Professional Documents
Culture Documents
Exploring IT Class 7 (Ubuntu Edition)
Exploring IT Class 7 (Ubuntu Edition)
and LibreOffice. It covers other Free and Open-Source Software (FOSS) such as KolourPaint and
KTurtle. It also discusses various software applications, including Adobe Flash, QBASIC and HTML. This
new series of Exploring Information Technology has been designed with emphasis on interactive and
creative approach. It serves as an ideal classroom support for computer education. It is based on the
latest guidelines of National Curriculum Framework (NCF), NCERT and all major state boards.
d
KEY FEATURES
Lt
Text is presented in a clear and simple language, with enhanced visual appeal.
t.
All the ideas and concepts are explained with clear-cut and practical examples.
Pv
Each and every topic is thoroughly researched and certified by consultant teachers from schools.
a
The illustrations given in the chapters lend enormous support as learning aids.
di
For the Teacher boxes provide teaching ideas and tips for the teachers.
In
Did You Know and Note boxes impart more information and interesting facts about the topic being
rs
discussed.
he
An exhaustive set of questions and activities are given at the end of each chapter to reinforce
is
learning and develop practical computer skills.
bl
Revision exercises and Project work at the end of the book help to sharpen the concepts learnt in
Pu
the chapters.
Sample questions based on National Cyber Olympiad at the end of the book help students prepare
n
for the Olympiads.
illa
ITL Education Solutions Limited (ITL ESL) is a part of the ITL group which has operations all over
m
the world with a significant presence in education and IT-enabled services. It specialises in handling
ac
educational projects in IT domains with a dedicated R&D wing of industry experts that helps in designing
M
and developing content.
We will be happy to respond to you on any query relating to the series.
©
Write to us at cs-support@macmillan.co.in
` 405
ISBN 938951821- 0
td
TECHNOLOGY
.Lt
Pv
a
di
7
In
rs
he
is
bl
Pu
n
illa
m
ac
M
©
Macmillan Publishers In
www.macmillaneduc
All rights reserved under the copyright act. No part of this publication may
be reproduced, transcribed, transmitted, stored in a retrieval system or
translated into any language or computer language, in any form or by any
means, electronic, mechanical, magnetic, optical, chemical, manual, photocopy
or otherwise without the prior permission of the copyright owner. Any person
who does any unauthorised act in relation to this publication may be liable
to criminal prosecution and civil claims for damages.
td
Cuttack Guwahati Hyderabad Jaipur Lucknow Madurai
.L
Nagpur Patna Pune Thiruvananthapuram Visakhapatnam
t
Pv
ISBN: 978-93-89518-21-4
a
ITL Education Solutions Ltd., 2nd Floor, GD-ITL Towers,
di
Netaji Subhash Place, Pitampura, New Delhi 110 034 In
Published by Macmillan Publishers India Private Ltd,
rs
Printed at
is
bl
Pu
n
illa
“This book is meant for educational and learning purposes. The author(s) of the book has/have taken all reasonable care to ensure
m
that the contents of the book do not violate any existing copyright or other intellectual property rights of any person in any manner
ac
whatsoever. In the event the author(s) has/have been unable to track any source and if any copyright has been inadvertently infringed,
please notify the publisher in writing for corrective action.”
M
©
ACKNOWLEDGEMENTS
We are immensely thankful to Ms Anne Dias, M.A., M. Ed., Director – Special Projects, Academic and Continuous Professional
Development, Ms Tracy Cardoz, M.A. M. Ed., Vice President – Curriculum Development, Ms Jaya Venkatram, M.A, B.Ed.,
A.G.M. – Curriculum Development and Dr Shefali Bharti, Ph.D., Sr. Manager – Academics Operations, VIBGYOR Group
of Schools, Mumbai for their active interest in promoting excellence in education and their invaluable contribution in the
successful completion of the project. Their guidance in designing the content and course structure for the series with regular
quality check has made the product par excellence.
We would also like to thank the Curriculum development team members Mr Sankalp Korde and Ms Shraddha Kambli along
with the Heads of the Computer Science Department Ms Amreen Khan, Ms Shruti Kamat, Ms Puja Kumar and Ms Sarla Devi
and all the Computer teachers of the VIBGYOR Group of Schools for their constant inputs and support during the making
of this series.
td
and it is gaining more momentum day by day.
.L
The series serves as an ideal classroom support for computer education. It is based on a
t
Pv
comprehensive curriculum graded according to the latest guidelines of National Curriculum Framework
a
(NCF), NCERT and all major state boards. It discusses various software applications, including
di
KolourPaint, KTurtle, LibreOffice, Adobe Flash, QBASIC and HTML.
In
Key Features
rs
he
• Text is presented in a clear and simple language, with enhanced visual appeal.
is
• All the ideas and concepts are explained with clear-cut and practical examples.
bl
• Each and every topic is thoroughly researched and certified by consultant teachers from schools.
Pu
• The illustrations given in the chapters lend enormous support as learning aids.
n
• For the Teacher boxes provide teaching ideas and tips for the teachers.
illa
• Did You Know and Note boxes impart more information and interesting facts about the topic
m
ac
being discussed.
M
• An exhaustive set of questions and activities are given at the end of each chapter to reinforce
learning and develop practical computer skills.
©
• Revision exercises and Project work at the end of the book help to sharpen the concepts learnt
in the chapters.
• Sample questions based on National Cyber Olympiad at the end of the book help students
prepare for the Olympiads.
We will be happy to respond to you on any query relating to the series. Write to us at
cs-support@macmillan.co.in.
Rohit Khurana
Founder and CEO
ITLESL
td
.L
5 Advanced Features of QBASIC 53
t
Pv
6 Introduction to HTML 75
a
di
In
7 Basic HTML Elements 85
rs
he
Revision 135
Terminology 139
td
which is an input device.
you about those devices.
t.L
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
M
Contents
©
td
variety of products and books. This code includes information about an item’s price,
.L
code, and its manufacturer’s detail.
t
Pv
A barcode reader generates light to reflect the image
on the barcode. It then identifies the image from the
a
thickness and spacing of the bars. When the image is
identified, it is converted into a numeric code which
di
In
can be processed according to the requirements.
rs
he
position readers, items having a barcode are passed in Fig. 1.1 Barcode reader
front of the reader either by hand or a conveyor belt.
n
Hand-held readers are not fixed at one place and are brought in front of the items to read
illa
their barcodes.
m
ac
means of a document reader. The first major use of the OCR was in processing petroleum
credit-card sales drafts. Over time, other applications evolved, including cash registers, stock
control, tape readers, market surveys, etc. OCR is also used for recognising handwriting.
The OCR system consists of an optical scanner and a special
software known as the OCR software. The optical scanner is used
to produce a digital image of the text document. The OCR software
then converts the individual bitmap images of the characters into a
computer-understandable code. This code is then interpreted by the
computer as letters, numbers, and special characters. Fig. 1.2 OCR
The OCR system makes the data entry fast and efficient. However,
if the document is not typed properly or written clearly, it becomes difficult for the OCR
2
td
should be positioned correctly and should be significantly darker than the surrounding
.L
paper. The forms are then passed under the OMR reader. The result obtained by the
reader is sent to the computer.
t
Pv
1.1.4 Magnetic Ink Character Recognition (MICR)
a
di
Magnetic Ink Character Recognition refers to the technique of recognising special magnetic
In
codes. These codes are printed using a special font which consists of numerals 0 to 9 and
rs
some special characters. A special ink which contains magnetised particles of iron oxide
he
td
instead of carrying cash. A special device called smart card
.L
reader is used to read the information from the smart cards.
t
Pv
Today, smart cards are used as SIM cards for mobile phones,
Fig. 1.6 Smart card
authorisation cards for pay television, and public–transport
a
di
payment cards such as in the Delhi Metro.
In
1.1.7 Touch Screen
rs
he
object.
m
A touch screen is normally used when information has to be Fig. 1.7 Touch screen
ac
the input of large amounts of data. Typically, it is used in ATMs and information-providing
systems such as those at hospitals, airlines, railway-reservation counters, amusement
©
parks, etc.
1.2.1 Plotter
A plotter is an output device that is used to generate graphical outputs such as images,
charts, graphs, blueprints, maps, circuit diagrams, and other line-based diagrams.
4
Types of Plotters
There are two types of plotters.
Drum plotter: This plotter is used to produce continuous output such as plotting
an earthquake activity or for long graphic output structures such as tall building
structures. A drum plotter consists of a long cylinder known as the drum. The paper
that is to be printed is placed over the drum. The drum can rotate clockwise or anti-
clockwise to draw lines.
Flatbed plotter: This plotter is used in designing ships, aircraft, buildings, etc.
A flatbed plotter consists of a stationary horizontal plotting surface on which the
td
paper is fixed. A pen mounted on a carriage moves horizontally or vertically to draw
.L
lines.
t
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
A Liquid Crystal Display (LCD) projector is a device which is used for displaying
presentations created on a computer. It is generally used when the target audience is
large in number and the computer monitor cannot be used to show the presentation.
For displaying a presentation, the LCD projector is connected to a computer which runs
the presentation and the projector projects the image on a flat surface such as a screen,
board, etc.
Software
td
.L
Device System Presentation Desktop
t
drivers utilties software publishing software
Pv
Fig. 1.10 Types of software
a
1.3.1 System Software
di
In
System software refers to a set of programs that are designed to control the operations of
rs
a computer system. The system software helps all parts of a computer to work together.
he
In simple words, it makes a computer functional. It also controls the operations of other
is
types of software that a computer runs. Basic functions of the system software are visual
bl
display, file management, keyboard input, security management, and many more.
Pu
The system software can be categorised into operating systems, device drivers, language
translators, and system utilities.
n
illa
The operating system is a system software that acts as an interface between the computer
M
hardware and the user. It is the first software that is loaded into the computer memory.
The operating system controls and organises the hardware. It interprets the commands
©
given by the user and communicates them to the hardware. It provides a platform for other
programs (software) to work properly. Basic functions of an operating system are memory
management, input/output management, file management, security management, etc.
Some of the examples of an operating system are Windows 8, Windows 7, Ubuntu,
Windows NT, UNIX, and Linux.
Device Drivers
Device drivers are system software responsible for proper functioning of various devices
connected to the computer. Every device, whether it is a printer, monitor, mouse or
keyboard, has a driver program associated with it for its proper functioning. A driver acts
like a translator between the device and the program that uses the device.
6
td
Interpreter: An interpreter reads one statement of a program (written in a high-level
.L
language) at a time, translates it into machine language and executes it immediately.
t
It continues to read, translate, and execute the statements one by one until it reaches
Pv
the end of the program. Therefore, it is slower than a compiler. The machine code
a
produced by the interpreter is not saved and hence, to execute a statement again, it
has to be interpreted again.
di
In
Assembler: An assembler translates a program written in the assembly language into
rs
machine language. It recognises the mnemonics used in the assembly language and
he
Language
translators
n
illa
m
ac
System Utilities
System utilities perform some specific tasks related to the maintenance of computer
hardware and data. They are used to support, enhance, and secure programs and data
in the computer system. The most common functions of system utilities include file
management, backup, data recovery, virus protection, and disk cleanup.
td
an efficient manner. Microsoft Access, LibreOffice Base and Oracle are examples of
.L
DBMS.
t
Presentation software: This software allows the user to create presentations with the
Pv
help of slides and handouts. Microsoft PowerPoint, LibreOffice Impress and Freelance
a
Graphics are examples of a presentation software.
di
Desktop publishing software: This software allows a user to create printed documents
In
using a desktop computer. It is the technique of using a personal computer to design
rs
a page with text and graphics and then using a laser printer or image-setter to output
he
the assembled pages onto paper, film or printing plate. These software are used for
is
publishing newsletters, books, magazines, etc. Quark Express and Adobe InDesign
bl
Low-level High-level
languages languages
Machine Assembly
language languages
td
.L
1.4.1 Low-level Language
t
Pv
In general, a language that is encoded in the binary language or is similar to the binary
language is understood and executed more quickly by the computer. A low-level language
a
di
is one such language which is similar to the binary language. However, it is machine
In
dependent, that is, it depends on the type of computer. This makes it difficult to learn and
use, as the programmer must have an in-depth knowledge of different computers to write
rs
computer. It was the first language used in the earliest machines and computers.
n
It is written using binary digits, that is, 0s and 1s, and therefore, it can be directly
illa
Assembly language: An assembly language uses letters, words, and symbols, called
mnemonics, instead of the binary digits used in machine language. This makes it
©
easier to use than machine language. However, this language depends on the type
of computer. That is, a program written for one computer cannot be executed on
another. A program written in an assembly language is called an assembly code.
Points to
Remember
A computer can accept inputs both manually and automatically.
A barcode reader is used to read the Universal Product Code (UPC) or the
barcode of a product.
Optical Character Recognition (OCR) is the process of providing text as input to
td
a computer by means of a document reader.
.L
Optical Mark Recognition (OMR) is the technique of recognising a pre-specified
t
Pv
mark made by a pencil or pen on paper.
Magnetic Ink Character Recognition (MICR) refers to the technique of recognising
a
di
special magnetic codes. In
A magnetic strip is used to store data. It can store up to 60 characters.
rs
A touch screen is a special kind of input device that enables you to choose an
Pu
icon or menu item displayed on a screen by simply touching it with your finger.
n
images, charts, graphs, blueprints, maps, circuit diagrams, and other line-based
m
diagrams.
ac
A Liquid Crystal Display (LCD) projector is a device that is used for displaying
M
The term ‘software’ refers to a set of computer programs that are loaded into a
computer for its proper functioning and processing of information. Software can
be categorised as system software or application software.
System software refers to a set of programs that are designed to control the
operations of a computer system. They can be categorised into operating systems,
device drivers, language translators, and system utilities.
Application software is a set of programs designed to perform a specific task.
Computer languages are divided into two categories—low-level languages and
high-level languages.
10
td
c. Which of the following is the technique of recognising a pre-specified mark
.L
made by a pencil or pen on a paper?
t
Pv
(i) Card reader (ii) OCR
a
(iii)
OMR (iv) Smart card
di
In
d. Which system software acts as an interface between the computer hardware
and the user?
rs
he
(iii)
Operating system (iv) Compiler
bl
Pu
e. Which of the following use English-like statements that are much easier to
learn and use?
n
illa
11
td
Universal Product Code.
t .L
c. OMR is widely used in banks.
Pv
d. Touch screens register the input when you touch the screen with
a
di
your finger or an object. In
e. A drum plotter consists of a long cylinder known as the drum.
rs
he
device drivers.
n
td
For Teacher
.L
the
t
Pv
Discuss with the students the working and uses of some advanced input and
output devices.
a
Explain to them the various types of software.
di
In
Tell them about the various types of computer languages.
rs
he
is
bl
Pu
n
illa
m
ac
M
©
13
td
you please tell me how to use Why not? Let us start.
.L
formulas and functions in Calc?
t
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
Contents
M
©
Formulas
Functions
Errors in Formulas LibreOffice Calc is an easy-to-use, yet powerful,
and Functions spreadsheet package. It enables you to quickly create
Printing in LibreOffice documents involving calculations. In your previous class,
Calc you have already learnt about the various components of
the Calc window and how to work with a worksheet.
In this chapter, you will learn how to use various formulas and functions to perform
mathematical calculations. The chapter also discusses various types of errors that can be
encountered while entering formulas and functions in a worksheet, and how to print a
worksheet or a workbook.
14
td
in a formula are listed in Table 2.1.
.L
Table 2.1 Operators used in a formula
t
Pv
Symbols Description
a
=
di
equal-to sign—a formula begins with an equal-to sign
In
() parentheses
rs
he
+ addition
is
– subtraction
bl
Pu
* multiplication
/ division
n
illa
^ exponent
m
ac
The Formula Bar is used to enter a formula in an active cell. You can type the formula
in the Input line. There are three buttons on the Formula Bar to the left of the Input line.
M
15
For example, if you want to calculate the total marks obtained by Preeti in the worksheet
shown in Fig. 2.2 using a formula, follow these steps.
1. Click the cell where you want to insert the formula, that is the cell F2.
2. Type (=) or click the Formula ( ) button on the Formula Bar to display ‘=’ in the
Input line. Now, type the address of the cells which are to be added that is, enter
B2+C2+D2+E2. Note that the formula is displayed in the Input line.
td
t .L
Pv
a
di
In
Fig. 2.2 Entering formula in a worksheet
rs
3. Press the Enter key. The result appears in the cell F2.
he
is
bl
Pu
n
illa
m
ac
Note that while you type a formula in the Input line, you can see the following two buttons
©
16
td
4. Now click the cell where the formula is to be copied, for example, click the cell F3.
.L
5. Click the Paste button ( ) present in the Standard toolbar OR right-click on the cell
t
Pv
and click the Paste option from the shortcut menu that appears.
6. The formula is copied and the result, that is, the sum of marks obtained by Himanshu
a
di
appears in the cell F3 (Fig. 2.5). In
rs
he
is
bl
Pu
n
The total marks of all the students can be calculated by repeating the same steps for
m
each student. Note that the formula copied for different cells is the same, except that the
ac
formula in cell F3 adds the entries in row 3, the formula in cell F4 adds the entries in row
M
4, and so on.
©
If you want to copy the same formula in multiple adjacent cells at once, select the desired
range of cells after copying the formula and then paste the formula. For example, to
calculate the percentage of each student using a formula, follow these steps.
1. Enter the formula =(F2/400)*100 in the cell G2 and press the Enter key.
2. Copy the formula entered in
the cell G2.
3. Select the cells G3 through
G9 and paste the formula.
td
t .L
Pv
Fig. 2.7 Copying formula using fill handle
a
2.1.3 Cell Referencing
di
In
As studied earlier, each cell has a unique address, which is specified by the intersection of
rs
he
the row and column corresponding to that cell. Calc can record cell addresses in formulas in
two different ways—relative reference and absolute reference. When you copy a formula,
is
bl
Relative Referencing
n
illa
When you copy a formula that contains cell references, Calc automatically adjusts the cell
m
references according to the cells where you paste the formula. Cell references that change
ac
when copied are known as relative cell references and this type of cell referencing is called
M
relative referencing.
©
Suppose, your teacher enters the marks of students obtained in different subjects in your
class. To calculate the average of each student is time-consuming. To avoid this, follow
these steps.
1. Enter the data as shown in Fig. 2.8 in the worksheet.
2. Write the formula =(F2/400)*100 in the cell G2.
3. Press the Enter key. This displays the result in the cell G2.
4. Click the Copy button on the Standard toolbar.
5. Click the next cell, that is, G3 and press the Enter key. You can see in the Input line
that the cell reference used in the formula is changed.
6. Repeat steps 4 and 5 until you have finished performing the calculation.
18
Note that relative referencing allows you to perform the same operation in the adjacent
cells. You do not need to provide the formula in the next cell as it is automatically generated
or copied. The references of the new cell (where the operation or the formula is copied)
are reflected in the Input line.
td
.L
Absolute Referencing
t
Pv
The cell whose reference is a fixed position in the worksheet is known as an absolute
referencing or an absolute cell reference. As a result, when the formula is copied to another
a
di
cell, its reference does not change. An absolute reference uses two dollar signs in the cell
In
address: one before the column letter and another before the row number. For example,
rs
Suppose that the salary of all the employees in the worksheet shown in Fig. 2.9 is to
is
be increased by 1500. Instead of adding this value individually to the salary of each
bl
employee, this operation is performed by absolute referencing. First, we enter the formula
Pu
=B2+$C$2 in the cell D2 to calculate the new incremented salary of the first employee.
n
Then, we copy this formula in cells D3 through D6 to calculate the same for the other
illa
employees.
m
Absolute referencing
ac
M
©
Notice that when the formula is copied, only the relative address of the cell changes
and the absolute address remains the same. For example, when you copy the formula
B2+$C$2 to another cell, only B2 (relative address) changes, while the absolute address
($C$2) remains the same. This implies that when the formula is copied to the cell D6, the
formula becomes =B6+$C$2.
19
td
functions require arguments for evaluation, while some functions can be evaluated
.L
without using arguments. For example, the SUM function requires arguments, while
t
Pv
the NOW function does not require any argument.
a
2.2.1 Entering Functions
di
In
To enter a function in your worksheet, follow these steps.
rs
2. Enter the equal-to sign ‘=’. Then enter the name of the function, followed by an
is
opening parenthesis ‘(’. After this, enter any argument (if required) for the function
bl
Pu
and then a closing parenthesis ‘)’. Note that there should be no space between the
name of the function and opening parenthesis.
n
illa
3. Press Enter to display the result of the function. For example, if you want to add
numbers in cells A3 to E3, use the SUM function and pass the range of cells as an
m
This method is useful when you are sure about the syntax of a particular function. If you
are not aware or sure of a function’s syntax, you should always use the Function Wizard.
td
Number 1. Fig. 2.11 Function Wizard dialog box
.L
6. The Function Wizard mini dialog box appears on the worksheet. Here, you can
t
Pv
either type the desired cell range or select the desired cell range using the mouse.
a
di
In
rs
he
is
bl
Pu
td
discuss these functions. We will use the
.L
sample data shown in Fig. 2.15 to explain
t
Pv
different functions in Calc.
Note that a function name can be entered
a
di
either in lowercase or in uppercase. For In
example, the SUM function is the same as
rs
SUM
bl
The SUM function adds numbers given as arguments. The syntax of the SUM function is
Pu
given here.
n
SUM(number1,number2...)
illa
For example, to add the marks of the student Preeti in both the subjects, enter the function
m
=SUM(B2:C2) in the cell D2 and press the Enter key. Sum can also be calculated by directly
ac
You can also add a number (such as 100) to the range of cells according to the requirements.
©
The function is
=SUM(B2:C2)
22
The function is
=PRODUCT(B2:C2)
td
t .L
Pv
The function is The function is
=PRODUCT(78,92) =PRODUCT(B6,500)
a
di
Fig. 2.17 PRODUCT function
In
rs
AVERAGE
he
The AVERAGE function calculates the average (arithmetic mean) of the given values.
is
AVERAGE(number1,number2...)
Pu
For example, to calculate the average marks of the student Preeti, enter
n
=AVERAGE(B2:C2) in the cell D2 and press the Enter key. Average can also be
illa
calculated by directly specifying the numbers as the arguments of the function, for
m
example, =AVERAGE(57,50,89,95).
ac
M
The function is
©
=AVERAGE(B2:C2)
The function is
=AVERAGE(57,50,89,95)
MAX
The MAX function displays the maximum value in a given series of values. The syntax of
the MAX function is given here.
23
td
.L
MIN(number1,number2...)
t
Pv
For example, to find the minimum marks obtained in English, enter the function
=MIN(B2:B7) in the cell B9 and press the Enter key. The MIN function can also be used
a
with numbers as the arguments. For instance, when =MIN(95,100,500) is entered in a
cell, the output is 95.
di
In
rs
he
is
bl
Pu
NOW
M
The NOW function displays the current date and time. This function has no arguments.
©
TODAY
The TODAY function displays the current date. This
function also has no arguments. The syntax of the
TODAY function is given here.
Fig. 2.22 TODAY function
24
td
Type Description
.L
###### This error occurs when the result is too long to fit in the selected cell.
t
Pv
It can be rectified by adjusting the column width.
#DIV/0! This error occurs when a number is divided by zero. It can be rectified
a
by making sure that the divisor is not zero.
di
In
#REF! This error occurs when the cell reference mentioned in the formula is
invalid. It can be rectified by entering the correct cell reference in the
rs
he
formula.
#VALUE! This error occurs when any wrong operands or arguments are used
is
bl
#Name? This error occurs when an incorrect name of the function or an incorrect
text is specified. It can be rectified by specifying correct function names
n
and text.
illa
m
td
specify the page range in the box beside this option.
.L
6. Click the Page Layout tab and choose the Pages per sheet and Order according to
t
Pv
your requirement.
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
M
©
Points to
Remember
A Calc formula always begins with an equal-to sign ‘=’ followed by some
combination of values, text, cell references, functions, and operators.
Calc can record cell addresses in formulas in two different ways: relative reference
and absolute reference.
26
Exercises
td
1. Tick (ü) the correct option.
.L
a. A Calc formula starts with
t
Pv
(i) + (ii) $
a
(iii)
= (iv) *
di
In
b. Which of the following functions is used to find the largest value in a given
range of cells?
rs
he
(iii)
LARGE (iv) LARGEST
bl
(iii)
#DIV/0! (iv) #NAME?
m
td
c. =A1*A6 is an example of a formula.
t .L
d. The TODAY function displays the current date.
Pv
e. You can paste a formula or a function by using the Paste button
a
on the Standard toolbar.
di
In
f. The #VALUE! error occurs when the cell reference mentioned in
rs
g. In relative referencing, both column and row parts are not fixed.
is
bl
Pu
(i) Cell B4 contains the formula =A1+A2+B1+B2. What are the contents
m
td
a. Calculate the total marks obtained by each student using the Copy and
.L
Paste options.
t
Pv
b. Calculate the percentage of marks obtained by each student using the Copy
and Paste options.
a
di
c. Insert the current date and time in the cell C10.
In
rs
a. =MIN(B1:C4) b. =MAX(A1:B4)
is
bl
c. =SUM(B1:C3) d. =AVERAGE(A1:B4)
Pu
n
illa
m
ac
M
©
29
td
t .L
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
30
td
t .L
Pv
(a) Data to be sorted (b) Sorting in ascending (c) Sorting in descending
a
order order
di
In
Fig. 3.1 Sorting data
rs
You can also sort data in any order using the Sort dialog box. To use the Sort dialog box,
is
click Sort.
m
td
Calc lets you filter the data if required. Filtering displays the data according to the
.L
conditions specified by the user. It displays only those rows that meet the specified
t
condition. It is a faster and easier medium to retrieve data according to the requirement.
Pv
There are two types of filters in Calc: AutoFilter and Standard Filter.
a
3.2.1 Using AutoFilter di
In
The AutoFilter function inserts a drop-down arrow on one or more data columns that lets
rs
he
you select the rows to be displayed. To filter a range of cells in a worksheet using AutoFilter,
follow these steps.
is
bl
( ) on the Standard
M
toolbar.
©
32
td
Fig. 3.6 AutoFilter drop-down menu
5. Click OK. The data gets filtered and only
.L
those rows that satisfy the condition are
t
Pv
visible.
a
Fig. 3.6 AutoFilter drop-down menu
di
In
rs
he
is
bl
Pu
n
illa
6. To remove the filter, click the AutoFilter icon ( ) again on the Standard toolbar.
ac
M
Standard Filter is the method to filter data based on some conditions. For example,
you can view names of students having greater than or equal to 90 marks in Computer.
To apply the Standard Filter, follow these steps.
1. Click any cell within the range of data to be filtered in the worksheet.
2. Click the Data menu, point to More Filters option and then click Standard Filter in
the submenu that appears. The Standard Filter dialog box appears.
3. Select Computer from the first drop-down list under Field name.
4. Select the condition >= from the first drop-down list under Condition.
5. Type the value 90 in the first box under Value.
33
a
6. Click OK to view the rows according to the condition specified.
di
In
rs
he
is
bl
Pu
n
illa
m
ac
34
td
t .L
Pv
a
di
In
Fig. 3.10 Conditional Formatting dialog box
rs
he
4. You can choose any style from the Apply Style drop-down box or choose New Style
to create your own conditional formatting. The Cell Style diaog box will open where
is
you can fill in the details of your style and save it. You can edit the style by clicking
bl
Pu
5. Choose the desired font effects in the Cell Style dialog box. Here, we have chosen
the Font color as red.
35
td
.L
6. Click OK in the Cell Style dialog box and the Conditional Formatting dialog box.
t
Pv
The cells are highlighted in the chosen effect.
a
di
In
rs
he
is
bl
Pu
7. To remove conditional
formatting, select the
m
td
t .L
Pv
Exercises
a
1. Tick (ü) the correct option.
di
In
a. Which of the following menus contains the Conditional Formatting option?
rs
he
(iii)
Format (iv) Tools
bl
c. Which feature enables you to display the data according to the conditions
ac
37
td
requirements.
.L
d. The ................................ filter is a way to filter data based on some specific
t
Pv
conditions.
a
di
In
3. State true or false.
rs
c. Autofiltering enables you to hide the rows which do not satisfy the
given criteria.
n
illa
38
td
.L
a. Sort the data in ascending order of names.
t
Pv
b. Apply filtering and display records of only those students who scored marks
between 80 and 90 in Maths and Computer subjects.
a
di
c. Apply conditional formatting such that the marks which are above 60 are
In
displayed in green and the marks which are below 60 are displayed in red.
rs
he
is
For Teacher
bl
the
Pu
Demonstrate to the students how data can be sorted in different ways in Calc.
n
Explain how data can be filtered to display only the selected data satisfying certain
illa
criteria.
m
ac
Show them how only the selected data can be formatted in various ways.
M
©
39
td
data. Let us learn about charts in Calc.
t .L
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
Contents
m
ac
Elements of a Chart
M
40
td
more than one data series on a chart.
.L
Chart title: This is a textual description about the chart written on the top of the chart.
t
Pv
Chart area: This is a rectangular area that contains all the elements of the chart.
a
di
Plot area: This is a region enclosed within the axes of the chart.
In
Legend: This is a colour-coded key located at the right of the plot area. It identifies
rs
Gridlines: These are the lines (horizontal or vertical) used to identify the value of
is
Data labels: These are the values that are present in the worksheet.
Data series Chart title Gridlines Chart area
n
illa
Data label
m
ac
Plot area
M
©
Y-axis title
td
4.2.1 Column Chart
.L
A Column chart is used to compare different items. Different categories are placed on the
t
Pv
x-axis and the values are placed on the y-axis of the chart. In a Column chart, each data
point in a series is signified by the column that rises from the x-axis.
a
di
In
rs
he
is
bl
Pu
n
illa
m
A Line chart compares different values. It is used to display the changing trends over a
period of time.
td
In case you want to display multiple series of data in the Pie chart, you can use one of its
.L
variations called the Donut chart. In this chart, the data is arranged in the form of ‘rings’
and each ring represents a data series in the chart. For example, in the chart shown in
t
Pv
Fig. 4.6, the inner ring displays the marks in English, while the outer ring displays the
a
marks in Computer.
di
In
rs
he
is
bl
Pu
n
illa
A Bar chart is also used to compare different items. It is similar to a column chart, except
©
that the bars are aligned horizontally. It implies that the y-axis is placed horizontally and
the x-axis, vertically.
td
.L
Fig. 4.8 Area chart
t
Pv
4.2.6 XY (Scatter) Chart
a
An XY (Scatter chart) shows the inter-relationship among different items. This chart is
widely used in representing scientific data.
di
In
rs
he
is
bl
Pu
n
illa
m
ac
44
td
For example, to create a chart for the sample data shown in Fig. 4.2, follow these steps.
.L
1. Select the range of cells
t
for which the chart is to
Pv
be created.
a
2. Click the Insert Chart
di
icon ( ) on the Standard
In
toolbar OR click the Insert
rs
worksheet.
Pu
see different chart subtypes of the chosen chart type in the rightmost pane.
illa
4. Click on the desired chart subtype. Depending on what chart subtype you select, you
m
may find some options under the chart subtypes to specify the look and shape of
ac
the chart.
M
5. Click Next. Choose the data range for which you want to create the chart from the
©
next window. By default, the selected range of cells appears in the Data range field.
td
.L
Fig. 4.14 Choosing the data series
t
Pv
7. Click Next. Fill in the desired chart elements in the respective fields.
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
td
The selected chart type is changed.
t .L
Pv
a
di
In
rs
he
is
bl
Pu
(a) Chart Type window (b) Chart after changing the layout
Fig. 4.17 Changing the chart type
n
illa
Chart area is the background behind all elements of the chart. You can modify the border,
M
colour and transparency of the background. To modify the chart area, follow these steps.
©
td
t .L
Pv
(a) Area tab clicked and with (b) Transparency tab active and
background colour options specified
a
6. Click OK. di
In
The specified settings are applied to the chart area.
rs
he
is
bl
Pu
n
illa
m
ac
M
48
td
t .L
Pv
a
di
In
rs
A chart can be moved from one sheet to another or can be inserted as a separate sheet
(with only the chart in it). To move the chart, follow these steps.
n
illa
2. Right-click on the chart and click Copy or Cut from the shortcut menu.
ac
3. Go to the desired location, right-click and select Paste. The chart is moved to the new
M
location
©
Note
The charts are saved along with the worksheets or workbooks. Thus, to save
a chart, follow the same steps as those of saving a workbook.
49
td
t .L
Pv
Exercises
a
di
In
1. Tick () the correct option.
rs
he
a. Which of the following is a region enclosed within the axes of the chart?
is
50
td
.L
d. In the Donut chart, the data is arranged in the form of rings
t
representing data series in the chart.
Pv
e. A Pie chart is used to plot a single set of series.
a
di
In
4. Answer the questions.
rs
Activities
©
51
td
t.L
a. Create a Pie chart for the sales in North region in the same worksheet.
Pv
b. Create any three-dimensional chart for the data in a separate worksheet.
a
di
c. Add the data labels as chart elements.In
rs
he
Demonstrate how a chart can be created in Calc and how it can be modified in
m
various ways.
ac
M
©
52
td
t.L
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
M
Contents
©
Iterative Statements
Jump Statements QBASIC is the most widely used version of BASIC.
QBASIC Functions It provides a rich set of statements which can be used to
Graphics in QBASIC develop a number of applications. Its easy-to-use syntax
and close resemblance with the English language makes it
Sound Effects a suitable language for learning programming.
This chapter begins with an introduction of iterative statements and different types of
loops used in QBASIC. It also discusses some of the string and mathematical functions
available in QBASIC. The chapter concludes with a discussion on how graphics and
sound effects can be included in QBASIC programs.
53
5.1.1 WHILE…WEND
The WHILE...WEND loop executes a set of instructions as long as a given condition is
true. The syntax of the WHILE...WEND loop is given here.
WHILE <condition>
td
<instruction_list>
.L
WEND
t
Pv
where,
a
di
condition = a logical operation In
instruction_list= instructions to be executed repeatedly
rs
The steps in the execution of instructions in a WHILE...WEND loop are given here.
he
1. condition is evaluated.
is
bl
CLS
ac
X = 10
M
WHILE X < 15
©
5.1.2 DO...LOOP
DO...LOOP is another type of loop that repeats a block of instructions while a condition
is True or until a condition becomes True. There are two different syntaxes of using
DO...LOOP which are given here.
Syntax 1:
DO [(WHILE | UNTIL) <condition>]
<instruction_list>
LOOP
td
.L
The steps for the execution of instructions in this loop are given here.
t
Pv
1. condition is evaluated.
2. When WHILE keyword is used, instruction_list is executed if condition
a
di
is True. The LOOP statement transfers the control back to the DO statement which again
In
evaluates condition. In this way, instruction_list is executed repeatedly till
rs
terminates and the control is transferred to the statement immediately after LOOP.
is
OR
bl
is False. The LOOP statement transfers the control back to the DO statement. In this
n
When condition becomes True, the loop terminates and the control is transferred
m
Syntax 2:
M
DO
©
<instruction_list>
LOOP [(WHILE | UNTIL) <condition>]
The steps for the execution of instructions in this loop are given here.
1. instruction_list is executed.
2. condition is evaluated.
3. When the WHILE keyword is used, the control is transferred to the DO statement if
condition evaluates to True. instruction_list is again executed. In this
way, instruction_list is executed repeatedly while condition remains True.
When condition becomes False, the loop terminates and the control is transferred
to the statement immediately after LOOP.
55
Note
Use the second syntax of DO...LOOP when a block of instructions is
required to be executed at least once.
td
Example 2: Using WHILE in a DO...LOOP
.L
CLS
t
Pv
X = 10
DO WHILE X < 15
a
PRINT X
di
In
X = X + 1
rs
he
LOOP
is
END
bl
Pu
n
illa
m
ac
M
©
In this program, a variable X is defined and initialised with a value 10. The DO WHILE
statement evaluates the condition X < 15. If the condition evaluates to True, the control is
transferred to the statement PRINT X, which prints the value of the variable X. The next
statement increments the value of X by 1. The LOOP statement transfers the control back to
the DO WHILE statement. The loop is executed 5 times and when the value of X becomes
15, the program terminates.
56
td
.Lt
Pv
a
di
In
rs
he
is
In this program, a variable X is defined and assigned a value 10. The PRINT X statement
prints the value of the variable X. Then the value of X is incremented by 1. The LOOP
n
illa
statement evaluates the condition X > 14 and if the condition is evaluated to False, the
control is transferred back to the DO statement. In this way, the loop is executed 5 times
m
5.1.3 FOR...NEXT
©
57
td
specified by increment in STEP.
.L
5. Again the value of control_variable is compared with that of end. If the
t
Pv
condition evaluates to True, the loop is executed again.
a
6. This process is repeated as long as the value of control_variable is less than
di
or equal to end. When the value of control_variable becomes greater than
In
end, the loop is terminated and the statements after NEXT are executed.
rs
he
is
Note
bl
Pu
If no STEP is used with the FOR statement, the control variable is incremented
by the default value, which is 1.
n
illa
CLS
M
FOR number = 1 TO 5
©
PRINT number
NEXT number
END
In this program, the control variable
number is assigned a start value 1 and
an end value 5. The statement PRINT
number prints the value of number.
The control then goes to the statement
NEXT number. This statement adds 1 to
number and transfers the control back to
Fig. 5.4 Using FOR…NEXT loop
58
td
END
.L
In this program, the control variable
t
Pv
number is assigned a start value 1 and
the end value 5. STEP 2 is used to
a
di
specify that number will be increased In
by 2 each time the loop executes. The
PRINT number statement prints the
rs
Sometimes, two or more loops are used in a program where one loop contains another
ac
loop within it. This is known as nesting of loops and such loops are called nested loops.
M
CLS
For X = 1 to 2
Print “Outer Loop”
For Y = 1 to 2
Print “Inner Loop”
Next Y
Next X
END
59
td
the loop such as FOR or DO has to be specified after EXIT.
.L
Example 7: Using the EXIT command in a FOR…NEXT loop
t
Pv
CLS
a
FOR I = 1 TO 5
INPUT “Enter numbers from 1 to 5:”;num di
In
rs
NEXT I
bl
Pu
In this program, the user is asked to enter the numbers from 1 to 5. The FOR...NEXT
loop runs 5 times (FOR I = 1 TO 5). The loop breaks if the user enters a number greater
than 5. The statement EXIT FOR causes the program to terminate the loop. After the loop
has been executed, the PRINT statement prints the sum of the numbers.
60
td
GOTO <label_name>
t .L
Pv
Note
a
di
When GOTO is used with the IF…THEN and the IF…THEN…ELSE statements,
In
it makes a loop.
rs
he
CLS
Pu
X = 10
n
start:
illa
PRINT X
m
X = X + 1
ac
M
END
In this program, a variable X is defined
and assigned a value 10. Then the label
start is defined. The statement PRINT
X prints the value of X. The next statement
increments the value of X by 1. The IF
statement evaluates the condition X < 15
and if the value of X is less than 15, the
control is transferred to the label start Fig. 5.8 Using GOTO statement
by the GOTO statement. In this way, the PRINT X statement is executed 5 times and when
the value of X becomes 15, the program terminates.
61
td
t .L
Pv
Note
a
All the string functions discussed in this section consider any space within the
string as a character. di
In
rs
he
LEN Function
is
The LEN function is used to find the length of the string. The syntax of this function is
bl
given here.
Pu
LEN(stringexpression)
n
illa
where,
stringexpression = a string constant, a string variable, or a string expression
m
ac
CLS
©
td
PRINT LEFT$(str1$,3)
.L
END
t
Pv
In this program, a string variable str1$
is defined and assigned a string value
a
di
Welcome to QBASIC. The LEFT$ In
function extracts the three leftmost
characters of the string, that is, Wel.
rs
he
RIGHT$ Function
m
The RIGHT$ function extracts the specified number of characters from the right side of a
ac
RIGHT$(stringexpression, n)
©
where
stringexpression = a string constant, a string variable, or a string expression
n = the number of characters to be extracted
Example 11: Using the RIGHT$ function in a program
CLS
str1$= “Welcome to QBASIC”
PRINT RIGHT$(str1$,4)
END
63
td
of the string, that is, ASIC. The PRINT statement then prints these four characters.
t .L
Pv
MID$ Function
a
The MID$ function returns a substring of a string. It extracts a specified number of characters
di
from a string, starting from a specified position. The syntax of this function is given here.
In
MID$(stringexpression, start[, length])
rs
he
where,
is
CLS
ac
PRINT MID$(str1$,3,5)
©
END
In this program, a string variable str1$
is defined and assigned a string value
Welcome to QBASIC. The MID$ then
extracts five characters from the string,
starting from the third character. The
PRINT statement prints the extracted
characters.
SQR Function
The SQR function is used to find the square root of a number. The syntax of this function
is given here.
SQR(numericexpression)
where,
numericexpression = a numeric constant, a numeric variable, or a numeric
expression
td
Example 13: Using the SQR function in a program
.L
CLS
t
Pv
PRINT SQR(1)
PRINT SQR(4)
a
PRINT SQR(9)
di
In
PRINT SQR(16)
rs
PRINT SQR(25)
he
END
is
bl
Pu
n
illa
m
ac
M
©
ABS Function
The ABS function returns the absolute value of a number. In other words, this function
converts a negative number to a positive number. If you pass a positive number, the ABS
function returns the same number.
65
td
t.L
Pv
a
di
In
rs
he
is
bl
In this program, the numbers 12 and –12 are passed to ABS. The number 12 is returned
n
QBASIC allows you to draw different shapes like line, square, circle, etc., using special
statements. You can also fill different colours in a shape or draw a coloured outline of a
©
shape.
Screen Modes
In QBASIC, you can adjust the screen resolution according to the requirement. The screen
resolution is the number of pixels per square inch that a monitor can display. The higher
the resolution, the better is the display quality. Different screen modes are provided to
change the screen resolution. The two basic types of modes are text mode and graphics
mode. The text mode allows you to display only text on the screen, whereas the graphics
mode allows you to display text as well as graphics on the screen. These modes are
identified by different numbers. The various screen modes available under the text and
graphics modes and their respective resolutions are listed in Table 5.1.
66
td
By default, QBASIC uses the screen mode 0 which is the text mode. In this mode, the
.L
screen is a grid of 80 columns and 25 rows. A program can write to any of these grids
t
Pv
locations. The top left corner of the screen is the location (1, 1), that is, column 1, row 1.
The bottom right corner of the screen is the location (80, 25), that is, column 80, row 25.
a
di
In
Note
rs
he
These coordinates are always specified by first writing the column number
bl
The SCREEN statement allows you to change the screen mode according to the requirement.
m
You can change the screen mode any number of times in your program. The syntax of the
ac
SCREEN <MODE>
©
where,
MODE = the number that sets the screen mode
Example 15: Changing the text colour using the COLOR statement
td
CLS
.L
COLOR 6
t
Pv
PRINT “Orange”
a
END
di
In
rs
he
is
bl
Pu
n
illa
m
ac
In this program, the COLOR statement sets the colour of the text to orange. The PRINT
©
68
td
.L
t
Pv
a
di
In
rs
he
is
In this program, the LINE statement is used with the starting point coordinates (10, 10),
Pu
the end point coordinates (100, 100) and a colour code 10. This draws a green line from
n
CLS
ac
M
SCREEN 9
©
td
.L
Example 18: Drawing a circle using the CIRCLE statement
t
Pv
CLS
a
SCREEN 9
CIRCLE (100, 100), 50, 9 di
In
rs
END
he
You can add sound effects to your programs. Sound effects are used to draw the attention
of the user of the program to any erroneous action being performed during program
execution. Sound effects can also be used to play music. Some of the statements which
are used to produce sound in QBASIC are BEEP and SOUND.
70
td
In this program, the BEEP statement is used in a DO loop. The user is prompted for a
.L
response to whether the beep sound is heard or not. If the user’s response is Y, the loop
t
Pv
terminates. Otherwise, the loop continues.
a
5.5.2 SOUND Statement
di
In
A SOUND statement produces a sound through the computer’s internal speakers. It enables
rs
you to produce sounds of varying frequency and time duration. This feature can be used
he
to produce a variety of interesting sounds. The syntax of the SOUND statement is given
is
here.
bl
where,
n
illa
duration = the number of system clock ticks for which the sound plays—the value
may range between 0 and 65,535 (there are 18.2 clock ticks in a second)
M
©
td
Q
BASIC allows you to draw different shapes like line, square, circle, etc., using
.L
special statements.
t
Pv
The two basic types of screen modes available in QBASIC are text mode and
graphics mode.
a
di
You can add sound effects to your programs. Two statements which are used to
In
produce sound in QBASIC are BEEP and SOUND.
rs
he
is
bl
Pu
Exercises
n
illa
FOR…NEXT
(iii) (iv) None of these
b. Which of the following statements is used to transfer the control from one
location to another in a program?
(i) GOTO (ii)
MOVETO
FOR…NEXT (iv)
(iii) WHILE…WEND
c. Which of the following functions returns a substring extracting a specified
number of characters from a string, starting from a specified position?
(i) LEFT$ (ii)
RIGHT$
CENTER$ (iv)
(iii) MID$
72
td
required is known.
.L
c. Any loop can be terminated prematurely using the ................... command.
t
Pv
d. .............................. statements, when used, transfer the control to a specified
a
line in a program.
di
In
e. .............................. is the number of pixels per square inch that a monitor
can display.
rs
he
c. The SCREEN statement allows you to change the colour of the screen.
ac
73
td
t.L
Pv
a
di
In
rs
he
a program.
n
Discuss the uses of the various built-in string and mathematical functions available
illa
in QBASIC.
m
programs.
M
©
74
td
t.L
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
75
td
.L
Tags
t
Pv
Tags are used to describe how a web page should be displayed. They determine the major
a
structural components in a document such as headings, paragraphs, horizontal lines, etc.
di
Note that a large number of tags exist in HTML and each tag performs a specific task.
In
A tag consists of a left-angle bracket (<), a tag name and a right–angle bracket (>).
rs
For example, <HR> is a tag where HR is the name of the tag. Note that while writing
he
tags, you should not include extra spaces. If the browser encounters a space, it does not
is
Note
HTML tags are not case sensitive: <H1> means the same as <h1>.
Attributes
Attributes provide additional information about a tag such as alignment, font colour and
size of the text. Attributes are defined in a tag after the tag name. Each attribute has a
name and a value. The value of the attribute is specified after the name of the attribute
and the equal to ‘=’ sign. Note that the value of the attribute may or may not be specified
within the quotes. For example, <FONT ALIGN=“CENTER” SIZE=“10”> aligns the
76
Elements
An element is a fundamental component to create a web page. It indicates how a browser
should display the information in the web page. An element generally comprises a starting
tag (and its attributes), the content and an ending tag. The ending tag, also known as the
closing tag, is preceded with a forward slash (/). For example, in Fig. 6.2, <H1> is the
opening tag with ALIGN as the attribute and </H1> is the ending tag.
Content
Tag name
td
.L
<H1 ALIGN=“CENTER”>THIS IS HEADING</H1>
t
Pv
Name Value
End tag
a
Attributes
di
In
rs
HTML element
he
One of the key features of HTML is that the elements can be nested. This implies that an
bl
element can contain one or more than one element within it. For example, if you want to
Pu
italicise and underline some text, you can use both italicise and underline tags.
n
Container element: It has a starting and an ending tag. For example, to make a
m
certain section of the text bold, the opening tag <B> is used and the ending tag
ac
</B> is used. The web browser displays the text enclosed within the opening and
M
Empty element: It has only the opening tag and its attributes. Empty elements perform
their specific functions without affecting the rest of the document. For example, the
horizontal rule tag <HR> can be used directly and does not require any ending tag.
td
.L
3. To save the document, click Save on the top-right corner.
t
OR
Pv
Press Ctrl+S.
a
di
A dialog box to save the document appears. In
rs
he
is
bl
Pu
n
illa
m
ac
M
(a) Entering HTML code in Text Editor (b) Saving the document
©
4. Specify the location where you want to save the document from the left pane of the
dialog box, specify the name of the document in the Name text box and then
click Save.
While saving an HTML document, some points must be noted.
The name of an HTML document cannot include characters such as /, \, *, ?, |,
and ,.
The name of the document should be relevant so that you can remember it and
access it in future.
78
td
To view your created web page, follow these steps.
.L
1. Click the Firefox icon ( )
t
Pv
on the Launcher.
a
The Firefox window appears.
2. Press Ctrl+O. The Open
di
In
File dialog box appears (see
rs
Fig. 6.4).
he
79
HTML Element
The HTML element is used to mark the beginning and the end of the HTML document.
It is the first element of every web page. This element indicates to the web browser that
the page is an HTML document.
The syntax of an HTML element is
td
<HTML>.......</HTML>
.Lt
Pv
HEAD Element
a
The HEAD element specifies the header information about the HTML document such
di
as title, keywords, etc. The content written between the opening and closing tags of the
In
HEAD element is not displayed in the web page.
rs
he
TITLE Element
n
The TITLE element provides a title to a web page. The title of a web page is displayed in
illa
the title bar of the browser window. It is defined within the HEAD element of the HTML
m
<HEAD>
©
<TITLE>.......</TITLE>
</HEAD>
BODY Element
The BODY element provides content to your web page. It specifies the main content
such as images, text, background of the web page, alignment of text, etc., in an HTML
document. The tag <BODY> is placed immediately after the closing tag </HEAD>.
The closing tag </BODY> of the BODY element is placed before the closing tag </HTML>
of the HTML element. All the other elements such as formatting tags, images, etc., are
placed within the opening and closing tags of the BODY element.
80
td
This sample web page uses all these elements.
.L
</BODY>
t
Pv
</HTML>
a
Now, open Mozilla Firefox and browse the sample.html file to see the output.
di
In
rs
he
is
bl
Pu
n
illa
m
ac
M
©
Points to
Remember
Hypertext Markup Language (HTML) comprises two major components, namely,
hypertext and markup.
HTML code consists of tags, attributes and elements.
81
td
information (without the tags, elements and attributes) formatted according to
.L
the tags or elements.
t
Pv
Every HTML document comprises four major elements, namely, HTML, HEAD,
TITLE and BODY.
a
di
In
rs
he
is
bl
Exercises
Pu
n
(iii)
HTML (iv) Tags
©
82
td
TITLE and .............................. .
.L
c. .............................. provide additional information about a tag such as
t
Pv
alignment, font colour, size of the text, etc.
d. An HTML document should always be saved with the .............................. or
a
di
.............................. extension. In
e. There are two types of HTML editors, namely, .............................. and
rs
.............................. .
he
is
e. The tag <BODY> is placed immediately after the closing tag </HEAD>.
©
td
.Lt
Pv
a
di
In
rs
he
is
bl
Pu
84
td
explain a little more about it?
t .L
Pv
a
di
In
rs
he
Contents
is
BODY Element
bl
Pu
BREAK Element
PARAGRAPH Element
n
illa
COMMENT Element
ac
Background Attribute
The background attribute is used to provide a background for the web page.
The background can be an image or text (converted into an image) which is ‘tiled’ across
the web page.
The syntax of the background attribute is
<BODY BACKGROUND=“URL or path/filename”>
td
Content
.L
</BODY>
t
Pv
where,
a
URL or path/filename = location of the image which is to be placed as the background
of the web page.
di
In
rs
Bgcolor Attribute
he
The bgcolor (background color) attribute provides a coloured background to the web
is
where,
m
Note that all browsers do not understand the colour names. Hence, colours are represented
M
in a hexadecimal (hex) number. This number is formed with the combination of red, green
©
and blue and is determined using the formula of #RRGGBB, where RR is the hex value for
red, GG is the hex value for green and BB is the hex value for blue. These numbers are
always preceded with a # symbol. For example, the hexadecimal number of white colour
is #FFFFFF.
Text Attribute
The text attribute provides a colour to the text in the web page. It is useful when a
coloured background or an image is used in the background. By default, the text colour of
the web page is black. It is generally used to establish a contrast between the background
colour and the text colour in the web page. As the background colour, the text colour is
also represented in hexadecimal numbers.
86
td
.L
Olive #808000
t
Red #FF0000
Pv
Aqua #00FFFF
a
Blue #0000FF
di
In
Yellow #FFFF00
rs
he
Maroon #800000
is
Green #008000
bl
Pu
Purple #800080
Orange #FF9900
n
illa
AliceBlue #F0F8FF
m
Brown #A52A2A
ac
M
Linen #FAF0E6
©
Orchid #DA70D6
Teal #008080
87
td
support for computer education.
.L
</BODY>
t
Pv
</HTML>
Now, open Mozilla Firefox and browse the IT.html file to see the output.
a
di
In
rs
he
is
bl
The BREAK element is used to insert a blank line or return in an HTML document.
illa
It specifies that the text following the BREAK element should be displayed in the next line
m
in the web page. It is an empty element. It can be used any number of times in the HTML
document.
ac
M
Example 2: Write this HTML code in Text Editor and save it as break-tag.html
<HTML>
<HEAD>
<TITLE>Working with Breaks</TITLE>
</HEAD>
<BODY>
This is the first line. <BR><BR>This is the second line, <BR>which
is broken.
</BODY>
</HTML>
88
td
than one space. The text enclosed within the PARAGRAPH element is displayed in a new
.L
line. It also inserts a line before and after the text. In some web browsers, the first line in
t
a paragraph is indented.
Pv
The syntax of the PARAGRAPH element is
a
di
<P>.....</P> In
Example 3: Write this HTML code in Text Editor and save it as Paragraph.html
rs
<HTML>
he
<HEAD>
is
bl
<TITLE>Paragraphs</TITLE>
Pu
</HEAD>
n
<BODY>
illa
<P>
m
ac
89
One of the commonly used attributes of the PARAGRAPH element is the align attribute.
Align Attribute
td
The align attribute adjusts the positioning of the paragraph in the web page according
.L
to the requirements. The value of this attribute can be RIGHT, LEFT, or CENTER.
t
Pv
By default, the paragraphs are left-aligned.
Example 4: Write this HTML code in Text Editor and save it as Paragraph-align.
a
di
html In
<HTML>
rs
<HEAD>
he
<TITLE>Align Attribute</TITLE>
is
bl
</HEAD>
Pu
<BODY>
n
</BODY>
M
©
</HTML>
Now, open Mozilla Firefox and browse the Paragraph-align.html file to see the
output.
90
td
size, width, noshade and color.
t .L
Align Attribute
Pv
The align attribute aligns the horizontal rule in the web page according to the requirement.
a
The value of this attribute can be LEFT, RIGHT or CENTER.
di
In
Width Attribute
rs
he
The width attribute is used to define the width of the horizontal rule. The width can be
is
Note
n
illa
To use the align attribute, it is necessary to use it with the width attribute.
m
ac
M
Size Attribute
©
The size attribute is used to define the size (thickness) of the horizontal rule. The size of
the horizontal rule is defined as the number of pixels. By default, the size of the horizontal
rule is 2 pixels.
Noshade Attribute
The noshade attribute is used to display 2D horizontal rules. Note that without the
noshade attribute, the HORIZONTAL RULE element displays a 3D rule.
Color Attribute
The color attribute is used to display a coloured horizontal rule. The colour can be used
either by specifying the colour name or the hexadecimal number.
91
Example 5: Write this HTML code in Text Editor and save it as hr_attribute.html
<HTML>
<HEAD>
<TITLE>Horizontal Rule</TITLE>
</HEAD>
td
<BODY>
.L
See the coloured horizontal rule
t
Pv
<HR ALIGN=“RIGHT” SIZE=“5” WIDTH=“80%” COLOR=“BLUE”>
a
This is another horizontal rule with the ‘noshade’ attribute.
di
In
<HR NOSHADE SIZE=“11”>
rs
</BODY>
he
</HTML>
is
bl
Now, open Mozilla Firefox and browse the hr_attribute.html file to see the output.
Pu
n
illa
m
ac
M
©
92
td
in the web browser. <!-Comments in the web browser can be
.L
inserted using the comment tag. ->
t
Pv
</BODY>
a
</HTML>
di
In
Now, open Mozilla Firefox and browse the comment.html file to see
the output.
rs
he
is
bl
Pu
n
illa
m
ac
93
Align Attribute
The align attribute adjusts the position of a heading in the web page according to the
requirement. The value of this attribute can be RIGHT, LEFT or CENTER. By default, the
headings are left-aligned.
Example 7: Write this HTML code in Text Editor and save it as Headings.html
<HTML>
<HEAD>
td
.L
<TITLE> Headings</TITLE>
t
</HEAD>
Pv
<BODY>
a
<H1 ALIGN=“CENTER”> THIS IS HEADING 1</H1>
di
In
<H2 ALIGN=“LEFT”> THIS IS HEADING 2</H2>
rs
</BODY>
m
</HTML>
ac
Now, open Mozilla Firefox and browse the Headings.html file to see the output.
M
©
ITALIC Element
The ITALIC element specifies that the enclosed text should be displayed in italics.
The syntax of the ITALIC element is
<I>.....</I>
td
.L
UNDERLINE Element
t
Pv
The UNDERLINE element specifies that the enclosed text should be displayed as
underlined text.
a
The syntax of the UNDERLINE element is
di
In
<U>.....</U>
rs
he
Example 8: Write this HTML code in Text Editor and save it as return.html
<HTML>
is
bl
<HEAD>
Pu
</HEAD>
illa
<BODY>
m
ac
</BODY>
</HTML>
Now, open Mozilla Firefox and browse the return.html file to see the output.
95
td
<BODY>
.L
<CENTER>This element is used to align text </CENTER> in the
t
Pv
centre of the browser window. Any text that is centred should be
between the opening and the closing <CENTER>tags of the CENTER
a
element.
di
In
</CENTER>
rs
</BODY>
he
</HTML>
is
bl
Now, open Mozilla Firefox and browse the center.html file to see the output.
Pu
n
illa
m
ac
M
©
96
Face Attribute
The face attribute sets the type of the font (font name) of the text. It is browser dependent
as some fonts may or may not be provided in particular browsers. Note that if the browser
does not support the font, the default font of the browser is used.
Size Attribute
The size attribute sets the size of the text. There are seven sizes available (ranging from
td
1 to 7) for the font. Size 7 represents the highest, while 1 represents the lowest size in the
.L
range. The default size of the font is 3.
t
Pv
Example 10: Write this HTML code in Text Editor and save it as font.html
<HTML>
a
<HEAD>
di
In
<TITLE>Fonts</TITLE>
rs
he
</HEAD>
is
<BODY>
bl
<FONT FACE=“COMIC SANS MS”> Here, you can see different types
©
Points to
Remember
The BODY element provides content to a web page which includes images, text,
background of the web page and alignment of the text.
The BREAK element is used to insert a blank line or ‘return’ in an HTML document.
The PARAGRAPH element divides and arranges the text into distinct paragraphs
in a web page.
The HORIZONTAL RULE element is used to generate a horizontal line (rule)
td
across the web page.
.L
The COMMENT element inserts comments in a web page. Comments are used
t
Pv
to provide information that can be useful to anyone who views the code of the
web page.
a
di
The HEADING element is used to organise a page logically into separate sections
In
with section headings for easier comprehension.
rs
The BOLD element specifies that the text enclosed in its starting and ending tags
he
The ITALIC element specifies that the enclosed text should be displayed in italics.
bl
Pu
The UNDERLINE element specifies that the enclosed text should be displayed as
underlined text.
n
illa
The CENTER element is used to align the text or an image in the centre of the
m
web page.
ac
The FONT element is used to change the size, font type or colour of the text in
M
Exercises
1. Tick (ü) the correct option.
a. Which of the following attributes provides a coloured background to the web
page?
(i) bgcolor (ii)
color
background (iv)
(iii) back
98
td
(i) color (ii) face
.L
size (iv)
(iii) height
t
Pv
a
2. Fill in the blanks.
a. di
The BODY element is placed immediately after the closing tag ................. .
In
rs
b. The ......................... attribute is used to specify the width of the margin
he
page.
Pu
e. The ......................... element is used to align the text or an image in the centre
m
f. The ......................... element is used to change the size font type, or colour
M
99
Activities
td
1. Create the given web page according to the following specifications.
.L
he title of the page should be ‘Delhi’.
T
t
Pv
Set the background colour to ‘Pink’.
a
Set the text colour to ‘Blue’, Size 3 and Style ‘Arial’.
di
The heading ‘Delhi–the Capital of India‘ should be displayed as the first
In
level heading.
rs
he
is
bl
Pu
td
system has been
.L
infected by a virus.
t
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
101
td
After infecting a system, a virus tries to take control of the system. It replicates by making
.L
copies of itself and also tries to carry out the harmful tasks written in its program. A virus
t
Pv
cannot spread in the system by itself. It tries to attach itself to another program in order to
spread. Some viruses are programmed to activate at a preset time. They check the system
a
clock continuously, and when the preset time matches the system time, they harm the
computer system.
di
In
rs
Computer viruses disrupt the system by deleting files in the system, formatting the hard
he
disk, overwriting the system BIOS, or completely disabling the computer. The various
harmful effects of viruses are listed here.
is
bl
infecting disks by corrupting boot sectors—the boot sector of the hard disk contains
M
Note
A computer virus does not infect the computer hardware such as keyboard,
monitor, etc. It infects only the software.
102
td
the risk of it being infected by a virus.
.Lt
If a virus is in the network, it tries to locate the computers that are prone to virus
Pv
attacks. The main purpose is to infect as many systems as possible. It infects a system
a
by attaching itself to the files in the computer.
di
In
8.1.3 Types of Computer Viruses
rs
he
Boot-sector virus: This type of virus hides in the boot sector of a hard disk or a pen
bl
drive and infects the start-up instructions, which are required to boot the system.
Pu
A boot-sector virus overwrites the original boot record with the infected one. When
other disks are used, the virus is transferred to their boot sectors also. This type of
n
illa
virus is difficult to find since the boot record is the first program that is loaded when
a computer starts. The most common boot-sector viruses are Stoned/Marijuana,
m
Program virus: This is the most infectious type of computer virus. It usually resides
M
inside the memory. It infects the executable files such as .COM and .EXE files by
©
attaching its copy to them and hence, is also known as the file virus. After attaching
to the files, it modifies the host programs. Subsequently, whenever the program runs,
the virus also runs along with it. The examples of a program virus are Acid Rain
Trojan, Alien.298, Umbrella.3173, Sunday and Cascade.
Stealth virus: This type of a virus attempts to hide its presence. Some of the simple
techniques include hiding the change in date and time and hiding the increase in
the file size. Some even prevent anti-virus software from reading the part of the file
where the virus is located. The examples of stealth virus are Stoned Monkey, Frodo,
Joshi and Whale.
Multipartite virus: This virus can infect both the boot sector of a disk as well as the
executable files. It is the worst virus because it can combine a lot of techniques to
103
8.2 WORMS
One of the other common computer threats is a worm. Worms are programs that are
td
designed to find their way into the data-processing programs, and alter or destroy the
.L
data. Worms often use networks such as the Internet to spread from one computer system
to another, thus attacking systems that are linked through communication lines. After
t
Pv
being active within a system, worms behave like viruses. Internet worms exploit e-mail
programs and network software to multiply themselves. Once it infects a system, a worm
a
di
may look for an address book and mail itself to everyone listed in the book. It may simply
In
send a copy of itself to each recipient, as you send out a new e-mail.
rs
Internet worms may also search the Internet for unprotected system drives which are shared
he
across a network with no password. When they find such drives, they copy themselves
is
to the new hosts and install their start-up instructions. The next time these machines are
bl
The term Trojan Horse is related to ancient Greek mythology. During the war between
m
Greece and Troy, the Greek army surrounded the city of Troy. But they were unable to
ac
enter the city. They decided to make a hollow wooden horse with soldiers hidden inside
M
it. The wooden horse was presented to the citizens of Troy as a gift. During the night, the
©
104
td
Always keep the Auto-Protect, Internet-worm Protection, and E-mail scanning
.L
features of an anti-virus software on to prevent downloading of the infected files.
t
Pv
Update the anti-virus software frequently so that it can detect and delete new viruses.
Always check if your computer demonstrates any strange behaviour such as these:
a
slowing down
di
In
disappearance of files
rs
he
Anti-virus software are application programs designed to detect and remove viruses,
©
worms, and Trojan horses from the computer system. An anti-virus software looks for these
computer threats in all the files and folders of the computer system. It looks for changes
and activities in the systems that are typical in case of a virus attack. Scanners that are built
within the anti-virus software look for particular types of codes within programs. If a virus
is detected, the anti-virus program performs one of these steps.
It removes the virus and repairs the infected file.
It deletes both the virus and the infected file.
If it detects an unknown virus, it quarantines (isolates) the infected file. Such a file is
stored in a special area called Quarantine. Files that are in quarantine cannot interact
with the rest of the system.
105
td
All local hard disks
.L
Files downloaded from the Internet
t
Pv
Pen drives when in use
a
Mobile phones and other devices when connected to the computer
di
In
Scanning and Removing Viruses
rs
To find and remove viruses using ClamTK anti-virus program, follow these steps.
he
2. Click the Show Applications button ( ) on the Launcher. The application screen
Pu
3. Click the ClamTK icon ( ) the screen. If you do not find the icon here, you can
illa
106
td
Fig. 8.2 ClamTK main window
t.L
4. Click the Settings button ( ) under the Configuration section. Various scan options
Pv
appear (see Fig. 8.3).
a
5. Check the boxes against
the types of files you
di
In
need to scan. Click Back
rs
window.
is
bl
Pu
n
illa
m
ac
M
td
.L
(a) Selecting a file (b) Selecting a directory
t
Pv
Fig. 8.5 Selecting the file/directory to scan
a
di
8. Click OK to start the scanning process. After the scanning is completed, ClamTK
In
displays a summary of the scan.
rs
he
is
bl
Pu
n
Points to
M
Remember
©
108
td
Exercises
t .L
Pv
1. Tick (ü) the correct option.
a
a. Which of the following application programs is used to detect and remove
viruses, worms and Trojan Horses?
di
In
(i) Anti-worm (ii) Anti-theft
rs
he
(iii)
Melissa (iv) Tequila
illa
c. Which of the following viruses can infect both the boot sector of the disk as
m
109
td
tries to carry out the harmful tasks written in its program.
.L
b. A .............................. virus hides in the boot sector of a hard disk or a pen
t
Pv
drive and infects the start-up instructions.
a
c. An .............................. software is an application program which is
di
In
designed to detect and remove viruses from the computer system.
rs
communication lines.
bl
Pu
infected one.
©
110
td
f. Explain the following terms.
.L
(i)
Worms (ii) Trojan horses
t
Pv
g. Discuss the various types of viruses.
a
di
In
rs
he
Activities
is
bl
Pu
1. Search for the examples of different types of viruses along with their date of
creation.
n
illa
2. Install anti-virus software on your computer and scan the different drives in
your system.
m
ac
M
Explain to the students the various types of known viruses and their modes of
operations.
Discuss with them the preventive measures one should take in order to save their
computers from being attacked by viruses, worms, Trojan horses and other types
of computer threats.
Demonstrate to them how computers can be scanned for viruses using anti-virus
software.
111
td
t .L
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
M
112
td
searches the Internet for new terms and stores the searched terms in a database.
.L
An indexer then indexes all the terms in the database to make the searching process fast.
t
Pv
The working of both crawler and indexer jointly results in the efficient working of the
search engine. Some popular search engines are Google, Yahoo and AltaVista.
a
di
You can search for any information or even a website whose address is not known using a
In
search engine. For this, you need to enter the keyword(s) or a phrase. The search engine
rs
then examines the database containing the keyword(s) and retrieves a list of hyperlinks
he
You can use logical operators such as AND, OR, and NOT, double quotes (“ ”),
m
parenthesis (), and asterisk (*) to refine your search on the Internet.
ac
M
To find information on a particular topic using a search engine, follow these steps.
©
icon ( ) on the
Launcher.
The Mozilla Firefox window
appears.
td
.Lt
Fig. 9.2 Google home page
Pv
a
4. Enter the search keyword, for example, Internet, in the search text box and then
di
press Enter or click the Google Search button. A web page with a list of hyperlinks
In
and a brief description of what each hyperlink contains appears. These hyperlinks
rs
5. Click on the desired hyperlink to open the web page in the same window.
OR
Right-click on the hyperlink and click Open in New Tab or Open in New Window
option from the shortcut menu to open the web page in a new tab or window,
respectively.
6. Keep clicking on the hyperlinks on the main search page till you find the required
information.
114
td
t .L
Pv
a
di
In
rs
he
is
bl
3. Enter the name (first name, last name or user name) and the location (city, state,
n
illa
country name, or zip code) of the person to be searched in the Name and Location
text boxes, respectively.
m
ac
4. Click the Find person button. A web page with a list of persons with the search name
appears. You can click on the link of the desired person to view his/her details.
M
©
td
appears.
t.L
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
3. Open any word processor such as Text Editor, LibreOffice Writer, etc., and paste the
ac
copied text.
M
4. Save the file where you have copied the text for future reference.
©
116
td
9.2.3 Saving a Web Page
t.L
You can also save the entire web page to view it even when you are not connected to the
Pv
Internet. To save a web page, follow these steps.
a
di
1. Click the Open menu button ( ) placed below the Close button (
In ) on the
top-right of the Mozilla Firefox window. A menu appears.
rs
2. Click Save Page As from the submenu that appears. The Save dialog box appears.
he
is
4. Type a name for the page in the Name box if you want to save the page with a
Pu
different name.
n
illa
(a) Selecting the Save Page As option (b) Save dialog box
Fig. 9.8 Saving a web page
117
td
e-mail, chatting, videoconferencing and newsgroups.
.L
t
Pv
9.3.1 E-mail
a
E-mail, or electronic mail, is the process of exchanging messages electronically using
di
computers. E-mails allow users to communicate with each other in lesser time and at
In
nominal costs. Apart from textual data, images, and audio and video files can also be sent
rs
through e-mails.
he
There are numerous advantages of using the e-mail facility provided by the Internet.
is
High Speed: Messages can be sent very quickly irrespective of the distance.
Low Cost: It is an inexpensive mode of communication.
n
illa
sent from a source computer, it will definitely be delivered. If any error occurs, an
ac
Content: Any form of data such as text, graphics, sound or video can be sent through
©
e-mails.
118
td
Sent folder Contains a copy of the outgoing e-mails so that you can review or
.L
resend them if needed
t
Pv
Spam folder Contains all the junk e-mails that you do not want to read
Trash folder Contains the e-mails deleted from any other folder
a
di
Composing a mail Allows you to create a new e-mail message
In
Replying to a mail Allows you to reply to a received e-mail
rs
Attachments Allows you to send pictures, documents or any other files with
is
Deleting a mail Allows you to delete unwanted messages from the Inbox or any
Pu
other folder
n
Online Contacts Allows you to store online the names, phone numbers and
m
td
Instant messaging (IM) is a form of online communication that allows instant exchange
.L
of text-based messages between a sender and a receiver. It is similar to online chat as it
also offers communication via text messages in real time over the Internet. However, the
t
Pv
difference between the two is that IM is a communication between known people, while
a
online chat can be held among unknown people also. Some popular IM services are
di
Google Hangouts, World of Chat Messenger, Hike Messenger and Skype.
In
rs
Note
he
is
Google Hangouts is a web-based IM service that allows two or more users to communicate
m
through text, voice or video messages. It has been developed by Google. You can access
ac
td
t .L
Pv
(a) Typing username (b) Typing password
a
Fig. 9.11 First screen of Google Hangouts
di
In
The main screen of Google Hangouts appears.
rs
6. To send a message to any of your contacts already added in your Gmail account,
he
click the MESSAGE button ( ) on the right side of the main screen.
is
7. Type the name, phone or e-mail address of the person to whom you want to send
bl
the message in the search box. As you start typing, a list of matching results appears.
Pu
n
illa
m
ac
M
©
(a) Main screen of Google Hangouts (b) Searching for the contact
Fig. 9.12 Finding a contact to send a message
8. Click on the desired name from the list. A separate chat window with the selected
username opens up.
9. Type your message in the text area.
10 Press the Enter key. The message is delivered instantly to your chosen contact and
he/she can then reply to your message.
121
td
Emoticons
.L
When you have a face-to-face conversation with your friend or a relative, you can express
t
Pv
your emotions using facial expressions. Even though the person on the other side cannot
see you, you can express and convey your emotions while writing e-mails and chatting by
a
di
making use of emoticons or smileys. Some of the commonly used emoticons are listed in
In
Table 9.2.
rs
:-) or :) Happy
bl
Pu
:-O Surprised
n
:-D Laughing
illa
8-} Silly
m
:-( Sad
ac
M
B-) Cool
©
:-? Thinking
:-& Sick
<:-P Party
=D> Applause
Acronyms
In addition to emoticons, you can make use of some acronyms or abbreviations in your
e-mails or while chatting. These acronyms are used to speed up typing. They can be
written in uppercase or in lowercase. Some of the popularly used acronyms are listed in
Table 9.3.
122
td
9.3.3 Videoconferencing
.L
Videoconferencing allows two or more people, who are geographically apart, to
t
Pv
communicate and interact via audio and video transmission. It enables conversation
between people located at different places with a facility to see each other while they
a
converse. Videoconferencing is an extremely useful means of communication because
di
it saves the time and expense of travel and can often accomplish many of the things a
In
physical meeting can.
rs
he
is
bl
Pu
n
illa
m
ac
M
©
There are five basic components that are required to conduct videoconferencing.
These components are listed below.
Camera: to capture the images to send across the network
Monitor or Television: to display the images of the people participating in
videoconferencing
Microphone: to capture the sound at the sender’s end
Speakers: to play the captured sound at the receiver’s end
Coder/Decoder (codec): to compress and decompress video and audio data, allowing
transmission across the network.
123
9.3.4 Newsgroup
On the Internet, one can also share news, views, ideas and information on topics sych as
politics, science, computers, etc. This can be accomplished using a newsgroup service.
A newsgroup, also known as a Usenet, is an online discussion group among people on
the Internet who share a common interest. Many websites, such as www.easynews.com,
www.google.com, and www.usenetserver.com provide the facility of newsgroups.
People interested in a specific topic write articles and post them on the bulletin board of
the newsgroup server so that others can read, reply and comment on them. You can read
td
and post newsgroup articles using newsreader software such as Mozilla Thunderbird or
.L
Netscape News or using a web browser such as Mozilla Firefox.
t
Pv
9.4 E-COMMERCE
a
di
The Internet, due to its enormous growth, is no longer restricted to personal use.
In
Organisations all over the world are using the Internet as a medium to conduct business.
This includes providing information about the product, buying and selling of a product
rs
as well as providing services such as after-sale service for the product. This is referred to
he
clothes, etc., can be bought using e-commerce. Similarly, services such as booking a
bl
holiday package, consulting a doctor, booking the air or railway tickets, checking your
Pu
who wants to conduct online business with the company or the individual can select and
ac
order the desired product(s) or avail the desired service. Once the order is placed, the next
M
step is to make the payment. Payments are made online generally through credit cards.
©
E-commerce is classified into different categories according to the purpose it serves for the
seller and the buyer. The various categories of e-commerce are listed here.
Business-to-Customer (B2C): In this type of e-commerce, the products or services
are sold from a firm to a consumer.
Business-to-Business (B2B): In this type of e-commerce, both the buyer and seller
are two companies.
Consumer-to-Consumer (C2C): In this type of e-commerce, consumers sell goods
and services to other consumers.
Business-to-Government (B2G): In this type of e-commerce, the business community
interacts electronically with government agencies or public sector organisations.
Submissions of VAT returns, income tax, etc., all come under this category.
124
td
making use of emoticons or smileys. You can also make use of some acronyms
.L
or abbreviations to speed up typing.
t
Pv
Videoconferencing enables conversation between people located at different
places with a facility to see each other while they converse.
a
di
There are five basic components that are required to conduct videoconferencing,
In
namely, camera, monitor or television, microphone, speakers, and coder/decoder
rs
(codec).
he
Providing information about the product, buying and selling of a product as well
as providing services such as after-sale service for the product on the Internet is
n
Exercises
1. Tick (ü) the correct option.
a. Which of the following is not an advantage of e-mail facility?
(i) High speed (ii) Reliability
(iii)
High cost (iv) Content
125
td
.L
e. Which software enables you to search for information on the Internet?
t
Pv
(i) Search engine (ii) Chat program
(iii) Videoconferencing software (iv) None of these
a
di
In
2. Fill in the blanks.
rs
which many users talk to each other in real time by posting messages.
is
bl
f. A ………………… searches the Internet for new terms and stores the
searched terms in a database.
g. ………………… folder stores all the incoming e-mails.
126
td
.L
d. How is chatting different from videoconferencing?
t
e. What is a search engine?
Pv
f. Write the steps involved in finding people on the Internet.
a
di
g. Write a short note on e-commerce. In
rs
he
is
bl
Pu
Activity
n
illa
Open the website www.google.com and find some information on the ‘solar eclipse’.
m
b.
Compose a new
M
information in the
message box, and send
it to any of your friends
whose e-mail address is
known to you.
127
td
.Lt
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
M
©
128
td
3. Which of these is not a communication service provided by the Internet?
.L
(a) E-mail (b) Chatting
t
Pv
(c) Newsgroup (d) E-commerce
a
4. Which of these symbols separates the two parts of an e-mail address?
di
In
(a)
$ (b) *
rs
(c)
@ (d) &
he
5. Which of these folders contains all the e-mails that have been composed but not sent?
is
bl
Which of these Calc functions is used to determine the lowest number within a range?
6.
illa
(a)
SUM (b) AVERAGE
m
ac
(c)
MAX (d) MIN
M
129
td
.L
color
(a) (b) background
t
Pv
font face (d)
(c) bottom margin
14. Which of these attributes of the FONT element is used to set the type of the font?
a
Size
(a)
di
(b) Shape
In
Face
(c) (d) Face color
rs
he
GOTO
(a) (b) JUMPTO
bl
Pu
JUMP
(c) (d) None of these
16. The horizontal or vertical lines used to identify the value of each data
n
illa
130
td
.L
<BODY>. . .</BODY> (b)
(a) <HTML>. . .</HTML>
t
Pv
<HEAD>. . .</HEAD> (d)
(c) <TITLE>. . .</TITLE>
23. Which of these HTML elements is used to underline the text in a web page?
a
<UN>. . .</UN> (b)
(a) <UND>. . .</UND>
di
In
<U>. . .</U>
(c) (d) None of these
rs
he
24. Which of these HTML elements is used to generate a horizontal line (rule) in a web
is
page?
bl
131
td
t .L
Pv
ANSWERS
a
di
In
1. (a) 2. (d) 3. (d) 4. (c) 5. (b)
rs
11. (a) 12. (d) 13. (b) 14. (c) 15. (a)
is
bl
16. (a) 17. (a) 18. (b) 19. (c) 20. (b)
Pu
21. (b) 22. (d) 23. (c) 24. (a) 25. (d)
n
26. (a) 27. (b) 28. (c) 29. (c) 30. (a)
illa
m
ac
M
©
132
LibreOffice Calc
Create a worksheet and enter the data given in the following table.
Minimum Maximum
City
Temperature Temperature
Delhi 5 20
td
Mumbai 25 21
.L
Chennai 33 42
t
Pv
Kolkata 30 32
a. Find the minimum value from the Minimum Temperature column.
a
b.
di
Find the maximum value from the Maximum Temperature column.
In
c. Find the average of minimum and maximum temperatures.
rs
he
d. Display the value of temperature in yellow if the cells in the Minimum Temperature
is
e. Display the value of temperature in green if the cells in the Maximum Temperature
Pu
f. Create an Area chart for the table in the same worksheet on which you are working.
illa
m
QBASIC
ac
133
HTML
Write the HTML code to create the following web page.
td
.L
t
Pv
a
di
In
rs
he
is
bl
Pu
n
illa
m
ac
M
©
134
td
b. Which of the following plotters is used in designing ships, buildings, etc.?
.L
(i) Drum plotter (ii) Flatbed plotter
t
Pv
(iii) Both (i) and (ii) (iv) None of these
a
c. Which of the following Calc functions displays the current date and time?
(i) Current (ii)
di
Date
In
(iii)
Time (iv) Now
rs
he
DIVIDE (iv)
(iii) ARRANGE
M
©
135
td
Calc.
.L
f. The LEFT$ function in QBASIC is used to find the length of a string.
t
Pv
g. ClamAV is the GUI version of ClamTK.
a
di
4. Answer the questions. In
a. Discuss any three commonly used application software.
rs
136
td
(i) OCR (ii) OMR
.L
(iii)
Smart card (iv) MICR
t
Pv
d. Which of the following functions in QBASIC is used to find the length of the
string?
a
(i) LENGTH$ (ii)
LEN$
di
In
LEFT$ (iv)
(iii) RIGHT$
rs
he
(i) A tag consists of a left-angle bracket, a tag name, and a right-angle bracket.
bl
Pu
(iv) An element cannot contain one or more than one element within it.
m
ac
b. A .............................. virus infects the executable files such as .COM and .EXE
files by attaching its copy to them.
c. ClamTK is an .............................. software.
d. An .............................. is displayed if the function is entered incorrectly or the
task is not carried in a proper way.
e. .............................. displays only those rows in the worksheet that meet the
conditions specified by the user.
f. The .............................. element in HTML provides a title to a web page.
g. In the .............................. category of e-commerce, the business community
interacts electronically with government agencies.
137
td
.L
f. The CIRCLE statement is used to draw a circle or an ellipse.
t
Pv
g. Using acronyms, you can express your emotions while chatting.
a
di
h. The TODAY function display the current date and time. In
rs
138
td
barcode of a product
.L
Chart: a graphical representation of data in a worksheet
t
Pv
Computer virus: a program which is designed to perform undesired and malicious actions
a
by replicating and attaching itself to other programs
di
Compiler: a language translator that translates a program written in a high-level language
In
into the machine language
rs
Desktop publishing software: the software which allows a user to design and create printed
he
documents
is
Device drivers: the system software responsible for the proper functioning of various
bl
Pu
earthquake activity or for long graphic output structures such as tall building structures
illa
about the product, buying and selling of a product as well as providing services like
ac
Filtering: a feature that displays the data according to the conditions specified by the user
©
Flatbed plotter: a type of plotter used in designing ships, aircraft, buildings, etc.
Formula: the entries that perform calculations on the values stored in a cell or range of
cells
Function: a predefined formula in Calc
High-level language: the language that uses English-like statements which are much easier
to learn and use
HTML: the language used for creating web pages
Image editor: a program that is designed specifically for capturing, creating, editing and
manipulating images
139
td
.L
Newsgroup: also known as a Usenet, is an online discussion group among people on the
Internet who share a common interest
t
Pv
Operating system: the system software that acts as an interface between the computer’s
a
hardware and the user
di
OCR: stands for Optical Character Recognition—the process of providing text as input to
In
a computer by means of a document reader
rs
Plotter: an output device that is used to generate graphical outputs such as images, charts,
bl
Relative reference: the cell reference in the formula that changes when it is copied to
n
Software: refers to the set of computer programs that are loaded into a computer for its
M
Sorting: one of the key features of Libre Office Calc that arranges the data either in the
ascending or descending order
System software: a set of programs that are designed to control the operations of a
computer system
System utilities: the system software that performs some specific tasks related to the
maintenance of the computer hardware and data
Touch screen: a special kind of an input device which enables you to choose an icon or a
menu item displayed on a screen by simply touching it with your finger
Videoconferencing: allows two or more people who are geographically apart from each
other to communicate and interact with each other via audio and video transmission
140
d
KEY FEATURES
Lt
Text is presented in a clear and simple language, with enhanced visual appeal.
t.
All the ideas and concepts are explained with clear-cut and practical examples.
Pv
Each and every topic is thoroughly researched and certified by consultant teachers from schools.
a
The illustrations given in the chapters lend enormous support as learning aids.
di
For the Teacher boxes provide teaching ideas and tips for the teachers.
In
Did You Know and Note boxes impart more information and interesting facts about the topic being
rs
discussed.
he
An exhaustive set of questions and activities are given at the end of each chapter to reinforce
is
Revision exercises and Project work at the end of the book help to sharpen the concepts learnt in
Pu
the chapters.
Sample questions based on National Cyber Olympiad at the end of the book help students prepare
n
ITL Education Solutions Limited (ITL ESL) is a part of the ITL group which has operations all over
m
the world with a significant presence in education and IT-enabled services. It specialises in handling
ac
educational projects in IT domains with a dedicated R&D wing of industry experts that helps in designing
M
Write to us at cs-support@macmillan.co.in
` 405
ISBN 938951821- 0