You are on page 1of 147

Information

Technology

Class X

Level 2
Students Handbook
2013-2014

CENTRAL BOARD OF SECONDARY EDUCATION


Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

Level 2

Students Handbook
2013-2014
CLASS

CENTRAL BOARD OF SECONDARY EDUCATION


Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

Information Technology Level -2

Information
Technology

Information Technology Level - 2


Students Handbook - Class X
PRICE: `
First Edition 2013, CBSE, India

Information Technology Level -2

Copies:

"This book or part thereof may not be reproduced by


any person or agency in any manner."

Published By

Design, Layout :

Printed By

The Secretary, Central Board of Secondary Education,


Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092
Multi Graphics, 8A/101, WEA Karol Bagh, New Delhi-110005
Phone: 011-25783846

H
k
k
j
r
d
k
l
af
o
/
k
u
m

sf
'
k
d
k
1

g
e
]
H
k
k
j
r
d
sy
k
sx
]
H
k
k
j
r
d
k
s,
d
l
E
i
w.
k
Z
i
zH
k
qR
o
&
l
ai
U
u
l
e
k
t
o
k
n
h
i
aF
k
f
u
j
i
s{
k
y
k
sd
r
a=
k
k
R
e
d
x
.
k
j
k
T
;

c
u
k
u
sd
sf
y
,
]
r
F
k
k
m
l
d
sl
e
L
r
u
k
x
f
j
d
k
sa d
k
s%
l
k
e
k
f
t
d
]
v
k
f
F
k
Zd
v
k
Sj
j
k
t
u
Sf
r
d
U
;
k
;
]
f
o
p
k
j
]
v
f
H
k
O
;
f
D
r
]
f
o
'
o
k
l
]
/
e
Z
v
k
Sj
m
i
k
l
u
k
d
h
L
o
r
a=
k
r
k
]
i
zf
r
"
B
k
v
k
Sj
v
o
l
j
d
h
l
e
r
k
i
zk
I
r
d
j
k
u
sd
sf
y
,
r
F
k
k
m
u
l
c
e
sa O
;
f
D
r
d
h
x
f
j
e
k
2
v
k
Sj

j
k
"
V
d
h
,
d
r
k
v
k
Sj
v
[
k
aM
r
k

l
qf
u
f
'
p
r
d
j
u
so
k
y
h
c
a/
qr
k
c
<
+k
u
sd
sf
y
,
n
`<
+l
ad
Y
i
g
k
sd
j
v
i
u
h
b
l
l
af
o
/
k
u
l
H
k
k
e
sa v
k
t
r
k
j
h
[
k
2
6
u
o
E
c
j
]
1
9
4
9
b
Z
d
k
s,
r
n
~}
k
j
k
b
l
l
af
o
/
k
u
d
k
sv
ax
h

r
]
v
f
/
f
u
;
f
e
r
v
k
Sj
v
k
R
e
k
f
i
Zr
d
j
r
sg
SaA
1
- l
af
o
/
k
u
(
c
;
k
y
h
l
o
k
al
a'
k
k
s/
u
)
v
f
/
f
u
;
e
]
1
9
7
6
d
h
/
k
j
k
2
}
k
j
k
(
3
1
1
9
7
7
)
l
s
i
zH
k
qR
o
&
l
ai
U
u
y
k
sd
r
a=
k
k
R
e
d
x
.
k
j
k
T
;

d
sL
F
k
k
u
i
j
i
zf
r
L
F
k
k
f
i
r
A
2
- l
af
o
/
k
u
(
c
;
k
y
h
l
o
k
al
a'
k
k
s/
u
)
v
f
/
f
u
;
e
]
1
9
7
6
d
h
/
k
j
k
2
}
k
j
k
(
3
1
1
9
7
7
)
l
s
j
k
"
V
d
h
,
d
r
k

d
sL
F
k
k
u
i
j
i
zf
r
L
F
k
k
f
i
r
A

H
k
k
x
4
d

e
wy
d

k
ZO
;
5
1
d
e
wy
d

k
ZO
;
&
H
k
k
j
r
d
si
zR
;
sd
u
k
x
f
j
d
d
k
;
g
d

k
ZO
;
g
k
sx
k
f
d
o
g
&
(
d
)
l
af
o
/
k
u
d
k
i
k
y
u
d
j
sv
k
Sj
m
l
d
sv
k
n
'
k
k
sZa]
l
aL
F
k
k
v
k
sa]
j
k
"
V

o
t
v
k
Sj
j
k
"
V
x
k
u
d
k
v
k
n
j
d
j
s_
(
[
k
)
L
o
r
a=
k
r
k
d
sf
y
,
g
e
k
j
sj
k
"
V
h
;
v
k
an
k
sy
u
d
k
si
zsf
j
r
d
j
u
so
k
y
sm
P
p
v
k
n
'
k
k
sZa d
k
s
n
;
e
sa l
at
k
s,
j
[
k
sv
k
Sj
m
u
d
k
i
k
y
u
d
j
s_
(
x
)
H
k
k
j
r
d
h
i
zH
k
qr
k
]
,
d
r
k
v
k
Sj
v
[
k
aM
r
k
d
h
j
{
k
k
d
j
sv
k
Sj
m
l
sv
{
k
q.
.
k
j
[
k
s_
(
?
k
)
n
s'
k
d
h
j
{
k
k
d
j
sv
k
Sj
v
k
g
~o
k
u
f
d
,
t
k
u
si
j
j
k
"
V
d
h
l
so
k
d
j
s_
(

)
H
k
k
j
r
d
sl
H
k
h
y
k
sx
k
sa e
sa l
e
j
l
r
k
v
k
Sj
l
e
k
u
H
k
zk
r
`R
o
d
h
H
k
k
o
u
k
d
k
f
u
e
k
Z.
k
d
j
st
k
s/
e
Z]
H
k
k
"
k
k
v
k
Sj
i
zn
s'
k
;
k
o
x
Zi
j
v
k
/
k
f
j
r
l
H
k
h
H
k
sn
H
k
k
o
l
si
j
sg
k
sa]
,
sl
h
i
zF
k
k
v
k
sa d
k
R
;
k
x
d
j
st
k
sf
L
=
k
;
k
sa d
sl
E
e
k
u
d
sf
o
#

g
Sa_
(
p
)
g
e
k
j
h
l
k
e
k
f
l
d
l
aL

f
r
d
h
x
k
Sj
o
'
k
k
y
h
i
j
ai
j
k
d
k
e
g

o
l
e
>
sv
k
Sj
m
l
d
k
i
f
j
j
{
k
.
k
d
j
s_
(
N
)
i
zk

f
r
d
i
;
k
Zo
j
.
k
d
h
f
t
l
d
sv
ar
x
Zr
o
u
]
>
h
y
]
u
n
h
]
v
k
Sj
o
U
;
t
h
o
g
Sa]
j
{
k
k
d
j
sv
k
Sj
m
l
d
k
l
ao
/
Zu
d
j
sr
F
k
k
i
zk
f
.
k
e
k
=
k
d
si
zf
r
n
;
k
H
k
k
o
j
[
k
s_
(
t
)
o
SK
k
f
u
d
n
`f
"
V
d
k
s.
k
]
e
k
u
o
o
k
n
v
k
Sj
K
k
u
k
t
Zu
r
F
k
k
l
q/
k
j
d
h
H
k
k
o
u
k
d
k
f
o
d
k
l
d
j
s_
(
>
)
l
k
o
Zt
f
u
d
l
ai
f

k
d
k
sl
qj
f
{
k
r
j
[
k
sv
k
Sj
f
g
al
k
l
sn
wj
j
g
s_
(

k
)
O
;
f
D
r
x
r
v
k
Sj
l
k
e
wf
g
d
x
f
r
f
o
f
/
;
k
sa d
sl
H
k
h
{
k
s=
k
k
sa e
sa m
R
d
"
k
Zd
h
v
k
sj
c
<
+u
sd
k
l
r
r
i
z;
k
l
d
j
sf
t
l
l
sj
k
"
V
f
u
j
ar
j
c
<
+r
sg
q,
i
z;
R
u
v
k
Sj
m
i
y
f
C
/
d
h
u
b
Zm
ap
k
b
;
k
sa d
k
sN
wy
s_
1
(
V
)
;
f
n
e
k
r
k
&
f
i
r
k
;
k
l
aj
{
k
d
g
S]
N
g
o
"
k
Zl
sp
k
Sn
g
o
"
k
Zr
d
d
h
v
k
;
qo
k
y
sv
i
u
s]
;
F
k
k
f
L
F
k
f
r
]
c
k
y
d
;
k
i
zf
r
i
k
Y
;
d
sf
y
;
sf
'
k
{
k
k
d
s
v
o
l
j
i
zn
k
u
d
j
sA
1
l
af
o
/
k
u
(
N
;
k
l
h
o
k
al
a'
k
k
s/
u
)
v
f
/
f
u
;
e
]
2
0
0
2
d
h
/
k
j
k
4
}
k
j
k
(
1
2
1
2
2
0
0
2
)
l
sa v
ar
%
L
F
k
k
f
i
r
A

THE CONSTITUTION OF INDIA


PREAMBLE
WE, THE PEOPLE OF INDIA, having solemnly resolved to constitute India into a 1[SOVEREIGN
SOCIALIST SECULAR DEMOCRATIC REPUBLIC] and to secure to all its citizens :
JUSTICE, social, economic and political;
LIBERTY of thought, expression, belief, faith and worship;
EQUALITY of status and of opportunity; and to promote among them all
FRATERNITY assuring the dignity of the individual and the2 [unity and integrity of the Nation];
IN OUR CONSTITUENT ASSEMBLY this twenty-sixth day of November, 1949, do HEREBY ADOPT,
ENACT AND GIVE TO OURSELVES THIS CONSTITUTION.
1.

Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "Sovereign Democratic Republic (w.e.f. 3.1.1977)

2.

Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "unity of the Nation (w.e.f. 3.1.1977)

THE CONSTITUTION OF INDIA


Chapter IV A

FUNDAMENTAL DUTIES
ARTICLE 51A
Fundamental Duties - It shall be the duty of every citizen of India(a)

to abide by the Constitution and respect its ideals and institutions, the National Flag and the National
Anthem;

(b)

to cherish and follow the noble ideals which inspired our national struggle for freedom;

(c)

to uphold and protect the sovereignty, unity and integrity of India;

(d)

to defend the country and render national service when called upon to do so;

(e)

to promote harmony and the spirit of common brotherhood amongst all the people of India transcending
religious, linguistic and regional or sectional diversities; to renounce practices derogatory to the dignity of
women;

(f)

to value and preserve the rich heritage of our composite culture;

(g)

to protect and improve the natural environment including forests, lakes, rivers, wild life and to have
compassion for living creatures;

(h)

to develop the scientific temper, humanism and the spirit of inquiry and reform;

(i)

to safeguard public property and to abjure violence;

(j)

to strive towards excellence in all spheres of individual and collective activity so that the nation constantly
rises to higher levels of endeavour and achievement;

(k) who is a parent or guardian to provide opportunities for education to his/her child or, as the case may be,
ward between age of six and forteen years.

1.

Ins. by the constitution (Eighty - Sixth Amendment) Act, 2002 S.4 (w.e.f. 12.12.2002)

Preface
The national curriculum Framework, 2005, recommends that childrens life at school must
be linked to their life outside the school. This principle make a departure from the legacy of
bookish learning which continues to shape our systems and caused a gap between the
school home, community and the workplace.
The student workbook on information Technology (IT) is a part of qualification package
developed for the implementation of National Vocational Education Qualification
Framework (NVEQF), an initiative of Ministry of Human Resource Development (MHRD),
Government of India to set common principles and guidelines for a nationally recognised
qualification system covering the schools vocational education and training institutions,
technical education institutions, college and universities. It is envisaged that the NVEQF
will promote transparency of qualifications, cross-sect oral learning, student
qualifications, thus encouraging life-long learning.

The CBSE has developed materials (units) for the vocational qualification package in
IT/ITes sector for NVEQF levels 1 to 4; level 2 is equivalent to class X. Based on Nos
occupation related core competencies (Knowledge, skills and abilities) were identified for
development of curriculum and learning modules (units).
This student workbook attempts to discourage rote learning and to bring about necessary
flexibility in offering of courses necessary for breaking the sharp boundaries between
different subjects areas. The workbook attempts to enhance this endeavour by giving
higher priority and space to opportunities for contemplation and wondering, discussion in
small groups and activities requiring hands on experience.
Any suggestions, feedback from the readers for improvement in the future editions of the
volume shall be heartily welcomed.
Vineet Joshi
Chairman, CBSE

Information Technology Level -2

This student workbook, which forms a part of vocational qualification package for
students who have passed class IX or equivalent examination, was created by group of
experts. The IT-ITes skill development council approved by the national occupation
standards (NOS). The national occupation standards are a set of competency standards
and guidelines endorsed by the representatives of IT industry for recognized and
assessing skills and assessing skills and knowledge needed to perform effectively in the
workplace.

Contents
Preface
Acknowledgement
Networking Fundamentals
o

1
23

Digital Data Analysis - Advanced Operations on Spreadsheet


o

40

Advanced Digital Presentation


o

62

Digital Content Creation - Web Designing Fundamentals (HTML)


o

79

Computer Systems Care


o

103

Information Technology Level -2

Digital Documentation - Advanced Word Processing


o

Unit Code

Unit Title

ITCC-201

Networking Fundamentals
Evolution of Networking and Need for Networking
Transmission of Data through different Switching Techniques
Data Communication Terminologies
Transmission Medium and Network Devices
Network Types and Layouts

ITDC-202

Digital Documentation - Advanced Word Processing


Reviewing and editing documents with Track Changes
Connecting Data from Spreadsheet with the Document using
Mail Merge Feature

Information Technology Level -2

Object Embedding and Linking


Language Correction
Securing Document
ITDC-203

Digital Data Analysis - Advanced Operations on Spreadsheet


Managing Multiple Spreadsheets and Workbooks
Organising and handling Spreadsheet Data
Creating Charts
Creating and Using Macros
Securing Spreadsheets

ITDC-204

Advanced Digital Presentation


Standardization of Slides
Multimedia Components in Presentation
Using Tables
Using Charts
Presentation Delivery
Securing Presentation

ITDC-205

Digital Content Creation - Web Designing Fundamentals (HTML)


Basics of Webpage and HTML
HTML - Basic Tags
Paragraphs and Tables
Web Page Layout
Forms
Multimedia Content in WebPages

ITOC-206

Computer Systems Care


Hardware Safety and Security
Software Safety, Security and Care

Information Technology Level -2

Unit -

Networking Fundamentals
1.1 Evolution of Networking and Need for Networking
As you know, networking is widely used for accessing and sharing information;
examples include web browsing, downloading & uploading, file sharing, printer
sharing, etc. Today networking is popular with private and business users across the
globe.
In today's world, it can be extremely difficult to live without networks, since resource
sharing (printers, shared folders etc) and Internet connectivity have become an
integral part of our daily activities.

computers and other hardware components interconnected by communication


channels that allow sharing of resources and information.
Networking is widely used for sharing of resources and information & for
communication purposes. Networks can also help in reducing costs; for example you
can buy a single printer and share it across multiple users.
Network consists of one or more computers or devices connected in order to provide
and access resources. Resources include a range of devices (example, Printer,
CDROM, Hard Drives, etc.) and services (example, web service, mail service, etc.).
Networks based on size are classified into LAN & WAN.
o
LAN: Local Area Network refers to group of computers networked within a

Information Technology Level -2

A computer network, often simply referred to as a network, is a collection of

limited geographical area such as schools, colleges, offices, etc.


o
WAN: Wide Area Network refers to computers networked across geographical
areas, in other words they connect LAN's between different locations. For
example, computers or devices in a branch office could connect to the computer
networks at the head office through telephone lines or satellites.
This session introduces you to the basic fundamental concepts of networking and
Internet and using different types of Internet connection.

Ways to form a computer Network


There are several ways to form a network as listed below:
o
Use a cross-over cable (also referred to as Peer-to-peer cable)
o
Use Serial and Parallel ports
o
Use Bluetooth
o
Use Wi-Fi (for more than two computers)
o
Use Hub or Network Switch (for more than two computers)
o
SOHO Router or Wi-Fi Router (Commonly found in home & small business
networks)
Networks are designed using the following architecture:
Peer-to-peer (P2P)

Information Technology Level -2

Networks in which all computers have an equal status are called peer to peer
networks. Generally in such a network each terminal has an equally competent CPU.

Peer-to-Peer Network

Client- Server
Networks in which certain computers have special dedicated tasks, providing
services to other computers (in the network) are called client server networks.
The computer(s) which provide services are called servers and the ones that use
these services are called clients.

Client-Server Network

Note: Clients are referred to as "Service Requestors" and Servers as "Service Providers".
Any machine that request a service is called as the client and machines that fulfill the
requests is called the client.

Networks can have a combination of both Client/Server models and Peer-to-Peer.


For example, you may be using a centralized mail server and/or access files from
other machines in the network.
Internet
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite to serve billions of users worldwide. It is a network
of networks that consists of millions of private, public, academic, business, and
government networks.

Intranet
Intranet refers to private computer network used by organizations for sharing
resources; Intranets can be simple within a building or very large spread across the
globe connected through various networking technologies. Intranets help employees
of an organization to locate information much faster resulting in increased
productivity. Though popularly referred to a company's internal website or portal,
Intranet usually employs other protocols such as POP3, SMTP, FTP, etc. and may even
offer a variety of services (you will read more about these in later sessions).
Extranet

Information Technology Level -2

Internet is one of the most useful technologies of modern times which help us in our
daily, personal and professional life. Internet is widely used by students, educational
institutes; scientist and professionals to gather information for research and
general information. Businesses use the Internet to access complex databases
such as financial database. The Internet is the largest encyclopedia for all age
groups. The Internet helps in maintaining contact with friends and relatives
who live across different locations via Internet chatting systems and email
software. Internet is also becoming a major source of entertainment for the general
public.

Extranet is a computer network used outside the Intranet. For example, an


organization may allow a vendor to view or access their resources such as their
internal website for updating a product catalog or training material. However, this is
highly restricted to Internet users (public). Extranets are usually accessed using
VPNs (you will read more about this protocol later).
World Wide Web
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a

system of interlinked hypertext documents accessed via the Internet. With a web
browser, one can view web pages that may contain text, images, videos, and other
multimedia, and navigate between them via hyperlinks.
Information is stored on web servers referred to as web pages are retrieved by using a
web browser such as Firefox on the local computer. A Web Browser is software used
to view websites and acts as an interface between the user and the World Wide Web.
A Web server is a computer that stores web sites and their related files for viewing on
the Internet.
Some of the advantages associated with networking are:
o
Data Sharing: One of the most important uses of networking is to allow the
sharing of data. Users can send text files, spread sheets, documents,
presentations, audio files, video files, etc. to other users.

Information Technology Level -2

o
Hardware Sharing: Hardware components such as printers, scanners, etc.
can also be shared. For example, instead of purchasing 10 printers for each user,
one printer can be purchased and shared among multiple users thus saving
cost.
o
Internet Access Sharing: You can purchase a single Internet connection and
share it among other computers in a network instead of purchasing multiple
Internet connection for each computer. This is very commonly found in
Internet caf (browsing centres), schools, colleges, companies, etc.
o
Usage of network based applications such as web browsers, email clients,
chat application, audio & video calling, etc is another advantage.

Data Transmission methods


Data can be transferred over a network using the following techniques:
o
Circuit Switching: In this method, a dedicated path is established between the
endpoints before the data is transferred. Once a dedicated path is established, no
other devices can use the circuit. Example: Dial-Up, ISDN.
o
Packet Switching: In this method, data is divided into blocks referred to as
packets. Multiple packets can be sent via different paths allowing more than two
devices to communicate at the same time. Modes of operation can be
connectionless or connection-oriented.

?
In connectionless mode, packets have source & destination address for
routing that may take different paths. Example: Ethernet, IP, UDP.
?
In connection-oriented mode, connection is defined (a virtual circuit is
created) before a packet is transferred. Packet switching supports variable
packet sizes. Example: X.25, Frame Relay, TCP.
o
Cell Switching: Cell switching method is similar to that of packet switching but
has a fixed size for the cells transmitting data. Cell switching is efficient when large
amounts of data need to transferred. Example: ATM.

Data transfer on the Internet


Having talked of data transfer and the Internet, have you ever wondered how sitting
in one corner of the world, you get information from another distant area in a
few seconds?

o
The data is broken up into bits of same sized pieces called packets.
o
A header is added to each packet explaining where the data has come from,
where it should end up and where it fits in with the rest of the packets.
o
Each packet is sent from computer to computer until it finds its destination.
Each computer on the way decides where next to send the packet. All
packets may not take the same route.
o
At the destination, the packets are examined. If any packets are missing or
damaged, a message is sent asking for them to be re-sent. This continues until
all packets have been received intact.
o
The packets are now reassembled into their original form. All this done in
seconds! To access the Internet, you need an active internet connection. You
need to gather and understand your requirement carefully before subscribing
to an internet connection plan. In this exercise, you will learn how to
choose an Internet connection.

Information Technology Level -2

In very simple language, let's see what happens to a piece of data, say a Web page,
when it is transferred over the Internet:

Some of the common questions that help you in your decision are:
o
What is the purpose of getting this connection?
o
Will you use the connection regularly?

o
How much data will be downloaded on an average per month?
o
How much speed do you need?
o
What technology is available in your particular area?
o
What are the different plans available from the ISP?
o
Is there any limitation or catch for the selected plan?
To access Wi-Fi, you need an access point with an active Internet connection.
Usually when you subscribe to an Internet connection, the ISP provides options
to purchase or rent a Wi-Fi router that can act as both an internet connectivity
device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network
requires technical expertise; however, you can access the Wi-Fi network by
connecting to an access point that is already setup for use. On computers that run
Windows XP, you can view the list of wireless networks available by using the

Information Technology Level -2

following procedure:
o
Right-Click on the Wireless Icon in the system tray and Click View Available
Wireless Networks.

Windows XP will display the list of available Wi-Fi networks; you can choose any of
the connection from the list. Select by Double-clicking on the name displayed in
the list.
Note: You may be prompted to enter a password if the selected network is secure. You
will receive a confirmation that you are connected to a wireless network. Now the
system is ready to be used for network related applications such as Firefox, Chrome,
Skype, etc.

Terminolgies and Technologies


Signaling Methods
In a network, communication happens between devices or computers through
electrical, optical or radio-wave signals. Methods of signaling are widely categorized
into baseband and broadband.
o
Baseband: Data is sent as digital signals by using entire bandwidth of the media
(Single Channel), supporting single communication at a time. Signals are sent
over co-axial, twisted pair or fiber optic cables. Baseband supports higher
transfer rates as compared to broadband; however, baseband is limited with
distance. Baseband uses TDM (Time Division Multiplexing) to send multiple
signals over a single cable. Example: Ethernet, Token Ring & FDDI.

Single Channel

Frequency

C1

C2

Frequency

Baseband vs. Broadband

Channel Operation
Channel operation refers to the mode of communication between connected devices
or computers. Channel operation can be simplex, half-duplex or fullduplex. Simplex is
a one way communication, similar to that of a radio. Halfduplex is a two way
communication but only one way at a time, similar to that of a walkie-talkie. Fullduplex is two way simultaneous communication (data can be received and sent at the
same time), similar to that of a telephone.

Information Technology Level -2

o
Broadband: Data is send as analog signals by using portion of a bandwidth.
Broadband supports use of multiple signals at different frequencies (multiple
channels). Signals are split into channels by using FDM (Frequency Division
Multiplexing). Example: xDSL, where telephone lines are used for both voice
(telephone) calls and data (Internet connectivity).

Multiple Signaling Methods


When multiple devices or computers are connected in a network, they use multiple
signals that are combined at the source and separated at the destination by use of a

technique called multiplexing. For multiplexing, a device called the multiplexer is


used for multiplexing / demultiplexing signals. Types of multiplexing include:
o
TDM (Time Division Multiplexing) is a method in which multiple signals are
combined and send over a single transmission media such as wires or radio
waves. This is achieved by use of time sharing; multiple signals are transmitted
for a defined amount of time in cycles. For example, a device sends and receives
signals every alternate second.
o
FDM (Frequency Division Multiplexing) is a method in which multiple signals
are transmitted at different frequencies. Multiple signals can be sent at the same
time over a single channel using this technique. For example, a device sends
multiple signals at the same time using different frequencies similar to that of a
radio (FM) or cable TV and the end device receives by tuning in to a particular
channel.

Information Technology Level -2

Getting access to the Internet


To use the Internet, you need an Internet connection. Internet connections are
provided by Internet Service Providers such as Bharat Sanchar Nigam Limited
(BSNL), Airtel, MTS, Vodafone, Tata Docomo, etc.
Internet Service Provider
An Internet service provider (ISP) is an organization which provides you with
access to the Internet via a dial-up (using modem) or direct (hard wired) or
wireless connection.
Choosing connectivity depends on the availability of a particular technology,
speed and connection type in your area. Usually small and medium business
users, home users use connectivity types such as DSL, cable modem, dial-up,
broadband wireless, WiMAX or 3G. Medium to large business users or customers
with more demanding requirements may use high speed connectivity such as
DSL (High Speed), ISDN, etc.
Modem
modem is a device that converts digital computer signals into a form (analog
signals) that can travel over phone lines. It also re-converts the analog signals back
into digital signals. The word modem is derived from its function MOdulator/
DEModulator.

Channel Access Methods


Channel access methods refer to how devices communicate using a shared medium
such as bus networks, star networks, ring networks, hub networks & wireless
networks. When multiple devices or computers are used in a shared medium, a predefined method of transmission needs to be defined. Channel access methods in
circuit switching networks include FDM, TDM, etc and in packet switching networks
include CSMA/CD, CSMA/CA, Token passing, etc.
Ethernet

CSMA/CD
CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as per IEEE 802.3
standard is a mechanism that defines how transmission takes place in a network.
Only one device in the collision domain may transmit at any one time, and the other
devices in the domain listen to the network before sending any packets in order to
avoid data collisions. Collisions also decrease network efficiency on a collision
domain. If two devices transmit simultaneously, a collision occurs, and both devices
device will wait for a random amount of time before attempting to transmit again.
Collision domains are found in a hub environment where each host segment connects
to a hub that represents only one collision domain and only one broadcast domain.
Modern wired networks use a network switch to eliminate collisions. By connecting
each device directly to a port on the switch, either each port on a switch becomes its
own collision domain (in the case of half duplex links) or the possibility of collisions is
eliminated entirely in the case of full duplex links. Collision domains are also found in
wireless networks such as Wi-Fi.; CSMA/CA is used in wireless networks.

Information Technology Level -2

Ethernet is a family of computer networking technologies for local area networks


(LANs) and has largely replaced competing wired LAN technologies. Ethernet
standard defines how communication happens between network interface cards,
hub, switches, repeaters, etc. Devices on Ethernet networks use frames or Ethernet
frames for communication. IEEE 802.3 standard defines the Media Access Control
(MAC) portion of the data link layer and the physical layer of the OSI model. Ethernet
protocols are covered by this standard.

CSMA/CA
Carrier sense multiple access with collision avoidance (CSMA/CA) is a network
multiple access method in which nodes attempt to avoid collisions by transmitting

only when the channel is sensed to be "idle". It is particularly important for wireless
networks, where the collision detection of the alternative CSMA/CD is unreliable due
to the hidden node problem.
Token Passing
Token passing is a channel access method where a signal called a token is passed
between nodes that authorize the node to communicate. The most well-known
examples are token ring and ARCNET.
Addressing methods

Information Technology Level -2

When multiple computers or devices are connected in a network, signals can be


addressed as unicast, multicasts or broadcasts. Unicast refers to one-to-one
communication, for example signal is sent from one computer to another.
Multicast refers to one-to-may communication, for example signal from one
computer or device is sent to selective set of computers or devices. Broadcast refers
to one-to-all communication, for example single from one computer or device is sent
to all devices and computers in a network.
Types of Common Internet Connectivity
There are different types of Internet Connectivity available today; it can be widely
categorized into wired and wireless access. Following table is a summary of different
types of Internet connectivity categorized into wired and wireless:
Technology

Type of Connectivity

Dial-Up

Wired

DSL

Wired

Cable Internet Access

Wired

3G

Wireless

WiMAX

Wireless

Wi-Fi

Wireless

Some of the commonly used Internet connectivity are:


Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities
of the public switched telephone network (PSTN) to establish a connection to an
Internet service provider (ISP) via telephone lines using a device called MODEM.
Users dial a particular number provided by the ISP and gain access to the Internet.

10

Dial-up connections are extremely slow and in most cases, it is replaced by a high
speed connection such as DSL or Cable Modem.
DSL: Digital subscriber line(DSL) provide Internet access by transmitting digital data
over wires of a local telephone network. DSL service is delivered along with wired
telephone service on the same telephone line. On the customer premises, a DSL
filter removes the high frequency interference, enabling simultaneous use of the
telephone and data transmission. For using a DSL connection, you need a DSL modem
and a subscription.
Cable Internet Access: Cable Internet Access is a form of broadband Internet access
that uses the cable television infrastructure. Cable Internet Access is provided
through existing cable TV networks; this is similar to DSL that is provided over
existing telephone lines.

WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless


communications standard designed to provide mobile broadband connectivity
across cities and countries through a variety of devices. WiMAX is a long range
system, covering many kilometres and is typically used where DSL or Cable
Internet Access cannot be used; this could be difficulty in laying out cables for home
or offices located in remote locations but need access to the Internet.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as
computers or mobile phones to exchange data wirelessly over a network, including
high-speed Internet connections. Wi-Fi devices such as personal computer,
smartphones, video game console, etc. can connect to a network resource such as
Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used
here cables cannot be run (such as old buildings, outdoor areas) to provide network
and Internet access. Wi-Fi can also be used where users require mobile connectivity.

Information Technology Level -2

3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and
mobile telecommunication services and networks. High-Speed Downlink Packet
Access (HSDPA) is 3G mobile telephony communications protocol that allows higher
data transfer speeds and capacity. If support for 3G is available on your mobile phone,
you can subscribe to the 3G connectivity with your ISP in order to get high speed
Internet connection on your phone.

Wi-Fi connectivity is used in home & offices, hotels, college & school campus typically
for Internet Access. Shopping malls, coffee shops, resorts mostly offer free or paid WiFi access to the Internet for their customers.

11

Types of Cables for Internet


Twisted-pair Ethernet cables can be wired "straight-through" or "Crossover".
To connect a network interface card to a switch, hub or router, straight-through or
patch cables are used.
To connect similar devices (network interface card on computer to another network
interface on another computer, hub to hub or switch to switch), crossover cables are
used.

Information Technology Level -2

Fiber Optic: A fiber optic cable is a cable containing one or more optical fibers. FiberOptic cables are ideal for transmitting data over very long distances at great speeds as
light is used for the medium for transmission. Fiber optic cables are not susceptible to
any EMI, Near-end Crosstalk (NEXT), or Far-end Crosstalk (FEXT).
Note that you require special network interface cards & network switch that support
the fiber optic interface which is usually expensive and common only in large
enterprise networks or locations that are susceptible to EMI such as factories that
use heavy machineries.
Fiber-Optic cables consist of a high quality glass or plastic strands and a plastic jacket
made of Teflon or PVC that protects the cable.
Two types of Fiber-Optic cable exist: Single-Mode Fiber (SMF) used for longer
distances and Multi-Mode Fiber (MMF) used for shorter distances. Signals are
transmitted as light signals from source to destination. Either LED or Laser is used. In
multi-mode fiber, light signals are transmitted in numerous dispersed path (singlemode fiber use single light source) and making it un-suitable for long distance
transmissions.

1. Core, 2. Cladding, 3. Buffer, 4. Jacket

Fiber Optic Cable

In some cases, plenum rated cables are used that have a special jacket to protect
against fire and emit less smoke than normal cables. However, this is rare and often
seen only in industrial or manufacturing sites.

12

Network Hardware
TCP/IP Utilities
On computers that have support for networking, a list of utilities is available to
configure and troubleshoot network related issues. Often referred to as TCP/IP
utilities, these utilities are bundled along with the operating system. Though the
names of the utilities could vary in spelling, the underlying function is almost the
same across operating systems. Given below is a list of utilities (with simple
description) You will learn more about them in later sessions.
Utility

Description
Internet Protocol Configuration Utility

GETMAC

View MAC or Physical Address of an NIC

PING

Test network connectivity

TRACERT

Trace Route from source to destination

ARP

Resolve IP address to MAC address

Host name

View computer name or hostname

NETSTAT

View TCP/IP statistics

Nbtstat

View NetBIOS over TCP/IP statistics

Nslookup

View DNS related information

Route

View or modify routing table

Pathping

Trace packets and view detailed packet information

Note: Use /? for additional help/syntax for each command listed here. For example to
know more about IPCONFIG, type IPCONFIG /?
Network devices such as NIC, hub, bridge, switch & routers are devices that help
computers to network and communicate. There are a variety of network devices
equipped with a wide range of functions.

Information Technology Level -2

IPCONFIG

Network Interface Card (NIC)


Network cards are devices that connect computers to the network. Network cards are
both Layer 1 (Physical) & 2 (Data Link) devices as they provide physical access to the
medium and also provide physical addressing through the MAC Address.

13

Network Interface Cards are available for desktop, laptop and server computers.
A variety of interface such as PCI, CardBus, USB are available today. Most desktops,
laptops, servers and motherboards have built-in NIC.

PCI Ethernet Card for use


in Desktops

Cardbus Ethernet Card for


use in older laptops

USB Ethernet Card


(USB Ethernet converter)

Lab
View Network Interface card installed on a computer

Information Technology Level -2

Hub
A hub is a device that connects multiple computers using a twisted-pair cable. Hubs
operate at Layer 1 (Physical). The number of computers that can be connected to a
hub depends on the number of ports available (typically 4 to 8). Whenever it receives
data from one port, the hub broadcast data to all the devices connected to it, leading
to collisions. Hence hubs are referred to as multiport repeaters. Since the evolution of
SOHO routers and network switches, hubs are rarely used and considered obsolete.
Bridge
Bridge is a device that can connect network segments and separate network traffic
based on broadcasts. Bridges examine the frames and selectively transfer frames
according to their MAC address. Bridges operate at Layer 2 of the OSI Model.
Switch
Switch is a device that allows multiple computers to be connected using twisted pair
cable. Switches (operating at Level 2 - OSI) manage traffic based on MAC (Media
Access Control) addresses and are efficient in large networks. Switches are
intelligent as they can build a table of MAC Addresses of all the devices connected to
ports on the switch and create a virtual circuit for each attached device. Once a packet
is received, it is analyzed and forwarded to only the destined station with matching
MAC address based on the table.

14

Using switches can eliminate collision as each port in the switch acts as a collision
domain. Since switches isolate collision domains, they are referred to as multiport
bridges. When forwarding frames, switches use Store and forward, cut through,
Fragment free or Adaptive switching methods.
Unlike a hub that uses half-duplex communication, a network switch can send and
receive at the same time (full-duplex mode) resulting in faster performance.
Number of computers that you can connect to a switch depends on the number of
ports available (Typically 4 or 8 on SOHO switches designed for use in home and
small business networks and 8 - 32 or 64 on switches designed for use in an
enterprise network.). The networks can be extended by adding additional switches
usually cascaded from the primary switch. Switches designed for larger networks are
cascaded through a special port called the Uplink port.

Information Technology Level -2

Simple Small Office Home Office Network Setup

An Enterprise network with a variety of networking devices

15

Categories of switches include:


o
Unmanaged switches are network switches used typically for homes or small
offices requiring no administrative configuration.
o
Managed switches are widely used in enterprise networks and ISP's. These need
to be configured by the network administrator before it is used in a network.
VLAN
A single layer-2 network can be partitioned to create multiple distinct broadcast
domains, enabling data to be exchanged only between the computers within the
domain. This is referred to as VLAN or Virtual LANs. This is created for two primary
reasons:
o
to reduce collisions

Information Technology Level -2

o
to implement security.
For example if all the computers in an organization are connected to a single switch,
you can isolate them by creating VLAN's for each department resulting in restricted
access across departments with maximum access between computers within
departments. VLANs can be configured only on Managed switches.

VLAN 1, Marketing Team

VLAN 2, Finance Team

Separate VLANs for marketing & finance team connected to a single switch

Power over Ethernet


PoE describes a standardized system to provide electrical power supply through
Ethernet cables; generally, UTP cables carry only signals necessary for data
communication. Switches that have support for PoE are generally expensive and in
some cases only limited number of Ethernet ports are capable of supporting PoE.
Advantages of PoE include the ability to provide power up to 25 watts and distance
factor that allows devices to be connected up to 100 meters from the switch.

16

Router
Routers are Layer 3 devices that allow packets to be routed to different logical
networks. Routers can discover and transfer packets based on routing table that are
pre-determined or self-discovered. Routing tables are either managed by an
administrator by manually defining the routes or automated through special
configuration to exchange the routing tables with other routers on a logical network.
Most common type of routers includes the SOHO router used at home or small office
for sharing Internet connection; sophisticated routers are widely used in enterprise
networks and ISP's. Similar to SOHO switches, SOHO routers do not need to be
configured and routers designed for use in large networks require to be configured
before they can be used.

Enterprise Router

In general, a combination of several routers and switches are used in large networks.
Notable manufacturers of routers include Cisco, Nortel Networks, Avaya, HP, Dell,
Huawei, etc.
Routing
Routing is the process of selecting paths in a network when sending or receiving
packets across computers or devices. Imagine if you are planning to send a parcel to
someone; the parcel will travel through different offices, change routes if roadblocks
are detected and finally be delivered to the recipient. Similarly when you browse the
internet or send an email, packets take different routes (from your computer to your
ISP, from your ISP to the next ISP, etc.) until it reaches its destination.

Information Technology Level -2

SOHO Router

SOHO Router
Also referred to as a residential gateway, SOHO (Small Office Home Office) routers are
devices designed for use in small to medium sized networks. Most SOHO routers have
combinations of a switch, DSL or cable modem and an access point for Wi-Fi
connectivity. These devices are used for two primary purposes:
o
Connecting desktops & laptops across home or office.

17

o
Sharing a single Internet connection across desktops & laptops.
Some models include support for connecting peripherals such as printers, USB hard
disk drives, etc. through USB ports.

Wireless Networking
Introduction to Wireless Networking, RF Communication
Wireless network refers to a computer network that is not connected by any cables.
Typically Wireless networking is used where wired connectivity is not possible or
feasible due to technology costs or availability. Wireless telecommunications
networks are implemented and administered using a transmission system called
radio waves. This implementation takes place at the physical level (layer) of the OSI
model network structure.

Information Technology Level -2

Types of wireless networks


o
Wireless personal area network (WPANs) interconnect devices within a
relatively small area usually within a person's reach. For example, usage of
Bluetooth to connect a mobile phone to a laptop.
o
Wireless metropolitan area network (WMANs) is a wireless network that
connects several wireless LANs. WiMAX is a type of Wireless MAN and is
described by the IEEE 802.16 standard.
o
Wireless wide area network (WWANs) is a wireless network that covers large
areas, such as one between neighboring towns and cities, or city and its suburbs.
This network can connect branch offices of business or function as a public
internet access system. The wireless connections between access points are
usually point to point microwave links using parabolic dishes on the 2.4 GHz
band, rather than Omnidirectional antennas used with smaller networks.
Omnidirectional antennas are types of antenna that radiates radio waves equally
in all directions. Omnidirectional antennas oriented vertically are widely used
for nondirectional antennas as they radiate equally in all horizontal directions.
Note: Though there are a variety of Wireless Networks, this course focuses only on
Wireless LAN.

Instant Messaging
Instant messaging (IM) is a form of communication over the Internet that offers an

18

instantaneous transmission of text-based messages from sender to receiver. Most


instant messaging software include the option for performing file transfers,
audio chat, video calling and conferencing, sharing desktops, etc. apart from
standard text chat. Instant messaging software is widely used for personal and
commercial use. In this session, you will be introduced to the concept of instant
messaging, the steps to create an instant messaging account and also work with
instant messaging software.
Unlike email, instant messaging happens in real-time and the response from
participants can be spontaneous. Some instant messaging software allows users to
view messages received when they are not logged on. These are called "Offline
Messages".
For utilizing audio and video chat or conferencing, you need to have
microphones and headsets or speakers and web cameras so that users can talk or see
each other.

o
Text Messages can be sent to one or more person (Similar to SMS)
o
Audio calling and conferencing.
o
Video calling and conferencing.
o
File transfers (Not limited to documents, spread sheets, audio files, video
files, etc.)
o
Message history (Save messages for future reference).
Instant Messaging Account
Participants messaging to each other need to be signed in to the same instant
messaging software. To use instant messaging software, a user must have a
valid instant messaging account.

Information Technology Level -2

Key features of an instant messaging are as follows:

Instant messaging accounts differ in formats; some instant messaging software such
as Yahoo Messenger, Windows Live Messenger use email addresses for managing
the account and software such as Skype use standard names.
Instant Messaging Services
There are two kinds of instant messaging software - application based and Web
based.

19

o
Application based instant messaging software is downloaded and installed on
user's computer. Some of the popular instant messaging software are:
?
Google Talk
?
Yahoo! Messenger
?
Skype
?
Windows Live Messenger
?
Rediff Bol, etc.
o
Web based instant messaging software is accessed using browsers such as
Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web
based instant messaging software are:
?
Meebo

Information Technology Level -2

?
Yahoo! Messenger for the Web
?
MSN Web Messenger
?
IMO, etc.
Creating an instant messaging account
In this exercise, you will learn to create an instant messaging account for using
Google Talk.
Google Talk is an instant messaging service that provides both text and voice
communication developed by Google Inc. Google Talk can also be used for
making video calls and to view updates from Gmail mailbox.
Google Talk is free and is available as application based (users need to
download and install Google Talk application to their desktops, mobiles or
laptops) and web based (users can use Google Talk through a browser after
signing into their Gmail account).
Before you start using Google Talk, a Gmail account is required. You have
learned how to create a Gmail account earlier. In this exercise, you will learn how to
use Google Talk.
Note: You need to download and install Google Talk application from
www.google.com/talk prior to this exercise.

20

Launching Google Talk


o
To launch Google Talk, Click Start >
Programs > Google Talk > Google Talk.
o
You can also double-click on the Google Talk
icon on the desktop if available.
You need to have a list of contacts that are available
for chat. If you don't have any contacts, you can add
their Gmail account to your contact list by sending
an invite.
If you don't have a Gmail account already you can create a new Gmail account.
Signing in into your Google Talk Account
To use Google Talk, you need to sign in with your account details.

Types of networks

Information Technology Level -2

After signing in into your Google Talk account, you should see a window similar to the
one displayed below. Now the Google Talk application is ready for use.

There are two major types of network Local Area Network (LAN) and Wide Area
Network (WAN).
Local Area Network
A local area network (LAN) is one which connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office
building, or closely positioned group of buildings.

21

Usually local area networks offer very high speeds and are used for connecting
computers and peripherals such as printers, scanners, etc.
Wide Area Network
A wide area network (WAN) is one which covers a broad area (i.e., any network that
links across metropolitan, regional, or national boundaries). The Internet is the
most popular WAN, and is used by businesses, governments, non-profit
organizations, individual consumers, artists, entertainers, and many others.

Online Transactions

Information Technology Level -2

Online shopping is a form of electronic commerce where customers can buy or sell
goods over the Internet. Customers need to have an active internet connection
for viewing goods or services offered by a seller; customers can pay online using a
credit, debit card.
Online shopping could be useful in situations when:
o
A customer does not have sufficient time to visit stores.
o
Visiting a store is more expensive than purchasing a product online.
o
A product or service that is not available in the local market is available
online.
Some of the popular online transaction websites are:
o
IRCTC, an online portal for booking flight and train tickets.
o
Flipkart, an online shopping portal for buying consumer products.
o
EBay, an online portal for buying and selling goods.
o
Redbus, an online portal for booking bus tickets.
To perform an online transaction, all you need is a web browser and an active internet
connection. In some cases where purchasing is involved, you will need a valid credit
card, debit card or online banking support referred to as Net Banking Subscription.
Some websites even allow COD (Cash on delivery) where the users can pay once they
receive the product or service.

22

Unit -

Digital Documentation
Advanced Word Processing
You have already learnt the basics of word processing. Now consider a situation when you
write a lengthy article that spans several pages, and you need to make it easier for the
readers to read it? Look at the following example:

Is the content presented above easy to read? Now, look at the formatted sample below:

Information Technology Level -2

What is Culture and Gender Sensitization? Culture in simple terms refers to our values,
the way we speak, behave, think, dress, religious beliefs, the music we like, our
interactions, and the food we eat. Diversity is a commitment to recognizing and
appreciating the variety of characteristics that make individuals unique in an
atmosphere that promotes and celebrates individual and collective achievement.
Many people mistakenly use such phrases as "Indian culture," "white/black culture," or
"Western/Eastern culture," to describe a particular culture but these people fail to
acknowledge the presence of cultural diversity, or the presence of multiple cultures
and cultural differences within a society. In reality, many different cultural groups
exist today in India and most developing and developed countries. Diversity in the
workforce means employing people without discrimination on the basis of gender, age
and ethnic or racial background. Since globalization is the current overwhelming trend
in business, diversity in the workplace is a better accepted and applied concept now
more than ever. There are different kinds of diversity that one encounters at the
workplace. These include diversity of gender, age, psychology, education, language and
culture.

What is culture and gender sensitization?


Culture in simple terms refers to our values, the way we speak, behave, think, dress,
religious beliefs, the music we like, our interactions, and the food we eat. Diversity is a
commitment to recognizing and appreciating the variety of characteristics that make
individuals unique in an atmosphere that promotes and celebrates individual and
collective achievement.

23

Many people mistakenly use such phrases as "Indian culture," "white/black culture," or
"Western/Eastern culture," to describe a particular culture but these people fail to
acknowledge the presence of cultural diversity, or the presence of multiple
cultures and cultural differences within a society. In reality, many different cultural
groups exist today in India and most developing and developed countries.
Diversity in the workforce means employing people without discrimination on the
basis of gender, age and ethnic or racial background. Since globalization is the current
overwhelming trend in business, diversity in the workplace is a better accepted and
applied concept now more than ever. There are different kinds of diversity that one
encounters at the workplace. These include diversity of gender, age, psychology,
education, language and culture.

Information Technology Level -2

Using paragraphs you can break continuous text to one or more sentences. This way, it is lot
easier for the readers to understand and enjoy the content. In this exercise, you will learn
to work with paragraphs and layouts.
Have you tried to make a professional looking resume? One important part of working with
a resume involves alignment. For the sake of both professional appearance and
accessibility, it is conventional for similar parts of a resume to all line up along the same
vertical axis. So that all the bullet points are aligned, and so are the headers, and sections.
You may come across situations where some bullet points don't line up, or where there are
many empty spaces that complicate editing and revising. So now what do you do?
1.

Open a new document in word processor. Click on the Page Layout tab on the Ribbon.

2.

Click on the icon under Paragraph group, as shown below.


Page Layout

3.

24

The Paragraph dialog box appears. You can see the options for automatic alignment,
spacing, etc. that you can setup while composing the document itself instead of doing
the alignment towards the end.

4.

Click on Tabs... button, Tabs dialog box appears.

5.

You can specify the tab stop position by mentioning the stopping position in the Tab
stop position box. After specifying the tab stop position click on Set button and the
Tabs window appears.
Note: You can also the set the initial tab stop position value from the default value (0.5")
by specifying the new value under Default tab stops. You may specify the value at
which the tab stops by giving the value specified along with the unit (like 7cm, etc.)

6.

Click OK. The ruler of the document will be marked with a L shaped symbol at 2",
meaning that the tab stop position has been set at that position. Now when you press
the tab key, the cursor will automatically jump from its initial position to the next tab
stop position. And this solves your problem too!

Information Technology Level -2

Note: You can also set the tab stop position by clicking at the required point on the
ruler. Now open a new document, type some text and press Enter. Notice that the
continuous text is automatically formatted as paragraphs, with the size that you have
specified in the Tabs Dialog box.

Managing Headers
Headers are text or images included at the top of the page. They usually contain important
information such as company or department name, logo, page numbers, name of the
author, etc. separated from the work or actual document area.
Look at the following example:

25

Information Technology Level -2

Notice the header in the above document; the title "Application From, June 2012" will be
included on all pages of this document. In this exercise, you will learn to include a header to
a document.
To understand and work with headers, open a new document in word processor
1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Header in the Header & Footer group, as shown below.
Insert

3.

Header

A drop down list appears which lists predefined header options (Figure below).
Now try inserting any of the predefined options from the list and observe the changes
at the header area of the document.
You can insert the page number at any position within the header area by selecting
the alignment option under Page Number. You can also change the number format
for page numbers by clicking Format Page Numbers... under Page Number options.
The Page Number Format dialog box appears as shown below.

26

You can insert date and time by clicking the Date & Time option available under
Insert Group. You can choose the date and time format from the available formats.

Managing Footers
Footers are text or image included at the bottom of the page and may repeat in all pages of
the document. The procedure for creating a footer is similar to that of headers.
For example, if you wanted to create a text book, you can include the name of the text book
using the headers and the page numbers using the footer option. This makes the document
look neat and organized.
To insert footer to a document, open a new document in Word processor
1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Footer in the Header & Footer group, as shown below.
Insert

Information Technology Level -2

You can also insert a picture or clipart within the header. This option can be useful in
situations when you need to insert company's or an event's logo. Try inserting a
picture or a clipart into the header using the Picture and Clip Art option under Insert
Group; observe the changes made to the document.

Footer

27

3.

A drop down list appears which lists collection of predefined Footer options.
Now try inserting date and time, page numbers, pictures and clip arts in the footer
area and observe the changes.

Managing Styles
Styles or Style sets are pre-defined or customized options used for creating good
looking professional documents with least efforts. You can find a number of styles
available within word processor that can be applied to a document. In this exercise, you
will learn to apply and manage styles.

Information Technology Level -2

To work with styles, open a new word document in word processor,


1.

To view list of styles, locate the Style group under Home tab (Figure below)

2.

If you would like to view the list of style sets available, point to Style Set under
Change Styles option. A drop-down with different styles will be displayed (Figure
below).

Select any of the styles listed by clicking it. The entire document will change to the
specified font or color automatically.

28

Document Template
Templates or document templates refer to a sample fill-in-the-blank document that
can help in saving time. Usually templates are customized documents that may have
sample content, themes, etc. For example, if you want to create a resume you can use a
resume template and modify only the sections that require changes.
In this exercise, you will learn to work with document templates.
To view sample templates available with your word processor,
1.

Go to File > New. You will be displayed with different types of templates (Figure
below). For example, if you would like to create a letter, you can select the Letters
option under Office.com Templates section.

Suppose you need to create certificates for a recently held competition, you can select the
Certificates option. You will be displayed with a list of Certificate templates.
Now select any of the templates by double-clicking on it.

You can also download other types of templates from websites. Some of the websites that
offer free templates are:
o
office.microsoft.com/templates
o
www.thepapermillstore.com
o
openoffice.blogs.com/openoffice/templates/
o
www.docstoc.com
You can visit the above mentioned websites to search, download and use a template that
suits your needs.
Creating a new document based on a template can save you time and effort because all the
work it takes to design the document has already been done. You may use the templates
that come with word processing software, or downloading templates created by
other people, or you can also create and save your own templates for future use. First
of all, you need to create a document that will serve as the template.

Information Technology Level -2

A sample certificate window similar to the one below appears. Now you can use this
template and customize the contents by replacing the school name, student name,
etc.

Note: You create the template as a normal document, but the magic step is where you save it.
Click on File >Save As, and give the template a name. Select Word Template from the Save
as type: drop down list.

29

Notice that there is a Templates folder within Microsoft Word. If you save your template
there, then we'll be able to see the template in the My templates category. So select that and
click Save.
Now to use the template, click on the File > New. Go to My templates, and as you scroll
down, you will find the file {your name}_Invoice , the template you just created. Select that
and click OK.
Notice that this is a new document and it's not the template. So, we've just created a new
document based on one of your own templates. Now when you save this document, it gets
saved as a normal .docx file.

Working with Page and Section Breaks


Page and Section breaks can be used to separate a document into sections.

Information Technology Level -2

If you would like to start a new page in a document,


you can use a page break.

30

To separate a section in a document, you can use the


section break. For example, you can lay out part of
a single-column page as two columns. You can
separate the chapters as separate sections in your
document so that the page numbering for each
chapter begins at 1. You can also create a different
header or footer for a section of your document.
For example, if you are creating a textbook and you
can create different sections for digital literacy,
word processing, spread sheets, etc.
To work with breaks, open a new document in the
word processor and type some contents. If you need
another fresh page, choose the page break option in
the Page Layout tab.
a)

Click on the Page Layout tab on the Ribbon.

b)

Click on the option Breaks in the Page Setup group (Figure below).

c)

A dropdown list with options for different types of breaks appears. An explanation is
given for each type of page or section break.

A page break can be inserted anywhere in a document to force the end of a page and the
beginning of a new one.
To create a new page, you can keep pressing enter and the cursor moves from line to line till
a new page starts. But if you add content to the previous page, the content of the new page
will automatically shift!
To avoid such problems, there is an easier method - use a page break and start a fresh page!
You may also use a page break when you want to be sure that a new chapter or sub-heading
automatically starts at the top of its own page.
Section breaks add flexibility to formatting your document. Using them, you can create
different headers and footers, different footnote numbering, change the layout of
columns, change page borders for different pages, and even change page layouts in the
same document! Using section breaks is like having mini-documents in one large
document.

You need to be able to see where your section breaks or page breaks are inserted in order
to see where the formatting stops and ends or to delete them. To see a section/page break,
click the Show/Hide button on the Home tab in the Paragraph section. The section/page
breaks are displayed in your document.
1.

Click on the section/page break.

2.

Press Delete on your keyboard and the section/page break is removed.

Anytime you need to add a page border to a single page or have a table in Landscape
orientation with the rest of the document in Portrait orientation, try using section breaks
to make the task easier!

Information Technology Level -2

A section break controls the formatting of the document content that precedes it, until it
reaches another section break. For example, if you have a 10 page document, with a section
breaks on page 3 and on page 8, the section break on page 3 controls the formatting of
pages 1, 2, and 3 while the section break on page 8 controls the formatting for pages
4 to 8.

Applying Character Formats


If you are creating a textbook with scientific content, you need to use special
formatting for some characters. Character formatting can be applied to a single
character or word.
In this session, you will learn to perform character formatting.

31

Working with character Formatting


To work with character formatting,
a.

Open a new document in word processor and type the following paragraph:
Water is a chemical substance with the chemical formula H2O. A water molecule
contains one oxygen and two hydrogen atoms connected by covalent bonds.
Water is a liquid at ambient conditions, but it often co-exists on Earth with its
solid state, ice, and gaseous state (water vapor or steam). Water also exists in a
liquid crystal state near hydrophilic surfaces. The density of water is 1,000 kg/m3.
Now to make changes, you may need to format the characters as shown below. You
will notice that some words of this paragraph are in bold, some are in Italics, some are
underlined, some are in colour and some are changed in its position
(superscript & subscript).

Information Technology Level -2

b.

In order to apply formatting to the contents in the document you must select the
concerned word or group of words.
Use the following options to make changes to a character or word:
Font Face: After selecting the text you need to click Font Name in the Font group to
select the particular font style from the fonts listed.
Font Size: After selecting the text you need to click Font Size in the Font group
to select the particular font size from the values given.
Water is a chemical substance with the chemical formula H2O. A water molecule
contains one oxygen and two hydrogen atoms connected by covalent bonds.
Water is a liquid at ambient conditions, but it often co-exists on Earth with its solid
state, ice, and gaseous state (water vapor or steam). WATER also exists in a liquid
crystal state near hydrophilic surfaces. The density of water is 1,000 kg/m3.
Grow Font: After selecting the text you need to click the A icon in the Font group to
make the font size larger than the current font size by the specified point.
Shrink Font: After selecting the text you need to click the A icon in the Font group
to make the font size smaller than the current font size by the specified point.
Strikethrough: After selecting the text you need to click the abc icon in the Font
group to make a strike through the middle of the selected text.
Subscript: After selecting the text you need to click the X2 icon in the Font group to
make the selected text lower than the normal text position.

32

Superscript: After selecting the text you need to click the X2 icon in the Font group
to make the selected text higher than the normal text position.
Clear Formatting: Clear Formatting is used to clear the character formatting (such as
Bold, Italics ,Underline, font face & size, superscript & subscript etc.) of the selected
text. To remove the character formatting, select the text and click on Aa icon in the
Font group.
Text Highlight Colour: Use this option to change the background colour. To do
so, select the text and click on ab icon in the Font group. You can choose the
background colour by clicking on the down arrow on the icon.
Font Colour: Use this option to change the colour of the text. To do so, select the text
and click on A icon in the Font group. You can choose the text colour by clicking on
the down arrow on the icon.

Sentence Case: On selecting this option from the dropdown list, the first character in
the first word of the selected sentence will be converted to Capital Letter
(Uppercase).
Lowercase: On selecting this option from the dropdown list, the selected text will be
converted to Small Letters (Lowercase).
Uppercase: On selecting this option from the dropdown list, the selected text will be
converted to Capital Letters (UPPERCASE).
Capitalize Each Word: On selecting this option from the dropdown list, the
first character in all the words of the selected sentence will be converted to Capital
Letter (Uppercase).

Information Technology Level -2

Change Case: Word processor helps us to change the text case to capital letters or
small letters. You can also capitalize each word in the sentence and capitalize the
starting word of the sentence using Change Case under Font Group. To do so, after
selecting the text you need to click the Aa icon in the Font group

Toggle Case: On selecting this option from the dropdown list, the small letters in the
selected text will be converted into capital letters and capital letters will be
converted into small letters.

Insert Graphical Objects and Illustrations


Often when you write a technical report, or a newsletter or even letter to friends, including
some form of graphics makes the document more interesting!

33

In a technical report, you may want to incorporate a graph of corporate performance or a


technical illustration. While in a newsletter or letter to family and friends, you enjoy
sharing memorable events that are represented by photos or maybe even cartoons. The
facility to blend these graphics into the document is part of the charm and power of every
major word processing program.
But not only can we blend graphic images into our message, but Word, WordPerfect and
OpenOffice also allow us to blend in other special features. These features are generally
known as "objects". These objects can be almost any form that can begenerated as a
computer file. Sounds, Music, drawings, documents spreadsheets, etc. are all examples of
possible objects that you can include in a document, or link to a document.

Information Technology Level -2

Note: Embedding an object makes it part of the document while linking an object does not
include the object file into the document files. Readers trying to access the linked object must
also have direct access to the separate file that forms that object. That may mean they have
to have access to your hard drive in order to see the linked object.
Most Word processors has support for inserting illustrations in the form of Clip Arts,
Shapes, pictures, charts, etc.
Clip Art can help in making a document look colourful and presentable. Clip arts are predefined images available for use in documents. For example, if you would like to create a
greeting card for your friend, you can use clip arts such as balloon, flowers, etc. along with
text message.
You can use the clip art gallery built-in within the word processor; you can also
download clipart from websites. Some of the websites that have free clip arts are:
o
www.openclipart.org
o
www.pdclipart.org
o
www.clker.com
o
www.freeclipartnow.com
o
www.wpclipart.com
In this exercise, you will learn to use Clip Arts.
To insert a clip art in a document,
a)

34

Open a new document in word processor


1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Clip Art in the Illustrations group (Figure below).

Insert

Clip Art

3.

The Clip Art Task Pane appears. Enter the clipart category name in the search box
and Click Go. For example, if you want to insert a logo, type logo in the search box
and Click "Go".

4.

Once you click Go (Figure 17), a window appears along with list of clip arts
matching the search keyword (Figure 18).

Now, you will learn to download a clip art from a website and use it in your document.
b)

To download a clip art from www.openclipart.org


1.

Open the web browser, Type www.openclipart.org in the address bar and press
Enter

You can use the search box available on the website for viewing the list of clip arts to
suit your needs. For example, Type School Bag in the search box and Click Search You
will be displayed with list of clip arts matching the keyword School bag, similar to the
one below.

Clipart search results for School bag

Information Technology Level -2

Select the clipart that you want to use, double-click on it and it will be inserted into
your document. Sometimes, you may need clip arts that may not be available within
the word processor application. In such cases, you can visit websites that offer
clip arts such as OpenClipart.org.

35

Now you can select the clip art you like, download it to your computer and insert it
using the photo option in the word processor.

Text Wrapping

Information Technology Level -2

You have learnt to insert graphics and illustrations in the last exercise. How do you want
the text to fit to the picture? Do you want a graphics to stand alone with text above it and
below it? Do you want the text to be along one side of the graphics? Do you want to have the
text message split so that part of the text is on the left side and then continue on the right
side of the graphics? Do you want the text to run right across the graphics? All these options
are possible depending on the text wrap options you choose.
What if the graphic image is too large, or too small? This is a problem you may face
when placing graphic images into a document. In all word processing software, if you
select the image (left mouse click on it) control handles will appear on the sides and on the
corners of the graphics. When you place your mouse on these handles, the cursor
changes to a double headed arrow and you can click and drag the handle in or out to
decrease or increase the size of the picture. In this exercise, you will learn to use text
wrapping.
Open a new word document and type the following:
Apache OpenOffice Writer is the word processor component of the OpenOffice
package. It is free and is available for a variety of Operating Systems including
Windows, Linux, FreeBSD and Solaris. It is capable of opening and saving documents in
a variety of formats.
You can either include a screenshot of the OpenOffice Writer or search for a picture in your
computer.
To take a screen shot, simultaneously press <Shift> and <Print Screen> keys. Place the
cursor on the right of the text and simultaneously press <Ctrl> and <V> keys.
To search for a picture, place the cursor before the text, click Insert Tab, and click
Picture under Illustrations. Browse for the picture and click Insert.
o
Once you have inserted the picture, you can wrap the text by using the Wrap Text
option under Text section of the Insert Tab after double-clicking on the picture
(Figure below). If you are working on Word, select the picture then select the
Text Wrapping dropdown arrow in the Arrange group under the Format tab.

36

Now try selecting different Wrap Text options such as Square, Tight, Through, etc.
and observe the changes made to the wrapping. A screen shot when the Square
option was used is shown below:

Inserting Objects
In addition to graphic images, to add a personal touch to a special message or to
illustrate a special feature, you may want to embed sound files or maybe even actual files
from other software applications in your document. For example, you can insert a PDF file
or a spread sheet within the word processor.
In this exercise, you will learn about inserting objects in a document.
To insert an object,
o
Open a new word document
o
Select Insert Tab

Information Technology Level -2

o
Click Object under Text section. A dialog box will be displayed, as shown in
figure 23.

o
Select Create from File Tab
o
Click Browse and select a file such as a spread sheet or a PDF document that is
available on your computer, Click Open and Click OK
o
Notice the document is available embedded within your word document.
Note: If you would like to edit the embedded document, double-click on it. It will
automatically open it for editing using respective application.

37

Now try inserting different types of document using the procedure mentioned above.
Note:
1.

The embedded objects cannot be printed.

2.

The person opening your document must have the relevant software loaded on
their computer to operate the embedded file.

3.

If you embed an object, the size of your document increases significantly and this may
cause problems in emailing the document as an attachment.

4.

If you link an object, the person opening that document must have a direct
connection to the original file location of the object.

Information Technology Level -2

Insert Shapes, Symbols and Special Characters

38

You can insert objects that have different shapes such as lines, basic geometric shapes,
arrows, equation shapes, flowchart shapes, stars, banners, and callouts using the shape
option.
In this exercise, you will learn to work with shapes in a word document.
To work with shapes, open a new document in word processor,
1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Shapes in the Illustrations group, as shown in figure 24.
Insert

Shapes

3.

Once you click the Shapes option a dropdown list with pre-defined shape such as box,
circle, etc. appears.

4.

You can select the shape from the list of shapes available and draw the shape by
dragging the mouse with the left button clicked. For example, if would like to insert a
square, select the box shaped item from the list, click and drag the shape to draw a
square.

Now try inserting other shapes from the list available and work with them by changing
colors or adding content inside them.
In some cases, you may need to insert special characters or symbols in documents such as
currency sign of a different country, copyright or trademark symbols, etc. In this exercise,
you will learn to insert symbols or special characters.
To work with symbols or special characters, open a new document in word processor.
1.

Click on the Insert tab on the Ribbon.

2.

Click on the option Symbol in the Symbols group, as shown in figure 25.
Insert

A dropdown list appears (figure 26).


Select a symbol from the list and double-click on to insert the symbol into the
document.
If you would like to view more symbols and special characters for inserting
into a document, click on the More Symbols option in the Symbols Dropdown list.

Information Technology Level -2

3.

Symbol

39

Unit -

Digital Data Analysis Advanced Operations on Spreadsheet


Use Autosum in Cells

Information Technology Level -2

You have learnt to navigate in a spreadsheet, populate cells, and perform calculations. As
you know, a spread sheet offers various mathematical functions to perform the
calculations. Sum is one of the functions available in the spread sheet to perform addition
of selected numbers in the sheet. In this exercise, you will learn how to use autosum
function to perform addition in a spread sheet.
Autosum is used for adding the values given in cells automatically without writing the
formula to perform the operation.
Open a new spread sheet and enter the following data.

Now to total the marks of each of the students, do the following:


o
Go to cell G2. While the cell G2 is selected, click on the AutoSum option available
under Editing Group in the Home tab.
AutoSum

40

o
The values in the cells from c2 to f2 will be automatically selected as shown below.

o
Press Enter.
?
The total marks of Abhas appears in cell G3.
?
Similarly, calculate the total marks of the rest of the students.

Now change the marks of one of the students in one or more subjects. The total marks
of that student will get calculated automatically. Automatic calculation of formulas is
one of the most powerful features of electronic spreadsheets.

Information Technology Level -2

Note: Autosum automatically selects the values around the cells either horizontally or
vertically. In the above example you want to perform addition of numbers listed from
left to right, after finding the total of two persons when you try to perform autosum for
another person the values on top of the current cell get selected. In that case, you have to
select the cell values that you want to perform addition.

Conditional Formatting
Conditional formatting allows you to change the formatting (font color, border,
shading) of the cells based on the values in it. Yes, you can do that manually, but it can be a
tiresome task if you have a huge amount of data. So, you specify a condition for the values

41

in the cell, and if the condition is satisfied then automatically the formatting of the
cell changes. This feature would be very useful if you were working on a profit and loss
spreadsheet, or a temperature variance spreadsheet, or a marksheet. You could
highlight cells that have values are greater than a defined rule with one color and those less
than another with a different color.
Basically, you can select one or more cells, and create rules (conditions) for when and how
those cells are formatted. The conditions can be, based on the selected cell's
contents, or based on the contents of another cell.
You can control the following formats:
o
Number format
o
Font, font style, and font colour (but not font size)
o
Fill colour and fill pattern

Information Technology Level -2

o
Border colour and border style (but not border thickness)

42

Open a new spreadsheet and enter the following data.

Now to apply conditional formatting for the data do the following.


o
Select all the cells you want to format conditionally.

Now to apply conditional formatting for the data do the following.


o
Select all the cells you want to format conditionally.

o
Click on Conditional Formatting option available under Styles group in the Home
tab. A drop down list appears.
Click on Highlight Cells Rules option, a submenu appears.

o
Specify the value in the box and click on the down arrow next to the with field and
select a predefined format for the condition from the drop down list. If you want to
highlight the cell contents with your own formatting style click Custom Format
option in the dropdown list.
o
A Format Cells dialog box appears. You can select a different font color under Font
tab, border style and color under Border tab and fill color under Fill tab.
o
Go ahead and create the data below and format it in the manner displayed.

Information Technology Level -2

o
Note: you can select the condition listed according to your needs. In this example
if you want to highlight the values that are greater than 75, select "Greater
Than..." available under the submenu. A dialog box appears.

Note: Similarly you can set various conditions for the selected value like less than,
equal to, between etc.

43

Information Technology Level -2

Optionally, you can also specify the cell address where the value is stored. This can be very
helpful as simply changing the value in one place can change the conditional
formatting all over the previously selected range. An example is shown in the figure
below.

44

The result is displayed below.

Hide / Unhide / Freeze Rows and Columns


Sometimes you have data in rows and columns which are needed for formulas or
charts, but you do not want the data to be visible. A very handy feature of a
spreadsheet is the ability to hide a row/column that is not to be shown to the end
user. The data in hidden row/column is available for calculations though not visible!
Freezing rows and columns is another helpful feature in a spreadsheet. When you are
dealing with a huge amount of data that spans several rows or columns, you may want the
headers to remain constant (frozen) while you scroll through the data so that you can see
the identifying names of the rows/columns.

Open a new spreadsheet. To hide a row or column, do the following:


o
In order to hide any row or column you can either select the particular row or column
that is to hidden or just one cell in the corresponding row or column (for example
B3).
o
Click on Format option available under Cells group in the Home tab.
o
A dropdown list appears as shown below.
o
Click on Hide & Unhide > Hide Rows. The spread sheet will be displayed as shown
below.
Note: Alternatively, you can select the row/column, right click and select Hide.
Note: In this example the cell in the 3rd row of the spread sheet was selected and then Hide
Rows option was selected. So, the 3rd row is hidden. What would have happened if you had
selected Hide Columns instead?

To freeze the rows or columns do the following.


o
Open a new spread sheet.
o
In order to freeze rows or columns click on Freeze Panes option available
under Window group in View tab.
o
A drop down list appears as shown below. Click on Freeze Panes. Doing so will
freeze all the rows above and all the columns to the left of the selected cell. Scroll your
mouse in the spreadsheet the frozen rows and columns remain constant.
Note: The panes are formed where your cursor is placed. Select the option again and notice
the change in the available options! Go ahead and try the other options too. You can also
freeze the entire row or column by selecting the entire row or column and click "Freeze
Panes" to freeze the entire row or column.

Information Technology Level -2

o
In order to unhide the row or column that is hidden you have to select any cells before
and after the cell that is hidden then click Unhide Rows in the Format option
available under Home tab.

Set Page Breaks


To print a worksheet with the exact number of pages that you want, you can adjust the
page breaks in the worksheet before printing it. This feature is very useful especially
when printing huge sheets. You can use the Page Break view to see how other
changes (e.g. changing row height/column width) affect the automatic page breaks.

45

In this exercise you will learn how to set page breaks in the spreadsheet. Open a new
spread sheet and create the sheet below. On the View tab, in the Workbook Views group,
click Page Break Preview.

Information Technology Level -2

Now to set the page break do the following.

46

o
To insert a vertical page break, select the row below where you want to insert the
page break. To insert a horizontal page break, select the column to the right of
where you want to insert the page break.
o
Click on Breaks down arrow under Page Setup group in the Page Layout tab. A
dropdown appears as shown below.
o
Click on Insert Page Break option. The spread sheet will be displayed as shown
below. The content you have typed comes in the first page and you can print it.
o
To move a page break, simply drag the page break to the desired location.

Note: You can also remove the page breaks by clicking the Remove Page Break option in
Breaks drop down list.
To return to Normal view after you finish working with the page breaks, click Normal in
the Workbook Views group under the View tab.

Set Page Layout


If you have a worksheet that contains a huge amount of data with many charts and you
want a professional looking printout, what would you do? Spread sheet software
provides various page layout options for organizing pages using the Page Layout option. In
this exercise, you will learn how to set the page layout options in the spread sheet
application. Open a new spread sheet.
To set the page layout options, do the following:
o
Click on Page Layout option under Workbook Views group on View tab. The
spreadsheet will be displayed as shown below. You can set the
Orientation
?
?
Page headers and footers
?
Hide or display grid lines
?
Size of the page
?
Define the print area
?
Specify the background
o
Click on Margins option under Page Setup group, a dropdown list appears as shown
in figure.

Information Technology Level -2

Margins
?

47

You can either select anyone of the predefined margin option available or else you can
o
define your own margin settings by clicking Custom Margins.. option.

Information Technology Level -2

A dialog box appears.

You can set the margin values manually from the options available under the dialog
o
box.
You can set the orientation of the page to either Portrait or Landscape by clicking the
o
Orientation option under Page Setup group in the Page Layout tab.
You can set the size of the page by clicking the Size option under Page Setup group in
o
the Page Layout tab.
You can specify the area to be printed by selecting the area and then clicking Print
o
Area option under Page Setup group in the Page Layout tab. A drop down list
appears as shown below.

Click on Set Print Area to set the selected to get printed. You can also clear the print
o
area by clicking the Clear Print Area option.
You can specify a background for your sheet using the Background option under
o
Page Setup in the Page Layout tab.

48

Manage Workbook Views


Spread sheet offers the users with variable views for the purpose of viewing the
outcome of the sheet while printing.
There are five types of views available in the spreadsheet.
o
Normal
o
Page Layout
o
Page Break Preview
o
Custom Views
o
Full Screen
You can select one of the above said views by clicking the appropriate option under
Workbook Views in the View tab.

Page Layout: You can select the Page Layout view in order to quickly fine tune a
worksheet that contains many charts or huge amounts of data and achieve professional
looking results.
Page Break Preview: This option is similar to the Page Layout option except you can set
the area that is to be set as a page after inserting page break.

Information Technology Level -2

Normal View: The default view of the spreadsheet application is the Normal. It's
acollection of cells arranged in the work area.

Custom Views: If you would like to view selected areas of a document, you can use the
custom view option. For example, if you would like to point out certain row and column,
you can add that to the Custom view.
Full Screen: Selecting this option makes the workbook cover the entire screen. All tabs are
hidden from view. To get back the tabs, click on File> Restore.
Additionally, in spreadsheet, you can open multiple windows that display the current
spreadsheet and then arrange those windows in a variety of ways. You can also open and

49

arrange multiple workbook windows.


To open a second instance of a workbook in a separate window:
o
Click the New Window button on the View tab, in the Window group.
To arrange multiple program windows:
o
Click Arrange All button in the Window group. An
Arrange Windows dialog box appears.
o
Click either Tiled, Horizontal, Vertical, or Cascade
options.
o
To include only windows displaying views of the current
workbook, select the Windows of active workbook check
box.

Information Technology Level -2

o
Click OK.

50

Apply Cell and Range Names


You can assign names to cells in a worksheet and use it for quickly locating specific cells
by entering the names. This could be useful when working with large spread sheets.
For example, if you have a lengthy list of groceries and prices, you can use names to
quickly locate and find total pricing of fruits from the entire list. In this exercise, you will
learn to work with cell and range names.
Open a new spreadsheet and enter the following (figure below):

Now to apply range names, do the following:


o
Select the cost against the cells that have Apple, Banana, Cherry, Grape, Guava,
Mango, Pineapple values (Keep the Ctrl key pressed and click on the cells - you
will be able to select selective cells together!). Right click and select Name a Range.
Alternatively, you can select Define Name under Defines Names group in the
Formulas tab.
o
A New Name dialog box appears prompting to enter a name. Enter Fruits in the Name
field and click OK (figure below).

Information Technology Level -2

o
Select the cost against the cells that have Cabbage, Cauliflower, Chilli, Cucumber,
Ginger, Potato, Pumpkin, Spinach, Tomato values. Right click define the name
Vegetables for this group.

If you would like to calculate the total cost of fruits from the list,
o
Select an empty cell
o
Type Total Cost of Fruits and in the adjacent cell, Type =SUM (Fruits) and press
Enter.
Notice the total cost of all items named as Fruits is displayed.

51

Create Modify and Format Charts


A chart is a graphical representation of data, in which the data is represented by symbols,
such as bars in a bar chart, lines in a line chart, or slices in a pie chart. A chart can represent
tabular numeric data, functions or some kinds of qualitative structures.
A Spread sheet enables you to create, modify and format charts based on the data given in
the spread sheet. In this exercise you will learn how to create, modify and format chart
using the spreadsheet.

Information Technology Level -2

Reopen the worksheet expenses_{your name}.

52

Now to create charts do the following.


o
Select all the expenses data.
o
Click on the chart type that you want from Charts group under the Insert tab.
o
After selecting the chart type the spread sheet will be displayed as shown below.

o
You can modify the chart values by making necessary modifications in the data table.

Chart has many elements; however, only some of the elements are displayed by default.
Following is an description of the elements used in the above chart:
Chart Area of the Chart

2.

Plot Area of the Chart

3.

Data Points that are plotted in the chart

4.

Horizontal and Vertical Axis in the chart

5.

Legend of the chart

6.

Chart and Axis Title used in the chart

7.

Data Label for identifying details of data point in the chart

Note: Once you insert a chart in the spreadsheet three additional tabs are available on the
Ribbon namely Design, Layout and Format. You can edit the chart, its design, layout
and formatting options using the three tabs available. You can change the chart type, chart
options etc. in the Design tab and can give the titles etc. in the Layout tab and set the borders,
colors and size of the option under Format tab.

Information Technology Level -2

1.

53

Choosing the right type of chart is very important. Different charts display data in very
different ways. Using the best chart type and format helps you to display data visually in
the most meaningful way.
Bar charts: A bar chart (horizontal bars) emphasizes the comparison between items at a
fixed period of time. This chart type also includes cylinder, cone, and pyramid
subtypes.
Column charts: A column chart, unlike a bar chart to which it is often compared,
emphasizes variation over a period of time. This chart type also includes cylinder,
cone, and pyramid subtypes
Line charts: A line chart shows the relationship of the changes in the data over a
period of time.
Pie charts: Pie charts contain just one chart data series. A pie chart shows the
relationship of the parts to the whole.

Information Technology Level -2

Area charts: An area chart shows the relative importance of values over time.

54

XY (Scatter) charts: Scatter charts are useful for showing a correlation among the data
points that may not be easy to see from data alone.

Sort and Filter Data


Sort is a feature that helps you arrange the selected data either in an ascending or
descending order. Filter is a feature used for extracting particular data using some
conditions. Spread sheet offers both these features for sorting and filtering data in the
spreadsheet.
Open a new spreadsheet and enter the following data:

Now to sort or filter the data do the following:


o
Select the data to be sorted and then click on Sort option under Sort & Filter group in
the Data tab. A dialog box appears as shown below.

o
You need to specify on what basis you are going to sort the data in the Sort by field and
select the order that is ascending and descending and then click OK.

To filter data, do the following:


o
Click the Filter option available under Sort & Filter group in the Data tab. Before
applying a filter you have to select the data along with the header as shown below.

Information Technology Level -2

For example, if you wanted to sort the data in Sales 2008, you would select the
relevant detail in the Sort by list and click OK. The spreadsheet would be
displayed as shown below. You can notice that the data has been sorted as per the
data in 2008 and also that values in the Sales 2008 field are arranged in
ascending order that is from smallest to largest.

55

Once you click on filter, the headers will be displayed with a down arrow as shown
o
below.

If you want to filter data that is greater than 75 in the Sales 2009 do the following.

Information Technology Level -2

Click the down arrow available under Sales 2009 header, a dropdown list
o
appears as shown below.

56

You can specify the filter by selecting the available values in the list.
o
You can also sort the filtered data by selecting Sort Smallest to Largest or Sort Largest
o
to Smallest option available in the dropdown list.
Click on Number Filters option under the dropdown list, once you click the
o
following submenu appears.

o
Here you can select the condition that you want to specify for the data in the list, If you
select Greater Than.. option the following dialog box appears.

The spreadsheet will be displayed as shown below. Notice that only data
greater than 75 is displayed under the Sales 2009.

Calculate Data Across Worksheets


Suppose you were working at the head office maintaining had data for six regions, and you
use exactly the same worksheet layout and labels to track the average sales of each
region over the previous quarter. Each sheet contains headings by region (such as
Region01, Region02 .. Region06), and in cell H15 on each sheet, the calculated totalsales
for the quarter appear. If you want to obtain the average sales over the quarter, what would
you do?

Information Technology Level -2

Specify the value that you want in the value box, (here it is 75) and click OK.
o

In this exercise you will learn how to perform calculations on data across different
worksheets.
Open a new spreadsheet. Name sheet 1 as year1 and type the following data.

57

Now to calculate the data across worksheets do the following.


o
Go to sheet 2, name it year2 sheet, and insert the same data in the Sheet2 for the next
year.

Information Technology Level -2

o
Go to sheet 2, name it Totals, and insert the same labels.
o
Type the sum formula in cell B2, =sum( , while the parenthesis is opened go to year1
sheet and go to year2 sheet and press Enter. Repeat the same step to calculate
sum for other expenses. Note the way the range is specified (sheetname!
cellnumber).

To answer the question raised earlier, you could create a new sheet, called Quarter
Summary. To find the average, enter the following formula in one of the cells in the
Summary sheet: =AVERAGE(Region01: Region06!H15)
Spreadsheet calculates the average for all values stored in H15 on all sheets in
the range Region01: Region06. If you move the Region06 sheet between Region04
and Region05, the software will adjust the calculation to include the sheets for
Regions01, 02, 03, 04, and 06; Region05 will be omitted. Similarly, if you delete or
add a sheet anywhere between Region01 and Region06, the software will include
all the sheets located within the range in its calculation.

58

Using Multiple Workbooks and Linking Cells


Spreadsheet also allows you to link the cells from various worksheets and from various
spread sheets to summarize data from several sources. In this manner, you can create
formulas that span different sources and make calculations using a combination of
local and linked information. You can link data from other spreadsheets and keep the
information up to date without editing multiple locations every time the data changes.
For example, you can display data from multiple departments for an overview of
details without sharing information between sources.
In this exercise you will learn how to link cells from different spreadsheet applications.
Open a new spread sheet and enter the following data:

o
Open a new spreadsheet workbook.
o
Type some formula, for example sum formula in any cell =sum(, while the
parenthesis is opened, click on Switch Windows option under Window group in the
View tab. A dropdown list appears with the active workbook names.

o
Click on Book1 to select the earlier spreadsheet you had created and select the cells
A2:D2.

Information Technology Level -2

To link cells from different worksheet do the following:

59

o
Press Enter. You are back on the second spreadsheet. The cell where you were
entering the formula has the total of the values in the first spreadsheet!. Note the way
the software gives the cell reference. If you update any values in the first
spreadsheet, automatically the sum value in the second spreadsheet is updated! Try
this out.

Information Technology Level -2

Sharing Worksheet Data

60

In most office settings, there is a shared drive where teams can store common files for
everyone to use. This usually leads to sighting of the message: "The document [filename] is
locked for editing by another user. To open a read-only copy of this document,
click"!! This message appears because someone else already has the file open. Sometimes
however, it is necessary to have multiple people working on a file at the same time. This can
be to either speed up data entry or simply make things easier for collaboration purposes.
Spreadsheet software allows the user to share the workbook and place it in the
network location where several users can access it simultaneously. In this exercise,
you will learn how to share a worksheet.
Open a new spreadsheet and type the following.

Now to share the spreadsheet do the following.


o
Click on Share workbook option under Changes group in the Review tab.
o
A dialog box appears as shown below.

o
Click OK.
Note: Most spreadsheet software automatically turn off some features in shared
workbooks. This is to simplify the workbook since multiple people can be working on the
file at the same time. For example, shared workbooks don't allow merging cells, conditional
formatting, or inserting pictures/graphs/etc.

Information Technology Level -2

o
Check the option Allow changes by more than one user at the same time. This
also allows workbook merging.

61

Unit -

Advanced Digital Presentation


Inserting a Movie Clip
Presentation allows the user to add movie clips to the presentation in order to make the
presentation colourful and meaningful. You can insert movies or YouTube videos
downloaded from the Internet.
In this exercise you will learn how to insert a movie clip in slides. Open a new file
using presentation software.
You can insert a movie in two ways:

Information Technology Level -2

o
Using Insert tab

62

o
Using Title and Content Layout Option
Click on Movie option under Media clips group in the Insert tab, a drop down appears as
shown below.

You can select the Movie from File option to insert the movie clip that you have
already downloaded from the Internet. A dialog box appears as shown below:

You can locate the movie clip and click OK to insert the same in the slide. The
presentation will be displayed as shown below.
You can set one of the two options available for playing the media clip, i.e
Automatically or When Clicked.
Alternatively, you can select Movie from Clip Organizer option to insert the movie clips
that are available under Clip Organizer. Doing so displays the clip art task pane as shown
below:

Using Layout Option


Open a new file using presentation software and change the layout of the slide.
Click on Layout option available under Slides group in the Home tab, a dropdown list
appears as shown below.

Information Technology Level -2

You can select any of the movies available and insert it in the slide. Once you have
inserted the movie clip in the slide, the presentation will be displayed as shown below.

63

Click on Title and Content option and a slide will be displayed with the layout as
shown below.

Information Technology Level -2

You can insert a movie in the slide by clicking the icon in the Layout option. Once you click
the icon, a dialog appears as shown below.

64

When you play the slideshow, the movie clip will be played automatically.

Inserting an Audio Clip


You can include audio clips to a presentation similar to that of videos. For example, you
can play mild background music while making your presentation. In this exercise you will
learn how to insert an audio clip in slides.
Open a new file using presentation software. Click on Sound option under Media clips
group in the Insert tab, a drop down appears as shown in figure 9.

You can select the Sound from File option to insert the sound clip. A dialog box
appears as shown below.

Working with Tables


Presentation software enables the user to add tables in the slides in order to represent the
statistical data meaningfully.

Information Technology Level -2

You can locate the audio clip and click OK to insert the same in the slide. You may
follow the same steps as you learnt while inserting a Movie Clip. There is an inbuilt clip
organizer for a list of sounds. You can access them via the Sound from Clip
Organizer option. Go ahead and insert an audio clip using this option.When you have
completed inserting the sound clip, and you play the slideshow, the audio clip will be
played automatically.

In this exercise you will learn to work with tables.


Open a new file using presentation software. You can insert a table in two ways:
o
Using Insert tab
o
Using Title and Content Option
Click on Table option under Tables group in the Insert tab, a drop down appears as
shown below.

65

Information Technology Level -2

You can have learnt to create tables in a word processor by dragging the mouse over
requisite number of boxes. Follow the same method here and create the table shown
below. Now go ahead and try the Insert Table and Draw Table options to create the
table.

Using Title and Content Option


Open a new file using presentation software and change the layout of the slide. To
change the layout of a slide do the following:
Click on Layout option available under Slides group in the Home tab, as you did while
selecting a movie clip. Click on Title and Content option from the dropdown list. You can
insert the table in the slide by clicking the
icon available within the layout.

66

Once you click the icon, a dialog appears as shown below.

Once you have inserted the table into the slide, additional tabs - Design and Layout -are
made available. You can use them for editing and formatting the table further.

You can change the design of the table by changing background, borders or effects by using
Table Styles group in the Design tab. To use a particular design, Select a design under
Table Styles group and double-click on it. If you would like to change a design, choose a
different design under Table Styles group and double-click on the new design.

Information Technology Level -2

Now enter the values for the number of columns and rows that you would like to have in
the table. For example, if you need a table with 3 columns and 3 rows, type 3 in both
Number of columns and Number of rows fields.

You have learnt to create a table in a presentation, but if the table already exists in a word
processor document or a spreadsheet, you can directly import it from there. To do so:
With a slide in edit mode, choose Object from the Insert menu.
o
In the Insert Object dialog box, click the Create From File option and click
Browse to locate and choose the document or spreadsheet that contains the table. By
default, the presentation software will insert the table.

67

o
When you click OK, the entire document or spreadsheet is imported to your slide.
Double-click the inserted text to remove extra text if the document contains more
than the table.
If you check the Link checkbox while inserting. On doing so, after you update the table
o
in the document or spreadsheet, then right click on the imported table in the
presentation software, and select the option Update Link , the embedded table
gets updated automatically.
Drag and drop the table on the slide to position it.
o

Working with Charts

Information Technology Level -2

Presentation software enables the user to insert charts in slides to present statistical table
data in a pictorial representation. This ensures that the audience can grasp complex
data at a glance.
In this exercise you will learn to work with charts. Open a new file using presentation
software. To insert a chart in the slide, click on Chart option under Illustrations group in
the Insert tab. A dialog box appears as shown below.

You will notice different type of the charts that can be used in the presentation. Select a
chart type and click OK. A default chart will be inserted on the slide. The default data
table for that chart will be opened in a spreadsheet application separately as shown
below.

68

You can edit the values in the spreadsheet and the presentation software will
automatically update the chart. Now enter the following in the spreadsheet window:
Day 2 Savings

Day 3 Savings

Arun

300

250

500

John

200

300

300

Jacob

150

500

600

Salim

500

750

150

Once you have modified the data table in the spreadsheet the chart in the slide gets
modified automatically and the chart will displayed similar to the one below.

Information Technology Level -2

Day 1 Savings

69

Now change the values in the spreadsheet and observe the changes in the chart.
You can change the colors and effects of the chart by using Chart Styles available under
Design tab. To change to a different style, select a style from Chart Styles and double-click
on it.
Some basic guidelines are as follows:
o
Convey one message per chart. Make the message the heading.
o
Make the chart easy to read. Label the X and Y axis and label the lines, bars, or pie
wedges. Make the most important text largest, the most important data lines or
sections darkest.
o
Make bars and columns wider than the spaces between them.
o
Be accurate. Always start a numerical axis at zero. Compare only like variables.

Information Technology Level -2

o
Eliminate all unnecessary details. Avoid grid lines, data points, boxes, etc. unless they
relate to the message.
o
Use a few (maximum four) colors per visual.
Importing a chart
You can also import a chart from a spreadsheet. The method is the same as importing a
table into presentation software. Since the entire sheet is imported, you may need to
maneuver around and display the chart in the embedded object. To increase / decrease the
size of the object, you can double click on it and resize it.

Inserting Transitions
Transition effects can help in increasing audience's interest during a presentation. A slide
transition is the visual motion when one slide changes to the next during a presentation. By
default, one slide simply replaces the previous one on screen, just like a slide show of
photographs would change from one to the next. Most presentation software provides
many different transition effects that you can use to liven up your slide show.
In this exercise you will learn to add transitions in the presentation. Open a new file using
presentation software and add contents to the presentation based on the guidelines
provided earlier. To work with transition effects, click the Animations tab. You will be
displayed with list of transition effects similar to the one below.

70

To apply, select an effect from Transitions to this slide group and double-click on it.
You can also increase or decrease the duration of the transition effect by setting up the time
interval (in seconds) in duration option under Timing group. Try setting the duration as 1
minute and observe the effect by performing the slide show.
You can set sound effects during transitions by selecting a sound scheme available in
Sound option under Timing group. Try using different sound schemes and observe the
sound effect by performing the slide show.

Note: A common mistake made is using too many transitions, or using one that doesn't fit well
with the subject matter. Try to find one transition that doesn't detract from the presentation
and use it throughout the show. Using too many makes your presentation looks amateurish.
A transition is the final effect to be given to your presentation so edit and arrange all slides in
the preferred order before setting them.

Inserting Animations
While transition occurs between each slide, animation allows you to put slide elements,
such as text and graphics, in motion within a slide! Animations are helpful way to make
your slides look more dynamic. Besides adding action, they help steer audience focus
and emphasize important points. They are also a great way to reveal text or object on a
slide one step at a time. For example, you could have five bullet points of text, and reveal
them one-by-one on the slide with each click.

Information Technology Level -2

If you would like to keep the same transition and sound effect across the entire
presentation, click Apply to all under the Timing group. Selecting this option will apply
all the selected effects across all slides.

In this exercise you will learn to add animations in a presentation. Open a new file using
presentation software and add contents to the presentation based on the guidelines
provided earlier. To work with animations, Click Animations tab. You will see Animation
options similar to the one below.

71

Information Technology Level -2

To apply, select the graphical object and click Animate under Animations group. Select
the animation effect under the Animate dropdown list. You can apply an animation effect
by selecting different animation scheme from the dropdown menu.

Once you have selected an animation scheme, play the slideshow to preview the
effect.
Surveys show that animation effects are one of the most annoying elements in
presentations. However, when used effectively, these effects can insert a dramatic moment
to a particular message and add spice to a dull presentation.
To summarize the effective uses of animation effects:
o
Helps focus audience attention on information.
o
Controls the flow of information especially while explaining a diagram.
o
Reveal concepts one by one.

Grouping Objects
Grouping can help when you want to move, rotate or resize multiple objects in a
presentation. You can group objects such as pictures, clip art, shapes and text box; once
grouped they appear as a single object.

72

In this exercise you will learn to work with grouping and ungrouping of objects. Open a
new file using presentation software and add graphical objects to the presentation
based on the guidelines provided earlier. To group the graphical objects, select all the
objects that you want to group in the slide. To select more than one objects in the slide
hold down the ctrl key and select the object in the slide.
To group the objects, click Format tab.

You can select the Group option available under Arrange group in the Format tab.
Once you select the option, you should see a dropdown similar to one displayed below.

Similarly you can ungroup the grouped objects by selecting the ungroup option available
under Group dropdown menu.

Inserting Speaker Notes


Good presenters always rehearse their presentations well but there's often one more thing
that helps them deliver flawless presentation - speaker notes. Speaker notes are guided
text used by the presenter during a presentation. Speaker notes can be short or long texts
that can be used as a reference by the presenter while making a presentation. An area of a
PowerPoint or OpenOffice Impress slide that is hidden during the presentation is reserved
for notes for the speaker. Here you as the presenter can note important key points that you
wish to cover during the presentation.

Information Technology Level -2

Click on Group, to group all the selected graphical objects in the slide.

You can print these notes out, accompanied by a thumbnail version of the appropriate
slide, to keep as a handy reference to use when you are making your oral presentation.

73

This can help you to communicate specific points related to each slide and make the
presentation effective for the audience.

Information Technology Level -2

In this exercise you will learn to add speaker notes. Open a new file using presentation
software. To add notes to a particular slide, select the slide and type the notes in the Click
to add notes area located at the bottom of the presentation software (Figure below).

Alternatively, you can select View tab and click Notes page under Presentation Views
Group.
Key things to remember about speaker notes:
1.

They should not restate the contents of the slide.

2.

Speaker notes should support the content of the slide with in-depth information.
While the regular presentation slides are shown on the main screen for the audience,
the view on your computer screen is slightly different - you can not only see the
current slide but also the text notes and other key points that should be discussed
with that slide. To do so, open the presentation file using your presentation software,
go to the Slide Show tab and check the option Use Presenter View.

Reviewing Content
You should always review the presentation and make changes if required before you
present it to the audience. Presentation software includes options such as spell checks for
correcting errors in a presentation. However, it is the presenters' responsibility to check
each and every point manually on each slide before attempting to make a presentation.

74

In this exercise you will learn to make an effective presentation. Making effective
presentations takes practice, but with a few tips up your sleeve, you are ready to take on the
challenge.
1.

Know your topic.


You may want to charge right in and start using the presentation software. However,
do the research first and know your material, think through what and how you will
present get comfortable with the matter before beginning the project on the
computer. Creating the presentation is the easy part. The best classroom
presentations are created by people who are comfortable with what they are going to
talk about.

2.

Use key phrases about your topic.


Good presenters use key phrases and include only the most important information.
Choose only the top three or four points and make them several times throughout the
presentation. Highlight key points that are necessary for the audience to remember.
Keep the points as short as possible, use 5-6 words to describe the point.
Avoid too much text on each slide.
Do not write your whole speech on the slides. The slide show is meant to accompany
your oral presentation. Summarize the content as bullet points. Use simple language
and limit the number of bullets to three or four per slide.

4.

Limit the number of slides.


Too many slides in a presentation may cause you to rush to get through them and
your audience might end up paying more attention to the changing slide than to
what you are saying. On average, one slide per minute is about right in a classroom
presentation.

5.

Plan the layout of your slide.


Make your slides easy to follow. Put the title at the top. Phrases should read left to
right and top to bottom. Keep important information near the top of the slide.

6.

Information Technology Level -2

3.

Avoid fancy fonts.


Make sure the fonts, design and colors are consistent throughout the presentation;
don't use different styles for each slide. Use fonts that are readable; recommended
fonts are Arial, Tahoma, Verdana. Use standard font size that is readable even from
the last row if presented in a large hall or to a large audience. Use combination of
capital and small letters; Do NOT use all capital letters as it may be difficult to read.
Use bold, italics or underline only if required or to highlight key points.

75

7.

Use contrasting colors for text and background.


Use reasonable mix of text color and background; preview to check if it is readable
without any difficulty. Dark text on a light background is usually the best as this
combination offers the maximum visibility. Keep your slide color scheme consistent
throughout your presentation.

8.

Use a slide design template to keep your presentation look consistent.


Use a single background on all slides; do NOT use multiple backgrounds. Use a
pleasant template or style set; do NOT use different style sets for different slides as it
will distract the audience and they might lose the focus.

9.

Use animations and transitions sparingly.

Information Technology Level -2

You may enjoy applying animations and transitions in every place that you can. This
will certainly be entertaining, but at the same time very distracting. So use this
feature with prudence.
10. Also, always review the presentation 2-3 times before making a presentation; this
can help in reducing or eliminating any errors in it. Remove irrelevant points
during the review, add or remove images during review. Try presenting to a smaller
audience, make necessary corrections before presenting it to a larger audience
Note: Most presentation software includes many features; do NOT try to overuse them!!!
Once you have created the presentation of your choice using the guidelines, you may now
proceed to reviewing the presentation. Use the additional guidelines below:
o
Do a thorough spell check across all slides
o
Perform a manual spell check for terms that is not included during the standard spell
check in the presentation software; NOT all terms (particularly technical terms such
as biological names, etc.) will be checked
o
Remove irrelevant content such as images or clip arts, terms, etc. if they are not
required.

Preparing to deliver a Presentation


Now that you have a presentation ready, you can customize the delivery of the
presentation. For example, you can customize to display selected slides to be
displayed to the audience or configure for multiple monitors, etc.
In this exercise, you will learn to deliver a presentation.

76

To work with Slide Show, open an existing presentation in the presentation software.
Click on Set Up SlideShow option under Set Up group in the Slide Show tab.
Once you click Set Up SlideShow, a dialog box appears as shown below.

If the presentation is to be made to an individual, use Browsed by an individual


(window) option.
If the presentation is to be made at Kiosks, use the Browser at a Kiosk (full screen) option.
Note: A kiosk is a computer terminal featuring specialized hardware and software
designed within a public exhibit that provides access to information and applications for
communication, commerce, entertainment, and education.
In addition, you can configure the presentation to be automated (run continuously),
with or without animation by using the options under Show Options group.

Information Technology Level -2

If the presentation is to be made to an audience, use the Presented by a speaker


(full screen) option.

You can display selective slides from a presentation using the Show slides option.

Print a Presentation
Sometimes you may need to provide print outs of the presentation to the audience as a
reference material. You can print notes, handouts or outline of the presentation using the
presentation software. In this exercise, you will learn to print notes, handouts and outline.

77

To print, open an existing presentation and select the Print option.

Information Technology Level -2

Select the Notes Page option under Print what: dropdown list (figure 24.

Click OK once you are ready to print the notes.


You can print handouts for audience reference by selecting the Handouts option under
Print what: dropdown list. To save paper, you can print multiple slides on a single sheet.
To print multiple slides, select the number of slides that you would like to print by
choosing the number displayed under Slides per page dropdown under Handouts Group
(figure 25).

If you would to print only the text part of the presentation, you can use the Outline option
in the presentation software.
To print the outline, select the Outline View option under Print what: dropdown list.

78

Unit -

Digital Content Creation


Web Designing Fundamentals
Introduction to Web Design & HTML

Following topics are covered in this module:


o
HTML & CSS
o
Web Authoring Tools, Microsoft Expression Web
o
Overview of Client-side & Server-side scripting, JavaScript & VBScript
Web Publishing
A number of markup languages such as HTML, DHTML, XML are used to create webbased
content. Apart from these, software products such as FrontPage, Dream Weaveretc are also
used to develop web based content. Web based applications are built using technologies
such as ASP (Active Server Pages), JSP (Java Server Pages), PHP (Hypertext Preprocessor),
ASP.net etc.

Information Technology Level -2

You have surfed several websites, exchanged emails, performed online transactions,etc. in
the previous sessions. If you want to create websites like the ones you haveseen, you need
to learn a variety of technologies, tools and techniques.Web designing refers to the skills
that are required to create and manage websites.Web design as a whole refers to designing
a user interface, authoring (programming)or a combination of both. Designing a website
requires multiple skills. However, it isrecommended to master and become skilled in one
particular technology once you geta taste of various technologies involved.

Understanding HTML
HTML or Hypertext Markup Language is a language used for created web pages that can be
viewed in a web browser.
o
Hyper - means active and all over the place! When you use a Web browser, youcan
move all over the place, without a specified order as to how to access pages/sites.
o
Text - You will be working with text files only.

79

o
Markup - To create a Web page, you will type in the text and then ?Mark up? the text.
o
Language - This is a method of creating something or communicating and in this case,
you are creating Web pages using a particular syntax.
HTML elements are the building blocks of a website. Web browsers interpret the
tagswritten in HTML and display a web page.
Hypertext refers to the text that can be linked to another text or page which a usercan
access. Hypertext is the underlying concept behind the World Wide Web.
HTML is developed and maintained by World Wide Web Consortium abbreviated asW3C.
When HTML was first released, there were a handful of tags available and usedfor basic
web page structures. As time evolved, several new tags and attributes wereintroduced.
Popular HTML versions include HTML 4.01 and HTML 5.0.

Information Technology Level -2

Designing Web pages using HTML


All you need is a text editor such as notepad to create a web page using HTML. HTML files
have the extension .htm or .html. You can open the web pages using web browsers such as
Mozilla Firefox, Internet Explorer, Google Chrome, etc.
Viewing Source Code
Web browsers have the ability to display the source code used for a web page. You can use
this to enhance your knowledge To view the code, do the following:
1.

Open the Web Browser and right-click anywhere in the web page and select View
Page Source from the context menu similar to the one below:

2.

Notice, the source code of the web page is visible with different color codes.
The colors have no meaning in terms of function and are only used to differentiate
different sets of code.

Saving a web page


You can save web pages for future reference using the following procedure:
1.

Select File > Save Page As

2.

Type a file name and click Save.

HTML Elements & Attributes - The Basics


When you work with a document, you create headings, sub-headings, tables, etc. to give the
document a structure. Similarly in HTML, tags or elements are used to create a web pages'
structure.

80

Look at an example of an online magazine. Online magazines have articles with text
content, images, videos, links or continuation to related articles, advertisements, etc. They
appear as a single web page to visitors. Have you noticed that the headings are of varying
sizes to indicating topics and sub-topics and different from the content?
All this formatting is possible using combinations of several HTML elements.
Elements & Attributes
Elements have content placed between a start tag and an end tag. Tags act as containers for
text, images and other types of content. Tags start an opening tag and end with a closing
tab, using angle brackets (<>) to define the structure.

Writing your First HTML Code


HTML uses tags enclosed in angle brackets; most tags are used in pairs such as
<html></html>, etc. Following is a simple example of HTML code:
<!DOCTYPE html>
<html>
<head>

Information Technology Level -2

Note: To learn to use the tags, throughout this document, you will find examples of code
displayed within dotted boxes. Copy it in a text editor, save it in your local computer and view
using web browsers.

<title>Learn HTML</title>
</head>
<body>
<p>Hello World!</p>
<!--this is an example of simple HTML code created using Notepad-->
</body>
</html>

81

In the above mentioned code, there are a few HTML tags used. All HTML documents start
with <html> and end with </html>. The rest of the document contains other elements
and web page content placed using elements.
o
Document type or DOCTYPE is an element used for indicating the version of HTML
used in a web page. This is used by the web browser to apply a set of rules for
understanding the document structure.
o
HTML element indicates the start and end of an HTML document. <HTML> indicates
the beginning of this HTML document and </HTML> indicates the end.
HTML is also the root of an HTML document and has two parts, Head and Body
elements.

Information Technology Level -2

?
Head element represents the header section of a document and contains
information about a web page. Head elements start with <head> and end with
</head>. This element includes all other elements that need to be executed or
understood before the content (included in the body element) is displayed to the
user.

82

o
Content placed within the <Title> and </Title> element is displayed as the title of a
web page and used by search engines to create indexes of content.
?
Body element represents the section that contains body content and is displayed
in the web browser. Most HTML elements are used within the body element
between <body> and </body> tags.
o
If you want to place hidden text in a web page, you can use the comment element (<!-> and <--> tags). Text placed using comment element will not be displayed in a web
browser but can seen when viewing the source code. This is useful to developers or
users who would like to share their experience in writing HTML code but hide the
text from general visitors.
HTML Attributes
Attribute are used to provide additional information about an element. Attribute contains
values and some elements use multiple attributes.

Nesting
You can nest other elements within elements. Elements nested within another element are
referred to as a child elements and the nesting element is referred to as a parent element.

When you nest elements, you need to ensure the elements are used in proper order.
Observe the correct way of using opening and closing tags illustrated in the figure below:

Text formatting
You can format the text content of a web page to make it attractive by using other HTML
elements such as Headings, Bold, Italics, etc.
Element

Description

Heading

There are six levels of heading elements from H1 to H6. H1 has the
largest text size and H6 has the smallest heading text size.

Emphasize

To emphasize a particular text in a sentence (for example a text that


should be pronounced different), use this element. Text enclosed
within <em> and <lem> are displayed in italics.

Italics

If you want the text to be displayed in alternate voice such as a text


translated from a foreign language, technical words or present text
in typographic italics, enclose the text within <i> and </i> elements.

Information Technology Level -2

Html Elements & Attributes - Text Formatting

83

Information Technology Level -2

Strong

If you want to emphasize a text with stronger importance in a


sentence, use the strong element. Text enclosed within <strong> and
</strong> are displayed in bold.

Bold

To make the text such as keywords visually bold, enclose the text
within <b> and </b>, the bold element.

Underline

To underline the text, enclose the text within <u> and </u>, the
underline element.

Mark

To highlight the text in a sentence, enclose the text within mark


element: <mark> and </mark>

Big

If you want to display a particular text in a sentence bigger than rest


of the text in a sentence, enclose the text within the big element :
<big> and </big>.

Small

To display a particular text in a sentence as smaller than the rest of


the text in a sentence, enclose the text within the small element:
<small> and </small>.

Subscript & Text enclosed within <sub> and </sub> are displayed as subscripts
superscripts and Text enclosed within <sup> and </sup> are displayed as
superscripts.
Pre

Text enclosed using <pre> and </pre> tags are displayed as it is (in
the example below - using a mono-space font such as Courier)

INS & DEL

Text enclosed within <del> and </del> are displayed as struck out
while text enclosed within <ins> and </ins> is underlined.

Break

To separate single lines or use multiple line spacing, use the break
element. Breaks between lines are represented through use of <br>.
No closing tag is needed.

HR

To separate sections, use a horizontal line to indicate


distinctiveness. Horizontal line is indicated through use of <hr>
element and requires no closing tag.

Sample Code - Text Elements


<!DOCTYPE html>
<html>
<head>

84

<title>Learn HTML</title>
</head>
<body>
<p> HTML supports six levels of headings, H1 to H6 with H1 being the largest.</p>
<h1>Main Heading</h1>
<h2>Sub heading, Level 1</h2>
<h3>Sub heading, Level 2</h3>
<h4>Sub heading, Level 3</h4>
<h5>Sub heading, Level 5</h5>
<h6>Sub heading, Level 6</h6>
<p> You are required to <em>agree</em> with our terms and conditions.</p>
<p> <i>HTML</i> is simple to learn.</p>
<p>It is important to know the common <strong>HTML Elements and attributes.
</strong></p>
<p>This an example of text displayed <u>underlined</u>.</p>
<p>This is an example of highlighted <mark>text.</mark></p>
<p><big>Sun</big> is the largest of all planets with 696,000 KM as its radius.</p>
<p><small>Mercury</small> is the smallest planet in the Solar System ever since Pluto
lost its status and was reclassified as a dwarf planet.</p>
<p>this is an example of subscript for a formula, H<sub>2</sub>O</p>
<p>this is an example of superscript for a formula, (A+B)<sup>2</sup></p>
<pre>
/* Hello World program */
#include<stdio.h>
main()
{

Information Technology Level -2

<p>This an example of text displayed in <b>bold</bold>.</p>

printf("Hello World");
}
</pre>
<p>this is the correct spelling of <del>entreprenaur</del>
<ins>entrepreneur</ins></p>
</body>
</html>

85

Referencing Elements
Element

Description

Quote

To include short text such as name of an author, publisher, etc. in


quotes, use the quote element. You can also use the cite attribute to
indicate the source. Text included within <q> and </q> is displayed
within quotations.

Blockquote

To include lengthy quotes, include text within <blockquote> and


</blockquote> elements.

Cite

To specify a tile of a work such as title of a book, movie, painting, etc.


include text within <cite> and </cite> elements.

Information Technology Level -2

Abbreviation To include abbreviations of acronyms, include the abbreviation


between <abbr> and </abbr> elements. Text included within this
element will be displayed when the cursor is moved over the text.
Sample Code - Referencing Elements
<!DOCTYPE html>
<html>
<head>
<title>Learn HTML</title>
</head>
<body>
<p>HTML Tutorial
<q>Created by Author Name</q>
<blockquote cite="http://en.wikipedia.org/wiki/Google_Analytics"> Google Analytics (GA)
is a service offered by Google that generates detailed statistics about a website's traffic and
traffic sources and measures conversions and sales.</blockquote>
<p>You can learn more about web design at <cite>
http://en.wikipedia.org/wiki/Web_design</cite>
<p><abbr title=" Hypertext Markup Language">HTML</abbr> has several elements and
attributes. </p>
</p>
</body>
</html>

86

Tables
You can create a table using the Table Element. Tables are made of rows and
columnssimilar to that of a spreadsheet. Rows are contained within table row element
<tr> and data is stored within row element <td>.
<!DOCTYPE html>
<html>
<head>
<title>Learn HTML</title>
</head>
<body>
<table>
<tr><td>Name</td><td>Age</td><td>City</td></tr>
<tr><td>Anand</td><td>17</td><td>Delhi</td></tr>
<tr><td>Rohit</td><td>23</td><td>Bangalore</td></tr>
</body>
</html>

Images
You can include images in your web page by using the <img> image element. Use the SRC
attribute to specify the location of the image and width and height attributes to specify the
dimensions of the image. Also it is a recommended practice to use the ALT attribute for
displaying text if the image is not downloaded.
<!DOCTYPE html>
<html>
<head>

Information Technology Level -2

</table>

<title>Learn HTML</title>
</head>
<body>
<img src="HTML5-logo.png" alt="HTML 5 Logo, is not displayed due to an error.
Please reload this page or contact the website administrator" width="300"
height="300">
</body></html>

87

Working with Audio, Video & Flash


Element

Description

Audio

To include an audio clip, enclose the audio within the <audio> and
</audio> elements and point to the clip using SRC attribute. To
automatically play the audio, use the autoplay attribute. To display
controls, use the controls attribute.

Video

To include a video clip, enclose the audio within the <video> and
</video> elements and point to the clip using SRC attribute. Also use
width and height attributes to specify the dimenstions of a video clip.

Flash

To embed a flash animation, use the <embed> and </embed>


elements and point to the animation using SRC attribute.

<!DOCTYPE html>

Information Technology Level -2

<html>
<head>
<title>Learn HTML</title>
</head>
<body>
<audio src="pump_im.mp3" autoplay controls>
Your browser does not support the audio element.
</audio>
</body>
</html>
<!DOCTYPE html>
<html>
<head>
<title>Learn HTML</title>
</head>
<body>
<video src="sample_mpeg4.mp4" height="320" width="200" controls>
Your browser does not support the Video element.
</video>
</body>
</html>

88

<!DOCTYPE html>
<html>
<head>
<title>Learn HTML</title>
</head>
<body>
<embed src="sample.swf" height="200" width="320">
</body>
</html>

You can also include videos from other sources such as youtube.com, etc. To include a video
from youtube.com, do the following:
Go to Youtube.com

2.

Select a video clip

3.

Right-click on the video and select Copy embed html

Write the code within <body> and </body> section (sample below).
.<!DOCTYPE html>
<html>
<head>
<title>Learn HTML</title>
</head>
<body>
<iframe width="640" height="360"
src="http://www.youtube.com/embed/v4oN4DuR7YU?feature=player_detailpage"

Information Technology Level -2

1.

frameborder="0" allowfullscreen></iframe></body>
</html>

Now save and open this web page using a web browser.
Note: Refer to Youtube.com FAQ' for detailed instructions.

89

Html Elements & Attributes - Forms & Frames


Forms
Forms contain input elements such as text boxes, dropdown menus, check boxes, radio
buttons, etc. to collect information from visitors and sent to a web server for further
processing such as displaying search results or send to a database for storage.
Forms are created using <form> element along with action and method attributes.
Action attribute is used for specifying the URL to where the data needs to be submitted.
Method attribute is used for specifying the HTTP method, get or post.
POST attribute is used for storing or updating a database or for sending emails and GET
attribute is used for retrieving data.
Form element uses text boxes to collect text information and radio buttons, check boxes
and dropdown menus for collecting information through pre-defined options.

Information Technology Level -2

Control
Textbox

Description
Single-line text input box is typically used for collecting shorter text
such as usernames or passwords. Multiple-line text input boxes are
used for collecting lengtheir text such as narrative feedback, etc.

Radio Buttons Used for collecting single value from multiple values. You should use
type=radio attribute for using radio buttons in a web page.
Checkbox

Used for collecting multiple values. You should use type=checkbox


attribute for using checkboxes in a web page.

Dropdown

Used for collecting single or multiple values from a dropdown menu.


You should use the option attribute along with values to present
multiple options.

Submit

Submit button allows visitors to submit the value.

Reset

Reset button clears all the selections made.

Sample Code - Forms


<!DOCTYPE html>
<html>
<head>
<title>Learn HTML</title>

90

</head>
<body>
<p>Subscribe to your weekly Newsletter</p>
<form action="http://www.example.com/signup.asp" method="post">
Name <input type="name" name="Name" size="30">
Password <input type="password" name="Name" size="30">
<textarea rows="3" name="Comments" cols="30"></textarea>
<p>I agree to the Terms and Conditions.
<input type="radio" value="Agree" name="R1"> Yes
<input type="radio" value="Diagree" checked name="R1"> No</p>
<p>10th <input type="checkbox" name="Class_10" value="ON"> 12th
<input type="checkbox" name="Class_12" value="ON"> Bachelors Degree
<input type="checkbox" name="Bachelors_Degree" value="ON"> Masters Degree

<p>This is an example of Dropdown Menu (Single Selection)</p>


<p>School Education Board<select size="1" name="School">
<option>State Board</option>
<option>Matriculation</option>
<option>CBSE</option>
</select> </p>
<p>
<input type="submit" value="Submit" name="Submit">
<input type="reset" value="Reset" name="Reset"></p>
</form>

Information Technology Level -2

<input type="checkbox" name="Masters_Degree" value="ON"></p>

</body>
</html>

Frames
Frames are used to display one or more pages within a single web page; collections of
different frames are referred to as a frameset. Frames are used when you want to display
different pages as a single page in a web browser.

91

<html>
<frameset cols="25%,50%,25%">
<frame src="sample.htm">
<frame src="sample.htm">
<frame src="sample.htm">
<noframes>
Text to be displayed in browsers that do not support frames
</noframes>
</frameset>
</html>

Information Technology Level -2

iframe
iframe or inline frames is an element used for embedding another document or an URL
with a web page.
<!DOCTYPE html>
<html>
<head>
<title>Learn HTML</title></head>
<body>
<p>You can use iframe to include a web page.</p>
<iframe width="600" height="300" src="lesson002.htm"></iframe>
<hr>
<p>You can use iframe to view another website live.</p>
<iframe width="600" height="300" src="http://www.mozilla.org"></iframe>
<hr>
<p>You can restrict scrolling in iframe.</p>
<iframe width="600" height="300" src="http://www.wikipedia.org"
scrolling=no></iframe>
</body>
</html>

92

Creating Websites and Webpages in a Website


Creating a Website
You can create websites with your own design. When you work with web pages, images,
style sheets, etc., you need to store all the related files in a single location (folder). This
helps you to:
o
Stay organized
o
Upload the entire content to the remote server when you want to publish the website.
Note: You will learn about templates later in this module. To create a new website, do the
following:
1.

Select Site > New Site

2.

A window appears similar to the one below:

You can create a website with a single page by selecting One Page Site.

b.

You can create a website from scratch by selecting Empty Site.

c.

If you already have a website created using HTML or any other software, you can
continue to work with the website using MEW once it is imported. To import an
existing website, use the Import Site Wizard.

Information Technology Level -2

3.

a.

Select Empty Site and enter a name for the website, for example:
MyFirstWebsite. Click OK.

93

Information Technology Level -2

4.

A website is created and you will notice a window similar to the one below:

5.

Now you can create web pages for this website. Navigate to the location (example:

6.

My Documents) where you stored the website. Notice the folder icon.

Content such as images, flash animations, web pages & style sheets, etc. will be
automatically stored in this folder.
Create a Web page
Once the website is created, you need to create web pages. To create a webpage, do the
following:
1.

94

Select File > New > Page. A window appears similar to the one below:

You can use MEW to create web pages using HTML or ASP code, Style Sheets (CSS), etc.
Select HTML from the list and Click OK. Notice that a new page is created (figure
below).

3.

Notice the file name Untitled_1.html. Being the first page of the website, this page is
may be your homepage. Use a standard naming convention such as default.htm,
index.htm or home.htm and save this page. To save this page, select File > Save.

4.

Type the file name as default and select Save. You need not specify .htm or .html
extension as it is automatically added to the web page.

Handling File Extensions


HTML Editors such as MEW automatically append the required file extension, .html by
default. You can configure the HTML editor to add the extension .htm by the following
procedure:
1.

Select Tools > Page Editor Options. The Page Editor Options dialog box appears
(figure below).

Information Technology Level -2

2.

95

Information Technology Level -2


96

2.

Select the Authoring Tab (figure below).

3.

Notice the default document type selected as HTML under Default Document:
dropdown menu and file extension selected as .html in Default HTML File
Extension: option.

You can change the settings, and, it is recommended to change Document Type
Declaration to HTML 5.
You can configure expression web to use external programs such as notepad to open
specific file types such as a style sheet. By default, style sheets open in expression web. To
modify, do the following:
1.

Select Tools > Application Options. The Application Options dialog box appears
(figure below).

2.

Select the Configure Editors Tab (figure below).

3.

Notice the file extensions (left pane) and application that will handle the extension
(right pane) displayed.

Note: Do NOT change any settings here for now.


Working with a Web page
The biggest advantage of HTML editors such as MEW is that the code is written for you by
the software.
1.

Type the following in the body area (figure below):


a.

My Homepage

b.

This is a website created using a HTML Editor.

When you create content, MEW automatically intends them as paragraphs. You may notice
the paragraph element indicated (see figure above) as "p" with a box above around the
content. When you use carriage return (Enter key), MEW inserts another paragraph
similar to that of the word processing software.

Now select the text "My Homepage" and do the following:


a.

Select the Style dropdown located in the toolbar (figure below)

b.

Select Heading 1 <h1> from the list.

3.

Now select the text "This is a website created using a HTML Editor." Select Heading 3
<h3> from the style dropdown list.

4.

Once complete, select View (Menu) > Page > Code (or select Code located above the
status bar). You will see a screen similar to the one below:

Information Technology Level -2

2.

97

Information Technology Level -2

5.

Notice the text is enclosed using heading (h1 and h3) elements. Now save this page
(CTRL+S).

Since the editor writes the code for you; you can stay focused on creating the content rather
than focusing on the code!
If you have noticed, there are pre-built standard HTML elements that you can use in a
webpage by just selecting the element from the style dropdown menu Now to switch back
to design view, select View > Page > Design.
The three views available in MEW are:
1.

Design View: This is the default view and displays only the content.

2.

Code View: This is used either when you want to view the source code written by the
HTML editor or, when you want to insert elements or code that is not available within
the HTML editor.

3.

Split View: This is used when you want to use both the Design and Code View side-byside.

Using Multiple Web Browsers


If you want to test your web page, it is a recommended practice to test using multiple web
browsers. However you may need to set up the browser list. To specify multiple browsers,
do the following:
1.

98

Select File > Preview in Browser > Edit Browser List. The Edit Browser List dialog
box appears.

You may notice that some web browsers are added to the list by default. If you want
add a web browser (for testing), select Add, and specify the path of the executable
file of the web browser (for example: C:\Program Files\Google\Chrome\
Application\chrome.exe).

3.

You can also use set the screen resolution here. This could be useful when you want to
test your pages for viewing on Smartphones or tablets that use different screen
resolutions.

Web Page Layout - Blogs


A blog is a discussion style site used by non-technical (and technical users) users for
creating personal web pages. Blogs are similar to an online personal diary and simple to
use.

Information Technology Level -2

2.

You can use a blog to convey messages about events, announcements, news, reviews,
etc. Blogs are usually managed using a web browser and this requires active internet
connection. You can also use offline blog software to create content first and later
publish the content when an active internet connection is available.
There are hundreds of websites that offer blog service for free. Some of the popular blogs
include:
o
www.WordPress.com

99

www.blogger.com
o
www.blog.com
o
www.weebly.com
o
www.blogsome.com
o
Creating a Blog Account
In this session, you will learn how to create a blog account in WordPress.
WordPress is free web service that you can use to create a beautiful website or blog.
WordPress has support for "themes" for customizing the design of a blog. Themes can
make the blog or the webpage look attractive.
Before you start using a blog, a blog account is required. To create one, you need a web
o
browser and an internet connection.

Information Technology Level -2

Open the Web Browser.


o
On the address bar type https://signup.WordPress.com/signup/.You should now get
o
to a page with the fields Blog address, Username, Password, Email Address and
Language.
Blog Address: You must provide a unique address to your WordPress Blog. This is
o
the address which others will use to view your blog.
Username: You should choose a username for managing this blog.
o
Password: Securing your WordPress blog account with a strong password is
o
important. A combination of uppercase and lowercase letters with some digits
along with symbols would be a strong enough password. You need to enter the
password twice.
Email Address: You must provide your Email Address here. An activation link
o
will be send to you from WordPress after you click "Create Blog".
Language: You can choose your own language for blogging from the list given.
o
Click Create Blog.
o
On doing so, you will be sent an email for activating your blog account. Open your email
and click on the activation link. Once you click Activate Blog, you will be redirected to
your WordPress Blog Account and you should see a web page similar to the one displayed
below.

100

Now the blog is ready for use. You will be presented with the address of your blog as
displayed in the web page above; you can either double click on the link or type the address
manually in the web browser. Either action takes you to the homepage of your blog.

o
To create a post, click New Post. A Window similar to the one displayed below
appears.

o
Title: You must provide a title for your post; choose a tile that this post will focus on.
For example, "School Annual Day Function 2012".

Information Technology Level -2

Once you have created a blog, you need to submit content that you want others to view. This
process ids called posting content.

Using the rich text box, you can type content that you want others to read.
Once you have finished typing the content, you need to publish the post for others to see.
Click Publish Post to publish your content. To view the post, you can type the blog address
in the address bar of the web browser; you should see your blog along with the post
(displayed below).

101

Information Technology Level -2

You can also add photos, videos, etc. to the blog using the options available in
WordPress.You can comment on posts published by others. Usually, the comment
option is available towards the end of the post. Look for options such as Leave a comment,
Leave a reply, etc. in the blog to comment. For example, in WordPress the comment box is
located below the post and labelled as Leave a reply.

o
In the Enter your comment here text box, type your comments about the post.
o
In the Email (required) field, type your email address.
o
In the Name (required) field, type your name.
o
In the Website filed, you may type your blog address (Optional).
o
Once you have typed the content in the comment area, review carefully and Click Post
Comment.
Once you click the Post Comment, you will see the blog along with your comment.

102

Unit -

Computer System Care


Hardware Security
Assessing your risks

Shingai: We want to put a brief summary of our security policy into this grant application,
but we also need to make sure the policy itself is thorough. What should we include in it?
Otto: I'm afraid I can't recommend a one-size-fits-all solution to the challenge of physical
security. The specifics of a good policy almost always depend on a particular
organisation's individual circumstances. Here's a piece of general advice, though: when
you're trying to come up with a plan, you need to observe your work environment very
carefully and think creatively about where your weak points might be and what you can
do to strengthen them.
When assessing the risks and vulnerabilities that you or your organisation face, you must
evaluate several different levels at which your data may be threatened.

Information Technology Level -2

Many organisations underestimate the importance of keeping their offices and their
equipment physically secure. As a result, they often lack a clear policy describing what
measures they should take to protect computers and backup storage devices from theft,
severe weather conditions, accidents, and other physical threats. The importance of such
policies may seem obvious, but formulating them properly can be more complicated than
it sounds. Many organisations, for example, have good quality locks on their office doors,
and many even have secure windows; but if they do not pay attention to the number of keys
that have been created, and who has copies of those keys, their sensitive information
remains vulnerable.

o
Consider the communication channels you use and how you use them. Examples
might include paper letters, faxes, landline phones, mobile phones, emails and Skype
messages.
o
Consider how you store important information. Computer hard drives, email and
web servers, USB memory sticks, external USB hard drives, CDs and DVDs, mobile
phones, printed paper and hand-written notes are all likely possibilities.

103

o
Consider where these items are located, physically. They could be in the office, at
home, in a trash bin out back or, increasingly, 'somewhere on the Internet.' In this last
case, it might be quite challenging to to determine the particular piece of
information's actual, physical location.

Information Technology Level -2

Keep in mind that the same piece of information might be vulnerable on many
different levels. Just as you might rely on anti-virus software to protect the contents of
a USB memory stick from malware, you must rely on a detailed physical security plan
to protect the same information from theft, loss or destruction. While some security
practices, such as having a good off-site backup policy, are helpful against both digital
and physical threats, others are clearly more specific.

104

When you decide whether to carry your USB memory stick in your pocket or sealed in
a plastic bag at the bottom of your luggage, you are making a decision about physical
security, even though the information you are trying to protect is digital. As usual, the
correct policy depends greatly on the situation. Are you walking across town or
travelling across a border? Will somebody else be carrying your bag? Is it raining?
These are the sorts of questions that you should consider when making decisions like
this.
How to protect your information from physical threats
No matter how much effort you have put into building a digital barrier around your
computer, you could still wake up one morning to find that it, or a copy of the information
on it, has been lost, stolen, or damaged by any number of unfortunate accidents or
malicious acts. Anything from a power surge to an open window to a spilt cup of coffee
might lead to a situation in which all of your data are lost and you are no longer able to use
your computer. A careful risk assessment, a consistent effort to maintain a healthy
computing environment and a written security policy can help avoid this type of diaster.
Background scenario
Shingai and Rudo are an elderly married couple with many years of experience helping
the HIV-infected population of Zimbabwe maintain access to proper medication. They are
applying for a grant to purchase new computers and network equipment for their office.
Since they live in a region that is quite turbulent, in terms both of politics and of
infrastructure, they and their potential funders want to ensure that their new hardware
will be safe, not only from hackers and viruses, but also from confiscation, thunderstorms,
electrical spikes and other such disasters. They ask Otto, a local computer technician, to
help them devise a plan of action to strengthen the physical security of the computers and
network hardware they plan to buy if their grant application is successful.

What you can learn from this chapter


More about a few of the physical threats to your computer and to the information
o
stored on it
How best to secure computer equipment against some of these threats
o
How to create a healthy operating environment for computers and network
o
equipment
What to consider when creating a security plan for the computers in your office
o
Maintaining a healthy environment for your computer hardware
Like many electronic devices, computers are quite sensitive. They do not adapt well to
unstable electricity supplies, extreme temperatures, dust, high humidity or mechanical
stress. There are a number of things you can do to protect your computers and network
equipment from such threats:

If you can afford them, you should install Uninterruptible Power Supplies (UPS') on
o
important computers in your office. A UPS stabilises electricity supply and provides
temporary power in the event of a blackout.
Even where UPS' are deemed inappropriate or too costly, you can still provide power
o
filters or surge protectors, either of which will help protect you from power surges.
Test your electrical network before you connect important equipment to it. Try to use
o
power sockets that have three slots, one of them being a 'ground line', or 'earth'. And,
if possible, take a day or two to see how the electrical system in a new office behaves
when powering inexpensive devices, such as lamps and fans, before putting your
computers at risk.

Information Technology Level -2

Electrical problems such as power surges, blackouts and brownouts can cause
o
physical damage to a computer. Irregularities like this can 'crash' your hard drive,
damaging the information it contains, or physically harm the electronic components
in your computer.

To defend against accidents in general, avoid placing important hardware in


o
passages, reception areas or other easily accessible locations. UPS', power filters,
surge protectors, power strips and extension cables, particularly those attached to
servers and networking equipment, should be positioned where they will not be
switched off by an accidental misstep.
If you have access to high-quality computer cables, power strips and extension cables,
o
you should purchase enough to serve your entire office and pick up a few extras.

105

Power strips that fall out of wall sockets, fail to hold plugs securely and spark
constantly are more than just annoying. They can be quite damaging to the physical
security of any computers attached to them. They can also lead frustrated users to
secure their loose computer cables to a sparking power strip with tape, which creates
an obvious fire hazard.
o
If you keep any of your computers inside cabinets, make sure they have adequate
ventilation, or they might overheat
o
Computer equipment should not be housed near radiators, heating vents, air
conditioners or other ductwork

Information Technology Level -2

Creating your physical security policy


Once you have assessed the threats and vulnerabilities that you or your organisation face,
you must consider what steps can be taken to improve your physical security. You should
create a detailed security policy by putting these steps in writing. The resulting document
will serve as a general guideline for yourself, your colleagues and any newcomers to your
organisation. It should also provide a checklist of what actions should be taken in the event
of various different physical security emergencies. Everybody involved should take the
time to read, implement and keep up with these security standards. They should also be
encouraged to ask questions and propose suggestions on how to improve the document.
Your physical security policy may contain various sections, depending on the
circumstances:
o
An office access policy that addresses the alarm systems, what keys exist and who has
them, when guests are allowed in the office, who holds the cleaning contract and
other such issues
o
A policy on which parts of the office should be restricted to authorized visitors
o
An inventory of your equipment, including serial numbers and physical descriptions
o
A plan for securely disposing of paper rubbish that contains sensitive information
o
Emergency procedures related to:
o
Who should be notified if sensitive information is disclosed or misplaced
o
Who to contact in the event of a fire, flood, or other natural disaster
o
How to perform certain key emergency repairs
o
How to contact the companies or organizations that provide services such as
electrical power, water and Internet access

106

How to recover information from your off-site backup system. You can find more
o
detailed backup advice in Chapter 5: How to recover from information loss.
Your security policy should be reviewed periodically and modified to reflect any policy
changes that have been made since its last review. And, of course, don't forget to back up
your security policy document along with the rest of your important data. See the Further
reading section for more information about creating a security policy.
Protecting your information from physical intruders
Malicious individuals seeking access to your sensitive information represent one
important class of physical threat. It would be a mistake to assume that this is the only
such threat to the security of your information, but it would be even more shortsighted to
ignore it. There are a number of steps you can take to help reduce the risk of physical
intrusion. The categories and suggestions below, many of which may apply to your home as
well as your office, represent a foundation upon which you should build in accordance with
your own particular physical security situation.

Get to know your neighbours. Depending on the security climate in your country and
o
in your neighbourhood, one of two things may be possible. Either you can turn them
into allies who will help you keep an eye on your office, or you can add them to the list
of potential threats that your security plan must address.
Review how you protect all of the doors, windows and other points of entry that lead
o
into your office.
Consider installing a surveillance camera or a motion-sensor alarm.
o
Try to create a reception area, where visitors can be met before they enter the office,
o
and a meeting room that is separate from your normal work space.
In the office

Information Technology Level -2

Around the office

Protect network cables by running them inside the office.


o
Lock network devices such as servers, routers, switches, hubs and modems into
o
secure rooms or cabinets. An intruder with physical access to such equipment can
install malware capable of stealing data in transit or attacking other computers on
your network even after he leaves. In some circumstances it may be beneficial to hide
servers, computers or other equipment in attics, over a fake ceiling, or even with a
neighbor, and use them through wireless connection.

107

o
If you have a wireless network, it is critical that you secure your access point so that
intruders cannot join your network or monitor your traffic. If you are using an
insecure wireless network, anyone in your neighbourhood with a laptop becomes a
potential intruder. This is an unusual definition of 'physical', but it helps to consider
that a malicious individual who can monitor your wireless network has the same
access as one who can sneak into your office and connect an ethernet cable. The steps
required to secure a wireless network will vary, depending on your access point
hardware and software, but they are rarely difficult to follow.
At your work

Information Technology Level -2

You should position your computer screen carefully, both on your desk and when you
o
are away from the office, in order to prevent others from reading what is displayed
there. In the office, this means considering the location of windows, open doors and
the guest waiting area, if you have one.
Most desktop computer cases have a slot where you can attach a padlock that will
o
prevent anyone without a key from getting inside. If you have cases like this in the
office, you should lock them so that intruders cannot tamper with their internal
hardware. You might also consider this feature when purchasing new computers.
Use a locking security cable, where possible, to prevent intruders from stealing the
o
computers themselves. This is especially important for laptops and small desktops
that could be hidden inside a bag or under a coat.
Software and settings related to physical security
Make sure that, when you restart your computer, it asks you for a password before
o
allowing you to run software and access files. If it does not, you can enable this feature
in Windows by clicking on the Start menu, selecting the Control Panel, and doubleclicking on User Accounts. In the User Accounts screen, select your own account and
click Create a Password. Choose a secure password, as discussed in Chapter 3: How
to create and maintain good passwords, enter your password, confirm it, click
Create Password and click Yes, Make Private.
There are a few settings in your computer's BIOS that are relevant to physical
o
security. First, you should configure your computer so that it will not boot from the
USB device, CD-ROM or DVD drives. Second, you should set a password on the BIOS
itself, so that an intruder can not simply undo the previous setting. Again, be sure to
choose a secure password.

108

If you rely on a secure password database, as discussed in Chapter 3, to store your


o
Windows or BIOS passwords for a particular computer, make sure that you do not
keep your only copy of the database on that computer.
Get in the habit of locking your account whenever you step away from your computer.
o
On Windows, you can do this quickly by holding down the Windows logo key and
pressing the L key. This will only work if you have created a password for your
account, as described above.
Encrypt sensitive information on computers and storage devices in your office. See
o
Chapter 4: How to protect the sensitive files on your computer for additional
details and pointers to the appropriate Hands-on Guides.
Rudo: I'm a bit nervous about messing around in BIOS. Can I break my computer if I do
something wrong?
tto: You sure can, at least for a little while. In fact, the settings that you might want to
possible to leave your computer temporarily unable to start if you do something wrong. In
general, if you're uncomfortable working in BIOS, you should ask someone with more
computer experience to help you out.
Portable devices
Keep your laptop, your mobile phone and other portable devices that contain
o
sensitive information with you at all times, especially if you are travelling or staying
at a hotel. Travelling with a laptop security cable is a good idea, although it is
sometimes difficult to find an appropriate object to which you can attach one.
Remember that meal times are often exploited by thieves, many of whom have learnt
to check hotel rooms for laptops during hours of the day when they are likely to be

Information Technology Level -2

change are pretty simple, but the BIOS screen itself can be a little intimidating, and it is

unattended.
If you have a laptop, tablet or other mobile device, try to avoid putting them on
o
display. There is no need to show thieves that you are carrying such valuable
hardware or to show individuals who might want access to your data that your
shoulder bag contains a hard drive full of information. Avoid using your portable
devices in public areas, and consider carrying your laptop in something that does not
look like a laptop bag.

109

How to create and maintain secure passwords


Many of the secure services that allow us to feel comfortable using digital technology to
conduct important business, from signing in to our computers and sending email to
encrypting and hiding sensitive data, require that we remember a password. These secret
words, phrases or strings of gibberish often provide the first, and sometimes the only,
barrier between your information and anyone who might want to read, copy, modify or
destroy it without your permission. There are many ways in which someone could learn
your passwords, but you can defend against most of them by applying a few specific tactics
and by using a secure password database tool, such as KeePass.

Information Technology Level -2

Background scenario
Mansour and Magda are siblings, in an Arabic-speaking country, who maintain a blog on
which they anonymously publicise human rights abuses and campaign for political
change. Magda recently tried to log into her personal webmail account and found that
her password had been changed. After resetting the password, she was able to log in, but
when she opened her inbox she noticed that several new messages were marked as having
been read. She suspects that a politically-motivated intruder may have learned or
guessed her password, which she uses for several of her website accounts. She is meeting
with Mansour, who has less computer experience, to explain the situation and to voice her
concerns.
Selecting and maintaining secure passwords
In general, when you want to protect something, you lock it up with a key. Houses, cars and
bicycle locks all have physical keys; protected files have encryption keys; bank cards have
PIN numbers; and email accounts have passwords. All of these keys, physical and
electronic, have one thing in common: they open their respective locks just as effectively in
the hands of somebody else. You can install advanced firewalls, secure email accounts, and
encrypted disks, but if your password is weak, or if you allow it to fall into the wrong hands,
they will not do you much good.
Elements of a strong password
A password should be difficult for a computer program to guess.
o
Make it long: The longer a password is, the less likely it is that a computer program
would be able to guess it in a reasonable amount of time. You should try to create
passwords that include ten or more characters. Some people use passwords that
contain more than one word, with or without spaces between them, which are often

110

called passphrases. This is a great idea, as long as the program or service you are
using allows you to choose long enough passwords.
o
Make it complex: In addition to length, the complexity of a password also helps
prevent automatic 'password cracking' software from guessing the right
combination of characters. Where possible, you should always include upper case
letters, lower case letters, numbers and symbols, such as punctuation marks, in your
password.
A password should be difficult for others to figure out.

o
Don't make it personal: Your password should not be related to you personally.
Don't choose a word or phrase based on information such as your name, social
security number, telephone number, child's name, pet's name, birth date, or anything
else that a person could learn by doing a little research about you.
o
Keep it secret: Do not share your password with anyone unless it is absolutely
necessary. And, if you must share a password with a friend, family member or
colleague, you should change it to a temporary password first, share that one, then
change it back when they are done using it. Often, there are alternatives to sharing a
password, such as creating a separate account for each individual who needs access.
Keeping your password secret also means paying attention to who might be reading
over your shoulder while you type it or look it up in a secure password database.

Information Technology Level -2

o
Make it practical: If you have to write your password down because you can't
remember it, you may end up facing a whole new category of threats that could leave
you vulnerable to anybody with a clear view of your desk or temporary access to your
home, your wallet, or even the trash bin outside your office. If you are unable to think
of a password that is long and complex but still memorable, the Remembering
secure passwords section, below, might be of some help. If not, you should still
choose something secure, but you may need to record it using a secure password
database such as KeePass. Other types of password-protected files, including
Microsoft Word documents, should not be trusted for this purpose, as many of them
can be broken in seconds using tools that are freely available on the Internet.

A password should be chosen so as to minimise damage if someone does learn it.


o
Make it unique: Avoid using the same password for more than one account.
Otherwise, anyone who learns that password will gain access to even more of your
sensitive information. This is particularly true because some services make it
relatively easy to crack a password. If you use the same password for your Windows

111

user account and your Gmail account, for example, someone with physical access to
your computer can crack the former and use what they learn to access the latter. For
similar reasons, it is a bad idea to rotate passwords by swapping them around
between different accounts.
o
Keep it fresh: Change your password on a regular basis, preferably at least once
every three months. Some people get quite attached to a particular password and
never change it. This is a bad idea. The longer you keep one password, the more
opportunity others have to figure it out. Also, if someone is able to use your stolen
password to access your information and services without you knowing about it,
they will continue to do so until you change the password.

Information Technology Level -2

Mansour: What if I trust someone? It's OK for me to tell you my password, right?
Magda: Well, first of all, just because you trust somebody with your password doesn't
necessarily mean you trust them to take good care of it, right? Even though I wouldn't do
anything bad with your password, I might write it down and lose it or something. That
could even be how I got into this mess! And besides, it's not all about trust. If you're the
only one who knows your password, then you don't have to waste your time worrying
about who to blame if the account gets broken into. Right now, for example, I feel pretty
confident that somebody actually guessed or 'cracked' my password, because I never
wrote it down or shared it with anyone.
Remembering and recording secure passwords
Looking over the list of suggestions above, you might wonder how anyone without a
photographic memory could possibly keep track of passwords that are this long, complex
and meaningless without writing them down. The importance of using a different
password for each account makes this even more difficult. There are a few tricks, however,
that might help you create passwords that are easy to remember but extremely difficult to
guess, even for a clever person using advanced 'password cracking' software. You also have
the option of recording your passwords using a tool like KeePass that was created
specifically for this purpose.
Remembering secure passwords
It is important to use different types of characters when choosing a password. This can be
done in various ways:
Varying capitalisation, such as: 'My naME is Not MR. MarSter
o
Alternating numbers and letters, such as: 'a11 w0Rk 4nD N0 p14Y
o

112

Incorporating certain symbols, such as: c@t(heR1nthery3'


o
Using multiple languages, such as: 'Let Them Eat 1e gateaU au ch()colaT'
o
Any of these methods can help you increase the complexity of an otherwise simple
password, which may allow you to choose one that is secure without having to give up
entirely on the idea of memorizing it. Some of the more common substitutions (such as the
use of a zero instead of an 'o' or the '@' symbol in place of an 'a') were long-ago
incorporated into password-cracking tools, but they are still a good idea. They increase the
amount of time that such tools would require to learn a password and, in the more common
situations where tools of this sort cannot be used, they help prevent lucky guesses.
Passwords can also take advantage of more traditional mnemonic devices, such as the use
of acronyms. This allows long phrases to be turned into complex, seemingly-random
words:
'To be or not to be? That is the question' becomes 2Bon2B?TitQ'
o

'Are you happy today?' becomes 'rU:-)2d@y?'


o
These are just a few examples to help you come up with your own method of encoding
words and phrases to make them simultaneously complex and memorable.
A little effort to make the password more complex goes a very long way. Increasing the
length of a password even just by a few characters, or by adding numbers or special
characters, makes it much more difficult to crack. For demonstrative purposes, the table
below shows how much longer it may take a hacker to break a list of progressively more
complex passwords by trying different combinations of the password one after another.
Sample Password

Time to crack with an


everyday computer

Time to crack with a


very fast computer

bananas

Less than 1 day

Less than 1 day

bananalemonade

2 days

Less than 1 day

BananaLemonade

3 months, 14 days

Less than 1 day

B4n4n4L3m0n4d3

3 centuries, 4 decades

1 month, 26 days

We Have No Bananas

19151466 centuries

3990 centuries

W3 H4v3 N0 B4n4n45

20210213722742 centuries

4210461192 centuries

Information Technology Level -2

'We hold these truths to be self-evident: that all men are created equal' becomes
o
WhtT2bs-e:taMac='

113

Of course, the time it would take to crack any of the above passwords would vary widely
depending on the nature of the attack, and the resources available to the attacker.
Moreover, new methods to crack passwords are constantly being devised. All the same, the
table does demonstrate that passwords become vastly more difficult to break by simply
varying characters and using two words or, even better, a short phrase.
The table above is based on Passfault's calculations. Passfault is one of a number of
websites which allow you to test the strength of your passwords. However, while such
resources are good for demonstrating the relative efficiency of different types of
passwords, you should avoid introducing your actual passwords into these sites.
Recording passwords securely

Information Technology Level -2

While a little creativity may allow you to remember all of your passwords, the need to
change those passwords periodically means that you might quickly run out of creativity. As
an alternative, you can generate random, secure passwords for most of your accounts and
simply give up on the idea of remembering them all. Instead, you can record them in a
portable, encrypted secure password database, such as KeePass.
Hands-on: Get started with the KeePass - Secure Password Storage Guide
Of course, if you use this method, it becomes especially important that you create and
remember a very secure password for KeePass, or whatever tool you choose. Whenever
you need to enter a password for a specific account, you can look it up using only your
master password, which makes it much easier to follow all of the suggestions above.
KeePass is portable, as well, which means that you can put the database on a USB memory
stick in case you need to look up a password while you are away from your primary
computer.
Although it is probably the best option for anybody who has to maintain a large number of
accounts, there are a few drawbacks to this method. First, if you lose or accidentally delete
your only copy of a password database, you will no longer have access to any of the
accounts for which it contained passwords. This makes it extremely important that you
back up your KeePass database. Look over Chapter 5: How to recover from information
loss for more information on backup strategies. Fortunately, the fact that your database is
encrypted means that you don't have to panic if you lose a USB memory stick or a backup
drive containing a copy of it.
The second major drawback could be even more important. If you forget your KeePass
master password, there is no way to recover it or the contents of the database. So, be sure to
choose a master password that is both secure and memorable!

114

The strength of this method may, in certain situations, become it's weakness. If somebody
force you to give away your Keepass database master password, he will gain access to all of
the passwords stored in this Keepass database. If this is the situation you may face, you
could treat your Keepass database as a sensitive file, and protect it as we describe in
Chapter 4: How to protect the sensitive files on your computer. You can also create a
separate Keepass database to containg passwords protecting more sensitive information,
and take extra precautions with that database.
Mansour: Wait a minute. If KeePass uses a single master password to protect all of your
other passwords, how is it more secure than just using that same password for all of your
accounts? I mean, if a bad guy learns the master password, he gets access to everything,
right?

How to recover from information loss


Each new method of storing or transferring digital information tends to introduce several
new ways in which the information in question can be lost, taken or destroyed. Years of
work can disappear in an instant, as a result of theft, momentary carelessness, the
confiscation of computer hardware, or simply because digital storage technology is
inherently fragile. There is a common saying among computer support professionals: "it's
not a question of if you will lose your data; it's a question of when." So, when this happens
to you, it is extremely important that you already have an up-to-date backup and a welltested means of restoring it. The day you are reminded about the importance of a backup
system is generally the day after you needed to have one in place.

Information Technology Level -2

Magda: It's a good thought, and you're right that protecting your master password is
really important, but there are a couple of key differences. First of all, this 'bad guy' would
not only need your password, he'd need your KeePass database file, too. If you just share
the same password between all of your accounts, then he'd only need the password itself.
Plus, we know that KeePass is extremely secure, right? Well, other programs and websites
can go either way. Some of them are much less secure than others, and you don't want
someone breaking into a weak website, and then using what he learns to access a more
secure account. And there's another thing, too. KeePass makes it really easy to change
your master password if you think it's necessary. I should be so lucky! I spent all day today
updating my passwords.

Although it is one of the most basic elements of secure computing, formulating an effective
backup policy is not as simple as it sounds. It can be a significant planning hurdle for a
number of reasons: the need to store original data and backups in different physical

115

locations, the importance of keeping backups confidential, and the challenge of


coordinating among different people who share information with one another using their
own portable storage devices. In addition to backup and file-recovery tactics, this chapter
addresses two specific tools, Cobian Backup and Recuva.

Information Technology Level -2

Background scenario
Elena is an environmentalist in a Russian-speaking country, where she has begun to
create a website that will rely on creative presentation of images, videos, maps and stories
to highlight the extent of illegal deforestation in the region. She has been collecting
documents, media files and geographic information about logging for years, and most of
it is stored on an old Windows computer in the office of the NGO where she works. While
designing a website around this information, she has come to realize its importance and
to worry about preserving it in the event that her computer should be damaged,
especially if it should happen before she gets everything copied up to the website. Other
members of her organization sometimes use the computer, so she also wants to learn how
to restore her files if someone accidentally deletes the folder containing her work. She
asks her nephew Nikolai to help her develop a backup strategy.
What you can learn from this chapter
o
How to organise and back up your information
o
Where you should store your backups
o
How you can manage your backups securely
o
How to recover files that have been deleted accidentally
Identifying and organising your information
While it is clearly important that you take steps to prevent disaster, by making sure that
your information is physically safe, free of malware and protected by a good firewall and
strong passwords, on their own these steps are not enough. There are simply too many
things that can go wrong, including virus attacks, hackers, electrical short circuits, power
spikes, water spills, theft, confiscation, demagnetisation, operating system crashes and
hardware failure, to name just a few. Preparing for disaster is just as important as
defending against it.
Elena: I know backup is important, Nikolai, but doesn't that mean I should have someone
else set it up for me? I mean, am I really going to have the time, resources and expertise to
do this on my own?

116

Nikolai: You'll be fine. Coming up with a good backup plan takes a bit of thought, but it
doesn't take all that much time or money. And, compared with losing all of your
information, you can hardly call it inconvenient, right? Besides, backup is definitely one of
those things that you should manage yourself. Unless the people who normally help you
out with tech support are extremely reliable and extremely well-informed about where
you keep your digital information, you're better off setting things up on your own.

Next, you need to define which of these files are 'master copies,' and which are duplicates.
The master copy is generally the most up-to-date version of a particular file or collection of
files, and corresponds to copy that you would actually edit if you needed to update the
content. Obviously, this distinction does not apply to files of which you have only one copy,
but it is extremely important for certain types of information. One common disaster
scenario occurs when only duplicates of an important document are backed up, and the
master copy itself gets lost or destroyed before those duplicates can be updated. Imagine,
for example, that you have been travelling for a week while updating the copy of a
particular spreadsheet that you keep on your USB memory stick. At this point, you should
begin thinking of that copy as your master copy, because the periodic, automated backups
of the outdated version on your office computer are no longer useful.

Information Technology Level -2

The first step to formulating a backup policy is to picture where your personal and work
information is currently located. Your email, for example, may be stored on the provider's
mail server, on your own computer, or in both places at once. And, of course, you might have
several email accounts. Then, there are important documents on the computers you use,
which may be in the office or at home. There are address books, chat histories and personal
program settings. It is also possible that some information is stored on removable media as
well, including USB memory sticks, portable hard drives, CDs, DVDs, and old floppy disks.
Your mobile phone contains a list of contacts and may have important text messages stored
in it. If you have a website, it may contain a large collection of articles built up over years of
work. And, finally, don't forget your non-digital information, such as paper notebooks,
diaries and letters.

Try to write down the physical location of all master and duplicate copies of the
information identified above. This will help you clarify your needs and begin to define an
appropriate backup policy. The table below is a very basic example. Of course, you will
probably find that your list is much longer, and contains some 'storage devices' with more
than one 'data type' and some data types that are present on multiple devices.

117

Data Type

Master/
Duplicate
Master

Storage
Device
Computer hard

A few important electronic


documents

Duplicate

USB memory

With me
stick

Program databases (photos,


address book, calendar, etc.)

Master

Computer hard
drive

Office

A few electronic documents


Email & email contacts

Duplicate
Master

CDs
Gmail account

Home
Internet

Text messages & phone contacts


Printed documents
(contracts, invoices, etc.)

Master
Master

Mobile phone
Desk drawer

With me
Office

Electronic documents

Location
Office
drive

Information Technology Level -2

In the table above, you can see that:


o
The only documents that will survive if your office computer's hard drive crashes are
the duplicates on your USB memory stick and the CD copies at home.
o
You have no offline copy of your email messages or your address book, so if you forget
your password (or if someone manages to change it maliciously), you will lose access
to them.
o
You have no copies of any data from your mobile phone.
o
You have no duplicate copies, digital or physical, of printed documents such as
contracts and invoices.
Defining your backup strategy
To back up all of the data types listed above, you will need a combination of software and
process solutions. Essentially, you need to make sure that each data type is stored in at
least two separate locations.
Electronic documents - Create a full backup of the documents on your computer using a
program like Cobian Backup, which is described in more detail below. Store the backup on
something portable so that you can take it home or to some other safe location. External
hard drives, CD/DVDs or USB memory sticks are possible choices. Some people use CDs or
DVDs for this, since the risk of overwriting and losing your backup is lower. Blank CDs may
be cheap enough to allow you to use a new one every time you make a backup.

118

Because this category of data often contains the most sensitive information, it is
particularly important that you protect your electronic document backups using
encryption. You can learn how to do this in Chapter 4: How to protect the sensitive files
on your computer and in the TrueCrypt Guide.
Program databases - Once you have determined the location of your program databases,
you can back them up in the same way as electronic documents.
Email - Rather than accessing your email only through a web browser, install an email
client like Thunderbird and configure it to work with your account. The Thunderbird
Guide explains in detail how to do this. Also most webmail services will provide
instructions on how to use such programs and, often, how to import your email addresses
into them. You can learn more about this in the Further Reading section, below. If you
choose to move your old email messages to your computer so they are not stored on the
server (e.g. for security reasons), make sure that you include them in the backup of
electronic documents described above.

mobile phone, you can connect it to your computer using the appropriate software, which
is generally available from the website of the company that manufactured your phone. You
may need to buy a special USB cable to do this.
Printed documents - Where possible, you should scan all of your important papers, then
back them up along with your other electronic documents, as discussed above.
In the end, you should have rearranged your storage devices, data types and backups in a
way that makes your information much more resistant to disaster:
Data Type

Master/
Duplicate

Storage
Device

Location

Electronic documents

Master

Computer hard
drive

Office

Electronic documents

Duplicate

CDs

Home

A few important electronic


documents

Duplicate

USB memory stick

With me

Information Technology Level -2

Mobile phone contents - To back up the phone numbers and text messages on your

119

Data Type

Master/
Duplicate

Storage
Device

Program databases

Master

Computer hard
drive

Office

Program databases

Duplicate

CDs

Home

Data Type

Storage
Device

Location

Email & email contacts

Duplicate

Gmail account

Internet

Email & email contacts

Master

Thunderbird on
office computer

Office

Master/
Duplicate

Storage
Device

Data Type

Information Technology Level -2

Master/
Duplicate

Location

Location

Text messages & mobile


phone contacts

Master

Mobile phone

With me

Text messages & mobile


phone contacts

Duplicate

Computer hard
drive

Office

Text messages & mobile


phone contacts

Duplicate

Backup SIM

Home

Master/
Duplicate

Storage
Device

Data Type

Location

Printed documents

Master

Desk drawer

Office

Scanned documents

Duplicate

CDs

At home

Elena: I know some people who keep all of their important documents on Gmail, by
attaching them to 'draft' messages or emails to themselves. Would that count as a 'second
physical location' for my files?
Nikolai: It might help you recover if you lose one or two very important documents, but it's
pretty awkward. Honestly, how many documents per week would you be willing to back
up like that? Plus, you need to consider whether or not those attachments are safe,
especially if you're at all worried about your email being monitored. Unless you're
connecting to Gmail securely, this is a bit like handing over your sensitive information on a
silver platter. Using an HTTPS connection to Gmail in order to back up small Truecrypt

120

volumes or KeePass database files would be pretty safe, because they're encrypted, but I
really wouldn't recommend this as a general-purpose backup strategy.
Creating a digital backup
Of the various data types discussed here, it is the 'electronic documents' that people tend to
worry about most when establishing a backup policy. This term is somewhat ambiguous,
but generally refers to files that you keep track of yourself and that you open manually,
either by double-clicking on them or by using a particular application's File menu.
Specifically, it includes text files, word processing documents, presentations, PDFs and
spreadsheets, among other examples. Unlike email messages, for example, electronic
documents are generally not synchronised with remote copies over the Internet.

Email stored by an application such as Thunderbird is a special example of a program


database. If you use an email program, especially if you are unable or unwilling to store a
copy of your messages on the server, then you must ensure that this email database is
included in your regular backup. You may consider image and video files to be electronic
documents or items within a program database, depending on how you interact with them.
Applications like Windows Media player and iTunes, for example, work like databases. If
you use programs like this, you might have to search your hard drive to learn where they
store the actual media files that they help manage.
Storage devices

Information Technology Level -2

When backing up your electronic documents, you should remember to back up your
program databases, as well. If you use a calendar application or an electronic address book,
for example, you will need to find the folder in which these programs store their data.
Hopefully, these databases will be in the same location as your electronic documents, as
they are often kept inside your My Documents folder on a Windows computer. If that is not
the case, however, you should add the appropriate folders to your regular backup.

Before you can back up your electronic documents, you must decide what kind of storage
device you will use.
USB disk or memory sticks - USB disk or memory sticks can be quite inexpensive, and
offer large capacity. They are easy to erase or overwrite numerous times. USB disk or
memory sticks have a limited lifetime, which greatly depends on ways and frequency of
usage but is generally estimated to be around 10 years.
Compact Discs (CDs) CDs store around 700 Megabytes (MB) of data. You will need a CD

121

burner and blank discs in order to create a CD backup. If you want to erase a CD and update
the files stored on it, you will need to have a CD-RW burner and rewritable CDs. All major
operating systems, including Windows XP, now include built-in software that can write
CDs and CD-RWs. Keep in mind that the information written on these discs may begin to
deteriorate after five or ten years. If you need to store a backup for longer than that, you will
have to recreate the CDs occasionally, buy special 'long life' discs or use a different backup
method.

Information Technology Level -2

Digital Video Discs (DVDs) - DVDs store up to 4.7 Gigabytes (GB) of data. They work much
like CDs but require slightly more expensive equipment. You will need a DVD or DVD-RW
burner, and appropriate discs. As with a CD, the data written on a normal DVD will
eventually begin to fade.
Remote server - A well-maintained network backup server may have almost unlimited
capacity, but the speed and stability of your own Internet connection will determine
whether or not this is a realistic option. Keep in mind that running a backup server in your
own office, while faster than copying information over the Internet, violates the
requirement that you keep a copy of your important data in two different physical
locations. There are free storage services on the Internet, as well, but you should very
carefully consider the risks of putting your information online and you should always
encrypt your backups before uploading them to servers run by organisations or
individuals whom you do not know and trust. See the Further reading section for a few
examples.
Backup Software
Cobian Backup is a user-friendly tool that can be set to run automatically, at regularly
scheduled times, and to include only files that have changed since your last backup. It can
also compress backups to make them smaller.
Hands-on: Get started with the Cobian Backup Guide
As always, it is a good idea to encrypt your backup files using a tool such as TrueCrypt.
More information about about data encryption can be found in Chapter 4: How to protect
the sensitive files on your computer.
Hands-on: Get started with the TrueCrypt - Secure File Storage Guide
When using these backup tools, there are a few things you can do to help your backup
system work smoothly:
o
Organise the files on your computer. Try to move all of the folders that contain

122

electronic documents you intend to back up into a single location, such as inside the
My Documents folder.
o
If you use software that stores its data in an application database, you should first
determine the location of that database. If it is not in a convenient location, see if the
program will allow you to choose a new location for its database. If it does, you can
put it in the same folder as your electronic documents.
o
Create a regular schedule to perform your backup.
o
Try to establish procedures for all of the staff in your office who do not already have a
reliable, secure backup policy. Help your coworkers understand the importance of
this issue.
o
Make sure to test the process of recovering data from your backup. Remember that, in
the end, it is the restore procedure, not the backup procedure, that you really care
about!

Nikolai: But what if your office burns down? Computer, desk, backup CDs and all? Or, what
if your website forum gets used to plan some giant environmental demonstration, the
authorities crack down, things get out of hand, and the organisation is raided? I doubt
your little desk lock will keep the police from confiscating those CDs. What about keeping
them at home, or asking a friend to store them for you?
Recovering from accidental file deletion
When you delete a file in Windows, it disappears from view, but its contents remain on the
computer. Even after you empty the Recycle Bin, information from the files you deleted
can usually still be found on the hard drive. See Chapter 6: How to destroy sensitive
information to learn more about this. Occasionally, if you accidentally delete an important
file or folder, this security vulnerability can work to your advantage. There are several
programs that can restore access to recently-deleted files, including a tool called Recuva.

Information Technology Level -2

Elena: Alright, so I made an encrypted backup while I was at work, and I put it on a CD.
Cobian is scheduled to update my backup in a few days. My desk at work has a drawer that
locks, and I'm planning to keep these backup CDs in there so they won't get lost or broken.

Hands-on: Get started with the Recuva - File Recovery Guide


These tools do not always work, because Windows may have written new data over your
deleted information. Therefore, it is important that you do as little as possible with your
computer between deleting a file and attempting to restore it with a tool like Recuva. The

123

longer you use your computer before attempting to restore the file, the less likely it is that
you will succeed. This also means that you should use the portable version of Recuva
instead of installing it after deleting an important file. Installing the software requires
writing new information to the file system, which may coincidentally overwrite the critical
data that you are trying to recover.
While it might sound like a lot of work to implement the policies and learn the tools
described in this chapter, maintaining your backup strategy, once you have a system in
place, is much easier than setting it up for the first time. And, given that backup may be the
single most important aspect of data security, you can rest assured that going through this
process is well worth the effort.

Software Security

Information Technology Level -2

Network Security
Internet security is a branch of computer security specifically related to the Internet, often
involving browser security but also network security. Its objective is to establish rules
and measures to use against attacks over the Internet. The Internet represents an insecure
channel for exchanging information leading to a high risk of intrusion or fraud, such as
phishing. This session introduces you to Internet security concepts and how to secure
online and network transactions.
Network security refers to the practice of securing computers and devices in a network
from unauthorized users and attacks. Network security can range from simple procedure
such as using a username and password to using complex network devices to protect a
network.
Though Internet provides valuable information and entertainment, it may leave your
computer unsecure due to many online threats. You need to ensure that your usernames,
passwords, credit card or online banking information secure as they are prone to be
tracked and used by unauthorized users. Some websites can also install Malware on the
computer without user consent thereby leaving the computer damaged or insecure.
Online threats such as Phishing, email spoofing, chat spoofing, etc. can increase the
chances of users getting compromised. Following are some of the common types of host &
network based attacks:
Spoofing
Spoofing is a method that refers to use of forged IP address, MAC address, E-mai address,
etc. falsifying and gaining data. For example someone could send a packet from an IP

124

address such as 10.1.1.1 but appears as if it was sent from another IP address thereby
allowing the packet to enter into network, thus resulting in gaining access to someone's
network without their consent.
Root kits
Root kits are special programs that take control of a computer by replacing critical system
files and usually do undetected. Most of root kit programs are kernel-based, they act like
parasites and attach themselves with the operating system. Though it is difficult to detect,
you can observe change in patterns and check integrity of the operating system to see if it's
affected by a root kit and take appropriate action.
Denial of service
Denial of service is a kind of attack that causes services to become unavailable when they
are expected. For example a website under DOS (Denial of service) attack will cause itself
to halt and affect the users by not providing the necessary service such as access to email or
online shopping.

You can reduce the risks by using best practices such as using Antivirus Software,
Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading
awareness of the best practices.
Best Practices for Security
Use strong passwords, a combination of alphanumeric and special characters could be
used for creating a password that is not so easy to crack or guessed by other users. Do not
keep passwords such as your favorite color, friends or relatives name, bike number,
mobile number either as single or combined option. These passwords are easy to
guess if a user knows you personally. Change your password frequently at least 2 or
3 weeks so that your account information remains secure.

Information Technology Level -2

To prevent unauthorized users from gaining access through any method, you need to
implement a variety of security measures such as using a firewall, scanning your computer
or network for weakness, apply security patches, use IDS, etc.

Using strong passwords can lower the risk of a security breach; effectiveness of a
password depends on the security mechanism of the software and users involvement
in generating a strong password.
Most websites check for password effectiveness when a user attempts to register for
the first time or when they change password. For example, when you register with
Gmail, you may notice a password meter displaying the strength of your password
similar to the one displayed below.

125

Following is a general guideline for managing strong passwords.


o
Keep the length of the password at least 12-14 characters if permitted.
o
Avoid keeping passwords based on repetition, dictionary words, letter or number
sequences, usernames, relative or pet names, etc.
o
Including numbers, and symbols in passwords if allowed.
o
Use capital and lower-case letters.
o
Avoid using the same password for multiple sites or purposes.
o
Avoid using something that the public or workmates know you strongly like or
dislike.
o
Use random password generators if possible.

Information Technology Level -2

Example of a strong password: u1vX:,4Hd{]$


You may also websites such as www.strongpasswordgenerator.com that can
generate random strong passwords. To generate a strong password using
www.strongpasswordgenerator.com do the following:
o
Open any web browser. Type www.strongpasswordgenerator.com in the address bar
and press Enter.
o
Click Generate strong password. Notice the password displayed under your new
password.
Backup your data: Always keep copies of personal data in additional media such as
compact discs, pen drives, etc. This could be helpful in situation when there is a loss of data.
Keep the data away from unauthorized users.
Use encryption software (usually available within the operating system) to protect
your data from unauthorized users. If encryption software is not available within the
operating system, use a 3rd party software.
Keeping your username and password private: Never save your username or
password on computers that are used in shared environments such as internet caf.
Browsers may save your personal data on the local computer that can be used by another
user using the same computer.
Registering with websites: Read the privacy statement or policy whenever you register
with a website, the statement or policy will include information about how the website use
personal data.

126

Do not share personal information; websites require you to fill out forms
containing fields such as name, gender, age, email address, school, etc. Be cautious
when filling out such forms; research and verify if it's a trustable website . Your email
addressed could be used by unauthorized users to send you fake or unwanted emails;
think twice or thrice before providing information to any website and decide if it is really
necessary.
Secure transactions: If you are using online shopping or transactions, websites even
store your credit card or online banking personal information such as your credit card
number, account details, etc. This information can be tracked and used by un-authorized
users often known as hackers to misuse this information. Again, ensure the website is
legitimate and uses secure practices for performing and maintaining online transactions.
Since information such as credit card details or personal information is sent over the
network, it is always recommended to use only secure websites for such transactions.
Verify if the website uses secure transaction; usually it is indicated through a digital
certificate represented as a golden lock in the web browser's address bar.

Do not immediately respond to mails from unknown users, it may be a fake mail trying to
gather personal information such as your bank account details, home address, etc. Some
mails could promise you jobs or announce lottery results which in turn could
compromise the user. And in some cases, virus or scripts that are dangerous could be
attached to the mail; NEVER open the attachment from an unknown source.

Information Technology Level -2

Use antivirus and antispyware software, computers are prone to attacks from software
known as Malware that could harm your computer. Malware track browsing behavior
or transmit personal data from your computer; programs such as keyloggers could
be installed on your computer track and transmit every key that is pressed on a
keyboard (keystrokes) to unauthorized users. Antivirus and Antispyware programs also
offer real-time protection monitoring your computer for any changes by malware
software. Keep your Antivirus and Antispyware software always up to date, this can
help in protecting your computer from recent threats.

Clear browser cookies frequently, cookies are programs that are created on your
local computer when you visit websites. Though cookies are meant for storing data
based on your activity performed during your earlier visit such as logon details, details of a
shopping cart, visited pages in a website, etc. they could also be tracked by
unauthorized users and possibly gain access to your personal information.
Keep the operating system and software applications up to date; though operating
systems and applications are designed, tested and distributed, sometimes they may

127

have security holes through which a hacker can take advantage; they may track and
gather information or even damage the whole computer. In general, most vendors notify
the users whenever a security hole is identified and an update is available to address that
particular issue. You can also visit respective vendor's website to check if there are any
updates available, download and keep your operating system and software applications up
to date, free from security holes.
Install firewalls: Firewalls could be software or hardware and can assist in keeping
a computer and a network secure. Firewalls analyze the network traffic and
determine if the traffic should be allowed or not. In most cases, operating systems
such as Linux, Windows or Mac include firewall software as a part of operating system thus
keeping the computer secure. In rare cases, you may need to configure your firewall for
additional security.
Never install software from unknown sources as they might not be trustworthy;

Information Technology Level -2

download only from well-known or reputed websites. Verify the source if it is


legitimate by searching the internet or referring to comments from other users
before downloading them; understand the nature and the purpose of the software
before attempting to download and install them.
Remove unwanted or unknown software applications; these might have got installed
without your knowledge when you have visited some websites. Unwanted software
could get installed as they might have been bundled along with necessary software. Some
programs such as toolbars get installed usually through bundled software and are
programmed to send personal data without your consent.
Clearing Data Stored In Browsers
Web browsers have built-in password management designed to store passwords used in
forms on websites. Browsers often prompt to save usernames and passwords when
users attempt to logon to websites.
This facility is offered to users, so that they can logon to their frequently used websites
without having to type the usernames or passwords. However it is not advisable to leave
the web browser store this data particularly on public or shared computers.
To clear personal data from a web browser such as Mozilla Firefox, launch the browser.
o
Click Tools Menu, click Options.
o
Click Security Tab. The following window will be displayed:

128

Mozilla Firefox can also store data such as cookies, visited websites or webpages
data, browsing history, etc. To clear this stored data, click General tab > Option. The
following window will be displayed:

Information Technology Level -2

Notice that under Passwords section, Remember password for sites is checked. This
means the browser is configured to save passwords for websites automatically. You can
uncheck Remember password for sites option, if you prefer NOT to store passwords.

129

o
Click Privacy Tab. The following window will be displayed:

Information Technology Level -2

o
Under History section, click the drop down menu next to Firefox will:.

130

o
Select Use custom settings for history from the drop down list. The following
window will be displayed:

Notice the preferences; Firefox is configured to remember browsing and downloading


history search and form history and cookies. If you do not wish store the above mentioned
data, select Never remember history from the drop down list. If you are in a public
environment such as a cyber caf, you may select the option Clear all current history.
On selecting this option, the following window will be displayed:

o
There are several online threats such as Phishing, email spoofing, chat spoofing, etc.
o
You can reduce the risks by using best practices such as using Antivirus Software,
Antispyware Software, Firewalls, strong passwords, etc. in addition to spreading
awareness of the best practices.
Firewall
Firewalls are software or hardware devices that protect a computer and/or a network by
analyzing and controlling both incoming and outgoing network traffic. Firewalls act like a
window between internal and external network allowing authorized users to access
resources.

Information Technology Level -2

o
Click Clear Now and then click OK. From now on, Mozilla Firefox will not remember
any history as you have configured it that way.

Most operating systems include a software firewall and are configured to keep your
computer secure. While software firewalls are sufficient for home and smaller networks,
hardware firewalls are essential for larger networks as it offers a higher level of protection
and can scale to larger network traffic from tens to hundreds of computers.

131

Firewall generations:
o
First generation: Firewalls use Packet filters, a mechanism in which each packet is
analyzed based on a combination of source and destination IP address, ports and
decide if the packet should be passed on or discarded.

Information Technology Level -2

o
Second generation: Firewalls use stateful filters, a mechanism in which each packet
is analyzed to track the state of network connection travelling through it. Only
packets that match the active connection is allowed or else discarded. Stateful Packet
inspection (SPI) used in this method is considered most secure as it allows packets to
be transmitted to the internal network as the firewall checks if the response packet is
originated based on the request sent from the internal network.

132

o
Third generation: Firewalls provide application layer filtering by working closely
with the applications (browsers, email software, etc.) and protocols (http, ftp, smtp,
etc.). This is useful when unwanted network application software or protocol
attempts to use network bandwidth, causing harm to the computer or flood the
network traffic and need to blocked or never allowed.
Note: Packet filtering alone does not provide enough protection. In order to effectively block
peer-to-peer-related network traffic, what is needed is a firewall that does application
filtering, which can be regarded as an extension to stateful packet inspection. Stateful packet
inspection can determine what type of protocol is being sent over each port, but applicationlevel filters look at what a protocol is being used for. For example, an application-level filter
might be able to tell the difference between HTTP traffic used to access a Web page and HTTP
traffic used for file sharing, whereas a firewall that is only performing packet filtering would
treat all HTTP traffic equally.
Types of Firewalls
o
Personal Firewalls are usually shipped with an operating system and protect only
the computer on which it is installed. Personal Firewalls are designed to control
network traffic generated by applications such as web browsers, file transfer
software, email software, etc. installed on a computer. When an application tends to
transmit or receive, the firewall looks up the policy defined in the firewall settings
and allows or denies network traffic accordingly. If you do not have a personal
firewall installed on your computer or you want to use a more advanced firewall
software with advanced management capabilities, you can purchase a commercial
firewall software or a hardware firewall.

Notable software firewalls include Windows Firewall (shipped with most versions of
Microsoft Windows), ZoneAlarm, Comodo Internet Security Plus, etc. Some Antivirus vendors bundle firewall software to provide complete protection such as
McAfee Internet Security, Kaspersky Internet Security, Norton Internet Security, etc.
o
Enterprise Firewalls are suitable for organizations that have thousands of users or
for networks that need high level of security such as banks. Enterprise Firewalls are
usually hardware based, expensive, require additional technical expertise but offer
greater levels of protection and scale to larger network traffic without affecting
stability in performance. Enterprise firewalls can protect the entire network and
operate at the network layer scanning each packet that transmits through them.
Notable vendors for enterprise firewalls include Cisco, HP, IBM, Microsoft, Juniper
networks, etc.

Information Technology Level -2

o
Windows Firewall: Windows Firewall is a built-in firewall software bundled and
installed by default on most Microsoft Windows Operating systems like Windows XP,
Vista & 7. Windows Firewall protects the computer by using the default settings
(firewall rules) that can be modified anytime. Most commonly used network
applications such as web browsers, email client software, etc. work without the need
for modifying the settings on the firewall. Some network applications may not work
as intended if it is blocked by the firewall (for example, an antivirus software may not
be able to update itself from the Internet); in such cases, you need to add the
application to the exception list indicating that the application is permitted to use the
network or the Internet.

133

132

Information Technology Level -2

Information Technology Level -2

CENTRAL BOARD OF SECONDARY EDUCATION

Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092 India

You might also like