Windows 10 With Office 2016: PM Publishers Pvt. LTD
Windows 10 With Office 2016: PM Publishers Pvt. LTD
Reema Soni
Name ..........................................................................
School ..........................................................................
® 7
PM PUBLISHERS PVT. LTD.
IT PLANET - 7 (GIGABYTE)
Trademarks
Microsoft Windows, Microsoft Word, Microsoft Excel, Microsoft PowerPoint, Microsoft Access, Scratch,
Photoshop, Animate, Stykz, etc. and all other brand names, product names, pictures and icons used in
this book are trademarks, registered trademarks or trade names of their respective holders. The Publisher
is not associated with any product or vendor mentioned in this book.
ISBN : 978-93-87596-69-6
Edition : 2020
Printed at :
Published in India by :
In the educated world, knowing about computer and its intricacies is no more a luxury, but a
necessity. Therefore, we have created IT Planet (Gigabyte) Computer Series for classes 1 to 8,
keeping this necessity in mind. The name of this series symbolizes memory unit of computer.
You may have heard somebody talking about AI, social engineering, cloud computing, app
development, Raspberry Pi — a lot of jargon in that talk might have seemed Latin and Greek to
you, but not in this series. In this series, the concepts of computer will be as clear as you are
watching streaming media without any buffering.
This series is based on the latest software packages and operating system programs such as
Microsoft Office 2016 and Windows 10. Apart from these two, we have covered latest software
programs such as Scratch, Stykz, Animate, Photoshop, Spark, MIT App Inventor and Python.
To produce a visually appealing and easy to understand book, we have artfully combined the
latest technology, pictures, drawings and text in this series. Most of the pictures in this series
show a step-by-step pedagogy, which simplifies the more complex computer concepts. The terms
and examples described in this series are those which everyone will come across while using
computers in school as well as at home.
To make the chapters exciting, projects have been given that encourage the students to try out
for themselves, to instill in them the confidence before they embark on making their own project
using that software. Each project in the chapter presents a practical problem and complete
solution in an easy-to-understand approach. Each of the tasks required to complete a project is
identified throughout the development of the project.
In a Nutshell is the section which summarizes the whole chapter and the Self-Evaluation section
examines the students' understanding of computer concepts. Different types of exercises and
activities have been included at the end of every chapter to inculcate the students with an urge
to seek answers.
The series also throws light on the cybercrimes and cyber security issues, thereby encouraging
students to be good digital citizens. It includes all the software programs required to be at par
with the current global education system.
The contents in this series are hand-picked by a panel of experts, including Ms. Nisha Batra, Jr.
Headmistress and HOD Computer Department, St. Mary’s School, Delhi and Dr. Richa Verma, Sr.
Headmistress, KIIT World School, Delhi. This selection of contents will answer the need of
students and shape their minds to stand apart from the crowd.
Humble acknowledgment to Prof. M.M. Pant for his invaluable contribution. A stalwart in the
world of computer technology, he is an internationally renowned expert specialising in pedagogy,
technology and the development of tools for the future learners.
We welcome constructive suggestions and any feedback to make this series more comprehensive,
relevant, updated and useful both for the teachers and the learners. You may mail us at
[email protected]
AUTHORS
CONTENTS
1 Computer Virus 5 6 Internet - Ethics & Safeguard 84
4 Photoshop - Introduction 46
• Introduction to Photoshop
9 HTML - Images, Links & Table 120
• Starting Photoshop • Images in Web Pages • Inserting Images
• Working with Photoshop • Creating List
• Using Photoshop Tools • Links in Web Page • Creating Links
• Color Modes • Tables in Web Page • Creating a Table
• Filters in Photoshop
10 Access - Creating a Database 144
5 Photoshop - Layers and Filters 66 • Database • Microsoft Access
• Starting Access 2016
• Layers in Photoshop • Project: Dance Class Database
• Project: Create a Collage • Creating a Blank Database
• Working with Layers • Creating a New Table
• Saving a Photoshop Image • Adding Records to a Table
Topics Covered
•Computer Virus •Malware •E-mail Virus •Ransomware Virus •Antivirus Program •Precautions against
Computer Virus
Computer Virus
VIRUS stands for Vital Information Resources Under Seize. Viruses
are programs which are created deliberately to damage critical
information and data. A virus can badly affect or infect your
computer without your knowledge and can alter its working. Once
a virus is in your computer, your files and operating system may get
damaged.
Computer viruses do not generate by chance. The programmer of a virus, known as a virus
author, intentionally writes a virus program with a motive to damage data or programs residing
in the computer. Writing a virus program usually requires significant programming skills.
Very few viruses are harmless. They display only a simple message. But most of the viruses are
very harmful. They destroy data or even the entire hard disk. Viruses attach themselves to
program files and move with them from disk to disk. Some viruses attach themselves to a file
and lie dormant. But when a certain date or event occurs, they get triggered and becomes
active. One such notorious virus is called Friday, the 13th Virus. It is also called Jerusalem
Virus because it was first discovered at the University of Jerusalem in 1987. It gets activated
every Friday that occurs on the 13th of a month.
TYPES OF VIRUSES
File Infector: This is the most common type of virus. It adds virus code to the
regular programming code within the program files. So, when the
infected program is executed, other program files also get infected.
IT P L A N E T - 7 (GIGABYTE)
This virus can cause irreversible damage to files by permanently
destroying the content.
Boot Sector Virus: This virus attaches itself to the boot sector of the disk. This sector is
the part of the disk where start-up instructions and the file-allocation
tables are kept. This sector is read and loaded into the memory every
time the disk is booted. Evidently, this virus is also very dangerous.
Executable File Virus: This virus stores itself in an executable file and infects other files each
time the file is run or executed.
Macro Virus: This virus infects files that are created using certain applications or
programs that contain macros. These mini-programs make it possible
to automate series of operations so that they are performed as a 5
single action, thereby saving the user from having to carry them out one-
by-one.
EXAMPLES OF VIRUSES
Worm: Worm is a harmless virus that simply replicates itself. But in the long run,
it takes over all the resources of the computer system, and eventually the
computer becomes useless. Worms have the capacity to travel from system
to system very easily.
Trojan Horse: Trojan horse, according to Greek mythology, was a huge
hollow wooden horse constructed by the Greeks that hid
a select force of men inside. They use this horse to gain
friendly entrance into Troy during the Trojan War.
In computing, Trojan horse virus comes as a friendly program (as a game,
application, etc.); however, it is very dangerous as it destroys all the data
on your system. Trojan horses do not replicate themselves but they can be
very destructive. The Trojan horse can be spread through a number of
ways, but the common means of infection is attachment of mail.
Rootkit: Rootkit is a program that hides in a computer and allows someone from a
remote location to take full control of the computer. Once the Rootkit is
installed, the Rootkit author can execute programs, change settings,
monitor activities, and access files from a remote computer.
Sweeper: Sweeper is a fake antivirus, also known as rogue. It is designed in such a
way that it looks like an antivirus software but, in reality, it is a virus.
People download it unintentionally, and the sweeper virus enters in their
computer and change system files, browsing activity, etc.
Sleeper: The sleeper virus is known to steal your personal and financial information.
This virus is programmed to target large networks only. This virus has
infected millions of machines so far.
Alabama: Alabama is a computer virus which infects executable (.exe) files. The virus is
loaded into the memory by executing an infected program and then affects
the computer runtime operation, corrupts the program or overlay files. The
virus manipulates the File Allocation Table and swaps filenames so that files
get lost slowly.
P M P U B L I S H E R S PVT. LTD.
Logic Bomb: A logic bomb is a program, or portion of a program, which lies dormant
until a specific piece of program logic is activated. In this way, a logic bomb
is very analogous to a real-world land mine. The most common activator
for a logic bomb is a date. The logic bomb checks the system date and
does nothing until a pre-programmed date and time is reached. At that
point, the logic bomb activates and executes its code.
Christmas Virus: Christmas virus is an email worm that spreads via email as a small,
executable file with a variety of names and extensions. The worm is
propagated by copying itself onto local and networked drives, as well as
emailing itself as an attachment to any address. It could breed from the
address book and files stored on the infected machine. Infected email
6 messages arrive with the subject “Merry Christmas!” and body “Happy
Holidays!”. The attachment has the name “postcard” followed by an
executable extension.
Adware: Adware is a program that displays an unwanted advertisement in a
banner, pop-up window on web pages, email messages, or on other
Internet services. If you click on the advertisement, sometimes it will take
you to a virus contained site, and virus will install on your computer.
Spyware: A spyware is a program placed on a computer or mobile device without
the user’s knowledge that secretly collects information about the user
and then communicates or sends the same information to some outside
source while the user is online.
SOURCES OF VIRUSES
Viruses are activated on your computer in many different ways:
E-MAIL: E-mail viruses are spread by files attached to e-mail messages. You cannot get an e-
mail virus from a message that contains only text. When you open an e-mail attachment that
contains a virus, the virus spreads to your computer. If you forward the attachment to other
people, their computers will also get affected when they open the attachment.
INTERNET DOWNLOAD: There is a lot of stuff to download from the Internet. But if something
in the stuff, you want to download, is infected by virus, then the virus comes to your computer
system. Now virus replicates itself and infects other files on your computer. This means if your
computer is infected by virus then whatever file you share with others could contain the virus.
DISTRIBUTION OF SOFTWARE: If your computer is virus-infected and you copy a software on a
CD or pendrive to distribute to someone, the virus of your computer might also get copied on
the CD or pendrive. The person, who installs this software on his computer, unknowingly gets
his computer infected by the virus.
Malware
Malware (short for malicious software) is a term used for computer viruses, worms, trojan
horses, and rootkits. It is a program that acts without a user’s knowledge and deliberately
alters the computer operations. Some corrupt programmers or virus authors write malware
and then test it to ensure it can deliver its payload. A payload is a destructive event a program
is intended to deliver.
Malware delivers its payload on a computer in a variety of ways:
(1) When a user opens an infected file
IT P L A N E T - 7 (GIGABYTE)
(2) When a user runs an infected program
(3) When a user boots the computer with infected CD or pen drive
(4) When a user connects an unprotected computer to a network
(5) Downloading an infected file from the Internet
E-mail Virus
E-mail viruses are spread by the files attached to e-
mail messages. As e-mail attachments have
become more common, the number of e-mail
viruses has also increased. You cannot get an e-
mail virus from a message that contains only text.
ERROR! ERROR!
Antivirus Program
An antivirus program detects the changes that the virus causes in the
computer. You should install an antivirus program to safeguard your computer
from virus attacks and update it regularly. An antivirus program protects a
computer against virus, identifying and removing any computer virus found in
the memory, storage media, or incoming files.
Antivirus programs use virus signatures as one of their techniques for detecting viruses. A
virus signature, also called a virus definition, is a known specific pattern of virus code. It is
necessary to update your antivirus program signature files often, for tackling the files
containing patterns of newly discovered viruses. This important activity allows your antivirus
software to protect your computer against viruses.
FEATURES OF ANTIVIRUS
$ Most antivirus programs contain an automatic update feature that regularly prompts the
users to download the updated virus signatures, usually at least once a week.
IT P L A N E T - 7 (GIGABYTE)
$ Most antivirus programs automatically check for viruses when they are first installed. In
addition, many antivirus programs automatically scan files downloaded from the web, e-
mail attachments, opened files, and all types of removable media, inserted in the computer
or mobile device.
$ Users should stay informed about new virus alerts and virus hoaxes. A virus hoax is an e-
mail message that warns users of a non-existent virus or other malware. It may inform users
that an important operating system file on their computer is a virus and encourage them to
delete the file, which could make their computer unusable.
WORKING OF ANTIVIRUS
If an antivirus program identifies an infected file, it attempts to remove the malware. If the
antivirus program cannot remove the infection, it often quarantines the infected file. A 9
quarantine is a separate area of a hard disk that holds the infected file until the infection can
be removed. This step ensures that other files will not be infected. Quarantined files remain
on your computer until you delete them or restore them.
SOME POPULAR ANTIVIRUS SOFTWARE PROGRAMS
NORTON ANTIVIRUS: Norton antivirus is developed and distributed by Symantec Corporation. It
protects your computer from various viruses and Internet threats.
MCAFEE: McAfee antivirus delivers complete virus protection and Internet security. It protects
your computer from harmful viruses.
KASPERSKY ANTIVIRUS: It offers a number of new and improved features together with unique
protection technologies to address the latest online threats, keeping your PC running smoothly.
AVG ANTIVIRUS: It includes antivirus and spyware protection, it also offers protection from
harmful downloads as well as sites.
TOTALAV: It is a solid and reliable antivirus, offering some great features at a low price. It
provides real-time antivirus protection from viruses, Malware, Spyware and Ransomware for all
your devices.
QUICK HEAL: Quick Heal offers a wide range of antivirus products that protects your PC from
viruses, spywares, malwares.
better to permanently delete the message rather than send it to Deleted Items folder.
$ Never trust any e-mail message or website that asks you to update or confirm sensitive
data such as your bank account number, credit card information or account password.
Bear in mind that no legitimate company or organisation will ever contact you via e-mail
to update or confirm such information online.
$ To keep your computer safe from viruses, always download software and files from
trusted websites.
$ Install an antivirus program on all your computers. Update the software and the virus
signature files regularly.
$ Set the macro security in programs so that you can enable or disable macros. Enable
10
macros only if the document is from a trusted source and you are expecting it.
$ Stay informed about new virus alerts and virus hoaxes.
$ Scan all downloaded programs for viruses and other malware.
CHECKLIST
Self-Evaluation
After reading the chapter, I know these points:
$ I know that viruses are programs which are created deliberately to damage critical
information and data.
$ I know that viruses in computer are not generated accidentally, but are programmed
intentionally by a programmer known as virus author.
$ I know that Malware is a program that acts without a user’s knowledge and
deliberately alters the computer operations.
$ I know that e-mail viruses are spread by files attached to e-mail messages.
$ I know that Ransomware is a virus that restricts access to our computer system and
demands a ransom (money) to be paid in order to remove the restriction.
$ I know that antivirus program detects the changes that the virus causes in computer.
E xe r c i s e s
A. Tick () the correct answer.
1. ..................... gets activated every Friday which occurs on the 13th of a month.
a. Trojan Horse b. File Infector c. Jerusalem Virus
2. ..................... virus adds virus code to the regular programming code in a program file.
a. File Infector b. Boot Sector c. Worm
3. ..................... is a program that displays online advertisement in a banner on the web page.
a. Adware b. Trojan Horse c. Worm
4. A program that detects the changes caused by a virus in the computer is ......................... .
a. Virus Detector b. Antivirus c. None
5. A ...................... is a destructive event the malware is intended to deliver.
a. Payload b. Download c. Temp File
B. Write ‘ T ’ for True and ‘ F ’ for False statements.
IT P L A N E T - 7 (GIGABYTE)
1. Virus can damage or destroy the operating system.
2. Boot sector virus is a harmless virus program.
3. The sleeper virus is known to steal your personal and financial information.
4. Viruses get activated by downloading an infected file from the Internet.
5. Virus cannot affect executable file.
6. We should ignore new virus alerts and virus hoaxes while using Internet.
C. Fill in the blanks.
1. VIRUS stands for .................................................................................................................... .
2. Viruses are programmed intentionally by a programmer known as .................................... .
11
3.A virus enters a computer through an attachment with an ............................ . 4.
....................................... virus comes as a friendly program.
5. A ....................................... is a known specific pattern of virus code.
D. Define the following.
1. Rootkit : .....................................................................................................................................
....................................................................................................................................................
2. Logic Bomb: ...............................................................................................................................
....................................................................................................................................................
3. Virus Signature : .........................................................................................................................
....................................................................................................................................................
E. Differentiate between the following.
Adware Spyware
...................................................................... ......................................................................
...................................................................... ......................................................................
...................................................................... ......................................................................
F. Answer in 1-2 sentences.
1. What is a computer virus?
....................................................................................................................................................
....................................................................................................................................................
2. Why do we use antivirus program?
....................................................................................................................................................
....................................................................................................................................................
G. Answer Briefly.
1. What is Boot Sector virus?
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
2. Write briefly about the sources of computer virus.
P M P U B L I S H E R S PVT. LTD.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
3. How does E-mail virus spread?
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
4. What is Ransomware virus?
....................................................................................................................................................
12
....................................................................................................................................................
....................................................................................................................................................
5. Write any two precautions that should be taken to prevent computer virus.
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
H. Application Based Question.
You receive an e-mail message that appears to be from someone you know. When you try to
open the attachment, nothing happens. You attempt to open the attachment two more times
without any success. A few minutes later, your computer is running slower and you are having
trouble running apps. What might be wrong?
..........................................................................................................................................................
Group Discussion
Divide the students into groups and discuss the topic, ‘E-mail virus vs Ransomware virus’.
Online Link
To learn more about Computer virus, visit the website:
https://www.geeksforgeeks.org/types-of-virus/
Discover More
Safeguard against Information Theft
Most financial organizations like banks attempt to prevent information theft by implementing the User
ID and Password, which is a common process. To further protect information on the Internet and
networks, organizations and individuals use a variety of encryption techniques.
Encryption is the process of changing data that is readable by humans into encoded characters to
prevent unauthorized access. You treat encrypted data just like any other data. That is, you can store it
or send it in an e-mail message. To read the data, the recipient must decrypt or decode it.
In the encryption process, the unencrypted, readable data is called plaintext. The encrypted data is
called ciphertext. An encryption algorithm, or cipher, is a set of steps that can convert readable
IT P L A N E T - 7 (GIGABYTE)
plaintext into unreadable ciphertext. A simple encryption algorithm might switch the order of
characters or replace characters with other characters. Encryption programs typically use encryption
algorithm, along with an encryption key. An encryption key is a set of characters that the originator of
the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
Step 2 Step 3
ABC Bank The sender uses The receiver uses his ABC Bank
the key to encrypt key to decrypt the
Monthly Monthly
Balance the message. message. Balance
in your CC478D43 in your
Account. Account.
Plaintext AAF5567 Plaintext
DFD3456
DFFCV34
DJDJJ77
ciphertext
13
2 Number System
Topics Covered
• Introduction •Number System •Conversion of Number Systems •Bits and Bytes
A computer is a machine that can do calculations very fast. But do you know how?
In this chapter, you will learn how a computer can calculate fast.
Introduction
A computer is a man-made electronic machine. It does not understand the language people
use to communicate with each other.
Computers recognize only two discrete states: ON and OFF. This B I N A RY DI G I T
( BI T)
ELECTRONIC
CHARGE
ELECTRONIC
STATE
Number System
Computer is an electronic machine that stores data in coded form or machine readable form.
Therefore, characters have to be represented in the form of electronic pulses. Two pulses that
are used to represent basic numbers (0 and 1) are absence of pulse (no current) and presence
P M P U B L I S H E R S PVT. LTD.
of pulse (current). Absence of pulse represents ‘0’, and presence of pulse represents ‘1’. Before
going into the details, it is essential to have a basic understanding of the number system.
Number System is a way to represent numbers in a computer system. Every value that you are
giving to/getting from computer memory has a defined number system.
There are two types of Number Systems:
IT P L A N E T - 7 (GIGABYTE)
left, are successive powers of two (20, 21, 22, 23 or 1, 2, 4, 8). To construct a binary number,
place ones in the positions where the corresponding values add up to the quantity you want
to represent and place zeros in the other positions. For example, in a four-digit binary number,
the binary place values are (from right to left) 1, 2, 4, and 8.
The binary number 1001 has ones in the positions for the values 1 and 8, and zeros in the
positions for 2 and 4. Therefore, the quantity represented by binary 1001 is 9 (8 + 0 + 0 + 1).
1001 = 1 × 23 + 0 × 22 + 0 × 21 + 1 × 20
= 8+0+0+1
= 9
A BIT refers to a Binary Digit in the Binary number system. 15
The table given below shows the binary equivalent of some decimal numbers.
Decimal Binary Decimal Binary
1 1111 : 2112
2 1112 21 2121
3 1121 22 2122
4 1122 23 2211
5 1211 24 2212
6 1212 25 2221
7 1221 26 2222
1 111
With this table, it is easy to translate between Octal
2 112 and Binary. For example,
3 121
(37)8 = 011 1112
4 122
(51)8 = 101 0012
5 211
6 212
7 221
8 222
IT P L A N E T - 7 (GIGABYTE)
Tens
6 0110 6 3 digits from the right; each Hundreds
Thousands
group has different names that
7 0111 7 include trillion, billion, million,
Ten thousands
Hundred thousands
Million
8 1000 8 thousand, and ones. Ten Million
Hundred Million
Billions
9 1001 9 Ten Billions
Hundred Billions
A 1010 10
But in Indian number system, 12,34,56,789
B 1011 11 the comma is placed after every Units
2 digits from the right, except Tens
C 1100 12 the first 3 digits; each group has
Hundreds
Thousands
D 1101 13 different names, such as crore, Ten thousands
lakh, thousand, and ones. Lakhs
17
E 1110 14 Ten Lakhs
Crores
F 1111 15 Ten Crores
Conversion of Number Systems
In this section, we will discuss about the conversion of one number system to another.
1001010 = 1 × 26 + 0 × 25 + 0 × 24 + 1 × 23 + 0 × 22 + 1 × 21 + 0 × 20
= 64 + 0 + 0 + 8 + 0 + 2 + 0
= 74 (Therefore, the Decimal value is 74.)
DECIMAL TO OCTAL CONVERSION
The conversion of Decimal to Octal is similar to the conversion of decimal to binary. The only
difference is the base. In this number system, we have to divide the decimal number using 8.
Example: Convert (2568)10 to its Octal equivalent.
8 2568 0
8 321 1
18
8 40 0 Hence, (2586) 10 = (5010) 8
8 5 5
8 - 0
DECIMAL TO HEXADECIMAL CONVERSION
The conversion of Decimal to Hexadecimal is similar to the conversion of decimal to binary and
decimal to octal. The only difference is the base. In this number system, we have to divide the
decimal number using 16.
Example: Convert (1000)10 to its hexadecimal equivalent.
27 2111 9
27 73 F
27 4 4
27 . 1
0 0 1 0 0 0 1 0
Byte
BYTE (BINARY TERM)
A group of 8 bits is called a Byte. Evidently, many such groups can be made in the binary
system. Exactly speaking, 28 or 256 bytes are possible and they can represent 256 characters.
Clearly, these 256 bytes are enough to represent 26 letters of the alphabet (both in capital and
small forms), numbers from 0 to 9, punctuation marks, currency signs, and some special
symbols. These 256 bytes are represented by different binary numerals starting from 00000000
IT P L A N E T - 7 (GIGABYTE)
and ending with 11111111.
NIBBLE 0 1 1 0 0 0 1 0
Half a byte is called Nibble. A nibble is a collection of
bits on a 4-bit boundary.
Bit
Nibble
Byte
E xe r c i s e s
A. Tick [ ] the correct answer.
1. Computers recognize only two discrete states, i.e., .............................. .
a. Yes and No b. Right and Wrong c. On and Off
2. The digit ‘zero’ represents the electronic state .............................. .
a. On b. Off c. None 3.
The base 8 number system is .............................. .
a. Hexadecimal b. Binary c. Octal
4. The number system used internally by all modern computers is .............................. .
a. Hexadecimal b. Binary c. Octal
5. The digits used in Octal number system are from .............................. .
a. 0 to 9 b. 0 and 1 c. 0 to 7
1. The decimal number system has just two unique digits, 0 and 1.
2. A byte is used to represent a single character in the computer.
3. A group of 8 bits is called kilobyte.
4. A nibble is a collection of 5 bits.
C. Fill in the blanks.
1. In computers, characters have to be represented in the form of .................................... .
2. In a Positional Number System, there are only a few symbols called ........................... .
3. The ................... Number System represents numeric values using two symbols, i.e., 0 and 1.
20 4. The Decimal Number System has ........................... as its base.
5. The Octal Number System has ................ as its base.
6. The Hexadecimal Number System includes the symbols ........................ and ....................... .
D. Define the following.
1. Bit: ...............................................................................................................................................
......................................................................................................................................................
2. Byte: ............................................................................................................................................
......................................................................................................................................................
3. Nibble: .........................................................................................................................................
......................................................................................................................................................
E. Differentiate between the following.
1. Binary Number System Decimal Number System
................................................................... ...................................................................
................................................................... ...................................................................
................................................................... ...................................................................
................................................................... ...................................................................
2. Octal Number System Hexadecimal Number System
................................................................. ...................................................................
................................................................ ...................................................................
................................................................ ...................................................................
................................................................ ...................................................................
F. Answer Briefly.
1. What do you mean by Number System? Mention its types.
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
2. Name the different positional number system.
......................................................................................................................................................
IT P L A N E T - 7 (GIGABYTE)
......................................................................................................................................................
G. Application Based Question.
Anjali’s teacher asks her to tell which method was used by humans in the past for counting
beyond ten. Help her.
............................................................................................................................................................
Group Discussion
Discuss the topic, ‘Using the combinations of multiple of 1s and 0s, the empire of computers is
established.’
Online Link 21
To learn more about working of Number System, visit the website:
https://www.includehelp.com/computer-number-systems.aspx
Activity Section
1. Decimal to Binary
i. 345 ii. 113
2. Binary to Decimal
i. 111 ii. 1101
P M P U B L I S H E R S PVT. LTD.
22
3. Decimal to Octal
i. 45 ii. 70
4. Decimal to Hexadecimal
i. 22 ii. 330
Discover More
ASCII Code
The combinations of 0s and 1s that represent uppercase and lowercase letters, numbers, and special
symbols are defined by patterns called a coding scheme. ASCII, which stands for American Standard Code
for Information Interchange, is the most widely used coding scheme to represent the letters, numbers,
symbols and some of the commands used by a computer. The ASCII code gives a binary code of eight
numbers to each character or command. The binary code, controls the switches that send a signal to the
computer. For example, an upper case S sends the binary code, 01010011.
How a letter is converted into Binary form and vice versa?
IT P L A N E T - 7 (GIGABYTE)
Step 1 Step 2
A user presses the capital letter S on the The scan code
keyboard, which in turn creates a special code, for the capital
called a scan code, for the capital letter S. letter S is sent
to the electronic
circuitry in the
computer.
Step 4 Step 3
After processing, The electronic circuitry in
the binary code for the computer converts the
the capital letter S, scan code for the capital 23
letter S into its ASCII binary
is converted into an
image and displayed
S code (01010011) and stores
on the monitor. it in memory for processing.
3 Animate - Layers & Animation
Topics Covered
• Importing Graphics in Animate • Layers • Working with Layers in Timeline • Symbols and Instances
•Animation in Animate • Adding Frames • Frame-by-Frame Animation • Using Tweening
In your previous class, you learnt about Adobe Animate and its tools. Let’s move ahead and
learn more about it.
INSERTING A GRAPHIC
1. Click on File menu. The File menu appears.
4 2. Click on Import.
P M P U B L I S H E R S PVT. LTD.
IT P L A N E T - 7 (GIGABYTE)
Deleting Layers
1. Click on the layer you want to delete.
2. Click on Delete Layer icon.
You can delete more than one layer by clicking the first
2
layer you want to delete, and then press Ctrl key while
1 clicking other layers, and then click on Delete Layer icon.
25
The layer will disappear from the Timeline.
If you delete the wrong layer accidentally, you can click on Edit menu and then click on Undo Delete
Layer.
Working with Layers in Timeline
You can also rename, hide, or lock a layer quickly from the Timeline.
RENAME A LAYER
1. Double-click on the
layer name.
2. Type a new name.
3.Press Enter key. The
layer name changes.
123
LOCK A LAYER
You can lock a layer, which helps you avoid moving or deleting elements by accident.
1. In the padlock icon column,
click on the bullet next to
the layer name.
The layer is now locked, and
you cannot edit the contents.
2. To unlock the layer, click on
1 the padlock icon next to the
2 layer name in the Timeline.
IT P L A N E T - 7 (GIGABYTE)
A plain guide layer helps you to position any object or element on the Stage, but it does not
appear in your final movie. You can place your photograph on a guide layer for reference and
draw its asset on another layer.
1. Click a layer where you
want to insert your
guide layer.
Your new layer will appear
above the layer you select.
2. Click on New Layer
button.
27
2 1
Animate adds a new
layer to the Timeline.
3. Right-click on the new
layer name.
Do You Know?
! By default, all layers you add to the Timeline are normal, which
Turning Guide layer
means all the objects on the layer appear in the movie.
back to a Normal
! Objects that you place on guide layers do not appear in the movie.
28 Right-click on your Guide layer.
! A mask layer hides layers nested underneath it, which are masked. In the menu that appears, click
! You can also place layers into folders to keep your movie organized. on the check box which
! Tween layers are the layers that are automatically created when precedes Guide option. Your
you create a motion tween. layer is now a Normal layer.
ADDING A MASK LAYER
A Mask layer is used to show or hide a portion of your layer. A mask is like a stencil or paper
cutout, where you can see what is behind it through the holes. You can have many layers
masked by a single layer mask.
1. Click a layer where you
want to insert a mask.
Your new layer will appear
2 above the layer you select.
2. Click on New Layer
button.
1
Draw A Mask
1. Click on the Lock icon
on your mask layer to
unlock.
2 The Lock icon becomes Dot
icon.
The mask layer is denoted
by the Mask layer icon.
IT P L A N E T - 7 (GIGABYTE)
2. Place some text on the
1 mask layer.
29
3
Symbols and Instances
A symbol is an object in Animate. This object is stored in the Library; it can be used repeatedly
throughout a movie. Symbol can be a graphic object, a movie clip, a graphic created in another
program, or a button. Sound clips may also be symbols.
When you drag a symbol from the Library to the Stage, you create an instance. Using instance
does not affect the file, no matter how many times you reuse a symbol. You can create many
instances of the same symbol, each with its own set of properties like different colors, different
sizes, etc. You create these symbols so that they can be used in your Animate movie as instances.
CREATING A SYMBOL
You can create symbols directly on the Stage. First create any object or drawing then convert it
into a symbol, so that you can reuse that object throughout your project.
Do You Know?
By clicking the Advanced option, you can see the
The Registration grid uses a small black square to advanced symbol creation options. Advanced options
indicate where, within the symbol bounding box,
are not available to graphic symbols.
the registration point is located. A registration
point is the axis around which the symbol rotates, 6. Click on OK.
and the point along which the symbol aligns.
IT P L A N E T - 7 (GIGABYTE)
stage.
Adding Frames
You can add frames and keyframes to add time to your Animate movie. A Frame is the empty
P M P U B L I S H E R S PVT. LTD.
frame along the timeline. A keyframe is the frame which has an animation in it, or where a new
symbol appears in the Timeline. It is used for critical points in the Timeline where your content
changes. Keyframes are also used to mark the beginning or end of an animation. You can add or
remove frames to adjust timing between keyframes.
A keyframe is indicated on the Timeline with a black circle. The frame where a keyframe span
ends has a white rectangle. When you insert an object in that keyframe, the black circle
changes to black dot. The frames between the two black dots become Light gray.
You can also add a blank keyframe to the Timeline as a placeholder for symbols you plan to
add later, or to clearly leave the frame blank. A blank keyframe is indicated by a black circle. A
blank keyframe is exactly the same as a regular keyframe. The only difference is that Animate
automatically removes all of your content from the Stage at a blank keyframe. That way, if you
32 want to start fresh at a certain point on the Timeline, you don’t have to manually delete objects
from the Stage.
ADDING REGULAR FRAME
1. Click an empty frame on the
2 3 Timeline where you want to
insert a new frame.
4 2. Click on Insert menu.
The Insert menu appears
3. Click on Timeline.
4. Click on Frame.
You can also press F5 key to
insert a frame.
1 IT P L A N E T - 7 (GIGABYTE)
Start
This project deals with creation of frame-by-frame animation. In this animation, we will
choose two images to create an underwater scene. We will add background (underwater
scene) on one layer and animated object (fish) on another layer. Finally, we will play the
animation to see the fish moving on the stage. Now, let us practice using these features
through a project. (Your pictures may vary in the project).
Frame-by-Frame Animation
Frame-by-frame animation is also known as stop-motion animation. It is achieved by
manipulating a physical object and making it appear to move on its own by shooting one
frame, manipulating the object, then shooting another frame and so on. You can create the
illusion of movement in a movie by changing the placement of the Stage content from
keyframe to keyframe. This animation is called frame-by-frame animation.
ADDING BACKGROUND IN THE LAYER
When you start Adobe Animate, the first keyframe is selected in the layer by default.
1. Double-click on the layer and
rename it as ‘Underwater
Scene’.
P M P U B L I S H E R S PVT. LTD.
34
Do You Know?
A famous example of frame-by-frame animation is the 1933 film ‘King Kong’. The giant ape is shot in this
animation style, making it seem as if he is moving on his own.
5 4. Click a frame on the Timeline
to select your keyframe’s
location.
6
5. Click on Insert menu.
7
6. Click on Timeline.
7. Click on Keyframe.
IT P L A N E T - 7 (GIGABYTE)
9
17
36
Finish
Using Tweening
You can apply tween when you animate moving symbols. A tween defines two points of
movement in the Timeline with two keyframes; it lets Animate calculate all the in-between
frames necessary to get from first point to the last point.
The difference between a frame-by-frame animation and tween is that when you create frame- by-
frame animation, you manually input the changes made to each frame in the sequence and
when you use tween, you only specify the first frame and the last frame, and let Animate
calculate the in-between frames. In Animate, we have three types of tweening : classical
tweening, motion tweening, and shape tweening.
IT P L A N E T - 7 (GIGABYTE)
3 4
37
6. Right-click between
the two keyframes
7 that make up your
tween to select the
frames.
7. Click on Create
Classic Tween from
the menu that
appears.
Animate adds color to the
tweened frames and
draws an arrow through
them.
8
P M P U B L I S H E R S PVT. LTD.
38 Do You Know?
Classic tween is complex to
create and provides less control
over tweened animation.
CREATING A MOTION TWEENING
A motion tween is a feature that allows you to easily animate the motion of an object. Instead
of defining the location of the object in every frame, you can create a motion tween, which will
automatically move the object from the beginning location to ending location. Once the tween
has been created, you can click on any frame within the motion tween and move or rotate the
object. Animate automatically builds a motion path animating the frames between the first
frame and the next keyframe. In order for Animate to create the motion tween, you may need
to convert the object to a symbol.
1. Select a keyframe where you
want to start the motion
tween.
2
2. Place the symbol you want to
animate on Stage.
Remember that the position of
the symbol should be the starting
point of the animation.
Start
40 This project deals with creation of Shape tween. In this animation, we will choose two
shapes and morph them from one shape to another. Now, let us practice using these
features through a project.
CREATING A SHAPE TWEENING
You can use shape tweening to morph one shape to another. For example, you can morph a
circle into a square. Shape tweens can only be applied to shapes.
1. Select the frame in which
you want to start a shape
tween.
2
2. Draw the object you want
to animate in frame 1.
IT P L A N E T - 7 (GIGABYTE)
5 image to morph or
change.
tween.
2. Press ENTER.
Animate plays the animation.
Your shape morphs from the
1 starting shape to the ending
shape.
42
Finish
CHECKLIST
Self-Evaluation
After reading the chapter, I know these points:
$ I know that in Animation, the scene and object change slightly from one frame to
next frame due to animation effect.
$ I know that in Animate, before creating any animated movie, we have to set up the
movie size and speed at which the movie will play.
$ I know that user can add frames and keyframes to add time to their Animated
movie.
$ I know that user can create frame by frame animation in Adobe Animate.
$ I know that user can apply tween in two ways, either by classic tweening or by
motion tweening.
$ I know that shape tween is used to morph one shape to another.
E xe r c i s e s
A. Tick () the correct answer.
1. In animation effect, the ...........of movement from one frame to the next is created.
a. Illusion b. Properties c. Design
2. A frame rate of ........................... is the default setting for new Animate document.
a. 12fps b. 30fps c. 24fps
3. A keyframe is indicated on the Timeline with a ........................... circle.
a. Red b. Black c. Green
4. In Animate, Shape tween can only be applied to ........................... .
a. Shapes b. Image c. Text
5. You can convert your text into graphics by using the ........................... command.
a. Shift b. Ctrl c. Break Apart
6. ........... attempts to keep your straight line straight, and corners sharp as the animation plays.
a. Angular blending b. Motion presets c. Curved paths
IT P L A N E T - 7 (GIGABYTE)
B. Write ‘ T ’ for true and ‘ F ’ for false statements.
1. Shape tween can only be applied to shapes.
2. While doing motion tween, Animate changes the color of timeline tween layer blue.
3. In frame-by-frame animation, Animate calculates in-between frames automatically.
4. The playing speed of the movie determines the number of frames per second (fps).
5. Creating frame-by-frame animation takes less time then creating tweening animation.
C. Fill in the blanks.
1. ........................... are used to make the beginning or ending of an animation.
2. Frame-by-frame animation is also known ........................... animation.
3. To slow down an animation, adjust the ........................... of animated movies.
43
4. In ............... tween, specify only first and last frame and let Animate calculate the in-
between frames.
5. To morph one shape to another, ........................... tween is used.
D. Differentiate between the following.
1. Keyframe Blank keyframe
................................................................. .................................................................
................................................................ .................................................................
................................................................ .................................................................
2. Motion Tween Shape Tween
................................................................. .................................................................
................................................................ .................................................................
................................................................ .................................................................
E. Answer in 1-2 sentences.
1. What is animation?
.....................................................................................................................................................
.....................................................................................................................................................
2. Why do we add frames in animate?
.....................................................................................................................................................
.....................................................................................................................................................
3. How can we slow down the animation?
.....................................................................................................................................................
.....................................................................................................................................................
F. Answer Briefly.
1. What is frame-by-frame animation? Explain.
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
2. What is tweening? Write its type.
.....................................................................................................................................................
P M P U B L I S H E R S PVT. LTD.
.....................................................................................................................................................
.....................................................................................................................................................
.....................................................................................................................................................
G. Application Based Question.
Sakshi wants to apply Shape tweening animation on a symbol. But when she started the work,
the shape tween option got disabled. Tell her the mistake she is doing.
..........................................................................................................................................................
Group Discussion
Discuss the topic, ‘Impact of animated movies on kids’.
44
Online Link
To learn more about Animation in Adobe Animate, visit the website:
https://www.skillshare.com/classes/2D-Animation-For-Beginners-With-Adobe-Animate/1155877/projects
Activity Section
Lab Activity
Draw a paper plane in Animate and make it fly in different directions.
IT P L A N E T - 7 (GIGABYTE)
Technology Trailblazers
Larry Ellison
Introduction to Photoshop
Photoshop is a graphic designer software developed by Adobe Systems. It allows you to
create, modify, and optimise digital images. You can then save the images to print, share via e-
mail, publish online, or view on a handheld device (such as an iPad or smartphone).
FEATURES OF PHOTOSHOP
Photoshop provides various features to move, color, stylize and add text to the elements of
your image. These features are given below:
Understanding and selecting Pixels: In Photoshop, digital images are made of tiny, solid color
squares called pixels. It provides various selection tools to edit specific pixels in the image.
Painting Image: You can use Photoshop Paintbrush, Airbrush and Pencil tools to apply colors or
patterns to your images after selecting their pixels. You can also fill the arrows of your
selections with solid or semi-transparent colors.
Adjusting Color: You can brighten, darken, and change the shades of colors in parts of your
image with Photoshop Dodge, Burn and similar tools.
Applying Filters: Photoshop filters can make your image look like an impressionist painting,
sharpen or blur your image, or distort your image in various ways.
Adding Text: Type tools of Photoshop make it easy to apply titles and labels to your images.
2. Scroll down and click on Adobe Photoshop. Adobe Photoshop window appears.
Photoshop gives you quick access to your recent
files. You can open any recently used file by
clicking on it.
3
3. Click on Create New. The New Document dialog
box will appear.
4. Type a name for the new image.
4
5. Type in the desired dimension and resolution.
6. Click on the down arrow for the type of color
5 you want in the background.
7. Click on Create.
46
Photoshop creates a new image window with the
6
specified dimensions. The name of the new image
appears in the Title tab.
7
THE PHOTOSHOP WINDOW
Each image you open in Photoshop appears in its own window. Window can take up the entire
workspace, and you can use a combination of tools, menu commands and palette-based
features to open and edit your digital images in Photoshop.
Menu bar
Option bar
Title tab
Menu bar: Displays menus that contain most of the commands and functions of Photoshop.
Option bar: It displays controls that let you customize the selected tool in the toolbox.
Image window: You can open an image in the image window in Photoshop. All the image
editing is done in image window.
IT P L A N E T - 7 (GIGABYTE)
Title tab: Displays the name, magnification, and color mode of an open image. You can switch
between images by clicking their respective tabs.
Palettes: Small windows that give you access to common commands and resources. You can
click the tabs and icons to display and hide panels.
Status bar: Displays the magnification of the current image and the amount of computer
memory that the image uses.
Toolbox: There are many tools in the Toolbox that you can use for working on your image. If
you leave your mouse cursor over the tool, Adobe Photoshop will indicate the name of the
tool and the keyboard shortcut to access the tool. Some of the tools are stacked in group of
tools. A small black arrow in the bottom right corner of the tool indicates that additional tools
are stacked behind. To access any of the tools in this stack, click and hold down the mouse
47
button on the uppermost tool for a second.
Working with Photoshop
OPENING AN IMAGE
You can open an existing image file in Photoshop.
1. Click on File in the Menu bar. The File menu will open.
2. Click on Open. The Open dialog box appears.
3. Navigate to the folder that contains the image you want to open.
4. Click on the filename to open. The preview of your image file will appear.
5.Click on Open. The image appears in a new window of Photoshop. The
name of the file appears in the Title tab of the image.
Do You Know?
To determine the printed size of a
Photoshop image, you can divide the
on-screen size by the resolution. If
you have an image with an on-screen
width of 480 pixels and a resolution
of 120 pixels per inch, the printed
Photoshop changes the canvas size of the image.
width is 4 inches.
The canvas changes equally on both the opposite sides
because you have selected the middle (center) anchor point.
IT P L A N E T - 7 (GIGABYTE)
ZOOM TOOL
You can change the magnification of the desired part of an image with the help of the Zoom
tool. It helps you to see small details in an image.
CROP TOOL
Crop tool can be used to cut only the desired part of an image. It crops some part of the
image and gives you the required part of the image.
1. Click on the Crop tool.
1 2. Click and drag to select the area
of the image you want to
display.
50
SELECTING TOOLS
Digital images consist of tiny, solid-color squares called pixels. To edit specific pixels in your
image, you must first select them by using one of Photoshop’s selection tools. You can move,
delete, or stylize the selected area using other Photoshop commands.
IT P L A N E T - 7 (GIGABYTE)
Photoshop selects the elliptical
portion of your image.
3
3
3
IT P L A N E T - 7 (GIGABYTE)
2. Type a number from 0 to 255
2
in Tolerance field.
1
Type smaller number to select
3 narrow range of colors, and type
the large number to select wide
range of colors.
3. Click on the area (pixels) you
want to select inside the image.
1. Click on the
2 Clone Stamp ( )
in the Toolbox.
2. Click on the
3 down arrow of
Brush.
3. Select the brush
size and type.
1
4. Press and hold
5 the Alt key on
the keyboard.
(not shown in
screenshot)
5. Click on the area
of the image
where you want
to copy from.
6. Release the Alt
key.
IT P L A N E T - 7 (GIGABYTE)
8
achieve the
desired effect.
Do You Know?
Update Your Knowledge The Clone tool is the oldest and the 55
most widely known cloning tool. The
You can use Clone tool to:
basic concept is that you can duplicate
! erase elements from your image without leaving a trace. certain portions of an image using a
! clone between areas of similar color and texture. source, destination, and brush.
Color Modes
You can use Color Mode to apply the specific colors on your image. Popularly used color modes
in Photoshop are RGB and Grayscale. You can change the color modes in the picture as per need.
RGB MODE
RGB is the common mode for working with color images in Photoshop.
1 1. Click on Image.
2 2. Click on Mode.
3
3. Click on RGB Color.
RGB is displayed in the Title tab
of the image.
4 4. Click on Channels to view the
different color components of
an RGB image.
5. Click on any channel (Red,
Green or Blue).
5 A grayscale version of the image
displays the amount of channels
the image contains.
CONVERTING COLORED IMAGES TO GRAYSCALE
You can convert the image to grayscale mode to remove the color from your image.
1. Click on Image in the Menu bar.
2. Click on Mode.
3. Click on Grayscale. Photoshop displays an alert box.
4
4. Click on Discard.
Background Color
1. Click on the Background Color
icon ( ).
2 The Color Picker dialog box will
open.
4
2. Click in the color box to select a
color.
3 3. Drag the slider to change the
range of color in the window.
4. Click on OK.
The selected color appears in the
IT P L A N E T - 7 (GIGABYTE)
Background Color icon.
Note: You need to be a bit careful while using the Brush tool as it can also fill those areas where
color is not needed.
brush strokes.
IT P L A N E T - 7 (GIGABYTE)
BRIGHTNESS AND CONTRAST
You can adjust the Brightness and Contrast of your image.
1. Click on Image.
2. Click on Adjustments.
3. Click on Levels. A dialog box appears.
7. Click and drag the left slider to the right to lighten the image.
8. Click and drag the right slider to the left to darken the image.
9. Click on OK.
1. Click on Dodge
2 3 tool ( ).
2. Click on the down
arrow button of
Brush, and choose
the brush size.
3. You can also select
the range of
colors. You want to
apply.
1 4 4. Click and drag over
the area that you
want to lighten.
IT P L A N E T - 7 (GIGABYTE)
button of Brush, and choose
the brush size.
4. You can also select the range
1 5 of colors you want to apply.
2
5. Click and drag over the area
that you want to darken.
The impact can be observed on
the dragged area.
61
Blur and Sharpen tools
You can use blur or sharpen tool on specific areas of your image. This enables you to emphasize or
de-emphasize objects in a photo.
Filters in Photoshop
With Photoshop filters, you can quickly and easily apply enhancements to your image,
including artistic effects, texture effects, and distortions. Filters can help you correct defects in
your image or enable you to turn a photograph into something that resembles an
impressionist painting. Photoshop comes with many filters.
E xe r c i s e s
A. Tick [] the correct answer.
1. Photoshop is developed by ................................ .
a. Microsoft b. Google c. Adobe
2. Digital images in Photoshop are made up of tiny, solid color squares called ....................... .
a. Dots b. Effect c. Pixels
3. ................................ can be used to change the size of an image.
a. Crop tool b. Fuzzy tool c. Pencil tool
4. ................................ can be used to copy information from one area of an image to another.
a. Magic Wand tool b. Lasso tool c. Clone Stamp tool
5. To darken a specific area of an image, we use ................................ .
IT P L A N E T - 7 (GIGABYTE)
a. Burn tool b. Brush tool c. Dodge tool
6. ................................ can be used to select a color from an open image.
a. Clone tool b. Crop tool c. Eyedropper tool
....................................................................................................................................................
2. Name the different ways to change size of an image.
....................................................................................................................................................
....................................................................................................................................................
3. What is the use of Magnetic Lasso tool?
....................................................................................................................................................
....................................................................................................................................................
G. Answer Briefly.
1. What is Photoshop? Write down its features.
64 ....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
2. What are color modes? Write the use of different color modes.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
H. Application Based Question.
You have gone for a picnic with your friends and clicked a group photograph. From that
photograph, you want to keep your photo and remove the rest of your friends. Which tool of
Photoshop will you use for this purpose?
...........................................................................................................................................................
Group Discussion
Divide the students into two groups and discuss ‘Image Editing Software vs Drawing Software’.
Online Link
To learn more about working of Photoshop, visit the website:
https://www.howtogeek.com/361342/how-to-learn-photoshop/
Activity Section
Lab Activity
Opening Images
! Click on File menu, navigate any image and click on Open to
open the image file. In this example, we have chosen an
image of flower. Your image may vary from the given image.
IT P L A N E T - 7 (GIGABYTE)
! Make the canvas size bigger from the original image.
! Cover the extra part of the canvas by using Clone Stamp tool.
Exposure Correction
! If the image is ‘overexposed’ i.e. there's too much light, you can correct the exposure by using the
brightness-contrast level tool.
! Apply dodge and burn tool wherever it is needed in the image.
Apply Filter
! You can give your image an artistic look by applying filter to it.
! Click on Filter menu, then select Noise and then change the
amount of noise. 65
5 Photoshop - Layers and Filters
Topics Covered
• Layers in Photoshop •Project: Create a Collage •Working with Layers •Saving a Photoshop Image
Layers in Photoshop
In Photoshop, layers are the key components to work with graphic objects. These are used to work
on individual parts of an image without affecting the other parts. A Photoshop image consists of
multiple layers, with each layer containing different objects in the image. When you open a digital-
camera photo or a newly scanned image in Photoshop, it exists as a single layer known as the
Background layer. You can add new layers on top of the Background layer as you work.
Layered Photoshop files act like several images combined into one. Each layer of an image has
its own set of pixels that you can move and transform, independently. Most commands affect
only the layer that you select. For example, if you click and drag with the Move tool, the
selected layer moves while the other layers stay in place. In order to perform most actions in
Photoshop you need to have at least one layer selected.
Start
P M P U B L I S H E R S PVT. LTD.
66
This project deals with creating and rearranging the layers to make a collage, which contains
one picture of frame and three different pictures of flowers.
Note: These pictures may vary from your pictures.
CREATING AND ADDING LAYERS
You can create separate layers and add objects in them which keep them independent from
one another.
1. Open an image of Frame.
Any image opened in Photoshop
appears as the background which is
locked because it is like the canvas
on a painting. You can create new
layers on top of a Background layer.
To unlock it, you need to convert the
background to a layer. You can do
this either by double-clicking on the
background layer in the Layers
Lock palette and renaming the layer or by
sign
simply clicking on the Lock sign and
then renaming the layer.
Layers Tab
Layer Mode Menu
Layers Filter
Opacity
Fill Opacity
Layer’s Eye
Icon Layers Panel Stack
IT P L A N E T - 7 (GIGABYTE)
Add Adjustment Layer
Layer Effects
Layers Group
Link
Delete Layers
Add Layer Mask Create New Layer
Layers Tab: It is used to move the Layers dialog panel around the Photoshop work area.
Layers Filter: It enables you to hide layers based on different things. There are so
many types of layers like a normal layer, adjustment layers, etc. You
can filter the similar types of layers with this.
Layer Mode Menu: It has many options to change the appearance of a selected layer.
Opacity: It is used to change the transparency of a selected layer, where 0 is 67
total transparency and 100 is no transparency.
Fill Opacity: It adjusts the amount of opacity of the pixels only, but layer styles
remain unaffected and remain 100% opaque.
Layer’s Eye Icon: When you click on the Layer’s eye icon, the layer image along with the
eye icon will disappear. Click again on the layer’s eye icon to make the
image as well as the eye icon appear again.
Layers Panel Stack: All the working layers are displayed here.
Link: It enables you to link layers which will move together unless unlinked.
Layer Effects: It applies effects like a shadow, outer glow, etc. to your image layer.
Add Layer Mask: It adds a layer mask to the currently selected layer which allows you
to paint the parts of your layer without damaging your original image.
Add Adjustment Layer: It allows you to do basic adjustments like brightness, contrast,
saturation, photo filter, color balance, etc.
Layers Group: It creates a new layer group to add the layers in it.
Create New Layer: It creates a new layer and add the images in it.
Delete Layers: It will delete the selected or active layer from the Layers panel.
Photoshop creates a
new, transparent layer.
68
Adding an Image in the Layer
You can add contents to the new layer by copying and pasting from another image.
3 1. Open another image.
The image appears in a
4 new window of
Photoshop.
You can resize the image
according to your frame.
2. Using a selection tool,
2 select the content you
want to copy in other
image.
3. Click on Edit. The Edit
menu will appear.
4. Click on Copy.
IT P L A N E T - 7 (GIGABYTE)
the new layer in Layer
palette.
69
Renaming A Layer
You can rename the layer after adding it. This will help you in identifying it in a better way or
managing many layers in a single image.
70
Working with Layers
After adding the layers, you can do many tasks with the layers.
These tasks may or may not be used in the project.
HIDING A LAYER
You can hide a layer to temporarily remove elements in that layer from view.
1. Select a layer (Rose).
2. Click on the Eye icon
[ ] of the layer.
1 The eye icon disappears.
2
MOVING A LAYER
You can move a layer by using Move tool to reposition the element in one layer without
moving those in the other.
IT P L A N E T - 7 (GIGABYTE)
2 1. Select a layer.
2. Click on the Move
tool.
3. Click and drag inside
the window.
Content in the selected
layer moves. Content in
1 the other layers remains
in the same location.
71
DUPLICATING A LAYER
By duplicating a layer, you can manipulate elements in an image while keeping a copy of their
original state.
1. Select a layer.
2. Click and drag the
layer to create a New
layer button [ ].
Or, you can click Layer
menu and then Duplicate
1 Layer in which a dialog
box will appear for you
to give a name to the
layer.
You can also press Ctrl +
J to duplicate the layer.
2
Photoshop duplicates
the selected layer.
You can see that the
layer has been
duplicated by
selecting a new layer.
To check, click on the
Move tool and drag
the layer.
DELETING A LAYER
You can delete a layer when you no longer needed it.
P M P U B L I S H E R S PVT. LTD.
1. Select a layer.
2. Click Delete layer
icon.
A confirmation box may
appear.
3. Click on Yes.
1
Photoshop deletes the
selected layer, and the
content in the layer
disappears from the
72 image window.
2
REORDERING A LAYER
You can change the stacking order of layers to move elements forward or backward in your image.
1. Select a layer.
2 Click and drag the
layer to change its
arrangement in the
stack.
In this example, the rose
layer which is on the top
order will come under
Yellow Flower.
1
IT P L A N E T - 7 (GIGABYTE)
1. Select a layer.
The default opacity
is 100%.
73
2. Type a new value in
the Opacity field.
Alternatively, you
can click side arrow
button and drag the
slider.
2 Layer opacity can be
changed from 1% to
100%.
The Layer changes
its opacity.
FLATTEN LAYERS
Flattening layers combine all the layers of an image into one.
2
P M P U B L I S H E R S PVT. LTD.
74
MERGE LAYERS
Merging layers can let you permanently combine information from two separate layers.
2 1. Click on a layer to
select.
This layer should be the
top layer which you
want to merge with
other layers.
2. Click on Layer
menu.
The Layer menu will
1 open.
3. Click on Merge
Down.
Rotate a Layer
2 1. Click on a layer to
select.
2. Click on Edit menu.
3. Click on Transform.
4. Click on Rotate.
3 1
4
76
Scale a Layer
2 1. Click on a layer to
select.
2. Click on Edit menu.
3. Click on Transform.
4. Click on Scale.
3
1
4
IT P L A N E T - 7 (GIGABYTE)
image.
77
BLENDING MODES
You can use Photoshop blending modes to specify how pixels in a layer should blend with the
layers below. You can blend layers to create all kinds of visual effects in your photos.
Photoshop has many blending modes. Selecting a blending mode changes the appearance of
the layer or image, based on the layer or layers beneath it. If there is only one layer, the layer
mode has no effect. Therefore, must be at least two layers in the image to be able to use layer
modes.
Some Blending Modes
Normal: By using this mode, nothing much happens; normal image will appear.
Dissolve: By using this mode, a black layer under image enables us to see the effect.
Lighten only: By using this mode, image becomes lighter.
Screen: By using this mode, light will boost in image.
Dodge: By using this mode, image becomes brighter and is funky.
Addition: By using this mode, image becomes brighter.
Darken only: By using this mode, image becomes darker.
Multiply: By using this mode, image darkens but often preserves can burn out.
Overlay: By using this mode, brightness and contrast will be added in an image.
Soft light: By using this mode, a soft brightness and a contrast add to an image.
Hard light: By using this mode, image becomes brighter and adds hard contrast.
1. Click on a layer to
select.
2. Click on Mode drop-
down menu to choose a
blend mode.
3 3. Click on any blending
mode (Hard light).
2
1
P M P U B L I S H E R S PVT. LTD.
78
FINALIZING THE PROJECT
By using the different tools like
scaling, moving, etc., you can adjust
the picture in the frame as per the
project.
IT P L A N E T - 7 (GIGABYTE)
position of the flare in the picture.
6. Click and drag the Brightness slider to control the amount of
brightness added in the flare.
You can select the Lens Type option to change the look of
flare.
6
7. Click on OK.
79
After applying the filter,
your given project is
now complete.
Finish
E xe r c i s e s
A. Tick [] the correct answer.
1. When you open an image in Photoshop, it appears as a ................... layer in Layer Palette.
a. Foreground b. Background c. Upward
2. You can hide a layer to ......................... remove elements in that layer from view.
a. Temporarily b. Permanently c. Suspend
3. ......................... layer will not display when you print or use the Save for Web command.
a. First b. Last c. Hidden
4. ............................ tool is used to change the size of an image.
a. Rotate b. Scale c. Merge
5. ......................... a layer allows you to keep the rest of your image unchanged.
a. Transforming b. Merging c. Stacking
IT P L A N E T - 7 (GIGABYTE)
B. Write ‘ T ’ for True and ‘ F ’ for False statements.
1. Layered Photoshop files act like several images combined into one.
2. You cannot combine, duplicate, and hide layers in an image.
3. You can delete a layer when you no longer needed it.
4. Merging layer stretches and squeezes area of your image.
5. Photoshop Image editor has one blending mode.
C. Fill in the blanks.
1. ......................... are the key components to work with graphic objects in Photoshop.
2. ......................... layers combine all the layers of an image into one.
3. By decreasing the ......................... of a layer, its transparency increases. 81
4. ......................... modes specify how pixels in a layer should blend with the layers.
5. ......................... a layer changes the stacking order of layers to move elements forward or
backward.
D. Differentiate between the following.
Reorder Layer Flatten Layer
................................................................ .................................................................
................................................................ .................................................................
................................................................ .................................................................
E. Answer in 1-2 sentences.
1. What is Layers dialog panel?
....................................................................................................................................................
....................................................................................................................................................
2. What is the use of renaming a layer?
....................................................................................................................................................
....................................................................................................................................................
3. What is the use of hiding a layer?
....................................................................................................................................................
....................................................................................................................................................
4. What do you mean by transforming a layer?
....................................................................................................................................................
....................................................................................................................................................
F. Answer Briefly.
1. What are Layers? Write their function in Photoshop.
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
2. What do you mean by blending modes of layer?
....................................................................................................................................................
P M P U B L I S H E R S PVT. LTD.
....................................................................................................................................................
....................................................................................................................................................
G. Application Based Question.
Rahul’s teacher asked him to create an image of flowers in different layers and then combine all
the layers of the image into one. Rahul is unable to do so. Tell him the option.
...........................................................................................................................................................
Group Discussion
Discuss the importance of Layers in Image editing software like GIMP or Photoshop.
82
Online Link
To learn more about working of Layers & Filters in Photoshop, visit the website:
https://photoshopcafe.com/tutorials/layers/intro.htm
Activity Section
Lab Activity
Create the following in Photoshop.
a. Open an image of sky in Photoshop. (Image 1)
b. Create a new layer by clicking on New layer icon and
rename it as Gas Balloon.
c. Open an image of Balloon. (Image 2)
d. Use any selection tool and select the Balloon from Image 2.
e. Click on Copy from the Edit menu.
f. Now, come back to Sky image (Image 1) and select the Image 1
Layer (Gas Balloon).
g. Click on Paste from the Edit menu. The selected balloon
appears on the layer. (Image 3)
Image 2
Image 3
h. Click on Eye icon of balloon layer to hide it. (Image 4)
i. Duplicate the layer of Gas Balloon. (Image 5)
j. Rotate the balloon. (Image 6)
k. Blend the layer (Burn blend). (Image 7) Image 4
IT P L A N E T - 7 (GIGABYTE)
Technology Trailblazers
Thomas Knoll
Topics Covered
• Internet •Protecting Yourself from Potential Threats on Web •Role of Parents and Teacher
Internet
Internet, also called Net, is one of the largest networks that links millions or
trillions of computers all over the world. You can access this network via INTERNET
communication devices and media such as modems, cables, telephone lines,
and satellites. Through the Internet, the society has the access to
information from all around the globe. The Internet enables you to read the
latest news, do research, shop, communicate, listen to music, play games,
and access a wide variety of information.
Internet has truly revolutionized the means of communication. Any person
who gets connected to the Internet gets connected to you. You can
communicate with anyone on the Internet. It touches the lives of everyone.
SPYWARE
P M P U B L I S H E R S PVT. LTD.
Spyware is a software program that gets installed on your computer without your knowledge
or consent. It can be downloaded from Websites, email messages, instant messages and direct file-
sharing connections. It can also enter in your computer while installing a software. This program
secretly gathers data from your computer, steals your passwords, displays advertisements, and
takes control of your web browser.
Precautions
! Use an Internet security program to protect computer from spyware and other security risks.
! Install a personal firewall (software that protects network resources from outside intrusions).
! Do not accept or open any doubtful error dialogs from within the browser.
84 ! Do not accept free deals because Spyware may come as a part of "free deal" offer.
! Always carefully read the End User License Agreement (EULA) at installation time and
cancel if other “programs” are being installed as part of the desired program.
POPrUP AD
Pop-up Ad is a sort of advertisement that disturbs your web browsing by appearing in a
separate browser window on top of (over) your current window. Pop-ups are irritating and may
also be dangerous because clicking items in the pop-up window can cause spyware or viruses
to be installed on your computer.
Precaution
! You can use a pop-up blocker to block pop-up ads in the browser.
SPAM
Email spam is also known as junk mail. It involves sending unwanted messages by spammer to
a large number of recipients. It can be used to deliver emails that contain viruses and targeted
attacks aimed at obtaining sensitive, personal identification information. Also, some spam may
include hidden text that becomes visible only if you highlight the content; it is a common trick
that spammers use to get their email to pass through spam filters without detection.
Precautions
! Sign up for email filtering through your ISP, or use an anti-spam program.
! Do not click links in spam or reply to spam for any reason.
! If you suspect an email is spam, do not respond, just delete it.
! Keep your security software up-to-date.
PHISHING
Phishing is a scam in which you will receive an official or legitimate looking email message that
attempts to obtain your personal and/or financial information. These messages look legal and
request you to update your credit card numbers, bank account numbers, passwords, or other
private information. Phishing scams can be executed via email messages, websites, and even
on the phone.
Precautions
! If you receive an email message from someone requesting you to verify online account or
financial information, do not reply with this information.
IT P L A N E T - 7 (GIGABYTE)
! If you receive a phone call from someone claiming to be from a legitimate company or
bank, record caller name and the time of the call. Do not disclose personal or financial
information to the caller.
! Never click on links in email messages, even if you know the sender.
! While visiting a bank’s website, that will require you to enter confidential information, be
sure to type the web address correctly. Typing it incorrectly may take you to a phishing
website where the information you enter can be collected by an unknown party.
! Enable phishing filter in your browser that can warn or block you from suspicious websites.
VIRUS
Viruses are programs which are created deliberately to damage data. A virus can badly affect 85
or infect your computer without your knowledge. Once a virus is in your computer, your files
and operating system may be damaged. Viruses usually enter into your computer when you
open an email attachment or download the data from Web.
Precautions
! Open only those email attachments that come from trusted sources and are expected.
! Delete all unwanted emails without opening.
! Do not click on Web links sent by someone you do not know.
! Install an antivirus program and keep it updated.
! Scan all files with an antivirus program before transferring them to your system.
KEYLOGGERS
A keylogger (keystroke logging) is a type of software that gets installed very easily and often
found on public computers. It records keystrokes you make to enter the data in the computer
in a hidden file.
Precautions
! Avoid checking your email or performing banking activities on public computers. These
computers may be running keyloggers, which record keystrokes in a hidden file and other
tracking software.
! If you use a public computer for critical activities, be certain to sign out of any password-
protected website and to clear the browser history.
SAVED PASSWORD
When you add User name and Password login your account in a particular website, web
browser sometimes displays a prompt message that offers to remember the password you
have written. If you click on ‘Yes’ and then access the website in future, the web browser
bypasses the login page and takes you directly to the site. Therefore, anyone who uses your
computer can also access your account from the site.
Precaution
! Always click on ‘No’ when your Web browser prompts to remember the password.
COOKIES
A cookie is a small text message that a web browser stores on your computer to keep track of
websites. Cookie files typically contain data about you, such as your user name, postal code,
P M P U B L I S H E R S PVT. LTD.
Precautions
! Some websites sell or trade information stored in your cookie to advertisers. If you do not
want personal information distributed, you should limit the amount of information you
86 provide to a website or adjust how your browser handles cookies.
! Clear or disable cookies in your browser. Most modern browsers allow users to decide
whether to accept cookies and the time frame to keep them. However, rejecting cookies
makes some websites unreadable.
VULNERABILITIES
Vulnerabilities are flaws in computer software that weaken overall security of your computer.
It can also be created by improper computer or security configurations. Cybercriminals like
hackers or crackers exploit the weaknesses and damage the computer or tamper its data.
Precautions
! Keep software and security patches up-to-date.
! Configure security settings for your operating system and Internet browser.
! Install an antivirus and keep it updated to block threats targeting vulnerabilities.
! Clear cookies (small text files that web servers store on a computer) in your browser.
CYBERBULLYING
Cyberbullying is harassment that takes place using technology which includes sending or
forwarding threatening text messages, posting embarrassing or altered pictures of someone
without his or her permission, or setting up a fake online social network page where others
make harsh comments and spread rumors about someone. Cyberbullying has become common
among teenagers.
Precautions
! Never give your personal information and password to any unknown person. He/she can
use this information to harass you.
! Check for privacy settings, usually found on the Settings on most social networking sites,
to set permissions. So, you can control who can review your profile and photos, make
comments, and if desired, block certain people from viewing your page.
! You should search your name on major search engine such as Google on regular basis. If
any personal information or photo appears which may be used for cyberbullying, you must
take an action to remove it and be safe.
! Installation of filtering software on the computer can protect teenagers from viewing
inappropriate content online.
IT P L A N E T - 7 (GIGABYTE)
HACKING
The term hacker refers to someone who accesses a computer or network illegally. This is
known as hacking. This can happen either for positive or negative reasons. Some hackers claim
the intent of their security breaches is to improve security (positive). Other hackers develop
computer malware or virus to gain access to confidential information (negative). A cracker is
someone who also accesses a computer or network illegally, but has the intent of destroying
data, stealing information, or other malicious action. Both hackers and crackers have advanced
computer and networking skills.
Precautions
! You should make a strong password and change it frequently. Your password should be at
least six characters long and include at least one number, letter (combination of upper and 87
lower cases) and special character (@, *, &, !, etc.). Your new password should be different
from any other passwords you have used. It is strongly advised that you use different
passwords for different accounts.
SOCIAL ENGINEERING
Social engineering is a term used for gaining unauthorized access or obtaining confidential
information by taking advantage of the trusting human nature of some victims. It is the art of
convincing people to reveal confidential information, such as user names and passwords, on
the phone, in person, or on the Internet. Human nature of trust is the basis of any social
engineering attack.
Social engineers depend on the fact that people are unaware of their valuable information and
are careless about protecting it. They obtain information from users who do not destroy or
conceal information properly.
Phases in a Social Engineering Attack
! Research on the Target (person or a company)
From websites, employees, tour company, etc.
! Select the Victim
Identify the frustrated employees of the target company.
! Develop Relationship
Develop relationship with the selected employees.
! Exploit the Relationship
Collect sensitive and financial information, and get aware of current technologies.
Precautions
! Verify the identity of the person or organization requesting personal or confidential
information.
! While relaying personal or confidential information, ensure that only authorized people can
hear your conversation.
! When personal or confidential information appears on a computer or mobile device, ensure
that only authorized people can see your screen.
! Shred all sensitive or confidential documents.
P M P U B L I S H E R S PVT. LTD.
DIGITAL FOOTPRINT
Everytime you surf the Internet, you leave a trail behind, known as digital footprint. Whatever
activity you perform on the Internet such as checking mails, filling forms, online banking,
buying and selling things, and posting on social networking leave traces of your personal
information online. This information can be seen by other users.
Open the history section of your web browser, and you can see all the websites you have
88 visited in the past. Everyone who uses the Internet has a digital footprint, so it is not
something to be worried about. However, it is wise to consider what trail of data you are
leaving behind.
Precautions
$ Keep your privacy settings as high as possible.
$ Never post personal information such as home address, telephone number, and parents’
office address.
$ Never upload inappropriate picture or videos.
$ Never post inappropriate matter about any person because your post is public.
$ If you see something online that makes you feel uncomfortable, unsafe or worried, leave
the website and turn off your computer. If you want, tell a trusted adult (your parents)
immediately.
$ When you use a public computer, make sure you logout of the accounts, you have
accessed, before leaving the computer.
$ Parents and Teachers should advise children to play only those online games which are
suitable for their age.
$ Parents and Teachers should advise children that most social networks are not suitable for
children under 11-12 years of age.
$ Parents and Teachers should be part of the children’s online life. At the same time, they
should gain their trust as far as the use of Internet is concerned.
$ Parents and Teachers should advise children not to share any personal information to any
unknown person.
$ Parents and teachers should make such environment at home and at school so that
children can discuss their internet related problems openly, without hesitation.
$ Parents and Teachers should advise children to create a strong password for every account
IT P L A N E T - 7 (GIGABYTE)
(such as email account) and keep on changing password after a certain period of time.
Most importantly, never share it with anyone.
$ Internet has many objectionable material, such as violence and obscene photos. Parents
and Teachers should use content filtering to restrict access of minors to inappropriate
sites.
E xe r c i s e s
A. Tick [ ] the correct answer.
1. A software that installs on your computer without your consent is ......................... .
a. Cookies b. Spyware c. Keyloggers
2. …………… are irritating while web browsing and can also cause viruses on your computer.
a. Antivirus b. Pop-up Ads c. Vulnerabilities
3. ….....… is a small text message that a browser stores on computer to keep track of Website.
a. Virus b. Cookies c. Junk
4. …………… is harassment that takes place using technology.
a. Cyberbullying b. Vulnerabilities c. Pop-up Ad
5. ……….. is the art of convincing people to reveal confidential information.
a. Phishing b. Spam c. Social engineering
1. Internet is one of the largest networks that links millions or trillions of computer.
2. Never click on links in email messages, even if you know the sender.
3. Vulnerabilities are flaws in computer software that weaken the security of computer.
4. Spam involves sending important messages to a large number of recipients.
5. You should click on ‘yes’ when your web browser asks to remember the password.
6. Hacking is the art of convincing people to reveal confidential information.
C. Fill in the blanks.
1. ..................... are the programs which are created deliberately to damage data on the Web.
2. .................. records keystrokes you make, to enter the data in the computer in a hidden file.
90
3. .......................... refers to someone who accesses a computer or network illegally.
4. Everytime you surf the Internet, you leave a trail behind, known as .................................
D. Differentiate between the following.
1. Spam Phishing
................................................................. .................................................................
................................................................. .................................................................
2. Hacker Cracker
................................................................. .................................................................
................................................................. .................................................................
E. Answer in 1-2 sentences.
1. What is cyberbullying?
....................................................................................................................................................
....................................................................................................................................................
2. What is Social Engineering?
....................................................................................................................................................
....................................................................................................................................................
F. Answer Briefly.
1. How can we protect our computer from Hacking?
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
2. Why should we not save password of account in a particular website?
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
3. Write any two roles of parents and teachers in protecting the children in the virtual world.
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
G. Application Based Question.
IT P L A N E T - 7 (GIGABYTE)
Your teacher wants you to read this scenario and tell the answer:
"A man calls in the company's help desk and says that he has forgotten his password. He
further adds that if he missed to send an urgent mail by the evening, his boss might fire him.
The help desk worker trusts him and quickly reveals/resets the password. "
Under which potential threat can this come?
............................................................................................................................................................
Group Discussion
Divide the students into two groups and discuss the topic, ‘Is online piracy inevitable’?
Online Link
91
To learn more about Ethics of Internet, visit the website:
https://www.teachthought.com/the-future-of-learning/11-tips-for-students-tomanage-their-digital-
footprints/
Activity Section
Activity Write
Write ‘ E ’ for Ethical and ‘ U ’ for Unethical statements.
1. An employee uses his computer at work to complete his personal assignment.
2. A student copies text from the web and uses it in a research paper for his English subject.
3. An employee makes a copy of software and installs it on his/her home computer.
4. An employee who has been laid off installs a computer virus on his employer’s computer.
5. Someone reads a well-known novel on the web and encourages others to read it.
6. Your friend uses a neighbor’s wireless network to connect to the Internet and check email.
7. A student only does research using the web and write his own report.
8. Your friend downloads your picture from Internet and uses it on social networking.
Discover More
Biometric Devices
A biometric device authenticates a person’s identity by translating a personal characteristic, such as a
fingerprint, into a digital code that is compared with a digital code stored in a computer verifying the
physical characteristic. If the digital code in the computer does not match the personal characteristic
code, the computer denies access to that person. Some of the popular biometric devices are fingerprint
reader, face recognition system, hand geometry system, voice verification system, signature verification
system, iris recognition system, and retinal scanner.
Fingerprint Reader: A fingerprint reader captures curves and indentations of a
fingerprint. Some laptops, smartphones, and smartwatches have a built-in
fingerprint reader. Using their fingerprint, users can unlock the computer or
device, or sign in to programs instead of entering a user name and a password.
P M P U B L I S H E R S PVT. LTD.
Hand Geometry System: A hand geometry system measures the shape and size
of a person’s hand. This is mainly used in companies to track workers’ time and
attendance, and to verify their identities.
92
Iris Recognition System: The iris recognition system reads patterns in the iris of the
eye which is as unique as a fingerprint. These are quite expensive and are used by
security organizations, and banks that deal with highly sensitive data.
7 H T M L - Introduction
Topics Covered
• Introduction to HTML •HTML5 •Text Editors •Web Browser for HTML5
Introduction to HTML
Today in this world of computers, you can download any information
or document containing text, sound, graphic, or video through the
Internet, with the help of a web browser. Web browser is a
software that enables a computer to display any type of document
or information present on the Internet.
Do you know, how these documents are displayed on the Internet? These web documents are
written in a special language which is popularly known as HTML.
HTML (HyperText Markup Language) is a language which is used to make web pages to be
displayed on the Internet. HTML documents are made up of text content and special codes
known as tags that tell web browsers how to display the content. It also provides the means
to link the Web pages. HTML documents are identified by their .html or .htm file extensions.
You can display HTML documents on any type of computer platform (operating system), such
as Windows, Mac OS and Linux. You do not have to create separate HTML documents for
different types of platforms. These documents are generally of small size and can transfer
quickly over the web.
HISTORY OF HTML
HTML was developed by Tim Berners Lee in early 1990s. HTML has gone through several
versions, each of which expands its capabilities. Although most browsers still support HTML
versions 3.2 and 2.0. Version 4.01 includes rules for using more than 90 HTML tags. It is an
improvement of previous versions by adding better support for multimedia and style sheets.
The most recent version of HTML is HTML5. This version includes rules for using more than
IT P L A N E T - 7 (GIGABYTE)
100 different HTML tags. HTML5 succeeds HTML 4.01, which was released in 1999. This
version offers new features for creating web pages.
HTML5
HTML5 is the new standard for HTML. It is an improvement of previous versions by including
new tags for defining common types of page content, better support for audio and video, and
drawing capability. It is designed to deliver almost everything you want to do online without
requiring additional plugins.
With HTML5, web pages can store data locally within the user’s browser, also known as Local
Storage. Earlier, this was done with cookies. However, web storage is more secure and faster.
The data is not included with every server request, but used only when asked for. 93
HTML5 is also cross-platform, that is, it works on Tablets, or Smartphones, Notebooks, or a
Smart TV. Major browsers like Safari, Chrome, Firefox, Opera, and Internet Explorer support
HTML5 features.
FEATURES OF HTML5
1. HTML5 is not a case sensitive language. This means that HTML5 commands can either be
written in Lower Case or in Upper Case.
2. Spaces and tabs can be used anywhere in the document because it doesn't affect the
appearance of the document.
3. HTML5 document is saved with .htm or .html file extension.
4. HTML5 document is written in text editors like Notepad and Gedit, and word processors
like WordPad, MS-Word, and Writer.
! Empty Tags: Tags that have only a starting, and there is no need to close them (using </>)
are known as Empty tags.
For example <BR> Starting Tag (opening tag)
<BR> Minhas Web Page
P M P U B L I S H E R S PVT. LTD.
SEMANTIC TAGS
HTML5 includes various semantic tags that enable you to describe the different parts of your
web page.
DOCTYPE: The DOCTYPE declaration at the beginning of your page specifies that the document
is written in HTML5. In HTML5, the DOCTYPE declaration is required.
NAVIGATION: The <nav> tag is used to define important navigational links to other pages on
your site.
94 HEADER: The <header> tag can be used to define introductory information like site names,
company names and logos, and slogans. <header> tag appears at the very beginning of the
body of a web page.
FOOTER: A <footer> tag is used to put copyright information, a contact address, and other small-
print items on a page. It typically goes at the end of your page, before the closing
</body> tag.
SECTION: A <section> tag offers a generic way of grouping related information on a web page.
ARTICLE: The <article> tag is for defining a self-contained information on a web page.
ASIDE: You can mark information on your page as tangential to the main content with the
<aside> tag. The <aside> tag is useful for defining pull quotes, glossary terms, or sets of links
related to an article.
CANVAS: The <canvas> tag enables you to define a blank drawing area on your web page on
which you can create shapes, draw straight and curved lines, apply color, and even add images
within the area.
AUDIO AND VIDEO: HTML5 offers a new <video> tag for embedding video clips into your web
pages and an <audio> tag for integrating sound.
HTML ATTRIBUTES
Some tags have attributes that offer options for the tag. Most attributes work by setting a
numeric or descriptive value. Attributes always go inside the opening HTML tag, and it is a
good form to enclose attribute values in quotation marks (“ ”). Some tags use attributes, such
as the <FONT> tag has a COLOR attribute that allows you to change the color of text.
<FONT COLOR=“#0000FF”>
Some tags do not need attribute like <BR> tags.
ENTITIES
Entities are the special characters such as a copyright symbol or a fraction that you can add
to a web page by using special codes. Entities represent characters not readily available on the
keyboard. All entities are preceded by an ampersand (&) and followed by a semicolon (;). For
example, the code © adds copyright symbol (©) to your web page.
IT P L A N E T - 7 (GIGABYTE)
You should always check your code to avoid HTML errors. Make sure your tags have brackets,
closing tags include a slash, and attribute values are surrounded by quotation marks. Multiple
HTML tags should be properly nested; it means your closing tags should be in the reverse
order of the opening tags. For example:
<P ALIGN=“center”><B>Minhas Web Page</B></P>
Always consider using new lines to type code, instead of running everything together in one
long line. It will make your HTML readable. Doing so will not affect how your page is displayed
because web browsers ignore extra white space.
RENDERING HTML
When a browser displays a web page, it retrieves the HTML file for that page from a local 95
storage or server, reads the HTML tags to determine how the content should be formatted,
and displays the page. The HTML tags tell the browser what images, video, audio, and other
content need to be downloaded and integrated into the page.
Text Editors
HTML documents are plain-text documents, so you can use any text-editing program to code
HTML and create a web page. A text editor is a program that allows a user to enter, change,
save and print text, such as Notepad. Text editors do not have many advanced features, but
they do allow you to develop HTML documents easily. Microsoft Windows comes with
Notepad, Apple Mac computers come with TextEdit, and Ubuntu comes with Gedit. These
three are well known simple text editors.
96
CHECKLIST
Self-Evaluation
After reading the chapter, I know these points:
$ I know that HTML was developed by Tim Berners Lee in early 1990s.
$ I know that HTML5 is a computer language used to create web pages.
$ I know that HTML5 is designed to deliver almost everything we want to do online
without requiring additional plugins.
$ I know that HTML5 consists of text with special instructions known as tags, which
are of two types—Container tags and Empty tags.
$ I know that web browser is a software that enables a computer to display any type
of document or information available on the Internet.
E xe r c i s e s
A. Tick [ ] the correct answer.
1. The language used to make web pages is ................................ .
a. QBASIC b. HTML c. Scratch
2. The file extension by which HTML files are identified is ................................ .
a. .html b. .exe c. .hmt
3. The program used to code HTML and create web pages is ................................ .
a. Text Editor b. Text Writer c. Text Reader
4. The text with special instructions in HTML is called ................................ .
a. Syntax b. Tag c. Command
5. The software that displays the resulting web pages is ................................ .
a. Web Explorer b. Web Browser c. Website
6. The sign used for closing a tag is ................................ .
a. / b. \ c. *
IT P L A N E T - 7 (GIGABYTE)
fl. Write ‘ T ’ for True and ‘ F ’ for False statements.
1. HTML5 is not case-sensitive language.
2. HTML document can contain both text and graphics.
3. Notepad is a text editor to create a web page.
4. <\HTML> is an opening tag of an HTML document.
5. Apple Safari, Mozila Firefox and Opera are examples of a web browser.
C. Fill in the blanks.
1. HTML was developed by ……………........…………. in early 1990s.
2. HTML stands for ............................................................................................................... .
97
3. HTML5 is ……………........…………. because it works on Tablets, or Smartphones, Notebooks.
4. The specific instructions given by each tag is enclosed by ........................................... .
5. ............................. are preceded by an ampersand (&) and followed by a semicolon (;).
D. Differentiate between the following.
Container Tag Empty Tag
................................................................. .................................................................
................................................................ .................................................................
................................................................ .................................................................
................................................................ .................................................................
E. Answer in 1-2 sentences.
1. What is HTML?
......................................................................................................................................................
......................................................................................................................................................
2. What are semantic tags?
......................................................................................................................................................
......................................................................................................................................................
3. What do you mean by DOCTYPE?
......................................................................................................................................................
......................................................................................................................................................
4. What do you mean by Attributes?
......................................................................................................................................................
......................................................................................................................................................
F. Answer flriefly.
1. What are the main features of HTML?
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
2. How will you avoid syntax error while writing an HTML code?
......................................................................................................................................................
......................................................................................................................................................
P M P U B L I S H E R S PVT. LTD.
......................................................................................................................................................
G. Application flased Question.
Rahul is surfing the Internet, and he is on a gaming web page. As he knows that web page is
created with HTML, he wants to see the HTML programming of that web page. Can he do that?
............................................................................................................................................................
............................................................................................................................................................
Group Discussion
Divide the students into groups and discuss the topic, ‘HTML 4.0 vs HTML 5.0’.
98
Online Link
To learn more about working of HTML, visit the website:
https://www.computerhope.com/jargon/h/html.htm
Activity Section
Activity Quiz
Reema and Kavita are playing a quiz on computer software. Help Kavita answer all the
questions correctly.
Reema: Hi Kavita! Do you know about HTML?
Kavita: Yes Reema! Our teacher told us about HTML language yesterday.
Reema: Great! Then let’s play a quiz. I will give you clues and you will guess the correct answers.
Kavita: It will be fun! Let us start the quiz quickly.
Reema: He developed HTML in this year.
Kavita: I have guessed it. He is ......................................... who developed HTML in .......................... .
Reema: Now, the second one. It is the latest version of HTML which succeeded this version.
Kavita: It is .................................. which succeeded ........................... .
Reema: OK! Next question for you. It consists of text with special instructions enclosed within <>.
Kavita: It is called a ........................................................ .
Reema: Now answer this. Two categories of tags.
Kavita: These are called ....................................................................................................... .
Reema: Great! Now answer this. It provides more options for the tags.
Kavita: It is called an ............................................................................ .
Reema: Wonderful, next one. These are three well-known simple text editors to write HTML code.
Kavita: They are ..............................................................................
.................................................... .
Reema: Now, the last one for you. A software used to display the
result of web page.
Kavita: It is called a ............................................................................ .
Technology Trailblazers
Steve Jobs IT P L A N E T - 7 (GIGABYTE)
HTML5
HyperText Markup Language (HTML) is a computer language used to create web pages. This
chapter will show you how to get started with a basic HTML5 document.
paragraphs, lists, tables, images, canvases and video, resides in the body of your
HTML document. The body of the document is identified by the <body> and
</body> tags. The body of a document comes after the head of a document.
IT P L A N E T - 7 (GIGABYTE)
the web page name.
A web page name can have
letters and numbers, but no
spaces. The main web page is
usually named index.htm.
5. Navigate the folder where
you want to save the page.
6. Click on Save as type: box to
4
6 see a list of the ways by
which you can save the web
7 page.
7. Click on Text Documents. 101
8
8. Click on Save.
Notepad saves the page.
Basic HTML Tags
You use sets of HTML tags to define the basic structure of your page. HTML tags control the layout
and formatting of the elements in HTML. These tags are the building blocks of HTML. Some basic
HTML tags <HTML>, <HEAD>, <TITLE>, and <BODY> that you must add to every web page you create
are discussed below.
HTML TAGS
The first set of tags after the <!DOCTYPE html> tag, <HTML> and </HTML>, indicates the start
and end of an HTML document.
<!DOCTYPE html>
<HTML> 1 below the
A computer is an electronic machine that works under the instructions given <!DOCTYPE
by you. It can accept data (input), manipulate the data according to specified html>.
rules (process), produce results (output), and store the results for future use. 2. Type </HTML> at
Today, in the age of electronic revolution computers have become integral the end of the
part of our life. We can say that computers have entered each and every
entire text on the
walk of life either it is home, at work or at school. Most of our daily activities
either involve the use of or depend upon the information derived from a web page.
computer. These tags declare
Many schools, colleges and homes have computers for educational the document as
purposes. Students complete assignments and do research on computers in
lab rooms. Computers have become a source of entertainment. You can play
HTML.
games, listen to music, watch a video or a movie, read a book or magazine,
102 compose a video, re-touch a photograph, plan a vacation or do many more
things.
</HTML> 2
HEAD TAGS
The next set of tags, <HEAD> and </HEAD>, contains the Web page title and other descriptive
information (metadata) about a web page.
TITLE TAGS
The <TITLE> and </TITLE> tags indicate the title of the Web page. The Title bar or Tab of a
web browser window usually displays the title.
1. Type <TITLE>
<!DOCTYPE html> directly below the
<HTML> <HEAD> tag.
2 3
<HEAD>
2. Type the title for the
1 <TITLE> Computer System </TITLE>
web page, using only
</HEAD>
letters and numbers.
A computer is an electronic machine that works under the instructions
given by you. It can accept data (input), manipulate the data according 3. Type </TITLE>.
to specified rules (process), produce results (output), and store the
results for future use. Title text describes the
Today, in the age of electronic revolution computers have become an contents of the page,
integral part of our life. We can say that computers have entered each and appears in the Title
IT P L A N E T - 7 (GIGABYTE)
and every walk of life either it is home, at work or at school. Most of bar or Tab of the web
our daily activities either involve the use of or depend upon the browser.
information derived from a computer.
Many schools, colleges and homes have computers for educational
purposes. Students complete assignments and do research on
computers in lab rooms. Computers have become a source of
entertainment. You can play games, listen to music, watch a video or a
BODY TAGS
The final set of tags, <BODY> and </BODY>, contains the main content of the Web page. It is a
container element, which includes text, graphics and other elements.
A computer is an electronic machine that works under the instructions above the </HTML>
given by you. It can accept data (input), manipulate the data according tag.
to specified rules (process), produce results (output), and store the
results for future use. This tag closes the body
Today, in the age of electronic revolution computers have become an
portion of the page.
integral part of our life. We can say that computers have entered each Save the file once again to
and every walk of life either it is home, at work or at school. Most of save the changes.
our daily activities either involve the use of or depend upon the
information derived from a computer.
Many schools, colleges and homes have computers for educational
purposes. Students complete assignments and do research on
computers in lab rooms. Computers have become a source of
entertainment. You can play games, listen to music, watch a video or
a movie, read a book or magazine, compose a video, re-touch a
104 photograph, plan a vacation or do many more things.
</BODY> 2
</HTML>
Displaying Web Page in a Web Browser
After creating and saving, the web page can be displayed in the web browser. This will allow
you to see how your web page will appear on the web. Start the web browser to display your
web page.
In this example, we are using Internet Explorer web browser.
1. Press the Alt key from the
2 keyboard to bring the Menu
bar in the web browser.
3 2. Click on File to open File
menu.
3. Click on Open.
The Open dialog box will
appear.
4. Click on Browse in the Open dialog box to locate the web page
on your computer.
4
The Internet Explorer dialog box appears.
IT P L A N E T - 7 (GIGABYTE)
7
105
Do You Know?
You can save the html file on the desktop and double-click on it to open it.
Modifying Paragraph Text
Paragraphs are surrounded by a vertical space of one line. Paragraph tag indicates the starting
of a paragraph in a text. The first line in a paragraph is indented in some browsers.
The web
P M P U B L I S H E R S PVT. LTD.
browser
displays a
blank line
between
each
paragraph.
ADDING A COMMENT
Comment can be added to Web page to write notes meant for you. Besides, it also helps to
update a section of the text and specifies the reasons for using a specific tag. However, these
comments will not appear when readers view your Web page.
IT P L A N E T - 7 (GIGABYTE)
1. Type <!-- where you
<!DOCTYPE html>
<HTML>
want to add a
<HEAD> comment. Then press
<TITLE> Adding Comments </TITLE> the SPACEBAR.
<1/HEAD> 2. Type the comment of
2 3
<BODY> your choice and press
<!-- This Web page is giving the information about Computer --> SPACEBAR again.
A computer is an electronic machine that works under the instructions 3. Type --> to complete
given by you. It can accept data (input), manipulate the data according
the comment.
to specified rules (process), produce results (output), and store the
The horizontal
rule on your
web page is
displayed by
the web
browser.
You can also set a numeric value to set the width of the rule in pixels.
IT P L A N E T - 7 (GIGABYTE)
<PRE> 1
PM PUBLISHERS
Noida
Employee’s Name Salary Date of joining
Karan Kumar 25,000 15-05-2011
Arun Sharma 30,000 20-08-2010
Suman Singh 25,000 01-01-2012
</PRE> 2
</BODY>
</HTML>
<!DOCTYPE html> 1. Type <H?> in front of the text you want to make a
<HTML> heading.
<HEAD> Replace ? with the heading-level numbered from 1 to 6,
<TITLE> Add Headings </TITLE> you want to use.
</HEAD>
2. Type </H?> at the end of the text you want to make a
<BO DY> heading.
1 2
Level one
Replace ? with the heading-level numbered from 1 to 6,
<H1>PM PUBLISHERS</H1>
you used earlier in step 1.
Level two
<H2>PM PUBLISHERS</H2>
Level three
<H3>PM PUBLISHERS</H3> The web
Level four browser
<H4>PM PUBLISHERS</H4> displays each
Level five heading with
<H5>PM PUBLISHERS</H5> a different
Level six heading level.
<H6>PM PUBLISHERS</H6>
</BODY>
</HTML>
</HEAD>
1 2 2. Type </CENTER> at
<BODY> the end of the text
<H1><CENTER>COMPUTER SYSTEM</CENTER></H1> you want to align in
<P>A computer is an electronic machine that works under the instructions the center.
The text is
centered on
the web
page in the
web browser.
110
Update Your Knowledge
Headings are used to set off paragraphs of text or different sections of a page. Headings have larger
font size than normal text and are often bold or italic, or are of different color than normal text.
Formatting Text
HTML provides a number of other tags to format text. These tags fall into two categories:
Logical style tags and Physical style tags.
Logical style tags allow a browser to interpret the tag based on browser settings, relative to
other text on a web page. The <h2> heading tag, for example, is a logical style tag which
indicates that the heading text should be larger than the regular text but smaller than text
formatted using an <h1> heading tag. The <strong> tag is another logical style tag, which
indicates that the text should have a strong emphasis, and for which most browsers interpret
and display the text in bold font.
Physical style tags specify a particular font change that is interpreted strictly by all browsers.
For example, to ensure that text appears in bold font, you would enclose it between a start
<b> and end </b> tag.
IT P L A N E T - 7 (GIGABYTE)
<U>PM PUBLISHERS</U> underlined.
</P>
2. Type </U> at the end of the text.
</BODY>
</HTML>
111
STRIKE, SUBSCRIPT, SUPERSCRIPT, AND TYPEWRITER STYLE TEXT
You can add style to your text to make your page visually appealing.
Strike specifies that the enclosed text should be displayed with a horizontal line striking
through the text. Subscript specifies that the enclosed text should be displayed as a subscript
using a smaller font as compared to the rest of the text. It appears slightly below the normal
text. Superscript specifies that the enclosed text should be displayed as a superscript using a
smaller font as compared to the rest of the text. It appears slightly above the normal text.
Typewriter specifies that the text should be rendered in fixed-width typewriter font.
STRIKE TEXT
<!DOCTYPE html>
<HTML> 1. Type <STRIKE> in front of the text you
<HEAD> want to appear in strikethrough.
<TITLE> Making text Strike, Subscript,
2. Type </STRIKE> at the end of the text.
Superscript and Typewriter </TITLE>
</HEAD>
<BODY> SUBSCRIPT TEXT
<P>Plain text<BR>
PM PUBLISHERS 1. Type <SUB> in front of the text you want to
appear in subscript.
1</P> 2
<P>Strike text<BR> 2. Type </SUB> at the end of the text.
<STRIKE>PM PUBLISHERS</STRIKE>
</P>
SUPERSCRIPT TEXT
1 2
<P> Subscript text<BR> 1. Type <SUP> in front of the text you want to
H<SUB>2</SUB>O appear in superscript.
</P> 2. Type </SUP> at the end of the text.
1
<P>Superscript text<BR>
O<SUP>2</SUP> 2 TYPEWRITER TEXT
</P>
1. Type <TT> in front of the text you want to
1 appear in typewriter.
<P>Typewriter text<BR>
<TT>PM PUBLISHERS</TT> 2 2. Type </TT> at the end of the text.
P M P U B L I S H E R S PVT. LTD.
</P>
</BODY>
</HTML>
The text as
strikethrough,
subscript, superscript,
and typewriter is
displayed by the web
browser.
112
CHANGING THE ALIGNMENT OF HEADING
You can control the horizontal positioning or alignment of your heading by using the ALIGN
attribute.
1. Type <H?> tag for the
<!DOCTYPE html>
<HTML> heading you want to use.
<HEAD> Replace ? with the heading-
<TITLE> Heading align </TITLE> level numbered from 1 to 6,
</HEAD> you want to use.
<B1ODY> 2
Level one Left align 2. In the heading tag, type
<H1 align = left>PM PUBLISHERS</H1> ALIGN=?.
Level two center align Replacing ? with the way
<H2 align = center>PM PUBLISHERS</H2> you wish to align the
Level three right align heading (left, center, or
<H3 align = right>PM PUBLISHERS</H3>
right).
</BODY>
</HTML>
IT P L A N E T - 7 (GIGABYTE)
<HEAD> to change the
<TITLE> Paragraph Alignment </TITLE> alignment.
</HEAD>
<BODY> 2. Add a space and then
<H1 align = center>COMPUTER SYSTEM</H1> ALIGN=“?”, replacing
<P ALIGN=“CENTER”>A 2computer is an electronic machine that ? with Left, Center,
works under the instructions given by you. It can accept data (input), Right or Justify.
When displayed
in a browser,
the text aligns
as specified.
In this example, 113
the line of text is
centered on the
page.
CHANGING FONT OF TEXT
You can change the appearance of your text using the tags <FONT> and </FONT>, along with
the FACE attribute. We should specify more than one font while changing the font, as it comes
handy if one font is missing on a user’s computer, the text can be displayed with another font
you have specified. One of the fonts you specify should be a common font such as Arial, Times
New Roman, etc.
1. Type <FONT FACE=“
<!DOCTYPE html>
<HTML> in front of the text
<HEAD> you want to
<TITLE> Change Font </TITLE> change.
</HEAD> 2. Type the name of
<BODY> 1 2 the font you want
<H1><CENTER>COMPUTER SYSTEM</CENTER></H1>
to use.
<P><FONT FACE=“Comic Sans MS A computer is an electronic machine
that works under the instructions given by you. It can accept data (input),
3. To specify the
<!DOCTYPE html> second font, type a
<HTML> comma (,) and then
<HEAD> press Spacebar from
<TITLE> Change Font </TITLE>
the keyboard. Now,
</HEAD>
type the name of
<BODY> 3 4 second font choice.
<H1><CENTER>COMPUTER SYSTEM</CENTER></H1>
<P><FONT FACE=“Comic Sans MS, Arial”> A computer is an electronic 4. Type ”> to complete
machine that works under the instructions given by you. It ca5n accept the Font tag.
data (input), manipulate the data according to specified rules (process),
produce results (output), and store the results for future use.</FONT></P> 5. Type </FONT> at
<P>Today, in the age of electronic revolution the computer has become the end of the text
you want to change.
P M P U B L I S H E R S PVT. LTD.
As it can be seen, the text is displayed in the font you have specified in the HTML code.
<!DOCTYPE html>
1. Type <FONT SIZE= “?”> in front of the
<HTML> text you want to change to a new font
<HEAD> size.
<TITLE> FONT SIZES </TITLE> Replace ? with the numbers from 1 to 7. The
</HEAD> smallest font size is 1, and the largest is 7.
<BODY> 2. Type </FONT> at the end of the text you
1 2
<p>Font size one<BR> want to change.
<FONT SIZE="1">PM PUBLISHERS</FONT></P>
<p>Font size two<BR>
<FONT SIZE="2">PM PUBLISHERS</FONT></P>
<p>Font size three<BR>
<FONT SIZE="3">PM PUBLISHERS</FONT></P>
<p>Font size four<BR>
<FONT SIZE="4">PM PUBLISHERS</FONT></P>
<p>Font size five<BR>
<FONT SIZE="5">PM PUBLISHERS</FONT></P>
<p>Font size six<BR>
<FONT SIZE="6">PM PUBLISHERS</FONT></P>
<p>Font size seven<BR>
<FONT SIZE="7">PM PUBLISHERS</FONT></P> As it can be seen, the text is displayed in
</BODY> the font sizes you have specified in the
</HTML> HTML code.
IT P L A N E T - 7 (GIGABYTE)
<HEAD>
<TITLE>Text Color</TITLE> the color you want to use.
</HEAD> For example, if you wish
<BODY TEXT= "RED"> 1
to have the text red in
<H1><CENTER>COMPUTER SYSTEM</CENTER></H1>
color then, type: <BODY
<P>A computer is an electronic machine that works under the TEXT= “RED”>
The text
appears in the
designated
color on the
web page.
There are codes assigned to each color. These color codes are in hexadecimal format. There
are 16 colors, which you can specify by name also.
Aqua #00FFFF Black #000000 Blue #0000FF Fuchsia #FF00FF
Grey #808080 Green #008000 Lime #00FF00 Maroon #800000
Navy #000080 Olive #808000 Purple #800080 Red #FF0000
Silver #C0C0C0 Teal #008080 White #FFFFFF Yellow #FFFF00
E xe r c i s e s
A. Tick [ ] the correct answer.
1. The tag that describes the contents of the web page is ........................ .
a. Head Tag b. Body Tag c. Title Tag
2. The text inside the <TITLE> tag is displayed on the ........................ .
a. Menu Bar b. Title Bar c. Status Bar
3. The tag used for starting a new line is ........................ .
a. <BR> b. <HR> c. <MR>
4. ..................... rule or line is used to separate different sections of your web page.
a. Slanting b. Vertical c. Horizontal
5. ........... style tags specify a particular font change that is interpreted strictly by all browsers.
a. Physical b. Logical c. Conceptual
fl. Write ‘ T ’ for True and ‘ F ’ for False statements.
IT P L A N E T - 7 (GIGABYTE)
1. Body tags are used to give the page title.
2. The text you enter in the comment will appear when readers view the web page.
3. Marquee tag is used for scrolling text or image displayed on the web page.
4. Font Size 1 creates the smallest text while Font Size 7 creates the largest text.
5. There are 13 colors in HTML which you can specify by name also.
C. Fill in the blanks.
1. The ........................... declaration at the beginning of web page specifies HTML5 document.
2. ........................ tag is used to add a line break if needed by the browser.
3. To add background color to the web page, .......................... attribute is used in body tag.
117
4. ..................... attribute works with the font tag to change text to any color.
5. .................. tag defines the largest heading, and .................. defines the smallest heading.
6. ..................... can be added to Web page to write notes meant for you.
D. Differentiate between the following.
Physical Style Formatting Logical Style Formatting
................................................................. ...........................................................................
................................................................. ...........................................................................
................................................................. ...........................................................................
................................................................. ...........................................................................
E. Answer in 1-2 sentences.
1. What is HTML?
......................................................................................................................................................
......................................................................................................................................................
2. What is the use of BR tag?
......................................................................................................................................................
......................................................................................................................................................
3. What is the use of Font tag?
......................................................................................................................................................
......................................................................................................................................................
F. Answer flriefly.
1. Which elements are included in the structure of HTML5 document?
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
2. What is the use of MetaData tag?
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
3. What is the use of adding more font names in Font attribute?
......................................................................................................................................................
P M P U B L I S H E R S PVT. LTD.
......................................................................................................................................................
......................................................................................................................................................
G. Application flased Question.
Rishabh created a web page in Notepad (text editor) but he saved it with .txt file extension. His
file is not identified as an HTML file. What should he do now to make an HTML file?
............................................................................................................................................................
Group Discussion
Divide the students into groups and discuss the various tags of HTML 5.
118
Online Link
To learn more about Creating Web page in HTML, visit the website:
https://www.tutorialspoint.com/html/index.htm
Activity Section
Lab Activity
Write the HTML code for the following Web page.
IT P L A N E T - 7 (GIGABYTE)
Technology Trailblazers
Sabeer Bhatia
Topics Covered
•Images in Web Pages • Inserting Images • Creating List • Links in Web Page •Creating Links • Tables
in Web Page • Creating a Table
Hello Friends! In the previous chapters, you learnt how to make the web page using HTML
programming language. You learnt about basic tags which are used in making web pages.
Now, let’s add images to our web page to make it more attractive. Images include
photographs, logos, and any other visual object that can be added to a web page. This
chapter guides you how to insert images, links, and tables in the web page.
You can create your own images that best suit your web pages, with the help of an image
editing program. Adobe Photoshop, GIMP, and Paint Shop Pro are popular image editing
programs.
STORING IMAGES AND WEB PAGES
You should store all your web pages and images in one folder on your computer. If the folder
contains many files, you can store your images in a sub-folder.
index.html
balloon.jpg If an image you want to
balloon.jpg
If an image is stored
frame.html index.html
SRC SRC stands for "source." It is the source of image file. It specifies the
URL (Uniform Resource Locator) of the image.
HEIGHT It specifies the height of an image in pixels.
Syntax : <IMG SRC = "..." ALIGN = "..." ALT = "..." HEIGHT = "..." WIDTH = "....">
IT P L A N E T - 7 (GIGABYTE)
1 3
<H1><CENTER>COMPUTER SYSTEM</CENTER></H1> 3. Type HEIGHT=“?”, replacing ?
<IMG SRC="computer.jpg" WIDTH = "450" HEIGHT = "350"> with the height measurement
<P>A computer is an electronic machine that works under the you want to set.
instructions given by you. It can accept data (input), manipulate
IT P L A N E T - 7 (GIGABYTE)
<BODY>
1 with the amount of space
<H1><CENTER>COMPUTER SYSTEM</CENTER></H1>
<IMG SRC="computer.jpg" ALIGN= left HSPACE=50>
you want to add to both
<P>A computer is an electronic machine that works under the the left and right sides of
instructions given by you. It can accept data (input), manipulate the image in pixels.
<!DOCTYPE html>
1. In the <IMG> tag for
<HTML> the image you want to
<HEAD> appear on the left
<TITLE>Wrap Text between Images</TITLE> side of text, type
</HEAD> ALIGN=left.
<BODY> 2. In the <IMG> tag for
<1H1><CENTER>COMPUTER SYSTEM</CENTER></H1> the image you want to
<IMG SRC="computer.jpg" ALIGN=left> appear on the right
<IMG SRC="desktop.jpg" ALIGN=right> 2 side of text, type
<P>A computer is an electronic machine that works under the ALIGN=right.
IT P L A N E T - 7 (GIGABYTE)
</HEAD>
the border you want to
<BODY>
1 use in pixels.
<H1><CENTER>COMPUTER SYSTEM</CENTER></H1>
<IMG SRC="computer.jpg" ALIGN= left BORDER=5>
<P>A computer is an electronic machine that works under the
instructions given by you. It can accept data (input), manipulate the
<TITLE> Bullet Style </TITLE> TYPE = "circle" for open circular bullet
</HEAD>
TYPE = "disc" for solid circular bullet
<B ODY>
1 TYPE = "square" for solid square bullet
<H1>LIST OF COMPUTER DEVICES</H1>
<UL Type= “square”> 2 In this example, the bulleted list uses solid square bullets.
<LI>Monitor 3. Type <LI> in front of each item in the list.
<LI>Mouse
<LI>Keyboard 4. Type </UL> at the end of the list.
<LI>Pr3inter
The bulleted
<LI>Scanner
list is displayed
<LI>Hard Disk
<LI>CD-ROM
in the style
<LI>Speakers you have
126 <LI>UPS selected.
<LI>Microphone
</UL> 4
</BODY></HTML>
CREATING A NUMBERED OR ORDERED LIST
You can use numbered list or ordered list on your web page to display items in a specific
order, such as a set of instructions or a table of contents.
<!DOCTYPE html>
1. Type <OL> before the list.
<HTML> 2. Type TYPE=“?” within the <OL> tag, replacing ?
<HEAD> with a number style code:
<TITLE> Numbered Style </TITLE> A: A, B, C a: a, b, c
</HEAD>
I: I, II, III i: i, ii, iii
1<BODY>
1: 1, 2, 3
IT P L A N E T - 7 (GIGABYTE)
<H1>LIST OF COMPUTER DEVICES</H1>
<OL Type= “a”> 2 3. Type <LI> in front of each item in the list.
<LI>Monitor
4. Type </OL> at the end of the list.
<LI>Mouse
<LI>Ke yboard
3
<LI>Printer
<LI>Scanner
<LI>Hard Disk
<LI>CD-ROM
<LI>Speakers
<LI>UPS
<LI>Microphone
</OL> 4
</BODY>
</HTML> 127
INTERNAL LINKS
Internal links are the links to the pages within your own website. These links can be either
absolute or relative. Web address for the web page such as http://www.pmpublishers.in is
included in absolute links. Relative links locate web pages within the same directory or
subdirectory that can be defined from the current position such as /Store/books.htm.
Anchors are links to sections within the same page. These can also be created using the <A>
tag.
EXTERNAL LINKS
External links are links outside your own website. These links must always be absolute. An
absolute link can include a protocol, such as HTTP; a domain name, such as
www.pmpublishers.in; and a file name. Each directory in an absolute link is separated by a
slash symbol (/).
Follow an example of creating a link to the PMP home page.
<A HREF="http://www.pmpublishers.in">Click Here to visit PMP home page</A>
Now understand it.
! <A> stands for Anchor. It begins the link to another page.
! HREF stands for Hypertext REFerence. "This is where the link will take you to"
! http://www.pmpublishers.in is the full address of the link. Note that the address has an
equal to sign (=) in front of it and is enclosed in inverted commas.
! Where it reads “Click Here to visit PMP home page" is where you write the text you want
P M P U B L I S H E R S PVT. LTD.
to appear on the page. Whatever is within that space will appear on the page for the
viewer to click. So, write something that denotes the link.
! </A> ends the entire link command.
Here's what will appear on the page using the command mentioned above:
Click Here to visit the PMP home page
Now, without clicking, simply place your mouse pointer on the words. You'll see the address of
the link you created on the bottom of the browser window.
IT P L A N E T - 7 (GIGABYTE)
window.
When the visitor selects or
clicks on the link, the
specified website will open.
<P>Many schools, colleges and homes have computers for educational 2. Type <A HREF
purposes. Students complete assignments and do research on computers in lab = “mailto=?”>
rooms. Computers have become a source of entertainment.</P> in front of the
IT P L A N E T - 7 (GIGABYTE)
<P>You can play games, listen to music, watch a video or a movie, read a book text or image,
or magazine, compose a video, re-touch a photograph, plan a vacation or do replacing ?
many more things.</P> 2
with the e-
<P ALIGN = CENTER>mail us at:<A HREF=“mailto: [email protected]”> mail address
[email protected]</A></P>
of the person
</BODY>
3 you want to
</HTML>
receive the e-
mail message.
3. Type </A> at the end of text or image.
WIDTH It specifies breadth of the table in the browser window. WIDTH attribute can
be set to a specific number of pixels or to a percentage of the available screen
width. The percentage value is used to ensure compatibility across a variety of
displays and platforms. The pixel value is useful when a fixed width is required
for the content, such as images.
Creating a Table
You can create a table to clearly display information on a web page. Sometimes, we may like to
display information in a tabular format. For example, if we like to display the price list or sales
order of an item, the best possible solution is to display it using a table. We can use tables to
present information in columns like those found in newspapers or magazines. A table has three
parts:
i. Row - It is a horizontal line of data.
ii. Header Cell - It contains text that describes the data in a row or column.
IT P L A N E T - 7 (GIGABYTE)
iii. Data Cell - It contains data or information we like to display.
<TD>Desktop</TD><TD>25000</TD><TD>4</TD><TD>100000</TD>
</TR>
</TABLE></BODY></HTML>
134
IT P L A N E T - 7 (GIGABYTE)
<!DOCTYPE html> 1. In the <TABLE> tag,
<HTML> for the table you
<HEAD> want to display a
<TITLE> ADDING BORDER TO TABLE </TITLE> border, type
</HEAD> BORDER = ?,
<BODY> replacing ? with the
<H1><CENTER>INVOICE</CENTER></H1> thickness you want
<CENTER> to use for the
<TABLE BORDER=5> 1 border.
<TR>
IT P L A N E T - 7 (GIGABYTE)
you specified.
<HTML> CELLPADDING=“?”,
<HEAD> replacing ? with the pixel
<TITLE> ADJUST CELL SPACING </TITLE> value you want to assign.
</HEAD> 2. Give space.
<BODY>
3. Type CELLSPACING=“?”,
<H1><CENTER>INVOICE</CENTER></H1>
<CENTE1R>
replacing ? with the pixel
value you want to assign.
<TABLE BORDER=5 WIDTH=“600” HEIGHT=“300”
CELLPADDING=“10” CELLSPACING=“10”> 3
<TR>
<TH COLSPAN=4>COMPUTER STORE</TH>
</TR> Update Your Knowledge
138 <TR BGCOLOR = “#FF0000”> The cellspacing attribute adds pixels
<TH>Item Name</TH><TH>Price Per Unit</TH><TH>Quantity between cells. The cellpadding
</TH> <TH>Total Price</TH> attribute adds pixels within a cell
border.
Cell Padding: The web
browser displays the
designated amount of
space between the cell
contents and the cell
borders.
Cell Spacing: The web
browser displays the
designated amount of
space between the cell
borders.
IT P L A N E T - 7 (GIGABYTE)
<TH>Total Price</TH>
</TR>1 2
<TR>
<TD ALIGN=“center”>Laptop</TD><TD>30000</TD><TD>2</TD><TD>
60000</TD>
140
E xe r c i s e s
A. Tick [] the correct answer.
1. The format of an image that web browser can display is ........................... .
a. JPEG b. JIG c. JEG
2. The attribute used to mention the path of the image where it is located is ....................... .
a. IMG b. SRC c. JPEG
3. Which link is used to link two pages within your own website?
a. E-mail Link b. External Link c. Internal Link
4. A web page is linked by using .................., which are links to section within the same page.
a. Anchors b. Image c. Text
5. ............. attribute is used to combine two or more cells in a column to make one large cell.
a. ROWSPAN b. COLSPAN c. CELLSPAN
IT P L A N E T - 7 (GIGABYTE)
fl. Write ‘ T ’ for True and ‘ F ’ for False statements.
1. You can wrap text between two images to change the layout of web page.
2. You cannot link an image in the HTML.
3. A hypertext link is used to connect one document with another document or file.
4. An e-mail link does not allow users to send queries and feedback.
5. Color in table header cell brings attention to the text in the header.
C. Fill in the blanks.
1. The ............................ tag incorporates graphics in the HTML document.
2. Internal links can be either ............................ or .................................... .
3. HREF stands for ............................................................................. . 141
4. You can use ............................. to add space between the border and the contents of a cell.
5. By default, the table data is vertically aligned in the ............................ of each cell.
D. Define the following.
1. Cell Padding: ................................................................................................................................
......................................................................................................................................................
2. Cell Spacing: ................................................................................................................................
......................................................................................................................................................
3. Absolute Link: ..............................................................................................................................
......................................................................................................................................................
E. Differentiate between the following.
1. Bulleted List Tag Numbered List Tag
................................................................. ....................................................................
................................................................ ....................................................................
................................................................ ....................................................................
2. Internal Link External Link
................................................................. ....................................................................
................................................................ ....................................................................
................................................................ ....................................................................
F. Answer in 1-2 sentences.
1. Why do we add images to the web pages?
.....................................................................................................................................................
.....................................................................................................................................................
2. What do you mean by IMG and SRC in Image tag?
.....................................................................................................................................................
.....................................................................................................................................................
3. What is the use of adding links to the web page?
......................................................................................................................................................
......................................................................................................................................................
4. What is the purpose of creating a table?
P M P U B L I S H E R S PVT. LTD.
......................................................................................................................................................
......................................................................................................................................................
G. Answer Briefly.
1. Why do we create Image link? Write its syntax.
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
2. What are the various attributes associated with Table tag?
142 ......................................................................................................................................................
......................................................................................................................................................
.....................................................................................................................................................
3. What is the use of spanning cells?
......................................................................................................................................................
......................................................................................................................................................
......................................................................................................................................................
H. Application flased Questions.
1. Kavya wants to create a web page displaying a school circular, containing a list of ten
students who got highest marks in the academic year in an ordered form. She is unable to
make it. By which tag should she do it?
......................................................................................................................................................
2. Divya has created a web page and mentioned the tags used for inserting an image in the
web page correctly. But still, the image is not displayed on the web page. What might be
the problem? Explain any two possibilities due to which the image is not getting inserted.
......................................................................................................................................................
Group Discussion
Divide the students into two groups and discuss the topic, ‘Images and Tables in a webpage make it
apparent’.
Online Link
To learn more about Images, Links and Tables in HTML, visit the website:
https://codeclubprojects.org/en-GB/webdev/
Activity Section
Lab Activity
Open Notepad and write the HTML code to create the given web page using the
instructions mentioned below.
Instructions
IT P L A N E T - 7 (GIGABYTE)
a. Insert a picture of your own school in
place of clipart.
b. Write your own name in the last line
“This Web page is designed by .....”
TIME TABLE c. At the bottom, give a text link to your
school website. For this, write the text
Hour Monday Tuesday Wednesday Thursday Friday “Click here to know more about my
9:00-9:45 English English English English English
school.” The Website address is
9:45-10:30 Computer Computer Computer Science Science
10:30-11:15 Science Science Science Science Science “www..................................................”.
11:15-11:30 RECESS RECESS RECESS RECESS RECESS d. Save the Web page as ‘Timetable’.
11:30-12:15 Maths Maths Maths Maths Maths
12:15-1:00 Hindi Hindi Hindi Hindi Hindi
1:00-1:45 Geography Geography Geography Moral&Civics Moral&Civics
143
1:45-2:00 Games Games Games Games Meditation
Topics Covered
•Database •Microsoft Access •Starting Access 2016 •Project: Dance Class Database •Creating a Blank
Database •Creating a New Table •Adding Records to a Table
Database
A database is a collection of data organized in
a manner that allows easy access, retrieval,
and use of that data. PM
PAYROLL 2003
PAYROLL 1995
a database on a computer.
The computer stores the data on a storage medium, such as a hard drive or optical disc.
Microsoft Access
Microsoft Access is a Relational Database Management System (RDBMS)
that allows you to create, manage, and process data in the form of multiple
tables. Each specific piece of information in a table is known as value. A
value is located at the intersection of row and column.
When you save a database in Access, it is saved with .accdb extension.
Older Access databases used an .mdb extension; but in 2007, Microsoft
started using .accdb extension.
COMPONENTS OF ACCESS
P M P U B L I S H E R S PVT. LTD.
IT P L A N E T - 7 (GIGABYTE)
2. Click on Browse.
The Open dialog box will appear.
IT P L A N E T - 7 (GIGABYTE)
Transportation Short Text Mode of transportation for the student
Fees Number Fees of the student
Table Structure
This project contains a database called ‘Dance Class’, a table named ‘Students Detail’ created in
Design view .
Creating a Blank Database
You can create a new database and fill data in it. Access prompts you to assign a name to the
file when you create a new database file.
In Access, you can create tables in two views, datasheet view and design view.
IT P L A N E T - 7 (GIGABYTE)
describe the structure of the table before creating it. Here, you enter your own field names
and descriptions, and choose your own data type to associate with each field.
In Design view, the window is divided into two panes: upper pane for creating field name,
specifying data types, and entering field descriptions and lower pane for specifying field
properties. For each field, you need to specify the following:
1. FIELD NAME: There must be a unique name for each field in the table. For example, in
the Students’ Detail table, the field names are Studnet-ID, Name, Class, Transportation,
and Fees.
2. DATA TYPE: Each field has a data type that defines what you can store in it. Data entry
is restricted to valid entries for the type you choose. For example, you cannot enter
149
letters in a field set to Number.
3. DESCRIPTION: You can enter detailed description of all the fields within the table.
The following are the available data types in Access 2016:
Short Text: This is a general-purpose field containing any data. It has a limit of
255 characters and cannot be used for numeric calculations. Use this
type for numeric entries that will not have calculations performed
on them, such as telephone numbers and ZIP codes.
Long Text: This type has a limit of 63,999 characters; it is used for detailed,
descriptive fields.
Number: This type stores numeric data that you can use in calculations. It can
also hold symbols, such as decimal points and commas.
Date/time: This type only stores numbers representing valid dates and times.
Currency: It stores currency data that you can use in calculations.
Auto Number: It stores a sequential number for each record.
Yes/No: The value 1 represents Yes and the value 0 represents No, but the
field can be formatted to display values as True/False or Yes/No.
OLE Object: It stores objects created in another application such as Word or
Excel that you can link to or fix in an Access table.
Hyperlink: You can link to websites, e-mail addresses, files on your computer,
files on the LAN or virtually any other location.
Attachment: This type works only in Access 2007 and Access 2016 databases. You
can attach data files from word processing programs, spreadsheets,
graphic editing programs and so on.
Calculated: You can use it to create calculated fields directly in a table. In the
earlier versions, you could create calculated fields only in queries.
Lookup Wizard: Depending on the usage, this type creates either a lookup list from
the data that you specify or a lookup list from the values in another
table. It can also be used to set up multivalued lists.
P M P U B L I S H E R S PVT. LTD.
1
1. Open the
database file and
2 click on Create
tab on the
Ribbon.
2. Click on Table
Design button.
150
The Table1 window appears in a Design view.
Define the fields by choosing the required details in the table window to proceed to the
next step in creating the table.
Field
Property Pane
or
Lower Pane
3. Type Student_ID
(the name of the
IT P L A N E T - 7 (GIGABYTE)
first field) in the
3 Field Name
column.
4. Press the TAB key
to bring the
insertion point to
Data Type field.
The word Student_ID is displayed in the Field Name column, and the insertion point advances to the
Data Type column, indicating that you can enter the data type. The word Short Text, one of the possible
data types is currently displayed.
151
Update Your Knowledge
In Table Design view window, you can create whatever fields you like and select the data type of each field.
5. If you want to
change the data
type, click on the
arrow button and
change the data type
5 according to your
need.
After selecting the data
type, its properties will
be displayed in the lower
pane.
13
As per the
project, Table
Structure is
now complete.
Finish
IT P L A N E T - 7 (GIGABYTE)
key.
2. Click on the Primary Key
1 button.
General tab
Drop-down
Lookup tab list
Property
Properties information
Pane
Yes/No properties
Properties Pane: When a field is selected in Design view, its properties appear in the lower
pane.
General Tab: The General tab contains most of the properties you will work with.
Lookup Tab: The Lookup tab is primarily used for setting up lookup lists.
Drop-down list: Some properties have drop-down lists from which you can select the option.
Click the arrow to open the list.
Property Information: When the insertion point is in a property box, information about that
property appears here.
Yes/No Properties: Some properties represent Yes/No questions, which have already been
filled for you with default values.
AutoNumber Long Integer The same as Number, except that there are only two
choices: Long Integer or Replication ID
AutoNumber
Setting Field Size Properties
The default field size for a field with a data type of text is 255 characters. You can change this
size in the range from 0 to 255 characters.
1. Click on the field whose
size you want to
change.
2. Click on General tab in
the Field Properties
area.
1 3. Enter the new field size
in the Field Size text
box.
IT P L A N E T - 7 (GIGABYTE)
4 4. Type the default value.
Access automatically adds
quotation marks around
what you typed, if the data
type is Text.
When you display the
datasheet of the table,
the default value
appears in new records.
155
Update Your Knowledge
You can resize text and numeric fields only. All the other data type size is predefined.
Setting The Field Format
You can change the format of a field to update its appearance in datasheet, form, and report.
IT P L A N E T - 7 (GIGABYTE)
table, and the table
4 name appears in the
Object tab and
Navigation Pane.
4. Click on the Close
button to close the
Table.
157
Adding Records to a Table
The first step is to create a table and save it. The second step is to add records to the table.
The table must be open so that the records can be added to the table. The table is displayed
in a Datasheet view. In Datasheet view, the table is represented as a collection of rows and
columns called datasheet.
1. Double-click on Table
(Students’ Detail) in
the Dance Class:
Database window.
You can close the Navigation Pane for more space for table.
Fields names
Datasheet view
P M P U B L I S H E R S PVT. LTD.
Description of Record 1 is
first field current record
IT P L A N E T - 7 (GIGABYTE)
Access saves the table, and
you can see the name of the
table in Navigation pane.
Finish
CHECKLIST
Self-Evaluation
After reading the chapter, I know these points:
$ I know that Microsoft Access is a powerful database software.
$ I know that database is a collection of data organized in a manner that allows
access, retrieval, and use of that data.
$ I know that a table defines the field and specifies how the data should be entered.
$ I know that tables consist of columns and rows that are used for holding data.
$ I know that database using template includes pre-built tables and forms, which we
will fill with our own data.
$ I know that in Design View, we can create whatever field we like and select the data
types for each field.
$ I know that a primary key is the key that differentiates the records in a table.
E xe r c i s e s
A. Tick () the correct answer.
1. The software that helps to enter and organize data in a database is ....................... .
a. Access b. Excel c. Animation
2. A row in a table that contains information is called ....................... .
a. Field b. Record c. Datasheet
3. The specific piece of information in a table is known as .................................... .
a. Field b. Value c. Record
4. .................... is the combination of data from multiple related tables into a single datasheet.
a. Query b. Report c. Filter
5. The data type that is used for detailed and descriptive fields is ................................... .
a. Currency b. Long Text c. Auto Number
B. Write ‘ T ’ for True and ‘ F ’ for False statements.
P M P U B L I S H E R S PVT. LTD.
IT P L A N E T - 7 (GIGABYTE)
4. What is the use of default value in the properties?
....................................................................................................................................................
....................................................................................................................................................
G. Answer Briefly.
1. What is the role of Tables in Database?
....................................................................................................................................................
....................................................................................................................................................
....................................................................................................................................................
2. Why should we specify validation rules while creating a table?
.................................................................................................................................................... 161
....................................................................................................................................................
....................................................................................................................................................
H. Application Based Question.
Somya has made a database table in Access containing fields like Student_name, Class, Roll_no.
and Contact_no. She has set the primary key for the field ‘Student_name’. Has she done the
right thing by setting the primary key for this field?
...........................................................................................................................................................
Group Discussion
Divide the students into two groups and discuss, ‘Advantages and Disadvantages of Database
Management System (DBMS)’.
Online Link
To learn more about working of Access, visit the website:
https://www.oreilly.com/library/view/access-2013-the/9781449359447/ch01.html
Activity Section
Lab Activity
1. Create a database named ‘Introduction’, and then create a table using Design View
where each record contains the given fields:
- Short Text
- Short Text
--
Short Text
Long Text
--
-
P M P U B L I S H E R S PVT. LTD.
IT P L A N E T - 7 (GIGABYTE)
1. .................... is a computer virus which infects executable (.exe) files.
2. In Number System, ........................... is a number system with a base of 16.
3. The smallest unit of data is a known as ........................... .
4. To slow down an animation, adjust the .......................... of animated movies.
5. The minimum height and width of Animate stage is ........................ pixels .
6. A .......... in the bottom right corner of the tool indicates additional tools are stacked behind.
7. .................... are small windows that give you access to common commands and resources.
8. By decreasing the .......................... of a layer, its transparency increases.
D. Define the following.
1. Sweeper 2. Mask layer 3. Stop-motion animation 4. Eyedropper tool
163
E. Differentiate between the following.
1. Executable file virus and Macro virus 2. Canvas size of image and Print size of image
F. Answer the following questions.
1. Write down the effects of viruses.
2. What are the features of Antivirus?
3. Why do we need Number System for Computers?
4. Why do we use Hexadecimal Number System?
5. What do you understand by Tweening?
6. What do you mean by a Symbol? How will it become an Instance?
7. What do you mean by Layers?
8. Describe the different selection tools available in Photoshop.
9. Why do we use filters in Photoshop?
10. What are the benefit of using layers?
Worksheet-2
Chapters 6 - 10
IT P L A N E T - 7 (GIGABYTE)
4. What is the role of Text Editors in HTML?
5. Why do we add comment in our web page?
6. How will you change background color of the page? Write its syntax.
7. What is the benefit of creating an E-mail link?
8. How will you display entire list box on the Form?
9. Explain any three field properties of a database.
10. Why do we use Design View?
11. Define Primary Key. Why do we need a Primary Key?
12. Name and explain the different Data types in MS-Access.
165
Projec t Work
Project Animate
A. Draw an image of a Fish in Adobe Animate and make it animate.
Project Photoshop
Open Photoshop and create three
shapes — red square, blue circle
and yellow star — in three different
layers.
166
Project HTML
A. Write the following HTML Code in text editor and get the output in the Web
browser.
<HTML>
<HEAD>
<TITLE> Test Page </TITLE>
</HEAD>
<BODY BGCOLOR = “GREEN” TEXT = “RED”>
<HR><HR><HR>
There are three lines above <BR>
And <BR> three lines below this text <BR><BR>
<HR><HR><HR>
</BODY>
</HTML>
fl. Write the following HTML Code in text editor and get the output in the Web
browser.
<HTML>
<HEAD>
<TITLE> Creating A Link </TITLE>
</HEAD>
<BODY>
<H1><CENTER> <FONT COLOR = “RED”> OPTICAL DISC</FONT></CENTER></H1>
<CENTER><IMG SRC="cd.jpg"></CENTER>
<HR SIZE= “10" Width= “50%” COLOR= “Blue”>
<P>An optical disc is a type of storage media that consists of a flat, round, portable disc
made of metal, plastic, and lacquer that is written and read by a laser. Optical discs used in
personal computers are 4.75 inches in diameter, and less than one-twentieth of an inch
thick.</P> <P>Optical discs primarily store software, data, digital photos, movies, and music.
Some optical disc formats are read only; it means users cannot write (save) on the media.
IT P L A N E T - 7 (GIGABYTE)
Others are read/write, which allow users to save on the disc just as they save on a hard
disk.</P> <P>Nearly every personal computer today has some type of optical disc drive
installed in a drive bay. On some, you push a button to slide out a tray, insert the disc, and
then push the same button to close the tray; others are slot loaded, which means you insert
the disc in a narrow opening on the drive. When you insert the disc, the operating system
automatically may start the program, music, or video on the disc.</P>
<P><CENTER><A HREF = "http://www.moserbaer.com"> Click Here For More Knowledge of
Optical Disc</A></CENTER></P>
</BODY>
</HTML>
ELECTRONIC SHOP
Name Manufacturer Model Cost
LED TV 32 inch Sony Ex550 Rs. 44900
Refrigerator LG GL 368 YAQ Rs. 32000
Food Processor Bajaj FX 10 Rs. 4500
Air Conditioner Carrier Duracool Rs. 29000
Smart Phone Apple iPhoneX Rs. 89000
Smart Speakers Google Google Home Rs. 10000
D. Your computer teacher has asked you to create the following notice of award
ceremony so that she can link the notice to the school website. You are supposed to
create the following Web document along with a table in HTML.
NOTICE
This is to bring to your kind notice that on 30th January 2020, Annual Function – PM
Public School was organized in the school premises. Mr. Rajesh Bajaj was the honorable
Chief Guest. The function commenced by lighting of the lamp by the School Principal.
At the end of the function, Award Ceremony was conducted to recognize the efforts of
the students. The awards were conferred by the Chief Guest and the Principal.
Following table shows the names of winners in various categories.
PM PUBLIC SCHOOL
List of Awardees
CATEGORY STUDENT NAME CLASS COMPETITION
P M P U B L I S H E R S PVT. LTD.
Project Access
Create a database named 'Customer' and design two tables in it containing the following
fields:
Table 1 : Customer
168
Fields: Customer ID (Primary Key), Customer Name, Address, City, Phone, E-mail ID
Table 2 : Invoice
Fields: Customer ID (Primary Key), Invoice No., Date, Invoice Amount
Additional Information
Screen Time
Screen time is a term used for activities done in front of a
screen, such as smartphone, tablets, TV, computer, etc.
When teens spend more hours on the screen, they have less
time for other important things, like exercise, learning, real-
world socializing, and even sleep. More screen time is known as
screen addiction.
ACCORDING TO A SURVEY
$ Children aged eight to ten spend nearly eight hours a day on media.
$ Older children and teens spend more than eleven hours a day on media.
$ Seventy-one percent of children have a TV or Internet device in their room.
$ One-third of teens send more than a hundred texts per day.
IT P L A N E T - 7 (GIGABYTE)
Be Role Model for Children
Children always learn from the parents, so if their parents are constantly on
their device, they will see this as acceptable. Try follow the same rules you
have set for them. If you have asked your children not to use their device at
the food table, make sure you also avoid to use.
YouTube
YouTube is the most popular video sharing service on the web.
This service was created by three former PayPal employees, Chad
Hurley, Steve Chen and Jawed Karim in February 2005. In
November 2006, YouTube was bought by Google.
YouTube offers tens of millions of videos as well as movie trailers,
commercials, clips from TV shows and much more. You use the
YouTube site to play a video clip, and YouTube streams the video
Chad Hurley, Steve Chen
to your computer and other mobile devices.
and Jawed Karim
If you have a digital movie or animation that you would like to
share with the world, you can upload the file to YouTube. To
upload videos, you need to create a free YouTube account or sign
in with your Google account, if you have one.
IT P L A N E T - 7 (GIGABYTE)
4
Uploading a Video
After creating an account, you can follow the steps to create a personal YouTube channel.
1. Go to YouTube home page and click on Sign in button. Google account page will appear.
2. Type your login ID and the password.
2
Password will appear in the form of black dots.
Your login ID and password are same as that you have created
or as that of your Gmail account.
3. Click on Next button. 171
3
4 YouTube page appears
again with your login
5 details.
4. Click on Create a video
button.
5. Click on Upload video.
6. Click on Select files to
upload.
By default, the privacy
settings are set to Public,
which means anybody can
view the video you are
6
going to upload. You can
change the privacy settings
by clicking on this button.
Once uploading is
complete, you will get a
link for your video. You can
share the displayed link to
172
others.
View your Uploaded Video in your Channel
After uploading the video, you can open your channel and view it.
1. Go to YouTube home page
2 and login to your account.
3 2. Click on Account icon.
3. Click on My channel.
IT P L A N E T - 7 (GIGABYTE)
?
(A) (B) (C) (D)
4. Five boys A, B, C, D and E are standing in a row. A is between C and D and B is between D and E. Which of the following pairs
represents the boys standing at both the ends?
(A) C, B (B) E, C (C) E, A (D) A, C
5. A man goes towards east five kilometres, then he takes a turn towards right and goes five kilometres. He again takes a turn
towards right and goes five kilometres. With respect to the point from where he started, where is he now?
(A) East (B) North (C) West (D) South
COMPUTERS AND INFORMATION TECHNOLOGY
6. MBP is a short form for a famous high end notebook from Apple. It is called .
(A) Macintosh Book Pro (B) Mac Book Programmable (C) Mountain Book Pro (D) MacBook Pro
P M P U B L I S H E R S PVT. LTD.
7. You can join an Active Directory domain in which of the following Windows 7 versions?
(i) Windows Home Edition (ii) Windows Professional Edition
(iii) Windows Ultimate Edition (iv) Windows Enterprise Edition
(A) Only (i) and (ii) (B) Only (iv) (C) Only (ii), (iii) and (iv) (D) All of these
8. The function of ‘Wrap Text’ icon in MS-Excel is used to .
(A) Join selected cells into one larger cell (B) Rotate text to a diagonal angle
(C) Make all content visible within a cell by displaying it on multiple lines (D) Highlight interesting cells
9. Match the following terms with what they stand for
Term Stands for
(i) .com (a) Education
(ii) .edu (b) India
(iii) .in (c) Australia
(iv) .au (d) Commerce
174 (A) (i)-(a), (ii)-(b), (iii)-(c), (iv)-(d) (B) (i)-(b), (ii)-(c), (iii)-(d), (iv)-(a)
(C) (i)-(c), (ii)-(d), (iii)-(a), (iv)-(b) (D) (i)-(d), (ii)-(a), (iii)-(b), (iv)-(c)
10. A browser is an interactive program that permits a user to view web pages on the computer. The browser performs which of the
following services?
(A) Connecting to the source computer whose address is specified (B) Requesting new page from the server
(C) Receiving new page (D) All of these
11. Modern Computers compared to earlier computers are .
(A) Faster and larger (B) Less reliable (C) Larger and stronger (D) Faster and smaller
12. In MS-Word, which shortcut key is used to increase the font size of text?
(A) Ctrl + F (B) Ctrl + Alt + F (C) Ctrl + Shift + > (D) Ctrl + Shift + X
13. Match the virus types given in Column-I with their corresponding examples given in Column-II.
Column-I Column-II
(a) Macro Virus (i) Lamer Exterminator
(b) Boot Sector Virus (ii) Natas
(c)Polymorphic Virus (iii) Melissa
(A) (a)-(iii), (b)-(i), (c)-(ii) (B) (a)-(i), (b)-(ii), (c)-(iii) (C) (a)-(ii), (b)-(i), (c)-(iii) (D) (a)-(iii), (b)-(ii), (c)-(i)
ACHIEVERS SECTION
14. Match the following output devices given in Column-I with their descriptions given in Column-II.
Column-I Column-II
(a) Voice Response System (i) It produces audio output by selecting an audio output from a set of pre-
recorded audio response.
(b) Voice Reproduction System (ii) It enables a computer to talk to a user.
(c) Speech Synthesizer (iii) It converts text information into spoken sentences.
(A) (a)-(ii), (b)-(i), (c)-(iii) (B) (a)-(i), (b)-(ii), (c)-(iii) (C) (a)-(iii), (b)-(ii), (c)-(i) (D) (a)-(i), (b)-(iii), (c)-(ii)
15. Which of the following QBASIC codes will produce the given output?
Output:
1
2
3
(A) FOR x = 1 TO 3 (B) FOR x = 1 TO 5 (C ) FOR x = 1 TO 3 (D) FOR x = 1 TO 3
PRINT x PRINT x PRINT x PRINT x
NEXT x NEXT x EXIT FOR EXIT FOR
NEXT x MORE x
IT P L A N E T - 7 (GIGABYTE)
J J 9 9 9 9 2 2 2 2 2
K K 3 3 3 3 3
L L 4 4 4 4 4
M M 5 5 5 5
N N 6 6 6 6 6
O O 6. GENDER 7 7 7 7
P P If you are a boy then 8 8 8 8
Q Q darken Male circle 9 9 9 9 9
R. R
Z
S. S GENDER
Z
T. T
U. U WRONG
V. V MALE FEMALE CORRECT
W W way to darken way to darken
X X the circle
Y Y the circle
ZA Z
7. If your choice for Answer 1 is C, then you should darken the circle as follows: 1. A B D
ANSWERS
1. (A) 2. (A) 3. (B) 4. (B) 5. (D) 6. (D) 7. (C) 8. (C) 9. (D) 10. (D) 11. (D)
12. (C) 13. (A) 14. (A) 15. (A)
P M P U B L I S H E R S PVT. LTD.
176
For
Students