Important Announcement
PubHTML5 Scheduled Server Maintenance on (GMT) Sunday, June 26th, 2:00 am - 8:00 am.
PubHTML5 site will be inoperative during the times indicated!

Home Explore Flipp Book Class-8 new1

Flipp Book Class-8 new1

Published by Memorica Graphics, 2021-03-11 10:26:05

Description: Flipp Book Class-8 new1

Search

Read the Text Version

Lab Project Work 1. Open the outer sketch image from the exercise files folder and fill the color as second image. 2. Open the first image from the exercise files folder and change the background second image. 3. Open the first image from the exercise files folder and make blur as the second image. 4. Open the first image from the exercise files folder and edit the as second im- ages using Sharpen Tool. Smart Computer Science Book-8 245

Lab Project Work 1. Prepare the cover page for the project work as given below 246 More on Photoshop

CHAPTER ICT, Ethics & Cyber Law 10 Juna : wow, what a magic ! we can communicate This chapter includes: among the people with chatting, video calling, • Introduction of Infor- messaging, sending e- mation, Communica- mail, tion & Technology Muna : Yes, because of develop- • Uses of ICT ment in the ICT. • Computer Ethics , Computer Crime & Cyber Law • Computer Virus Juna : Beside of the communi- cation, where is ICt used ? Muna : Every step of life ICT is used such in education, business, securities, health, banking, etc. Juna : Are there any challenges with the use of ICT? Muna : Of course! We must be aware and maintain the ethical code of conduct. Lets, we discuss in detail about this in this chapter. INFORMATION ICT Stands for \"Information and Communication Technologies.\" Information commonly refers collection or preparation of such type of data which gives particular meaning that we can understand easily. It is made ready to share with each other. Information is prepared with manually or using the Informa- tion processing technology which includes computer and other different types Smart Computer Science Book-8 247

of accessories. The technology which is used to prepare the information to share and broadcast within two or more people is called IT (Information Tech- nology). Commonly Information technology includes computing and broad- casting technology. The common Information Technology process of prepar- ing the Information can be illustrated as: Input Process Output Information Store Information Share Information COMMUNICATION Communication refers to share the information with each other using the com- munication network channel. There are varieties of new technology in the communication network channel such as radio, TV (Television), Postal Ser- vice, News paper, E-mail, Internet, Computer Network, Telecommunication system(Telephone, Cellular phone), etc. COMMUNICATION TECHNOLOGY Technology refers to method and idea used for preparing and broadcasting the in- formation with each other across the Globe. Such as, Tele-communication technol- ogy, Computer Network Technology (E-mail & Internet, Video conferencing, Chatting) Radio and Television, News Paper, Electronic document published in Web site, etc. 248 ICT, Ethics & Cyber Law

WHAT IS ICT? So, in the conclusion ICT (Information Communication Technology) is a combination of communication technologies that provides easy environment to access informa- tion through Communication Network channel. This includes the Internet, wireless networks, cell phones, radio, TV (Television), and other communication mediums. Using the ICT, people can communicate in real-time with others in different places such as instant messaging, telecommunication, video -conferences,etc. Social net- working web sites like Face book, Twitter allow users from all over the world to re- main in contact and communicate on a regular basis. Modern information and communication technologies have created a \"Global village\" in which people can communicate with others across the world as if they were living next door. Usages of ICT 249 ICT in Education: Now a days ICT is using in education sector. Using internet we can search a lot of study material. A lot of education material can be posted in the world Wide Web (WWW) which we can easily access and study. By looking television and news paper also we can extend our knowledge. In the school and colleg- es, teacher can use to tech ICT tools Smart Computer Science Book-8

such as computer, multimedia projector, audio video system, etc. In this way, ICT has introduced the easiest way of learning and teaching for both students and the teach- ers. ICT in business: Using ICT we can run the business by sitting in our own home. Using e-commerce, we can sell and buy products through out the internet and computer. Easily we can promote and ad- vertise of the product world wide using the ICT. ICT in Banking: ICT is making very easy for the banking system. We can withdraw money any time using ATM (Automatic Teller Machine). Using the modern ICT technology, Banks are giving the very fast and instant service such as SMS system, online transaction system, online opening bank account and purpose loan appli- cation, online transaction report, etc. ICT in communication: Using the ICT, now days communication is very easy, within a single click we can send and receive our e-mail. We perform online chatting and video conference , online messaging, telephony, etc. ICT in Security : ICT has introduced a lot of things which prevents people committing crime. CCTV camera, GPRS (General packet radio service sys- tem), using database for finding criminals' informa- tion are some unique thing which can not be pos- sible without the blessing of IT. Police uses GPRS to track someone's car,mobile phone if it has been stolen. Police uses CCTV camera to detect criminals' face. Fingerprint is another 250 ICT, Ethics & Cyber Law

especial method with which the police can identify the thieves. COMPUTER ETHICS Computer ethics are the standards of moral conduct to be followed by all of us for using various computer resources. Ethics are also required to maintain the system security. We must understand that unethical acts are always illegal and may cause harm to the security. Code of Computer Ethics We must understand our duties when using the computer as well as ICT. Each one of us must know the difference between right and wrong in order to be ethical. Some of the guide lines which are generally given in code of computer ethics are given below: • We must maintain the privacy and confidentiality of data documents maintained by us. • We should not access data meant for others. • We should not use pirated software. • We should not steal, destroy, and use work done by someone else. • We should not make changes in the data in any form without proper authentica- tion. • We should not disclose the secrecy of computer. • We should not spread false and illegal information. • You should not copy or use software for which you have not paid • You should not use a computer to steal. • You should not create computer virus and spread. COMPUTER VIRUS Computer virus is a computer program not living organism which enters the computer system by attaching itself to another program and then spreads it- self across the system. It is developed with the intention of destroying, damag- Smart Computer Science Book-8 251

ing, deleting the data and programs re- siding in the computer system and crash the storage device. Some viruses damage the files stored in your computer while others cause dam- age by simply replicating themselves. Virus enters computer very cleverly. Sometimes their presences is detected only after they have damaged. Some of the common computer virus names are Time Bomb, C-Brain, Logic Bomb, Aids, I Love You, etc. Who create Computer Virus? Unlike a biological viruses, computer virus do not simply evolve by them- selves. Computer viruses are created by programmers who want to show their programming skills and like to break into the computer systems or networks. Commonly, there are two types of people to break the computer system or networks: Hackers: Hackers refer to the people who use their skills to enter into com- puter system without authorization,and break into secure system to gain knowledge about them and possibly use this knowledge to play pranks. Crackers: Crackers are the malicious programmer who gains unauthorized access to computer system for the purpose of stealing, altering, or corrupting information. Types of computer Virus Macro Virus: Macro viruses are common computer virus which are designed to infect data files. These viruses spread by infecting documents and spread- sheets like a word or Excel file. The first Micro virus was written for Microsoft Word. File Infector: This is the most common type of virus designed to infect the root in host files and then begins its operation when the file is executed. These 252 ICT, Ethics & Cyber Law

viruses attache themselves to program files, usually having the .COM or Ex- tension files. Boot Sector Virus: These viruses are designed to infect the boot sector of the disk. When such virus infected the disk, it may have seemed to start up the computer or computer may not start up. Logic Bomb Virus: A logic bomb is a program that gets executed only when a specific condition is met. Example, The virus 'Friday the 13th' was so pro- gramed so as it to get executed on that particular date. Multiparti Virus: These viruses have common features of Boot sector virus and File infector virus. These viruses first infect the Boot sector of the hard drive and then infect executable file stored on disk. Stealth Virus : These viruses are very dangerous, which try to hide them- selves from Anti virus software by restoring to tricks. Stealth virus can falsely show an Anti-virus software that a certain file is uninfected. Network Virus: These viruses are designed to spread through the computer network. Other Harmful Programs There are other lots of small harmful programs developed which disturb to run the computer smoothly. Some of the common harmful programs are : a. Trojan Horse b. Worms Trojan Horse : It is a small harmful program file. It is harmless unless it has been executed in nature. It is very dangerous because it disguises itself as game or utility program but when started to execute; it can destroy data stored in the computer. Worms: Worms are also harmful small programs. These programs use com- puter network and security hole to spread itself. These programs also use the Internet to spread by e-mail programs. It attacks the address book of e-mail system then when you mail to other, it automatically replicates to other recipi- ents. Smart Computer Science Book-8 253

Means of Spreading Computer Virus A virus is usually passed through infected files of a disk and the Internet. The common means of spreading viruses are : a. Internet b. E-mail c. Disks (CD/ DVD/ Hard Disk) d. USB drive e. Pirated Software f. Blue tooth Symptoms of Computer Virus • Slow performance. • Take long to load programs. • Reduce the disk size suddenly. • Data files become corrupt or missing. • Programs may not run. • Disk drive light flashes constantly. • Display unusual matter on the screen. Safe Computing To protect your system against viruses you have to do the following: • Install good Anti-virus software on your computer. • Update the antivirus software regularly. • Be careful while downloading files or programs from the internet. • Always scan disk before using such as external hard disk, Flash disk, CDs, etc. • Do not use pirated software. • Turn on the Firewall of your computer operating system. Safe Guards of Computer Virus Antivirus Software : Antivirus is a computer program which works as a security guard of your computer system from virus and other harmful programs. Some of the common and popular anti virus program are Nortorn Antiviru, McAfee, Kaspersky, Quick Heal, etc. Fire Wall: A FireWall is a combination of hardware and software which protects a private network from being accessed by run unauthorized users. 254 ICT, Ethics & Cyber Law

COMPUTER CRIME Computer Crime refers to misuse of com- puter resources for unauthorized or illegal functions. Computer crimes include em- bezzling money by bank employees, un- authorized copying of software, unauthor- ized modification of data, malfunctioning of computer, creating and spreading com- puter virus, unauthorized downloading, leak-aging and hacking data and per- forming other illegal functions for causing harms to computer. CYBER LAW Cyber law is the part of the overall le- gal provision that deals with the Internet, cyberspace, and their respective legal issues. Cyber law covers a fairly broad area, encompassing several subtopics including freedom of expression, access to and usage of the Internet, and online privacy. So, cyber law has been referred to as the Law of the Internet or WWW (World Wide Web) Cyber law includes a wide variety of legal issues related to the use of com- munication technology, such as the use of Internet as well as any other form of computer, digital processing and related devices. The major components included in the cyber law are: • Electronic and Digital Signature Law • Computer Crime/Cyber Crime Law • Intellectual Property Law • Data Protection and Privacy Law • Telecommunication Law Smart Computer Science Book-8 255

Points to Know • Master page is as like as a background that you can quickly apply to many pages. • Information commonly refers to collection or preparation of such type of data which gives particular meaning that we can understand easily. • Communication refers to share the information with each other using the com- munication network channel. • Technology refers to method and idea to prepare and broadcasting the infor- mation with each other across the Globe. • ICT is a combination of communication technologies that provides easy en- vironment to access information through Communication Network channel. • Common application fields of ICT are Education, business, banking, communication,Security. • Computer ethics are the standards of moral conduct to be followed by all of us for using various computer resources. • Computer virus is a computer program not living organism which enters the computer system by attaching itself to another program . • Computer viruses are created by programmers who want to show their pro- gramming skills and like to break into the computer systems or networks. • Antivirus is a computer program which works as a security guard of your com- puter system. • Computer Crime refers to misuse of computer resources for unauthorized or illegal functions. • Cyber law is the part of the overall legal provision that deals with the Internet, cyberspace, and their respective legal issues. • Cyber law includes a wide variety of legal issues related to the use of com- munication technology. 256 ICT, Ethics & Cyber Law

Terms to Know Information : Meaningful result. Communication : Sharing and receiving information within the two or more people. Technology : New method, idea or principle to conduct the any system. Computer Virus : Harmful computer programs. Ethics : Moral conduct to be followed by all of us. Computer crime : Misuse of computer resources for illegal functions. Boot : Start up the computer. Boot Sector : Place of the disk where files needed to startup the computers are stored. Worksheet Objective Questions 1. Fill in the blanks: a. ............................ refers to share the information with each other. b. ........................................ refers to new method and idea prepare and broadcasting information. c. ............................. is a combination of communication technology. d. Computer ethics are the ............................... of moral conduct. e. ...................................... ............................ is not a living organism. f. Computer Virus is created by ........................................... g. Crackers are the ........................................ program. h. ........................................ works as security guard. i. Computer .............................. refers to misuse of computer resources for unauthorized function. j. A ................................. protects private network being infected by virus. Smart Computer Science Book-8 257

2. State wether the following statements are true or false. a. Information is a processes result which is ready to share with each other. b. We must not maintain the privacy and confidentiality of data. c. Computer virus is as like as biological virus. d. Multiparti virus has common features of boot sectors virus and file infector virus. e. Antivirus software could not detect the stealth virus. f. Worms uses computer network and security hole to spread itself. g. Trojan horse disguised itself as game or utility program. h. Firewall is an anti virus software. i. Cyber Law is a Law of the internet. 3. Choose the correct option: a. Cyber Law includes: ii) Data Privacy Law i) Digitial Signature Law iv) All of these iii) Cyber Crime Law b. Which is not Antivirus Software? ii) McAfee i) Firewall iv) Kaspersky iii) Quick Heal c. The Common means of spreading Virus: i) Internet ii) Pirated Software iii) USB Drive iv) All of them d. Which is not symptoms of computer Virus ? i) Slow Performance ii) Data files missing iii) Increase disk size suddenly iv) All of these 258 ICT, Ethics & Cyber Law

e. Which is not included in ICT ? ii) Internet i) Postal Service iv) Wireless network iii) Cell Phone f. Where should not use ICT? ii) Business i) Education iv) Communication iii) Fraud Activities g. Which does not include in the code of computer ethics? i) Pirating Software ii) Spread illegal Information iii) Access other's information iv) Publish knowledge base information Descriptive Questions 1. Answer the following questions: a. What is information? b. What is information technology? c. What is communication? Write the some example of communication technol- ogy. d. What do you mean by communication technology? e. What is ICT? f. What does ICT include? g. How does ICT make a global village to world? h. How is ICT used in education? i. How does ICT play the role of security? j. What is the role of ICT in business? k. What are the common computer ethics? l. Write any two codes of computer ethics. m. What is computer virus? n. Why is computer virus developed? o. What do you mean by hackers? Smart Computer Science Book-8 259

p. What do you mean by crackers? q. Write a characteristics of stealth virus. r. What do you mean by worms? s. What is Trojan horse? t. Write any three means of spreading computer virus? u. Write the any three ways to perform the safe computing. v. What is antivirus software? w. What is Firewall? x. What do you mean by computer crime? y. What is Cyber Law? z. Why is Cyber Law needed? Analytical Case Study Questions: 1. Mahrshi School is going to setup the ICT base School. Now, School Man- agement wants to know the answer to the following questions: a. How will be the students benefited ? b. How is it easy and effective for teaching procedures for teachers ? c. How will be parents benefited ? 2. Shivani's Father is planing the business furnished with ICT. Now Shivani has to clear her father about the following matters: a. How can he sell his goods using ICT ? b. How can be reliable for the customers ? c. How may it increase the business of her father with the help of ICT ? 3. We have seen, now days ICT is using in the Banking System: a. How is it making easy for Banking System ? b. How do public feel a reliable and effective Banking System ? c. Are there any challenges for bank and public, If Yes, What types of challenges may occur ? 260 ICT, Ethics & Cyber Law

4. ICT is used in the securities: a. How do we public feel more secured with such securities system used ICT. b. How does it make more effective investigation for the police. c. Have you felt ICT based security system is applied in our countries? Illustrate with reliable examples. 5. ICT is an advance feature of communication: a. How is it reliable communication with this technology? b. Are you looking any challenges? What types of challenges may occur with the ICT based communication Technology? c. Have you heard any incident that occurred with the miss use of ICT based communi- cation? 6. Computer virus is a computer program. It is very harmful: a. What is the benefit for the virus creator? Why they develop it? b. Till date have you ever felt your computer is infected by virus ? Give the reliable illus- trations. Project -1 261 1. Prepare the Project work Report for awar- ing the public about use of ICT: Content: a. Background b. Beneficial Aspects. c. Harmful Aspects. d. Conclusion Project report should include the picture, interview, video for more informative to above title . Smart Computer Science Book-8

11Internet & Web Technology CHAPTER Juna : WOw ! Around the globe This chapter includes: we can communicate • Internet & Website and get the informa- • Fundamental of Web- tion just staying in a site. room. What a interesting Ma'am? • Features of Good Web- site • Create Web Page with HTML Muna : Yes, it's the contribution of the Internet . Juna : Using website, let's see, we can buy and sell goods. It is a magical. Muna : Apart from this, we can perform many activities using In- ternet and websites. Juna : How to make such websites? How is it possible ? Muna : Yes. In this chapter, we start to make website step by step. Lets follow me. INTERNET The internet is formed by the network of millions of computers all over the world. So, it is also called the largest network of computers or World Wide Net- work (WAN). In the short form internet is also called Net. Some of the major advantages of internet are : • It offers very fast communication. 262 Internet & Web Technology

• It is cost effective and inexpensive. • It is interactive (unlike one way broadcasting of TV or radio). • It provides huge amount of information. • It is available anywhere of the world. WEBSITE Web Technology is the most popular technology in the field of ICT(Information Com- munication Technology). Us- ing this technology, the world becomes very small. Most of the information stored in the Internet is managed in the same way as are pages in a book. These books are called websites. We can upload and download the informa- tion through the website. A complete website is actually stored under a file name in a certain amount of memory space allotted to an organization in a computer at a specific location. Such space is also called virtual space, where information about the specific per- son or organization is stored. The information is managed in the website in a single page or multiple pages, such page is known as the web pages. Like a book, each website has many pages. Websites usually include links to take you to other pages within the same site or else where. Such links are known as hyperlinks (links for short). A hyperlink can be a word, a line, an icon or a picture. Often hyperlinks are indicated by blue colored text; sometimes they are also underlined. Information can be copied from the Web to a personal computer which pro- cess is called downloading. Foe example, you can download songs, photos Smart Computer Science Book-8 263

and even whole books. In the similar way, information can also be copied from a personal computer to the Web is called uploading. There are websites that let you upload photos or videos. Some websites provide you storage space, where you can upload your document for safe keeping. Such docu- ments stored in the Web can be accessed from anywhere in the world. Features of good web page • It should not be too long • The information given should be precise and correct. • It should be interactive (hyperlinked) • It should have the correct mix of text, graphics and animation to hold the interest of reader. Home Page The first page of the website of any organization, person or information source is called home page. It is also index page. The home page has a lot of links to access other pages. Web Browser A web browser is a special communication program which allows your computer to ac- cess the resources on the Internet. You can access,download, upload information and view web pages with this program. Some popular Web browser are : Microsoft Internet Explorer, Goggle Chrome, Opera, Mozilz Firefox, etc. The first web browser was NCSA Mosiac,developed in National Center for Super Computing Application, USA in early 1990s. Uniform Resource Locator(URL) URL is the address or location of Web document or Website on the Internet which helps to access any website. Example of 264 Internet & Web Technology

URL are www.yahoo.com, www.goggle.com, www.ekantipur.com, www.nepal- news.com, etc. All the web sites are fixed with www (World Wide Web). The World Wide Web is a service of the Internet. Search Engine Often you need to search for some informa- tion on web. For example, you might want to learn about universe, read the history of com- puter, or might me looking for the complete statical record of your favorite cricketer. You can find all this on the Web. The World Wide Web (WWW) is consisted with millions of web pages of informations. It is very difficult to find the information in time you need. It may waste your time to search the information. But, many Web programs are developed which help us to search informa- tion in specific topic on the world wide web easily and quickly. Such programs are known as 'Search Engine'. google, Altavista, yahhoo are popular search engine website Search engines collect an index of important words called keywords or reserve words. These words are continually added by a special program known as the crawler. The crawler runs all over the world wide web collecting keywords from each and every site existing in WWW. The designer of website selects such words which best describes regarding his/her website and puts them under the main heading keywords. These keywords are not visible in normal view however recognized by the crawler and added to the index list of the search engine, which causes the websites links appears as a search results page. Search Education Material Using Goggle Step-1 : Double click on your browser. Step-2 : Type the URL of Google as www.goggle.com. Now, you get the Smart Computer Science Book-8 265

home page of the goggle. Universe Step-3 : Type the word 'Universe' in the search box of the goggle. Now, Goggle presents you with a list of results for the word you search. Step-4 : Now, just scroll down the page to see the results. If you find some- thing of your interest, click on it and you will get appropriate page. Trick & TIPS • Search words should be very specific and should match exactly what you are looking for, otherwise you will get a lot of unwanted page making you difficult to find your information and waste your time. About Hyper Text Markup Language (HTML) We can create web pages using variety of tools such as FrontPage, Dream- weaver, HTML (Hyper Text Markup Language). In this chapter we study about HTML to design the web pages. HTML is a markup language recommended by the W3C (World Wide Web Consortium) to develop the Websites. HTML was invented in 1990 by Tim Berners-Lee, a scientist at CERN, Switzerland, at the European Laboratory for Particle Physics. The main purpose was to make it easier for scientists of different Universities to share and exchange their research works through the web sites using the Internet. 266 Internet & Web Technology

Steps to create a Web Page Using HTML Step-1 : Open new document in 'Notepad'. Step-2 : Write the HTML command in the form of tags to create your web page. Step-3 : Save the file by giving it file name with extension .html (eg. test. html). Step-4 : Open the HTML file n the browser. Step-5 : The document will be displayed as a web page. Step-6 : The source of the web page can be seen by clicking on 'View- >source'. Step-7 : The Source can be modified if required. The text file should be saved after modification. Step-8 : To see the modified version of the web page, either press F5 or click Refresh button in the browser. ELEMENTS IN HTML DOCUMENT An HTML document is made up of text, headings, paragraphs, tables, horizontal lines, lists, form, etc. These are known as the Elements of an HTML document. Tags in HTML Page Tags are used to give a specific effect, for example, coloring a part of text or to make a part of text bold. Tags are enclosed within the less than < and greater than > sym- bols. Tags come in a pairs, one for opening and the other for closing. The example of opening tag is <body> and closing tag would look like </body>. There are two types of tags. Container Tags: The Container tags are used in pairs and have a starting and ending tag. These tags define how the matter contained within them should be formatted. For example, to make a line of text bold we should use the tags <b> ...............</b>. Empty Tags Empty tags have only a starting tag have only a starting tag. They give formatting constructs like line breaks <b>, horizontal rule <hr>, etc. Smart Computer Science Book-8 267

Structure of an HTML document The basic structure of any HTML document is as Follow: <html> <head> <title> This is the title of the page</title> </head> <body> This is where the contents of the page are to be written. </body> </html> TAGS AND THEIR USE HTML Tag This is the first tag of HTML which specifies the web page document. All the HTML pages are contained within the <html> and </html> tags. This tells the browser that the pages have been formatted in HTML. Syntax: <html> Content of Web page </html> HEAD Tag This tag section contains the introduction to the contents of the page. This tag include <title> tag along with title of the page and other information to help the search engine to identify the topics covered in the page. Syntax: <head> ..............</head> TITLE Tag The title of the web page is the most essential. This tag allows to add title of the web page document. This is written within the HEAD section which ap- 268 Internet & Web Technology

pears in the browser's title bar. The <title> tag uses only plain text. It does not support any other formatting, Syntax: <title> ......... <Title> Example: <html> <head> <title> Concept of HTML</title> </head> </html> BODY Tag This tag contained all the details of the web page. All the text content, picture, video, and links are contained in this section. All the formatted elements like font and color are defined in this section. Syntax: <body> Content of Web page </body> Example: <html> <head> <title>Introduction of HTML</title> </head> <body> HTML is a markup language recommended by the W3C (World Wide Web Consortium) to develop the Websites. HTML was invented in 1990 by Tim Berners-Lee, a scientist at CERN, Switzerland, at the European Laboratory for Particle Physics. The main purpose was to make it easier for scientists of different Universities to share and exchange their research works through the Smart Computer Science Book-8 269

web sites using the Internet. </body> </html> Heading Tag <hn> The heading tag is used to specify the headings in the web page. An HTML document can have six different levels or sizes of headings - h1 to h6. smaller suffix gives you a bigger size of heading. Syntax: <hn> Heading Text</hn> Where n is the size of the text. Example: <html> <head> <title>Example of Heading</title> </head> <body> <h1>This is a Heading1</h1> <h2>This is a Heading1</h1> <h3>This is a Heading1</h1> <h4>This is a Heading1</h1> 270 Internet & Web Technology

<h5>This is a Heading1</h1> <h6>This is a Heading1</h1> </body> </html> Paragraph Tag The Paragraph tag is used to create a paragraphs in a HTML document. It cre- ates line of space between two paragraphs. Align attributes is used with <p> tag. Align values are : left, right, center, justify. But HTML5 does not support. Syntax: <p attribute=value> Paragraph Text</p> Example: <html> <head> <title>Introduction of HTML</title> </head> <body> <p> HTML is a markup language recommended by the W3C (World Wide Web Consortium) to develop the Websites. HTML was invented in 1990 by Tim Berners-Lee, a scientist at CERN, Switzerland, at the European Laboratory for Particle Physics. </p> Smart Computer Science Book-8 271

<P alging=\"justify\"> The main purpose was to make it easier for scientists of different Universities to share and exchange their research works through the web sites using the Internet. </p> </body> </html> Line Break Tag <br> The Line break tag is used to insert a line break. It is a empty tag. If you want to display the text in the next line, you should use this tag. Syntax: <body> text <br> </body Example: <html> <head> <title>Example of Line break </title> </head> <body> Introduction of HTML <br> Concept of HTML <br> Advantages of HTML</br> </body> </html> 272 Internet & Web Technology

Horizontal Rule Tag <hr> The horizontal rule tag is an empty tag. It allows you to draw a a horizontal line in the web page. Syntax: <hr> Example: <html> <head> <title>Introduction of HTML</title> </head> <body> <h4>Introduction of HTML</h4> <hr> <p align=\"justify\"> HTML is a markup language recommended by the W3C (World Wide Web Con- sortium) to develop the Websites. HTML was invented in 1990 by Tim Berners-Lee, a scientist at CERN, Switzerland, at the European Laboratory for Particle Physics. </p> </body> </html> Smart Computer Science Book-8 273

Bold, Italic and Underline Tags BOLD <b> The BOLD tag is used to display the enclosed text in bold face. Syntax: <b> Text </b> ITALICS Tag <i> The ITALICS tag is used to display the enclose text in italics style. Syntax: <i> Text </i> UNDERLINE Tag The UNDERLINE tag is used to make underline to enclosed text. Syntax: <u> Text </u> Example: <html> <head> <title>Example of Bold, Italics and Underlie </title> </head> <body> <b>Introduction of HTML </b> <br> <i>Concept of HTML </i> <br> <u>Advantages of HTML</u> <br> </body> </html> 274 Internet & Web Technology

Lab Activities 1. Class VIII students have been as- signed a task to design a simple infor- mative website about own family. One of them Bibek Jhha has designed as given below. Now, to desigen as Bibek Jha, how would you proceed ? ATTRIBUTES Attributes are the optional commands which come inside a tags. Attributes always provides additional information about the element of web page. BODY Tag and its Attributes You can define several attributes with the BODY tag. Some of the BODY tag attributes are: Smart Computer Science Book-8 275

a. BGCOLOR attribute b. BACKGROUND attribute. c. Text attribute d. LEFT MARGIN attribute e. RIGHT MARGIN attribute. BGCOLOR Attribute The BGCOLOR Attribute allows you to set the desire color to the background of the web page. There are sixteen colors available for the background. 1. Black 2. Blue 3. Cyan 4. Magenta 5. Grey 6. Green 7. Lime 8. Navy 9. Olive 10. Purple 11. Purple 12. Red 13. Silver 14. Teal 15. White 16. Maroon Syntax: <body bgcolor = \"color name\"> Example: <html> <head> <title>Example of Body Color Attribute </title> </head> <body bgcolor =\"blue\"> <h3> Body bg color</h3> </body> </html> 276 Internet & Web Technology

Background Attribute You can also put keep the picture as a background of the web page. But you can not use both BGCOLOR and BACKGROUND attributes together. But if you are using HTML5, it doe not support BACKGROUND. Syntax: <body background = \"file name\"> Example: <html> <head> <title>Example of BACKGROUND Attribute </title> </head> <body background =\"liliy.jpg\"> </body> </html> Smart Computer Science Book-8 277

TEXT Attributes The Text Attribute is used set the color to the body text. All the texts in the HTML page appears in a single color. Syntax: <body text =\"color name\" Content of page </body> Example: <html> <head> <title>Example of TEXT Attribute </title> </head> <body text=\"blue\"> <h3> Introduction of TEXT Attributes</h3> <hr> <p> The TEXT Attribute is used to set the color to the body text. All the texts in the HTML page appears in a single color. </p> </body> </html> 278 Internet & Web Technology

FONT Tag and its Attributes The FONT is used to format a block of text. You can use FONT Tag attributes to change the font type, size and color of the text in a paragraph. Syntax: <font> Text Content </font> Attributes of FONT Tag FACE : It is used to specify the FONT type such as TIME NEW ROMAN, ARIAL, CALIBRI,etc. COLOR : It is used to specify the FONT color. SIZE : It is used to specify the size of the FONT. The number can be in the range of 1-7. The default size is 3. Syntax: <font face=\"Font Name\" color = \"Color Name\" size = \"Font Size\"> Text Content </font> Example: <html> <head> <title>Example of FONT Tag and Attribute </title> </head> <body> <font face=\"arial black\" color=\"red\" size=4> Introduction of HTML </font> </body> </html> Smart Computer Science Book-8 279

Nested Tag A Tag comes inside a tag is called nested Tag. When you design a web page, some times it needs to write nested tag. Syntax: <tag1 with its attribute> <tag2 with its attribute> Content </tag2> <tag1> Example: <html> <head> <title>Example of Nested Tag and Attribute </title> </head> <body bgcolor = \"blue\"> <font face=\"arial black\" color=\"red\"> <h3> Introduction of Nested Tag </h3> <font face=\"arial black\" color=\"white\"> <h4> Introduction of Nested Tag </h4> </font> </font> </body> </html> 280 Internet & Web Technology

IMAGE Tag <IMG> The IMG Tag is used to insert inline image in the Webpage. This Tag is an empty tag. IMG Tag has some attributes which are used to specify the source, height, width and alignment of the picture. Syntax: <IMG Attributes> IMG Tag Attributes SRC : It is used to identify the source of immage or location of the im- mage. Syntax : <img src = \"file name\"> ALIGN : It is used to align the image. Syntax : <img align = \"left\"/ \"right\"/ \"top\"/ \"bottom\"> Border : It is used to set the border to your image. The thickness of the bor- der varies from 1 to 10 pixels. Syntax : <img border = values of border thickness in pixel. HEIGHT : It is used to set the height of the images in pixels. Syntax : <img height = value of width in pixels> WEIDTH : It is used to set the width of the image in pixels. Syntax : <img width= values of width in pixels> Example: <html> <head> <title> Example of Adding image in web page</title> </head> <body> <h2>Picture</h2> <img src=\"hill_road.jpg\" align = \"right\" border = 4 height = 200 width = 300> </body> </html> Smart Computer Science Book-8 281

Trick & TIPS • If the image file is in the same location as the HTML file, you can simply type file name of image otherwise you have to type complete location of file. The background picture can be bmp, gif or jpg type. 282 Internet & Web Technology

Lab Activities 1. Prepare the following personal family information web design. Smart Computer Science Book-8 283

LIST Lists are used to group together related pieces of information so they are clearly associated with each other and easy to read. In HTML, we have differ- ent tags to create different types of lists. Some of the Common list are discuss in this chapter. Unoder List An unordered list is a collection of related items that have no special order or sequence. An unordered list starts with the <ul> tag. Each list item starts with the <li> tag. The list items will be marked with bullets (small black circles) by default. You can choose different unorder list marker with type attribute for <ul> tag like. a. Circle b. disc c. square Syntax: <ul type=markers> <li> information</li> ..................... </ul> Example: <!DOCTYPE html> <html> <head> <title> Example of unorder list</title> </head> <body> <h2>Unordered List with different Markers</h2> <ul type=\"disc\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ul> <ul type=\"circle\"> 284 Internet & Web Technology

<li>Coffee</li> <li>Tea</li> <li>Milk</li> </ul> <ul type=\"square\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ul> </body> </html> HTML Ordered Lists If you are required to put your items in a numbered list instead of bulleted, then HTML ordered list will be used. This list is created by using <ol> tag. The numbering starts at one and is incremented by one for each successive ordered list element tagged with <li>. The list items will be marked with num- bers by default. The type attribute of the <ol> tag defines the type of the list item marker: Type Attributes Type Description type=\"1\" The list items will be numbered with numbers (default) type=\"A\" The list items will be numbered with uppercase letters type=\"a\" The list items will be numbered with lowercase letters type=\"I\" The list items will be numbered with uppercase roman numbers type=\"i\" The list items will be numbered with lowercase Roman numbers Syntax: <Ol type=markers> <li> information</li> ..................... </ol> Smart Computer Science Book-8 285

Example : <html> <head> <title> Ordered list</title> </head> <body> <h2>Ordered List with different Markers</h2> <ol type=\"1\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ol> <ol type=\"A\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ol> <ol type=\"a\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ol> <ol type=\"I\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ol> <ol type=\"i\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ol> </body> </html> 286 Internet & Web Technology

Nested List A list created within a list is called nested list. Any type of list can be nested. Example: <html> <head> <title> Ordered list</title> </head> <body> <h2>Nested List</h2> <ol><b><u>Subjects</u></b> <li>English</li> <li>Computer</li> <li>Math</li> <ul> <li>Algebra</li> <li>Arithmetic</li> <li>Geometric</li> </ul> <li>Science</li> <ul> <li>Physics</li> <li>Chemistry</li> <li>Biology</li> </ul> </ol> </body> </html> Smart Computer Science Book-8 287

Lab Activities 1. Get the images from exercise files and Prepare the following web design for the Agriculture Firm. 288 Internet & Web Technology

Points to Know • The internet is formed by the network of millions of computers all over the worlds. So, it is also called the largest network of computers or World Wide Network (WAN). • Most of the information stored in the Internet is managed in the same way as are page in a books. These books are called website. • Websites usually include links to take you to other pages within the same site or else where. Such links are known as hyper links (links for short). • The first page of the website of any organization, person or information source is called home page. • A web browser is a special communication program which allows your com- puter to access the resources on the Internet. • URL is the address or location of Web document or Website on the Internet which helps to access any website. • Web programs which help us to search information in specific topic on the world wide web easily and quickly known as 'Search Engine'. google, Altavista, yahoo are popular search engine websites. • HTML is a markup language recommended by the W3C (World Wide Web Consortium) to develop the Websites. • An HTML document is made up of text, headings, paragraphs, tables, horizon- tal lines, lists, form, etc. which are called HTML elements. • Tags are used to give a specific effect, for example, coloring a part of text or to make a part of text bold. • The Container tags are used in pairs and have a starting and ending tag. • Empty tags have only a starting tag . Smart Computer Science Book-8 289

Terms to Know Internet : Largest computer network of the world. Website : Electronic page kept in world wide web under a file name. Hyperlink : Link helps to connect another page of website. Upload : Put the information from personal computer to internet. Download : Get the information from interment to personal computer. Keyword : Main word gives best description of information. Tag : HTML command written within the angular bracket. Worksheet Objective Questions 1. Fill in the blanks: a. The ........................ is formed by the network of millions of computers all over the world. b. ............................ is a markup language. c. ............................ tags have starting and ending tag. d. ............................ tag insert line break. e. ............................... tag draw the horizontal line. f. The .................... tag used to format a block of text. g. ............................ software is needed to view the HTML page. h. ............................. tag contained all the details of the web page. i. .............................. tag contains the introduction to the contents of the page. j. .......................... used to keep the inline picture of the web page. k. ..................................... always provides additional information about the ele- ment of web page. 290 Internet & Web Technology

2. State wether the following statements are true or false. a. Chrome is a browser software. b. Tags are case sensitive. c. <b> is an empty tag. d. There are six levels of heading. e. <body> tag appears after the <title> tag. f. A tag within the tag is called nested tag. g. TEXT attributes is used to set the color to the body. h. BCKGROUND attribute is comes with <body> tag. i. There are sixteen types of color for body background of the web page. j. Paragraph tag creates a line space between two paragraph. k. <p> tag is a paired tag. l. Heading tag always followed by suffix values ranges from 1 to 6. 3. Choose the correct option: a. Font Attribute change the: i) Type ii) Color iii) Size iv) All of these b. Which is not feature of good website ? i) Should not be long ii) Should be interactive iii) Should be only Text iv) All of these c. Which tag is written in the top of the HTML document ? i) <body> ii) <title> iii) <head> iv) <html> Smart Computer Science Book-8 291

d. Which is not <img> tag attribute ? i) src ii) border iii) length iv) All of these e. Which is empty tag ? i) <br> ii) <hr> iii) <img> iv) align f. How many heading level are there in HTML ? i) Six ii) Four iii) Five iv) None of these g. Heading of information is defined by ? i) <head> ii) <h> iii) <title> iv) None of these h. Which is first web browser ? i) Internet Explorer ii) Google Chrome iii) NCSA Mosiac iv) None of these Discursive Questions: 1. Answer the following questions: a. What is internet? b. What do you mean by website? c. What is web page? d. What is hyper link? e. Differentiate between uploading and downloading? f. What is web browser? g. What is search engine? h. What is the purpose of development of HTML? i. Differentiate between container tag and empty tag. j. Differentiate between tag and attribute. 292 Internet & Web Technology

Analytical Case Study Questions: 1. Observe the following web page and answer the following questions : a. Which tag is used to separate the paragraph ? Give reason. b. How do you add spaces between these two paragraphs ? c. Which alignment value is used ? d. Write the complete code for this 2. Vishakha Koirala wants to simple web page about her school. She wants to set the background image and body text color: a. Name the property to set the background image ? b. She wrote the code to set body color blue. But she could not get the result. ? <body text=blue> c. She create a unorder list or the list of activities, but she forget to define the attribute type. Is she get result ? If yes. What type of list marker type she get. 3. Observe the following code and answer the following question : <ol type=\"1\"> <li>Coffee</li> <li>Tea</li> <li>Milk</li> </ol> a. Write the output . Smart Computer Science Book-8 293

b. If you remove the code type=\"1\" what does make it difference in the output c. Rewrite the code to display list with capital roman list markers. 4. Observe the following code and answer the given questions : <ul> <li>Physics</li> <li>Chemistry</li> <li>Biology</li> </ul> a. Write the output ? b. If you remove the code type=\"dic\" what does make it difference in the output c. Rewrite the code to display list with circle list markers. 5. Study the following code and answer the given questions: <html> <head> <title> Example of Adding image in web page</title> </head> <body <img src=\"hill_road.jpg\" </body> </html> a. Do you get output ? If no, give appropriate reason. b. if you set the dimension of the image, what modification is required ? c. According to this code, is your image and HTML file is in the same location ? d. If your image is in the XYZ folder of D drive but HTML file is not existing in another place. What modification is required ? 6. Bandita Tripathi has to design a small personal introduction web page. She has to set the font and formatting attributes: a. What are the font attributes? b. What are the common formatting tags c. What is the default size and range of font size value ? 294 Internet & Web Technology


Like this book? You can publish your book online for free in a few minutes!
Create your own flipbook