www.tn11th.in
GOVERNMENT OF TAMILNADU
HIGHER SECONDARY FIRST YEAR
COMPUTER APPLICATIONS VOLUME-II
A publication under Free Textbook Programme of Government of Tamil Nadu
Department of School Education Untouchability is Inhuman and a Crime
Introduction Pages.indd 1
02/08/18 12:29 PM
www.tn11th.in
Government of Tamil Nadu First Edition
-
2018
NOT FOR SALE
Content Creation
The wise possess all
State Council of Educational Research and Training © SCERT 2018
Printing & Publishing
Tamil NaduTextbook and Educational Services Corporation www.textbooksonline.tn.nic.in
II
Introduction Pages.indd 2
02/08/18 12:29 PM
www.tn11th.in
PREFACE
Human civilization achieved the highest peak with the development of computer known as “Computer era”. Literate are those who have the knowledge in using the computer whereas others are considered illiterate inspite of the other degrees obtained.
T h e growth of the nation at present lies in the hands of the youth, hence the content of this book is prepared in such a way so as to attain utmost knowledge considering the future needs of the youth.
This book does not require prior knowledge in computer Technology Each unit comprises of simple activities and demonstrations which can be done by the teacher and also students.
HOW TO USE THE BOOK
Technical terminologies are listed in glossary for easy understanding The “ Do you know?” boxes enrich the knowledge of reader with additional information Workshops are introduced to solve the exercises using software applications QR codes are used to link ing additional materials in digital form
How to get connected to QR Code? o
the QR code scanner from the google play store/ apple app store into your smartphone
o
Open the QR code scanner application
o
Once the scanner button in the application is clicked, camera opens and then bring it closer to the QR code in the textbook.
o
Once the camera detects the QR code, a URL appears in the screen. Click the URL and go to the content page.
III
Introduction Pages.indd 3
02/08/18 12:29 PM
www.tn11th.in
CAREER GUIDANCE AFTER 12TH COURSES B.E / B.Tech
COLLEGES/ UNIVERSITIES
PROFESSION
Software Engineer, All University and their d Hardware Engineer, Software Colleges and Self financing Colleges in Development, Healthcare India and Abroad. Section, IT & ITEs
Science and Humanities B.Sc (Computer Science) BCA B.Sc ( Maths, Physics, Chemistry, Bio-Chemistry, Geography, journalism, Library Sciences, Political Science, Travel and Tourism)
All University and their d Government Job and Private Colleges and Self financing Colleges in Company BPO, Geologist, India and Abroad. Journalist
LAW LLB B.A+LLB B.Com BBM+LLB BBA+LLB CA Diploma
All University and their d Lawyer, Legal Officer, Govt Colleges and Self financing Colleges in Job India and Abroad. The Institute of Chartered ant of India (ICAI) Government Polytechnic and Selffinancing colleges
CA Private and Govt. Junior Engineer (Government and Private)
Commerce Courses B.com-Regular, B.com-Taxation & Tax Procedure, B.com-Travel &Tourism, B.com-Bank Management, B.com-Professional, BBA/BBM-Regular, BFM- Bachelors in Financial Markets, All University and their d Colleges and Self financing Colleges in BMS-Bachelors in Management Studies, India and Abroad. BAF- Bachelors in ing & Finance, Certified Stock Broker & Investment Analysis, Certified Financial Analyst, Certified Financial Planner, Certified Investment Banker
Private Organization , Government ,Banking sectors and prospects for self – employment.
IV
Introduction Pages.indd 4
02/08/18 12:29 PM
www.tn11th.in
COURSES
COLLEGES/ UNIVERSITIES
PROFESSION
Management Courses Business Management Bank Management Event Management Hospital Management Human Resource Management Logistics Management
Private Organization , All University and their d Government ,Banking sectors Colleges and Self financing Colleges in and prospects for self – India and Abroad. employment.
Science and Humanities B.Sc.Botany B.Sc.Zoology B.Sc.Dietician & Nutritionist B.Sc.Home Science B.Sc.Food Technology B.Sc.Dairy Technology B.Sc. Hotel Management B.Sc. Fashion Design B.Sc. Mass Communication B.Sc. Multimedia B.Sc. -3D Animation
All University and their d Government Job and Private Colleges and Self financing Colleges in Company BPO, Geologist, India and Abroad Journalist
V
Introduction Pages.indd 5
02/08/18 12:29 PM
www.tn11th.in
Table of Contents Chapter No.
Title
Page
UNIT III – WEB PAGE DEVELOPMENT USING HTML AND CSS
9
Introduction to Internet and Email
10
HTML - Structural Tags
28
11
HTML - Formatting text, Creating Tables, List and Links
54
12
HTML - Adding multimedia elements and Forms
93
13
CSS - Cascading Style Sheets
1
116
UNIT IV – JAVASCRIPT
14
Introduction to Javascript
127
15
Control Structure in JavaScript
154
16
JavaScript Functions
176
UNIT V – COMPUTER ETHICS AND CYBER SECURITY
17
Computer Ethics and Cyber Security
184
UNIT VI – TAMIL COMPUTING
18
Tamil Computing
E - book
200
Assessment
DIGI links
Lets use the QR code in the text books ! How ? • the QR code scanner from the Google PlayStore/ Apple App Store into your smartphone • Open the QR code scanner application • Once the scanner button in the application is clicked, camera opens and then bring it closer to the QR code in the text book. • Once the camera detects the QR code, a url appears in the screen.Click the url and goto the content page.
VI
Introduction Pages.indd 6
02/08/18 12:29 PM
www.tn11th.in
Unit III
Web Page Development using HTML and CSS
CHAPTER
9
Introduction to Internet and Email Learning Objectives
Let us call this company Sri Mother International Ltd. Imagine the amount of information such as sales, inventory, etc. required by the management of the company to make everyday decisions. To get this information they will need to call their local offices. Their local offices will need to mail or fax printed reports or even send media (floppies!) through the postal service. By the time the mail is received, the data is already days old. Even if reports are faxed, it will be a cumbersome task to consolidate all reports. This task also increases chance of human error since large numbers of reports are manually collated. This is just one part of the equation. You also need to consider the information required by the local offices. They also need various data from the head office and other offices around the world.
To know the • Necessity of Internet in Commerce • Types of Network available • Services available in Internet • Applications of Internet • Difference between Internet, Intranet and extranet • Difference Website
between
Webpage
and
• Difference between Static and Dynamic Webpage • Difference between Browser and Search engine
Now consider the same company, but in the present time with all their offices interconnected. They would use a single application around the world that takes advantage of their global network. The data from all offices would be instantly stored at the central location and with a single click, the management team can see data from around the world in any format they like. This data would also be real-time. This means that they see it, as its happening. Since the data is centralized, any office location can see data pertaining to any location.
• Do’s and don’t of safe Surfing on Internet 9.1 Necessity of Internet It is important to understand what a network is and the importance of network. Simply put, a network is a collection of interconnected devices (such as computers, printers, etc.). To understand the importance of networks, let us look at how things worked before networks were created. For this, consider a large multinational company that sells food products in a time when networks did not exist.
As you can see, the cost, time and effort involved in transferring data was 1
Chapter 9 Pages 1-27.indd 1
02/08/18 2:41 PM
www.tn11th.in Now that you know how beneficial networks are, its time to look at different types of network.
much higher without networks. So networks decrease cost, time, and effort and thereby increase productivity. They also help in resource optimization by helping to share resources. A simple example of resource sharing is a printer, shared between many different computers in a typical office.
9.2 Types of Network Depending upon geographical area covered by a network, it is classified as: 1.Local Area Network ( LAN ) 2. Metropolitan Area Network ( MAN ) 3.Wide Area Network ( WAN ) 4. Personal Area Network( PAN ) 5. Campus Area Network ( CAN ) 6. Wireless Local Area Network ( W-LAN ) 1. LAN – LOCAL AREA NETWORK
Local Area Network (LAN)
Range : Upto 10 Km
Firewall
Location : Refers to same office, same building, same company and in same schools
Internet Switch
Speed : Upto 10-100 Mbps Advantages : Low Cost, Resource Sharing, Security Disadvantages : Area Covered Limited When number of nodes increases, performance Decreases
Switch
Router Web Server
File Server
File File Server Server
Colour Printer
Plotter Fax
Figure 9.1
2
Chapter 9 Pages 1-27.indd 2
02/08/18 2:41 PM
www.tn11th.in 2. MAN – Metropolitan Area Network Range : 10 to 15 Miles Location : MAN is a network designed to extend over an entire city Central NVR
Speed : Upto 5 – 10 Mbps
MAN
Advantages : Wider than LAN Disadvantages : Data rate is slow compared to LAN Cost higher than LAN
Figure 9.2 3. WAN – WideArea Network Range : Above 1000 Kms
Satellite Microwave tower
Local area network (LAN)
Local area network (LAN)
Location : It Span entire countries and continents Speed : Upto256 Kbps to 2 Mbps Advantages : Large geographical Area
Figure 9.3
Disadvantages : Complicated and Complex.High Cost. Requires high Performance.Devices. Low security. Cost higher than LAN 4. PAN – Personal Area Network PERSONAL AREA NETWORK (PAN)
Range :Upto 100 meters Location : Used for shorter distance, controlled by a single person within a single building Speed : up to 250 Kbps
Figure 9.4
Advantages : Efficient, Cost effective and convenient. Controlled by a single person Hotspot may connect upto 8 devices 3
Chapter 9 Pages 1-27.indd 3
02/08/18 2:41 PM
www.tn11th.in Disadvantages : Shorter distance upto 10 meters only. Data rate is low compared to other network 5 CAN – CampusArea Network A Typical Campus Network Topology
Range : Upto 5 Kms
Internet
Central site
Location : Larger than LAN, but smaller than MAN. University, school or small business, enterprise
ERNET
Academic Building
Core Switch
Router Firewall
Servers WLAN Controller Switch
Wi-Fi Access Points
Speed : 40 KB/s TO 1 MB/s
Residential Zone
Advantages : Cost effective ,Wired or Wired Network, High B andwithMulti-depar tmental Network access
Building1 Hostel Zone WAN Links
Building2
Building3
SMOFC
Figure 9.5
UTP
Disadvantages : Difficult to manage 6. WLAN – Wireless Local Area Network Range : Upto 50 Kms Wireless Router Network Diagram Internet MP3 Player
WEB Camera
HDD
Cable Modem
Speed : 1 Mbps to 54 Mbps
Printer Wireless router
Media PC
Desktop PC
IP Camera Digital Camera
Location : Ranges from a single room to an entire campus Uses Wifi or Bluetooth, Radio waves
Wireless Media Player
Advantages : Portable Installation is quick and easy Disadvantages : Low Bandwith due to interference
Laptop
Smartphone Entertainment System
Figure 9.6 4
Chapter 9 Pages 1-27.indd 4
02/08/18 2:41 PM
www.tn11th.in
Figure 9.7 9.3 INTERNET And WWW Several networks, small and big all over the world, are connected together to form a Global network called the internet. The internet uses T/IP(Transmission Control Protocol/ Internet Protocol ) to transmit data via various types of media. T/IP is not a single networking protocol – it is a suite of protocols named after the two most important protocols or layers within it – T and IP. As with any form of communication, two things are needed: a message to transmit and the means to reliably transmit the message.The internet protocol (IP) addressing system is used to keep track of the millions of s. Each computer on net is called as host. The internet is the most cost-effective method of communications in the world. Examples of few services available are: Marketing Internet
Marketing / Purchasing Internet
Extranet
The World
The World
Extranet
Intranet
IT - Dept.
Company Only
Suppliers, Customers Collaborators
Suppliers, Customers Collaborators
Intranet
Figure 9.8
5
Chapter 9 Pages 1-27.indd 5
02/08/18 2:41 PM
www.tn11th.in
The Internet works by using a protocol called T/IP. T/IP allows one computer to talk to another computer via the Internet through compiling packets of data and sending them to right location. An Intranet is a website used by organizations to provide a place where employees can access company information (eg policies, procedures, staff, directory, department info), tools (quick links to common apps, forms etc.) and (collaborate (to social sharing tools similar facebook).
An extranet is a private network that uses Internet technology and the public telecommunication system to securely share part of a business's information or operations with suppliers, vendors, partners, customers, or other businesses.
• Email • Web-enabled audio/video conferencing services • Online movies and gaming • Data transfer/file-sharing, often through File Transfer Protocol (FTP) • Instant messaging • Internet forums • Social networking • Online shopping • Financial services Vinton Gray Cerf (1943) an American Computer Scientist, is widely known as "Father of the Internet" shares this title with T/IP co-inventor Bob Kahn. He was also involved in the formation of ICANN
9.3.1 Domain Name It is a name or an identity which become a online identity and can be access by the web browser when connected to internet. 6
Chapter 9 Pages 1-27.indd 6
02/08/18 2:41 PM
www.tn11th.in Table: 9.1 Generic Domain Name Description .com
Commercial Organisation
.gov
Government institution
,org
Non-profit Organisation
.net
Network Group
.edu
Educational Institution
The heart of intranets and the internet is called as the Domain Name System(DNS), the way computers can each other and do things such as exchange electronic mail or display Web pages. The Internet Protocol (IP) uses this Internet address information and the DNS to deliver mail and other information from computer to computer Table: 9.2 Country Level Domain Name
Description
.in
India
.au
Australia
.us
United States of America
.jp
Japan
.ru
Russia
.sg
Singapore
9.3.2 What is URL? Every server on the internet has an IP number, a unique number consisting of four parts separated by dots. The IP number is the server’s address 165.113.245.2 128.143.22.55 At times the number keeps changing hence it is harder for people to number than to
Figure 9.9 7
Chapter 9 Pages 1-27.indd 7
02/08/18 2:41 PM
www.tn11th.in word combinations. So, addresses are given “word-based” addresses called URL. The URL and the IP number are one and the same. A URL is an address that shows where a particular page can be found on the World Wide Web. URL is an abbreviation for 'Uniform Resource Locator (URL)'.
9.3.3 Who Governs the Internet? One of the most frequently asked questions about the internet is, “ Who runs it?” The truth is that no centralized management of the internet exists.
ICANN was created on September 18, 1998, and incorporated on September 30, 1998, in the US State of California. It is headquartered in the Playa Vista neighborhood of Los Angeles.
The internet as a whole does not have a single controller. But the internet society, which is a voluntary hip organization, takes the responsibility to promote global information exchange through the internet technology. Internet Corporation for Assigned Names and Numbers( ICANN) isters the domain name registration. It helps to avoid a name which is already ed. 9.3.4 What is W3C? W3C stands for "World Wide Web Consortium." The W3C is an international community that includes a full-time staff, industry experts, and several member organizations. These groups work together to develop standards for the World Wide Web. The World Wide Web Consortium (W3C) is an international organization committed to improving the web. It is made up of several hundred member organizations from a variety of related IT industries. W3C sets standards for the World Wide Web (WWW) to facilitate better communication ability and cooperation among all web stakeholders. It Tim Berners-Lee was established in 1994 by the creator of the WWW, Tim Berners-Lee. 9.4 Types of Internet Service Here are some common types of Internet service. Wireless Radio frequency bands are used in place of telephone or cable networks. One of the greatest advantages of wireless Internet connections is the "always-on" connection that can be accessed from any location that falls within network coverage. Wireless connections are made 8
Chapter 9 Pages 1-27.indd 8
02/08/18 2:41 PM
www.tn11th.in possible through the use of a modem, which picks up Internet signals and sends them to other devices. Mobile Many cell phone and smartphone providers offer voice plans with Internet access. Mobile Internet connections provide good speeds and allow you to access the Internet. Hotspots Hotspots are sites that offer Internet access over a wireless local area network (WLAN) by way of a router that then connects to an Internet service provider. Hotspots utilize WiFi technology, which allows electronic devices to connect to the Internet or exchange data wirelessly through radio waves. Hotspots can be phone-based or free-standing, commercial or free to the public. Broadband This high-speed Internet connection is provided through either cable or telephone companies. One of the fastest options available, broadband Internet uses multiple data channels to send large quantities of information. The term broadband is shorthand for broad bandwidth. Broadband Internet connections such as DSL and cable are considered highbandwidth connections. Although many DSL connections can be considered broadband, not all broadband connections are DSL. DSL DSL, which stands for Digital Subscriber Line, uses existing 2-wire copper telephone line connected to one's home so service is delivered at the same time as landline telephone service. Customers can still place calls while surfing the Internet. Cable Cable Internet connection is a form of broadband access. Through use of a cable modem, s can access the Internet over cable TV lines. Cable modems can provide extremely fast access to the Internet. Satellite In certain areas where broadband connection is not yet offered, a satellite Internet option may be available. Similar to wireless access, satellite connection utilizes a modem. ISDN ISDN (Integrated Services Digital Network) allows s to send data, voice and video content over digital telephone lines or standard telephone wires. The installation of an ISDN 9
Chapter 9 Pages 1-27.indd 9
02/08/18 2:41 PM
www.tn11th.in adapter is required at both ends of the transmission—on the part of the as well as the Internet access provider. Dongles / Data Card Today, many dongles provide wireless capabilities. For example, USB Wi-Fi adapters are often called dongles. Since most computers now have built-in Wi-Fi chips, mobi data adapters, such as 3G and 4G dongles, are more prevalent. These types of dongles allows to connect to the Internet even when Wi-Fi is not available. Comparison between Data Card and Dongle Dongle
Data Card
Refers to any removable component used for enabling extra security. USB Dongles can be divided into • WiFi Dongles • BlueTooth Dongle • Memory Dongle
It is a removable electronic card which is used for storing for data. Types of datacard are • Expansion Card • Memory Card or Flash Card • Identification Card
9.4.1 Internet Connection and Access Methods
There are several ways or methods of connecting to the Internet.
There are two access methods direct and Indirect and these can be either fixed or mobile. 9.4.1.1 Indirect Access This is most common method used in home and office networks. The device e.g. computer connects to a network using Ethernet or WiFi and the network connects to the Internet using Asymmetric digital subscriber lineADSL( cable or fibre.) 9.4. 1.2 Direct Access
Indirect Access
Direct Access Public-Wifi Dial up-(old method Router
Wthernet or Wi-Fi network ADSL, Fibre or 3G/4G Cable Internet Connection Methods Figure 9.10
This is most common method used when travelling. 10
Chapter 9 Pages 1-27.indd 10
02/08/18 2:41 PM
www.tn11th.in The device e.g. smart phone connects directly to the Internet using 3G/4G mobile networks or public Wi-Fi. There are two ways to look for the information on the web. 1. If the URL of the website is known, enter it on the address bar. 2. If is the URL is not known, then “Search Engines” will help us to get the information. A search engine is a software system that is designed to search for information on the World Wide Web. Examples of popular search engines are Yahoo, Lycos, Altavista, Hotbot, Google and Askjeeves. 1. A browser is used to access websites and web pages whereas a search engine isused to search for particular information. 2. Internet Explorer, Chrome, Firefox, Safari, and are the most popular web browsers while Google and Yahoo are the most popular search engines. 3. A browser is used to access the Internet whereas in order to open a search engine you need a browser. The list of content returned via a search engine to a is known as a search engine results page (SERP). 9.5 Internet Applications 1. Internet telephony Internet telephony (e.g. Skype) is another common communications service made possible by the creation of the Internet. VoIP stands for Voice-over-Internet Protocol, referring to the protocol that underlies all Internet communication. 2. Job search Nowadays, many people search for their jobs online as it is quicker and there is a larger variety of job vacancies present. People can publish resume online for prospective job. Some of the web sites providing this service are naukri.com, monster.com, summerjob.com, recuritmentindia.com etc. 3. Online Shopping The internet has also facilitated the introduction of a new market concept consisting of virtual shops. They provide information about products or services for sale through www servers. Using the internet services customers can submit specific product queries and request 11
Chapter 9 Pages 1-27.indd 11
02/08/18 2:41 PM
www.tn11th.in specific sales quotes. For example amazon.com is a www based bookshop on the internet where information on all types of international books can be found and books can be ordered online. 4. Stock market updates Selling or buying shares sitting on computer through internet. Several websites like ndtvprofit.com, moneypore.com, provide information regarding investment 5. Travel: One can use internet to gather information about various tourist place .it can be used for booking Holiday tours, hotels, train, bus, flights and cabs. Some of the web sites providing this service are goibibo.com, makemytrip.com, olacabs.com. 6. Research Research papers are present online which helps in the researcher doing aliterature review 7. Video conferencing It enables direct face-to-face communication across networks via web cameras, microphones, and other communication tools. Video conferencing can enable individuals in distant locations to participate in meetings on short notice, with time and money savings. The technology is also used for telecommuting, in which employees work from home. When video Conferencing is used in education, it is easier to have interactive classes between teacher to teacher, teacher to classroom, or classroom to classroom with students in different places. 8. e–commerce e–commerce (electronic commerce or EC) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet. These business transactions occur either business-to-business, business-to-consumer, consumerto-consumer or consumer-to-business. Largest e-commerce companies in India are Flipkart, Snapdeal, Amazon India, Paytm. 9. Online payments The rising boom of online payments in India has given way to many new entrants in the industry such as Paytm etc who are majorly wallet driven payment companies. This growth has been driven by rapid adoption led by the increasing use of smartphones, tablets and speedy access to internet through broadband, 4G etc 10. Social Networking Social networking is the use of internet-based social media programs to make connections with friends, family, classmates, customers and clients. Social networking can 12
Chapter 9 Pages 1-27.indd 12
02/08/18 2:41 PM
www.tn11th.in be done for social purposes, business purposes or both. The programs show the associations between individuals and facilitate the acquisition of new s. Examples of social networking includes Facebook 11. Voicemail Voicemail is a system of sending messages over the phone. Calls are answered by a machine which connects you to the person you want to leave a message for, and they canlisten to their messages later. 12. Chatting On the Internet, chatting is talking to other people who are using the Internet at the same time you are. Usually, this "talking" is the exchange of typed-in messages and a group of s who take part from anywhere on the Internet.. Chats can be ongoing or scheduled for a particular time and duration. Most chats are focused on a particular topic of interest and some involve guest experts or famous people who "talk" to anyone ing the chat. Transcripts of a chat can be archived for later reference. 13. e-banking e-banking (Online banking) , also known as internet banking, it is an electronic payment system that enables customers of a bank or other financial institution to conduct a range of financial transactions through the financial institution's website. The online banking system will typically connect to or be part of the core banking system operated by a bank and is in contrast to branch banking which was the traditional way customers accessed banking services. Electronic Banking
Electronic Banking
Electronic Banking
Using aTelephone
Using Personal Computers
Connection
Automated Telephone System
Mobile banking
using internet connection
Home Banking
Internet Banking
Mail banking
Payment ins truments and Self-Service Zones
Selfservice zone
Payment Electronic card wallet
Figure 9.11 14. e-learning e-Learning are courses that are specifically delivered via the internet to somewhere other than the classroom where the professor is teaching. It is not a course delivered via a DVD 13
Chapter 9 Pages 1-27.indd 13
02/08/18 2:41 PM
www.tn11th.in or CD-ROM, video tape or over a television channel e-learning is utilizing electronic technologies to access educational curriculum outside of a traditional classroom. It is a program delivered completely online. E-learning is interactive in that you can also communicate with teachers, professors or other students in a class. Sometimes it is delivered live, where you can “electronically” raise your hand and interact in real time and sometimes it is a lecture that is prerecorded. There is always a teacher/ professor interacting/ communicating, grading participation, giving assignments and conducting tests. 9.6 Email Electronic mail or email is information stored on a computer The first mail was sent by Ray Tomlinson in that is exchanged between two 1971 as a test e-mailmessage containing the s over telecommunications. text like “QWERTYUIOP” Email is a message that may contain text, files, images or any other attachments sent through a network to a specified individual or group of individuals
Fig 9.12 9.6.1 Structure of email Click the Compose button and then writing an e-mail contents When sending an e-mail message, several fields are required to be filled: • The To field is where you type the e-mail address of the person who is the recipient of your message. 14
Chapter 9 Pages 1-27.indd 14
02/08/18 2:41 PM
www.tn11th.in • The From field should contain your e-mail address. • If you are replying to a message, the To and From fields are automatically filled out; if it's a new message, you'll need to enter them manually. • The Subject should consist of a few words describing the e-mail's contents. The Subject lets the recipient see what the e-mail is about, without opening and reading the full e-mail. This field is optional.
Figure 9.13 (a)
• The CC (Carbon Copy) field allows you to specify recipients who are not direct addressees (listed in the "To" field). This field is optional. • The BCC (Blind Carbon Copy) field is similar to CC, except the recipients are secret. Each BCC recipient will receive the e-mail, but will not see who else received a copy. The addressees (anyone listed in the "To" field) remain visible to all recipients. This field is optional.
Figure 9.13 (b)
• Finally, the Message Body is the location you type your main message. It often contains your signature at the bottom; similar to a hand-written letter. 9.6.2 Advantages of email
Some of the main advantages of email are listed below.
• Free delivery - Sending an e-mail is virtually free, outside the cost of Internet service. There is no need to buy a postage stamp to send a letter. • Global delivery - E-mail can be sent to nearly anywhere around the world, to any country. 15
Chapter 9 Pages 1-27.indd 15
02/08/18 2:41 PM
www.tn11th.in • Instant delivery - An e-mail can be instantly sent and received by the recipient over the Internet. • File attachment - An e-mail can include one or more file attachments, allowing a person to send documents, pictures, or other files with an e-mail. • Long-term storage - E-mails are stored electronically, which allows for storage and archival over long periods of time. • Environmentally friendly - Sending an e-mail does not require paper ( Paperless )), cardboard, or packing tape, conserving paper resources. 9.6.3 What is sent in an email In addition to text messages being sent over e-mail, it is also possible to attach a file or other data in an e-mail. For example, an attachment could be a picture, PDF,word processor document,, or any file stored on the computer. 9.7 Internet Threat It’s a dangerous world out there in the World Wide Web. Just as your mother may have told you to never talk to strangers, the same advice holds true for the virtual world. You may know to be wary of giving strangers your business bank details. But can you be sure the website you’re logging into is that of your bank and not a forgery created by a cybercriminal?Cybercriminals use many different methods to lure you into parting with your confidential personal or business information. Hence you ought to be aware of the issues and be extra vigilant when online and offline.. Computer virus: A computer virus is a small piece of software that can spread from one infected computer to another. The virus could corrupt, steal, or delete data on your computer— even erasing everything on your hard drive. A virus could also use other programs like your email program to spread itself to other computers. Malware: Malware is short for “malicious software.” Malware is used to mean a “variety of forms of hostile, intrusive, or annoying software or program code.” Malware could be computer viruses, worms, Trojan horses, dishonest spyware, and malicious rootkits—all of which are defined below. Trojan horse: s can infect their computers with Trojan horse software simply by ing an application they thought was legitimate but was in fact malicious. Once it enters inside the computer, a Trojan horse can do anything from recording your s by logging its keystrokes, hijacking your webcam to watch and record every movement. Malicious spyware: Malicious spyware is used to describe the Trojan application that was 16
Chapter 9 Pages 1-27.indd 16
02/08/18 2:41 PM
www.tn11th.in created by cybercriminals to spy on their victims. An example would be keylogger software that records a victim’s every keystroke on his or her keyboard. The recorded information is periodically sent back to the originating cybercriminal over the Internet. Keylogging software is widely available and is marketed to parents or businesses that want to monitor their kids’ or employees’ Internet usage. Computer worm: A computer worm is a software program that can copy itself from one computer to another, without human interaction. Worms can replicate in great volume and with great speed. For example, a worm can send copies of itself to every in your email address book and then send itself to all the s in your s’ address books. Because of their speed of infection, worms often gain notoriety overnight infecting computers across the globe as quickly as victims around the world and switch them on to open their email. Botnet: A botnet is a group of computers connected to the Internet that have been compromised by a hacker using a computer virus or Trojan horse. An individual computer in the group is known as a “zombie“ computer. Spam: Spam in the security context is primarily used to describe email spam. Unwanted messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter your mailbox as well as potentially take up space on your mail server. However, spam messages can contain links that when clicked on could go to a website that installs malicious software onto your computer. Phishing: Phishing scams are fraudulent attempts by cybercriminals to obtain private information. Phishing scams often appear in the guise of email messages designed to appear as though they are from legitimate sources. For example, the message would try to lure you into giving your personal information by pretending that your bank or email service provider is updating its website and that you must click on the link in the email to your information and details. Rootkit: A rootkit is a collection of tools that are used to obtain -level access to a computer or a network of computers. A rootkit could be installed on your computer by a cybercriminal exploiting a vulnerability or security hole in a legitimate application on your PC and may contain spyware that monitors and records keystrokes. 9.8. Browsers Looking for information on the internet is called surfing or browsing. To browse the internet, a software called the web browser or browser is used. E-commerce, social media, and many other things we take for granted today would be impossible without internet browsers.Web browsers translates HTML documents of the 17
Chapter 9 Pages 1-27.indd 17
02/08/18 2:41 PM
www.tn11th.in website and allows to view it on the screen. 9.8.1 Familiar Internet Browser 1. Google Chrome is a freeware familiar web browser developed by Google Inc. It is best for its speed, simplicity, security, privacy and customization features. Google Chrome s on Android 4.0 or higher, iOS 6.0 or higher, Mac OSX 10.6 or higher and Windows (XP sp2 or higher) and Linux system. 2. Mozila Firefox is a free and open source web browser developed by Mozilla Foundationand Mozilla Corporation. FireFox is default browser in Ubuntu . It s Windows, Mac OS X, Linux and Android system. 3. Internet Explorer commonly known as Microsoft Internet Explorer or Windows Internet Explorer is the first or default browser for a Windows PC. It is developed by Microsoft. 4. Safari is a web browser developed by Apple Inc. and comes with OS X and iOS. Some version of safari browser also s in Windows Operating System. Exclusively used in Apple Mac system. 9.9 Web Page Vs Web Site Websites A website is a collection of webpages. For example if there is a company that owns sricompany.com then this website will have several Webpages like Home, , Us, Testimonials, Products, Services, FAQ’s, and others. The first page of the website is called a Home Page. All of these pages together make up a Website. Web Pages A webpage is apage of a Website. A web page can be accessed by a URL in a browser and that page can be copied and or send to a friend for review whereas websites are collections of multiple page that must be navigated to view other content A webpage is a page of a Website. Every page has a unique address called the Uniform Resource Locator (URL). The URL locates the pages on the internet. Difference between Webpage and Website Webpage
Website
Consists of a Single document displayed by A collection of multiple documents a browser displayable by a browser Shares a unique domain name
Has its own unique domain name
Makes up a website
Contains one or more webpages 18
Chapter 9 Pages 1-27.indd 18
02/08/18 2:41 PM
www.tn11th.in 9.10 Static and Dynamic Web Pages
Web pages are classified as Static and Dynamic Webpages
Web pages are called Static websites as they remain the same whenever it is visited. Examples of static Websites are website owned by Small business organizations, School websites etc. Websites that displays marks of Public Examinations and Entrance Examinations changes when different numbers are given. Such websites are called as Dynamic Websites. Eg,. Websites of Government and Entrance Exams. Comparison of Static and Dynamic Web Pages Static Web Page
Dynamic Web Page
The content and layout of a web page is fixed
The content and layout may change during run time
Static Web pages never use databases
Databases is used to generate dynamic content through queries
Static web pages directly run on the Dynamic web pages runs on the server browser and do not require any server side side application programs and displays application program the results Dynamic web page development requires programming skills
Static Web pages are easy to develop
9.11 Web –Applications E-commerce is the activity of buying or selling of products on online services or over the Internet. Electronic commerce draws on technologies such as mobile commerce, electronic funds transfer, supply chain management, Internet marketing, online transaction processing, electronic data interchange (EDI), inventory management systems, and automated data collection systems. 9.11.1 E-commerce Classifying ecommerce according to the parties involved 1. Business to consumer (B2C) – Transactions happen between businesses and consumers. In B2C ecommerce, businesses are the ones selling products or services to end-s (i.e. consumers). 2. Business to business (B2B) – As its name states, B2B ecommerce pertains to transactions conducted between two businesses. Any company whose customers are other businesses operate on a B2B model. 3. Consumer to business (C2B) – Consumer to business ecommerce happens when a consumer sells or contributes monetary value to a business. Many crowdsourcing campaigns fall under C2B ecommerce. 19
Chapter 9 Pages 1-27.indd 19
02/08/18 2:41 PM
www.tn11th.in 4. Consumer to consumer (C2C) – As you might have guessed, C2C ecommerce happens when something is bought and sold between two consumers. C2C commonly takes place on online marketplaces such as eBay, in which one individual sells a product or service to another. 5. Government to business (G2B) – G2C transactions take place when a company pays for government goods, services, or fees online. Examples could be a business paying for taxes using the Internet. 6. Business to government (B2G) – When a government entity uses the Internet to purchases goods or services from a business, the transaction may fall under B2G ecommerce. Let’s say a city or town hires a web design firm to update its website. This type of deal may be considered a form of B2G. 7. Consumer to government (G2C) – Consumers can also engage in B2C ecommerce. People paying for traffic tickets or paying for their car registration renewals online may fall under this category. 9.11.2 E-governance Electronic governance or e-governance is the application of information and communication technology (ICT) for delivering government services. Benefits of E-governance • Reduced corruption • High transparency • Increased convenience • Reduction in overall cost. • Expanded reach government
of
Types of Interactions in e-Governance
Figure 9.14
1. G2G (Government to Government): When the exchange of information and services is within the periphery of the government, is termed as G2G interaction. This can be both horizontal, i.e. among various government entities and vertical, i.e. between national, state and local government entities and within different levels of the entity. 2. G2C (Government to Citizen): The interaction amidst the government and general public is G2C interaction. Here an interface is set up between government and citizens, which enables citizens to get access to wide variety of public services. The citizens has the freedom to share their views and grievances on government policies anytime, anywhere. 3. G2B (Government to Business): In this case, the e-governance helps the business class to interact with the government seamlessly. It aims at eliminating red-tapism, saving time, cost and establish transparency in the business environment, while interacting with 20
Chapter 9 Pages 1-27.indd 20
02/08/18 2:41 PM
www.tn11th.in government. 4. G2E (Government to Employees): The government of any country is the biggest employer and so it also deals with employees on a regular basis, as other employers do. ICT helps in making the interaction between government and employees fast and efficient, along with raising their level of satisfaction by providing perquisites and add-on benefits. E-governance has a great role to play, that improves and s all tasks performed by the government department andagencies, because it simplifies the task on the one hand and increases the quality of work on the other. 9.12 Safe Surfing on Internet As a great reminder that Internet security is something that needs constant vigilance. It’s also a great reminder that a lot of things can happen on the Internet if you don’t properly take precautions against them. With that in mind, be sure to have a safe and happy Safer Internet Day. SAFER INTERNET DAY Safer Internet Day (SID) 2018 iscelebrated around the world in February of every year with a theme of "Create, connect and share respect: A better internet starts with you". Following is the do’s and don’t of safe Surfing on Internet 1. Don’t give out your personal information – Don’t put personal details such as your home address, telephone numbers or parent’s work address online as cybercriminals can use this information to create a fake profile with your details 2. What goes online, stays online – Use privacy settings to make sure only your friends and family can see photos you post. Avoid posting holiday plans as criminals have been known to track your movements 3. Check your security and privacy settings – Make sure your social network privacy settings are secured so only your friends can see your personal information and use your privacy settings to restrict who can see your posts, videos and photos 4. safety – Sharing your with your parents is a sensible idea, but avoid sharing your with your friends, even if they promise they won’t tell anyone! Also, when setting your , make sure it isn’t something people may guess such as your pet’s name. Use a mixture of letters, numbers and upper and lower case characters 5. Always protect your mobile device – Make sure your mobile phone is pin-protected so all your personal information stored on it is safe. a security app which allows you to remotely wipe any personal data, should your mobile be lost or stolen 6. Don’t talk to strangers online or offline – Don’t meet up with strangers and let your parents know if a stranger has tried to get in with you online. 7. Listen to the adults who know – Adults will always be worried about you. Help set their mind at rest and avoid chatting online with strangers. 21
Chapter 9 Pages 1-27.indd 21
02/08/18 2:41 PM
www.tn11th.in 8. Be wary of unsecured or unknown websites – When shopping online, use reputable and known retailers. 9. Be careful what links you click on – Avoid clicking links in an email, Instant Message or on your social network unless you are sure the message is from someone you know. Now that we have come to the end of this chapter, the next chapter introduces you to create a web page using html tags. Sandboxing is a software managing techinque through which programs that are suspected to be infected with avirus can be run. The programs are run is a separated memory area and therefore cannot damage the operating systems. The Internet of Things (IoT) is the network of physical devices, such as vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators and connetivity which enables these things to connect and exchanges data creating opportunities for more direcct integration of the physical world into computer - based systems, resulting in effficiency improvements, economic benefits, and reduced human exertions. Points to : • The different type of network are LAN, MAN, WAN, PAN, CAN and WLAN • Two things required for T/IP needed are
a) Message to transmit
b) Means to reliably transmit the message
• Each computer on net is called as host • Examples of internet are 1) email
2) instant Messaging
3) Social Networking
4) Online Shopping
• Internet Corporation for Assigned Names and Numbers ( ICANN) isters the domain registration to avoid name already ed. • W3C stands for world wide web consortium. It sets standards for the www to facilitate better communication ability. It was established in 1994 by the creator of www, Tim Berners Lee. • The internet is a globally connected network system that uses T/IP ( Transmission Control Protocol / Internet Protocol ) to transmit data via various types of media 22
Chapter 9 Pages 1-27.indd 22
02/08/18 2:41 PM
www.tn11th.in
• Hotspots are sites that offer internet access over wireless local network.( WLAN) by way of a router that then connects to an internet service provider. • Internet telephony (e.g. Skype) is another common communications service made possible by the creation of the Internet. VoIP stands for Voice-over-Internet Protocol • Video conferencing enables direct face-to-face communication across networks via web cameras, microphones, and other communication tools. Video conferencing can enable individuals in distant locations to participate in meetings on short notice, with time and money savings. • E–commerce (electronic commerce or EC) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the Internet. • Social networking is the use of internet-based social media programs to make connections with friends, family, classmates, customers and clients. • Voicemail is a system of sending messages over the phone. Calls are answered by a machine which connects you to the person you want to leave a message for, and they canlisten to their messages later. • Email is short for 'electronic mail' similar to a letter, it is sent via the internet to a recipient • An internet browser, also known as a web browser, is a software program that you can use to access the internet and view web pages on your computer. • A website is a collection of webpages. For example if there is a company that owns sricompany.com then this website will have several Webpages like Home, , Us, Testimonials, Products, Services, FAQ’s, and others. All of these pages together make up a Website. • Dongle refers to removable component used for enabling software protection. E.g. USB, WiFi • A webpage is a page of a Website. A web page can be accessed by a URL in a browser and that page can be copied and or send to a friend for review whereas websites are collections of multiple page that must be navigated to view other content. • E-commerce is the activity of buying or selling of products on online services or over the Internet. • Electronic governance or e-governance is the application of information and communication technology (ICT) for delivering government services.
23
Chapter 9 Pages 1-27.indd 23
02/08/18 2:41 PM
www.tn11th.in
Evaluation
PART – I Choose the correct answer: 1.
What is the expansion of WLAN? a)Wireless Local Area Network c) Wireless Local Area Netware
b) Wired local Area Network d) Wireless Area Netbande
2.
Range of Campus Network is a) 10 KM b) 5 KM
c) 25 KM
d) 20 KM
3.
Each computer on net is called a) host b) server
c) workstation
d) node
4.
The internet is governed by a) ICANM b) ICANN
c) ICMA
d) ICNNA
5.
Expansion of W3C a) World Wide Web Consortium c) World Web Wide Consortium
b) Wide World Web Consortium d) World Wide Web Consortum
6.
W3C was established in 1994 by a) Tim Berners-Lee c) Kim Berners
b) Tim Burnard Lee d) Kim Bernard Lee
7.
Hotspot uses which type of network services? a) LAN b) PAN c) WLAN
d) CAN
8.
USB WiFi adapters are often called as a) Data Card b) Pen Drive
d) Memory Card
9.
Looking for information on the internet is called a) Surfing b) Searching c) Finding
d) glancing
10.
Safari web browser was developed by a) Google b) Apple
d) Linux Corpn.
11.
How many types of websites are available? a) 3 b) 2 c) 4 d) 6
c) Dongles
c) Microsoft
24
Chapter 9 Pages 1-27.indd 24
02/08/18 2:41 PM
www.tn11th.in PART –II Answer to the following questions (2 Marks): 1. List any four types of available networks? 2. Name the two important protocols for internet? 3. What is a network? 4. What is the role of ICANN ? 5. What is a search engine? 6. What is a browser? 7. What are the components of url addressing ? 8. What is a website? 9. What is CC and BCC in an email? 10. What is a Static web Page? 11. What is a Dynamic web page? 12. What are the benefits of e-governance? 13. What is Phishing ? PART-III Answer to the following questions (3 Marks): 1. Differentiate PAN and CAN network. 2. What is T/IP ? 3. Write a note on Hotspot internet service. 4. Differentiate Data Card and Dongles. 5. Write a note on two access methods of connecting to internet. 6. Differentiate browser and a search engine with suitable examples. 7. Differentiate Website and Webpage. 8. What is the difference between Static and dynamic web page. 9. Write a note on W3C? 10. What are Advantages of email. PART IV Answer to the following questions (5 Marks): 1. Compare the different geographical types of Network. 2. Explain any five types of internet services. 3. Explain any five internet applications with suitable examples. 4. Write a note on any five Internet browsers other than that given in the book.an 5. Classify and explain any five e-commerce parties with suitable examples. 6. Explain the different types of interactions in e-governance. 25
Chapter 9 Pages 1-27.indd 25
02/08/18 2:41 PM
www.tn11th.in 7.
Explain the do’s and don’t of safe surfing on internet. Activity
Student Activity Explain the different types of network. Mention a few internet services you know. Mention a few Internet Applications other than that is given in the textbook List some browsers not given in the text book Teacher Activity Students is taught to develop Static and Dynamic Websites as workshop.
GLOSSARY No.
Acronym
Description
1
LAN
Local Area Network
2
MAN
Metropolitan Area Network
3
WAN
Wide Area Network
4
PAN
Personal Area Network
5
CAN
Campus Area Network
6
WLAN
Wireless Local Area Network
7
VSNL
Videsh Sanchar Nigam Ltd
8
T
Transmission Control Protocol
9
IP
Internet Protocol
10
Host
A host is a computer connected to a computer network
11
ICANN
Internet Corporation for Assigned Names and Numbers
12
W3C
World Wide Web Consortium
13
WWW
World Wide Web
14
Tim Berners-Lee
Creator of WWW
15
DSL
Digital Subscriber Line
16
ISDN
Integrated Services Digital Network
17
URL
Uniform Resource Locator
18
Dongle
A sbmall device able to be connected to and used with a computer, allowing access to wireless broadband or use of protected software. 26
Chapter 9 Pages 1-27.indd 26
02/08/18 2:41 PM
www.tn11th.in
19
ADSL
Asymmetric Digital Subscriber Line
20
Browser
21
Search Engine
22
SERP.
The list of content returned via a search engine to a is known as a search engine results page.
23
Phishing
Phishing scams are fraudulent attempts by cybercriminals to obtain private information
24
WebSite
Collection of Webpages
25
WebPage
It is page of Website.
26
EDI
Electronic Data Interchange
27
ICT
Information and Communication Technology
28
SID
Safer Internet Day. February every year.
29
Voice mail
System of sending messages over the phone.
30
e-commerce
Electronic Commerce, Buying and selling goods and services over an electronic network.
31
e-governance
Electronic governance. Application of information and communication technology for delivering government services.
32
Internet
Several networks, small and big all over the world, are connected together to form a Global network called the internet.
33
Intranet
It is a website used by organizations to provide a place where employees can access company related information.
34
Extranet
It is a private network using internet technology to share part of business information with suppliers partners and customers.
A browseris software that is used to access the internet Eg. Chrome, FireFox A search engine is a web-based tool that enables s to locate information on WWW. Eg. Google
References: 1. Mastering HTML, CSS & JavaScript Web Publishing – Laura Lemay, Rafe Colburn, Jennifer Kyrnin – BPB Publications. 2. Informatics Practices, A text book for CBSE class XII – Sumita Arora – Dhanpat Rai & Co.
27
Chapter 9 Pages 1-27.indd 27
02/08/18 2:41 PM
www.tn11th.in
Unit III
Web Page Development using HTML, and CSS
CHAPTER
10
HTML - Structural Tags
Learning Objectives:
HTML was originally derived from SGML (Standard Generalized Markup Language) a larger, complicated document processing language. To learn HTML, no need to know about SGML.
The students will learn the following: • How to create web pages using HTML. • What are the various structural tags available to create an HTML document. • What are the various page formatting tags available and how to use them.
10.1 Introduction to HTML
10.2 Writing HTML document
In the previous sections you learnt about Internet and web pages, whatever you have seen on the web is a document written in HTML (Hyper Text Markup Language). HTML is a special markup language used to create web pages. This language tells the browsers, how to display the text, images, animations and other contents of a hypertext document on the screen. The language also tells how to make a document interactive through special hyper links.
HTML is a markup language. Writing in a markup language is very simple, directly you start the text of your web document and add special tags around words and paragraphs. The tags are coded by HTML commands or keywords that indicate how web browser should format and display the content. HTML is made up of tags and its attributes. Tags are known as elements of HTML. Additional information such as colour, alignment etc., can be included with an HTML tag is known as attribute. Attributes are used to improve the appearance of an HTML document. You cannot create your own tags to create a new style or feature.
HTML is not a word processing tool or a programming language. It is only a markup or page layout and hyperlink specification language. It describes the structure of a document.
28
Chapter 10 Pages 28-53.indd 28
02/08/18 2:42 PM
www.tn11th.in All HTML tags should be specified within angle brackets (< >). For example, is a tag. HTML is not case sensitive that means you can write an HTML tag in lower case or in upper case (Small letter or Capital letter). Browser treats both of them in the same manner. For example, you can write as ; both are same. 10.2.1 HTML Document Structure An HTML document contains the text of the page itself and HTML tags, which defined the structure and appearance of the document. It also contains hyperlinks to other pages or to include multimedia elements such as audio, video, animations etc. Entire HTML document is bounded within a pair of and