SYJC Arts IT Chapter 1 to 6.pdf

170
Chapter 1 Web publishing Introduction A web page or web document is a document or information resource onwww and can be accessed through a Web browser and displayed on a monitor. Web publishing describes the software and methodologies to design the web pages and website. Common terms Web server is computer that stores websites. Web browser is software program through which we can access webpage. For e.g. Internet Explorer,Netscape Navigator, Mozilla Firefox etc. Website is a collection of web pages. Homepage is the First page of website. 1.1 HTMLPAGE FRAMES Frame divides browser window into several parts through which we can see more than one web page at a time. Multiple scrollable sections can be created using frames. Each HTML document is called a frame, and each frame is independent of the others. Frame pages can also be hyperlinked. 1.1.1 Creating Frames The <frameset>----</frameset>Tags: The<frameset> tag is container tag for all other tags that are used to create frames. The<frameset>tag replaces the <body>tag in frameset documents. The <frameset> tag defines how to divide the window into frames. Each frameset defines a set of rows or columns. If you define frames by using rows then horizontal frames are created. If you define frames by using columns then vertical frames are created. The values of the rows/columns indicate the amount of screen area each row/column will occupy. Each frame is indicated by <frame> tag and it defines what HTML document to put into the frame. 1.1.2 The rows attribute The rows attribute divides the screen into Horizontal frames. Following example shows Horizontal frames. <html> <head> <title>frame</title> </head> <frameset rows="25%, 75%"> <frame src="page1.html"> <frame src="page2.html"> </frameset> </html> Output of example Figure 1.1 Horizontal Frame

description

SYJC Maharashtra Board IT Textbook

Transcript of SYJC Arts IT Chapter 1 to 6.pdf

Page 1: SYJC Arts IT Chapter 1 to 6.pdf

Chapter 1 Web publishing

Introduction

A web page or web document is a document or information resource onwww and can be accessed

through a Web browser and displayed on a monitor. Web publishing describes the software and

methodologies to design the web pages and website.

Common terms Web server is computer that stores websites.

Web browser is software program through which we can access webpage. For e.g. Internet

Explorer,Netscape Navigator, Mozilla Firefox etc.

Website is a collection of web pages.

Homepage is the First page of website.

1.1 HTMLPAGE FRAMES

Frame divides browser window into several parts through which we can see more than one web page at a time. Multiple scrollable sections can be created using frames. Each HTML document is called a

‗frame‘, and each frame is independent of the others. Frame pages can also be hyperlinked.

1.1.1 Creating Frames

The <frameset>----</frameset>Tags: The<frameset> tag is container tag for all other tags that are used to create frames.

The<frameset>tag replaces the <body>tag in frameset documents.

The <frameset> tag defines how to divide the window into frames.

Each frameset defines a set of rows or columns. If you define frames by using rows then

horizontal frames are created. If you define frames by using columns then vertical frames are

created.

The values of the rows/columns indicate the amount of screen area each row/column will

occupy.

Each frame is indicated by <frame> tag and it defines what HTML document to put into the

frame.

1.1.2 The rows attribute

The rows attribute divides the screen into Horizontal frames.

Following example shows Horizontal frames.

<html> <head> <title>frame</title> </head> <frameset rows="25%, 75%"> <frame src="page1.html"> <frame src="page2.html"> </frameset> </html>

Output of example

Figure 1.1 Horizontal Frame

Page 2: SYJC Arts IT Chapter 1 to 6.pdf

In the above example we have a frameset with two rows. The first row is set to 25% of the width of the browser window and the second row is set to 75% of the width of the browser window. The

document "page1.html" is put into the first row, and the document "page2.html" is put into the second

row.

1.1.3 The cols attribute The Cols attribute divides the browser window into vertical frames depending upon the width defined.

The following example illustrates the concept.

<html> <head> <title>frame</title> </head> <frameset cols="100, 45 %,*"> <frame src="page1.html"> <frame src="page2.html"> <frame src="page3.html"> <frameset> </html>

Output of the example

Figure 1.2 Vertical Frames

The above example, the file page1.html is set to 100 pixels, page2.html is set to 45% of the available

area and the page page3.html takes up the remaining area. The total area of all the rows and cols must be either defined in terms of pixels, or a percentage

value(%) or relative value by using (*) asterisk sign.

1.1.4 The<frame> tag The <frame> tag is used to create frame within frameset. The attributes of this tag can be used to

specify the name of a frame and HTML page that you need to display in the frame.

The following are the various attributes of the <frame> tag:

Src This attribute is used to specify HTML page that you want to display in the frame

<frame src=‖URL of an Html page‖>

Frameborder=0/1 This attribute shows border around the frame. The value 0 creates borderless frame. The value 1 gives border.

Marginwidth This attribute sets left and right frame margin in pixels.

e.g. <frame src=‖page1.html‖ marginwidth=25>

Marginheight This attribute sets Top and Bottom frame margin in pixels.

e.g. <frame src=‖page1.html‖ marginheight=25>

Noresize This attribute prevents the user from resizing the frames. By

default user can resize frame by dragging to new position. e.g. <frame src=‖page1.html‖ noresize>

Name It is used to assign the name to the frame for targeting and linking

purpose

e.g. <frame src=‖page1.html‖ name=‖xyz‖> Scrolling=‖yes/no/auto‖ Scrolling has three values YES, NO, AUTO

The value YES specifies that a scrollbar should

always be visible on the frame.

The value NO specifies that a scrollbar should

never be visible on the frame.

The value AUTO specifies the browser to

automatically display or remove the scrollbars

Page 3: SYJC Arts IT Chapter 1 to 6.pdf

1.1.5 Nested frames

You can nest a <frameset> tag within another <frameset> tag. See the following codes as an example of nested frame:

Example-1

<html> <head> <title>frame</title> </head> <frameset cols="50%, 50 %"> <frame src="page1.html"> <frameset rows=”50%, 50 %"> <frame src="page2.html"> <frame src="page3.html"> </frameset> </frameset></html>

Output of example

Figure 1.3 Nested frame

Example-2

<html> <head> <title>frame</title> </head> <frameset cols="50%, 50 %"> <frameset rows="50%, 50 %"> <frame src="page1.html"> <frame src="page2.html"> </frameset> <frameset rows="50%, 50 %"> <frame src="page3.html"> <frame src="page4.html"> </frameset> </frameset> </html>

Output of the example

Figure 1.4 Nested frame

1.1.6 Linking frame or Target attribute Linking is one of the advantages of using frame. In linking there is menu/links on the left side of

browser and the content is displayed on the right side while clicking on links.

Steps to create linking frame

First create a frameset with 2 vertical frames. Give name to the frames using the name

attribute of the <frame> tag.

Giving the name to the first frame is optional, but the target frame must be given a name

<framesrc="left.html"><framesrc="right.html" name="xyz"> Here the name of frame is‖xyz‖

from a frame. This is default value.

Page 4: SYJC Arts IT Chapter 1 to 6.pdf

Create HTML document containing menu. The menu item will be hyperlink to other pages. The hyperlink when clicked should be displayed in the right frame which is target name.

The target attribute in the <A> tag specifying the name of frame as follows:

<A href=”input.html” target=”xyz”>Input</a> <A href=”Output.html” target=”xyz”>Output</a>

For example see the following html code:

<html> <head> <title>linking frame</title> </head> <frameset cols="40%, 60 %"> <frame src="left.html"> <frame src="right.html" name="xyz"> </frameset> </html>

Left.html

<html> <head> <title>left</title> </head> <body> <a href="input.html"

target="xyz">Input</a><br> <a href="output.html"

target="xyz">Output</a> </body> </html>

Right.html

<html> <head> <title>Right</title> </head> <body> <p>This is Right page</p> </body></html> Input.html

<html> <head> <title>input</title> </head> <body> <p>The list of Input devices</p> <ol> <li>keyboard</li> <li>mouse</li> <li>Joystick</li> </ol>

Initially the following Figure 1.5 will be

displayed

Figure 1.5 Linking Frame

The output for Input link is as follows

Figure 1.6 Linking Frame

And If we click on Output link, then the

following output will be displayed

The output for output link is as follows

Page 5: SYJC Arts IT Chapter 1 to 6.pdf

</body> </html> Output.html

<html> <head> <title>output</title> </head> <body> <p>The list of output devices</p> <ol> <li>Monitor</li> <li>Printer</li> <li>Speaker</li> </ol> </body> </html>

Figure 1.7 Linking Frame

It means while clicking on the links the content will be displayed in right side browser window.

1.1.7 Magic target names There are some target names that will open the link in different frames. They are called as

Magictargetnames.

Following are some Magic Targetnames(Table No 1)

Target=‖_self‖ This will open the page in the same window as link

Target=‖_blank‖ This will open the page in new blank window

Target=‖_top‖ This will open a link in top frame of browser window

Target =‖_parent‖ This will open the page in the main or parent frame

Table No. 1

1.1.8 Inline or floating frame <Iframe>----</Iframe> tag is used to create inline frame. This <tag> displays frame along with the

text and graphics in an HTML page. The inline frame appears within <body> Tag.

The following is an example of an inline frame:

<html> <head> <title>inline</title> </head> <body> <p>This is an Inline Frame</p> <br> <iframe src="page1.html"width=400 height=200 scrolling=”yes”></iframe> </body> </html>

This code is stored in the inline.html and

<iframe> tag is used to display inline

frame as shown in Figure 1.8.

Figure 1.8 an Inline Frame

Page 6: SYJC Arts IT Chapter 1 to 6.pdf

Attributes of <Iframe>tag

Src This attribute is used to specify HTML page that you want to display in

the inline frame

Width Sets the width of inline frame.

Height Sets the Height of inline frame.

Align This aligns the inline frame as left, right and center of the page

Name This attribute is used to assign the name to the inline frame for linking

purpose

Scrolling=‖yes/no/auto‖ Scrolling shows the scrollbars in inline frame if the value as ―yes‖ and ―auto‖ and value ―no‖ hide the scrollbars

Border Displays the border around the inline frame.

Table No. 2

1.2 Image mapping Image mapping is a single graphic image that consists of number of‖ hyperlinks‖ incorporated within

an image. The specific areas within an image are known as hotspot. Each hotspot is a link. These

regions are clickable. The map itself is either separate file(Server side map) or part of HTML document(client side map). Image format can be used are either JPEG or GIF.MAP FILE isa text file

that contains the information of an image and the mapped areas of an image. These areas can be

rectangles, circles, or polygons defined in an image and are done by specifying screen coordinates in

pixels. Image maps are of two types-client side image map and server side image map.

1.2.1Client side image maps

Client side image maps are not dependent on server. They are executed on client machine from web

browser itself. Since all information for a client-side image map is loaded along with the image, it works more quickly than server-side image map.

Creating client side image map

In order to mention that image map is client side, use USEMAP attribute of the <img>tag. <map> and <area>tags are used to define hotspot in an image. The <map> tag has name attribute which is

referenced within the <img> tag with USEMAP attribute.

For example, see the code

<img src="C:\Users\Public\Pictures\Sample Pictures\tulips.jpg" usemap="#test">

<map name="test">

------------------

-----------------

</map> In above example ‖tulips.jpg‖ is the image.

The attribute usemap="#test" says that this is client side image map and its mapping name is ―test‖.

For specifying the areas of the hotspot, the <area> tag is used within <map> tag.

The attribute of <area> tag are as follows-

Shape-specifies as Rectangle, circle and polygon.

Coords- specifies coordinates forRectangle, circle and polygon.

Alt - specifies alternate text given to hotspot.

Href-specifies path of html file or URL of website.

To find coordinates of this shape we have to find pixel location of image for that you will have to use a graphic editing program, such as paint brush or adobe Photoshop. The pixel locations are measured

Page 7: SYJC Arts IT Chapter 1 to 6.pdf

from the upper left corner of the image. Each pixel locationconsistsof horizontal X and vertical Y –axis

.

RECTANGLE (RECT):This requires the upper left and right bottom (X, Y) coordinates.

<area shape="rect" coords="22, 37, 123, 97" alt="rectangle" href="page1.html">

CIRCLE (CIRCLE):This requires the coordinates of center point and radius (in pixels).

<area shape="circle" coords="406, 38, 30" alt="circle" href="page2.html">

POLYGON (POLY): This requires3 ormore pair of coordinates to form polygon.

<area shape="poly" coords="48, 169, 142, 234, 50,248" alt="polygon" href="page3.html">

The following code is an example of client side image map

<html> <body> <img src="C:\Users\Public\Pictures\Sample Pictures\tulips.jpg" alt="image” usemap="#test"> <map name="test"> <area shape="rect" coords="22, 37, 123, 97" alt="rectangle" href="page1.html"> <area shape="circle" coords="406, 38, 30" alt="circle" href="page2.html"> <area shape="poly" coords="48, 169, 142, 234, 50,248" alt="polygon" href="page3.html"> </map> </body> </html>

Output of the example

Figure 1.9 Client side image map

1.2.2 Server side image map

When a server side image map is displayed on the browser, then the program that executes the links is placed on the server. The browser activates program on the server by sending x and y coordinates of

the position where the hyperlink was created. On receiving these coordinates the program on the

server looks at the map file for close match to these coordinates and then loads the file that is closest to this range.

Creating server side image map Server side image is not used often but it is very important to know how it works Server side image map require following elements-

A map file on the server that contains the coordinated regions and the web pages or URL

Html code to indicate an image map

Steps to create server side image map

1. Using a text editor, create a text file and save it with the extension (.map) and place this file to same folder in which you have placed html document containing the image. In this map file

you have to include following:

Default http://servername/folder/xyz.html Recthttp:// servername/folder /yahoo.com 39, 61,179,135 Circle http:// servername/folder/google.com 286, 90, 45 Poly http:// servername/folder/hotmail.com 115, 35,169,117,156,174

Page 8: SYJC Arts IT Chapter 1 to 6.pdf

A default URL is the location where the user is taken on clicking on part of image map which is not hotspot. It is important to specify default URL for server side image map.

2. Once you have created your external map file, add the following lines in to your html

document.

<a href=”http://servername/folder/server.map”>

<img src=”cloud.gif” ISMAP></a>

The < a href> tag specifies the location of external map file and the server side image map program on

the web server. The<img>tag is reference for the mapped file. The ISMAP attribute in the <img> tag

specifies that the image is mapped file. ISMAP indicates a server side image map.

1.2.3 Combining Client and server side image maps

Most of the steps we have already done in client side and server side image map such as defining

pixel locations and then creating an external map file. The difference is in the step where you have to

reference your external map file and create an internal map file within your html document that

contain image map.

This can be done with the help of combination of server side and client side image mapping.

Once you have pixel location of your hotspot area, then you have to create external map file with

name server. Map,place it in the same folder as your html document. The content of this would be:

Default http://servername/folder/xyz.html Rect http:// servername/folder /yahoo.com 39, 61,179,135 Circle http:// servername/folder/google.com 286, 90, 45 Poly http:// servername/folder/hotmail.com 115, 35,169,117,156,174

As it is the combination of server side/client side image maps,so it must contain element of both.

Therefore the need for two map files—an internal map file and external map file. The client side map

file is included in html code as--

<a href=”http://servername/folder /server.map”><imgsrc=”cloud.gif” ISMAP></a> <map name="test"> <area shape="rect" coords="22, 37, 123, 97" alt="rectangle" href="page1.html"> <area shape="circle" coords="406, 38, 30" alt="circle" href="page2.html"> </map>

The server side map file created earlier will be used only if browser cannot use the client side map

file. In above code

<a href=”http://servername/folder /server.map”><img src=”cloud.gif” ISMAP></a> Links both the client side and server side image maps. This tells the browser where to look client side

map (#test) information in the HTML page and also link the server side image map (server.map) in

case the user‘s browser does not support the client side image map. The method will make your image map independent of the browser or server.

1.3 Forms and Forms object Forms are used to accept or input the data from user. The forms that consist form object/elements.

Form elements or objects are Textbox, radio button, checkbox, drop down list, submit and reset button etc.

1.3.1 The <form> tag

Form is created using <Form> …</Form> tag. All form elements are placed inside the body of the

form. Form cannot be nested.

Syntax

<Form>

.

Input elements .

</Form>

Page 9: SYJC Arts IT Chapter 1 to 6.pdf

1.3.2 Attributes of <Form> tag

Method: This attribute has two values GET or POST. The POST value is used to send the data to the server for processing. The GET is the default method by which appends the form-data to the URL in

name/value pairs:

URL?name=value&name=value

Action: This attribute is used to the specify the location/path or URL of the server where form information submitted.

Name: This attribute is used to assign the name to form.

For example:<form method=‖post‖ action=‖http://someserver/xyz/formname.asp‖> In above example the form‘s data is stored at assigned location in action attribute.

1.3.3 Text input fields or textbox

Text field or input field allows the user to key in text in to the field. <Input> tag is used to create a

text/input field or single line text box. It has no ending tag. <input type=‖text‖> is used to create

single entry text box. By default the value of type is text.

<Form>

First name: <input type="text" name="firstname" >

Last name: <input type="text" name="lastname” >

</Form>

The above HTML code looks in a browser as follows:

First name:

Last name:

Attributes of <Input> tag

Size This attribute assign the limit to display size of a text box. <Input type=‖text‖ size=35 name=‖xyz‖>

Maxlength This limits the number of character that the user can key in a text field.

<input type =‖text‖ name=‖xyz‖ maxlength=3> i.e. maximum 3 characters can be entered in the text box.

Name Is used to assign the name to the textbox for processing of information contained in

the text box, at the server end.

Value Is used to assign the default value to text box

Checked Attribute is used for default selection of radio button and checkbox

Type Indicates the type of form objects like text(default),radio, submit,reset,radio,checkbox

etc.

Readonly Indicates that changes to the form element cannot occur

Table No.3

Password Field

When user types in a text field of type PASSWORD then text entered is displayed as asterisk(*)or

disc(•)sign.

<input type="password"> defines a password field:

<Form>

Password: <input type="password" name="pwd">

</Form>

The above HTML code looks in a browser as follows:

Page 10: SYJC Arts IT Chapter 1 to 6.pdf

Password: ********

Radio Buttons

Radio buttons are something like toggle button and only one button can be selected at a time. If user

selects a radio button from a group then all other become deselected. You can group RADIO buttons

by giving them the same NAME but different VALUE. By default all radio buttons are unselected. You can control this status by defining the CHECKED attribute within the INPUT tag.

See the following example

<Form> <input type="radio" name="sex" value="male"> Male<br> <input type="radio" name="sex" value="female"> Female </Form>

The above HTML code looks in a browser:

Male

Female

Checkboxes

<input type="checkbox">creates a checkbox. Checkbox is used to select ONE or MORE options of a

limited number of choices. Checked attribute will select the checkbox by default. Following code

shows two checkboxes. Using checked attribute, Tuesday checkbox get selected by default.

<Form> <input type="checkbox" name="day1">Monday<br>

<input type="checkbox" name="day2" checked>Tuesday </Form>

The above HTML code looks in a browser:

Submit button

<input type="submit"> defines a submit button. A submit button is used to send form data to a server

for processing. The data is sent to the page specified in the form's action attribute.

<form name="xyz" action="html_form.asp" method="post"> Username: <input type="text" name="user"> <input type="submit" value="Submit">

</form>

The above HTML code looks in a browser:

Username: If you type some characters in the text field above, and click the "Submit" button, the browser will

send your input to a page called "html_form.asp". The page will show you the received input. Using the VALUE attribute you can change the label of the button to of your choice. If you have not

specified the value attribute, then submit query will be displayed by default.

Page 11: SYJC Arts IT Chapter 1 to 6.pdf

<input type=”submit” value=”Hello world! “> Or <input type=”submit”> The above code displayed in a browser:

Or

RESET BUTTON The RESET button usually used along with SUBMIT button resets the value of the form to its original states.

<input type=”reset” value=”Reset“> Or

<input type=‖reset‖ value=‖clear form‖>

Using Button value also we can create button. Remember, whatever button we have created using

Button value that is only for clicking only not submitting the form data.

<form>

<input type="button" value="CLICK‖>

</form>

Hidden fields

Hidden is value of <input>type tag. The main purpose for the hidden field is to store the value that

need to be sent to server along with form submission. The web browser does not display these values.

<input type=”hidden” name=“xyz”>

The<SELECT> TAG The<select>--</select> tag allows the user to select an option from menu kind of drop-down list or

scrolling list box.

Each item in the drop- list can be created using <option>--</option>tag which is used within

<select> tag. The closing</option> tag is optional. You can use VALUE attribute along with each <option> tag to assign a value to each option. (Figure1.10)

<html> <body> <form> <p> please select the car</p> <select name="car"> <option value="volvo">Volvo</option> <option value="saab">Saab</option> <option value="fiat">Fiat</option> <option value="audi">Audi</option> </select> </form> </body> </html>

The output of example

Figure 1.10 select tag

Page 12: SYJC Arts IT Chapter 1 to 6.pdf

Attributes of <select> tag

Name Is used to assign the label to selection. This helps to identify which item

user has selected.

Size Allows to specify the number of list items to be displayed at one time. e.g.

size=value

Multiple It is used to select more than one selection from the same list

Table No.4

This display the option as selected by using the SELECTED attribute with <option> tag. If this is not included, the form displays the first element listed as default selected choice.

The following example includes the entire SELECT attribute

<html> <body> <Form> <p>Select the city <select name="city"> <option value="1">Mumbai</option> <option value="2">Pune</option> <option value="3">Delhi</option> </select></p> <p>select multiple option</p> <select name="city" multiple> <option value="1">Mumbai</option> <option value="2">Pune</option> <option value="3">Delhi</option> </select><br><br> <input type="submit" value="submit"> <input type="Reset" value="Reset"> </form> </body> </html>

The output of example

Figure1.11 a select tag showing multiple options

1.3.4 The <Textarea> tag

The <Textarea>--</Textarea> is used to create multiline textbox or large editable area. It is useful in

those forms where you want detailed feedback with multiline entries.

Attribute of <textarea> tag

Name: =‖text‖ attribute sets the name of the textarea to the script on the server when the form is

submitted.

Cols=”number‖: specifies the width of the text entry area as columns.

Rows=―number‖: specifies the height of the text entry area as rows.

Page 13: SYJC Arts IT Chapter 1 to 6.pdf

For example

<html> <body> <form> <p>Extra-curricular Activities description</p> <textarea rows="3" cols="30"></textarea> <p>Extra-curricular Activities description</p> <textarea rows="3" cols="30"> Please enter your comment</textarea><br> <input type="submit" value="submit"> <input type="Reset" value="Reset"> </form></body></html>

The output of example

Figure 1.12 textarea tag within form

<input type=”file”> This attribute is used for uploading the files.

Observe the following example

<html> <head><title>form</title> </head> <form> <p align="center"><b>File Upload system</b></p> File Description:<br> <input type="text"><br> Specify File to post<br> <input type="file"><br> <input type="submit" value="Send it"></form> </body> </html>

Output of the example

Figure 1.13 File form control rendering the

dialog box

Sample Feedback Form

<html>

<head>

<title>Form</title>

</head>

<bodybgcolor="yellow">

<h2 align="center">Feedback Form</h2>

<form>

<P>

First name: <INPUT type="text" name="firstname"><BR>

Last name: <INPUT type="text" name="lastname"><BR>

Email address:<INPUT type="text" name="email"><BR>

Sex:<BR>

Page 14: SYJC Arts IT Chapter 1 to 6.pdf

<INPUT type="radio" name="sex" value="Male"> Male<BR>

<INPUT type="radio" name="sex" value="Female"> Female<BR>

Hobbies

<ol>

<li><Input type="checkbox">Reading Books</li>

<li><Input type="checkbox">Listening to music</li>

<li><Input type="checkbox">Playing Games</li>

</ol>

What would you like to do today? <BR>

<SELECT size=2>

<OPTION value=drink>Drink Coffee

<OPTION value=read selected>Read A Book

<OPTION value=walk>Take A Walk

<OPTION>Exercise

</SELECT><BR>

Please enter your comments below: <BR>

<TEXTAREA name=positive rows=10 cols=20></TEXTAREA><BR>

<INPUT type="submit" value="Send">

<INPUT type="reset" value="Clear Form"></form></body></html> Output of the example:-

Figure 1.14 Form objects

1.4 Inserting Sound and Video Inserting audio and video increases the effectiveness of web pages. We can insert sound and video in

addition to hyperlink for video in web page.

Popular sound/audio formats for the web are

1. .WAV format developed by Microsoft and IBM. It is audio standard for windows platform.

2. .AIFF (Audio Interchange File Format) was developed by Apple and is mainly used for MAC platform.

3. .Ra (Real Audio Format) is lower quality audio, but loads much more quickly due to file size

the Real audio file is much smaller WAV,AIFF format. The sound quality is not as good. 4. .MPEG/.MPG(Moving Picture Experts Group) format does not occupy space and gives very

good sound quality. This is very popular sound format for the web.

5. .AU (Audio) is a Sun Microsystems format. It is for UNIX platform.

Page 15: SYJC Arts IT Chapter 1 to 6.pdf

6. .MIDI (Musical Instrument Digital Interface) format is basically music industries standard format that uses very less disk space than that of WAV formats. This format is used for

instrumental music.

1.4.1 Linking to an Audio/Midi files Hyperlink the audio file format that would like to use in web page.Using <A>anchor tag.

<html>

<head>

<title>audio in webpage</title>

</head>

<body>

<a href=‖C:\Users\Public\Music\Sample

Music\Sleep Away.mp3‖> click here to play

the song</a>

</body>

</html>

Output of the example

Figure 1.15 Hyperlink the audio

1.4.2 Adding sound to web pages To add music/audio file in to web page, <Bgsound>and<Embed> both tags can be used.

1.4.2.1 <Bgsound> tag Using <Bgsound> tag background sound can be added to an HTML page. Using this tag you can play

audio format like WAVE, AU and MIDI. The <Bgsound> tag does not have any control attribute. It is

supported by only Internet Explorer Browser. Syntax

<Bgsoundsrc=‖audio file‖ loop=2>

Attributes of <Bgsound>tag ( Table 5)

Src Specify the name of audio file that you want as background sound

Loop This attribute specify number of times the file must be played. The attribute takes number as value e.g. Loop=2 plays sound file twice,

loop=‖infinite‖ or -1 plays sound file continuously/ forever

Table 5

The following example shows the background sound and their attribute

<html>

<head>

<title>audio</title>

</head>

<body>

<h1>Inserting Background sound</h1>

<bgsound src=”C:\Users\Public\Music\Sample Music\Sleep Away.mp3“loop =-1>

The output of example

Page 16: SYJC Arts IT Chapter 1 to 6.pdf

</Body></html>

Figure 1.16<Bgsound> tag

1.4.2.2<Embed> tag

This tag is used to insert audio as well as video both. With <embed> you have several options for

customizing the console.

Attributes of<Embed>tag (Table 6)

Src Specify the name of audio or video file that isembeded in HTML page.

Autostart=‖true/false‖ True tell the browser to play the music when page is loaded. Using ―false‖

as a value will mean that the sound will have to play by the user clicking

on play button.

Hidden=‖ true/false‖ False value shows the console(Default) where as true value hide the

console so you can only listen the audio or video

Volume Sets the volume of music. The volume can be set to any value between 1

to 100, 50 being the default value.

Width specifies the width of console

Height specifies the height of console

Controls=‖consoles/small

consoles‖

Value Console gives the complete console with play, stop and pause

button and small consoles displays play and stop button.

Table 6

For example

<html> <head> <title>embed</title> </head> <body> <h1>Inserting sound using Embed tag</h1> <embed src=”song.mp3” height=200 width=200> </body> </html>

Output of the example

Figure 1.17 Sound using Embed Tag

1.4.2Video file formats

Inserting video or movie files in the web page makes it more attractive. Like sound file format there

are video formats which can be inserted into the web page. Some of video formats are:

.AVI (Audio Video Interleave) format for windows was developed by Microsoft and it is windows

standard.

.QT (QuickTime)formats developed by Apple for MAC platform.

MPEG /mpg/.mp3 format produces fine picture quality and is widely used for web.

1.4.4Adding video using the DYNSRC and EMBED tag

Page 17: SYJC Arts IT Chapter 1 to 6.pdf

<embed> tag is used to insert video on the web page. Dynsrc (Dynamic source) attribute is used along with <img> tag which is used specify the name of video file.

Syntax

<img dynsrc=‖name of video file‖>

For example

<html>

<head>

<title>adding video</title>

</head>

<body>

<h1> Adding video using DYNSRC</h1>

<img Dynsrc=”C:\Users\Mr.Ashish\Desktop\Shala [2012] Marathi Movie.avi” height=200 width=200>

</body></html>

Output of example

Figure 1.18 VIDEO with DYNSRC

Example with <Embed> tag

<html> <head> <title>adding video 1</title> </head> <body> <h1> Adding video using EMBED</h1> <embed src=”C:\examples\media\sample.avi” height=200 width=200> </body> </html>

Output of example

Figure 1.19 video with <EMBED>

1.5Creation of Web Content using Indian Languages by using standard Unicode and

Indian Language fonts such as Arial Unicode MS and Mangal

We were facing many problems while typing regional languages other than English in Computer. It

was trouble for us while working with other languages; but it is possible through standard Unicode

We shall learn use of Unicode to establish regional language.

Unicode is an standard character set encoding developed and maintained by The Unicode® Consortium. The Unicode character set has the capacity to support over one million characters, and is

Page 18: SYJC Arts IT Chapter 1 to 6.pdf

being developed with an aim to have a single character set that supports all characters from all scripts,

as well as many symbols, that are in common use. Unicode, also known as UTF-8 (Unicode

Transformation Format-8) or the "Universal Alphabet‖. After creating your multilingual Web pages,

you should test them on as many browsers and operating systems as you can. Nearly all of the current

Web browsers include Unicode support and can therefore display text simultaneously in several

scripts and languages, provided that suitable fonts are installed and that the browser has been configured to use them. We can read easily typed content on any computer. For using Unicode in

computer, installation of font ‗Mangal‘and Arial Unicode MS is necessary.

Steps to create WebPages using Indian languages.

1.5.1 Language setting in windows 7 The default language setting of windows does not give permission to type the content in

certain languages so you have to make certain changes in windows 7/Vista to make it compatible to the fonts of that particular language.

Go to control panel in windows 7 operating system and add Devnagari keyboard to it. Click

on the ―start‖ button on the Taskbar and click on ―Control panel‖ (Figure 1.20). Next, click on ―Clock, Language and Regional‖ and Click on ―Change Keyboards or Other

Input Methods‖ options. Now in the ―Regional and Language Options‖ window in the

―Keyboards and Languages Tab‖, click on the ‗change keyboards option‘. (Figure 1.20 and 1.21).

Now in the ‗Text Services and Input Languages‘ window, in the ‗General‘ Tab, click on

‗Add‘ button. In the ‗Add Input Language‘ window, in front of the ‗Marathi (India)‘ font,

click on plus sign. Now click on plus sign in the front of the word on the plus sign in the front word ‗Keyboard‘ and click on ‗Devnagari In script‘ and ‗Marathi (India)‘ and click on the OK

button.(Figure 1.23 and 1.24).

Now in the ‗Text Services and Input Languages‘ window, in the ‗Default Input Languages‘,

include ‗Marathi (India) -Devnagari In script‘ option and click on the ‗Apply‘ button. Then

click on ‗OK‘ button.(Figure 1.25). The above procedure shown in Figure 1.20 to 1.25

Figure 1.20 start menu

Page 19: SYJC Arts IT Chapter 1 to 6.pdf

Figure 1.21 control panel

Figure 1.22 region and dialog box

Figure 1.23 Text services and input language

Page 20: SYJC Arts IT Chapter 1 to 6.pdf

Figure 1.24 Add input language

Figure 1.25 Add input language

For the example

<html> <head> <title>Indian language</title> </head> <body><h1>

भारत माझा देश आहे</h1>

</body> </html>

Type this code in the notepad by setting ‗Marathi India‗

and save as html extension and UTF-8 Format. Output of the example

Figure 1.26 web pages using Indian Languages

Page 21: SYJC Arts IT Chapter 1 to 6.pdf

1.6 Cross browser testing

Testing your website on different browser is known as Cross browser testing. Once website is ready,

it must be tested on different browser i.e. Internet explorer and Mozilla Firefox is called as Cross

Browser Testing Method. This shows limitation of the web site and functional features. Some html

tags are not supported by certain versions of different browser.

For example

<html> <head><title>cross browser</title> <body> <bgsound src=”ding.wav” loop=2> <img src=”noimage.jpg” alt=”broken image”> <br> <blink> This blinks the text</blink><br> <table border bordercolorlight=”red” bordercolordark=”yellow”> <Caption>temperature</caption> <tr> <th>City</th> <th>Max</th> <th>Min</th> </tr> <tr> <td>Mumbai</td> <td>30</td> <td>25</td> </tr> <tr> <td>Pune</td> <td>35</td> <td>30</td> </tr> <tr> <td>Nagpur</td> <td>40</td> <td>35</td> </tr> </table></body></html> Cross browser testing by using Internet Explorer and Mozilla Firefox browser. Output of the example

in figure 1.27 and figure 1.28

Page 22: SYJC Arts IT Chapter 1 to 6.pdf

Figure1.27 Cross browser test in Internet Explorer Browser

Figure 1.28 Cross browser test in Mozilla Firefox Browser

1.7 Introduction to CSS

CSS stands for Cascading Style Sheet. Style defines how to display html element/tags. CSS allows styling of web page. CSS is an advance tool for web designer to create professional WebPages that

cannot be made using regular HTML attribute.CSS can be Internal, External and Inline.

Page 23: SYJC Arts IT Chapter 1 to 6.pdf

1.7.1 Internal CSS

Internal style sheet can be defined internally within the web document. To define CSS into html code

<style> tag is used within <head> tag.

CSS syntax

A style sheet is a set of rules. To define a rule you need a

a Selector

a Declaration- i.e. Property and value

Selector {property: value}

The selector is normally the HTML element/tag you want to style.

Each declaration consists of a property and a value.

The property is the style attribute you want to change. Each property has a value.

A CSS declaration always ends with a semicolon (;), and declaration groups are surrounded by curly

brackets. Property and value can be separated by colon (:).

Example program

<html>

<head>

<title>CSS Example</title>

<style>

p{background-color: red; text-align: center}

</style>

</head>

<body>

<p>this is paragraph</p>

</body>

</html>

Output of example

Figure1.29 CSS Effect

1.7.2 External style sheet

An external style sheet is ideal when the style is applied to many pages. In this method style

definitions are stored in a separate file with an extension .css . Link the file with the HTML document using <Link>tag within<head> tag.

Page 24: SYJC Arts IT Chapter 1 to 6.pdf

Consider the following example

The first file style.css is external file that stores style definitions. The second file, external.html, is

HTML document that uses the style definitions stored in the file style.css.

Style.css

h2 {font-style: italic; background-color: yellow; color: red} P {background-color: pink} In the preceding code, the style for <h1> and <p> tags are defined.Save this file with style.css

The following is the code for the external.html file

External.html

<html> <head> <title>external css</title> <link rel="stylesheet" type="text/css"href="style.css"> </head> <body> <h2>This is heading style example</h2> <p>This is Paragraph</p> </body> <html>

Output of example

Figure 1.30 External style sheet

1.7.3<Link> Tag and their attribute

<Link> tag is used to link style sheet properties to an HTML document. You can also define by

linking to an external style sheet.<link> tag used within <head> tag.

Attributes of <link>

REL This attribute is used to define the relationship between the linked file and the

HTML document.

TYPE This attribute is used to specify a media type=text/css for a Cascading Style Sheet.

HREF Specifies the css filename to be linked..

1.7.4 Inline style sheet In Inline style sheet we can use style element as an attribute of any tag. To include the style definition

with the tag, we use STYLE property. For example, to define a style for <p> tag with the properties a font face Arial and text italicized, you can use following code.

<p style=”font-family: Arial; font-style: italic”>This came from a paragraph tag with a style</p>

An inline style affects only the element for which the style is defined.

In the code line, the first <p> tag has an inline style defined as <―font-family: Arial; font-style: italic‖>. This style will be only applied to the text written within that <p> tag.

Page 25: SYJC Arts IT Chapter 1 to 6.pdf

For example

<html> <head><title>inline css</title> </head> <body> <p style=”font-family: Arial; font-style: italic”>This came from a paragraph tag with a style</p> </body> </html>

The output of example

Figure 1.31 Inline style sheet

1.7.5 The classes IDs

The CLASS selector is used formatting variations for different instances of a single element. For

example, using the CLASS selector, you can define different styles for the different instances of the

H1 element in an html document. The CLASS selector can be used to share the same format.

A class selector definition starts with a period (.) followed by a name, and then the style definition.

Consider the following example

<html> <head><title>Class Selector Example</title> </head> <style> .xyz {color: green; background-color: yellow} </style> </head> <body> <h1 class=”xyz”>Heading with style definition from the class .xyz</h1> <p class=”xyz”>This is first Paragraph taking the style definition from class</p> <p>This is another paragraph with no style</p> </body> </html> In the above code .xyz is a class name. <H1> tag and the first <p> tag share the same styles defined in

the class .xyz. The second <p> tag does not take this style because the class is not applied to it.

Page 26: SYJC Arts IT Chapter 1 to 6.pdf

The output of example

Figure 1.32 class selector

Notice that although <H1> and <p> tags are of the different types, they pick up the styles defined by

the .xyz class. An ID is similar to CLASS selector. However, there is difference between ID selector and a CLASS selector. Unlike a CLASS selector, an ID selector applies to exactly an element in an

HTML document. ID gives identification to a particular element.

An ID selector definition starts with (#) hash symbol, followed by name, and then the style definition.

Consider the following code

<html>

<head><title>ID Selector</title>

</head>

<style>

#pqr {color: green; background-color: pink}

</style>

</head>

<body>

<p ID=”pqr”>This Paragraph taking the style definition from ID selector</p>

</body>

</html>

In the above code #pqr is the name of ID selector. When the ID, pqr, is applied to the <p> element, the ID is not applied to any other element.

Page 27: SYJC Arts IT Chapter 1 to 6.pdf

Figure 1.33 ID Selector

1.7.6 The contextual selector

There may situations when you want a given style to be applied to instance of one selector within

another. For example, when <i>---</i> tags occur inside <p>---</p>tags, the text color should be

green. You can do this by declaring the style tag.

<style>

P I {color: green}

</style>

Here, only instances of the<I> tag within the <p> tag will have the style as declared above.

<html>

<head><title>contextual Selector</title>

<style>

PI{color: green}

H1{color: red}

</style>

</head>

<body>

<H1>Using <I> Selector</I></H1>

<p> contextual <I>selector</I></p>

</body>

</html>

In the above code, the <I> tag enclosed in the <p> tag will have the text in green and the <I> tag

enclosed in the <H1> tag will take the color of <H1> tag.

Page 28: SYJC Arts IT Chapter 1 to 6.pdf

Figure 1.34 displays the output of the above code

Figure 1.34 Contextual selector

1.7.7 Grouping selector This property can be used when same style has to be applied to different tags. Without grouping, the syntax will be

H1 {font-family: arial ; color: red; background-color: yellow} H2 {font-family: arial ; color: red; background-color: yellow} H3 {font-family: arial ; color: red; background-color: yellow} It can be grouped as

H1, H2, H3 {font-family: arial; color: red; background-color: yellow}

1.7.8 Positioning using CSS

With CSS positioning, one can place an element exactly where user want it on the web page. By

applying CSS positioning to the elements, user can control the positioning of the elements.

There are two ways of positioning

Absolute positioning

Relative positioning

The principle behind CSS positioning is that you can position any box anywhere in the system of

coordinates. Imagine a browser window as a system of coordinates

Page 29: SYJC Arts IT Chapter 1 to 6.pdf

Figure 1.35 coordinate window

Let's say we want to position a headline. By using the box modelthe headline will appear as follows:

If user want this headline positioned 100px from the top of the document and 200px from the left of

the document, then the code is asfollows in our CSS(Figure 1.35a)

h1 { position: absolute; top: 100px; left: 200px; }

The result will be as follows:

Figure 1.35(a)

Page 30: SYJC Arts IT Chapter 1 to 6.pdf

1.7.8.1Absolute positioning

The absolute positioning define the exact pixel value where the specified HTML element will appear.

To position an element absolutely, the position property is set as absolute.The properties left, right,

top, and bottom to place the box.

For the example

<html> <head> <style> h3 {position: absolute; top: 200px;left: 150px} p {position: absolute; top: 75px;left: 75px} </style> </head> <Body> <h3>This is my h3 header</h3> <p>This is my paragraph</p> </body></html> The output of example

Figure1.36

In above example the heading tag positioned 200px from the top of the document and 150px from the left of the document, and paragraph tag positioned 75px from the top of the document and 75px from

the left of the document

1.7.8.2 Relative positioning It is the distance from previous element of the web page or offset the box from other element on the web page. To position an element relatively, the property position is set as relative.

The position for an element which is relatively positioned is calculated from the original position in

the document. That means that you move the element to the right, to the left, up or down.

In the example given below first row of the text normally across the page. The second row, displayed using <P> tag positioned 35 pixels to the right of the element above it as shown in Figure 1.37

Page 31: SYJC Arts IT Chapter 1 to 6.pdf

<html>

<head>

<title>Relative position</title>

<style>

#xxx {position:relative;Top:70px;left:35px}

</style>

</head>

<body>

<p>This is normal flow text row</p>

<p id=‖xxx‖>This text is offset from the

above line 70 pixels from top and 35 pixels

on the left<p></body></html>

Output of example

Figure 1.37 Relative positioning

1.7.9 3-D Layers

Using the Z axis positioning you can layer objects on top of each other. If you position multiple

elements at the same x and y coordinates, each new element will cover up the earlier elements.

To avoid this, z-index property is used. You can specify the layer on which an object is to be positioned by setting the z-index higher or lower.

In the following example, shows how by using the z-index two lines of the text with approproximately

the same absolute location are placed on the page as shown in figure 1.38

<html>

<head>

<title>3 d layers</title>

<style>

.upper {position: absolute; Top: 35px; left: 30px; width: 200px; height: 150px; z-index: 2;

background-color: yellow}

.lower {position: absolute; Top: 65px; left: 90px; width:300px;height:150px;z-

index:1;background-color:green}

</style>

</head>

<body>

<div class=‖upper‖>this layer is positioned at 30 px from the left and 35 px from the top of

the window.

</div>

<div class=‖lower‖>this layer is positioned just below the above text, and would usually be

placed on the top using z index </div>

</body>

</html>

Page 32: SYJC Arts IT Chapter 1 to 6.pdf

Observe the following Figure 1.38

Figure 1.38 3-D layers

1.7.10Letter-spacing property This property adjusts the amount of space between letters in the content.

Following example give 20 pixels space has been placed as in Fig1.39 <html> <body> <p style=”letter-spacing: 20px”>In this line each letter has been placed 20 pixels apart</p> </body> </html> The output of example

Figure 1.39 Letter Spacing

1.7.11.1Text-Decoration

This property allows the user formatting like underline, line-through, overline or no line at all the text.

Syntax

Selector {Property: Value}

Where values are

Page 33: SYJC Arts IT Chapter 1 to 6.pdf

Value Description

None Defines a normal text. This is default

Underline Defines a line under the text

Overline Defines a line above the text

line-through Defines a line throughi.e. strike out the text

Blink Defines a blinking text. The "blink" value is not supported in IE, Chrome

browser supported in Mozilla Firefox

The following code demonstrate text-decoration property

<html>

<head>

<style type="text/css">

h1 {text-decoration: overline}

h2 {text-decoration:line-through}

h3 {text-decoration:underline}

h4 {text-decoration:blink}

</style>

</head>

<body>

<h1>This is heading 1</h1>

<h2>This is heading 2</h2> <h3>This is heading 3</h3> <h4>This is heading 4</h4> <p><b>Note :< /b>the "blink" value is not supported in IE, Chrome, It is supported in Mozilla Firefox<p> </body> </html> Output of the example

Page 34: SYJC Arts IT Chapter 1 to 6.pdf

Figure1.40 Text decoration property

1.7.11.2 TEXT – ALIGN

The text-align property allows you to adjust the text alignment of your content. You can align to the

left, right and center or justify.

Syntax

Selector {Property: value}

Where the values are

Left, right and center or justify

For example

h1 {Text-align: center}

In above code line displays the content of <h1> as a center of the page.

Style Properties

Property Description

background-color Sets the background color of an element

Color Sets the color of the text

background-image Sets the background image for an element

border Sets all the border properties in one declaration

border-color Sets the color of the four borders

height Sets the height of an element

width Sets the width of an element

font Sets all the font properties in one declaration

font-family Specifies the font family for text

font-size Specifies the font size of text

font-style Specifies the font style for text

font-variant Specifies whether or not a text should be displayed in a small-caps font

Page 35: SYJC Arts IT Chapter 1 to 6.pdf

font-weight Specifies the weight of a font

Table No.7

1.8 Web server

Web server can be refered to either the hardware (the computer) or the software (the computer

application) that helps to Transfer Web pages that can be accessed through the Internet. The most

common use of web servers is to host websites or provide access to content and responds to requests

received from web browsers. A web server uses one or more protocols such as HTTP (Hyper Text

Transfer Protocol), FTP (File Transfer Protocol) and for transfer.

Web server also performs file management, execute script, process form data, authenticate data and

perform security checks.

1.8.1 Locating web server

At the time of visiting an FTP server with a WYSIWYG (What You See Is What You Get) * FTP

program (like CuteFTP) you will be presented with a list of directories. A directory is identified by

the characters "dir", for "directory" or a little yellow folder icon. If click on this line you will go down

the directory tree to more directories or to the files in that directory, or both. Today most FTP sites

can be viewed using a standard web browser. The web browser will list the directories and files in

blue (denoting a link below). You can click on these links to commence a download. Simply type the

URL of the server into the location box.

For example:

ftp://name.of.site/ will give you a listing of all the directories of

the FTP server;

ftp://name.of.site/directory/ which will give you a listing of all the files available in that directory; and

ftp://name.of.site/directory/filename will download the actual file

to your computer

1.8.2 Directories and File Organisation

To move through levels of directories in the same way that you do in Windows Explorer in Windows.

In other words, mouse click on a directory to see its contents. Move up the directories by clicking on the up arrow folder icon and down directories by clicking on the directory's folder icon. Let‘s say you

had built a web site and you wanted to upload all your files to your ISP's web server. In the left pane

you would go to the directory with your HTML files and picture files in it. In the right pane find your "work space‖. In the left pane you would highlight the files you want to move to the web server and

then click the up pointing arrow. Note that file names can be deleted or renamed in FTP program.

1.8.3 Moving files to web server

To move files to the web server use FTP, FileZilla or some other way. While transferring the file

following points are important

File name restrictions are to be considered.

Watch out for upper/lower case sensitivity as web servers (namely, those of the UNIX and

Linux variety) are sensitive to the case use in file names.INDEX.html and index.html are considered as two different files.

Transferring mode of file: when you transfer file using Filezilla FTP or any other program

will be provided with option like binary or ASCII mode of transfer. Always transfer your

HTML files, images and other media in binary format.

1.8.4 Commercial web services

Using Internet access through ISP (Internet service Provider) via commercial online service, then this

method is expensive method and there may be space and script restrictions. These can solve these

Page 36: SYJC Arts IT Chapter 1 to 6.pdf

issues with the help of ISP or Commercial Web services. There are many services are available on internet that provide assistance in web publishing. They provide disk space,FTP and other programs

to upload files to their server. These commercial services have administrator, which maintain the

server and it is running all the time. Some of these services charge monthly or some of them free of cost.

For example

http://www.geocities.com, http://www.tripod.com Most of commercial internet services providers give web space on their own server and account name

is added on to the server address.

1.8.5 Setting up the web server

Websites on server maintained by someone else may have to face lot of restrictions such as space,

script and content in some cases. By setting up own server a lot of these problems can be erased.

There are many things to consider when setting up own web server. A computer that can be dedicated as a web server with broadband connection.

A high upload rate is of the utmost importance. A computer that will be enough to keep up with server

requests. Processor intensive web sites will require a higher quality PC than a web site that only has a

few static HTML pages. An ISP or Internet Connection that supports web traffic. Many ISPs will not allow users to run a web server unless they pay an additional fee.

1.8.6 Windows IIS server and UNIX Server

Windows IIS server

Internet Information Services (IIS) – formerly called Internet Information Server – is a web

server application created by Microsoft for use with Windows. It comes with three other servers‘ web,

FTP and Gopher. IIS is for Windows XP, Windows Vista and Windows 7 operating systems. It is

used for building and administering web sites.An ASP (Active Server Pages) scripts processed on web

server (IIS).

Servers for UNIX systems

The NCSA (National Center for Supercomputing Applications) and Apache are twopopular serveravailable for UNIX systems.NCSA HTTPD was a web server originally developed at the

NCSA by Robert McCool. It includes security, authentication, and login and password validation. It

supports form processing and CGI script. The Apache HTTP Server commonly referred to as

Apache. Apache was originally based on NCSA HTTPD server. This server is faster than many other

free servers available.

References

1. web publishing by Monica D‘souza Jude D‘souzatata McGraw-Hill ISBN 0-07-040270-1

Chapter 6,9,13,14

2. HTML and XML introduction Prentice-Hall of india 2003 ISBN 81-203-2389-0 Chapter 9

3. http://www.w3schools.com

4. http://www.html.net/tutorials/css/lesson14.php

EXERCISE

1. Fill in the blanks 1. The ----------- attribute of <form> tag is used to specify path the file to be sent to the server.

2. The---------------- tag encloses client side image map specifications like shape and coordinates. 3. ------------- audio tag can only be used with Internet Explorer.

4. For floating frame---------- tag is used.

5. IIS stands for---------------------- 2. True or False

1. FTP stands for file transporter protocol

2. Dynamic and src are supported attributes of <img> tag 3. To create server side image map ISMAP is used.

Page 37: SYJC Arts IT Chapter 1 to 6.pdf

4. Noresize is attribute of <form> tag. 5. To add sound file in the web page <embed> tag is used.

3. Multiplechoice (ONE correct)

1. ________ tag is used to create Inline frame a. <frame> b. <iframe> c. <framset> d.<Noframe>

2. Target = ____________ will open the new html page in new window

a. a._parent b. _blank c._self d. _top e._bottom 3. Browser which does not support frame and to avoid blank screen ____ tag is used

a. <frame set> b. <frame> c .<noframe> d. <iframe> e.<nframe>

4. ________tag defines client side image map

a. <map> b.<name> c.<iframe> d.<name> e.<usemap> 5. _________tag is used to create single line textbox.

a. <input type=‖text‖> b. <text field> c. <text> d. <inputfield>

6. IIS is ___________ server.

a. Unix b. Linux c. Opera d. windows

4. Multiple choices (TWO correct)

1.<iframe> tag supports following attributes a. src b. Align c.frameborderd.getpos()

2. Following tags are used in client side image maps

a. <Area> b. <shape> c. <Map> d. <Ismap> 3. The valid values for method attributes of <form> tag in HTML are___

a. post b. get c. send d. retrieve

4. Sound can be added in web page using a. <bgsound> b. <sound> c. <audio> d. <embed>

5. Style tag can be present inside______

a. <title> b. <head> c. <body> d. </title>

5. Write HTML code for the Following

1.

2

Page 38: SYJC Arts IT Chapter 1 to 6.pdf
Page 39: SYJC Arts IT Chapter 1 to 6.pdf

Chapter 2.Cyber Laws and Ethics – Syllabus

2.1 Moral, Ethics and Law

2.2 Ethics culture and ethics for computer users, professionals and business

2.3 information service

2.4 code and guidelines of ethics

2.5 Introduction to cyber Laws and IT Act of India 2000

2.6 Digital Signature, Electronic Records-Attribution, acknowledgment and dispatch

2.7 Ten Commandments of Computing

2.8 Security and Privacy Control

2.9 Intellectual Property Rights

Scope and Limitations

2.1 Moral, Ethics and Law

2.2 Need for Ethics culture and ethics for -- computer users, professionals and business

2.3 Information service

2.4 code of ethics and ethic guidelines

2.5 Introduction to cyber Laws and

2.6 IT Act of India 2000 – Definitions, Digital Signature, Electronic Records-Attribution,

acknowledgment and dispatch

2.7 Ten Commandments of Computing

2.8 Security and Privacy Controls

2.9 Intellectual Property Rights

Page 40: SYJC Arts IT Chapter 1 to 6.pdf

Chapter 2

Cyber Laws and Ethics

Introduction:

With the widespread usage of IT, computers, mobile phones, Internet and other components of

the ICT technologies in India over the last couple of decades, there is increase in misuse (cyber

crimes) as well. Internet is easy to use and low cost fastest mode of communication. Majority of

the people are using it. Hence there is rise in cyber crimes. Cyber crimes such as spreading

computer virus, hacking, online financial frauds, email spamming, phishing etc. So to get remedy

for all these cyber crimes, IT act in India was finally articulated in the form of IT act 2000 in

year 2000 and modified in 2008 IT Act 2008 (Amendment). Ethics identify what is wrong and

what is rigt.

2.1 Moral, Ethics and Law

Moral: Moral refers to generally accepted standards of right and wrong in a society. Parents

guide their child to learn how to behave in society. e. g. Do not lie, do not steal, etc. In cyber

world, there are also such standards. e.g Do not make use of pirated software CDs, Do not use

computers for wrong and illegal hacking, stealing of passwords etc. A set of moral principles

which systematically links moral beliefs to each other is called as moral theory.

Ethics: The parents guide child to identify what is wrong and what is right; and select the right

thing. This determination of right and wrong, following right behavior, using morals is called as

ethics.

Laws: Law includes any act of parliament or of state legislature, ordinance promulgated by the

president or a Governor, as the case may be; Bills enacted as President‘s Act and includes rules,

regulations, bye-laws and order issued there under.

2.2 Ethics Culture and ethics for computer users:

It depends on a person that how to make appropriate use of any means. We always observe that

our society consists of various types of people. Constructive minded people make decent and

appropriate use of their knowledge and technology; by thus helping society in most preferred

way. Whereas, there can be also people who utilize their knowledge in destructive way for

various reasons.

Internet is communication media which is easily accessible & open to all. The word ―Cyber

Ethics‖ refers to the code of responsible behavior, one has to demonstrate while using Internet.

In a way, it is the code of conduct which defines what is right and what is wrong. It can be also

termed as ―netiquette‖ i.e. net etiquette to be ensured. As a part of responsible computer user in

the society, one shall use the system in ethical and lawful manner.

Ethics for Computer User – Any ethical computer user should avoid

1. Software piracy

2. Unauthorised access

Page 41: SYJC Arts IT Chapter 1 to 6.pdf

Software Piracy: Software Piracy is nothing but copyright violation of software created

originally by individual or institution. In includes stealing of codes / programs and other

information illegally and creating the imitated copy by unauthorized means and utilizing this

data either for own benefit or for profit making is violation of copyright act. Piracy is possible in

many forms and few most common are: duplication of original license copy, distribution and

usage of the same.

Types of software piracy include:

Borrowing and installing a copy of a software application from a person

Installing more number of copies of the software than authorized number of licenses

copies available

Installing and selling unauthorized copies of software while purchasing new computers.

Duplicating and selling copyrighted programs.

Downloading software illegally from peer-to-peer network, Internet auction or blog.

Unauthorized written CDs / DVDs for music, various software & utilities, etc. are the most

commonly observed examples of piracy.

Unauthorized Access:

Authorization means granting access rights to resources, which is related to information security,

computer security and to access control in particular. This is typically possible when the

particular software / service is purchased through legal and formal procedure.

Gaining access without user permission is known as Unauthorised Access.

Attempting to get information (like e-mails, bank account, intellectual or any other personal &

confidential information) from unauthorised person is known as accessing the machine illegally.

Examples of Unauthorized Access are :

- Hacking financial / bank account related information

- Stealing organizational / intellectual information

- Illegal monitoring of information owned by other users including mails and messaging

- Illegal use / break of login and password of other users

- Causing intentional irritation to other users by means of damaging software and

important information, etc.

Security technologies are used to manage access and prevent unauthorized access. It includes:

• Firewalls

• Intrusion Detection Systems (IDS)

• Virus and content scanners

• Patches and hotfixes

• Hardening operating systems and applications

Page 42: SYJC Arts IT Chapter 1 to 6.pdf

Unauthorised access can be overcome by

1. User‘s vigilance / monitoring

2. Updating installed softwares regularly with proper permissions and certifications

3. Installing patches regularly released by software companies

2.3 Information Services

1. Ensuring accuracy and authenticity

2. Properly designed database

3. Information provided should be complete without ambiguity

4. Providing proper security from unauthorized access

2.4 code and guidelines of ethics: Following are few key points which user should follow as

guidelines.

1. Honesty: As a part of decent behavior (netiquette), user shall always demonstrate the truth

while using internet.

2. Respect: User shall respect the privacy of the other users

3. Confidentiality: User shall keep confidentiality while using internet and do not share any such

information to anybody which will be breach and user should not try to get confidential data of

other users

4. Professionalism: User shall maintain professional conduct and well-mannered approach

5. Responsibility: User shall take ownership and responsibility of own data on internet and shall

also ensure that it contains authenticity and truth

6. Communication: User shall ensure decent and polite communication with others.

7. Obeying the law: Use should strictly ensure to obey the law and demonstrate decent internet

usage.

2.4.1 Ethics for Computer Professionals:

1. Computer professional is obligated to perform assigned tasks competently, according to

professional standards.

2. These professional standards include technical excellence and concern for the social effects of

computers on operators, users and the public.

3. Computer professionals shall ensure that their technical knowledge and efforts to create

desired output are getting utilized in the development of society.

4. Computer professionals are bound to operate on ethical grounds and with legal functions.

5. There are key factors and responsibilities that a computer professional shall take into account:

Page 43: SYJC Arts IT Chapter 1 to 6.pdf

Key factors and responsibilities of Computer Professional

- Before processing on defined activities, computer professional must ensure availability

of authentic and legal version of purchased software products. User must avoid usage of

pirated copy, thereby respecting legality of the product.

- Privacy is individual‘s right. Hence Computer Professional should ensure that they design

the product with high security and avoid any attempt of unauthorized access to specific

site / server.

- Confidentiality of the data shall be ensured so that it should be accessed by only intended

user.

- Data storage shall be ensured at well protected servers

- All defects must be rectified before launching the product of that version.

- All applicable cyber laws shall be taken into consideration while developing or launching

any software product.

2.4.2 Ethics for business:

With the help of internet, world has now become a global village. Internet has been proven as

boon to individuals as well as various organizations and business. E-commerce is becoming very

popular among businessmen as it is helping reach consumers faster than any other means. Every

consumer will expect that business deals should be carried out in the most legal and efficient way

and he should be benefited with service and product obtained through internet.

1. Business should have ethical policies and guidance on the proper use of business

computers.

2. Business should have authenticity and quality of product

3. Business should have Branding and quality services

4. Business should have proper data security services.

2.5 Introduction to Cyber Laws:

Cyber law deals with issues generated by the use of computer and internet. Cyber law examines

the technological aspects of law. The name ‗Information Technology Act‘ has been suggested

because it is the law which governs information processing.

2.6 IT Act of India 2000 – Definitions, Digital Signature, Electronic Records-Attribution,

acknowledgment and dispatch:

Information Technology Act 2000:

IT Act 2000 is an Act to provide legal recognition for transactions carried out by means of

electronic data interchange and other means of electronic communication i.e. legal recognitions

for transactions carried out by e- commerce. E-commerce is paperless method for carrying out

transactions using electronic data exchange, electronic filing and electronic storage of

information.

Some of the definitions given in IT Act 2000 are as follows:

Page 44: SYJC Arts IT Chapter 1 to 6.pdf

1. Access : "access" with its grammatical variations and cognate expressions means gaining

entry into, instructing or communicating with the logical, arithmetical, or memory

function resources of a computer, computer system or computer network.

2. Addressee: "addressee" means a person who is intended by the originator to receive the

electronic record but does not include any intermediary.

3. Computer: "computer" means any electronic magnetic, optical or other high-speed data

processing device or system which performs logical, arithmetic, and memory functions

by manipulations of electronic, magnetic or optical impulses, and includes all input,

output, processing, storage, computer software, or communication facilities which are

connected or related to the computer in a computer system or computer network.

4. Computer network : "computer network" means the interconnection of one or more

computers through—

(i) the use of satellite, microwave, terrestrial line or other communication media. and

(ii) terminals or a complex consisting of two or more interconnected computers whether

or not the interconnection is continuously maintained.

5. Computer resource: "computer resource" means computer, computer system, computer

network, data, and computer data base software.

6. Computer System :"computer system" means a device or collection of devices,

including input and output support devices and excluding calculators which are not

programmable and capable of being used in conjunction with external files, which

contain computer programmes, electronic instructions, input data and output data, that

performs logic, arithmetic, data storage and retrieval, communication control and other

functions.

7. Data :"data" means a representation of information, knowledge, facts, concepts or

instructions which are being prepared or have been prepared in a form , deletion, storage

and retrieval and communication or telecommunication from or within a computer.

8. Information :"information" includes data, text, images, sound, voice, codes, computer

programs, software and databases or micro film or computer generated micro fiche:

9. Intermediary: "intermediary" with respect to any particular electronic message means

any person who on behalf of another person receives, stores or transmits that message or

provides any service with respect to that message.

10. Key pair: "key pair", in an asymmetric crypto system, means a private key and its

mathematically related public key, which are so related that the public key can verify a

digital signature created by the private key.

11. License: "license" means a license granted to a Certifying Authority under section 24.

12. Private key: "private key" means the key of a key pair used to create a digital signature.

13. Public key: "public key" means the key of a key pair used to verify a digital signature

and listed in the Digital Signature Certificate.

2.6.1 Digital Signature:

The purpose of digital signature is to provide authenticity to user for Information. It is a

safeguard for ‗information‘ or ‗data‘. Digital signatures secure your data by encoding it. It

contains a key pair i.e. private key and public key like a Lock and key. The IT act 2000 has

provided a legal recognition to digital signature. It uses public key cryptography."Subscriber"

means a person in whose name the Digital Signature Certificate is issued; the initial electronic

record was affixed with the digital signature by the use of private key corresponding to the public

key of the subscriber. Any person by the use of a public key of the subscriber can verify the

electronic record. The private key and the public key are unique to the subscriber and constitute a

Page 45: SYJC Arts IT Chapter 1 to 6.pdf

functioning key pair. Digital signature uses public key cryptography. In public key cryptography

one can make a encryption key ‗public‘ without sacrificing the secrecy of the information or

decryption key.

Working of digital signature is as follows:

Sender ―A‖ wants to send message for ―B‖ is called as ―plain text‖. ―A‖ encrypts that message

which gets converted into ―cipher text‖.Plain text is a simple text which can be read by human

while cipher text is unreadable to humans.

2.6.2 Electronic Records-Attribution, acknowledgment and dispatch:

2.6.2.1 Attribution of electronic records:

An electronic record shall be attributed to the originator—

(a) if it was sent by the originator himself;

(b) by a person who had the authority to act on behalf of the originator in respect of that

electronic record;

(c) by an information system programmed by or on behalf of the originator to operate

automatically.

2.6.2.2 Acknowledgment of receipt: Acknowledgment does not mean the acceptance.

Acknowledgment just signifies that the message has been received where the originator has not

agreed with the addressee that the acknowledgment of receipt of electronic record be given in a

particular form or by a particular method, an acknowledgment may be given by

(a) any communication by the addressee, automated or otherwise;

(b) any conduct of the addressee, sufficient to indicate to the originator that the electronic record

has been received.

2.6.2.3 Time and place of dispatch and receipt of electronic record: ―Dispatch of an

electronic record‖ includes successful communication of an electronic record to the intended

addressee.

Sender “A”

Encrypts the message

using public key

Encrypted

Message

Receiver “B”

decrypts the message using his

private key

Sender “A”

decrypts the message

using his private key

Encrypted

Message

Receiver “B”

encrypts the message(reply to

sender) using his public key

Sender “A”

Encrypts the message

using public key

Encrypted

Message

Plain text Encryption Cipher text Decryption Plain text

Page 46: SYJC Arts IT Chapter 1 to 6.pdf

(a) if the originator or the addressee has more than one place of business, the principal place of

business, shall be the place of business;

(b) if the originator or the addressee does not have a place of business, his usual place of

residence shall be deemed to be the place of business;

(c) "usual place of residence", in relation to a body corporate, means the place where it is

registered.

2.7 Ten Commandments of Computing:

These are ethics principles written in statements Commandments of computing guides computer

users and professional about do‘s and don‘ts.

i. Thou shalt not use a computer to harm other people.

ii. Thou shalt not interfere with neighbor‘s computer work.

iii. Thou shalt not watch around the neighbor‘s computer files.

iv. Thou shalt not use a computer for the purpose of steal.

v. Thou shalt not use a computer to bear a false witness.

vi. Thou shalt not copy or use the software for which Thou has not paid.

vii. Thou shalt not use other person‘s computer resources without authentication or without

proper authorization.

viii. Thou shalt not copy / use other person‘s intellectual output.

ix. Thou shalt think about the social awareness and consequence of the program the Thou is

writing or the system the one is designing.

x. Thou shalt always use a computer by means that show due considerations and due respect

for one‘s fellow humans.

2.8 Security and Privacy Controls:

Security : The virus attacks, unethical hackers, crackers may damage or corrupt or destroy or

disclose information. ―Security‖ is the quality or state of being protected from unauthorized

access or uncontrolled losses or effects. There are security procedures like passwords,

encryption, firewalls, digital signatures, antivirus, SSL (Secure Socket Layers) to protect

Information. Still it is impossible to achieve the absolute security in day to day practice. The

quality of a given security system is relative. The duty of securing an electronic record rests with

the creator. It‘s the responsibility of recipient to verify the secured electronic record.

Privacy: Privacy is the right of a person. It is concerned with the publication of true account of

private life of individual, medical confidentiality, privacy in electronic communication etc.

2.9 Intellectual Property Rights:

It is assumed that software, photographs, images, documents available on internet can be used

and distributed by downloading it. But it‘s a wrong assumption as copyright law protects this

work as well. The intellectual property right consists of copyright, trademarks, patent, design and

geographical indications. A person or a company can protect their rights against infringers. The

web pages downloaded only for viewing does not violet the copyright act as material on websites

Page 47: SYJC Arts IT Chapter 1 to 6.pdf

are published for reading and view of public. But this material may not be available for

commercial use or reproduction by any one.

1. Copyright: is an intellectual property right attached to original works in which the right

exists with him. Copyright is a form of protection provided by the law to the authors of

―original works of authorship‖. If you do any work originally, then you can place the

copyright symbol © next to your name. Copyright law is useful for authorship

determination, duration of protection and requirement for transfer of right to others. . The

copyright act can be applied to Original literary work including computer programs,

computer tables, databases etc, 2. Dramatic work, 3.Musical work, 4.Artistic work 5.

Cinematograph of films.

2. FairUse: is the exceptional case of copyright which allows copying of a limited amount

of materials in certain cases without permission of the copyright owner. Even for this use,

whether a specific use is fair or not depends on number of factors such as purpose, nature,

amount and effect. In 1978, FairUse had become a law in United States.

3. Attribution: Attribution term is related to the originator (sender) who sends the products

to the other persons.

4. Acknowledgment: Acknowledgment term is related to the receiver who receives the

product from the originator. Attribution of the electronic record can be defined as :An

electronic record shall be attributed to the originator :

a. If it was sent by the originator himself.

b. If it was sent by a person who had the authority to act on behalf of the originator in

respect of that electronic record.

c. If it was sent by the information system Programmed by/on behalf of the originator to

operate automatically.

Shareware, Freeware and Public Domain Software or Distinguish Between:

Shareware:

Shareware programs can be freely distributed and freely tested.

This program can be shared with other user with owner permission.

A trail period (generally 30 days) is given to test those programs. After this trial period,

the user who wants to keep using the program has to register or pay a fee.

The software‘s which are made available with magazine‘s are normally of this type.

Freeware:

Freeware is termed as free software that allow everyone to copy, redistribute and modify

it with free of cost.

But still its copyright is hold by authors.

Freeware is programming that is offered at no cost.

Linux is an example of freeware.

Public Domain Software:

Page 48: SYJC Arts IT Chapter 1 to 6.pdf

Public Domain Software is software that is not copyrighted. It implies the authors have

waived copying over the software.

Anybody can copy them, modify them or use them in any manner they want.

Public Domain programs can be freely incorporated into new works without paying

royalties for the original material.

There are several software available on internet which are public domain.

THE INFORMATION TECHNOLOGY (AMENDMENT) ACT 2008

Provisions

1. Amendment of section 2 - Communication device means cell phones, personal digital

assistance or combination of both or any other device used to communicate, send or

transmit any text, video, audio or image.

2. ‗Cyber café‘ means any facility from where access to the internet is offered by any

person on the ordinary course of business to the members of the public.

3. ‗Cyber security‘ means protecting information equipment devices, computer, computer

resource, communication device and information stored therein from unauthorized

access, use, disclosure, disruption, modification or destruction.

4. Delivery of Services by service provider - For efficient delivery of services to the

public through electronic means authorize, by order, any service provider to set up,

maintain and upgrade the computerized facilities and perform such other services as it

specify by notification in the Official Gazette. Service provider so authorized includes

any individual, private agency, private company, partnership firm, sole proprietor firm or

any other body or agency which has been granted permission by the Government to offer

services through electronic means in accordance with the policy governing such service

sector.

5. Audit of documents, etc maintained in electronic form - Wherein any law for the time

being in force, there is a provision for audit of documents, records or information that

provision shall also be applicable for audit of documents, records or information

processed and maintained in electronic form.

6. Duties of subscriber of electronic signature certificate - In respect of Electronic

Signature Certificate the subscriber shall perform such duties as may be prescribed.

7. Powers to issue directions for blocking for public access for any information through any

computer resource.

8. Powers to authorize to monitor and collect traffic data or information through any

computer resource for cyber security.

9. Indian Computer Emergency Response team to serve as National Agency for incident

response.

Page 49: SYJC Arts IT Chapter 1 to 6.pdf

1. The official gazette published in electronic form is called as _______

2. _______ provides legal recognition of transaction carried out by means of E-

commerce.

3. To change the original Data into Code _______ technique is used.

4. _______ means a person who is intended by the originator to receive an electronic

record.

5. _______ is used to verify the identity of each persons in an electronic transaction.

6. _______ process consists of encryption and decryption.

7. _______ Key is used to create Digital Signature.

8. _______ key is used to verify the digital signature.

9. _______ is a legal use of copyrighted material without explicit permission from copyright

holder.

10. To decide what is right and wrong and then doing the right thing is called as

_______.

11. LINUX is a _______ type of software.

12. Unauthorized duplication and use of software is called as ______

13. Software which is available for limited period is known as _______

14. Accessing of data without having permission is called _______

15. _______ value guide “how we have behave in society”.

16. _______ deals with the determination of what is right and wrong.

17. _______ protection covers original work.

18. _______ term is related to the sender who sends the product to other person.

19. _______ is useful to Authorship determination, duration of protection and

requirement for transfer of right to others.

20. _______ refers to all activities done with criminal activity in cyber space.

21. Promoting Data integrity means _______

22. CD received with magazine is a _______ type of software.

23. _______ means representation of instruction or knowledge.

24. IPR stands for _______.

25. _______ means representation of facts, concepts or instructions.

26. Norms and principles are stated under _______

27. _______ software is not copyrighted.

28. _______ is an unauthorized duplication, distribution and use of computer software.

29. Public key means a key of a pair used to verify the _______.

QQ.. 11]] FFiillll iinn tthhee BBllaannkkss ::

Page 50: SYJC Arts IT Chapter 1 to 6.pdf

30. The _______provides the legal recognition for transaction carried out by means of

electronic data interchange and other means of electronic communication commonly

referred to as Electronic Commerce.

31. _______ gives respect to individual persons by considering his opinions and choices.

32. _______contribute their efforts to the analysis, specification, design and development

of software systems.

33. _______ indicates what is wrong in the workplace.

34. The purpose of _______is to identify the sender and verify the message has not been

altered in transit.

35. © is a _______ symbol.

36. _______ is organizational concern.

37. _______is an individual concern.

38. _______includes policies, procedures, tools and techniques designed to protect a

companies computer assets from accidental damage and unlawful use.

39. _______are policies, procedures, tools and techniques design to prevent errors in

data, software and system.

1. A Computer Professional should always maintain Data confidentiality. --------

2. Business Ethics is considered as management discipline. --------

Shareware programs can be copied. --------

3. Intellectual Property Right refers to all the legal and regulatory aspects of internet and www.

--------

4. Programs can be copyrighted under ‗Literacy Work Heading‘. --------

5. According to Software Ethics any user is allowed to access data of another user with authorization.

--------

6. Controls are the organizational Policies and procedure to ensure that laws and regulations are

followed. --------

7. Software Piracy should be practiced for maintaining ethics. --------

8. Antivirus helps a user to access information from another computer. --------

9. @ is a copyright Symbol. --------

10. Copying of Shareware programs is legal. --------

11. Private Key is one of the pair of keys used to create Digital Signature. --------

12. Ethical Principles are based on Law values. --------

13. Cyber Crime refers to all the legal aspects of Internet and WWW. --------

14. Private key is used for Encryption. --------

15. It is ethically permitted to buy pirated softwares. --------

16. Digital Signature identifies the sending system and a person. --------

17. License agreement must differ from publisher to publisher. --------

QQ.. 22]] TTrruuee oorr FFaallssee ::

Page 51: SYJC Arts IT Chapter 1 to 6.pdf

18. Computer Professional should not appreciate other peoples intellectual output. --------

19. Code of Ethics is a combination of Do‘s and Don‘ts.

--------

20. Software theft is not a serious matter. --------

21. UNIX operating system is freeware. --------

22. Rules for computing are called commandments. --------

23. Law indicates rules and regulations to be obeyed in the organization. --------

24. Copying Software from a friend is unethical. --------

25. Accessing of data without permission is called authorized access. --------

26. Fair use does not allow copying of limited amount of material without permission. --------

27. Fair use allow limited amount of data to be copied without permission. --------

28. Cyber Law refers to all the legal aspects of Law. --------

29. Shareware is software that can be distributed freely for trial period . --------

30. Pirated software means software without license. --------

31. Ethics improved transitional effect efficiency. --------

32. Unauthorized access means damage to software or data of other user. --------

33. Ethics principle acts as a justification for evaluation of human action. --------

34. Respect and honest are moral values. --------

35. User must install and use the software according to license agreement. --------

36. Right thing do not depends upon moral principle. --------

37. Though Freeware is available at no cost it is Copyright. --------

38. Antivirus detects and prevents known and unknown viruses. --------

39. Freeware software are available free of cost to the user. --------

40. Fair use allows copying of a limited amount of material without permission. --------

41. There are 10 commandments of computing proposed by computer ethics institute --------

42. User can purchase the pirated software. --------

43. Public Domain Software is copyrighted. --------

44. Ethics builds trust and teamwork. --------

45. Linux is public domain software. --------

46. Pirated software means software with license. --------

47. To use software product it is not necessary to register it. --------

48. Information includes data, text, images, sound, voice etc. --------

49. It is not necessary to register before using shareware --------

50. Moral refers to generally accepted standards of right and wrong in a society. --------

51. Cyber crime refers to all the activities done with criminal invent in cyber space. --------

52. Shareware is completely free. --------

53. Ethics refers to generally accepted standards of right and wrong. --------

54. © is a copyright symbol. --------

55. Justice indicates to treat each person on equal share basis. --------

56. Copyright can be used to preserve musical works. --------

57. Moral and Ethical Statement are different from law. --------

Page 52: SYJC Arts IT Chapter 1 to 6.pdf

58. Copyright is exact copy of a program. --------

59. Ethics is an art of determining what is right or good. --------

60. Purchasing legitimate license product is the remedy for stopping software piracy. --------

61. Copyright is the protection that covers published and unpublished literary. --------

1. Acquire and maintain Professional Competence is _______________ responsibility.

a. Leader b. User c. Professional d. Developer

2. The largest source of software piracy is ________.

a. End user b. Companies c. Cyber Law d. School

3. Confidential data is protected from outsiders is using __________.

a. Locker method b. Decryption method c. Decoding method d. Encryption method

4. When software is free to copy it is called ___________.

a. Freeware b. Shareware c. Useware d. Liveware

5. ________ is the official gazette which is published in electronic form.

a. E-mail b. Cyber Crime c. Electronic Gazette d. Software Piracy

6. Norms and principles are stated under _________.

a. IT Act 2000b. Code of Ethics c. Cyber Law d. Moral

7. ______ allows the user to support and test the product behavior before paying for it.

a. Shareware b. Freeware c. Public Domain d. Pirated Software

8. _______ refers to standards of right conduct and judgment of particular action

a. Moral b. Ethics c. Cultural Values d. Law

9. _______ gives respect to individual person by considering his opinions and choice

a. Ethics b. Moral c. society d. Friendship

10. Shareware is a __________ method

a. Copyright b. Distribution c. License d. Selling

11. ____ means data, record, image or sound stored, received or send in an electronic

form.

a. Electronic record b. Information c. Electronic gazette d. Digital record

12. _________ is a discipline that deals with issues in copyright trademark and patent

laws.

a. Cyber laws b. India IT act c. Cyber Crime d. Intellectual Property Rights

13. To determine what is right and wrong and then doing the right thing is called as

QQ.. 33]] MMuullttiippllee CChhooiiccee SSiinnggllee AAnnsswweerr ::

Page 53: SYJC Arts IT Chapter 1 to 6.pdf

a. Moral b. Ethics c. Patent d. Laws

14. ________ ensures that the document originated with the person signing it and that

was not tempered with after the signature was applied.

a. Digital signature b. Coded signature c. Double signature d. Simple signature

15. ________ law grants the creator the exclusive rights to reproduce, perform, distribute

and display the works publicly.

a. Cyber crime b. Copyright c. Cyber law d. Fair use

16. License means a license

a. granted by owner b. granted by operator

c. granted to a certifying authority d. None of these

17. ________ is a contract between purchaser and publisher of the software.

a. License b. Copyright c. Cyber law d. None

18. ________ is also called as equity.

a. Honesty b. Fair treatment c. Quality d. None

19. As per the IT ACT _______ cannot be in Electronic Form.

a. License b. Cheque c. Record d. Form

20. Promoting data integrity means ________.

a. Encouraging data duplication b. Establishing privacy polic

c. Ensuring accuracy, reliability, completeness and time limit of personal

information d. None of the above.

21. The software created can be protected by ________.

a. Software Piracy b. Copyright c. Ethics d. Authorization

22. The Ethical issues for computer users are _____.

a. Software Piracy b. Professional Standard c. Competency d. Authorized assets

23. _________ is a non-copyrighted program.

a. Shareware b. Freeware c. Public domain d. Fair use

1. Ethics for computer professionals will be categorized as follows:

a. Professional software b. Professional Standards c. Professional principles

d. Professional responsibility e. Professional ethics f. Programmers liability

2. Security is _______________

a. Unauthorization b. Availability c. Integrity

QQ.. 55]] MMuullttiippllee CChhooiiccee TTrriippllee AAnnsswweerr ::

Page 54: SYJC Arts IT Chapter 1 to 6.pdf

d. Access Control e. Data Confidentiality f. Inconsistency

3. Generally code of ethics for computer professionals and user are

a. fair treatment b. pirated c. communication

d. system integrity e. information access

4. Intellectual Property Rights are related with _______.

a. Copyright b. Attribution and Acknowledgement c. Digital Signature

d. Fair Use e. Copied Software f. Firewall

5. Pirated software means _________.

a. Software without license b. Copied Software c. Software with License

d. Software with digital signature e. Unauthorized duplicate software

1. Explain areas considered by I.T. Act?

2. Define Ethics? Explain need of Ethics?

3. Write down the importance of cyber law?

4. What is shareware and public domain software?

5. What is the need for Ethics Culture? Explain.

6. Write a note on Ethics for Computer Users?

7. Explain the Objectives of Cyber Laws?

8. Describe IT act of India?

9. Define Data & Digital Signature?

10. What is Security?

11. Explain Copyright and Fair Use?

12. Give Ten Commandments of Computing?

13. What is Secure System?

14. Compare between Shareware, Freeware and Public Domain Software’s?

15. List any four responsibilities of Computer Professionals?

16. What is Unauthorized access? Explain its three categories?

17. What is Fair Use? Write any two advantages of Fair Use?

18. Write a note on Intellectual Property Right?

19. Explain Cyber Laws?

20. Define Software Piracy? Explain how it is harmful to the society?

21. Write a note on code of ethics?

22. Define: Moral, Ethics and Law

23. What is Freeware?

QQ.. 77]] AAnnsswweerr tthhee FFoolllloowwiinngg ::

Page 55: SYJC Arts IT Chapter 1 to 6.pdf

Chapter 3 . E-COMMERCE

Introduction:

After the Internet and dot com revolution, electronic commerce (e-commerce) remains a new,

emerging and constantly changing in the field of information technology and business

management. With the advent of the Internet, the term e-commerce gained popularity. It

includes:-

a. Electronic trading of physical goods and of intangibles such as information.

b. All the steps involved in trade, such as on-line marketing, ordering payment and support for

delivery.

c. The electronic provision of services such as after sales support or on-line legal advice.

d. Electronic support for collaboration between companies such as collaborative on-line design

and engineering or virtual business consultancy teams.

Thus E-commerce is an emerging concept that describes the process of buying and selling or exchanging

of products, services, and information via computer networks including the internet.

3.1 E-commerce: E-Commerce is more than just buying and selling products online. Instead, it

encompasses the entire online processes of developing, marketing, selling, delivering, and

paying for products and services purchased on internet.

3.1.1 Definition: Electronic Commerce (e-Commerce) is a general concept covering any

form of business transaction or information exchange executed using information and

communication technologies (ICTs). E-Commerce takes place between companies, between

companies and their customers, or between companies and public administrations. Electronic

Commerce includes electronic trading of goods, services and electronic material.

Classification of E-Commerce: E-Commerce exchanges may be business-to-business,

business-to-consumer or, with facilities such as online auctions, consumer-to-consumer. The e-

Commerce customer may be a home computer user, a business computer user, a commercial

intermediary or the transactions may be generated from the customers' business information

system. The first two of these may use internet e-Commerce, the commercial intermediary an e-

Market, whereas the exchange of data between business information systems is properly the

province of EDI.

Classification of E-Commerce is based on:

a. who orders, the goods and services to be sold

b. who sold those goods and services and the nature of transactions

Based on above two criteria, e-commerce can be further classified as:

a. Business-to-Business (B2B) model

b. Business-to-Consumer (B2C) model

c. Consumer-to-Business (C2B) model

d. Consumer-to-Consumer (C2C) model

Page 56: SYJC Arts IT Chapter 1 to 6.pdf

a. Business-to-Business (B2B) model: This

model describes commerce transactions

between businesses, such as between a

manufacturer and a wholesaler, or

between a wholesaler and a retailer.It is

the largest form of ecommerce. In this

form the buyers and sellers are both

business entities and do not involve and

individual consumer. It is commonly

known as EDI (Electronic Data

Interchange). In the past EDI was

conducted on a direct link of some form

between the two businesses where as

today the most popular connection is the internet. The two businesses pass information

electronically to each other.

b. Business-to-Consumer (B2C) model: In this mode, business and consumers are involved.

Business sell to the public typically

through catalogs utilizing shopping cart

software. (i.e. typical online buying)

Customer identifies a need. Searches for

the product or services to satisfy the

need. Selects a vendor and negotiates a

price. Receives the product or services

(delivery logistics, inspection and

acceptance). Makes payment.

Gets service and warranty claims.

Example websites like Amazon.com,

Flipcart etc.

c. Consumer –to-Business model: In this model , the customer requests a specific service from

the business. Consumer to Business is a growing arena where the consumer requests a specific

service from the businessIt enables buyers to name their own price, often binding, for a specific

good or services generating demand. A consumer posts his project with a set budget online and

within outs; companies review the customers’ requirements and bids out the project Example

online trading, tenders ,freelancing with website like Bazee.com

Page 57: SYJC Arts IT Chapter 1 to 6.pdf

d. Consumer-to-Consumer (C2C) model:

It facilitates the online transaction of goods

or services between two peoples.

Consumer-to-consumer (C2C) (or citizen-

to-citizen) model involves the electronically

facilitated transactions between consumers

through some third party. A common

example is the online auction, in which a

consumer posts an item for sale and other

consumers bid to purchase it; The sites are

only intermediaries, just there to match

consumers.

Example :OLX,ebay

3.1.2 Scope of E-Commerce: E-Commerce uses three 'technologies': Electronic Markets,

Electronic Data Interchange (EDI) and Internet Commerce, see Figure 1.E-Commerce systems

include commercial transactions on the Internet but their scope is much wider than this. They can

be classified by application type:

Electronic Markets:

The principle function of an

electronic market is to facilitate the

search for the required product or

service. Example Airline booking

systems

Electronic Data Interchange (EDI):

EDI provides for the efficient

transaction of recurrent trade

exchanges between commercial

organizations. Example :Large retail

groups and vehicle assemblers when

trading with their

suppliers(supermarket)

Internet Commerce:

The Internet can be used for advertising goods and services and transacting once-off

deals.Internet commerce has application for both business to business

and business to consumer transactions. Example purchasing book through amazon.com.

3.2. Trade Cycle:

A trade cycle is the series of exchanges, between a customer and supplier that take place when a

commercial exchange is execute.

3.2.1 Phases of trade cycle: Trade cycle has to support:

Page 58: SYJC Arts IT Chapter 1 to 6.pdf

•Finding goods or services appropriate to the requirement and agreeing the terms of trade

•Placing the order, taking delivery and making payment

•After sales activities

A general trade cycle consists of following phases :

Pre-Sales: Finding a supplier and agreeing the terms. It is a search and negotiate phase

Execution: Selecting goods and taking delivery .It is Order and Delivery phase

Settlement: Invoice (if any) and payment

After-Sales: Following up complaints or providing maintenance. It is a service and

warrantee pase

3.2.2 Three generic trade cycles can be identified as:

• Repeat: Regular repeat transactions between commercial trading partners

• Credit: Irregular transactions between commercial trading partners where execution and

settlement are separated (“credit transactions”)

• Cash: Irregular transactions in once off trading relationships where execution and settlement

are typically combined.

Figure 2: Generic trade cycle

Search

Negotiate

Order

Deliver

Invoice

Payment

After Sales

Pre-Sale

Execution

Settlement

After Sale

Repeat Credit CashTrade Cycle:

Page 59: SYJC Arts IT Chapter 1 to 6.pdf

3.3. Electronic Market:

Definition: An electronic market is an information system (virtual market) that provides

facilities for buyers and sellers to exchange information about price and product offerings.

Electronic market also tend to be available only to the intermediaries

Electronic Market bring together product, price and service information from many suppliers

Electronic Market can thus act as database or catalogue. Electronic market is the virtual

representation of physical market.

Electronic markets are used for passenger ticket reservations, an airline booking system and in

various financial and commodity markets. These markets give the customer (or the customer's

intermediary) easy access to comparative data on price, and other attributes, of the goods or

services on offer. Access to this information is advantageous for the consumer but making the

information available is not necessarily beneficial to the supplier.

E-Market and Trade cycle:

The Electronic market is primarily

search phase of trade cycle. Typically

an inter-organisational credit trade

cycle. Normally includes facilities for

Execution and Settlement

Figure 3 : E-Market and Trade cycle

Usage of electronic markets

a. Application has been limited to specific sectors:

Airline Booking Systems

Financial and Commodity Markets

b. Use is typically via an intermediary (i.e. only for dealers)

c. Study of Share and stock market

Advantages :

1. Customer Advantage: Easy access to comparative price/service information. These

markets give the customer (or the customer's intermediary) easy access to comparative

data on price, and other attributes, of the goods or services on offer.

2. Supplier: For supplier it facilitates easy access to market.

Page 60: SYJC Arts IT Chapter 1 to 6.pdf

3. Search cost lowered: An effective E-Market increases the efficiency of market; it

reduces the search cost for buyers.

4. Assistance to buyers: E-Market is most effective in assisting the buyer.

5. Awareness of market: The use of information and communication technologies to

provide geographically dispersed traders with the information necessary for the fair

operation of the market.

6. Best negotiations: Easy access to information on a range of competing product offerings

reduces the search cost of finding the supplier that best meets the purchase requirement.

Disadvantage: It becomes difficult for sellers to maintain high price levels, because due to the

introduction of an electronic market search cost is reduced for the buyer.And also second

disadvantage for seller is buyer can make easy price comparison.

3.4. Electronic Data Interchange (EDI):

Definition: The transfer of structured data, by agreed message standards, from one computer

system to another, by electronics means.

This definition has four elements, each of them essential to form EDI system

1. Structured Data: EDI transactions are composed of code, values and short pieces of text;

each element with strictly defined purpose.

2.Agreed message standards: The EDI transactions has to have a standards format .The

standard is not just agreed between the trading partners but is a general standard agreed at

national or international level.

3. From one computer system to another: The EDI message sent is between two computer

applications There s no requirement for people to read the message or re-key it into computer

system

4. By electronics means: Usually this is

by data communication but the physical

transfer of magnetic tape or floppy disc

would be within the definition of EDI

Thus there are two important things in

EDI. First, EDI replaces paper-based

documents with electronic ones. And,

second, the data in a document is

transmitted in a standardised format so

that both the sender and the receiver can

accurately read the document.

Figure 4: EDI and trade cycle

EDI and Trade Cycle: Commercial transactions that are repeated on a regular basis, such as

supermarkets replenishing their shelves, is one category of trade cycle. EDI is the e-Commerce

Page 61: SYJC Arts IT Chapter 1 to 6.pdf

technology appropriate to these exchanges.EDI is mapped with settlement and execution phase

of trade cycle.

Benefits of EDI:

1. Shortened ordering time: EDI orders are sent straight into the network. Orders can be in

suppliers system within a day.

2. Reduction in cost: The use of EDI can cut cost. These include the costs of stationary and

postage. EDI is the potential to save staff costs.

3. Eliminition of errors: EDI eliminates the source of errors i.e. data entry errors.

4. Fast response: With EDI, customer can be informed directly for any inconvenience, so that

the customer can take fast decision.

EDI security: When an organization adopts EDI, security controls becomes important factor.

Because when transaction takes place between two trading partners, confidentiality is necessary

and important.

A full EDI security system should include three levels of security:

(1) Network level security: This level of security ensures that users not registered in the EDI

network are not able to gain access to its facilities.

(2) Application level security: In any given EDI application or software, there might be some

data you are not allowed to see, some you can see but not alter.

(3) Message level security: Here the data should be secured against non-bonafide messages,

duplication, loss or replay of messages, deletion of messages.

3.5 Internet Commerce: is the use of the Internet for all phases of creating and completing

business transactions. In broad sense Internet Commerce includes:

Full sales and marketing cycle - for example, by analyzing online feedback to ascertain

customer's needs.

Identifying new markets - through exposure to a global audience through the World

Wide Web.

Developing ongoing customer relationships - achieving loyalty through ongoing email

interaction.

Assisting potential customers with their purchasing decision - for example by guiding

them through product choices in an intelligent way.

Providing round-the-clock points of sale - making it easy for buyers to order online,

irrespective of location.

Supply Chain Management - supporting those in the supply chain, such as dealers and

distributors, through online interaction.

Ongoing Customer Support - providing extensive after-sales support to customers by

online methods; thus increasing satisfaction, deepening the customer relationship and

closing the selling loop through repeat and ongoing purchases.

Definition: Internet Commerce.

Internet commerce is once off sale / once of transaction done using information and

communication technology (Internet to be specific). Consumer purchasing over internet typifies

this trade. Internet commerce is also mentioned as Business-to-Consumer E-Commerce. But

internet commerce can also be used by organizations to make once off or infrequent purchases of

items such as computer and office supplies.

Page 62: SYJC Arts IT Chapter 1 to 6.pdf

Internet commerce and Trade cycle: Consumer transactions tend to be once-off (or at least

vary each time) and payment is made at the time of the order. Internet e-Commerce is the

technology for these exchanges.

The third generic trade cycle is the non-

repeating commercial trade cycle and

Internet e-Commerce or an electronic

market is the appropriate e-technology

Advantages of Internet Commerce

1.Home Shopping: Quick and convenient

2.World Wide and 24 hours: Anywhere -

any time

3.Home Delivery of the product.

Figure 5 : Internet commerce and trade cycle

Disadvantages of internet commerce:

1. Privacy and security: Privacy of personal details and security of transactions.

2. Delivery of product: Delay in delivery can be inconvenient and can add other costs.

3. Inspecting goods: You cannot actually see, feel or try goods.

4. Social interaction: Shopping with family and friends will stop.

3.6 E-Commerce Perspective: E-Commerce can be seen from different Perspective

1. Communications Perspective:

E-Commerce is the delivery of information, products/services, or payments over the telephone

lines, computer networks or any other electronic means.

2. Business Process Perspective:

E-Commerce is the application of technology toward the automation of business transactions and

work flow.

3. Service Perspective:

E-Commerce is a tool that addresses the desire of firms, consumers, and management to cut

service costs while improving the quality of goods and increasing the speed of service delivery.

4. Online Perspective:

E-Commerce provides the capability of buying and selling products and information on the

internet and other online services.

3.6.1 EDI security standards:

The important aspect of EDI is security and privacy. The first point is to ensure the interchange

of message is reliable. Hence EDI security standards include:

• controls designed to protect against errors in, and corruption of message.

• Where there is concern that transmission is not reliable it can be protected by digital

signature and filters like firewall

• Where the contents of message are sensitive, the privacy of message can be protected

using encryption.

• The receipt acknowledgement message is to ensure the recipient of the message does

deny having received it

Page 63: SYJC Arts IT Chapter 1 to 6.pdf

Exercise:

Q1. Fill in the blanks.

1. Selling and buying products and services through web means ________

2. E-Commerce is the ________ exchange of business information.

3. In traditional marketing focus is _______ oriented.

4. An online action is the best example of _______.

5. Electronic market is the ________ representation of physical market.

6. Regular, repeat transaction between commercial trading partners are called ______ trade

cycle.

7. E-Market is primarily about ______ phase of the trade cycle.

8. Order and Delivery are ________phase of the trade cycle.

9. Invoice and payment are ________phase of the trade cycle.

10. Warranty, services etc. are ________ activities.

11. Final use of Internet E-Commerce is for _______ service.

12. Marketing focus is related to ________ position in traditional commerce

13. EDI stands for ____________ .

14. EDI is commonly applied to Execution and _______ phase of trade cycle.

15. EDI replaces paper-based documents with _______ ones.

Q2.State True or False.

1. In E-Commerce scope is local

2. In E-Commerce 24 hours service is available for all 7 days.

3. In E-Commerce time required is more as compare to traditional commerce.

4. E-Commerce is fully service oriented.

5. E-Commerce is applied to all phases of trade cycle.

6. In E-Commerce payments are done with the help of credit card.

7. E-Commerce gives the guarantee of the good ordered about their quality and reliability.

8. Search comes under execution phase of Trade Cycle.

9. Order and Delivery are the part of presale phase trade cycle.

10. After sales services are the parts of Settlement phase of trade cycle.

Page 64: SYJC Arts IT Chapter 1 to 6.pdf

11. In Cash trade cycle execution and settlement are combined.

12. E-Market deals with all phases of the trade cycle.

13. E-Market is a common place for worldwide buyers and sellers.

14. Online Airline booking system is an example of E-Market.

15. Online Airline booking system is an example of E-Commerce.

16. EDI does not require printed order and invoice.

17. EDI means paperless trading.

18. EDI is commonly applied to Execution and Settlement phase of trade cycle.

19. EDI increases data entry errors.

Q3. Multiple choice question (choose one correct alternative)

1. Online buying and selling the products is called as _________

(a) Internet Commerce (b) Traditional Commerce

(c) E-Commerce (d) None of these

2. ICT stands for ___________

(a) Indian Communication Industry

(b) Information and Communication Technology

(c) Information and Computing Technology

3. ___________ is fully product oriented commerce.

(a) Traditional Commerce (b) E-Commerce

(c) M-Commerce (d) None of these

4. _________ is the last phase of trade cycle.

(a) Order (b) Payment

(c) Search (d) After sales

5. Search and ________ comes under presale phase of trade cycle.

(a) Order (b) After sales

(c) Delivery (d) Negotiate

6. Online trading and auction are called as ________ .

(a) E-Market (b) E-Commerce

(c) EDI (d) Traditional Commerce

7. EDI helps to _________.

(a) Reduce paper works (b) Increase paper works

(c) Higher security (d) reduce Accuracy

8. _______cause reduced data entry errors.

(a) EDI (b) E-Commerce

(c) Internet Commerce (d) E-Market

Q4. Multiple choice question (choose two correct alternative)

1.______ and ______ are last phases of trade cycle.

a)Presale b) Execution c) Settlement d) After sales

2. After sales phase of trade cycle consist of ______ and _____

Page 65: SYJC Arts IT Chapter 1 to 6.pdf

a)Warranty b)search c)service d)payment

3. EDI includes forms for ____ and _____

a) Invoice b) Stock c) Purchase order d) Documents

Q5. Multiple choice question (choose three correct alternative)

1. The three generic trade cycles can be identified as ___, ___ and __

a) Repeat trade cycle b) Credit trade cycle c) Cash trade cycle d)Routine trade cycle

2. Benefits of EDI are_______,_______ and __________

a)Reduces paper work b)increases paper work c)reduces data entry b)reduces cost

Q6. Answer the following questions

1. Explain classification of E-commerce in detail.

2. Give scope of E-commerce in brief.

3. Give different perspectives of E-Commerce.

4. Explain generic trade cycles.

5. Explain EDI security and standards.

Q7. Write short note on:

1. Internet commerce.

2. EDI.

3. Usage and Advantages of E-Market.

Reviewed by:

Sr no Name Sign

Page 66: SYJC Arts IT Chapter 1 to 6.pdf

Traditional commerce and E-commerce

consider the difference between the traditional paper purchase order and its electronic

counterpart:

BusinessInformation

Systems

HomeComputer

Users

CommercialIntermediaries

BusinessComputer

Users

Internet

Comerce

Electronic

Markets

EDI

Page 67: SYJC Arts IT Chapter 1 to 6.pdf

A Traditional Document Exchange Of a Purchase Order

Buyer makes a buying decision, creates the purchase order and prints it.

Buyer mails the purchase order to the supplier.

Supplier receives the purchase order and enters it into the order entry system.

Buyer calls supplier to determine if purchase order has been received, or supplier mails

buyer an acknowledgment of the order.

This process normally takes between three and five days!

An EDI Document Exchange Of a Purchase Order

Buyer makes a buying decision, creates the purchase order but does not print it.

EDI software creates an electronic version of the purchase order and transmits it

automatically to the supplier.

Supplier's order entry system receives the purchase order and updates the system

immediately on receipt.

Supplier's order entry system creates an acknowledgment an transmits it back to confirm

receipt.

This process normally occurs overnight and can take less than an hour!

Page 68: SYJC Arts IT Chapter 1 to 6.pdf

Teachers Training Program

Page 69: SYJC Arts IT Chapter 1 to 6.pdf

Networking

Scope and Limitations

4A Communication and Network Technologies,4B Internet, Network Communication and Protocols,4C Transmission Media, Communication over Wires and Cables, Wireless

Communication and Standards4D Network Architecture, Relationships and Features4E Cable Topologies4F Network Hardware

Page 70: SYJC Arts IT Chapter 1 to 6.pdf

Sr. No Objectives MarksMarks with

Option

1 Knowledge 15 15

2 Understanding 20 20

3 Application 30 30

4 Skill 15 15

Total 80 80

Weightage to Objectives

Page 71: SYJC Arts IT Chapter 1 to 6.pdf

Sr. No Type of Question Marks Marks with

Option

1 Objective Type 60 60

2 Short Answer 10 10

3 Long Answer 10 10

Total 80 80

Weightage to Type of Questions

Page 72: SYJC Arts IT Chapter 1 to 6.pdf

Unit wise Weightage

Topic/Unit MarksMark(With

option)Lectures

Approx.Pages

Introduction To Networking10 10 12 22

Page 73: SYJC Arts IT Chapter 1 to 6.pdf

Networking

IntroductionThe concept of networking is probably as old as the concept of telecommunicationitself. Over the years computing networks have advanced from pair of wires to fiberoptics and microwaves through Wi-Fi networks. A computer network is a group ofinterconnected computers or a collection of hardware components and computersinterconnected by communication channels that allow sharing of date, resources,hardware, programs and information provides a means of e-mail communication andvideo conferencing. Besides the hardware needed for networking it also requiresspecial software to enable communication which are in built to all major operatingsystem.

Page 74: SYJC Arts IT Chapter 1 to 6.pdf

Network Characteristics

Cost - Includes the cost of network components, their installation and maintenance.

Reliability - Reliability defines the reliability of the network components and the connectivity between them.

Security - Security includes the protection of the network components and the data they contain and/or the data transmitted between them.

Speed - Speed includes how fast data is transmitted between network end points.

Scalability - Scalability defines how well the network can adapt to new growth, including new users, applications, and network components.

Topology - Topology describes the physical cabling layout and the logical way data moves between components.

Page 75: SYJC Arts IT Chapter 1 to 6.pdf

Network Classification

Computer network is classified into three categories based on the geographical area. 1. Local Area Network (LAN)2. Metropolitan Area Network (MAN)3. Wide Area Network (WAN)Local Area Network (LAN)•LANs are privately-owned networks within a building or campus (upto few kms range) •They are mainly used to connect PCs and workstations in company offices. •Main idea is resource (printers ,files) sharing.•Traditional LANs run at speeds of 10 to 100 Mbps (Recent trend is in GBPS)

Metropolitan Area Network (MAN)•A MAN is basically a bigger version of LAN and normally uses similar technology.•It might cover a group of nearby corporate offices or city.•MAN can be related to the local cable television network.

Wide Area Network (WAN)•A WAN spans a large geographical area , often a country or a continent.•WAN have irregular topologies.•Typically many LANs put together forms a WAN•A WAN provides long distance transmission of data, voice image and video information.

Page 76: SYJC Arts IT Chapter 1 to 6.pdf

Network Classification

Internet - Individual networks are joined into internetworks with the help ofinternetworking devices. The internet is networking of million of networks. Thesenetworks are connected to each other either by wired or wireless technologies.Network Communication and ProtocolA protocol is a formal description of a set of rules and conventions that govern aparticular aspect of how devices on a network communicate. Protocols determine theformat, timing, sequencing, and error control in data communication.

Protocols are used for communication between computers in different computernetworks. TCP/IP, HTTP, POP, PPP are some examples of the protocols.

Network Communication and ProtocolA protocol is a formal description of a set of rules and conventions that govern aparticular aspect of how devices on a network communicate. Protocols determine theformat, timing, sequencing, and error control in data communication. Protocols areused for communication between computers in different computer networks. TCP/IP,HTTP, POP, PPP are some examples of the protocols.

Page 77: SYJC Arts IT Chapter 1 to 6.pdf

Transmission Media

TRANSMISSION MEDIA

WIRED

(GUIDED)

CO-AXIAL

(THICKNET&

THINNET)

TWISTED PAIR

(UTP &STP)

OPTICAL FIBER

(SINGLEMODE &

MULTIMODE)

WIRELESS

(UNGUIDED)

RADIO SIGNALS

MICROWAVE

(TERRESTRIAL &

SATELLITE)

INFRA RED WI-FI

Transmission media can be defined simply as the means by which signals (data) aresent from one computer to another (either by wired or wireless means).Communication can be broadly classified on the basis of transmission media used intotwo categories – wired communication and wireless communication. Wired media arealso called as bounded media and wireless media as unbounded media.

Page 78: SYJC Arts IT Chapter 1 to 6.pdf

Network ClassificationA transmission media is a material substance that can propagate energy waves. Forexample, the transmission medium for sound received by the ears is usually air, butsolids and liquids may also act as transmission media for sound.

The absence of a material medium in vacuum may also constitute a transmissionmedium for electromagnetic waves such as light and radio waves. While materialsubstance is not required for electromagnetic waves to propagate, such waves areusually affected by the transmission media they pass through, for instance byabsorption or by reflection or refraction at the interfaces between media.

The term transmission medium also refers to a technical device that employs thematerial substance to transmit or guide waves. Thus, an optical fiber or a copper cableis a transmission medium.

Page 79: SYJC Arts IT Chapter 1 to 6.pdf

Communication over Wires and Cables

Data transmission, digital transmission, or digital communications is the physicaltransfer of data (a digital bit stream) over a point-to-point or point-to-multipointcommunication channel.

There are two categories of transmission media used in computer communications.

1. WIRED / GUIDED /BOUNDED MEDIA 2. WIRELESS / UNBOUNDED / UNGUIDED MEDIA

Examples of such channels are copper wires, optical fibers, wireless communicationchannels, and storage media. The data is represented as an electromagnetic signal,such as an electrical voltage, radio wave, microwave, or infrared signal.

Page 80: SYJC Arts IT Chapter 1 to 6.pdf

Bounded Media

Bounded media are the physical links through which signals are confined to narrowpath. These are also called guided/wired media. Bounded media are made up of anexternal conductor (Usually copper) bounded by jacket material.

Bounded media are great for LABS as1. They offer high speed2. Good security3. Low cast.

Three common types of bounded media are•Coaxial Cable •Twisted Pairs Cable •Fiber Optics Cable

Page 81: SYJC Arts IT Chapter 1 to 6.pdf

Coaxial Cable

Coaxial cable is very common & widely used commutation media. (TV wire is usuallycoaxial). Coaxial cable gets its name because it contains two conductors that areparallel to each other. The center conductor in the cable is usually copper. The coppercan be a solid wire. Outside this central Conductor is a non-conductive material(insulation). It is usually white, plastic material used to separate the inner Conductorform the outer Conductor. The other Conductor is a fine mesh made from Copper. It isused to help shield the cable form EMI. Outside the copper mesh is the final protectivecover. The actual data travels through the center conductor (copper wire) in the cable.EMI interference is caught by outer copper mesh.

Page 82: SYJC Arts IT Chapter 1 to 6.pdf

There are different types of coaxial cable vary by gauge. Gauge is the measure of thecable thickness. It is measured by the Radio grade measurement, or RG number. Thehigh the RG number, the thinner the central conductor core, the lower the number thethicker the core.Two types of co-axial cables are used-Base-band co-axial cables: These cables are used for digital transmissionBroadband co-axial cables : These cables are used for analog transmissionHere the most common coaxial standards.50-Ohm RG-7 or RG-11: used with thick Ethernet.50-Ohm RG-58 : used with thin Ethernet75-Ohm RG-59 : used with cable television93-Ohm RG-62: used with ARCNET.

Coaxial Cable

Page 83: SYJC Arts IT Chapter 1 to 6.pdf

Coaxial Cable

Characteristics of Coaxial Cable• Low cost • Easy to install • Up to 10Mbps capacity • Medium immunity from EMI • Medium of attenuation

Advantages Coaxial Cable• Inexpensive • Easy to wire • Easy to expand • Moderate level of EMI immunity

Disadvantage Coaxial Cable• Single cable failure can take down an entire network

Page 84: SYJC Arts IT Chapter 1 to 6.pdf

Twisted Pair Cable

The most popular network cabling is Twisted pair. It is1. Light weight2. Easy to install3. Inexpensive4. Support many different types of network.Twisted pair cabling is made of pairs of solid or stranded copper twisted along eachother. The twists are done to reduce vulnerably to EMI and cross talk. The number ofpairs in the cable depends on the type. The copper core is usually 22-AWG or 24-AWG,as measured on the American wire gauge standard. There are two types of twistedpairs cabling1. Unshielded Twisted Pair (UTP)2. Shielded Twisted Pair (STP)

Page 85: SYJC Arts IT Chapter 1 to 6.pdf

Twisted Pair Cable

1. Unshielded Twisted Pair (UTP)UTP is more common. It can be either voice grade or data grade depending on thecondition. UTP cable normally has an impedance of 100 ohm. UTP cost less than STPand easily available due to its many use. There are five levels of data cablingCategory 1These are used in telephone lines and low speed data cable.Category 2These cables can support up to 4 mps implementation.Category 3These cable supports up to 16 mps and are mostly used in 10 mps.Category 4These are used for large distance and high speed. It can support 20mps.Category 5This is the highest rating for UTP cable and can support up to 100mps.UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11connector and 4 pair cable use RJ-45 connector.

Page 86: SYJC Arts IT Chapter 1 to 6.pdf

1. Unshielded Twisted Pair (UTP) Cable

1. Unshielded Twisted Pair (UTP)UTP is more common. It can be either voice grade or data grade depending on thecondition. UTP cable normally has an impedance of 100 ohm. UTP cost less than STPand easily available due to its many use. There are five levels of data cablingCategory 1 - These are used in telephone lines and low speed data cable.Category 2 - These cables can support up to 4 mps implementation.Category 3 - These cable supports up to 16 mps and are mostly used in 10 mps.Category 4 - These are used for large distance and high speed. It can support 20mps.Category 5 - This is the highest rating for UTP cable and can support up to 100mps.UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11connector and 4 pair cable use RJ-45 connector.

Page 87: SYJC Arts IT Chapter 1 to 6.pdf

Characteristics Of UTP•low cost •easy to install •High speed capacity •High attenuation •Effective to EMI •100 meter limit

Advantages Of UTP•Easy installation •Capable of high speed for LAN •Low cost

Disadvantages Of UTP•Short distance due to attenuation

1. Unshielded Twisted Pair (UTP) Cable

Page 88: SYJC Arts IT Chapter 1 to 6.pdf

It is similar to UTP but has a mesh shielding that’s protects it from EMI which allowsfor higher transmission rate. IBM has defined category for STP cableType 1 - STP features two pairs of 22-AWGType 2 - This type include type 1 with 4 telephone pairsType 6 - This type feature two pairs of standard shielded 26-AWGType 7 - This type of STP consist of 1 pair of standard shielded 26-AWGType 9 - This type consist of shielded 26-AWG wire

2. Shielded Twisted Pair (STP) Cable

Page 89: SYJC Arts IT Chapter 1 to 6.pdf

Characteristics of STP1. Medium cost 2. Easy to install 3. Higher capacity than UTP 4. Higher attenuation, but same as UTP 5. Medium immunity from EMI 6. 100 meter limit

Advantages of STP1. Shielded 2. Faster than UTP and coaxial

Disadvantages of STP1. More expensive than UTP and coaxial 2. More difficult installation 3. High attenuation rate

2. Shielded Twisted Pair (STP) Cable

Page 90: SYJC Arts IT Chapter 1 to 6.pdf

Fiber Optic Cable

Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable light only moves in one direction for two way communication to take place a second connection must be made between the two devices. It is actually two strands of cable. Each strand is responsible for one direction of communication.

A laser at one device sends pulse of light through this cable to other device. These pulses are translated into “1’s” and “0’s” at the other end.

In the center of fiber cable is a glass stand orcore. The light from the laser moves throughthis glass to the other device. Around theinternal core is a reflective material knownas CLADDING. No light escapes the glasscore because of this reflective cladding.

Fiber optic cable has bandwidth more than 2 gbps (Gigabytes per Second)

Page 91: SYJC Arts IT Chapter 1 to 6.pdf

Characteristics of Fiber Optic Cable1. Expensive 2. Very hard to install 3. Capable of extremely high speed 4. Extremely low attenuation 5. No EMI interference

Advantages of Fiber Optic Cable1. Fast 2. Low Attenuation 3. No Emi Interference

Disadvantages of Fiber Optics1. Very costly 2. Hard to install

Fiber Optic Cable

Page 92: SYJC Arts IT Chapter 1 to 6.pdf

Characteristics of Fiber Optic Cable1. Expensive 2. Very hard to install 3. Capable of extremely high speed 4. Extremely low attenuation 5. No EMI interference

Advantages of Fiber Optic Cable1. Fast 2. Low Attenuation 3. No Emi Interference

Disadvantages of Fiber Optics1. Very costly 2. Hard to install

Fiber Optic Cable

Page 93: SYJC Arts IT Chapter 1 to 6.pdf

It is difficult to lay down cables due to the terrain (mountains, jungles, swamps, etc.), wireless may be better. Modern wireless digital communication began in the Hawaiian Islands, where large chunks of Pacific Ocean separated the users and the telephone system was inadequate.

For mobile users, twisted pair, coaxial cables and fiber-optics are of no use. They needto get their hits of data for their i-pad, i-phone, laptop, palmtop or wristwatchcomputers without being tethered to the terrestrial communication infrastructure andthe only way their queries and interest can be catered to be through the wirelesscommunication.

Wireless/ Unguided media or unbounded media doesn't use any physical connectorsbetween the two devices communicating. Wireless media is used when a physicalobstruction or distance blocks are used with normal cable media. The three types ofwireless media are:a. RADIO WAVESb. MICRO WAVESc. INFRARED WAVES

Wireless Communication over Radio Signals

Page 94: SYJC Arts IT Chapter 1 to 6.pdf

Radio Waves

Radio waves are easy to generate and they can travel longer distance It has frequency between10 KHz to 1 GHz. They can travel in all directions and hence they are also called omnidirectional. They can easily penetrate through obstacles. Hence they are widely used incommunication Radio waves has the following types.

• Short waves• VHF (Very High Frequency)• UHF (Ultra High Frequency)Microwaves Microwaves travels at high frequency than radio waves and provide throughput as wireless network media.Microwave transmission requires sender to be inside of the receiver. Following are the types of Microwaves.• Terrestrial Microwaves • Satellite Microwaves

Terrestrial Microwaves Terrestrial Microwaves are used to transmit wireless signals across a few miles. Terrestrialsystem requires that direct parabolic antennas can be pointed to each other. These systemsoperate in a low Giga Hertz range.

Characteristics of Terrestrial Microwavesa. Moderate to high cost. b. Moderately difficult installation c. 1 M bps to 10 M bps capacity d. Variable attenuation e. Low immunity to EMI

Page 95: SYJC Arts IT Chapter 1 to 6.pdf

Radio WavesSatellite Micro WavesThe main problem with micro wave communication is the curvature of the earth, mountains &other structure often block the line of sight. Due to this reason, many repeaters are required forlong distance which increases the cost of data transmission between the two points.

Satellite micro wave transmission is used to transmit signals throughout the world. These systemuse satellites in orbit about 50,000 Km above the earth. Satellite dishes are used to send thesignals to the satellite where it is again sent back down to the receiver satellite. Thesetransmissions also use directional parabolic antenna’ within line of sight.

In satellite communication micro wave signals at 6 GHz are transmitted from a transmitter onthe earth through the satellite position in space. By the time signal reaches the satellitesbecomes weaker due to 50,000 Km distance. The satellite amplifies week signals and transmits itback to the earth at the frequency less than 6 GHz.

Characteristics Satellite Micro Waves1. High cost 2. Extremely difficult. 3. Variable attenuation. 4. Low immunity to EMI 5. High security needed because a signal send to satellite is broadcasts through all receivers with in satellite.

Page 96: SYJC Arts IT Chapter 1 to 6.pdf

InfraredInfrared frequencies are just below visible light. These high frequencies allow high speed data transmission.This technology is similar to the use of a remote control for a TV. Infrared transmission can be affected byobjects obstructing sender or receiver. These transmissions fall into two categories.• Point to point • Broadcast

Point to PointPoint to point infrared transmits signal directly between two systems. Many lap top system use point topoint transmission. These systems require direct alignment between many devices.

Characteristics of Point to Point• Wide range of cost • Moderately easy installation. • 100 kbps to 16 Mb of capacity. • Variable attenuation. • High immunity to EMI

Broad CastThese infrared transmissions use sprayed signal, one broad cast in all directions instead of direct beam. This help to reduce the problems of proper alignment and abstraction. It also allows multiple receiver of signal

Characteristics of Broad Cast• Inexpensive. • Single installation. • 1Mbps capacity. • Variable attenuation.

Radio Waves

Page 97: SYJC Arts IT Chapter 1 to 6.pdf

Wireless StandardsHome and business networkers looking to buy wireless local area network gear face an array ofchoices .The products conforming to the 802.11a, 802.11b, 802.11g or 802.11n wirelessstandards collectively are known as Wi-Fi technologies.

802.11 - In 1997, the institute of Electrical Engineers (IEEE) created the first WLAN standard. They called it802.11 after the name of the group formed to oversee its development.Unfortunately, 802.11 onlysupported a maximum network bandwidth of 2Mbpswhich was too slow for most applications. For thisreason, ordinary 802.11 wireless products are no longer manufactured.

802.11b - IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11bspecification.802.11b supports bandwidth up to 11Mbps, comparable to traditional Ethernet. It uses thesame unregulated signaling frequency (2.4 GHz) as the original 802.11 standard. Thus 802.11 gear can incurinterference from microwave ovens, cordless phones, and other appliances using the same 2.4GHz range butif a reasonable distance is maintained then the interference could be avoided.

802.11a - While 802.11b was in development, IEEE created a second extension to the original 802.11standard called 802.11a, In fact 802.11b and 802.11a was created at the same time but 802.11b gained morepopularity. Also due to its higher cost 802.11a is usually found on business networks whereas 802.11b betterserves the home market. It supports bandwidth up to 54 MBPS and signals in the regulated frequencyspectrum around 5 GHZ, which means 802.11A signals have more difficulty in penetrating walls and otherobstructions. Because 802.11A and 802.11B use different frequencies, the two technologies areincompatible with each other.

Wireless Standards

Page 98: SYJC Arts IT Chapter 1 to 6.pdf

802.11gIn 2002 and 2003 WLAN products supporting a newer standard called 802.11g emerged on the market.802.11g attempts to combine the best of both 802.11a and 802.11b.802.11g supports bandwidth up to 54MBPS, and it uses the 2.4 GHz frequency for greater range.

802.11nThe newest in the IEEE standard in the Wi-Fi category is 802.11n; It was designed to improve on 802.11g. Inthe amount of bandwidth supported by utilizing multiple wireless signals and antennas instead of one.When this standard is finalized, 802.11n wireless connection should support data rates of over 100 MBPS.802.11n offers better range over earlier Wi-Fi standards due to its increased signal intensity.

Apart from these general purpose Wi-Fi standards, several other related wireless technologies exist.

Other IEEE 802.11 working group standards like 802.11h and 802.11j are extensions or off shoots of Wi-Fitechnologies that each serves a very specific purpose.

Bluetooth is an alternative wireless network technology that followed a different development path than the802.11 family, it supports a very short range (approximately 10 meters and relatively low bandwidth - i.e. 1-3MBPS) designed for low power network devices like hand held’s.

WiMaxWiMax was developed separately from Wi-Fi for long range networking spanning miles or kilometers.

Wireless Standards

Page 99: SYJC Arts IT Chapter 1 to 6.pdf

Network Architecture

Network architecture is a design of a computer network. The design includes the physical

structure and functionalities of the network. The role of computer is very important in the

network architecture.

OSI Reference Model

In 1977, the international organization for standardization (ISO) composed of industry

representatives developed data communication standards that promote multi vendor inter

operability and universal accessibility. The result was the open system connection (OSI reference

model).

The ISO issued a recommendation for a standard network architecture that defines the

relationships and interactions between network services and functions through common

interfaces and protocols. It is in the form of a seven layered model for network architecture and is

known as OSI reference model. It defines the rules and conventions for various function within

each layer and notes the constraints. Neither the details of the implementation nor the

specification of the interlayer interfaces are part of the architecture. Thus the OSI reference

model is just – a Model. It cannot be implemented. It serves only as a framework for standards

which can be implemented at each layer by a variety of protocols.

Network Architecture

Page 100: SYJC Arts IT Chapter 1 to 6.pdf

Network Architecture

Page 101: SYJC Arts IT Chapter 1 to 6.pdf

The Physical LayerPhysical layer is concerned with transmitting raw bits over a communication channel. The design issues here largely deals with mechanical, electrical and the physical transmission medium, which lies below the physical layer. The Data Link LayerThe main task of Data Link layer is to take a raw transmission facility and transform it into a linethat appears free of transmission errors to the network layer. Packet from the network layer ismodified to include the source and the destination address MAC (Media Access Control)address. The sender breaks the input data into data frames, transmit the frames sequentially,and process the acknowledgement frame sent back by the receiver.The Network LayerThe Network Layer is concerned with the controlling of operation of the subnet; at this layer a packet is created. A key design issue is how packets are routed from source to destination. Controlling the congestion belongs to network layer. Network layer overcomes all the problems to allow heterogeneous networks to be interconnected.

Network Architecture

Page 102: SYJC Arts IT Chapter 1 to 6.pdf

The Transport LayerThe basic function of the transport layer is to accept data from the session layer, split it up intosmaller units if need be, pass these to the network layer and ensure that the pieces all arrivecorrectly at the other end. The transport layer multiplex several transport connection onto thesame network connection to reduce the cost. It determines the kind of service to provide to thesession layer and the users of the network. In addition to multiplexing it should take care ofestablishing and deleting connections across the network.The Session LayerThe Session Layer allows users on different machines to establish sessions maintain and end thesession. One of the services of the session layer is to manage dialogue control. The decision totransmit data using half duplex or full duplex is made at this layer.The Presentation LayerThe presentation layer converts application layer information into a common format on thesending computer. It converts the common format to the application format at the receivingcomputer.The formats include: ASCII- text files, JPG, BMP, GIFF- Pictures, MPG, AVI, MOV- Videos andMP3, WAV- Music.The Application LayerThe Application Layer contains a variety of protocols that are commonly needed, it includes allthe network applications a user interacts with. E.g.: HTTP, FTP, SMTP, Telnet etc.

Network Architecture

Page 103: SYJC Arts IT Chapter 1 to 6.pdf

ARPANET was a research network sponsored by US Department of Defense, which eventuallyconnected hundreds of Universities and government installations using leased telephone lines.When satellites and radio networks were added later, the existing protocols had troubleinterworking with them, so new reference architecture was needed. This architecture was basedon the ability to connect multiple networks together in a seamless way, which later becameknown as the TCP/IP reference model. The internet layer is a packet switching network based ona connectionless internetworking layer. This layer called the internet layer which is the lynchpinthat holds the whole architecture together. Its job is to permit host to inject IP packages into anynetwork and have them travel independently to their destination. Packet routing is clearly themajor issue here as is avoiding congestion.

The Transport LayerLayer above the internet layer is the transport layer, it is designed to allow peer on the sourceand destination host to carry on a conversation. Two end-to-end protocols are defined here.TCP- Transmission control protocol, is a reliable connection oriented protocol that allows a bytestream originating on one machine to be delivered without error on any other machine in theinternet.UDP- User Datagram protocol is an unreliable, connectionless protocol for applications that donot want TCP’s sequencing or flow controls and wish to provide their own. It is also widely usedfor client server type request-reply queries and applications in which prompt delivery is moreimportant that accurate delivery.

TCP/IP Reference Model

Page 104: SYJC Arts IT Chapter 1 to 6.pdf

The Application Layer - Above the transport layer is the application layer, whichcontains all the higher- levels protocols. E.g.: HTTP, FTP, SMTP, Telnet etc. Manyprotocols have been added to this such as domain name service (DNS) for mappinghost name on to their network addresses.The Host-To-Network Layer - This model does not say much about what happens hereexcept to point out that the host has to connect to the network using some protocol soit can send IP packets over it. This protocol is not defined and varies from host to hostand network to network.

Address Resolution Protocol (ARP) - ARP is the protocol used by the internet protocol tomap IP network addresses to the hardware addresses used by a data link protocol. The termaddress resolution refers to the process of finding an address of a computer in the network. Theaddresses “resolved” using a protocol in which a piece of information is sent by a client processexecuting on the local computer to a server process executing on a remote computer. Theaddress resolution procedure is completed when the client receives a response from the servercontaining the required address.

Reverse Address Resolution Protocol (RARP) - RARP is a protocol by which a physicalmachine in a local area can request to learn its IP address from a gateway server’s ARP table orcache. It is used for diskless computers to determine their IP address using the network.

Networking

Page 105: SYJC Arts IT Chapter 1 to 6.pdf

Point –To- Point Communication - A point –to- point connection is a dedicated linkbetween two systems or processes. Think of a wire that directly connects two systems.The systems use that wire exclusively to communicate. The opposite of point to pointcommunication is broadcasting where one system transmits to many systems. Point –to-point communication is defined in the physical and data link layers of the OSIprotocol stack.

Hyper Text Transfer Protocol (Http) - It is the underlined protocol used by the WorldWide Web. HTTP defines how messages are formatted and transmitted, and whatactions web servers and browsers should take in response to various commands. HTTPis called a stateless protocol because each command is executed independently,without any knowledge of the commands that came before it.

Networking

Page 106: SYJC Arts IT Chapter 1 to 6.pdf

Network Relationship - Prior to understanding the network relationship it is important toknow some networking terminologies which are as follows:

Node - A node is anything connected to the network, usually a computer, but it could be aprinter or a scanner.

Segment - A segment is any portion of a network that is separated by a switch, bridge or arouter from another part of a network.

Backbone - Backbone is the main cabling of a network that all of the segments connect to.Usually, the backbone is capable of carrying more information than the individual segments.

Topology - The way each node is physically connected to the network.

Client - A client is an application or system that accesses a service made available by a server.

Server - A server is a computer designed to process requests and deliver data to other(client) computers over a local network or the Internet.Networks can be broadly classified into one of the two categories depending upon thestructures, sizes and budgets of different organization:Client-Server Network (Centralized)Peer-to-Peer Network (Decentralized)

Networking

Page 107: SYJC Arts IT Chapter 1 to 6.pdf

Client-Server Network :In Client-Server network client applications request services from server. Clients and servers typically run ondifferent computers interconnected by a computer network. It provides for centralized administration. Allusers and resources can be managed from a single location or security database The file servers become theheart of the system, providing access to resources and providing security

Advantages of Client-Server Networks1. Facilitate resource sharing – centrally administrate and control 2. Facilitate system backup and improve fault tolerance3. Enhance security – only administrator can have access to Server4. Support more users – difficult to achieve with peer-to-peer networks

Disadvantage of Client-Server Networks1. High cost for Servers2. Need expert to configure the network3. Failure of the Server leads to the failure of the entire network

Networking

Page 108: SYJC Arts IT Chapter 1 to 6.pdf

Peer To Peer NetworkPeer-to-peer networks allow users to share resources and files located on their computers and to accessshared resources found on other computers. They do not have a file server or a centralized managementsource . All computers are considered equal. They all have the same abilities to use the resources availableon the network. This network is designed primarily for small to medium local area networks.

Advantages of Peer To Peer Networks1. Low cost2. Simple to configure3. User has full accessibility of the computer 4. Security is not an issue

Disadvantages of Peer To Peer Networks1. No need for a dedicated server. 2. No central repository for files and applications3. Does not provide the security available on a client/server network.4. May have duplication in resources5. Difficult to uphold security policy6. 10 or less users

Networking

Page 109: SYJC Arts IT Chapter 1 to 6.pdf

Network Features

Network Features

File and Printer Sharing Network allows users to share information in different ways but the common way of sharinginformation is through file sharing. The file could be either on the server or on other hosts andwhen in network can be shared by all. Resources like printer can be shared by many systems at agiven point of time thereby saving on the cost and space.

Application Services and E-mailOne of the most common reasons for networking in many businesses, institutions andorganizations is that several users can work together on a single application which will be on theserver and can be shared by all. In larger office, personnel can use e-mails and instant messagingtools to communicate and store messages.

Remote AccessWith remote access, different users can access same files, data and messages in the office aswell as when they are not in the office. Now a days mobiles, i-pad, i-phones make use of thistechnology.

Page 110: SYJC Arts IT Chapter 1 to 6.pdf

Cable Topologies

It is also known as Network topology. Network Topology defines the way in whichcomputers, printers and other devices are connected in other words - the structure ofthe network. Network topology describes the layout of the wire and devices as well asthe paths used by data transmissions.

Types Of Topologies: Topologies can be majorly classified as follows:BUSRINGSTAR

Page 111: SYJC Arts IT Chapter 1 to 6.pdf

Bus Topology

In Bus topology all devices are connected to a common cable called trunk/bus alsoknown as backbone with terminators provided at each end. Maximum length of thecable can be 200m. Maximum nodes that can be attached are 30. This topology ispopular on LAN because it is inexpensive due to single cable connection and easy toinstall.

Advantages of Bus Topology 1. Installation of devices is easy.2. Requires less cable as compared to Star topology.3. Less expensive and works better for smaller networks.

Disadvantages of Bus Topology1. If backbone breaks entire network gets down.2. Difficult to isolate problems due to single cable.3. Limited number of devices can only be attached.

Page 112: SYJC Arts IT Chapter 1 to 6.pdf

Star Topology

In star Topology each device is connected to a central device called hub/switchthrough cable. All data transferred from one node to another passes throughhub/switch before reaching the destination

Advantages of Star Topology1. Centralized management and security can be implemented in the hub/switch.2. Adding or removing of node does not affect the whole network. 3. Easy to detect faults and to remove parts.

Disadvantages of Star Topology1. Requires more cable length.2. Failure of hub/switch affects the entire network.3. It is more expensive.

Page 113: SYJC Arts IT Chapter 1 to 6.pdf

Ring Topology

In Ring topology, devices are connected in a closed loop with all the nodes arrangedalong a ring. All devices have equal access to media. Data travels from one device toanother around entire ring in one direction. It is primarily used for LANs but also usedin WANs.

Advantages of Ring TopologyData travels at greater speed. Data is quickly transferred without collision/bottlenecks. Handles large volume of traffic. Transmission of data is relatively simple as packets travel in one direction only.

Disadvantages of Ring TopologyMore cabling is required compared to bus. One faulty device affects the entire network. Addition of devices affects the network. Difficult to troubleshoot. A data packet passes through every node between the sender and receiver making it slow.

Page 114: SYJC Arts IT Chapter 1 to 6.pdf

Network Hardware

1. RepeaterA repeater is an electronic device that receives a signal and retransmits it at a higher leveland/or higher power, or onto the other side of an obstruction, so that the signal can coverlonger distances.

2. HubA hub is the place where data converges from one or more directions and is forwarded out inone or more directions. It can be seen in local area networks. Hubs are of three types Activehubs, Passive hubs and intelligent hubs. An active hub possesses all the usual features of apassive hub besides having some more.An active hub takes a larger role in Ethernet communications with the help of technology calledstore & forward.A passive hub on the other hand, do very little to enhance the performance of the network.Neither, it helps in any way in the troubleshooting operations.Intelligent hub is another form of hub that is increasingly being used.An advanced version that comprises the best of both active and passive hubs is the intelligenthub, it provides with the ability to manage the network from one central location. With the helpof an intelligent hub, one can easily identify, diagnose problems and even come up withremedial solutions.

Page 115: SYJC Arts IT Chapter 1 to 6.pdf

Network Hardware 3. BridgeA bridge is a product that connects a local area network (LAN) to another local area networkthat uses the same protocol. A bridge examines each message on a LAN, "passing" those knownto be within the same LAN, and forwarding those known to be on the other interconnected LAN(or LANs).

4. RouterA router is a device or a software in a computer that determines the next network point towhich a packet should be forwarded toward its destination. It allows different networks tocommunicate with each other. A router creates and maintains a table of the available routes andtheir conditions and uses this information along with distance and cost algorithms to determinethe best route for a given packet. A packet will travel through a number of network points withrouters before arriving at its destination.

5. SwitchA network switch is a small hardware device that joins multiple computers together within onelocal area network (LAN). Technically, network switches operate at layer two (Data Link Layer) ofthe OSI model. Network switches appear nearly identical to network hubs, but a switchgenerally contains more intelligence (and a slightly higher price tag) than a hub. Unlike hubs,network switches are capable of inspecting data packets as they are received, determining thesource and destination device of each packet, and forwarding them appropriately. By deliveringmessages only to the connected device intended, a network switch conserves networkbandwidth and offers generally better performance than a hub.

Page 116: SYJC Arts IT Chapter 1 to 6.pdf

THANK YOU

Page 117: SYJC Arts IT Chapter 1 to 6.pdf

1

Chapter -5 Cs3 DTP using Adobe InDesign

Introduction to Adobe InDesign:- Adobe InDesign is a page-layout software that takes print

publishing and page design beyond current boundaries. Replacing popular software such as PageMaker and Quark

Express, InDesign is a desktop publishing program that incorporates illustration capabilities into its interface. It also

allows cross platform interaction with Illustrator, Photoshop, and Acrobat. Adobe InDesign Creative Suite (CS5)

software is a versatile desktop publishing application that gives you pixel-perfect control over design. We need

minimum Pentium Processor Core 2 Duo or higher with 2 GB RAM or higher and preferably with graphics card for better performance.

Getting Started:-Procedure : To start - Adobe InDesign CS5.

click Start > Programs > Adobe InDesign CS5 or click on the InDesign short cut on the desktop.

5.1 Document Setup and Working Environment:- 5.1.1 Document Setup:-To create a new document, Click on File menu New Document. This will open

the Document Setup dialog box, Here user will be able to set up the correct page size, margins and page columns for

document as shown in fig.5.1

Fig 5.1 Document Setup

Window in as shown above diagram include following options : Number of Pages

Type a value for the total number of pages for this document.

Ruler Guide

Page 118: SYJC Arts IT Chapter 1 to 6.pdf

2

Facing Pages

Select this option to make left and right pages face each other in a double-page spread. Deselect this option to let

each page stand alone, such as user plan to print on both sides of a sheet of paper or want objects to bleed in the

binding.

Master Text Frame

Select this option to create a text frame the size of the area within the margin guides, matching the column settings

specified. The master text frame is added to the master.

Page Size

Choose a page size from the menu, or type values for Width and Height. Page size represents the final size user want

after bleeds or trimming other marks outside the page. There are presets for common sizes such as letter, legal, and

A4.

Orientation

Click the Portrait (tall) or Landscape (wide) icons. These icons interact dynamically with the dimensions user have

entered in Page Size. After entering all document settings, click OK.

5.1.2 Working Environment:- User create and manipulate documents and files using various elements, such as panels, bars, and windows. Any

arrangement of these elements is called a workspace. The workspaces of the different applications in Adobe®

Creative Suite® 5 share the same appearance so that user can move between the applications easily.

5.1.3 Toolbox:-

(Fig.

5.2)

Fig 5.2 Tool Box

Tools overview

Page 119: SYJC Arts IT Chapter 1 to 6.pdf

3

Type tools:-Create and format type in standard or customized blocks or paths.

Drawing tools:-Draw and style simple and complex objects, including rectangles, ellipses, polygons, freeform

shapes.

Selection tool:-Select (activate) objects, points, or lines.

Transform tools:-Reshape, reorient, and resize objects.

Navigation tools:-Move around in, control the view of, and measure distances in a document.

The Scissors tools:-Splits paths and frames.

5.1.4 Ruler Guides:- Ruler guides are different from grids in that they can be positioned freely on a page or on a pasteboard. User can

create two kinds of ruler guides, page guides which appear only on the page, or spread guides, which span all pages

and the pasteboard of a multiple-page spread. User can drag any ruler guide to the pasteboard. A ruler guide is

displayed or hidden with the layer on which it was created. New ruler guides always appear on the target spread.

5.1.5 Zooming and Scrolling:- Zoom Tool is helpful because it allows user to focus in on specific areas of

documents to make the placement of text and graphics as accurate as possible. User can access the Zoom Tool by

selecting it from the Tool Box (Fig. 5.2). Zoom tool adjusts the view magnification in the document window. With

help of scrolling user can scroll the page vertically & horizontally.

5.2 Creating Frames, Moving Objects, Selection Techniques 5.2.1 Creating Frames :- User can draw objects in a document and use them as paths or as frames. Frames can be containers for text or other

objects. A frame can also exist as a placeholder—a container without contents. As containers and placeholders,

frames are the basic building blocks for a document’s layout.

Frames can contain text or graphics. A text frame determines the area to be occupied by text and how text will flow

through the layout. User can recognize text frames by the text ports in their respective upper left and lower right

corners.

A graphics frame can function as a border and background, and can crop or mask a graphic. When acting as an empty placeholder, a graphics frame displays a crossbar. (Fig 5.3)

Fig 5.3 Empty Graphical Frames

5.2.2 Moving Objects: Paste an object into a frame:-Use the Paste Into command to nest graphics within container frames. User can insert

nested t graphics into nested frames by any one of the following method.

•To paste one object inside a frame, select the object.

•To paste two or more objects inside a frame, group them first, because a frame can contain only one object.

•To paste a text frame inside another frame and preserve its current appearance, select the entire text frame using the

Selection tool or Direct Selection tool , not the Type tool.

2. Choose Edit > Copy (or Edit > Cut, if you don’t want to keep the original).

Page 120: SYJC Arts IT Chapter 1 to 6.pdf

4

3. Select a path or frame, and then choose Edit > Paste Into.

Fit an object to its frame:- 1.Select the frame of the object.

2.Choose Object > Fitting and one of the following options:

Fit Content To Frame Resizes content to fit a frame and allows the content proportions to be changed. The frame

will not change, but the content may appear to be stretched if the content and the frame have different proportions.

Fit Frame To Content Resizes a frame to fit its content. The frame’s proportions are altered to match the content proportions, if necessary. This is useful for resetting a graphics.

Center Content Centers content within a frame. The proportions of the frame and its content are preserved. The

size of the content and frame are unaltered.

Fit Content Proportionally Resizes content to fit a frame while preserving the content proportions. The frame’s

dimensions are not changed. If the content and the frame have different proportions, some empty space will result.

Fill Frame Proportionally Resizes content to fill the entire frame while preserving the content’s proportions. The

frame’s dimensions are not changed. If the content and the frame have different proportions, some of the content

will be cropped by the bounding box of the frame.

5.2.3 Selection Techniques

Selection methods and tools:

Selection tool:- Allows to select text and graphics frames, and work with an object using its bounding box. If user

click the content grabber that appears while holding the mouse pointer over an image, user can manipulate the image

within the frame without switching to the Direct Selection tool.

Direct Selection tool:- Allows user to select the contents of a frame, such as a placed graphic, or work directly with editable objects, such as paths, rectangles, or type that has been converted to a text outline.

Select submenu:- Allows user to select an object’s container (or frame) and its contents. The Select submenu also

facilitates select objects based on their position relative to other objects.

Select All and Deselect All commands:- Allows to select or deselect all objects on the spread and pasteboard,

depending on which tool is active and what is already selected. Choose Edit > Select All or Edit > Deselect All.

Select objects:-An object is any printable element on a page or on the pasteboard, such as a path or an imported

graphic. A frame or path is a shape drawn or a container for text or graphics. A bounding box is a rectangle with

eight selection handles that represents an object’s vertical and horizontal dimensions. .

Select text inside a frame

•To select text by dragging, click on a text frame using the Type tool. An insertion point appears. •To create an insertion point in text, double-click a text frame using any selection tool. InDesign switches to the

Type tool automatically.

Select an object inside a frame •Click the object using the Direct Selection tool The Direct Selection tool

automatically changes to the Hand tool when placed over a graphic object inside a frame.

Select multiple objects

•To select all the objects in a rectangular area, use the Selection tool to drag a marquee over the objects want to

select.

•To select nonadjacent objects, use the Selection tool to select an object and then press Shift as user click additional

objects. Clicking selected objects deselects them.

•To add more objects to a selection, press Shift as user clicks the Selection tool to drag a marquee over additional objects. Dragging over selected objects deselects them.

5.2.4 Control and Transforming objects Transform panel overview:-Use the Transform panel to view or specify geometric information for any selected

object, including values for position, size, rotation, and shearing. Commands in the Transform panel menu provide

additional options and quick ways to rotate or reflect objects.

Page 121: SYJC Arts IT Chapter 1 to 6.pdf

5

Fig 5.4 Transform

A. Reference point locator B. Constrain Proportions icon C. Panel menu

View geometric information about objects:-When user select an object, its geometric information appears in the

Transform and Control panels. If user select multiple objects, the information represents all selected objects as a

unit. Select one or more objects, and display the Transform panel (Window > Object & Layout >

Transform).Position information is relative to the ruler origin and the reference point of the object. Angle

information is relative to the pasteboard, where a horizontal line has an angle of 0°.

Change transformation settings:-The Transform panel includes several options that determine how objects are

transformed and how transformations are displayed in the Transform and Control panels

Change the reference point for selected objects:-All transformations originate from a fixed point on or near the

object, called the reference point. The reference point is marked by an icon when a transformation tool, such as the

Scale tool, is active.

Transform objects with the Selection tool:-

To move objects, click anywhere within the bounding box, and then drag. •To scale objects, hold down Ctrl key and drag any bounding box handle until the object is the desired size. Include

the Shift key to preserve the selection’s proportions. Include the Alt key to scale objects from the center.

•To rotate objects, position the pointer anywhere outside a bounding box handle. When the pointer changes to ,

drag until the selection is at the desired angle of rotation

•To reflect objects, drag a handle of the bounding box past the opposite edge or handle, until the object is at the

desired level of reflection.

Transform objects with the Free Transform tool

Rotate an object using the Rotate tool

Select an object to rotate. To rotate both the frame and its content, use the Selection tool to select the frame.

To rotate the content without rotating its frame, click the Content Grabber or use the Direct Selection tool to select the object. To rotate a frame without rotating the content, direct-select the frame, and select all the

anchor points

Select the Rotate tool .

Page 122: SYJC Arts IT Chapter 1 to 6.pdf

6

If user want to use a different reference point for the rotation, click where user want the reference point to

appear.

Position the tool away from the reference point, and drag around it. To constrain the tool to multiples of

45°, hold down Shift while dragging. For finer control, drag farther from the object’s reference point. User

can also rotate by using the Free Transform tool.

Rotate an object using the Selection tool:-Using the Selection tool, position the pointer anywhere outside a

selection handle. When the pointer changes to, drag until the selection is at the desired angle of rotation.

5.2.5 Lines:- direction handles direction

points.

5.2.6 Manually Resizing Objects:-

5.3 Working with Text 5 .3.1 Entering, Editing and Importing Text Text in InDesign resides inside containers called text frames.

Like graphics frames, text frames can be moved, resized, and changed. The tool with which user select a text frame

determines the kind of changes user can make:

• Use the Type tool to enter or edit text in a frame.

• Use the Selection tool for general layout tasks such as positioning and sizing a text frame. • Use the Direct Selection tool to alter a text frame’s shape.

Text frames can have multiple columns. Text frames can be based on, yet independent of, page columns. Text

frames can also be placed on master pages and still receive text on document pages.

When user place or paste text, user don’t need to create a text frame; InDesign automatically adds frames based on

the page’s column settings either by

• Select the Type tool , and then drag to define the width and height of a new text frame. Hold down Shift as user

drag to constrain the frame to a square. When user release the mouse button, a text insertion point appears in the

frame.

• Using the Selection tool, click the in port or out port of another text frame, and then click or drag to create another

frame.

•Use the Place command to place a text file.

•Using the Type tool , click inside any empty frame. If the Type Tool Converts Frames To Text Frames option is

selected in Type preferences, the empty frame is converted to a text frame.

Place (import) text:-When user place a text or spreadsheet file, user can specify options to determine how the

imported text is formatted.

Page 123: SYJC Arts IT Chapter 1 to 6.pdf

7

1. To create links to the files being placed, click File Handling in the Preferences dialog box and select Create Links

When Placing Text and Spreadsheet Files. Selecting this option creates a link to the placed file. User can use the

Links panel to update, relink, or remove links to text files. However, if user format linked text in InDesign, the

formatting may not be preserved when user update the link. If this option isn’t selected, imported text and

spreadsheet files are embedded (not linked).

•To create a new frame for the placed text, make sure that no insertion point is present and that no text or frames are selected.

•To add text to a frame, use the Type tool to select text or place the insertion point.

•To replace the contents of an existing frame, use a selection tool to select the frame. If the frame is threaded, a

loaded text cursor appears.

3. Choose File > Place.

4. Select Replace Selected Item if user want the imported file to replace the contents of a selected frame, to replace

selected text, or to be added to the text frame at the insertion point. Deselect this option to flow the imported file

into a new frame.

5. Select Show Import Options, and then double-click the file user want to import.

6. Set import options, and then click OK.

5.3.2 Highlights and Threading Text:-

Thread text frames:-The text in a frame can be independent of other frames, or it can flow between connected

frames. To flow text between connected frames (also called text boxes), user must first connect the frames.

Connected frames can be on the same page or spread, or on another page in the document. The process of

connecting text among frames is called threading text.

5.3.3 Understanding Text Thread:- Each text frame contains an in port and an out port, which are used to

make connections to other text frames. An arrow in a port indicates that the frame is linked to another frame. A red plus sign (+) in an out port indicates that there is more text in the story to be placed but no more text frames in

which to place it. This remaining unseen text is called overset text.

5.3.4 Story Editor:-

Page 124: SYJC Arts IT Chapter 1 to 6.pdf

8

Fig 5.5 Story Editor

5.3.5 Glyphs:-1.Using the Type tool , click to place the insertion point where user want to enter a character.

2.Choose Type > Glyphs to display the Glyphs panel.

3.To display a different set of characters in the Glyphs panel, select a different font and type style, if available. From

the Show menu, choose Entire Font. Or, if user selected an OpenType font, choose from a number of OpenType

categories.•Choose a custom glyph set from the Show menu. 4.Scroll through the display of characters until user see the glyph user want to insert. If user selected an OpenType

font, user can display a pop-up menu of alternate glyphs by clicking and holding the Glyph box.

5.Double-click the character user want to insert. The character appears at the text insertion point.

5.3.6 Special Character and White Space:-

Special Character :-User can insert common characters such as em dashes and en dashes, registered trademark

symbols, and ellipses.

1. Using the Type tool, position the insertion point where user want to insert a character.

2. Choose Type > Insert Special Character, and then select an option from any of the categories in the menu. If

special characters that user use repeatedly do not appear on the list of special

White space options:-The following options appear on the Type > Insert White Space menu:

Em Space Equal in width to the size of the type. In 12-point type, an em space is 12 points wide. En Space One-

half the width of an em space. Nonbreaking Space The same flexible width as pressing the spacebar, but it prevents the line from being broken at the space character.

5.3.7 Text Frame Options-Columns:- Add columns to a text frame User can create columns within a text frame by using the Text Frame Options dialog box.

Using the Selection tool, select a frame, or using the Type tool, click inside the text frame or select text.

Choose Object > Text Frame Options.

Specify the number of columns, the width of each column, and the spacing between each column (gutter)

for the text frame

Page 125: SYJC Arts IT Chapter 1 to 6.pdf

9

Select Fixed Column Width to maintain column width when user resize the frame. If this option is selected,

resizing the frame can change the number of columns, but not their width.

5.3.8 Text Frame Insets & Vertical Alignment:- For text frames, specify columns, vertical alignment, and inset spacing in the Text Frame Options dialog box. Set

horizontal alignment in the Paragraph panel (Type > Paragraph). For graphics and text frames, use subcommands on

the Object > Fitting menu to fit content to a frame (or vice versa).

5.4 Character Settings 5.4.1 Font, Size & Style Fonts:- A font is a complete set of characters—letters, numbers, and symbols—that share a common weight, width, and style, such as 10-pt Adobe Garamond Bold. Typefaces (often called type families or font families) are

collections of fonts that share an overall appearance, and are designed to be used together, such as Adobe

Garamond.A type style is a variant version of an individual font in a font family. Typically, the Roman or Plain (the

actual name varies from family to family) member of a font family is the base font, which may include type styles

such as regular, bold, semibold, italic, and bold italic.

Apply a font to text:-When user specify a font, user can select the font family and its type style independently.

When user change from one font family to another, InDesign attempts to match the current style with the style

available in the new font family. For example, Arial Bold would change to Times Bold when user change from Arial

to Times.

Specify a typeface size:-By default, typeface size is measured in points (a point equals 1/72 of an inch). User can

specify any typeface size from 0.1 to 1296 points, in 0.001-point increments.

1Select the characters or type objects user want to change. If user don’t select any text, the typeface size applies to new text user create.

•In the Character panel or Control bar set the Font Size option

•Choose a size from the Type > Size menu. Choosing Other lets user type a new size in the Character

Character style attributes:-Unlike paragraph styles, character styles do not include all the formatting attributes of

selected text. Instead, when user create a character style, User can create a character style that, when applied to text,

changes only some attributes, such as the font family and size, ignoring all other character attributes. If user want

other attributes to be part of the style, add them when editing the style.

Apply a character style:-

1.Select the characters to which user want to apply the style.

•Click the character style name in the Character Styles panel

.•Select the character style name from the drop-down list in the Control panel

5.4.2 Leading The vertical space between lines of type is called leading. Leading is measured from the baseline of one line of text

to the baseline of the line above it. The default auto-leading option sets the leading at 120% of the type size (for example, 12-point leading for 10-point type). When auto-leading is in use, InDesign displays the leading value in

parentheses in the Leading menu of the Character panel.

Change leading : By default, leading is a character attribute, which means that user can apply more than one

leading value within the same paragraph. The largest leading value in a line of type determines the leading for that

line. However, user can select a preferences option so that leading applies to the entire paragraph, instead of to text

within a paragraph. This setting does not affect the leading in existing frames

Change leading of selected text:- 1. Select the text user want to change.

•In the Character panel or Control panel, choose the leading user want from the Leading menu .•Select the existing leading

value and type a new value.

•While creating a paragraph style, change the leading using the Basic Character Formats panel.

If InDesign ignores the leading change, it may be due to Vertical Justification or Align To Baseline Grid being selected.

Choose Object > Text Frame Options and make sure Vertical Justification is set to Top, and make sure Do Not Align To Baseline Grid is selected in the Paragraph panel, Control panel, or paragraph style.

5.4.3 Kerning and Tracking Kerning is the process of adding or subtracting space between specific pairs of characters. Tracking is the process

of loosening or tightening a block of text.

Page 126: SYJC Arts IT Chapter 1 to 6.pdf

10

Types of kerning:-User can automatically kern type using metrics kerning or optical kerning. Metrics kerning uses

kern pairs, which are included with most fonts. Kern pairs contain information about the spacing of specific pairs of

letters. Some of these are: LA, P., To, Tr, Ta, Tu, Te, Ty, Wa, WA, We, Wo, Ya, and Yo. InDesign uses metrics

kerning by default so that specific pairs are automatically kerned when user import or type text. To disable metrics

kerning, select "0". Optical kerning adjusts the spacing between adjacent characters based on their shapes. Some

fonts include robust kern-pair specifications. However, when a font includes only minimal built-in kerning or none at all, or if user use two different typefaces or sizes in one or more words on a line, user may want to use the optical

kerning. User can apply kerning, tracking, or both to selected text. Tracking and kerning are both measured in

1/1000 em, a unit of measure that is relative to the current type size. In a 6-point font, 1 em equals 6 points; in a 10-

point font, 1 em equals 10 points. Kerning and tracking are strictly proportional to the current type size.

5.4.4 Horizontal and Vertical Scale Scale type:-User can specify the proportion between the height and width of the type, relative to the original width

and height of the characters. Unscaled characters have a value of 100%. Some types (families) include a true expanded font, which is designed with a larger horizontal spread than the plain type style. Scaling distorts the type,

so it is generally preferable to use a font that is designed as condensed or expanded.

Adjust vertical or horizontal scaling:-

1Select text user want to scale.

2In the Character panel or Control panel, type a numeric value to change the percentage of Vertical Scaling or

Horizontal Scaling .

Scale text by resizing the text frame in InDesign:-

•Using the Selection tool, hold down Ctrl (Windows) and then drag a corner of the text frame to resize it

•Using the Scale tool , resize the frame.

5.4.5 Baseline Shift and Slanted Text Apply baseline shift:-

Make characters superscript or subscript in a non-OpenType font:-

1. Select text. 2. Choose Superscript or Subscript in the Character panel menu or in the Control panel. When user choose

Superscript or Subscript, a predefined baseline shift value and type size are applied to the selected text. The values

applied are percentages of the current font size and leading, and are based on settings in the Type Preferences dialog

box. These values do not appear in the Baseline Shift or Size boxes of the Character panel when user select the text

(Fig. 5.6)

Page 127: SYJC Arts IT Chapter 1 to 6.pdf

11

Fig 5.6 Subscript

5.5 Paragraph Settings 5.5.1 Indents:- 1)Left Indent: This option provide space to left side of the entire paragraph.

2) Right Indent: This option provide space to right side of the entire paragraph.

3) First Line Left Indent:-This option provide space to left side of the first line of the paragraph.

4) First Line Right Indent:-This option provide space to right side of the first line of the paragraph.

Fig 5.7 Indents

5.5.2 Space Before/Space After:-

1.Space Before :- Provide space before or Above the paragraph .

2.Space After :- Provide space After or Below the paragraph .

5.5.3 Alignment of the Paragraph :- Paragraph may be align left ,align center, align right and justify with

different options like justify with last line aligned left , justify with last line aligned right etc.

Page 128: SYJC Arts IT Chapter 1 to 6.pdf

12

5.5.4 Use drop caps:-User can add drop caps to one or more paragraphs at a time. The drop cap’s baseline sits

one or more lines below the baseline of the first line of a paragraph. User can also create a character style that can

be applied to the drop-cap characters. For example, user can create a tall cap (also called a raised cap) by specifying

a 1-line, 1-character drop cap and applying a character style that increases the size of the first letter. (Fig. 5.8)

Fig 5.8 Drop Cap

1.With the Type tool selected, click in the paragraph where user want the drop cap to appear.

2In the Paragraph panel or Control panel, type a number for Drop Cap Number Of Lines to indicate the number of

lines user want the drop cap to occupy

3. For Drop Cap One Or More Characters , type the number of drop cap characters user want.

4. To apply a character style to the drop cap character, choose Drop Caps and Nested Styles from the Paragraph

panel menu, and then choose the character style user created.

5.5.5 Aligning to a Baseline Grid:- When the Align to Baseline Grid option is applied to paragraphs with Top, Center, or Bottom alignment, all lines

will be aligned to the baseline grid. With the Justified option, only the first and last lines will be aligned to the

baseline grid.

With out Baseline Grid With Baseline Grid

Fig 5.9 BaseLine Grid

5.5.6 Hyphenation:-with help of this option user can apply hyphenation or remove the hyphenation from the

paragraph.

5.5.7 Control paragraph breaks using Keep Options:-

To highlight paragraphs that violate Keep Options, choose Edit >

Preferences > Composition (Windows)

5.5.8 Text Composers:-The appearance of text on user page depends on a complex interaction of processes

called composition. Using the word spacing, letter spacing, Glyph scaling, and hyphenation options user has

Page 129: SYJC Arts IT Chapter 1 to 6.pdf

13

selected, InDesign composes user type in a way that best supports the specified parameters. InDesign offers two

composition methods: Adobe Paragraph Composer (the default) and Adobe Single-line Composer (both are

available from the Control panel menu). User can select which composer to use from the Paragraph panel menu, the

Justification dialog box, or the Control panel menu.

5.5.9 Paragraph Rules:- Add rules (lines) above or below paragraphs:- Rules are paragraph attributes that move and are resized along with

the paragraph on the page. If user’re using a rule with headings in user document, user may want to make the rule

part of a paragraph style definition. The width of the rule is determined by the column width. The offset for a rule

above a paragraph is measured from the baseline of the top line of text to the bottom of the rule. The offset for a rule

below a paragraph is measured from the baseline of the last line of text to the top of the rule.

Fig 5.10 Rules

5.5.10 Bullet Points and Lists:- Create bulleted or numbered lists:-In bulleted lists, each paragraph begins with a bullet character. In numbered

lists, each paragraph begins with an expression that includes a number or letter and a separator such as a period or

brackets. The numbers in a numbered list are updated automatically when user add or remove paragraphs in the list. User can change the type of bullet or numbering style, the separator, the font attributes and character styles, and the

type and amount of indent spacing. User cannot use the Type tool to select the bullets or numbers in a list. Instead,

edit their formatting and indent spacing using the Bullets and Numbering dialog box, the Paragraph panel, or the

Bullets and Numbering section of the Paragraph Styles dialog box (if the bullets or numbers are part a style).

Page 130: SYJC Arts IT Chapter 1 to 6.pdf

14

Fig 5.11 Number List

5.5.11 Paragraph styles or Character styles:- By default, each new document contains a [Basic

Paragraph] style that is applied to text user type. User can edit this style, but user can’t rename or delete it. User can

rename and delete styles that user create. User can also select a different default style to apply to text. Open the Paragraph Styles panel:-Choose Type > Paragraph Styles, or click the Paragraph Styles tab, which

appears by default on the right side of the application window.

5.5.12 Editing paragraph or character styles:- 1 If user want to base a new style on the formatting of existing text, select that text or place the insertion point in it.

If a group is selected in the Styles panel, the new style will be part of that group.

2 Choose New Paragraph Style from the Paragraph Styles panel menu, or choose New Character Style from the Character Styles panel menu.

3 For Style Name, type a name for user new style.

4 For Based On, select which style the current style is based on.

5 For Next Style (Paragraph Styles panel only), specify which style is applied after the current style when user press

Enter or Return.

6 To add a keyboard shortcut, position the insertion point in the Shortcut box, and make sure Num Lock is turned

on. Then hold down any combination of Shift, Alt, and Ctrl or Shift, Option and press a number on the numeric

keypad. User cannot use letters or non-keypad numbers for defining style shortcuts. If user keyboard does not have a

Num Lock key, user cannot add keyboard shortcuts to styles.

7 If user want the new style to be applied to the selected text, select Apply Style To Selection.

8 To specify the formatting attributes, click a category (such as Basic Character Formats) on the left, and specify the

attributes user want to add to user style. When specifying a Character Color in the Style Options dialog box, user can create a new color by double-clicking the fill or stroke box.

5.6 Working with Images in Indesign 5.6.1 Placing an Image & Image Fitting Options (Fig. 5.12):- Place (import) graphics:-The Place command is the primary method used to insert graphics into InDesign because

it provides the highest level of support for resolution, file formats, multipage PDF files, and color. To place graphics

is also referred to as import images and insert pictures.

.• To replace an existing image, select its graphics frame.

o Choose File > Place and select one or more graphics files of any available format.

o To replace an object user selected, select Replace Selected Item.

o To add a caption based on the image metadata, select Create Static Captions.

o To set format-specific import options, do one of the following: o Select Show Import Options, and then click Open

o Hold down Shift as user click Open or Shift-double-click a file name.

o If the Image Import Options dialog box appears (because user chose to set format-specific import options),

select import options and click OK.

.

Page 131: SYJC Arts IT Chapter 1 to 6.pdf

15

Fig 5.12 placing Image

5.6.2 Scaling Images and Cropping Images :- Scale objects or image:-Scaling an object enlarges or reduces it horizontally (along the x axis), vertically (along the

y axis), or both horizontally and vertically, relative to the reference point user specify. By default, InDesign scales

strokes. User can change the default stroke behavior by deselecting Adjust Stroke Weight When Scaling in the Transform or Control panel menu.

Scale an object using the Selection tool:-To scale the content and frame simultaneously, use the Selection tool to select the object and hold down Ctrl. Add the Shift key to resize the object proportionally.

Scale an object using the Scale tool:- 1. Select an object to scale. To scale both the frame and its content, use the Selection tool to select the frame. To

scale the content without scaling its frame, click the Content Grabber to direct-select the object. To scale a frame

without scaling the content, direct-select the frame, and select all the anchor points.

2.Select the Scale tool .

3.Position the Scale tool away from the reference point and drag. To scale the x or y axis only, start dragging the

Scale tool along one axis only. To scale proportionally, hold down Shift as user drag the Scale tool. For finer

control, start dragging farther from the object’s reference point.

Scale an object using the Transform panel:-To maintain the original proportions of the object when using the

Transform panel, make sure the Constrain Proportions icon is selected.

1. Select an object to scale. To scale both the frame and its content, use the Selection tool to select the frame. To

scale the content without scaling its frame, direct-select the object. To scale a frame without scaling the content,

direct-select the frame, and select all the anchor points.

2. In the Transform or Control panel, do one of the following: •Choose a preset percentage value in the Scale X Percentage or Scale Y Percentage pop-up menu.

•Type a percentage value (such as 120%), or a specific distance (such as 10p) in the Scale X Percentage or Scale Y

Percentage box, and then press Enter or Return.

Crop or mask objects or Image Cropping and masking are both terms that describe hiding part of an object. In

general, the difference is that cropping uses a rectangle to trim the edges of an image, and masking uses an arbitrary

shape to make an object’s background transparent. A common example of a mask is a clipping path, which is a mask

made for a specific image. Use graphics frames to crop or mask objects. Because an imported graphic is

Page 132: SYJC Arts IT Chapter 1 to 6.pdf

16

automatically contained within a frame, user can crop or mask it immediately without having to create a frame for it.

1. To crop an imported image or any other graphic already inside a rectangular frame, click the object using the

Selection tool and drag any handle on the bounding box that appears. Press Shift as user drag to preserve the frame’s

original proportions.

2. To crop or mask any object, use the Selection or Direct Selection tool to select one object user want to mask.

Choose Edit Copy, select an empty path or frame smaller than the object, and choose Edit > Paste Into. 3. To crop frame content precisely, select the frame with the Direct Selection tool, and use the Transform or Control

panel to change the size of the frame.

4. To specify crop settings for an empty placeholder frame, choose Object > Fitting > Frame Fitting Options, and

then specify the crop amount.

Fig 5.11 Crop Image

5.7 The Pages Panel:- 5.7.1 Pages Panel:-The Pages panel provides information about and control over pages, spreads, and masters

(pages or spreads that automatically format other pages or spreads). By default, the Pages panel displays thumbnail

representations of each page’s content. 1. If the Pages panel isn’t visible, choose Window > Pages.

2. Choose Panel Options in the Pages panel menu.

3. In the Icons section, specify which icons appear next to the page thumbnails in the Pages panel. These icons

indicate whether transparency or page transitions have been added to a spread, and whether the spread view is

rotated.

4. In the Pages and Masters sections:

•Select an icon size for pages and masters. •Select Show Vertically to display spreads in one vertical column. Deselect this option to allow spreads to be

displayed side-by-side.

•Select Show Thumbnails to display thumbnail representations of the content of each page or master.

5. In the Panel Layout section, select Pages On Top to display the page icon section above the master icon section,

or select Masters On Top to display the master icon section above the page icon section.

6. Choose an option in the Resize menu to control how the sections are displayed when user resize the panel:

•To resize both the Pages and Masters sections of the panel, choose Proportional.

•To maintain the size of the Pages section and resize only the Masters section, choose Pages Fixed.

Page 133: SYJC Arts IT Chapter 1 to 6.pdf

17

•To maintain the size of the Masters section and resize only the Pages section, choose Masters Fixed.

5.7.2 Inserting and Deleting Pages To Add new pages to a document •To add a page after the active page or spread, click the New Page button in the Pages panel or choose Layout >

Pages > Add Page. The new page uses the same master as the existing active page.

•To add multiple pages to the end of the document, choose File > Document Setup. In the Document Setup dialog

box, specify the total number of pages for the document. InDesign adds pages after the last page or spread.

•To add pages and specify the document master, choose Insert Pages from the Pages panel menu or choose Layout >

Pages > Insert Pages. Choose where the pages will be added and select a master to apply.

To Delete a page from the document:- • In the Pages panel, drag one or more page icons or page-range numbers to the Delete icon.

• Select one or more page icons in the Pages panel, and click the Delete icon. • Select one or more page icons in the Pages panel, and then choose Delete Page(s) in the Pages panel menu.

5.7.3 Repositioning Document Pages Move or copy pages between documents 1. To move pages from one document to another, open both documents.

2. Choose Layout > Pages > Move Pages, or choose Move Pages from the Pages panel menu.

3. Specify the page or pages user want to move

5.7.4 Setting Adding and Deleting Master Pages:- Create master Pages By default, any document user created has a master page. User can create additional masters from scratch or from

an existing master page or document page. After user apply master pages to other pages, any changes made to the

source master carry forward to the masters and document pages that are based on it.

Delete a master from a document:-

1.In the Pages panel, select one or more master page icons. 2.Do one of the following:

•Drag a selected master page or spread icon to the Delete icon at the bottom of the panel.

•Click the Delete icon at the bottom of the panel.

•Choose Delete Master Spread [spread name] in the panel menu.

When user delete a master, the [None] master is applied to any document page to which the deleted master was

applied.

5.7.5 Auto page numbering Procedure to Auto page numbering:- Right click on Page Panel Select Numbering & Section Options. (Fig

5.14)

Page 134: SYJC Arts IT Chapter 1 to 6.pdf

18

Fig 5.14 Numbering & Section Options

5.8 Working with tables 5.8.1. Tables:-

5.8.2 Adding and deleting rows and columns:- Insert a row

1. Place the insertion point in a row below or above where user want the new row to appear.

2. Choose Table > Insert > Row. 3.Specify the number of rows user want.

4. Specify whether the new row or rows should appear before or after the current row, and then click OK. The new

cells have the same formatting as the text in the row in which the insertion point was placed.

Insert a column

1Place the insertion point in a column next to where user want the new column to appear.

2Choose Table > Insert > Column.

3Specify the number of columns user want.

4Specify whether the new column or columns should appear before or after the current column, and then click OK.

The new cells have the same formatting as the text in the column in which the insertion point was placed

5.8.3 Resizing Columns and Rows:-

5.8.4 Entering Content:- Add text to a table:-User can add text, anchored objects, XML tags, and other tables to table cells. The height of a

table row expands to accommodate additional lines of text, unless user set a fixed row height. User cannot add

footnotes to tables.

Page 135: SYJC Arts IT Chapter 1 to 6.pdf

19

❖Using the Type tool T, do any of the following

• Position the insertion point in a cell, and type text. Press Enter or Return to create a new paragraph in the same

cell. Press Tab to move forward through cells (pressing Tab in the last cell inserts a new row). Press Shift+Tab to

move backwards through cells. • Copy text, position the insertion point in a cell, and then choose Edit > Paste

• Position the insertion point in a cell where user want to add text, choose File > Place, and then double-click a text

file.

5.9 Exporting to PDF:- About Adobe PDF:-Portable Document Format (PDF) is a universal file format that preserves the fonts, images,

and layout of source documents created on a wide range of applications and platforms. Adobe PDF is the standard

for the secure, reliable distribution and exchange of electronic documents and forms around the world.

Export to PDF:-

Export in PDF format.

1. Choose File > Export.

2. Specify a name and location for the file.

3. For Save As choose Adobe PDF (Print),\and then click Save. When user select the Adobe PDF (Print) option,

user cannot include interactive elements in the PDF.

• To use a predefined set of job options, choose a preset from the Adobe PDF Preset menu

• To create a PDF/X file, either choose a PDF/X preset from the Adobe PDF Preset menu, or choose a predefined

PDF/X format from the Standard menu

• To customize options, select a category from the list on the left and then set the options.

5. For Compatibility, choose the lowest PDF version necessary to open the files user create.

6. Click Export.

Page 136: SYJC Arts IT Chapter 1 to 6.pdf

20

Fig 5.15 Exporting to PDF File

Exercise

Q1. Fill in the blanks:

1. _________ is page layout software that takes print publishing and page design beyond current boundaries.

2. Using __________ option , user can make left and right pages face each other.

3. _________ is used to view or specify geometric information for any selected object.

4. ___________ use as containers for text or other objects..

5. Text in Indesign reside inside containers called as ___________.

Q2. True or False:

1. Adobe InDesign allows cross platform interaction with Illustrator , Photoshop and Acrobat.

2. A text frame can function as border and can be cropped.

3. Each frame contain an In port and an Out port.

4. Auto Page Numbering is not possible in Adobe InDesign.

5. Leading is the process of adding or subtracting space between specific pairs of characters.

Q3. MCQ( Single Correct Answers):

1) Any arrangement of elements such as panels , bars and windows is called as_________.

a) Workspace b) Workgroup c) Worktask d) All

2) ______ is desktop publishing software.

a) Ms-Office b) Browser c) Adobe InDesign d) PDF.

3) ______ option is used from file menu to import the text in InDesign. a) Place b) Export c) Save d)none

4) User can change the text in InDesign either on layout page or in the ________ window.

a)Story Editor b)Leading c)Kerning d)Crop

5. The process of connected text among frames is called as ___________.

a)Tracking b)Leading c)Kerning d)Crop

Q4 . Write Answers of the following questions.

1. Explain the terms cropping and masking.

2. What are the uses of the Selection Tool in InDesign?

3 .Explain any four option from Toolbox in InDesign.

4. What is Composition ? Explain in detail.

Page 137: SYJC Arts IT Chapter 1 to 6.pdf

Std. XIIth Arts – I.T.

Chapter 6: Adobe Acrobat

Introduction

Portable Document Format (PDF) is a format designed by Adobe and is used to represent a document in a

manner independent of the application software, hardware, and operating system used to create it. It is a well

documented and established standard and is a popular and widely used format for document distribution. It is

common to find web pages offer the same document in both formats, HTML for immediate display, and PDF

format for downloading (to print). PDF (Portable Document Format) is an electronic portable document file

format that has captured all the elements of a printed document as an electronic image that you can view,

navigate, print, or forward to someone else. A PDF document will have a .pdf filename extension Their icon

looks like this:

6.1 Concept of PDF

It is a cross platform standard. This means that somebody can create a PDF file in Windows

environment and the same can viewed in Unix environment.

PDF files are device independent: These files can be printed on any inkjet printer or on any image

printer.

PDF files are compact. PDF supports a number of sophisticated compression algorithms.

PDF files can contain multimedia elements like movies or sound as well as hypertext elements like

bookmarks, links to e-mail addresses or web pages and thumbnail views of pages.

PDF supports security. The creator of a PDF file can set various security options. It is possible to lock

a PDF so it can only be opened with a password. It is also possible to prohibit changing the content of

a PDF or disable the option to print a PDF file.

Disadvantages of PDF

Portable Document Format is not that portable as it was named. Roughly every two years Adobe have

released a new version of PDF, each time adding new features or expanding the scope of existing

ones.

PDF tries to be everything to everybody, meaning that it may not be as efficient for a specific task

than a tool optimized for that task. User can use PDF to exchange small graphic elements like ads,

drawings or pictures but more prepare applications can handle the EPS file format.

PDF is geared towards visualizing documents. Using metadata it is possible to preserve the logical

structure of a document.

PDF files are not meant to be edited. Small changes can be made to a PDF file but it is fairly difficult

to add complete blocks of text or images to an existing PDF file. There are specialized tools in the

market.

6.1.1 Applications of PDF:

1) Platform independent: PDF document can be viewed on any computer platform and can print on

most printers regardless of the operating system, such as MS Windows, UNIX and other platforms.

2) Extensible: PDF based solutions includes creation, plug in, consulting, training and support tools.

3) Maintain information integrity: Adobe PDF files look exactly like original document and preserve

source file information i.e text, drawings, photos etc. regardless of the application used to create it.

4) Open File Format: PDF is an open file format for representing 2-D documents in a device

independent and resolution independent fixed layout document format.

Page 138: SYJC Arts IT Chapter 1 to 6.pdf

5) Application free of cost: PDF applications are free of cost. Anyone may encode information that is

specific to the application software, hardware or operating system used to create or view the

document.

6) Useful for Artistic Work: PDF files are useful for documents such as magazine articles, product

brochures etc.

6.1.2 Features of PDF:

1) Adding links: In a PDF document, it is not necessary to view pages in sequence. User can jump

immediately from one section of a document to another using links. Links are also used to add

interactivity.

2) Easy to add bookmarks: A Bookmark is a link represented by text in the bookmarks palette. In PDF,

bookmarks are used to create a brief custom outline of a document or to open other documents.

3) Ability to embed images: In PDF, it is possible to capture the image to change the bitmap text to

regular PDF text that can be edited and searched in Acrobat.

4) Ability to embed font: In PDF, it is possible to embed different fonts as per need.

5) Ability to edit text: PDF text tool lets user to edit text, one line at a time and change text attributes

such as spacing, point size and color.

Screen Shot of Adobe Acrobat:

Page 139: SYJC Arts IT Chapter 1 to 6.pdf

Use the Acrobat Menu Commands

Acrobat has five command groups, described as follows in order from left to right on the menu bar.

• File The commands in the File group are used to create PDF files; create PDF Portfolios; and to open, close,

and save documents. Additional commands are used to attach the current PDF to an e-mail, share files online,

view document information, and launch the new Action Wizard.

• Edit The commands in the Edit group are used to edit the current PDF document. There are also commands

to search for items in the current document, search for words or phrases in PDF documents stored in folders

on computer, find words or phrases in a document, check spelling in comments and editable text, and set

Acrobat preferences (Windows).

• View The commands in the View group are used to change view of the document. User use menu

commands in this group to navigate to a specific page in the document, zoom in or out, change the manner in

which the page is displayed, rotate the view, and so on. User also find commands in this group to access

Navigation panels and the toolbars.

• Window The commands in the Window group are used to select documents user currently have opened,

split the view into two panes or spreadsheet view, as well as arrange the view of multiple documents. User

can also view a document in full-screen mode by accessing a command from this menu. Another command

enables user to open the active document in a new window.

• Help In the Help command group, user can find access to complete program help, links to online help and

program updates, as well as a feature user can use to repair the Acrobat installation. User can use Acrobat to

read e-books, manage digital editions from the Help command group.

6.1.3 Embedding Images in a PDF:

A PDF file is a faithful reproduction of a document. Obviously it can also contain images. The PDF file

format has been designed to cope with a wide range of image types and color spaces. Images in PDF files can

be:

Black-and-white images (line-art) – Older versions of Acrobat (<4.0) occasionally had problems

when such images were colorized in a front-end application like QuarkXPress. Nowadays this should

no longer be a problem.

Grayscale images – These can be 2, 4, 8 or 16 bit. Usually images are 8 bit, which means that there

are 256 shades of grey going from white to black.

Multitones – Duotones, tritones, Hexachrome files,… were not possible in PDF 1.2 files (created

using Acrobat 3) but PDF 1.3 provided a new color space called DeviceN which is specifically meant

for such images.

Color images – These can be 1, 2, 4, 8 or 16 bit. Usually each color plane is 8-bit (256 colors) which

means that an RGB image can contain 16 million colors. Instead of gradual tints, an image can also

contain a fixed list of a limited number of colors. This is called „indexed color‟. The following color

spaces are supported:

o RGB

o LAB/ICC based

o CMYK

Sometimes the creation of a PostScript file and the subsequent conversion to a PDF changes the content of

images. Fairly common things that can go wrong are CMYK images that end up as RGB images in the PDF

document or documents in color that get converted to black-and-white PDF files. In most cases, images are

compressed to limit the file size of the resulting PDF.

Page 140: SYJC Arts IT Chapter 1 to 6.pdf

Images embedded as Form XObjects

Sometimes images are embedded as an object called a Form XObject within a PDF. Internally to PDF, Form

XObjects are the logical equivalent of EPS files. Some PDF tools are not capable of handling Form

XObjects.

6.1.4 PDF font basics:

The PDF file format supports the use of the following font formats:

TrueType

Type 1

Type 3 Composite fonts (Type 0): both Type 1 (CIDFontType0) and TrueType (CIDFontType2) are

supported.

OpenType: From PDF 1.6 onwards, OpenType fonts can be stored directly in PDF files. In prior

releases OpenType fonts are embedded as either Type 1 or TrueType fonts. The ability to embed

OpenType directly was added for the forms capabilities of PDF.

There are two mechanisms to include fonts in a PDF:

Embedding – A full copy of the entire character set of a font is stored in the PDF.

Subsetting – Only those characters that are actually used in the lay-out are stored in the PDF. If the

“$” character doesn‟t appear anywhere in the text, that character is not included in the font. This

means that PDF files with subsetted fonts are smaller than PDF files with embedded fonts. For

subsetted fonts, the font name is preceded by 6 random characters and a plus sign.

If certain fonts are missing from the PDF file, Adobe Acrobat and Adobe Reader will automatically try to

emulate the missing font by using one of the Multiple Master fonts that are built into these programs. The

Multiple Master fonts that are used for this are:

Adobe Serif MM

Adobe Sans MM

6.2 Adobe PDF Writer Printer

An Adobe Acrobat file (more commonly referred to as a PDF file) is the required format for all

documents

submitted for publication collections. Using Adobe Acrobat Writer will also make doing your

publication collection easier and make your documents more readable, hence saving you a lot of time.

Adobe Acrobat Writer allows to:

• create a PDF directly from a website

• combine multiple files to create a single PDF

• save time by not having to print pages and pages from the internet and then re-scan them and also

not needing to copy and paste from the internet into another document

User can create a single PDF from multiple PDFs through the scanner program.

Adobe Acrobat Writer on a Personal Computer The working page for Adobe writer (as it would appear on a standard PC) is shown below. If user have Adobe writer installed, all PDFs you open will have this toolbar. Creating a PDF from a File User can create a PDF from another file which you already have, such as a Microsoft Word

Page 141: SYJC Arts IT Chapter 1 to 6.pdf

document. To

do this, you will be using the From File option under the Create PDF button on the toolbar.

Click on Create PDF and scroll down to and click on the From File… option. This opens a browser window

which allows user to select the file user want to create a PDF document of. Click on document/s, and then

click Open.

Document will open in the Adobe page. To create the PDF, simply save the open file.

Page 142: SYJC Arts IT Chapter 1 to 6.pdf

Creating a PDF from a web page

Using an Adobe Acrobat window, click on Create PDF and scroll down to the From Web Page… option. This will bring up a window requesting a URL address. Copy the website URL from internet browser window and paste it into the field. Then click Create.

User will need to wait a few seconds until the full website‟s contents have been downloaded and converted

to a PDF file.

Once it is downloaded, name and save a copy of PDF file.

Page 143: SYJC Arts IT Chapter 1 to 6.pdf

Creating a PDF from Multiple files

User can create a single PDF from multiple PDFs by either going through the Create PDF function on the

toolbar or by directly clicking on the Combine files button on the toolbar.

In the first case, user would click on Create PDF, and then choose From Multiple files… A Combine Files window will open to allow you to select your multiple files. The second option is to click directly on Combine Files on the toolbar, which will take you directly to this same window. User can add any open PDF files by clicking on Add Open Files. Add each of the files user want by clicking on the Add Files… button at the top left of the page. This will open another window which will allow user to find and select each chosen file. Once user have chosen your files, they will appear in the Combine Files window.

Page 144: SYJC Arts IT Chapter 1 to 6.pdf

Once user have selected and added all the files you wanted, you can use the Move Up and Move Down

buttons (found nearer the bottom of the Combine Files window) to re-order the files into your desired

order. There is an alternative to manually navigating to the files user wish to combine. If the files user

wish to combine are already open in Adobe Acrobat Writer, user can use the Add Open Files...

function. Whilst in the Combine Files window, click the Add Open Files... button at the top right of the

page. This will open another window showing all currently open PDFs. Highlight all the files user want to

add, then click Add Files.

Page 145: SYJC Arts IT Chapter 1 to 6.pdf

Once user have a list of all the files you wanted to combine, and have rearranged them to be in the correct

order, click Next at the bottom of the page.

Page 146: SYJC Arts IT Chapter 1 to 6.pdf

User will now be given two options for how the files are to be combined. Most often, user will use the default first option, Merge files into a single PDF. Click the Create button at the bottom of the window to

combine all your files together.

Page 147: SYJC Arts IT Chapter 1 to 6.pdf

User can choose a name for your new file and click Save, user will have finished creating combined PDF file.

Page 148: SYJC Arts IT Chapter 1 to 6.pdf

6.2.1 PDF Conversion Settings

When user want to convert a Word document to a PDF file, Acrobat PDFMaker uses the currently selected

conversion settings, it also allows user to modify document security, specify how Microsoft Office features are

converted to PDF, specify how Acrobat PDFMaker creates bookmarks, and specify display options.

Open Acrobat PDFMaker dialog box that modifies conversion settings, the Settings tab is active.

1. Click the Conversion Settings drop-

down arrow and choose one of the

preset options: High Quality Print,

Oversized Pages, PDF/A-1b 2005

(CMYK), PDF/A-1b 2005 (RGB),

PDF/X-1a 2001, PDF/X-3-2002, Press

Quality, Smallest File Size, Standard,

or any custom conversion setting you

have created. To apply the new settings,

click OK. To modify additional

conversion settings, click the

appropriate tab and modify the

parameters to suit the intended

destination of your document.

2. In the PDFMaker Settings area, user can choose the following options, the first three of which are

selected by default:

• View Adobe PDF Result Opens the document in Acrobat after the conversion process is

completed.

• Prompt For Adobe PDF File Name Prompts for a filename before the document is converted

to a PDF file. If user deselect this option, the resulting PDF file adopts the filename of the

Microsoft Office document user is converting.

• Convert Document Information Converts certain information (document title, author,

keywords, and subject) from the Microsoft Office Properties dialog box into the PDF file‟s

Document Properties, which can be displayed by opening the file‟s Document Properties dialog

box.

• Create PDF/A-1a: 2005 Compliant File Creates a document that is compliant with PDF/A-1a:

2005 standards.

3. In the Application Settings area, you can choose the following options, the last three of which are

selected by default:

• Attach Source File Attaches the source file to the converted PDF document. Viewers can open

the source file by opening the Attachments panel and double-clicking the file title.

• Create Bookmarks Uses headings or styles from the Microsoft Office document to create

bookmarks in the PDF document. User can specify which styles are converted to bookmarks on

the Bookmarks tab of the Acrobat PDFMaker dialog box.

• Add Links Preserves any links present in the Microsoft Office file. The links in the converted

PDF file maintain a similar appearance to those found in the original file.

Page 149: SYJC Arts IT Chapter 1 to 6.pdf

• Enable Accessibility And Reflow With Tagged Adobe PDF Creates tags (objects that

reference document structure objects, such as images and text objects) in the PDF document

based on the structure of the source Microsoft Office file. This structure can be used to reflow a

document when viewed on different devices.

4. Click OK to apply the settings. Alternatively, you can click a different tab to modify additional

settings.

User can create custom conversion settings by clicking Advanced Settings. When user click this button, the

Acrobat PDFMaker dialog box opens the Adobe PDF Settings dialog box for the currently selected job option.

6.2.2 Create PDF Files Using an Application’s Print Command

When Acrobat software is installed on system, Adobe PDF is automatically added as a system printer. You can

use Adobe PDF to print from the authoring application file to disk in PDF format in the same manner as you use

a printer to print a hard copy of a file.

User can create a PDF file using following steps:

1. Choose the application‟s Print command.

2. Choose Adobe PDF from the application‟s Printer menu. The actual Print dialog box varies, depending

on operating system (OS) and the software from which user is printing the file.

3. Click Properties to reveal the Adobe PDF Document Properties dialog box, which has three sections,

separated by tabs. Click the Layout tab, as shown next.

4. In the Orientation area, choose Portrait, Landscape, or Rotated Landscape.

5. Click the Pages Per Sheet drop-down arrow and choose an option from the drop-down menu. The

default option of 1 displays one document page on one PDF page. If user choose one of the other options,

multiple pages of the original document are displayed on a single PDF page. After select ing number of

pages per sheet, the Preview window updates to give an idea of how the finished document will look.

6. Click the Paper/Quality tab, shown on the top of the next page, and then click the Paper Source drop-

down arrow and choose an option from the drop-down menu.

7. Click the corresponding icon to print the document in color or black and white.

8. Click Advanced to open the Adobe PDF Converter Advanced Options dialog box.

In the Paper/Output section the options are:

• Paper Size Click the drop-down arrow and choose one of the presets from the drop-down menu.

• Copy Count Click Copy Count and enter a value for the number of copies to print. When user

choose this option, the Collate option is available. This option is enabled by default and causes

Acrobat to collate the pages for each copy printed.

Page 150: SYJC Arts IT Chapter 1 to 6.pdf

9. Click the plus sign (+) to the left of the Graphic title to set the following parameters:

• Print Quality Click Print Quality, click the drop-down arrow, and then choose an option from the

drop-down menu. The default resolution, 1200 dpi (dots per inch), works well in most instances. If the

document to be converted to PDF contains images choose resolution that closely matches the intended

output device.

• Image Color Management Click the plus sign to the left of the Image Color Management title to set

the parameters:

• ICM Method Click ICM Method, click the drop-down arrow that appears, and then choose one

of the following options: ICM Disabled, to disable color management; ICM Handled By Host

System, to handle color management through the color management profile used by computer;

ICM Handled By Printer, to handle color management through the output device; or ICM

Handled By Printer Using Printer Calibration. Refer printer operation manual to choose the right

setting,

• ICM Intent Click ICM Intent, click the drop-down arrow that appears, and then choose one of

the following options: Graphics, if the document predominantly contains images with large areas

of solid color; Pictures, if the document is largely made up of full-color photographs; Proof, to

create a black-and-white proof for a customer; or Match, to match the document colors.

• Scaling Click Scaling and then enter a value to which you want the document scaled when distilled to

PDF format. This value is a percentage of the document size as created in the authoring application.

• TrueType Font Click Substitute With Device Font (the default), or click the drop-down arrow that

appears, and choose Download As Softfont. This determines how Acrobat Distiller handles TrueType

fonts used in the original document.

10. Click the plus sign to the left of Document Options and then click the plus sign to the left of PostScript

Options to set the following parameters:

• PostScript Output Option Click the PostScript Output Option, click the drop-down arrow that

appears, and then choose any one of the following :

• Optimize For Speed Choose this option to speed the distilling process. This option is not

useful in networking environment as print spooling is not supported in network.

• Optimize For Portability Choose this option to have the distilled file conform to Adobe

Document Structuring Conventions (ADSC). When user choose this option, each PostScript page

Page 151: SYJC Arts IT Chapter 1 to 6.pdf

is independent of the other pages in the document. Choose this option if user printing the file on a

network spooler. When user choose network spooler, printing happens in the background, which

frees up workstation for other tasks. When user choose this option, the network spooler prints the

PDF document one page at a time.

• Encapsulated PostScript (EPS) Choose this option to create EPS files composed of single

pages in the authoring application user intend to use in documents of other applications.

• Archive Format Choose this option to improve file portability. When user choose this option,

printer settings that may prevent the distilled PDF file from printing on other output devices are

suppressed.

• TrueType Font Download Option Click TrueType Font Download Option, click the drop-down arrow

that appears are:

• Automatic Choose this option to automatically embed any TrueType fonts from the source

document to the resulting PDF file.

• Outline Choose this option to embed any TrueType font in the source file as outlines in the

resulting PDF file.

• Bitmap Choose this option to convert TrueType fonts in the source file to bitmap images in the

resulting PDF document. The resulting PDF document cannot be searched.

• Native TrueType Choose this option, and TrueType fonts will not be embedded with the

document. The resulting PDF file will download font information from the source computer from

which the document is viewed.

• PostScript Language Level Click this option and then use the spinner buttons to select 1, 2, or 3.

Alternatively, you can enter the desired value.

• Send PostScript Error Handler Click this option and then choose Yes or No from the drop-down

menu.

• Mirrored Output Click this option and then, from the drop-down menu, choose No to print the PDF

document the same as the source file, or click Yes to print the PDF document as a mirror image of the

source document.

11. Click OK to close the Adobe PDF Converter Advanced Options dialog box.

12. Click the Adobe PDF Settings tab to set the parameters shown on the top of the next page.

13. Click the Default Settings drop-down arrow and then choose one of the presets from the drop-down menu.

14. Click the Adobe PDF Security drop-down arrow and choose one of the following options:

• None No security is applied to distilled documents.

• Reconfirm Security For Each Job You will be prompted for security settings each time you use the

Adobe PDF printer.

Page 152: SYJC Arts IT Chapter 1 to 6.pdf

Use Last Known Security Settings On future printing jobs, Acrobat will use the last security

settings you specified.

15. After choosing one of the preceding options, the Edit button to the right of the field becomes available. Click

the Edit button to edit security settings.

16. Leave the Adobe PDF Output Folder field at its default setting, Prompt For Adobe PDF Filename, which

prompts for a document name and a folder in which to save the document, or choose My Documents\*PDF to

save the file in My Documents folder.

17. Click the Adobe PDF Page Size drop-down arrow and choose the desired size for the resulting PDF

document.

18. At the bottom of the Adobe PDF Settings tab, check one or more of the following options.

• View Adobe PDF Results This default option opens the resulting PDF document in Acrobat. Deselect

this option to print the document without previewing the end result.

• Add Document Information This default option adds information from the source document to the

PDF file as Document Information.

• Rely On System Fonts Only; Do Not Use Document Fonts No fonts will be embedded in the PDF; if

the document contains an embedded font, it will be unavailable in the PDF. Instead, the MM (Multiple

Master) fonts will be used to reproduce the font if it is not available on the user‟s system; otherwise, the

font will be missing from the PDF.

• Delete Log Files For Successful Jobs Acrobat Distiller creates a log file whenever Adobe PDF is used

to create a PDF file. By default, the file is deleted when the distilling job is successful. If you deselect

this option, Acrobat creates a log file that can be viewed with a text editor.

• Ask To Replace Existing PDF File Select this option if user want Acrobat to prompt before

overwriting a PDF file with the same filename as the one selected for the current printing job.

19. Click OK to apply the settings and then close the Adobe PDF Document Properties dialog box.

20. Click OK in the Application Print dialog box to print the document in PDF format.

Page 153: SYJC Arts IT Chapter 1 to 6.pdf

6.2.3 Create PDF Files from Microsoft Office Software

When user install Acrobat, the

install utility searches your

machine for Microsoft Office

applications. When a supported

Microsoft Office application is

found, Acrobat installs Acrobat

PDFMaker as a helper utility. With

Acrobat PDFMaker, user can

create a PDF file that looks

identical to the Microsoft Office

file by clicking a Convert To

Adobe PDF icon, which is added

to your Microsoft Office 2003

application.

If you own a Windows Microsoft Office 2007 or 2010 application, Acrobat creates an

Acrobat ribbon with icons to convert files to PDF, attach files to e-mail messages, and

so on. There are several default conversion settings for Acrobat PDFMaker. User can

use Acrobat PDFMaker to create PDF files from within the following Microsoft

Office applications:

Word 2003, 2007, and 2010 Use Acrobat PDFMaker to convert documents you

create with Word to PDF files. The resulting PDF file retains font information and

embedded graphics, as well as header and footer attributes.

• Excel 2003, 2007, and 2010 Use Acrobat PDFMaker to convert an Excel spreadsheet

to PDF format. The converted PDF file retains column formatting, as well as column

and row headers and embedded graphics

• PowerPoint 2003, 2007, and 2010 Convert PowerPoint presentations to PDF files and

provide additional functionality to the presentation with many features of Acrobat

PDFMaker.

• Outlook Convert Microsoft Outlook e-mail messages to PDF files. This is a wonderful

way of archiving selected e-mail messages or a folder of e-mail messages. File

attachments are also archived with the PDF document.

The Acrobat PDFMaker plug-in is, for all intents and purposes, identical in all supported Microsoft Office

applications, with the exception of the options available in each application when modifying conversion settings.

6.3 Create Bookmarks from the Document Structure

User can create bookmarks from the document structure only if enabled the Enable Accessibility And Reflow

With Tagged PDF option when choosing conversion settings in the authoring application from which user has

created the PDF. To create bookmarks from the document structure, follow the steps:

1. Open the document in bookmarks are to be created.

2. In the Navigation pane, click the Bookmarks icon to open the Bookmarks panel.

3. Click the Options dropdown arrow and choose New Bookmarks From Structure to open the Structure

Elements dialog box.

4. Click a structure element name to select it. To add additional structure elements, hold down shift and

click to add contiguous elements, or hold down Ctrl (Windows) and then click to add noncontiguous

elements. To select all structure elements, click the Select All button.

Page 154: SYJC Arts IT Chapter 1 to 6.pdf

5. Click OK. Acrobat scans the document and creates a bookmark for each selected structure element

located. The bookmarks are untitled and nested in tree fashion. Click the plus sign (+) to the left of the

top element to expand the first bookmark.

Change Bookmark Settings

The settings you modify on the Bookmarks

tab determine which Word text styles Acrobat

PDFMaker converts to bookmarks. To change

bookmark settings for the document

conversion, do the following:

1. Open the Acrobat PDFMaker dialog

box.

2. Click the Bookmarks tab and

modify the settings.

• Convert Word Headings To

Bookmarks (default option) Acrobat

PDFMaker converts all Word headings

in the document to PDF bookmarks.

By default, Heading 1 through

Heading 9 styles are converted to

bookmarks. To modify headings to be

converted to bookmarks, click a

heading name in the Bookmark

column to select or deselect it.

• Convert Word Styles To Bookmarks By default, no Word styles are converted to

bookmarks. Choose this option, all Word styles used in the document are converted to

bookmarks when Acrobat PDFMaker converts the document.

• Convert Word Bookmarks Converts any user-created Word bookmarks to PDF

bookmarks.

3. Click OK to apply the new settings, or click another tab to make additional modifications

to the document conversion settings.

Use the Bookmarks Options Menu

Use the Bookmarks Options menu to perform functions associated with bookmarks. User can use commands

from this menu to modify bookmarks, navigate to bookmarks, and maintain the Bookmarks panel. To do so,

follow these steps:

Page 155: SYJC Arts IT Chapter 1 to 6.pdf

1. To open the Bookmarks Options menu, click Bookmarks in the Navigation pane to open the Bookmarks panel

and then click the Options icon.

2. After you open the Bookmarks Options menu, click the menu command you want Acrobat to perform. Some

of the commands in this menu were already presented; others will do the same job as their toolbar counterparts.

6.3.3 Change/Edit a Bookmark Destination

User can change the destination of a bookmark, change its zoom, or change both. By modifying the view of a

bookmark, user call attention to a specific part of the document. To modify a bookmark destination, follow these

steps:

1. In the Bookmarks panel, select the bookmark whose destination user want to modify.

2. In the Document pane, change to the location user want the bookmark to link to by using the Hand tool,

navigation tools, or menu commands. Alternatively, you can click a thumbnail in the Pages panel to navigate to a

page.

3. Change the zoom of the document by using the viewing tools or menu commands.

4. Choose Set Bookmark Destination from the Bookmarks Options menu. Alternatively, user can right-click and

choose Set Destination from the context menu. When user selects this option, a dialog box appears asking the

user whether user really want to change the bookmark location.

5. Click Yes to change the bookmark destination and close the dialog box.

6.3.4 Rename a Bookmark

To rename / change a bookmark follow the steps

1. Select the bookmark and then click inside the text box to select the bookmark text.

2. Enter a new name for the bookmark and then press enter or return.

Delete a Bookmark

User can delete any bookmark. When user delete a bookmark, only a link has been removed without any change

in the content of the document. There is no warning before the bookmark is deleted.

1. Select the bookmark. To add contiguous bookmarks to the selection, press shift and click the

bookmark(s) user want to add to the selection. To add noncontiguous bookmarks to the selection, press

ctrl (Windows) and then click the bookmark(s) user want to add to the selection.

2. Choose Edit | Delete, press delete, or click the Delete Selected Bookmarks icon (looks like a trash

can). Alternatively, user can choose Delete Selected Bookmarks from the Options menu. T

Arrange Bookmarks

When user create a PDF document, bookmarks are created in descending order from the first page of the

document to the last. Acrobat nests bookmarks when user convert a document with multiple heading levels or if

user use the New Bookmarks From Structure command. User can create own bookmark nests to organize a

cluttered Bookmarks panel.

1. Select the bookmark(s) user want to nest. User can select contiguous (shift + click) or noncontiguous

(ctrl + click) for Windows bookmarks.

2. Click and drag the bookmarks toward the bookmark under which user want to nest them. As user drag

the bookmarks toward another bookmark, a right-pointing arrowhead with a dashed line appears.

3. Drag right so that the right-pointing arrow appears underneath the bookmark with which user want to

nest the selected bookmark.

4. Release the mouse button when user reach the desired bookmark location. As soon as the mouse

button is released, Acrobat nests the bookmark(s) in the new location. If the bookmark to which user is

nesting is collapsed, Acrobat expands it. Collapse the bookmark by clicking the minus sign (–) to its left

(Windows).

User can remove a bookmark from a nested position by doing the following:

1. Expand the bookmark that contains the bookmark user want to remove from a nested position.

Page 156: SYJC Arts IT Chapter 1 to 6.pdf

2. Select the bookmark user want to move.

3. Drag the bookmark under the minus sign up and to the left of the parent bookmark. Nested bookmarks

are noted by a left-pointing triangle.

When user select and drag a branch that has children, the children of the parent are moved as well,

maintaining the structure of the branch.

4. Release the mouse button. Acrobat moves the bookmark out of a nested position.

6.3.1 Adobe Tools:

Use Acrobat Toolbars

Many of the tools in Acrobat are conveniently grouped and laid out as a task button and tool groups on a toolbar.

User can access the rest of the Acrobat tools by

choosing View | Show/Hide Toolbar Items and then selecting the desired tool from the submenu. In the default

display of toolbars, user can find a Create task button that is used to create PDF documents. Other toolbars

includes related tools to edit, view, and navigate documents, and to perform many other operations. In addition,

the Quick Tools toolbar has what the Acrobat designers deem as tools that are frequently used by most Acrobat

users. User can customize the Quick Tools toolbar to add to favorite tools, or remove tools which user don‟t use

frequently. Many of the toolbars have drop-down menus containing other options.

The Create Task Button

The Create task button, accesses commands used to create a PDF document. After clicking this button, a drop-

down menu appears with all the commands to create PDF documents from files stored on computer, from web

pages, from documents to scan into the Document pane, and from images copied to the system clipboard.

These commands are as follows:

• PDF From File Click the PDF From File button to navigate to a file on computer and convert it to a

PDF document.

• PDF From Scanner Click the PDF From Scanner button to create a PDF document from a scanner or a

digital camera attached to your computer.

• Create PDF From Web Page Click the PDF From Web Page button, and a dialog box appears in

which user enters URL of the web page to be converted to a PDF document. After converting the web

page, user can modify it by clicking Tools, clicking Document Processing, choosing Web Capture, and

then choosing the desired command from the submenu.

• PDF From Clipboard Click the PDF From Clipboard button to create a PDF document after using the

Snapshot tool to select an area from an open PDF document and copy it as an image to the clipboard.

• Combine Files Into A Single PDF Click this button to open the Combine Files dialog box, which

enables user to create a PDF from supported files or existing PDF documents. User can also specify

which pages of each document are combined into the resulting PDF.

• PDF Form Click this button to open the Create Or Edit Form dialog box, enabling to use the current

document as the basis for a PDF form, browse for a file to make into a PDF form, or scan a paper form.

• PDF Portfolio Click this button to open the Create PDF Portfolio dialog box, which enables user to

create a sophisticated portfolio of documents in PDF format.

The File Toolbar

The File toolbar, shown here, consists of four tools - open, print, save, and e-mail PDF documents.

• Open Click this button to navigate to and open an existing PDF file stored on computer or network.

Page 157: SYJC Arts IT Chapter 1 to 6.pdf

• Save This tool is used to save the current PDF document. This command is dimmed out (unavailable) if

user open an existing PDF document. When user open an existing document and apply changes, the Save

button becomes available.

• Print This tool is used to print a document with a system printer.

• Email Click this button to send a PDF document as an e-mail attachment using default e-mail

application.

The Page Navigation Toolbar

The Page Navigation toolbar is composed of the tools to navigate from one page to the next. The toolbar has

forward and back buttons, which you use to go to the next or previous page, respectively. User can also navigate

to a page by entering its number in the text box.

The Select & Zoom Toolbar

The tools in this toolbar (shown here) are used to select objects, manually navigate to different parts of a

document, and activate links in the document.

• Select This tool enables user to select text, tables, or images in a PDF document. User can then copy

selected objects to the clipboard for use in other applications.

• Hand This rightly named tool is used to manually navigate through the pages of a PDF document. First,

click the tool to select it; then, when user click inside the Document pane to navigate with this tool,

cursor becomes a closed fist. To navigate from the top to the bottom of a page, and vice versa, select the

Hand tool, move the tool over the document, and then click and drag. Release the left mouse button to

stop scrolling the page. The Hand tool is also used to find and activate links within the document. When

user pass the cursor over a document link or a bookmark in the Bookmark tab, the cursor becomes a

pointing finger. Click the link or bookmark to navigate to the specified destination within the document.

• Zoom Out Click this tool to zoom out to the next lowest level of magnification.

• Zoom In Click this tool to zoom in to the next highest level of magnification.

• Magnification Window Acrobat displays the current percentage level of magnification in this window.

User can click the triangle to the right of the window and select a magnification percentage from the

drop-down menu, or user can enter the desired level of magnification directly into the window and then

press enter or return to apply. User can also specify a magnification level by choosing View | Zoom |

Zoom To and then entering a value between 1 percent and 6400 percent in the Zoom To dialog box (the

available range of magnification in Acrobat). Note that the lowest magnification level available from the

Magnification drop-down list is 10 percent, but you can enter a value of 1 if desired.

The Page Display Toolbar

The Page Display toolbar has two buttons by default. User use these buttons to control your view of the page.

• Continuous This page display option adjusts the width of the page to fit within the width of the

Document pane. User can use the Hand tool to navigate within the page and scroll to different pages.

• Single Page This option displays a single page. User can use the Hand tool to pan within the page and

use the navigation tools to navigate to different pages.

6.3.2 Use the Panes:

Acrobat has lots of tools and menu commands. Previous versions of Acrobat displayed most

of the tools on the menu command bar. In Acrobat X Pro, user can perform tasks by

choosing menu commands that are conveniently located in panes on the right side of the

interface to work : Tools, Comment, and Share.

Use the Tools Pane

In the Tools pane, you find commands to edit pages, edit content, create forms, use the

Action Wizard, recognize text from scanned documents, and protect the document. To access

the Tools pane, click the Tools icon. The illustration at left shows the default sections in the

Page 158: SYJC Arts IT Chapter 1 to 6.pdf

Tools pane. Click a section title to reveal a group of related commands. The Tools pane is

divided into the following sections.

Pages

The Pages section, shown,

has commands that enable

user to edit pages, insert

pages, and edit page

design. The commands to

rotate pages, delete pages,

extract pages, replace

pages, crop pages, insert a

header or footer, insert a

background, insert a

watermark, and implement

Bates Numbering are also

available.

Content

The Content section, shown, has commands

that enable user to add bookmarks, attach

files, edit text and objects, add or edit

interactive content, add links, add buttons,

and select objects.

Forms

The Forms section, shown, has commands

that you use to create forms. After creating a

form, you can add and edit form fields as

well as distribute and track forms.

Page 159: SYJC Arts IT Chapter 1 to 6.pdf

Action Wizard

The Action Wizard section, shown, has

commands to create and edit actions. User

can find the default actions in this section of

the Tools pane.

Recognize Text

The Recognize Text section, shown, is used

after you create a PDF by scanning a

document. User can recognize text in a single

document or multiple documents. User can

also scan for suspects.

Protection

The Protection section contains commands

that you use to protect documents. You can

encrypt pages, remove sensitive information

from documents, remove hidden information,

and sanitize documents.

Page 160: SYJC Arts IT Chapter 1 to 6.pdf

Sign & Certify

In the Sign & Certify section, you can add

digital signatures to a document and certify a

document.

6.3.3 Use the Comments Pane

Acrobat has some powerful commands you use to review documents and collaborate with other members of

your team. This pane has commands to add annotations to a document, mark up a document, and much more.

The Comments pane contains the following sections.

Annotations

In the Annotations section, user can add

sticky notes, add attachments, add sound

annotations, add your stamp of approval to a

document, highlight text, and much more.

Drawing Markups

In the Drawing Markups section, user can

annotate a document with shapes, text, lines,

pencil marks, and much more. There is also

an eraser that you use to edit pencil marks.

Review

In the Review section, user can send a

document for a shared review, send a

document for e-mail review, collaborate live,

and track reviews.

Page 161: SYJC Arts IT Chapter 1 to 6.pdf

Comments List

In the Comments List section (not shown),

you find a list of all comments in a

document. You can also search comments.

6.3.4 Create a User Profile

User can create a profile to for identification and a password that links to digital signature. To create user profile

follow the steps:

1. Click Tools, click Protection, and then choose More Protection | Security Settings to open the Security

Settings dialog box.

2. Click Digital IDs to display the options for Digital IDs.

3. Click the Add ID button to open the Add Digital ID Wizard. On the first page (shown next), choose

My Existing Digital ID From and then select one of these options: A File, A Roaming Digital ID Stored

On A Server, or A Device Connected To This Computer. Alternatively, to create a new digital ID, choose

A New Digital ID I Want To Create Now.

4. Click Next. The steps for New Digital ID.

If you already have an existing digital ID, such as a Windows certificate, on your

computer, click the A File radio button and then click Next. The next wizard page

prompts you to locate the ID file and enter your password. After following these steps,

you can use the digital ID from within Acrobat to certify documents and apply security

settings. The second Add Digital ID Wizard page, shown on the next page, enabling the

following options

• New PKCS#12 Digital ID File Creates a digital ID file using the PKCS#12 standard.

Digital IDs created with this standard have a .pfx or .p12 file extension, and can be used

with most applications that require secure digital IDs, including certain browsers.

• Windows Certificate Store Creates a digital ID file that can be used with most

applications supported by Windows.

Page 162: SYJC Arts IT Chapter 1 to 6.pdf

5. Click Next to open the next page of the Add Digital ID Wizard, shown here.

6. Enter name in the Name field. If desired, supply additional contact information in the Organizational

Unit and Organizational Name fields.

7. Enter e-mail address in the Email Address field.

8. Click the Country/Region drop-down arrow and choose an option from the

dropdown menu.

9. Click the Enable Unicode Support check box if you want to include Unicode information with the

certificate. The Unicode standard provides a unique number for every character. Each number is cross-

platform. The Unicode standard for most English documents is UTF-8. If you choose this option,

Unicode fields appear to the right of your contact information. Enter the appropriate Unicode information

in the desired fields.

10. Click the Key Algorithm drop-down arrow and choose 1024-bit RSA or 2048-bit RSA. The latter

choice offers better security, but it may not be available to all users.

11. Click the Use Digital ID For drop-down arrow and choose an option from the drop-down menu. The

default option, Digital Signatures and Data Encryption, enabling to use the digital ID for signing

documents and encrypting. Alternatively, you can choose Digital Signatures Or Data Encryption to limit

your use of the digital ID.

12. Click Next to open the password page of the Add Digital ID Wizard.

13. Accept the default location and filename for digital ID, or enter a different path and filename.

14. Enter and confirm your password. Password must be at least six characters and cannot contain any of

the following symbols:

! @ # $ % ^ & * , | \ < > _ or "

When user enter characters for password, the rating changes from Weak to Medium, to Strong, to Best.

Create a password with a rating of Strong or Best. These are the types of passwords that are hard to hack.

15. Click Finish to complete the process and exit the wizard. Your new digital signature appears in the

Digital IDs section of the Security Settings dialog box.

16. Close the Security Settings dialog box.

Page 163: SYJC Arts IT Chapter 1 to 6.pdf

6.3.5 Digital Signature

A digital signature, like a conventional handwritten signature, identifies the person signing a document. Unlike a

handwritten signature, however, a digital signature is difficult to forge because it contains encrypted information

that is unique to the signer and easily verified. To sign a document, user must obtain a digital ID from a third-

party provider or create a self-signed digital ID. The digital ID contains a private key that is used to add the

digital signature and a certificate that you share with those who need to validate your signature.

6.3.6 Signing Certified Documents

User should sign the document that user has just certified, to verify that filling in a signature field doesn't

invalidate the certification.

1. With the Hand tool selected, click in the Approved Signature box at the bottom of the document. Click

Continue to clear the message box. Then click the Sign Document button on the document message bar.

2. In the dialog box, if user have more than one digital IDs defined, select your digital ID.

3. Enter your password.

4. Leave the other values, click Sign, and save the file in the folder using the same filename.

5. Click the Signatures button in the navigation pane, and expand the certification entry marked with the

blue ribbon icon. Notice that the certification is still valid even though a signature has been added.

6. Choose File > Close.

6.4 Document Security Options

User can secure a PDF using any of the following security methods:

Add passwords and set security options to restrict opening, editing, and printing PDFs.

Encrypt a document so that only a specified set of users has access to it.

Save the PDF as a certified document. Certifying a PDF adds a (visible or invisible) certifying signature

that lets the document author restrict changes to the document.

Apply server-based security policies to PDFs (for example, using Adobe LiveCycle Rights

Management). Server-based security policies are especially useful user want others to have access to

PDFs for a limited time.

Securing PDFs in FIPS Mode (Windows)

Acrobat and Reader (version 8.1 and later) provide a FIPS mode to restrict data protection to Federal

Information Processing Standard (FIPS) 140-2 approved algorithms using theRSA BSAFE Crypto-C 2.1

encryption module. The following options are not available in FIPS mode:

Applying password-based security policies to documents. User can use public key certificates or

Adobe LiveCycle Rights Management to secure the document, but user cannot use password encryption

to secure the document.

Page 164: SYJC Arts IT Chapter 1 to 6.pdf

Creating self-signed certificates. In FIPS mode, user cannot create self-signed certificates. In FIPS

mode, user can open and view documents that are protected with non–FIPS-compliant algorithms, but

user cannot save any changes to the document using password security. To apply security policies to the

document, use either public key certificates or LiveCycle Rights Management.

6.4.1 Adding Security (permission for Editing) to PDF Files

User can add security to Adobe PDF files when user first create them or after the fact. User can even add

security to files that you receive from someone else, unless the creator of the document has restricted, who can

change security settings.

Adding Passwords

User can add two kinds of passwords to protect Adobe PDF documents. User can add a Document Open

password so that only users who have the password can open the document, and also user can add Permissions

password so that only users who have the password can change the permissions for the document.

User will add protection to your logo file so that no one can change the contents of the logo file and so that

unauthorized users can't open and use the file.

2. Choose File > Open, and open the SBR_Logo.pdf file.

3. Choose File > Save As, name the file SBR_Logo1.pdf, and save it in the specified folder.

4. Click the Secure task button (with the padlock icon), and choose Show Security Properties. User first

chooses the type of security to add.

4. From the Security Method menu, choose Password Security. The Password Security Settings dialog box

opens automatically.

5. Select compatibility level from the Compatibility menu. (For Acrobat 7.0 or later).

6. Select the "Require a password to open the document" option, and then type

password. Type SBRLogo. User can share this password with anyone that user want to be able to open the

document. Remember that passwords are case-sensitive.

Now user will add a second password that controls who is allowed to change printing, editing, and security

settings for the file.

7.Under Permissions, select "Restrict editing and printing of the document," and type a second password. Type

SBRPres. (Note that your Open password and Permissions password can't be the same.

8. From the Printing Allowed menu, choose whether to allow printing at all, printing at low resolution, or

printing at high resolution. We chose Low Resolution (150 dpi).

Always record passwords in a secure location. There is no way by which you can recover your password.

9. From the Changes Allowed menu, specify the type of changes which user is allowed. Choose "Commenting,

filling in form fields, and signing existing signature fields" to allow users to comment on the logo.

10. Click OK to apply changes.

11. In the first dialog box, reenter the Open password. Type SBRLogo, then click OK, and click OK again to

clear the alert box.

12. In the second dialog box, reenter the Permissions password. Type SBRPres, then click OK, and click OK

again to clear the alert box.

13. Click OK to exit the Document Properties dialog box.

14. Click File > Save to save work and apply the security changes.

15. Choose File > Close to close the SBR_Logo1.pdf file.

6.4.2 Opening Password-Protected Files

1. Choose File > Open and reopen the SBR_Logo1.pdf file in the specified folder.

User prompted to enter the required password to open the file.

2. Type SBRLogo and click OK.

Notice that "(SECURED)" has been appended to the filename at the top of display.

3. Click the Secure task button, and choose Show Security Properties from the menu.

Page 165: SYJC Arts IT Chapter 1 to 6.pdf

4. In the Document Properties dialog box, try changing the Security Method from Password Security to No

Security. Acrobat prompts you to enter the Permissions password.

5. Type SBRPres and clicked OK and then OK again. All restrictions are now removed from the file.

6. Click OK to close the Document Properties dialog box.

7. Choose File > Close, and close the file without saving the changes.

Page 166: SYJC Arts IT Chapter 1 to 6.pdf

6.5 Creating a Form

Adobe Acrobat can create a form from any type of PDF file. It is of the interactive type. It‟s just a matter of

converting your document from within Acrobat and creating fields with the tools provided. You can enter

information in predefined formats.

1. Open .PDF file in Acrobat.

2. Open the TOOLS tray on the right side of

the document and click the FORMS header

to toggle it open. Click CREATE to

convert the current document to a form.

3. Clicking CREATE will cause a series of two

dialogue boxes to appear. Choose “Use

Current Document” for both.

4. After conversion, the tray on the right side

will have changed as well. You will see a list

of TASKS followed by a list of FIELDS. (Fig.

22)

Page 167: SYJC Arts IT Chapter 1 to 6.pdf

5. Under the TASKS menu, choose Add New

Field to show a list of the types of fields

Which user can add.

6. Select Text Field from the menu. A target

Field will open that will allow user to click

and drag a box in the position required in

the document. When the mouse is released,

a dialogue box remains open asking user to

label the newly-created field. Use

something appropriate so you can easily

navigate back to it.

7. To set the rest of your options, such as how

the text will appear in the field, whether or

not to put an outline around the box, the

fill color (if any), etc, simply double-click the

field. A dialogue box will appear.

Indicate your custom settings here.

8. To preview what your form will look like to

an end user, just click the PREVIEW button.

Page 168: SYJC Arts IT Chapter 1 to 6.pdf

9. This is a preview of the newly-created form,

showing how it will look to the end user.

Note that the blue tint in the field is merely

a document indicator and WILL NOT

PRINT.

10. Notice that the button that said PREVIEW

in the last step now says EDIT. To continue

adding fields or adjusting the appearance of

existing fields, click this button.

11. When finished, save it, the form is ready. Fig. 26

Page 169: SYJC Arts IT Chapter 1 to 6.pdf

Exercise

Q1: Fill in the blanks:

1. PDF stands for _______.

2. PDF format is designed by _______.

3. When PDF files are produces, by default it gets _______.

4. PDF document is _______ of the application software, hardware and operating system used

to create it.

5. PDF files retain all the formatting, fonts and graphics of the _______ document.

6. _______ software is used To open PDF file.

7. _______ tools allow to select text or text formatted in a table or column.

8. PDF is smaller than the same document in _______ format.

9. A _______ security is used for PDF document.

10. The commands in the _______ group are used to edit the current PDF document.

Q2: True or False:

1. PDF files have a .PDF extension. _______

2. PDF files cannot be edited. _______

3. Images in PDF files can only be black and white. _______

4. Images are embedded as an object called a Form XObject within a PDF. _______

5. PDF document is platform dependent. _______

6. PDF is widely used format for document distribution. _______

7. When PDF files are produced, it remains in uncompressed state. _______

8. PDF files must be read sequentially. _______

9. PDF format is designed for distribution over the network. _______

10. PDF software is free software. _______

11. To navigate the document, links can be used. _______

12. Generally PDF document is displayed at 100% zoom level. _______

13. PDF files can be printed easily. _______

14. Size of PDF document is same in postscript format. _______

Q3: MCQ( Single Correct Answers):

1) ______ is a popular and widely used format for document distribution.

a) BMP b) TIG c) PDF d) All

2) ______ government is the first user of PDF document.

a) India b) France c) British d) U.S.

3) Size of PDF file is _____ as compared to the same document in postscript format.

a) Same b) Smaller c) Larger d) Reduced

4) PDF document consists of ______ table which is same as index that list the exact

position of each object in the file.

a) Cross-Reference b) Multiple c) Index d) Log

5) To navigate the document ______ are used.

a) Page Break b) View c) Line d) Next page

6) When PDF file is created, look of the original document will be ______.

a) Retained b) Lost c) Changed d) Modified

7) To adjust the view of the document displayed on the screen use ______ tools.

Page 170: SYJC Arts IT Chapter 1 to 6.pdf

a) Zoom b) Arrow c) First d) Line

8) To convert postscript file to PDF.

a) Acrobat Writer b) Acrobat Distiller c) Ms-Word d) Ms-Access

9) Contents in PDF documents can be saved in _____ format.

a) Text b) .doc c) Rich Text d) none

10) ______ is used to provide copy and print protection in PDF.

a) Password b) User name c) Used - id d) Firewall

Q4: MCQ (Triple Answers):

1) Important characteristics of PDF are:

a) It is platform independent

b) It is popular format used for document distribution

c) It modifies the look of original document

d) It is a universal file format.

e) It is platform dependent

f) Object oriented language.

2) PDF Document:

a) By default gets compressed

b) Requires to read sequentially

c) Consist of cross reference table

d) Compact and smaller than original document

e) Size of file is larger

f) by default gets uncompressed

3) PDF files can be created using:

a) Adobe Writer b) Access document

c) Excel document d) Adobe Distiller

e) Word Document e) Adobe Reader

4) Advantages of PDF are:

a) Object oriented documents b) Easy access

c) Platform Dependent d) Easy to add bookmark

e) Object oriented Language e) Software Dependent

5) In PDF, documents security is provided by:

a) Using Password b) Using Encryption c) Digital signature

d) Cross table e) Using Decryption f) None