking Print

Area option under Page Setup group in the Page Layout tab. A drop down list

appears as shown below.

Click on Set Print Area to set the selected to get printed. You can also clear the print

area by clicking the Clear Print Area option.

You can specify a background for your sheet using the Background option under

Page Setup in the Page Layout tab.

Page 60: class 10 IT Reader

Inform

ation

Technolog

y Level -2

49

Manage Workbook Views

Spread sheet offers the users with variable views for the purpose of viewing the

outcome of the sheet while printing.

There are five types of views available in the spreadsheet.

Normal

Page Layout

Page Break Preview

Custom Views

Full Screen

You can select one of the above said views by clicking the appropriate option under

Workbook Views in the View tab.

Normal View: The default view of the spreadsheet application is the Normal. It's

acollection of cells arranged in the work area.

Page Layout: You can select the Page Layout view in order to quickly fine tune a

worksheet that contains many charts or huge amounts of data and achieve professional

looking results.

Page Break Preview: This option is similar to the Page Layout option except you can set

the area that is to be set as a page after inserting page break.

Custom Views: If you would like to view selected areas of a document, you can use the

custom view option. For example, if you would like to point out certain row and column,

you can add that to the Custom view.

Full Screen: Selecting this option makes the workbook cover the entire screen. All tabs are

hidden from view. To get back the tabs, click on File> Restore.

Additionally, in spreadsheet, you can open multiple windows that display the current

spreadsheet and then arrange those windows in a variety of ways. You can also open and

o

o

o

o

o

Page 61: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

50

arrange multiple workbook windows.

To open a second instance of a workbook in a separate window:

Click the New Window button on the View tab, in the Window group.

To arrange multiple program windows:

Click Arrange All button in the Window group. An

Arrange Windows dialog box appears.

Click either Tiled, Horizontal, Vertical, or Cascade

options.

To include only windows displaying views of the current

workbook, select the Windows of active workbook check

box.

Click OK.

You can assign names to cells in a worksheet and use it for quickly locating specific cells

by entering the names. This could be useful when working with large spread sheets.

For example, if you have a lengthy list of groceries and prices, you can use names to

quickly locate and find total pricing of fruits from the entire list. In this exercise, you will

learn to work with cell and range names.

Open a new spreadsheet and enter the following (figure below):

o

o

o

o

o

Apply Cell and Range Names

Page 62: class 10 IT Reader

Inform

ation

Technolog

y Level -2

51

Now to apply range names, do the following:

Select the cost against the cells that have Apple, Banana, Cherry, Grape, Guava,

Mango, Pineapple values (Keep the Ctrl key pressed and click on the cells - you

will be able to select selective cells together!). Right click and select Name a Range….

Alternatively, you can select Define Name under Defines Names group in the

Formulas tab.

A New Name dialog box appears prompting to enter a name. Enter Fruits in the Name

field and click OK (figure below).

Select the cost against the cells that have Cabbage, Cauliflower, Chilli, Cucumber,

Ginger, Potato, Pumpkin, Spinach, Tomato values. Right click define the name

Vegetables for this group.

If you would like to calculate the total cost of fruits from the list,

Select an empty cell

Type Total Cost of Fruits and in the adjacent cell, Type =SUM (Fruits) and press

Enter.

Notice the total cost of all items named as Fruits is displayed.

o

o

o

o

o

Page 63: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

52

Create Modify and Format Charts

A chart is a graphical representation of data, in which the data is represented by symbols,

such as bars in a bar chart, lines in a line chart, or slices in a pie chart. A chart can represent

tabular numeric data, functions or some kinds of qualitative structures.

A Spread sheet enables you to create, modify and format charts based on the data given in

the spread sheet. In this exercise you will learn how to create, modify and format chart

using the spreadsheet.

Reopen the worksheet expenses_{your name}.

Now to create charts do the following.

Select all the expenses data.

Click on the chart type that you want from Charts group under the Insert tab.

After selecting the chart type the spread sheet will be displayed as shown below.

o

o

o

Page 64: class 10 IT Reader

Inform

ation

Technolog

y Level -2

53

o You can modify the chart values by making necessary modifications in the data table.

Chart has many elements; however, only some of the elements are displayed by default.

Following is an description of the elements used in the above chart:

1. Chart Area of the Chart

2. Plot Area of the Chart

3. Data Points that are plotted in the chart

4. Horizontal and Vertical Axis in the chart

5. Legend of the chart

6. Chart and Axis Title used in the chart

7. Data Label for identifying details of data point in the chart

Note: Once you insert a chart in the spreadsheet three additional tabs are available on the

Ribbon namely Design, Layout and Format. You can edit the chart, its design, layout

and formatting options using the three tabs available. You can change the chart type, chart

options etc. in the Design tab and can give the titles etc. in the Layout tab and set the borders,

colors and size of the option under Format tab.

Page 65: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

54

Choosing the right type of chart is very important. Different charts display data in very

different ways. Using the best chart type and format helps you to display data visually in

the most meaningful way. Bar charts: A bar chart (horizontal bars) emphasizes the comparison between items at a

fixed period of time. This chart type also includes cylinder, cone, and pyramid

subtypes.

Column charts: A column chart, unlike a bar chart to which it is often compared,

emphasizes variation over a period of time. This chart type also includes cylinder,

cone, and pyramid subtypes

Line charts: A line chart shows the relationship of the changes in the data over a

period of time.

Pie charts: Pie charts contain just one chart data series. A pie chart shows the

relationship of the parts to the whole.

Area charts: An area chart shows the relative importance of values over time.

XY (Scatter) charts: Scatter charts are useful for showing a correlation among the data

points that may not be easy to see from data alone.

Sort is a feature that helps you arrange the selected data either in an ascending or

descending order. Filter is a feature used for extracting particular data using some

conditions. Spread sheet offers both these features for sorting and filtering data in the

spreadsheet.

Open a new spreadsheet and enter the following data:

Sort and Filter Data

Page 66: class 10 IT Reader

Inform

ation

Technolog

y Level -2

55

Now to sort or filter the data do the following:

Select the data to be sorted and then click on Sort option under Sort & Filter group in

the Data tab. A dialog box appears as shown below.

You need to specify on what basis you are going to sort the data in the Sort by field and

select the order that is ascending and descending and then click OK.

For example, if you wanted to sort the data in Sales 2008, you would select the

relevant detail in the Sort by list and click OK. The spreadsheet would be

displayed as shown below. You can notice that the data has been sorted as per the

data in 2008 and also that values in the Sales 2008 field are arranged in

ascending order that is from smallest to largest.

To filter data, do the following:

Click the Filter option available under Sort & Filter group in the Data tab. Before

applying a filter you have to select the data along with the header as shown below.

o

o

o

Page 67: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

56

o

o

o

o

o

Once you click on filter, the headers will be displayed with a down arrow as shown

below.

If you want to filter data that is greater than 75 in the Sales 2009 do the following.

Click the down arrow available under Sales 2009 header, a dropdown list

appears as shown below.

You can specify the filter by selecting the available values in the list.

You can also sort the filtered data by selecting Sort Smallest to Largest or Sort Largest

to Smallest option available in the dropdown list.

Click on Number Filters option under the dropdown list, once you click the

following submenu appears.

Page 68: class 10 IT Reader

Inform

ation

Technolog

y Level -2

57

o

o

Here you can select the condition that you want to specify for the data in the list, If you

select Greater Than.. option the following dialog box appears.

Specify the value that you want in the value box, (here it is 75) and click OK.

The spreadsheet will be displayed as shown below. Notice that only data

greater than 75 is displayed under the Sales 2009.

Suppose you were working at the head office maintaining had data for six regions, and you

use exactly the same worksheet layout and labels to track the average sales of each

region over the previous quarter. Each sheet contains headings by region (such as

Region01, Region02 ….. Region06), and in cell H15 on each sheet, the calculated totalsales

for the quarter appear. If you want to obtain the average sales over the quarter, what would

you do?

In this exercise you will learn how to perform calculations on data across different

worksheets.

Open a new spreadsheet. Name sheet 1 as year1 and type the following data.

Calculate Data Across Worksheets

Page 69: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

58

Now to calculate the data across worksheets do the following.

Go to sheet 2, name it year2 sheet, and insert the same data in the Sheet2 for the next

year.

Go to sheet 2, name it Totals, and insert the same labels.

Type the sum formula in cell B2, =sum( , while the parenthesis is opened go to year1

sheet and go to year2 sheet and press Enter. Repeat the same step to calculate

sum for other expenses. Note the way the range is specified (sheetname!

cellnumber).

To answer the question raised earlier, you could create a new sheet, called Quarter

Summary. To find the average, enter the following formula in one of the cells in the

Summary sheet: =AVERAGE(Region01: Region06!H15)

Spreadsheet calculates the average for all values stored in H15 on all sheets in

the range Region01: Region06. If you move the Region06 sheet between Region04

and Region05, the software will adjust the calculation to include the sheets for

Regions01, 02, 03, 04, and 06; Region05 will be omitted. Similarly, if you delete or

add a sheet anywhere between Region01 and Region06, the software will include

all the sheets located within the range in its calculation.

o

o

o

Page 70: class 10 IT Reader

Inform

ation

Technolog

y Level -2

59

Using Multiple Workbooks and Linking Cells

Spreadsheet also allows you to link the cells from various worksheets and from various

spread sheets to summarize data from several sources. In this manner, you can create

formulas that span different sources and make calculations using a combination of

local and linked information. You can link data from other spreadsheets and keep the

information up to date without editing multiple locations every time the data changes.

For example, you can display data from multiple departments for an overview of

details without sharing information between sources.

In this exercise you will learn how to link cells from different spreadsheet applications.

Open a new spread sheet and enter the following data:

To link cells from different worksheet do the following:

Open a new spreadsheet workbook.

Type some formula, for example sum formula in any cell =sum(, while the

parenthesis is opened, click on Switch Windows option under Window group in the

View tab. A dropdown list appears with the active workbook names.

Click on Book1 to select the earlier spreadsheet you had created and select the cells

A2:D2.

o

o

o

Page 71: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

60

o Press Enter. You are back on the second spreadsheet. The cell where you were

entering the formula has the total of the values in the first spreadsheet!. Note the way

the software gives the cell reference. If you update any values in the first

spreadsheet, automatically the sum value in the second spreadsheet is updated! Try

this out.

In most office settings, there is a shared drive where teams can store common files for

everyone to use. This usually leads to sighting of the message: "The document [filename] is

locked for editing by another user. To open a read-only copy of this document,

click"!! This message appears because someone else already has the file open. Sometimes

however, it is necessary to have multiple people working on a file at the same time. This can

be to either speed up data entry or simply make things easier for collaboration purposes.

Spreadsheet software allows the user to share the workbook and place it in the

network location where several users can access it simultaneously. In this exercise,

you will learn how to share a worksheet.

Open a new spreadsheet and type the following.

Sharing Worksheet Data

Page 72: class 10 IT Reader

Inform

ation

Technolog

y Level -2

61

Now to share the spreadsheet do the following.

Click on Share workbook option under Changes group in the Review tab.

A dialog box appears as shown below.

Check the option Allow changes by more than one user at the same time. This

also allows workbook merging.

Click OK.

Note: Most spreadsheet software automatically turn off some features in shared

workbooks. This is to simplify the workbook since multiple people can be working on the

file at the same time. For example, shared workbooks don't allow merging cells, conditional

formatting, or inserting pictures/graphs/etc.

o

o

o

o

Page 73: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

62

Advanced Digital Presentation

Inserting a Movie Clip

Presentation allows the user to add movie clips to the presentation in order to make the

presentation colourful and meaningful. You can insert movies or YouTube videos

downloaded from the Internet.

In this exercise you will learn how to insert a movie clip in slides. Open a new file

using presentation software.

You can insert a movie in two ways:

Using Insert tab

Using Title and Content Layout Option

Click on Movie option under Media clips group in the Insert tab, a drop down appears as

shown below.

You can select the Movie from File… option to insert the movie clip that you have

already downloaded from the Internet. A dialog box appears as shown below:

o

o

4Unit-

Page 74: class 10 IT Reader

Inform

ation

Technolog

y Level -2

63

You can locate the movie clip and click OK to insert the same in the slide. The

presentation will be displayed as shown below.

You can set one of the two options available for playing the media clip, i.e

Automatically or When Clicked.

Alternatively, you can select Movie from Clip Organizer… option to insert the movie clips

that are available under Clip Organizer. Doing so displays the clip art task pane as shown

below:

You can select any of the movies available and insert it in the slide. Once you have

inserted the movie clip in the slide, the presentation will be displayed as shown below.

Open a new file using presentation software and change the layout of the slide.

Click on Layout option available under Slides group in the Home tab, a dropdown list

appears as shown below.

Using Layout Option

Page 75: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

64

Click on Title and Content option and a slide will be displayed with the layout as

shown below.

You can insert a movie in the slide by clicking the icon in the Layout option. Once you click

the icon, a dialog appears as shown below.

When you play the slideshow, the movie clip will be played automatically.

You can include audio clips to a presentation similar to that of videos. For example, you

can play mild background music while making your presentation. In this exercise you will

learn how to insert an audio clip in slides.

Open a new file using presentation software. Click on Sound option under Media clips

group in the Insert tab, a drop down appears as shown in figure 9.

Inserting an Audio Clip

Page 76: class 10 IT Reader

Inform

ation

Technolog

y Level -2

65

You can select the Sound from File… option to insert the sound clip. A dialog box

appears as shown below.

You can locate the audio clip and click OK to insert the same in the slide. You may

follow the same steps as you learnt while inserting a Movie Clip. There is an inbuilt clip

organizer for a list of sounds. You can access them via the Sound from Clip

Organizer… option. Go ahead and insert an audio clip using this option.When you have

completed inserting the sound clip, and you play the slideshow, the audio clip will be

played automatically.

Presentation software enables the user to add tables in the slides in order to represent the

statistical data meaningfully.

In this exercise you will learn to work with tables.

Open a new file using presentation software. You can insert a table in two ways:

Using Insert tab

Using Title and Content Option

Click on Table option under Tables group in the Insert tab, a drop down appears as

shown below.

Working with Tables

o

o

Page 77: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

66

You can have learnt to create tables in a word processor by dragging the mouse over

requisite number of boxes. Follow the same method here and create the table shown

below. Now go ahead and try the Insert Table… and Draw Table options to create the

table.

Open a new file using presentation software and change the layout of the slide. To

change the layout of a slide do the following:

Click on Layout option available under Slides group in the Home tab, as you did while

selecting a movie clip. Click on Title and Content option from the dropdown list. You can

insert the table in the slide by clicking the icon available within the layout.

Using Title and Content Option

Page 78: class 10 IT Reader

Inform

ation

Technolog

y Level -2

67

Once you click the icon, a dialog appears as shown below.

Now enter the values for the number of columns and rows that you would like to have in

the table. For example, if you need a table with 3 columns and 3 rows, type 3 in both

Number of columns and Number of rows fields.

Once you have inserted the table into the slide, additional tabs - Design and Layout -are

made available. You can use them for editing and formatting the table further.

You can change the design of the table by changing background, borders or effects by using

Table Styles group in the Design tab. To use a particular design, Select a design under

Table Styles group and double-click on it. If you would like to change a design, choose a

different design under Table Styles group and double-click on the new design.

You have learnt to create a table in a presentation, but if the table already exists in a word

processor document or a spreadsheet, you can directly import it from there. To do so:

With a slide in edit mode, choose Object from the Insert menu.

In the Insert Object dialog box, click the Create From File option and click

Browse to locate and choose the document or spreadsheet that contains the table. By

default, the presentation software will insert the table.

o

Page 79: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

68

o

o

o

When you click OK, the entire document or spreadsheet is imported to your slide.

Double-click the inserted text to remove extra text if the document contains more

than the table.

If you check the Link checkbox while inserting. On doing so, after you update the table

in the document or spreadsheet, then right click on the imported table in the

presentation software, and select the option Update Link , the embedded table

gets updated automatically.

Drag and drop the table on the slide to position it.

Presentation software enables the user to insert charts in slides to present statistical table

data in a pictorial representation. This ensures that the audience can grasp complex

data at a glance.

In this exercise you will learn to work with charts. Open a new file using presentation

software. To insert a chart in the slide, click on Chart option under Illustrations group in

the Insert tab. A dialog box appears as shown below.

You will notice different type of the charts that can be used in the presentation. Select a

chart type and click OK. A default chart will be inserted on the slide. The default data

table for that chart will be opened in a spreadsheet application separately as shown

below.

Working with Charts

Page 80: class 10 IT Reader

Inform

ation

Technolog

y Level -2

69

You can edit the values in the spreadsheet and the presentation software will

automatically update the chart. Now enter the following in the spreadsheet window:

Once you have modified the data table in the spreadsheet the chart in the slide gets

modified automatically and the chart will displayed similar to the one below.

Day 1 Savings

300

200

150

500

Day 3 Savings

500

300

600

150

Arun

John

Jacob

Salim

Day 2 Savings

250

300

500

750

Page 81: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

70

Now change the values in the spreadsheet and observe the changes in the chart.

You can change the colors and effects of the chart by using Chart Styles available under

Design tab. To change to a different style, select a style from Chart Styles and double-click

on it.

Some basic guidelines are as follows:

Convey one message per chart. Make the message the heading.

Make the chart easy to read. Label the X and Y axis and label the lines, bars, or pie

wedges. Make the most important text largest, the most important data lines or

sections darkest.

Make bars and columns wider than the spaces between them.

Be accurate. Always start a numerical axis at zero. Compare only like variables.

Eliminate all unnecessary details. Avoid grid lines, data points, boxes, etc. unless they

relate to the message.

Use a few (maximum four) colors per visual.

You can also import a chart from a spreadsheet. The method is the same as importing a

table into presentation software. Since the entire sheet is imported, you may need to

maneuver around and display the chart in the embedded object. To increase / decrease the

size of the object, you can double click on it and resize it.

Transition effects can help in increasing audience's interest during a presentation. A slide

transition is the visual motion when one slide changes to the next during a presentation. By

default, one slide simply replaces the previous one on screen, just like a slide show of

photographs would change from one to the next. Most presentation software provides

many different transition effects that you can use to liven up your slide show.

In this exercise you will learn to add transitions in the presentation. Open a new file using

presentation software and add contents to the presentation based on the guidelines

provided earlier. To work with transition effects, click the Animations tab. You will be

displayed with list of transition effects similar to the one below.

o

o

o

o

o

o

Importing a chart

Inserting Transitions

Page 82: class 10 IT Reader

Inform

ation

Technolog

y Level -2

71

To apply, select an effect from Transitions to this slide group and double-click on it.

You can also increase or decrease the duration of the transition effect by setting up the time

interval (in seconds) in duration option under Timing group. Try setting the duration as 1

minute and observe the effect by performing the slide show.

You can set sound effects during transitions by selecting a sound scheme available in

Sound option under Timing group. Try using different sound schemes and observe the

sound effect by performing the slide show.

If you would like to keep the same transition and sound effect across the entire

presentation, click Apply to all under the Timing group. Selecting this option will apply

all the selected effects across all slides.

Note: A common mistake made is using too many transitions, or using one that doesn't fit well

with the subject matter. Try to find one transition that doesn't detract from the presentation

and use it throughout the show. Using too many makes your presentation looks amateurish.

A transition is the final effect to be given to your presentation so edit and arrange all slides in

the preferred order before setting them.

While transition occurs between each slide, animation allows you to put slide elements,

such as text and graphics, in motion within a slide! Animations are helpful way to make

your slides look more dynamic. Besides adding action, they help steer audience focus

and emphasize important points. They are also a great way to reveal text or object on a

slide one step at a time. For example, you could have five bullet points of text, and reveal

them one-by-one on the slide with each click.

In this exercise you will learn to add animations in a presentation. Open a new file using

presentation software and add contents to the presentation based on the guidelines

provided earlier. To work with animations, Click Animations tab. You will see Animation

options similar to the one below.

Inserting Animations

Page 83: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

72

To apply, select the graphical object and click Animate under Animations group. Select

the animation effect under the Animate dropdown list. You can apply an animation effect

by selecting different animation scheme from the dropdown menu.

Once you have selected an animation scheme, play the slideshow to preview the

effect.

Surveys show that animation effects are one of the most annoying elements in

presentations. However, when used effectively, these effects can insert a dramatic moment

to a particular message and add spice to a dull presentation.

To summarize the effective uses of animation effects:

Helps focus audience attention on information.

Controls the flow of information especially while explaining a diagram.

Reveal concepts one by one.

Grouping can help when you want to move, rotate or resize multiple objects in a

presentation. You can group objects such as pictures, clip art, shapes and text box; once

grouped they appear as a single object.

o

o

o

Grouping Objects

Page 84: class 10 IT Reader

Inform

ation

Technolog

y Level -2

73

In this exercise you will learn to work with grouping and ungrouping of objects. Open a

new file using presentation software and add graphical objects to the presentation

based on the guidelines provided earlier. To group the graphical objects, select all the

objects that you want to group in the slide. To select more than one objects in the slide

hold down the ctrl key and select the object in the slide.

To group the objects, click Format tab.

You can select the Group option available under Arrange group in the Format tab.

Once you select the option, you should see a dropdown similar to one displayed below.

Click on Group, to group all the selected graphical objects in the slide.

Similarly you can ungroup the grouped objects by selecting the ungroup option available

under Group dropdown menu.

Good presenters always rehearse their presentations well but there's often one more thing

that helps them deliver flawless presentation - speaker notes. Speaker notes are guided

text used by the presenter during a presentation. Speaker notes can be short or long texts

that can be used as a reference by the presenter while making a presentation. An area of a

PowerPoint or OpenOffice Impress slide that is hidden during the presentation is reserved

for notes for the speaker. Here you as the presenter can note important key points that you

wish to cover during the presentation.

You can print these notes out, accompanied by a thumbnail version of the appropriate

slide, to keep as a handy reference to use when you are making your oral presentation.

Inserting Speaker Notes

Page 85: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

74

This can help you to communicate specific points related to each slide and make the

presentation effective for the audience.

In this exercise you will learn to add speaker notes. Open a new file using presentation

software. To add notes to a particular slide, select the slide and type the notes in the Click

to add notes area located at the bottom of the presentation software (Figure below).

Alternatively, you can select View tab and click Notes page under Presentation Views

Group.

Key things to remember about speaker notes:

1. They should not restate the contents of the slide.

2. Speaker notes should support the content of the slide with in-depth information.

While the regular presentation slides are shown on the main screen for the audience,

the view on your computer screen is slightly different - you can not only see the

current slide but also the text notes and other key points that should be discussed

with that slide. To do so, open the presentation file using your presentation software,

go to the Slide Show tab and check the option Use Presenter View.

You should always review the presentation and make changes if required before you

present it to the audience. Presentation software includes options such as spell checks for

correcting errors in a presentation. However, it is the presenters' responsibility to check

each and every point manually on each slide before attempting to make a presentation.

Reviewing Content

Page 86: class 10 IT Reader

Inform

ation

Technolog

y Level -2

75

In this exercise you will learn to make an effective presentation. Making effective

presentations takes practice, but with a few tips up your sleeve, you are ready to take on the

challenge.

1. Know your topic.

You may want to charge right in and start using the presentation software. However,

do the research first and know your material, think through what and how you will

present get comfortable with the matter before beginning the project on the

computer. Creating the presentation is the easy part. The best classroom

presentations are created by people who are comfortable with what they are going to

talk about.

2. Use key phrases about your topic.

Good presenters use key phrases and include only the most important information.

Choose only the top three or four points and make them several times throughout the

presentation. Highlight key points that are necessary for the audience to remember.

Keep the points as short as possible, use 5-6 words to describe the point.

3. Avoid too much text on each slide.

Do not write your whole speech on the slides. The slide show is meant to accompany

your oral presentation. Summarize the content as bullet points. Use simple language

and limit the number of bullets to three or four per slide.

4. Limit the number of slides.

Too many slides in a presentation may cause you to rush to get through them and

your audience might end up paying more attention to the changing slide than to

what you are saying. On average, one slide per minute is about right in a classroom

presentation.

5. Plan the layout of your slide.

Make your slides easy to follow. Put the title at the top. Phrases should read left to

right and top to bottom. Keep important information near the top of the slide.

6. Avoid fancy fonts.

Make sure the fonts, design and colors are consistent throughout the presentation;

don't use different styles for each slide. Use fonts that are readable; recommended

fonts are Arial, Tahoma, Verdana. Use standard font size that is readable even from

the last row if presented in a large hall or to a large audience. Use combination of

capital and small letters; Do NOT use all capital letters as it may be difficult to read.

Use bold, italics or underline only if required or to highlight key points.

Page 87: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

76

7. Use contrasting colors for text and background.

Use reasonable mix of text color and background; preview to check if it is readable

without any difficulty. Dark text on a light background is usually the best as this

combination offers the maximum visibility. Keep your slide color scheme consistent

throughout your presentation.

8. Use a slide design template to keep your presentation look consistent.

Use a single background on all slides; do NOT use multiple backgrounds. Use a

pleasant template or style set; do NOT use different style sets for different slides as it

will distract the audience and they might lose the focus.

9. Use animations and transitions sparingly.

You may enjoy applying animations and transitions in every place that you can. This

will certainly be entertaining, but at the same time very distracting. So use this

feature with prudence.

10. Also, always review the presentation 2-3 times before making a presentation; this

can help in reducing or eliminating any errors in it. Remove irrelevant points

during the review, add or remove images during review. Try presenting to a smaller

audience, make necessary corrections before presenting it to a larger audience

Note: Most presentation software includes many features; do NOT try to overuse them!!!

Once you have created the presentation of your choice using the guidelines, you may now

proceed to reviewing the presentation. Use the additional guidelines below:

Do a thorough spell check across all slides

Perform a manual spell check for terms that is not included during the standard spell

check in the presentation software; NOT all terms (particularly technical terms such

as biological names, etc.) will be checked

Remove irrelevant content such as images or clip arts, terms, etc. if they are not

required.

Now that you have a presentation ready, you can customize the delivery of the

presentation. For example, you can customize to display selected slides to be

displayed to the audience or configure for multiple monitors, etc.

In this exercise, you will learn to deliver a presentation.

o

o

o

Preparing to deliver a Presentation

Page 88: class 10 IT Reader

Inform

ation

Technolog

y Level -2

77

To work with Slide Show, open an existing presentation in the presentation software.

Click on Set Up SlideShow option under Set Up group in the Slide Show tab.

Once you click Set Up SlideShow, a dialog box appears as shown below.

If the presentation is to be made to an audience, use the Presented by a speaker

(full screen) option.

If the presentation is to be made to an individual, use Browsed by an individual

(window) option.

If the presentation is to be made at Kiosks, use the Browser at a Kiosk (full screen) option.

Note: A kiosk is a computer terminal featuring specialized hardware and software

designed within a public exhibit that provides access to information and applications for

communication, commerce, entertainment, and education.

In addition, you can configure the presentation to be automated (run continuously),

with or without animation by using the options under Show Options group.

You can display selective slides from a presentation using the Show slides option.

Sometimes you may need to provide print outs of the presentation to the audience as a

reference material. You can print notes, handouts or outline of the presentation using the

presentation software. In this exercise, you will learn to print notes, handouts and outline.

Print a Presentation

Page 89: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

78

To print, open an existing presentation and select the Print option.

Select the Notes Page option under Print what: dropdown list (figure 24.

Click OK once you are ready to print the notes.

You can print handouts for audience reference by selecting the Handouts option under

Print what: dropdown list. To save paper, you can print multiple slides on a single sheet.

To print multiple slides, select the number of slides that you would like to print by

choosing the number displayed under Slides per page dropdown under Handouts Group

(figure 25).

If you would to print only the text part of the presentation, you can use the Outline option

in the presentation software.

To print the outline, select the Outline View option under Print what: dropdown list.

Page 90: class 10 IT Reader

Inform

ation

Technolog

y Level -2

Introduction to Web Design & HTML

You have surfed several websites, exchanged emails, performed online transactions,etc. in

the previous sessions. If you want to create websites like the ones you haveseen, you need

to learn a variety of technologies, tools and techniques.Web designing refers to the skills

that are required to create and manage websites.Web design as a whole refers to designing

a user interface, authoring (programming)or a combination of both. Designing a website

requires multiple skills. However, it isrecommended to master and become skilled in one

particular technology once you geta taste of various technologies involved.

Following topics are covered in this module:

HTML & CSS

Web Authoring Tools, Microsoft Expression Web

Overview of Client-side & Server-side scripting, JavaScript & VBScript

A number of markup languages such as HTML, DHTML, XML are used to create webbased

content. Apart from these, software products such as FrontPage, Dream Weaveretc are also

used to develop web based content. Web based applications are built using technologies

such as ASP (Active Server Pages), JSP (Java Server Pages), PHP (Hypertext Preprocessor),

ASP.net etc.

HTML or Hypertext Markup Language is a language used for created web pages that can be

viewed in a web browser.

Hyper - means active and all over the place! When you use a Web browser, youcan

move all over the place, without a specified order as to how to access pages/sites.

Text - You will be working with text files only.

o

o

o

o

o

Web Publishing

Understanding HTML

Digital Content CreationWeb Designing Fundamentals

79

5Unit-

Page 91: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

80

o

o

Markup - To create a Web page, you will type in the text and then ?Mark up? the text.

Language - This is a method of creating something or communicating and in this case,

you are creating Web pages using a particular syntax.

HTML elements are the building blocks of a website. Web browsers interpret the

tagswritten in HTML and display a web page.

Hypertext refers to the text that can be linked to another text or page which a usercan

access. Hypertext is the underlying concept behind the World Wide Web.

HTML is developed and maintained by World Wide Web Consortium abbreviated asW3C.

When HTML was first released, there were a handful of tags available and usedfor basic

web page structures. As time evolved, several new tags and attributes wereintroduced.

Popular HTML versions include HTML 4.01 and HTML 5.0.

All you need is a text editor such as notepad to create a web page using HTML. HTML files

have the extension .htm or .html. You can open the web pages using web browsers such as

Mozilla Firefox, Internet Explorer, Google Chrome, etc.

Web browsers have the ability to display the source code used for a web page. You can use

this to enhance your knowledge To view the code, do the following:

1. Open the Web Browser and right-click anywhere in the web page and select View

Page Source from the context menu similar to the one below:

2. Notice, the source code of the web page is visible with different color codes.

The colors have no meaning in terms of function and are only used to differentiate

different sets of code.

You can save web pages for future reference using the following procedure:

1. Select File > Save Page As…

2. Type a file name and click Save.

When you work with a document, you create headings, sub-headings, tables, etc. to give the

document a structure. Similarly in HTML, tags or elements are used to create a web pages'

structure.

Designing Web pages using HTML

Viewing Source Code

Saving a web page

HTML Elements & Attributes - The Basics

Page 92: class 10 IT Reader

Inform

ation

Technolog

y Level -2

81

Look at an example of an online magazine. Online magazines have articles with text

content, images, videos, links or continuation to related articles, advertisements, etc. They

appear as a single web page to visitors. Have you noticed that the headings are of varying

sizes to indicating topics and sub-topics and different from the content?

All this formatting is possible using combinations of several HTML elements.

Elements have content placed between a start tag and an end tag. Tags act as containers for

text, images and other types of content. Tags start an opening tag and end with a closing

tab, using angle brackets (<>) to define the structure.

Note: To learn to use the tags, throughout this document, you will find examples of code

displayed within dotted boxes. Copy it in a text editor, save it in your local computer and view

using web browsers.

HTML uses tags enclosed in angle brackets; most tags are used in pairs such as

<html></html>, etc. Following is a simple example of HTML code:

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<p>Hello World!</p>

<!--this is an example of simple HTML code created using Notepad-->

</body>

</html>

Elements & Attributes

Writing your First HTML Code

Page 93: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

82

In the above mentioned code, there are a few HTML tags used. All HTML documents start

with <html> and end with </html>. The rest of the document contains other elements

and web page content placed using elements.

Document type or DOCTYPE is an element used for indicating the version of HTML

used in a web page. This is used by the web browser to apply a set of rules for

understanding the document structure.

HTML element indicates the start and end of an HTML document. <HTML> indicates

the beginning of this HTML document and </HTML> indicates the end.

HTML is also the root of an HTML document and has two parts, Head and Body

elements.

Head element represents the header section of a document and contains

information about a web page. Head elements start with <head> and end with

</head>. This element includes all other elements that need to be executed or

understood before the content (included in the body element) is displayed to the

user.

Content placed within the <Title> and </Title> element is displayed as the title of a

web page and used by search engines to create indexes of content.

Body element represents the section that contains body content and is displayed

in the web browser. Most HTML elements are used within the body element

between <body> and </body> tags.

If you want to place hidden text in a web page, you can use the comment element (<!--

> and <--> tags). Text placed using comment element will not be displayed in a web

browser but can seen when viewing the source code. This is useful to developers or

users who would like to share their experience in writing HTML code but hide the

text from general visitors.

Attribute are used to provide additional information about an element. Attribute contains

values and some elements use multiple attributes.

o

o

o

o

?

?

HTML Attributes

Page 94: class 10 IT Reader

Inform

ation

Technolog

y Level -2

83

Nesting

Text formatting

You can nest other elements within elements. Elements nested within another element are

referred to as a child elements and the nesting element is referred to as a parent element.

When you nest elements, you need to ensure the elements are used in proper order.

Observe the correct way of using opening and closing tags illustrated in the figure below:

You can format the text content of a web page to make it attractive by using other HTML

elements such as Headings, Bold, Italics, etc.

Heading There are six levels of heading elements from H1 to H6. H1 has the

largest text size and H6 has the smallest heading text size.

Emphasize To emphasize a particular text in a sentence (for example a text that

should be pronounced different), use this element. Text enclosed

within <em> and <lem> are displayed in italics.

Italics If you want the text to be displayed in alternate voice such as a text

translated from a foreign language, technical words or present text

in typographic italics, enclose the text within <i> and </i> elements.

Html Elements & Attributes - Text Formatting

Element Description

Page 95: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

84

Strong If you want to emphasize a text with stronger importance in a

sentence, use the strong element. Text enclosed within <strong> and

</strong> are displayed in bold.

Bold To make the text such as keywords visually bold, enclose the text

within <b> and </b>, the bold element.

Underline To underline the text, enclose the text within <u> and </u>, the

underline element.

Mark To highlight the text in a sentence, enclose the text within mark

element: <mark> and </mark>

Big If you want to display a particular text in a sentence bigger than rest

of the text in a sentence, enclose the text within the big element :

<big> and </big>.

Small To display a particular text in a sentence as smaller than the rest of

the text in a sentence, enclose the text within the small element:

<small> and </small>.

Subscript & Text enclosed within <sub> and </sub> are displayed as subscripts

superscripts and Text enclosed within <sup> and </sup> are displayed as

superscripts.

Pre Text enclosed using <pre> and </pre> tags are displayed as it is (in

the example below - using a mono-space font such as Courier)

INS & DEL Text enclosed within <del> and </del> are displayed as struck out

while text enclosed within <ins> and </ins> is underlined.

Break To separate single lines or use multiple line spacing, use the break

element. Breaks between lines are represented through use of <br>.

No closing tag is needed.

HR To separate sections, use a horizontal line to indicate

distinctiveness. Horizontal line is indicated through use of <hr>

element and requires no closing tag.

<!DOCTYPE html>

<html>

<head>

Sample Code - Text Elements

Page 96: class 10 IT Reader

Inform

ation

Technolog

y Level -2

85

<title>Learn HTML</title>

</head>

<body>

<p> HTML supports six levels of headings, H1 to H6 with H1 being the largest.</p>

<h1>Main Heading</h1>

<h2>Sub heading, Level 1</h2>

<h3>Sub heading, Level 2</h3>

<h4>Sub heading, Level 3</h4>

<h5>Sub heading, Level 5</h5>

<h6>Sub heading, Level 6</h6>

<p> You are required to <em>agree</em> with our terms and conditions.</p>

<p> <i>HTML</i> is simple to learn.</p>

<p>It is important to know the common <strong>HTML Elements and attributes.

</strong></p>

<p>This an example of text displayed in <b>bold</bold>.</p>

<p>This an example of text displayed <u>underlined</u>.</p>

<p>This is an example of highlighted <mark>text.</mark></p>

<p><big>Sun</big> is the largest of all planets with 696,000 KM as it’s radius.</p>

<p><small>Mercury</small> is the smallest planet in the Solar System ever since Pluto

lost its status and was reclassified as a dwarf planet.</p>

<p>this is an example of subscript for a formula, H<sub>2</sub>O</p>

<p>this is an example of superscript for a formula, (A+B)<sup>2</sup></p>

<pre>

/* Hello World program */

#include<stdio.h>

main()

{

printf("Hello World");

}

</pre>

<p>this is the correct spelling of <del>entreprenaur</del>

<ins>entrepreneur</ins></p>

</body>

</html>

Page 97: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

86

Referencing Elements

Sample Code - Referencing Elements

Element Description

Quote To include short text such as name of an author, publisher, etc. in

quotes, use the quote element. You can also use the cite attribute to

indicate the source. Text included within <q> and </q> is displayed

within quotations.

Blockquote To include lengthy quotes, include text within <blockquote> and

</blockquote> elements.

Cite To specify a tile of a work such as title of a book, movie, painting, etc.

include text within <cite> and </cite> elements.

Abbreviation To include abbreviations of acronyms, include the abbreviation

between <abbr> and </abbr> elements. Text included within this

element will be displayed when the cursor is moved over the text.

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<p>HTML Tutorial

<q>Created by Author Name</q>

<blockquote cite="http://en.wikipedia.org/wiki/Google_Analytics"> Google Analytics (GA)

is a service offered by Google that generates detailed statistics about a website's traffic and

traffic sources and measures conversions and sales.</blockquote>

<p>You can learn more about web design at <cite>

http://en.wikipedia.org/wiki/Web_design</cite>

<p><abbr title=" Hypertext Markup Language">HTML</abbr> has several elements and

attributes. </p>

</p>

</body>

</html>

Page 98: class 10 IT Reader

Inform

ation

Technolog

y Level -2

87

Tables

Images

You can create a table using the Table Element. Tables are made of rows and

columnssimilar to that of a spreadsheet. Rows are contained within table row element

<tr> and data is stored within row element <td>.

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<table>

<tr><td>Name</td><td>Age</td><td>City</td></tr>

<tr><td>Anand</td><td>17</td><td>Delhi</td></tr>

<tr><td>Rohit</td><td>23</td><td>Bangalore</td></tr>

</table>

</body>

</html>

You can include images in your web page by using the <img> image element. Use the SRC

attribute to specify the location of the image and width and height attributes to specify the

dimensions of the image. Also it is a recommended practice to use the ALT attribute for

displaying text if the image is not downloaded.

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<img src="HTML5-logo.png" alt="HTML 5 Logo, is not displayed due to an error.

Please reload this page or contact the website administrator" width="300"

height="300">

</body></html>

Page 99: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

88

Working with Audio, Video & Flash

Element Description

Audio To include an audio clip, enclose the audio within the <audio> and

</audio> elements and point to the clip using SRC attribute. To

automatically play the audio, use the autoplay attribute. To display

controls, use the controls attribute.

Video To include a video clip, enclose the audio within the <video> and

</video> elements and point to the clip using SRC attribute. Also use

width and height attributes to specify the dimenstions of a video clip.

Flash To embed a flash animation, use the <embed> and </embed>

elements and point to the animation using SRC attribute.

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<audio src="pump_im.mp3" autoplay controls>

Your browser does not support the audio element.

</audio>

</body>

</html>

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<video src="sample_mpeg4.mp4" height="320" width="200" controls>

Your browser does not support the Video element.

</video>

</body>

</html>

Page 100: class 10 IT Reader

Inform

ation

Technolog

y Level -2

89

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<embed src="sample.swf" height="200" width="320">

</body>

</html>

You can also include videos from other sources such as youtube.com, etc. To include a video

from youtube.com, do the following:

1. Go to Youtube.com

2. Select a video clip

3. Right-click on the video and select Copy embed html

Write the code within <body> and </body> section (sample below).

.<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

</head>

<body>

<iframe width="640" height="360"

src="http://www.youtube.com/embed/v4oN4DuR7YU?feature=player_detailpage"

frameborder="0" allowfullscreen></iframe></body>

</html>

Now save and open this web page using a web browser.

Note: Refer to Youtube.com FAQ' for detailed instructions.

Page 101: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

90

Html Elements & Attributes - Forms & Frames

Forms

Sample Code - Forms

Forms contain input elements such as text boxes, dropdown menus, check boxes, radio

buttons, etc. to collect information from visitors and sent to a web server for further

processing such as displaying search results or send to a database for storage.

Forms are created using <form> element along with action and method attributes.

Action attribute is used for specifying the URL to where the data needs to be submitted.

Method attribute is used for specifying the HTTP method, get or post.

POST attribute is used for storing or updating a database or for sending emails and GET

attribute is used for retrieving data.

Form element uses text boxes to collect text information and radio buttons, check boxes

and dropdown menus for collecting information through pre-defined options.

Textbox Single-line text input box is typically used for collecting shorter text

such as usernames or passwords. Multiple-line text input boxes are

used for collecting lengtheir text such as narrative feedback, etc.

Radio Buttons Used for collecting single value from multiple values. You should use

type=radio attribute for using radio buttons in a web page.

Checkbox Used for collecting multiple values. You should use type=checkbox

attribute for using checkboxes in a web page.

Dropdown Used for collecting single or multiple values from a dropdown menu.

You should use the option attribute along with values to present

multiple options.

Submit Submit button allows visitors to submit the value.

Reset Reset button clears all the selections made.

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title>

Control Description

Page 102: class 10 IT Reader

Inform

ation

Technolog

y Level -2

91

</head>

<body>

<p>Subscribe to your weekly Newsletter</p>

<form action="http://www.example.com/signup.asp" method="post">

Name <input type="name" name="Name" size="30">

Password <input type="password" name="Name" size="30">

<textarea rows="3" name="Comments" cols="30"></textarea>

<p>I agree to the Terms and Conditions.

<input type="radio" value="Agree" name="R1"> Yes

<input type="radio" value="Diagree" checked name="R1"> No</p>

<p>10th <input type="checkbox" name="Class_10" value="ON"> 12th

<input type="checkbox" name="Class_12" value="ON"> Bachelors Degree

<input type="checkbox" name="Bachelors_Degree" value="ON"> Masters Degree

<input type="checkbox" name="Masters_Degree" value="ON"></p>

<p>This is an example of Dropdown Menu (Single Selection)</p>

<p>School Education Board<select size="1" name="School">

<option>State Board</option>

<option>Matriculation</option>

<option>CBSE</option>

</select> </p>

<p>

<input type="submit" value="Submit" name="Submit">

<input type="reset" value="Reset" name="Reset"></p>

</form>

</body>

</html>

Frames are used to display one or more pages within a single web page; collections of

different frames are referred to as a frameset. Frames are used when you want to display

different pages as a single page in a web browser.

Frames

Page 103: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

92

<html>

<frameset cols="25%,50%,25%">

<frame src="sample.htm">

<frame src="sample.htm">

<frame src="sample.htm">

<noframes>

Text to be displayed in browsers that do not support frames

</noframes>

</frameset>

</html>

iframe or inline frames is an element used for embedding another document or an URL

with a web page.

<!DOCTYPE html>

<html>

<head>

<title>Learn HTML</title></head>

<body>

<p>You can use iframe to include a web page.</p>

<iframe width="600" height="300" src="lesson002.htm"></iframe>

<hr>

<p>You can use iframe to view another website live.</p>

<iframe width="600" height="300" src="http://www.mozilla.org"></iframe>

<hr>

<p>You can restrict scrolling in iframe.</p>

<iframe width="600" height="300" src="http://www.wikipedia.org"

scrolling=no></iframe>

</body>

</html>

iframe

Page 104: class 10 IT Reader

Inform

ation

Technolog

y Level -2

93

Creating Websites and Webpages in a Website

Creating a Website

You can create websites with your own design. When you work with web pages, images,

style sheets, etc., you need to store all the related files in a single location (folder). This

helps you to:

Stay organized

Upload the entire content to the remote server when you want to publish the website.

Note: You will learn about templates later in this module. To create a new website, do the

following:

1. Select Site > New Site…

2. A window appears similar to the one below:

a. You can create a website with a single page by selecting One Page Site.

b. You can create a website from scratch by selecting Empty Site.

c. If you already have a website created using HTML or any other software, you can

continue to work with the website using MEW once it is imported. To import an

existing website, use the Import Site Wizard.

3. Select Empty Site and enter a name for the website, for example:

MyFirstWebsite. Click OK.

o

o

Page 105: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

94

4. A website is created and you will notice a window similar to the one below:

5. Now you can create web pages for this website. Navigate to the location (example:

6. My Documents) where you stored the website. Notice the folder icon.

Content such as images, flash animations, web pages & style sheets, etc. will be

automatically stored in this folder.

Once the website is created, you need to create web pages. To create a webpage, do the

following:

1. Select File > New > Page…. A window appears similar to the one below:

Create a Web page

Page 106: class 10 IT Reader

Inform

ation

Technolog

y Level -2

95

2. You can use MEW to create web pages using HTML or ASP code, Style Sheets (CSS), etc.

Select HTML from the list and Click OK. Notice that a new page is created (figure

below).

3. Notice the file name Untitled_1.html. Being the first page of the website, this page is

may be your homepage. Use a standard naming convention such as default.htm,

index.htm or home.htm and save this page. To save this page, select File > Save.

4. Type the file name as default and select Save. You need not specify .htm or .html

extension as it is automatically added to the web page.

HTML Editors such as MEW automatically append the required file extension, .html by

default. You can configure the HTML editor to add the extension .htm by the following

procedure:

1. Select Tools > Page Editor Options…. The Page Editor Options dialog box appears

(figure below).

Handling File Extensions

Page 107: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

96

2. Select the Authoring Tab (figure below).

3. Notice the default document type selected as HTML under Default Document:

dropdown menu and file extension selected as .html in Default HTML File

Extension: option.

You can change the settings, and, it is recommended to change Document Type

Declaration to HTML 5.

You can configure expression web to use external programs such as notepad to open

specific file types such as a style sheet. By default, style sheets open in expression web. To

modify, do the following:

1. Select Tools > Application Options…. The Application Options dialog box appears

(figure below).

2. Select the Configure Editors Tab (figure below).

Page 108: class 10 IT Reader

Inform

ation

Technolog

y Level -2

97

3. Notice the file extensions (left pane) and application that will handle the extension

(right pane) displayed.

Note: Do NOT change any settings here for now.

The biggest advantage of HTML editors such as MEW is that the code is written for you by

the software.

1. Type the following in the body area (figure below):

a. My Homepage

b. This is a website created using a HTML Editor.

When you create content, MEW automatically intends them as paragraphs. You may notice

the paragraph element indicated (see figure above) as "p" with a box above around the

content. When you use carriage return (Enter key), MEW inserts another paragraph

similar to that of the word processing software.

2. Now select the text "My Homepage" and do the following:

a. Select the Style dropdown located in the toolbar (figure below)

b. Select Heading 1 <h1> from the list.

3. Now select the text "This is a website created using a HTML Editor." Select Heading 3

<h3> from the style dropdown list.

4. Once complete, select View (Menu) > Page > Code (or select Code located above the

status bar). You will see a screen similar to the one below:

Working with a Web page

Page 109: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

98

5. Notice the text is enclosed using heading (h1 and h3) elements. Now save this page

(CTRL+S).

Since the editor writes the code for you; you can stay focused on creating the content rather

than focusing on the code!

If you have noticed, there are pre-built standard HTML elements that you can use in a

webpage by just selecting the element from the style dropdown menu Now to switch back

to design view, select View > Page > Design.

The three views available in MEW are:

1. Design View: This is the default view and displays only the content.

2. Code View: This is used either when you want to view the source code written by the

HTML editor or, when you want to insert elements or code that is not available within

the HTML editor.

3. Split View: This is used when you want to use both the Design and Code View side-by-

side.

If you want to test your web page, it is a recommended practice to test using multiple web

browsers. However you may need to set up the browser list. To specify multiple browsers,

do the following:

1. Select File > Preview in Browser > Edit Browser List…. The Edit Browser List dialog

box appears.

Using Multiple Web Browsers

Page 110: class 10 IT Reader

Inform

ation

Technolog

y Level -2

99

2. You may notice that some web browsers are added to the list by default. If you want

add a web browser (for testing), select Add…, and specify the path of the executable

file of the web browser (for example: C:\Program Files\Google\Chrome\

Application\chrome.exe).

3. You can also use set the screen resolution here. This could be useful when you want to

test your pages for viewing on Smartphones or tablets that use different screen

resolutions.

A blog is a discussion style site used by non-technical (and technical users) users for

creating personal web pages. Blogs are similar to an online personal diary and simple to

use.

You can use a blog to convey messages about events, announcements, news, reviews,

etc. Blogs are usually managed using a web browser and this requires active internet

connection. You can also use offline blog software to create content first and later

publish the content when an active internet connection is available.

There are hundreds of websites that offer blog service for free. Some of the popular blogs

include:

www.WordPress.com

Web Page Layout - Blogs

o

Page 111: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

100

o

o

o

o

o

o

o

o

o

o

o

o

o

www.blogger.com

www.blog.com

www.weebly.com

www.blogsome.com

In this session, you will learn how to create a blog account in WordPress.

WordPress is free web service that you can use to create a beautiful website or blog.

WordPress has support for "themes" for customizing the design of a blog. Themes can

make the blog or the webpage look attractive.

Before you start using a blog, a blog account is required. To create one, you need a web

browser and an internet connection.

Open the Web Browser.

On the address bar type https://signup.WordPress.com/signup/.You should now get

to a page with the fields Blog address, Username, Password, Email Address and

Language.

Blog Address: You must provide a unique address to your WordPress Blog. This is

the address which others will use to view your blog.

Username: You should choose a username for managing this blog.

Password: Securing your WordPress blog account with a strong password is

important. A combination of uppercase and lowercase letters with some digits

along with symbols would be a strong enough password. You need to enter the

password twice.

Email Address: You must provide your Email Address here. An activation link

will be send to you from WordPress after you click "Create Blog".

Language: You can choose your own language for blogging from the list given.

Click Create Blog.

On doing so, you will be sent an email for activating your blog account. Open your email

and click on the activation link. Once you click Activate Blog, you will be redirected to

your WordPress Blog Account and you should see a web page similar to the one displayed

below.

Creating a Blog Account

Page 112: class 10 IT Reader

Inform

ation

Technolog

y Level -2

101

Now the blog is ready for use. You will be presented with the address of your blog as

displayed in the web page above; you can either double click on the link or type the address

manually in the web browser. Either action takes you to the homepage of your blog.

Once you have created a blog, you need to submit content that you want others to view. This

process ids called posting content.

To create a post, click New Post. A Window similar to the one displayed below

appears.

Title: You must provide a title for your post; choose a tile that this post will focus on.

For example, "School Annual Day Function 2012".

Using the rich text box, you can type content that you want others to read.

Once you have finished typing the content, you need to publish the post for others to see.

Click Publish Post to publish your content. To view the post, you can type the blog address

in the address bar of the web browser; you should see your blog along with the post

(displayed below).

o

o

Page 113: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

102

You can also add photos, videos, etc. to the blog using the options available in

WordPress.You can comment on posts published by others. Usually, the comment

option is available towards the end of the post. Look for options such as Leave a comment,

Leave a reply, etc. in the blog to comment. For example, in WordPress the comment box is

located below the post and labelled as Leave a reply.

In the Enter your comment here… text box, type your comments about the post.

In the Email (required) field, type your email address.

In the Name (required) field, type your name.

In the Website filed, you may type your blog address (Optional).

Once you have typed the content in the comment area, review carefully and Click Post

Comment.

Once you click the Post Comment, you will see the blog along with your comment.

o

o

o

o

o

Page 114: class 10 IT Reader

Inform

ation

Technolog

y Level -2

Computer System Care

103

Hardware Security

Assessing your risks

Many organisations underestimate the importance of keeping their offices and their

equipment physically secure. As a result, they often lack a clear policy describing what

measures they should take to protect computers and backup storage devices from theft,

severe weather conditions, accidents, and other physical threats. The importance of such

policies may seem obvious, but formulating them properly can be more complicated than

it sounds. Many organisations, for example, have good quality locks on their office doors,

and many even have secure windows; but if they do not pay attention to the number of keys

that have been created, and who has copies of those keys, their sensitive information

remains vulnerable.

Shingai: We want to put a brief summary of our security policy into this grant application,

but we also need to make sure the policy itself is thorough. What should we include in it?

Otto: I'm afraid I can't recommend a one-size-fits-all solution to the challenge of physical

security. The specifics of a good policy almost always depend on a particular

organisation's individual circumstances. Here's a piece of general advice, though: when

you're trying to come up with a plan, you need to observe your work environment very

carefully and think creatively about where your weak points might be and what you can

do to strengthen them.

When assessing the risks and vulnerabilities that you or your organisation face, you must

evaluate several different levels at which your data may be threatened.

Consider the communication channels you use and how you use them. Examples

might include paper letters, faxes, landline phones, mobile phones, emails and Skype

messages.

Consider how you store important information. Computer hard drives, email and

web servers, USB memory sticks, external USB hard drives, CDs and DVDs, mobile

phones, printed paper and hand-written notes are all likely possibilities.

o

o

6Unit-

Page 115: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

104

oConsider where these items are located, physically. They could be in the office, at

home, in a trash bin out back or, increasingly, 'somewhere on the Internet.' In this last

case, it might be quite challenging to to determine the particular piece of

information's actual, physical location.

Keep in mind that the same piece of information might be vulnerable on many

different levels. Just as you might rely on anti-virus software to protect the contents of

a USB memory stick from malware, you must rely on a detailed physical security plan

to protect the same information from theft, loss or destruction. While some security

practices, such as having a good off-site backup policy, are helpful against both digital

and physical threats, others are clearly more specific.

When you decide whether to carry your USB memory stick in your pocket or sealed in

a plastic bag at the bottom of your luggage, you are making a decision about physical

security, even though the information you are trying to protect is digital. As usual, the

correct policy depends greatly on the situation. Are you walking across town or

travelling across a border? Will somebody else be carrying your bag? Is it raining?

These are the sorts of questions that you should consider when making decisions like

this.

No matter how much effort you have put into building a digital barrier around your

computer, you could still wake up one morning to find that it, or a copy of the information

on it, has been lost, stolen, or damaged by any number of unfortunate accidents or

malicious acts. Anything from a power surge to an open window to a spilt cup of coffee

might lead to a situation in which all of your data are lost and you are no longer able to use

your computer. A careful risk assessment, a consistent effort to maintain a healthy

computing environment and a written security policy can help avoid this type of diaster.

Shingai and Rudo are an elderly married couple with many years of experience helping

the HIV-infected population of Zimbabwe maintain access to proper medication. They are

applying for a grant to purchase new computers and network equipment for their office.

Since they live in a region that is quite turbulent, in terms both of politics and of

infrastructure, they and their potential funders want to ensure that their new hardware

will be safe, not only from hackers and viruses, but also from confiscation, thunderstorms,

electrical spikes and other such disasters. They ask Otto, a local computer technician, to

help them devise a plan of action to strengthen the physical security of the computers and

network hardware they plan to buy if their grant application is successful.

How to protect your information from physical threats

Background scenario

Page 116: class 10 IT Reader

Inform

ation

Technolog

y Level -2

105

What you can learn from this chapter

o

o

o

o

o

o

o

o

o

o

More about a few of the physical threats to your computer and to the information

stored on it

How best to secure computer equipment against some of these threats

How to create a healthy operating environment for computers and network

equipment

What to consider when creating a security plan for the computers in your office

Like many electronic devices, computers are quite sensitive. They do not adapt well to

unstable electricity supplies, extreme temperatures, dust, high humidity or mechanical

stress. There are a number of things you can do to protect your computers and network

equipment from such threats:

Electrical problems such as power surges, blackouts and brownouts can cause

physical damage to a computer. Irregularities like this can 'crash' your hard drive,

damaging the information it contains, or physically harm the electronic components

in your computer.

If you can afford them, you should install Uninterruptible Power Supplies (UPS') on

important computers in your office. A UPS stabilises electricity supply and provides

temporary power in the event of a blackout.

Even where UPS' are deemed inappropriate or too costly, you can still provide power

filters or surge protectors, either of which will help protect you from power surges.

Test your electrical network before you connect important equipment to it. Try to use

power sockets that have three slots, one of them being a 'ground line', or 'earth'. And,

if possible, take a day or two to see how the electrical system in a new office behaves

when powering inexpensive devices, such as lamps and fans, before putting your

computers at risk.

To defend against accidents in general, avoid placing important hardware in

passages, reception areas or other easily accessible locations. UPS', power filters,

surge protectors, power strips and extension cables, particularly those attached to

servers and networking equipment, should be positioned where they will not be

switched off by an accidental misstep.

If you have access to high-quality computer cables, power strips and extension cables,

you should purchase enough to serve your entire office and pick up a few extras.

Maintaining a healthy environment for your computer hardware

Page 117: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

106

Power strips that fall out of wall sockets, fail to hold plugs securely and spark

constantly are more than just annoying. They can be quite damaging to the physical

security of any computers attached to them. They can also lead frustrated users to

secure their loose computer cables to a sparking power strip with tape, which creates

an obvious fire hazard.

If you keep any of your computers inside cabinets, make sure they have adequate

ventilation, or they might overheat

Computer equipment should not be housed near radiators, heating vents, air

conditioners or other ductwork

Once you have assessed the threats and vulnerabilities that you or your organisation face,

you must consider what steps can be taken to improve your physical security. You should

create a detailed security policy by putting these steps in writing. The resulting document

will serve as a general guideline for yourself, your colleagues and any newcomers to your

organisation. It should also provide a checklist of what actions should be taken in the event

of various different physical security emergencies. Everybody involved should take the

time to read, implement and keep up with these security standards. They should also be

encouraged to ask questions and propose suggestions on how to improve the document.

Your physical security policy may contain various sections, depending on the

circumstances:

An office access policy that addresses the alarm systems, what keys exist and who has

them, when guests are allowed in the office, who holds the cleaning contract and

other such issues

A policy on which parts of the office should be restricted to authorized visitors

An inventory of your equipment, including serial numbers and physical descriptions

A plan for securely disposing of paper rubbish that contains sensitive information

Emergency procedures related to:

Who should be notified if sensitive information is disclosed or misplaced

Who to contact in the event of a fire, flood, or other natural disaster

How to perform certain key emergency repairs

How to contact the companies or organizations that provide services such as

electrical power, water and Internet access

o

o

o

o

o

o

o

o

o

o

o

Creating your physical security policy

Page 118: class 10 IT Reader

Inform

ation

Technolog

y Level -2

107

o

o

o

o

o

o

o

How to recover information from your off-site backup system. You can find more

detailed backup advice in Chapter 5: How to recover from information loss.

Your security policy should be reviewed periodically and modified to reflect any policy

changes that have been made since its last review. And, of course, don't forget to back up

your security policy document along with the rest of your important data. See the Further

reading section for more information about creating a security policy.

Malicious individuals seeking access to your sensitive information represent one

important class of physical threat. It would be a mistake to assume that this is the only

such threat to the security of your information, but it would be even more shortsighted to

ignore it. There are a number of steps you can take to help reduce the risk of physical

intrusion. The categories and suggestions below, many of which may apply to your home as

well as your office, represent a foundation upon which you should build in accordance with

your own particular physical security situation.

Get to know your neighbours. Depending on the security climate in your country and

in your neighbourhood, one of two things may be possible. Either you can turn them

into allies who will help you keep an eye on your office, or you can add them to the list

of potential threats that your security plan must address.

Review how you protect all of the doors, windows and other points of entry that lead

into your office.

Consider installing a surveillance camera or a motion-sensor alarm.

Try to create a reception area, where visitors can be met before they enter the office,

and a meeting room that is separate from your normal work space.

Protect network cables by running them inside the office.

Lock network devices such as servers, routers, switches, hubs and modems into

secure rooms or cabinets. An intruder with physical access to such equipment can

install malware capable of stealing data in transit or attacking other computers on

your network even after he leaves. In some circumstances it may be beneficial to hide

servers, computers or other equipment in attics, over a fake ceiling, or even with a

neighbor, and use them through wireless connection.

Protecting your information from physical intruders

Around the office

In the office

Page 119: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

108

o

o

o

o

o

o

If you have a wireless network, it is critical that you secure your access point so that

intruders cannot join your network or monitor your traffic. If you are using an

insecure wireless network, anyone in your neighbourhood with a laptop becomes a

potential intruder. This is an unusual definition of 'physical', but it helps to consider

that a malicious individual who can monitor your wireless network has the same

access as one who can sneak into your office and connect an ethernet cable. The steps

required to secure a wireless network will vary, depending on your access point

hardware and software, but they are rarely difficult to follow.

You should position your computer screen carefully, both on your desk and when you

are away from the office, in order to prevent others from reading what is displayed

there. In the office, this means considering the location of windows, open doors and

the guest waiting area, if you have one.

Most desktop computer cases have a slot where you can attach a padlock that will

prevent anyone without a key from getting inside. If you have cases like this in the

office, you should lock them so that intruders cannot tamper with their internal

hardware. You might also consider this feature when purchasing new computers.

Use a locking security cable, where possible, to prevent intruders from stealing the

computers themselves. This is especially important for laptops and small desktops

that could be hidden inside a bag or under a coat.

Make sure that, when you restart your computer, it asks you for a password before

allowing you to run software and access files. If it does not, you can enable this feature

in Windows by clicking on the Start menu, selecting the Control Panel, and double-

clicking on User Accounts. In the User Accounts screen, select your own account and

click Create a Password. Choose a secure password, as discussed in Chapter 3: How

to create and maintain good passwords, enter your password, confirm it, click

Create Password and click Yes, Make Private.

There are a few settings in your computer's BIOS that are relevant to physical

security. First, you should configure your computer so that it will not boot from the

USB device, CD-ROM or DVD drives. Second, you should set a password on the BIOS

itself, so that an intruder can not simply undo the previous setting. Again, be sure to

choose a secure password.

At your work

Software and settings related to physical security

Page 120: class 10 IT Reader

Inform

ation

Technolog

y Level -2

109

o

o

o

o

o

If you rely on a secure password database, as discussed in Chapter 3, to store your

Windows or BIOS passwords for a particular computer, make sure that you do not

keep your only copy of the database on that computer.

Get in the habit of locking your account whenever you step away from your computer.

On Windows, you can do this quickly by holding down the Windows logo key and

pressing the L key. This will only work if you have created a password for your

account, as described above.

Encrypt sensitive information on computers and storage devices in your office. See

Chapter 4: How to protect the sensitive files on your computer for additional

details and pointers to the appropriate Hands-on Guides.

Rudo: I'm a bit nervous about messing around in BIOS. Can I break my computer if I do

something wrong?

tto: You sure can, at least for a little while. In fact, the settings that you might want to

change are pretty simple, but the BIOS screen itself can be a little intimidating, and it is

possible to leave your computer temporarily unable to start if you do something wrong. In

general, if you're uncomfortable working in BIOS, you should ask someone with more

computer experience to help you out.

Keep your laptop, your mobile phone and other portable devices that contain

sensitive information with you at all times, especially if you are travelling or staying

at a hotel. Travelling with a laptop security cable is a good idea, although it is

sometimes difficult to find an appropriate object to which you can attach one.

Remember that meal times are often exploited by thieves, many of whom have learnt

to check hotel rooms for laptops during hours of the day when they are likely to be

unattended.

If you have a laptop, tablet or other mobile device, try to avoid putting them on

display. There is no need to show thieves that you are carrying such valuable

hardware or to show individuals who might want access to your data that your

shoulder bag contains a hard drive full of information. Avoid using your portable

devices in public areas, and consider carrying your laptop in something that does not

look like a laptop bag.

Portable devices

Page 121: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

110

How to create and maintain secure passwords

Selecting and maintaining secure passwords

Many of the secure services that allow us to feel comfortable using digital technology to

conduct important business, from signing in to our computers and sending email to

encrypting and hiding sensitive data, require that we remember a password. These secret

words, phrases or strings of gibberish often provide the first, and sometimes the only,

barrier between your information and anyone who might want to read, copy, modify or

destroy it without your permission. There are many ways in which someone could learn

your passwords, but you can defend against most of them by applying a few specific tactics

and by using a secure password database tool, such as KeePass.

Mansour and Magda are siblings, in an Arabic-speaking country, who maintain a blog on

which they anonymously publicise human rights abuses and campaign for political

change. Magda recently tried to log into her personal webmail account and found that

her password had been changed. After resetting the password, she was able to log in, but

when she opened her inbox she noticed that several new messages were marked as having

been read. She suspects that a politically-motivated intruder may have learned or

guessed her password, which she uses for several of her website accounts. She is meeting

with Mansour, who has less computer experience, to explain the situation and to voice her

concerns.

In general, when you want to protect something, you lock it up with a key. Houses, cars and

bicycle locks all have physical keys; protected files have encryption keys; bank cards have

PIN numbers; and email accounts have passwords. All of these keys, physical and

electronic, have one thing in common: they open their respective locks just as effectively in

the hands of somebody else. You can install advanced firewalls, secure email accounts, and

encrypted disks, but if your password is weak, or if you allow it to fall into the wrong hands,

they will not do you much good.

A password should be difficult for a computer program to guess.

Make it long: The longer a password is, the less likely it is that a computer program

would be able to guess it in a reasonable amount of time. You should try to create

passwords that include ten or more characters. Some people use passwords that

contain more than one word, with or without spaces between them, which are often

Background scenario

Elements of a strong password

o

Page 122: class 10 IT Reader

Inform

ation

Technolog

y Level -2

111

called passphrases. This is a great idea, as long as the program or service you are

using allows you to choose long enough passwords.

Make it complex: In addition to length, the complexity of a password also helps

prevent automatic 'password cracking' software from guessing the right

combination of characters. Where possible, you should always include upper case

letters, lower case letters, numbers and symbols, such as punctuation marks, in your

password.

A password should be difficult for others to figure out.

Make it practical: If you have to write your password down because you can't

remember it, you may end up facing a whole new category of threats that could leave

you vulnerable to anybody with a clear view of your desk or temporary access to your

home, your wallet, or even the trash bin outside your office. If you are unable to think

of a password that is long and complex but still memorable, the Remembering

secure passwords section, below, might be of some help. If not, you should still

choose something secure, but you may need to record it using a secure password

database such as KeePass. Other types of password-protected files, including

Microsoft Word documents, should not be trusted for this purpose, as many of them

can be broken in seconds using tools that are freely available on the Internet.

Don't make it personal: Your password should not be related to you personally.

Don't choose a word or phrase based on information such as your name, social

security number, telephone number, child's name, pet's name, birth date, or anything

else that a person could learn by doing a little research about you.

Keep it secret: Do not share your password with anyone unless it is absolutely

necessary. And, if you must share a password with a friend, family member or

colleague, you should change it to a temporary password first, share that one, then

change it back when they are done using it. Often, there are alternatives to sharing a

password, such as creating a separate account for each individual who needs access.

Keeping your password secret also means paying attention to who might be reading

over your shoulder while you type it or look it up in a secure password database.

A password should be chosen so as to minimise damage if someone does learn it.

Make it unique: Avoid using the same password for more than one account.

Otherwise, anyone who learns that password will gain access to even more of your

sensitive information. This is particularly true because some services make it

relatively easy to crack a password. If you use the same password for your Windows

o

o

o

o

o

Page 123: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

112

user account and your Gmail account, for example, someone with physical access to

your computer can crack the former and use what they learn to access the latter. For

similar reasons, it is a bad idea to rotate passwords by swapping them around

between different accounts.

Keep it fresh: Change your password on a regular basis, preferably at least once

every three months. Some people get quite attached to a particular password and

never change it. This is a bad idea. The longer you keep one password, the more

opportunity others have to figure it out. Also, if someone is able to use your stolen

password to access your information and services without you knowing about it,

they will continue to do so until you change the password.

Mansour: What if I trust someone? It's OK for me to tell you my password, right?

Magda: Well, first of all, just because you trust somebody with your password doesn't

necessarily mean you trust them to take good care of it, right? Even though I wouldn't do

anything bad with your password, I might write it down and lose it or something. That

could even be how I got into this mess! And besides, it's not all about trust. If you're the

only one who knows your password, then you don't have to waste your time worrying

about who to blame if the account gets broken into. Right now, for example, I feel pretty

confident that somebody actually guessed or 'cracked' my password, because I never

wrote it down or shared it with anyone.

Looking over the list of suggestions above, you might wonder how anyone without a

photographic memory could possibly keep track of passwords that are this long, complex

and meaningless without writing them down. The importance of using a different

password for each account makes this even more difficult. There are a few tricks, however,

that might help you create passwords that are easy to remember but extremely difficult to

guess, even for a clever person using advanced 'password cracking' software. You also have

the option of recording your passwords using a tool like KeePass that was created

specifically for this purpose.

It is important to use different types of characters when choosing a password. This can be

done in various ways:

Varying capitalisation, such as: 'My naME is Not MR. MarSter’

Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y’

o

o

o

Remembering and recording secure passwords

Remembering secure passwords

Page 124: class 10 IT Reader

Inform

ation

Technolog

y Level -2

113

o

o

o

o

o

Incorporating certain symbols, such as: ‘c@t(heR1nthery3'

Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT'

Any of these methods can help you increase the complexity of an otherwise simple

password, which may allow you to choose one that is secure without having to give up

entirely on the idea of memorizing it. Some of the more common substitutions (such as the

use of a zero instead of an 'o' or the '@' symbol in place of an 'a') were long-ago

incorporated into password-cracking tools, but they are still a good idea. They increase the

amount of time that such tools would require to learn a password and, in the more common

situations where tools of this sort cannot be used, they help prevent lucky guesses.

Passwords can also take advantage of more traditional mnemonic devices, such as the use

of acronyms. This allows long phrases to be turned into complex, seemingly-random

words:

'To be or not to be? That is the question' becomes ‘2Bon2B?TitQ'

'We hold these truths to be self-evident: that all men are created equal' becomes

‘WhtT2bs-e:taMac='

'Are you happy today?' becomes 'rU:-)2d@y?'

These are just a few examples to help you come up with your own method of encoding

words and phrases to make them simultaneously complex and memorable.

A little effort to make the password more complex goes a very long way. Increasing the

length of a password even just by a few characters, or by adding numbers or special

characters, makes it much more difficult to crack. For demonstrative purposes, the table

below shows how much longer it may take a hacker to break a list of progressively more

complex passwords by trying different combinations of the password one after another.

bananas Less than 1 day Less than 1 day

bananalemonade 2 days Less than 1 day

BananaLemonade 3 months, 14 days Less than 1 day

B4n4n4L3m0n4d3 3 centuries, 4 decades 1 month, 26 days

We Have No Bananas 19151466 centuries 3990 centuries

W3 H4v3 N0 B4n4n45 20210213722742 centuries 4210461192 centuries

Sample Password Time to crack with an Time to crack with a

everyday computer very fast computer

Page 125: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

114

Of course, the time it would take to crack any of the above passwords would vary widely

depending on the nature of the attack, and the resources available to the attacker.

Moreover, new methods to crack passwords are constantly being devised. All the same, the

table does demonstrate that passwords become vastly more difficult to break by simply

varying characters and using two words or, even better, a short phrase.

The table above is based on Passfault's calculations. Passfault is one of a number of

websites which allow you to test the strength of your passwords. However, while such

resources are good for demonstrating the relative efficiency of different types of

passwords, you should avoid introducing your actual passwords into these sites.

While a little creativity may allow you to remember all of your passwords, the need to

change those passwords periodically means that you might quickly run out of creativity. As

an alternative, you can generate random, secure passwords for most of your accounts and

simply give up on the idea of remembering them all. Instead, you can record them in a

portable, encrypted secure password database, such as KeePass.

Hands-on: Get started with the KeePass - Secure Password Storage Guide

Of course, if you use this method, it becomes especially important that you create and

remember a very secure password for KeePass, or whatever tool you choose. Whenever

you need to enter a password for a specific account, you can look it up using only your

master password, which makes it much easier to follow all of the suggestions above.

KeePass is portable, as well, which means that you can put the database on a USB memory

stick in case you need to look up a password while you are away from your primary

computer.

Although it is probably the best option for anybody who has to maintain a large number of

accounts, there are a few drawbacks to this method. First, if you lose or accidentally delete

your only copy of a password database, you will no longer have access to any of the

accounts for which it contained passwords. This makes it extremely important that you

back up your KeePass database. Look over Chapter 5: How to recover from information

loss for more information on backup strategies. Fortunately, the fact that your database is

encrypted means that you don't have to panic if you lose a USB memory stick or a backup

drive containing a copy of it.

The second major drawback could be even more important. If you forget your KeePass

master password, there is no way to recover it or the contents of the database. So, be sure to

choose a master password that is both secure and memorable!

Recording passwords securely

Page 126: class 10 IT Reader

Inform

ation

Technolog

y Level -2

115

The strength of this method may, in certain situations, become it's weakness. If somebody

force you to give away your Keepass database master password, he will gain access to all of

the passwords stored in this Keepass database. If this is the situation you may face, you

could treat your Keepass database as a sensitive file, and protect it as we describe in

Chapter 4: How to protect the sensitive files on your computer. You can also create a

separate Keepass database to containg passwords protecting more sensitive information,

and take extra precautions with that database.

Mansour: Wait a minute. If KeePass uses a single master password to protect all of your

other passwords, how is it more secure than just using that same password for all of your

accounts? I mean, if a bad guy learns the master password, he gets access to everything,

right?

Magda: It's a good thought, and you're right that protecting your master password is

really important, but there are a couple of key differences. First of all, this 'bad guy' would

not only need your password, he'd need your KeePass database file, too. If you just share

the same password between all of your accounts, then he'd only need the password itself.

Plus, we know that KeePass is extremely secure, right? Well, other programs and websites

can go either way. Some of them are much less secure than others, and you don't want

someone breaking into a weak website, and then using what he learns to access a more

secure account. And there's another thing, too. KeePass makes it really easy to change

your master password if you think it's necessary. I should be so lucky! I spent all day today

updating my passwords.

Each new method of storing or transferring digital information tends to introduce several

new ways in which the information in question can be lost, taken or destroyed. Years of

work can disappear in an instant, as a result of theft, momentary carelessness, the

confiscation of computer hardware, or simply because digital storage technology is

inherently fragile. There is a common saying among computer support professionals: "it's

not a question of if you will lose your data; it's a question of when." So, when this happens

to you, it is extremely important that you already have an up-to-date backup and a well-

tested means of restoring it. The day you are reminded about the importance of a backup

system is generally the day after you needed to have one in place.

Although it is one of the most basic elements of secure computing, formulating an effective

backup policy is not as simple as it sounds. It can be a significant planning hurdle for a

number of reasons: the need to store original data and backups in different physical

How to recover from information loss

Page 127: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

116

locations, the importance of keeping backups confidential, and the challenge of

coordinating among different people who share information with one another using their

own portable storage devices. In addition to backup and file-recovery tactics, this chapter

addresses two specific tools, Cobian Backup and Recuva.

Elena is an environmentalist in a Russian-speaking country, where she has begun to

create a website that will rely on creative presentation of images, videos, maps and stories

to highlight the extent of illegal deforestation in the region. She has been collecting

documents, media files and geographic information about logging for years, and most of

it is stored on an old Windows computer in the office of the NGO where she works. While

designing a website around this information, she has come to realize its importance and

to worry about preserving it in the event that her computer should be damaged,

especially if it should happen before she gets everything copied up to the website. Other

members of her organization sometimes use the computer, so she also wants to learn how

to restore her files if someone accidentally deletes the folder containing her work. She

asks her nephew Nikolai to help her develop a backup strategy.

How to organise and back up your information

Where you should store your backups

How you can manage your backups securely

How to recover files that have been deleted accidentally

While it is clearly important that you take steps to prevent disaster, by making sure that

your information is physically safe, free of malware and protected by a good firewall and

strong passwords, on their own these steps are not enough. There are simply too many

things that can go wrong, including virus attacks, hackers, electrical short circuits, power

spikes, water spills, theft, confiscation, demagnetisation, operating system crashes and

hardware failure, to name just a few. Preparing for disaster is just as important as

defending against it.

Elena: I know backup is important, Nikolai, but doesn't that mean I should have someone

else set it up for me? I mean, am I really going to have the time, resources and expertise to

do this on my own?

Background scenario

What you can learn from this chapter

o

o

o

o

Identifying and organising your information

Page 128: class 10 IT Reader

Inform

ation

Technolog

y Level -2

117

Nikolai: You'll be fine. Coming up with a good backup plan takes a bit of thought, but it

doesn't take all that much time or money. And, compared with losing all of your

information, you can hardly call it inconvenient, right? Besides, backup is definitely one of

those things that you should manage yourself. Unless the people who normally help you

out with tech support are extremely reliable and extremely well-informed about where

you keep your digital information, you're better off setting things up on your own.

The first step to formulating a backup policy is to picture where your personal and work

information is currently located. Your email, for example, may be stored on the provider's

mail server, on your own computer, or in both places at once. And, of course, you might have

several email accounts. Then, there are important documents on the computers you use,

which may be in the office or at home. There are address books, chat histories and personal

program settings. It is also possible that some information is stored on removable media as

well, including USB memory sticks, portable hard drives, CDs, DVDs, and old floppy disks.

Your mobile phone contains a list of contacts and may have important text messages stored

in it. If you have a website, it may contain a large collection of articles built up over years of

work. And, finally, don't forget your non-digital information, such as paper notebooks,

diaries and letters.

Next, you need to define which of these files are 'master copies,' and which are duplicates.

The master copy is generally the most up-to-date version of a particular file or collection of

files, and corresponds to copy that you would actually edit if you needed to update the

content. Obviously, this distinction does not apply to files of which you have only one copy,

but it is extremely important for certain types of information. One common disaster

scenario occurs when only duplicates of an important document are backed up, and the

master copy itself gets lost or destroyed before those duplicates can be updated. Imagine,

for example, that you have been travelling for a week while updating the copy of a

particular spreadsheet that you keep on your USB memory stick. At this point, you should

begin thinking of that copy as your master copy, because the periodic, automated backups

of the outdated version on your office computer are no longer useful.

Try to write down the physical location of all master and duplicate copies of the

information identified above. This will help you clarify your needs and begin to define an

appropriate backup policy. The table below is a very basic example. Of course, you will

probably find that your list is much longer, and contains some 'storage devices' with more

than one 'data type' and some data types that are present on multiple devices.

Page 129: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

118

Electronic documents Master Computer hard Office

drive

A few important electronic Duplicate USB memory With me

documents stick

Program databases (photos, Master Computer hard Office

address book, calendar, etc.) drive

A few electronic documents Duplicate CDs Home

Email & email contacts Master Gmail account Internet

Text messages & phone contacts Master Mobile phone With me

Printed documents Master Desk drawer Office

(contracts, invoices, etc.)

In the table above, you can see that:

The only documents that will survive if your office computer's hard drive crashes are

the duplicates on your USB memory stick and the CD copies at home.

You have no offline copy of your email messages or your address book, so if you forget

your password (or if someone manages to change it maliciously), you will lose access

to them.

You have no copies of any data from your mobile phone.

You have no duplicate copies, digital or physical, of printed documents such as

contracts and invoices.

To back up all of the data types listed above, you will need a combination of software and

process solutions. Essentially, you need to make sure that each data type is stored in at

least two separate locations.

Electronic documents - Create a full backup of the documents on your computer using a

program like Cobian Backup, which is described in more detail below. Store the backup on

something portable so that you can take it home or to some other safe location. External

hard drives, CD/DVDs or USB memory sticks are possible choices. Some people use CDs or

DVDs for this, since the risk of overwriting and losing your backup is lower. Blank CDs may

be cheap enough to allow you to use a new one every time you make a backup.

Data Type Master/ Storage Location

Duplicate Device

o

o

o

o

Defining your backup strategy

Page 130: class 10 IT Reader

Inform

ation

Technolog

y Level -2

119

Because this category of data often contains the most sensitive information, it is

particularly important that you protect your electronic document backups using

encryption. You can learn how to do this in Chapter 4: How to protect the sensitive files

on your computer and in the TrueCrypt Guide.

Program databases - Once you have determined the location of your program databases,

you can back them up in the same way as electronic documents.

Email - Rather than accessing your email only through a web browser, install an email

client like Thunderbird and configure it to work with your account. The Thunderbird

Guide explains in detail how to do this. Also most webmail services will provide

instructions on how to use such programs and, often, how to import your email addresses

into them. You can learn more about this in the Further Reading section, below. If you

choose to move your old email messages to your computer so they are not stored on the

server (e.g. for security reasons), make sure that you include them in the backup of

electronic documents described above.

Mobile phone contents - To back up the phone numbers and text messages on your

mobile phone, you can connect it to your computer using the appropriate software, which

is generally available from the website of the company that manufactured your phone. You

may need to buy a special USB cable to do this.

Printed documents - Where possible, you should scan all of your important papers, then

back them up along with your other electronic documents, as discussed above.

In the end, you should have rearranged your storage devices, data types and backups in a

way that makes your information much more resistant to disaster:

Electronic documents Master Computer hard Office

drive

Electronic documents Duplicate CDs Home

A few important electronic Duplicate USB memory stick With me

documents

Data Type Master/ Storage Location

Duplicate Device

Page 131: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

120

Program databases Master Computer hard Office

drive

Program databases Duplicate CDs Home

Email & email contacts Duplicate Gmail account Internet

Email & email contacts Master Thunderbird on Office

office computer

Text messages & mobile Master Mobile phone With me

phone contacts

Text messages & mobile Duplicate Computer hard Office

phone contacts drive

Text messages & mobile Duplicate Backup SIM Home

phone contacts

Printed documents Master Desk drawer Office

Scanned documents Duplicate CDs At home

Elena: I know some people who keep all of their important documents on Gmail, by

attaching them to 'draft' messages or emails to themselves. Would that count as a 'second

physical location' for my files?

Nikolai: It might help you recover if you lose one or two very important documents, but it's

pretty awkward. Honestly, how many documents per week would you be willing to back

up like that? Plus, you need to consider whether or not those attachments are safe,

especially if you're at all worried about your email being monitored. Unless you're

connecting to Gmail securely, this is a bit like handing over your sensitive information on a

silver platter. Using an HTTPS connection to Gmail in order to back up small Truecrypt

Data Type Master/ Storage LocationDuplicate Device

Data Type Master/ Storage Location

Duplicate Device

Data Type Master/ Storage Location

Duplicate Device

Data Type Master/ Storage Location

Duplicate Device

Page 132: class 10 IT Reader

Inform

ation

Technolog

y Level -2

121

volumes or KeePass database files would be pretty safe, because they're encrypted, but I

really wouldn't recommend this as a general-purpose backup strategy.

Of the various data types discussed here, it is the 'electronic documents' that people tend to

worry about most when establishing a backup policy. This term is somewhat ambiguous,

but generally refers to files that you keep track of yourself and that you open manually,

either by double-clicking on them or by using a particular application's File menu.

Specifically, it includes text files, word processing documents, presentations, PDFs and

spreadsheets, among other examples. Unlike email messages, for example, electronic

documents are generally not synchronised with remote copies over the Internet.

When backing up your electronic documents, you should remember to back up your

program databases, as well. If you use a calendar application or an electronic address book,

for example, you will need to find the folder in which these programs store their data.

Hopefully, these databases will be in the same location as your electronic documents, as

they are often kept inside your My Documents folder on a Windows computer. If that is not

the case, however, you should add the appropriate folders to your regular backup.

Email stored by an application such as Thunderbird is a special example of a program

database. If you use an email program, especially if you are unable or unwilling to store a

copy of your messages on the server, then you must ensure that this email database is

included in your regular backup. You may consider image and video files to be electronic

documents or items within a program database, depending on how you interact with them.

Applications like Windows Media player and iTunes, for example, work like databases. If

you use programs like this, you might have to search your hard drive to learn where they

store the actual media files that they help manage.

Before you can back up your electronic documents, you must decide what kind of storage

device you will use.

USB disk or memory sticks - USB disk or memory sticks can be quite inexpensive, and

offer large capacity. They are easy to erase or overwrite numerous times. USB disk or

memory sticks have a limited lifetime, which greatly depends on ways and frequency of

usage but is generally estimated to be around 10 years.

Compact Discs (CDs) CDs store around 700 Megabytes (MB) of data. You will need a CD

Creating a digital backup

Storage devices

Page 133: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

122

burner and blank discs in order to create a CD backup. If you want to erase a CD and update

the files stored on it, you will need to have a CD-RW burner and rewritable CDs. All major

operating systems, including Windows XP, now include built-in software that can write

CDs and CD-RWs. Keep in mind that the information written on these discs may begin to

deteriorate after five or ten years. If you need to store a backup for longer than that, you will

have to recreate the CDs occasionally, buy special 'long life' discs or use a different backup

method.

Digital Video Discs (DVDs) - DVDs store up to 4.7 Gigabytes (GB) of data. They work much

like CDs but require slightly more expensive equipment. You will need a DVD or DVD-RW

burner, and appropriate discs. As with a CD, the data written on a normal DVD will

eventually begin to fade.

Remote server - A well-maintained network backup server may have almost unlimited

capacity, but the speed and stability of your own Internet connection will determine

whether or not this is a realistic option. Keep in mind that running a backup server in your

own office, while faster than copying information over the Internet, violates the

requirement that you keep a copy of your important data in two different physical

locations. There are free storage services on the Internet, as well, but you should very

carefully consider the risks of putting your information online and you should always

encrypt your backups before uploading them to servers run by organisations or

individuals whom you do not know and trust. See the Further reading section for a few

examples.

Cobian Backup is a user-friendly tool that can be set to run automatically, at regularly

scheduled times, and to include only files that have changed since your last backup. It can

also compress backups to make them smaller.

Hands-on: Get started with the Cobian Backup Guide

As always, it is a good idea to encrypt your backup files using a tool such as TrueCrypt.

More information about about data encryption can be found in Chapter 4: How to protect

the sensitive files on your computer.

Hands-on: Get started with the TrueCrypt - Secure File Storage Guide

When using these backup tools, there are a few things you can do to help your backup

system work smoothly:

Organise the files on your computer. Try to move all of the folders that contain

Backup Software

o

Page 134: class 10 IT Reader

Inform

ation

Technolog

y Level -2

123

electronic documents you intend to back up into a single location, such as inside the

My Documents folder.

If you use software that stores its data in an application database, you should first

determine the location of that database. If it is not in a convenient location, see if the

program will allow you to choose a new location for its database. If it does, you can

put it in the same folder as your electronic documents.

Create a regular schedule to perform your backup.

Try to establish procedures for all of the staff in your office who do not already have a

reliable, secure backup policy. Help your coworkers understand the importance of

this issue.

Make sure to test the process of recovering data from your backup. Remember that, in

the end, it is the restore procedure, not the backup procedure, that you really care

about!

Elena: Alright, so I made an encrypted backup while I was at work, and I put it on a CD.

Cobian is scheduled to update my backup in a few days. My desk at work has a drawer that

locks, and I'm planning to keep these backup CDs in there so they won't get lost or broken.

Nikolai: But what if your office burns down? Computer, desk, backup CDs and all? Or, what

if your website forum gets used to plan some giant environmental demonstration, the

authorities crack down, things get out of hand, and the organisation is raided? I doubt

your little desk lock will keep the police from confiscating those CDs. What about keeping

them at home, or asking a friend to store them for you?

When you delete a file in Windows, it disappears from view, but its contents remain on the

computer. Even after you empty the Recycle Bin, information from the files you deleted

can usually still be found on the hard drive. See Chapter 6: How to destroy sensitive

information to learn more about this. Occasionally, if you accidentally delete an important

file or folder, this security vulnerability can work to your advantage. There are several

programs that can restore access to recently-deleted files, including a tool called Recuva.

Hands-on: Get started with the Recuva - File Recovery Guide

These tools do not always work, because Windows may have written new data over your

deleted information. Therefore, it is important that you do as little as possible with your

computer between deleting a file and attempting to restore it with a tool like Recuva. The

o

o

o

o

Recovering from accidental file deletion

Page 135: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

124

longer you use your computer before attempting to restore the file, the less likely it is that

you will succeed. This also means that you should use the portable version of Recuva

instead of installing it after deleting an important file. Installing the software requires

writing new information to the file system, which may coincidentally overwrite the critical

data that you are trying to recover.

While it might sound like a lot of work to implement the policies and learn the tools

described in this chapter, maintaining your backup strategy, once you have a system in

place, is much easier than setting it up for the first time. And, given that backup may be the

single most important aspect of data security, you can rest assured that going through this

process is well worth the effort.

Internet security is a branch of computer security specifically related to the Internet, often

involving browser security but also network security. Its objective is to establish rules

and measures to use against attacks over the Internet. The Internet represents an insecure

channel for exchanging information leading to a high risk of intrusion or fraud, such as

phishing. This session introduces you to Internet security concepts and how to secure

online and network transactions.

Network security refers to the practice of securing computers and devices in a network

from unauthorized users and attacks. Network security can range from simple procedure

such as using a username and password to using complex network devices to protect a

network.

Though Internet provides valuable information and entertainment, it may leave your

computer unsecure due to many online threats. You need to ensure that your usernames,

passwords, credit card or online banking information secure as they are prone to be

tracked and used by unauthorized users. Some websites can also install Malware on the

computer without user consent thereby leaving the computer damaged or insecure.

Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the

chances of users getting compromised. Following are some of the common types of host &

network based attacks:

Spoofing is a method that refers to use of forged IP address, MAC address, E-mai address,

etc. falsifying and gaining data. For example someone could send a packet from an IP

Software Security

Network Security

Spoofing

Page 136: class 10 IT Reader

Inform

ation

Technolog

y Level -2

125

address such as 10.1.1.1 but appears as if it was sent from another IP address thereby

allowing the packet to enter into network, thus resulting in gaining access to someone's

network without their consent.

Root kits are special programs that take control of a computer by replacing critical system

files and usually do undetected. Most of root kit programs are kernel-based, they act like

parasites and attach themselves with the operating system. Though it is difficult to detect,

you can observe change in patterns and check integrity of the operating system to see if it's

affected by a root kit and take appropriate action.

Denial of service is a kind of attack that causes services to become unavailable when they

are expected. For example a website under DOS (Denial of service) attack will cause itself

to halt and affect the users by not providing the necessary service such as access to email or

online shopping.

To prevent unauthorized users from gaining access through any method, you need to

implement a variety of security measures such as using a firewall, scanning your computer

or network for weakness, apply security patches, use IDS, etc.

You can reduce the risks by using best practices such as using Antivirus Software,

Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading

awareness of the best practices.

Use strong passwords, a combination of alphanumeric and special characters could be

used for creating a password that is not so easy to crack or guessed by other users. Do not

keep passwords such as your favorite color, friends or relatives name, bike number,

mobile number either as single or combined option. These passwords are easy to

guess if a user knows you personally. Change your password frequently at least 2 or

3 weeks so that your account information remains secure.

Using strong passwords can lower the risk of a security breach; effectiveness of a

password depends on the security mechanism of the software and users involvement

in generating a strong password.

Most websites check for password effectiveness when a user attempts to register for

the first time or when they change password. For example, when you register with

Gmail, you may notice a password meter displaying the strength of your password

similar to the one displayed below.

Root kits

Denial of service

Best Practices for Security

Page 137: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

126

Following is a general guideline for managing strong passwords.

Keep the length of the password at least 12-14 characters if permitted.

Avoid keeping passwords based on repetition, dictionary words, letter or number

sequences, usernames, relative or pet names, etc.

Including numbers, and symbols in passwords if allowed.

Use capital and lower-case letters.

Avoid using the same password for multiple sites or purposes.

Avoid using something that the public or workmates know you strongly like or

dislike.

Use random password generators if possible.

Example of a strong password: u1vX:,4Hd{]$

You may also websites such as www.strongpasswordgenerator.com that can

generate random strong passwords. To generate a strong password using

www.strongpasswordgenerator.com do the following:

Open any web browser. Type www.strongpasswordgenerator.com in the address bar

and press Enter.

Click Generate strong password. Notice the password displayed under your new

password.

Backup your data: Always keep copies of personal data in additional media such as

compact discs, pen drives, etc. This could be helpful in situation when there is a loss of data.

Keep the data away from unauthorized users.

Use encryption software (usually available within the operating system) to protect

your data from unauthorized users. If encryption software is not available within the

operating system, use a 3rd party software.

Keeping your username and password private: Never save your username or

password on computers that are used in shared environments such as internet café.

Browsers may save your personal data on the local computer that can be used by another

user using the same computer.

Registering with websites: Read the privacy statement or policy whenever you register

with a website, the statement or policy will include information about how the website use

personal data.

o

o

o

o

o

o

o

o

o

Page 138: class 10 IT Reader

Inform

ation

Technolog

y Level -2

127

Do not share personal information; websites require you to fill out forms

containing fields such as name, gender, age, email address, school, etc. Be cautious

when filling out such forms; research and verify if it's a trustable website . Your email

addressed could be used by unauthorized users to send you fake or unwanted emails;

think twice or thrice before providing information to any website and decide if it is really

necessary.

Secure transactions: If you are using online shopping or transactions, websites even

store your credit card or online banking personal information such as your credit card

number, account details, etc. This information can be tracked and used by un-authorized

users often known as hackers to misuse this information. Again, ensure the website is

legitimate and uses secure practices for performing and maintaining online transactions.

Since information such as credit card details or personal information is sent over the

network, it is always recommended to use only secure websites for such transactions.

Verify if the website uses secure transaction; usually it is indicated through a digital

certificate represented as a golden lock in the web browser's address bar.

Use antivirus and antispyware software, computers are prone to attacks from software

known as Malware that could harm your computer. Malware track browsing behavior

or transmit personal data from your computer; programs such as keyloggers could

be installed on your computer track and transmit every key that is pressed on a

keyboard (keystrokes) to unauthorized users. Antivirus and Antispyware programs also

offer real-time protection monitoring your computer for any changes by malware

software. Keep your Antivirus and Antispyware software always up to date, this can

help in protecting your computer from recent threats.

Do not immediately respond to mails from unknown users, it may be a fake mail trying to

gather personal information such as your bank account details, home address, etc. Some

mails could promise you jobs or announce lottery results which in turn could

compromise the user. And in some cases, virus or scripts that are dangerous could be

attached to the mail; NEVER open the attachment from an unknown source.

Clear browser cookies frequently, cookies are programs that are created on your

local computer when you visit websites. Though cookies are meant for storing data

based on your activity performed during your earlier visit such as logon details, details of a

shopping cart, visited pages in a website, etc. they could also be tracked by

unauthorized users and possibly gain access to your personal information.

Keep the operating system and software applications up to date; though operating

systems and applications are designed, tested and distributed, sometimes they may

Page 139: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

128

have security holes through which a hacker can take advantage; they may track and

gather information or even damage the whole computer. In general, most vendors notify

the users whenever a security hole is identified and an update is available to address that

particular issue. You can also visit respective vendor's website to check if there are any

updates available, download and keep your operating system and software applications up

to date, free from security holes.

Install firewalls: Firewalls could be software or hardware and can assist in keeping

a computer and a network secure. Firewalls analyze the network traffic and

determine if the traffic should be allowed or not. In most cases, operating systems

such as Linux, Windows or Mac include firewall software as a part of operating system thus

keeping the computer secure. In rare cases, you may need to configure your firewall for

additional security.

Never install software from unknown sources as they might not be trustworthy;

download only from well-known or reputed websites. Verify the source if it is

legitimate by searching the internet or referring to comments from other users

before downloading them; understand the nature and the purpose of the software

before attempting to download and install them.

Remove unwanted or unknown software applications; these might have got installed

without your knowledge when you have visited some websites. Unwanted software

could get installed as they might have been bundled along with necessary software. Some

programs such as toolbars get installed usually through bundled software and are

programmed to send personal data without your consent.

Web browsers have built-in password management designed to store passwords used in

forms on websites. Browsers often prompt to save usernames and passwords when

users attempt to logon to websites.

This facility is offered to users, so that they can logon to their frequently used websites

without having to type the usernames or passwords. However it is not advisable to leave

the web browser store this data particularly on public or shared computers.

To clear personal data from a web browser such as Mozilla Firefox, launch the browser.

Click Tools Menu, click Options.

Click Security Tab. The following window will be displayed:

Clearing Data Stored In Browsers

o

o

Page 140: class 10 IT Reader

Inform

ation

Technolog

y Level -2

129

Notice that under Passwords section, Remember password for sites is checked. This

means the browser is configured to save passwords for websites automatically. You can

uncheck Remember password for sites option, if you prefer NOT to store passwords.

Mozilla Firefox can also store data such as cookies, visited websites or webpages

data, browsing history, etc. To clear this stored data, click General tab > Option. The

following window will be displayed:

Page 141: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

130

o

o

o

Click Privacy Tab. The following window will be displayed:

Under History section, click the drop down menu next to Firefox will:.

Select Use custom settings for history from the drop down list. The following

window will be displayed:

Page 142: class 10 IT Reader

Inform

ation

Technolog

y Level -2

131

Notice the preferences; Firefox is configured to remember browsing and downloading

history search and form history and cookies. If you do not wish store the above mentioned

data, select Never remember history from the drop down list. If you are in a public

environment such as a cyber café, you may select the option Clear all current history.

On selecting this option, the following window will be displayed:

Click Clear Now and then click OK. From now on, Mozilla Firefox will not remember

any history as you have configured it that way.

There are several online threats such as Phishing, email spoofing, chat spoofing, etc.

You can reduce the risks by using best practices such as using Antivirus Software,

Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading

awareness of the best practices.

Firewalls are software or hardware devices that protect a computer and/or a network by

analyzing and controlling both incoming and outgoing network traffic. Firewalls act like a

window between internal and external network allowing authorized users to access

resources.

Most operating systems include a software firewall and are configured to keep your

computer secure. While software firewalls are sufficient for home and smaller networks,

hardware firewalls are essential for larger networks as it offers a higher level of protection

and can scale to larger network traffic from tens to hundreds of computers.

o

o

o

Firewall

Page 143: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

132

Firewall generations:

First generation: Firewalls use Packet filters, a mechanism in which each packet is

analyzed based on a combination of source and destination IP address, ports and

decide if the packet should be passed on or discarded.

Second generation: Firewalls use stateful filters, a mechanism in which each packet

is analyzed to track the state of network connection travelling through it. Only

packets that match the active connection is allowed or else discarded. Stateful Packet

inspection (SPI) used in this method is considered most secure as it allows packets to

be transmitted to the internal network as the firewall checks if the response packet is

originated based on the request sent from the internal network.

Third generation: Firewalls provide application layer filtering by working closely

with the applications (browsers, email software, etc.) and protocols (http, ftp, smtp,

etc.). This is useful when unwanted network application software or protocol

attempts to use network bandwidth, causing harm to the computer or flood the

network traffic and need to blocked or never allowed.

Note: Packet filtering alone does not provide enough protection. In order to effectively block

peer-to-peer-related network traffic, what is needed is a firewall that does application

filtering, which can be regarded as an extension to stateful packet inspection. Stateful packet

inspection can determine what type of protocol is being sent over each port, but application-

level filters look at what a protocol is being used for. For example, an application-level filter

might be able to tell the difference between HTTP traffic used to access a Web page and HTTP

traffic used for file sharing, whereas a firewall that is only performing packet filtering would

treat all HTTP traffic equally.

Personal Firewalls are usually shipped with an operating system and protect only

the computer on which it is installed. Personal Firewalls are designed to control

network traffic generated by applications such as web browsers, file transfer

software, email software, etc. installed on a computer. When an application tends to

transmit or receive, the firewall looks up the policy defined in the firewall settings

and allows or denies network traffic accordingly. If you do not have a personal

firewall installed on your computer or you want to use a more advanced firewall

software with advanced management capabilities, you can purchase a commercial

firewall software or a hardware firewall.

o

o

o

o

Types of Firewalls

Page 144: class 10 IT Reader

Inform

ation

Technolog

y Level -2

133

Notable software firewalls include Windows Firewall (shipped with most versions of

Microsoft Windows), ZoneAlarm, Comodo Internet Security Plus, etc. Some Anti-

virus vendors bundle firewall software to provide complete protection such as

McAfee Internet Security, Kaspersky Internet Security, Norton Internet Security, etc.

Enterprise Firewalls are suitable for organizations that have thousands of users or

for networks that need high level of security such as banks. Enterprise Firewalls are

usually hardware based, expensive, require additional technical expertise but offer

greater levels of protection and scale to larger network traffic without affecting

stability in performance. Enterprise firewalls can protect the entire network and

operate at the network layer scanning each packet that transmits through them.

Notable vendors for enterprise firewalls include Cisco, HP, IBM, Microsoft, Juniper

networks, etc.

Windows Firewall: Windows Firewall is a built-in firewall software bundled and

installed by default on most Microsoft Windows Operating systems like Windows XP,

Vista & 7. Windows Firewall protects the computer by using the default settings

(firewall rules) that can be modified anytime. Most commonly used network

applications such as web browsers, email client software, etc. work without the need

for modifying the settings on the firewall. Some network applications may not work

as intended if it is blocked by the firewall (for example, an antivirus software may not

be able to update itself from the Internet); in such cases, you need to add the

application to the exception list indicating that the application is permitted to use the

network or the Internet.

o

o

Page 145: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

132

Page 146: class 10 IT Reader

Info

rmati

on T

echnol

ogy

Leve

l -2

Page 147: class 10 IT Reader

CENTRAL BOARD OF SECONDARY EDUCATIONShiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India


Recommended