Snake and Ladder Board Game on Entrepreneurship by Y. Yogi RajY. Yogi Raj
A board game on entrepreneurship was created by Y. Yogi Raj using the snake and ladders concept. The game was published in CBSE's textbook for entrepreneurship that is played by millions of students ever year.
enterpreneurship book = cbse - Arise roby IndianArise Roby
Education in India plays a major role for the students in Identifying and molding the different DNA hidden inside in each and every student.
DESIRE DREAM DESTINY
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Snake and Ladder Board Game on Entrepreneurship by Y. Yogi RajY. Yogi Raj
A board game on entrepreneurship was created by Y. Yogi Raj using the snake and ladders concept. The game was published in CBSE's textbook for entrepreneurship that is played by millions of students ever year.
enterpreneurship book = cbse - Arise roby IndianArise Roby
Education in India plays a major role for the students in Identifying and molding the different DNA hidden inside in each and every student.
DESIRE DREAM DESTINY
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
4. InformationTechnologyLevel-2
InformationTechnologyLevel-2
StudentsHandbook-ClassX
PRICE:`
First Edition 2013, CBSE, India
Copies:
Published By : The Secretary, Central Board of Secondary Education,
Shiksha Kendra, 2, Community Centre, Preet Vihar, Delhi-110092
Design, Layout : Multi Graphics, 8A/101, WEA Karol Bagh, New Delhi-110005
Phone: 011-25783846
Printed By :
"This book or part thereof may not be reproduced by
any person or agency in any manner."
6. THE CONSTITUTION OF INDIA
PREAMBLE
1
WE, THE PEOPLE OF INDIA, having solemnly resolved to constitute India into a [SOVEREIGN
SOCIALIST SECULAR DEMOCRATIC REPUBLIC] and to secure to all its citizens :
JUSTICE, social, economic and political;
LIBERTY of thought, expression, belief, faith and worship;
EQUALITY of status and of opportunity; and to promote among them all
2
FRATERNITY assuring the dignity of the individual and the [unity and integrity of the Nation];
IN OUR CONSTITUENT ASSEMBLY this twenty-sixth day of November, 1949, do HEREBY ADOPT,
ENACT AND GIVE TO OURSELVES THIS CONSTITUTION.
THE CONSTITUTION OF INDIA
Chapter IV A
FUNDAMENTAL DUTIES
ARTICLE 51A
Fundamental Duties - It shall be the duty of every citizen of India-
(a) to abide by the Constitution and respect its ideals and institutions, the National Flag and the National
Anthem;
(b) to cherish and follow the noble ideals which inspired our national struggle for freedom;
(c) to uphold and protect the sovereignty, unity and integrity of India;
(d) to defend the country and render national service when called upon to do so;
(e) to promote harmony and the spirit of common brotherhood amongst all the people of India transcending
religious, linguistic and regional or sectional diversities; to renounce practices derogatory to the dignity of
women;
(f) to value and preserve the rich heritage of our composite culture;
(g) to protect and improve the natural environment including forests, lakes, rivers, wild life and to have
compassion for living creatures;
(h) to develop the scientific temper, humanism and the spirit of inquiry and reform;
(i) to safeguard public property and to abjure violence;
(j) to strive towards excellence in all spheres of individual and collective activity so that the nation constantly
rises to higher levels of endeavour and achievement;
1
(k) who is a parent or guardian to provide opportunities for education to his/her child or, as the case may be,
ward between age of six and forteen years.
1. Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "Sovereign Democratic Republic” (w.e.f. 3.1.1977)
2. Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for "unity of the Nation” (w.e.f. 3.1.1977)
1. Ins. by the constitution (Eighty - Sixth Amendment) Act, 2002 S.4 (w.e.f. 12.12.2002)
7. InformationTechnologyLevel-2
ThenationalcurriculumFramework,2005,recommendsthatchildren’slifeatschoolmust
belinkedtotheirlifeoutsidetheschool.Thisprinciplemakeadeparturefromthelegacyof
bookish learning which continues to shape our systems and caused a gap between the
schoolhome,communityandtheworkplace.
The student workbook on information Technology (IT) is a part of qualification package
developed for the implementation of National Vocational Education Qualification
Framework (NVEQF), an initiative of Ministry of Human Resource Development (MHRD),
Government of India to set common principles and guidelines for a nationally recognised
qualification system covering the school’s vocational education and training institutions,
technical education institutions, college and universities. It is envisaged that the NVEQF
will promote transparency of qualifications, cross-sect oral learning, student
qualifications,thusencouraginglife-longlearning.
This student workbook, which forms a part of vocational qualification package for
student’s who have passed class IX or equivalent examination, was created by group of
experts. The IT-ITes skill development council approved by the national occupation
standards (NOS). The national occupation standards are a set of competency standards
and guidelines endorsed by the representatives of IT industry for recognized and
assessing skills and assessing skills and knowledge needed to perform effectively in the
workplace.
The CBSE has developed materials (units) for the vocational qualification package in
IT/ITes sector for NVEQF levels 1 to 4; level 2 is equivalent to class X. Based on Nos
occupation related core competencies (Knowledge, skills and abilities) were identified for
developmentofcurriculumandlearningmodules(units).
This student workbook attempts to discourage rote learning and to bring about necessary
flexibility in offering of courses necessary for breaking the sharp boundaries between
different subjects areas. The workbook attempts to enhance this endeavour by giving
higherpriorityandspacetoopportunitiesforcontemplationandwondering,discussionin
smallgroupsandactivitiesrequiringhandsonexperience.
Any suggestions, feedback from the readers for improvement in the future editions of the
volumeshallbeheartilywelcomed.
Vineet Joshi
Chairman, CBSE
Preface
12. InformationTechnologyLevel-2
1.1 EvolutionofNetworkingandNeedforNetworking
As you know, networking is widely used for accessing and sharing information;
examples include web browsing, downloading & uploading, file sharing, printer
sharing, etc. Today networking is popular with private and business users across the
globe.
In today's world, it can be extremely difficult to live without networks, since resource
sharing (printers, shared folders etc) and Internet connectivity have become an
integralpartofourdailyactivities.
A computer network, often simply referred to as a network, is a collection of
computers and other hardware components interconnected by communication
channelsthatallowsharingofresourcesandinformation.
Networking is widely used for sharing of resources and information & for
communication purposes. Networks can also help in reducing costs; for example you
canbuyasingleprinterandshareitacrossmultipleusers.
Network consists of one or more computers or devices connected in order to provide
and access resources. Resources include a range of devices (example, Printer,
CDROM,HardDrives,etc.)andservices(example,webservice,mailservice,etc.).
NetworksbasedonsizeareclassifiedintoLAN&WAN.
LAN: Local Area Network refers to group of computers networked within a
limitedgeographicalareasuchasschools,colleges,offices,etc.
WAN: Wide Area Network refers to computers networked across geographical
areas, in other words they connect LAN's between different locations. For
example, computers or devices in a branch office could connect to the computer
networksattheheadofficethroughtelephonelinesorsatellites.
This session introduces you to the basic fundamental concepts of networking and
InternetandusingdifferenttypesofInternetconnection.
o
o
1
Networking Fundamentals
1Unit -
13. InformationTechnologyLevel-2
2
Thereareseveralwaystoformanetworkaslistedbelow:
Useacross-overcable(alsoreferredtoasPeer-to-peercable)
UseSerialandParallelports
UseBluetooth
UseWi-Fi(formorethantwocomputers)
UseHuborNetworkSwitch(formorethantwocomputers)
SOHO Router or Wi-Fi Router (Commonly found in home & small business
networks)
Networksaredesignedusingthefollowingarchitecture:
Networks in which all computers have an equal status are called peer to peer
networks.GenerallyinsuchanetworkeachterminalhasanequallycompetentCPU.
Peer-to-Peer Network
Networks in which certain computers have special dedicated tasks, providing
servicestoothercomputers(inthenetwork)arecalledclientservernetworks.
The computer(s)which provide services are called servers and the ones thatuse
theseservicesarecalledclients.
Client-Server Network
Note: Clients are referred to as "Service Requestors" and Servers as "Service Providers".
Any machine that request a service is called as the client and machines that fulfill the
requestsiscalledtheclient.
WaystoformacomputerNetwork
Peer-to-peer(P2P)
Client-Server
o
o
o
o
o
o
14. InformationTechnologyLevel-2
3
NetworkscanhaveacombinationofbothClient/ServermodelsandPeer-to-Peer.
For example, you may be using a centralized mail server and/or access files from
othermachinesinthenetwork.
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite to serve billions of users worldwide. It is a network
of networks that consists of millions of private, public, academic, business, and
governmentnetworks.
Internet is one of the most useful technologies of modern times which help us in our
daily, personal and professional life. Internet is widely used by students, educational
institutes; scientist and professionals to gather information for research and
general information. Businesses use the Internet to access complex databases
such as financial database. The Internet is the largest encyclopedia for all age
groups. The Internet helps in maintaining contact with friends and relatives
who live across different locations via Internet chatting systems and email
software. Internet is also becoming a major source of entertainment for the general
public.
Intranet refers to private computer network used by organizations for sharing
resources; Intranets can be simple within a building or very large spread across the
globeconnectedthroughvariousnetworkingtechnologies.Intranetshelpemployees
of an organization to locate information much faster resulting in increased
productivity. Though popularly referred to a company's internal website or portal,
Intranet usually employs other protocols such as POP3, SMTP, FTP, etc. and may even
offeravarietyofservices(youwillreadmoreabouttheseinlatersessions).
Extranet is a computer network used outside the Intranet. For example, an
organization may allow a vendor to view or access their resources such as their
internal website for updating a product catalog or training material. However, this is
highly restricted to Internet users (public). Extranets are usually accessed using
VPNs(youwillreadmoreaboutthisprotocollater).
World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a
Internet
Intranet
Extranet
WorldWideWeb
15. InformationTechnologyLevel-2
4
system of interlinked hypertext documents accessed via the Internet. With a web
browser, one can view web pages that may contain text, images, videos, and other
multimedia,andnavigatebetweenthemviahyperlinks.
Informationisstoredonwebserversreferredtoaswebpagesareretrievedbyusinga
web browser such as Firefox on the local computer. A Web Browser is software used
to view websites and acts as an interface between the user and the World Wide Web.
A Web server is a computer that stores web sites and their related files for viewing on
theInternet.
Someoftheadvantagesassociatedwithnetworkingare:
Data Sharing: One of the most important uses of networking is to allow the
sharing of data. Users can send text files, spread sheets, documents,
presentations,audiofiles,videofiles,etc.tootherusers.
Hardware Sharing: Hardware components such as printers, scanners, etc.
can also be shared. For example, instead of purchasing 10 printers for each user,
one printer can be purchased and shared among multiple users thus saving
cost.
Internet Access Sharing: You can purchase a single Internet connection and
share it among other computers in a network instead of purchasing multiple
Internet connection for each computer. This is very commonly found in
Internetcafé(browsingcentres),schools,colleges,companies,etc.
Usage of network based applications such as web browsers, email clients,
chatapplication,audio&videocalling,etcisanotheradvantage.
Datacanbetransferredoveranetworkusingthefollowingtechniques:
Circuit Switching: In this method, a dedicated path is established between the
endpointsbeforethedataistransferred.Onceadedicatedpathisestablished,no
otherdevicescanusethecircuit.Example:Dial-Up,ISDN.
Packet Switching: In this method, data is divided into blocks referred to as
packets. Multiple packets can be sent via different paths allowing more than two
devices to communicate at the same time. Modes of operation can be
connectionlessorconnection-oriented.
o
o
o
o
o
o
DataTransmissionmethods
16. InformationTechnologyLevel-2
5
In connectionless mode, packets have source & destination address for
routingthatmaytakedifferentpaths.Example:Ethernet,IP,UDP.
In connection-oriented mode, connection is defined (a virtual circuit is
created) before a packet is transferred. Packet switching supports variable
packetsizes.Example:X.25,FrameRelay,TCP.
Cell Switching: Cell switching method is similar to that of packet switching but
has a fixed size for the cells transmitting data. Cell switching is efficient when large
amountsofdataneedtotransferred.Example:ATM.
Having talked of data transfer and the Internet, have you ever wondered how sitting
in one corner of the world, you get information from another distant area in a
fewseconds?
In very simple language, let's see what happens to a piece of data, say a Web page,
whenitistransferredovertheInternet:
Thedataisbrokenupintobitsofsamesizedpiecescalledpackets.
A header is added to each packet explaining where the data has come from,
whereitshouldendupandwhereitfitsinwiththerestofthepackets.
Each packet is sent from computer to computer until it finds its destination.
Each computer on the way decides where next to send the packet. All
packetsmaynottakethesameroute.
At the destination, the packets are examined. If any packets are missing or
damaged, a message is sent asking for them to be re-sent. This continues until
allpacketshavebeenreceivedintact.
The packets are now reassembled into their original form. All this done in
seconds!To access the Internet, you need an active internet connection.You
needtogatherandunderstand your requirement carefully before subscribing
to an internet connection plan. In this exercise, you will learn how to
choose anInternetconnection.
Someofthecommonquestionsthathelpyouinyourdecisionare:
Whatisthepurposeofgettingthisconnection?
Willyouusetheconnectionregularly?
?
?
o
o
o
o
o
o
o
o
DatatransferontheInternet
17. InformationTechnologyLevel-2
6
Howmuchdatawillbedownloadedonanaveragepermonth?
Howmuchspeeddoyouneed?
Whattechnologyisavailableinyourparticulararea?
WhatarethedifferentplansavailablefromtheISP?
Isthereanylimitationorcatchfortheselectedplan?
To access Wi-Fi, you need an access point with an active Internet connection.
Usually when you subscribe to an Internet connection, the ISP provides options
to purchase or rent a Wi-Fi router that can act as both an internet connectivity
device and an access point for Wi-Fi connectivity. Setting up a Wi-Fi network
requires technical expertise; however, you can access the Wi-Fi network by
connectingtoanaccesspointthatisalreadysetupforuse.Oncomputersthatrun
Windows XP, you can view the list of wireless networks available by using the
followingprocedure:
Right-Click on the Wireless Icon in the system tray and Click View Available
WirelessNetworks.
Windows XP will display the list of available Wi-Fi networks; you can choose any of
the connection from the list. Select by Double-clicking on the namedisplayedin
thelist.
Note: You may be prompted to enter a password if the selected network is secure. You
will receive a confirmation that you are connected to a wireless network. Now the
system is ready to be used for network related applications such as Firefox, Chrome,
Skype,etc.
o
o
o
o
o
o
18. InformationTechnologyLevel-2
7
In a network, communication happens between devices or computers through
electrical, optical or radio-wave signals. Methods of signaling are widely categorized
intobasebandandbroadband.
Baseband: Data is sent as digital signals by using entire bandwidth of the media
(Single Channel), supporting single communication at a time. Signals are sent
over co-axial, twisted pair or fiber optic cables. Baseband supports higher
transfer rates as compared to broadband; however, baseband is limited with
distance. Baseband uses TDM (Time Division Multiplexing) to send multiple
signalsoverasinglecable.Example:Ethernet,TokenRing&FDDI.
Broadband: Data is send as analog signals by using portion of a bandwidth.
Broadband supports use of multiple signals at different frequencies (multiple
channels). Signals are split into channels by using FDM (Frequency Division
Multiplexing). Example: xDSL, where telephone lines are used for both voice
(telephone)callsanddata(Internetconnectivity).
Baseband vs. Broadband
Channel operation refers to the mode of communication between connected devices
or computers. Channel operation can be simplex, half-duplex or fullduplex. Simplex is
a one way communication, similar to that of a radio. Halfduplex is a two way
communication but only one way at a time, similar to that of a walkie-talkie. Full-
duplexistwowaysimultaneouscommunication(datacanbereceivedandsentatthe
sametime),similartothatofatelephone.
When multiple devices or computers are connected in a network, they use multiple
signals that are combined at the source and separated at the destination by use of a
TerminolgiesandTechnologies
SignalingMethods
ChannelOperation
MultipleSignalingMethods
o
o
Single Channel
FrequencyFrequency
C1 C2 C
19. InformationTechnologyLevel-2
8
technique called multiplexing. For multiplexing, a device called the multiplexer is
usedformultiplexing/demultiplexingsignals.Typesofmultiplexinginclude:
TDM (Time Division Multiplexing) is a method in which multiple signals are
combined and send over a single transmission media such as wires or radio
waves. This is achieved by use of time sharing; multiple signals are transmitted
for a defined amount of time in cycles. For example, a device sends and receives
signalseveryalternatesecond.
FDM (Frequency Division Multiplexing) is a method in which multiple signals
are transmitted at different frequencies. Multiple signals can be sent at the same
time over a single channel using this technique. For example, a device sends
multiple signals at the same time using different frequencies similar to that of a
radio (FM) or cable TV and the end device receives by tuning in to a particular
channel.
To use the Internet, you need an Internet connection. Internet connections are
provided by Internet Service Providers such as Bharat Sanchar Nigam Limited
(BSNL),Airtel,MTS,Vodafone,TataDocomo,etc.
An Internet service provider (ISP) is an organization which provides you with
access to the Internet via a dial-up (using modem) or direct (hard wired) or
wirelessconnection.
Choosing connectivity depends on the availability of a particular technology,
speed and connection type in your area. Usually small and medium business
users, home users use connectivity types such as DSL, cable modem, dial-up,
broadband wireless, WiMAX or 3G. Medium to large business users or customers
with more demanding requirements may use high speed connectivity such as
DSL(HighSpeed),ISDN,etc.
Á modem is a device that converts digital computer signals into a form (analog
signals) that can travel over phone lines. It also re-converts the analog signals back
into digital signals. The word modem is derived from its function MOdulator/
DEModulator.
o
o
GettingaccesstotheInternet
InternetServiceProvider
Modem
20. InformationTechnologyLevel-2
9
Channel access methods refer to how devices communicate using a shared medium
such as bus networks, star networks, ring networks, hub networks & wireless
networks. When multiple devices or computers are used in a shared medium, a pre-
defined method of transmission needs to be defined. Channel access methods in
circuit switching networks include FDM, TDM, etc and in packet switching networks
includeCSMA/CD,CSMA/CA,Tokenpassing,etc.
Ethernet is a family of computer networking technologies for local area networks
(LANs) and has largely replaced competing wired LAN technologies. Ethernet
standard defines how communication happens between network interface cards,
hub, switches, repeaters, etc. Devices on Ethernet networks use frames or Ethernet
frames for communication. IEEE 802.3 standard defines the Media Access Control
(MAC) portion of the data link layer and the physical layer of the OSI model. Ethernet
protocolsarecoveredbythisstandard.
CSMA/CD (Carrier Sense Multiple Access/Collision Detect) as per IEEE 802.3
standardisamechanismthatdefineshowtransmissiontakesplaceinanetwork.
Only one device in the collision domain may transmit at any one time, and the other
devices in the domain listen to the network before sending any packets in order to
avoid data collisions. Collisions also decrease network efficiency on a collision
domain. If two devices transmit simultaneously, a collision occurs, and both devices
devicewillwaitforarandomamountoftimebeforeattemptingtotransmitagain.
Collisiondomainsarefoundinahubenvironmentwhereeachhostsegmentconnects
to a hub that represents only one collision domain and only one broadcast domain.
Modern wired networks use a network switch to eliminate collisions. By connecting
each device directly to a port on the switch, either each port on a switch becomes its
owncollisiondomain(inthecaseofhalfduplexlinks)orthepossibilityofcollisionsis
eliminated entirely in the case of full duplex links. Collisiondomains are also found in
wirelessnetworkssuchasWi-Fi.;CSMA/CAisusedinwirelessnetworks.
Carrier sense multiple access with collision avoidance (CSMA/CA) is a network
multiple access method in which nodes attempt to avoid collisions by transmitting
ChannelAccessMethods
Ethernet
CSMA/CD
CSMA/CA
21. InformationTechnologyLevel-2
10
only when the channel is sensed to be "idle". It is particularly important for wireless
networks, where the collisiondetection of the alternative CSMA/CD is unreliable due
tothehiddennodeproblem.
Token passing is a channel access method where a signal called a token is passed
between nodes that authorize the node to communicate. The most well-known
examplesaretokenringandARCNET.
When multiple computers or devices are connected in a network, signals can be
addressed as unicast, multicasts or broadcasts. Unicast refers to one-to-one
communication,forexamplesignalissentfromonecomputertoanother.
Multicast refers to one-to-may communication, for example signal from one
computer or device is sent to selective set of computers or devices. Broadcast refers
to one-to-all communication, for example single from one computer or device is sent
toalldevicesandcomputersinanetwork.
There are different types of Internet Connectivity available today; it can be widely
categorized into wired and wireless access. Following table is a summary of different
typesofInternetconnectivitycategorizedintowiredandwireless:
Dial-Up Wired
DSL Wired
CableInternetAccess Wired
3G Wireless
WiMAX Wireless
Wi-Fi Wireless
SomeofthecommonlyusedInternetconnectivityare:
Dial-up: Dial-up Internet access is a form of Internet access that uses the facilities
of the public switched telephone network (PSTN) to establish a connection to an
Internet service provider (ISP) via telephone lines using a device called MODEM.
UsersdialaparticularnumberprovidedbytheISPandgainaccesstotheInternet.
TokenPassing
Addressingmethods
TypesofCommonInternetConnectivity
Technology TypeofConnectivity
22. InformationTechnologyLevel-2
11
Dial-up connections are extremely slow and in most cases, it is replaced by a high
speedconnectionsuchasDSLorCableModem.
DSL:Digitalsubscriberline(DSL)provideInternetaccessbytransmittingdigitaldata
overwires of a local telephone network. DSLserviceisdeliveredalongwith wired
telephone service on the same telephone line. On the customerpremises, a DSL
filter removes the high frequency interference, enabling simultaneous use of the
telephoneanddatatransmission.ForusingaDSLconnection,youneedaDSLmodem
andasubscription.
Cable Internet Access: Cable Internet Access is a form of broadband Internet access
that uses the cable television infrastructure. Cable Internet Access is provided
through existing cable TV networks; this is similar to DSL that is provided over
existingtelephonelines.
3G: 3G, short for 3rd Generation is a set of standards used for mobile devices and
mobile telecommunication services and networks. High-Speed Downlink Packet
Access (HSDPA) is 3G mobile telephony communications protocol that allows higher
datatransferspeedsandcapacity.Ifsupportfor3Gisavailableonyourmobilephone,
you can subscribe to the 3G connectivity with your ISP in order to get high speed
Internetconnectiononyourphone.
WiMAX: WiMAX (Worldwide Interoperability for Microwave Access) is a wireless
communications standard designed to provide mobile broadband connectivity
across cities and countries through a variety of devices. WiMAX is a long range
system, covering many kilometres and is typically used where DSL or Cable
Internet Access cannot be used; this could be difficulty in laying out cables for home
orofficeslocatedinremotelocationsbutneedaccesstotheInternet.
WI-Fi: Wi-Fi is a popular technology that allows an electronic device such as
computers or mobile phones toexchangedatawirelesslyoveranetwork,including
high-speed Internet connections. Wi-Fi devices such as personal computer,
smartphones, video game console, etc. can connect to a network resource such as
Internet through a device called the Wireless Access Point (WAP). Wi-Fi is used
here cables cannot be run (such as old buildings, outdoor areas) to provide network
andInternet access.Wi-Ficanalsobe usedwhereusersrequiremobileconnectivity.
Wi-Ficonnectivityisused inhome&offices,hotels,college&schoolcampustypically
forInternetAccess.Shoppingmalls,coffeeshops,resortsmostlyofferfreeorpaidWi-
FiaccesstotheInternetfortheircustomers.
23. InformationTechnologyLevel-2
12
TypesofCablesforInternet
Twisted-pairEthernetcablescanbewired"straight-through"or"Crossover".
To connect a network interface card to a switch, hub or router, straight-through or
patchcablesareused.
To connect similar devices (network interface card on computer to another network
interface on another computer, hub to hub or switch to switch), crossover cables are
used.
FiberOptic: A fiberoptic cable isa cable containing oneormore optical fibers.Fiber-
Opticcablesareidealfortransmittingdataoververylongdistancesatgreatspeedsas
lightisusedforthemediumfortransmission.Fiberopticcablesarenotsusceptibleto
anyEMI,Near-endCrosstalk(NEXT),orFar-endCrosstalk(FEXT).
Note that you require special network interface cards & network switch that support
the fiber optic interface which is usually expensive and common only in large
enterprise networks or locations that are susceptible to EMI such as factories that
useheavymachineries.
Fiber-Optic cables consist of a high quality glass or plastic strands and a plastic jacket
madeofTeflonorPVCthatprotectsthecable.
Two types of Fiber-Optic cable exist: Single-Mode Fiber (SMF) used for longer
distances and Multi-Mode Fiber (MMF) used for shorter distances. Signals are
transmittedaslightsignalsfromsourcetodestination.EitherLEDorLaserisused.In
multi-mode fiber, light signals are transmitted in numerous dispersed path (single-
mode fiber use single light source) and making it un-suitable for long distance
transmissions.
1. Core,2.Cladding,3.Buffer,4.Jacket FiberOpticCable
In some cases, plenum rated cables are used that have a special jacket to protect
against fire and emit less smoke than normal cables. However, this is rare and often
seenonlyinindustrialormanufacturingsites.
24. InformationTechnologyLevel-2
13
NetworkHardware
On computers that have support for networking, a list of utilities is available to
configure and troubleshoot network related issues. Often referred to as TCP/IP
utilities, these utilities are bundled along with the operating system. Though the
names of the utilities could vary in spelling, the underlying function is almost the
same across operating systems. Given below is a list of utilities (with simple
description)Youwilllearnmoreabouttheminlatersessions.
IPCONFIG InternetProtocolConfigurationUtility
GETMAC ViewMACorPhysicalAddressofanNIC
PING Testnetworkconnectivity
TRACERT TraceRoutefromsourcetodestination
ARP ResolveIPaddresstoMACaddress
Hostname Viewcomputernameorhostname
NETSTAT ViewTCP/IPstatistics
Nbtstat ViewNetBIOSoverTCP/IPstatistics
Nslookup ViewDNSrelatedinformation
Route Viewormodifyroutingtable
Pathping Tracepacketsandviewdetailedpacketinformation
Note: Use /? for additional help/syntax for each command listed here. For example to
knowmoreaboutIPCONFIG,typeIPCONFIG/?
Network devices such as NIC, hub, bridge, switch & routers are devices that help
computers to network and communicate. There are a variety of network devices
equippedwithawiderangeoffunctions.
Networkcardsaredevicesthatconnectcomputerstothenetwork.Networkcardsare
both Layer 1 (Physical) & 2 (Data Link) devices as they provide physical access to the
mediumandalsoprovidephysicaladdressingthroughtheMACAddress.
TCP/IPUtilities
NetworkInterfaceCard(NIC)
Utility Description
25. InformationTechnologyLevel-2
14
NetworkInterfaceCardsareavailablefordesktop,laptopandservercomputers.
A variety of interface such as PCI, CardBus, USB are available today. Most desktops,
laptops,serversandmotherboardshavebuilt-inNIC.
ViewNetworkInterfacecardinstalledonacomputer
A hub is a device that connects multiple computers using a twisted-pair cable. Hubs
operate at Layer 1 (Physical). The number of computers that can be connected to a
hub depends on the number of ports available (typically 4 to 8). Whenever it receives
data from one port, the hub broadcast data to all the devices connected to it, leading
tocollisions.Hencehubsarereferredtoasmultiportrepeaters.Sincetheevolutionof
SOHOroutersandnetworkswitches,hubsarerarelyusedandconsideredobsolete.
Bridge is a device that can connect network segments and separate network traffic
based on broadcasts. Bridges examine the frames and selectively transfer frames
accordingtotheirMACaddress.BridgesoperateatLayer2oftheOSIModel.
Switch is a device that allows multiple computers to be connected using twisted pair
cable. Switches (operating at Level 2 - OSI) manage traffic based on MAC (Media
Access Control) addresses and are efficient in large networks. Switches are
intelligent as they can build a table of MAC Addresses of all the devices connected to
portsontheswitchandcreateavirtualcircuitforeachattacheddevice.Onceapacket
is received, it is analyzed and forwarded to only the destined station with matching
MACaddressbasedonthetable.
Lab
Hub
Bridge
Switch
PCI Ethernet Card for use
in Desktops
Cardbus Ethernet Card for
use in older laptops
USB Ethernet Card
(USB Ethernet converter)
26. InformationTechnologyLevel-2
15
Using switches can eliminate collision as each port in the switch acts as a collision
domain. Since switches isolate collision domains, they are referred to as multiport
bridges. When forwarding frames, switches use Store and forward, cut through,
FragmentfreeorAdaptiveswitchingmethods.
Unlike a hub that uses half-duplex communication, a network switch can send and
receiveatthesametime(full-duplexmode)resultinginfasterperformance.
Number of computers that you can connect to a switch depends on the number of
ports available (Typically 4 or 8 on SOHO switches designed for use in home and
small business networks and 8 - 32 or 64 on switches designed for use in an
enterprise network.). The networks can be extended by adding additional switches
usuallycascadedfromtheprimaryswitch.Switchesdesignedforlargernetworksare
cascadedthroughaspecialportcalledtheUplinkport.
Simple Small Office Home Office Network Setup
An Enterprise network with a variety of networking devices
27. InformationTechnologyLevel-2
16
Categoriesofswitchesinclude:
Unmanaged switches are network switches used typically for homes or small
officesrequiringnoadministrativeconfiguration.
ManagedswitchesarewidelyusedinenterprisenetworksandISP's.Theseneed
tobeconfiguredbythenetworkadministratorbeforeitisusedinanetwork.
A single layer-2 network can be partitioned to create multiple distinct broadcast
domains, enabling data to be exchanged only between the computers within the
domain. This is referred to as VLAN or Virtual LANs. This is created for two primary
reasons:
toreducecollisions
toimplementsecurity.
For example if all the computers in an organization are connected to a single switch,
you can isolate them by creating VLAN's for each department resulting in restricted
access across departments with maximum access between computers within
departments.VLANscanbeconfiguredonlyonManagedswitches.
Separate VLANs for marketing & finance team connected to a single switch
PoE describes a standardized system to provide electrical power supply through
Ethernet cables; generally, UTP cables carry only signals necessary for data
communication. Switches that have support for PoE are generally expensive and in
somecasesonlylimitednumberofEthernetportsarecapableofsupportingPoE.
Advantages of PoE include the ability to provide power up to 25 watts and distance
factorthatallowsdevicestobeconnectedupto100metersfromtheswitch.
o
o
o
o
VLAN
PoweroverEthernet
VLAN 1, Marketing Team VLAN 2, Finance Team
28. InformationTechnologyLevel-2
17
Routers are Layer 3 devices that allow packets to be routed to different logical
networks. Routers can discover and transfer packets based on routing table that are
pre-determined or self-discovered. Routing tables are either managed by an
administrator by manually defining the routes or automated through special
configuration to exchange the routing tables with other routers on a logical network.
Most common type of routers includes the SOHO router used at home or small office
for sharing Internet connection; sophisticated routers are widely used in enterprise
networks and ISP's. Similar to SOHO switches, SOHO routers do not need to be
configured and routers designed for use in large networks require to be configured
beforetheycanbeused.
In general, a combination of several routers and switches are used in large networks.
Notable manufacturers of routers include Cisco, Nortel Networks, Avaya, HP, Dell,
Huawei,etc.
Routing is the process of selecting paths in a network when sending or receiving
packets across computers or devices. Imagine if you are planning to send a parcel to
someone; the parcel will travel through different offices, change routes if roadblocks
are detected and finally be delivered to the recipient. Similarly when you browse the
internet or send an email, packets take different routes (from your computer to your
ISP,fromyourISPtothenextISP,etc.)untilitreachesitsdestination.
Alsoreferredtoasaresidentialgateway,SOHO(SmallOfficeHomeOffice)routersare
devicesdesignedforuseinsmalltomediumsizednetworks.MostSOHOroutershave
combinations of a switch, DSL or cable modem and an access point for Wi-Fi
connectivity.Thesedevicesareusedfortwoprimarypurposes:
Connectingdesktops&laptopsacrosshomeoroffice.
Router
Routing
SOHORouter
o
SOHO Router Enterprise Router
29. InformationTechnologyLevel-2
18
SharingasingleInternetconnectionacrossdesktops&laptops.
Some models include support for connecting peripherals such as printers, USB hard
diskdrives,etc.throughUSBports.
Wireless network refers to a computer network that is not connected by any cables.
Typically Wireless networking is used where wired connectivity is not possible or
feasible due to technology costs or availability. Wireless telecommunications
networks are implemented and administered using a transmission system called
radio waves. This implementation takes place at the physical level (layer) of the OSI
modelnetworkstructure.
Wireless personal area network (WPANs) interconnect devices within a
relatively small area usually within a person's reach. For example, usage of
Bluetoothtoconnectamobilephonetoalaptop.
Wireless metropolitan area network (WMANs) is a wireless network that
connects several wireless LANs. WiMAX is a type of Wireless MAN and is
describedbytheIEEE802.16standard.
Wireless wide area network (WWANs) is a wireless network that covers large
areas, such as one between neighboring towns and cities, or city and its suburbs.
This network can connect branch offices of business or function as a public
internet access system. The wireless connections between access points are
usually point to point microwave links using parabolic dishes on the 2.4 GHz
band, rather than Omnidirectional antennas used with smaller networks.
Omnidirectionalantennasaretypesofantennathatradiatesradiowavesequally
in all directions. Omnidirectional antennas oriented vertically are widely used
fornondirectionalantennasastheyradiateequallyinallhorizontaldirections.
Note: Though there are a variety of Wireless Networks, this course focuses only on
WirelessLAN.
Instant messaging (IM) is a form of communication over the Internet that offers an
o
o
o
o
WirelessNetworking
InstantMessaging
IntroductiontoWirelessNetworking,RFCommunication
Typesofwirelessnetworks
30. InformationTechnologyLevel-2
19
instantaneous transmission of text-based messages from sender to receiver. Most
instant messaging software include the option for performing file transfers,
audio chat, video calling and conferencing, sharing desktops, etc. apart from
standard text chat. Instant messaging software is widely used for personal and
commercial use. In this session, you will be introduced to the concept of instant
messaging, the steps to create an instant messaging account and also work with
instantmessagingsoftware.
Unlike email, instant messaging happens in real-time and the response from
participants can be spontaneous. Some instant messaging software allows users to
view messages received when they are not logged on. These are called "Offline
Messages".
For utilizing audio and video chat or conferencing, you need to have
microphonesandheadsetsorspeakersandwebcamerassothatuserscantalkorsee
eachother.
Keyfeaturesofaninstantmessagingareasfollows:
TextMessagescanbesenttooneormoreperson(SimilartoSMS)
Audiocallingandconferencing.
Videocallingandconferencing.
File transfers (Not limited to documents, spread sheets, audio files, video
files,etc.)
Messagehistory(Savemessagesforfuturereference).
Participants messaging to each other need to be signed in to the same instant
messaging software. To use instant messaging software, a user must have a
validinstantmessagingaccount.
Instantmessagingaccountsdifferinformats;some instantmessagingsoftwaresuch
as Yahoo Messenger, Windows Live Messenger use email addresses for managing
theaccountandsoftwaresuchasSkypeusestandardnames.
There are two kinds of instant messaging software - application based and Web
based.
o
o
o
o
o
InstantMessagingAccount
InstantMessagingServices
31. InformationTechnologyLevel-2
20
Application based instant messaging software is downloaded and installed on
user'scomputer.Someofthepopularinstantmessagingsoftwareare:
GoogleTalk
Yahoo!Messenger
Skype
WindowsLiveMessenger
RediffBol,etc.
Web based instant messaging software is accessed using browsers such as
Internet Explorer, Mozilla Firefox, Google Chrome, etc. Some of the popular web
basedinstantmessagingsoftwareare:
Meebo
Yahoo!MessengerfortheWeb
MSNWebMessenger
IMO,etc.
In this exercise, you will learn to create an instant messaging account for using
GoogleTalk.
Google Talk is an instant messaging service that provides both text and voice
communication developed by Google Inc. Google Talk can also be used for
makingvideocallsandtoviewupdatesfromGmailmailbox.
Google Talk is free and is available as application based (users need to
download and install Google Talk application to their desktops, mobiles or
laptops) and web based (users can use Google Talk through a browser after
signingintotheirGmailaccount).
Before you start using Google Talk, a Gmail account is required. You have
learned how to create a Gmail account earlier. In this exercise, you will learn how to
useGoogleTalk.
Note: You need to download and install Google Talk application from
www.google.com/talk priortothisexercise.
o
o
?
?
?
?
?
?
?
?
?
Creatinganinstantmessagingaccount
32. InformationTechnologyLevel-2
21
To launch Google Talk, Click Start >
Programs >GoogleTalk>GoogleTalk.
You can also double-click on the Google Talk
icononthedesktopifavailable.
You need to have a list of contacts that are available
for chat. If you don't have any contacts, you can add
their Gmail account to your contact list by sending
aninvite.
Ifyoudon'thaveaGmailaccountalreadyyoucancreateanewGmailaccount.
TouseGoogleTalk,youneedtosigninwithyouraccountdetails.
AftersigninginintoyourGoogleTalkaccount,youshouldseeawindowsimilartothe
onedisplayedbelow.NowtheGoogleTalkapplicationisreadyforuse.
There are two major types of network Local Area Network (LAN) and Wide Area
Network(WAN).
A local area network (LAN) is one which connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office
building,orcloselypositionedgroupofbuildings.
LaunchingGoogleTalk
SigninginintoyourGoogleTalkAccount
LocalAreaNetwork
o
o
Typesofnetworks
33. InformationTechnologyLevel-2
22
Usually local area networks offer very high speeds and are used for connecting
computersandperipheralssuchasprinters,scanners,etc.
A wide area network (WAN) is one which covers a broad area (i.e., any network that
links across metropolitan, regional, or national boundaries). The Internet is the
most popular WAN, and is used by businesses, governments, non-profit
organizations,individualconsumers,artists,entertainers,andmanyothers.
Online shopping is a form of electronic commerce where customers can buy or sell
goods over the Internet. Customers need to have an active internet connection
for viewing goods or services offered by a seller; customers can pay online using a
credit,debitcard.
Onlineshoppingcouldbeusefulinsituationswhen:
Acustomerdoesnothavesufficienttimetovisitstores.
Visitingastoreismoreexpensivethanpurchasingaproductonline.
A product or service that is not available in the local market is available
online.
Someofthepopularonlinetransactionwebsitesare:
IRCTC,anonlineportalforbookingflightandtraintickets.
Flipkart,anonlineshoppingportalforbuyingconsumerproducts.
EBay,anonlineportalforbuyingandsellinggoods.
Redbus,anonlineportalforbookingbustickets.
Toperformanonlinetransaction,allyouneedisawebbrowserandanactiveinternet
connection. In some cases where purchasing is involved, you will need a valid credit
card, debit card or online banking support referred to as Net Banking Subscription.
Some websites even allow COD (Cash on delivery) where the users can pay once they
receivetheproductorservice.
WideAreaNetwork
OnlineTransactions
o
o
o
o
o
o
o
34. InformationTechnologyLevel-2
23
Digital Documentation
Advanced Word Processing
You have already learnt the basics of word processing. Now consider a situation when you
write a lengthy article that spans several pages, and you need to make it easier for the
readerstoreadit?Lookatthefollowingexample:
What is Culture and Gender Sensitization? Culture in simple terms refers to our values,
the way we speak, behave, think, dress, religious beliefs, the music we like, our
interactions, and the food we eat. Diversity is a commitment to recognizing and
appreciating the variety of characteristics that make individuals unique in an
atmosphere that promotes and celebrates individual and collective achievement.
Manypeoplemistakenlyusesuchphrasesas"Indianculture,""white/blackculture,"or
"Western/Eastern culture," to describe a particular culture but these people fail to
acknowledge the presence of cultural diversity, or the presence of multiple cultures
and cultural differences within a society. In reality, many different cultural groups
exist today in India and most developing and developed countries. Diversity in the
workforce means employing people without discrimination on the basis of gender, age
andethnicorracialbackground.Sinceglobalizationisthecurrentoverwhelmingtrend
in business, diversity in the workplace is a better accepted and applied concept now
more than ever. There are different kinds of diversity that one encounters at the
workplace.Theseincludediversityofgender,age,psychology,education,languageand
culture.
Isthecontentpresentedaboveeasytoread?Now, look at theformattedsamplebelow:
Whatiscultureandgendersensitization?
Culture in simple terms refers to our values, the way we speak, behave, think, dress,
religious beliefs, the music we like, our interactions, and the food we eat. Diversity is a
commitment to recognizing and appreciating the variety of characteristics that make
individuals unique in an atmosphere that promotes and celebrates individual and
collectiveachievement.
2Unit -
35. InformationTechnologyLevel-2
24
Manypeoplemistakenlyusesuchphrasesas"Indianculture,""white/blackculture,"or
"Western/Eastern culture," to describe a particular culture but these people fail to
acknowledge the presence of cultural diversity, or the presence of multiple
cultures and cultural differences within a society. In reality, many different cultural
groupsexisttodayinIndiaandmostdevelopinganddevelopedcountries.
Diversity in the workforce means employing people without discrimination on the
basis of gender, age and ethnic or racial background. Since globalization is the current
overwhelming trend in business, diversity in the workplace is a better accepted and
applied concept now more than ever. There are different kinds of diversity that one
encounters at the workplace. These include diversity of gender, age, psychology,
education,languageandculture.
Usingparagraphsyoucanbreakcontinuoustexttooneormoresentences.Thisway,itislot
easier for the readers to understand and enjoy the content. In this exercise, you will learn
toworkwithparagraphsandlayouts.
Haveyoutriedtomakeaprofessionallookingresume?Oneimportantpartofworkingwith
a resume involves alignment. For the sake of both professional appearance and
accessibility, it is conventional for similar parts of a resume to all line up along the same
vertical axis. So that all the bullet points are aligned, and so are the headers, and sections.
Youmaycomeacrosssituationswheresomebulletpointsdon'tlineup,orwhere thereare
manyemptyspaces thatcomplicateeditingand revising.Sonowwhatdoyoudo?
1. Openanewdocumentinwordprocessor.ClickonthePageLayouttabontheRibbon.
2. ClickontheiconunderParagraphgroup,asshownbelow.
3. The Paragraph dialog box appears. You can see the options for automatic alignment,
spacing, etc. that you can setup while composing the document itself instead of doing
thealignmenttowardstheend.
Page Layout
36. InformationTechnologyLevel-2
25
4. ClickonTabs...button,Tabsdialogboxappears.
5. You can specify the tab stop position by mentioning the stopping position in the Tab
stop position box. After specifying the tab stop position click on Set button and the
Tabswindowappears.
Note:Youcanalsothesettheinitialtabstoppositionvaluefromthedefaultvalue (0.5")
by specifying the new value under Default tab stops. You may specify the value at
whichthetabstopsbygivingthevaluespecifiedalongwiththeunit(like7cm,etc.)
6. Click OK. The ruler of the document will be marked with a L shaped symbol at 2",
meaningthatthetabstoppositionhasbeensetatthatposition.Nowwhenyou press
the tab key, the cursor will automatically jump from its initial position to the next tab
stopposition. Andthissolvesyourproblemtoo!
Note: You can also set the tab stop position by clicking at the required point on the
ruler. Now open a new document, type some text and press Enter. Notice that the
continuous text is automatically formatted as paragraphs, with the size that you have
specifiedintheTabsDialogbox.
Headers are text or images included at the top of the page. They usually contain important
information such as company or department name, logo, page numbers, name of the
author,etc.separatedfromtheworkoractualdocumentarea.
Lookatthefollowingexample:
ManagingHeaders
37. InformationTechnologyLevel-2
26
Notice the header in the above document; the title "Application From, June 2012" will be
includedonallpagesofthisdocument.Inthisexercise,youwilllearntoincludeaheaderto
adocument.
Tounderstandandworkwithheaders,openanewdocumentinwordprocessor
1. ClickontheInserttabontheRibbon.
2. ClickontheoptionHeaderintheHeader&Footergroup,asshownbelow.
3. Adropdownlistappearswhichlistspredefinedheaderoptions(Figurebelow).
Nowtryinsertinganyofthepredefinedoptionsfromthelistandobservethechanges
attheheaderareaofthedocument.
You can insert the page number at any position within the header area by selecting
the alignment option under Page Number. You can also change the number format
for page numbers by clicking Format Page Numbers... under Page Number options.
ThePageNumberFormatdialogboxappearsasshownbelow.
Insert Header
38. InformationTechnologyLevel-2
27
You can insert date and time by clicking the Date & Time option available under
InsertGroup.Youcanchoosethedateandtimeformatfromtheavailableformats.
You can also insert a picture or clipart within the header. This option can be useful in
situations when you need to insert company's or an event's logo. Try inserting a
pictureoraclipartintotheheaderusingthePictureandClipArtoptionunderInsert
Group;observethechangesmadetothedocument.
Footers are text or image included at the bottom of the page and may repeat in all pages of
thedocument.Theprocedureforcreatingafooterissimilartothatofheaders.
For example, if you wanted to create a text book, you can include the name of the text book
usingtheheadersandthepagenumbersusingthefooteroption.Thismakesthedocument
lookneatandorganized.
Toinsertfootertoadocument,openanewdocumentinWordprocessor
1. ClickontheInserttabontheRibbon.
2. ClickontheoptionFooterintheHeader&Footergroup,asshownbelow.
ManagingFooters
Insert Footer
39. InformationTechnologyLevel-2
28
3. AdropdownlistappearswhichlistscollectionofpredefinedFooteroptions.
Now try inserting date and time, page numbers, pictures and clip arts in the footer
areaandobservethechanges.
Styles or Style sets are pre-defined or customized options used for creating good
looking professional documents with least efforts. You can find a number of styles
available within word processor that can be applied to a document. In this exercise, you
willlearntoapplyandmanagestyles.
Toworkwithstyles,openanewworddocumentinwordprocessor,
1. Toviewlistofstyles,locatetheStylegroupunderHometab(Figurebelow)
2. If youwould like to view the list of style sets available, point to Style Setunder
Change Styles option. A drop-down with different styles will be displayed (Figure
below).
Select any of the styles listed by clicking it. The entire document will change to the
specifiedfontorcolorautomatically.
ManagingStyles
40. InformationTechnologyLevel-2
29
DocumentTemplate
Templates or document templates refer to a sample fill-in-the-blank document that
can help in saving time. Usually templates are customized documents that may have
sample content, themes, etc. For example, if you want to create a resume you can use a
resumetemplateandmodifyonlythesectionsthatrequirechanges.
Inthisexercise,youwilllearntoworkwithdocumenttemplates.
Toviewsampletemplatesavailablewithyourwordprocessor,
1. Go to File > New. You willbe displayed with different types of templates(Figure
below). For example, if you would like to create a letter, you can select the Letters
optionunderOffice.comTemplatessection.
Suppose you need to create certificates for a recently held competition, you can select the
Certificatesoption.YouwillbedisplayedwithalistofCertificatetemplates.
Nowselectanyofthetemplatesbydouble-clickingonit.
A sample certificate window similar to the one below appears. Now you can use this
template and customize the contents by replacing the school name, student name,
etc.
You can also download other types of templates from websites. Some of the websites that
offerfreetemplatesare:
office.microsoft.com/templates
www.thepapermillstore.com
openoffice.blogs.com/openoffice/templates/
www.docstoc.com
You can visit the above mentioned websites to search, download and use a template that
suitsyourneeds.
Creating a new document based on a template can save you time and effort because all the
work it takes to design the document has already been done. You may use the templates
that come with word processing software, or downloading templates created by
other people, or you can also create and save your own templates forfutureuse.First
ofall,youneedtocreateadocumentthatwillserveasthetemplate.
Note: You create the template as a normal document, but the magic step is where you save it.
Click on File >Save As, and give the template a name. Select Word Template from the Save
astype:dropdownlist.
o
o
o
o
41. InformationTechnologyLevel-2
30
Notice that there is a Templates folder within Microsoft Word. If you save your template
there,thenwe'llbeabletoseethetemplateintheMytemplatescategory.Soselectthatand
clickSave.
Now to use the template, click on the File > New. Go to My templates, and as you scroll
down, you will find the file {your name}_Invoice , the template you just created. Select that
andclickOK.
Notice that this is a new document and it's not the template. So, we've just created a new
document based on one of your own templates. Now when you save this document, it gets
savedasanormal.docxfile.
PageandSectionbreakscanbeusedtoseparateadocumentintosections.
If you would like to start a new page in a document,
youcanuseapagebreak.
To separate a section in a document, you can use the
section break. For example, you can lay out part of
a single-column page as two columns. You can
separate the chapters as separate sections in your
document so that the page numbering for each
chapter begins at 1. You can also create a different
header or footer for a section of your document.
For example, if you are creating a textbook and you
can create different sections for digital literacy,
wordprocessing,spreadsheets,etc.
To work with breaks, open a new document in the
word processor and type some contents. If you need
another fresh page, choose the page break option in
thePageLayouttab.
a) ClickonthePageLayouttabontheRibbon.
b) ClickontheoptionBreaksinthePageSetupgroup(Figurebelow).
c) A dropdown list with options for different types of breaks appears. An explanation is
givenforeachtypeofpageorsectionbreak.
WorkingwithPageandSectionBreaks
42. InformationTechnologyLevel-2
31
A page break can be inserted anywhere in a document to force the end of a page and the
beginningofanewone.
Tocreateanewpage,youcankeeppressingenterandthecursormovesfromlinetolinetill
a new page starts. But if you add content to the previous page, the content of the new page
willautomaticallyshift!
Toavoidsuchproblems,thereisaneasiermethod-useapagebreakandstartafreshpage!
Youmayalsouseapagebreakwhenyouwanttobesurethatanewchapterorsub-heading
automaticallystartsatthetopofitsownpage.
Section breaks add flexibility to formatting your document. Using them, you can create
different headers and footers, different footnote numbering, change the layout of
columns, change page borders for different pages, and even change page layouts in the
same document! Using section breaks is like having mini-documents in one large
document.
A section break controls the formatting of the document content that precedes it, until it
reachesanothersectionbreak.Forexample,ifyouhavea10pagedocument,withasection
breaks on page 3 and on page 8, the section break on page 3 controls the formatting of
pages 1, 2, and 3 while the section break on page 8 controls the formatting for pages
4to8.
You need to be able to see where your section breaks or page breaks are inserted in order
to see where the formatting stops and ends or to delete them. To see a section/page break,
click the Show/Hide button on the Home tab in the Paragraph section. The section/page
breaksaredisplayedinyourdocument.
1. Clickonthesection/pagebreak.
2. PressDeleteonyourkeyboardandthesection/pagebreakisremoved.
Anytime you need to add a page border to a single page or have a table in Landscape
orientation with the rest of the document in Portrait orientation, try using section breaks
tomakethetaskeasier!
If you are creating a textbook with scientific content, you need to use special
formatting for some characters. Character formatting can be applied to a single
characterorword.
Inthissession,youwilllearntoperformcharacterformatting.
ApplyingCharacterFormats
43. InformationTechnologyLevel-2
32
A
A
abc
WorkingwithcharacterFormatting
Toworkwithcharacterformatting,
a. Openanewdocumentinwordprocessorandtypethefollowingparagraph:
Water is a chemical substance with the chemical formula H O. A water molecule2
contains one oxygen and two hydrogen atoms connected by covalent bonds.
Water is a liquid at ambient conditions, but it often co-exists on Earth with its
solidstate,ice,andgaseous state (water vapororsteam). Water also exists in a
3
liquidcrystalstatenearhydrophilicsurfaces.Thedensityofwateris1,000kg/m .
Now to make changes, you may need to format the characters as shown below. You
willnoticethatsomewordsofthisparagraphareinbold,someareinItalics,someare
underlined, some are in colour and some are changed in its position
(superscript&subscript).
b. In order to apply formatting to the contents in the document you must select the
concernedwordorgroupofwords.
Usethefollowingoptionstomakechangestoacharacterorword:
Font Face: After selecting the text you need to click Font Name in the Font group to
selecttheparticularfontstylefromthefontslisted.
Font Size: After selecting the text you need to click Font Size in the Font group
toselecttheparticularfontsizefromthevaluesgiven.
Water is a chemical substance with the chemical formula H O. A water molecule2
contains one oxygen and two hydrogen atoms connected by covalent bonds.
Waterisaliquidatambientconditions,butitoftenco-existsonEarthwithitssolid
state, ice, and gaseous state (water vapor or steam). WATER also exists in a liquid
3
crystalstatenearhydrophilicsurfaces.Thedensityofwateris1,000kg/m .
GrowFont:Afterselectingthetextyouneedtoclickthe iconintheFontgroupto
makethefontsizelargerthanthecurrentfontsizebythespecifiedpoint.
ShrinkFont: After selecting the text you need to click the icon in the Font group
tomakethefontsizesmallerthanthecurrentfontsizebythespecifiedpoint.
Strikethrough: After selecting the text you need to click the icon in the Font
grouptomakeastrikethroughthemiddleoftheselectedtext.
Subscript: After selecting the text you need to click the icon in the Font group to
maketheselectedtextlowerthanthenormaltextposition.
X2
44. InformationTechnologyLevel-2
33
Superscript:Afterselectingthetextyouneedtoclickthe iconintheFontgroup
tomaketheselectedtexthigherthanthenormaltextposition.
ClearFormatting:ClearFormattingisusedtoclearthecharacterformatting(suchas
Bold, Italics ,Underline, font face & size, superscript & subscript etc.) of the selected
text. To remove the character formatting, select the text and click on icon in the
Fontgroup.
Text Highlight Colour: Use this option to change the background colour. To do
so, select the text and click on icon in the Font group. You can choose the
backgroundcolourbyclickingonthedownarrowontheicon.
Font Colour: Use this option to change the colour of the text. To do so, select the text
and click on icon in the Font group. You can choose the text colour by clicking on
thedownarrowontheicon.
Change Case: Word processor helps us to change the text case to capital letters or
small letters. You can also capitalize each word in the sentence and capitalize the
starting word of the sentence using Change Case under Font Group. To do so, after
selectingthetextyouneedtoclickthe iconintheFontgroup
Sentence Case: On selecting this option from the dropdown list, the first character in
the first word of the selected sentence will be converted to Capital Letter
(Uppercase).
Lowercase: On selecting this option from the dropdown list, the selected text will be
convertedtoSmallLetters(Lowercase).
Uppercase: On selecting this option from the dropdown list, the selected text will be
convertedtoCapitalLetters(UPPERCASE).
Capitalize Each Word: On selecting this option from the dropdown list, the
first character in all the words of the selected sentence will be converted to Capital
Letter(Uppercase).
Toggle Case: On selecting this option from the dropdown list, the small letters in the
selected text will be converted into capital letters and capital letters will be
convertedintosmallletters.
Often when you write a technical report, or a newsletter or even letter to friends, including
someformofgraphicsmakesthedocumentmoreinteresting!
InsertGraphicalObjectsandIllustrations
2
X
Aa
ab
A
Aa
45. InformationTechnologyLevel-2
34
In a technical report, you may want to incorporate a graph of corporate performance or a
technical illustration. While in a newsletter or letter to family and friends, you enjoy
sharing memorable events that are represented by photos or maybe even cartoons. The
facility to blend these graphics into the document is part of the charm and power of every
majorwordprocessingprogram.
But not only can we blend graphic images into our message, but Word, WordPerfect and
OpenOffice also allow us to blend in other special features. These features are generally
known as "objects". These objects can be almost any form that can begenerated as a
computer file. Sounds, Music, drawings, documents spreadsheets, etc. are all examples of
possibleobjectsthatyoucanincludeinadocument,orlinktoadocument.
Note: Embedding an object makes it part of the document while linking an object does not
include the object file into the document files. Readers trying to access the linked object must
also have direct access to the separate file that forms that object. That may mean they have
to have access to your hard drive in order to see the linkedobject.
Most Word processors has support for inserting illustrations in the form of Clip Arts,
Shapes,pictures,charts,etc.
Clip Art can help in making a document look colourful and presentable. Clip arts are pre-
defined images available for use in documents. For example, if you would like to create a
greeting card for your friend, you can use clip arts such as balloon, flowers, etc. along with
textmessage.
You can use the clip art gallery built-in within the word processor; you can also
downloadclipartfromwebsites.Someofthewebsitesthathavefreeclipartsare:
www.openclipart.org
www.pdclipart.org
www.clker.com
www.freeclipartnow.com
www.wpclipart.com
Inthisexercise,youwilllearntouseClipArts.
Toinsertaclipartinadocument,
a) Openanewdocumentinwordprocessor
1. ClickontheInserttabontheRibbon.
2. ClickontheoptionClipArtintheIllustrationsgroup(Figurebelow).
o
o
o
o
o
46. InformationTechnologyLevel-2
35
Clipart search results for “School bag”
3. TheClipArtTaskPaneappears.Entertheclipartcategorynameinthesearchbox
and ClickGo.Forexample,ifyouwanttoinsertalogo,typelogointhesearchbox
andClick"Go".
4. Once you click Go (Figure 17), a window appears along with list of clip arts
matchingthesearchkeyword(Figure18).
Select the clipart that you want to use, double-click on it and it will be inserted into
your document. Sometimes, you may need clip arts that may not be available within
the word processor application. In such cases, you can visit websites that offer
clipartssuchasOpenClipart.org.
Now,youwilllearntodownloadaclipartfromawebsiteanduseitinyourdocument.
b) Todownloadaclipartfromwww.openclipart.org
1. Open the web browser, Type www.openclipart.org in the address bar and press
Enter
You can use the search box available on the website for viewing the list of clip arts to
suityourneeds.Forexample,TypeSchoolBaginthesearchboxandClickSearchYou
will be displayed with list of clip arts matching the keyword School bag, similar to the
onebelow.
Insert Clip Art
47. InformationTechnologyLevel-2
36
Nowyoucanselect theclipartyou like,download it toyourcomputerand insert it
usingthephotooptioninthewordprocessor.
You have learnt to insert graphics and illustrations in the last exercise. How do you want
the text to fit to the picture? Do you want a graphics to stand alone with text above it and
belowit?Doyouwantthetexttobealongonesideofthegraphics?Doyouwanttohavethe
text message split so that part of the text is on the left side and then continue on the right
sideofthegraphics?Doyouwantthetexttorunrightacrossthegraphics?Alltheseoptions
arepossibledependingonthetextwrapoptionsyouchoose.
What if the graphic image is too large, or too small? This is a problem you may face
when placing graphic images into a document. In all word processing software, if you
selecttheimage(leftmouseclickonit)controlhandleswillappearonthesidesandon the
corners of the graphics. When you place your mouse on these handles, the cursor
changes to a double headed arrow and you can click and drag the handle in or out to
decrease or increase the size of the picture. In this exercise, you will learn to use text
wrapping.
Openanewworddocumentandtypethefollowing:
Apache OpenOffice Writer is the word processor component of the OpenOffice
package. It is free and is available for a variety of Operating Systems including
Windows, Linux,FreeBSDandSolaris.Itiscapableofopeningandsavingdocumentsin
avarietyofformats.
You can either include a screenshot of the OpenOffice Writer or search for a picture in your
computer.
To take a screen shot, simultaneously press <Shift> and <Print Screen> keys. Place the
cursorontherightofthetextandsimultaneouslypress<Ctrl>and<V>keys.
To search for a picture, place the cursor before the text, click Insert Tab, and click
PictureunderIllustrations.BrowseforthepictureandclickInsert.
Once you have inserted the picture, you can wrap the text by using the Wrap Text
option under Text section of the Insert Tab after double-clicking on the picture
(Figure below). If you are working on Word, select the picture then select the
TextWrapping dropdown arrow in the Arrange group under theFormattab.
TextWrapping
o
48. InformationTechnologyLevel-2
37
Now tryselecting differentWrapTextoptions suchas Square,Tight,Through,etc.
and observe the changes made to the wrapping. A screen shot when the Square
optionwasusedisshownbelow:
In addition to graphic images, to add a personal touch to a special message or to
illustrate a special feature, you may want to embed sound files or maybe even actual files
from other software applications in your document. For example, you can insert a PDF file
oraspreadsheetwithinthewordprocessor.
Inthisexercise,youwilllearnaboutinsertingobjectsinadocument.
Toinsertanobject,
Openanewworddocument
SelectInsertTab
Click Object under Text section. A dialog box will be displayed, as shown in
figure23.
SelectCreatefromFileTab
Click Browse and select a file such as a spread sheet or a PDF document that is
availableonyourcomputer,ClickOpenandClickOK
Noticethedocumentisavailableembeddedwithinyourworddocument.
Note: If you would like to edit the embedded document, double-click on it. It will
automaticallyopenitforeditingusingrespectiveapplication.
InsertingObjects
o
o
o
o
o
o
49. InformationTechnologyLevel-2
38
Nowtryinsertingdifferenttypesofdocumentusingtheprocedurementionedabove.
Note:
1. Theembeddedobjectscannotbeprinted.
2. The person opening your document must have the relevant software loaded on
theircomputertooperatetheembeddedfile.
3. Ifyouembedanobject,thesizeofyourdocumentincreasessignificantlyandthismay
causeproblemsinemailingthedocumentasanattachment.
4. If you link an object, the person opening that document must have a direct
connectiontotheoriginalfilelocationoftheobject.
You can insert objects that have different shapes such as lines, basic geometric shapes,
arrows, equation shapes, flowchart shapes, stars, banners, and callouts using the shape
option.
Inthisexercise,youwilllearntoworkwithshapesinaworddocument.
Toworkwithshapes,openanewdocumentinwordprocessor,
1. ClickontheInserttabontheRibbon.
2. ClickontheoptionShapesintheIllustrationsgroup,asshowninfigure24.
3. OnceyouclicktheShapesoptionadropdown listwithpre-definedshapesuchasbox,
circle,etc.appears.
4. You can select the shape from the list of shapes available and draw the shape by
dragging the mouse with the left button clicked. For example, if would like to insert a
square, select the box shaped item from the list, click and drag the shape to draw a
square.
InsertShapes,SymbolsandSpecialCharacters
Insert Shapes
50. InformationTechnologyLevel-2
39
Now try inserting other shapes from the list available and work with them by changing
colorsoraddingcontentinsidethem.
In some cases, you may need to insert special characters or symbols in documents such as
currencysignofadifferentcountry,copyrightortrademark symbols,etc. In thisexercise,
youwilllearntoinsertsymbolsorspecialcharacters.
Toworkwithsymbolsorspecialcharacters,openanewdocumentinwordprocessor.
1. ClickontheInserttabontheRibbon.
2. ClickontheoptionSymbolintheSymbolsgroup,asshowninfigure25.
3. Adropdownlistappears(figure26).
Select a symbol from the list and double-click on to insert the symbol into the
document.
If you would like to view more symbols and special characters for inserting
into adocument,clickontheMoreSymbolsoptionintheSymbolsDropdownlist.
Insert Symbol
51. InformationTechnologyLevel-2
40
Digital Data Analysis -
Advanced Operations on Spreadsheet
UseAutosuminCells
You have learnt to navigate in a spreadsheet, populate cells, and perform calculations. As
you know, a spread sheet offers various mathematical functions to perform the
calculations.Sumisoneofthefunctionsavailableinthespread sheet to performaddition
of selected numbers in the sheet. In this exercise, you will learn how to use autosum
functiontoperformadditioninaspreadsheet.
Autosum is used for adding the values given in cells automatically without writing the
formulatoperformtheoperation.
Openanewspreadsheetandenterthefollowingdata.
Nowtototalthemarksofeachofthestudents,dothefollowing:
Go to cell G2. While the cell G2 is selected, click on the AutoSum option available
underEditingGroupintheHometab.
o
AutoSum
3Unit -
52. InformationTechnologyLevel-2
41
o
o
Thevaluesinthecellsfromc2 tof2willbeautomaticallyselectedasshownbelow.
PressEnter.
ThetotalmarksofAbhasappearsincellG3.
Similarly,calculatethetotalmarksoftherestofthestudents.
Note: Autosum automatically selects the values around the cells either horizontally or
vertically. In the above example you want to perform addition of numbers listed from
left to right, after finding the total of two persons when you try to perform autosum for
anotherpersonthevaluesontopofthecurrentcellgetselected.Inthatcase,youhaveto
selectthecellvaluesthatyouwanttoperformaddition.
Now change the marks ofone ofthe students in one ormore subjects. Thetotal marks
of that student will get calculated automatically. Automatic calculation of formulas is
oneofthemostpowerfulfeaturesofelectronicspreadsheets.
Conditional formatting allows you to change the formatting (font color, border,
shading)of thecellsbasedonthevaluesin it.Yes,youcandothat manually,but itcanbea
tiresome task if you have a huge amount of data. So, you specify a condition for the values
?
?
ConditionalFormatting
53. InformationTechnologyLevel-2
42
in the cell, and if the condition is satisfied then automatically the formatting of the
cell changes. This feature would be very useful if you were working on a profit and loss
spreadsheet, or a temperature variance spreadsheet, or a marksheet. You could
highlightcellsthathavevaluesaregreaterthanadefinedrulewithonecolorandthoseless
thananotherwithadifferentcolor.
Basically, you can select one or more cells, and create rules (conditions) for when and how
those cells are formatted. The conditions can be, based on the selected cell's
contents,orbasedonthecontentsofanothercell.
Youcancontrolthefollowingformats:
Numberformat
Font,fontstyle,andfontcolour(butnotfontsize)
Fillcolourandfillpattern
Bordercolourandborderstyle(butnotborderthickness)
Openanewspreadsheetandenterthefollowingdata.
Nowtoapplyconditionalformattingforthedatadothefollowing.
Selectallthecellsyouwanttoformatconditionally.
o
o
o
o
o
54. InformationTechnologyLevel-2
43
Nowtoapplyconditionalformattingforthedatadothefollowing.
Selectallthecellsyouwanttoformatconditionally.
Click on Conditional Formatting option available under Styles group in the Home
tab.Adropdownlistappears.
ClickonHighlightCellsRulesoption,asubmenuappears.
Note: you can select the condition listed according to your needs. In this example
if you want to highlight the values that are greater than 75, select "Greater
Than..."availableunderthesubmenu.Adialogboxappears.
Specify the value in the box and click on the down arrow next to the with field and
select a predefined format for the condition from the drop down list. If you want to
highlight the cell contents with your own formatting style click Custom Format
optioninthedropdownlist.
A Format Cells dialog box appears. You can select a different font color under Font
tab,borderstyleandcolorunderBordertabandfillcolorunderFilltab.
Goaheadandcreatethedatabelowandformatitinthemannerdisplayed.
Note: Similarly you can set various conditions for the selected value like less than,
equalto,betweenetc.
o
o
o
o
o
o
55. InformationTechnologyLevel-2
44
Optionally, you can also specify the cell address where the value is stored. This can be very
helpful as simply changing the value in one place can change the conditional
formatting all over the previously selected range. An example is shown in the figure
below.
Theresultisdisplayedbelow.
Sometimes you have data in rows and columns which are needed for formulas or
charts, but you do not want the data to be visible. A very handy feature of a
spreadsheet is the ability to hide a row/column that is not to be shown to the end
user. The data in hidden row/column is available for calculations though not visible!
Freezing rows and columns is another helpful feature in a spreadsheet. When you are
dealing with a huge amount of data that spans several rows or columns, you may want the
headers to remain constant (frozen) while you scroll through the data so that you can see
theidentifyingnamesoftherows/columns.
Hide/Unhide/FreezeRowsandColumns
56. InformationTechnologyLevel-2
45
Openanewspreadsheet.Tohidearoworcolumn,dothefollowing:
In order to hide any row or column you can either select the particular row or column
that is to hidden or just one cell in the corresponding row or column (for example
B3).
ClickonFormatoptionavailableunderCellsgroupintheHometab.
Adropdownlistappearsasshownbelow.
Click on Hide & Unhide > Hide Rows. The spread sheet will be displayed as shown
below.
Note:Alternatively,youcanselecttherow/column,rightclickandselectHide.
Note: In this example the cell in the 3rd row of the spread sheet was selected and then Hide
Rows option was selected. So, the 3rd row is hidden. What would have happened if you had
selectedHideColumnsinstead?
In orderto unhide the row or column that is hiddenyou have to selectany cellsbefore
and after the cell that is hidden then click Unhide Rows in the Format option
availableunderHometab.
Tofreezetherowsorcolumnsdothefollowing.
Openanewspreadsheet.
In order to freeze rows or columns click on Freeze Panes option available
underWindowgroupinViewtab.
A drop down list appears as shown below. Click on Freeze Panes. Doing so will
freezealltherowsaboveandallthecolumnstotheleftoftheselectedcell.Scrollyour
mouseinthespreadsheetthefrozenrowsandcolumnsremainconstant.
Note: The panes are formed where your cursor is placed. Select the option again and notice
the change in the available options! Go ahead and try the other options too. You can also
freeze the entire row or column by selecting the entire row or column and click "Freeze
Panes"tofreezetheentireroworcolumn.
To print a worksheet with the exact number of pages that you want, you can adjust the
page breaks in the worksheet before printing it. This feature is very usefulespecially
when printing huge sheets. You can use the Page Break view to see how other
changes (e.g. changing rowheight/columnwidth) affect the automaticpagebreaks.
o
o
o
o
o
o
o
o
SetPageBreaks
57. InformationTechnologyLevel-2
46
In this exercise you will learn how to set page breaks in the spreadsheet. Open a new
spread sheet and create the sheet below. On the View tab, in the Workbook Views group,
clickPageBreakPreview.
Nowtosetthepagebreakdothefollowing.
To insert a vertical page break, select the row below where you want to insert the
page break. To insert a horizontal page break, select the column to the right of
whereyouwanttoinsertthepagebreak.
Click on Breaks down arrow under Page Setup group in the Page Layout tab. A
dropdownappearsasshownbelow.
Click on Insert Page Break option. The spread sheet will be displayed as shown
below.Thecontentyouhavetypedcomesinthefirstpageandyoucanprintit.
Tomoveapagebreak,simplydragthepagebreaktothedesiredlocation.
o
o
o
o
58. InformationTechnologyLevel-2
47
Note: You can also remove the page breaks by clicking the Remove Page Break option in
Breaksdropdownlist.
To return to Normal view after you finish working with the page breaks, click Normal in
theWorkbookViewsgroupundertheViewtab.
If you have a worksheet that contains a huge amount of data with many charts and you
want a professional looking printout, what would you do? Spread sheet software
provides various page layout options for organizing pages using the Page Layout option. In
this exercise, you will learn how to set the page layout options in the spread sheet
application.Openanewspreadsheet.
Tosetthepagelayoutoptions,dothefollowing:
Click on Page Layout option under Workbook Views group on View tab. The
spreadsheetwillbedisplayedasshownbelow.Youcansetthe
Margins
Orientation
Pageheadersandfooters
Hideordisplaygridlines
Sizeofthepage
Definetheprintarea
Specifythebackground
Click on Margins option under Page Setup group, a dropdown list appears as shown
infigure.
SetPageLayout
o
o
?
?
?
?
?
?
?
59. InformationTechnologyLevel-2
48
o
o
o
o
o
o
o
Youcaneitherselectanyoneofthepredefinedmarginoptionavailableorelseyoucan
defineyourownmarginsettingsbyclickingCustomMargins..option.
Adialogboxappears.
You can set the margin values manually from the options available under the dialog
box.
You can set the orientation of the page to either Portrait or Landscape by clicking the
Orientation option underPageSetup group in thePageLayout tab.
You can set the size of the page by clicking the Size option under Page Setup group in
thePageLayouttab.
You can specify the area to be printed by selecting the area and then clicking Print
Area option under Page Setup group in the Page Layout tab. A drop down list
appearsasshownbelow.
Click on Set Print Area to set the selected to get printed. You can also clear the print
areabyclickingtheClearPrintAreaoption.
You can specify a background for your sheet using the Background option under
PageSetupinthePageLayouttab.
60. InformationTechnologyLevel-2
49
ManageWorkbookViews
Spread sheet offers the users with variable views for the purpose of viewing the
outcomeofthesheetwhileprinting.
Therearefivetypesofviewsavailableinthespreadsheet.
Normal
PageLayout
PageBreakPreview
CustomViews
FullScreen
You can select one of the above said views by clicking the appropriate option under
WorkbookViewsintheViewtab.
Normal View: The default view of the spreadsheet application is the Normal. It's
acollectionofcellsarrangedintheworkarea.
Page Layout: You can select the Page Layout view in order to quickly fine tune a
worksheet that contains many charts or huge amounts of data and achieve professional
lookingresults.
Page Break Preview: This option is similar to the Page Layout option except you can set
theareathatistobesetasapageafterinsertingpagebreak.
Custom Views: If you would like to view selected areas of a document, you can use the
custom view option. For example, if you would like to point out certain row and column,
youcanaddthattotheCustomview.
FullScreen:Selectingthisoptionmakestheworkbookcovertheentirescreen.Alltabsare
hiddenfromview.Togetbackthetabs,clickonFile>Restore.
Additionally, in spreadsheet, you can open multiple windows that display the current
spreadsheet and then arrange those windows in a variety of ways. You can also open and
o
o
o
o
o
61. InformationTechnologyLevel-2
50
arrangemultipleworkbookwindows.
Toopenasecondinstanceofaworkbookinaseparatewindow:
ClicktheNewWindowbuttonontheViewtab,intheWindowgroup.
Toarrangemultipleprogramwindows:
Click Arrange All button in the Window group. An
ArrangeWindows dialogboxappears.
Click either Tiled, Horizontal, Vertical, or Cascade
options.
To include only windows displaying views of the current
workbook,selecttheWindowsofactiveworkbookcheck
box.
ClickOK.
You can assign names to cells in a worksheet and use it forquickly locating specificcells
by entering the names. This could be useful when working with large spreadsheets.
For example, if you have a lengthy list of groceries and prices, you can use names to
quickly locate and find total pricing of fruits from the entire list. In this exercise, you will
learntoworkwithcellandrangenames.
Openanewspreadsheetandenterthefollowing(figurebelow):
o
o
o
o
o
ApplyCellandRangeNames
62. InformationTechnologyLevel-2
51
Nowtoapplyrangenames,dothefollowing:
Select the cost against the cells that have Apple, Banana, Cherry, Grape, Guava,
Mango, Pineapple values (Keep the Ctrl key pressed and click on thecells - you
willbeabletoselectselectivecellstogether!).Rightclickandselect NameaRange….
Alternatively, you can select Define Name under Defines Names group in the
Formulastab.
ANewNamedialogboxappearspromptingtoenteraname.EnterFruitsintheName
fieldandclickOK(figurebelow).
Select the cost against the cells that have Cabbage, Cauliflower, Chilli, Cucumber,
Ginger, Potato, Pumpkin, Spinach, Tomato values. Right click define the name
Vegetablesforthisgroup.
Ifyouwouldliketocalculatethetotalcostoffruitsfromthelist,
Selectanemptycell
Type Total Cost of Fruits and in the adjacent cell, Type =SUM (Fruits) and press
Enter.
NoticethetotalcostofallitemsnamedasFruitsisdisplayed.
o
o
o
o
o
63. InformationTechnologyLevel-2
52
CreateModifyandFormatCharts
A chart is a graphical representation of data, in which the data is represented by symbols,
such as bars in a bar chart, lines in a line chart, or slices in a pie chart. A chart can represent
tabularnumericdata,functionsorsomekindsofqualitativestructures.
A Spread sheet enables you to create, modify and format charts based on the data given in
the spread sheet. In thisexercise youwill learnhow to create,modify andformatchart
usingthespreadsheet.
Reopentheworksheetexpenses_{yourname}.
Nowtocreatechartsdothefollowing.
Selectalltheexpensesdata.
ClickonthecharttypethatyouwantfromChartsgroupundertheInserttab.
Afterselectingthecharttypethespreadsheetwillbedisplayedasshownbelow.
o
o
o
64. InformationTechnologyLevel-2
53
oYoucanmodifythechartvaluesbymakingnecessarymodificationsinthedatatable.
Chart has many elements; however, only some of the elements are displayed by default.
Followingisandescriptionoftheelementsusedintheabovechart:
1. ChartAreaoftheChart
2. PlotAreaoftheChart
3. DataPointsthatareplottedinthechart
4. HorizontalandVerticalAxisinthechart
5. Legendofthechart
6. ChartandAxisTitleusedinthechart
7. DataLabelforidentifyingdetailsofdatapointinthechart
Note: Once you insert a chart in the spreadsheet three additional tabs are available on the
Ribbon namely Design, Layout and Format. You can edit the chart, its design, layout
and formatting options using the three tabs available. You can change the chart type, chart
options etc. in the Design tab and can give the titles etc. in the Layout tab and set the borders,
colorsandsizeoftheoptionunderFormattab.
65. InformationTechnologyLevel-2
54
Choosing the right type of chart is very important. Different charts display data in very
different ways. Using the best chart type and format helps you to display data visually in
themostmeaningfulway.
Bar charts: A bar chart (horizontal bars) emphasizes the comparison between items at a
fixed period of time. This chart type also includes cylinder, cone, and pyramid
subtypes.
Column charts: A column chart, unlike a bar chart to which it is often compared,
emphasizes variation over a period of time. This chart type also includes cylinder,
cone,andpyramidsubtypes
Line charts: A line chart shows the relationship of the changes in the data over a
periodoftime.
Pie charts: Pie charts contain just one chart data series. A pie chart shows the
relationshipofthepartstothewhole.
Areacharts:Anareachartshowstherelativeimportanceofvaluesovertime.
XY (Scatter) charts: Scatter charts are useful for showing a correlation among the data
pointsthatmaynotbeeasytoseefromdataalone.
Sort is a feature that helps you arrange the selected data either in an ascending or
descending order. Filter is a feature used for extracting particular data using some
conditions. Spread sheet offers both these features for sorting and filtering data in the
spreadsheet.
Openanewspreadsheetandenterthefollowingdata:
SortandFilterData
66. InformationTechnologyLevel-2
55
Nowtosortorfilterthedatadothefollowing:
Select the data to be sorted and then click on Sort option under Sort & Filter group in
theDatatab.Adialogboxappearsasshownbelow.
YouneedtospecifyonwhatbasisyouaregoingtosortthedataintheSortbyfieldand
selecttheorderthatisascendinganddescendingandthenclickOK.
For example, if you wanted to sort the data in Sales 2008, you would select the
relevant detail in the Sort by list and click OK. The spreadsheet would be
displayed as shown below. You can notice that the data has been sorted as per the
data in 2008 and also that values in the Sales 2008 field are arranged in
ascendingorderthatisfromsmallesttolargest.
Tofilterdata,dothefollowing:
Click the Filter option available under Sort & Filter group in the Data tab. Before
applyinga filteryouhave to select thedataalongwith theheaderasshownbelow.
o
o
o
67. InformationTechnologyLevel-2
56
o
o
o
o
o
Once you click on filter, the headerswillbe displayed with a down arrow as shown
below.
Ifyouwanttofilterdatathatisgreaterthan75intheSales2009dothefollowing.
Click the down arrow available under Sales 2009 header, a dropdown list
appearsasshownbelow.
Youcanspecifythefilterbyselectingtheavailablevaluesinthelist.
You can also sort the filtered data by selecting Sort Smallest to Largest or Sort Largest
toSmallestoptionavailableinthedropdownlist.
Click on Number Filters option under the dropdown list, once you click the
followingsubmenuappears.
69. InformationTechnologyLevel-2
58
Nowtocalculatethedataacrossworksheetsdothefollowing.
Go to sheet 2, name it year2 sheet, and insert the same data in the Sheet2 for the next
year.
Gotosheet2,nameitTotals,andinsertthesamelabels.
Type the sum formula in cell B2, =sum( , while the parenthesis is opened go to year1
sheet and go to year2 sheet and press Enter. Repeat the same step tocalculate
sum for other expenses. Note the way the range is specified (sheetname!
cellnumber).
To answer the question raised earlier, you could create a new sheet, called Quarter
Summary. To find the average, enter the following formula in one of the cells in the
Summarysheet:=AVERAGE(Region01:Region06!H15)
Spreadsheet calculates the average for all values stored in H15 on all sheets in
therangeRegion01:Region06. Ifyoumove the Region06 sheet between Region04
and Region05, the software will adjust the calculation to include the sheets for
Regions01, 02, 03, 04, and 06; Region05 will be omitted. Similarly, if you delete or
addasheetanywherebetween Region01 and Region06, the software will include
all the sheetslocatedwithintherangeinitscalculation.
o
o
o
70. InformationTechnologyLevel-2
59
UsingMultipleWorkbooksandLinkingCells
Spreadsheet also allows you to link the cells from various worksheets and from various
spread sheets to summarize data from several sources. In this manner, you can create
formulas that span different sources and make calculations using a combination of
local and linked information. You can link data from other spreadsheets and keep the
informationuptodatewithouteditingmultiplelocationseverytimethedatachanges.
For example, you can display data from multiple departments for an overview of
detailswithoutsharinginformationbetweensources.
Inthisexerciseyouwilllearnhowtolinkcellsfromdifferentspreadsheetapplications.
Openanewspreadsheetandenterthefollowingdata:
Tolinkcellsfromdifferentworksheetdothefollowing:
Openanewspreadsheetworkbook.
Type some formula, for example sum formula in any cell =sum(, while the
parenthesis is opened, click on Switch Windows option under Window group in the
Viewtab.Adropdownlistappearswiththeactiveworkbooknames.
Click on Book1 to select the earlier spreadsheet you had created and select the cells
A2:D2.
o
o
o
71. InformationTechnologyLevel-2
60
oPress Enter. You are back on the second spreadsheet. The cell where you were
entering the formula has the total of the values in the first spreadsheet!. Note the way
the software gives the cell reference. If you update any values in the first
spreadsheet, automatically the sum value in the second spreadsheet is updated! Try
thisout.
In most office settings, there is a shared drive where teams can store common files for
everyonetouse.Thisusuallyleadstosightingofthemessage:"Thedocument[filename] is
locked for editing by another user. To open a read-only copy of this document,
click"!!Thismessageappears because someoneelsealready has the fileopen. Sometimes
however,itisnecessarytohavemultiplepeopleworkingonafileatthesametime.Thiscan
betoeitherspeedupdataentryorsimplymakethingseasierforcollaborationpurposes.
Spreadsheet software allows the user to share the workbook and place it in the
network location where several users can access it simultaneously. In this exercise,
youwilllearnhowtoshareaworksheet.
Openanewspreadsheetandtypethefollowing.
SharingWorksheetData
73. InformationTechnologyLevel-2
62
Advanced Digital Presentation
InsertingaMovieClip
Presentation allows the user to add movie clips to the presentation in order to make the
presentation colourful and meaningful. You can insert movies or YouTube videos
downloadedfromtheInternet.
In this exercise you will learn how to insert a movie clip in slides. Open a new file
usingpresentationsoftware.
Youcaninsertamovieintwoways:
UsingInserttab
UsingTitleandContentLayoutOption
Click on Movie option under Media clips group in the Insert tab, a drop down appears as
shownbelow.
You can select the Movie from File… option to insert the movie clip that you have
alreadydownloadedfromtheInternet.Adialogboxappearsasshownbelow:
o
o
4Unit -
74. InformationTechnologyLevel-2
63
You can locate the movie clip and click OK to insert the same in the slide. The
presentationwillbedisplayedasshownbelow.
You can set one of the two options available for playing the media clip, i.e
AutomaticallyorWhenClicked.
Alternatively, you can select Movie from Clip Organizer… option to insert the movie clips
that are available under Clip Organizer. Doing so displays the clip art task pane as shown
below:
You can select any of the movies available and insert it in the slide. Once you have
insertedthemovieclipintheslide,thepresentationwillbedisplayedasshownbelow.
Openanewfileusingpresentationsoftwareandchangethelayoutoftheslide.
Click on Layout option available under Slides group in the Home tab, a dropdown list
appearsasshownbelow.
UsingLayoutOption
75. InformationTechnologyLevel-2
64
Click on Title and Content option and a slide will be displayed with the layout as
shownbelow.
You can insert a movie in the slide by clicking the icon in the Layout option. Once you click
theicon,adialogappearsasshownbelow.
Whenyouplaytheslideshow,themovieclipwillbeplayedautomatically.
You can include audio clips to a presentation similar to that of videos. For example, you
can play mild background music while making your presentation. In this exercise you will
learnhowtoinsertanaudioclipinslides.
Open a new file using presentation software. Click on Sound option under Media clips
groupintheInserttab,adropdownappearsasshowninfigure9.
InsertinganAudioClip
76. InformationTechnologyLevel-2
65
You can select the Sound from File… option to insert the sound clip. A dialog box
appearsasshownbelow.
You can locate the audio clip and click OK to insert the same in the slide. You may
follow the same steps as you learnt while inserting a Movie Clip. There is an inbuilt clip
organizer for a list of sounds. You can access them via the Sound from Clip
Organizer… option. Go ahead and insert an audio clip using this option.When you have
completed inserting the sound clip, and you play the slideshow, the audio clip will be
playedautomatically.
Presentation software enables the user to add tables in the slides in order to represent the
statisticaldatameaningfully.
Inthisexerciseyouwilllearntoworkwithtables.
Openanewfileusingpresentationsoftware.Youcaninsertatableintwoways:
UsingInserttab
UsingTitleandContentOption
Click on Table option under Tables group in the Insert tab, a drop down appears as
shownbelow.
WorkingwithTables
o
o
77. InformationTechnologyLevel-2
66
You can have learnt to create tables in a word processor by dragging the mouse over
requisite number of boxes. Follow the same method here and create the table shown
below. Now go ahead and try the Insert Table… and Draw Table options to create the
table.
Open a new file using presentation software and change the layout of the slide. To
changethelayoutofaslidedothefollowing:
Click on Layout option available under Slides group in the Home tab, as you did while
selecting a movie clip. Click on Title and Content option from the dropdown list. You can
insertthetableintheslidebyclickingthe iconavailablewithinthelayout.
UsingTitleandContentOption