12 Ict-X
12 Ict-X
12 Ict-X
and Computer
Technology
ClassX
Printed By :
U
Ug
U, U , U v- U U ,
U S U
, U U ,
U, , ,
U U S,
cU U U
U
U U
wU UcU U U
U U
U UU U w{ U, v~y~ mU ,
U U U
v. ( ) , v~|{ U w mU (x.v.v~||) - U S U S
w. ( ) , v~|{ U w mU (x.v.v~||) UcU S U S
y
zv . - U U U U U
() U U U Z, S, UcU U UcU U U;
() S UU UcU U U U Z NU U U U U;
() U , U U U U U U U;
() U U U U U UcU U;
() U U U U , U U U
U U, U S L U;
() UU S U UU U U U U U;
(U) U , , , U U, U U U U U
U;
() cU, U U U;
() U U U U U UU;
() U U U U U U UcU UU U U
U U U ;
v(U) - U U, UU U , S,
U U
v. (U ) , w mU S
THE CONSTITUTION OF INDIA
PREAMBLE
We the people of India, having solemnly resolved to constitute India into a 1Sovereign
Socialist Secular Democratic Republic and to secure to all its citizens:
Justice, social, economic and political;
Liberty of thought, expression, belief, faith and worship;
Equality of status and of opportunity; and to promote among them all
Fraternity assuring the dignity of the individual and the2 unity and integrity of the Nation;
In our constituent assembly this twenty-sixth day of November, 1949, to hereby
adopt, enact and give to ourselves this constitution.
1. S ubs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for Sovereign Democratic Republic
(w.e.f.. 3.1.1977)
2. Subs, by the Constitution (Forty-Second Amendment) Act. 1976, sec. 2, for Unity of the Nation (w.e.f.. 3.1.1977)
Chapter IV A
Fundamental Duties
Article 51A
Fundamental Duties: It shall be the duty of every citizen of India:
(a) to abide by the Constitution and respect its ideals and institutions, the National Flag and the
National Anthem;
(b) to cherish and follow the noble ideals which inspired our national struggle for freedom;
(c) to uphold and protect the sovereignty, unity and integrity of India;
(d) to defend the country and render national service when called upon to do so;
(e) to promote harmony and the spirit of common brotherhood amongst all the people of India
transcending religious, linguistic and regional or sectional diversities; to renounce practices
derogatory to the dignity of women;
(f) to value and preserve the rich heritage of our composite culture;
(g) to protect and improve the natural environment including forests, lake, rivers, wild life and to
have compassion for living creatures;
(h) to develop the scientific temper, humanism and the spirit of inquiry and reform;
(i) to safeguard public property and to abjure violence;
(j) to strive towards excellence in all spheres of individual and collective activity so that the nation
constantly rises to higher levels of endeavour and achievement;
1(k) to provide opportunities for education to his/her child or, as the case may be, ward between age
of 6 and 14 years.
In the 21st century, an ability to work with information and communication technologies
is becoming as essential to education, life and workplace success as reading, writing and
arithmetic.
In this century it has become mandatory that everyone must have a basic understanding of
ICT and must learn to make productive use of it, in-order to be good students and employable
workers.Hence it is necessary for teaching fraternity to make a conscious effort and devise
curriculum to impart valuable knowledge and skills required for computing and communications
devices i.e. software that operates them, applications that run on them and systems that are
built with them.
Be it e-learning, blended learning or distant learning ICT has completely penetrated in school
education and has brought a major transformation inteaching and learning process. It has
become an integral and indispensable part of modern education system.
Recognizing the potential value of ICT in education, CBSE wants to ensure proper integration
of ICT in schools and its use in pedagogy.
I am happy to release Information and communication Technology Book for Class X. I would
like to express my deep appreciation to the text book development team for their contribution.
Appreciation is also due to Dr. Sadhana Parashar, Prof. and Director (Academics, Research,
Training and Innovation) and Dr. KshipraVerma, Education Officer, CBSE in bringing out
this publication.
It is hoped that all students and teachers will benefit by making best use of this publication.
Their feedback will be highly appreciated for further improvement.
Vineet Joshi
Chairman
Acknowledgements
CBSE ADVISORS
Shri Vineet Joshi, Chairman, CBSE
Dr. Sadhana Parashar, Prof. & Director
(Academics, Research, Training and Innovation)
DEVELOPMENT TEAM
Ms. Anuradha Aggarwal, Lecturer, Sri Ram College of Commerce, Delhi University
Ms. Bhawana Garg, Tagore International, Vasant Vihar, Delhi
Ms. Kshipra Verma, Education Officer, CBSE, New Delhi.
Ms. Ritu Ranjan, Indrapastha International School, Paschim Vihar, New Delhi.
EDITORS
Ms. Anju Jhanji, DAV School, Gurgaon
Ms. Garima Gupta, DLDAV Public School, ND Block, Pitam Pura, New Delhi
Ms. Sutapa Sen, Consultant
MEMBER COORDINATOR
Ms. Kshipra Verma, Education Officer, CBSE, New Delhi.
Content
Foreword
Acknowledgement
Learning Objectives
By the end of this chapter, learner will be able to:
List five computer applications which are used on the daily basis.
Identify the different Input / Output devices.
Describe the process of changing data from input to output (The IPO cycle).
Explain the connectivity of devices through different kinds of ports.
Differentiate between primary and secondary memory.
State the purpose of different softwares.
Tabulate the difference between different types of computers according to their size and
processing capabilities.
Introduction
The computer is just a dead collection of plastic, silicon and metal until you press the
Power button. One little burst of electricity and it starts a string of events that puts life
and power into the machine. But, even at this stage, the computer is unaware of the
potential that it holds within itself. The computer, today, is a fundamental part of the
information age.
Initially, computers were developed to perform mathematical operations, but later on, they
were used to store the result of those operations, which with the time leads to the storage
of other data or information.
As we are talking about data and information, now we will learn what data is and what
is called as information?
A computer can be defined as an advanced electronic device that takes raw data as input
from the user. It uses a set of instructions (called program) to process the data and give
the result (output). The result can be used immediately or saved for future use.
Hardware is any part of the computer that has a physical structure that can be seen and
touched, though some may be so tiny that they are invisible to the naked eye.
Software is the instruction set that tells the computer how to perform tasks. Software is
intangible i.e., that cannot be seen and touched, but its effect is clearly defined.
Input devices, output devices, a system unit, storage devices, and communication devices
are all components of computer hardware.
Spindle
Slider (and Head) Case Mounting Holes
Actuator Arm
Actuator Axis
Ribbon Cable (attaches
Actuator
heads to Logic Board)
SCSI Interface Connector
Jumper
Jumper Pins Platters
Power Connector
3. Compact Disk Read Only Memory or CD-ROM is a read only or read-write disk.
It can store large amount of data which can be distributed to large number of users.
It is inexpensive and fast, but its access time is longer than that of magnetic disk.
There are two types of CDs: CD-R and CD-RW.
CD-R stands for Compact Disk Recordable which can store 700
MB of data, but only once.
CD-RW stands for Compact Disk ReWriteable which can read,
write and erase data as many times.
4. DVD, short for Digital Versatile Disc, is an optical storage disc similar
to CD-ROM, as this is double sided with dual layer disc and can hold
4.7 GB of data.
5. Blue-Ray Disks are used to store more than 25 GB of data with a very high speed
in less amount of time. A single layer of BD can store 13 hours of video where as
double layer BD can store more than 20 hours of video.
The heart of the computer system is the processor unit. It consists of the Arithmetic and
Logic Unit (ALU) which executes most computer operations (arithmetic and logical)
and the Control Unit which acts as the nerve centre that sends control signal to all other
units.
The control unit and ALU are usually many times faster than other devices connected to a
computer system. This enables a single processor to control a number of external devices
such as video terminals, magnetic tapes, disk memories, sensors, displays and mechanical
controllers, since they are much slower than the processor.
1.3. Memory
There are two categories of memory, primary memory and secondary memory (or external
memory).
Primary Memory is very fast as data and programs must be in the primary memory for
execution. Random Access Memory (RAM) and Read Only Memory (ROM) are both
primary memory.
Random Access Memory refers to memory that can be selected and used randomly. The
information stored here disappears the very moment the machine is turned off. It is also
referred to as volatile memory.
Read Only Memory is permanently built into the computer at the time of production.
The information from this memory can only be read and it is not possible to write fresh
Secondary Memory or Auxiliary Memory: The content on the RAM is erased when
electric power is switched off. So, it becomes necessary to store this data for future use,
somewhere else. Since, primary storage is expensive too; we need a relatively cheaper
form of backup storage which can store vast quantities of information. Thus, Secondary
Memory devices become an important part of the computer.
2. Software
A computer systems hardware must have software to function. There are two primary
types of softwares: Application software and Systems software.
Software
Application System
Whereas, at the same time, there are application softwares that are created to address
specific needs of a group of specialized users and are, therefore, known as tailored or
customized software to perform the required tasks in a specific manner. There are many
packaged softwares available, addressing specific needs of small or big groups of users.
You have a Tally or a QuickBooks to address a small businessmans accounting needs,
but it can also serve a large multinational company.
2.2.1 There are two categories of system software: operating systems and
system utilities.
The operating system, also referred to as the OS, is a computer program that manages all
the other programs on your computer, stores files in an organized manner, and coordinates
the use of the computer hardware such as the keyboard and mouse. The operating system
frees one from having to interact directly with the hardware other than clicking the
mouse button or pressing keys on the keyboard to complete tasks.
3. Computers Characteristics
Speed: A computer computes problems much faster than a human being.
Accuracy: With the high computation speed, computers are able to produce accurate
results. If the input is valid, only then correct output will be produced as computers follows
GIGO i.e. Garbage In Garbage Out principle.
No IQ: It is programmed to carry out tasks and performs exactly as instructed, since it
has no intelligence of its own.
Diligence: It can carry out tasks over and over again with exactly the same result every
time, and it does so without tiring.
Data Storage: Using different kinds of storage devices, it can store huge quantities of data
over long periods of time.
No Heuristics: As computer is a dumb machine, thus it never ever learns from its past
experiences.
4. Generations of Computers
The first electronic computer was designed and built at the University of Pennsylvania
based on vacuum tube technology.
Computers have been divided into five generations according to the development of
technologies used to fabricate the processors, memories and I/O units.
I Generation (1945 55) Bulky, vacuum based and costly, used assembly language
which was translated to machine level language for execution. These computers
were used mainly for scientific calculations. Examples: ENIAC, EDSAC, EDVAC,
UNIVAC.
III Generation (1965 75) Small Scale Integration and Medium Scale Integration
technology were implemented in CPU, I/O processors etc. Faster processors with
magnetic core memories that were later replaced by RAM and ROM. This is when
microprogramming was introduced as were operating system software. Database
management, multi-user application, online systems like closed loop process control,
airline reservation, interactive query systems, automatic industrial control, etc.
emerged during this period. Examples: System 360 Mainframe from IBM, PDP-8
Mini Computer from Digital Equipment Corporation.
5. Categories of Computers
Computers are classified into many categories depending upon their size, functioning and
processing capabilities.
Hybrid: Digital computers could not deal with very large numbers and so, a computer
with characteristics of both analog and digital was created which was known as Hybrid
computer.
5.2 According to the size, computers are classified into the following
categories
Palmtop, better known as Personal Digital Assistants (PDAs), are small, lightweight and
tightly integrated computers which usually do not have keyboards but rely on touch screen
technology for user-input.
Laptops and Notebooks are portable computers. They include a battery that provides
electrical backup for a period of time.
Personal computer (PC) is small in size and is designed for general use by a single
person.
Desktop computer is typically set up in a permanent location and is a PC that is not portable.
A desktop computer is a PC built for high performance and heavy workload. It helps in
faster rendering of complex graphics, provides power for computer intensive applications
and memory for large tasks. They are more reliable and have less downtime.
Micro-computers came into being with the invention of the micro-processor. They are
not so expensive. The personal computer is a micro-computer.
Mini computers provide more power than micro computers in terms of speed and
storage capacity. They are also less expensive. Their performance is also lower than that
of mainframes.
Mainframe computers can also process data at very high speeds, but less than that of
super computers. Normally, they are used in banking, airlines and railways etc. for their
applications.
6. Applications of Computers
Computers are used in almost all walks of life today. In medicine and health care, in
education and business, in the manufacturing and service industries, for science and
research; computers are the most important tool used by human beings.
Process (CPU)
Input Output
Memory
Take Ingredients:
Water, Sugar, Tea Leaves, Boil all the ingredients in
Tea is ready to serve
Milk a bowl & filter it
Computer monitors, on the other hand, are designed for RGB signals. Most digital video
devices, such as digital cameras and game machines, produce video in RGB format.
Therefore, the images look best when output is on a computer monitor. When output is
on a television, however, they look better in S-Video format than in composite format.
To use S-Video, the device sending the signals must support S-Video output and the device
receiving the signals must have an S-Video input jack. Then, you need a special S-Video
cable to connect the two devices.
Summary
1. Data is a collection of unprocessed facts, figures and symbols.
2. Information is a data that is organised, meaningful and useful. It helps in decision making
processes.
3. Hardware refers to the components that can be seen or touched. It comprises of input devices,
output devices, system units, storage devices and a communication devices.
4. Software is a set of instructions that tells the computer to perform the task.
5. Primary memory helps in the fast execution of the program and it compromises of RAM
and ROM.
6. Secondary memory is also known as Auxiliary Memory. It helps to store the data permanently
using available storage devices such as Hard Disk, DVD, USB, etc.
7. Operating system is a computer program that manages all other programs stored on the
computer.
8. IPO refers to input-process-output cycle which is followed by the computer system to achieve
the desired result.
9. Most keyboards attach to the PC via PS/2 connector or USB port.
10. Pointing device such as mouse is connected to the PC via a serial port, PS/2 mouse port or
USB port.
11. The process of decoding data that has been encrypted into secret format is called
decryption.
C. Lab Session
1. State whether the following statements are true or false
(a) The input device receives data in machine readable form
(b) The Arithmetic and Logic Unit and the Central Processing Unit are part of the Control
Unit
(c) The plotter is an input device
(d) RAM and the ROM storage is effected by the presence of electricity.
2. Justify the statement Computers are used only to collect data for science and research
as either true or false.
3. Tanya is working on a project in her school. For the same, she wants to store multimedia
information in a portable storage device. Her information is subject to change as per her
needs. Which storage device would you recommend? Why?
4. Prem Das is an editor and is currently working in a popular News House group. His job
includes writing stories and articles for his newspaper. For writing his documents, he uses
WordPad and Notepad, but is facing problems with the formatting of the document. He
is also not able to check the grammatical errors. Which type of software should he be
using and why?
5. Mr. Shivank works in a multinational company. He often has to travel in and out of the
country in order to complete his tasks. He wants to buy a computer that is portable
and can be easily carried overseas. Which kind of computer should he buy to store his
important information and data?
6. Where do you store the set of instructions that gets the computer ready to receive
instructions? Discuss the different tasks performed by the OS.
7. Without prior knowledge, a user cannot interact with the computer. Do you agree with
this statement? Justify your answer.
Learning Objectives
After learning this chapter learner will be able to:-
State the purpose of using Gimp software.
List the features of Gimp.
Use advance tools of Gimp for editing the images.
Align different objects placed in a Layer.
Create image by merging two or three images using Layers.
View the images in different dimensions using Perspective tool.
Apply different effects on image using Masking option.
Introduction
GIMP is called multi-platform photo manipulation tool. Since, GIMP is free software,
it is covered by the General Public License [GPL]. The GPL provides the users with the
freedom to access and alter the source code. In this chapter, you will learn advance tools
of Gimp used to give different projections to the image to get the desired result.
2. Tool box
The Basic tools were learnt in Class IX. Here we would learn some advanced tools.
Advanced GIMP 19
2.5 Perspective Tool
The Perspective Tool is used to view the images in different dimensions, of the active
layer content.
The Burn tool uses the current brush to darken the colors in your image.
3. S
teps to use the Tools stated above used in GIMP
are as follows
3.1 Move Tool [M]
The Move Tool is used to move layers, selections, paths or guides. It works also on
texts.
To use this tool simply click on the canvas and drag the selection to a desired location.
Note: Holding down the space bar changes the active tool to Move temporarily.
Layer
Selection
3.2 Move Tool Options Move
Path
Normally, tool options are displayed in a window attached Move:
Tool Toggle (Shift)
under the Toolbox as soon as you activate a tool. If they Pick a layer or guide
are not, you can access them from the image menu bar Move the active layer
through
Advanced GIMP 21
If Move is on Layer
Only the current Layer
will be moved.
If Move is on Selection
The selections outline will
be moved.
Align, By clicking on the tool icon: in the toolbox, By using Relative to:
First item
the Q keyboard shortcut.
These options seem to differ from the Related to options only by the possibility to
set an offset. This offset is the distance which will separate the selected layer(s) from
You can access this command from the image menubar through Image Scale Image.
Image Layer Colors Tools Filters Windows Help
Duplicate Ctrl+D
Mode
Transform
Canvas Size...
Fit Canvas to Layers
Fit Canvas to Selection
Print Size...
Scale Image...
Crop to Selection
Autocrop Image
Guides
Configure Grid...
Image Properties Atl+Return
Scale Layer
Scale Layer
Earthi.jpg-20 ([Earth] (imported))
Layer Size
Width: 1940
Height: 1941 px
1940 1940 pixels
300 ppi
Quality
Interpolation: Cubic
Advanced GIMP 23
3.6 Shear Tool [Shift + S]
Shear tool is used to shift one part of an image, a layer, a selection or a path to a direction
and the other part to the opposite direction. For instance, a horizontal shearing will shift
the upper part to the right and the lower part to the left.
Perspective
Perspective
horinajpg.115 (proeo) image
Transforamtion Matrix
1.00000 0.00000 0.00000
0.00000 1.00000 0.00000
0.00000 0.00000 1.00000
Advanced GIMP 25
3.10 Blend Tool [L]
The Blend tool creates a new color by gradually mixing multiple colours. This tool fills the
selected area with a gradient blend of the foreground and background colours. To make a
blend, drag the cursor in the direction you want the gradient to go, and release the mouse
button when you feel you have the right position and size of your blend. The softness of
the blend depends on how far you drag the cursor. The shorter the drag distance, the
sharper it will be.
Sharpen mode causes each pixel to become more different from its neighbours, it increases
contrast inside the brushstroke area.
Tool Options
Blur/Sharpen
Mode: Normal
Holding down the Ctrl key toggles between Blur and Opacity
sharpen. Dynamics
Untiltled
Dynamics Options
Smooth Stroke
Rate 50.0
Blurring can be useful if some element of your image stands out too much, and you would
like to soften it. If you want to blur a whole layer, or a large part of one, you will probably
be better off using one of the Blur Filters.
Advanced GIMP 27
In Sharpen mode, the tool works by increasing the contrast where the brush is applied.
Over-application of the tool will produce noise.
Using Ctrl with Shift, you can constrain the angle between two successive lines to vary
by steps of 15.
The Tool can also be called by clicking the tool icon or by using the Shift+D keyboard
shortcut.
Before using the Dodge Tool After using the Dodge Tool
Before using the Burn Tool After using the Burn Tool
4. Layers
In GIMP terminology, each individual transparency is called a layer.Layer provides a
variety of effects that change the appearance of the image. It allows you to work with one
element of an image without disturbing the others. Layers are the transparent sheets one
on top of the other. You can see through transparent areas of a layer to the layers below.
A new image in Gimp has a single layer. You can add a number of additional layers to
add different elements in an image.
Enter the information for a new layer; transparency is good for overlapping layers or
necessary for deleting portions of an image.
Advanced GIMP 29
Give the layer a name which will help you to identify it later, such as while changing the
background.
Mode: Normal
Layer name: Layer
Opacity 100.0
Width: 640
Lock:
Height: 400 px
Layer
Layer Fill Type
Background Foreground color
Background color
White
Transparency
Help OK Cancel
Mode: Normal
Opacity 100.0
Lock:
Layer
Edit Layer Attributes...
New Layer...
New from Visible
New Layer Group...
Duplicate Layer
Anchor Layer
Merge Down
Delete Layer
4.4Merging a Layer
To merge a layer,
[Untitled]-5.0 (RGB color, 1 layer) 640400 - GIMP *[Untitled]-5.0 (RGB color, 1 layer) 640400 - GIMP
File Edit Select View Image Layer Colors Tools Filters Windows Help File Edit Select View Image Layer Colors Tools Filters Windows Help
Toolbox Toolbox
Layers
Mode: Normal
Opacity 100.0
Lock:
earth.jpg
bridge.jpg
Layers
Mode: Normal
Opacity 100.0
Lock:
Layer
Edit Layer Attributes...
New Layer...
New from Visible
New Layer Group...
Duplicate Layer
Step 2: Right-click the layer and select merge down or merge Anchor Layer
Merge Down
visible option available in the drop-down menu. The Merge down Delete Layer
option merges the selected layer with the layer right below it, Layer Boundary Size...
Layer to Image Size
whereas the Merge visible option merges all the visible layers. Scale Layer...
Advanced GIMP 31
Step 3: Resultant image, after merging the two
layers.
You can access this command from the image menubar through Layer Scale Layer.
Stack
feeldesain-ferrari-
Mask
Transparency
feeldesain-ferrari-
Transform
Crop to Selection
Autocrop Layer
A Copy of your previous layer will be automatically made in the Layers tab.
5. Masking
The Mask is GIMPs way of showing the full structure of the selection. Mask also provides
the ability to interact with the selection in new, and substantially ways.Masking layers
(similar to the fusion mask in Photoshop)which allows you to work on layers with great
ease. With this method it is easy to edit corners without touching the layer.
Step 1. Click the small outlined button at the lower left of the image window to toggle
Quickmask on and off. The button switches between Quickmask mode, and marching
ants mode.
ants mode.
Selection Editor
Feather...
Sharpen
Shrink...
Advanced GIMP 33
By default the mask is shown in red, but you can change this if another mask colour is
more convenient.
Blue
Fill opacity: 50.0
Quick Maks
Edit Channel Attributes...
Help OK Cancel
New Channel...
Raise Channel
Lower Channel Set the settings and press OK
Duplicate Channel
Delete Channel
Channel to Selection
Add to Selection
Subtract from Selection
Intersect with Selection
R 0
G 144
B 255
A 50
Current:
Old:
Advanced GIMP 35
Exercise
A. Multiple choice questions
1. _________ tool helps you to add a new layer to the image which is identical copy of the
active layer.
(a) Smudge Tool (b) Dodge Tool
(c) Perspective Tool (d) Duplicate Layer
2. By default the mask is shown in ______, but you can change this if another mask colour
is more convenient.
(a) Red (b) Blue
(c) Green (d) No colour
3. In _________ mode, the selection is shown as a translucent screen overlying -the image,
whose transparency at each pixel indicates the degree to which that pixel is selected.
(a) Default (b) Quickmask
(c) Marching ants (d) Normal
4. __________ are the transparent sheets one on top of the other.
(a) Masking (b) Tools
(c) Layers (d) None of the above
5. By default the extension of Gimp file is ______
(a) .XCf (b) .BMP
(c) .TIFF (d) .PNG
6. GPL stands for
(a) General Private license (b) Great Pioneer License
(c) General Public Limited (d) General Public License
7. The image loses some of its quality by being _______
(a) Scaled (b) Merging (c) Renaming (d) Masking
8. _______
(a) Adobe (b) Gimp (c) After Effects (d) Paint Shop Pro X5
9. In _______ mode, over-application of the tool will produce noise.
(a) Sharpen (b) Blur (c) Dodge (d) Smudging
10. ________ takes colour in passing and uses it to mix it to the next colours it meets.
(a) Sharpen (b) Blur (c) Dodge (d) Smudging
Advanced GIMP 37
3. Rudraksh has to send his photograph to the passport office for the processing of his
Passport but his photograph clicked by the photographer is very dark due to insufficient
light. Help him lighten the colour pixel of his photograph as per the requirement.
4. Geetanjali has got a project work in she has been given two images, where one image
depicts a girl walking on the grass and other one depicts an ocean. Now she has to
project as if the girl is walking on the water surface. Suggest her the way to accomplish
the task.
5. Avni wants to change her coloured photograph into white/black photograph along with
the borders and corners of the image without affecting the original image. Help her to
do the same.
6. Bhuvi is working on her social science project work. She wants to add the image of the
Minister but the image is not in the required direction. She needs the mirror image of
the photograph. Suggest her the tool to perform the task.
7. Mohit has got a hazy image. He wants to increase the contrast of the image. Suggest him
the tool to complete the task.
8. Vasu has inserted an image in a new file. He wants to duplicate the image on the same
layer. Suggest him the tool which will fulfil his requirement.
E. Lab Session
1. Collect the photographs of your family members and make a
collage of the same. Design a Birthday card for your friend.
(a) Add image of a flower and text to the card
(b) Fill the background with the texture format
3. Make a collage depicting the different seasons such as Rainy, Summer, Autumn, Winter.
Transform an image using perspective tool.
Learning Objectives
By the end of this chapter, learner will be able to:
Describes the various uses of the TABLE tag and its sub elements in HTML.
Recognize the different attributes of each tag for each of the TABLE elements.
Use the TABLE and its sub elements to create web layout.
Given a design use appropriate tabs from the TABLE group.
Use Frames in the HTML page to divide the browser into different sections.
Display data in a tabular form using table tag.
Introduction
The data on the webpage can be represented in tabular form. In HTML the format can
be defined using <TABLE > tag.
The <TABLE > tag arranges the data items on the web page in rows and columns. The
basic syntax of table tag along with the attributes is given as under:
The TABLE Element (<TABLE >) represents data in two or more dimensions.
<body>
<TABLE border =number
align= left/right/center
width= number%
bgcolor= NameOfColor
background= addressOfTheFile
bordercolor= #hexadecimalNumberOfColour>
<TR>
<TD> text 1</TD>
<TD> text 2</TD>
</TR>
</TABLE>
</body>
Tables 39
1. Structure of <Table> tag
The structure of table is formed using the Table tag.
The data in the cells of the rows are inserted using either the TH tag or the TD tag. The
TH tag encloses the Header object and makes the data boldface and center aligned. The
TD keeps the data in regular font and left aligned by default. The TH and TD tags are
nested inside the TR tag and the TR tag in turn is nested within the TABLE tag.
1.1. The attributes of table tag are discussed below one by one
1.1.1. Border
This attribute is used to insert the lines on four sides of the table. The inside lines shows
the rows and columns of the table and the outside lines displays the dimensions of the
table. This attribute takes the value as a number starting from 1 to any number. The value
one displays one pixel line on inside and outside of the table. However, the value larger
than one only thickens the outer lines (giving a 3D effect) leaving the inside lines to one
pixel point. When this attribute is omitted, neither inside nor outside lines are visible. Let
us take the 3 cases one by one:
Case 1.1: The border attribute takes the value one, results in both inside and outside
border.
In the above code, the attribute border takes the value as one. This displays both the
inside and outside border of one point. The table row is formed using <TR> tag and the
<TD> tag helps in inserting the text thin bordered cell in the cells of the rows and
columns of the table. The code produces the output in figure 1.
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border = 1>
<TR>
<TD> thin bordered cell 1</TD>
<TD> thin bordered cell 2</TD>
</TR>
<TR>
C:\Users\HP\Music
File Edit View Favorites Tools Help
Figure 1
Case 1.2: If the value is taken to be as high as 40, the outer border width changes.
The table tag uses the border attribute with the value 40. This increases the length and the
height of the entire table. The outside border thickens, giving the table a 3D effect. The
<TR> tag defines the rows of the table and the <TD> tag is used to insert thick bordered
cell in each of the cells of the two rows as shown in the output figure 2.
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border = 40>
<TR>
<TD> thick bordered cell 1</TD>
<TD> thick bordered cell 2</TD>
</TR>
<TR>
<TD> thick bordered cell 3</TD>
<TD> thick bordered cell 4</TD>
</TR>
</TABLE>
</BODY>
</HTML>
Tables 41
Output produced by the above HTML code:
C:\Users\HP\Music C:\Users\HP\Music\D
File Edit View Favorites Tools Help
Figure 2
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE >
<TR>
<TH> no border cell 1</TH>
<TH> no border cell 2</TH>
</TR>
<TR>
<TD> no border cell 3</TD>
<TD> no border cell 4</TD>
</TR>
</TABLE>
</BODY>
</HTML>
The output from the above code is shown in figure 3. The table is shown without the
inside and outside border. Also, note in the output that the data in the first row is bolder
C:\Users\HP\Music
File Edit View Favorites Tools Help
Figure 3
1.1.2. Align
The align attribute helps in placing the table on the webpage. If you want to place it in
the center of the webpage, use the center value, for right side use right and for the left
side of the web page, the value left. If you omit this attribute in the <TABLE > tag, the
table will be placed at its default position which is usually left.
Case 2.1: The following code assigns the value center to the align attribute.
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE Border = 1 Align=Center>
<TR>
<TD> center aligned1</TD>
<TD> center aligned2</TD>
</TR>
<TR>
<TD> center aligned3</TD>
<TD> center aligned4</TD>
</TR>
</TABLE>
</BODY>
</HTML>
Tables 43
The output from the above code positions the table in the center of the web page as
below:
C:\Users\HP\Music C:\Users\HP\Music\D...
File Edit View Favorites Tools Help
Figure 4
1.1.3. Width
The width attribute helps in identifying the breadth of the table in comparison to the
webpage. It accepts the value as a number (in pixels) or in percentage (in proportion to
the width of the webpage). If you omit this attribute, the width of the table is set according
to the length of the characters inside the cells.
Case 3.1: Where, the width of the table is set to 30% of the web pages width.
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border=1 width = 30%>
<TR>
<TH> width of table 30% </TH>
<TH> of width of the window </TH>
</TR>
<TR>
<TD> if the size of window is small </TD>
<TD> the width of table will be 30% of small size</TD>
</TR>
</TABLE>
</BODY>
</HTML>
C:\Users\HP\Music\Desktop\TABLE.html C:\Users\HP\Music\De...
Figure 5
Case 3.2: Where, the width of the table is set to 100% of the web pages width.
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border=1 width = 100%>
<TR>
<TH>100% width of the table - cell 1</TH>
<TH>100% width of the table - cell 2</TH>
</TR>
<TR>
<TD> cell 3</TD>
<TD> cell 4</TD>
</TR>
</TABLE>
</BODY>
</HTML>
The code above displays the table with the breadth equal to the breadth of the webpage
as shown in the figure 6. The table occupies 100% of the width of the web page.
Suggested Sites HP Games - Top Games Get more Add-one islamic calender
100% width of the table - cell 1 100% width of the table - cell 2
cell 3 cell 4
Figure 6
Tables 45
1.1.4. Border color
The colour of the lines inside and outside the table can also be changed using the Border
Color attribute. It accepts the value as name of the colour. If you omit this attribute, the
colour of the table border is set to its default grey.
Case 4.1: Let us set the lines of table as red in the following code:
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border=10 border color=red>
<TR>
<TD>border line thickness is set to 10</TD>
<TD>border colour is red</TD>
</TR>
<TR>
<TD>red as tomato</TD>
<TD>red as apple</TD>
</TR>
</TABLE>
</BODY>
</HTML>
The Microsoft Internet Explorer displays the output in figure 7. The table is shown with
red coloured border lines on both inside and outside the table. The outside line gets its
thickness from the border attribute which has the value equal to 10. This means the width
of the outside border is 10 pixels wide.
C:\Users\HP\Music C:\Users\HP\Music\D...
File Edit View Favorites Tools Help
Figure 7
Case 5.1:
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border =1 bgcolor= pink>
<TR>
<TH>border line point 1</TH>
<TH> pink as lily </TH>
</TR>
<TR>
<TD> background colour of the table is pink </TD>
<TD> </TD>
</TR>
</TABLE>
</BODY>
</HTML>
The above code gives a background colour to the table. Here the background is set to the
colour pink as shown in figure 8. The breadth of the table is set according to the contents
in the cells of the table. The last cell is formed and is empty because one character space
is assigned to this cell using the special character The special character provides
the result only when used in lowercase.
Note: If you want to set individual cells of the table with different background colour, the
attribute bgcolor can be used with either <TH> tag or <TD> tag.
C:\Users\HP\Music\Desktop\TABLE.html C:\Users\HP\Music\Deskto...
Figure 8
Tables 47
1.1.6. Background
If you want to place an image or a picture at the background of the table, you can do so
using the background attribute. This attribute takes the value as the address or the path
of the picture. The picture may be a bitmap or a graphic image. In the following code, the
image named yelloww.jpg is set as background to the entire table.
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border =1 background=c:\yelloww.jpg>
<TR>
<TH>lily</TH>
<TH>rose</TH>
<TH>lotus</TH>
</TR>
<TR>
<TD>white, yellow</TD>
<TD>white, yellow</TD>
<TD>white, pink</TD>
</TR>
</TABLE>
</BODY>
</HTML>
The above code displays the output in figure 9. The background of the entire table is set
to the image named yelloww.jpg.
C:\Users\HP\Music\Desktop\TABLE.html C:\Users\HP\Music\Deskto...
lily
border line rose
point 1 lotuspink as lily
white, yellow
background colourwhite,
of theyellow
table white,
is pinkpink
Figure 9
2. The TH or TD element
The TH element or <TH> tag helps in identifying a table header. Correspondingly, TD
element or <TD> tag identifies the table data cell. The text inserted using the TH element
is in boldface and centred by default. Compared to this, TD element or the <td> tag is
aligned to the left and the text is in regular font. The attributes used with <TD> or <TH>
tag are: Align, Colspan, No wrap, Rowspan, Valign.
The align attribute is similar to that of table, except that it align the text inside the cell
rather than the table. Valign takes the value top, middle, bottom to vertically align the
text inside a cell.
The Nowrap attribute does not allow the text to flow to the next line in the cell. If the
sentence is wider than the width of the cell, nowrap will show the sentence in one straight
line. Let us now discuss colspan and rowspan.
3.1. COLSPAN
The colspan attribute helps in merging the columns of a row. This attribute is not used
with table tag but with the <TH> or the <TD> tag.
Case Colspan: If you want to prepare the table where there are 4 rows and the all the
other rows except the first row are divided into two columns. In other words, the two
columns of the first row are merged into a row, use the following code:
C:\Users\HP\Music
File Edit View Favorites Tools
MERGEDROW
R2 1
R3 2
R4 3
Figure 10
Tables 49
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border=2>
<TR>
<TH colspan=2>MERGEDROW</TH>
</TR>
<TR>
<TD>R2</TD>
<TD>1</TD>
</TR>
<TR>
<TD> R3</TD>
<TD>2</TD>
</TR>
<TR>
<TD>R4</TD>
<TD>3</TD>
</TR>
</TABLE>
</BODY>
</HTML>
Case No Colspan: If the row in the example above does not span across three columns,
the code will be:
<HMTL>
<HEAD><TITLE> </TITLE></HEAD>
<BODY>
<TABLE border=2>
<TR>
<TH>MERGEDROW</TH>
</TR>
<TR>
<TD>R2</TD>
<TD>1</TD>
</TR>
<TR>
Case Rowspan: Taking the similar example as above, we have the following code:
<TABLE border=1>
<TR>
<td rowspan=2> MERGEDCOLUMN </TD>
<TD>Col2Row1 </TD>
</TR>
<TR>
<TD>Col2Row2</TD>
</TR>
</TABLE>
Tables 51
The code here produces the output in figure
12. The output displays how rowspan merges
the two rows into one to form a sidebar. In
other words, this sidebar acts as a single row
that gets divided into two rows in the next
column of the table.
Figure 12
Case NoRowspan: In case you dont wish to use rowspan, then you might end up creating
a ghost cell as shown by the following code:
<TABLE border=1>
<TR> <TD> Col1Row1</TD>
<TD>Col2Row1 </TD>
</TR>
<TR> <TD>Col1Row2</TD>
</TR>
</TABLE>
Figure 14 displays the result of the code. The bottom of the table is captioned with Table
with caption.
C:\Users\HP\Music
File Edit View Favorites Tools Help
coordinates 1, 1 1, 2
2, 1 coordinates 2, 2
Table with caption
Figure 14
Let us quickly revise the list of attributes used with TABLE, TH, TD elements, before
moving on to the next section on frames. The following table displays a list of function,
tags, attributes and values associated with <TABLE >, <TH> and <TD> element.
Tables 53
8. Table Header <TH></TH> (same as data, except
bold & centered)
9. Alignment <TH or TD
ALIGN=LEFT|RIGHT|
CENTER|MIDDLE|BOTTOM>
10. No Linebreaks <TH or TD NOWRAP>
11. Desired Width <TH or TD WIDTH=?> (in pixels)
12. Width Percent <TH or TD WIDTH=%> (percentage of table)
13. Cell Color <TH or TD
BGCOLOR=#$$$$$$>
14. Columns to Span <TH or TD COLSPAN=?>
15. Rows to Span <TH or TD ROWSPAN=?>
16. Table Caption <CAPTION></CAPTION>
17. Alignment <CAPTION (above/below table)
ALIGN=TOP|BOTTOM>
4. Frames
A frame divides the screen into separate windows with both vertical and horizontal scroll
bars.. The windows so formed may appear to be sub-windows of the main window (the
webpage). This allows the user to access different pages of a website from one screen if
designed to do so. Frames are needed when you want to have menus on one side and the
contents or the operations on the other side. When the user clicks on one of the menu
items, the contents become visible on the other side.
A frame divides the webpage into different windows. It makes some structural changes
to the main window. Hence, it is not written inside the body element, but it forms its
own element, outside the head section of HTML document called the FRAMESET. A
FRAMESET element is the parent element that defines the characteristics of individual
frame pages. The basic syntax of FRAMESET element is:
<html>
<head> </head>
<FRAMESET cols= number%,number%
<frame src = address of HTML document>
<frame src = address of HTML document>
</FRAMESET>
</html>
Tables 55
If you want to make a webpage that uses two frames divided in columns, you should
follow these steps:
1. Create an HTML document with the FRAMESET element as shown below.
<FRAMESET cols=120,*>
<frame src=menu.html name=menu>
<frame src=main.html name=main>
</FRAMESET>
In the above code, the left side of the column is 120 pixels and the Star indicates
the rest of the screen. A star has been used because the screen size varies; it may be
640 pixels across, or 800 or 1024 pixels across. The src attribute opens the menu.
html document in left side frame and main.html gets opened in right side frame.
Both the frames are given a name through the name attribute. The names are used
by navigational frame which has been discussed later in the chapter.
2. Create a number of HTML documents (containing the body tag) that you would
like to load into the frames. (Atleast as many as the frames that are there in the
FRAMESET element of step 1 here you need to have two documents; menu.html
and main.html)
3. When a FRAMESET page is loaded, the browser automatically loads the HTML
documents designed in step2 as requested by each of the FRAME tag within the
FRAMESET.
The rest of the chapter discusses the different types of frames that you can design.
For example 1:
If you want to divide the webpage in equal sizes horizontally, and want to display a.html
in first and b.html in second, you will use the following code:
<html>
<head></head>
<FRAMESET rows= 50%,50%>
<frame src = a.html>
<frame src = b.html>
</FRAMESET>
</html>
<html><head></head>
<FRAMESET rows=20%,*>
<frame src=a.html>
<FRAMESET cols=30%,*>
<frame src=b.html>
<frame src=c.html>
</FRAMESET>
</FRAMESET>
</html>
For example 3:
If you want to divide the webpage in the form of an inverted T, where there are two
horizontal frames and the first frame is again divided into two columns, you can use the
following code:
<FRAMESET rows=16%,84%>
<FRAMESET cols=50%,50%>
<frame src=a.html name=topleft>
<frame src=b.html name=topright>
</FRAMESET>
<frame src=secondrow.html name=2row>
</FRAMESET>
The first FRAMESET divides the screen into two C:\Users\HP\Music\Doc C:\Users\HP\Music\D...
SOCIAL
row of the new screen, the second FRAMESET NETWORKING
SITES...
can divide it into two columns, open the two ASMALLWORLD
HTML documents, a.html and b.html, give them BLOGSTER
CARE2
a name and then move the control to the second
CLASSMATES
row of the new screen. Since now the control
is on the second screen, SRC can now open Enter Comments Here
Tables 57
For example 4:
If you do not want to show the grey border dividing the frames and there is 50 pixels
space between the two frames, you can use the following code. The output of this code
is given below:
<html
<head>
</head>
<FRAMESET cols=120,* frameborder=0 framespacing=50>
<frame src =a.html>
<frame src =formbutton.html>
</FRAMESET>
</html>
C:\Users\HP\Music C:\Users\HP\Music\D...
BLOGSTER
CARE2
CLASSMATES
DAILYSTREN
Figure 16
For example 5:
If you want to insert scrolls in the frames when the contents of the frame are not visible,
use the value auto as shown below:
<html
<head>
</head>
<FRAMESET cols=120,* frameborder=0 framespacing=50>
<frame src =a.html scrolling=auto>
<frame src =formbutton.html scrolling=no>
</FRAMESET>
</html>
C:\Users\HP\Music C:\Users\HP\Music\D...
BLOGSTER
CARE2
CLASSMATE
DAILYSTRE
Figure 17
For example 6:
If you do not want the user to adjust the frame size in the webpage, use noresize attribute.
Since it takes the value noreisize, you can omit the value and simply write the attribute
as shown below:
<html>
<head></head>
<FRAMESET cols= 120,* frameborder= 0 framespacing = 0>
<frame src = a.html scrolling= no noresize>
<frame src = b.html scrolling = auto noresize>
</FRAMESET>
</html>
Tables 59
<html>
<head></head>
<FRAMESET cols= 120,*>
<frame src = a.html>
<frame src = Jump.html#S12>
</FRAMESET>
</html>
Further, the HTML document named jump.html should contain a section with the name
S12. To implement this, we prepare the body of jump.html as under:
<html>
<head> </head>
<body>
<a name = S1> </a>
<h1> Section 1 </h1> This is section 1.
<h1> Section 2 </h1> This is section 2.
<h1> Section 3 </h1> This is section 3.
<h1> Section 4 </h1> This is section 4.
<h1> Section 5 </h1> This is section 5.
<h1> Section 6 </h1> This is section 6.
<h1> Section 7 </h1> This is section 7.
<h1> Section 8 </h1> This is section 8.
<h1> Section 9 </h1> This is section 9.
<h1> Section 10 </h1> This is section 10.
<h1> Section 11 </h1> This is section 11.
<a name = S12> </a>
<h1> Section 12 </h1> This is section 12.
<h1> Section 13 </h1> This is section 13.
<h1> Section 14 </h1> This is section 14.
<h1> Section 15 </h1> This is section 15.
</body>
</html>
Now when the first code is executed, it calls the HTML document i.e. jump.html. The
section number S12 of jump.html becomes visible the moment it gets loaded in the second
frame.
First divide the webpage into frames as done earlier. Also give a name to each frame as
shown below. Save this file as b.html.
<html>
<head></head>
<FRAMESET cols=30%,*>
<frame src =a.html name=menu>
<frame src =b.html name=content>
</FRAMESET>
</html>
<html>
<head></head>
<body>
<font face=Felix Titling size=4 color=purple>
Social Networking Sites
<a href= http://www.asmallworld.net/ target= content>
<h4> ASmallWorld</h4></a>
<a href= http://www.blogster.com/ target= content>
<h4>Blogster</h4></a>
<a href= http://www.care2.com/ target= content> <h4>Care2</h4></a>
<a href= http://www.classmates.com/ target= content>
<h4>Classmates</h4></a>
<a href= http://www.dailystrength.org/ target= content>
<h4>DailyStrength</h4></a>
</font>
</body>
</html>
Tables 61
The output window of a.html is shown in figure 18
C:\Users\HP\Music C:\Users\HP\Music\D...
File Edit View Favorites Tools Help
Figure 18
When a user clicks on one of the social networking sites like A Small World or the
Class Mates, the webpage will get opened in the second frame on the right hand site
of b.html. It is this frame whose name is content and which is being called by target
attribute in anchor tag in a.html.
The figure 19 shows a navigational frame, which means that you can navigate from one
social networking site to another without changing the webpage or moving from one
window to another. By remaining in the existing window, you can switch from one site
to another, i.e. you can navigate from one social networking site to another. Just run the
HTML document (b.html), see the output in figure 19 and enjoy the fun
C:Users\HP\Music\Desktop\b.html C:Users\HP\Music\Desktop...
File Edit View Favorites Tools Help
SOCIAL NETWORKING
SITES... classmatesTM
ASMALLWOR classmates is the best way to find old high
BLOGSTER browse the biggest collection of yearbooks
CARE2 I graduated in
CLASSMATES Alabama Illinois Montana Rhode Island
Alaska Indiana Nebraska South Carolina
Figure 19
Exercise
A. Multiple choice questions
1. <TR> belongs to Frameset tag.
(a) <Table> (b) <DIV>
(c) <Frameset> (d) <TD>
2. ______ tag is used to add columns to a table
(a) definition list (b) definition list term
(c) definition list description (d) none of the above
3. Which attribute is used to define cell contents to left ?
(a) VAlign (b) Align
(c) GAlign (d) HAlign
4. Tag to add a row to a table.
(a) TR (b) TD
(c) TH (d) TC
5. Which of the following is used to specify the beginning of a tables row?
(a) TROW (b) TABLER
(c) TR (d) ROW
Tables 63
6. In order to add border to a table, BORDER tag is specified in which tag
(a) THEAD (b) TBORDER
(c) TABLE (d) TR
7. Which of these tags are called table tags?
(a) <Thead><body ><tr> (b) <Table><tr><td>
(c) <Table><head><tfoot> (d) <Table><tr><tt>
8. ___________ tag is used to define the heading of a table
(a) TABLE (b) COLUMN
(c) HEADING (d) TITLE
9. Which HTML command is used to align the contents of the cell to right.
(a) <TR align= right-> (b) <TD align = right>
(c) <TD> align = right (d) All of the above
10. Which of the following statements is incorrect:
(a) < frame rows = 20% , 80 %> (b) < frame cols = 40% , 60 %>
(c) < frame rows = 60% , 60 %> (d) < frame rows = 60% , 40 %>
MERGEDROW
R2 1
R3 2
R4 3
Option A Option B
<TABLE border=2> <TABLE border=2>
<TR> <TR>
<TH>MERGEDROW</TH> <TH>MERGEDROW</
<TH> </TH> TH>
</TR> <TH> </TH>
<TR> </TR>
<TD>R2</TD> <TR>
<TD>R2</TD>
<TD>1</TD>
<TD>1</TD>
</TR>
</TR>
<TR>
<TR>
<TD>R3</TD>
<TD>R3</TD>
<TD>2</TD>
<TD>2</TD>
</TR>
</TR>
<TR>
<TR>
<TD>R4</TD>
<TD>R4</TD>
<TD>3</TD>
<TD>3</TD>
</TR>
</TABLE> </TR>
</TABLE>
Tables 65
C. Lab Session
Task 1: Create a website with a header area and two columns below to contain the
navigation bar on the left and the content bar to the right. Given below is the task you
must complete with this unit
#00FFFF
30% 70%
#00CCCC #00EEEE
Task 2: Make the required changes to the original file to create the following display. Save
it as task2.html
Photgraphs
70%
History
#00EEEE
https://developer.mozilla.org/en-US/docs/Web/HTML/Element/table
Task 3: Now create the same kind of visual effect that you did with tables but use frames
instead. Save the document as task3.html
xed
frameset
Computer
Services
Topics
Introduction
Help Desk
Seminars
STUDENT MARKSHEET
Roll Marks
Name
no. First Term Second Term Third Term
1 Arpit Kumar 140 160 175
2 Nilima Kapoor 190 180 116
3 Prerna Sharma 130 115 178
Tables 67
Chapter 4
Forms
Learning Objectives
After learning this chapter learner will be able to:-
State the purpose of the FORM tag.
List the attributes that can be used with the FORM tag to make web page more
interactive.
Learn to post the details filled in the form on the server.
Differentiate the working of different controls.
Understand the use of all the controls placed on the form.
Assign attributes to the <input> element to create the different FORM objects
Introduction
A form is an object that is used for collecting data from the user. We generally come
across such forms whenever we are creating a new account either in bank (manually) or
for an email id (computerized).
In HTML, a form is a window that consists of the elements of a form called the form
fields. These fields may be text field, text area, drop-down box, radio buttons, checkbox
and/or a command button. HTML forms are used to pass data to a server. A form can be
inserted in HTML documents using the HTML form element which acts as a container
for all the input elements. All the information collected by a form can be submitted to a
processing agent (a file containing a script made to process this information) thats usually
specified in the action attribute of the Form tag.
The above code contains both the start tag and the end tag of <form> to indicate the
beginning of form object and end of form object. The <input> tag inside the form tag
Value Description
Get Default. Appends the form-data to the URL in name/value pairs:
URL?name=value&name=value
Post Sends the form-data as an HTTP post transaction
Forms 69
2. Input tag
The <input> tag collects the information from the user.
Along with this the TextBox field accepts value, size, name, maxlength, align and tabindex
within the <input> tag.
HTML Code:
<form>
Fathers Name:
<input type=text size = 20 name=FName >
<br>
Mothers name:
<input type=text size = 20 name=MName>
</form>
The above code creates two textboxes, each of which is 20 characters wide. The two textboxes
are arranged vertically one below the other. The <br> tag does the work of Enter key.
Output:
Father name
mothers name
Text areas are the fields that displays several text lines at a time. Textarea field is generally
used to prepare the body of the email or use it to take comment from the user. The
<textarea> tag has both start and the end tag indicating from where the textarea begins
and where the area where you were writing text ends.
Forms 71
The attributes are:
Attribute Name Description
Cols and Rows It takes the value as number. While cols indicate the length of the
textarea, the rows indicate the number of rows with text that will
be visible at a time.
Name It provides an internal name to the textarea field as understood by
the computer.
Tabindex It defines the order number of activation of this field when the
visitor clicks on the tab key.
Wrap It helps in flowing the text to the next row in a paragraph when the
text reaches the right hand border of the text area.
(i) It can take three types of values as discussed below:
(ii) If the text is not wrapped, i.e. its value is set to wrap off , it
will be placed in the first row of the text area. In such a case
if the sentence doesnt get completed at the right hand border
of the text area, the text after the border will not be visible.
(iii) The value Virtual recognizes the text with line breaks when
textarea is loaded on the web page.
(iv) Physical defines the format of the text. It will appear on the
webpage as inserted by the user.
For Example:
The following code displays the use of <textarea> tag.
The above code produces the following output which displays a text area of 5 lines
visible at a time and 30 characters long with a word wrap facility where the text flows to
the next line if the active text area is smaller than 30 characters due to small size of the
webpage opened by the user.
email yourself
Radio button enables the selection of one of the options out of the many.
Forms 73
For Example:
<form>
What type of lighting you have in your room? <br>
Lightingtype:
<input type=radio name=Ltype value=tube>TubeLight
<input type=radio name=Ltype value=bulb>Bulb <br>
Lighting Size:
<input type=radio name=LSize value=Long>Long
<input type=radio name=LSize value=medium>Medium
<input type=radio name=LSize value=short>Short <br></form>
The user is allowed to select one of the two from Lighting type i.e. either TubeLight or Bulb.
Similarly, the user can select any one of the three from Lighting Size i.e. Long, Medium
and Short. This is achieved by naming all options of a set the same. Here all light type
has the name Ltype while all light size is name LSize. This is where the id attribute comes
handy, especially if the value has to be used later on.
2.4. Checkboxes
If the value of the type attribute is checkbox i.e. <input type= Checkbox>, the form will
show a checkbox. As compared to radio button, a checkbox allows for multiple selections
of items.
The check boxs attributes namely, name, align, value and tabindex behave the same as a
radio buttons attributes.
For example:
All the checkboxes have the same name i.e. sweet, though the value for each one of them
is different.
<form>
I love to eat Chocolate:
<input type=checkbox name=sweet value=Chocolate>
<br>
I love to eat Ladoo:
<input type=checkbox name=sweet value=Ladoo>
<br>
I love to eat Cake:
<input type=checkbox name=sweet value=Cake>
</form>
Forms 75
This command button will perform some action when the user clicks on it. The action is
defined by action attribute in <form> tag along with the method attribute as shown in
the following code:
Suggested Sites
Email Yourself
When the user click on the command button called Email Yourself , the action specified
in <form> tag is performed. It opens your email inbox in email.com.
The <option> tag is used for creating a list inside a <select> tag as shown under:
<select>
<option>Chocolate</option>
<option>Ladoo</option>
<option>Cake</option>
</select>
For Example:
The following code displays the use of <select> and <option> tag to show the dropdown
box in the browser. The size attribute takes the value as number 4, specifying the
dropdown box to show 4 items at a time in the list box.
The following output will display 6 items in the dropdown box, which is already open and
where the first item is already selected.
Taste of food
Indian
Chinese
Mexican
Italian
Continental
Karims Special
Forms 77
Summary
1. A form is an object that is used for collecting data from the user.
2. A The method attribute specifies how to send form-data using URL variables (with
method=get) or as HTTP post transaction (with method=post).
3. A The <input> tag collects the information from the user.
4. A The textfield control accepts the input in one line.
5. A Text areas are the fields that displays several text lines at a time. The <textarea> tag has
both start and the end tag.
6. A Radio button enables the selection of one of the options out of the many.
7. A Checkbox allows for multiple selections of items.
8. A The command button placed on the form performs some action when the user clicks on it.
9. A Submit buttons: When activated, a submit button submits a form. A form may contain
more than one submit button.
10. Reset buttons: When activated, a reset button resets all controls to their initial values.
11. Drop down Box contains a list that prompts the user to select one item from the list. It is
created by using <select> and <option> tags.
Exercise
A. Multiple choice questions
1. A _____ can be inserted in HTML document which can act as a container for all the input
elements.
(a) Text field (b) Teaxt area
(c) Form (d) Command Button
2. ________ method is used to sent form data as URL variables.
(a) get (b) set
(c) post (d) none of them
3. ________ method is used to sent form data as HTTP post.
(a) get (b) set
(c) post (d) none of them
4. What is the purpose of a web form
(a) An outdated feature still used to help the page load faster
(b) An useful way to send information from the user directly to the search engines
(c) A way to input data into a website or an application
(d) To enable the user to navigate the website with ease
C. Lab Session
1. Write HTML code to generate the following form. Save it as task1.html
Gender Male
Age Below 25
Above 25
Hobbies Outdoor Games
Painting
Dancing
Music
Submit
Forms 79
2. Write HTML code to generate the following form. Save it as task2.html
Medical Information
Hospital
preference City
Insurance
Company State -Select-
Allergies (If
any)
Submit Reset
Learning Objectives
By the end of this chapter, learner will be able to:
Differentiate between HTML & DHTML
State the purpose of using CSS.
List different advantages and disadvantages of using CSS.
Understand the working of all the mentioned properties of CSS.
Create an interactive webpage using CSS.
Introduction
When we open any web page and sends it to the computer requesting it cannot get any
more data from the server unless a new request is made. So to overcome this drawback
we use Dynamic HTML (DHTML) which is combining HTML and a scripting language
that runs on the Clients browser to bring special effects to otherwise static pages.
1. DHTML
DHTML is the combination of HTML and JavaScript. DHTML is the combination of
several built-in browser features in fourth generation browsers that enable a web page to
be more dynamic.
Dynamic is defined as the ability of the browser to alter a web pages look and style after
the document has loaded.
DHTML is not a scripting language (like JavaScript), but merely a browser feature- or
enhancement- that gives your browser the ability to be dynamic.
Features of DHTML:
DHTML makes documents dynamic. It allows the designer to control how the HTML
displays Web pages content.
Web page reacts and change with the actions of the visitor.
DHTML helps to exactly position any element in the window, and change that position
after the document has loaded.
It can hide and show content as needed.
DHTML allows any HTML element (any object on the screen that can be controlled
independently using JavaScript) in Internet Explorer to be manipulated at any time,
turning plain HTML into dynamic HTML.
With DHTML, changes occur entirely on the client-side (on the users browser).
Cascading Style Sheets (CSS) is a style sheet language used for describing the look and
formatting of a document written in a markup language. It is a way to provide style to
HTML. Whereas the HTML is the meaning or content, the style sheet is the presentation
of that document.
Cascading Style Sheets (CSS) is a simple mechanism for adding style (e.g., fonts, colors,
spacing) to Web documents.
The advantages of using CSS are:
It controls layout of many documents from one single style sheet.
It has more precise control of layout.
It applies different layouts to different media-types.
It has numerous advanced and sophisticated techniques to be applied on web pages.
The Limitations of CSS are: CSS is very limited in browser compatibility. When you
design a web page and you want it to display exactly as you like it. The problem with CSS
is that it displays webpages very differently in the different browsers.
Your webpage looks perfect in Mozilla may look different in Internet Explorer. This is a
big problem for your sites success.
Example 1: To apply the red background color in a webpage, it can be applied in the
following manner.
<html>
<head>
<title>Example</title>
</head>
<body style=background-color: #FF0000;>
<p>The background is red.</p>
</body>
</html>
An external style sheet is a text file with the extension .css. Like other files, we can place
the style sheet on your web server or hard disk.
For example, save the style sheet with the name style.css and place it in a folder named
style.
www.html.net
default.htm
style
style.css
To create a link from the HTML document (default.htm) to the style sheet (style.css). The
following code will be inserted in the header section of the HTML code i.e. between the
<head> and </head> tags. HTML file.
style.css
body {
background-color: #FF0000;
}
This link will display the layout from the CSS file in the browser when displaying the HTML file.
le:///C:Users/sony/Desktop/default.htm l Yahoo
My stylesheet page
One CSS file can be used to control the layout of many HTML documents. Using CSS,
the change can be made in a few seconds just by changing one code in the central style
sheet.
3. Font
3.1 Font Properties
FONT-FAMILY
FONT-STYLE
FONT-SIZE
FONT-VARIANT
FONT-WEIGHT
</body>
</html>
Heading 1 in Arial
Heading 2 in Times New Roman
</body>
</html>
Heading 1 in Arial
Heading 2 in Times New Roman
If font-variant is set to small-caps and no small-caps font is available the browser will
most likely show the text in uppercase instead.
h1 {font-variant: small-caps;}
h2 {font-variant: normal;}
le:///C:Users/sony/Desktop/font.htm l Yahoo
<h2>Heading 2 in bold</h2>
</body>
</html>
le:///C:Users/sony/Desktop/font.htm l Yahoo
Heading 1 in normal
Heading 2 in bold
There are many different units (e.g. pixels and percentages) to describe font sizes. The
following example will illustrate the following effect of font size in a web page.
</body>
</html>
le:///C:Users/sony/Desktop/font.htm l Yahoo
Heading 1 30px
Heading 2 12PT
Heading 3 120%
Heading 4 Paragraph
The units px and pt make the font size absolute, while % and em allow the user to
adjust the font size as he/she see fit. Some users suffer from poor vision or a monitor of
bad quality. To make your website readable for everybody, you should use adjustable units
such as % or em.
For example, to apply different font-properties for <p> tag following code can be used:
p{
font-style: italic;
font-weight: bold;
font-size: 30px;
font-family: arial, sans-serif; }
le:///C:Users/sony/Desktop/font.htm l Yahoo
4. COLOR Properties
TEXT-INDENT
TEXT-ALIGN
TEXT-DECORATION
LETTER-SPACING
TEXT-TRANSFORM
Example:
To apply 40px indentation to all text paragraphs marked with <p>, the following code
will be used:
le:///C:Users/sony/Desktop/font.htm l Yahoo
Example:
Display the text in table headings <th> aligned to the right while the table data <td> in
the centre of the browser window and normal text in paragraphs to be justified.
</p>
</body>
</html>
td {
text-align: center;
}
p {
text-align: justify;
}
le:///C:Users/sony/Desktop/font.htm l
Text alignment
Heading 1 Heading 2
Cell 1 Cell 2
Cell 3 Cell 4
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. it is a network of
networks that consists of millions of private, public, academic, business and government networks, of local to global scope, that are linked by a broad array of electronic, wireless, and optical
new networking technologies. The Internet carries and extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW), the
infrastructure to support email, and peer-topeer networks.
The Internet has no centralized governance in eighter technological implementation or policies for access and usage; each constituent network sets its own policies. Only the
overreaching definitions of the two principla name spaces in the Internet, the Internet Protocol address space and the Domain name System, are directed by a maintainer organization, the
Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet
Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.
+In the following example, <h1> are underlined headlines, <h2> are headlines with a line
above the text and <h3> are headlines with a line though the text.
<h2>Text Overline</h2>
<h3> Text Line Through</h3>
</body>
</html>
h2 {
text-decoration: overline;
}
h3 {
text-decoration: line-through;
}
le:///C:Users/sony/Desktop/font.htm l Yahoo
Text Underline
Text Overline
Example:
To give 3px spacing between the letters in a text paragraph <p> and 6px between letters
in headlines <h1> the following code will be used:
<p>The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is
a network of networks that consists of millions of private, public, academic, business,
and government networks, of local to global scope, that are linked by a broad array of
electronic, wireless, and optical networking technologies. The Internet carries an extensive
range of information resources and services, such as the inter-linked hypertext documents
of the World Wide Web (WWW), the infrastructure to support email, and peer-to-peer
networks.
</p>
</body>
</html>
le:///C:Users/sony/Desktop/font.htm l Yahoo
Capitalize : Capitalizes the first letter of each word. For example: information technology
will be Information Technology.
Example:
Display the heading in Capital letters and list items in uppercase.
le:///C:Users/sony/Desktop/font.htm l Yahoo
Parts of Computer:
1. VISUAL DISPLAY UNIT
2. KEYBOARD
3. MOUSE
4. CENTAL PROCESSING UNIT
5. PRINTER
5. Background Properties
FOREGROUND-COLOR
BACKGROUND-COLOR
BACKGROUND-IMAGE
BACKGROUND-REPEAT
<ol>
<li> Visual Dispaly Unit</li>
<li> Keyboard </li>
<li> Mouse </li>
<li> Central Processing Unit </li>
le:///C:Users/sony/Desktop/font.htm l Yahoo
Parts of Computer:
1. VISUAL DISPLAY UNIT
2. KEYBOARD
3. MOUSE
4. CENTAL PROCESSING UNIT
5. PRINTER
Colors can be entered as hexadecimal values as in the example above (#ff0000), or you
can use the names of the colors (red) or rgb-values (rgb(255,0,0)).
To change the background color of an entire page, the background-color property should
be applied to the <body> tag. You can also apply background colors to other elements
including headlines and text.
h1 {
color: #990011;
background-color: #FC9004;
}
Notice that two properties have been applied to <h1> by dividing them by a semicolon.
le:///C:Users/sony/Desktop/font.htm l Yahoo
To insert the image of the butterfly as a background image for a web page, simply apply
the background-image property to <body> and specify the location of the image.
</body>
</html>
h1 {
color: #990000;
background-color: #FC9804;
}
Inserting Image
Image will be inserted by giving the specified the location of the image as url(earth.gif ).
This means that the image is located in the same folder as the style sheet. You can also
refer to images in other folders using url(../images/earth.gif ) or even on the Internet
indicating the full address of the file: url(http://www.example.net/earth.gif ).
h1 {
color: #990000;
background-color: #FC9804;
}
le:///C:Users/sony/Desktop/font.html Yahoo
No repeated Image
Exercise
A. Multiple choice questions
1. Which property describes how bold or heavy a font should be presented?
(a) Font style (b) Font size
(c) Font weight (d) Font variant
D. Lab Session
1. Create a web page for a company name web@Creation using attributes such as Background
color along with other attribute.
2. Create a webpage for departmental store using all the listing tags with margin attributes
of CSS, where they sold following items:
(a) Furniture (b) Electronic Items (c) Home Appliances
(d) Computer Books (e) Cosmetics
3. Design a webpage where heading is placed from the left 40 using relative-position of CSS
having headings A B C D.
4. Write code to develop Webpage that is having some paragraph with the different size
unit.
Learning Objectives
By the end of this chapter, learner will be able to:
Name the different kinds of software licensing available
Differentiate between freeware and open source software
State how the use of shareware software is different from that of freeware software
Differentiate between copyright and licensing
Define cyberethics, cybersafety and cybersecurity
State the purpose of cookies
Tabulate the different phases of cyber ethics evolution
List precautions that can be taken to ensure cyber safety
Identify the different kinds of threats to cyber security
State ethical behaviour to be followed as a cyber citizen
Identify the different categories of cyber crime
Introduction
The world created by technology is one of machines - computers, computer systems and
computer networks. Add to that the human component and one has a world of diverse
cultures and social practices that is often referred to as cyberspace.
Cyberspace is a man made world that is constantly evolving. It differs from the static
physical world as it has no boundaries, no geographical mass, and of course, no gravity. It is
limitless, constantly changing its shape, attributes and characteristics. It exists in a form of
bits and bytes; it is an information driven world. Government(s), hardware manufacturers
and software application providers act as gatekeepers of cyberspace.
This medium, which is dynamic, infinite and intangible has to be regulated to prevent
it from exploding. Regulating cyberspace means regulating both man and the machine.
There is ethics, safety and security involved.
Ethics represents personal choice. Its the set of acceptable behaviours in a given culture.
Its not just a list of rules but the code of conduct by which a society chooses to live. Safety
refers to safe practices and security is the additional tasks carried out to ensure safety.
In cyberspace we have
Cyberethics exploring appropriate and ethical behaviours related to online
environments and digital media. It includes plagiarism, bullying, and hacking to
name a few.
Cybersafety defining how one operates on-line. It includes rules guiding how to keep
personal information safe and limited
Cybersecurity involving tasks undertaken on the computer to keep it secure from
people who wish to harm it or use data stored on it unlawfully. This includes installing
virus software and firewalls.
Before we study these in greater detail there are certain fundamental terminology and
concepts that must be understood.
1. Basic Terminology
1.1 Copyright and License
Copyright is about protecting original expression. Copyright
arises as soon as a work is created. A software copyright
protects all source code, written text materials, graphic
images/ designs, drawings, any linked sound, video files
or films.
Some copyrighted software is made available for use, free of charge for an unlimited time.
These are called freeware. The copyright still remains with the producer / owner for any
future development.
Shareware are copyrighted software that can be shared for a limited on a trial basis with
the understanding that if the user decides to use it, he will pay for it.
Cyber law includes all the cases, written rules and government laws that affect persons
and institutions who
control the entry to cyberspace,
provide access to cyberspace,
create the hardware and software which unable people to
access cyberspace or
Use devices to go online and enter cyberspace.
Laws governing ecommerce, online contracts, copyright, trademark, business software
patenting, eTaxation, eGovernance and cyber crimes all fall within the meaning and scope
of cyber law.
1.6 Cookies
Cookies allow a visited website to store its own information about a user on the users
computer.
Both hackers and crackers can also work on the ethical side when they use their skills to
prevent cyber crime and help the law keepers.
1.8 Firewall
A firewall is a program or hardware device that
filters the information coming through an internet
connection to a network or computer system. If
incoming information does not pass the rules
stored in the firewall, it is not allowed through.
Cyberethics began in some form in the 1940s. It examines the impact of not only the
internet or computing machines but also private computer networks and interconnected
communication technologies.
Cyber ethics must be practiced at every level of computer usefrom the novice user to an
information technology professional whose job requires significant use of online resources.
Those who use the internet must be follow ethical practices in every aspect of its use.
Anyone can communicate at anytime, with anyone, anywhere over the internet today.
This can have negative consequences. Anonymous posting to blogs, websites, and social
media can encourage bad behaviour as it does not identify the person who commits the
action.
The same rules of right and wrong taught to a child while growing up needs to be applied
to cyber space! Do not do something in cyber space that you would consider wrong or
illegal in everyday life.
Do not use rude or offensive language.
Do not lie about people, send embarrassing pictures of them, or anything else to try
to hurt them (bullying).
Do not use someone elses password or break into his computer.
Do not copy information from the Internet and claim it as yours (plagiarism).
Obey copyright restrictions when downloading material.
Do not try to make someone elses computer unusable.
One of the more common ways to accomplish identity theft is via a technique called
phishing, which is the process of trying to tempt the target to provide personal information
which can be used to perform illegal actions.
Cyber-safety addresses the ability to act in a safe and responsible manner on the Internet
and other connected environments. These behaviours protect personal information and
In following cyber safety guidelines a user will recognize online risks, make informed
decisions, and take appropriate actions to protect himself while using technology, technology
systems, digital media and information technology. He would adhere to privacy and safety
guidelines, policies, and procedures.
2. M
ost attacks can be categorized as one of six
broad classes
Malware, software that has a mischievous purpose such as virus attacks, worms, adware,
Trojan horses, and spyware. This is the most prevalent danger to a system. Malware is
discussed in detail later in the lesson.
Security breaches that attempt to gain unauthorized access to a system including cracking
of passwords, changing privileges, breaking into a server.. in other words, hacking a
computer or a computer network.
Denial of service (DoS) attacks that are designed to prevent legitimate access to a
system.
Web attacks that attempts to breach a website. Two of the most common such attacks are
SQL injection and cross-site scripting.
DNS poisoning, which seeks to compromise a DNS server so that users can be redirected
to unsafe websites.
Malware
Malware is used to disrupt computer operation, gather sensitive information, or gain access
to private computer systems. It can appear in the form of code, scripts, active content, and
other software. Malware is a general term used to refer to a variety of forms of hostile or
intrusive software. Let us take a look at some of the important malwares available today.
Viruses: A computer virus is a program that replicates itself. A computer virus attaches
itself to a program or file to help it spread from one computer to another. Almost all viruses
are attached to an executable file, which means the virus may exist on a computer but it
actually cannot infect the computer unless one runs or opens the malicious program. It is
important to note that a virus cannot be spread without a human action, (such as running
an infected program) to keep it going.
Adware: Adware refers to computer software that is provided usually for free but contains
advertisements. It automatically renders advertisements in order to generate revenue for
its author.
Trojan horses: A Trojan horse is a program that looks straightforward and safe but actually
has a malicious purpose. At first glance it will appear to be useful software but will actually
do damage once installed or run on a computer. It is often used to deliver a virus into the
system. One of the earliest and most widely known was Back Orifice.
Spyware: Spyware is simply software that literally spies on what is being done on a computer.
Spyware can be as simple as a cookie used by a website to record a few brief facts about a
visit to that website, or spyware could be of a more dangerous type such as a key logger,
a program that records every keystroke one makes on a keyboard.
Cyber crime may be defined as any illegal act that involves a computer, computer system
or computer network. It is any illegal act for which knowledge of computer technology is
essential to execute, investigate, or implement.
Some of these we have already talked about in the lesson. You could find out information
about the others from other sources. This is just an introduction to get you going.
General Intrusions
Case 1: Sending Computer Virus/Worm to invade computers
The ILOVEYOU virus comes in an e-mail note with I LOVE YOU in the subject line
and contains an attachment that, when opened, results in the message being re-sent to
everyone in the recipients Microsoft Outlook address book and, perhaps more seriously,
the loss of every JPEG, MP3, and certain other files on the recipients hard disk. Because
Microsoft Outlook is widely installed as the e-mail handler in corporate networks, the
ILOVEYOU virus can spread rapidly from user to user within a corporation. On May 4,
2000, the virus spread so quickly that e-mail had to be shut down in a number of major
enterprises such as the Ford Motor Company. The virus reached an estimated 45 million
users in a single day.
The attachment in the ILOVEYOU virus is a VBScript program that, when opened (for
example, by double-clicking on it with your mouse), finds the recipients Outlook address
book and re-sends the note to everyone in it. It then overwrites (and thus destroys) all files
of the following file types: JPEG, MP3, VPOS, JS, JSE, CSS, WSH, SCT and HTA. Users
who dont have a backup copy will have lost these files. (In March 1999, a virus named
Melissa virus also replicated itself by using Outlook address books, but was less harmful
in destroying user files.) The ILOVEYOU virus also resets the recipients Internet Explorer
start page in a way that may cause further trouble, resets certain Windows registry settings,
and also acts to spread itself through Internet Relay Chat (Internet Relay Chat).
The Creators Reomel Ramores and Onel de Guzman created this deadly virus on 5 May
2000 but were lucky to escape prosecution due to lack of rules for arresting people for
writing malicious code in Philippines ! The Damage-- 50 million infections reported
within 10 days.
Case 2: Malware/Trojans
A Trojan takes its name from the term Trojan Horse. It is a type of computer virus that
can be installed on your computer without you realising.
More sophisticated Trojans insert a pop-up page in front of your genuine online banking
page, and then try to trick you into making a payment to someone elses account.
Other types of malware are able to insert extra fields, not normally found on your online
banking website.
It is suggested that you should use virtual keyboard while doing net banking. Virtual
Keyboard is an online application to enter password with the help of a mouse.The Virtual
Keyboard is designed to protect your password from malicious Spyware and Trojan
Programs. Use of Virtual keyboard will reduce the risk of password theft.
Actually they sent some sort of trojan sniffer in the guise of these executable files.
When recipients ran the file, a software called Dialup Security became resident in the
computer memory and started working whenever the user booted the computer. When
the user accessed the internet, the Trojan captured the username and password fields from
the dialup screen and sent a mail to the culprits in encrypted form.
Case 5: Phishing
One financial Institute registered a crime stating that some persons (perpetrators)
have perpetrated certain acts through misleading emails ostensibly emanating from a
National Banks email ID. Such acts have been perpetrated with an intent to defraud the
Customers.
The Investigation was carried out with help of those emails received by the customers of
that financial Institute and arrested the accused, the place of offence at Vijaywada was
searched for the evidence. There one Lap Top and Mobile Phone was seized which was
used for the commission of the crime
The arrested accused had used open source code email application software for sending
spam emails. He has down loaded the same software from net and then used it as it is.
He used only VSNL emails to spam the email to customers of financial Institute because
VSNL email service provider do not have spam box to block the unsolicited emails.
After spamming emails to financial Institute customers he got the response from around
120 customers of which 80 are genuine and others are not correct because it do not have
debit card details as required for e-banking.
The financial Institute customers those who have received his email felt that the email was
originated from the financial Institute bank. When they filled the confidential information
and submitted that time said information was directed to accused. This was possible because
the dynamic link was given in the first page (Home page) of the fake web site. The dynamic
link means when people click on the link provided in spamming email that time only
the link will be activated. The dynamic link was coded by handling the Internet Explorer
onclick() event and the information of the form will be submitted to the web server
(Where the fake web site is hosted). Then server will send he data to configured email
address and in this case email configured was to the accused email . So on submission of
the confidential information the information was directed to email ID accused email .The
This crime has been registered u/s U/Sec. 66 of IT Act, sec 419, 420, 465, 468, 471 of I.P.C
r/w Sections 51, 63 and 65 of Copyright Act, 1957 which attract the punishment of 3 years
imprisonment and fine up to 2 lacs rupees which accused never thought of.
Phishers have refined their technology to launch sophisticated attacks and use advanced
social engineering techniques to dupe online banking users.
Case 6: Hacking
Mumbai police have arrested a hacker by name Kalpesh (name change) for hacking into a
financial website. Although the hacker couldnt break into the main server of the financial
institution, which was well secured by the financial institution. The accused person could
make some addition to the home page of the financial website and has added a string of
text to the news module of the home page of the website. Police were able to crack the
case by following the trace left by the hacker on the web server of the financial institution.
The financial institution has maintained a separate server for financial online transactions,
for which utmost security has been taken by the financial institution. The website was
hosted on a different server which comparatively had lesser security.
The hacker Kalpesh (name changed) is a 10th Pass youngster of 23 years old. He has done
computer courses like CCNA, MCSE etc. But he is a computer addict. He sits before the
computer for almost 16 to 20 times each day. He has mostly used the readymade hacking
tools, to hack into any website. He goes to a particular website on the web, which facilitates
him to see the entire directory structure of that website. Then using various techniques,
such as obtaining a password file, he gets into the administrators shoes and hacks the
website.
In April 2001 a person from New Delhi complained to the crime branch regarding the
website. Amazing.com, he claimed, carried vulgar remarks about his daughter and a few
of her classmates. During the inquiry, print-outs of the site were taken and proceedings
initiated.
After investigation a student of grade XI and classmate of the girl was arrested.
The juvenile board in Nov 2003 refused to discharge the boy accused of creating a website
with vulgar remarks about his classmate.
Case 8: Cyberstalking
There are a couple of reported cases, which speak of the position of the cyber stalking in
India. The recent being the case of A(name) who was recently arrested by the New Delhi
Police. He was talking an Indian lady, B(name) by illegally chatting on the Web site MIRC
using her name. He used obscene and obnoxious language, and distributed her residence
telephone number, inviting people to chat with her on the phone. As a result of which, B
kept getting obscene calls from everywhere, and people promptly talked dirty with her. In
a state of shock, she called the Delhi police and reported the matter. For once, the police
department did not waste time swinging into action, traced the culprit and slammed a
caseunder Section 509 of the Indian Penal Code for outraging the modesty of B (Indian
child, 2005).
Both kind of Stalkers Online & Offline have desire to control the victims life. Majority
of the stalkers are the dejected lovers or ex-lovers, who then want to harass the victim
because they failed to satisfy their secret desires. Most of the stalkers are men and
victim female.
How do they Operate
a. Collect all personal information about the victim such as name, family background,
Telephone Numbers of residence and work place, daily routine of the victim,
address of residence and place of work, date of birth etc. If the stalker is one of
the acquaintances of the victim he can easily get this information. If stalker is a
stranger to victim, he collects the information from the internet resources such
The girl was quickly smitten by the mans smooth online flattery. She didnt realise that he
was one of the growing number of sexual predators who had found a new way to exploit
the increasing obsession with social media.
They exchanged phone numbers, and his attention increased with rapid-fire texts. He
convinced her to meet in a mall, and she found him just as charming in person.
They agreed to meet again. After telling her mom she was going to visit a sick girlfriend,
she climbed into the mans minivan near her home.
The man, a 24-year-old drove her an hour to a town .There, he locked her in a small room
inside a house with at least five other girls aged 14 to 17.She came to know that she was
kidnapped. She somehow managed to escape ,but everyone does not get a chance.
One simple and quick setting (on Facebook) you can change to increase privacy is to
restrict the viewing of your profile only to users at your own college or to only your
friend list. Most social networking sites offer similar ways to restrict access to personal
information, but in all cases, the principle is the same: dont advertise to the world what
youre doing or where you live.
But dont forget that even if you limit who can see what you post, there are ways others
can get around it to view your profile anyway.
Limit what you post.Dont share things that would make you vulnerable to unwanted
contact (such as sharing your email address, physical address, or phone number) or to
stalking (such as information about your schedule or routine).
Finally, its important to recognize that once you publish something online, it is available
to other people and to search engines.You cant retract it.
Even if you go back and remove the information from a site, its always possible that
someone has already seen it. And they may have saved a copy.
In addition, some search engines cache copies of Web pages so that they open faster;
these cached copies may be available a long time after a Web page has been deleted or
altered. Some Web browsers, also, maintain a cache of the Web pages a user has visited,
so the original version of your posting may be stored in someone elses machine.
The bottom line? Once something is out there, theres no guarantee you can take it
back.
Subsequently Cyber cell registered a FIR under section 66 IT act , 420/34 IPC
Name and address of the mobile used by Sameera were in the name of Nigerian Franklin
(name changed). The address was not reachable as he shifted to new address. After that
cyber cell started analysing the logs of Sameera and identified the numbers to whom call
was made. Finally cyber cell had five numbers to be analyzed. After months of analysis
one suspect was traced. Cyber cell had the address of a suspect, the house was raided by
cyber cell at Delhi and seized 6 mobiles and a laptop but accused could not be caught.
LOC was issued against suspect. During investigations the culprits were identified to be
O. Addeda (name changed) and her lady co-partner. Mobiles and laptops involved in the
fraud were recovered from Addedas house but he escaped. After analysis of Addeda mobile
cyber cell found the person named EMMA to be the prime suspect providing bank details
to him. Documents seized also show his relation with him. Analysis of CDR revealed that
EMMA (name changed) is superior in hierarchy of internet job fraud.
Cybercell has arrested EMMA and his wife from their home. Several bank details, ATM/
DEBIT cards were recovered from him. At present EMMA is in CENTRAL JAIL and
is facing trial. His wife co-accused in the crime has been given bail due to last stage
of pregnancy. Court has issued permanent arrest warrants against the accused who are
absconding. Cyber cell is trying to identify the properties owned by the suspects so that
proceeds of the frauds can be recovered from them.
License is the permission granted by the holder of a copyright to another to use an original work.
It states under what circumstances and to what extent the original work can be used, changed
or distributed.
1. Open-source software (OSS) is computer software with its source code made available. It is
very often developed in a public, collaborative manner. A license for open sources software
allows the end user to study, change and distribute the software for any purpose.
2. Some copyrighted software is made available for use, free of charge for an unlimited time.
These are called freeware. The copyright still remains with the producer / owner for any
future development.
3. Shareware are copyrighted software that can be shared for a limited on a trial basis with the
understanding that if the user decides to use it, he will pay for it.
4. Cyber law is a new branch of law and is growing very fast. It establishes norms of accepted
human behaviour in cyberspace.
5. Cookies allow a visited website to store its own information about a user on the users
computer.
6. A firewall is a program or hardware device that filters the information coming through an
internet connection to a network or computer system.
Hackers are people with computer programming skills who use their knowledge to gain
unauthorized access to data in a system or computer.
Crackers modify or disable features of a software application. They usually mean to harm the
software, the hardware using this software or the end user of the software.
Once you have understood all the tags of HTML and the basics of GIMP, you are ready to
make web applications. The following specifications must be considered while developing
a web site:
1. Identify the problem.
2. Once you have analyzed the problem, you will have a clear idea about the web pages
to be created.
3. When designing your site, pay attention to layout, typography and images.
4. Always use standard Font styles in your web site so that all the browsers should
support them.
5. Site should exhibit strong design, user-friendly navigation, clear and consistent layout,
and professional appearance.
6. Your site should exhibit proper use of background and font colours.
7. Website must include at least one image , it can be a scanned photo, a digital
photograph, or a graphic/artwork created by you.
8. You may use other images, but they must not violate copyright laws.
9. All images must have alt tags, be well placed, and working correctly.
10. Each page must have an appropriate title.
11. Each page must have a consistent navigation menu containing functional links to all
other main pages
12. Visit every page and check to make sure all links work correctly.
13. Test your site behaviour across multiple browsers (e.g. Internet Explorer, Firefox,
Safari, etc.) and different operating systems (e.g. Windows, iOS).
After following all the instruction now you are ready to publish your website on web
server.
Project 133
Sample Case Studies
1. Create a website depicting different festivals of India. The Home page should have
links of allfestivals of India . It should also offer link to the other web pages and
each of these web pages should contain a link to home page and to the various html
pages required in your site. Your site should have feedback form .Use Gimp software
to give various effects to the images to be included in the website.
Festivals Of India
Home | ContactUs | Typesof Festivals | Feedback
Photo Gallery
Diwali
Dusshera
Holi
Eid
Christmas
Pongal
Oman
Raksha Bandhan
Janamashtmi
Navratri
Indian Festivals celebrated by varied cultures and through their special rituals add to the
Maha Shivartri
colours of Indian Heritage. Some festivals welcome the seasons of the year, the harvest, the Ram Navami
rains, or the full moon. Others celebrate religious occasions, the birthdays of divine beings
saints, and gurus (reversed teachers), or the advent of the New year. A number of these festivals
are common to most parts of India, however they are celebrated differently in different parts of
the country....
<html>
<head>
<title></title>
</head>
<body link = blue vlink = purple alink = blue border=1>
<table height = 50 width = 100% bgcolor = #F2AC28 cellpadding = 10><tr><td width=35%
height=50><img src = tiger.gif height = 50 width = 35% border = 2></td><td width =
90% height = 50 valign = middle><font face = trebuchet ms color = maroon size =
30><p align = right><i><u> Festivals Of India </u></i></font></td></tr></table>
Project 135
<li> Eid
<li> Christmas
<li> Pongal
<li> Oman
<li> Raksha Bandhan
<li> Janamashtmi
<li> Navratri
<li> Maha Shivratri
<li> Ram Navami
</i></font></ul></td></tr>
<tr><td height=50 valign=top><br><p align=center><img src = a.jpg height = 300
width = 300 border = 3>
<br>
<br>
<br>
<font face = trebuchet ms color = Blue size = 4><p align = justify><i>Indian Festivals
celebrated by varied cultures and
through their special rituals add to the colours of Indian Heritage. Some festivals welcome
the seasons of the year, the
harvest, the rains, or the full moon. Others celebrate religious occasions, the birthdays of
divine beings, saints, and
gurus (revered teachers), or the advent of the New Year. A number of these festivals are
common to most parts of India,
however they are celebrated differently in different parts of the country.....</i></font>
</td></tr>
</table>
<br>
<hr><hr><p align=center><font face = trebuchet ms size = 2 color = black>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Festivals Of India | All Rights Reserved
<p align =center><font face=monotype corsiva size=4>
<b><i><u>By ABC<br><br>
Roll No.:- 15</u></i></b>
</font>
</body>
</html>
file///C:Users/Savi/Desktop/Festivals%200%India/2nd%20page.htm
Festivals of India
Home | About Us | Types of Festivals | Feedback
Photo Gallery
Conctact Us at:
ABC Corporations
Connaught Place - 110085
By Nikhil Arora
Class Xa
Roll No. 12
<html><head><title></title></head>
<body link = blue vlink = purple alink = blue>
<table height = 100 width = 100% bgcolor = #F2AC28 cellpadding = 10><tr><td
width=35% height=100><img src = Diwali.jpg height = 100 width = 35% border =
2></td><td width = 90% height = 100 valign = middle><font face = trebuchet ms
color = maroon size = 30><p align = right><i>Festivals Of India</i></font></td></
tr></table>
<br>
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height
= 35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align
= center><a href = Main Page.htm> Home </a>| About Us | Types of Festivals | <a
href=Feedback.htm>Feedback</a></font></td></tr></table>
<table height = 100 width = 100% border = 3><tr><td><font face = trebuchet ms size
= 3 color = maroon>Photo Gallery </font></td></tr><tr><td><marquee scrollamount
= 8 behavior = scroll loop = 100>
<img src = map.jpg height = 100 width = 100>
<img src = festival.jpg height = 100 width = 100>
<img src = firecrackers.jpg height = 100 width = 100>
<img src = flag2.jpg height = 100 width = 100>
<img src = India.png height = 100 width = 100>
Project 137
<img src = holi.jpg height = 100 width = 100>
<img src = diwali.jpg height = 100 width = 100>
<img src = kannada.jpg height = 100 width = 100>
<img src = joy.jpg height = 100 width = 100>
<img src = food.jpg height = 100 width = 100>
<img src = food1.gif height = 100 width = 100>
<img src = food2.jpg height = 100 width = 100>
<img src = joy.jpg height = 100 width = 100>
<img src = food.jpg height = 100 width = 100>
<img src = food1.gif height = 100 width = 100>
<img src = food2.jpg height = 100 width = 100>
</marquee></td></tr></table>
<br>
<table width = 100%>
<tr>
<td width = 50%>
<align = left>
&nbs
p; &n
bsp;
<img src = t.jpg height = 200 width = 200 border = 3></td>
<td width = 50%>
<font face = trebuchet ms color = maroon size = 4><align = right>
Contact Us at: <br>
ABC Corporations <br>
Connaught Place - 110085 <br>
Phone No. - 12345678 <br>
And know the traditions of all Festivals and their Festivities
</font></td></tr>
</table>
<br>
<hr><p align=center><font face = trebuchet ms size = 2 color = black>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Festivals Of India | All Rights Reserved
<p align =center><font face=monotype corsiva size=4>
<b><i><u>By ABC<br>
file:///C:/Users/savi/Desktop/Festivals%20Of%India/diwali.htm
Deepavali or Diwali, popularly known as the festival of lights, is primarily a five day Hindu
festival which startes on Dhanteras, Celebrated on thirteenth lunar day of Krishna paksha
(dark fortninght) of the Hindu calendar month Ashwin and ends on Bhaubeej, celebreted on
second lunar day of Shukla paksha (bright fortnigh) of the Hindu calendar month Kartik. In the
Gregorian calendar, Diwali falls between mid-October and mid-Novermber. Diwali is an
official holiday in India, Nepal, Sri Lanka, Myanmar, Mauritius, Guyan, Trinidad & Tobago,
Suriname, Malaysia, Singapore and Fiji...
13:57
05-03-2013
<html>
<head>
<title></title>
</head>
<body link = blue vlink = purple alink = blue>
<table height = 100 width = 100% bgcolor = Yellow cellpadding = 10><tr><td width=35%
height=100><img src = Diwali.jpg height = 100 width = 35% border = 2></td><td width
= 90% height = 100 valign = middle><font face = trebuchet ms color = maroon size
= 30><p align = right><i>Diwali - The Holiest Hindu Festival</i></font></td></tr></
table>
Project 139
<br>
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height
= 35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align
= center><a href = Main Page.htm> Home </a>| About Us | Types of Festivals | <a
href=Feedback.htm>Feedback</a></font></td></tr></table>
<br>
<hr>
<table width = 100% cellpadding = 30><tr><td width = 65% bgcolor = maroon><font
face = trebuchet ms color = white size = 6 valign = middle ><p align = center>
Enjoy The Moments .....</font></td>
<td width = 35% height = 100% bgcolor = Pink rowspan = 2>
<font face = trebuchet ms color = maroon size = 5> &nb
sp; <u>Diwali</u>:</font>
<ul><font face = trebuchet ms color = white size = 4>
<li><img src=Diwali2.jpg height=250 width=300>
<br><br>
<li><img src=Diwali3.jpg height = 250 width = 300>
</font></ul></td></tr>
<tr><td height=100 valign=top><br><p align=center><img src = Diwali4.jpg height
= 300 width = 300 border = 3>
<br>
<br>
<font face = trebuchet ms color = Blue size = 4><p align = justify><i>Deepavali or
Diwali, popularly known as the festival of lights, is primarily a five day Hindu festival
which starts on Dhanteras, celebrated on thirteenth lunar day of Krishna paksha (dark
fortnight) of the Hindu calendar month Ashwin and ends on Bhaubeej, celebrated on
second lunar day of Shukla paksha (bright fortnight) of the Hindu calendar month Kartik.
In the Gregorian calendar, Diwali falls between mid-October and mid-November. Diwali
is an official holiday in India, Nepal, Sri Lanka, Myanmar, Mauritius, Guyana, Trinidad
& Tobago, Suriname, Malaysia, Singapore and Fiji..</i></font>
</td></tr>
</table>
<br>
<hr><p align=center><font face = trebuchet ms size = 2 color = black>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Festivals Of India | All Rights Reserved
<p align =center><font face=monotype corsiva size=4>
Diwali.htm
file:///C:/Users/savi/Desktop/Festivals%20Of%India/Dusshera.htm
<html>
<head>
<title></title>
</head>
<body link = blue vlink = purple alink = blue>
<table height = 100 width = 100% bgcolor = Grey cellpadding = 10><tr><td width=35%
height=100><img src = Dusshera 4.gif height = 100 width = 35% border = 2></td><td
width = 90% height = 100 valign = middle><font face = trebuchet ms color = maroon
size = 30><p align = right><i>Dussehra-Victory Over Evil!!!</i></font></td></tr></
table>
<br>
Project 141
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height
= 35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align
= center><a href = Main Page.htm> Home </a>| About Us | Types of Festivals | <a
href=Feedback.htm>Feedback</a></font></td></tr></table>
<br>
<hr>
<table width = 100% cellpadding = 30><tr><td width = 65% bgcolor = Light Blue><font
face = trebuchet ms color = white size = 6 valign = middle ><p align = center>
Enjoy The Moments .....</font></td>
<td width = 35% height = 100% bgcolor = #F2AC28 rowspan = 2>
<font face = trebuchet ms color = maroon size = 5> &nb
sp; <u>Dussehra</u>:</font>
<ul><font face = trebuchet ms color = white size = 4>
<li><img src=Dusshera 2.jpg height=250 width=300>
<br><br>
<li><img src=Dusshera 3.jpg height = 250 width = 300>
</font></ul></td></tr>
<tr><td height=100 valign=top><br><p align=center><img src = Dusshera 1.jpg
height = 300 width = 300 border = 3>
<br>
<br>
<font face = trebuchet ms color = Blue size = 4><p align = justify><i>Vijayadashami
also known as Dashahara, Dussehra, Dashain (in Nepal), Navratri or Durgotsav is one of
the most important Hindu festivals celebrated in various forms, across India, Nepal and
Bangladesh.
The name Dussehra is derived from Sanskrit Dasha-hara literally means removal of ten
referring to Lord Ramas victory over the ten-headed demon king Ravana. The day also
marks the victory of Goddess Durga over the demons Mahishasur. The name Vijayadashami
is also derived from the Sanskrit words Vijaya-dashmi literally meaning the victory on
the dashmi</i></font>
</td></tr>
</table>
<br>
<hr><p align=center><font face = trebuchet ms size = 2 color = black>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Festivals Of India | All Rights Reserved
<p align =center><font face=monotype corsiva size=4>
Holi.htm
le:///C:/Users/savi/Desktop/Festiv als%20Of%India/Holi.htm
Holi:
<html>
<head>
<title></title>
</head>
<body link = blue vlink = purple alink = blue>
<table height = 100 width = 100% bgcolor = Yellow cellpadding = 10><tr><td width=35%
height=100><img src = Holi 1.jpg height = 100 width = 35% border = 2></td><td width
= 90% height = 100 valign = middle><font face = trebuchet ms color = maroon size
= 30><p align = right><i>Holi - The Festival Of Colors</i></font></td></tr></table>
<br>
Project 143
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height
= 35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align
= center><a href = Main Page.htm> Home </a>| About Us | Types of Festivals | <a
href=Feedback.htm>Feedback</a></font></td></tr></table>
<br>
<hr>
<table width = 100% cellpadding = 30><tr><td width = 65% bgcolor = maroon><font
face = trebuchet ms color = White size = 6 valign = middle ><p align = center>
Enjoy The Moments .....</font></td>
<td width = 35% height = 100% bgcolor = Purple rowspan = 2>
<font face = trebuchet ms color = Black size = 5>
<u>Holi</u>:</font>
<ul><font face = trebuchet ms color = white size = 4>
<li><img src=Holi 2.jpg height=250 width=300>
<br><br>
<li><img src=Holi 3.jpg height = 250 width = 300>
</font></ul></td></tr>
<tr><td height=100 valign=top><br><p align=center><img src = Holi 4.jpg height
= 300 width = 300 border = 3>
<br>
<br>
<font face = trebuchet ms color = Blue size = 4><p align = justify><i>Holi is a
religious spring festival celebrated by Hindus, as a festival of colours. It is primarily observed
in India and Nepal. It is observed by the minority Hindus in Bangladesh and Pakistan
as well in countries with large Indic diaspora populations following Hinduism, such as
Suriname, Malaysia, Guyana, South Africa, Trinidad and Tobago, the United Kingdom, the
United States, Mauritius, and Fiji. It is also known as Phagwah and Festival of Colours,
or as Doajatra in Odisha and Dol Jatra or Basantotsav in West Bengal and Assam..</i></
font>
</td></tr>
</table>
<br>
<hr><p align=center><font face = trebuchet ms size = 2 color = black>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Festivals Of India | All Rights Reserved
<p align =center><font face=monotype corsiva size=4>
<b><i><u>By ABC<br>
Please Give your valuable feedback about what you feel about my webpage!!!
First Name:
Last Name:
E-Mail Address:
Gender:
Male
Female
Excellent
Very Good
Good
Acceptable
Bad
submit
Feedback...
<html>
<head>
<title></title>
</head>
<body link = blue vlink = purple alink = blue background=jj.jpg>
<font face=Comic sans ms size =5 color=yellow>
<u>Please Give your valuable feedback about what you feel about my
webpage!!!<br><hr>
<font face=comic sans ms size=5><center>
<a href = Main Page.htm>Click here to go back to the main page!!!</a>
</center></font>
Project 145
<hr>
<table height=150 width=100%>
<td width= 60%>
<font face=Comic Sans MS size=4 color=yellow>
<ul type=disc>
<form>
First Name: <input type=text
name=First Name><br>
Last Name: <input type=text
name=Last Name><br>
E-Mail Address: <input type=text name=E-Mail Address><br><br><br>
<font face=Comic Sans MS size=4><u>Gender:</u></font><br><br><input type=radio
name=sex value=male>Male<br>
<input type=radio name=sex value=female>Female<br>
</form>
<br><br>
<u>How Would You Rate Our Website:</u><br>
<br><input type=radio name=Excellent value=>Excellent<br>
<input type=radio name=Very Good value=>Very Good<br>
<input type=radio name=Good value=>Good<br>
<input type=radio name=Acceptable value=>Acceptable<br>
<input type=radio name=Bad value=>Bad<br>
<center><br><br>
<form name=input action=html_form_action.asp method=get>
     <input type=submit value=Submit>
</form></center></font>
</ul>
</td>
<td width=40%>
<img src = v.png>
</td>
</table>
<hr><hr>
<p align=left><img src=fd.jpg>
<p align=center><font face = trebuchet ms size = 2 color = yellow>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Festivals Of India | All Rights Reserved<br>
2. Create a websiteon Global Warming- its effect & prevention. It should also offer link
to the other web pages and each of these webpages should contain a link to home page
and tothe various html pages required in your site. Your site should have feedback
form .Use Gimp software to prepare images for web which are to be included in the
website.
<html>
<head>
<title></title>
</head>
<body bgcolor=black>
Project 147
<center><table background=g.jpg height=100 width=100% border=1 cellpadding=10>
<tr><td align=center width=150><img src=d.jpg height=150 width=150></
td><td align=right valign=middle><font face=trebuchet ms color=maroon
size=7><b><i>GLOBAL WARMING</i></b></font></td></tr></table></center><br>
<table width = 100% height=20 cellpadding = 10><tr><td width = 100% bgcolor =
maroon><font face = trebuchet ms color = white size = 6 valign = middle ><p
align = center> Stop Polluting The Earth!!! </font></td>
<table width = 100% height=5 cellpadding = 10><tr><td width = 100% bgcolor =
#F2AC28><font face = trebuchet ms color = Maroon size = 4 valign = middle
><b>
<center>
<a href=Effects.htm> Effects</a> |
<a href=Preventions.htm>Preventions</a> |
<a href=Feedback.htm>Feedback</a></b></font>
</center>
</td></tr></table><table bgcolor=black>
<tr border=2 bordercolor=black><td height=50 valign=top><br><center>
<img src = b.jpg height = 300 width = 300>  
;
<img src=a.jpg height=300 width=300>
<img src=c.jpg height=300 width=300 ></td></center></tr>
<br><hr>
<br><tr><td><hr>
<font face = calibri color = yellow size = 5>Global warming is the rise in the average
temperature of Earths atmosphere and oceans since the late 19th century and its projected
continuation. Since the early 20th century, Earths mean surface temperature has increased
by about 0.8 C (1.4 F), with about two-thirds of the increase occurring since 1980.
Warming of the climate system is unequivocal, and scientists are more than 90% certain
that it is primarily caused by increasing concentrations of greenhouse gases produced by
human activities such as the burning of fossil fuels and deforestation.These findings are
recognized by the national science academies of all major industrialized nations.</font>
</td></tr>
</table>
<br><hr><hr>
</body>
</html>
Click to Go Back!!!
<html>
<head>
<title></title>
</head>
<body link = blue vlink = purple alink = blue background=i.jpg>
<table height = 200 width = 100% background=g.jpg cellpadding = 60><tr><td width=35%
height=100></td><td width = 90% height = 100 valign = middle>
<font face = trebuchet ms color = maroon size = 7><center><i>Effects Of Global
Warming</i></font></td></tr></table></center>
<br>
<hr>
<br>
<table width = 100%>
<tr>
<td width = 50%>
<align = left>
&n
bsp; &nbs
p;
<img src = h.png height = 350 width = 450 border = 3></td>
Project 149
<td width = 50%>
<font face = calibri color = white size = 5><b><align = right>
The effects of global warming are the ecological and social changes caused by the rise in
global temperatures. There is a scientific consensus that climate change is occurring, and
that human activities are the primary driver. Evidence of climate change includes the
instrumental temperature record, rising sea levels, and decreased snow cover in the Northern
Hemisphere. According to the Intergovernmental Panel on Climate Change (IPCC), most
of the observed increase in global average temperatures since the mid-20th century is very
likely due to the observed increase in human greenhouse gas concentrations.</b>
</font></td></tr>
</table>
<br>
<hr><p align=center><font face = trebuchet ms size = 2 color = black>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Global Warming | All Rights Reserved
<p align =center><font face=monotype corsiva size=4>
</font><br>
<font face=trebuchet ms size=3><a href=Main.htm><b>Click to Go Back!!!</b></
a></font>
</body>
</html>
Click to Go Back!!!
Project 151
<font face=trebuchet ms size=3><a href=Main.htm><b>Click to Go Back!!!</b></
a></font>
</body>
</html>
Please Give your valuable feedback about what you feel about my webpage!!!
First Name:
Last Name:
E-Mail Address:
Gender:
Male
Female
Comments:
Submit
Feedback..
<html>
<head>
<title></title>
</head>
<body link = blue vlink = purple alink = blue background=m.jpg>
<font face=Comic sans ms size =5 color=yellow>
<u>Please Give your valuable feedback about what you feel about my
webpage!!!<br><hr>
<font face=comic sans ms size=5><center>
<a href = Main Page.htm>Click here to go back to the main page!!!</a>
Project 153
3. Create a website on London Games. It should have linksfor the description of various
games and each of these web pages should contain a link to home pagerequired in
your site. Result of the games should also be included in the site. Your site should have
feedback form .Use Gimp software to edit theimages to be included in the website.
<html>
<head>
<title>London Olympics 2012</title>
</head>
<body background =z.jpg>
<center><img src=5.png height=200></center>
</head>
<body>
<div id=navbar>
<ul>
<li><a href=mascot.htm>Mascots</a></li>
Project 155
<html>
<body background = z.jpg vlink=lightgreen>
<center><Font color = blue><h1>London Olympics Mascots</h1></font></center>
<center><img src = mascot.jpg><br><br><br>
<center>
<font color = yellow face=calibri size = 4 ><b>Wenlock and Mandeville are the official
mascots for the 2012 Summer Olympics and Paralympics being held in London, United
Kingdom.</b>
The mascots were unveiled on 19 May 2010; this marks the second time
(after Vancouvers Miga, Quatchi, Sumi and Mukmuk) that both Olympic and Paralympic
mascots were unveiled at the same time.
The mascots were created and designed by iris, a London-based creative agency.
Wenlock and Mandeville are animations depicting two drops of steel from a steelworks
in Bolton.They are named after the Shropshire town of Much Wenlock, which held a
forerunner of the current Olympic Games, and Stoke Mandeville Hospital,
a facility in Buckinghamshire that initially organised the Stoke Mandeville Games, the
precursor of the Paralympic Games.</center>
</center><br><br><br><center>
<a href=website.htm><b>Click here to go back</b></a>
</center>
</body>
</html>
</body>
</html>
Project 157
<html>
<body vilnk =blue>
<img src = stadium.jpg height=100% width=100% border=3>
<font face = calibri size = 4>
<center><b><a href =website.htm>Click to go back</a></font>
</center>
</body>
</html>
3. Create a website on the topic Travel & Tourism of India.Your site should contain
links on the home page linked to the other web pages. Your site should have feedback
form Use Gimp software to give various effects to theimages to be included in the
website.
Project 159
<td align = left>
<font face = calibri size =5><b>
So youve wanted to see the country and didnt know where to start? We at travel&tourism.
com have listed out the most popular places to see in India.
Weve sifted through guidebooks, travel industry data, polls and reviews from travellers like
you to come up with the top destinations within India. Of course, India is a vast country
with many more amazing experiences and it would be impossible to capture them all in
such a short list.<br></b>
</font></td></tr></table><br>
<hr><hr>
</body>
</html>
<html>
<head>
<title>Ladakh</title>
</head>
<body background=bg.jpg>
<imgsrc = 1.jpg width = 100% height = 325>
World class beaches; excellent cuisine; amazingly warm people; feni; Goan Port wine;
Portugues influence on culture and architecture; boutique guesthouses; markets; and above
all, living the local susegaad life. Goa has a unique fusion of cultures, lifestyles and
cuisines, while being one of the most easily accessible destinations from most Indian cities.
Project 161
<html>
<head>
<title>Goa</title>
</head>
<body background=bg.jpg>
<imgsrc = 1.jpg width = 100% height = 325>
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height =
35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align =
center><a href=Main.html> Home</a> | <a href = 2nd page.htm>Contact Us </a>|<a
href = Feedback.htm>Feedback</a></font></td></tr></table>
<br><br>
<table><tr>
<td width=50%>
<img src=island.jpg width=100%>
</td><td align = left>
<center>
<font face = calibri size =4>
<b>World class beaches; excellent cuisine; amazingly warm people; feni; Goan Port
wine; Portuguese influence on culture and architecture; boutique guesthouses; markets;
and above all, living the local Susegaad life.
Goa has a unique fusion of cultures, lifestyles and cuisines, while being one of the most
easily accessible destinations from most Indian cities.</b>
</center></font>
</td></tr></table>
</body></html>
<html>
<head>
<title>TajMahal</title>
</head>
<body background=bg.jpg>
<imgsrc = 1.jpg width = 100% height = 325>
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height =
35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align =
center><a href=Main.html> Home</a> | <a href = 2nd page.htm>Contact Us </a>|<a
href = Feedback.htm>Feedback</a></font></td></tr></table>
<br><br>
<table>
<tr>
<td width=50%>
<img src=taj.jpg width=100%>
</td>
<td align= center>
<font face = calibri size =4>
<b>The one sight that surpasses all hype... No words can describe the experience of taking
in the vision of this spectacular monument to love. So we wont even try. Just go.</b>
Project 163
</font>
</td></tr></table>
</body>
</html>
You can lvoe it or hate it, but we can guarantee you wont feel indifferent about the
Maximum City. You may feel overwhelmed if you go for a short visit. but stay on only
slightly longer and Mumbai (Its still an effort to not call it Bombay) will make you its
own.
<html>
<head>
<title>Mumbai</title>
</head>
<body background=bg.jpg>
<imgsrc = 1.jpg width = 100% height = 325>
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height =
35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align =
center><a href=Main.html> Home</a> | <a href = 2nd page.htm>Contact Us </a>|<a
href = Feedback.htm>Feedback</a></font></td></tr></table>
<br><br>
<table>
<tr>
<td width=50%>
Contact us at:
ABC Corporations
Connaught Place - 110089
Phone No.
And know the traditions of all Festivals and their Festivities
<html>
<head><title></title></head>
<body link = blue vlink = purple alink = blue background=bg.jpg>
<imgsrc = 1.jpg width = 100%>
<br>
<table width = 100% height = 35 bgcolor = #F2AC28><tr><td width = 100% height
= 35 valign = middle><font face = trebuchet ms color = maroon size = 4><p align
Project 165
= center><a href = Main.html> Home </a>| Travel & Tourism | <a href=Feedback.
htm>Feedback</a></font></td></tr></table>
<br>
<table width = 100%>
<tr>
<td width = 50%>
<align = left>
&nbs
p; &n
bsp;
<imgsrc = 7.jpg height = 200 width = 200 border = 3></td>
<td width = 50%>
<font face = trebuchet ms color = maroon size = 4><align = right>
Contact Us at: <br>
ABC Corporations <br>
Connaught Place - 110085 <br>
Phone No. - 12345678 <br>
And know the traditions of all Festivals and their Festivities
</font></td></tr>
</table>
<br>
<hr><p align=center><font face = trebuchet ms size = 2 color = black>
Home | Privacy Policy | Terms of Service | Feedback <br>
2010 © Travel & Tourism | All Rights Reserved
</font>
</body>
</html>
We strive to bring the best experience to consumers around the world through our innovative idea of building a website to help you know the best places in India.
We welcome your feedback on our website
First Name:
Last Name:
E-Mail Address:
Gender:
Male
Female
Excellent
Very Good
Good
Acceptable
Bad
<html><head><title></title></head>
<body link = blue vlink = purple alink = blue background=10.jpg>
<imgsrc = 1.jpg width = 100% height = 325>
<font face=Comic sans ms size =5 color=yellow>
<a href = Main.html>Home</a><hr>
We strive to bring the best experience to consumers around the world through our
innovative idea of building a website to help you know the best places in India. We
welcome your feedback on our website.
</center></font>
<hr>
<table height=150 width=100%>
<td width= 60%>
<font face=Comic Sans MS size=4 color=yellow>
<ul type=disc>
<form>
First Name: <input type=text
name=First Name><br>
Last Name: <input type=text
name=Last Name><br>
Project 167
E-Mail Address: <input type=text name=E-Mail Address><br><br><br>
<font face=Comic Sans MS size=4><u>Gender:</u></font><br><br><input type=radio
name=sex value=male>Male<br>
<input type=radio name=sex value=female>Female<br>
</form>
<br><br>
<u>How Would You Rate Our Website:</u><br>
<br><input type=radio name=Excellent value=>Excellent<br>
<input type=radio name=Very Good value=>Very Good<br>
<input type=radio name=Good value=>Good<br>
<input type=radio name=Acceptable value=>Acceptable<br>
<input type=radio name=Bad value=>Bad<br>
<center><br><br>
<form name=input action=html_form_action.asp method=get>
     <input type=submit value=Submit>
</form></center></font>
</ul>
</td>
<td width=40%>
<imgsrc = v.png>
</td>
</table>
<hr><hr>
</font>
</body>
</html>