Você está na página 1de 239

ICT

COMPILATION

7
TABLE OF CONTENTS

MS EXCEL .................................................................................................................................................................. 2
HTML .................................................................................................................................................................. 77
ADOBE FLASH ............................................................................................................................................... 106
FLOWCHARTS ............................................................................................................................................... 141
COMMUNICATION ON THE INTERNET ....................................................................... 162
COMPUTER VIRUSES .............................................................................................................................. 195
INTERNET RESEARCH .............................................................................................................................. 217
CHAPTER 1
MS EXCEL

1
MS Excel

1.1. MS-Excel Basics, Entering data

1.1.1. What is Excel?

Microsoft Excel is one of the most used software applications of all time. Hundreds of
millions of people around the world use Microsoft Excel. You can use Excel to enter all sorts
of data and perform financial, mathematical or statistical calculations.

1.1.2. Basics

Ribbon: The tabs on the ribbon are: File, Home, Insert, Page layout, Formulas, Data,
Review and View. Excel selects the ribbon's Home tab when you open a workbook.

Workbook: A workbook is another word for your Excel file. When you start Excel, click
Blank workbook to create an Excel workbook from scratch.
Worksheets: A worksheet is a collection of cells where you keep and manipulate the data.
Each Excel workbook can contain multiple worksheets.

4
Format Cells: When we format cells in Excel, we change the appearance of a
number without changing the number itself.

Find & Select: Learn how to use Excel's Find, Replace and Go To Special feature.

Templates: Instead of creating an Excel workbook from scratch, you can create a workbook
based on a template. There are many free templates available, waiting to be used.

5
Data Validation: Use data validation in Excel to make sure that users enter certain values
into a cell.

Keyboard Shortcuts: Keyboard shortcuts allow you to do things with your keyboard instead
of your mouse to increase your speed.

Print: This chapter teaches you how to print a worksheet and how to change some important
print settings in Excel.

Share: Learn how to share Excel data with Word documents and other files.

Protect: Encrypt an Excel file with a password so that it requires a password to open it.

1.1.3. Entering data

Excel beginners tend to reach for the mouse far too often. One of the keys to
productivity with Excel is to avoid using the mouse when entering data. In this
lesson we’ll quickly populate a worksheet without using the mouse at all.

1. Create a worksheet like this:

2. Notice the difference between values and text

Cells can contain values or text. Values can be numbers, dates or formulas (more
on formulas later).

6
Excel usually does a great job of recognizing when there are values in a cell and
when there is text. The giveaway is that text is always (by default) left aligned in
the cell and values are right aligned. Look at the numbers on this worksheet.
Notice how they are all right aligned. This lets you know that Excel has correctly
recognized them as values and will happily perform mathematical operations
using them.

3. Save a value into a cell.

 Type the value 42000 into cell B5. Notice that the mouse cursor is
still flashing in the cell.

At this stage the value has not been saved into the cell. If you change your mind,
you can still undo the value by pressing the <ESC> key at the top left of your
keyboard or by clicking the Cancel button on the left hand side of the
Formula Bar.

 Decide that you want to keep this value in the cell by either
pressing the <Enter>, <Tab> or an <Arrow> key on the
keyboard, or by clicking the Confirm button on left hand side of
the Formula Bar.

4. Enter a column of data without using the mouse.

When you enter data into a column, there’s no need to use them mouse. Press the
<Enter> key after each entry and the active cell moves to the cell beneath. Try
this now with the following January sales data:

a. Type 18,000 into cell B6.

b. Press the <Enter> key to move to cell B7.

7
c. Do the same to enter the relevant values into the next two cells.

5. Enter a row of data without using the mouse.

You can also enter a row of data without using the mouse.

a. Click in Cell C5.

b. Type 39,000 and then press the <Tab> key on your keyboard.

The <Tab> key is on the left hand side of the keyboard above the <Caps
Lock> key. Notice how pressing the <Tab> key saves the value into the
cell and then moves one cell to the right.

c. Type 43,000 into cell D5 and press the <Enter> key.

You magically move to cell C6 as Excel assumes you want to begin


entering data into the next row.

6. Complete the table without using the mouse.

By using the <Tab> or <Enter> key in the right place you should be able to
complete the table now without using the mouse:

8
7. Change the text in cell B3 to January

a. Double-click cell B3. Notice that there is now a flashing cursor in the
cell.

b. Type uary on the keyboard to change Jan to January.

c. Press the <Enter> key.

8. Change the text in cell B3 back to Jan using the formula bar.

Click once in cell B3 and then change the text in the formula bar back to Jan
(see sidebar).

9. Save your work as First Quarter Sales and Profit-2.

Exercise

9
1.2. Using autofill options

1.2.1. Autofill
Instead of entering data manually on a worksheet, you can use the Auto Fill feature to fill
cells with data that follows a pattern or that is based on data in other cells.

Use AutoFill for text and numeric series:

1. Open First Quarter Sales and Profit-8 from your sample files folder.

2. Delete the text Feb and Mar from cells C3:D3. Select cells C3:D3 and then
press the <Delete> key on your keyboard.

3. Make B3 the active cell. Notice that there is a green border around the cell and
a spot on the bottom right-hand corner. This is the AutoFill handle. If you
don’t see it, refer to the sidebar.

4. Hover over the AutoFill handle with your mouse until the cursor shape
changes to a black cross.

Many of my students have great difficulty with this when they try it for the
first time.

 You don’t want the four-headed arrow: that would move the cell.

 You don’t want the white cross: that would select the cell.

 You want the black cross: the AutoFill cursor.

10
5. When the black cross cursor is visible, hold down the mouse button and drag
your mouse to the right to AutoFill the other months: Feb and Mar.

Notice the tip that appears as you drag, previewing the month that will appear
in each cell. When you release the mouse button, the name of each month
appears in cells C3 and D3.

6. Type: Monday into cell A18 and AutoFill down to cell A24 to show the days
of the week.

7. In cell B18 type the number 1 and in cell B19 type the number 2.

8. Select cells B18 and B19.

9. AutoFill down to B24 to create sequential numbers:

10. In cell C18 type 9 and in cell C19 type 18.

11. Select cells C18 and C19.

12. AutoFill down to B24 to create the nine times table.

11
13. Use AutoFill to create sequential dates.

a. Type 01-Jan-08 into cell D18.

b. Type 02-Jan-08 into cell D19.

c. Select Cells D18:D19.

d. AutoFill down to D24 to create sequential dates.

14. Use AutoFill to quickly copy text.

Sometimes you will want to duplicate the value from one cell into many others to the right
of, left of, beneath, or above the active cell. When a cell containing text is the active cell and
it isn’t defined as a fill series (the built-in fill series are days of the week and months of the
year), AutoFill will simply duplicate the contents of the cell. Type the text Adjusted into cell
E18 and then AutoFill it down as far as cell E24.

The same text is now shown in each of the cells:

10

12
Exercise:
Create a table like this using autofill option in MS Excel.

1.3. Formating Cells, borders


1.3.1. Format Cells

When we format cells in Excel, we change the appearance of a number without changing the
number itself. We can apply a number format (0.8, $0.80, 80%, etc) or other formatting
(alignment, font, border, etc).
1. Enter the value 0.8 into cell B2.

By default, Excel uses the General format (no specific number format) for numbers.
To apply a number format, use the 'Format Cells' dialog box.

11

13
2. Select cell B2.
3. Right click, and then click Format Cells (or press CTRL + 1). The 'Format Cells'
dialog box appears.

4. For example, select Currency.

5. Click OK.

12

14
Cell B2 still contains the number 0.8. We only changed the appearance of this number.
The most frequently used formatting commands are available on the Home tab.
6. On the Home tab, in the Number Group, click the
percentage symbol to apply a Percentage format.

7. On the Home tab, in the Alignment Group, center the number.

8. On the Home tab, in the Font group, add outside borders and change the font color
to blue.

Result:

13

15
1.3.2. Font Group.

Change the font family and font size from the


drop down list

Increase or decrease font size

Font Style: Make the text bold, italic, underline

Borders: Use borders for selected cells

Fill Color: Change the background color of the


cells

Font Color: Change the font color of the cells

Dialog Box Launcher: Opens the Format cell


Dialog box from which you can change all the
properties of the selected cells.

1.3.3. Alignment Group.

Applies vertical cell alignment to the selected range.

Change text direction in the selected range

Wrap text: Without changing the column width, wraps


the text from the end of the column to the next row.
Applies horizontal cell alignment to the selected
range.
Decrease and Increase Indent: Changes the start
position of the text without changing the left margin.
Merge cells: Merges selected cell as if they are one
cell. Or, unmerges them back.

14

16
1.3.3.1. Warp Text

Wrap text in Excel if you want to display long text on multiple lines in a single cell. Wrap
text automatically or enter a manual line break.

A. Wrap Text Automatically


1. For example, take a look at the long text string in cell A1 below. Cell B1 is
empty.

2. On the Home tab, in the Alignment group, click Wrap Text.

Result:

3. Click on the right border of the column A header and drag the separator to
increase the column width.

15

17
4. Double click the bottom border of the row 1 header to automatically adjust
the row height.

Note: if you manually set a row height (by clicking on the bottom border of a row
header and dragging the separator), Excel does not change the row height when
you click the Wrap Text button. Simply double click the bottom border of a row
header to fix this.
5. Enter an extra-long text string in cell B1 and wrap the text in this cell.

Note: by default, Excel aligns text to the bottom (see cell A1).
6. Select cell A1.
7. On the Home tab, in the Alignment group, click Top Align.

Result:

16

18
B. Manual Line Break
To insert a manual line break, execute the following steps.
1. For example, double click cell A1.
2. Place your cursor at the location where you want the line to break.
3. Press Alt + Enter.

1.3.3.2.Merge Cells

1. Enter a label in cell A1.

2. Select the range A1:G1.

3. On the Home tab, in the Alignment Group, click Merge & Center.

17

19
Result:

1.3.4. Borders

Apply a border style using the Presets options or


Presets
remove an old border style.
Choose a border Line Style , then click the border
Line Style
to which you want to apply the new line style.
Select a color from the list to change the line
Line Color
color.
You can add/remove any Border lines by clicking
Border on them. The new lines will have the color and
style you selected

18

20
Borders example:
1. Select the cells

2. Click Dialog Box Launcher and click Borders tab

3. Select the Line Style and Color (Example: red) and Outline from Presets.

Result:

19

21
4. Now to change the inside borders select the cells and go again in Borders tab in
Format cells dialog box. Select again the Line Style and the color green here and
click in the borders group where you want to insert this borders.

Result:

Exercise: Prepare this table.

20

22
1.4. Review and Practice

Exercise 1: Format the data so it looks like the following

Exercise 2: Create the number series shown below (without typing them all in!), using
number formatting to get them to appear as shown:

21

23
Exercise 3: Create a table like this:

22

24
1.5. Cell and range references

A cell in excel is the intersection between column and row. A reference identifies a cell or a
range of cells in a worksheet, and tells Excel where to look for the values or data you want to
use in a formula.

The cell in column A and row 1 A1


The range of cells in column B and row 1 through 20 B1:B20
The Range of cells in row 4 and column B through D B4:D4
All cells in row 8 8:8
All cells in row 3 through 6 3:6
All cells in column E E:E
All cells in column B through D B:D
The range cells in column C through E and
rows 5 through 10 C5:E10

1.5.1. Access a Cell

If you want to access a cell we have two ways.

1. Click in the name box and write the cell address and press Enter

23

25
2. Just click in the cell that you want and you see that is written the address in the Name
Box.

1.5.2. Types of cell reference (Relative, Absolute and Mixed Reference)


When you use a cell (or a range) reference in a formula, you can use the following three
types of references:
Type How to write
Relative A1
Absolute $A$1
$A1
Mixed
A$1

Exercises:
1. What are the three types of cell referencing?
2. Write an absolute cell reference ________
3. Write a relative cell reference ________
4. Write a mixed cell reference ________
5. Write how to collect the cells from A1 to D14 __________
6. Write how to c\select all the column C ___________

24

26
1.6. Auto Sum Features

The AutoSum feature automatically adds numbers in the selected cells. You can use it to
find the average, maximum, etc. for a range of cells. The AutoSum button is present at two
places on the ribbon:
1. In Editing group on the HOME tab

2. In the Function Library group on the Formulas tab

1.6.1. Calculating Totals with AutoSum


Create a table like this

25

27
Average: Find the average of selected cells.
To find the average of this three marks click in the cell E2 and go to AutoSum button click
the arrow and select the Average option.

Result:

To find for the others students now just use the AutoFill.

Maximum: find the maximum of selected cells.


Let’s find the maximum average in cell E8
Select the cell E8 and now go to AutoSum click the arrow and select the Max function and
select now the cells from E2:E6

26

28
Result:

Minimum: Find the minimum number of selected cells.


Let’s find the minimum average in cell E9
Select the cell E9 and now go to AutoSum click the arrow and select the Min function and
select now the cells from E2:E6

27

29
Result:

Sum: find the sum of selected cells.


Let’s find the sum of average in cell E10
Select the cell E10 and now go to AutoSum click the arrow and select the Sum function and
select now the cells from E2:E6

Result:

28

30
Count: find how many numbers we have in selected cells.
Let’s find how many numbers we have in average column and write it in cell E11
Select the cell E11 and now go to AutoSum click the arrow and select the Sum function and
select now the cells from E2:E6

Result:

29

31
Exercise 1: Create a table like this format it and find the average, maximum and minimum
of temperature in given cities.

Exercise 2:

Create a table with yours subject, find the average of the subject the max mark and the
minimum mark for every subject.

30

32
1.7. Using formulas
To enter a formula, select a cell and enter the formula in the cell or in the formula bar. When

you finish entering the formula click (or press enter), the cell will show the formula
result and not the formula itself.
However you see the formula in the formula bar, let us calculate the sum of the numbers in
cell B2, C2 and D2.
1. Click the cell where you want to find the sum.
2. Start with equal sign (=) and write the names of cells that you want to add and later
press + for example =B2+C2+D2 and press enter.
3. Or you can type equal sign and later click the cell that you want to add later + sign
and so on. This method is called Pointing
Example:

Let’s take an example and remember the cell references. How type of cell references we
have? In the first exercise we will use the relative cell reference. Create this table:
To find the Inters Amount using the formula:
Principal Amount*Rate of Interest*Time in Years
Click the cell D2 and type this =A2*B2*C2

31

33
To find for the others just use the Autofill and you find it automatically.

Result:

In this exercise we will use the Absolute cell reference remember that an absolute cell
reference start with a $ sign before the column (Letter) or row (number). Create this table:

Try to write the formula to find the Interest. You find it? Try to use autofill? What
happened?

32

34
Because we use autofill change also the cell for years and in the second row now the cell for
times in years is D2 not D1 that we want.
Now write the formula again in cell C2 write this formula =A3*B3*D$1. Because I want to
move down I want to let fixed the row of the Times in Years and for that reason I use the $
sign before the row (number).

Now to find the other values you can use the Autofill.

Result:

33

35
Exercise 1: Calculate the area of a rectangle for various lengths and breadths.

Exercise 2: Create a table that is used to exchange money from lek in different currencies.

34

36
1.8. Review and Practice

Exercise 1: Format the data so it looks like the following

Exercise 2: Create a table like this find the total for each item (QTY*Price) find the total
price and the average for the total and in cell B11 find the remaining budget:

Exercise 3: Create a multiplication table like this:

35

37
1.9. Function Library

Functions in Excel are predefined formulas that perform specific calculations.


Click the Formulas tab. In the Function Library group, click the function button for the
category of function you want, such as Financial, Logical, Text, Date & Time, Lookup &
Reference, or Math & Trig. Then select the required function from the list that appears.

Let see about two functions in Math & Trig category GCD and LCM.
This function calculates the GDC or the greatest common divisor of two or more integer.
The greatest common divisor is the largest integer that can divide the numbers without a
remainder. It also called the highest common factor. The steps to calculate are as follow.
1. Type two numbers in cell A1 and A2 and select the cell A3, which is the cell where
you want to find the GCD.

2. Click on Formulas Tab, click the Math & Trig button and then select GCD from
the drop-down menu.

36

38
3. The Function Arguments appears. Type A1 and A2 in the Number1 and Number2.
Observe that the result of the formula appears near the bottom of the dialog box.
Click OK.

1.9.1. LCM

This function calculates the least common multiple of two or more integers. The least
common multiple (LCM) is the smallest positive integer that is a multiple of all the given
numbers. The steps to calculate LCM are:
1. Type three numbers in cell A1 and A2 and A3 select the cell A4, which is the cell
where you want to find LCM.

37

39
2. Click on Formulas Tab, click the Math & Trig button and then select LCM from
the drop-down menu.

3. The Function Arguments appears. Type A1, A2, A3 in the Number1, Number2,
and Number3. Observe that the result of the formula appears near the bottom of the
dialog box. Click OK.

Exercise 1:
Find the GCD of this numbers 24 and 44

Exercise 2:
Find the LCM of this numbers 30, 15, 50, 45

38

40
1.10. Creating a Formula Using Insert Function

In order to create a formula using Insert Function you should follow the steps below:

1. Click the cell in which you want to enter a formula.

2. Click Insert Function on the Formula Bar or click the More Functions
option from the AutoSum menu.

Or click the Insert Function button in the Function Library group on the Formulas tab.

3. The insert Function Dialog Box appears.

4. In the Or select a category box, select


All. If you are familiar with the function
categories, you can also select a category.
5. In the Select a function box, select the
function you want to use and then click
OK
6. In the arguments dialog box that are
displayed for the function you selected,
enter the values or cell references, or
select the cell that you want to reference, and click OK.

39

41
Exercise: Use the insert function option and find the average and min and max in this table.

40

42
1.11. Review and Practice

Define each word.


1. COUNT....................................................................................................................
2. MIN..........................................................................................................................
3. Absolute....................................................................................................................
4. Mixed........................................................................................................................
5. Average....................................................................................................................
6. Functions..................................................................................................................
7. GCD..........................................................................................................................

41

43
8. MAX.........................................................................................................................
9. SUM.........................................................................................................................
10. LCM.........................................................................................................................
11. Relative.....................................................................................................................

Practice

Rayan maintains data on its salesperson in a worksheet as give below. List the steps to
calculate the commission (13% of sales amount), the total, average, maximum and minimum
of the sales amount, and the commission.

42

44
1.12. Creating Charts and Types of Charts

1.12.1.Creating Charts

A chart is a pictorial representation of data. A simple chart in Excel can say more than a
sheet full of numbers. As you'll see, creating charts is very easy.
To create a line chart, execute the following steps.
1. Select the range A1:D7.

2. On the Insert tab, in the Charts group, click the Line symbol.

43

45
3. Click Line with Markers.

Result:

Note: enter a title by clicking on Chart Title. For example, Wildlife Population.

44

46
1.12.2.Types of Charts.

Line Chart: The line chart is one of the most frequently used chart types, typically used to
show trends over a period of time. If you need to chart changes over time, consider using a
line chart.

Column Chart: Column charts are typically used to compare several items in a specific
range of values. Column charts are ideal if you need to compare a single category of data
between individual sub-items, such as, for example, when comparing revenue between
regions.

Clustered Column Chart: A clustered column chart can be used if you need to compare
multiple categories of data within individual sub-items as well as between sub-items. For

45

47
instance, you can use a clustered column chart to compare revenue for each year within each
region, as well as between regions.

Stacked Column Chart: A stacked column chart allows you to compare items in a specific
range of values as well as show the relationship of the individual sub-items with the whole.
For instance, a stacked column chart can show not only the overall revenue for each year, but
also the proportion of the total revenue made up by each region.

Pie Chart: Another frequently used chart is the old pie chart. A pie chart represents the
distribution or proportion of each data item over a total value (represented by the overall
pie). A pie chart is most effective when plotting no more than three categories of data.

46

48
Bar Chart: Bar charts are typically used to compare several categories of data. Bar charts
are ideal for visualizing the distribution or proportion of data items when there are more than
three categories. For instance a bar chart could be used to compare the overall revenue
distribution for a given set of products.

Area Chart: Area charts are ideal for clearly illustrating the magnitude of change between
two or more data points. For example, you can give your audience a visual feel for the
degree of variance between the high and low price for each month.

47

49
Combination Chart: A combination chart is a visualization that combines two or more chart
types into a single chart. Combination charts are an ideal choice when you want to compare
two categories of each individual sub-item. They are commonly used to create visualizations
that show the difference between targets versus actual results.

XY Scatter Plot Chart: Scatter charts in Excel (also known as XY scatter plot charts) are
excellent for showing correlations between two sets of values. For example an XY scatter
plot can be used to illustrate the correlation between employee performance and competency,
demonstrating that employee performance rises as competency improves. The x and y axes
work together to represent data plots on the chart based on the intersection of x values and y
values.

48

50
Bubble Chart: A bubble chart is a variation of an XY scatter plot. Just like the XY scatter
plot, bubble charts show the correlation between two sets of data. The difference is the
addition of a third dimension that is represented by the size of each bubble in the chart. This
third dimension is typically used to show the relative impact of a quantitative data item. For
instance, in addition to showing employee performance versus competency, you can have the
size of each bubble represent years of service, allowing your audience to quickly get a sense
of how years of service may affect the relationship between competency and performance.

49

51
1.13. Components of a Chart

We have seen the different types of charts that are possible for the same data set. Let us
now understand the various components of a chart.

 Data Table: It refers to the set of data values from which the chart is derived.
 X-Axis: It is the horizontal axis of the chart. It is also know as the category axis.
 Y-Axis: It is the vertical axis of the chart. It also know as the value axis. He
value of each data point is plotted on this axis.
 Chart Title: It is usually placed at the top of the chart and helps the user
understand what the chart represents.
 Axis Title: It is the title given to an axis. A 2-D graph has two axes (x and y) and
a 3-D one has three (x,y, and z).
 Chart Area: It refers to the area within which all chart components are placed.
Often, it is surrounded by a border.
 Plot Area: It is the rectangle area bounded by the two axes. The x-axis and the y-
axis define the two sides of the rectangle plot area.
 Legend: It identifies the data series. A unique color or pattern is assigned to each
data series to make it easier to distinguish them visually.
 Gridlines: Lines that run across the plot area from each category on the x-axis
and from each value on the y-axis. You can choose whether to display them or
not. They make it easier to identify the value of each data point on the chart.
 Data Label: A label that provides additional information about a data point on a
chart.

50

52
Chart Title
Y-axis
Gridline

Data Label

Axis Title

Legend

Data Table

Exercise:
Create a chart for this information.

51

53
1.14. Creating Charts

We will learn how to create different charts (before we learn how to create a line chart now
we will learn how to create Column Chart, Bar Chart, Pie Chart)

1.14.1.Create a Column Chart.


Column charts are used to compare values across categories by using vertical bars. To create
a column chart, execute the following steps.
1. Select the range A1:A7, hold down CTRL, and select the range C1:D7.

2. On the Insert tab, in the Charts Group, click the Column Symbol.

3. Click Clustered Column.

52

54
Result:

1.14.2.Bar Chart

A bar chart is the horizontal version of a column chart. Use a bar chart if you have large text
labels. To create a bar chart, execute the following steps.
1. Select the range A1:B6.

2. On the Insert Tab, in the Charts Group, click the Column Symbol.

53

55
3. Click Clustered Bar.

Result:

1.14.3. Pie chart

Pie charts are used to display the contribution of each value (slice) to a total (pie). Pie charts
always use one data series. To create a pie chart of the 2017 data series, execute the
following steps.
1. Select the range A1:D2.

54

56
2. On the Insert Tab, in the Charts Group, click the Pie symbol.

3. Click Pie.

55

57
Result:

4. Click on the pie to select the whole pie. Click on a slice to drag it away from the
center.

Result:

56

58
1.15. Review and Practice

Exercise 1: Using this data create a Pie Chart like this.

Exercise 2: Using this data create a Column Chart like this:

57

59
1.16. Formating Charts

To create a chart:

1. Select the cells you want to chart, including the column titles and row labels. These
cells will be the source data for the chart.

2. Click the Insert tab.

3. In the Charts group, select the desired chart category (Column, for example).

4. Select the desired chart type from the drop-down menu (Clustered Column, for
example).

58

60
5. The chart will appear in the worksheet.

Chart tools

Once you insert a chart, a set of chart tools arranged into three tabs will appear on the
Ribbon. These are only visible when the chart is selected. You can use these three tabs to
modify your chart.

59

61
To change chart type:

1. From the Design tab, click the Change Chart Type command. A dialog box appears.

2. Select the desired chart type, then click OK.

To switch row and column data:

Sometimes when you create a chart, the data may not be grouped the way you want. In the
clustered column chart below, the Book Sales statistics are grouped by Fiction and Non-
Fiction, with a column for each year. However, you can also switch the row and column data
so the chart will group the statistics by year, with columns for Fiction and Non-Fiction. In
both cases, the chart contains the same data—it's just organized differently.

60

62
1. Select the chart.

2. From the Design tab, select the Switch Row/Column command.

3. The chart will readjust.

61

63
To change chart layout:

1. Select the Design tab.

2. Click the More drop-down arrow in the Chart Layouts group to see all of the
available layouts.

3. Select the desired layout.

4. The chart will update to reflect the new layout.

62

64
To change chart style:

1. Select the Design tab.

2. Click the More drop-down arrow in the Chart Styles group to see all of the available
styles.

3. Select the desired style.

4. The chart will update to reflect the new style.

63

65
To modify the chart components.

1. Select the Format tab and from here go to the Current Selection to select the
component.

2. After you select the Component go to Shape Style group and change the appearance

3. From here you can change the Shape fill selecting a color or a gradient color.

4. You can use also from the Shape outline what kind of outline you want to use what
kind of color and the weight of the outline.

Example: Select the Series Jan and change the Shape fill with red color and green outline
with weight 3pt.

64

66
To move the chart to a different worksheet:

1. Select the Design Tab.

2. Click the Move Chart command. A dialog box appears.

The current location of the chart is selected .

3. Select the desired location for the chart (choose an existing worksheet, or select New
Sheet and name it).

4. Click OK. The chart will appear in the new location.

Exercise: Create a chart like this.

65

67
1.17. Spartlines

Sometimes you may want to analyze and view trends in your data without creating an entire
chart. Sparklines are miniature charts that fit into a single cell. Because they're so compact,
it's easy to include several sparklines in a workbook.

Types of sparklines

There are three different types of sparklines: Line, Column, and Win/Loss. Line and
Column work the same as line and column charts. Win/Loss is similar to Column, except it
only shows whether each value is positive or negative instead of how high or low the values
are. All three types can display markers at important points, such as the highest and lowest
points, to make them easier to read.

Line Column WIN/LOSE

Why use sparklines?

Sparklines have certain advantages over charts. For example, let's say you have 1,000 rows
of data. A traditional chart would have 1,000 data series to represent all of the rows, making
relevant data difficult to find. But if you placed a sparkline on each row, it will be right next
to its source data, making it easy to see relationships and trends for multiple data series at the
same time.

66

68
Sparklines are ideal for situations when you need a clear overview of the data at a glance and
when you don't need all of the features of a full chart. On the other hand, charts are ideal for
situations when you want to represent the data in greater detail, and they are often better for
comparing different data series.

To create sparklines:

Generally, you will have one sparkline for each row, but you can create as many as you want
in any location. Just like formulas, it's usually easiest to create a single sparkline and then use
the fill handle to create sparklines for the adjacent rows. In our example, we'll create
sparklines to help visualize trends in sales over time for each salesperson.

1. Select the cells that will serve as the source data for the first sparkline. In our
example, we'll select the cell range B2:G2.

67

69
2. Select the Insert tab, then choose the desired Sparkline from the Sparklines group.
In our example, we'll choose Line.

3. The Create Sparklines dialog box will appear. Use the mouse to select the cell
where the sparkline will appear, then click OK. In our example, we'll select cell H2,
and the cell reference will appear in the Location Range: field.

4. The sparkline will appear in the specified cell.

68

70
5. Click, hold, and drag the fill handle to create sparklines in adjacent cells.

6. Sparklines will be created for the selected cells. In our example, the sparklines show
clear trends in sales over time for each salesperson in our worksheet.

69

71
Modifying sparklines

It's easy to change the way sparklines appear in your worksheet. Excel allows you to
customize a sparkline's markers, style, type, and more.

To display markers:

Certain points on a sparkline can be emphasized with markers, or dots, making the sparkline
more readable. For example, in a line with a lot of ups and downs, it might be difficult to
tell which values are the highest and lowest points. Showing the high point and low point
will make them easier to identify.

1. Select the sparkline(s) you want to change. If they are grouped in adjacent cells,
you'll only need to click on one sparkline to select them all.

2. From the Design tab, select the desired option(s) from the Show group. In our
example, we'll select High Point and Low Point.

70

72
3. The sparkline(s) will update to show the selected markers.

To change the sparkline style:

1. Select the sparkline(s) you want to change.

2. From the Design tab, click the More drop-down arrow.

3. Choose the desired style from the drop-down menu.

71

73
4. The sparkline(s) will update to show the selected style.

To change the sparkline type:

1. Select the sparkline(s) you want to change.

2. From the Design tab, select the desired Sparkline type. In our example, we'll select
Column.

3. The sparkline(s) will update to reflect the new type.

72

74
Exercise: Create a Sparkline like this:

73

75
1.18. Review and Practice

Exercise 1: Format cells like this here.

Exercise 2: Use the AutoSum features to find the results:

Exercise 3: Use the absolute references to find the tax this we can get from the cell C2:

74

76
Exercise 4: Create a chart like this:

Exercise 5: Format this table and use the Sparklines WIN/LOSE in this way:

75

77
CHAPTER 2
HTML

76

78
HTML (Hypertext Markup Language)

2. Introduction to HTML (Editors and Elements Basics)


2.1. What is HTML?

HTML is a language for describing web pages.

 HTML stands for Hyper Text Markup Language


 HTML is not a programming language, it is a markup language
 A markup language is a set of markup tags
 The purpose of the tags are to describe page content

2.1.1. HTML Text Editor

An HTML editor is a Software tool to create and modify HTML documents. HTML editors
can be divided into three categories: Text editors, WYSIWYG editors and Online editors.

O WYSIWYG (What You See Is What You Get) Editors: let you built HTML Pages
without knowing HTML tags or commands.
O Advantages of WYSIWYG editor:
O Web Sites can be created quickly
O No knowledge of HTML or Tags is required.
O Examples are: Dreamweaver, Microsoft Visual Web Developer Express etc.
O Text Editor: let you built HTML Pages knowing HTML tags or commands.
O Examples are: Notepad, notepad++, Nano, WordPad etc

77

79
2.1.2. HTML Elements

 "HTML tags" and "HTML elements" are often used to describe the same thing.
 HTML elements that include both ON and OFF tags are called container elements.
 But strictly speaking, an HTML element is everything between the start tag and the
end tag, including the tags:
o For example:
 <p>This is a paragraph.</p>
 HTML elements that only have an ON tag and do not require an OFF tag are called
empty elements.
o For example:
 <hr> tag which is used to draw a horizontal line
HTML Documents = Web Pages

 HTML documents describe web pages


 HTML documents contain HTML tags and plain text
 HTML documents are also called web pages

2.1.3. Web Browsers

The purpose of a web browser (Chrome, Internet Explorer, Firefox) is to read HTML
documents and display them as web pages. The browser does not display the HTML tags,
but uses the tags to interpret the content of the page:

78

80
HTML Page Structure

<html>

<head>

<title> My First Page </title>

</head>

<body>

<h1> This is a Heading </h1>

<p> This is a paragraph. </p>

<p> This is another paragraph. </p>

</body>

</html>

79

81
Task 1 – My First Webpage

a. Open up Microsoft Notepad (Start>Programs>Accessories>Notepad)

b. Type the following into notepad.

c. Create a folder in your personal drive called ‘My first website’

d. Save the page as ‘index.html’

Double click your webpage to see what it looks like in a web browser.

80

82
Task 2 – Analyse what you have created

Open up a blank Microsoft Word Document. Screenshot your


webpage in both Notepad and Internet Explorer.

Use text boxes to analyse each line of your HTML code and
explain what it does.

Task 3 – This is a webpage

Create a webpage that prints your name to the screen with every letter being a different
heading size and set its title to "This is a webpage".

2.2. HTML Headings and Paragraphs

2.2.1. What Headings and Paragraphs are?


HTML provides the structure of the document (consisting of all the individual HTML
elements on the page). HTML also provides the semantics of an HTML document. Elements
are generally used for a particular meaning. For example, a heading level 1 is more important
than a heading level 2.

2.2.2. HTML Headings


There is a special tag for specifying headings in HTML. There are 6 levels of headings in
HTML ranging from <h1> for the most important, to <h6> for the least important.

81

83
<h1>Heading 1</h1>

<h2>Heading 2</h2>

<h3>Heading 3</h3>

<h4>Heading 4</h4>

<h5>Heading 5</h5>

<h6>Heading 6</h6>

2.2.3. HTML Paragraphs

To create a paragraph, surround the words that make up the paragraph with an opening <p>
tag and closing </p> tag.
By default, a browser will show each paragraph on a new line with some space between it
and any subsequent paragraphs.

82

84
2.2.4. Line break element <br>
The browser does not recognize the paragraph formatting in HTML text. If you want to start
a new line, you need to insert a line break with <br>. This element has no end tag.

Example (without break line)

Example (with break line)

Exercise 1
Create a webpage like this.

83

85
2.3. Text and Font Properties
2.3.1. Text properties

All elements have various properties, for example, text, font, margin, etc. All these
properties have default values. These values can be changed by the person writing the code.
The text properties provide you with various text formatting options that help you style text
in a Web page. The table below shows various text properties, their description, and the
values that they can assigned.

Property Description Values Examples

Color Specifies the Color name Color: red


foreground color of
the text. Hexadecimal Color: #243459

RGB color values Color: rgb (255, 0, 0)

Text-align Specifies the Left Right Text-align: right


horizontal alignment
of text or block of Center Justify
text

Line-height Specifies the distance Normal Number Line-height: normal


between two lines
Length Line-height: 8px

percentage value

Text-decoration Specifies the None Underline Text-decoration: overline


decorations that are Overline
added to the text. Text-decoration: undeline
line-through

Text-shadow Specifies a list of None Text-shadow: 2px 2px yellow


shadow effects to be
applied to the text color name or value

Text-transform Controls the None Text-transform: uppercase


capitalization of text
Uppercase

Lowercase

84

86
2.3.2. The style attribute

The style attribute is used to specify the styling of an element, like the color, font, size etc.
The syntax to use the style is like this:

<element style=”property: property value”> *******</element>

Example:

Make the text color of the paragraph red

<p style=”color: red”> text of the paragraph </p>

Make the text color of the paragraph red and align in the center. Now after the first property
put a semi-colon;

<p style=”color: red; text-align: center”> text of the paragraph </p>

85

87
Exercise 1:

Change the second paragraph, make the font color green, align it on right and make it all
uppercase and the line height 16px like in the picture.

86

88
2.3.3. Font Properties

Property Description Values Examples

Specifies all the font


“font-style font-
font properties in one Font: italic 24px calibri
size font-family”
declaration

Specifies a list of font Font name


Font-family Font-family: calibri
names

x-small

small
Font-size: large
Specifies the size of a medium (default)
Font size Font-size: 15px
font Large
Font-size: 15pt
Value

percentage

Normal Font-style: italic


Specifies the style of the
Font-style Italic Font-style: obilique
font.
obilique

87

89
Example 1:

Make the font family of the paragraph Calibri and font color red

<p style=”font-family: Calibri; color: red”> text of the paragraph </p>

Example 2:

Make the font family of the paragraph Calibri font size 20px and font color red.

<p style=”font-family: Calibri; font-size: 20px; color: red”> text of the paragraph </p>

88

90
Exercise 2:

Change the second paragraph, make the font color green, align it on right and make it all
uppercase and the line height 16px, font family=Arial, font size= 18px and font style= italic.

89

91
2.4. HTML Formating
If you use a word processor, you must be familiar with the ability to make text bold,
italicized, or underlined; these are just three of the ten options available to indicate how text
can appear in HTML.

Formatting elements were designed to display special types of text:

Tag Element Description

<b> Bold text

<strong> Important text

<i> Italic text

<em> Emphasized text

<mark> Marked text

<small> Small text

<del> Delete text

<ins> Inserted text

<sub> Subscript text

<sup> Superscript text

How to use the formatting elements.

The syntax to use the formatting elements is like this: <tag > text </tag>

HTML <b> and <strong> Elements

The HTML <b> element defines bold text, without any extra importance.

90

92
Example:

Make the first two lines of the paragraph bold.

HTML <i> and <em> Elements

The HTML <i> element defines italic text, without any extra importance.

HTML <small> Element ( The HTML <small> element defines smaller text):

91

93
HTML <mark> Element

The HTML <mark> element defines marked or highlighted text:

HTML <del> Element

The HTML <del> element defines deleted (removed) text.

HTML <ins> Element

The HTML <ins> element defines inserted (added) text.

92

94
HTML <sub> Element

The HTML <sub> element defines subscripted text.

HTML <sup> Element

The HTML <sup> element defines superscripted text.

93

95
Exercise:

Using the HTML formatting elements create a webpage like this.

94

96
2.5. Review and Practice

1. Make the title bold italic and underline and highlight, position it on the centre.
2. Write the first paragraph with Arial font and the size 20px, use text
transformer to change all in capital letters, align on left and the color of the
text green.
3. Write the first paragraph with Calibri font and the size 18px, align on center
and the color of the text red. Make the words Triumph as superscript and
Disaster as subscript in the third line.

Rudyard Kipling: IF

If you can keep your head when all about you


are losing theirs and blaming it on you,
if you can trust yourself when all men doubt you,
but make allowance for their doubting too;
if you can wait and not be tired by waiting,
or being lied about, don‟t deal in lies,
or being hated, don‟t give way to hating,
and yet don‟t look too good, nor talk too wise:

If you can dream—and not make dreams your master;


if you can think—and not make thoughts your aim;
if you can meet with triumph and disaster
and treat those two impostors just the same;
if you can bear to hear the truth you‟ve spoken
twisted by knaves to make a trap for fools,
or watch the things you gave your life to, broken,
and stoop and build ‟em up with worn-out tools:

Preview of the finished webpage.

95

97
2.6. HTML Backgrounds Colors and Images
2.6.1. Background Properties

Background properties are used to set the background style of an HTML element.
Background properties are explained in the following table.

Property Description Values Examples

Specifies the Color name/ color Background-color:


Background-color
background color value/ transparent green

Specifies the Background-image:


Background-image URL of the image
background image url(„image.jpg‟)

Left top/ left center/


left bottom/ right
top/ right center/
Specifies the initial
Background- right bottom/ center Background-position:
position of the
position top/ center center/ center center
background image
center bottom x-
position, y-position
X%, Y%

Specifies whether
the background
Background- image is fixed or Scroll Background-
attachment scroll when the user Fixed attachment: fixed
scrolls the rest of the
page

Repeat
Specifies whether
the background Repeat-x Background-repeat:
Background-repeat
image is repeated or Repeat-y repeat-x
not
No-repeat

96

98
Setting background color

The background color property allows you to set the background color of the HTML element
or document.

Example:If you want to change the background of the paragraph in red color the syntax is
like this:

<p style=”background-color: red”> text of the paragraph </p>

Example If you want to change the background of the paragraph in red color and the
background color of the webpage in yellow the syntax is like this:

<body style=”background-color: yellow”>

<p style=”background-color: red”> text of the paragraph </p>

97

99
Setting the Background Image

You can enhance the background of the HTML document by adding a picture in the
background using the background-image property.

Example:

If you want to add an image as background webpage you should use a syntax like this:

<body style=”background-image: url(„flower.jpg‟)>

Example:

If you want to add an image as background webpage and you want to position it in the center
and you don‟t want to repeat the image you should use a syntax like this: (be careful because
the webpage and the image should be in the same place in this code)

98

100
<body style=”background-image: URL („flower.jpg‟); background-position: center center;
background-repeat: no-repeat”>

Exercise:

Create a webpage like in the image.

99

101
2.7. HTML Links and Borders

2.7.1. HTML Links

Links are found in nearly all web pages. Links allow users to click their way from page to
page. HTML links are hyperlinks. You can click on a link and jump to another document.
When you move the mouse over a link, the mouse arrow will turn into a little hand.

HTML Links – Syntax

In HTML, links are defined with the <a> tag: <a href="url">link text</a>

Example link text (go from your web page to google)

<a href=”https://www.google.com/”> Go to Google </a>

Example link text: Go from your web page to another webpage this should be in the same
folder.

Syntax: <a href=”name of the page.html”> link text </a>

Example: <a href=”second..html”> Go to Second Page </a>

100

102
2.7.2. HTML Borders

You can set the border width, border style and border color of any HTML element. Use the
table below for the properties of borders.

Property Description Values

Sets all the border properties Border-width, border- Border: solid 3px
Border
in one declaration style, border-color green

Thin Thick

Medium (default) Border-width: thick


Specifies the width of the
Border-width
border Length (you can define Border-width: 6px
the thicknees of the
border)

None (no border)

Dotted Dashed
Specifies the style of the Border-style: solid
Border-style Solid Double
border Border-style: ridge
Groove Ridge

Inset Outset

Specifies the color of the Color name


Border-color Border-color: red
border Color value

101

103
Example for paragraph border

<p style=”border-style: dotted; border-width: 6px; border-color: red> text </p>

Or

<p style=”border: dotted 6px red”> text </p>

Practice:

Create a webpage like this:

102

104
2.8. Review and Practice

Create two pages and connect with each other also format it as there are in the image below.

First Page

 Background is image position center and don‟t repeat.

 Heading has a yellow background color.

 Paragraph has border-style dotted size 6px and color is red, text align is center and
color is green make the first 2 lines bold and 3 -4 italic.

 Insert a link to go on the second page

103

105
Second Page

 Background color is powderblue.

 Text paragraph is calibri, size is 18px, align center, color red, border is groove size
10px and color yellow;

 Heading is align center.

 Insert a link to go on the first page

104

106
CHAPTER 3
ADOBE FLASH

105

107
Adobe Flash

3. Introduction to Flash CS6

Adobe Flash Professional CS6 is a multimedia platform for creating digital animation, rich
Web applications, websites, movies as well as content for mobile phones and other
embedded devices. It is frequently used for creating advertisements and games. Some of the
most popular games made in Flash are Minesweeper, Pac Man, Tetris, and Bejewelled.
Flash has also been used to create many popular movies and series such as Off-Mikes,
Gotham Girls, CrimeTime, and Homestar Runner.

In this chapter, you will learn to start Adobe Flash Professional CS6, create a new Flash CS6
document, and get familiar with Adobe Flash Professional CS6 interface. You will also learn
to work with various panels.

3.1.1. Starting Adobe Flash Professional CS6

To start Adobe Flash Professional CS6, choose the Start button on the taskbar; the Start
menu will be displayed. Next, choose All Programs > Adobe Production Premium CS6
> Adobe Flash Professional CS6 from the Start menu, as shown in Figure 1-1 ; the
Adobe Flash Professional CS6 welcome screen will be displayed, as shown in Figure 1-2.
To create a new Flash CS6 document, choose ActionScript 3.0 from the Create New

106

108
area of the welcome screen. Alternatively,
choose File > New from the menubar; the New
Document dialog box will be displayed, as shown
in Figure 1-3. In this dialog box, choose
ActionScript 3.0 from the General tab and then
choose the OK button; a new flash file will be
created.

Figure 1-1

Figure 1-2 Figure 1-3

107

109
3.1.2. Exploring the Adobe Flash Professional CS6 interface

The interface of Flash CS6 consists of a Stage, Tools panel, Timeline panel,
Properties panel, menubar, and application bar, as shown in Figure 1-4. Using the
tools in this interface, you can create interactive websites and digital animations as
well as edit and add elements to your movie. You can also import files from Adobe
Illustrator, Adobe Photoshop, and Adobe After Effects in Flash CS6.

Figure 1-4

3.1.3. Working Space


In Flash CS6, the main screen is called the Application screen. In Flash CS6, there
are several workspace profile presets, which allow you to change the layout and
arrangement of the panels based on your primary usage. You can also arrange panels
based on your requirement and save the current interface as your workspace. To save
the current arrangement of panels as your workspace, choose the Workspace switcher

108

110
button from the application bar; a flyout will be displayed. In this flyout, choose the
New Workspace option, as shown in Figure 1-5. The New Workspace dialog box will
be displayed. Next, type the name of the workspace in the Name text box and
then choose the OK button; the current arrangement of panels will be saved with
the name that you specified in the dialog box and it becomes the active workspace.
You can also choose the preset workspace from the workspace flyout. Various
components of the Flash CS6 interface are discussed next.

Figure 1-5
3.1.4. Stage
Stage is an area where all activities are performed that the viewers see when a movie
is being played. The gray area surrounding the Stage is called Pasteboard. Anything
in the Pasteboard is not visible in the final output. You can change the color and size
of the Stage by using the options in the New Document dialog box and the Properties
panel, refer to Figures 1-6.

Figure 1-6

109

111
3.2. Working With Graphs in Flash CS6

Every graphic in Flash starts with a shape. A shape is made of two components: the fill, or
the insides of the shape; and the stroke, or the outlines of the shape. If you always keep these
two components in mind, you’ll be well on your way to creating beautiful and complicated
visuals.
The fill and the stroke are independent of each other, so you can modify or delete either
without affecting the other. For example, you can create a rectangle with a blue fill and a red
stroke, and then later change the fill to purple and delete the red stroke entirely. All you’ll be
left with is a purple rectangle without an outline. You can also move the fill or stroke
independently, so if you want to move the entire shape, make sure that you select both its fill
and stroke.

3.2.1. Creating Shapes


Flash includes several drawing tools, which work in different drawing modes. Many of your
creations will begin with simple shapes such as rectangles and ovals, so it’s important that
you’re comfortable drawing them, modifying their appearance, and applying

fills and strokes. You’ll begin by drawing the cup of coffee.

3.2.2. Using rectasngle tools


The coffee cup is essentially a cylinder, which is a rectangle with an oval at the top and an
oval at the bottom. You’ll start by drawing the rectangular body. It’s useful to break down
complicated objects into their component parts to make drawing them easier.

1. In the Tools panel, select the Rectangle tool ( ). Make sure the Object

Drawing mode icon ( ) is not selected.

110

112
2. Choose a stroke color ( ) and a fill color ( ) from the bottom of the.
Tools panel. Choose #663300 (dark brown) for the stroke and #CC6600 (light
brown) for the fill.

3. On the Stage, draw a rectangle that is a little taller than it is wide. You’ll
specify the exact size and position of the rectangle in step 6.

4. Select the Selection tool ( ).

5. Drag the Selection tool around the entire rectangle to select its stroke and
its fill. When a shape is selected, Flash displays it with white dots. You
can also double-click a shape, and Flash will select both the stroke and
fill of the shape.

6. In the Properties inspector, type 130 for the width and 150 for the height.
Press Enter/Return to apply the values.

3.2.3. Using the Oval Tool

Now you’ll create the opening at the top and the rounded bottom.

In the Tools panel, press and hold your mouse cursor over the
Rectangle tool to access the hidden tools. Choose the Oval tool.

1. Make sure the Snap to Objects option ( ) is enabled. This option forces shapes that
you draw on the Stage to snap to each other to ensure that lines and corners connect
to one another.

111

113
2. Click inside the rectangle and drag across it to make an oval inside the rectangle. The
Snap to Objects option makes the sides of the oval connect to the sides of the
rectangle.

3. Draw another oval near the bottom of the rectangle.

3.3. Making Selections

First be able to select different parts of it. In Flash, you can make selections using the
Selection, Subselection, or Lasso tool. Typically, you use the Selection tool to select an
entire object or a section of an object. The Subselection tool lets you select a specific point or
line in an object. With the Lasso tool, you can make a freeform selection.

3.3.1. Selecting Strokes and Fills

Now you’ll make the rectangle and ovals look more like a coffee cup. You’ll use the

Selection tool to delete unwanted strokes and fills.

1. In the Tools panel, select the Selection tool ( ).

2. Click the fill above the top oval to select it. The shape above the top oval
becomes highlighted.

3. Press the Delete key.The shape is deleted.

4. Select each of the three line segments above the top oval and press the
Delete key. The individual strokes are deleted, leaving the top oval connected
to the rectangle.

112

114
5. Now select the fill and strokes below the bottom oval, as well as the inside
arc at the bottom of the cup, and press the Delete key.

6. The remaining shape appears as a cylinder.

3.3.2. Editing Shapes

When drawing in Flash, you’ll often start with the Rectangle and Oval tools. But to create
more complex graphics, you’ll use other tools to modify those base shapes. The Free
Transform tool, the Copy and Paste commands, and the Selection tool can help transform the
plain cylinder into a coffee cup.

Using the Free transform tool

The coffee cup will look more realistic if you taper the bottom rim. You’ll use the Free
Transform tool to change its overall shape. With the Free Transform tool, you can change
an object’s scale, rotation, or skew (the way it is slanted), or distort an object by dragging
control points around a bounding box.

1. In the Tools panel, select the Free Transform tool ( ).

2. Drag the Free Transform tool around the cylinder on the Stage to select it.
Transformation handles appear on the cylinder.

3. Press Ctrl/Command+Shift as you drag one of the lower corners inward.


Holding these keys while dragging lets you move both corners the same
distance simultaneously.

4. Click outside the shape to deselect it.

The bottom of the cylinder is narrow, and the top is wide. It now looks more
like a coffee cup.

113

115
Using copy and paste

Use Copy and Paste commands to easily duplicate shapes on the Stage. You’ll set the
surface level of the coffee by copying and pasting the top rim of the coffee cup.

1. Choose the Selection tool. Hold down the Shift key and select the
top arc and bottom arc of the coffee cup opening.

2. Choose Edit > Copy (Ctrl/Command+C). The top strokes of the oval
are copied.

3. Choose Edit > Paste in Center (Ctrl/Command+V).A duplicate oval appears on the
Stage.

4. In the Tools panel, if it’s not already selected, select the Free Transform tool.
Transformation handles appear on the oval.

5. Press the Shift key and the Alt/Option key as you drag on the corners inward. Make
the oval about 10 percent smaller. Pressing the Shift key lets you change the shape
uniformly so the oval maintains its aspect ratio. Pressing the Alt/Option key changes
the shape from its transformation point.

6. Select the Selection tool.

7. Drag the oval over the rim of the coffee cup so it overlaps the front lip.

8. Click outside the selection to deselect the oval.

9. Select the lower part of the smaller oval and delete it.

10. Your coffee cup now is filled with coffee!

114

116
Changing shape contours

With the Selection tool, you can push and pull lines and corners to change the overall
contours of any shape. It’s a fast and intuitive way of working with shapes.

1. In the Tools panel, select the Selection tool.

2. Move your mouse cursor close to one of the sides of the coffee cup.

A curved line appears near your cursor, indicating that you can change the
curvature of the stroke.

3. Click and drag the stroke outward. The sides of the coffee cup bend, giving the
coffee cup a slight bulge

4. Click and drag the other side of the coffee cup outward slightly.

5. The coffee cup now has a more rounded body.

3.4. Working with text

If you’re looking to display important information in your Adobe Flash Creative Suite 5
movie or you simply want to add creative text elements to your design, the flexible Text tool
in Flash CS5 can create attractive type for design elements, buttons, titles, and informational

115

117
text areas. Flash CS5 features several new typesetting improvements in the new Text Layout
Framework (TLF) text engine, bringing to the table many abilities already found in
applications such as Illustrator and InDesign.

Follow these steps to create basic type on the stage:

1. In a new or existing file, add a new layer to the timeline by choosing


Insert→Timeline→Layer.
2. Choose the Text tool from the Tools panel.
3. Click anywhere on the stage to create a text box and then enter some text.
4. Click and drag within the text box to select all the text you just entered.
5. Fine-tune the appearance of your text by selecting character, color, size, and other
options in the Character section of the Property inspector.

116

118
How to work with text

Adobe Flash Professional CS5 lets you add text to a Flash application in two formats:

• A new text format called the Text Layout Framework (TLF).

• The previous text format called Classic text.

Using the Text Layout Framework

TLF text provides the following enhancements over Classic text:

• You can adjust a wider range of character aspects, such as leading and tracking.

• You can rotate text more easily.

• You can flow text across multiple containers, as it does in a magazine page layout.

• You can better control the attributes of Asian text.

• You can create right-to-left text.

The Text Layout Framework is available as an option in the Text Property inspector.

TLF text requires that ActionScript 3.0 and Flash Player 10 or later are specified in the
publish settings of your FLA file. See the guide “How to Publish a Flash Document” for
more details.

117

119
To create TLF text:

1. Start Flash and choose File > New (ActionScript 3.0).


2. On the Timeline, double-click a layer, name it, and press
Enter (Windows) or Return (Mac OS).
3. Click the Text tool.
Window > Properties.

6. Move the pointer to the Stage.


The pointer changes to a cross hair with the letter T
attached to it.
7. Drag to create a container
8. Release the mouse button and click in the container.
9. Type some text

Managing text flow for TLF text

In Flash, you’ve probably noticed that a red plus appears in a TLF text container when you
fill it with more text than fits. This red plus indicates the text is overset. Overset text is text
that does not fit in the container.You could solve the problem of overset text by making the
container bigger, but often you will want to continue the text in another container, either on
the same page or on another page. This is called text flow.

118

120
For example, in Figure 4 the upper container is overset and needs to flow to the lower text
container.

Figure 4.Overset text

In Figure 5, the two containers have been linked, as indicated by a line between the
Out port of the top container and the In port of the bottom container.

Figure 5 Linked containers

119

121
3.5. Motion and Shape tweening
The minimal building block in a tween layer is a tween span, which can contain only one
symbol instance. The symbol instance is called the target instance of the tween span. If you
add a second symbol to the tween span, the new symbol replaces the original one. You can
change the target object of a tween by dragging a different symbol from the library onto the
tween span in the Timeline. You can delete the symbol from a tween layer without removing
or breaking the tween. To have a symbol in the Timeline, you do not have to include more
than one property keyframe. You can edit individual property keyframes on the Stage, in the
Property inspector, or in the Motion Editor.
Selection tool
To create a motion tween:

1. Start Flash and choose File > New (ActionScript 3.0).

2. Draw a shape on the Stage. The shape appears in keyframe 1 of Layer 1.

3. Using the Selection Tool (Figure 1), double-click to select the shape and border, if
present

4. Choose Modify > Convert To Symbol.The Convert To Symbol dialog box appears
(Figure 2).

5. Type a new name for the symbol in the Name text box, select Graphic for Type, and
click OK (Figure 2).

Figure 2.Convert To Symbol dialog box

120

122
6. Select frame 10.

7. Select Insert > Timeline > Frame. (The motion tween will last for 10 frames.) When
you insert a frame, Flash fills the area between the last frame (on the current layer)
and the new frame with the same content (Figure 3). Frames 1 through 10 all contain
the new symbol.

8. Make sure frame 10 (the end frame for the motion tween) is selected and select Insert
> Motion Tween.

Figure 3.Inserted frame

9. Select the symbol in frame 10; then make one or more of the following changes:

Color change: In the Property inspector, select Tint from the Color Effect Style
pop-up menu (Figure 4). Select 100% for the Tint Amount and change the color in
the Tint Color box.

Fading: In the Property inspector, select Alpha from the Color Effect Style pop-up
menu. Reduce the percentage of the Alpha Amount for more transparency. For
example, an Alpha value of 0% makes the object disappear.

Position: Use the Selection tool to move the object to a different position on the
Stage. A motion path appears. The points on this motion path are editable.

Size: Select the object. Then select Modify > Transform > Free Transform. Drag
the object handles to increase size, decrease size, or rotate the object

121

123
Figure 4. Tint options

10. Select frame 1 on the Timeline. In the Timeline, the motion tween is represented by a
solid blue background running from the start keyframe to the end keyframe (Figure
5). (When you inserted the motion tween in step 7, frame 10 was converted to a
keyframe.)

Figure 5. Motion tween in the Timeline

11. With frame 1 selected, adjust one or more properties of the motion tween in the
Property inspector (Figure 6).

• Ease: Controls how fast the object starts or ends the motion tween. For example, a
high number makes an object begin tweening quickly and end slowly.

• Rotate: Rotates the object clockwise or counterclockwise a designated number of


times.

122

124
• Path: If you add a guide layer, the object is linked to the path drawn on the guide
layer.

• Sync Graphic Symbols option: Starts and stops the tweening of all objects on the
Stage at the same time.

Figure 6.Tween Property inspector

12. You can also use the Motion Editor to adjust tweens (Figure 7).

You can view all tween properties and their property keyframes in the Motion Editor. You
can also add precision and detail to your tweens. Once you create a tween in the Timeline,
you can control the tween in several different ways:

• Add or remove property keyframes for individual properties.

• Move property keyframes to different frames within the tween.

• Add or remove filters or color effects and adjust their settings.

• Add different preset eases to individual properties and property categories.

• Create custom ease curves.

123

125
• Enable roving for individual property keyframes for X, Y, and Z properties. Roving
allows the property keyframe to move to different frames or between individual
frames to create smooth motion.

Figure 7.Motion Editor

13. Select Control > Test Movie > In Flash Professional to test the movie.

14. Select File > Close to close the preview window.

15. To see all phases of the tween at the same time, click the Onion Skin button at the
bottom of the Timeline (Figure 8).

16. Drag the onion skinning frame handles (they appear as brackets with circles on them
at the top of the Timeline) to span the frames in which the object appears. All the
intermediate steps of the tween are visible on the Stage.

17. Turn off onion skinning by clicking the Onion Skin button again.

18. Save the movie.

Figure 8.Onion Skin button

124

126
Shape tweens

In shape tweening, you draw a vector shape at one specific frame in the Timeline and change
that shape or draw another shape at another specific frame. Flash then interpolates the
intermediate shapes for the frames in between, creating the animation of one shape morphing
into another.

Note: Shape tweens work best with simple shapes. Avoid shapes with cutouts or negative
spaces in them. Experiment with the shapes you want to use to determine the results. You
can use shape hints to tell Flash which points on the beginning shape should correspond to
specific points on the end shape. Shape tweens can use much more computer memory than
motion tweens, so it is best to use shape tweens sparingly.

To create a shape tween:

1. Start Flash and choose File > New.

2. Select ActionScripot 3.0 and click OK. Frame 1 in Layer 1 already contains a blank
keyframe.

3. Begin by adding a shape to the Stage: Drawn objects: Select a shape tool (rectangle
or oval) and draw an object on the Stage.

Text: Select the Text tool and type a word or phrase on the Stage. Then select the text and
select Modify > Break Apart. This breaks the words into separate letters. With the letters still
selected, select Modify > Break Apart again to convert the letters into shapes.

Outside images: Select File > Import > Import To Stage to import an image. If the image is a
bitmap, you must break it apart. If the image is a grouped vector drawing, you must ungroup
it completely. To break apart a bitmap, select Modify > Break Apart. To ungroup an image,
select Modify > Ungroup.

125

127
Note: You might need to select Modify > Break Apart or Modify > Ungroup multiple times
until the object becomes a shape, as indicated in the Property inspector.

4. Select frame 10.

5. Select Insert > Timeline > Keyframe. The tween will last for 10 frames.

6. Make sure frame 10 is still selected and make one or more of the following changes
to your shape:

Amorphous shape change: Click the Stage with the Selection tool to deselect the object.
Bring the Selection tool close to the object to grab an edge. Drag the edge to change the
shape of the object (Figure 10).

Figure 10. Changing a shape with the Selection tool

Different shape: To morph between your original shape and a new shape, delete the object in
keyframe 10 and draw a new object.

Note: Select Modify > Break Apart if the drawn object is not a shape.

Text: To morph between your original shape and some text, delete the object in keyframe 10
and type the text on the Stage. Select Modify > Break Apart until the text block is a shape, as
indicated in the Property inspector.

126

128
Outside image: To morph between your original shape and a new image you import, delete
the object in keyframe 10 and select File > Import to bring in the outside image. Select
Modify > Break Apart to make the object a shape, as indicated in the Property inspector.

7. Click anywhere inside the tween span on the Timeline (Figure 11) and select Insert >
Shape Tween.

Figure 11. Close the movie

8. Select frame 1 on the Timeline (on the current layer). This is the start frame for your
animation.

9. In the Tweening section of the Property inspector, adjust one or more properties of the
Shape tween (Figure 12):

Figure 12. Click inside the tween span

127

129
Ease: Controls how fast the object starts or ends the shape tween. For example, a high
number begins the tweening quickly and ends slowly.

Blend (Distributive): Creates an animation in which the intermediate shapes are smoother
and more irregular.

Blend (Angular): Creates an animation that preserves corners and straight lines in the
intermediate shapes.

10. Select Control > Test Movie to test the movie.

11. Select File > Close to close the preview window.

12. To see all phases of the tween at the same time, click the Onion Skin button at the
bottom of the Timeline.

13. Drag the frame handles (they appear as brackets with circles on them at the top of the
Timeline) to span the first 10 frames of Layer 1.

The steps of the tween are all visible on the Stage.

14. Turn off onion skinning by clicking the Onion Skin button again. Save the movie.

15. Save the movie.

3.6. Using Masking Layer in Flash

The concept of masking in Adobe Flash CS6 involves using a shape (or shapes) to hide or
reveal portions of a piece of artwork — much like viewing the outside through a small
window in your house. The window’s size limits what you can see when you’re inside.

Flash features a special type of layer, known as a mask, and its contents are used to
selectively reveal (or hide) artwork or animation on another layer.

128

130
You can convert any layer into a mask by using the Layer contextual menu, launched by
right-clicking (Windows) or Control-clicking (Mac) the layer’s name area. Artwork on a
mask layer isn’t visible; the content of a mask layer always represents the visible area of the
layer underneath.

Before you get started, create a new document and select the Type tool. Choose a fill color
and then use the Property inspector to set the typeface to Arial Black (or similar) and the font
size to 40. Then follow these steps:

1. On a new layer, select the Text tool and type a few words on the layer.
2. Switch to the Selection tool and select the text. Choose Modify→Convert to Symbol
or press the F8 keyboard shortcut to convert the text to a new graphic symbol.
3. In the Convert to Symbol dialog box, select Graphic from the Type drop-down list
and enter a name for the symbol in the Name text box.
4. Place the text off the stage to the left so that it’s sitting in the pasteboard area.

You animate the text to bring it across the stage, entering from one side and exiting
on the other.

5. To create a new tween span, right-click (Windows) or Control-click (Mac) the first
keyframe on the layer that contains your text and choose Create Motion Tween from
the contextual menu that appears.

An instance of the text is created there as well.

6. Move the pointer over the last frame of the new tween span until you see the double
arrows. Click and drag to extend the tween span to Frame 40.
7. On Frame 40, select the text and drag it all the way to the right side of the stage.

129

131
A keyframe is created at Frame 40, and it creates a tween that moves the text from
left to right across the stage.

8. Insert a new layer above the tween layer and name it Mask; create a shape to use as
your mask on this layer. Make sure that the shape is at least as tall as the text symbol
you created.

For example, the Polystar tool is used to create a star in the center of the stage. The
Star option for the Polystar tool is available in the Property inspector, under Options.

9. Right-click (Windows) or Control-click (Mac) the new layer name and choose Mask
from the contextual menu that appears.

The new layer is converted to a mask layer, and the tween layer appears indented
underneath. Both layers are locked automatically.

10. Press Enter or Return to play your movie.

The text animates, appearing through the shape (a star, in this example), much like
you’re viewing the animation through a window.

130

132
For the masking layer to take effect, both the mask layer and the layer being masked must be
locked. To edit the contents of either layer, unlock the layers by clicking and removing the
padlock icons on each layer. Mask layers can contain just about anything a standard layer
can, including tweens. Try creating a motion tween on your mask layer and see what
happens!

How to create masks

In Adobe Flash Professional CS5, a mask is a special type of layer that lets you reveal
select parts of another layer. For example, if you want to show people walking around
inside a house, and you want them to be visible when they pass by a window but
invisible otherwise, you can use a mask. You can use masking for effects such as
creating a spotlight or showing pictures behind images.

Creating a mask

In the following steps, you’ll create a mask by using a simple shape.

To create a mask:

1. Start Flash and open a document.

2. Import an image to the Stage.

3. Create a new layer and name it mask. Put this layer directly above the layer
containing the image.

4. Use a drawing tool, such as the Oval tool or the Rectangle tool, to define the area of
the mask layer that you want to be transparent (Figure 1). Make the transparent area
of the mask a solid, noticeable color. This will help you see where the transparent
area is.

131

133
5. Right-click (Windows) or Control-click (Mac OS) the mask layer, and select Mask
from the context menu. The two layers change to indicate that the bottom layer is
masked. The name of the masked layer is indented under the name of the masking
layer and its icon changes to a mask layer icon (Figure 2). Both of the layers are
locked by default. Note: To display the mask effect, lock both the mask layer and
the layer containing the masking content. Unlock one or both layers to hide the
effect.

6. Select Control > Test Movie > In Flash Professional to see it play. Observe that only
the masked area is visible.

7. Select File > Close to close the preview window.

Figure 3. Motion tween on the mask layer

Change the masked content

You can change content on the layer below the mask while keeping the mask the same.

To change the masked content:

1. Continue where you left off.

2. On the masked layer, select frame 10 and select Insert > Timeline > Blank Keyframe.

132

134
Inserting a blank keyframe clears the contents of the frame.

The contents of the masked layer clear.

3. Add new content to the masked layer at frame 10. (Unlock the masked layer, if
necessary.)

For example, you could drag a different picture to the

Stage.

4. Select Control > Test Movie > In Flash Professional to see it play.

Observe that the area under the mask changes halfway through the animation.

4. Select File > Close to close the preview window.

133

135
4.1. Animation using motion guide

A motion path allows you to move a symbol along a predefined path.

1. Create a new (ActionScript 2.0 or 3.0) movie


2. Use the oval tool and create a ball (Set the outline to null, and the fill to a gradient
ball, and use the shift key to keep it a circle)
3. Use the Selection tool to draw a box around the ball, and right click > Convert to
Symbol
1. Name: Ball (type:Graphic), and add to the library
4. Change the name of the Layer (Layer 1) to Ball (right click on Layer 1 > Properties
>Name:Ball)
5. Right Click on the word Ball (Layer label)> Add classic motion guide. This will add
a new layer, where we will draw the path for the ball to follow.
6. Click on the Guide layer, and using the pencil tool draw a path.
7. Select frame 40 of the guide layer, right click > Insert Frame (or press [F5])
8. Click on Frame1 of Layer Ball. Now drag the ball onto the start of the path (when the
bubble attaches itself to the path)
9. Click on Frame 40 of Layer Ball, and insert a keyframe ([F6])
10. Now drag the ball to the end of the path (or if it is a circle leave it where it is!).
11. Select any frame of the Layer Ball and right click and select "Create Classic Tween".
If you have put the ball at the start and the end at the same place nothing will happen
if you run the movie), so lets insert some keyframes to the tween.

134

136
12. Click on Frame 10 of the Layer Ball, and drag the ball to a new position along the
path, Click on Frame 20 of the Layer Ball and drag the ball to the next position, do
the same for frame 30.

Use Motion Guides in Flash CS6

Motion guides are especially useful when you work with a shape that has an obvious
orientation (or direction, such as the nose of a car or an airplane). For this reason, be sure to
use a symbol with an obvious orientation (such as a triangle) as your tweened object in these
steps:

1. Create a new Flash document, and create some interesting graphics on the stage.
2. Using the Selection tool, select the graphics you created and press the F8 shortcut
key to convert the graphic to a symbol.
3. When the Convert to Symbol dialog box appears, choose Graphic from the Type
drop-down list and enter a name for the symbol in the Name text box.
4. Create another new layer on the Timeline, select the Pencil tool in the Tools panel,
and select a stroke color from the Property inspector on the right.

135

137
Make sure that Object Drawing mode is turned off. This button appears at the bottom
of the Tools panel when the Pencil tool is selected.

5. Draw a path on the stage with the Pencil tool.


6. Switch to the Selection tool and double-click the path you just created.
7. Choose Edit→Cut to remove the path from the stage temporarily.
8. Right-click (Windows) or Control-click (Mac) Frame 1 of the layer that contains your
symbol and choose Create Motion Tween from the contextual menu that appears. A
new tween span is created for your triangle symbol.
9. Choose Edit→Paste in Place to paste the path you created earlier. Flash
automatically converts the path to a motion path, and your symbol snaps to the path.

Press Enter or Return to play your movie.

136

138
The symbol follows the path you created. Next, you can tweak the tween so that the
symbol follows the exact orientation of the path.

10. Select Frame 1 of your tween span; in the Property inspector, locate and select the
Orient to Path check box (it’s located under the Rotation options).
11. Press Enter or Return again to play your movie and you’ll see that the symbol now
changes rotation to match the direction of the path.

Starting off your symbol on the right foot often helps produce better results when using
Orient to Path. If the symbol orientation isn’t what you expect, try rotating the symbol in the
right direction at both the beginning and ending frames of the tween span.

4.2. Working with sounds

The best multimedia creations can be enhanced tremendously using sound effects and music.
Adobe Flash CS6 fully supports the import, placement, and control of sounds in lots of
different formats, so you can easily bring in loops, sound effect files, and even music from
your .mp3 collection.

You can enhance your movie with background music or narrative, and sound effects can
make using buttons and menus more intuitive. Flash can stream longer sounds (such as
soundtracks or long-form narration) to minimize loading time so that users get right to the
good stuff.

Follow these steps to import a sound into your library:

1. Create a new Flash document and choose File→Import→Import to Library.


2. Browse and choose an .mp3, .wav, or .aiff file from your hard drive and click Open
(Windows) or Choose (Mac).

137

139
3. Choose Window→Library to launch the Library panel.

The sound appears in the library with a speaker icon.

4. Select the sound and check out the Preview window. A waveform preview of your
sound appears, and you can listen to the sound by using the Stop and Play buttons in
the upper-right corner of the panel.

Place Sounds on the Timeline in Adobe Flash CS6

After you have imported your favorite sounds into your Adobe Flash CS6 document, you can
place them on keyframes along the Timeline to have them play at specific points in your
movie.

138

140
You can assign sounds with the Property inspector, which displays the Sound section when a
keyframe is selected. Sounds can be combined across different layers and used inside buttons
to create sound effects for controls and navigation menus.

To place a sound on the Timeline, follow these steps:

1. On a new layer, create a blank keyframe along the Timeline and launch the Property
inspector (if it’s not already visible).
2. On the right side of the Property inspector, locate the Sound section and select a
sound from the Name drop-down list.

This drop-down list shows all sounds in your library.

The sound is now placed on your Timeline.

3. Press Enter or Return to play your movie. The sound plays when the playhead
reaches the keyframe.

139

141
CHAPTER 4
FLOWCHARTS
S

140

142
Flowcharts
4.1. Introduction to programming

4.1.1. What is Programming?


Programming can be defined as the process to develop different solutions (algorithms) for a
specific problem and then choosing the most efficient one. Computer programming is a
process of giving step-by-step instructions to a computer to solve a well-defined problem
using programming language. Afterwards, the computer would be able to determine the
solution of the problem for varying input values. We can deduce the following facts from
this definition:

1. First of all, there must be a problem to solve in order to make a program.


2. Every problem requires a different solution.
3. There is a step-by-step process that should be followed in the solution of the problem.
4. Programming languages are used to tell the solution to the computer.

A programming language is a tool to express our solution to the computer. It is a kind of


Communication Bridge built between human beings and the electronics area. Programming
is totally different; it is the art of solving problems. You are not going to use any
programming language in this book; instead you are going to use flowchart symbols to
express your solution to the computer. A flowchart is a diagram that represents an
algorithm showing the steps as boxes of various kinds as well as their order by connecting
them with arrows. Programming languages are beyond the scope of this book.

141

143
Programming skills will help you to gain the ability to examine daily life problems that you
encounter fromskills
Programming different points
will help of to
you view,
gaincreating alternative
the ability solutions
to examine daily and
life choosing
problems the
thatmost
you
efficient
encounterone
fromfordifferent
you. Understanding
points of view,programming alone solutions
creating alternative is not enough to make
and choosing theyou
mosta
successful member
efficient one of society,
for you. but it will
Understanding definitely contribute
programming to your
alone is not success
enough in different
to make you a
areas.
successful member of society, but it will definitely contribute to your success in different
areas.

4.1.2. Flowchart IDE


4.1.2.
You will find Flowchart IDE
a free to download flowchart programming IDE (Integrated Development
Environment)
You will find software
a free toondownload
http://www.nchsoftware.com/chart/index.html website
flowchart programming IDE (Integrated or you can
Development
use an online IDE
Environment) (Integrated
software Development Environment) on https://www.draw.io.
on http://www.nchsoftware.com/chart/index.html website or The
you free
can
download software
use an online is called ClickCharts.
IDE (Integrated Development Environment) on https://www.draw.io. The free
download software is called ClickCharts.
By using the ClickCharts program, you can do the following:

By using the ClickCharts program, you can do the following:


− Design your own flowcharts. Visualize complex processes and organizations

− Save
− your
Design flowcharts
your to disk and
own flowcharts. open them
Visualize whenever
complex you and
processes need.organizations

− Export
− your
Save your flowcharts
flowcharts toas jpg,and
disk gif,open
png them
or other image file
whenever youformats.
need.
− Edit
− andyour
Export customize colors,
flowcharts fillsgif,
as jpg, andpng
strokes
or other image file formats.
− Simple
− Edit andediting functions
customize include
colors, copy,
fills and paste, undo and more
strokes
− Simple editing functions include copy, paste, undo and more
Example 1: The “Hello World” Program

Example 1: The “Hello World” Program

142

142

144
− Edit and customize colors, fills and strokes
− Simple editing functions include copy, paste, undo and more

Example 1: The “Hello World” Program


The “Hello World” program prints out “Hello World”, by tradition, is the first program
taught at the beginning of any programming class. This program has no input or process, but
only a line of output. Make the flowchart yourself using ClickCharts.

142

Example 2: The “My first Flowchart” Program


Create a flowchart that displays two lines of text:
Hello my name is YourName
This is my first flowchart

143

145
4.2. Steps in Problem solving

4.2.1. Programming Procedure

Programmer are the persons that write line of code to give any command to our computers.
Before starting to write these line of code programmers should first of all to scratch the
stages/steps that the programs has to go through. Below are given the steps that a problem
should pass from beginning to the end:

1. Understanding the problem. Identify the objectives of the problems. Read carefully
the problem as many times as needed to identify its objectives. Be sure that you
understand what is asked at you problem. Think about: Input data, Format, Output,
do you need any formula which is a key point connecting us with the next step.
2. Analyze the problem. Think of different ways that the problem can be solved and try
to figure out which is the best solution for this problem. Do you know the formula or
should we develop a new one.
3. Developing the solution. A step by step solution of the problem should be figured out.
You have to write the algorithm of the problem. It can be a pseudo code or a
flowchart solution. Programmers are free to create their pseudo code/ flowchart as
they wish, but there are some key points that they should follow.
4. Coding and implementing. This is the last step where you convert the algorithm
(pseudo code/ flowchart) to lines of code.

144

146
4.2.2. Flowchart Control Structures

As mentioned before to develop an algorithm, we need to represent the instructions in some


way that is understandable to a person who is trying to figure out the steps involved. Two
commonly used representations for an algorithm is by using pseudo code, or
flowcharts.

Let us think about solving a problem of a broken lamp example.

Pseudo code Flowchart

1. IF lamp works, go to step 7.

2. Check if lamp is plugged in.

3. IF not plugged in, plug in lamp.

4. Check if bulb is burnt out.

5. IF blub is burnt, replace bulb.

6. IF lamp doesn’t work buy new lamp.

7. Quit ... problem is solved

Programmers are free to create their pseudo code/ flowchart as they wish, but there are some
key points that they should follow. Let us give a short description of the steps that the
programmer should follow during this process:

145

147
− Sequence – Ordered List of instructions
1. Make sure switch is turned on
2. Check if lamp is plugged in
3. Check if bulb is burned out
4. …
− Condition - A stop point where there is more than one
path to be followed. And the output will depend on the
path followed on this path
1. if lamp is not plugged in

then plug it in

2. if bulb is burned out

then replace bulb

otherwise buy new lamp

− Repetition – repeat something as many time as it occurs at the condition


1. repeat

get a new light bulb put it in the lamp

until lamp works or no more bulbs left

2. repeat 3 times

unplug lamp

plug into different socket…

− Storage – storing data in order to be used in the steps further down the list
1. x ← a new bulb count ← 8
− Jumping – being able to jump to a specific step when needed.
1. if bulb works
2. then go to step 7

146

148
Practice Exercises:
Write the pseudo code and draw the flowchart to solve each of the following problems. Be
careful to follow the steps as given above. Keep in mind that every one of you can have a
unique answer.
a. Making a peanut butter and jam sandwich
b. Putting together a jigsaw puzzle
c. Playing the game of musical chairs
d. Replacing a flat tire on your car
e. Getting home from school today
f. Emptying a case of drinks into your refrigerator
g. Shopping for groceries (from entering store to leaving store)

147

149
4.3. Flowchart Symbols

A flowchart graphically shows


4.3. Flowchart the steps that need to be followed to solve a specific problem,
Symbols
such as sorting numbers or calculating weekly expenses. The different shapes in a flowchart
are used for specific purposes. The input, output, decision, and process symbols are all
A flowchart graphically shows
4.3. Flowchart the steps that need to be followed to solve a specific problem,
Symbols
different from one
such as sorting numbers or calculating weekly expenses. The different shapes in a flowchart
Symbol Name Description
are used for specific purposes. The input, output, decision, and process symbols are all
A flowchart graphically shows the steps that need to be followed to solve a specific problem,
different from one The terminal symbol marks where the
such as sorting numbers or calculating weekly expenses.flowchart
The different shapes
starts and in ait flowchart
where ends. The
Symbol Terminal Name
(Start,output,
End) decision,
starting and Description
terminal contains theareword
are used for specific purposes. The input, process symbols all
START while the ending terminal
different from one The terminal symbol marks where the
contains the word END
flowchart starts and where it ends. The
Symbol TerminalName End) Description
Input (Get,(Start,
Read) starting
Where theterminal
user of the contains
programtheis asked
word
START
for while the ending terminal
The information (INPUT)
terminal symbol or where
marks where thethe
Output (Print, Display) contains
program the word
displays END
a result (OUTPUT)
flowchart starts and where it ends. The
Terminal
Input (Get,(Start,
Read)End) starting
Where
A processtheterminal contains
user of denotes
symbol the program the asked
word
that aisprocess
START
for while (INPUT)
information the ending terminal
or where
Process (Do) (arithmetic, logic, or assignment) will the
be
Output (Print, Display) contains
program the word
displays END
a result (OUTPUT)
carried out.
Input (Get, Read) Where
A the symbol
process
This
user of denotes
is a decision
the program
making and aisprocess
asked
that branching
Process (Do) for information
(arithmetic, (INPUT) or where the
symbol. Youlogic, or assignment)
can control the flowwill be
of the
Output (Print, Display)
program
carried displays a result (OUTPUT)
programout.by means of the decision
Decision (If) symbol-
A process that is you
symbol can set
denotes that loops and
a process
This is a decision making and branching
Process (Do) execute
(arithmetic, either part of the program
symbol. Youlogic, or assignment)
can control the flowwill be
of the
depending
carried out. on the result of the logical
program by means of the decision
expression in the decision symbol.
Decision (If) symbol- that is you can set loops and
This is a decision making and branching
execute
Arrows either part of the program
Flow Line (Arrow) symbol. indicate
You canthecontrolsequence
the of
flowsteps
of and
the
depending
the direction onof the
flow. result of the logical
program by means of the decision
expression in the decision symbol.
Decision (If) symbol- that is you can set loops and
The connector symbol connects two parts
execute
Arrows either the
indicate part of the program
Flow Line (Arrow) of a flowchart. It sequence of steps
is usually usedandto
depending
the direction onof flow.
the result of the logical
Connector (Joining) connect two pages of a flowchart when
expression in the decision symbol.
you are manually drawing a flowchart on
The connector symbol connects two parts
paper.
Arrows indicate theIt sequence of steps
Flow Line (Arrow) of a flowchart. is usually usedandto
Connector (Joining) the direction
connect two of flow.of a flowchart when
pages
Note: The shapes of the flowchart symbols in some other sources can be slightly different
you are manually drawing a flowchart on
The connector symbol connects two parts
paper.
of a flowchart. It is usually used to
Connector
Note: The shapes of the flowchart (Joining)
symbols in some otherconnect
sourcestwo canpages of a flowchart
be slightly differentwhen
you are manually drawing a flowchart on
paper.

Note: The shapes of the flowchart symbols in some other sources can be slightly different
148

150
148
Example 1: Sum of two numbers

Make a flowchart that


reads two numbers and
displays their sum. Use
three variables num1 and
num2 for this program to
keep the input values as
well as sum to keep the
result.

A variable is a symbolic name (e.g., num, surname, sum, a, result) that stands for a value
that can change. The values of variables are stored in the memory. Variables enable the same
program to execute various sets of data.

Exercise 1: Product of two numbers

Make a flowchart that reads two numbers and displays their product. Use three variables
num1 and num2 for this program to keep the input values as well as product to keep the
result.

149

151
4.4. Arithmetic and Assignment Operator
4.4.1. List of arithmetic operators
In mathematics and computer programming, an operator is a symbol that represents a
specific action. For example, a plus sign (+) represents the addition in the “Sum of two
numbers” program

Operator Description Example

+ Addition 3+5

- Subtraction 13 - 15

* Multiplication 4*7

/ Division 12/4

% Modulus 16%5

4.4.2. Assignment Operator

Assignment operator is the most common operator used with all programming languages. It
is used to assign a value to a variable on the left side of the assignment operator. If the value
already exists in that variable, it will be replaced with a new value. There is always a
variable on the left side and a value, variable, or expression on the right side of the
assignment operator. “result=3+5”: the new value of the result variable is 8. “a=a+1”: the
value of the variable a is incremented by 1. “num=(a+b)/(a-b)”: num gets the result of the
expression.

150

152
Example 1: Output

a. Determine the output of the following flowchart manually


b. Draw the flowchart on the computer.

Exercise 1: Mini Calculator


Draw a flowchart that calculates the sum, difference, product, and quotient of two numbers.

151

153
Exercise 2: What does it do?
Examine the following flowchart and determine the problem that the flowchart has been
designed.

Exercise 3: What does it do?


Examine the following flowchart and determine the problem that the flowchart has been
designed.

152

154
4.5. Decision Making

Decision making is an ability given to mankind. We use our decision-making skills to solve
problems by selecting one course of action from several possible alternatives. In
programming, decision making is used for branching and looping.

4.5.1. Relational and Logical Operator

A relational expression compares the values of two arithmetic values or arithmetic


expressions. Relational and logical expressions are called Boolean expressions. The result of
a Boolean expression is either true or false. The logical operators compare Boolean
expressions and return a Boolean result. Both relational and logical expressions are often
used to make a test expression for decision making that controls program flow.

Relational Operator

Operator Description Example


> Greater than 3 < 5 is true
< Less Than A < A is false.
>= Greater Than or Equal to A*A >= 0 is true.

<= Less Than or Equal to 3 <= 2 is false.


== Equal to A*B == B*A is true.
!= Not Equal to X+Y!=Y+X is false

Logical Operator

Operator Description Example


&& AND (2 > -1) && (A==A) is true.
|| OR (A>=0) || (A<0) is true.
! NOT !(3==3) is false

153

155
Example 1: Open or Closed
The following otherwise. Make the flowchart in
ClickCharts, run it in step mode, and observe the
program flow for different negative and positive
input values.

154

156
4.6. Exercises

Exercise 1: What does it do?


Examine the following flowchart and
dertermine what it does

Exercise 2: Output
What is the output of the following?

155

157
Exercise 3: Maximum
1. The following flowchart has been designed to determine the largest of three numbers.
Draw the flowchart on the computer.
2. Make the same flowchart without using the fourth variable (i.e., the variable max).

156

158
Test Questions

159
160
158
161
159
Problems

162

160
CHAPTER 5
COMMUNICATION ON THE INTERNET

161

163
Communication on the Internet

5.1. PAST AND PRESENT COMMUNICATION

Objectives:
• understand how changing technology affected people‘s lives;
• examine changes in technology over several generations by comparing past and present
objects and photographs, and discussing how these changes have shaped people‘s lives;
• identify technologies used in the childhoods of their grandparents or familiar elders and
in their own childhood, and finding out where each was produced;
• identify some rules for children of past generations that do not apply in the present, and
some rules of the present that did not exist in the past due to technological changes.

What is Communication?

Using words, sounds, signs or behaviours to exchange information.

Expressing your ideas, thoughts or feelings.

Exchanging of information.

Speaking, writing, or drawing to give a message

Sending or receiving information.

162

164
Discussion:
Name all the things that people use to help them communicate.

EARLY COMMUNICATION IN TECHNOLOGY

Mail or Post System Printing Press Machine


People used pen and paper to write letters and this In the 1440s, a man named Johann
was a very popular way of communicating. In the Gutenberg invented a machine that could
1800s, official postal systems were set up all over print many books quickly. Before this time,
the world, to deliver letters and parcels. However, books were handwritten and this meant that
sometimes the system was unreliable because it there were not many books available to buy
took a long time for a letter to reach its destination or read.
and sometimes letters could be lost and never
arrived at their destination.

Electrical Telegraph
In the 1800s, telegraphic communication was invented which
involved sending electric signals through a wire. A well-known
version of the electrical telegraph is Morse code. Morse‘s code used
dots and dashes, which were short and long pulses, sent through the
wire to match letters and numbers.
This type of communication allowed for instant communication
across very long distances, which was something that had never
been done before.

165
MODERN COMMUNICATION WITH MACHINES

RADIO
Radios send messages by radio waves in the air,
instead of through wires. In the early 1920s, people
spent hours listening to stations that were broadcasting
news, music, sports, drama and variety shows.

TELEVISION
The invention of television in the 1920s was a
breakthrough in technology because it was the first
time sound and pictures could be sent over the air. At
first, television images were only displayed in black
and white and it wasn‘t until the 1970s that people
could see colour on the screen.

COMPUTERS AND THE INTERNET


In the early 1940s, the first electric computer was created
but it was very large and not like the computers we use
today. Since then, inventors have transformed the way
computers work so that they are faster, more mobile,
more powerful and multifunctional.
Along with the invention of the Internet in the 1990s,
people became interconnected through computer
networks that link computers worldwide.
There are many popular ways of communication over the
internet, such as email, social networking and instant
messaging.

Discuss with your partner other


ther forms of communication to research

166
ACTIVITY 1
Think as computer scientist

Can you imagine a type of communication you think people will use in the future?
a) What it will look like?
b) What features will it use to communicate?
c) How will it be different to devices we use today?
d) What materials will it be made from?

ACTIVITY 2
Think as computer scientist

Choose a form of communication from the list below, then use the classroom resources and
a computer to research the kind of communication.
Fill in the table using the questions below to guide you.
Sign language Printing press machine Morse code Radio Television
Computers and internet Books Newspapers Satellites Type writer Braille

Communication tool
When it was used/invented?
What country was used/invented in?
Who invented it?
What does it do?

Write a short paragraph about the changes made


to this invention and how or if it is used today and
why

Picture of this type of communication

165

167
5.2. UNDERSTANDING INTERNET AND WORLD WIDE WEB

US scientist have calculated that the


entire internet can be printed on 136
billion sheets of standart
8 - by - 11 paper

136,000,000,000

Objectives

 Understand how internet works and its evolution in time


 Understand how internet of things has changed the world
 Indetify technologies and services available over the internet
 Examine different types of internet connections

In the present age of information Technology, use of Internet is becoming quite popular for
accessing information on any topic of your interest. It also provides tremendous opportunities to
students; researchers and professionals for getting information on matters related to academic
and professional topics and lot more. In the present world, most of the people who have
computers around themselves use Internet to access information from the World Wide Web,
exchange messages & documents and e-services.

What is internet?

The Internet or simply the Net is a worldwide network of computer networks. It is an


interconnection of large and small networks around the globe.

166

168
Application of the internet:

With the help of Internet you can

 Exchange messages using e-mail (Electronic mail).


 Transfer files as well as software.
 Browse through information on any topic on web.
 Communicate in real time (chat) with others connected to the Internet.
 Search databases of government, individuals and organizations.
 Read news available from leading news groups.
 Send or receive animation and picture files from distant places.
 Set up a site with information about your company‘s products and services.

Technologies and services available over the internet include:

 web pages – HTML documents that present images, sound and text accessed through a web
browser

 web applications - web software accessed through a browser

 native apps - applications developed for specific devices (such as smartphones) and accessed
without the need for a browser

 email

 file sharing

 voice calls

 streaming audio and video

167

169
An amazing fact a day

Why do people use the internet for?

In each minute in the internet,there are 6.9 million Facebook messages sent, 138,889 hours of
YouTube videos watched, 347 222 Tweets sent and 4.1 million Google searches.

Find out what your classmates spend most of their time doing on the internet. What
websites do they use? Which is most popular?

Record your findings here:

Website/Game Tally Frequency

*** Could you produce a bar graph to represent your findings?

You could also try to find out:


 About internet history
 What the next global technology breakthrough might be
 Whether the internet use is still growing

______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________
______________________________________________________________________________________________________

168

170
Web browser

A web browser is a piece of software that enables the user to access web pages and web apps on
the internet. There are a range of browsers available, and they are usually free to download and
install.

The internet of things (IoT)

The 'internet of things' is the concept of networking lots of devices so that they can collect and
transmit data. The idea that any object or living being can be uniquely identified on the internet
is central to the concept. By automating the capture of information, greater quantities of it can be
stored and processed.

The 'thing' in the 'internet of things' could include:

 sensors monitoring conditions on a farm

 the contents of a fridge

 an object or person being tracked with an RFID tag

Information gathered from such systems can be used to intelligently respond and adapt to the
needs of an environment. For example, if a system detects that a room is empty, lights and
heating can be automatically switched off to reduce waste.

ACTIVITY 1
Think as computer scientist

 Create a timeline of how IoT has changed the world

169

171
Connecting to the internet
To connect a computer or a device to the internet, you need:

 an ISP (internet service provider)

 a modem or router (wired or wireless)

 a web browser or app

 a connection to the network (through a copper wire or a fibre optic cable)

Different companies in Albania that provides internet.


Examples:

ABcom,Digicom,Abissnet,Selcom,ADAnet

Challenge
Think as a computer scientist

Imagine there was no internet.

 What it will be like?


 Would it be terrible or would you have more time to do other things.

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

170

172
Fibre optics

Fibre optic cabling is made from glass that becomes very flexible when it is thin. Light is passed
through the cable using a transmitter. Light travels quickly through the light-reflecting internal
wall of the cable. The transmitter in the router sends light pulses representing binary code. When
the data is received, it is decoded back to its binary form and the computer displays the message.

Copper Cable

Copper cable uses electrical signals to pass data between networks. There are three types of
copper cable: coaxial, unshielded twisted pair and shielded twisted pair.

 Coaxial degenerates over long distances.

 Unshielded twisted pair is made by twisting the copper cables around each other and this
reduces degeneration.

 Shielded twisted pair uses copper shielding around the twisted wires to make them less
susceptible to interference.

Broadband connections

The internet is transmitted both on physical wires and


wireless connections.

Broadband internet is transmitted on physical wires


that run underground and under the oceans.
Download speeds tend to be faster than upload speeds.
More bandwidth is assigned for downloading because
there is a higher demand for downloads. Network
speeds are measured by how many megabits they can
download per second (Mbps).

173
ADSL

ADSL (asymmetric digital subscriber line) provides connection speeds of up to 24 Mbps and
uses a telephone line to receive and transmit data. The speed that data can be transferred is
dependent on a number of factors:

 Signal quality can vary between phone lines and whilst it doesn't affect voice signals,
it does affect data transmissions.

 The distance between the modem and the telephone exchange has an effect on the speed at
which data is transferred. A distance of 4 km is considered the limit for ADSL technology,
beyond which it may not work.

3G and 4G

The wireless 3G and 4G networks can be accessed through a smartphone without the need for
a WiFi router. The data is transmitted through the cellular phone network rather than the physical
cabled network of broadband. This enables anyone to connect to the internet as long as there is a
3G or 4G connection available. 3G allows for up to 6 Mbps to be downloaded and 4G
allows for up to 18 Mbps.
Challenge
Think as a computer scientist

Work in pairs. Search in the internet about advantages and disadvantages of different
types of connection and fill in the table below:

Connection types Advantages Disadvantages

Fibre optics

Copper cable

Broadband connections

ADSL

3G/4G

174
5.2.1. Web pages

A web page is a document that can be viewed on a web browser. It can contain text, images,
sounds, animations, videos and hyperlinks to other web pages. Most web pages are written
using HTML, HTML5, XML and CSS. Websites often have several pages that you can access by
clicking on links. A Web site can be a collection of related Web pages. Each Web site contains
a home page (this is the original starting page) and may also contain additional pages.

Layout of the webpage contains:

1. Title bar – tells you the name of the web page


2. Menu bar – has commands for moving around the webpage, printing, etc
3. Tool bar – short cuts to commands. Each picture represents a command
4. Address bar – webpage address. If you want to go directly to a web page, you will need
to know the address.

Layout of a Web Page

Address bar

Reload button

Bookmark

Search bar

Search by voice Customize and control


button

175
Parts of a Web Address

A web address is typically composed of four parts. For example, the address
http://www.google.ca is made up of the following areas:

1. http://
This Web server uses Hypertext Transfer Protocol (HTTP). This is the most common
protocol on the Internet.
2. www.
This site is on the World Wide Web.
3. google
The Web server and site maintainer.
4. .ca
This tells us it is a site in Canada.

Web Server

A Web Server is a computer that stores web pages. It is responsible for accepting request(s) from
users and serves them with web pages. Two important web server programs are: IIS (Internet
Information server) and Apache, etc. Web servers are connected to the Internet 24 hours a day,
seven days a week.

Hyperlink

It is an element in an electronic document that links to another place in the same document or to
an entirely different document or other resource. Hyperlinks usually appear as underlined text
and in a different color, but they may also appear as graphics, such as buttons to click.
Hyperlinks may be used to link another place in the same page, or another page, to play an audio
or video file, to download a file, to set up a message to an e-mail address, and to link to other
Internet resources.

176
HTML (Hypertext Markup Language)

It is a language that consists of certain key words called ‗Tags‘, used for writing the documents
on the web.

Search engines

A search engine is a web application which keeps a huge database of web addresses. Web pages
are stored as an index on a server. When a search term is entered, the server looks through an
index of web pages that contain the term.

The index has already been put together by an automated program called a crawler that is run by
the search engine program. The crawler frequently visits web sites and takes a record of the
address and keywords and adds this information to a database with an index. The index links the
website to other websites that are connected through hyperlinks.

Cloud computing

Cloud computing is storing and using services online, rather than storing them locally on
a device such as a hard drive. Cloud computing is becoming more popular as web
browsers become more powerful and network coverage is more widely available. The files are
stored on a server owned by the service provider. Google Drive, Flickr and Dropbox are all
examples of cloud storage. Cloud services are useful, but using them means we are sharing our
data with service providers. Organisations such as government departments and banks are likely
to create their own cloud servers because they have extra restrictions with regards to the data
they hold.

ACTIVITY 2
Think as computer scientist

1. Do you use any of the websites below? What for?


2. What is your favourite website? Why?

177
5.3.COMMUNICATION PROTOCOLS

Objectives:

 Understand different types of network protocols


 Examine how TCP/IP works.
 Indetify the road of the packet from the sender to receiver
 Indetify the advantages of TCP/IP protocols

Communication protocols are agreed sets of rules and procedures for computers to exchange
information. Like humans agreeing to speak the same language during a conversation. For two
computers to exchange data, they must be using the same protocols.

Network Protocols
There is a standard protocol for each network communication task, such as:
- how to send data over the Internet (TCP/IP)
- how to send and receive email (POP, IMAP)
- how to request and deliver web pages (HTTP)
- how to request and deliver files (FTP)

Choosing Protocols

Sometimes there is more than one choice of protocol for a task, such as how messages pass
across a network (IPX/SPX vs TCP/IP, POP vs IMAP). As long as all the connected computers
use the same protocol, it really does not matter which protocol is used (like diplomats agreeing
on a language for negotiations).

The internet only works because TCP/IP, POP, FTP and HTTP are universal standards, used by
all shapes and sizes of computers.

178
TCP/IP protocol

TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of


communication protocols used to interconnect network devices on the internet. TCP/IP can also
be used as a communications protocol in a private network.

TCP/IP specifies how data is exchanged over the internet by providing end-to-end
communications that identify how it should be broken into packets, addressed, transmitted,
routed and received at the destination.

TCP/IP requires little central management, and it is designed to make networks reliable, with the
ability to recover automatically from the failure of any device on the network.

The two main protocols in the internet protocol suite serve specific functions. TCP defines how
applications can create channels of communication across a network. It also manages how a
message is assembled into smaller packets before they are then transmitted over the internet and
reassembled in the right order at the destination address.

IP defines how to address and route each packet to make sure it reaches the right destination.
Each gateway computer on the network checks this IP address to determine where to forward the
message.

How TCP/IP works

TCP/IP uses the client/server model of communication in which a user or machine (a client) is
provided a service (like sending a webpage) by another computer (a server) in the network.

Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client
request is considered new because it is unrelated to previous requests. Being stateless frees up
network paths so they can be used continuously.

The transport layer itself, however, is stateful. It transmits a single message, and its connection
remains in place until all the packets in a message have been received and reassembled at the
destination.

179
Packets of data

TCP/IP breaks files into packets to be sent across the internet or a network. Each packet
contains:

- the address of the sender

- the destination address (recipient)

- error-detecting checksum

- a chunk of data
Step 2
Step 1 The packets travel
from router to router Step 3
The TCP/IP
protocol over the internet The TCP/IP
To:
breaks data according to the IP protocol To:
From:
into packets protocol. reassembles the From:
packets into the
router router original whole.
router

sender recipient
router
router router

Once a file has been chopped into packets, the IP protocol delivers each packet to its destination.
Each packet can take a different route from A to B, bouncing from router to router getting more
precise with each hop. The route is dynamically chosen for each packet, based on internet
conditions at that time.

At the packet‘s destination the receiving computer‘s TCP re-assembles packets back into the
original file. If packets are damaged, lost or delayed in transit, TCP will request the server to
send the packet again.

Advantages of TCP/IP

TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore, the
internet protocol suite can be modified easily. It is compatible with all operating systems, so it
can communicate with any other system. The internet protocol suite is also compatible with all
types of computer hardware and networks.

180
URL
A URL (Uniform Resource Locator), as the name suggests, provides a way to locate a resource
on the web, the hypertext system that operates over the internet. The URL contains the name of
the protocol to be used to access the resource and a resource name. The first part of a URL
identifies what protocol to use. The second part identifies the IP address or domain name where
the resource is located. A URL is the most common type of Uniform Resource Identifier (URI).
URIs are strings of characters used to identify a resource over a network.

A URL is mainly used to point to a webpage, a component of a webpage or a program on a


website. The resource name consists of:

 A domain name identifying a server or the web service; and

 A program name or a path to the file on the server.

URL parts explained:

181
Challenge

a) Look at a map of London Underground network. Select a starting point for your journey
and select a destination. Your starting point and destination can be anywhere on the map.
b) Write down the journey you would take to travel from your chosen starting point to your
destination.
c) Ask a partner to put a blockage on the line somewhere along the route you wrote down
for part b. Can you still get to your destination? If not,what should you do? Write down
your new route to your destination.
d) If secret service agents wanted to transfer confidential information from Euston Square to
Old Street they might split the information into several different pieces and use a number
of different agents,each carrying a different piece and travelling on a different route,to get
the information to its destionation. What are the advantages of this?

5.4.IP address

Objectives:

 Understand what is an IP address


 Indetify the function of IP address and how to find it for your computer
 Examine the advantages of Domain Name Systems

Every device on the internet has a unique IP address. The IP address is included in a data
packet. IP addresses are either 32-bit or 128-bit numbers. The address is broken down into four
8-bit numbers (each is called an octet). Each octet can represent a number between 0 and 255 and
is separated by a full stop, eg 192.168.0.12.

The first byte indetifies the network and the last byte indetifies the device.

123.123.123.123
Byte 1 Byte 2 Byte 3 Byte 4

182
The maximum number of possible IP addresses sets a limit on the number of devices that can
connect to the internet at any given time.As there are more devices in the world that want to
connect to the internet than there are IP addresses,most devices are loaned a dynamic IP address
for a period of time.Every time a device connect to the internet it receives a dynamic IP address
Servers are an exeption,however.They usually have static IP addresses that do not change.

Think as a computer scientist

Why can each byte hold 256 different binary combinations?

______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

How can I find my IP address

1. To find your IP address you can use the ipconfig command line tool.

183
2. To find your IP address go to the ―Network and Internet‖ category, click the ―View
network status and tasks‖ link. In the upper right corner of the ―Network and Sharing
Center‖ window, click the name of your network connection. In the ―Ethernet Status‖
window, click the ―Details‖ button. In the ―Network Connection Details‖ window, you‘ll
find your router‘s IP address listed as ―IPv4 Default Gateway.‖

184
3.To find your Ip address, search in google: Find my IP address location.

Did you know?

The 32-bit IP address system is also known as IPv4. It allows for just over 4 billion unique addresses. IPv6 is now coming
into use. IPv6 uses 16 bits for each section of the address, creating a 128-bit address. This allows almost 80 octillion unique
IP addresses.

185
Subnets
IPV4 provides over four billion IP addresses,but we are running out as the number of digital
devices that want to connect to the internet continues to increase.If we allocate the IP addresses
to a router then we can turn four billion devices into four billion networks. These networks, that
appear to be one device to the outside world, are called subnets.

5.4.1.Domain Name System

The Domain Name System (DNS) handles the growing number of Internet users. DNS translates
names, such as www.example.com , into IP addresses, such as 192.168.40.0 (or the more
extended IPv6 addresses), so that computers can communicate with each other. DNS makes
using Internet applications, such as the World Wide Web, easy. The process is as if, when
phoning your friends and relatives, you could autodial them based on their names instead of
having to remember their phone numbers.

186
How DNS Works

To understand how DNS works, imagine a typical user, John, logging in to his computer. He
launches his web browser so that he can view the website at a company.

He enters the name of their website—http://www.example.com. Then:

 John‘s workstation sends a request to the DNS


server about the IP address of www.example.com.
 The DNS server checks its database to find that
www.example.com corresponds to 192.168.1.4. 3
 The server returns this address to John‘s browser.
 The browser uses the address to locate the website.
 The browser displays the website on John‘s monito

Think as a computer scientist

Indetify the IP address for the device that sent this email address.

Hint: received and return - path gives you more information about the sender.

hHint

187
5.5.Email Usage

What is email and how does it work?


Email is the modern way to send letters – you can send a message to the other side of the world
and get a reply in minutes! Email is short for electronic mail. An email is a letter that is sent over
a computer network instead of being sent through the post. You can attach documents and photos
to emails, just like you can include a photo or a document with a letter. You can also attach
computer files, such as programs and spreadsheets. Sending and receiving email is generally
free, and you can actually send an email to as many people as you like. Each person on email has
a unique email address, which is how you direct an email address to a specific person. You can
even send emails to yourself.

Email has its own writing conventions, which may take a little getting used to. Not many people
start an email with Dear sir, or end it with Regards. It‘s a lot less formal than that. There‘s
nothing wrong with being formal, of course, but some readers might think it strange. There are
also abbreviations and things called emoticons that you might find useful to learn.
A BRIEF HISTORY OF EMAIL
Email is actually older than the internet, having been developed in conjunction with the Advanced Research
Projects Agency Network (ARPANET) in the late 1960s and early ’70s. ARPANET was the precursor to the
modern internet that was built as a research project by the US Department of Defence. Original emails were text
only, didn’t support having documents, photos or video attached to them, or even different fonts. It was only in the
1980s when ARPANET morphed into the current internet that email started to look like it does today

Advantages and disadvantages of using email

Advantages

 Emails are delivered extremely fast when compared to traditional post.


 Emails can be sent 24 hours a day, 365 days a year.
 Webmail means emails can be sent and received from any computer, anywhere in the
world, that has an Internet connection.
 Cheap - when using broadband, each email sent is effectively free. Dial-upusers are
charged at local call rates but it only takes a few seconds (for conventional email, eg text
only) to send an email.

188
Disadvantages

 The recipient needs access to the Internet to receive email.


 Viruses are easily spread via email attachments (most email providers scan emails for
viruses on your behalf).
 Phishing - sending an email to a user falsely claiming to be a legitimate company to scam
the user into providing information, such as personal information and bank account
numbers on a bogus website. The details will then be used for identity theft.
 No guarantee the mail will be read until the user logs on and checks their email.
 Spam - unsolicited email

Setting up an account.

1. Decide on an email provider. There are countless different email providers--most of


whom are free to sign up for and use--but the three most popular ones are:

 Gmail - Google mail. Signing up for Gmail also creates a Google account, which is useful for
YouTube and other large social media sites.
 Outlook - Microsoft-created mail. An Outlook account is required for some Microsoft services
such as Microsoft Word (or Office 365), Windows 10, and Xbox LIVE.
 Yahoo - Yahoo is a simple email provider with features like news in your inbox and a simple
theme.
 All three of the above email providers have mobile apps for your smartphone available for free.
This will allow you to send and receive email from your smartphone.

2. Click the "Sign Up" button. This button may say "Create an Account" or something
similar and is typically in the upper-right side of the email page. If you are on Yahoo's
main website, you may need to click the Sign in button first, and then click Sign up at
the bottom of the "Sign in" page

189
3. Enter your information. Though there may be
additional information needed, you'll typically be
required to add the following information for all email
providers:
 Your name
 Your preferred email address
 Your preferred password
 Your date of birth

4. Complete the setup process. In some cases, you'll be


required to verify your identity over the phone (as in the
case of Yahoo), while other email providers simply ask
you to prove you're human by checking a box. Once
you've completed the setup process, you're ready to send
your email.

Sending an email
1. Select the "Compose" button. This is the
button that prompts the email provider to open a
new email template:
 Gmail - Click COMPOSE in the upper-left side of the
inbox (desktop) or tap the pencil icon (mobile).
 Outlook - Click + New at the top of the inbox
(desktop) or tap the pen-and-pad icon (mobile).
 Yahoo - Click Compose in the upper-left corner of the
page (desktop) or tap the pencil icon (mobile).

190
2. Type in another person's email address. You'll typically do this in the "To" field,
which is usually the text field at the top of the new email window.

 Email addresses are in the following format: name@emailprovider.com. There is usually an


option for "Cc" and "Bcc" in the "To" field. Selecting "Cc" will allow you to add another
person's email address, and "Bcc" lets you add an email address that is hidden from other
recipients.

Email address of the following format: name@emailprovider.com.

Context of the email

Write your email.


You'll do this in the large, white space below the Subject field.

3. Attach a photo, video, document, or other file if you want. Most email interfaces have a
paperclip icon that, when clicked, allows you to select files to upload to your email. It is usually
located at the bottom of the body of the email or somewhere along the toolbar between the
subject line and the body of the email.

 Email providers have a size limit for files (for example, Gmail allows up to 25 megabytes of
files to be uploaded per email).

191
Social Media

Social media is a computer-based technology that facilitates the sharing of ideas and
information and the building of virtual networks and communities. By design, social media is
internet based and offers users easy electronic communication of personal information and other
content, such as videos and photos. Users engage with social media via computer, tablet or
smartphone via web-based software or web application, often utilizing it for messaging.

The social tools provide channels through which new information is being produced every day.
For some people this can be overwhelming and lead to a feeling of information overload.
However, people typically use social media in a way which uses their social or professional
networks to filter the vast array of information down to something that is manageable. Once you
have built a network of people with interests similar to yours, you can use them to identify
resources that you are likely to be interested in.

Unlike traditional search technologies, which only return results related to the search terms that
you input, social tools harness your network to inform you about issues and developments you
may not be aware of. They can even provide alternative strategies and approaches to questions
based on collective experience. In other words, ‗search‘ can provide you with answers only to
the questions you ask, whereas social media can also provide you with intelligently-filtered
information that helps to stimulate new questions, in the same way that a conversation with a
friend might.

What social tools are available?

192
Review and Practise

Exercise 1. Fill in the blanks with the correct word.


social media, internet,internet of things, ADSL, cloud computing, communication
protocols,hyperlink,search engine,TCP/IP, URL

 ___________________worldwide network of computer networks. It is an


interconnection of large and small networks around the globe.
 ___________________concept of networking lots of devices so that they can collect and
transmit data.
 ___________________ provides connection speeds of up to 24 Mbps and uses a
telephone line to receive and transmit data.
 ___________________element in an electronic document that links to another place in
the same document or to an entirely different document or other resource.
 ___________________web application which keeps a huge database of web addresses.
Web pages are stored as an index on a server
 ___________________ is storing and using services online, rather than storing them
locally on a device such as a hard drive.
 _____________________agreed sets of rules and procedures for computers to exchange
information.
 _____________________suite of communication protocols used to interconnect network
devices on the internet
 _____________________provides a way to locate a resource on the web,
the hypertext system that operates over the internet.
 _____________________computer-based technology that facilitates the sharing of ideas
and information and the building of virtual networks and communities.

Exercise 2. Write T for the true statements and F for the false one. Correct the false statements.

 Web pages are web applications documents that present images, sound and text accessed
through a web browser

193
 To connect a computer or a device to the internet, you need an ISP (internet service
provider), modem or router (wired or wireless),web browser or app and a connection to
the network (through a copper wire or a fibre optic cable)
 Fibre optic uses electrical signals to pass data between networks
 Network speeds are measured by how many megabits they can download per second
(Mbps).
 ADSL network can be accessed through a smartphone without the need for a WiFi router.
The data is transmitted through the cellular phone network rather than the physical cabled
network of broadband.
 Each Web site contains an index page (this is the original starting page) and may also
contain additional pages.
 A web file is a computer that stores web pages.
 The crawler frequently visits web sites and takes a record of the address and keywords
and adds this information to a database with an index
 At the packet‘s destination the receiving computer‘s TCP re-chop the assembles packets
back into the original file.
 The URL contains the name of the protocol to be used to access the resource and a
resource name.
 Every device on the internet has a unique IP address.

Exercise 3.Which are the advantages and disavantages of using an e-mail message?
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
Exercise 4. Look at the Facebook and Google sign-up screens. Make a list of the similar
components you can see.
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________
______________________________________________________________________________

194
5. Research work. Carry out a research into fibre-optic broadband and answer the following
questions:

a. Who provides it?


b. What is the average upstream and downstream capacity?
c. How much does it cost?
d. Is it available in your area?

6. Research work. Is access to the internet a human right?

7. Research work. Connect to a website that provides details of your internet connection speed
using a mobile digital device. In a spreadsheet, record the upload and download speed of your
connection when you connect to the internet via a private wifi network,a public wifi network and
a 3G network.

b) Next, record the speed of your connection when you connect to the internet using a desktop
computer in school and, if you have a computer at home,at home.

c) Sort the data by download speeds and then by upload speeds. What do you notice?

8. Research work. What is the name of the ISP that provides you internet at home and what
services does it provide?

a) Consider the list of services an ISP can provide above and list them in your personal
order of priority.
b) Compare the service you receive from your ISP with your personal priorities. Are you
getting value for money?
c) Given the choice,would you change your ISP? Justify your decision.

9. Research work. What services might be available to you in the future to allow you to model
your social networking? What are the possible benefits and drawbacks of such services?

10. Research work. Carry out a research in the internet and find the best ways how to hide your
IP address.Create a powerpoint presentation on the topic “Hide your IP” and send it as an
attachment to your teachers e-mail.

195
Chapter 6
Computer Viruses

196
6.1.Moral and social issues related to ICT

The internet and freedom of speech

The internet is a vast source of information but it can also be used to peddle pornography, con
people out of money, invade people‟s privacy with unwanted advertising, and make it easier
for criminals to organise their activities.

However, it is not the case that anyone can post anything over the internet. For example:

 the Chinese government heavily censors its citizens' use of the internet

 libel (written defamation of someone's character) laws apply equally well to the internet

 copyright law is being actively used to suppress websites, for example, many file
sharing websites have been shut down over the years.

Arguments for control

 To prevent illegal material being readily available.

 To prevent young children accessing unsuitable material.

 To ensure copyright laws are maintained

Arguments against control

 Unsuitable material is easily available in other ways.

 Control would cost money and users would have to pay.

197
The need for the Data Protection Act

During the second half of the 20th century, businesses, organisations and the government
began using computers to store information about their customers, clients and staff in
databases. For example:

 names

 addresses

 contact information

 employment history

 medical conditions

 convictions

 credit history

Databases are easily accessed, searched and edited. It‟s also far easier to cross reference
information stored in two or more databases than if the records were paper-based. The
computers on which databases resided were often networked. This allowed for organisation-
wide access to databases and offered an easy way to share information with other
organisations.

The data, information and databases section has more on searching databases.

Think as a computer scientist

Misuse and unauthorised access to information

With more and more organisations using computers to store and process personal information
there was a danger the information could be misused or get into the wrong hands. Give your
opinion for the question below and discuss it with your partner:

 Who could access this information?


 How accurate is the information?
 Could it be easily copied?
 Is it possible to store information about a person without the individual’s knowledge
or permission?

198
The purpose of the Data Protection Act

The 1998 Data Protection Act was passed by Parliament to control the way information is
handled and to give legal rights to people who have information stored about them. Other
European Union countries have passed similar laws as often information is held in more than
one country.

The internet and crime

New technology brings with it new crimes and as a result some governments are setting up
special units to deal with internet crime. A major concern is internet fraud. For
example, phishing scams, identity theft and denial of service attacks are common techniques
used by criminals today.

Other concerns surround:

 the interception of credit card details and transactions online

 hacking into personal, private files with criminal intent

 fraudulent websites taking credit card details from customers

 the spreading of viruses via the internet

There are a number of ways the public are made to feel safer when using the internet:

 encryption of sensitive data, making it unreadable until it reaches its destination and is
decrypted

 passwords and access level restrictions

 firewalls (protection from hackers)

 anti-virussoftware

 tough penalties for offenders under the Computer Misuse Act

Computer Misuse Act


Defines and criminalises a number of offences involving the use of a computer, eg
unauthorised access to computer systems.

199
Computerisation of retail
Computerisation is changing the way we
shop in a number of ways:

 Computerised stock control means shops


can accurately predict demand. Ordering
of stock is automatic.

 IT supports the growth of big stores but


every business has access to the same
technology, and so they all have the same
opportunity to grow.

 Loyalty cards offer regular customers


discounts and this puts smaller shops
under threat.

 These cards enable the stores to build huge databases of customer preferences. Their
personal details can be used in direct mail-shots for marketing goods.

 Internet and digital TV shopping means we can shop without leaving home.

The growth of large stores and internet shopping has inevitably affected small shops:

 more small shops may go out of business

 local town centres are threatened by the closure of small shops

Other concerns

IT skills considered a must-have

IT skills are now seen as vital in the employment market. Those with such skills can advance
in their careers while those without might struggle to get a job. This is creating a
divided society-those with IT skills and those without.

Challenge

A travel agent has recently introduced a computer system into their High Street
branches. Describe two advantages this will give the company.

200
6.2. E-safety

Objectives:

 Apply e-safety knowledge to online activities.


 Use technology safely, respectfully and responsibly.
 Recognise acceptable and unacceptable behaviour online.
 Identify a range of ways to report concerns about content and contact

Discussion

 What are some of the opportunities and some of the pitfalls of connecting with
people online?
 In what online situations should you get a “gut feeling” that tells you that you may
be at risk?
 What are some rules for staying safe when talking and messaging online?

The Internet is without a doubt one of the best resources available to us. Unfortunately it's
also extremely dangerous if you aren't aware of who and what lurks behind the scenes.
Everyone should know how to be safe when surfing the web, but internet safety tips and
tricks are spread out all over the web without a go-to resource.

E-safety is the knowledge of minimising the user's personal safety and security risks on
private information and property associated with using the internet, and the self protection
from computer crime in general. Internet safety is a growing concern for both children and
adults. Common concerns regarding safety of the internet include malicious users (spam,
phishing, cyberbullying, cyberstalking etc.), websites and software ( malware, computer
virus, etc.) and various types of obscene or offensive content.

Cyberbulling

Bullying is unwanted, aggressive or unpleasant behaviour towards someone which causes


them any kind of harm. Usually, the behaviour is repeated over time, without provocation.

201
But which types of bullying might happen in person?

Verbal bullying
This could be teasing, name-calling, making inappropriate comments, taunting or
threatening to hurt someone.

Social bullying
People not to be friends with the victim, spreading rumours, embarrassing someone in
public on purpose.

Physical bullying
Sometimes the most obvious kind of bullying, this could be: hitting; kicking; pinching;
spitting; tripping or pushing; breaking someone‟s belongings; making rude gestures.

Bullying vs Cyberbullying

What similarities and differences did you come up with?

Bullying in Person

The bully can see if the person gets upset or angry.

Cyberbullying

The bully cannot see the effect on the person and this means they
are less likely to feel guilty. Other people can’t see that the victim is
hurt, and they are less likely to intervene.

202
Secure sites

Group discussion: What Do You Do Online? In a group, brainstorm the different types of
websites you access. Put them under these headings:

With an Adult
By Myself at Home At School

Social Media Shopping Research

Video Streaming Homework Research Design Websites

Online Games

Homework Research

How Can You Tell a Site Is Secure?

If a site is secure it means that any information you put into it is safe: it can‟t be seen by
anyone else. There are some simple clues you can look for to tell you a website is safe: Look
at the address bar. Does it read „http‟ or „https‟ at the beginning? The „s‟ stands for secure!

Padlock icon

https address

Secure logo

203
ACTIVITY 1

1. How can you tell that a website is secure and that it is save to give
personal information?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

2. Are there any warning signs to look out for that might tell you that a
website is unsecure or even fraudulent?

__________________________________________________________________________________
__________________________________________________________________________________
__________________________________________________________________________________

6.3.Hacking and viruses

Objectives:
 describe what is meant by hacking
 describe what a computer virus is
 explain the measures which must be taken in order to protect against hacking
 explain the measures which must be taken in order to protect against viruses

The word 'hacking' has several meanings, but in the context of ICT, it is normally taken to
mean breaking in to a computer system. A hacker may break into a system just out of
curiosity or for the challenge - can they get through the system‟s defences? But, it is more
likely that they are breaking in to access data, usually because the data has value. For
example, if a hacker enters your computer and steals financial information such as your credit
card number, or the password to your bank account, they could use that information to make
purchases.

If a lot of information about you is stolen, a hacker could use this to impersonate you on-line.

They might apply for new credit cards, take out bank loans, buy cars, etc. all in your name.

This is known as identity theft.


204
Can a Computer be Protected from Hacking?

Just as in the real world, there is no guaranteed way to stop someone breaking into a building
(you can make it very difficult, but every security system has its weaknesses), there is also
no guaranteed way to stop someone breaking into a computer system. However, you can
make it difficult enough so that a hacker moves on and looks for an easier target.

You should:

Use strong passwords to protect your user login account

Never reveal your login password to anyone else

Place a firewall between your computer and any network

Disconnect from networks when you are not using them

Encrypt any sensitive information (just in case they get in)

Viruses

A computer virus is a type of software that can make


copies of itself and invade other computer programs. This
can cause your whole computer memory to halt and
effectively stop your computer working properly.

The primary source of infection these days are email


attachments followed by illegal software and infected
files from the internet.

If you have up to date anti-virus software installed this


will immediately warn you of any infection. If not, there
is usually no evidence of the virus and the user is not
usually aware of it until something goes wrong.

Think as a computer scientist

Describe one possible method of preventing a virus getting onto your computer system.
205
How can I tell if my computer has a virus?

The common signs that your computer has been infected by a virus are:

• data has gone missing

• hard drive starts spinning for no reason

How Can a Computer Be Protected from Viruses?

 Install a firewall. This can be software or hardware, and protects your computer by
controlling what data can be passed onto your computer network.
 Install anti-virus software and keep it up-to-date (this is the most important thing you
can do!)
 Install anti-malware software (stops software installing without your knowledge)
 Never download and install software from the Internet unless you are certain it is from
a source you can trust
 Don‟t open e-mail attachments unless you have scanned them (even a file that seems
to be a picture can contain a virus)
 Don‟t click links in websites that seem suspicious (if a site is offering prizes / free
stuff etc. be suspicious!)
 If someone gives you a memory stick or CD-ROM, run a virus scan on it before
opening any files.
 Don‟t trust cracked versions of software from file-sharing sites (often these have
viruses and other malware added to them - a Trojan horse)

What is Software Copyright?

When someone creates an original piece of software, that person then holds something called
the copyright for that software. (This is also true when people create books, films and songs.)

For example, a team of 120 people put in over 1 million


person-hours of work to create the game Halo 3. The
development of the game took over three years.

That’s a huge amount of time and effort, and the


company that created the game ought to be paid for their
work. Paying a few dollars for a game that took so much
effort to create actually seems like pretty good value!

206
Holding the copyright for software means that you have the protection of the law if anyone
tries to steal your software.

Under copyright law, people must not:

Copy the software for other people

Lend or Rent the software to other people

Install the software on a network when other users can access it (unless it is a special
„network‟ version) If someone breaks the copyright, they can be punished by fines or even
by imprisonment. The reason for this is that creating software can involve the work of many
people and may take thousands of hours. It is only fair that all of this effort is protected.

Interesting facts

Ironically, one of the most infamous bits of spyware around is called Antivirus XP 2008/9.
This software is advertised as a genuine anti-virus product (for free too!), but if you install it, you've
actually installed some malware. The software will 'scan' your computer, then tell you that your
computer is infected. You'll then be bullied with endless pop-ups into paying a fee to have your
computer 'disinfected'.

In fact the only infection you really have is the fake anti-virus!

It is estimated that the creators of this malware have made millions of dollars from innocent, gullible
computer users. It's best to assume that if software is given away for free, there is probably something
dodgy about it.

Use Google to check any software out before downloading and installing

Think as a computer scientist

Carry out a research in the internet about most dangerous computer viruses and fill in
the table below by answering the questions.

Important: Cite the information!

207
Virus Worksheet

How to avoid getting your


How this virus How this virus affect your
Computer computer infected with this
is spread? PC or your information?
Virus virus?

E-mail
viruses

Trojan
horses

Worms

Boot sector
viruses

New virus
name:

208
6.4.Protection against unauthorized access and malware

As soon as your computer is connected to a network, you have to start thinking


about security – security of your files, information, etc. A network allows a person who does
to have physical access to your computer (they are not sitting in front of it) to gain access all
the same. If your computer is connected to a network, other people can connect to your
computer.

There are a number of security measures that you can take to prevent hackers accessing your
computer and all of the data stored on it:

Physical Security

The first thing to make sure of is that no unauthorised people can physically access (sit down
in front of) any of the computers on your network. For example, by keeping office doors
locked.

Use a Username and Have a Good Password

The most common way to protect your computer‟s data is to setup user
accounts with usernames and passwords. Anyone not having a username, or not knowing the
correct password will be denied access. For this to be effective passwords must be chosen
that are not easy to guess. Passwords should be a random combination of lowercase letters,
uppercase letters and numbers (and symbols if this is allowed):

„Weak‟ passwords: password, 123456, david, 27dec1992

„Strong‟ passwords: s63gRdd1, G66ew$dQ, gdr298783X

Some computer systems replace the typing of usernames and passwords with other forms of
user identification such as ID cards, fingerprint readers, voice-print recognition, etc.

Strong passwords are often hard to remember. Here is a good method for creating a password that is very strong, but also easy
to remember:
Think of a phrase that you will never forget…

“My favourite food is chocolate ice cream”

Take the first letter of each word…

mfficic

Change some letters to similar numbers: I to 1, o to 0, s to 5, etc. and make some letters (e.g. the first and last) uppercase…

Mff1c1C
209
A random-looking mixture of letters and numbers. As long as you like chocolate ice cream you will never forget your
password!
Using firewall

A firewall is a device, or a piece of software that is placed between your computer and the
rest of the network (where the hackers are!)

If you wish to protect your whole LAN from hackers out on the Internet, you would place a
firewall between the LAN and the Internet connection. A firewall blocks unauthorised
connections being made to your computer or LAN. Normal data is allowed through the
firewall (e.g. e-mails or web pages) but all other data is blocked. In addition to physical
devices, firewalls can also be software. In fact most computer operating systems have a
software firewall built in (e.g. Windows, Linux and Mac OS)

LAN

A local area network (LAN) is a group of computers and


associated devices that share a common communications
line or wireless link to a server.

Operating system and software patches and updates

There is no such thing as perfect software. Programs often have compatibility issues or
vulnerabilities that can compromise your computer's security. Software patches, updates,
and drivers are made available, often for free, to consumers to help keep a software program
and operating systems running properly and secure.

If the program you're using does not have any method of checking for updates on its own, it
is up to you to verify the program is up-to-date. Often this can be done by visiting the website
of the developer who created the program.

210
Password Worksheet

Being safe online is very important.Lots of websites ask you to set up a password.

What makes a good password?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

What about you? What would your perfect password look like? Follow the rules to
create your own strong password.Enter it into a password checker website and see how
strong your password is. Remember, don’t tell anyone your idea for password!

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

211
6.5.Encryption

Objectives:

 Explain what encryption is


 Analyze how encryption works

Often we have data that is private or confidential. This data needs to be protected from being
viewed by unauthorised people. This is especially true if the data is to be sent via a public
network such as The Internet.

The best way to protect data is to encrypt it.

Encryption is the process of converting information into a form that is meaningless to anyone
except holders of a „key‟.

Encryption has been used for centuries to protect secrets. Military leaders as far back as
roman times have used encryption to protect important messages sent to their armies,
messages that must be kept secret from the enemy. If the messenger was caught by the
enemy, the message, being encrypted, remained secret because they didn‟t know the code to
decrypt it.

Example:

If Alice wants to send important, personal messages to Bob, she must go through the
following steps. First Alice needs to generate a secret „key‟. The key is usually a very long,
random number.

Alice must then give a copy of this key to Bob. She must make sure that nobody else can get
to the key . (So maybe Alice will visit Bob and give him a copy of the key on a memory stick
or floppy disc).

212
Now that Bob has a copy of the key, each time Alice needs to send him a message she starts
by encrypting it using special encryption software and the secret key.

The encrypted message now looks like a jumble of random letters and numbers. Alice
then sends the encrypted message to Bob. She can use a public network like the Internet,
since, even if it gets stolen, the encrypted message cannot be read or understood without the
key.

When Bob receives the message, he uses special decryption software and his copy of
the secret key to decrypt the message. Bob can now read the original message from Alice.

 Carry out a research by giving three advantages and disadvantages of using


cryptography in computer security.

213
Encryption Worksheet

Julius Caesar used a simple substitution Cipher to send messages to his troops. He used a
very simple rule to replace each letter with another letter from the alphabet. He substitute
letter by the letter that was 3 places further along in the alphabet, so that “a” was replaced
with “D”, “b” with “E” and so on. Complete the table below to show what each letter is

enciphered as using this system.

1. Using the Caesar Cipher, encode the name of your school. Check that you get the
same code as the person sat next to you.

___________________________________________________________________________

2. How easy is it for someone who intercepts a secret message written using this cipher
to work out the original message? Is there anyway to make it harder to work out?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

3. Decode this message, which was enciphered using a Caesar Shift:

ZKHQ BRX KDYH GHFRGHG WKLV ZRUN RXW WZHQWB VHYHQ WLPHV
QLQH DQG WHOO BRXU WHDFKHU.

__________________________________________________________________________________
__________________________________________________________________________________

4. Write a message of your own, and encipher it using the Caesar Shift. Hand the secret
message to your partner, and get them to decipher it. In pairs, discuss how good this
cipher is at protecting messages. Can you think of any ways to improve

Although Caesar substituted each letter with the letter 3 places ahead, there are other variations of this cipher.

You could shift each letter by 4 or 5 or 6 etc. This is called a key, and depending on which key you use, you will get a different message.

214
Review and Practise
Exercise 1. Fill in the blanks with the correct word.

E-safety, bullying, computer virus, copyright, firewall, encryption

1. ________________ is the knowledge of minimising the user's personal safety and


security risks on private information and property associated with using the internet,
and the self protection from computer crime in general.
2. ________________ is unwanted, aggressive or unpleasant behaviour towards
someone which causes them any kind of harm.
3. A _______________ is a type of software that can make copies of itself and invade
other computer programs.
4. When someone creates an original piece of software, that person then holds
something called the ________________ for that software.
5. A _______________ is a device, or a piece of software that is placed between your
computer and the rest of the network
6. ______________ is the process of converting information into a form that is
meaningless to anyone except holders of a „key‟.

Exercise 2. Bullying and cyberbullying have many similarities yet are very different types of
bullying.

Carry out a research in the internet and using the key facts, complete the following Venn
diagram.

215
Exercise 3. Multiply choice questions.

1. Which country heavily censors what their citizens can access on the internet?
o China
o USA
o UK
2. Which of the following is NOT an argument for controlling some of the
material on the internet?
o To prevent young children accessing unsuitable material
o To encourage people to write defamatory or libellous comments about organisations
o To ensure copyright laws are maintained
3. Two of the following statements show why controlling access to material on
the internet would not work. Which is the odd one out?
o Unsuitable material is easily available elsewhere
o Email monitoring is justified if it helps prevent crime
o Control would cost money and users would have to pay
4. What is the name of the Act which covers the collection and storage of
personal data?
o Computer Misuse Act
o Copyright, Designs & Patents Act
o Data Protection Act
5. What is hacking?
o Stealing company hardware
o Spreading viruses around a network
o Gaining unauthorised access to computer systems
6. What does encrypting data involve?
o Sending data as an email attachment
o Sending data across your own secure network
o Translating data into a code so that it makes no apparent sense
7. What does a firewall do?
o Prevents unauthorised access to your computer via the internet
o Stops you installing software that may harm your computer
o Records everything you do on your computer
8. Which of the following is a negative effect of the growth of internet shopping?
o Small shops can go out of business
o People can shop 24 hours a day
o Prices can quickly be compared between store
9. Which of the following is BAD advice for protecting your computer against
infection?
o Open email attachments if they look interesting
o Use up-to-date anti-virus software and always download the latest definitions
o Only download files from reputable internet sites
10. Why is it a good idea to regularly backup data?
o It will prevent your computer from getting a virus
o It is a requirement of government law
o Damaged files can be restored

216
Exercise 4. Creating a strong password

Imagine that your grandmother has recently bought


herself a new laptop.She wants to contact her friends using
social media but she needs to think of a suitable and
strong password for her account.This is the password that
she has come up with:

granny-password123

Your grandmother does not understand why granny-password123 is a weak password, and
she need your help in thinking of a better password for her account.

To help her, write down some Do’s and Don’ts to help her create a new strong password:

DO’s

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

DON’ts

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Exercise 5. Imagine that you work for the Customer Support Team of a social network
website called Clix-n-Pix, and you receive the following email from an unhappy customer:

How would you respond to this email?

217
Chapter 7
Internet Research

218
7.1. Advantages and disadvantages of internet
research Objectives:

 Indetify the advantages and disadvantages of internet research


 Analyze the differecnce between library research and internet research

1. Imagine you live in a world with no internet. For homework, you’ve been asked to do a
project on the life of Charles Dickens.
Where would you go to find out information?
2. Finish the sentences:
Research means……
The most popular way to do research today is….

Online and library research each have their place in a good research project. But whether a
student chooses to use both or just one of these depends on which has the information the
student needs, what resources are most available and what comfort level the student feels for
each research method.

Advantages of online research

 Access to new and valuable sources of information that came into being because of
the Internet.
 A more efficient route for accessing certain standard information sources such as
newspapers, particularly overseas papers and electronic versions of existing print
journals.
 Access to an enormous amount of information. Currently it is estimated that there are
about 800 million pages of information on the Web.
 Access to obscure and arcane information. Because there are so many people with
such diverse interests on the Internet, a search can often turn up the most unusual and
hard-to locate nugget of data.
 Access to digitized versions of primary sources. Some libraries are digitizing (making
electronic versions) of primary research sources such as personal letters, official
government documents, treaties, photographs, etc. and making these available for
viewing over the Internet. The same is true for audio and, in some cases, video.

219
 Access to searchable databases and datasets. There are many sites on the Internet
where you can search a collection of statistical data, such as demographic or social
science data. While some databases on the Internet are fee-based, others are free.
 Access to government information. The U.S. federal government is one of the largest
publishers in the world and it is utilizing the Internet as its preferred method for
disseminating much of its information.
 Access to international information. Not only can you easily find official data from
other countries by connecting to embassies, consulates, and foreign governmental
sites, you can also search other countries' newspapers, discuss issues with citizens
from around the world on the newsgroups, and locate Web sites established by
individuals from other nations.
 Other key benefits that the Internet brings to the researcher include:
- Speed. Doing a search on the Internet can take just seconds.
- Timeliness. On the Internet you can find information that has just been made
available a few minutes earlier.
- Multimedia. The Internet delivers not just text, but graphics, audio, and video.
- Hyperlinking. The ability to click between Web pages can facilitate an
associative type of research, and make it easier to view citations and
supporting data from a text.

Disadvantages of Online Research

 Diverse collection of information. The Internet is truly a potpourri of information-


that's one of its strengths, but it's also one of its weaknesses. On the Net you can come
across everything from a scholarly paper published on particle physics to a 14-year-
old's essay on her summer vacation. All of this diversity makes it difficult to separate
out and pinpoint just the type of information you want.
 Difficult to search effectively. A traditional electronic database that you might search
in a library may take a little learning and practice, but once you get the hang of it, you
can become an effective searcher. But on the Internet, even if you know all the ins and
outs of searching, because of the built-in limitations of Internet search engines and the
way Web pages are created, you'll only be able to search a small percentage of what's
on the Net. You also won't be able to easily distinguish the valuable from the trivial
pages; and you can obtain unpredictable results.

220
 Emphasis on new information. The Web came into being in the early 1990s, and,
consequently, most of the information available on the Internet postdates that time.
However, this is changing as certain Web site owners are loading older, archival
material.
 Lack of context. Because search engines will return just a single page from a
multipage document, you can miss the larger context from which that information was
derived.
 Lack of permanence. Web pages are notoriously unstable. They appear, move, and
disappear regularly. This can be of particular concern for academic researchers, who
need to cite a stable page for reference purposes.
 Selectivity of coverage. Despite the size of the Internet, the vast majority of the
world's knowledge still resides in print. So a search for information on the Internet in
no way represents a comprehensive search of the world's literature or
knowledge.

Think as a computer scientist

You’ll notice that most of the disadvantages also appear in the advantages list.
Why do you think this is?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Advantages of Library Research

Libraries are still the best place to find primary and scholarly sources, an essential element in
any research project. And if a library does not have its own copy of a source, it can borrow
resources from other libraries through interlibrary loan. Libraries are staffed with librarians
who are often subject matter experts or at least knowledgeable about their own collections.
Getting a librarian's assistance can mean having access to resources you never would have
known about. And library collections are heavily vetted. Students can be sure that the
majority of items in a library are reliable sources.

221
Disadvantages of Library Research

Time and access can be obstacles to library research. Students must get to the library during
library hours, which may not be convenient. They also may need to stay in the library for a
long time to ensure they have exhausted all resources. Some resources may not be available
for checkout, which means the student must stay in the library to use them. And those that do
circulate may be checked out by others and unavailable to anyone else.

Think as a computer scientist

Finding the right information on the internet can be a tricky task. A search engine can
help to locate information quickly and accurately. Can you name some different search
engines? Look at these research questions about animals and underline three or four
keywords that would help to find the most relevant information. Write the keywords in
the search box.

1. Animals which eat meat are called carnivores.

How do the teeth of the carnivores help them to eat their food?

2. Some animals use colours to camouflage themselves for protection.

Which prey animals use camouflage?

3. Some animals live in very cold environments such as Artic.

What adaptions do they have for living in such cold places?

 Try adding the keywords into a search engine. Do the keywords find good information
to help answer the questions?

222
7.2. Internet sources and reliability
Objectives:
 Indetify and evaluate different internet resources
Before using information you find on the internet for assignments and research, it is
important to judge its accuracy and to establish that the information comes from a reliable
and appropriate source.

1. Trustful sites

If we had to choose between getting your world news from The New York Times or Smitty's
Basement Newspaper, most of us would grab the Times, because it's a name we know and
trust.

The same is true for internet research. If you want to know the results of last week's election,
visiting your favorite news outlet's website is a great place to start.

2. Date

Another helpful tip is to look at the date of an article as well as the dates attached to studies
and resources within an article.

If an article cites a study done 10 years ago, it brings into question the reliability of the
information. This is especially true if there are more recent studies available on the subject.

Another good indication that an article may be outdated is broken or "dead links."

Many website articles include links that visitors can click on for more information (like those
at the bottom of this page). If those links don't go anywhere, chances are the article is old.
One dead link is probably nothing to worry about, but a bunch of them should raise a red flag.

The creator of a legitimate website will take the time to keep links up to date so visitors can
learn more. The presence of dead links is a good indication that the website is no longer
maintained.

3.Top level domain (TLD) and Domains

One of the simplest ways to determine the credibility of an online resource is to look at the
purpose of the website, which can often be learned from the ending of the site's address.

223
Every website ends in a Top Level Domain (TLD). This is the bit after the last period in the
domain name. For instance, WhoIsHostingThis.com ends in .com, which lets you know that
this is a commercial website.

It the most popular TLD on the internet and can be used by any person, business, or other
entity, which means if you're researching something, .com sites require more evaluation that
some other types of sites.

Therefore, any information on their website is liable to have a bias toward getting a visitor to
buy whatever it is that's for sale there. If you're looking for an honest comparison between
iOS and Android, you should assume that anything you find on Apple.com is going to have a
major bias toward the former.

Alternatively, an address that ends in .edu belongs to an educational institution such as a


college or university.

A visitor may find an article there written by a professor who is an expert on a particular
topic. The professor may include their credentials at the end of the article as well as citations.
These elements serve to make the website a more reliable online resource.

As a note, students are also able to contribute to many .edu websites. It's a good idea to look
for citations when dealing with a student's writing to ensure credibility.

Also, if you're searching for information for a research paper, you probably need to look for
peer-reviewed articles. Just because a professor publishes something on a .edu website
doesn't mean their peers have reviewed and validated the information.

An address that ends in .gov is a government website. If you're looking for reliable
information about government policy, tax codes, or a political office, these sites are a great
place to start.

The TLD .org was originally intended to be used by non-profit organizations, but any
organization can register a .org address. Much like .com sites, you should expect that
anything you read on a .org site will have a bias toward that particular organization's mission
or goals.

At the time of this writing, there were over 700 top-level domains available, including
everything from .barber to .ninja.

224
While these unique TLDs may prove useful when you are looking for a particular type of
service, they can't guarantee the credibility of any content. It's always beneficial to read all
online articles with a critical eye.

4.Digging Deeper

The presence of many misspellings on a website is also a clue that it's not a credible resource.
Someone who creates a legitimate website designed to provide people with factual
information takes care with both spelling and grammar in order to appear more professional.

5.Local Library

The internet is a great source of information, but when accuracy counts, the library is still one
of the best places to do research. Most libraries now allow patrons to utilize their research
tools online, so you can still do your research from the comfort of your computer chair.

Libraries have access to research databases, many of which require a subscription and aren't
available through traditional search engines. These databases allow you to search for articles
in print and online journals and books.

6.Don't Trust Your First Source

Finally, no matter where you find information, it's a good idea to double-check it against
other sources. You can do this by performing additional online research or checking some
print publications at the library.

If you find the same information on several other legitimate websites as well as in a print
publication, it increases the odds that the information is accurate.

Think as a computer scientist

1. If you were looking for information on Hurricane Katrina which source would be the
most reliable? Which one is the least reliable?
A. victim blog
B. novel
C. newspaper report
D. eyewitness account

225
Evaluating Internet Resources
Evaluate the selected Web sites by using these criteria. Answer the questions for each site, as
the information is available.

Topic:
Site 1: http://
Site 2: http://
Site 3: http://

Evaluating Internet Resources Site Site Site


1 2 3
AUTHORITY
(Who is responsible for the information?) Can you identify the author(s)?
What are the credentials of the author(s)?
Is the organization sponsoring the site knowledgeable or respected in its
field? (Look for header or footer for affiliation; domain name)

PURPOSE
Why was this site created?
Is the page designed to sway opinion?
Is there any bias?
Is there any advertising on the page?

CONTENT
Does the site cover the topic comprehensively?
Does the information appear to be accurate? (Does the info sound
outlandish?
Do the links work?) Can you tell which sources the author used in obtaining
the info? (Bibliography or report listed?

CURRENCY
Is the page dated?
If so, when was the last update?
Is the information current?
If not, does it matter for this topic?

WOULD YOU USE THIS SITE FOR A PAPER ON THE SAME TOPIC?

226
The "Hummingbird" update was the first major update
to Google's search algorithm since the 2010 "Caffeine"
search architecture upgrade, but even that was limited
primarily to improving the indexing of information
7.3.Searching the internet effectively rather than sorting through information.
Objectives:
 Explain the google page rank
 Indetify basic smart search terms
 Analyze and indetify by searching into the internet effectively
Google page rank

Page Rank (PR) is an algorithm used by Google Search to rank websites in their search
engine results. Page Rank was named after Larry Page, one of the founders of Google. Page
Rank is a way of measuring the importance of website pages and how relevant is their
information.

Example:

When you go to a search engine you are given a search box into which you enter the key
words of your topic. For example, if you enter the word rock you will likely get links to pages
about geology, music and building societies.

Let us say we want information on rock music. If you type in rock music it is likely the
search engine will bring up links to many pages about rocks, rock climbing and music.
However, if you try typing in "rock music" (with quotes) the search engine will treat it as a
phrase and bring up details of web pages containing the words rock music in that order.

Advanced search terms

Entering rock + music will bring up documents containing both words. Entering rock + music
- climbing will bring up documents containing the words rock and music but with no
reference to climbing.

227
Smart search terms
Use quotes to locate a specific phrase

Probably one of the number one things you can do to save serious web search time is the
simplest - and that's searching for a phrase by putting it in quotes.

When you use quotation marks around a phrase, you are telling the search engine to only
bring back pages that include these search terms exactly how you typed them in order,
proximity, etc. This tip works in almost every search engine and is very successful in
bringing back hyper-focused results. If you're looking for an exact phrase, put it in quotes.
Otherwise, you'll come back with a huge jumble of results.

Use Google to Search within a Site

If you've ever tried to use a website's native search tool to find something, and haven't been
successful, you definitely are not alone! You can use Google to search within a site, and since
most site search tools just aren't that great, this is a good way to find what you're looking for
with a minimum of fuss. This is a great way to easily find what you're looking for.

228
Simply use this command within Google's search bar to search within a site: the word "site",
then a colon, then the URL of the website you'd like to search within. For
example: site:www.yahoo.com "how to find people" plugged into Google will bring back
search results only from this domain that are related to finding people online.

Find Words within a Web Address

You can actually search within a web address using the "inurl" command via Google; this
allows you to search for words within the URL, or Uniform Resource Locator.

This is just another interesting way to search the web and find web sites that you might not
have found by just entering in a query word or phrase. For example, if you only want to find
results from sites that have the word "marshmallow" in their URL, you would plug this query
into Google's search bar: inurl:marshmallow. Your search results will only contain websites
with that word in their URL.

Use Basic Math to Narrow Your Search Results

Another web search trick that's deceptively simple is using addition and subtraction to make
your search results more relevant. Basic math can really help you in your search quest.This is
called Boolean search and is one of the guiding principles behind the way most search
engines frame their search results.

229
Limit Searches to a Specific, High-level Domains

This works in most popular search engines and is a great way to narrow your searches to a
very particular level. For example, say you only wanted to search U.S. government-related
sites for something. You could limit your search results to only government sites simply by
typing site:.gov "veteran's benefits". This will bring back results only from sites that are in
the .gov high-level domain.

Using Multiple Search Engines

Every search engine returns different results. Plus, there are many search engines that focus
on specific niches: games, blogs, books, forums, etc. The more comfortable you are with a
good variety of search engines, the more successful your searches are going to be.

Widen the Net with a Wildcard Search

These wildcard characters include * (asterisk), # (hashtag), and ? (question mark) with the
asterisk being the most common.

For example, if you are looking for sites that discuss trucks and topics associated with trucks,
don't search for just "truck", search for truck*. This will return pages that contain the word
"truck" as well as pages that contain "trucks", "trucking", "truck enthusiasts", "trucking
industry", and so on.

Create some questions about your chosen topic to search in Google.


Eg. “Where did the Vikings land?” Internet Research
Change them into statements with a blank.
Eg. “The Vikings landed in *.”

Search both and see which gives the better search results.

Think of an interesting way to record and compare the search results.


Eg. Table? Graph? Poster?

Finally, record at least 3 of the interesting facts you have found out!
1.
2.
3.

230
7.4. Referencing and avoiding plagiarism

Objectives:

 Indetify the importance of referencing into a research work


 Indetify the importance of avoiding plagiarism

Plagiarism is passing off somebody else's work as your own. If someone is caught
plagiarising, they automatically fail the course.

Authors don't mind being quoted, as long as their name is mentioned whenever they are
quoted. The author should also be included in the bibliography. Whenever you use words
straight from a text, you should put quotation marks around them, and give a reference to
show where the text came from.

If you don't include references for original text, you'll be guilty of plagiarism.

Writing a bibliography

A bibliography is a list of all the sources that you used to make your portfolio. This includes
all books, magazines, newspapers, websites, interviews and TV programmes.

There is a standard way of laying them out that you MUST follow. This is:

Author - put the last name first.

Title - this should be underlined and in quotation marks.

Publisher - in a book this is usually located on one of the first few pages.

Date - the date/year the book/article was published.

Put each source on a single line, with a comma between each and a full stop at the end. You
should arrange them in alphabetical order of the author's surname. You should also make
sure that the list is double-spaced.

Use the example below as a guide:

Books Fleming, Ian, 'Diamonds are Forever', Penguin Books, 1957.

Jon Spencer, Architect, interviewed on 3/3/2005.

Website http://www.bbc.co.uk/dida, 'Dangers of the Internet', June 2005.

231
Bibliography advice

 It is best to keep your bibliography up to date as you go through each project.


 Keep a word processor file called Bibliography open whenever you are working on
your project. Add to it whenever you do some research.
 Remember to list authors and sources in alphabetical order.
 Remember it is fine to use secondary sources to gather information for your project,
but you cannot just reproduce them. It would be plagiarism and could
infringe copyright.
 You don't need to have several pages of references, just put in the things you used.
Don't add things just for the sake of it.
 You will probably need between 10 and 20 references for most projects.
 Don't put search engines down in your bibliography. It is the information that you
found that is the important thing to include.

Identifying Plagiarism

The following are quotes from sources and excerpts from student papers that somehow
employ the source quote. In each case, ask yourself: Is this plagiarism?

Original Quote: “To be sure, Atlantic Africans made important contributions in forging the
interconnected, mutually influencing entanglements of the Atlantic world; yet they were also
ensnared by them—through slavery, through racism, through colonial subjectivity.”

This quote comes from page 305 of the following: Sweet, J. H. (2009). Mistaken identities?
Olaudah Equiano, Domnigos Álvares, and the methodological challenges of studying the
African diaspora. American Historical Review, 114(2), 279-306.

Student paper excerpt: As one historian has written, people from Africa played an
important role in creating the interconnectedness of the early modern Atlantic world even
though they were often victims of slavery and racism.

Is this plagiarism?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

232
Original Quote: “On April 12, while the Union fleet lay helpless offshore, the Confederates
began bombarding Fort Sumter, and after thirty-four hours Anderson and his garrison were
forced to surrender.”

This quote comes from page 292 of the following: Donald, D. H. (1995). Lincoln. New York:
Simon & Schuster.

Student paper excerpt: The Confederates started the American Civil War in April 1861
when they bombarded Fort Sumter.

Is this plagiarism?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

Original Quote: “In 1893, the city’s star rat catcher was Frederick Wegner, who arrived
from Bavaria and made his name, first, by ridding Brooklyn’s Prospect Park and then
Greenwood Cemetery of rats. When there was a rat infestation in the Central Park Zoo—the
rumor was that the elephants had been attacked by rats—he was immediately called in and
caught 475 rats in his first week; he used traps because the zookeeper was worried about
poison around elephants.”

This quote comes from page 97-98 of the following: Sullivan, R. (2004). Rats: observations
on the history & habitat of the city’s most unwanted inhabitants. New York: Bloomsbury.

Student paper excerpt: The journalist Robert Sullivan (2004) has noted that New York
City’s most successful rat catcher of the 1890s was a Bavarian immigrant named Frederick
Wegner, who rid the Central Park Zoo of a major infestation without the use of poison (p. 97-
8).

Is this plagiarism?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

233
7.5. Evaluating a website
Objectives:
 Understand how the ease of publishing on the Internet might affect how much they can trust
the content of some sites.
 Learn criteria that will help evaluate websites.
 Apply the criteria to a site to determine how trustworthy and useful it is.

The online world is quickly becoming a source of primary information.Considering the


enormous amount of information available online and that about 75% of all people in the
world have Internet access, students need to be able to critically evaluate Web pages for
authenticity, applicability, authorship, bias, and usability. Unlike the media center, there are
no media specialists to sort out the valuable information from the substandard information.
With more than 350 million documents available on the Web alone, finding relevant
information online can be daunting. Therefore, the ability to critically evaluate information is
an invaluable skill in this information age.

Navigation and Usability

In order to use a site effectively, and in order to get to the important information, it must be
navigable and easy-to-use. A site should provide for all types of learners. This can be done by
offering hypertext links, so users can jump around, and a site map for the left-brained or
concrete-sequential user.

Authorship

A site should enable the user to easily find out about the author; where they work, what their
credentials are that makes it appropriate for them to write about the topic, and how to get in
touch with them for further questions. Web page authors have to expect that they will get e-
mail from interested students asking for further explanation of the topic covered.

Content Validity

The most important area to consider when evaluating a Web site is the content. Students need
to be able to recognize when a Web page is a thinly-disguised commercial or opinion page or
when it is strictly a source of information. More importantly, the student needs to realize
when each type of page is appropriate for his/her purpose or task. If possible all information
should be verified in a traditional edited print/electronic source or from reputable Web sites.

234
Bias

Biased sites contain words that try to persuade rather than inform. Some of these words
include over-generalizations and simplifications and may also contain games, giveaways,
contests, or celebrity endorsements intended to persuade.

Dates

Every credible Web site includes the date that it was created and the date of last update.
Another date that may be important to your students is the date the data was collected.
Students need to ask themselves if the information they are looking for is from an area that
demands more current information. In this case, the date of last update is an important feature
to look for.

Example: Identifying High-Quality Sites


Name of Site:
URL:

235
Think as a computer scientist

How accurate do you think Wikipedia is as a source of information?

236
Review and Practise

1. Which answer is a warning sign that a website might NOT have trustworthy
information?

a) The author is an expert

b) The information comes from the site of a well-known newspaper

c) It is not clear who the author is

2. True or false: Only experts can post things on the Internet, so everything you read
online has been put there by people who know what they are talking about.

a) True

b) False

3.You and your friend Darren are partners for a science research project. Darren sends you a
link to a website, but you don’t think it’s very good.

Circle at least three things on the site that do not seem trustworthy.

4. Use Boolean search terms to search the web and find as much relevant and high
quality information as you can about three programing languages named after famous
people.

237
5. What can you do to ensure you avoid plagiarism?

___________________________________________________________________________
___________________________________________________________________________

6.The internet Way back machine website has been storing snapshots of websites since
1996.

Find out how your favourite website have changed over the years.What has changed and
why?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

7.Geocities was the first giant online community when it launched in 1994.When it was
closed down in 2009,a project archived it so you can see it as it was. Search for” geocities
archive project ” and have a look around.What has changed and why?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

8.In 2010,The Telegraph reported the following:

Mr.Schmidt said he believed that every young person will one day be allowed to change
their name to distance themselves from embarrassing photographs and material stored
on their friends social media sites.

Some companies now search for an interviewee online and check their Facebook
profiles before hiring them. Is there anything about you on the web that might cost you a
job in the future?

___________________________________________________________________________
___________________________________________________________________________
___________________________________________________________________________

238
239

Você também pode gostar