Information Technology

Class X

Level 2 Students Handbook 2013-2014

CENTRAL BOARD OF SECONDARY EDUCATION Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

Level 2

Students Handbook 2013-2014 CLASS

X

CENTRAL BOARD OF SECONDARY EDUCATION Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

Information Technology Level -2

Information Technology

Information Technology Level - 2 Students Handbook - Class X PRICE: ` First Edition 2013, CBSE, India

Information Technology Level -2

Copies:

"This book or part thereof may not be reproduced by any person or agency in any manner."

Published By

:

Design, Layout :

Printed By

:

The Secretary, Central Board of Secondary Education, Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 Multi Graphics, 8A/101, WEA Karol Bagh, New Delhi-110005 Phone: 011-25783846

H k k j r d k l af o / k u m í sf ' k d k 1

g e ] H k k j r d sy k sx ] H k k j r d k s, d l E i w. k Z ¹ i zH k qR o & l ai U u l e k t o k n h i aF k f u j i s{ k y k sd r a= k k R e d x . k j k T ; º c u k u sd sf y , ] r F k k m l d sl e L r u k x f j d k sa d k s% l k e k f t d ] v k f F k Zd v k Sj j k t u Sf r d U ; k ; ] f o p k j ] v f H k O ; f D r ] f o ' o k l ] / e Z v k Sj m i k l u k d h L o r a= k r k ] i zf r " B k v k Sj v o l j d h l e r k i zk I r d j k u sd sf y , r F k k m u l c e sa O ; f D r d h x f j e k 2 v k Sj ¹ j k " V ªd h , d r k v k Sj v [ k aM r k º l qf u f ' p r d j u so k y h c a/ qr k c < +k u sd sf y , n `< +l ad Y i g k sd j v i u h b l l af o / k u l H k k e sa v k t r k j h [ k 2 6 u o E c j ] 1 9 4 9 b Zñ d k s, r n ~} k j k b l l af o / k u d k sv ax h Ñ r ] v f / f u ; f e r v k Sj v k R e k f i Zr d j r sg SaA 1 - l af o / k u ( c ; k y h l o k al a' k k s/ u ) v f / f u ; e ] 1 9 7 6 d h / k j k 2 } k j k ( 3 1 1 9 7 7 ) l s¶ i zH k qR o & l ai U u y k sd r a= k k R e d x . k j k T ; ¸ d sL F k k u i j i zf r L F k k f i r A 2 - l af o / k u ( c ; k y h l o k al a' k k s/ u ) v f / f u ; e ] 1 9 7 6 d h / k j k 2 } k j k ( 3 1 1 9 7 7 ) l s¶ j k " V ªd h , d r k ¸ d sL F k k u i j i zf r L F k k f i r A

H k k x 4 d

e wy d Ù k ZO ; 5 1 d e wy d Ù k ZO ; & H k k j r d si zR ; sd u k x f j d d k ; g d Ù k ZO ; g k sx k f d o g & ( d ) l af o / k u d k i k y u d j sv k Sj m l d sv k n ' k k sZa] l aL F k k v k sa] j k " V ªè o t v k Sj j k " V ªx k u d k v k n j d j s_ ( [ k ) L o r a= k r k d sf y , g e k j sj k " V ªh ; v k an k sy u d k si zsf j r d j u so k y sm P p v k n ' k k sZa d k sâ n ; e sa l at k s, j [ k sv k Sj m u d k i k y u d j s_ ( x ) H k k j r d h i zH k qr k ] , d r k v k Sj v [ k aM r k d h j { k k d j sv k Sj m l sv { k q. . k j [ k s_ ( ? k ) n s' k d h j { k k d j sv k Sj v k g ~o k u f d , t k u si j j k " V ªd h l so k d j s_ ( Ä ) H k k j r d sl H k h y k sx k sa e sa l e j l r k v k Sj l e k u H k zk r `R o d h H k k o u k d k f u e k Z. k d j st k s/ e Z] H k k " k k v k Sj i zn s' k ; k o x Zi j v k / k f j r l H k h H k sn H k k o l si j sg k sa] , sl h i zF k k v k sa d k R ; k x d j st k sf L = k ; k sa d sl E e k u d sf o # ¼ g Sa_ ( p ) g e k j h l k e k f l d l aL Ñ f r d h x k Sj o ' k k y h i j ai j k d k e g Ù o l e > sv k Sj m l d k i f j j { k . k d j s_ ( N ) i zk Ñ f r d i ; k Zo j . k d h f t l d sv ar x Zr o u ] > h y ] u n h ] v k Sj o U ; t h o g Sa] j { k k d j sv k Sj m l d k l ao / Zu d j sr F k k i zk f . k e k = k d si zf r n ; k H k k o j [ k s_ ( t ) o SK k f u d n `f " V d k s. k ] e k u o o k n v k Sj K k u k t Zu r F k k l q/ k j d h H k k o u k d k f o d k l d j s_ ( > ) l k o Zt f u d l ai f Ù k d k sl qj f { k r j [ k sv k Sj f g al k l sn wj j g s_ ( × k ) O ; f D r x r v k Sj l k e wf g d x f r f o f / ; k sa d sl H k h { k s= k k sa e sa m R d " k Zd h v k sj c < +u sd k l r r i z; k l d j sf t l l sj k " V ªf u j ar j c < +r sg q, i z; R u v k Sj m i y f C / d h u b Zm ap k b ; k sa d k sN wy s_ 1 ( V ) ; f n e k r k & f i r k ; k l aj { k d g S] N g o " k Zl sp k Sn g o " k Zr d d h v k ; qo k y sv i u s] ; F k k f L F k f r ] c k y d ; k i zf r i k Y ; d sf y ; sf ' k { k k d s v o l j i zn k u d j sA 1 l af o / k u ( N ; k l h o k al a' k k s/ u ) v f / f u ; e ] 2 0 0 2 d h / k j k 4 } k j k ( 1 2 1 2 2 0 0 2 ) l sa v ar % L F k k f i r A

THE CONSTITUTION OF INDIA PREAMBLE WE, THE PEOPLE OF INDIA, having solemnly resolved to constitute India into a 1[SOVEREIGN SOCIALIST SECULAR DEMOCRATIC REPUBLIC] and to secure to all its citizens : JUSTICE, social, economic and political; LIBERTY of thought, expression, belief, faith and worship; EQUALITY of status and of opportunity; and to promote among them all FRATERNITY assuring the dignity of the individual and the2 [unity and integrity of the Nation]; IN OUR CONSTITUENT ASSEMBLY this twenty-sixth day of November, 1949, do HEREBY ADOPT, ENACT AND GIVE TO OURSELVES THIS CONSTITUTION. 1.

Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "Sovereign Democratic Republic” (w.e.f. 3.1.1977)

2.

Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "unity of the Nation” (w.e.f. 3.1.1977)

THE CONSTITUTION OF INDIA Chapter IV A

FUNDAMENTAL DUTIES ARTICLE 51A Fundamental Duties - It shall be the duty of every citizen of India(a)

to abide by the Constitution and respect its ideals and institutions, the National Flag and the National Anthem;

(b)

to cherish and follow the noble ideals which inspired our national struggle for freedom;

(c)

to uphold and protect the sovereignty, unity and integrity of India;

(d)

to defend the country and render national service when called upon to do so;

(e)

to promote harmony and the spirit of common brotherhood amongst all the people of India transcending religious, linguistic and regional or sectional diversities; to renounce practices derogatory to the dignity of women;

(f)

to value and preserve the rich heritage of our composite culture;

(g)

to protect and improve the natural environment including forests, lakes, rivers, wild life and to have compassion for living creatures;

(h)

to develop the scientific temper, humanism and the spirit of inquiry and reform;

(i)

to safeguard public property and to abjure violence;

(j)

to strive towards excellence in all spheres of individual and collective activity so that the nation constantly rises to higher levels of endeavour and achievement;

1

(k) who is a parent or guardian to provide opportunities for education to his/her child or, as the case may be, ward between age of six and forteen years.

1.

Ins. by the constitution (Eighty - Sixth Amendment) Act, 2002 S.4 (w.e.f. 12.12.2002)

Preface The national curriculum Framework, 2005, recommends that children’s life at school must be linked to their life outside the school. This principle make a departure from the legacy of bookish learning which continues to shape our systems and caused a gap between the school home, community and the workplace. The student workbook on information Technology (IT) is a part of qualification package developed for the implementation of National Vocational Education Qualification Framework (NVEQF), an initiative of Ministry of Human Resource Development (MHRD), Government of India to set common principles and guidelines for a nationally recognised qualification system covering the school’s vocational education and training institutions, technical education institutions, college and universities. It is envisaged that the NVEQF will promote transparency of qualifications, cross-sect oral learning, student qualifications, thus encouraging life-long learning.

The CBSE has developed materials (units) for the vocational qualification package in IT/ITes sector for NVEQF levels 1 to 4; level 2 is equivalent to class X. Based on Nos occupation related core competencies (Knowledge, skills and abilities) were identified for development of curriculum and learning modules (units). This student workbook attempts to discourage rote learning and to bring about necessary flexibility in offering of courses necessary for breaking the sharp boundaries between different subjects areas. The workbook attempts to enhance this endeavour by giving higher priority and space to opportunities for contemplation and wondering, discussion in small groups and activities requiring hands on experience. Any suggestions, feedback from the readers for improvement in the future editions of the volume shall be heartily welcomed. Vineet Joshi Chairman, CBSE

Information Technology Level -2

This student workbook, which forms a part of vocational qualification package for student’s who have passed class IX or equivalent examination, was created by group of experts. The IT-ITes skill development council approved by the national occupation standards (NOS). The national occupation standards are a set of competency standards and guidelines endorsed by the representatives of IT industry for recognized and assessing skills and assessing skills and knowledge needed to perform effectively in the workplace.

Contents Preface Acknowledgement Networking Fundamentals o

1 23

Digital Data Analysis - Advanced Operations on Spreadsheet o

40

Advanced Digital Presentation o

62

Digital Content Creation - Web Designing Fundamentals (HTML) o

79

Computer Systems Care o

103

Information Technology Level -2

Digital Documentation - Advanced Word Processing o

Unit Code

Unit Title

ITCC-201

Networking Fundamentals Evolution of Networking and Need for Networking Transmission of Data through different Switching Techniques Data Communication Terminologies Transmission Medium and Network Devices Network Types and Layouts

ITDC-202

Digital Documentation - Advanced Word Processing Reviewing and editing documents with Track Changes Connecting Data from Spreadsheet with the Document using Mail Merge Feature

Information Technology Level -2

Object Embedding and Linking Language Correction Securing Document ITDC-203

Digital Data Analysis - Advanced Operations on Spreadsheet Managing Multiple Spreadsheets and Workbooks Organising and handling Spreadsheet Data Creating Charts Creating and Using Macros Securing Spreadsheets

ITDC-204

Advanced Digital Presentation Standardization of Slides Multimedia Components in Presentation Using Tables Using Charts Presentation Delivery Securing Presentation

ITDC-205

Digital Content Creation - Web Designing Fundamentals (HTML) Basics of Webpage and HTML HTML - Basic Tags Paragraphs and Tables Web Page Layout Forms Multimedia Content in WebPages

ITOC-206

Computer Systems Care Hardware Safety and Security Software Safety, Security and Care

Information Technology Level -2

Unit -

1

Networking Fundamentals 1.1 Evolution of Networking and Need for Networking As you know, networking is widely used for accessing and sharing information; examples include web browsing, downloading & uploading, file sharing, printer sharing, etc. Today networking is popular with private and business users across the globe. In today's world, it can be extremely difficult to live without networks, since resource sharing (printers, shared folders etc) and Internet connectivity have become an integral part of our daily activities.

computers and other hardware components interconnected by communication channels that allow sharing of resources and information. Networking is widely used for sharing of resources and information & for communication purposes. Networks can also help in reducing costs; for example you can buy a single printer and share it across multiple users. Network consists of one or more computers or devices connected in order to provide and access resources. Resources include a range of devices (example, Printer, CDROM, Hard Drives, etc.) and services (example, web service, mail service, etc.). Networks based on size are classified into LAN & WAN. o LAN: Local Area Network refers to group of computers networked within a

Information Technology Level -2

A computer network, often simply referred to as a network, is a collection of

limited geographical area such as schools, colleges, offices, etc. o WAN: Wide Area Network refers to computers networked across geographical areas, in other words they connect LAN's between different locations. For example, computers or devices in a branch office could connect to the computer networks at the head office through telephone lines or satellites. This session introduces you to the basic fundamental concepts of networking and Internet and using different types of Internet connection.

1

Ways to form a computer Network There are several ways to form a network as listed below: o Use a cross-over cable (also referred to as Peer-to-peer cable) o Use Serial and Parallel ports o Use Bluetooth o Use Wi-Fi (for more than two computers) o Use Hub or Network Switch (for more than two computers) o SOHO Router or Wi-Fi Router (Commonly found in home & small business networks) Networks are designed using the following architecture: Peer-to-peer (P2P)

Information Technology Level -2

Networks in which all computers have an equal status are called peer to peer networks. Generally in such a network each terminal has an equally competent CPU.

Peer-to-Peer Network

Client- Server Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called client server networks. The computer(s) which provide services are called servers and the ones that use these services are called clients.

Client-Server Network

Note: Clients are referred to as "Service Requestors" and Servers as "Service Providers". Any machine that request a service is called as the client and machines that fulfill the requests is called the client.

2

Networks can have a combination of both Client/Server models and Peer-to-Peer. For example, you may be using a centralized mail server and/or access files from other machines in the network. Internet The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks.

Intranet Intranet refers to private computer network used by organizations for sharing resources; Intranets can be simple within a building or very large spread across the globe connected through various networking technologies. Intranets help employees of an organization to locate information much faster resulting in increased productivity. Though popularly referred to a company's internal website or portal, Intranet usually employs other protocols such as POP3, SMTP, FTP, etc. and may even offer a variety of services (you will read more about these in later sessions). Extranet

Information Technology Level -2

Internet is one of the most useful technologies of modern times which help us in our daily, personal and professional life. Internet is widely used by students, educational institutes; scientist and professionals to gather information for research and general information. Businesses use the Internet to access complex databases such as financial database. The Internet is the largest encyclopedia for all age groups. The Internet helps in maintaining contact with friends and relatives who live across different locations via Internet chatting systems and email software. Internet is also becoming a major source of entertainment for the general public.

Extranet is a computer network used outside the Intranet. For example, an organization may allow a vendor to view or access their resources such as their internal website for updating a product catalog or training material. However, this is highly restricted to Internet users (public). Extranets are usually accessed using VPNs (you will read more about this protocol later). World Wide Web World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a

3

system of interlinked hypertext documents accessed via the Internet. With a web browser, one can view web pages that may contain text, images, videos, and other multimedia, and navigate between them via hyperlinks. Information is stored on web servers referred to as web pages are retrieved by using a web browser such as Firefox on the local computer. A Web Browser is software used to view websites and acts as an interface between the user and the World Wide Web. A Web server is a computer that stores web sites and their related files for viewing on the Internet. Some of the advantages associated with networking are: o Data Sharing: One of the most important uses of networking is to allow the sharing of data. Users can send text files, spread sheets, documents, presentations, audio files, video files, etc. to other users.

Information Technology Level -2

o Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For example, instead of purchasing 10 printers for each user, one printer can be purchased and shared among multiple users thus saving cost. o Internet Access Sharing: You can purchase a single Internet connection and share it among other computers in a network instead of purchasing multiple Internet connection for each computer. This is very commonly found in Internet café (browsing centres), schools, colleges, companies, etc. o Usage of network based applications such as web browsers, email clients, chat application, audio & video calling, etc is another advantage.

Data Transmission methods Data can be transferred over a network using the following techniques: o Circuit Switching: In this method, a dedicated path is established between the endpoints before the data is transferred. Once a dedicated path is established, no other devices can use the circuit. Example: Dial-Up, ISDN. o Packet Switching: In this method, data is divided into blocks referred to as packets. Multiple packets can be sent via different paths allowing more than two devices to communicate at the same time. Modes of operation can be connectionless or connection-oriented.

4

? In connectionless mode, packets have source & destination address for routing that may take different paths. Example: Ethernet, IP, UDP. ? In connection-oriented mode, connection is defined (a virtual circuit is created) before a packet is transferred. Packet switching supports variable packet sizes. Example: X.25, Frame Relay, TCP. o Cell Switching: Cell switching method is similar to that of packet switching but has a fixed size for the cells transmitting data. Cell switching is efficient when large amounts of data need to transferred. Example: ATM.

Data transfer on the Internet Having talked of data transfer and the Internet, have you ever wondered how sitting in one corner of the world, you get information from another distant area in a few seconds?

o The data is broken up into bits of same sized pieces called packets. o A header is added to each packet explaining where the data has come from, where it should end up and where it fits in with the rest of the packets. o Each packet is sent from computer to computer until it finds its destination. Each computer on the way decides where next to send the packet. All packets may not take the same route. o At the destination, the packets are examined. If any packets are missing or damaged, a message is sent asking for them to be re-sent. This continues until all packets have been received intact. o The packets are now reassembled into their original form. All this done in seconds! To access the Internet, you need an active internet connection. You need to gather and understand your requirement carefully before subscribing to an internet connection plan. In this exercise, you will learn how to choose an Internet connection.

Information Technology Level -2

In very simple language, let's see what happens to a piece of data, say a Web page, when it is transferred over the Internet:

Some of the common questions that help you in your decision are: o What is the purpose of getting this connection? o Will you use the connection regularly?

5

o How much data will be downloaded on an average per month? o How much speed do you need? o What technology is available in your particular area? o What are the different plans available from the ISP? o Is there any limitation or catch for the selected plan? To access Wi-Fi, you need an access point with an active Internet connection. Usually when you subscribe to an Internet connection, the ISP provides options to purchase or rent a Wi-Fi router that can act as both an internet connectivity device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network requires technical expertise; however, you can access the Wi-Fi network by connecting to an access point that is already setup for use. On computers that run Windows XP, you can view the list of wireless networks available by using the

Information Technology Level -2

following procedure: o Right-Click on the Wireless Icon in the system tray and Click View Available Wireless Networks.

Windows XP will display the list of available Wi-Fi networks; you can choose any of the connection from the list. Select by Double-clicking on the name displayed in the list. Note: You may be prompted to enter a password if the selected network is secure. You will receive a confirmation that you are connected to a wireless network. Now the system is ready to be used for network related applications such as Firefox, Chrome, Skype, etc.

6

Terminolgies and Technologies Signaling Methods In a network, communication happens between devices or computers through electrical, optical or radio-wave signals. Methods of signaling are widely categorized into baseband and broadband. o Baseband: Data is sent as digital signals by using entire bandwidth of the media (Single Channel), supporting single communication at a time. Signals are sent over co-axial, twisted pair or fiber optic cables. Baseband supports higher transfer rates as compared to broadband; however, baseband is limited with distance. Baseband uses TDM (Time Division Multiplexing) to send multiple signals over a single cable. Example: Ethernet, Token Ring & FDDI.

Single Channel

Frequency

C1

C2

C

Frequency

Baseband vs. Broadband

Channel Operation Channel operation refers to the mode of communication between connected devices or computers. Channel operation can be simplex, half-duplex or fullduplex. Simplex is a one way communication, similar to that of a radio. Halfduplex is a two way communication but only one way at a time, similar to that of a walkie-talkie. Fullduplex is two way simultaneous communication (data can be received and sent at the same time), similar to that of a telephone.

Information Technology Level -2

o Broadband: Data is send as analog signals by using portion of a bandwidth. Broadband supports use of multiple signals at different frequencies (multiple channels). Signals are split into channels by using FDM (Frequency Division Multiplexing). Example: xDSL, where telephone lines are used for both voice (telephone) calls and data (Internet connectivity).

Multiple Signaling Methods When multiple devices or computers are connected in a network, they use multiple signals that are combined at the source and separated at the destination by use of a

7

technique called multiplexing. For multiplexing, a device called the multiplexer is used for multiplexing / demultiplexing signals. Types of multiplexing include: o TDM (Time Division Multiplexing) is a method in which multiple signals are combined and send over a single transmission media such as wires or radio waves. This is achieved by use of time sharing; multiple signals are transmitted for a defined amount of time in cycles. For example, a device sends and receives signals every alternate second. o FDM (Frequency Division Multiplexing) is a method in which multiple signals are transmitted at different frequencies. Multiple signals can be sent at the same time over a single channel using this technique. For example, a device sends multiple signals at the same time using different frequencies similar to that of a radio (FM) or cable TV and the end device receives by tuning in to a particular channel.

Information Technology Level -2

Getting access to the Internet To use the Internet, you need an Internet connection. Internet connections are provided by Internet Service Providers such as Bharat Sanchar Nigam Limited (BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc. Internet Service Provider An Internet service provider (ISP) is an organization which provides you with access to the Internet via a dial-up (using modem) or direct (hard wired) or wireless connection. Choosing connectivity depends on the availability of a particular technology, speed and connection type in your area. Usually small and medium business users, home users use connectivity types such as DSL, cable modem, dial-up, broadband wireless, WiMAX or 3G. Medium to large business users or customers with more demanding requirements may use high speed connectivity such as DSL (High Speed), ISDN, etc. Modem Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over phone lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its function MOdulator/ DEModulator.

8

Channel Access Methods Channel access methods refer to how devices communicate using a shared medium such as bus networks, star networks, ring networks, hub networks & wireless networks. When multiple devices or computers are used in a shared medium, a predefined method of transmission needs to be defined. Channel access methods in circuit switching networks include FDM, TDM, etc and in packet switching networks include CSMA/CD, CSMA/CA, Token passing, etc. Ethernet

CSMA/CD CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as per IEEE 802.3 standard is a mechanism that defines how transmission takes place in a network. Only one device in the collision domain may transmit at any one time, and the other devices in the domain listen to the network before sending any packets in order to avoid data collisions. Collisions also decrease network efficiency on a collision domain. If two devices transmit simultaneously, a collision occurs, and both devices device will wait for a random amount of time before attempting to transmit again. Collision domains are found in a hub environment where each host segment connects to a hub that represents only one collision domain and only one broadcast domain. Modern wired networks use a network switch to eliminate collisions. By connecting each device directly to a port on the switch, either each port on a switch becomes its own collision domain (in the case of half duplex links) or the possibility of collisions is eliminated entirely in the case of full duplex links. Collision domains are also found in wireless networks such as Wi-Fi.; CSMA/CA is used in wireless networks.

Information Technology Level -2

Ethernet is a family of computer networking technologies for local area networks (LANs) and has largely replaced competing wired LAN technologies. Ethernet standard defines how communication happens between network interface cards, hub, switches, repeaters, etc. Devices on Ethernet networks use frames or Ethernet frames for communication. IEEE 802.3 standard defines the Media Access Control (MAC) portion of the data link layer and the physical layer of the OSI model. Ethernet protocols are covered by this standard.

CSMA/CA Carrier sense multiple access with collision avoidance (CSMA/CA) is a network multiple access method in which nodes attempt to avoid collisions by transmitting

9

only when the channel is sensed to be "idle". It is particularly important for wireless networks, where the collision detection of the alternative CSMA/CD is unreliable due to the hidden node problem. Token Passing Token passing is a channel access method where a signal called a token is passed between nodes that authorize the node to communicate. The most well-known examples are token ring and ARCNET. Addressing methods

Information Technology Level -2

When multiple computers or devices are connected in a network, signals can be addressed as unicast, multicasts or broadcasts. Unicast refers to one-to-one communication, for example signal is sent from one computer to another. Multicast refers to one-to-may communication, for example signal from one computer or device is sent to selective set of computers or devices. Broadcast refers to one-to-all communication, for example single from one computer or device is sent to all devices and computers in a network. Types of Common Internet Connectivity There are different types of Internet Connectivity available today; it can be widely categorized into wired and wireless access. Following table is a summary of different types of Internet connectivity categorized into wired and wireless: Technology

Type of Connectivity

Dial-Up

Wired

DSL

Wired

Cable Internet Access

Wired

3G

Wireless

WiMAX

Wireless

Wi-Fi

Wireless

Some of the commonly used Internet connectivity are: Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities of the public switched telephone network (PSTN) to establish a connection to an Internet service provider (ISP) via telephone lines using a device called MODEM. Users dial a particular number provided by the ISP and gain access to the Internet.

10

Dial-up connections are extremely slow and in most cases, it is replaced by a high speed connection such as DSL or Cable Modem. DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data over wires of a local telephone network. DSL service is delivered along with wired telephone service on the same telephone line. On the customer premises, a DSL filter removes the high frequency interference, enabling simultaneous use of the telephone and data transmission. For using a DSL connection, you need a DSL modem and a subscription. Cable Internet Access: Cable Internet Access is a form of broadband Internet access that uses the cable television infrastructure. Cable Internet Access is provided through existing cable TV networks; this is similar to DSL that is provided over existing telephone lines.

WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless communications standard designed to provide mobile broadband connectivity across cities and countries through a variety of devices. WiMAX is a long range system, covering many kilometres and is typically used where DSL or Cable Internet Access cannot be used; this could be difficulty in laying out cables for home or offices located in remote locations but need access to the Internet. WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as computers or mobile phones to exchange data wirelessly over a network, including high-speed Internet connections. Wi-Fi devices such as personal computer, smartphones, video game console, etc. can connect to a network resource such as Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used here cables cannot be run (such as old buildings, outdoor areas) to provide network and Internet access. Wi-Fi can also be used where users require mobile connectivity.

Information Technology Level -2

3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and mobile telecommunication services and networks. High-Speed Downlink Packet Access (HSDPA) is 3G mobile telephony communications protocol that allows higher data transfer speeds and capacity. If support for 3G is available on your mobile phone, you can subscribe to the 3G connectivity with your ISP in order to get high speed Internet connection on your phone.

Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid WiFi access to the Internet for their customers.

11

Types of Cables for Internet Twisted-pair Ethernet cables can be wired "straight-through" or "Crossover". To connect a network interface card to a switch, hub or router, straight-through or patch cables are used. To connect similar devices (network interface card on computer to another network interface on another computer, hub to hub or switch to switch), crossover cables are used.

Information Technology Level -2

Fiber Optic: A fiber optic cable is a cable containing one or more optical fibers. FiberOptic cables are ideal for transmitting data over very long distances at great speeds as light is used for the medium for transmission. Fiber optic cables are not susceptible to any EMI, Near-end Crosstalk (NEXT), or Far-end Crosstalk (FEXT). Note that you require special network interface cards & network switch that support the fiber optic interface which is usually expensive and common only in large enterprise networks or locations that are susceptible to EMI such as factories that use heavy machineries. Fiber-Optic cables consist of a high quality glass or plastic strands and a plastic jacket made of Teflon or PVC that protects the cable. Two types of Fiber-Optic cable exist: Single-Mode Fiber (SMF) used for longer distances and Multi-Mode Fiber (MMF) used for shorter distances. Signals are transmitted as light signals from source to destination. Either LED or Laser is used. In multi-mode fiber, light signals are transmitted in numerous dispersed path (singlemode fiber use single light source) and making it un-suitable for long distance transmissions.

1. Core, 2. Cladding, 3. Buffer, 4. Jacket

Fiber Optic Cable

In some cases, plenum rated cables are used that have a special jacket to protect against fire and emit less smoke than normal cables. However, this is rare and often seen only in industrial or manufacturing sites.

12

Network Hardware TCP/IP Utilities On computers that have support for networking, a list of utilities is available to configure and troubleshoot network related issues. Often referred to as TCP/IP utilities, these utilities are bundled along with the operating system. Though the names of the utilities could vary in spelling, the underlying function is almost the same across operating systems. Given below is a list of utilities (with simple description) You will learn more about them in later sessions. Utility

Description Internet Protocol Configuration Utility

GETMAC

View MAC or Physical Address of an NIC

PING

Test network connectivity

TRACERT

Trace Route from source to destination

ARP

Resolve IP address to MAC address

Host name

View computer name or hostname

NETSTAT

View TCP/IP statistics

Nbtstat

View NetBIOS over TCP/IP statistics

Nslookup

View DNS related information

Route

View or modify routing table

Pathping

Trace packets and view detailed packet information

Note: Use /? for additional help/syntax for each command listed here. For example to know more about IPCONFIG, type IPCONFIG /? Network devices such as NIC, hub, bridge, switch & routers are devices that help computers to network and communicate. There are a variety of network devices equipped with a wide range of functions.

Information Technology Level -2

IPCONFIG

Network Interface Card (NIC) Network cards are devices that connect computers to the network. Network cards are both Layer 1 (Physical) & 2 (Data Link) devices as they provide physical access to the medium and also provide physical addressing through the MAC Address.

13

Network Interface Cards are available for desktop, laptop and server computers. A variety of interface such as PCI, CardBus, USB are available today. Most desktops, laptops, servers and motherboards have built-in NIC.

PCI Ethernet Card for use in Desktops

Cardbus Ethernet Card for use in older laptops

USB Ethernet Card (USB Ethernet converter)

Lab View Network Interface card installed on a computer

Information Technology Level -2

Hub A hub is a device that connects multiple computers using a twisted-pair cable. Hubs operate at Layer 1 (Physical). The number of computers that can be connected to a hub depends on the number of ports available (typically 4 to 8). Whenever it receives data from one port, the hub broadcast data to all the devices connected to it, leading to collisions. Hence hubs are referred to as multiport repeaters. Since the evolution of SOHO routers and network switches, hubs are rarely used and considered obsolete. Bridge Bridge is a device that can connect network segments and separate network traffic based on broadcasts. Bridges examine the frames and selectively transfer frames according to their MAC address. Bridges operate at Layer 2 of the OSI Model. Switch Switch is a device that allows multiple computers to be connected using twisted pair cable. Switches (operating at Level 2 - OSI) manage traffic based on MAC (Media Access Control) addresses and are efficient in large networks. Switches are intelligent as they can build a table of MAC Addresses of all the devices connected to ports on the switch and create a virtual circuit for each attached device. Once a packet is received, it is analyzed and forwarded to only the destined station with matching MAC address based on the table.

14

Using switches can eliminate collision as each port in the switch acts as a collision domain. Since switches isolate collision domains, they are referred to as multiport bridges. When forwarding frames, switches use Store and forward, cut through, Fragment free or Adaptive switching methods. Unlike a hub that uses half-duplex communication, a network switch can send and receive at the same time (full-duplex mode) resulting in faster performance. Number of computers that you can connect to a switch depends on the number of ports available (Typically 4 or 8 on SOHO switches designed for use in home and small business networks and 8 - 32 or 64 on switches designed for use in an enterprise network.). The networks can be extended by adding additional switches usually cascaded from the primary switch. Switches designed for larger networks are cascaded through a special port called the Uplink port.

Information Technology Level -2

Simple Small Office Home Office Network Setup

An Enterprise network with a variety of networking devices

15

Categories of switches include: o Unmanaged switches are network switches used typically for homes or small offices requiring no administrative configuration. o Managed switches are widely used in enterprise networks and ISP's. These need to be configured by the network administrator before it is used in a network. VLAN A single layer-2 network can be partitioned to create multiple distinct broadcast domains, enabling data to be exchanged only between the computers within the domain. This is referred to as VLAN or Virtual LANs. This is created for two primary reasons: o to reduce collisions

Information Technology Level -2

o to implement security. For example if all the computers in an organization are connected to a single switch, you can isolate them by creating VLAN's for each department resulting in restricted access across departments with maximum access between computers within departments. VLANs can be configured only on Managed switches.

VLAN 1, Marketing Team

VLAN 2, Finance Team

Separate VLANs for marketing & finance team connected to a single switch

Power over Ethernet PoE describes a standardized system to provide electrical power supply through Ethernet cables; generally, UTP cables carry only signals necessary for data communication. Switches that have support for PoE are generally expensive and in some cases only limited number of Ethernet ports are capable of supporting PoE. Advantages of PoE include the ability to provide power up to 25 watts and distance factor that allows devices to be connected up to 100 meters from the switch.

16

Router Routers are Layer 3 devices that allow packets to be routed to different logical networks. Routers can discover and transfer packets based on routing table that are pre-determined or self-discovered. Routing tables are either managed by an administrator by manually defining the routes or automated through special configuration to exchange the routing tables with other routers on a logical network. Most common type of routers includes the SOHO router used at home or small office for sharing Internet connection; sophisticated routers are widely used in enterprise networks and ISP's. Similar to SOHO switches, SOHO routers do not need to be configured and routers designed for use in large networks require to be configured before they can be used.

Enterprise Router

In general, a combination of several routers and switches are used in large networks. Notable manufacturers of routers include Cisco, Nortel Networks, Avaya, HP, Dell, Huawei, etc. Routing Routing is the process of selecting paths in a network when sending or receiving packets across computers or devices. Imagine if you are planning to send a parcel to someone; the parcel will travel through different offices, change routes if roadblocks are detected and finally be delivered to the recipient. Similarly when you browse the internet or send an email, packets take different routes (from your computer to your ISP, from your ISP to the next ISP, etc.) until it reaches its destination.

Information Technology Level -2

SOHO Router

SOHO Router Also referred to as a residential gateway, SOHO (Small Office Home Office) routers are devices designed for use in small to medium sized networks. Most SOHO routers have combinations of a switch, DSL or cable modem and an access point for Wi-Fi connectivity. These devices are used for two primary purposes: o Connecting desktops & laptops across home or office.

17

o Sharing a single Internet connection across desktops & laptops. Some models include support for connecting peripherals such as printers, USB hard disk drives, etc. through USB ports.

Wireless Networking Introduction to Wireless Networking, RF Communication Wireless network refers to a computer network that is not connected by any cables. Typically Wireless networking is used where wired connectivity is not possible or feasible due to technology costs or availability. Wireless telecommunications networks are implemented and administered using a transmission system called radio waves. This implementation takes place at the physical level (layer) of the OSI model network structure.

Information Technology Level -2

Types of wireless networks o Wireless personal area network (WPANs) interconnect devices within a relatively small area usually within a person's reach. For example, usage of Bluetooth to connect a mobile phone to a laptop. o Wireless metropolitan area network (WMANs) is a wireless network that connects several wireless LANs. WiMAX is a type of Wireless MAN and is described by the IEEE 802.16 standard. o Wireless wide area network (WWANs) is a wireless network that covers large areas, such as one between neighboring towns and cities, or city and its suburbs. This network can connect branch offices of business or function as a public internet access system. The wireless connections between access points are usually point to point microwave links using parabolic dishes on the 2.4 GHz band, rather than Omnidirectional antennas used with smaller networks. Omnidirectional antennas are types of antenna that radiates radio waves equally in all directions. Omnidirectional antennas oriented vertically are widely used for nondirectional antennas as they radiate equally in all horizontal directions. Note: Though there are a variety of Wireless Networks, this course focuses only on Wireless LAN.

Instant Messaging Instant messaging (IM) is a form of communication over the Internet that offers an

18

instantaneous transmission of text-based messages from sender to receiver. Most instant messaging software include the option for performing file transfers, audio chat, video calling and conferencing, sharing desktops, etc. apart from standard text chat. Instant messaging software is widely used for personal and commercial use. In this session, you will be introduced to the concept of instant messaging, the steps to create an instant messaging account and also work with instant messaging software. Unlike email, instant messaging happens in real-time and the response from participants can be spontaneous. Some instant messaging software allows users to view messages received when they are not logged on. These are called "Offline Messages". For utilizing audio and video chat or conferencing, you need to have microphones and headsets or speakers and web cameras so that users can talk or see each other.

o Text Messages can be sent to one or more person (Similar to SMS) o Audio calling and conferencing. o Video calling and conferencing. o File transfers (Not limited to documents, spread sheets, audio files, video files, etc.) o Message history (Save messages for future reference). Instant Messaging Account Participants messaging to each other need to be signed in to the same instant messaging software. To use instant messaging software, a user must have a valid instant messaging account.

Information Technology Level -2

Key features of an instant messaging are as follows:

Instant messaging accounts differ in formats; some instant messaging software such as Yahoo Messenger, Windows Live Messenger use email addresses for managing the account and software such as Skype use standard names. Instant Messaging Services There are two kinds of instant messaging software - application based and Web based.

19

o Application based instant messaging software is downloaded and installed on user's computer. Some of the popular instant messaging software are: ? Google Talk ? Yahoo! Messenger ? Skype ? Windows Live Messenger ? Rediff Bol, etc. o Web based instant messaging software is accessed using browsers such as Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web based instant messaging software are: ? Meebo

Information Technology Level -2

? Yahoo! Messenger for the Web ? MSN Web Messenger ? IMO, etc. Creating an instant messaging account In this exercise, you will learn to create an instant messaging account for using Google Talk. Google Talk is an instant messaging service that provides both text and voice communication developed by Google Inc. Google Talk can also be used for making video calls and to view updates from Gmail mailbox. Google Talk is free and is available as application based (users need to download and install Google Talk application to their desktops, mobiles or laptops) and web based (users can use Google Talk through a browser after signing into their Gmail account). Before you start using Google Talk, a Gmail account is required. You have learned how to create a Gmail account earlier. In this exercise, you will learn how to use Google Talk. Note: You need to download and install Google Talk application from www.google.com/talk prior to this exercise.

20

Launching Google Talk o To launch Google Talk, Click Start > Programs > Google Talk > Google Talk. o You can also double-click on the Google Talk icon on the desktop if available. You need to have a list of contacts that are available for chat. If you don't have any contacts, you can add their Gmail account to your contact list by sending an invite. If you don't have a Gmail account already you can create a new Gmail account. Signing in into your Google Talk Account To use Google Talk, you need to sign in with your account details.

Types of networks

Information Technology Level -2

After signing in into your Google Talk account, you should see a window similar to the one displayed below. Now the Google Talk application is ready for use.

There are two major types of network Local Area Network (LAN) and Wide Area Network (WAN). Local Area Network A local area network (LAN) is one which connects computers and devices in a limited geographical area such as home, school, computer laboratory, office building, or closely positioned group of buildings.

21

Usually local area networks offer very high speeds and are used for connecting computers and peripherals such as printers, scanners, etc. Wide Area Network A wide area network (WAN) is one which covers a broad area (i.e., any network that links across metropolitan, regional, or national boundaries). The Internet is the most popular WAN, and is used by businesses, governments, non-profit organizations, individual consumers, artists, entertainers, and many others.

Online Transactions

Information Technology Level -2

Online shopping is a form of electronic commerce where customers can buy or sell goods over the Internet. Customers need to have an active internet connection for viewing goods or services offered by a seller; customers can pay online using a credit, debit card. Online shopping could be useful in situations when: o A customer does not have sufficient time to visit stores. o Visiting a store is more expensive than purchasing a product online. o A product or service that is not available in the local market is available online. Some of the popular online transaction websites are: o IRCTC, an online portal for booking flight and train tickets. o Flipkart, an online shopping portal for buying consumer products. o EBay, an online portal for buying and selling goods. o Redbus, an online portal for booking bus tickets. To perform an online transaction, all you need is a web browser and an active internet connection. In some cases where purchasing is involved, you will need a valid credit card, debit card or online banking support referred to as Net Banking Subscription. Some websites even allow COD (Cash on delivery) where the users can pay once they receive the product or service.

22

Unit -

2

Digital Documentation Advanced Word Processing You have already learnt the basics of word processing. Now consider a situation when you write a lengthy article that spans several pages, and you need to make it easier for the readers to read it? Look at the following example:

Is the content presented above easy to read? Now, look at the formatted sample below:

Information Technology Level -2

What is Culture and Gender Sensitization? Culture in simple terms refers to our values, the way we speak, behave, think, dress, religious beliefs, the music we like, our interactions, and the food we eat. Diversity is a commitment to recognizing and appreciating the variety of characteristics that make individuals unique in an atmosphere that promotes and celebrates individual and collective achievement. Many people mistakenly use such phrases as "Indian culture," "white/black culture," or "Western/Eastern culture," to describe a particular culture but these people fail to acknowledge the presence of cultural diversity, or the presence of multiple cultures and cultural differences within a society. In reality, many different cultural groups exist today in India and most developing and developed countries. Diversity in the workforce means employing people without discrimination on the basis of gender, age and ethnic or racial background. Since globalization is the current overwhelming trend in business, diversity in the workplace is a better accepted and applied concept now more than ever. There are different kinds of diversity that one encounters at the workplace. These include diversity of gender, age, psychology, education, language and culture.

What is culture and gender sensitization? Culture in simple terms refers to our values, the way we speak, behave, think, dress, religious beliefs, the music we like, our interactions, and the food we eat. Diversity is a commitment to recognizing and appreciating the variety of characteristics that make individuals unique in an atmosphere that promotes and celebrates individual and collective achievement.

23

Many people mistakenly use such phrases as "Indian culture," "white/black culture," or "Western/Eastern culture," to describe a particular culture but these people fail to acknowledge the presence of cultural diversity, or the presence of multiple cultures and cultural differences within a society. In reality, many different cultural groups exist today in India and most developing and developed countries. Diversity in the workforce means employing people without discrimination on the basis of gender, age and ethnic or racial background. Since globalization is the current overwhelming trend in business, diversity in the workplace is a better accepted and applied concept now more than ever. There are different kinds of diversity that one encounters at the workplace. These include diversity of gender, age, psychology, education, language and culture.

Information Technology Level -2

Using paragraphs you can break continuous text to one or more sentences. This way, it is lot easier for the readers to understand and enjoy the content. In this exercise, you will learn to work with paragraphs and layouts. Have you tried to make a professional looking resume? One important part of working with a resume involves alignment. For the sake of both professional appearance and accessibility, it is conventional for similar parts of a resume to all line up along the same vertical axis. So that all the bullet points are aligned, and so are the headers, and sections. You may come across situations where some bullet points don't line up, or where there are many empty spaces that complicate editing and revising. So now what do you do? 1.

Open a new document in word processor. Click on the Page Layout tab on the Ribbon.

2.

Click on the icon under Paragraph group, as shown below. Page Layout

3.

24

The Paragraph dialog box appears. You can see the options for automatic alignment, spacing, etc. that you can setup while composing the document itself instead of doing the alignment towards the end.

4.

Click on Tabs... button, Tabs dialog box appears.

5.

You can specify the tab stop position by mentioning the stopping position in the Tab stop position box. After specifying the tab stop position click on Set button and the Tabs window appears. Note: You can also the set the initial tab stop position value from the default value (0.5") by specifying the new value under Default tab stops. You may specify the value at which the tab stops by giving the value specified along with the unit (like 7cm, etc.)

6.

Click OK. The ruler of the document will be marked with a L shaped symbol at 2", meaning that the tab stop position has been set at that position. Now when you press the tab key, the cursor will automatically jump from its initial position to the next tab stop position. And this solves your problem too!

Information Technology Level -2

Note: You can also set the tab stop position by clicking at the required point on the ruler. Now open a new document, type some text and press Enter. Notice that the continuous text is automatically formatted as paragraphs, with the size that you have specified in the Tabs Dialog box.

Managing Headers Headers are text or images included at the top of the page. They usually contain important information such as company or department name, logo, page numbers, name of the author, etc. separated from the work or actual document area. Look at the following example:

25

Information Technology Level -2

Notice the header in the above document; the title "Application From, June 2012" will be included on all pages of this document. In this exercise, you will learn to include a header to a document. To understand and work with headers, open a new document in word processor 1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Header in the Header & Footer group, as shown below. Insert

3.

Header

A drop down list appears which lists predefined header options (Figure below). Now try inserting any of the predefined options from the list and observe the changes at the header area of the document. You can insert the page number at any position within the header area by selecting the alignment option under Page Number. You can also change the number format for page numbers by clicking Format Page Numbers... under Page Number options. The Page Number Format dialog box appears as shown below.

26

You can insert date and time by clicking the Date & Time option available under Insert Group. You can choose the date and time format from the available formats.

Managing Footers Footers are text or image included at the bottom of the page and may repeat in all pages of the document. The procedure for creating a footer is similar to that of headers. For example, if you wanted to create a text book, you can include the name of the text book using the headers and the page numbers using the footer option. This makes the document look neat and organized. To insert footer to a document, open a new document in Word processor 1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Footer in the Header & Footer group, as shown below. Insert

Information Technology Level -2

You can also insert a picture or clipart within the header. This option can be useful in situations when you need to insert company's or an event's logo. Try inserting a picture or a clipart into the header using the Picture and Clip Art option under Insert Group; observe the changes made to the document.

Footer

27

3.

A drop down list appears which lists collection of predefined Footer options. Now try inserting date and time, page numbers, pictures and clip arts in the footer area and observe the changes.

Managing Styles Styles or Style sets are pre-defined or customized options used for creating good looking professional documents with least efforts. You can find a number of styles available within word processor that can be applied to a document. In this exercise, you will learn to apply and manage styles.

Information Technology Level -2

To work with styles, open a new word document in word processor, 1.

To view list of styles, locate the Style group under Home tab (Figure below)

2.

If you would like to view the list of style sets available, point to Style Set under Change Styles option. A drop-down with different styles will be displayed (Figure below).

Select any of the styles listed by clicking it. The entire document will change to the specified font or color automatically.

28

Document Template Templates or document templates refer to a sample fill-in-the-blank document that can help in saving time. Usually templates are customized documents that may have sample content, themes, etc. For example, if you want to create a resume you can use a resume template and modify only the sections that require changes. In this exercise, you will learn to work with document templates. To view sample templates available with your word processor, 1.

Go to File > New. You will be displayed with different types of templates (Figure below). For example, if you would like to create a letter, you can select the Letters option under Office.com Templates section.

Suppose you need to create certificates for a recently held competition, you can select the Certificates option. You will be displayed with a list of Certificate templates. Now select any of the templates by double-clicking on it.

You can also download other types of templates from websites. Some of the websites that offer free templates are: o office.microsoft.com/templates o www.thepapermillstore.com o openoffice.blogs.com/openoffice/templates/ o www.docstoc.com You can visit the above mentioned websites to search, download and use a template that suits your needs. Creating a new document based on a template can save you time and effort because all the work it takes to design the document has already been done. You may use the templates that come with word processing software, or downloading templates created by other people, or you can also create and save your own templates for future use. First of all, you need to create a document that will serve as the template.

Information Technology Level -2

A sample certificate window similar to the one below appears. Now you can use this template and customize the contents by replacing the school name, student name, etc.

Note: You create the template as a normal document, but the magic step is where you save it. Click on File >Save As, and give the template a name. Select Word Template from the Save as type: drop down list.

29

Notice that there is a Templates folder within Microsoft Word. If you save your template there, then we'll be able to see the template in the My templates category. So select that and click Save. Now to use the template, click on the File > New. Go to My templates, and as you scroll down, you will find the file {your name}_Invoice , the template you just created. Select that and click OK. Notice that this is a new document and it's not the template. So, we've just created a new document based on one of your own templates. Now when you save this document, it gets saved as a normal .docx file.

Working with Page and Section Breaks Page and Section breaks can be used to separate a document into sections.

Information Technology Level -2

If you would like to start a new page in a document, you can use a page break.

30

To separate a section in a document, you can use the section break. For example, you can lay out part of a single-column page as two columns. You can separate the chapters as separate sections in your document so that the page numbering for each chapter begins at 1. You can also create a different header or footer for a section of your document. For example, if you are creating a textbook and you can create different sections for digital literacy, word processing, spread sheets, etc. To work with breaks, open a new document in the word processor and type some contents. If you need another fresh page, choose the page break option in the Page Layout tab. a)

Click on the Page Layout tab on the Ribbon.

b)

Click on the option Breaks in the Page Setup group (Figure below).

c)

A dropdown list with options for different types of breaks appears. An explanation is given for each type of page or section break.

A page break can be inserted anywhere in a document to force the end of a page and the beginning of a new one. To create a new page, you can keep pressing enter and the cursor moves from line to line till a new page starts. But if you add content to the previous page, the content of the new page will automatically shift! To avoid such problems, there is an easier method - use a page break and start a fresh page! You may also use a page break when you want to be sure that a new chapter or sub-heading automatically starts at the top of its own page. Section breaks add flexibility to formatting your document. Using them, you can create different headers and footers, different footnote numbering, change the layout of columns, change page borders for different pages, and even change page layouts in the same document! Using section breaks is like having mini-documents in one large document.

You need to be able to see where your section breaks or page breaks are inserted in order to see where the formatting stops and ends or to delete them. To see a section/page break, click the Show/Hide button on the Home tab in the Paragraph section. The section/page breaks are displayed in your document. 1.

Click on the section/page break.

2.

Press Delete on your keyboard and the section/page break is removed.

Anytime you need to add a page border to a single page or have a table in Landscape orientation with the rest of the document in Portrait orientation, try using section breaks to make the task easier!

Information Technology Level -2

A section break controls the formatting of the document content that precedes it, until it reaches another section break. For example, if you have a 10 page document, with a section breaks on page 3 and on page 8, the section break on page 3 controls the formatting of pages 1, 2, and 3 while the section break on page 8 controls the formatting for pages 4 to 8.

Applying Character Formats If you are creating a textbook with scientific content, you need to use special formatting for some characters. Character formatting can be applied to a single character or word. In this session, you will learn to perform character formatting.

31

Working with character Formatting To work with character formatting, a.

Open a new document in word processor and type the following paragraph: Water is a chemical substance with the chemical formula H2O. A water molecule contains one oxygen and two hydrogen atoms connected by covalent bonds. Water is a liquid at ambient conditions, but it often co-exists on Earth with its solid state, ice, and gaseous state (water vapor or steam). Water also exists in a liquid crystal state near hydrophilic surfaces. The density of water is 1,000 kg/m3. Now to make changes, you may need to format the characters as shown below. You will notice that some words of this paragraph are in bold, some are in Italics, some are underlined, some are in colour and some are changed in its position (superscript & subscript).

Information Technology Level -2

b.

In order to apply formatting to the contents in the document you must select the concerned word or group of words. Use the following options to make changes to a character or word: Font Face: After selecting the text you need to click Font Name in the Font group to select the particular font style from the fonts listed. Font Size: After selecting the text you need to click Font Size in the Font group to select the particular font size from the values given. Water is a chemical substance with the chemical formula H2O. A water molecule contains one oxygen and two hydrogen atoms connected by covalent bonds. Water is a liquid at ambient conditions, but it often co-exists on Earth with its solid state, ice, and gaseous state (water vapor or steam). WATER also exists in a liquid crystal state near hydrophilic surfaces. The density of water is 1,000 kg/m3. Grow Font: After selecting the text you need to click the A icon in the Font group to make the font size larger than the current font size by the specified point. Shrink Font: After selecting the text you need to click the A icon in the Font group to make the font size smaller than the current font size by the specified point. Strikethrough: After selecting the text you need to click the abc icon in the Font group to make a strike through the middle of the selected text. Subscript: After selecting the text you need to click the X2 icon in the Font group to make the selected text lower than the normal text position.

32

Superscript: After selecting the text you need to click the X2 icon in the Font group to make the selected text higher than the normal text position. Clear Formatting: Clear Formatting is used to clear the character formatting (such as Bold, Italics ,Underline, font face & size, superscript & subscript etc.) of the selected text. To remove the character formatting, select the text and click on Aa icon in the Font group. Text Highlight Colour: Use this option to change the background colour. To do so, select the text and click on ab icon in the Font group. You can choose the background colour by clicking on the down arrow on the icon. Font Colour: Use this option to change the colour of the text. To do so, select the text and click on A icon in the Font group. You can choose the text colour by clicking on the down arrow on the icon.

Sentence Case: On selecting this option from the dropdown list, the first character in the first word of the selected sentence will be converted to Capital Letter (Uppercase). Lowercase: On selecting this option from the dropdown list, the selected text will be converted to Small Letters (Lowercase). Uppercase: On selecting this option from the dropdown list, the selected text will be converted to Capital Letters (UPPERCASE). Capitalize Each Word: On selecting this option from the dropdown list, the first character in all the words of the selected sentence will be converted to Capital Letter (Uppercase).

Information Technology Level -2

Change Case: Word processor helps us to change the text case to capital letters or small letters. You can also capitalize each word in the sentence and capitalize the starting word of the sentence using Change Case under Font Group. To do so, after selecting the text you need to click the Aa icon in the Font group

Toggle Case: On selecting this option from the dropdown list, the small letters in the selected text will be converted into capital letters and capital letters will be converted into small letters.

Insert Graphical Objects and Illustrations Often when you write a technical report, or a newsletter or even letter to friends, including some form of graphics makes the document more interesting!

33

In a technical report, you may want to incorporate a graph of corporate performance or a technical illustration. While in a newsletter or letter to family and friends, you enjoy sharing memorable events that are represented by photos or maybe even cartoons. The facility to blend these graphics into the document is part of the charm and power of every major word processing program. But not only can we blend graphic images into our message, but Word, WordPerfect and OpenOffice also allow us to blend in other special features. These features are generally known as "objects". These objects can be almost any form that can begenerated as a computer file. Sounds, Music, drawings, documents spreadsheets, etc. are all examples of possible objects that you can include in a document, or link to a document.

Information Technology Level -2

Note: Embedding an object makes it part of the document while linking an object does not include the object file into the document files. Readers trying to access the linked object must also have direct access to the separate file that forms that object. That may mean they have to have access to your hard drive in order to see the linked object. Most Word processors has support for inserting illustrations in the form of Clip Arts, Shapes, pictures, charts, etc. Clip Art can help in making a document look colourful and presentable. Clip arts are predefined images available for use in documents. For example, if you would like to create a greeting card for your friend, you can use clip arts such as balloon, flowers, etc. along with text message. You can use the clip art gallery built-in within the word processor; you can also download clipart from websites. Some of the websites that have free clip arts are: o www.openclipart.org o www.pdclipart.org o www.clker.com o www.freeclipartnow.com o www.wpclipart.com In this exercise, you will learn to use Clip Arts. To insert a clip art in a document, a)

34

Open a new document in word processor 1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Clip Art in the Illustrations group (Figure below).

Insert

Clip Art

3.

The Clip Art Task Pane appears. Enter the clipart category name in the search box and Click Go. For example, if you want to insert a logo, type logo in the search box and Click "Go".

4.

Once you click Go (Figure 17), a window appears along with list of clip arts matching the search keyword (Figure 18).

Now, you will learn to download a clip art from a website and use it in your document. b)

To download a clip art from www.openclipart.org 1.

Open the web browser, Type www.openclipart.org in the address bar and press Enter

You can use the search box available on the website for viewing the list of clip arts to suit your needs. For example, Type School Bag in the search box and Click Search You will be displayed with list of clip arts matching the keyword School bag, similar to the one below.

Clipart search results for “School bag”

Information Technology Level -2

Select the clipart that you want to use, double-click on it and it will be inserted into your document. Sometimes, you may need clip arts that may not be available within the word processor application. In such cases, you can visit websites that offer clip arts such as OpenClipart.org.

35

Now you can select the clip art you like, download it to your computer and insert it using the photo option in the word processor.

Text Wrapping

Information Technology Level -2

You have learnt to insert graphics and illustrations in the last exercise. How do you want the text to fit to the picture? Do you want a graphics to stand alone with text above it and below it? Do you want the text to be along one side of the graphics? Do you want to have the text message split so that part of the text is on the left side and then continue on the right side of the graphics? Do you want the text to run right across the graphics? All these options are possible depending on the text wrap options you choose. What if the graphic image is too large, or too small? This is a problem you may face when placing graphic images into a document. In all word processing software, if you select the image (left mouse click on it) control handles will appear on the sides and on the corners of the graphics. When you place your mouse on these handles, the cursor changes to a double headed arrow and you can click and drag the handle in or out to decrease or increase the size of the picture. In this exercise, you will learn to use text wrapping. Open a new word document and type the following: Apache OpenOffice Writer is the word processor component of the OpenOffice package. It is free and is available for a variety of Operating Systems including Windows, Linux, FreeBSD and Solaris. It is capable of opening and saving documents in a variety of formats. You can either include a screenshot of the OpenOffice Writer or search for a picture in your computer. To take a screen shot, simultaneously press and keys. Place the cursor on the right of the text and simultaneously press and keys. To search for a picture, place the cursor before the text, click Insert Tab, and click Picture under Illustrations. Browse for the picture and click Insert. o Once you have inserted the picture, you can wrap the text by using the Wrap Text option under Text section of the Insert Tab after double-clicking on the picture (Figure below). If you are working on Word, select the picture then select the Text Wrapping dropdown arrow in the Arrange group under the Format tab.

36

Now try selecting different Wrap Text options such as Square, Tight, Through, etc. and observe the changes made to the wrapping. A screen shot when the Square option was used is shown below:

Inserting Objects In addition to graphic images, to add a personal touch to a special message or to illustrate a special feature, you may want to embed sound files or maybe even actual files from other software applications in your document. For example, you can insert a PDF file or a spread sheet within the word processor. In this exercise, you will learn about inserting objects in a document. To insert an object, o Open a new word document o Select Insert Tab

Information Technology Level -2

o Click Object under Text section. A dialog box will be displayed, as shown in figure 23.

o Select Create from File Tab o Click Browse and select a file such as a spread sheet or a PDF document that is available on your computer, Click Open and Click OK o Notice the document is available embedded within your word document. Note: If you would like to edit the embedded document, double-click on it. It will automatically open it for editing using respective application.

37

Now try inserting different types of document using the procedure mentioned above. Note: 1.

The embedded objects cannot be printed.

2.

The person opening your document must have the relevant software loaded on their computer to operate the embedded file.

3.

If you embed an object, the size of your document increases significantly and this may cause problems in emailing the document as an attachment.

4.

If you link an object, the person opening that document must have a direct connection to the original file location of the object.

Information Technology Level -2

Insert Shapes, Symbols and Special Characters

38

You can insert objects that have different shapes such as lines, basic geometric shapes, arrows, equation shapes, flowchart shapes, stars, banners, and callouts using the shape option. In this exercise, you will learn to work with shapes in a word document. To work with shapes, open a new document in word processor, 1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Shapes in the Illustrations group, as shown in figure 24. Insert

Shapes

3.

Once you click the Shapes option a dropdown list with pre-defined shape such as box, circle, etc. appears.

4.

You can select the shape from the list of shapes available and draw the shape by dragging the mouse with the left button clicked. For example, if would like to insert a square, select the box shaped item from the list, click and drag the shape to draw a square.

Now try inserting other shapes from the list available and work with them by changing colors or adding content inside them. In some cases, you may need to insert special characters or symbols in documents such as currency sign of a different country, copyright or trademark symbols, etc. In this exercise, you will learn to insert symbols or special characters. To work with symbols or special characters, open a new document in word processor. 1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Symbol in the Symbols group, as shown in figure 25. Insert

A dropdown list appears (figure 26). Select a symbol from the list and double-click on to insert the symbol into the document. If you would like to view more symbols and special characters for inserting into a document, click on the More Symbols option in the Symbols Dropdown list.

Information Technology Level -2

3.

Symbol

39

Unit -

3

Digital Data Analysis Advanced Operations on Spreadsheet Use Autosum in Cells

Information Technology Level -2

You have learnt to navigate in a spreadsheet, populate cells, and perform calculations. As you know, a spread sheet offers various mathematical functions to perform the calculations. Sum is one of the functions available in the spread sheet to perform addition of selected numbers in the sheet. In this exercise, you will learn how to use autosum function to perform addition in a spread sheet. Autosum is used for adding the values given in cells automatically without writing the formula to perform the operation. Open a new spread sheet and enter the following data.

Now to total the marks of each of the students, do the following: o Go to cell G2. While the cell G2 is selected, click on the AutoSum option available under Editing Group in the Home tab. AutoSum

40

o The values in the cells from c2 to f2 will be automatically selected as shown below.

o Press Enter. ? The total marks of Abhas appears in cell G3. ? Similarly, calculate the total marks of the rest of the students.

Now change the marks of one of the students in one or more subjects. The total marks of that student will get calculated automatically. Automatic calculation of formulas is one of the most powerful features of electronic spreadsheets.

Information Technology Level -2

Note: Autosum automatically selects the values around the cells either horizontally or vertically. In the above example you want to perform addition of numbers listed from left to right, after finding the total of two persons when you try to perform autosum for another person the values on top of the current cell get selected. In that case, you have to select the cell values that you want to perform addition.

Conditional Formatting Conditional formatting allows you to change the formatting (font color, border, shading) of the cells based on the values in it. Yes, you can do that manually, but it can be a tiresome task if you have a huge amount of data. So, you specify a condition for the values

41

in the cell, and if the condition is satisfied then automatically the formatting of the cell changes. This feature would be very useful if you were working on a profit and loss spreadsheet, or a temperature variance spreadsheet, or a marksheet. You could highlight cells that have values are greater than a defined rule with one color and those less than another with a different color. Basically, you can select one or more cells, and create rules (conditions) for when and how those cells are formatted. The conditions can be, based on the selected cell's contents, or based on the contents of another cell. You can control the following formats: o Number format o Font, font style, and font colour (but not font size) o Fill colour and fill pattern

Information Technology Level -2

o Border colour and border style (but not border thickness)

42

Open a new spreadsheet and enter the following data.

Now to apply conditional formatting for the data do the following. o Select all the cells you want to format conditionally.

Now to apply conditional formatting for the data do the following. o Select all the cells you want to format conditionally.

o Click on Conditional Formatting option available under Styles group in the Home tab. A drop down list appears. Click on Highlight Cells Rules option, a submenu appears.

o Specify the value in the box and click on the down arrow next to the with field and select a predefined format for the condition from the drop down list. If you want to highlight the cell contents with your own formatting style click Custom Format option in the dropdown list. o A Format Cells dialog box appears. You can select a different font color under Font tab, border style and color under Border tab and fill color under Fill tab. o Go ahead and create the data below and format it in the manner displayed.

Information Technology Level -2

o Note: you can select the condition listed according to your needs. In this example if you want to highlight the values that are greater than 75, select "Greater Than..." available under the submenu. A dialog box appears.

Note: Similarly you can set various conditions for the selected value like less than, equal to, between etc.

43

Information Technology Level -2

Optionally, you can also specify the cell address where the value is stored. This can be very helpful as simply changing the value in one place can change the conditional formatting all over the previously selected range. An example is shown in the figure below.

44

The result is displayed below.

Hide / Unhide / Freeze Rows and Columns Sometimes you have data in rows and columns which are needed for formulas or charts, but you do not want the data to be visible. A very handy feature of a spreadsheet is the ability to hide a row/column that is not to be shown to the end user. The data in hidden row/column is available for calculations though not visible! Freezing rows and columns is another helpful feature in a spreadsheet. When you are dealing with a huge amount of data that spans several rows or columns, you may want the headers to remain constant (frozen) while you scroll through the data so that you can see the identifying names of the rows/columns.

Open a new spreadsheet. To hide a row or column, do the following: o In order to hide any row or column you can either select the particular row or column that is to hidden or just one cell in the corresponding row or column (for example B3). o Click on Format option available under Cells group in the Home tab. o A dropdown list appears as shown below. o Click on Hide & Unhide > Hide Rows. The spread sheet will be displayed as shown below. Note: Alternatively, you can select the row/column, right click and select Hide. Note: In this example the cell in the 3rd row of the spread sheet was selected and then Hide Rows option was selected. So, the 3rd row is hidden. What would have happened if you had selected Hide Columns instead?

To freeze the rows or columns do the following. o Open a new spread sheet. o In order to freeze rows or columns click on Freeze Panes option available under Window group in View tab. o A drop down list appears as shown below. Click on Freeze Panes. Doing so will freeze all the rows above and all the columns to the left of the selected cell. Scroll your mouse in the spreadsheet the frozen rows and columns remain constant. Note: The panes are formed where your cursor is placed. Select the option again and notice the change in the available options! Go ahead and try the other options too. You can also freeze the entire row or column by selecting the entire row or column and click "Freeze Panes" to freeze the entire row or column.

Information Technology Level -2

o In order to unhide the row or column that is hidden you have to select any cells before and after the cell that is hidden then click Unhide Rows in the Format option available under Home tab.

Set Page Breaks To print a worksheet with the exact number of pages that you want, you can adjust the page breaks in the worksheet before printing it. This feature is very useful especially when printing huge sheets. You can use the Page Break view to see how other changes (e.g. changing row height/column width) affect the automatic page breaks.

45

In this exercise you will learn how to set page breaks in the spreadsheet. Open a new spread sheet and create the sheet below. On the View tab, in the Workbook Views group, click Page Break Preview.

Information Technology Level -2

Now to set the page break do the following.

46

o To insert a vertical page break, select the row below where you want to insert the page break. To insert a horizontal page break, select the column to the right of where you want to insert the page break. o Click on Breaks down arrow under Page Setup group in the Page Layout tab. A dropdown appears as shown below. o Click on Insert Page Break option. The spread sheet will be displayed as shown below. The content you have typed comes in the first page and you can print it. o To move a page break, simply drag the page break to the desired location.

Note: You can also remove the page breaks by clicking the Remove Page Break option in Breaks drop down list. To return to Normal view after you finish working with the page breaks, click Normal in the Workbook Views group under the View tab.

Set Page Layout If you have a worksheet that contains a huge amount of data with many charts and you want a professional looking printout, what would you do? Spread sheet software provides various page layout options for organizing pages using the Page Layout option. In this exercise, you will learn how to set the page layout options in the spread sheet application. Open a new spread sheet. To set the page layout options, do the following: o Click on Page Layout option under Workbook Views group on View tab. The spreadsheet will be displayed as shown below. You can set the Orientation ? ? Page headers and footers ? Hide or display grid lines ? Size of the page ? Define the print area ? Specify the background o Click on Margins option under Page Setup group, a dropdown list appears as shown in figure.

Information Technology Level -2

Margins ?

47

You can either select anyone of the predefined margin option available or else you can o define your own margin settings by clicking Custom Margins.. option.

Information Technology Level -2

A dialog box appears.

You can set the margin values manually from the options available under the dialog o box. You can set the orientation of the page to either Portrait or Landscape by clicking the o Orientation option under Page Setup group in the Page Layout tab. You can set the size of the page by clicking the Size option under Page Setup group in o the Page Layout tab. You can specify the area to be printed by selecting the area and then clicking Print o Area option under Page Setup group in the Page Layout tab. A drop down list appears as shown below.

Click on Set Print Area to set the selected to get printed. You can also clear the print o area by clicking the Clear Print Area option. You can specify a background for your sheet using the Background option under o Page Setup in the Page Layout tab.

48

Manage Workbook Views Spread sheet offers the users with variable views for the purpose of viewing the outcome of the sheet while printing. There are five types of views available in the spreadsheet. o Normal o Page Layout o Page Break Preview o Custom Views o Full Screen You can select one of the above said views by clicking the appropriate option under Workbook Views in the View tab.

Page Layout: You can select the Page Layout view in order to quickly fine tune a worksheet that contains many charts or huge amounts of data and achieve professional looking results. Page Break Preview: This option is similar to the Page Layout option except you can set the area that is to be set as a page after inserting page break.

Information Technology Level -2

Normal View: The default view of the spreadsheet application is the Normal. It's acollection of cells arranged in the work area.

Custom Views: If you would like to view selected areas of a document, you can use the custom view option. For example, if you would like to point out certain row and column, you can add that to the Custom view. Full Screen: Selecting this option makes the workbook cover the entire screen. All tabs are hidden from view. To get back the tabs, click on File> Restore. Additionally, in spreadsheet, you can open multiple windows that display the current spreadsheet and then arrange those windows in a variety of ways. You can also open and

49

arrange multiple workbook windows. To open a second instance of a workbook in a separate window: o Click the New Window button on the View tab, in the Window group. To arrange multiple program windows: o Click Arrange All button in the Window group. An Arrange Windows dialog box appears. o Click either Tiled, Horizontal, Vertical, or Cascade options. o To include only windows displaying views of the current workbook, select the Windows of active workbook check box.

Information Technology Level -2

o Click OK.

50

Apply Cell and Range Names You can assign names to cells in a worksheet and use it for quickly locating specific cells by entering the names. This could be useful when working with large spread sheets. For example, if you have a lengthy list of groceries and prices, you can use names to quickly locate and find total pricing of fruits from the entire list. In this exercise, you will learn to work with cell and range names. Open a new spreadsheet and enter the following (figure below):

Now to apply range names, do the following: o Select the cost against the cells that have Apple, Banana, Cherry, Grape, Guava, Mango, Pineapple values (Keep the Ctrl key pressed and click on the cells - you will be able to select selective cells together!). Right click and select Name a Range…. Alternatively, you can select Define Name under Defines Names group in the Formulas tab. o A New Name dialog box appears prompting to enter a name. Enter Fruits in the Name field and click OK (figure below).

Information Technology Level -2

o Select the cost against the cells that have Cabbage, Cauliflower, Chilli, Cucumber, Ginger, Potato, Pumpkin, Spinach, Tomato values. Right click define the name Vegetables for this group.

If you would like to calculate the total cost of fruits from the list, o Select an empty cell o Type Total Cost of Fruits and in the adjacent cell, Type =SUM (Fruits) and press Enter. Notice the total cost of all items named as Fruits is displayed.

51

Create Modify and Format Charts A chart is a graphical representation of data, in which the data is represented by symbols, such as bars in a bar chart, lines in a line chart, or slices in a pie chart. A chart can represent tabular numeric data, functions or some kinds of qualitative structures. A Spread sheet enables you to create, modify and format charts based on the data given in the spread sheet. In this exercise you will learn how to create, modify and format chart using the spreadsheet.

Information Technology Level -2

Reopen the worksheet expenses_{your name}.

52

Now to create charts do the following. o Select all the expenses data. o Click on the chart type that you want from Charts group under the Insert tab. o After selecting the chart type the spread sheet will be displayed as shown below.

o You can modify the chart values by making necessary modifications in the data table.

Chart has many elements; however, only some of the elements are displayed by default. Following is an description of the elements used in the above chart: Chart Area of the Chart

2.

Plot Area of the Chart

3.

Data Points that are plotted in the chart

4.

Horizontal and Vertical Axis in the chart

5.

Legend of the chart

6.

Chart and Axis Title used in the chart

7.

Data Label for identifying details of data point in the chart

Note: Once you insert a chart in the spreadsheet three additional tabs are available on the Ribbon namely Design, Layout and Format. You can edit the chart, its design, layout and formatting options using the three tabs available. You can change the chart type, chart options etc. in the Design tab and can give the titles etc. in the Layout tab and set the borders, colors and size of the option under Format tab.

Information Technology Level -2

1.

53

Choosing the right type of chart is very important. Different charts display data in very different ways. Using the best chart type and format helps you to display data visually in the most meaningful way. Bar charts: A bar chart (horizontal bars) emphasizes the comparison between items at a fixed period of time. This chart type also includes cylinder, cone, and pyramid subtypes. Column charts: A column chart, unlike a bar chart to which it is often compared, emphasizes variation over a period of time. This chart type also includes cylinder, cone, and pyramid subtypes Line charts: A line chart shows the relationship of the changes in the data over a period of time. Pie charts: Pie charts contain just one chart data series. A pie chart shows the relationship of the parts to the whole.

Information Technology Level -2

Area charts: An area chart shows the relative importance of values over time.

54

XY (Scatter) charts: Scatter charts are useful for showing a correlation among the data points that may not be easy to see from data alone.

Sort and Filter Data Sort is a feature that helps you arrange the selected data either in an ascending or descending order. Filter is a feature used for extracting particular data using some conditions. Spread sheet offers both these features for sorting and filtering data in the spreadsheet. Open a new spreadsheet and enter the following data:

Now to sort or filter the data do the following: o Select the data to be sorted and then click on Sort option under Sort & Filter group in the Data tab. A dialog box appears as shown below.

o You need to specify on what basis you are going to sort the data in the Sort by field and select the order that is ascending and descending and then click OK.

To filter data, do the following: o Click the Filter option available under Sort & Filter group in the Data tab. Before applying a filter you have to select the data along with the header as shown below.

Information Technology Level -2

For example, if you wanted to sort the data in Sales 2008, you would select the relevant detail in the Sort by list and click OK. The spreadsheet would be displayed as shown below. You can notice that the data has been sorted as per the data in 2008 and also that values in the Sales 2008 field are arranged in ascending order that is from smallest to largest.

55

Once you click on filter, the headers will be displayed with a down arrow as shown o below.

If you want to filter data that is greater than 75 in the Sales 2009 do the following.

Information Technology Level -2

Click the down arrow available under Sales 2009 header, a dropdown list o appears as shown below.

56

You can specify the filter by selecting the available values in the list. o You can also sort the filtered data by selecting Sort Smallest to Largest or Sort Largest o to Smallest option available in the dropdown list. Click on Number Filters option under the dropdown list, once you click the o following submenu appears.

o Here you can select the condition that you want to specify for the data in the list, If you select Greater Than.. option the following dialog box appears.

The spreadsheet will be displayed as shown below. Notice that only data greater than 75 is displayed under the Sales 2009.

Calculate Data Across Worksheets Suppose you were working at the head office maintaining had data for six regions, and you use exactly the same worksheet layout and labels to track the average sales of each region over the previous quarter. Each sheet contains headings by region (such as Region01, Region02 ….. Region06), and in cell H15 on each sheet, the calculated totalsales for the quarter appear. If you want to obtain the average sales over the quarter, what would you do?

Information Technology Level -2

Specify the value that you want in the value box, (here it is 75) and click OK. o

In this exercise you will learn how to perform calculations on data across different worksheets. Open a new spreadsheet. Name sheet 1 as year1 and type the following data.

57

Now to calculate the data across worksheets do the following. o Go to sheet 2, name it year2 sheet, and insert the same data in the Sheet2 for the next year.

Information Technology Level -2

o Go to sheet 2, name it Totals, and insert the same labels. o Type the sum formula in cell B2, =sum( , while the parenthesis is opened go to year1 sheet and go to year2 sheet and press Enter. Repeat the same step to calculate sum for other expenses. Note the way the range is specified (sheetname! cellnumber).

To answer the question raised earlier, you could create a new sheet, called Quarter Summary. To find the average, enter the following formula in one of the cells in the Summary sheet: =AVERAGE(Region01: Region06!H15) Spreadsheet calculates the average for all values stored in H15 on all sheets in the range Region01: Region06. If you move the Region06 sheet between Region04 and Region05, the software will adjust the calculation to include the sheets for Regions01, 02, 03, 04, and 06; Region05 will be omitted. Similarly, if you delete or add a sheet anywhere between Region01 and Region06, the software will include all the sheets located within the range in its calculation.

58

Using Multiple Workbooks and Linking Cells Spreadsheet also allows you to link the cells from various worksheets and from various spread sheets to summarize data from several sources. In this manner, you can create formulas that span different sources and make calculations using a combination of local and linked information. You can link data from other spreadsheets and keep the information up to date without editing multiple locations every time the data changes. For example, you can display data from multiple departments for an overview of details without sharing information between sources. In this exercise you will learn how to link cells from different spreadsheet applications. Open a new spread sheet and enter the following data:

o Open a new spreadsheet workbook. o Type some formula, for example sum formula in any cell =sum(, while the parenthesis is opened, click on Switch Windows option under Window group in the View tab. A dropdown list appears with the active workbook names.

o Click on Book1 to select the earlier spreadsheet you had created and select the cells A2:D2.

Information Technology Level -2

To link cells from different worksheet do the following:

59

o Press Enter. You are back on the second spreadsheet. The cell where you were entering the formula has the total of the values in the first spreadsheet!. Note the way the software gives the cell reference. If you update any values in the first spreadsheet, automatically the sum value in the second spreadsheet is updated! Try this out.

Information Technology Level -2

Sharing Worksheet Data

60

In most office settings, there is a shared drive where teams can store common files for everyone to use. This usually leads to sighting of the message: "The document [filename] is locked for editing by another user. To open a read-only copy of this document, click"!! This message appears because someone else already has the file open. Sometimes however, it is necessary to have multiple people working on a file at the same time. This can be to either speed up data entry or simply make things easier for collaboration purposes. Spreadsheet software allows the user to share the workbook and place it in the network location where several users can access it simultaneously. In this exercise, you will learn how to share a worksheet. Open a new spreadsheet and type the following.

Now to share the spreadsheet do the following. o Click on Share workbook option under Changes group in the Review tab. o A dialog box appears as shown below.

o Click OK. Note: Most spreadsheet software automatically turn off some features in shared workbooks. This is to simplify the workbook since multiple people can be working on the file at the same time. For example, shared workbooks don't allow merging cells, conditional formatting, or inserting pictures/graphs/etc.

Information Technology Level -2

o Check the option Allow changes by more than one user at the same time. This also allows workbook merging.

61

Unit -

4

Advanced Digital Presentation Inserting a Movie Clip Presentation allows the user to add movie clips to the presentation in order to make the presentation colourful and meaningful. You can insert movies or YouTube videos downloaded from the Internet. In this exercise you will learn how to insert a movie clip in slides. Open a new file using presentation software. You can insert a movie in two ways:

Information Technology Level -2

o Using Insert tab

62

o Using Title and Content Layout Option Click on Movie option under Media clips group in the Insert tab, a drop down appears as shown below.

You can select the Movie from File… option to insert the movie clip that you have already downloaded from the Internet. A dialog box appears as shown below:

You can locate the movie clip and click OK to insert the same in the slide. The presentation will be displayed as shown below. You can set one of the two options available for playing the media clip, i.e Automatically or When Clicked. Alternatively, you can select Movie from Clip Organizer… option to insert the movie clips that are available under Clip Organizer. Doing so displays the clip art task pane as shown below:

Using Layout Option Open a new file using presentation software and change the layout of the slide. Click on Layout option available under Slides group in the Home tab, a dropdown list appears as shown below.

Information Technology Level -2

You can select any of the movies available and insert it in the slide. Once you have inserted the movie clip in the slide, the presentation will be displayed as shown below.

63

Click on Title and Content option and a slide will be displayed with the layout as shown below.

Information Technology Level -2

You can insert a movie in the slide by clicking the icon in the Layout option. Once you click the icon, a dialog appears as shown below.

64

When you play the slideshow, the movie clip will be played automatically.

Inserting an Audio Clip You can include audio clips to a presentation similar to that of videos. For example, you can play mild background music while making your presentation. In this exercise you will learn how to insert an audio clip in slides. Open a new file using presentation software. Click on Sound option under Media clips group in the Insert tab, a drop down appears as shown in figure 9.

You can select the Sound from File… option to insert the sound clip. A dialog box appears as shown below.

Working with Tables Presentation software enables the user to add tables in the slides in order to represent the statistical data meaningfully.

Information Technology Level -2

You can locate the audio clip and click OK to insert the same in the slide. You may follow the same steps as you learnt while inserting a Movie Clip. There is an inbuilt clip organizer for a list of sounds. You can access them via the Sound from Clip Organizer… option. Go ahead and insert an audio clip using this option.When you have completed inserting the sound clip, and you play the slideshow, the audio clip will be played automatically.

In this exercise you will learn to work with tables. Open a new file using presentation software. You can insert a table in two ways: o Using Insert tab o Using Title and Content Option Click on Table option under Tables group in the Insert tab, a drop down appears as shown below.

65

Information Technology Level -2

You can have learnt to create tables in a word processor by dragging the mouse over requisite number of boxes. Follow the same method here and create the table shown below. Now go ahead and try the Insert Table… and Draw Table options to create the table.

Using Title and Content Option Open a new file using presentation software and change the layout of the slide. To change the layout of a slide do the following: Click on Layout option available under Slides group in the Home tab, as you did while selecting a movie clip. Click on Title and Content option from the dropdown list. You can insert the table in the slide by clicking the icon available within the layout.

66

Once you click the icon, a dialog appears as shown below.

Once you have inserted the table into the slide, additional tabs - Design and Layout -are made available. You can use them for editing and formatting the table further.

You can change the design of the table by changing background, borders or effects by using Table Styles group in the Design tab. To use a particular design, Select a design under Table Styles group and double-click on it. If you would like to change a design, choose a different design under Table Styles group and double-click on the new design.

Information Technology Level -2

Now enter the values for the number of columns and rows that you would like to have in the table. For example, if you need a table with 3 columns and 3 rows, type 3 in both Number of columns and Number of rows fields.

You have learnt to create a table in a presentation, but if the table already exists in a word processor document or a spreadsheet, you can directly import it from there. To do so: With a slide in edit mode, choose Object from the Insert menu. o In the Insert Object dialog box, click the Create From File option and click Browse to locate and choose the document or spreadsheet that contains the table. By default, the presentation software will insert the table.

67

o When you click OK, the entire document or spreadsheet is imported to your slide. Double-click the inserted text to remove extra text if the document contains more than the table. If you check the Link checkbox while inserting. On doing so, after you update the table o in the document or spreadsheet, then right click on the imported table in the presentation software, and select the option Update Link , the embedded table gets updated automatically. Drag and drop the table on the slide to position it. o

Working with Charts

Information Technology Level -2

Presentation software enables the user to insert charts in slides to present statistical table data in a pictorial representation. This ensures that the audience can grasp complex data at a glance. In this exercise you will learn to work with charts. Open a new file using presentation software. To insert a chart in the slide, click on Chart option under Illustrations group in the Insert tab. A dialog box appears as shown below.

You will notice different type of the charts that can be used in the presentation. Select a chart type and click OK. A default chart will be inserted on the slide. The default data table for that chart will be opened in a spreadsheet application separately as shown below.

68

You can edit the values in the spreadsheet and the presentation software will automatically update the chart. Now enter the following in the spreadsheet window: Day 2 Savings

Day 3 Savings

Arun

300

250

500

John

200

300

300

Jacob

150

500

600

Salim

500

750

150

Once you have modified the data table in the spreadsheet the chart in the slide gets modified automatically and the chart will displayed similar to the one below.

Information Technology Level -2

Day 1 Savings

69

Now change the values in the spreadsheet and observe the changes in the chart. You can change the colors and effects of the chart by using Chart Styles available under Design tab. To change to a different style, select a style from Chart Styles and double-click on it. Some basic guidelines are as follows: o Convey one message per chart. Make the message the heading. o Make the chart easy to read. Label the X and Y axis and label the lines, bars, or pie wedges. Make the most important text largest, the most important data lines or sections darkest. o Make bars and columns wider than the spaces between them. o Be accurate. Always start a numerical axis at zero. Compare only like variables.

Information Technology Level -2

o Eliminate all unnecessary details. Avoid grid lines, data points, boxes, etc. unless they relate to the message. o Use a few (maximum four) colors per visual. Importing a chart You can also import a chart from a spreadsheet. The method is the same as importing a table into presentation software. Since the entire sheet is imported, you may need to maneuver around and display the chart in the embedded object. To increase / decrease the size of the object, you can double click on it and resize it.

Inserting Transitions Transition effects can help in increasing audience's interest during a presentation. A slide transition is the visual motion when one slide changes to the next during a presentation. By default, one slide simply replaces the previous one on screen, just like a slide show of photographs would change from one to the next. Most presentation software provides many different transition effects that you can use to liven up your slide show. In this exercise you will learn to add transitions in the presentation. Open a new file using presentation software and add contents to the presentation based on the guidelines provided earlier. To work with transition effects, click the Animations tab. You will be displayed with list of transition effects similar to the one below.

70

To apply, select an effect from Transitions to this slide group and double-click on it. You can also increase or decrease the duration of the transition effect by setting up the time interval (in seconds) in duration option under Timing group. Try setting the duration as 1 minute and observe the effect by performing the slide show. You can set sound effects during transitions by selecting a sound scheme available in Sound option under Timing group. Try using different sound schemes and observe the sound effect by performing the slide show.

Note: A common mistake made is using too many transitions, or using one that doesn't fit well with the subject matter. Try to find one transition that doesn't detract from the presentation and use it throughout the show. Using too many makes your presentation looks amateurish. A transition is the final effect to be given to your presentation so edit and arrange all slides in the preferred order before setting them.

Inserting Animations While transition occurs between each slide, animation allows you to put slide elements, such as text and graphics, in motion within a slide! Animations are helpful way to make your slides look more dynamic. Besides adding action, they help steer audience focus and emphasize important points. They are also a great way to reveal text or object on a slide one step at a time. For example, you could have five bullet points of text, and reveal them one-by-one on the slide with each click.

Information Technology Level -2

If you would like to keep the same transition and sound effect across the entire presentation, click Apply to all under the Timing group. Selecting this option will apply all the selected effects across all slides.

In this exercise you will learn to add animations in a presentation. Open a new file using presentation software and add contents to the presentation based on the guidelines provided earlier. To work with animations, Click Animations tab. You will see Animation options similar to the one below.

71

Information Technology Level -2

To apply, select the graphical object and click Animate under Animations group. Select the animation effect under the Animate dropdown list. You can apply an animation effect by selecting different animation scheme from the dropdown menu.

Once you have selected an animation scheme, play the slideshow to preview the effect. Surveys show that animation effects are one of the most annoying elements in presentations. However, when used effectively, these effects can insert a dramatic moment to a particular message and add spice to a dull presentation. To summarize the effective uses of animation effects: o Helps focus audience attention on information. o Controls the flow of information especially while explaining a diagram. o Reveal concepts one by one.

Grouping Objects Grouping can help when you want to move, rotate or resize multiple objects in a presentation. You can group objects such as pictures, clip art, shapes and text box; once grouped they appear as a single object.

72

In this exercise you will learn to work with grouping and ungrouping of objects. Open a new file using presentation software and add graphical objects to the presentation based on the guidelines provided earlier. To group the graphical objects, select all the objects that you want to group in the slide. To select more than one objects in the slide hold down the ctrl key and select the object in the slide. To group the objects, click Format tab.

You can select the Group option available under Arrange group in the Format tab. Once you select the option, you should see a dropdown similar to one displayed below.

Similarly you can ungroup the grouped objects by selecting the ungroup option available under Group dropdown menu.

Inserting Speaker Notes Good presenters always rehearse their presentations well but there's often one more thing that helps them deliver flawless presentation - speaker notes. Speaker notes are guided text used by the presenter during a presentation. Speaker notes can be short or long texts that can be used as a reference by the presenter while making a presentation. An area of a PowerPoint or OpenOffice Impress slide that is hidden during the presentation is reserved for notes for the speaker. Here you as the presenter can note important key points that you wish to cover during the presentation.

Information Technology Level -2

Click on Group, to group all the selected graphical objects in the slide.

You can print these notes out, accompanied by a thumbnail version of the appropriate slide, to keep as a handy reference to use when you are making your oral presentation.

73

This can help you to communicate specific points related to each slide and make the presentation effective for the audience.

Information Technology Level -2

In this exercise you will learn to add speaker notes. Open a new file using presentation software. To add notes to a particular slide, select the slide and type the notes in the Click to add notes area located at the bottom of the presentation software (Figure below).

Alternatively, you can select View tab and click Notes page under Presentation Views Group. Key things to remember about speaker notes: 1.

They should not restate the contents of the slide.

2.

Speaker notes should support the content of the slide with in-depth information. While the regular presentation slides are shown on the main screen for the audience, the view on your computer screen is slightly different - you can not only see the current slide but also the text notes and other key points that should be discussed with that slide. To do so, open the presentation file using your presentation software, go to the Slide Show tab and check the option Use Presenter View.

Reviewing Content You should always review the presentation and make changes if required before you present it to the audience. Presentation software includes options such as spell checks for correcting errors in a presentation. However, it is the presenters' responsibility to check each and every point manually on each slide before attempting to make a presentation.

74

In this exercise you will learn to make an effective presentation. Making effective presentations takes practice, but with a few tips up your sleeve, you are ready to take on the challenge. 1.

Know your topic. You may want to charge right in and start using the presentation software. However, do the research first and know your material, think through what and how you will present get comfortable with the matter before beginning the project on the computer. Creating the presentation is the easy part. The best classroom presentations are created by people who are comfortable with what they are going to talk about.

2.

Use key phrases about your topic. Good presenters use key phrases and include only the most important information. Choose only the top three or four points and make them several times throughout the presentation. Highlight key points that are necessary for the audience to remember. Keep the points as short as possible, use 5-6 words to describe the point. Avoid too much text on each slide. Do not write your whole speech on the slides. The slide show is meant to accompany your oral presentation. Summarize the content as bullet points. Use simple language and limit the number of bullets to three or four per slide.

4.

Limit the number of slides. Too many slides in a presentation may cause you to rush to get through them and your audience might end up paying more attention to the changing slide than to what you are saying. On average, one slide per minute is about right in a classroom presentation.

5.

Plan the layout of your slide. Make your slides easy to follow. Put the title at the top. Phrases should read left to right and top to bottom. Keep important information near the top of the slide.

6.

Information Technology Level -2

3.

Avoid fancy fonts. Make sure the fonts, design and colors are consistent throughout the presentation; don't use different styles for each slide. Use fonts that are readable; recommended fonts are Arial, Tahoma, Verdana. Use standard font size that is readable even from the last row if presented in a large hall or to a large audience. Use combination of capital and small letters; Do NOT use all capital letters as it may be difficult to read. Use bold, italics or underline only if required or to highlight key points.

75

7.

Use contrasting colors for text and background. Use reasonable mix of text color and background; preview to check if it is readable without any difficulty. Dark text on a light background is usually the best as this combination offers the maximum visibility. Keep your slide color scheme consistent throughout your presentation.

8.

Use a slide design template to keep your presentation look consistent. Use a single background on all slides; do NOT use multiple backgrounds. Use a pleasant template or style set; do NOT use different style sets for different slides as it will distract the audience and they might lose the focus.

9.

Use animations and transitions sparingly.

Information Technology Level -2

You may enjoy applying animations and transitions in every place that you can. This will certainly be entertaining, but at the same time very distracting. So use this feature with prudence. 10. Also, always review the presentation 2-3 times before making a presentation; this can help in reducing or eliminating any errors in it. Remove irrelevant points during the review, add or remove images during review. Try presenting to a smaller audience, make necessary corrections before presenting it to a larger audience Note: Most presentation software includes many features; do NOT try to overuse them!!! Once you have created the presentation of your choice using the guidelines, you may now proceed to reviewing the presentation. Use the additional guidelines below: o Do a thorough spell check across all slides o Perform a manual spell check for terms that is not included during the standard spell check in the presentation software; NOT all terms (particularly technical terms such as biological names, etc.) will be checked o Remove irrelevant content such as images or clip arts, terms, etc. if they are not required.

Preparing to deliver a Presentation Now that you have a presentation ready, you can customize the delivery of the presentation. For example, you can customize to display selected slides to be displayed to the audience or configure for multiple monitors, etc. In this exercise, you will learn to deliver a presentation.

76

To work with Slide Show, open an existing presentation in the presentation software. Click on Set Up SlideShow option under Set Up group in the Slide Show tab. Once you click Set Up SlideShow, a dialog box appears as shown below.

If the presentation is to be made to an individual, use Browsed by an individual (window) option. If the presentation is to be made at Kiosks, use the Browser at a Kiosk (full screen) option. Note: A kiosk is a computer terminal featuring specialized hardware and software designed within a public exhibit that provides access to information and applications for communication, commerce, entertainment, and education. In addition, you can configure the presentation to be automated (run continuously), with or without animation by using the options under Show Options group.

Information Technology Level -2

If the presentation is to be made to an audience, use the Presented by a speaker (full screen) option.

You can display selective slides from a presentation using the Show slides option.

Print a Presentation Sometimes you may need to provide print outs of the presentation to the audience as a reference material. You can print notes, handouts or outline of the presentation using the presentation software. In this exercise, you will learn to print notes, handouts and outline.

77

To print, open an existing presentation and select the Print option.

Information Technology Level -2

Select the Notes Page option under Print what: dropdown list (figure 24.

Click OK once you are ready to print the notes. You can print handouts for audience reference by selecting the Handouts option under Print what: dropdown list. To save paper, you can print multiple slides on a single sheet. To print multiple slides, select the number of slides that you would like to print by choosing the number displayed under Slides per page dropdown under Handouts Group (figure 25).

If you would to print only the text part of the presentation, you can use the Outline option in the presentation software. To print the outline, select the Outline View option under Print what: dropdown list.

78

Unit -

5

Digital Content Creation Web Designing Fundamentals Introduction to Web Design & HTML

Following topics are covered in this module: o HTML & CSS o Web Authoring Tools, Microsoft Expression Web o Overview of Client-side & Server-side scripting, JavaScript & VBScript Web Publishing A number of markup languages such as HTML, DHTML, XML are used to create webbased content. Apart from these, software products such as FrontPage, Dream Weaveretc are also used to develop web based content. Web based applications are built using technologies such as ASP (Active Server Pages), JSP (Java Server Pages), PHP (Hypertext Preprocessor), ASP.net etc.

Information Technology Level -2

You have surfed several websites, exchanged emails, performed online transactions,etc. in the previous sessions. If you want to create websites like the ones you haveseen, you need to learn a variety of technologies, tools and techniques.Web designing refers to the skills that are required to create and manage websites.Web design as a whole refers to designing a user interface, authoring (programming)or a combination of both. Designing a website requires multiple skills. However, it isrecommended to master and become skilled in one particular technology once you geta taste of various technologies involved.

Understanding HTML HTML or Hypertext Markup Language is a language used for created web pages that can be viewed in a web browser. o Hyper - means active and all over the place! When you use a Web browser, youcan move all over the place, without a specified order as to how to access pages/sites. o Text - You will be working with text files only.

79

o Markup - To create a Web page, you will type in the text and then ?Mark up? the text. o Language - This is a method of creating something or communicating and in this case, you are creating Web pages using a particular syntax. HTML elements are the building blocks of a website. Web browsers interpret the tagswritten in HTML and display a web page. Hypertext refers to the text that can be linked to another text or page which a usercan access. Hypertext is the underlying concept behind the World Wide Web. HTML is developed and maintained by World Wide Web Consortium abbreviated asW3C. When HTML was first released, there were a handful of tags available and usedfor basic web page structures. As time evolved, several new tags and attributes wereintroduced. Popular HTML versions include HTML 4.01 and HTML 5.0.

Information Technology Level -2

Designing Web pages using HTML All you need is a text editor such as notepad to create a web page using HTML. HTML files have the extension .htm or .html. You can open the web pages using web browsers such as Mozilla Firefox, Internet Explorer, Google Chrome, etc. Viewing Source Code Web browsers have the ability to display the source code used for a web page. You can use this to enhance your knowledge To view the code, do the following: 1.

Open the Web Browser and right-click anywhere in the web page and select View Page Source from the context menu similar to the one below:

2.

Notice, the source code of the web page is visible with different color codes. The colors have no meaning in terms of function and are only used to differentiate different sets of code.

Saving a web page You can save web pages for future reference using the following procedure: 1.

Select File > Save Page As…

2.

Type a file name and click Save.

HTML Elements & Attributes - The Basics When you work with a document, you create headings, sub-headings, tables, etc. to give the document a structure. Similarly in HTML, tags or elements are used to create a web pages' structure.

80

Look at an example of an online magazine. Online magazines have articles with text content, images, videos, links or continuation to related articles, advertisements, etc. They appear as a single web page to visitors. Have you noticed that the headings are of varying sizes to indicating topics and sub-topics and different from the content? All this formatting is possible using combinations of several HTML elements. Elements & Attributes Elements have content placed between a start tag and an end tag. Tags act as containers for text, images and other types of content. Tags start an opening tag and end with a closing tab, using angle brackets (<>) to define the structure.

Writing your First HTML Code HTML uses tags enclosed in angle brackets; most tags are used in pairs such as , etc. Following is a simple example of HTML code:

Information Technology Level -2

Note: To learn to use the tags, throughout this document, you will find examples of code displayed within dotted boxes. Copy it in a text editor, save it in your local computer and view using web browsers.

Learn HTML

Hello World!



81

In the above mentioned code, there are a few HTML tags used. All HTML documents start with and end with . The rest of the document contains other elements and web page content placed using elements. o Document type or DOCTYPE is an element used for indicating the version of HTML used in a web page. This is used by the web browser to apply a set of rules for understanding the document structure. o HTML element indicates the start and end of an HTML document. indicates the beginning of this HTML document and indicates the end. HTML is also the root of an HTML document and has two parts, Head and Body elements.

Information Technology Level -2

? Head element represents the header section of a document and contains information about a web page. Head elements start with and end with . This element includes all other elements that need to be executed or understood before the content (included in the body element) is displayed to the user.

82

o Content placed within the and element is displayed as the title of a web page and used by search engines to create indexes of content. ? Body element represents the section that contains body content and is displayed in the web browser. Most HTML elements are used within the body element between and tags. o If you want to place hidden text in a web page, you can use the comment element ( and <--> tags). Text placed using comment element will not be displayed in a web browser but can seen when viewing the source code. This is useful to developers or users who would like to share their experience in writing HTML code but hide the text from general visitors. HTML Attributes Attribute are used to provide additional information about an element. Attribute contains values and some elements use multiple attributes.

Nesting You can nest other elements within elements. Elements nested within another element are referred to as a child elements and the nesting element is referred to as a parent element.

When you nest elements, you need to ensure the elements are used in proper order. Observe the correct way of using opening and closing tags illustrated in the figure below:

Text formatting You can format the text content of a web page to make it attractive by using other HTML elements such as Headings, Bold, Italics, etc. Element

Description

Heading

There are six levels of heading elements from H1 to H6. H1 has the largest text size and H6 has the smallest heading text size.

Emphasize

To emphasize a particular text in a sentence (for example a text that should be pronounced different), use this element. Text enclosed within and are displayed in italics.

Italics

If you want the text to be displayed in alternate voice such as a text translated from a foreign language, technical words or present text in typographic italics, enclose the text within and elements.

Information Technology Level -2

Html Elements & Attributes - Text Formatting

83

Information Technology Level -2

Strong

If you want to emphasize a text with stronger importance in a sentence, use the strong element. Text enclosed within and are displayed in bold.

Bold

To make the text such as keywords visually bold, enclose the text within and , the bold element.

Underline

To underline the text, enclose the text within and , the underline element.

Mark

To highlight the text in a sentence, enclose the text within mark element: and

Big

If you want to display a particular text in a sentence bigger than rest of the text in a sentence, enclose the text within the big element : and .

Small

To display a particular text in a sentence as smaller than the rest of the text in a sentence, enclose the text within the small element: and .

Subscript & Text enclosed within and are displayed as subscripts superscripts and Text enclosed within and are displayed as superscripts. Pre

Text enclosed using
 and 
tags are displayed as it is (in the example below - using a mono-space font such as Courier)

INS & DEL

Text enclosed within and are displayed as struck out while text enclosed within and is underlined.

Break

To separate single lines or use multiple line spacing, use the break element. Breaks between lines are represented through use of
. No closing tag is needed.

HR

To separate sections, use a horizontal line to indicate distinctiveness. Horizontal line is indicated through use of
element and requires no closing tag.

Sample Code - Text Elements

84

Learn HTML

HTML supports six levels of headings, H1 to H6 with H1 being the largest.

Main Heading

Sub heading, Level 1

Sub heading, Level 2

Sub heading, Level 3

Sub heading, Level 5
Sub heading, Level 6

You are required to agree with our terms and conditions.

HTML is simple to learn.

It is important to know the common HTML Elements and attributes.

This an example of text displayed underlined.

This is an example of highlighted text.

Sun is the largest of all planets with 696,000 KM as it’s radius.

Mercury is the smallest planet in the Solar System ever since Pluto lost its status and was reclassified as a dwarf planet.

this is an example of subscript for a formula, H2O

this is an example of superscript for a formula, (A+B)2

 /* Hello World program */ #include main() {

Information Technology Level -2

This an example of text displayed in bold.



printf("Hello World"); }

this is the correct spelling of entreprenaur entrepreneur



85

Referencing Elements Element

Description

Quote

To include short text such as name of an author, publisher, etc. in quotes, use the quote element. You can also use the cite attribute to indicate the source. Text included within and is displayed within quotations.

Blockquote

To include lengthy quotes, include text within
and
elements.

Cite

To specify a tile of a work such as title of a book, movie, painting, etc. include text within and elements.

Information Technology Level -2

Abbreviation To include abbreviations of acronyms, include the abbreviation between and elements. Text included within this element will be displayed when the cursor is moved over the text. Sample Code - Referencing Elements Learn HTML

HTML Tutorial Created by Author Name

Google Analytics (GA) is a service offered by Google that generates detailed statistics about a website's traffic and traffic sources and measures conversions and sales.

You can learn more about web design at http://en.wikipedia.org/wiki/Web_design

HTML has several elements and attributes.



86

Tables You can create a table using the Table Element. Tables are made of rows and columnssimilar to that of a spreadsheet. Rows are contained within table row element and data is stored within row element . Learn HTML

Images You can include images in your web page by using the image element. Use the SRC attribute to specify the location of the image and width and height attributes to specify the dimensions of the image. Also it is a recommended practice to use the ALT attribute for displaying text if the image is not downloaded.

Information Technology Level -2

NameAgeCity
Anand17Delhi
Rohit23Bangalore


Learn HTML HTML 5 Logo, is not displayed due to an error. Please reload this page or contact the website administrator

87

Working with Audio, Video & Flash Element

Description

Audio

To include an audio clip, enclose the audio within the elements and point to the clip using SRC attribute. To automatically play the audio, use the autoplay attribute. To display controls, use the controls attribute.

Video

To include a video clip, enclose the audio within the elements and point to the clip using SRC attribute. Also use width and height attributes to specify the dimenstions of a video clip.

Flash

To embed a flash animation, use the and elements and point to the animation using SRC attribute.



Information Technology Level -2

Learn HTML Learn HTML

88

Learn HTML

You can also include videos from other sources such as youtube.com, etc. To include a video from youtube.com, do the following: Go to Youtube.com

2.

Select a video clip

3.

Right-click on the video and select Copy embed html

Write the code within and section (sample below). . Learn HTML

Now save and open this web page using a web browser. Note: Refer to Youtube.com FAQ' for detailed instructions.

89

Html Elements & Attributes - Forms & Frames Forms Forms contain input elements such as text boxes, dropdown menus, check boxes, radio buttons, etc. to collect information from visitors and sent to a web server for further processing such as displaying search results or send to a database for storage. Forms are created using
element along with action and method attributes. Action attribute is used for specifying the URL to where the data needs to be submitted. Method attribute is used for specifying the HTTP method, get or post. POST attribute is used for storing or updating a database or for sending emails and GET attribute is used for retrieving data. Form element uses text boxes to collect text information and radio buttons, check boxes and dropdown menus for collecting information through pre-defined options.

Information Technology Level -2

Control Textbox

Description Single-line text input box is typically used for collecting shorter text such as usernames or passwords. Multiple-line text input boxes are used for collecting lengtheir text such as narrative feedback, etc.

Radio Buttons Used for collecting single value from multiple values. You should use type=radio attribute for using radio buttons in a web page. Checkbox

Used for collecting multiple values. You should use type=checkbox attribute for using checkboxes in a web page.

Dropdown

Used for collecting single or multiple values from a dropdown menu. You should use the option attribute along with values to present multiple options.

Submit

Submit button allows visitors to submit the value.

Reset

Reset button clears all the selections made.

Sample Code - Forms Learn HTML

90

Subscribe to your weekly Newsletter

Name Password

I agree to the Terms and Conditions. Yes No

10th 12th Bachelors Degree Masters Degree

This is an example of Dropdown Menu (Single Selection)

School Education Board



Information Technology Level -2





Frames Frames are used to display one or more pages within a single web page; collections of different frames are referred to as a frameset. Frames are used when you want to display different pages as a single page in a web browser.

91

Text to be displayed in browsers that do not support frames

Information Technology Level -2

iframe iframe or inline frames is an element used for embedding another document or an URL with a web page. Learn HTML

You can use iframe to include a web page.


You can use iframe to view another website live.


You can restrict scrolling in iframe.



92

Creating Websites and Webpages in a Website Creating a Website You can create websites with your own design. When you work with web pages, images, style sheets, etc., you need to store all the related files in a single location (folder). This helps you to: o Stay organized o Upload the entire content to the remote server when you want to publish the website. Note: You will learn about templates later in this module. To create a new website, do the following: 1.

Select Site > New Site…

2.

A window appears similar to the one below:

You can create a website with a single page by selecting One Page Site.

b.

You can create a website from scratch by selecting Empty Site.

c.

If you already have a website created using HTML or any other software, you can continue to work with the website using MEW once it is imported. To import an existing website, use the Import Site Wizard.

Information Technology Level -2

3.

a.

Select Empty Site and enter a name for the website, for example: MyFirstWebsite. Click OK.

93

Information Technology Level -2

4.

A website is created and you will notice a window similar to the one below:

5.

Now you can create web pages for this website. Navigate to the location (example:

6.

My Documents) where you stored the website. Notice the folder icon.

Content such as images, flash animations, web pages & style sheets, etc. will be automatically stored in this folder. Create a Web page Once the website is created, you need to create web pages. To create a webpage, do the following: 1.

94

Select File > New > Page…. A window appears similar to the one below:

You can use MEW to create web pages using HTML or ASP code, Style Sheets (CSS), etc. Select HTML from the list and Click OK. Notice that a new page is created (figure below).

3.

Notice the file name Untitled_1.html. Being the first page of the website, this page is may be your homepage. Use a standard naming convention such as default.htm, index.htm or home.htm and save this page. To save this page, select File > Save.

4.

Type the file name as default and select Save. You need not specify .htm or .html extension as it is automatically added to the web page.

Handling File Extensions HTML Editors such as MEW automatically append the required file extension, .html by default. You can configure the HTML editor to add the extension .htm by the following procedure: 1.

Select Tools > Page Editor Options…. The Page Editor Options dialog box appears (figure below).

Information Technology Level -2

2.

95

Information Technology Level -2 96

2.

Select the Authoring Tab (figure below).

3.

Notice the default document type selected as HTML under Default Document: dropdown menu and file extension selected as .html in Default HTML File Extension: option.

You can change the settings, and, it is recommended to change Document Type Declaration to HTML 5. You can configure expression web to use external programs such as notepad to open specific file types such as a style sheet. By default, style sheets open in expression web. To modify, do the following: 1.

Select Tools > Application Options…. The Application Options dialog box appears (figure below).

2.

Select the Configure Editors Tab (figure below).

3.

Notice the file extensions (left pane) and application that will handle the extension (right pane) displayed.

Note: Do NOT change any settings here for now. Working with a Web page The biggest advantage of HTML editors such as MEW is that the code is written for you by the software. 1.

Type the following in the body area (figure below): a.

My Homepage

b.

This is a website created using a HTML Editor.

When you create content, MEW automatically intends them as paragraphs. You may notice the paragraph element indicated (see figure above) as "p" with a box above around the content. When you use carriage return (Enter key), MEW inserts another paragraph similar to that of the word processing software.

Now select the text "My Homepage" and do the following: a.

Select the Style dropdown located in the toolbar (figure below)

b.

Select Heading 1

from the list.

3.

Now select the text "This is a website created using a HTML Editor." Select Heading 3

from the style dropdown list.

4.

Once complete, select View (Menu) > Page > Code (or select Code located above the status bar). You will see a screen similar to the one below:

Information Technology Level -2

2.

97

Information Technology Level -2

5.

Notice the text is enclosed using heading (h1 and h3) elements. Now save this page (CTRL+S).

Since the editor writes the code for you; you can stay focused on creating the content rather than focusing on the code! If you have noticed, there are pre-built standard HTML elements that you can use in a webpage by just selecting the element from the style dropdown menu Now to switch back to design view, select View > Page > Design. The three views available in MEW are: 1.

Design View: This is the default view and displays only the content.

2.

Code View: This is used either when you want to view the source code written by the HTML editor or, when you want to insert elements or code that is not available within the HTML editor.

3.

Split View: This is used when you want to use both the Design and Code View side-byside.

Using Multiple Web Browsers If you want to test your web page, it is a recommended practice to test using multiple web browsers. However you may need to set up the browser list. To specify multiple browsers, do the following: 1.

98

Select File > Preview in Browser > Edit Browser List…. The Edit Browser List dialog box appears.

You may notice that some web browsers are added to the list by default. If you want add a web browser (for testing), select Add…, and specify the path of the executable file of the web browser (for example: C:\Program Files\Google\Chrome\ Application\chrome.exe).

3.

You can also use set the screen resolution here. This could be useful when you want to test your pages for viewing on Smartphones or tablets that use different screen resolutions.

Web Page Layout - Blogs A blog is a discussion style site used by non-technical (and technical users) users for creating personal web pages. Blogs are similar to an online personal diary and simple to use.

Information Technology Level -2

2.

You can use a blog to convey messages about events, announcements, news, reviews, etc. Blogs are usually managed using a web browser and this requires active internet connection. You can also use offline blog software to create content first and later publish the content when an active internet connection is available. There are hundreds of websites that offer blog service for free. Some of the popular blogs include: o www.WordPress.com

99

www.blogger.com o www.blog.com o www.weebly.com o www.blogsome.com o Creating a Blog Account In this session, you will learn how to create a blog account in WordPress. WordPress is free web service that you can use to create a beautiful website or blog. WordPress has support for "themes" for customizing the design of a blog. Themes can make the blog or the webpage look attractive. Before you start using a blog, a blog account is required. To create one, you need a web o browser and an internet connection.

Information Technology Level -2

Open the Web Browser. o On the address bar type https://signup.WordPress.com/signup/.You should now get o to a page with the fields Blog address, Username, Password, Email Address and Language. Blog Address: You must provide a unique address to your WordPress Blog. This is o the address which others will use to view your blog. Username: You should choose a username for managing this blog. o Password: Securing your WordPress blog account with a strong password is o important. A combination of uppercase and lowercase letters with some digits along with symbols would be a strong enough password. You need to enter the password twice. Email Address: You must provide your Email Address here. An activation link o will be send to you from WordPress after you click "Create Blog". Language: You can choose your own language for blogging from the list given. o Click Create Blog. o On doing so, you will be sent an email for activating your blog account. Open your email and click on the activation link. Once you click Activate Blog, you will be redirected to your WordPress Blog Account and you should see a web page similar to the one displayed below.

100

Now the blog is ready for use. You will be presented with the address of your blog as displayed in the web page above; you can either double click on the link or type the address manually in the web browser. Either action takes you to the homepage of your blog.

o To create a post, click New Post. A Window similar to the one displayed below appears.

o Title: You must provide a title for your post; choose a tile that this post will focus on. For example, "School Annual Day Function 2012".

Information Technology Level -2

Once you have created a blog, you need to submit content that you want others to view. This process ids called posting content.

Using the rich text box, you can type content that you want others to read. Once you have finished typing the content, you need to publish the post for others to see. Click Publish Post to publish your content. To view the post, you can type the blog address in the address bar of the web browser; you should see your blog along with the post (displayed below).

101

Information Technology Level -2

You can also add photos, videos, etc. to the blog using the options available in WordPress.You can comment on posts published by others. Usually, the comment option is available towards the end of the post. Look for options such as Leave a comment, Leave a reply, etc. in the blog to comment. For example, in WordPress the comment box is located below the post and labelled as Leave a reply.

o In the Enter your comment here… text box, type your comments about the post. o In the Email (required) field, type your email address. o In the Name (required) field, type your name. o In the Website filed, you may type your blog address (Optional). o Once you have typed the content in the comment area, review carefully and Click Post Comment. Once you click the Post Comment, you will see the blog along with your comment.

102

Unit -

6

Computer System Care Hardware Security Assessing your risks

Shingai: We want to put a brief summary of our security policy into this grant application, but we also need to make sure the policy itself is thorough. What should we include in it? Otto: I'm afraid I can't recommend a one-size-fits-all solution to the challenge of physical security. The specifics of a good policy almost always depend on a particular organisation's individual circumstances. Here's a piece of general advice, though: when you're trying to come up with a plan, you need to observe your work environment very carefully and think creatively about where your weak points might be and what you can do to strengthen them. When assessing the risks and vulnerabilities that you or your organisation face, you must evaluate several different levels at which your data may be threatened.

Information Technology Level -2

Many organisations underestimate the importance of keeping their offices and their equipment physically secure. As a result, they often lack a clear policy describing what measures they should take to protect computers and backup storage devices from theft, severe weather conditions, accidents, and other physical threats. The importance of such policies may seem obvious, but formulating them properly can be more complicated than it sounds. Many organisations, for example, have good quality locks on their office doors, and many even have secure windows; but if they do not pay attention to the number of keys that have been created, and who has copies of those keys, their sensitive information remains vulnerable.

o Consider the communication channels you use and how you use them. Examples might include paper letters, faxes, landline phones, mobile phones, emails and Skype messages. o Consider how you store important information. Computer hard drives, email and web servers, USB memory sticks, external USB hard drives, CDs and DVDs, mobile phones, printed paper and hand-written notes are all likely possibilities.

103

o Consider where these items are located, physically. They could be in the office, at home, in a trash bin out back or, increasingly, 'somewhere on the Internet.' In this last case, it might be quite challenging to to determine the particular piece of information's actual, physical location.

Information Technology Level -2

Keep in mind that the same piece of information might be vulnerable on many different levels. Just as you might rely on anti-virus software to protect the contents of a USB memory stick from malware, you must rely on a detailed physical security plan to protect the same information from theft, loss or destruction. While some security practices, such as having a good off-site backup policy, are helpful against both digital and physical threats, others are clearly more specific.

104

When you decide whether to carry your USB memory stick in your pocket or sealed in a plastic bag at the bottom of your luggage, you are making a decision about physical security, even though the information you are trying to protect is digital. As usual, the correct policy depends greatly on the situation. Are you walking across town or travelling across a border? Will somebody else be carrying your bag? Is it raining? These are the sorts of questions that you should consider when making decisions like this. How to protect your information from physical threats No matter how much effort you have put into building a digital barrier around your computer, you could still wake up one morning to find that it, or a copy of the information on it, has been lost, stolen, or damaged by any number of unfortunate accidents or malicious acts. Anything from a power surge to an open window to a spilt cup of coffee might lead to a situation in which all of your data are lost and you are no longer able to use your computer. A careful risk assessment, a consistent effort to maintain a healthy computing environment and a written security policy can help avoid this type of diaster. Background scenario Shingai and Rudo are an elderly married couple with many years of experience helping the HIV-infected population of Zimbabwe maintain access to proper medication. They are applying for a grant to purchase new computers and network equipment for their office. Since they live in a region that is quite turbulent, in terms both of politics and of infrastructure, they and their potential funders want to ensure that their new hardware will be safe, not only from hackers and viruses, but also from confiscation, thunderstorms, electrical spikes and other such disasters. They ask Otto, a local computer technician, to help them devise a plan of action to strengthen the physical security of the computers and network hardware they plan to buy if their grant application is successful.

What you can learn from this chapter More about a few of the physical threats to your computer and to the information o stored on it How best to secure computer equipment against some of these threats o How to create a healthy operating environment for computers and network o equipment What to consider when creating a security plan for the computers in your office o Maintaining a healthy environment for your computer hardware Like many electronic devices, computers are quite sensitive. They do not adapt well to unstable electricity supplies, extreme temperatures, dust, high humidity or mechanical stress. There are a number of things you can do to protect your computers and network equipment from such threats:

If you can afford them, you should install Uninterruptible Power Supplies (UPS') on o important computers in your office. A UPS stabilises electricity supply and provides temporary power in the event of a blackout. Even where UPS' are deemed inappropriate or too costly, you can still provide power o filters or surge protectors, either of which will help protect you from power surges. Test your electrical network before you connect important equipment to it. Try to use o power sockets that have three slots, one of them being a 'ground line', or 'earth'. And, if possible, take a day or two to see how the electrical system in a new office behaves when powering inexpensive devices, such as lamps and fans, before putting your computers at risk.

Information Technology Level -2

Electrical problems such as power surges, blackouts and brownouts can cause o physical damage to a computer. Irregularities like this can 'crash' your hard drive, damaging the information it contains, or physically harm the electronic components in your computer.

To defend against accidents in general, avoid placing important hardware in o passages, reception areas or other easily accessible locations. UPS', power filters, surge protectors, power strips and extension cables, particularly those attached to servers and networking equipment, should be positioned where they will not be switched off by an accidental misstep. If you have access to high-quality computer cables, power strips and extension cables, o you should purchase enough to serve your entire office and pick up a few extras.

105

Power strips that fall out of wall sockets, fail to hold plugs securely and spark constantly are more than just annoying. They can be quite damaging to the physical security of any computers attached to them. They can also lead frustrated users to secure their loose computer cables to a sparking power strip with tape, which creates an obvious fire hazard. o If you keep any of your computers inside cabinets, make sure they have adequate ventilation, or they might overheat o Computer equipment should not be housed near radiators, heating vents, air conditioners or other ductwork

Information Technology Level -2

Creating your physical security policy Once you have assessed the threats and vulnerabilities that you or your organisation face, you must consider what steps can be taken to improve your physical security. You should create a detailed security policy by putting these steps in writing. The resulting document will serve as a general guideline for yourself, your colleagues and any newcomers to your organisation. It should also provide a checklist of what actions should be taken in the event of various different physical security emergencies. Everybody involved should take the time to read, implement and keep up with these security standards. They should also be encouraged to ask questions and propose suggestions on how to improve the document. Your physical security policy may contain various sections, depending on the circumstances: o An office access policy that addresses the alarm systems, what keys exist and who has them, when guests are allowed in the office, who holds the cleaning contract and other such issues o A policy on which parts of the office should be restricted to authorized visitors o An inventory of your equipment, including serial numbers and physical descriptions o A plan for securely disposing of paper rubbish that contains sensitive information o Emergency procedures related to: o Who should be notified if sensitive information is disclosed or misplaced o Who to contact in the event of a fire, flood, or other natural disaster o How to perform certain key emergency repairs o How to contact the companies or organizations that provide services such as electrical power, water and Internet access

106

How to recover information from your off-site backup system. You can find more o detailed backup advice in Chapter 5: How to recover from information loss. Your security policy should be reviewed periodically and modified to reflect any policy changes that have been made since its last review. And, of course, don't forget to back up your security policy document along with the rest of your important data. See the Further reading section for more information about creating a security policy. Protecting your information from physical intruders Malicious individuals seeking access to your sensitive information represent one important class of physical threat. It would be a mistake to assume that this is the only such threat to the security of your information, but it would be even more shortsighted to ignore it. There are a number of steps you can take to help reduce the risk of physical intrusion. The categories and suggestions below, many of which may apply to your home as well as your office, represent a foundation upon which you should build in accordance with your own particular physical security situation.

Get to know your neighbours. Depending on the security climate in your country and o in your neighbourhood, one of two things may be possible. Either you can turn them into allies who will help you keep an eye on your office, or you can add them to the list of potential threats that your security plan must address. Review how you protect all of the doors, windows and other points of entry that lead o into your office. Consider installing a surveillance camera or a motion-sensor alarm. o Try to create a reception area, where visitors can be met before they enter the office, o and a meeting room that is separate from your normal work space. In the office

Information Technology Level -2

Around the office

Protect network cables by running them inside the office. o Lock network devices such as servers, routers, switches, hubs and modems into o secure rooms or cabinets. An intruder with physical access to such equipment can install malware capable of stealing data in transit or attacking other computers on your network even after he leaves. In some circumstances it may be beneficial to hide servers, computers or other equipment in attics, over a fake ceiling, or even with a neighbor, and use them through wireless connection.

107

o If you have a wireless network, it is critical that you secure your access point so that intruders cannot join your network or monitor your traffic. If you are using an insecure wireless network, anyone in your neighbourhood with a laptop becomes a potential intruder. This is an unusual definition of 'physical', but it helps to consider that a malicious individual who can monitor your wireless network has the same access as one who can sneak into your office and connect an ethernet cable. The steps required to secure a wireless network will vary, depending on your access point hardware and software, but they are rarely difficult to follow. At your work

Information Technology Level -2

You should position your computer screen carefully, both on your desk and when you o are away from the office, in order to prevent others from reading what is displayed there. In the office, this means considering the location of windows, open doors and the guest waiting area, if you have one. Most desktop computer cases have a slot where you can attach a padlock that will o prevent anyone without a key from getting inside. If you have cases like this in the office, you should lock them so that intruders cannot tamper with their internal hardware. You might also consider this feature when purchasing new computers. Use a locking security cable, where possible, to prevent intruders from stealing the o computers themselves. This is especially important for laptops and small desktops that could be hidden inside a bag or under a coat. Software and settings related to physical security Make sure that, when you restart your computer, it asks you for a password before o allowing you to run software and access files. If it does not, you can enable this feature in Windows by clicking on the Start menu, selecting the Control Panel, and doubleclicking on User Accounts. In the User Accounts screen, select your own account and click Create a Password. Choose a secure password, as discussed in Chapter 3: How to create and maintain good passwords, enter your password, confirm it, click Create Password and click Yes, Make Private. There are a few settings in your computer's BIOS that are relevant to physical o security. First, you should configure your computer so that it will not boot from the USB device, CD-ROM or DVD drives. Second, you should set a password on the BIOS itself, so that an intruder can not simply undo the previous setting. Again, be sure to choose a secure password.

108

If you rely on a secure password database, as discussed in Chapter 3, to store your o Windows or BIOS passwords for a particular computer, make sure that you do not keep your only copy of the database on that computer. Get in the habit of locking your account whenever you step away from your computer. o On Windows, you can do this quickly by holding down the Windows logo key and pressing the L key. This will only work if you have created a password for your account, as described above. Encrypt sensitive information on computers and storage devices in your office. See o Chapter 4: How to protect the sensitive files on your computer for additional details and pointers to the appropriate Hands-on Guides. Rudo: I'm a bit nervous about messing around in BIOS. Can I break my computer if I do something wrong? tto: You sure can, at least for a little while. In fact, the settings that you might want to possible to leave your computer temporarily unable to start if you do something wrong. In general, if you're uncomfortable working in BIOS, you should ask someone with more computer experience to help you out. Portable devices Keep your laptop, your mobile phone and other portable devices that contain o sensitive information with you at all times, especially if you are travelling or staying at a hotel. Travelling with a laptop security cable is a good idea, although it is sometimes difficult to find an appropriate object to which you can attach one. Remember that meal times are often exploited by thieves, many of whom have learnt to check hotel rooms for laptops during hours of the day when they are likely to be

Information Technology Level -2

change are pretty simple, but the BIOS screen itself can be a little intimidating, and it is

unattended. If you have a laptop, tablet or other mobile device, try to avoid putting them on o display. There is no need to show thieves that you are carrying such valuable hardware or to show individuals who might want access to your data that your shoulder bag contains a hard drive full of information. Avoid using your portable devices in public areas, and consider carrying your laptop in something that does not look like a laptop bag.

109

How to create and maintain secure passwords Many of the secure services that allow us to feel comfortable using digital technology to conduct important business, from signing in to our computers and sending email to encrypting and hiding sensitive data, require that we remember a password. These secret words, phrases or strings of gibberish often provide the first, and sometimes the only, barrier between your information and anyone who might want to read, copy, modify or destroy it without your permission. There are many ways in which someone could learn your passwords, but you can defend against most of them by applying a few specific tactics and by using a secure password database tool, such as KeePass.

Information Technology Level -2

Background scenario Mansour and Magda are siblings, in an Arabic-speaking country, who maintain a blog on which they anonymously publicise human rights abuses and campaign for political change. Magda recently tried to log into her personal webmail account and found that her password had been changed. After resetting the password, she was able to log in, but when she opened her inbox she noticed that several new messages were marked as having been read. She suspects that a politically-motivated intruder may have learned or guessed her password, which she uses for several of her website accounts. She is meeting with Mansour, who has less computer experience, to explain the situation and to voice her concerns. Selecting and maintaining secure passwords In general, when you want to protect something, you lock it up with a key. Houses, cars and bicycle locks all have physical keys; protected files have encryption keys; bank cards have PIN numbers; and email accounts have passwords. All of these keys, physical and electronic, have one thing in common: they open their respective locks just as effectively in the hands of somebody else. You can install advanced firewalls, secure email accounts, and encrypted disks, but if your password is weak, or if you allow it to fall into the wrong hands, they will not do you much good. Elements of a strong password A password should be difficult for a computer program to guess. o Make it long: The longer a password is, the less likely it is that a computer program would be able to guess it in a reasonable amount of time. You should try to create passwords that include ten or more characters. Some people use passwords that contain more than one word, with or without spaces between them, which are often

110

called passphrases. This is a great idea, as long as the program or service you are using allows you to choose long enough passwords. o Make it complex: In addition to length, the complexity of a password also helps prevent automatic 'password cracking' software from guessing the right combination of characters. Where possible, you should always include upper case letters, lower case letters, numbers and symbols, such as punctuation marks, in your password. A password should be difficult for others to figure out.

o Don't make it personal: Your password should not be related to you personally. Don't choose a word or phrase based on information such as your name, social security number, telephone number, child's name, pet's name, birth date, or anything else that a person could learn by doing a little research about you. o Keep it secret: Do not share your password with anyone unless it is absolutely necessary. And, if you must share a password with a friend, family member or colleague, you should change it to a temporary password first, share that one, then change it back when they are done using it. Often, there are alternatives to sharing a password, such as creating a separate account for each individual who needs access. Keeping your password secret also means paying attention to who might be reading over your shoulder while you type it or look it up in a secure password database.

Information Technology Level -2

o Make it practical: If you have to write your password down because you can't remember it, you may end up facing a whole new category of threats that could leave you vulnerable to anybody with a clear view of your desk or temporary access to your home, your wallet, or even the trash bin outside your office. If you are unable to think of a password that is long and complex but still memorable, the Remembering secure passwords section, below, might be of some help. If not, you should still choose something secure, but you may need to record it using a secure password database such as KeePass. Other types of password-protected files, including Microsoft Word documents, should not be trusted for this purpose, as many of them can be broken in seconds using tools that are freely available on the Internet.

A password should be chosen so as to minimise damage if someone does learn it. o Make it unique: Avoid using the same password for more than one account. Otherwise, anyone who learns that password will gain access to even more of your sensitive information. This is particularly true because some services make it relatively easy to crack a password. If you use the same password for your Windows

111

user account and your Gmail account, for example, someone with physical access to your computer can crack the former and use what they learn to access the latter. For similar reasons, it is a bad idea to rotate passwords by swapping them around between different accounts. o Keep it fresh: Change your password on a regular basis, preferably at least once every three months. Some people get quite attached to a particular password and never change it. This is a bad idea. The longer you keep one password, the more opportunity others have to figure it out. Also, if someone is able to use your stolen password to access your information and services without you knowing about it, they will continue to do so until you change the password.

Information Technology Level -2

Mansour: What if I trust someone? It's OK for me to tell you my password, right? Magda: Well, first of all, just because you trust somebody with your password doesn't necessarily mean you trust them to take good care of it, right? Even though I wouldn't do anything bad with your password, I might write it down and lose it or something. That could even be how I got into this mess! And besides, it's not all about trust. If you're the only one who knows your password, then you don't have to waste your time worrying about who to blame if the account gets broken into. Right now, for example, I feel pretty confident that somebody actually guessed or 'cracked' my password, because I never wrote it down or shared it with anyone. Remembering and recording secure passwords Looking over the list of suggestions above, you might wonder how anyone without a photographic memory could possibly keep track of passwords that are this long, complex and meaningless without writing them down. The importance of using a different password for each account makes this even more difficult. There are a few tricks, however, that might help you create passwords that are easy to remember but extremely difficult to guess, even for a clever person using advanced 'password cracking' software. You also have the option of recording your passwords using a tool like KeePass that was created specifically for this purpose. Remembering secure passwords It is important to use different types of characters when choosing a password. This can be done in various ways: Varying capitalisation, such as: 'My naME is Not MR. MarSter’ o Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y’ o

112

Incorporating certain symbols, such as: ‘c@t(heR1nthery3' o Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT' o Any of these methods can help you increase the complexity of an otherwise simple password, which may allow you to choose one that is secure without having to give up entirely on the idea of memorizing it. Some of the more common substitutions (such as the use of a zero instead of an 'o' or the '@' symbol in place of an 'a') were long-ago incorporated into password-cracking tools, but they are still a good idea. They increase the amount of time that such tools would require to learn a password and, in the more common situations where tools of this sort cannot be used, they help prevent lucky guesses. Passwords can also take advantage of more traditional mnemonic devices, such as the use of acronyms. This allows long phrases to be turned into complex, seemingly-random words: 'To be or not to be? That is the question' becomes ‘2Bon2B?TitQ' o

'Are you happy today?' becomes 'rU:-)2d@y?' o These are just a few examples to help you come up with your own method of encoding words and phrases to make them simultaneously complex and memorable. A little effort to make the password more complex goes a very long way. Increasing the length of a password even just by a few characters, or by adding numbers or special characters, makes it much more difficult to crack. For demonstrative purposes, the table below shows how much longer it may take a hacker to break a list of progressively more complex passwords by trying different combinations of the password one after another. Sample Password

Time to crack with an everyday computer

Time to crack with a very fast computer

bananas

Less than 1 day

Less than 1 day

bananalemonade

2 days

Less than 1 day

BananaLemonade

3 months, 14 days

Less than 1 day

B4n4n4L3m0n4d3

3 centuries, 4 decades

1 month, 26 days

We Have No Bananas

19151466 centuries

3990 centuries

W3 H4v3 N0 B4n4n45

20210213722742 centuries

4210461192 centuries

Information Technology Level -2

'We hold these truths to be self-evident: that all men are created equal' becomes o ‘WhtT2bs-e:taMac='

113

Of course, the time it would take to crack any of the above passwords would vary widely depending on the nature of the attack, and the resources available to the attacker. Moreover, new methods to crack passwords are constantly being devised. All the same, the table does demonstrate that passwords become vastly more difficult to break by simply varying characters and using two words or, even better, a short phrase. The table above is based on Passfault's calculations. Passfault is one of a number of websites which allow you to test the strength of your passwords. However, while such resources are good for demonstrating the relative efficiency of different types of passwords, you should avoid introducing your actual passwords into these sites. Recording passwords securely

Information Technology Level -2

While a little creativity may allow you to remember all of your passwords, the need to change those passwords periodically means that you might quickly run out of creativity. As an alternative, you can generate random, secure passwords for most of your accounts and simply give up on the idea of remembering them all. Instead, you can record them in a portable, encrypted secure password database, such as KeePass. Hands-on: Get started with the KeePass - Secure Password Storage Guide Of course, if you use this method, it becomes especially important that you create and remember a very secure password for KeePass, or whatever tool you choose. Whenever you need to enter a password for a specific account, you can look it up using only your master password, which makes it much easier to follow all of the suggestions above. KeePass is portable, as well, which means that you can put the database on a USB memory stick in case you need to look up a password while you are away from your primary computer. Although it is probably the best option for anybody who has to maintain a large number of accounts, there are a few drawbacks to this method. First, if you lose or accidentally delete your only copy of a password database, you will no longer have access to any of the accounts for which it contained passwords. This makes it extremely important that you back up your KeePass database. Look over Chapter 5: How to recover from information loss for more information on backup strategies. Fortunately, the fact that your database is encrypted means that you don't have to panic if you lose a USB memory stick or a backup drive containing a copy of it. The second major drawback could be even more important. If you forget your KeePass master password, there is no way to recover it or the contents of the database. So, be sure to choose a master password that is both secure and memorable!

114

The strength of this method may, in certain situations, become it's weakness. If somebody force you to give away your Keepass database master password, he will gain access to all of the passwords stored in this Keepass database. If this is the situation you may face, you could treat your Keepass database as a sensitive file, and protect it as we describe in Chapter 4: How to protect the sensitive files on your computer. You can also create a separate Keepass database to containg passwords protecting more sensitive information, and take extra precautions with that database. Mansour: Wait a minute. If KeePass uses a single master password to protect all of your other passwords, how is it more secure than just using that same password for all of your accounts? I mean, if a bad guy learns the master password, he gets access to everything, right?

How to recover from information loss Each new method of storing or transferring digital information tends to introduce several new ways in which the information in question can be lost, taken or destroyed. Years of work can disappear in an instant, as a result of theft, momentary carelessness, the confiscation of computer hardware, or simply because digital storage technology is inherently fragile. There is a common saying among computer support professionals: "it's not a question of if you will lose your data; it's a question of when." So, when this happens to you, it is extremely important that you already have an up-to-date backup and a welltested means of restoring it. The day you are reminded about the importance of a backup system is generally the day after you needed to have one in place.

Information Technology Level -2

Magda: It's a good thought, and you're right that protecting your master password is really important, but there are a couple of key differences. First of all, this 'bad guy' would not only need your password, he'd need your KeePass database file, too. If you just share the same password between all of your accounts, then he'd only need the password itself. Plus, we know that KeePass is extremely secure, right? Well, other programs and websites can go either way. Some of them are much less secure than others, and you don't want someone breaking into a weak website, and then using what he learns to access a more secure account. And there's another thing, too. KeePass makes it really easy to change your master password if you think it's necessary. I should be so lucky! I spent all day today updating my passwords.

Although it is one of the most basic elements of secure computing, formulating an effective backup policy is not as simple as it sounds. It can be a significant planning hurdle for a number of reasons: the need to store original data and backups in different physical

115

locations, the importance of keeping backups confidential, and the challenge of coordinating among different people who share information with one another using their own portable storage devices. In addition to backup and file-recovery tactics, this chapter addresses two specific tools, Cobian Backup and Recuva.

Information Technology Level -2

Background scenario Elena is an environmentalist in a Russian-speaking country, where she has begun to create a website that will rely on creative presentation of images, videos, maps and stories to highlight the extent of illegal deforestation in the region. She has been collecting documents, media files and geographic information about logging for years, and most of it is stored on an old Windows computer in the office of the NGO where she works. While designing a website around this information, she has come to realize its importance and to worry about preserving it in the event that her computer should be damaged, especially if it should happen before she gets everything copied up to the website. Other members of her organization sometimes use the computer, so she also wants to learn how to restore her files if someone accidentally deletes the folder containing her work. She asks her nephew Nikolai to help her develop a backup strategy. What you can learn from this chapter o How to organise and back up your information o Where you should store your backups o How you can manage your backups securely o How to recover files that have been deleted accidentally Identifying and organising your information While it is clearly important that you take steps to prevent disaster, by making sure that your information is physically safe, free of malware and protected by a good firewall and strong passwords, on their own these steps are not enough. There are simply too many things that can go wrong, including virus attacks, hackers, electrical short circuits, power spikes, water spills, theft, confiscation, demagnetisation, operating system crashes and hardware failure, to name just a few. Preparing for disaster is just as important as defending against it. Elena: I know backup is important, Nikolai, but doesn't that mean I should have someone else set it up for me? I mean, am I really going to have the time, resources and expertise to do this on my own?

116

Nikolai: You'll be fine. Coming up with a good backup plan takes a bit of thought, but it doesn't take all that much time or money. And, compared with losing all of your information, you can hardly call it inconvenient, right? Besides, backup is definitely one of those things that you should manage yourself. Unless the people who normally help you out with tech support are extremely reliable and extremely well-informed about where you keep your digital information, you're better off setting things up on your own.

Next, you need to define which of these files are 'master copies,' and which are duplicates. The master copy is generally the most up-to-date version of a particular file or collection of files, and corresponds to copy that you would actually edit if you needed to update the content. Obviously, this distinction does not apply to files of which you have only one copy, but it is extremely important for certain types of information. One common disaster scenario occurs when only duplicates of an important document are backed up, and the master copy itself gets lost or destroyed before those duplicates can be updated. Imagine, for example, that you have been travelling for a week while updating the copy of a particular spreadsheet that you keep on your USB memory stick. At this point, you should begin thinking of that copy as your master copy, because the periodic, automated backups of the outdated version on your office computer are no longer useful.

Information Technology Level -2

The first step to formulating a backup policy is to picture where your personal and work information is currently located. Your email, for example, may be stored on the provider's mail server, on your own computer, or in both places at once. And, of course, you might have several email accounts. Then, there are important documents on the computers you use, which may be in the office or at home. There are address books, chat histories and personal program settings. It is also possible that some information is stored on removable media as well, including USB memory sticks, portable hard drives, CDs, DVDs, and old floppy disks. Your mobile phone contains a list of contacts and may have important text messages stored in it. If you have a website, it may contain a large collection of articles built up over years of work. And, finally, don't forget your non-digital information, such as paper notebooks, diaries and letters.

Try to write down the physical location of all master and duplicate copies of the information identified above. This will help you clarify your needs and begin to define an appropriate backup policy. The table below is a very basic example. Of course, you will probably find that your list is much longer, and contains some 'storage devices' with more than one 'data type' and some data types that are present on multiple devices.

117

Data Type

Master/ Duplicate Master

Storage Device Computer hard

A few important electronic documents

Duplicate

USB memory

With me stick

Program databases (photos, address book, calendar, etc.)

Master

Computer hard drive

Office

A few electronic documents Email & email contacts

Duplicate Master

CDs Gmail account

Home Internet

Text messages & phone contacts Printed documents (contracts, invoices, etc.)

Master Master

Mobile phone Desk drawer

With me Office

Electronic documents

Location Office drive

Information Technology Level -2

In the table above, you can see that: o The only documents that will survive if your office computer's hard drive crashes are the duplicates on your USB memory stick and the CD copies at home. o You have no offline copy of your email messages or your address book, so if you forget your password (or if someone manages to change it maliciously), you will lose access to them. o You have no copies of any data from your mobile phone. o You have no duplicate copies, digital or physical, of printed documents such as contracts and invoices. Defining your backup strategy To back up all of the data types listed above, you will need a combination of software and process solutions. Essentially, you need to make sure that each data type is stored in at least two separate locations. Electronic documents - Create a full backup of the documents on your computer using a program like Cobian Backup, which is described in more detail below. Store the backup on something portable so that you can take it home or to some other safe location. External hard drives, CD/DVDs or USB memory sticks are possible choices. Some people use CDs or DVDs for this, since the risk of overwriting and losing your backup is lower. Blank CDs may be cheap enough to allow you to use a new one every time you make a backup.

118

Because this category of data often contains the most sensitive information, it is particularly important that you protect your electronic document backups using encryption. You can learn how to do this in Chapter 4: How to protect the sensitive files on your computer and in the TrueCrypt Guide. Program databases - Once you have determined the location of your program databases, you can back them up in the same way as electronic documents. Email - Rather than accessing your email only through a web browser, install an email client like Thunderbird and configure it to work with your account. The Thunderbird Guide explains in detail how to do this. Also most webmail services will provide instructions on how to use such programs and, often, how to import your email addresses into them. You can learn more about this in the Further Reading section, below. If you choose to move your old email messages to your computer so they are not stored on the server (e.g. for security reasons), make sure that you include them in the backup of electronic documents described above.

mobile phone, you can connect it to your computer using the appropriate software, which is generally available from the website of the company that manufactured your phone. You may need to buy a special USB cable to do this. Printed documents - Where possible, you should scan all of your important papers, then back them up along with your other electronic documents, as discussed above. In the end, you should have rearranged your storage devices, data types and backups in a way that makes your information much more resistant to disaster: Data Type

Master/ Duplicate

Storage Device

Location

Electronic documents

Master

Computer hard drive

Office

Electronic documents

Duplicate

CDs

Home

A few important electronic documents

Duplicate

USB memory stick

With me

Information Technology Level -2

Mobile phone contents - To back up the phone numbers and text messages on your

119

Data Type

Master/ Duplicate

Storage Device

Program databases

Master

Computer hard drive

Office

Program databases

Duplicate

CDs

Home

Data Type

Storage Device

Location

Email & email contacts

Duplicate

Gmail account

Internet

Email & email contacts

Master

Thunderbird on office computer

Office

Master/ Duplicate

Storage Device

Data Type

Information Technology Level -2

Master/ Duplicate

Location

Location

Text messages & mobile phone contacts

Master

Mobile phone

With me

Text messages & mobile phone contacts

Duplicate

Computer hard drive

Office

Text messages & mobile phone contacts

Duplicate

Backup SIM

Home

Master/ Duplicate

Storage Device

Data Type

Location

Printed documents

Master

Desk drawer

Office

Scanned documents

Duplicate

CDs

At home

Elena: I know some people who keep all of their important documents on Gmail, by attaching them to 'draft' messages or emails to themselves. Would that count as a 'second physical location' for my files? Nikolai: It might help you recover if you lose one or two very important documents, but it's pretty awkward. Honestly, how many documents per week would you be willing to back up like that? Plus, you need to consider whether or not those attachments are safe, especially if you're at all worried about your email being monitored. Unless you're connecting to Gmail securely, this is a bit like handing over your sensitive information on a silver platter. Using an HTTPS connection to Gmail in order to back up small Truecrypt

120

volumes or KeePass database files would be pretty safe, because they're encrypted, but I really wouldn't recommend this as a general-purpose backup strategy. Creating a digital backup Of the various data types discussed here, it is the 'electronic documents' that people tend to worry about most when establishing a backup policy. This term is somewhat ambiguous, but generally refers to files that you keep track of yourself and that you open manually, either by double-clicking on them or by using a particular application's File menu. Specifically, it includes text files, word processing documents, presentations, PDFs and spreadsheets, among other examples. Unlike email messages, for example, electronic documents are generally not synchronised with remote copies over the Internet.

Email stored by an application such as Thunderbird is a special example of a program database. If you use an email program, especially if you are unable or unwilling to store a copy of your messages on the server, then you must ensure that this email database is included in your regular backup. You may consider image and video files to be electronic documents or items within a program database, depending on how you interact with them. Applications like Windows Media player and iTunes, for example, work like databases. If you use programs like this, you might have to search your hard drive to learn where they store the actual media files that they help manage. Storage devices

Information Technology Level -2

When backing up your electronic documents, you should remember to back up your program databases, as well. If you use a calendar application or an electronic address book, for example, you will need to find the folder in which these programs store their data. Hopefully, these databases will be in the same location as your electronic documents, as they are often kept inside your My Documents folder on a Windows computer. If that is not the case, however, you should add the appropriate folders to your regular backup.

Before you can back up your electronic documents, you must decide what kind of storage device you will use. USB disk or memory sticks - USB disk or memory sticks can be quite inexpensive, and offer large capacity. They are easy to erase or overwrite numerous times. USB disk or memory sticks have a limited lifetime, which greatly depends on ways and frequency of usage but is generally estimated to be around 10 years. Compact Discs (CDs) CDs store around 700 Megabytes (MB) of data. You will need a CD

121

burner and blank discs in order to create a CD backup. If you want to erase a CD and update the files stored on it, you will need to have a CD-RW burner and rewritable CDs. All major operating systems, including Windows XP, now include built-in software that can write CDs and CD-RWs. Keep in mind that the information written on these discs may begin to deteriorate after five or ten years. If you need to store a backup for longer than that, you will have to recreate the CDs occasionally, buy special 'long life' discs or use a different backup method.

Information Technology Level -2

Digital Video Discs (DVDs) - DVDs store up to 4.7 Gigabytes (GB) of data. They work much like CDs but require slightly more expensive equipment. You will need a DVD or DVD-RW burner, and appropriate discs. As with a CD, the data written on a normal DVD will eventually begin to fade. Remote server - A well-maintained network backup server may have almost unlimited capacity, but the speed and stability of your own Internet connection will determine whether or not this is a realistic option. Keep in mind that running a backup server in your own office, while faster than copying information over the Internet, violates the requirement that you keep a copy of your important data in two different physical locations. There are free storage services on the Internet, as well, but you should very carefully consider the risks of putting your information online and you should always encrypt your backups before uploading them to servers run by organisations or individuals whom you do not know and trust. See the Further reading section for a few examples. Backup Software Cobian Backup is a user-friendly tool that can be set to run automatically, at regularly scheduled times, and to include only files that have changed since your last backup. It can also compress backups to make them smaller. Hands-on: Get started with the Cobian Backup Guide As always, it is a good idea to encrypt your backup files using a tool such as TrueCrypt. More information about about data encryption can be found in Chapter 4: How to protect the sensitive files on your computer. Hands-on: Get started with the TrueCrypt - Secure File Storage Guide When using these backup tools, there are a few things you can do to help your backup system work smoothly: o Organise the files on your computer. Try to move all of the folders that contain

122

electronic documents you intend to back up into a single location, such as inside the My Documents folder. o If you use software that stores its data in an application database, you should first determine the location of that database. If it is not in a convenient location, see if the program will allow you to choose a new location for its database. If it does, you can put it in the same folder as your electronic documents. o Create a regular schedule to perform your backup. o Try to establish procedures for all of the staff in your office who do not already have a reliable, secure backup policy. Help your coworkers understand the importance of this issue. o Make sure to test the process of recovering data from your backup. Remember that, in the end, it is the restore procedure, not the backup procedure, that you really care about!

Nikolai: But what if your office burns down? Computer, desk, backup CDs and all? Or, what if your website forum gets used to plan some giant environmental demonstration, the authorities crack down, things get out of hand, and the organisation is raided? I doubt your little desk lock will keep the police from confiscating those CDs. What about keeping them at home, or asking a friend to store them for you? Recovering from accidental file deletion When you delete a file in Windows, it disappears from view, but its contents remain on the computer. Even after you empty the Recycle Bin, information from the files you deleted can usually still be found on the hard drive. See Chapter 6: How to destroy sensitive information to learn more about this. Occasionally, if you accidentally delete an important file or folder, this security vulnerability can work to your advantage. There are several programs that can restore access to recently-deleted files, including a tool called Recuva.

Information Technology Level -2

Elena: Alright, so I made an encrypted backup while I was at work, and I put it on a CD. Cobian is scheduled to update my backup in a few days. My desk at work has a drawer that locks, and I'm planning to keep these backup CDs in there so they won't get lost or broken.

Hands-on: Get started with the Recuva - File Recovery Guide These tools do not always work, because Windows may have written new data over your deleted information. Therefore, it is important that you do as little as possible with your computer between deleting a file and attempting to restore it with a tool like Recuva. The

123

longer you use your computer before attempting to restore the file, the less likely it is that you will succeed. This also means that you should use the portable version of Recuva instead of installing it after deleting an important file. Installing the software requires writing new information to the file system, which may coincidentally overwrite the critical data that you are trying to recover. While it might sound like a lot of work to implement the policies and learn the tools described in this chapter, maintaining your backup strategy, once you have a system in place, is much easier than setting it up for the first time. And, given that backup may be the single most important aspect of data security, you can rest assured that going through this process is well worth the effort.

Software Security

Information Technology Level -2

Network Security Internet security is a branch of computer security specifically related to the Internet, often involving browser security but also network security. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud, such as phishing. This session introduces you to Internet security concepts and how to secure online and network transactions. Network security refers to the practice of securing computers and devices in a network from unauthorized users and attacks. Network security can range from simple procedure such as using a username and password to using complex network devices to protect a network. Though Internet provides valuable information and entertainment, it may leave your computer unsecure due to many online threats. You need to ensure that your usernames, passwords, credit card or online banking information secure as they are prone to be tracked and used by unauthorized users. Some websites can also install Malware on the computer without user consent thereby leaving the computer damaged or insecure. Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the chances of users getting compromised. Following are some of the common types of host & network based attacks: Spoofing Spoofing is a method that refers to use of forged IP address, MAC address, E-mai address, etc. falsifying and gaining data. For example someone could send a packet from an IP

124

address such as 10.1.1.1 but appears as if it was sent from another IP address thereby allowing the packet to enter into network, thus resulting in gaining access to someone's network without their consent. Root kits Root kits are special programs that take control of a computer by replacing critical system files and usually do undetected. Most of root kit programs are kernel-based, they act like parasites and attach themselves with the operating system. Though it is difficult to detect, you can observe change in patterns and check integrity of the operating system to see if it's affected by a root kit and take appropriate action. Denial of service Denial of service is a kind of attack that causes services to become unavailable when they are expected. For example a website under DOS (Denial of service) attack will cause itself to halt and affect the users by not providing the necessary service such as access to email or online shopping.

You can reduce the risks by using best practices such as using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best practices. Best Practices for Security Use strong passwords, a combination of alphanumeric and special characters could be used for creating a password that is not so easy to crack or guessed by other users. Do not keep passwords such as your favorite color, friends or relatives name, bike number, mobile number either as single or combined option. These passwords are easy to guess if a user knows you personally. Change your password frequently at least 2 or 3 weeks so that your account information remains secure.

Information Technology Level -2

To prevent unauthorized users from gaining access through any method, you need to implement a variety of security measures such as using a firewall, scanning your computer or network for weakness, apply security patches, use IDS, etc.

Using strong passwords can lower the risk of a security breach; effectiveness of a password depends on the security mechanism of the software and users involvement in generating a strong password. Most websites check for password effectiveness when a user attempts to register for the first time or when they change password. For example, when you register with Gmail, you may notice a password meter displaying the strength of your password similar to the one displayed below.

125

Following is a general guideline for managing strong passwords. o Keep the length of the password at least 12-14 characters if permitted. o Avoid keeping passwords based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, etc. o Including numbers, and symbols in passwords if allowed. o Use capital and lower-case letters. o Avoid using the same password for multiple sites or purposes. o Avoid using something that the public or workmates know you strongly like or dislike. o Use random password generators if possible.

Information Technology Level -2

Example of a strong password: u1vX:,4Hd{]$ You may also websites such as www.strongpasswordgenerator.com that can generate random strong passwords. To generate a strong password using www.strongpasswordgenerator.com do the following: o Open any web browser. Type www.strongpasswordgenerator.com in the address bar and press Enter. o Click Generate strong password. Notice the password displayed under your new password. Backup your data: Always keep copies of personal data in additional media such as compact discs, pen drives, etc. This could be helpful in situation when there is a loss of data. Keep the data away from unauthorized users. Use encryption software (usually available within the operating system) to protect your data from unauthorized users. If encryption software is not available within the operating system, use a 3rd party software. Keeping your username and password private: Never save your username or password on computers that are used in shared environments such as internet café. Browsers may save your personal data on the local computer that can be used by another user using the same computer. Registering with websites: Read the privacy statement or policy whenever you register with a website, the statement or policy will include information about how the website use personal data.

126

Do not share personal information; websites require you to fill out forms containing fields such as name, gender, age, email address, school, etc. Be cautious when filling out such forms; research and verify if it's a trustable website . Your email addressed could be used by unauthorized users to send you fake or unwanted emails; think twice or thrice before providing information to any website and decide if it is really necessary. Secure transactions: If you are using online shopping or transactions, websites even store your credit card or online banking personal information such as your credit card number, account details, etc. This information can be tracked and used by un-authorized users often known as hackers to misuse this information. Again, ensure the website is legitimate and uses secure practices for performing and maintaining online transactions. Since information such as credit card details or personal information is sent over the network, it is always recommended to use only secure websites for such transactions. Verify if the website uses secure transaction; usually it is indicated through a digital certificate represented as a golden lock in the web browser's address bar.

Do not immediately respond to mails from unknown users, it may be a fake mail trying to gather personal information such as your bank account details, home address, etc. Some mails could promise you jobs or announce lottery results which in turn could compromise the user. And in some cases, virus or scripts that are dangerous could be attached to the mail; NEVER open the attachment from an unknown source.

Information Technology Level -2

Use antivirus and antispyware software, computers are prone to attacks from software known as Malware that could harm your computer. Malware track browsing behavior or transmit personal data from your computer; programs such as keyloggers could be installed on your computer track and transmit every key that is pressed on a keyboard (keystrokes) to unauthorized users. Antivirus and Antispyware programs also offer real-time protection monitoring your computer for any changes by malware software. Keep your Antivirus and Antispyware software always up to date, this can help in protecting your computer from recent threats.

Clear browser cookies frequently, cookies are programs that are created on your local computer when you visit websites. Though cookies are meant for storing data based on your activity performed during your earlier visit such as logon details, details of a shopping cart, visited pages in a website, etc. they could also be tracked by unauthorized users and possibly gain access to your personal information. Keep the operating system and software applications up to date; though operating systems and applications are designed, tested and distributed, sometimes they may

127

have security holes through which a hacker can take advantage; they may track and gather information or even damage the whole computer. In general, most vendors notify the users whenever a security hole is identified and an update is available to address that particular issue. You can also visit respective vendor's website to check if there are any updates available, download and keep your operating system and software applications up to date, free from security holes. Install firewalls: Firewalls could be software or hardware and can assist in keeping a computer and a network secure. Firewalls analyze the network traffic and determine if the traffic should be allowed or not. In most cases, operating systems such as Linux, Windows or Mac include firewall software as a part of operating system thus keeping the computer secure. In rare cases, you may need to configure your firewall for additional security. Never install software from unknown sources as they might not be trustworthy;

Information Technology Level -2

download only from well-known or reputed websites. Verify the source if it is legitimate by searching the internet or referring to comments from other users before downloading them; understand the nature and the purpose of the software before attempting to download and install them. Remove unwanted or unknown software applications; these might have got installed without your knowledge when you have visited some websites. Unwanted software could get installed as they might have been bundled along with necessary software. Some programs such as toolbars get installed usually through bundled software and are programmed to send personal data without your consent. Clearing Data Stored In Browsers Web browsers have built-in password management designed to store passwords used in forms on websites. Browsers often prompt to save usernames and passwords when users attempt to logon to websites. This facility is offered to users, so that they can logon to their frequently used websites without having to type the usernames or passwords. However it is not advisable to leave the web browser store this data particularly on public or shared computers. To clear personal data from a web browser such as Mozilla Firefox, launch the browser. o Click Tools Menu, click Options. o Click Security Tab. The following window will be displayed:

128

Mozilla Firefox can also store data such as cookies, visited websites or webpages data, browsing history, etc. To clear this stored data, click General tab > Option. The following window will be displayed:

Information Technology Level -2

Notice that under Passwords section, Remember password for sites is checked. This means the browser is configured to save passwords for websites automatically. You can uncheck Remember password for sites option, if you prefer NOT to store passwords.

129

o Click Privacy Tab. The following window will be displayed:

Information Technology Level -2

o Under History section, click the drop down menu next to Firefox will:.

130

o Select Use custom settings for history from the drop down list. The following window will be displayed:

Notice the preferences; Firefox is configured to remember browsing and downloading history search and form history and cookies. If you do not wish store the above mentioned data, select Never remember history from the drop down list. If you are in a public environment such as a cyber café, you may select the option Clear all current history. On selecting this option, the following window will be displayed:

o There are several online threats such as Phishing, email spoofing, chat spoofing, etc. o You can reduce the risks by using best practices such as using Antivirus Software, Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading awareness of the best practices. Firewall Firewalls are software or hardware devices that protect a computer and/or a network by analyzing and controlling both incoming and outgoing network traffic. Firewalls act like a window between internal and external network allowing authorized users to access resources.

Information Technology Level -2

o Click Clear Now and then click OK. From now on, Mozilla Firefox will not remember any history as you have configured it that way.

Most operating systems include a software firewall and are configured to keep your computer secure. While software firewalls are sufficient for home and smaller networks, hardware firewalls are essential for larger networks as it offers a higher level of protection and can scale to larger network traffic from tens to hundreds of computers.

131

Firewall generations: o First generation: Firewalls use Packet filters, a mechanism in which each packet is analyzed based on a combination of source and destination IP address, ports and decide if the packet should be passed on or discarded.

Information Technology Level -2

o Second generation: Firewalls use stateful filters, a mechanism in which each packet is analyzed to track the state of network connection travelling through it. Only packets that match the active connection is allowed or else discarded. Stateful Packet inspection (SPI) used in this method is considered most secure as it allows packets to be transmitted to the internal network as the firewall checks if the response packet is originated based on the request sent from the internal network.

132

o Third generation: Firewalls provide application layer filtering by working closely with the applications (browsers, email software, etc.) and protocols (http, ftp, smtp, etc.). This is useful when unwanted network application software or protocol attempts to use network bandwidth, causing harm to the computer or flood the network traffic and need to blocked or never allowed. Note: Packet filtering alone does not provide enough protection. In order to effectively block peer-to-peer-related network traffic, what is needed is a firewall that does application filtering, which can be regarded as an extension to stateful packet inspection. Stateful packet inspection can determine what type of protocol is being sent over each port, but applicationlevel filters look at what a protocol is being used for. For example, an application-level filter might be able to tell the difference between HTTP traffic used to access a Web page and HTTP traffic used for file sharing, whereas a firewall that is only performing packet filtering would treat all HTTP traffic equally. Types of Firewalls o Personal Firewalls are usually shipped with an operating system and protect only the computer on which it is installed. Personal Firewalls are designed to control network traffic generated by applications such as web browsers, file transfer software, email software, etc. installed on a computer. When an application tends to transmit or receive, the firewall looks up the policy defined in the firewall settings and allows or denies network traffic accordingly. If you do not have a personal firewall installed on your computer or you want to use a more advanced firewall software with advanced management capabilities, you can purchase a commercial firewall software or a hardware firewall.

Notable software firewalls include Windows Firewall (shipped with most versions of Microsoft Windows), ZoneAlarm, Comodo Internet Security Plus, etc. Some Antivirus vendors bundle firewall software to provide complete protection such as McAfee Internet Security, Kaspersky Internet Security, Norton Internet Security, etc. o Enterprise Firewalls are suitable for organizations that have thousands of users or for networks that need high level of security such as banks. Enterprise Firewalls are usually hardware based, expensive, require additional technical expertise but offer greater levels of protection and scale to larger network traffic without affecting stability in performance. Enterprise firewalls can protect the entire network and operate at the network layer scanning each packet that transmits through them. Notable vendors for enterprise firewalls include Cisco, HP, IBM, Microsoft, Juniper networks, etc.

Information Technology Level -2

o Windows Firewall: Windows Firewall is a built-in firewall software bundled and installed by default on most Microsoft Windows Operating systems like Windows XP, Vista & 7. Windows Firewall protects the computer by using the default settings (firewall rules) that can be modified anytime. Most commonly used network applications such as web browsers, email client software, etc. work without the need for modifying the settings on the firewall. Some network applications may not work as intended if it is blocked by the firewall (for example, an antivirus software may not be able to update itself from the Internet); in such cases, you need to add the application to the exception list indicating that the application is permitted to use the network or the Internet.

133

132

Information Technology Level -2

Information Technology Level -2

CENTRAL BOARD OF SECONDARY EDUCATION

Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

01 Information Technology Level - Kendriya Vidyalaya No.1 Raipur

Class X. 2013-2014. Technology. CENTRAL BOARD OF SECONDARY EDUCATION. Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India .... Internet is one of the most useful technologies of modern times which help us in our daily, personal ...... solid state, ice, and gaseous state (water vapor or steam).

8MB Sizes 7 Downloads 492 Views

Recommend Documents

Kendriya Vidyalaya Jalgaon.pdf
2 PGT (Computer Science) BE/ B. Tech. in Computer Science or M. Sc. (Computer. Science/IT) or MCA with at least 50% marks. 3 PGT (Commerce) M. Com. with 50% marks from recognised university. 4 TGT (English, Sanskrit,. Science, Maths, Social Science).

Kendriya Vidyalaya Hyderabad Recruitment [email protected] ...
Apr 6, 2018 - Primary teacher(PRT); Note: Should have +2 with two years teacher training or D.Ed. 4. Nurse. 5. Educational Counsellor. 6. Yoga Instructor. 7. Games and Sports Coach. 8. Data Entry Operator. Note: For the teaching post of TGTs, Educati

International Institute of Information Technology Naya Raipur ...
International Institute of Information Technology Naya Raipur administrative Positions.pdf. International Institute of Information Technology Naya Raipur ...

Kendriya Vidyalaya Sangthan Question Paper.pdf
Whoops! There was a problem loading more pages. Retrying... Kendriya Vidyalaya Sangthan Question Paper.pdf. Kendriya Vidyalaya Sangthan Question ...

Kendriya Vidyalaya Lonavla Recruitment [email protected] ...
Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Kendriya Vidyalaya Lonavla Recruitment [email protected]. Kendriya Vidyalaya Lonavla Recruitment

Notification-Kendriya-Vidyalaya-Jhunjhunu-Teaching-Non-Teaching ...
Educational / Professional qualification, remuneration and format of application please visit the websites. www.kvjhunjhunu.org OR www.kvindrapura.org OR ...

Kendriya Vidyalaya Sangathan Recruitment [email protected] ...
Page 3 of 13. Kendriya Vidyalaya Sangathan Recruitment [email protected]. Kendriya Vidyalaya Sangathan Recruitment [email protected]. Open.

Kendriya Vidyalaya Hyderabad Recruitment [email protected] ...
B.A. / B.Sc. (Psychology) with Certificate of Diploma in Counselling. Desirable: Minimum of One year Experience in Providing Career/. Educational Counselling to students at schools. OR. Working knowledge and experience in placement Bureaus. OR. Regis

Kendriya Vidyalaya MICR Ahmednagar Recruitment 2018@govnokri ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Kendriya Vidyalaya MICR Ahmednagar Recruitment [email protected]. Kendriya Vidyalaya MICR Ahmednagar Recr

Kendriya Vidyalaya Vijayawada Recruitment [email protected] ...
In case of Honours Degree in Math, the candidate should studied. Math in all ... Page 3 of 4. Kendriya Vidyalaya Vijayawada Recruitment [email protected].

Kendriya Vidyalaya Varangaon Bharti [email protected] ...
7 days ago - Page 1 of 1. (qril{ Tgrq-fr kfirs dTrilq 3Tqfiarer). BilI- ildrlfi{ 1r6rrs9- 8?e 3 o c. KENDRIYA VTDYALAYA, O. F. VARANGAON'. (Under Min. of HRD, Govt' of India). JALGAON (Maharashtra) PIN:425308. Phone; (02582)277306. web: www.kvofvaran

Kendriya Vidyalaya AFS Jorhat.pdf
(ii) University Degree in Education / B.Ed. 02 PGT Computer. Science. (i). (ii). (iii). (iv). M.Tech. (Computer Science) or B.E./B.Tech. in Computer. Science from a ...

Kendriya Vidyalaya, Ballygunge Jobs.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

Kendriya Vidyalaya Kamptee Recruitment [email protected] ...
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Kendriya Vidyalaya Kamptee Recruitment [email protected]. Kendriya Vidyalaya Kamptee Recruitment 2018@gov

Kendriya Vidyalaya Uppal Recruitment [email protected] ...
Feb 21, 2018 - 3) DOCTOR. 4) STAFF NURSE. 5) SPORTS COACHES. ( Taekwondo / Hockey / Rope Skipping). PRINCIPAL. Instructions to Candidates : 1. Please read the Eligibility criteria before filling the Application. Form. 2. Eligibility conditions are en

Kendriya Vidyalaya Varangaon Bharti [email protected] ...
... details visit our website www'kvofvaranRaon.ors g""E#'rTnritt. afl{,r,{ i.,+s$+$lPAL. Cnroff i:' :^rl il't ;l1ryff"[?Ei !..' .. ',1! b'i' 'l- i{Fjlil[i|,;i l,,i ,. ' , ';',1'i ",4ft',{. #. F:.li;:;::l;a;*. t/. " www.GovNokri.in. Page 1 of 1. Kend

Kendriya Vidyalaya Sanghthan PGT & TGT Exam Date ...
Page 1 of 1. Page 1 of 1. Kendriya Vidyalaya Sanghthan PGT & TGT Exam Date 2017 (1).PDF. Kendriya Vidyalaya Sanghthan PGT & TGT Exam Date 2017 (1).PDF. Open. Extract. Open with. Sign In. Main menu. Page 1 of 1.

Kendriya-Vidyalaya-No.1-AFS-Chakeri-Kanpur-Teaching-Non ...
... with Computer Science component) /. Rs.26250/-. For VI to X. Page 3 of 4. Kendriya-Vidyalaya-No.1-AFS-Chakeri-Kanpur-Teaching-Non-Teaching-Posts.pdf.

Kendriya Vidyalaya ONGC Ankleshwar Walk in Interview Various ...
Kendriya Vidyalaya ONGC Ankleshwar Walk in Interview Various Teachers.pdf. Kendriya Vidyalaya ONGC Ankleshwar Walk in Interview Various Teachers.pdf.

Kendriya Vidyalaya Wardha Bharti 2017.pdf
Sc., M.Sc. ( Electronics with computer Science. component) / M.Sc(IT) / B.Sc( Computer Science ) OR. Bachelor's / Master Degree in any Science.

Kendriya Vidyalaya Nanded Bharti [email protected]
4] Computer Instructor: B.E. / B. Tech. (CS/IT) ... 5] Data Feeding Operator (on daily wages basis): XII/Degree with Computer knowledge and .... 8) E-mail ID: .

Kendriya Vidyalaya Air Force Station Bidar Bharti 2017.pdf ...
There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Kendriya Vidyalaya Air Force Station Bidar Bharti 2017.pdf.

KENDRIYA VIDYALAYA HYDERABAD REGION-1.pdf
What starts with the letter 't' is. filled with 't' and ... I help you stay safe in all that. you do. ... KENDRIYA VIDYALAYA HYDERABAD REGION-1.pdf. KENDRIYA ...