Information Technology (IT) / Information Technology Enabled Services (ITES)
NVEQ Level 3 – Class XI
Teacher's Handbook
PSS CENTRAL INSITITUTE OF VOCATATIONAL EDUCATIOIN SHYAMLA HILLS, BHOPAL A constituent unit of NATIONAL COUNCIL OF EDUCATIONAL RESEARCH & TRAINING (MINISTRY OF HUMAN RESOURCE & DEVELOPMENT) Government of India Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
© PSS Central Institute of Vocational Education, 2013
Copyright protects this publication. Except for purposes permitted by the Copyright Act, reproduction, adaptation, electronic storage and communication to the public are prohibited without prior written permission.
Page 2 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Table of Contents IT/ITES 301 Functional English (Advanced) Page No. Session 1 Dress And Hygiene Session 2 Preparing A Daily And Weekly Work Plan Session 3 The Importance of Computers Session 4 Identifying Different Types of Computers Session Review Session 1 Session 5 Computer Brands and Models Session 6 Features, Advantages and Benefits Session Review Session 2 Session 7 Locating Products Session 8 Complaint HandlingCategorizing Computer Issues Session 9 User Manual Session Review Session 3 Session 10 Cross Selling Session 11 Merchandizing Via Technology Session 12 Product Promotion Session Review Session 4 Session 13 14: Closing a Deal Session 14 15: Stock Count Session 15 16: Writing a Customer Service report Session Review Session 5 IT/ITES 302 Digital Literacy (Advanced) Session 1 Digital literacy Session 2 Copyright, Trademark & Patent Session 3 Plagiarism Session 4 Avoiding violations Session 5 Cyberlaws IT/ITES 303 Word Processing (Intermediate) Session 1 Managing Lists – Sort, Renumber, Customize A List Session 2 Adding A Watermark Session 3 Table Manipulations
Page 3 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Session 4 Working With Styles Session 5 Working With Themes Session 6 Playing With Pictures Session 7 Insert And Format Screenshots In A Document Session 8 Create Text Boxes And Pull Quotes Session 9 Word Art And Other Special Effects Session 10 Using SmartArt Session 11 Controlling Text Flow IT/ITES 304 Spreadsheet (Intermediate) Session 1 Insert and Modify Pictures and ClipArt Session 2 Draw and Modify Shapes Session 3 Illustrate Workflow Using SmartArt Graphics Session 4 Layer and Group Graphic Objects Session 5 Goal seek Session 6 Analyze Data with Logical and Lookup Functions Session 7 Manage themes Session 8 Create Modify and Format Charts Session 9 Create and use templates Session 10 Update Workbook Properties Session 11 Creating and Editing Macros IT/ITES 305 Digital Presentation (Intermediate) Session 1 Inserting a Movie Clip Session 2 Inserting an Audio Clip Session 3 Working With Tables Session 4 Working With Charts Session 5 Inserting Transitions Session 6 Inserting Animations Session 7 Grouping Objects Session 8 Inserting Speaker Notes Session 9 Reviewing Content Session 10 Preparing to Deliver a Presentation Session 11 Print a Presentation
Page 4 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
IT/ITES 306 Email Messaging (Advanced) Session 1 Modify message settings Session 2 Change the message fromat Session 3 Out of the office notification Session 4 Create a distribution list or A Contact Group Session 5 Insert a hyperlink Session 6 Sort and filter messages using multiple criteria Session 7 Manage junk email Session 8 Set workdays and time in a calendar Session 9 Display an additional time zone Session 10 Set availability options Session 11 Create calendar groups Session 12 Manage automatic meeting responses Session 13 Manually Modify a journal entry Session 14 Reply to a task request IT/ITES 307 Computer Networks Session 1 Introduction to Networking Session 2 The OSI Model Session 3 Terminologies and Technologies Session 4 Network Topologies & Access Methods Session 5 Network Hardware: Network Interface Card (NIC) Session 6 Network Hardware: Hub, Switch & Routers Session 7 Protocols Session 8 IP Address Session 9 IP Address Assignment Session 10 Transport Layer Protocols – TCP & UDP Session 11 Server Operating Systems Session 12 Networking Services: Dynamic Host Configuration Protocol Session 13 Networking Services: Name Resolution Session 14 Networking Services: NetBIOS, WINS & DSNS Session 15 Wireless Networking
Page 5 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Session 16 Wireless Security Session 17 Wide Area Networks Concepts Session 18 Networking Services: Proxy Servers & Address Translation Session 19 Network Security I Session 20 Network Security II Session 21 Troubleshooting Networks IT/ITES 308 Web Designing Part 1 Session 1 Introduction to Web Design & HTML Session 2 HTML Elements & Attributes The Basics Session 3 HTML Elements & Attributes Text Formatting Session 4 HTML Elements & Attributes – Lists & Links Session 5 HTML Elements & Attributes – Tables, Images & Multimedia Session 6 HTML Elements & Attributes – Forms and Frames Session 7 HTML Elements & Attributes – Metatags, Doctypes & Validation Session 8 Introduction to CSS Session 9 Overview of XML and XHTML Session 10 Forms Session 11 Introduction to CSS Session 12 Web Site Design Scripting Tools Session 13 Overview of DHTML, AJAX & JQuery Session 14 Introduction to VB Script Session 15 Overview of Apache and Web Server Session 16 Overview of ASP Session 17 Overview of PHP IT/ITES 308 Web Designing Part 2 Session 1 Introduction Session 2 Creating websites and webpages Session 3 Templates & importing webpages Session 4 Lists, formating text, use spell check and use find&replace Session 5 Tables and Cells
Page 6 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Session 6 Images Session 7 Hyperlinks I Session 8 Hyperlinks II Session 9 Audio & video Session 10 Frames, inline framesand layers Session 11 Hover effect, Meta Elements & Watermark Session 12 Forms Session 13 CSS Session 14 Behaviors Session 15 Compatibility Session 16 Code view, addins, snippets and page transitions Session 17 Dynamic web templates Session 18 SEO Search Engine Optimization Session 19 Forms – advanced Session 20 Publishing webpages or websites I Session 21 Publishing webpages or websites II Session 22 Authoring Tools Session 21 CSS Templates
Page 7 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
ACKNOWLEDGEMENTS The following partners were instrumental in providing the content: The Sector Coordinator of IT/ ITES “Mr. Deepak D. Shudhalwar” from Engineering and Technology Department of Pandit Sunderlal Sharma Central Institute of Vocational Education (PSSCIVE) along with the expert Dr. Prakash Khanale, Head of the Department of Computer Science, DSM, Parbhani has developed this Teacher's Handbook. The institute appreciate the work done by the team in a very short period of time. Accenture India’s Corporate Citizenship Program (Skills 4 Life). Accenture has provided the content material they have commissioned and developed as well as access to their implementing partners (Dr. Reddy’s Foundation and QUEST Alliance) for this material. Microsoft Free Digital Literacy Program eLearning package has been used to supplement the content. The Wadhwani Foundation team involved in designing and building the content include Ms. Darshika Sanghani, Ms. Sonia Kakkar, Mr. Karthik Chandru, Ms. Toral Veecumsee, Ms. Rekha Menon, Mr. Ajay Goel and Mr. Austin Thomas. In addition, various public domain sources have been leveraged to create materials and illustrations across module. The contributions of all these sources is gratefully acknowledged and recognized.
Page 8 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Preface The National Curriculum Framework, 2005, recommends that children’s life at school must be linked to their life outside the school. This principle makes a departure from the legacy of bookish learning which continues to shape our system and causes a gap between the school, home, community and the workplace. The Teacher's Handbook on NVEQF Level 2 in IT/ ITES sector is the qualification package developed for the implementation of National Vocational Education Qualification Framework (NVEQF), an initiative of Ministry of Human Resource Development (MHRD), Government of India to set common principles and guidelines for a nationally recognized qualification system covering Schools, Vocational Education and Training Institutions, Technical Education Institutions, Colleges and Universities. It is envisaged that the NVEQF will promote transparency of qualifications, crosssectoral learning, studentcentred learning and facilitate learner’s mobility between different qualifications, thus encouraging lifelong learning. This Teachers Handbook, which forms a part of vocational qualification package for teacher’s teaching the NVEQF in IT/ ITES sector in Level 2. The ITITeS Skill Development Council approved by the National Skill Development Corporation (NSDC) for the IT/ITeS Industry developed the National Occupation Standards (NOS). The National Occupation Standards are a set of competency standards and guidelines endorsed by the representatives of IT Industry for recognizing and assessing skills and knowledge needed to perform effectively in the workplace. The Pandit Sunderlal Sharma Central Institute of Vocational Education (PSSCIVE), a constituent of National Council of Educational Research and Training (NCERT) in association with Wadhwani Foundation has developed modular curricula and learning materials for the vocational qualification package in IT/ITES sector for NVEQ levels 1 to 4; Level 1 is equivalent to Class IX. Based on NOS, occupation related core competencies (knowledge, skills, and abilities) were identified for development of curricula and learning modules. This Teacher's Handbook attempts to discourage rote learning and to bring about necessary flexibility in offering of courses, necessary for breaking the sharp boundaries between different subject areas. The handbook attempts to enhance these endeavours by giving higher priority and space to opportunities for contemplation and wondering, discussion in small groups and activities requiring handsonexperience. We hope these measures will take us significantly further in the direction of a childcentred system of education outlined in the National Policy of Education (1986). The success of this effort depends on the steps that school Principals and Teachers will take to encourage children to reflect their own learning and to pursue imaginative and onthejob activities and questions. Participation of learners in skill development exercises and inculcation of values and creativity is possible if we involve children as participants in learning, and not as receiver of information. These aims imply considerable change in school routines and mode of functioning. Flexibility in the daily timetable would be a necessity to maintain the rigour in implementing the activities and the required number of teaching days will have to be increased for teaching and training.
Page 9 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
About this Handbook This handbook is to assist the teachers to teach the course NVEQF IT/ ITES Level 2. Teacher should work through this hand book in the classroom to guide the students. This handbook contains sessions which will help you to provide relevant knowledge and skills (soft and hard) on various aspects of the unit of competency. Each session is small enough to be easily tackled and digested by you before you move on to the next session. Animated pictures and photographs have been included to bring about visual appeal and to make the text lively and interactive for you. You can also try to create your own illustrations using your imagination or taking the help of your teacher. Let us now see what the sections in the sessions have for you. Section1: Introduction This section introduces you to the topic of the Unit. It also tells you what you will learn through the various sessions covered in the Unit. Section 2: Relevant Knowledge This section provides you with the relevant information on the topic (s) covered in the session. The knowledge developed through this section will enable you to perform certain activities. You should read through the information to develop an understanding on the various aspects of the topic before you complete the exercise(s). Section 3: Session Plan The session plan which contains the session topic, objectives of the session, materials & equipment requited and preparation to be done by the teacher for teaching a topic. In pedagogy part the Teaching and Training methodology is given which explains the process and how much Theory, Demonstration and Practical sessions need to be taken to achive the level of competence.
Page 10 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
IT/ITES 301: FUNCTIONAL ENGLISH (ADVANCED) SESSION 1: DRESS AND HYGIENE Clipped nails – It is easier to keep your nails clean when they are clipped. RELEVANT KNOWLEDGE Wellcombed hair – Smita likes keeping her hair clean and wellcombed. What do you think is Hygiene? As you all Ironed clothes – It doesn’t matter know, it is all about keeping yourself whether I wear the white shirt or the blue clean and healthy. Following a good one, as long as it is ironed well. hygiene may be necessary for many Deodorant – It is advisable to use a reasons; personal, social, health reasons, deodorant, especially during summer, to psychological or simply as a way of life. avoid body odor. Maintaining a good standard of hygiene Read aloud the “List of Products” given helps to prevent the development and below. Your facilitator will conduct an spread of infections, illnesses and bad activity based on this. Listen carefully odors. and follow the instructions of your Selfesteem, confidence and motivation facilitator. can all be altered by our body image List of Products: making it very important to follow good Cherry boot polish hygiene practices. The way you present Rexona deodorant yourself speaks volumes about you. Many Vaseline lip balm job interviews are highly dependent on Colgate toothpaste hygiene, as, often decisions are made by Cinthol soap first impressions formed within the first Sunsilk shampoo few minutes of a meeting. Hence chances Happy Nails nailcutter of succeeding either in work or social Gillette shaving cream settings can be influenced by your Brylcreem hairstyling gel maintenance of hygiene. Dettol hand wash What is your idea of a well dressed Lexus iron person? Jot down your ideas here: ______SESSION 2: PREPARING A DAILY ______AND WEEKLY WORK PLAN ______RELEVANT KNOWLEDGE There are some common terms used when talking about dress and hygiene. Some of What is a work plan? Why do you need them are introduced here. Read aloud the one? Have you ever thought along these following terms: lines? (A neat and tidy person) – Wellgroomed A work plan is a detailed list of the tasks He is always wellgroomed; I have never and activities that are going to be carried seen him looking dirty or shabby. out to fulfill a scope of work. Polished shoes – I only wear polished As a student, it is important for you to set leather shoes to the office.
Page 11 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query a target or goal and then plan how to in a day will take. achieve it. Workplanning is your ability Prepare a plan that helps us get through to list a collection of related subtasks the day, week, or month without running that need to be done, set specific outcome around in circles. goals to measure the success of each If you learn to tame the time ‘monster’, subtask, allocate sufficient time to carry you might be surprised at how much you out each subtask, evaluate actual work can get done. The real reward, however, performance, and make necessary is that you will probably feel a lot less adjustments in future workplanning as stressed and far more happy!” needed. As an example, read the Look at the given sample work plan following: drawn by Akaash Seth, a call center “School and homework. Activities and agent at “thisisIT.com”, for 5th October, chores. Sleeping and eating. So much to 2012. fit into a single day! Time Task Objective Anisha, 15, said, "I don't have much time 11:00 Check check for for friends. I wish I could talk to them on am. Complaint complaints that the computer and on the phone more". Files have been Rakesh, 14, feels like he never has solved, enough time to practice his football and check for hang out with friends. Instead, he's complaints that always studying and doing homework. are still unsolved Karan, 16, wants more time for cricket 2:30 Meeting with discuss feedback and Paramjeet, 13, wishes he had more pm. Team on performance, time to watch TV. Malika, 17, said, "I Manager, discuss career never have time to talk with my friends, Richa Gulati pathway write in my diary, or watch a movie!" 8:30 Complete number of calls And Arnav, 17, complained that he never pm. “Call” Reports received – 29 has enough time for himself because he's number of calls packed with homework, tuition, and dropped 6 preparing for his exams. 9:30 Submit percentage of Wouldn't it all be easier if time were like pm. reports on successful calls – a DVD that you could slowdown, day’s call 83% speedup, fastforward, or rewind? Or success rate percentage of have you wished that time was like a unsuccessful computer game, and when your time was calls – 17% up, you could just stop it and return to it whenever you pleased? This plan lists the time, task, and Well, unfortunately, we can't change the objective of work that Akaash Seth is speed of time or get more of it. What we planning to do on the 5th October, 2012. CAN do, however, is manage it. Simple work plans such as this one can be This means that we should: easily drawn up for daily or weekly goals, Consider everything we HAVE to do and as required for a situation. we WANT to do. You can keep the points given below in Understand how much time each activity
Page 12 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query mind when you plan your daily or weekly important and necessary tool that enables goals to work upon: communication and work. • Describe the key issues: Two • Governments around the world are questions need to be answered. introducing computer classes as one of 1. What needs to be done? the core subjects in the education 2. What needs to be done first? curriculum today, because they realize The answers depend on the level of that a computerskilled enabled significance and importance of each task / workforce is very important for the goal. countries’ economy. In addition, by the • Identify key strategies: How will use of a few buttons on the keyboard, you put your plan into action? List the computers have simplified many complex major steps that need to take place. tasks. Identify any difficulties you may come • From schools to workplaces, it has across and how they will be managed. claimed a central position because of its • Resources required: What many useful functions. resources do you require to put your plan • Computer has become very into action. important nowadays because it is very Do you require support from your accurate, fast and can accomplish many supervisor? tasks easily, as computers can do very big Do you require some additional software? calculations in just a fraction of a second. Do you require a faster computer? • Computers allow people with • Timelines: When do you start? disabilities to do normal activities; When do you have to finish? Are your shopping online, playing games with goals achievable in the given time? Have other people and work from home. you thought about the other tasks that • Computer knowledge is essential in may need your attention at the same our world today, as basic computer skills time? have become one of the main conditions Session 3: The Importance of for getting a job. Computers • The presence of Internet has revolutionized the way people RELEVANT KNOWLEDGE communicate and interact. Computers In this session, you will understand the make lives of people easier and more importance of computers in today’s world. comfortable: they give opportunities to Read aloud the points given below. millions of people to keep in touch, while • The extraordinary growth of being in different parts of the world. computers in the modern world has been • Business transactions, amazing. Computer is an electronic broadcasting of information and device used in almost every field even interpersonal (family and friendly) where it is most unexpected. That is why interactions have all been incorporated in the age of the computer is known as the the computerization process. “ITage!” • In the days before the computer, • In most offices around the world tasks were completed manually and today, the computer has become an required much more time than it does
Page 13 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query today. that were imparted. • Computers can store a huge Process: The review evaluations will be amount of data, far more than the human divided into four parts. One for each mind. session: • Today people work for employers • Hygiene and Dress. from other countries even without seeing • Preparing a daily and weekly work them. plan. • Computers today are irreplaceable • Importance of Computers. for business people and those who need • Identifying different kinds of them for work and for students to study. computers. • One of the most positive results Session 5: Computer Brands and from the usage of computers, is the Models impact it has had on deforestation; cutting down of trees, as the use of paper RELEVANT KNOWLEDGE in offices around the world has gone down vastly over the years. In this session, you will talk about your • Computers today are portable and preference for a particular computer no longer restrict their user to a desk. brand. Name some well known computer They come in various models and sizes; brands popular for the following from the superthin Laptop to a categories of computers: pocketsized Tablet PC. This makes it • Desktops easier for anyone to communicate and • Laptops work from anywhere! • Tablet PCs Session 4: Identifying Different Select a category and prepare to defend a Types of Computers brand of your choice. You can defend the brand from the point of view of: RELEVANT KNOWLEDGE • Affordability In this session, you will be recall different • Efficiency types of computers. How many can you • Brand reliability name? List them in your notebooks and • Other attractive features – like the describe each one of them in your own processor speed, storage (memory) space, words in a sentence. look, monitor screen resolution, DVD Review Session 1 drive, warranty, free software, etc. Listen carefully to your facilitator as RELEVANT KNOWLEDGE he/she guides you in forming appropriate The purpose of this session is to evaluate sentences. your knowledge and understanding of Read aloud the following terms related to Sessions 1, 2, 3 and 4. computer brands and models. Methodology: The review evaluations USP (Unique Selling Point) – A feature of will be Question ‘and’ Answer based. a product shown as the main reason why Answers will be assessed on Content, people should buy it. For example, the Context, Grammar, Sentence structure USP for Sony Vaio is it’s punch line “‘Go and Vocabulary based on the sessions Vivid”, as it explains that Vaio comes in
Page 14 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query different colors. unique selling points and make sure your Brand ambassador – A wellknown customer agrees that these are important person or celebrity who promotes and to them. advertises a particular brand For Note: Most people think features are example, Kareena Kapoor is the brand benefits but they are not. The customer ambassador for Sony Vaio Laptops likes the features because they provide Branded products – Popular products them with an advantage, and the belonging to established brands, such as, advantage then provides them with the Vaio, iPad, Windows7 and the benefits. microprocessor, belong to, Sony, Apple, Here are some examples of the features of Microsoft and Intel respectively. a product – mobile phone: Models – Most computer brands are • Some mobile phones have the available in various models, with ability to surf the web and run different features and prices. For Internetbased applications. Example, HCL has 22 different models of • Many mobile phones have builtin Laptops; HCL ME Laptop K4307 priced digital cameras, and can play music and at Rs 41, 610, HCL ME Laptop P3897 videos that are stored on the device in priced at Rs 29, 250, HCL ME Laptop addition to making phone calls. G3845 priced at Rs 25,130, etc. • Some of the latest mobile phones Session 6: Features, Advantages and have builtin physical keyboards while Benefits others use touch screen keyboards within the phone's screen or a traditional RELEVANT KNOWLEDGE numbered phone keypad. Look at the heading of this session. What • Some newer smart phones are also do these terms indicate to you? How do capable of streaming music and video these terms relate to a product? Jot down from the web. your thoughts. The features, advantages • Mobile phones with builtin and benefits of a product are referred to Bluetooth can be connected to handsfree as the FAB of the product. Read aloud the headsets and speakerphones, as well as details below: share data with your computer and other Features devices without having to connect the • A feature of a product is something phone to them using wires. which is hopefully unique in some way. • Some mobile phones offer only • A feature should differentiate one builtin memory, while others give users product from its competition (although the ability to expand the phone's memory many times features are similar between using memory cards. competitive products). Advantages • The important features of a • The advantage is a result of the product are its Unique Selling Points feature and is providing something good (USPs) that are not available with the for the customer. competitor's product. (For Example: The • The advantage is dependent upon “iPhone 4S” from Apple). Therefore, you the feature. need to identify your own product's • The advantage is not always
Page 15 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query apparent so sometimes it needs to be • The benefit is the real reason that explained. a customer will make the decision to • Always ensure the customer invest money and buy the product. understands the advantages to the Given below are some examples of features the product provides. benefits of the product mobile phone. Given below are some examples of • Stay connected anytime and advantages of the product mobile phone. anywhere: The most basic benefit of a cell • Mobile phones today enable many phone for which most of us use it is that company executives to work from across we can stay connected with our loved the world due to its computing ones in any part of the world and applications. anytime. Gone are the days when we used • Mobile phones today perform to stand in queues to make an STD or various functions, eliminating the need ISD calls. You can talk to your loved ones for carrying different standalone staying even seven seas far with cell gadgets. phones. • Mobile phones are now a • Mini PC: cell phones are nowadays customers’ music system, digital camera, almost equivalent to mini computers. The gaming device, computer, all rolled into latest ones are equipped with windows one! and internet facilities. So you don’t need • These mobile phones cater to the to wait for the newspaper! You can simply need of each and every class of people. access the internet on your cell phone and • The newest mobile phones ensure get to know about the latest news, your that customers get outstanding emails, movie shows and a lot more! multimedia capabilities and hightech • Enhance your business: cell phones digital cameras that enable customers to are a great help even at your business. capture a moment and turn it into a With cell phones, you can constantly stay memory. in touch with your employees and get to • Mobile phones with MP3 player, know about crucial information of your allow customers to play their favorite business. music tracks with superb sound quality • Wholesome entertainment: with a and share them with their friends via cell phone in your hand, you don’t need a powerful Bluetooth wireless technology. TV or PC to get entertained. It is all in • Mobile phones allow customers to your cell phone. You can play games, access the latest technology in the palm of listen to music, and click pictures and your hand. even record videos in your cell phone. Benefits • Transfer of data: these days cell • The benefits are the final results phones are equipped with infrared and caused by the advantages, which in turn bluetooth technologies which allow you to have been brought about by the features. transfer data like mails, pictures, music • Few people really understand what and even videos just in span of seconds. benefits are, and can successfully Knowledge of FAB helps to impart communicate them to the potential product information to the potential customer. customer. Sometimes customers may not
Page 16 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query be aware of the advantages and benefits • Address the customers’ needs i.e of the product, so it’s the responsibility of advise and help the customer locate a salesperson to bring it to their appropriate products. attention. After all, FAB is the real • Receive payments, orders and reason why customers choose one product makes invoices. over another. • Arrange display of goods in retail Given this information, you will follow stores. the instructions of your facilitator and • Coordinate stock inventory and complete an activity in class. order new stock Review Session 2 Listen carefully to the instructions and directions of the facilitator as he/she RELEVANT KNOWLEDGE guides you through a role play of a computer sales representative. The purpose of this session is to evaluate your knowledge and understanding of Sessions 5 and 6. Session 8: Complaint Handling Methodology: The review evaluations will be Question ‘n’ Answer and Role play RELEVANT KNOWLEDGE based. Answers will be assessed on Content, Context, Grammar, Sentence We all have complained about something structure and Vocabulary based on the or the other in our daily lives. Now, it is sessions that were imparted. important for you to understand: Process: The review evaluations will be • The nature of a complaint. divided into two parts, one for each • The importance of keeping a session: customer happy. • Computer Brands and Models. • The reasons why customers • Features, Advantages and complain. Benefits. • The result a complaint has on Session 7: Locating Products business. • The different ways of handling a RELEVANT KNOWLEDGE complaint. How do you define a complaint? The role of a sales representative is very “An expression of dissatisfaction by a diverse. Some of the activities of a sales customer whether justified or not” representative are: How does a happy customer affect • Assisting and encouraging business? A happy customer will… customers to select and purchase • Returns the next time products. • Use the other services that the • Describing the FAB and sometimes business (restaurant / hotel / shop / even do a demo of the product. organization, etc.) is promoting or selling • Answer all of the customer’s • Appreciate the staff and respects queries regarding specifications, them warranty, EMI options, maintenance etc. • Recommend the place to his family
Page 17 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query and friends Do you think it is a good idea for a • Thus, increase the profits of the business to actively seek (try to find out) place customers’ complaints? Support your Note: A study says that 95% of customers answer with reasons. stop going to a hotel, restaurant or store ______because somebody from the staff was rude ______to them. ______One of the most effective ways of ______handling a complaint is to: ______Kill the reason for the complaint. Don’t ______let the complaint arise in the first place. ______Read aloud the eight steps to solve a ______complaint: ______1. Provide customers your full and What do you think would happen if your undivided attention. favorite store/restaurant lost 95% of its 2. Listen completely. customers? Why do think customers 3. Ask the key question “what else?” complain? Can you list a few reasons? 4. Agree that an issue exists; never Some of the main reasons why customers disagree or argue. complain are… 5. Apologize; for any problem caused • Bad service; very unacceptable and 6. Assure that the complaint will be disappointing. looked into at once. • Unsatisfactory service; average 7. Reassure that the issue will be and ordinary solved at the earliest (Ask again “what • Delayed response in service; taking else?”). too much time, sometimes days. 8. Thank the customer for bringing • Issues not being handled seriously; the complaint to your attention. not given due importance. Go through the text given below • Not getting the promises promised; “Complaint Handling; Keeping insincere assurance. Customers Happy”. • Rude and disinterested staff. • Akhil is upset about the service at • How do you think complaints affect the store. He tells the store manager he’s businesses? never coming back. ______• Nilofer apologizes to the customer, ______for the faulty laptop he bought, and ______assures him that she will make sure the ______laptop is replaced and the whole issue A study says that One unhappy customer solved within 72 hours. not using the service of a business equals • Ranvir takes down a complaint to thirtyfive people (including friends, from Mr. Shorey, who is very family and social contacts) not using its disappointed about the below average service. service he’d received the last time he’d
Page 18 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query called. What would you do then? • Manisha is upset! She has been put B: Simple. Never ______or _____, as on hold, for more than 30mins, by the call “the customer is always right”! So, we center agent she was speaking to. She is _____ that an issue exists, and ______definitely going to raise a complaint about for any problem caused to them and then this to the agent’s superior. assure them that their complaint will be • Customers at the restaurant are looked into at once. always complaining to Tanya about A: Does that make the customers happy? Mahesh’s poor service. If this keeps B: Yes, it does. Especially when we happening, Tanya fears the restaurant ______them that their issue will be may face a big loss! solved at the earliest, and ______them for Listen carefully to the instructions of bringing the complaint to our attention. your facilitator and fill in the details A: Wow! This has really taught me a lot below: about how to handle customer “Ways of Handling Complaints”. complaints. Thanks! A: Does your place of work have a B: You’re welcome! complaint department? Session 9: Categorizing Computer B: No, it doesn’t. Issues A: Then who handles all of the customers’ complaints? RELEVANT KNOWLEDGE B: We do! A: What do you mean you do? Don’t you What is categorization? It implies that think it’s wise to have a separate objects or ideas are placed in categories or department for that? Did you know that groups, for a specific purpose. Generally, for every complaint a there is a relationship between items in registered, there are… a category. Categorization is fundamental B: ____ unregistered complaints. I know in language, decision making, and in all and I do agree that it is important to keep kinds of environmental interaction. In our customers ______; however, we don’t this session, you will be able to categorize have the budget that allows such a products and understand instructions department. So, even with the few of us, related to it. we manage to ______our customers with Study the following table and try to our ___ and undivided ______! match the two columns – issues with the A: I understand. So, what are the relevant category. different ways you handle complaints? Computer Issue Category B: First, like I said, we show all our Can’t Connect to the Operating customers that we care by giving each of Email System them individual attention, ______to All the files are Hardware everything they have to say, asking opening very slowly AntiVirus them whatever the issue is. Screen Freeze Software A: Sounds good, but what if the customer DVD doesn’t work Internet insists that there was a problem with the All the files are Memory / Disk service, even if you know there wasn’t. corrupted Space
Page 19 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
2. He did not face any issues while he Now imagine that you are guiding your was connected to the internet younger sibling to match the two Make your own sentences with the words columns. How would you instruct her to for categorizing issues. create the categories match? Now, read aloud the “List of Computer Write down the sentences that you form. Issues and Categories” given below. Note the set of instructions that you have created and underline the words that Computer Issues help make an ordinary statement into an Loss of memory instruction. No sound speaker Now, read aloud the following list “Words The keyboard is not working for Categorizing Issues”. You have also Screen freeze been given sample sentences using the Computer crashed words. Unable to open programs 1. Troubleshoot: Mend, Repair Can’t turn on the computer or nothing 2. You have to troubleshoot the issue happens with the hard disk Computer is running slow 3. The agent who troubleshot the CPU is not switching on problem with the DVD drive was very Too many Popups are making the helpful screen hang 4. Solve: Explain System shuts down whenever games 5. Solve these issues as soon as are played possible System takes a long time to startup 6. Customers are pleased when their Categories computer issues are solved Software: System, Programming and 7. Classify: Organize, sort Application 8. Classify the issues into various Hardware: Keyboard, Monitor, Printer, categories Optical disc drive (CD / DVD), Floppy 9. It is important to classify all disk, Memory card, USB flash drive, CPU computer related issues into categories (Central Processing Unit) and solve them on time Hard disk: Motherboard Network, Power Label: Mark, tag supply, Randomaccess memory (RAM), 1. All hardware products have been Sound card, Video card labeled under various categories Internet: Broadband; Dialup and 2. Label each computer with the Wireless, Modem customers’ names on it Listen carefully to the instructions given Divide: Separate by your facilitator and complete an 1. Divide the issues amongst them activity in class. 2. Computer related issues” has been divided into two subcategories – Hardware and Software Connect: Link, join Session 10: User Manual 1. The customer was not able to connect to the internet
Page 20 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
RELEVANT KNOWLEDGE • Some user manuals may be very lengthy and of many pages, while others When you purchase a product, you may only be a couple of pages long. generally find a small booklet along with • Most user manuals have images / it, guiding you how to effectively and pictures of the products and instructions optimally use the product. What is this to be followed. Pictures are better than booklet? Yes, it’s a user manual or a user text, especially in complex procedures guide. where users / customers need to have What is the purpose of this manual? visual confirmation that they're Would it make a difference if it was not performing the steps correctly. there? What kinds of products have user • The user manuals for heavyduty manuals? Is it very complicated and machines come with a page consisting of difficult to follow? safety measures that the users/customers Think about the answers to these should follow while using the product. questions and participate in your class Review Session 3 room discussion. The basic outline of a good user manual is RELEVANT KNOWLEDGE as follows: • User manuals or product manuals The purpose of this session is to evaluate are either big or small books with a set of your knowledge and understanding of instructions that are user/customer Sessions 7, 8, 9 and 10. friendly. Methodology: The review evaluations • The main purpose of a user manual will be Question ‘n’ Answer and Role play is to make the product and procedures based. Answers will be assessed on easier for the users/customers to Content, Context, Grammar, Sentence understand. structure and Vocabulary based on the • Before making a user manual, sessions that were imparted. companies do a lot of research to define Process: There will be one review who the user/customer is, how they will evaluation for each session: use the user manual and how much • Locating Products experience they have with the product. • Complaint Handling • Most user manuals have a • Categorizing Computer Issues reference page with a stepbystep • A User Manual. description of how to fix, repair and setup a product. Session 11: Cross Selling • User manuals usually also have a wordlist with their meanings. (For RELEVANT KNOWLEDGE example: a user manual about computers Cross selling is selling additional may have the term CPU mentioned in a products to an existing customer. For number of places. All that the user has to example, a customer is going to buy a do is turn to the wordlist and the computer from your company. You can meaning of the term can be found there. cross sell a DVD player or some CPU = Central Processing Unit.) educational or game CDs along with it.
Page 21 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Some common terms and phrases which shop for an electronic item is considered can be used while cross selling a product too tiresome for some. such as a computer or a mobile phone are: • The new internet age, has • “Would you also like to try revolutionized the way human beings out/buy…” interact with each other. Today, people • “We have a special offer for you…” want the company selling the product to • “Limited offer…” reach them via the internet or via a call. • “This ______will look good/work • Customers want the whole well with the______.” “customer sales / service experience” to • “This ______complements the reach them in their living rooms, without ______very well.” as much as moving an inch! Read the following examples: • Customer sales representatives • ‘Would you also like to try out this need to encourage all clarification queries Compaq wireless mouse? It will work well the customers may have, while the with the laptop.” customer sales representatives explain • “We have a special offer for you. the products’ features, advantages and Since you are buying the Compaq laptop, benefits. you can also buy this Compaq wireless • Customer sales representatives mouse at half the cost price.” should read up in depth about the • “This HP printer can be bought at product they’re marketing, and must be half the cost price with the laptop. It’s a confident enough to answer all the limited offer so you should avail it soon.” questions about the product. • The purpose of merchandizing Session 12: Merchandizing Via products via such technology is that it Technology shall meet the customer’s needs and wants, thus making the customers happy. • RELEVANT KNOWLEDGE Customer sales representatives What do you think is “Online and also know that marketing is all about Telemerchandising”. Read aloud the creating good relationships with the following points out loud. customers so that they can buy their company’s products. Definition: Online and • When merchandizing over the Telemerchandising is how a company telephone customer sales representatives markets its products/services via the need to remember to be tactful and telephone, or displays its products/ assure the customer that they can trust services on its’ website. the product is worth investing in. • Internet and the telephone is the • Customer sales representatives fastest growing business phenomenon on need to also be efficient, listen carefully, Earth. That is why companies are sound energetic, and be prompt in spending a fortune on calling software, responding, polite in speech, patient with customer service/sales representatives, elderly customers and pleasant in mood. website designing, categorizing product • software, advertisements, etc. Customer sales representatives who are helpful and have an organized • These days, going to the store to
Page 22 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query way of communicating, plus sounds promoted? natural (not scripted) and is eager to • Advertisement serve will mostly find their • Adding bonus features like gift merchandizing calls ending very, very items, two for the price of one, etc. For satisfactorily! e.g., “Buy a Desktop Computer and get a So, when merchandizing over the phone pair of speakers for free”, “Buy a with customers, all the customer sales ‘Resilience’ Data Card, and get a 25% representatives need to do is, remember discount on the first year’s bill”, the “Telephone”. “Fourpack Game Cds, 50 Rupees off”, etc. T Tactful, Trustworthy • Brand ambassadors. E.g., Kareena E – Efficient Kapoor for Sony Vaio, Abhishek L Listen carefully Bachchan for Idea Cellular, etc. E – Energetic Review Session 4 P – Prompt, Polite, Patient, Pleasant The purpose of this session is to evaluate H – Helpful your knowledge and understanding of O – Organized in thought Sessions 11, 12 and 13. N – Natural sounding Methodology: The review evaluations E Eager to serve. will be Question ‘n’ Answer and Role play In conclusion, whether serving or selling based. Answers will be assessed on customers, customer sales Content, Context, Grammar, Sentence representatives always need to remember structure and Vocabulary based on the to smile a lot and have some fun; good sessions that were imparted. marketing becomes “best” only when Process: There will be one review customer sales representatives are able to evaluation for each session: make customers feel that the whole • CrossSelling. interaction was pleasurable and fun. Only • Merchandising via Technology then will the results be great and • Product Promotion. amazing! Session 14: Closing a Deal Session 13: Product Promotion RELEVANT KNOWLEDGE RELEVANT KNOWLEDGE One of the roles a customer sales/service In this session, you will discuss the topic representative plays is to answer the of promotion of items. customer’s queries in order to close a deal. A customer sales/service Read aloud the following questions and representative must try his/her best to the points listed below each question. get the customer to buy an item. In order What do you mean when you say you are to close the deal, he/she needs to explain promoting a product? the features and offer benefits which • To encourage the sales of products make the deal very attractive. through advertisement, adding bonus Some of the questions a customer might features and or other publicity. ask are: • How products are usually 1. Will you deliver it to my place?
Page 23 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
2. Is an upgrade available? the product they want) 3. Can I take this car out for a test 3. Counting products (So they know drive? how many were originally on sale, how 4. Does this item have a warranty on many sold, and how many are unsold) it? 4. Updating stock count format 5. Can I get a discount on the price? (Improving on the way/plan of stock How would you answer the above taking) questions in the positive? Jot down your All computer manufacturing companies answers here: need to take a count of their stocks on a daily basis. Why? Think and jot down your answer. Session 16: Writing a Customer Service report Session 15: Stock Count RELEVANT KNOWLEDGE RELEVANT KNOWLEDGE What is a customer service report? As you know, not only selling items and A Customer Service report is a very closing deals but also counting inventory important aspect of running of successful may be a part of a sales representative's business. Customer sales/service daily job routine. representatives use customer service A stock count as the name suggests is the reports or call reports to record details of counting of inhand inventory. This is all the customers they receive, from very important from the business point of potential to existing customers. view. Losing track of inventory is a sure Call reports typically include what was recipe for disaster in a business. discussed with the customer, the outcome Moreover, you can lose a customer if of the conversation, and any other often, he/she searches for an item at your relevant information. These reports are store and does not get it due to then submitted to supervisors and are unavailability. The customer will used to keep a record of contacts with definitely switch loyalty to a better customers. They can also give supervisors stocked store! Hence, you need to know valuable feedback about an employee's which products are moving, which are not job performance. and also how much of each item is left in Look at the following chart (Customer hand. Service Report Chart): What tasks do you think are involved in a stock count? Daily stock count involves the following tasks: 1. Identifying location (The best place to showcase the product) 2. Arranging products (So that the products look attractive and the customers can easily identify and choose
Page 24 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
provided, and any followup calls or service that needs to be made or delivered. With this information in hand, now listen carefully to you facilitator and complete the exercises in the session. Review Session 5 The review evaluations will be Question and Answer and RolePlay based. Answers will be assessed on content, context, grammar, sentence structure and The Customer Service report has been vocabulary based on the sessions 14, 15 prepared showing the number of and 16. The review evaluation is divided customers, their addresses and contact into three parts. One for each session: numbers. The report also shows the • Closing a Deal. reason why the customers contacted the • company, their date of contact, the Stock Count. • discussion details, products sold, services Writing a “Customer Service requested, customers who need to be Report”. called back, customers who need service
Page 25 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
IT/ITES 302: DIGITAL LITERACY SESSION1: Digital literacy next few sessions.
SESSION 2: Copyright, Trademark & RELEVANT KNOWLEDGE Patent Intellectual Property Intellectual property (IP) is a legal concept RELEVANT KNOWLEDGE that refers to intangible property rights. Copyright Intangible property, describes something which a person or corporation can have Copyright is a legal concept, enacted by most ownership of and can transfer ownership to governments, granting the creator of an another person or corporation, but has no original work, exclusive rights to it, usually physical substance. for a limited time period. Copyright protection is available to both published and For example if you create an illustration for unpublished work. use in ebooks (digital form of textbook viewed on computing devices), it becomes an Copyright was initially conceived as a way for intellectual property. You can transfer the governments to restrict printing. But ownership of this illustration to a publisher nowadays, this concept helps promotes either for a fixed fee, through a royalty creation of new works by protecting authors, scheme or at no cost. giving them control of content and the right to make profits from it. Works such as Generally ownership lies with the owner, paintings, sculptures, books, photographs, protected through legal rights. By protecting software, audio & visual works, architectural the efforts, owners can have a safe social designs, etc. are protected by Copyright. environment where their work is protected Copyright can be made by either individuals and hard work is rewarded. or companies. Companies usually have a Intellectual property is a legal concept legal department with experts to deal with referring to creations of the mind for which Intellectual property such as the Copyright. exclusive rights are recognized. Under Exclusive rights intellectual property law, owners are granted certain exclusive rights to a variety of Exclusive rights mean that only the copyright intangible assets, such as: holder is entitled to exercise the rights (listed below) and others are prohibited from using • Musical, literary, and artistic works. the work without permission. Following are • Discoveries and inventions. some of the rights typically attached to the holder of the copyright: • Words, phrases, symbols, and designs. a) To produce copies or reproductions of Intellectual property rights also allow the work and to sell those copies protecting intellectual activity in industrial, (including, typically, electronic copies). scientific, literary & artistic fields. Different types of intellectual property rights that can b) To import or export the work. increase protection include copyright, c) To create derivative works (works that trademarks, patents, industrial design rights adapt the original work). and in some jurisdictions, trade secrets. d) To perform or display the work Note: You will learn about the different types publicly. of intellectual property rights in detail in the
Page 26 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
e) To sell or assign these rights to others. mean it’s copyrighted. Copyright jurisdictions For example, you might notice lots of websites that have © symbol indicating that Copyrights are said to be territorial, which the content, website hosted are copyrighted. means that they do not extend beyond the It reminds the visitors of the website to territory of a specific state unless that state is respect copyright. a party to an international agreement. For example rights for a content that is Obtaining copyright copyrighted in one country may or may not be Copyright registration is a legal formality applicable in another country. Today, intended to make a public record indicating however, this is less relevant since most the ownership and the rights of the owner. countries are parties to at least one such This can help owners file a case against agreement. infringements of their content. Copyright Copyright validity involves procedures as required by the law; refer to copyright bodies or seek help from Generally validity of a copyright is whole life copyright experts for proper procedure. of the creator plus fifty to a hundred years from the creator's death, or a finite period for Using copyrighted content anonymous or corporate creations. You can use copyrighted materials if you Things that cannot be copyrighted obtain permission from the owner; in most cases, you may have to get a written Several categories cannot be copyrighted such confirmation from the owner to avoid any as: legal issues. • Slogans, short phrases, familiar Note: If a copyright notice is not available, it symbols or logos, lettering, coloring. is recommended to contact the webmaster or • Ideas, procedures, methods, systems, owner to check if you require any special processes, concepts, principles, permission to use the material. Also it is the discoveries, or devices, as right of the owner to grant or deny distinguished from a description, permission, to part or complete material. If explanation, or illustration. the permission is granted, then the owner • Works consisting entirely of may charge a fee or provide the material free information that is common property of cost; however, the decision is left with the and contain no original authorship (for owner. In rare cases, if the copyright of the example: standard calendars, height material is expired and confirmed, then the and weight charts, tape measures and material maybe used without permission. rulers, and lists or tables taken from Copyright infringement public documents or other common Copyright infringement is the unauthorized sources) use of works under copyright, infringing the Copyright symbol copyright holder's "exclusive rights", such as Content or information that is copyrighted the right to reproduce, distribute, display or usually identified through the symbol ©; perform the copyrighted work, spread the information related to copyright or legal information contained within copyrighted terms is usually made available in product works, or to make derivative works. manuals, warranty cards, websites, etc. It often refers to copying "intellectual Use of copyright symbol © doesn’t necessarily property" without written permission from the copyright holder, which is typically a
Page 27 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query publisher or other business representing or or brand services) assigned by the work's creator. Copyright 3. ® (the letter "R" surrounded by a infringement is often associated with the circle, for a registered trademark) terms piracy and theft. Trademark can be registered if it is able to Examples of copyright infringement includes distinguish the goods or services of a party, (not limited to): will not confuse consumers about the • Downloading and using software relationship between one party and another, without paying for it (if it is paid and will not otherwise deceive consumers software), purchasing software and with respect to the qualities. redistributing it for free, etc. Like Copyright, Trademarks can be located resulting in software piracy. on a package, a label, a voucher or on the • Paying for single copy and using it on product itself. A trademark is typically a multiple computers (referred to as name, word, phrase, logo, symbol, design, Software Piracy). image, or a combination of these elements.Example of a trademark includes • Downloading paid MP3 (music or the logo for Wikipedia website (figure below): audio) or video from websites without paying any money. • Downloading and/or distributing movies from the Internet through direct downloads or torrents. • Using copyrighted logos without Wikipedia Logo permission. Patent • Downloading licensed software A patent is a form of intellectual property. It without paying for it. consists of a set of exclusive rights granted by • Downloading and/or distributing a sovereign state to an inventor or their movies without permission assignee for a limited period of time, in exchange for the public disclosure of the Trademark invention. A trademark is a recognizable sign, design or The procedure for granting patents, expression which identifies products or requirements placed on the patentee, and the services of a particular source from those of extent of the exclusive rights vary widely others. The trademark owner can be an across countries based on their national laws individual, business organization, or any and international agreements. Typically, legal entity. however, a patent application must include A trademark may be designated by the one or more claims that define the invention. following symbols: These claims must meet relevant patentability requirements, such as novelty 1. ™ (the "trademark symbol", which is and nonobviousness. The exclusive right the letters "TM", for an unregistered granted to a patentee in most countries is the trademark, a mark used to promote or right to prevent others from making, using, brand goods) selling, or distributing the patented invention 2. ℠ (which is the letters "SM" in without permission. superscript, for an unregistered Patent is done through Patent Offices that service mark, a mark used to promote
Page 28 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query are governmental or intergovernmental copied and reproduced without owner’s organizations which controls the issue of consent, it is referred to as content scraping. patents. Internet plagiarism is widely practiced in SESSION 3: Plagiarism academia and journalism. For example: • Students, professors or researchers RELEVANT KNOWLEDGE may copy content from the Internet that is considered academic Plagiarism dishonesty and may be punished through suspension or termination. Copying, reproducing or distributing information without the owner’s consent is • Reporters may copy recent news from referred to as plagiarism. Getting involved in other website for local paper or other such practices is considered unethical. publications and authors using content in text books without Copyright infringement refers to violations providing citation that is considered leading to legal consequences whereas unethical. Authors and reports may plagiarism refers to activity such as lose credibility with the organization reproducing another’s work as if it is one’s and may be terminated as a result. own original work. Plagiarism is considered an ethical offense and not as a crime. If you want to use the information available Understand ethics in the following context: on the Internet on your personal use or for You write an article for a competition and public distribution, you need to ensure that someone else copies your original work and you are authorized to copy or distribute the claims that she has created the work. information. In general, it is necessary to obtain permission from the author or the Given below are some examples of publisher before copying or distributing the plagiarism: information. 1. Downloading and using images or Following is a general guideline to avoid content from websites or other sources plagiarism: and claiming it to be your original work. • Use quotations when placing text in documents to indicate that this is 2. Modifying existing company logos on copy; use different fonts or colors for brochures, flyers, business cards, blogs quotations. or other distribution materials. • Include the source as a footnote either 3. Copying fulltext or image from below the quotation or at least at the websites and placing it in documents end of the document. without citations or quotations. • Paraphrase the entire text using your Internet Plagiarism own words; check with the original Internet is a major resource for searching, paraphrase for technical accuracy. researching, collecting and using information. • Indicate if it’s an improvement of This information available could be owned by accuracy and quote the original text. an author who may have published the information for free or for a fee through a Detecting Plagiarism publisher. Plagiarism is common due to widespread use When information such as text, tutorials, of computers today. It can be detected source code to applications, news, etc is manually or automated through
Page 29 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query computerassisted methodologies. your blog or printed material (Sample below). Though detecting plagiarism can be difficult, “This document is compiled from content some websites offer textbased plagiarism available in www.wikipedia.org.” detection services to detect online presence of “Compiled from copied content. Some of the online plagiarism http://en.wikipedia.org/wiki/Plagiarism” detection services include (not limited to): Citation is usually available at the end of a 1. Chimpsky (chimpsky.uwaterloo.ca) document or material referred to as a 2. Copyscape (www. Copyscape.com) “footnote”; however, citations need to be provided based on the terms and conditions 3. Plagium (www.plagium.com) as set by the owner. 4. PlagTracker (www. PlagTracker.com) For example, you might have noticed the following citation in this text book (end of first session): SESSION 4: Avoiding violations “Note: This document is compiled from a RELEVANT KNOWLEDGE variety of sources including Wikipedia, U.S. Copyright website, Copyright handbook from When you create content and/or publish, it Copyright office – Government of India becomes your intellectual property. As owner (http://copyright.gov.in/Documents/handbook. of the content, you have all rights to control html). “ how the information can be copied, This is an example to indicate where the key distributed or reproduced and also, who can points and content are sourced from to: one, use the information. Similarly to use encourage readers to visit respective websites intellectual property owned by others, you for any clarification and two, to comply with need proper permissions from the rightful legal requirements. owner. However in some cases, the owners might provide guidelines for using the Fair Use content without prior permissions enforced Fair use is a limitation and exception to the through certain licensing terms. exclusive right granted by copyright law to Certain authors, publishers or owners allow the author of a creative work. Fair Use refers copying, reproducing or distributing content to using copyrighted materials to a limited through certain legal conditions without the extent without obtaining permission. need for obtaining written permission. For Examples of fair use include news, reporting, example, you may be permitted to use the teaching, researching, library archiving, etc. content under certain methods & licensing For example, you can include screenshots of a types such as Citation, Fair Use, Public software product in a training document or a Domain, Creative Commons, etc. blog. However, it is recommended to check with the product vendor (in this scenario) or Citation the website for legal requirements. To know Citation is a reference to a published or more about Fair Use, visit unpublished source. Citation is used for http://en.wikipedia.org/wiki/Fair_Use. acknowledging or attributing the original work in order to avoid plagiarism. For Public Domain example, if you would like to quote few Works in the public domain are those whose sentences from a newspaper or book, you can intellectual property rights have expired, indicate the source of the content used in been forfeited, or are inapplicable. Basically,
Page 30 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query the public domain consists of works that are purposes. publicly available. For example: a public • No Derivative Works (ND), allowing domain that provides free images is only the original work, without www.openclipart.org. derivatives. Creative Commons These modules are combined to currently Creative Commons (CC) is a nonprofit form six major licenses of the Creative organization headquartered in Mountain Commons: View, California, United States devoted to • Attribution (CC BY) expanding the range of creative works available for others to build upon legally and • Attribution Share Alike (CC BYSA) to share. The organization has released • Attribution No Derivatives (CC several copyrightlicenses known as Creative BYND) Commons licenses free of charge to the • public. These licenses allow creators to Attribution NonCommercial (CC communicate which rights they reserve, and BYNC) which rights they waive for the benefit of • Attribution NonCommercial Share recipients or other creators. Alike (CC BYNCSA) A Creative Commons license is one of several • Attribution NonCommercial No public copyright licenses that allow the Derivatives (CC BYNCND) distribution of copyrighted works. A Creative For example, Wikipedia uses Creative Commons license is used when an author Commons AttributionShare Alike 3.0 license. wants to give people the right to share, use, You can learn more about Creative Commons and even build upon a work that they have at www.creativecommons.org. created. Creative Common licensing provides an author flexibility (for example, they might Best practices to avoid copyright violations choose to allow only noncommercial uses of Following are some of the guidelines to avoid their own work) and protects the people who copyright violation: use or redistribute an author's work, so they don’t have to worry about copyright 1. Always check the source for legal infringement, as long as they abide by the requirements; usually guidelines are found conditions the author has specified. in terms and conditions, terms of use, legal use, fair use, about us, press images, etc. There are several types of Creative Common sections of the website. If any of the pages licenses. The licenses differ by several or instructions are not available, mail the combinations that condition the terms of author (or webmaster) to confirm if you distribution. can use the content in your website or Creative Commons licenses consist of four material. major condition modules: 2. Never download or use illegitimate • Attribution (BY), requiring attribution (pirated) software; if possible try to to the original author. research and use open source software as • Share Alike (SA), allowing derivative an alternate instead. works under the same or a similar 3. Never share product keys or serial keys; license (later or jurisdiction version). never install paid software (for self or • NonCommercial (NC), requiring the others) unless you are sure of the work is not used for commercial transaction (receipt).
Page 31 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
4. Never attempt to browse websites that are communicating through Chat, Mail or restricted by the government. forums, extra care must be taken to avoid falling into traps. Never respond to chat, mail 5. If content is copied or reproduced under or electronic messages that are suspicious or Fair Use Policy, provide citation or credits fraudulent in nature; for example, you may to the author, source or publisher. receive a mail that could promise financial 6. When providing content or software, it is benefits without any efforts which in turn essential to provide copyright information. might be a scam. For example, you may include details such Several unethical & illegal things happen on as whether the enduser can reproduce / the Internet. Activities such as cheating, distribute / download the content/ software fraud, misappropriation, piracy, defamation, you have created / developed without your pornography, hacking, planting viruses, IPR permission, or, if they need to get in touch thefts, copyright violations, threats, etc. are with you for acquiring permissions for a committed through the Internet today. These fee, etc. activities are treated as cyber crimes and 7. If you are not clear about the licensing involving in such activities could lead to terms and conditions, get help from a severe punishments. licensing expert or contact the owner. Defamation In layman’s language, defamation means SESSION 5: Cyberlaws making false statement(s) about someone or something which results in spoiling the RELEVANT KNOWLEDGE reputation of the individual, business, product, group, etc. Cyber laws are legal regulations to control Defamation can be either, slander (verbal) or cyber crimes. Millions of users are dependent libel (written). Both slander and libel ways of on the Internet all over the world and crimes defamation are considered to be punishable are possible in the cyber space. offences; depending on the severity, the Cyber Crime punishment could be severe. In short, it is Cyber Crime or computer crime refers to any illegal and unethical to practice defamation crime that involves a computer and a and never should be encouraged. network. Cybercrimes are defined as: Cyber Laws "Offences that are committed against To maintain the Internet as a safe place for individuals or groups of individuals with a all, laws and regulations are required. Laws criminal motive to intentionally harm the & regulations that cover the Internet & the reputation of the victim or cause physical or World Wide Web are referred to as Cyber mental harm to the victim directly or laws. indirectly, using modern telecommunication networks such as Internet (Chat rooms, Cyber law or Internet law is a term that emails, notice boards and groups) and mobile summarizes the legal issues related to use of phones (SMS/MMS)". the Internet. It is less a distinct field of law than intellectual property or contract law, as Cybercrimes can also refer to unauthorized it is a domain covering many areas of law and access or modification to computer materials. regulation. It includes internet access and Activities such as spam, fraud (mail, chat, usage, privacy, freedom of expression, and etc.), threats, harassment, etc. are some of jurisdiction etc. To know about Cyber laws in the cybercrimes popular today. When India, Visit http://deity.gov.in/.
Page 32 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Page 33 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
IT/ITES 302: WORD PROCESSING (ADVANCED)
Session 1: Managing Lists – Sort, tab. These lists are by default, Renumber, Customize A List automatically indented from the page margin. To stop creating the list, click the RELEVANT KNOWLEDGE highlighted Bullets/Numbering icon again to turn it off or press Enter twice. To use a different bullet type (e.g. arrow instead Introduction and Recap of a dot) or a different numbering (a,b,c… While working with word processors instead of 1,2,3…), click on the earlier, you created bulleted and highlighted bullet or number button on numbered lists. As you may recall, you the menu and select a different style. If use numbered lists when you are working you want to use a bullet design other with instructions to be done in a sequence than the ones provided by default, you i.e. steps to be followed, and the numbers can click on Define New Bullet… or suggest an order. The same applies when Define New Number Format… and create you refer to specific items by number. If a design of your choice. ordering using numbers are not necessary, you can use bullets. Sorting a list Lists help to organize the contents of a If you want to arrange an existing list in document and summarize key points that a particular order (alphabetic or value, are easier to read and remember. For ascending or descending), you can do it example, if you would like to summarize using the sort function. To practice several paragraphs, you can summarize sorting a list, do the following: as points and display a list that is easier • Open a new word processing to understand. In some cases, you may document. need sublists under existing lists. For • Select the Numbering icon in the example, a planets list can have a sublist Paragraph group under the Home tab. of moons. Creating multiple level lists help you to organize the contents of your • Enter the names of you classmates on document effectively. a separate line. (Make sure to press Enter after every name). You have already created single level bulleted and numbered lists and are • When you have finished, select the aware that they can be created by entire list and click on the Sort button clicking on the Bullets/Numbering icon in in the Paragraph group. The Sort the Paragraph group under the Home Text dialog box appears.
Page 34 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
beginning of each list, do the following: • Place the cursor on the item where you want to restart the numbering, and rightclick. • Select Restart Numbering. This automatically resets it as another list instead of continuing from the previous list (Figure 1 right). • Alternatively, you can also make a list to continue from a previous list by selecting the option Continue Numbering. Sorting Text based on conditions • If you want to start the numbering • Select sort by Paragraph since the from a specific number, place the words are separated by the Enter key, cursor next to the number. Click the like paragraphs. You can also specify whether the items are text or date or Number dropdown menu and numbers and if it should be sorted in select Set Numbering Value. ascending or descending manner. Setting Value • Click OK. Notice the result! Your list Type the new value (starting number) in of classmates is now displayed in the Set Value To: and Click OK. Observe alphabetic order of their names. the change in the list. Renumbering a list Switching between bullets and numbers Occasionally, you may realize you do need to use numbers instead of bullets or vice versa. You can also change the numbers to bullets in a list. Switching between a bullet list to a Number list
Bullet is a symbol used for representing items in a list. Bullet symbols can have a variety of shapes, such as circular, When you create lists, the numbering square, diamond, arrow, etc. Bullets can may continue throughout the document. also include pictures. To use bullets for Sometimes when you want to create a an existing numbered list do the new list (figure above left) or when you following: want to continue an old list from before • Reselect the list of classmates you (which has been reset to 1) renumbering had sorted. is useful. To restart the numbering at the
Page 35 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
• Click on the bullets icon on the the next level. Each new list within a list toolbar and select desired bullet creates a new list level. Now, do the from the Bullets list by clicking on following: it. Notice the change as the 1. Open a new document in word numbers change into bullets. processor. Multilevel Lists Having worked with single level lists, 2. Click the (Multilevel list) icon now you will learn about the powerful available under Paragraph group in feature of multilevel lists. A multilevel the Home Tab. The following list has list within lists. The added dropdown appears: advantage is that you can mix numbers, letters and bullets in such a list. Look at the list below. System Software Operating System DOS Windows XP Windows Vista Compiler 3. Select the appropriate list style from Assembler the default List Library. Interpreter Once you select a list style, the starting Application Software number or bullet format is inserted in the Package document. DBMS • To create the sublevel list, press Enter and then the Tab key (or click Word Processors the Indent button on the toolbar Spreadsheets under Paragraph group). On doing so, Utility the next level is displayed. Antivirus • To return to the previous level in the list press Shift+Tab key (or click the Backup Software Decrease Indent button on the toolbar Disk Defragmenter under Paragraph group). How do you create such a multilevel list? 4) To practice, create the sample on To create such a list, you need to first System and Application software list understand the concept of list levels. A given above. single level list has all details at one Creating your own list style level. When you add another list under one item, you are creating a new list at • You can also design your own list style at each level independently. To design
Page 36 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
a list style, do the following: • Click the Multilevel List button to see the list library. • Click Define New Multilevel List… option. A dialog box for customizing the list appears. You can define the number/ bullet format for every level available in the list. After selecting the format and alignment, click OK to apply the changes to the document.
Customizing Level Styles • To convert this style into a template available in other documents, select the radio button New documents based on this template. • Click OK. . Session 2: Adding A Watermark New Multilevel List RELEVANT KNOWLEDGE If you create a list style, use it in many places in the document and may decide to A watermark is text or an image change the design later, it is advisable to embedded as a background of a create your own list style. Then when you document. Watermark is typically used modify this list style, it is automatically for indicating readers the ownership such updated all over the document. You can as copyright information, status of a create your own list styles by doing the document such as its confidentiality, etc. following: Watermark can be text or image such as company name, department, logo, Select the Define New List Style… option document status such as draft or available in the dropdown list. A dialog confidential, etc. box for customizing the list style appears. You can customize the style by selecting Create a watermark fonts, size, images, etc. To create a watermark, do the following: 1. Open a document in Word Processor. 2. Click on the Watermark option available in Page Background group under the Page Layout tab (shown below). A dropdown list of default watermarks available within the word processing software appears.
Page 37 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Watermark library by clicking on it. Notice the DO NOT COPY watermark is applied to the document across all pages!
Default Watermarks 3) Select DO NOT COPY 1 from the Watermark applied in a document 3) Click OK. Create a customized watermark You can customize the watermark by specifying the font, size and color or use a picture for watermark in the Printed Watermark dialog box. To create a customized watermark, do the following: 1) Select Custom Watermark… option available in the dropdown list. A Printed Watermark dialog box appears. You can customize the watermark here by Custom watermark applied in a selecting either a picture or some text. document. Notice the custom watermark is now applied to the document.
Session 3: Table Manipulations
RELEVANT KNOWLEDGE
You are familiar with using spreadsheet software for sorting and computing numeric values. You can also perform similar operations in using word Custom Watermark dialog box processing software. You have already 2) Select Text Watermark and type learnt how to create a table for tabular Watermark Demo under Text option. representation of data using spreadsheet
Page 38 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query software. 3. Select Name under Sort by drop down • Open a new document in the word list. processing software. 4. select Ascending to specify the sort • Create a table in the new document order. with the following data: 5. Click OK. Notice the data in Name column is sorted Name Sub1 Sub2 Sub3 Tot alphabetically. Radha 78 89 86 Similarly, if you would like to sort the table based on highest score in subject 1, Anita 87 91 88 do the following: Kashish 75 79 82 • Select the Sort option available under Ambikagiri 85 76 77 Data group in the Layout tab. Lakshmi 75 88 90 • Select Subject 1 under Sort by drop Aniruddha 95 78 65 down list. • Vidya 82 87 76 Select Descending to specify the sort order. Geeta 90 89 87 • Click OK Notice the list is sorted by top to bottom Sort data in a table score in Subject 1 Column. You can sort data available in a table Now sort by Subject 2 and Subject 3 when you want to visualize data in a columns using the procedure mentioned particular sequence. You can sort up to above. three levels in a table on individual Perform calculations in a table columns (not rows). To sort the table data in the Name column by alphabetical If you are using numbers in a table such order, do the following: as financial data or score, you can apply formulas for computations. This is similar 1. Select the Sort option available under to the calculations performed in a Data group in the Layout tab. A dialog spreadsheet. For example, to find the box appears (shown below). total score for the first student in the table, do the following: 1) Place the cursor in the last cell of the row and select the Formula option available under Data group in the Layout tab as shown below: A Formula dialog box appears (figure below)
2. Sort by condition dialog box
Page 39 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
spans at least two pages to complete this exercise. a) Place the cursor on the row that has headers (first row) b) Select Layout Tab, Select Repeat Header Rows under Data group. Formula dialog box Notice the header text is available on Before you enter the formulae, you Note: subsequent pages. need to understand the row and column numbering system in a table. Columns Working with cell layout represent letters and Rows represent If you want to modify an existing cell numbers (similar to that of a layout, you can use the Rows & Columns spreadsheet). Calculations are performed group in the Layout tab in the word based on cell references. First cell in the processing software. For example, if you table is A1 and the cell to the right is B1. want to: The cell below A1 is A2. • Add a row above, select Insert Above Since this is very similar to spreadsheets, option. you can apply the formulas learnt during • Add a row below, select Insert Below spreadsheet sessions. You need to enter option. the formula in a particular cell, similar to a spreadsheet, in order to calculate. • Add a column to the left, select Insert 2) Enter the formula =SUM(LEFT). This Left option. will calculate the total of all the values • Add a column to the right, select present in the left side of the cells. Insert Right option. Note the value in Total column. • To remove a cell, table, row or column, select appropriate option Note: Calculations done using a word under Delete dropdown menu. processor is suitable for simple calculations. For complex operations such as data filtering, validation, etc, it is advisable to use spreadsheet software. Repeat table headers across multiple pages Rows & Columns group If you have a lengthy table that spans • Sometimes, a header or a detail may across multiple pages, it will be easier to span several columns or rows. To refer if the headers are repeated on each combine two or more cells in the same page. Table headers are available only on row or column, into a single cell, select the first row of a table by default. To the cells that you would like to merge. include header on each page, do the Select Merge Cells option under Merge following: group in Layout tab. Note: You need to have a table that
Page 40 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Cell Size group To change the orientation of the text in the cell, select Layout tab and specify the Alignment type under Alignment group. Merge group • Similarly, to divide a cell, do the following: • Place the cursor in the cell that you would like to split. Alignment group • Select Split Cells option under Merge Apply designs to table group in Layout tab. You can apply designs to a table to make • Enter the value in Number of columns it look attractive. To apply design, do the and/or Number of rows text box in following: Split Cells dialog box. Click on the table. • Click OK. The Design tab is now available. Select it. Select a design available from Table Styles group. For example, click on Light shading – Accent 1 from the list. Notice the style Light shading – Accent 1 is applied to the table.
Split Cell dialog box To adjust the size of a cell, select Layout tab and specify the size under Cell Size group.
Table design applied to a table following: • To apply a different design, select • Click on the More icon in Table Styles other styles from the Table Styles group in Design Tab. group. • Select New Table Style…. A Create Customize a table design New Style From Formatting dialog box appears. You can also customize the style or create your table design. To do so, do the
Page 41 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Now create your table styles by choosing font, size, theme colors and borders; apply the custom design to the table created earlier. Session 4: Working With Styles
RELEVANT KNOWLEDGE Styles give your document a professional Create New Style From Formatting look and saves time. You have observed a dialog box. default style in your documents created using a word processor: • In Create New Style From Formatting dialog box, do the following: 1. Headings are in a font that contrasts with the text body. • Type a new in Name: text box, for example, MyTableStyle1. 2. Paragraphs are separated by white space. • Select Table Grid from the dropdown list under Style based on:. 3. Elements such as lists are indented. • Select Odd Banded Rows from Apply formatting to: dropdown menu 4. Emphasized text is usually in a contrasting color. • Select a fill color, for example Dark Blue, Text 2, Lighter 80% from Theme You have also learnt to apply different Color dropdown menu. formats using font size, style, bold, italics etc. As you know, this method of direct • Select Even Banded Rows from Apply formatting can be very tedious when formatting to: dropdown menu. updating a huge document. If you want to • Select a fill color, for example Olive change the look of the document, you green, Accent 3, Lighter 80% from must select each element separately and Theme Color dropdown menu. apply the new formatting choices. • Select Header Row from Apply On the other hand, by using styles to formatting to: dropdown. format your document, you can quickly and easily apply a set of formatting • Select a fill color, for example White, choices consistently throughout your Background 1, Darker 5% from Theme document. Color dropdown. A style is a set of formatting • Click OK. characteristics, such as font name, size, • To apply this custom design, select the color, paragraph alignment and spacing. more icon in Table Styles group. The Some styles even include borders and new style will be available under the shading. Custom section of the Table Styles list. For example, instead of taking three • To apply, click MyTableStyle1. separate steps to format your heading as
Page 42 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Cambria, 14 point, bold, you can get the formatting needs to be consistent. For same result in a single step by applying example, if one word in your paragraph is the builtin Heading 1 style (Styles group bold, every word in your new style will be under Home tab). For each heading just made bold. click on Heading 1 and the job is done! • Place the mouse pointer within the Accessing the Style task pane new paragraph. The Styles task pane is used extensively • In the Styles group, click the More when working with styles. Styles can be button . quickly set, applied, and modified by • Select Save Selection as a New using the task pane. To access the style Quick Style....The Create New task pane, Styles dialog box launcher Style from Formatting dialog box icon. The Styles task pane appears. The appears. keyboard shortcut for the same is Alt+Ctrl+Shift+S. • Enter the name for your style in the Name text box (Note: names Note: Change of style is either a change are case sensitive). of character style (the font, font size, color etc.) or a change of paragraph style • Click OK. This style will be (alignment, spacing, paragraphing, and accessible from the Styles group. indentation). Alternatively, using the Styles task pane, Creating your own style you can create styles before you use them. You can also import and export styles to You can create your own styles in two and from other documents and templates. ways: To create a style using the Styles task From existing text pane, do the following: • Using the Styles task pane. Select the Styles task pane and click the • To create a style from existing text, New Style icon . The Create New Style do the following: from Formatting dialog box appears. • Format a paragraph the way you want your style to be applied. Input the desired character or paragraph formatting, typeface, borders, shading, spacing, and alignment. Note: Paragraph styles include character formatting. Whatever formatting choices your sample paragraph has (for example left and right indents or a border), it will be part of your new style. Consider all of these components when creating your Create New Style From Formatting own style. Moreover, your character dialog box
Page 43 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
1. Type a name for the new style in the 2. Move your mouse pointer over the Name text box. (Note: names are case style you want to change, a drop down sensitive) arrow is visible. Click on the down 2. Select the Style type as Paragraph or arrow and select the option Modify…. Character to create a paragraph style The Modify Style dialog box appears. or character style respectively. 3. From the Style based on dropdown list, either select an existing style (to base the new style on) or select (no style) to create a completely new style. 4. In the Formatting section, make the adjustments as per your desired style. 5. Complete all details and click OK. Applying and modifying a style Now that you have created styles, to apply the same, do the following: Selecting the text you want to format. 1. Select the required style from the Styles group. Note that as your cursor moves over each style, a preview of Styles dialog box the style appears on the selected text. Make the desired changes and click On selecting a style, it is OK. automatically applied to the selected text. Delete styles 2. Now imagine that you have just You can delete a custom style created by finished creating an 80 page report you. When you do so, the word processor with several subheadings and your automatically applies the Normal style to boss is not happy with the font and all paragraphs / text formatted with the alignment. He wants you to change it deleted style. to left aligned, italics, bold, Arial point • Access the Styles task pane. 14. You have been smart enough to use a self created style for • Move your mouse pointer over the subheadings. So now, all you need to style you want to delete, a drop do is modify the style and it down arrow is visible. Click on the automatically updates subheadings all down arrow and select the option over the document! What a relief! But Delete…. A confirmation dialog how do you modify a style? box appears. To modify a style, do the following: • To delete the style, click YES; or to cancel without deleting the style, 1. Access the Styles pane. click NO. If you select yes, the
Page 44 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
style is deleted. menu under Themes group. Note: There may be situations (for example, when you work on text from another source) where you want to remove all formatting from a selected portion or the entire document. In such a case, select the text and then the option Clear All from the Styles task pane. Session 5: Working With Themes
RELEVANT KNOWLEDGE
Themes can help in creating professional Default Themes looking documents with coordinated sets Notice the default themes available in the of colors, fonts, effects and backgrounds. dropdown list. When you create a new document in word processing software, Office theme is • To apply a theme, select it from the applied by default by which a specific set dropdown list (for example, of colors, fonts, effects are applied to the concourse) and click on it. Notice document. However, you can customize the visual difference. the look and feel of a document by modifying theme settings or design your own theme. Using default themes. • Open a new document in word processing software and create a Customizing a theme document by using an existing template available within the word • You can customize the look and feel processor. by modifying the theme color, theme font and theme effects • To view list of themes, select Page available under Themes group Layout tab, click Themes dropdown (Image below).
Page 45 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Theme Colour Theme Font Theme Effects • To apply a theme color, click the look of the document by selecting a theme dropdown menu available under theme you like. You can also fine tune the color color and select by clicking on an item and font schemes to give your document available in the list. the desired professional looking design. • To apply a theme font, click the Quick Styles available under Styles group dropdown menu available under theme in Home Tab rely on the theme selection. font and select by clicking on an item Similarly, the fonts in Fonts dropdown available in the list. and styles in Style Set dropdown (under Change Styles dropdown in Styles group) • To apply a theme effects, click the are determined based on a theme dropdown menu available under theme selection. effects and select by clicking on an item available in the list. 1. Select File > New. Notice the changes in the document after 2. Select Equity Report under applying theme color, theme font and Installed Templates and Click theme effects. Create. Download themes 3. Now navigate to Page Layout Tab You can download and use themes in a 4. Select Median Theme from Themes document. To do so, dropdown list. 1. Select Page Layout tab. 5. Navigate to Home Tab, Click Change Styles Dropdown menu 2. Select Themes dropdown under Themes group and click Browse for Notice the list of Fonts tailored for this Themes. particular theme. Relation between Quick Styles and To summarize, when styles are used in a Themes document it interacts with the Quick Style Sets and themes to provide Having worked with styles, Quick Styles professional looking documents. and Themes, it is now important to grasp the relationship between them. On the Session 6: Playing With Pictures surface, it seems that both serve the same function, helping you to change color, RELEVANT KNOWLEDGE typefaces and style sets. However, the difference is that while themes define the You have already learnt to insert pictures overall look of your document, styles offer in a word processor document. You can different palette options that work with customize the pictures by resizing and the main design. using special effects available within the word processing software. Once you apply styles to your document, you can quickly change its look to suit Modifying pictures and their appearance your needs by selecting the Quick Style Open a new document in word processor set you want. You can further refine the and insert a picture into the document.
Page 46 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Click on the picture. You will notice the are boxes. A “Picture Tools” toolbar pops image has a black border around it and at up with an additional Format tab on the each corner and in the middle of each side menu bar (refer figure below).
Word processing software includes example, if the document that has support for limited photo formatting and pictures is intended to be sent over email, editing. However, if you want to use select EMail (96 ppi): minimize advanced functions consider using photo document size for sharing and Click Ok. editing software such as GIMP, Click Ok. Photoscape, Paint.NET, etc. Crop pictures Large pictures occupy more space in turn You can crop the picture to discard increasing the file size of the document. unwanted areas of a picture (sample In such cases, you can reduce the size of below). the picture or compress them to save hard disk space. Compressing pictures To compress a picture, do the following: • Select Format Tab. • Select Compress Pictures under To crop the picture, Adjust group. • Select Format tab. • Select Crop tool under Size group. Use the crop cursor to remove unwanted areas of the picture. Resize a picture You can resize a picture to show the • Click Options… A dialog box with complete but smaller version of it. settings for compression appears To resize, drag the boxes at the corner of the picture until the desired size is reached. Alternatively, you can specify the size in height & width by specifying numeric value in the height & width text box in Size group. Note: Dragging the boxes in the middle of each side will only change the height or You can specify the settings here. For width dimensions (depending on which
Page 47 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query side you choose). To keep the picture’s the following: height and width ratio in proper • Select Picture Effects dropdown in proportion, drag the boxes at the corner; Picture Styles group. both the height and width will simultaneously resize so that your picture • Bring your cursor on Reflection > stays perfectly proportioned. Also and select Tight Reflection, remember that the larger you resize your touching effect (example below). picture, the more pixilated (grainy and blurry) it gets. Improving clarity In some cases, the picture may lack clarity due to excess brightness or contrast. Now apply other reflection effects. a) To modify the brightness of the picture, Practice by applying Shadow, Glow, 3D Select Format Tab. Select Brightness & bevel effects to illustrations and dropdown and select the value observe the difference. (percentage). You can apply different shapes to b) To modify the contrast of the picture, pictures. To apply a cloud shape to a Select Format Tab. Select Contrast picture, do the following: dropdown and select the value 1. Select Picture Shape dropdown in (percentage). Picture Styles group. For much accurate adjustment, do the 2. Select Cloud from the dropdown following: list. • Select Brightness or Contrast dropdown. • Select Picture Correction Options.... • Move the slider next to brightness and contrast to preview Now apply different shapes and observe • Click Close once necessary the effects. modifications are made. Applying special effects Session7: Insert & Format At times, some illustrations look better Screenshots in A Document when polished using special effects. Word processing software includes picture RELEVANT KNOWLEDGE styles such as Shadow, Reflection, Glow, 3D & other effects for enhancing A screenshot is an image taken by the pictures. user to record what is displayed on the To apply reflection effect, you need to do monitor of the computer. Screenshots are
Page 48 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query used for demonstrating a program or a • Click Properties. Ensure the screen problem associated with a program. For is the active window. example, there are several screenshots • Press ALT + Print Screen on your included in this manual demonstrating keyboard. various options available within the word processing software. • Use CTRL+V to paste the screenshot in a document. You can take screenshots by using the Print Screen key and this option captures the entire screen that can be inserted as a picture in a document. To take a screenshot of the entire desktop, do the following: • Open a new word document. • Press Print Screen Key on your keyboard. • To paste the screenshot on the word document, press CTRL+V together on the document. Notice the entire screen is pasted into the document. Screenshot of Computer System Properties Notice only the active window is pasted in the document. You can further modify or crop the screenshot or apply effects to enhance the image using the word processing software. Session8: Create Text Boxes And Pull Quotes
RELEVANT KNOWLEDGE Screenshot of word processing software A text box is used for placing a block of In some cases, you may need to insert text in a document. Though a text box can portions of a screenshot instead of entire be placed anywhere in a document, it is screen, in that case you can use the ALT usually used for highlighting key points + Print Screen Key combination. that are indicated within quotes( i.e. “”). For example if you want to take the A “pull quote” is a quotation or excerpt screenshot of only the computer from an article highlighting or properties, do the following: summarizing a key topic. It is typically used in journalism and publishing. For • Rightclick My Computer.
Page 49 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query example, you might notice shorttext such 2. Select Simple Text Box from the as a proverb or advertisement quoted in Text box dropdown. (See sample italics in the middle of a document or an below). attention grabbing text message in a newspaper (Samples below).
Replace the default text with the following in italics and within quotes. “TEAM, T Together, E Everyone, A Achieves, M More – Chambless.” Resize the text box as required. Advertisement (left) and Attention grab in a Newspaper (right) To understand and work with pull quotes, do the following: 1. Create a new document 2. Type the following text displayed below: Notice the document containing text Teamwork annotated through a sample pull quote. Teamwork refers to efforts made by At times, the text box from builtin individuals in a team who work together gallery may not suit your purpose. In to achieve a common goal. such a case, you can draw a custom text box by doing the following: You can insert pull quotes using text boxes to annotate and make an article • Click Text Box dropdown available appear interesting by adding exciting under Text group in the Insert tab. facts. For example, you can use the text “TEAM, T Together, E Everyone, A Achieves, M More Chambless.” to annotate with the topic mentioned above. To insert a textbox, you can either use the builtin text box gallery or draw a text box that suits your needs. To use a text box from the builtin text box gallery 1. Click Text Box dropdown available under Text group in the Insert tab.
Page 50 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
box. Now you can use the text box to fill content such as text or image. Customize text box You can customize the appearance of the text box to make it look more attractive. To modify the text box, do the following: Select by doubleclicking on the text box. Apply a text box style from Text Box Styles group in Format tab. For example, select Dashed Outline Accent 3 from the Text Box Styles dropdown menu. • Click and drag to draw the text
a) Notice the Dashed Outline Accent You can add special effects to text such as 3 applied to the text box. Shadow, 3D Rotation, etc. to make text Now customize the text box further by visually attractive. applying different shape fills & shape To create a poster for Children’s day, use outlines available in Text Box Styles WordArt and do the following: group. • Open a new document You can also apply different shadow • Select WordArt option in Text effects from Shadow Effects dropdown in group under Insert tab. (figure below). Shadow Effects group. Session 9: Word Art And Other Special Effects
RELEVANT KNOWLEDGE
WordArt is a textstyling utility. It allows users to create stylized text with numerous "special effects" such as textures, outlines, etc and many other manipulations that are not available through the standard font formatting.
Page 51 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
• You can select from a variety of good visual diagram can help you easily styles from the WordArt dropdown list. explain the flow or the steps involved. For example, select WordArt Style 16 Word processing software have a feature from the dropdown list. A dialog box called SmartArt using which, it is appears similar to the one below. convenient and easy to create such diagrams. SmartArt categories There are 115 preset SmartArt graphics layout templates in categories such as list, process, cycle, and hierarchy. For example, if you would like to create a diagram to represent a process flow, you can use the Process SmartArt Style. • Replace the default text with SmartArt has seven categories. These are “Children’s Day”. 1. List – Use this style to present a • Click OK. You will see a result listing. similar to the one below. 2. Process – Use this style to show steps in a process. 3. Cycle Use this style to show steps in a continuous process. 4. Hierarchy Use this style to represent an organizational chart or You can customize the text further by decision tree diagrams. adding 3D effects. For example, select 5. Relationship Use this style to 3D Style 7 from 3D Effects dropdown represent relationships. menu in Shadow Effects group. (result 6. Matrix Use this style to display below). how parts relate to a whole. 7. Pyramid Use this style to display relationships with the largest component at the top or the bottom. Creating a SmartArt diagram To work with SmartArt, do the following: Practice by applying different WordArt 1. Open a new document in the Word styles. processor. Session10: Using SmartArt 2. To insert a SmartArt illustration, click on SmartArt option available under RELEVANT KNOWLEDGE Illustrations group in the Insert tab. A dialog box with a list of SmartArt styles SmartArt is a set of editable & formatted appears (shown below). diagrams in word processing software that are used to create organizational charts, process diagrams, relationship diagrams, etc. When you want to present a flow chart, a
Page 52 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Example of online shopping process flow Adding visual effects If you want to enhance the visual effects, you can choose from the SmartArt Styles available in Design tab. To apply a style, doubleclick the SmartArt
SmartArt dialog box To represent a online shopping process Select subtle effect from the SmartArt flow, do the following: Styles dropdown list. Notice the effect • Select Process (left pane). applied to the SmartArt (figure below). • SelectVertical Chevron List layout. • Click OK. When an instance of a SmartArt is inserted, a text pane appears next to it enabling the user to enter text that should appear in the SmartArt graphic. Each SmartArt graphic, based on its design, maps the text outline, onto the graphic. 1. Replace [Text] by following the text given below: If you want to modify the SmartArt by 1. Step 1: Visit www.flipkart.com adding colors, you can choose a color 2. Step 2: Select Products scheme from Change Colors dropdown in 3. Step 3: Compare Price & SmartArt Styles group. For example, features select ColorfulAccent colors from the 4. Step 4: Add to Shopping Cart Change Colors dropdown menu. Notice 5. Step 5: Make payment the color scheme applied to the SmartArt Notice the flow chart created looks (Figure below). similar to the one below.
Color Scheme applied to the SmartArt Modifying the SmartArt content
Page 53 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
If you want to add another step, you can across pages? use the Add Shape dropdown menu Editors use special procedures to control available in Create Graphic group under text that can span across multiple pages Design tab. through a feature builtin within the If you want to switch the layout, you can word processing software. use the Right to Left option in Create Text flow is a word processing feature Graphic group. that can help in controlling text flowing across multiple pages. To understand text flow and how it operates, do the following: 1. Open a new document 2. Insert couple of text boxes using Create Graphic group the Draw Text Box option to include Use the Promote & Demote option in roughly four to five lines of text content Create Graphic group to promote or (Height about 1 inches and width about 1 demote levels in a list (for example, inch, sample below) across two pages. replace step 3 with step 2 and vice versa). Now apply different styles available under SmartArt Styles group.
Session 11: Controlling Text Flow 3. By default, text boxes move along with the content within the document RELEVANT KNOWLEDGE making it difficult to work with. So, to make the text box fixed in a particular When you read newspapers or magazines, position, doubleclick the text box. you might have noticed text content span 4. By default, text boxes move along across different pages. When entering with the content within the document text there must be some way wherein the making it difficult to work with. So, to text flows from one text box to another on make the text box fixed in a particular a different page. position, doubleclick the text box. 5. Select Format tab. 6. Select More Layout Options… in Text Wrapping dropdown under Arrange group. A Advanced Layout window similar to the one below appears.
You might have noticed that the first five to six lines of a news item may be present on the main page and rest of the news content continue several pages away. Have you ever thought how do the editors control the content and its flow
Page 54 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
(c) Responsibility (d) A sense of humour (e) Honesty These are also abilities that can be practiced (but require the individual to genuinely like other people) such as: a) Empathy (sensitivity to others views/feelings) b) Teamwork c) Leadership d) Communication e) Good manners f) Negotiation 7. Uncheck Move object with text g) Sociability 8. Uncheck Move object with text h) Ability to teach. under Options. It's often said that qualifications and 9. Click OK. Now the text box is fixed expertise (often called “hard skills”) will in its position and will not move when get you through an interview but you text is added to the document. Repeat the need soft skills to get (and keep) the job. procedure for the second text box. Many people often refer to 'soft skills' as 10. You need to establish a link 'people skills' or 'emotional intelligence'. between the two text boxes for the text to Hard skills are the technical abilities flow between the two boxes. To establish required to do a job or perform a task: the link, do the following: essentially they are acquired through 11. Select the first text box. training and education programs. 12. Select Format tab. Some studies have shown that a person's 13. Select Create Link in Text ability to manage his or herself and relate group. Notice the shape of the cursor to other peoplematters twice as much as changes to a straight pitcher with a down intelligence or technical skills in job arrow on it. success. 14. Now place the pitcher cursor over Results of recent studies on the the second text box (Notice the straight importance of soft skills indicated that pitcher cursor now changed to tilted the single most important soft skill for a pitcher) and click. This will create the job candidate to possess was link between the first box and the second interpersonal skills, followed by written box. or verbal communication skills and the 15. Enter the following content in the ability to work under pressure. first text box: The work environment is constantly Importance of Soft Skills changing due to technology, Soft skills are often described by using customerdriven markets, an terms often associated with personality informationbased economy and traits, such as: globalization. These factors impact on the (a) Optimism structure of the workplace and lead to an (b) Common sense increased reliance on, and demand for,
Page 55 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query soft skills. Similarly, to remove the link between Soft skills are not a replacement for text boxes, do the following: hard/technicalskills. They are, in many (a) Select the text box instances, complementary, and serve to (b) Click Format tab unlock the potential for highly effective (c) Select Break Link option performance in people qualified with the available under Text group. requisite hard skill. Notice the text continues to fill in the second text box automatically. You can also link multiple text boxes using the above mentioned procedure.
Page 56 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
IT/ITES 304: SPREADSHEET (ADVANCED) Session 1: Insert and Modify Pictures (figure below). and ClipArt
RELEVANT KNOWLEDGE
You have learned to work with pictures and clipart in earlier sessions using word processing software. You can insert pictures and clipart in spreadsheet software as well. Spreadsheet software includes a variety of clip arts. You can use these in spreadsheets. Searching and inserting a Clip Art If you want to insert a clip art in a billing Clip Art search dialog box statement, do the following: 1. To search for a clip art use relevant 1. Click File > New. Under New keywords in the search box. So, to display Workbook dialog box, select Installed clip arts related to billing, type billing in Templates. the Search for: text box and click Go. 2. Select Billing Statement template Notice clip arts tagged as billing in the from Installed Templates and click search results (figure below). Create. A window similar to the one below appears.
Billing statement template Notice the template does not have any logo or pictures. To insert a clip art, do the following: 1. Select Clip Art under Illustrations Search results dialog box group in the Insert tab. Note: Spreadsheet software will display the Clip Art Organizer dialog box to include search results of clip arts from online web site (if not prompted before). The Clip Art search dialog box appears
Page 57 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
This option requires an active Internet connection as the spreadsheet software needs to fetch relevant clip arts from the online website based on the keywords specified in the search text box. Preview and insert a Clip Art To preview the clip art before inserting into the spreadsheet, do the following: • Click on the dropdown arrow next to the clip art (figure below, left) and click Billing statement spreadsheet with preview/ properties. A Preview/ clipart. Properties dialog box along with selected Insert a picture clip art appears with technical & keyword You can also insert pictures or photos in a details such as file format, image vertical spreadsheet. For example, you can insert & horizontal size, file size, assigned a logo in an invoice, locations of sites in a keywords, etc.(figure below, right). travel quotation, etc. To insert a picture do the following: 1. Open a new workbook in spreadsheet. Click on the Insert tab on the Ribbon. 2. Click on the option Picture in the Illustrations group (figure below).
3. The Insert Picture dialog box appears (figure below). Browse the location of the picture, select the picture and click Insert.
• To insert, doubleclick on the clip art. Notice the clip art is added to the spreadsheet (figure below).
Page 58 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Note: Spreadsheet software inserts the clip art or the picture with its actual size. The Clip Art may be too large, thus, hiding the essential details in the spreadsheet. Hence, it is advisable to To practice what you have just learnt, resize the clipart or the picture. insert different clip arts & pictures in the To resize the picture/clip art, do the same worksheet. Apply different Picture following: Effects, Picture Shapes & Picture Borders 1. Drag the corners of the clip art or and observe the change. rightclick the picture. 2. Select Size and Properties option and specify the desired width & height of the picture just as you do in a word processor. Applying Effects You can apply special effects such as Shadow, Reflection, Glow, 3D effects, etc. to enhance the appearance of a clipart or picture. Adding special effects can make the spreadsheet look attractive. For example to apply 3D effect, do the following: 1. Doubleclick on the clip art or picture. 2. Select Picture Effects dropdown in Picture Styles group under Format Tab. 3. Point to 3D Rotation. 4. Select Isometric Right Up from the list. Notice the Isometric Right Up style is applied to the picture.
Page 59 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
available under the Illustrations group under the Insert tab. To insert a shape, do the following: 1. Open a new workbook and enter the following data:
2. You will insert visual call outs to illustrate the reason for high volume of sales. To do so, select Insert tab.
3. Under Shapes dropdown menu in Illustrations group, select Rectangular Picture Shapes, Picture Borders & Callout. Click and drag until the shape is Picture Effects dropdown menus. complete. 4. Add the requisite text within the Session 2: Draw and Modify Shapes Rectangular Callout (sample figure below). RELEVANT KNOWLEDGE
You have learnt to work with shapes in earlier sessions using word processing software. You can use shapes in spreadsheets to annotate or insert a comment to compliment the data or the data analysis. Inserting a shape Notice the attention grabbing text in the You can shapes such as lines, basic rectangular callout representing the geometric shapes, arrows, equation reason for high sales figure in the table. shapes, flowchart shapes, stars, banners, and callouts using the Shape option Modifying a shape
Page 60 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
You can modify the callout to enhance the visual appearance by applying different You have already learnt about SmartArt styles . To modify the callout you had and using it in Word processing software. created, do the following: You can use Smart Art in spreadsheet 1. Doubleclick on the callout. software to illustrate a timeline or a 2. Select Subtle effect – Accent 3 workflow process. visual style from Shape Styles dropdown You can illustrate a sequence of actions or menu. Notice the visual effect applied to events such as different phases of a the callout (figure below). project or process by using SmartArt in spreadsheet software. Workflow consists of a sequence of actions where each step has a precedent before the next action or step can begin. You can basic workflow process using SmartArt. Workflow process can vary from simple to complex structures. It is widely used in almost every business today, ranging from manufacturing, production to research & development, etc. You can apply fancy effects such as For example, a simple workflow process reflection, shadow, glow, etc. to make this for recruitment includes: callout look much more attractive. • Post job description and required 1. To apply glow effect, point to Glow qualification. from Shape Effects dropdown menu in • Collect resumes. Shape Styles group. • Match skill sets. 2. Select Accent Color 1, 8 pt glow • Conduct preliminary assessments. from the list and apply. Notice the Glow • Shortlist potential candidates. effect applied to the callout (figure • Conduct facetoface interviews. below). • Finalize candidates. • Provide employment offer. • Complete hiring formalities. To create the illustration for this workflow process, do the following: 1. Select Insert tab. 2. Select SmartArt in Illustrations group. A window similar to the one below appears.
Session 3: Illustrate Workflow Using SmartArt Graphics
RELEVANT KNOWLEDGE
Page 61 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Modify a SmartArt To enhance visual appearance of the SmartArt, you can use the Design tab to customize the color, style and layouts. To apply a style, do the following: 1. Select Design tab 2. Select Moderate Effect available in SmartArt Styles group and apply. Notice 1. Notice, the recruitment process the visual effect changed (figure below). defined here is a continuous process. To illustrate a continuous process, you can use the Cycle SmartArt graphic. Select Cycle from the list (left) 2. Select Basic Style and click OK. A SmartArt graphic similar to the one below is displayed. Use the following table as a reference when illustrating workflow process: • Use List, if you want to illustrate a listing that do not follow a stepbystep process. • Use Process, if you want to 3. You need to add text to illustrate illustrate a one way process. the workflow process. To modify the • Use Cycle, if you want to illustrate default text, enter the following under a continuous process. Type your text here section: • Use Hierarchy, if you want to • Post Job Description & required illustrate tree structure such as an qualification organizational chart. • Collect Resumes • Use Relationship, if you want to • Match Skill sets illustrate connections between sets. • Conduct Preliminary Assessments • Use Matrix, if you want to • Shortlist Potential Candidates illustrate how parts relate to a whole. • Conduct Facetoface interviews • Use Pyramid, if you want to • Finalize candidates illustrate a top to bottom proportional • Provide employment offer relationship. • Complete hiring formalities The recruitment workflow (illustrated below), now displayed as a continuous process, is easier to comprehend.
Page 62 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Session 4: Layer and Group Graphic computer clip art. Objects Viewing and moving between layers To view layers, do the following: RELEVANT KNOWLEDGE • Select the Page Layout tab. • Select Selection Pane in Arrange You have already learnt to group group. graphical objects in word processing and presentation software. You can also group graphical objects in spreadsheet software. Grouping can help when you want to simultaneously move, rotate or resize On doing so, the Selection and Visibility multiple objects in a workbook. You can dialog box appears (figure below). group objects such as pictures, clip art, shapes and text box. Once grouped, they appear as a single object. Layers When working with graphical objects such as pictures, clip arts, shapes, etc., each object is layered on top of each other. For example if you insert a picture over data, the picture overlaps hiding the data and likewise if you draw a shape over a • Select the layer from the list to picture, the shape overlaps hiding the highlight. picture. You can rearrange layers • To move a layer up or down, you according to your requirement after inserting several pictures, clip arts or can use the up arrow or down arrow shapes. buttons in the Selection and To understand working with layers, open Visibility dialog box. a workbook using spreadsheet software For example, to bring the computer clip and add few graphical objects to the art to the front as the topmost layer, workbook (sample figure below). select it and then click the up arrow button until it is visible as the topmost layer. With every click, you will notice a movement of the object selected. The Selection and Visibility dialog box helps you easily arrange objects in different layers. Grouping Objects Sometimes, you work on a spreadsheet that has multiple graphical objects, each Notice the graphical objects overlap each object being placed with great care at a other. In this example, a star overlaps a relational distance from each other. To square box, which in turn overlaps the move them all to another position would
Page 63 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query mean spending effort in positioning them and then select Ungroup available in the once again. So what’s the solution? Group dropdown menu. Grouping can help in organizing a group of objects to act like one single object Session 5: Goal seek making them easier to move in a worksheet. RELEVANT KNOWLEDGE To understand how to group objects, do the following: Goal Seek is a special and very useful • Open a worksheet and insert feature of spreadsheet software. This different graphical objects (sample figure feature allows you to alter the data used below). in a formula in order to find out what the modified results will be. Basically, goal seeking is the ability to calculate backwards to obtain an input that would result in a given output. This is also referred to as the whatif analysis or as back solving. For example, if you want sell a book worth Rs.500 with a sales target of Rs. 30,000 but are unsure of how many books • Select all the objects that you want you need to purchase and sell, you can to group. To select multiple objects, press use the goal seeking method to create a the Ctrl key and select the objects. forecast. This function helps you to see how one element of data in a formula affects another. To learn about this feature of spreadsheets, you will first create a scenario with the example discussed above and then create a forecast using goal seek. Do the following: • Open a new worksheet and enter the following details in respective rows and columns. Multiple objects selected for grouping • Select the Group option available under Arrange group in the Format tab. • Click on Group, to group all the selected graphical objects in the workbook. • Try moving or resizing the object; notice all the objects grouped move as if it To compute the total amount, calculate is it is a single object. the product of the price per book and the Similarly, to ungroup, select the object number of books to be sold. Enter the
Page 64 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query formula in B3 as =B1*B2. Since we do not know the number of copies to sell to reach the target revenue, keep the value as zero in B3. Note: The Step & Pause buttons in the Now, use Goal Seek function to find out Goal Seek Status dialog box will be active how many copies are needed to achieve when spreadsheet software is unable to the target revenue. find a solution. • To use goal seek, click Goal Seek If you would like to set different targets from WhatifAnalysis dropdown menu or goals, click Undo (CTRL+Z) and try available under Data Tools group in Data with different target values using the tab. A Goal Seek dialog box appears. procedure outlined in this session. This feature can be very useful in loan or investment calculation. Another scenario where this feature can be used is to answer the “whatif” questions people ask after elections (for example, how many Now enter the following values: votes would have been needed to win, • Specify the cell reference as B3 in etc.). the Set Cell text box. • Specify the cell reference as B2 in Session 6: Analyze Data with Logical the By Changing Cell text and Lookup Functions box;spreadsheet software will change the goal value until it completes matching the RELEVANT KNOWLEDGE target income. • Select the To Value text box and When you need to perform complex enter the goal, 30000. calculations and data analysis, you can • Click Ok. use the powerful functions of a Notice the Goal Seek Status dialog box spreadsheet Lookup function and that displays the progress for computing Logical function. the value necessary to reach the goal For example, if you have a large database value. Notice that No. of books to Sell is of customers and you want to find out automatically populated with a target customers by location, town, etc. you can value of 60 to meet the income of Rs. use a combination of logical and lookup 30000.00. functions for your data analysis. Lookup functions are used to return a value from a single column or from an array. For example, if in one sheet of a spreadsheet, you have a parts list in a table containing thousands of part numbers and their description and other details (supplier, price etc.). On a separate sheet in the spreadsheet, you
have the Invoice with columns for Part
Page 65 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
Number, Description, Quantity Sold, Price, and Total. Now, when you enter the part number in the Part Number column of the Invoice sheet, the VLOOKUP function can be used to automatically search for and get the related details of the input part number 2. Type the following in cell B2 & B3 (description, price, etc). =AND (5 Logical function employs operators for returning TRUE or FALSE values. Logical Operators compare two values • Type the following in cell A6 = OR and return the result as either a TRUE or (A1>50, A2>60, A3>100) and press Enter. FALSE. • The OR function will display TRUE Operators include =, <, >, <=, >=, and <>. if any of the values present in A2, A3 or Logical functions include AND, TRUE, A4 satisfies the rule mentioned in the FALSE, IF, NOT, OR and IFERROR. formula. AND Function • Notice the result. The AND function returns TRUE if all IF Function the argument results are true and The IF function is used where logical returns FALSE if one or more argument decisions are needed in a calculation. To results are false. To understand AND understand the IF function. function • Enter the following data: 1. Open a new worksheet and enter the following data: Page 66 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query NOT (A1="I like to learn more") and press Enter. You see the result as given below: • Type the following in cell C2 = IF (A2>B2,"Insufficient Funds") and press • Enter. Now enter “I like to learn more” in cell A1 and press Enter. Notice the • Wherever the value in Expense changed value. column is greater than the value in Income column, the IF Function displays TRUE() and FALSE() Functions a comment “Insufficient funds” in the The TRUE() function returns the logical Comment column. value TRUE in its cell. Similarly, • Now change the value in the FALSE() always evaluates to logical value Expense column making it less than the FALSE. These functions are used with value in the Income column and notice other functions. the Comment changing to “FALSE” as the TRUE() or FALSE() can be used for given condition is no longer met. testing purposes to force a certain value to be returned. For example, consider the IFERROR Function IF statement: The IFERROR function returns either the • IF specified result if the formula is right or a (logic_test;true_value;false_value). user specified error message if formula • leads to an error. To understand If logic_test evaluates to TRUE, IFERROR function true_value is returned, otherwise false_value is returned. • Enter the following data: Lookup Functions Lookup functions return values by looking up a table. Most popular lookup functions include the VLOOKUP and HLOOKUP. These functions are available • Type the following in cells D2, D3 under Lookup & Reference dropdown in & D4 = IFERROR(B2/C2, "Error in Function Library group under Formulas calculation") and press Enter. tab. • The IFERROR function displays Note: VLOOKUP needs data to be sorted either the result if the formula and the in ascending order; sort the data before values are right or “Error in calculation” attempting to use the function in a if the value cannot be computed. spreadsheet. NOT Function VLOOKUP looks for data vertically (top The NOT function returns reversed to bottom) until it locates a value that logical value i.e. if it is used for a TRUE matches your query. HLOOKUP looks for expression, FALSE is returned, but, if it data horizontally (left to right) until it is used for FALSE expression, TRUE is locates a value that matches your query. returned. To understand the NOT Lookup functions are used when you have function. a huge amount of data to analyze and • Enter the following in cell A2 = Page 67 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query take decisions. To understand the not available, then the next largest value VLOOKUP function, you will work on an is returned. exercise that is based on the assumption • If FALSE, only an exact match is that the spreadsheet has a lot of data and returned. If the exact match is not that you need to find out the department available, then the error value #N/A is of a person by specifying the Employee returned. ID. Do the following: To understand HLOOKUP, you will work • Enter the following data: on an exercise where it is assumed that the records or data are available horizontally (figure above) and that you need to find out the Department of a person using the Employee ID. Do the following: • Type the following formula in cell • Enter the following data: E3 (or any other empty cell) = VLOOKUP(A3,A1:C4,3,0) and press Enter. The output will be as given below: • Type the following formula in cell D5 (or any other empty cell): =HLOOKUP(10203, A1:D3, 3,0) and press Enter. The output will be as given The syntax of VLOOKUP is: below: =VLOOKUP(lookup_value,table_array,col _index_num,[range_lookup]) • Lookup_Value is the value you want to search for in the first column of the table_array. In this case, it is the Employee ID (A3). • Table_Array is the data range to be The syntax of HLOOKUP is: searched. In this case, it is A1:C4. =HLOOKUP(lookup_value,table_array,ro • Col_Index_num is the number of w_index_num,[range_lookup]) • the column in the table_array that Lookup_Value is the value you are contains the data you want returned. In searching for in the first column of the this case, it is the third (3) column that table_array. In this case, it is the refers to department. Employee ID (D3). • • Range_lookup is the logical value Table_Array is the data range to be that returns either TRUE or FALSE. searched. In this case, it is A1:C4. This value indicates if VLOOKUP should • Row_Index_num is the row return an exact value or an approximate referenced for returning respective value. value. In this case, it is the third (3) row that • If TRUE, an exact or approximate refers to department. match is returned. If the exact match is • Range_lookup is the logical value Page 68 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query that returns TRUE or FALSE; this value indicate if HLOOKUP should return an exact value or an approximate value. • If TRUE, an exact or approximate match is returned. If the exact match is not available, then the next largest value is returned. • If HLOOKUP value is smaller than Weekly timetable sample using shapes the smallest value, the error value #N/A and table formatting is returned. • Select Page Layout tab In this session, you have learnt about the • Select Paper theme from Themes fundamentals of logical & lookup dropdown (sample below) and observe the functions. You can perform complex changes. Select different themes until you analysis by combining the functions with find a theme that fits your need. different arguments. You can also use data from different columns, rows, worksheets or spreadsheets for data analysis. Refer to the spreadsheet help file for more syntax, constraints and examples to learn more about logical & Weekly timetable sample after applying lookup functions in detail. Paper Theme. You can customize the look Session 7: manage themes and feel of a workbook by modifying the Theme Color, Theme Font and Theme RELEVANT KNOWLEDGE Effects available under Themes group Themes are used to format a spreadsheet (figure below). and make it look attractive. For example, you can create attractive scorecards, business reports or invoices to customers (email or color print) by using themes. You can apply themes to existing documents, documents created from templates or a even a blank document. To apply themes to a new spreadsheet, do the following: Colors, Fonts & Effects dropdown menu • Create a new spreadsheet for For practice, change the theme color to managing your weekly timetable similar Oriel and observe the change. to the one below (Include fields for days, number of periods(classes) per day and a shape to indicate the heading). Oriel Color applied Now change the theme font to Technic and observe the difference. Page 69 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Technic Font applied Change the theme effect to Equity and observe the change. Save Current Theme dialog box To apply this theme to another Equity Effect applied spreadsheet, do the following: Note: There might be minor alternations 1. Open the spreadsheet made when applying Fonts or Effects. 2. Select Page Layout tab Pay close attention to the changes. 3. Select Themes dropdown menu in Saving a Theme and using it later Themes group (figure below) You can save themes for future use once 4. Notice the theme saved earlier is it is customized. To save a theme, do the now available in the list. You can apply following: the theme by clicking on it. • Select Page Layout Tab • Select Save Current Theme… in Themes dropdown menu (figure below) Custom Themes in Themes dropdown Downloading Themes You can download and use themes in a workbook. Use search engine such as Google to find download themes from different websites. To apply the theme downloaded earlier, do the following: 1. Select Page Layout tab. Saving themes 2. Select Themes dropdown under • Type a name for this theme, for Themes group. example: MyTheme01 (figure below) and 3. Click Browse for Themes. Select click Save. the theme downloaded to your computer and click Open. Theme will be applied to the spreadsheet and results will be displayed on the screen. Page 70 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Session 8: create and use templates RELEVANT KNOWLEDGE Templates can help you save time and effort because all the work it takes to design a workbook has already been done. You can use templates that are builtin within the spreadsheet software or create your own templates. Custom bill Creating and using a template 1. To save this as a template, select To create a template, first you need to File > Save As…. Select the type as create a spreadsheet as per your Template from the Save as type: drop requirements and then convert it to a down list. For example, you can specify template. You can create templates for a Excel Template if you are using an Excel variety of purposes such as invoices, bills, Spreadsheet. feedback forms, quiz, etc. ◦ Enter a file name, for example, To create a template of a bill that auto Bill sample. Click Save. calculates the price with sales tax, do the Now you can use this template whenever following: you need to raise a bill. To use this 1. Open a new spreadsheet. template, do the following: • Create the following entries (figure • Select File > New below): • Select My Templates (figure below) • A6 to A11 (Description) • B6 to B11 (Price per quantity) • C6 to C11 (Quantity) • D6 to D11 (Total). Enter the formula to autocalculate the total as a product of price per quantity and quantity {based on the values entered in the cells (example: D6=B6*C6, etc.)}. • C13 (Net Total). • D13 (=SUM(D6:D11) • C14 (Tax Amount). Template • D14 (leave this blank to enter tax • Notice the Bill template created amount) earlier is now available. To use this • C15 (Total Amount) template, select the template and click • D15 (Enter the formula to find the OK. A worksheet based on this template sum of Net Total and Tax Amount) will be created (figure below). Page 71 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query templates installed by default. Hence, at times, a template that you need may not be readily available. In such a case, either you can download the template from websites. To search for a template, do the following: 1. Type a keyword for example, billing, in the search box (centre section of the New Workbook dialog box) and click the icon. (Note: You need an active internet connection to perform this task.).A list of templates matching your Worksheet created automatically using keyword appears. the template. 2. You can preview the templates. To Now you can use or share this template. use a template, doubleclick on it. Using inbuilt templates You can also use the templates that are inbuilt in the spreadsheet software. To use templates available in the spreadsheet software, do the following: • Click on File > New. • To view the list of templates installed along with the spreadsheet software, click Installed Templates under Templates. Notice the available list of templates. • To use a template, click on it from the list and click Create. For example, if you would like to create a tracker for monitoring attendance, do the following: • Select the the Timecard template from the list and click Create (figure below). Timecard template • You can customize this worksheet further according to your needs. Downloading templates Spreadsheet software has limited Page 72 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Session 9: Update Workbook Keywords, Category Comments and Properties Status here. RELEVANT KNOWLEDGE Workbook properties contain information about the workbook such as the author of the workbook, date and time when the d) To view additional details such as workbook was created and modified, etc. date of creation or when the spreadsheet This information is referred to as was last modified or accessed, click the metadata. dropdown Document Properties located at Adding information about author, the left corner. company, etc. can help in identifying the e) Click Advanced properties. A source of the document. For example if [Workbook name] Properties dialog box you need to report an in error in a appears. Notice the details available document, it will be easy it you know under General, Summary, Statistics, information about the author or the Contents and Custom tabs. company. You update a workbook's properties to Session 10: Creating&Editing Macros store additional information about the workbook. For example, you might want RELEVANT KNOWLEDGE to store information about what the workbook is used for to help potential Macros are used for storing a sequence of users of the workbook. You can only action that can help reducing time and update the properties of a workbook that effort while performing repetitive tasks. you own and currently have open. In other words, when you find yourself You might also want to view a workbook's performing the same actions or tasks in a properties to find out information about spreadsheet, again and again, it is useful the workbook. For example, you might to create a macro. want to find out the name of the A macro is a recording of each command workbook owner or the date that the and action you perform to complete a workbook was created or last saved. task. Once you have created a macro, To update a workbook’s properties, do the whenever you need to carry out that following: particular task in a spreadsheet, all you a) Open a workbook in Spreadsheet need to do is to run the macro! software. To understand how to use macros, you b) Click on File. A dropdown menu will first open a new workbook in appears. spreadsheet software and then format the c) Click Prepare > Properties. An worksheet title. additional detail dialog box appears above As you know, the macro recorder works the work area of your work sheet (figure by recording all keystrokes and clicks of below). You can view or modify details the mouse. Since a worksheet title is about the Author, Title, Subject, generally unique to a worksheet, before Page 73 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query starting the macro, enter the tile as “My Test Worksheet 1” in cell A1. Now do the following: • Click on Macros option available under Macros group in the View tab. A dropdown menu appears. • This workbook • Using this option, the macro is available only in this workbook. • New workbook • Select the Record Macro... option • This option opens a new workbook. from the dropdown menu. A dialog box for The macro is available only in this new recording the sequence will be displayed workbook. (figure below). • Personal macro workbook. • This option creates a hidden workbook Personal.xlsb which stores your macros and makes them available to you in all workbooks. Macro created with this option is available only after saving the workbook. • Name the macro as MyMacro1. • Select Personal Macro Workbook under Store the macro dropdown list and a) Give a name to the Macro you are click OK. creating. The name you give here will be • Notice a small blue square at the listed and can be used later. left bottom (status bar) indicating the b) It is optional to specify a shortcut current status (figure below). From now key for the macro. You can enter in a the sequence of actions that are letter, number, or other character in the performed will be recorded until the Stop available space. Doing so will allow you to button is clicked. run the macro by holding down the CTRL key and pressing the chosen letter on the keyboard. c) Specify the location by selecting • Do the following sequence of one of the options from Store macro in: actions: dropdown list. 1. Select cells A1 to M1. 2. Click on Home tab and then on Merge & Center option in the Alignment group. Page 74 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 3. Click on the bold icon in the Font whenever the spreadsheet software is group. launched. 4. Select Fill colour drop down from Editing Macros the Font group and select Theme Colour You can modify a macro to include Yellow. additional sequences or remove certain 5. Now click the Stop button. sequences. Alternatively, you can click on Macros However to edit Macros you need to option available under Macros group in understand a language used by the View tab. Notice that the option Stop spreadsheet software called Visual Basic Recording is available here now. for Applications (VBA). In short, macros 6. The Macro recorder will stop are set of instructions written using VBA recording keystrokes or actions and the and used by spreadsheet software to macro is ready to be used. Save this complete a automated task. workbook. Caution with Macros 7. Open a new workbook. Enter a Though macros are usually created for Worksheet title in cell A1. automating tasks, it is possible to create 8. Click View tab macros programmatically that can run 9. Click Macros dropdown arrow and programs or spread virus on a computer. click View Macros. You will see a Macro Spreadsheet containing macros are dialog box containing list of macros considered to be a high risk. This is created earlier. because when a spreadsheet containing macros is accessed from another computer, spreadsheet software disables the macros by default. This results in reduced functionality of the workbook itself as the macro is disabled and the user sees with a window similar to the one below: If you are certain about the source, you can change the settings available within Notice that macro MyMacro1 appears in the spreadsheet software in order to allow the list. Click Run. Notice the actions the macro to work. done earlier apply automatically to the To view the security settings, do the new spreadsheet. following: Note: If you are using MSexcel the Click File > Excel Options > Trust Center spreadsheet software will save the > Trust Center Settings > Macro Settings. recorded macros with the file name of A window for altering security settings, PERSONAL.XLSB under C:\Documents similar to the one below appears. and Settings\USERNAME\Application Data\Microsoft\Excel\XLSTART folder so that the macros can be made available Page 75 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query disabled. If you receive a workbook containing macros and you want to: • Disable the macros and you don’t want to be notified; select Disable all macros without notification. • Disable the macros and you want Notice the list of options under Macro to be notified; select Disable all macros Settings on the right. By default, it is set with notification. to Disable all macros with notification. • Enable the macros only for the Macros can be digitally signed to confirm workbooks that are digitally signed; it is safe. To receive a digital signature, select Disable all macros without you need to contact the system notification. administrator or reputable certificate • Run the macros in any case; select authority (CA). If the spreadsheet Enable all macros (not recommended; containing the macros is digital signed by potentially dangerous code can run). a reputable CA, macros will not be IT/ITES 304: PRESENTATION (ADVANCED) Session 1: Working with a design Viewing installed templates template Presentation software usually includes a set of sample templates. To view installed RELEVANT KNOWLEDGE templates, do the following: 1. Go to File > New. A New In presentation software, there are many Presentation dialog box containing inbuilt design templates with various different types of templates appears layouts, formatting and colors. These (figure below). combinations help you to create 2. Select Installed Templates and eyecatching presentations. You have browse the list of templates installed on learnt to work with templates in earlier your system. sessions using word processing and spreadsheet software. You can also work with templates in presentation software. Templates or presentation templates refer to a sample design that helps in saving your time and effort. Sometimes, in a template, you may find sample content along with designs. For example, if you want to conduct a quiz using a presentation you may choose a New Presentation dialog box Quiz template and modify the required Using installed templates sections. To create a quiz conducted through a Page 76 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query presentation, do the following: Installed Templates dialog box 1. Select the Quiz Show template • Click Create under Installed Templates section. • Save this presentation. 2. Click Create. A presentation based Now to copy the design from this on the template opens (shown below). presentation to a new presentation, do the following: • Create a new blank presentation (CTRL+N). • Open the presentation created using Pitchbook template. • To view both the presentations Quiz Show template applied to a sidebyside for easy reference, select presentation View Tab and select Arrange All under 1. Run the presentation to Window group (figure below). understand the different types of question styles in this template. 2. Now you can use this template and customize the contents by replacing the Questions, Answers, Transition effects, Animation etc. Copying templates from other presentations You can also copy design templates from other presentations. This is helpful when you want to copy from a preformatted presentation (for example, with school Presentations arranged sidebyside logo, matching color scheme, etc.) to your • Select the slide containing the existing presentation. To copy the design design that you want to copy. from an existing presentation, do the • To copy this to the new following: presentation, select Home tab and select • Click File > New. Select Installed Format Painter. Notice the formatting is Templates. ready for application. • Select Pitchbook from the Installed • Now switch to the blank Templates list (figure below) presentation. Move your cursor over the first slide in the slide list of the new presentation and select the first slide by clicking on it. Notice the design is applied to this blank presentation (figure below). Page 77 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Design applied from another presentation List of themes in Themes dropdown You can use the abovementioned • Select a theme to be applied for procedure to apply designs from other this design, for example, Trek. Notice the presentations as well. theme applied to the whole presentation Customizing a template (figure below). Sometimes the builtin templates may not suffice your design needs. In such cases, you can customize a template and use it for other presentations you create. To customize an existing design template, do the following: Note: We will use the existing presentation created using pitchbook template. • Open the presentation created using pitchbook template. • To select a design, select Design tab. Trek Theme applied to the presentation • Select the Themes dropdown • You need to save this a template (figure below) for future use. To save this as a template, select File > Save As… > Template. • Provide a file name for this template. For example, DESIGN TEMPLATE {YOURNAME]. (figure below) Themes Group, Design Tab Page 78 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Save As… dialog box New Slide dropdown menu • Click Save. • Now you can work with the You can now use this customized design presentation and insert different slides template to create other presentations. To available in the New Slide dropdown use this customized design template, do menu. the following: You can further customize the look and • Create a new presentation by feel of the template by modifying theme selecting File > New. color, theme font and theme effects by • Select My Templates… . clicking the respective dropdown arrow available under Themes group in the Design tab (figure below). My Templates dialog box Colors, Fonts & Effects dropdown menus • Notice the customized design in the Themes group template available in the list. Select 1. To apply a theme color, click the DESIGN TEMPLATE {YOURNAME}, dropdown menu available under Colors click OK. (figure above, left) and select by clicking • Select Home tab and then select on an item available in the list. New Slide dropdown (figure below). 2. To apply a theme font, click the Notice the slides available based on the dropdown menu available under Fonts customized design. (figure above, middle) and select by clicking on an item available in the list. 3. To apply a theme effect, click the dropdown menu available under Effects (figure above, right) and select by clicking Page 79 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query on an item available in the list. creating the Notes pages. Notice the changes in the presentation • This feature of presentation after applying theme color, theme font software enables adding notes to the slide and theme effects. as you are constructing them. These notes Session 2: Using the slide master can be seen afterwards in normal views. These notes might be some kind of special RELEVANT KNOWLEDGE points or notifications. 4. Handout Master the master for In the last session, you used inbuilt creating Handout pages. templates found in presentation software. • These are thumbnails of slides However, you may wish to create your printed together on a sheet of paper. own template so that certain features, These are often printed and sent for such as a predefined background, your review before the presentation is shown organization’s logo or company colors are to an audience. During the presentation, always present whenever the template is these handouts can be distributed to the opened. These templates are called audience. Master Slides. When you launch a presentation, the There are four different Master Slides default design template or theme is a 1. Slide Master – the master for all plain, white slide. This is created from slides in the presentation other than the the slide master. As already discussed, a Title Master. slide master is an element of the design • Each presentation template comes template that stores information about with a slide master. The slide master the template, such as font styles, controls the overall formatting and object placeholder sizes and positions, placement for the presentation Font background design, and color scheme type, color and size, background color, information. Slide masters also allow you and certain special effects (e.g. text to insert common elements on every slide, shadowing). When you want to make a for example, a common footer, slide global change to the appearance of your number, copyright line, logo, or even slide you need not change each slide pictures. All slides in a presentation are individually, just make changes once on created using the fonts, colors and the slide master and that changes other graphics specified in the slide master. slides automatically. Each new slide takes on these features. 2. Title Slide Master the master for This feature is very useful when you want the Title page only. all slides in your presentation to use • When you open a new similar fonts, formatting, colors, and presentation, the presentation software graphics. It saves time and the effort of assumes that you will begin your slide applying repetitive formatting. You can show with a title slide. Adding a title and customize an existing slide master and subtitle to this slide layout is as easy as create a template for your personal use. clicking and entering text in the given Presentation software includes several text boxes. tools to control the look and functionality 3. Notes Master the master for of the slides. Page 80 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Slide Master View allows you to control the themes to make the presentation look consistent across all the slides. Working with the slide master Open a new presentation in the presentation software. To work with Slide Master view, do the following: • Select the View tab and click Slide Master under Presentation Views group. 3. Insert a placeholder for inserting company logo or picture Title Slide. (Placeholders help organize content in the layouts. Content may be a clipart, or Notice the Slide Master tab now available picture, or text, or chart, or table, etc.) in the Ribbon (figure below). You can Click Picture from Insert Placeholder customize the styles, background and dropdown under Master Layout group. layout for the entire presentation here. Note the cursor turns to a crosshair (Plus symbol). Now draw a square box on the right top corner to place the logo. Create a presentation template Now you will create a template with the following options: 1. Open a new presentation and select View tab> Slide Master 2. Apply a Theme – Technic 1. Apply borders to the placeholders • To do so, click Technic under Tile and Content Layout slide. Themes dropdown in Edit Theme group • Click the Tile and Content Layout (fig. below) (hint: All themes are slide from the list (Hint: Move your alphabetically arranged; browse for the mouse over the slides available for relevant one). customization; Slide layout names will be available for reference). • Doubleclick the Title placeholder, select Intense Effect Dark 1 from Shape Styles group under Format tab. Page 81 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query already selected!). 1. Click Slide Master tab and click Close Master View available in Close group. • Now save this template. While saving select the file type as template from Save as type: dropdown list. Note: This template is saved under Now create additional templates using Templates folder and is available under different styles, themes, colors, etc. My Templates section. Using Multiple Design Themes Using the customized template If you have noticed only a single design • Now click File > New to create a theme can be applied to a presentation by new presentation. Click My Templates. default. If you want to use multiple Notice the template created earlier is design themes in a presentation, you need listed here. Select the template and click to modify the slide master. In this OK. example, you will use both the Foundry • Insert a Title Slide from the New and Origin theme in a single Slide dropdown menu in the Home tab. presentation. Notice the placeholder for inserting the a) Open a new presentation using the logo or a picture available on this slide. presentation software. • Insert a Tile and Content Layout b) Select Design tab. Slide from the New Slide dropdown c) Select Theme dropdown and select menu. Notice the Title Placeholder Foundry theme from the list. displaying the custom border applied d) Notice the Foundry theme applied earlier. This is due to the effect of Slide to your presentation. Master customized earlier. Now you can e) To add another theme, select the continue working with the presentation. View tab and then select the Slide Master Preserving the Slide Master (figure below). To avoid any changes to the Slide Master by mistake, you can preserve the slide master template. To do so, • Go to Slide Master View. • Rightclick on the slide master (first slide) and select Preserve master (figure below).Alternatively, you can the option Preserve from the Edit Master group in the Slide Master tab (if it is not Page 82 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Slide Master View displaying slide layouts with Foundry theme applied a) Scroll to the bottom of the Slides/ Outlines Pane (left side of the screen) Origin Theme from Themes dropdown list (figure below). a) Once Origin theme is selected, a new set of slides based on Origin theme is inserted below the first set of slides (figure below). End of the Slide/Outlines Pane a) Now click below the last slide in the list (you will notice the cursor blinking) b) Now select the second theme to be Slides based Origin Themes displayed used in this presentation. From the under the first set Themes dropdown, select Origin theme a) Click Close Slide Master. (figure below). b) You can now add slides either based on Foundry or the Origin Theme. To insert a slide, select Home tab, select New Slide dropdown list (figure below). New Slide displaying slides based on both themes a. You can now select different slides based on either Foundry or Origin Theme. Page 83 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Ribbon. 2. Click on the option Header & Footer available under Text group, as shown below. A Header and Footer dialog box appears (shown below). b. You can save this as a template for future use. Use the procedure described above to add more design themes to your presentation. Session 3: Creating headers & footers You can specify the Date and time, slide RELEVANT KNOWLEDGE number and custom message here. Once complete, click either: You have learnt that you can use the 1. Apply, to display the specified slide master to insert information details only in the current slide. globally across slides. One such item, 2. Apply to All, to display the usually required is headers and footers. specified details on all slides. You have learnt to create headers and Do the following in the Slide tab: footers in documents using word 1. Check Date and Time option under processing software. You can also add Include on slide section. headers and footers to the slides using 2. Click Apply to All. presentation software. As you already 3. Now play the presentation; notice know, headers and footers help to: the current date and time displayed at • Include important information the bottom of each slide. about the slides for the presenter (or You can also customize the header and audience), such as the date the footer of notes and handouts. Click on presentation was created or delivered. Notes and Handouts tab in Header and • Brand the slides with your Footer dialog box (shown below). company name. • Automatically place a slide number on each slide. Open a new presentation in presentation software, to work with headers and footers, 1. Click on the Insert tab on the Page 84 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query RELEVANT KNOWLEDGE Handouts are set of slides distributed as hard copies to an audience during a presentation. You can customize the handouts using the handout Master in the presentation software. You use the handout master to customize the layout, include or exclude header, footer or page numbers of printed handouts. As you can see this is quite similar to the To work with handout master, open an Slide tab. You can specify the Date and existing presentation. time, slide number and a customized Click on the View tab on the Ribbon. message here. Once complete, select Click on the option Handout Master in Apply to All, to display the specified the Presentations group, as shown below. details on all notes and handouts. Do the following in the Notes and Handouts tab: 1. Check Footer textbox. 2. Type your name in the textbox. A window similar to the one below 3. Click Apply to All. appears. 4. Go to File > Print >Print Preview. 5. Select handouts in the Print What: dropdown menu. 6. Select the appropriate option and notice the name displayed at the bottom. In this example: a) To set 9 Slides per page, Select 9 Slides from Slides Per Page dropdown in Page Setup group under Handout Master Tab. b) Ensure Header, Date, Footer and Page Number options are checked in Placeholders group under Handout Master tab. c) Once complete, click Close Master View in Close group. Handout elements are not visible on the screen as they are meant for printing purposes. To confirm the changes you Session 4: The Handout Master have made, print the handouts. Exporting Handouts to a word processor. Page 85 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query A handout is printed for circulating to the Select the option: audience. You can further customize your • Paste: if you need the slide and handout and make it professional looking notes to be inserted in the word by exporting it to a word processing processing document. software from the presentation software. • Paste Link: if you need the word Doing so, you can add additional text document to be automatically updated such as a thank you note, contact details whenever you update the slides or the for future communication or feedback, handouts. etc. • Select the option Notes next to To send the presentation to word slides, and select Paste Link. processing software, • Click OK. • Click File > Publish. Note: Word processing software will automatically insert a table with slide and notes. Now edit the content and notes in the presentation. Switch to the document and confirm the status of the contents. Are they updated automatically? Generally, presentations can increase in size if it has many graphics inserted for emphasis. When you are working on a draft of a presentation and want an approval or review before you create the presentation, you can send only the outline of a presentation. • Select the option Create Handouts. If you are using MS Office, a window similar to the one below appears. Session 5: The notes master RELEVANT KNOWLEDGE Notes master view is used for setting up header, folder and layout of printed notes. You can create notes pages with a reduced image of your slide, and notes that go along with the slide. The formatting of the notes pages are specified in the Notes Master. Remember Note: You can customize the page layout to add page numbers to your speaker of slide and notes, as you want them to notes so that if you drop a stack of notes appear in the document by selecting the pages, you can use the page numbers to appropriate radio button in this window. quickly sort them back into order! To work with notes master, open an Page 86 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query existing presentation that has sufficient Note: Notes will not be visible in the notes for practice. slideshow. To confirm if the changes are 1. Click on the View tab on the applied, use print preview or print the Ribbon. notes. To preview, select print preview 2. Click on the option Notes Master in and select Notes Pages under Print What: the Presentations group, as shown below. dropdown menu. A window similar to the one below appears. Session 6: Saving in Different Format Similar to working with handout master RELEVANT KNOWLEDGE view, you can customize the orientation, header, footer and slide position on the You can save your presentation in a page. Notes master has two placeholders variety of formats. Some situations where by default; one for the slide and one for this might come in handy are: the notes. You can apply themes, theme • If you want to send your colors, theme fonts and theme effects by presentation to someone but you do not using the Edit Theme group under Notes want them to use your design template, Master tab. you can save and send the presentation You can also insert pictures, cliparts, as images. shapes, SmartArt, etc. using the • Select File > Save As…. Notice the Illustrations group under Insert Tab. list of file formats displayed in the For example if you want to reduce the dropdown such as PNG(Portable Network size of the image taken by the slide when Graphics Format), GIF, JPEG, etc. printing notes and change the page • If you want to publish your orientation, you can use the notes master presentation as a web page on your LAN to: or the Internet, you can save the • Resize the Slide area to make it presentation as a webpage. smaller Save the presentation as images • Change Page Orientation to To save your slides as images, do the Landscape by choosing Landscape in following: Notes Page Orientation Group • Open a new presentation or an Page 87 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query existing presentation • Select File > Save As….. Select the • To save the files in PNG, select type as Web Page. PNG from the dropdown list. Click Save. • Click the button Publish…(figure You will see a window similar to the one below) below. • You can select a single slide or all the slides in the presentation. • Select Current Slide Only if you want to save only a selected slide Save As…dialog box • Select Every Slide if you want all A dialog box with publishing options the slides in the presentation to be saved appears(figure below) as an image. When you have multiple slides, each slide will be automatically saved as a separate image. (figure below). • You can publish the entire presentation or selective slides of a presentation. • To publish the entire presentation, select Complete Presentation. Folder contents with list of images of • To publish selective slides, specify slides the slide range in Slide Number value • You can now send selective or all box. the images in the folder. • You can include or exclude speaker Save the presentation for publishing on a notes from being published along with the web page presentation. To publish speaker notes, To publish the presentation as a web select the checkbox Display Speaker page, do the following: notes. • Open a new presentation or an • In the text box File name:, enter existing presentation the location where you want the web pages to be saved. Page 88 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query • Select the checkbox Open published web page in browser, if you RELEVANT KNOWLEDGE want to open the web page automatically after publishing it. Guidelines • Click Publish. Notice the web page Before you design and deliver a displayed using your default browser presentation, use the following guidelines (figure below). that can help you make effective presentations: 1. Analyze the topic and the need for this presentation. 2. Understand your audience. 3. Estimate the number of hours required for a presentation. 4. Collect required resources (photos, clip arts, audio / video clips, flash animations, etc.) relevant to this presentation. 5. Prepare speaker notes & handouts. Web page displayed in web browser 6. Use a rough sketch first to Downloading and submitting templates estimate and then create the actual The presentation software has a limited presentation. number of inbuilt templates. However, 7. Keep approximately 56 points per you can download templates from several slide with not more than 3040 words websites either free or for a fee. For your 8. Keep only the keywords or key reference, here is a list of website from points in the slides, not an entire where you can download templates: sentence unless it is of high importance. 1. www.powerpointstyles.com 9. Use readable fonts such as Arial, 2. www.presentationmagazine.com Tahoma, Verdana with size around 2430 3. www.templatemonster.com Points & colors. 4. www.slideshop.com 10. Use appropriate images & 5. www.graphicriver.net backgrounds or designs; don’t overcrowd Note: In most cases, even paid websites the slide with too many graphic or text usually offer a limited numbers of free elements. templates for personal use. Check if the 11. Revise key points on each slide website offers any free template that for once ready; replace keywords or points if both personal and commercial use. You required. can also publish use your own 12. Rehearse the presentation at least presentation on the Internet either free or 23 times to make sure you are for a fee. Check out the website for comfortable delivering it; use timings for procedures to submit or sell your recording the time taken for each slide. templates. Adjust the content for delivery if required. Session 7: Assignment 13. Anticipate questions based on the Page 89 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query content and keep answers ready. 17. Summarize the presentation 14. Keep printouts of handouts ready. towards the end. Be ready to accept 15. Include citations to indicate questions from the audience. sources of information if used (websites, 18. Include contact information at the books, etc.). end of the presentation. 16. Include references for additional reading through websites and books for selected topic. IT/ITES 306: EMAIL MESSAGING (ADVANCED) indicated by an icon after the message SESSION 1: MODIFY MESSAGE subject in the Inbox. SETTINGS Importance Email messaging software allows you to Sometimes it is necessary to alert set priority for messages. For example, recipients about the importance or since exam schedule is of high sensitivity of the information you are importance, you can set the importance sending as well as making sure that your level of exam related emails to high. If message has been received and read. At you want to set high importance for a the same time, as a recipient of email, it mail message as a one time activity, do is critical that senders know when you the following: will be able to respond to their email. • Compose a new mail message. Moreover, when you email regularly to • Click red exclamation (!) under the same group of people, there is a great Options group in Message tab. way to save time. • Send the email message to a In addition, you may want to insert recipient. hyperlinks about resource in a mail you Messages will be marked with red send. In the following five sessions, you exclamation (!) when viewed by the will learn about all these features of recipients indicating that this message is emailing software. of high importance (figure below). RELEVANT KNOWLEDGE You have already learnt to work with email messages using the email messaging software. Email messaging software allows us to modify various settings such as setting importance, confidentiality, set color category, delivery options, etc. Message settings alert the recipient of the message about the importance and sensitivity of a message. Both the message importance and sensitivity are Page 90 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query More Options group. The Message Message when viewed in list Options dialog box opens: Email when opened. To set importance level as high for all outgoing messages, do the following: 1. Select Tools > Options 2. Select Email Options... under Preferences tab 3. Select Advanced Email Options...in Email Options dialog box. 4. Select High from Set importance: dropdown list under When sending a message section. 4. Select Private under Sensitivity: dropdown under Message settings (image above). Click Close. 5. Click OK thrice to save the settings 5. Send this message to a recipient. and move to the previous window. 6. The recipient will see a message 6. Now compose and send a mail to a similar to the one below when the mail is recipient. viewed. 7. Notice the message received by the recipient is marked with red exclamation (!). Note: By using the above specified settings, all outgoing messages will be marked as High, even messages that have low priority. This can be very misleading. Use high importance only for critical email messages. Note that this option is just an indicator Sensitivity to the recipient, sent with a belief that When you send a mail that as sensitive the recipient will be ethical and keep the information, it may be accidentally message private, not highlighting the forwarded to another person or to a group contents to others. However, the recipient by the recipient. In such cases, you can can choose whatever he/she wants to do indicate the sensitivity of the message by with such an email. special markers such as normal (default), Delivery Options private, personal or confidential. This Delivery options include settings that: way the recipient can be made aware of a) Specify that replies be sent somewhere the sensitivity of the message. To mark a other than to the sender of the message. message as Private, do the following: b) Delay delivery of the message until a 1. Compose a new mail message. specified date or time. The message is 2. Select Options tab. stored in the Outbox until it is delivered. 3. Click on the dropdown arrow in c) Have the message expire after a Page 91 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query specified date or time. After the expiration date, if the message has not been opened yet, it is deleted. If the message has been opened, it is crossed out. Setting Expiration You can set expiry date and time for time sensitive messages. For example if you send an email to a large group announcing a public gathering at a Viewed in mailbox Message when opened specific date & time, you generally do not beyond schedule expect participants to join the gathering Delay Delivery after the specified date and time and it is If you want to send a message on a later useless if this message is viewed by the date, at a specific schedule, you can use recipients beyond the schedule. Hence, the delay delivery option. Delay delivery you can set the mail to expire is useful when you want to delay the automatically beyond a particular message delivery for example, schedule and mails will be marked with announcing a time sensitive activity such the status as expired denoted by a as a contest or when waiting for a strikeout icon. confirmation from your supervisor about For example, you need to compose a mail an announcement. In such cases, you can to announce an Interschool competition prepare the mail in advance but set it to along with its schedule. To set the shoot off later. message to expire beyond the schedule, do To understand how to specify delayed the following: delivery, do the following: 1. Create the appropriate mail. 1. Compose a new mail message 2. Select Options tab and click announcing a painting contest – “Miracle dropdown arrow in More Options group. of Hands”. A Message Options window appears. 2. To delay the delivery, select 3. To set expiration, select the Options tab. Select the dropdown arrow checkbox next to Expires after under the in More Options group. The Message section Delivery Options and specify the Options dialog box appears. exact date and time as mentioned in the 3. To set the mail to be sent at a later schedule. schedule, check Do not deliver before: 4. Send the email message to a under Delivery options section and select recipient a data & time from dropdown list. For The message is displayed with a this exercise, select the current date as strikethrough (figure below), if viewed by date and set the time 5 minutes from the the recipient after the date and time has current time. Click Close. elapsed, indicating that the message is no 4. Now send this message to a longer valid. recipient. Notice this message will be queued in Outbox and will be sent only at the specified time. 5. Now compose another message and Page 92 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query send this immediately to a recipient. Note the difference. Notice the second message is delivered immediately to the recipient; message marked for delayed delivery will be sent 8. Now compose a new test mail only at the specified time. Check with the message and send it to a recipient. recipient if they have received the contest 9. Notice the message is queued in mail after the delayed schedule. the outbox waiting to be sent 60 minutes To delay the delivery for all messages, do later. the following: 10. To confirm, select outbox. Double For example, to set the messaging click the queued message. Select Options software to delay delivery of mails for all tab, select dropdown arrow in More messages by 60 minutes, do the following: Options group. Notice the schedule set 1. Select Tools > Rules and Alerts. automatically 60 minutes from now under Click New Rule… A dialog box appears. Do not deliver before: (data & time 2. Select Check messages after values). sending from the dialog box Step1: Select Receiving a confirmation (Requires a template. Exchange environment and/or ISP 3. Click Next. A window similar to support) the one below appears indicating that this Sometimes, when you send important rule will be applied all messages. Click messages, you may need a confirmation Yes. that the email message sent by you has reached the recipient. Email messaging software can track delivery of messages; however, this is not a guarantee that the recipient has read and understood the 4. Check defer delivery by a number message. of minutes under Step 1: Select action(s). If you want to specify the confirmation 5. Select a number of from the dialog settings as a onetime activity, do the box Step 2: Edit the rule description (click following: an underlined value). • Compose a new email message. • Apply the Request a Delivery Receipt option available under Tracking group in Options tab. 6. A Deferred Delivery dialog box • Send the email message to a appears. You can specify the delay in recipient. minutes here. In this case enter the value You will receive an email message either as 60. with icon next to the mail message if it 7. Click OK. Click Next twice and is delivered to the recipient or with Click Finish. Click OK. icon next to the mail message if it is not delivered. To receive delivery receipts for all outgoing messages, do the following: Page 93 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query • Select Tools > Options. by the recipient indicated by the icon • Select Email Options...under next to the email (figure below). Preferences tab. • Select Tracking Options...under Email Options dialog box. • Select Delivery receipt under the section For all messages I Send, request:. If the recipient has clicks No, you will not receive any notification. However, if the message is deleted without begin viewed or read, you will receive an email with • Click OK thrice to save the settings Message Deleted Without Being Read and move back to the previous level. notice indicated by icon next to your • Now compose and send a mail to a mail message. recipient. To receive read receipt notification for all Notice that you will receive delivery messages, do the following: receipts for all outgoing messages once 1. Select Tools > Options. delivered to the recipient. 2. Select Email Options...under Read Receipt Preferences tab. If want to receive a notification when the 3. Select Tracking Options...under recipient has viewed or read your mail, Email Options dialog box. you can use the Read Receipt feature. To 4. Select Read receipt under the receive a notification for a single mail, do section For all messages I Send, request:. the following: • Compose a new email message • Apply the Read Receipt option available under Tracking group in 5. Click OK thrice to save settings Options tab. and move to the previous level. • Send the email message to a 6. Now compose and send a mail to a recipient recipient. When the recipient of your mail has Notice that you will receive red receipts viewed the mail, he/she will see a dialog for all outgoing messages if the recipient box requesting permission for sending chooses to click Yes. notification to the sender of the mail. Note to instructor: Disable the rule before moving to next section as this rule will delay all other activities in this session. To disable, select Rules and Alerts, uncheck this rule and Click OK. Flag Messages Imagine yourself in a role in which you interact with many people through mails everyday; it would be extremely difficult If the recipient clicks Yes (a decision when you want to track multiple made by the recipient), then you will activities. You may forget to respond to a receive a mail that the message was read vendor, sign a contract or followup with Page 94 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query someone for an important decision. Flagging email messages can help you to manage emails much effectively. For example if you want to set a remainder for yourself, do the following: 1. Select a mail message from the list 2. Select Actions > Follow Up > If you want to send a message to someone Custom… and you need a reminder for yourself for following up, do the following: • Compose a new mail message • Select Follow Up dropdown arrow under Options group. Select Custom. • Check Reminder: , select a date and time convenient to you for a follow up. • Click OK. • Send the message to a recipient. • 3. In the custom dialog box (figure Select Go > Tasks to view the below) under Flag for Me:, select Reply ToDo list. Notice the reminder set in the from Flag To: dropdown list. list. 4. To set an alarm, check Reminder: Sometimes you may delegate a task to and select a date and time from dropdown your colleague and expect a response. If values. your colleague forgets about the delegated task, you may not receive the response on time. To avoid this, you can flag the message you wanted your colleague to respond. To set a reminder for a task delegated to your college, do the following: • Compose a new mail message. • Select Follow Up dropdown and select Flag for Recipients… 5. Click OK Reminders are stored in the email messaging software as ToDo’s lists. To view list of ToDo’s, select Go > Tasks. Notice the follow up listed under ToDo list flagged along with reminder (Left) and action to perform (Right). • Flag for Recipients section, select Page 95 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Reply from Flag To: dropdown list, select Flag on a mail message data and time under Reminder: Notice the flagged reminder (left) and dropdown. text (Right). • Click OK. Since the reminder is added to the • Send the message to a recipient. recipient’s calendar, alerts may popup Note: Following screen will be available depending on how the recipient’s only on the recipient’s email messaging messaging software is configured. software. Recipient can send a reply to the sender Mail message flagged using this to indicate the completion of task. procedure is displayed to the recipient Voting similar to the one below: Imagine a situation where you want to finalize a decision based on votes from a group of audience. Usually a meeting is conducted or groups are collected for voting. This requires lot of time spent by each voter. To save time and money, Flag icon on a mail message. electronic votes are used, especially if a large group (possibly located in different Notice the flag icon next to the mail geographical locations) is being message (Left) and text above Sent: addressed. (Right). For example, to conduct a survey across Now the recipient can add this flagged your school to have special computer lab reminder to their calendar by: classes over a weekend, do the following: • Rightclick on the flag icon • Compose a new mail message • Select Add Reminder… (figure explaining the details of this survey. below) • To insert voting buttons, do the following: • Select Options tab • Select dropdown arrow in More Options group. The Message Options dialog box appears. • Select Yes; No from Use Voting buttons: dropdown list in Voting and • Click OK in the Custom dialog box. Tracking options section (image below). Now the reminder is added to the ToDo For now, select Yes; No from the list. list in Recipient’s email messaging • Click Close software. To view the to do list , select Go • Send the message to a recipient or > Tasks. group of recipients. Recipients will receive your mail just like any other mail, except that in addition they can choose Yes or No from a menu similar to the one below. Message viewed in inbox (figure left) and when opened Page 96 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query (figure right) responses by viewing the number of votes instead of checking mails one by one. To view the response, click on the title area above From:, and click View voting responses. A window similar to the one below appears with a list of results. Recipients can respond either by choosing Yes or No from the dropdown depending on their decision with or without additional comments. When recipients click Yes (or No), a window similar to the one below appears: Note: Not all recipients vote. Responses from recipients who voted will be displayed in the result. You can consolidate the results from the recipients • If Send the response now is to make the decision based on votes. You selected, the decision is sent immediately can customize the voting dropdown by • If Edit the response before sending specifying values separated by semicolons is selected, messaging software allows in Use Voting buttons: dropdown list. you to add comments before sending the Examples: vote. • Recommend; Don’t Recommend • Click OK. • Monday; Wednesday; Friday Once recipients have made their votes, Categories the sender will receive the results with You have learnt to create color categories the voting decision in the Subject line for appointments using Calendar. Now, (figure below). you will learn about a similar concept with mail messages. When you have large number of mails in your inbox, it may be difficult to locate specific messages. You can color code and categorize messages that are easier to locate. For example, Blue color can be mapped to messages from vendors, Red If you have received large number of for mails from supervisor, Green for mails responses, it is easier to track the Page 97 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query from colleagues, etc. • Type a name, for example Office For example to apply a color, do the and click OK. following: 8. To add a new color and a category: 1. Double click on a message • Click New… 2. Select Categorize dropdown menu • Type a new in the Name: text box from Options group • Choose a color from Color: dropdown and a shortcut from Shortcut Key: dropdown. • Click OK. Now you can assign this category 3. Select Blue Category from the whenever you receive mails from clients. dropdown list. A Rename Category dialog box appears (figure below). SESSION 2: CHANGE THE MESSAGE FROMAT RELEVANT KNOWLEDGE 4. Type Vendor in the Name: text box Why have different formats? and click Yes. You have already learnt how to compose 5. From now on, you can mark the email messages. When sending emails, messages vendor that will be easier to you need to consider if the recipients have locate. You can modify the existing color necessary support to view the email as categories or create your own categories intended. When a recipient views your by doing the following: mail using a email software different 6. Select Actions > Categorize > All from yours, the message may appear Categories… distorted or garbled making it difficult to read. In such cases, you need to send the message in a format that is acceptable to the recipient’s email software. Email messaging software supports a variety of formats to address these kinds of issues. For example if a recipient reports that their email software can accept text formats without any problems, it is advisable to change the 7. To rename an existing category: format at your end before sending the • Select {color name} Category mails. • Click Rename. Page 98 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Modify email format Note: In most cases, you can leave the To modify message formats, do the default setting as it is. Change the following: message format settings only if the 1. Open the email messaging recipient is having issues viewing your software. mails. 2. Go to Tools > Options. A Options Using Plain Text Format dialog box appears. Plain text format is a simple text format 3. Select Mail Format tab. Notice the that has widest compatibility compared to list available under Compose in this other formats. Since plain text format is message format dropdown list in the pure text, mails composed using this section Message format. format are smaller and move faster Email messaging software supports the compared to other formats. following formats: 1. HTML – This is the default message format in email messaging software. This format allows the user to add formatted text, images, and If you want to send a plain text message hyperlinks in the message. Message as a onetime activity, you can change the composed using this format look like message format at the time of composing document. an email by doing the following: 2. Plain Text – This format of email • Select File > New > Mail Message. message enables the user to add only text • Select the Options tab. contents without any images or text • Select Plain Text under Format formatting such as bold, italic, colors, etc. group. This format is supported by all email • Now compose a test message. messaging software. You can use this Notice that options such as bullets, when you need maximum compatibility. paragraph options are greyed out as you 3. Rich Text – This format enables cannot use advanced text formatting the user to add formatted text content. when using plain text format. The email messaging software • Send the mail to a recipient and automatically converts the RTF format to observe the format received by the HTML while sending over the Internet. recipient. If you want to set your email messaging software to use only Plain text format for all outgoing messages, do the following: 1. Select Tools > Options. 2. Select the Mail Format tab. 3. Select Plain text from the Compose in this message format: dropdown list (in the Message format section). Page 99 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query recipient. If you want to set your email messaging software to use only HTML format for all outgoing messages, do the following: • Select Tools > Options. 4. Click on Apply. • Select Mail Format tab. 5. Click OK. • Select HTML from the Compose in Now select File > New > Mail Message. this message format: dropdown list (in Notice the default mail format is in plain the Message format section). text (Plain Text option is selected in the • Click Apply. Options tab). • Click OK. Using HTML Format • Now select File > New > Mail HTML format is similar to that of a Message. Notice the default mail format webpage containing text and graphics is in HTML (HTML option is selected in formatted in a specific way. Messages Options tab). composed using this format appear as it Rich Text Format would appear in a web browser. HTML Rich Text format is a proprietary format mails are used in scenarios that require developed by Microsoft. RTF is attractive messages such as a newsletter recommended when you use Microsoft or marketing emails. However, since Exchange, a mail server from Microsoft. HTML mails contain graphics, colors, However, Outlook automatically converts tables, URLs, etc, they take up more mail email messages composed using rich text space making the email bulkier and it’s format to HTML format when it is sent to movement is slower compared to other an Internet recipient such as Gmail or formats. Yahoo! Mail. Most email software includes support for Note: It is recommend to use HTML HTML format through a GUI editor for format if you send and/or receive mails composing mails and a rendering engine from recipients using a variety of mail for displaying HTML mails. servers/clients to avoid any compatibility If you want to send a HTML Mail issues. message as a onetime activity, you can If you want to send a mail message using change the message format at the time of rich text format as a onetime activity, composing an email by: follow the same steps as learnt for HTML • Select File > New > Mail Message. and then select Rich text under Format • Select Options tab. group • Select HTML under Format group. Now when you compose a test message; • Now compose a test message; the options such as bullets, paragraph notice options such as bullets, paragraph options will be available . options are available as you can use Send the mail to a recipient and observe advanced text formatting in the HTML the format received by the recipient. format. Similarly, you can set your email • Now send the mail to a classmate messaging software to use only rich text and observe the format received by the format for all outgoing messages Page 100 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query and click Save. If you are using MSoffice, SESSION 3: OUT OF THE OFFICE the option would be Outlook Template. NOTIFICATION 5. You need to formulate a rule so that whenever you receive a mail, the RELEVANT KNOWLEDGE message in the template is sent as a reply to the sender. To setup the rule, select Understanding Out Of Office notification Tools dropdown menu. Out Of Office feature of messaging software (referred to as OOO), automatically sends a standard reply to your incoming messages while you are out of the office, on leave/vacation or having limited access to mails. Configuring an Out of Office notification 6. Click Rules and Alerts…. A Rules To configure the out of office notification, and Alerts dialog box appears similar to as a first step, you need to create a the one below. template that will be used when automatically responding to received mail. Do the following: 1. Start the email messaging software. 2. Go to File > New > Mail Message, and compose a message similar to the one below. 7. Click New Rule…. A Rules Wizard dialog box appears (figure below). 3. Now, save this as a template. Click File> Save As. A dialog box appears as shown below. 4. Specify a name, select the relevant 8. Select Check messages when they option from Save as type dropdown menu Page 101 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query arrive under Start from a blank rule and click Next. 12. Now, you need to specify the template to be used. Under Step 2: Edit the rule description (click an underlined 9. In the next step, you need to value), click a specific template. A Select specify to the conditions that need to be a Reply Template dialog box appears checked. (figure below). 10. Select the sent only to me option available under Step 1: Select condition(s) and click Next. 11. In the next step, you need specify what you want to do with the message. Here, select reply using a specific template option available under Step 1: Select action(s). 13. Select the template (use Look in: dropdown menu to locate the template) and click Open. 14. Click Next. The Rules Wizard dialog box appears wherein you can specify any exceptions to the rule you have just created. (figure below). Page 102 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 15. For now, click Next. Click Finish on the next window. Finally, click OK. 16. From now on, the message specified in the template will be sent automatically whenever you receive a mail. You can also set up rules to forward mails from a specific client to a colleague who is handing issues in your absence or to forward messages on a critical project to your manager. Page 103 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query SESSION4: CREATE DISTRIBUTION following: LIST or CONTACT GROUP • Click Select Members option available under Members group. A dialog RELEVANT KNOWLEDGE box appears with the list of contacts from Understanding distribution lists your address book. Select the contacts A distribution list refers to a collection of that you would like to add to this contacts or a contact group enabling you distribution list. to quickly address and send messages to a group of recipients. For example, if you want to send the exam schedule for 11th grade students, you can create a group that has all the members of the 11th grade students and then send the schedule to that particular group. This helps in saving time and avoids leaving out anyone by mistake from the list. Distribution lists are stored in the contacts folder, where you can identify them by the distribution list symbol. Creating a distribution list • After selecting contacts, click You need to create a distribution list Members > and click OK. Now, the before you can work with it. To create a Distribution List window appears with distribution list, do the following: the list of selected contacts. • Open the email messaging software. • Go to File > New > Distribution List. A window, similar to the one below appears. • Click on Save & Close option available under Actions. Now a distribution list is created. Using the distribution list To use the distribution list, do the following: • Specify a name for the distribution 1. Compose a message. list, for example my classmates in the 2. Click To…, and the Select Names Name: textbox. Contacts dialog box with the list of • You need to add contacts to this contacts and distribution list appears distribution list. To add contacts, do the (shown below). Notice the icons for Page 104 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query contacts and distribution lists. To print a distribution list, do the following: • Click Contacts. • Open the distribution list you want to print. • Select File>Print. SESSION 5: INSERT A HYPERLINK RELEVANT KNOWLEDGE You have already learnt about hyperlinks that are widely used in the Internet. A hyperlink is an object, text or a graphic that links to another web page, email 3. Select the distribution list from the address, network etc. Email messaging dialog box and click OK. software includes a facility for sending 4. Click Send. The mail is sent to all hyperlinks to recipients. This is very the contacts included in the distribution useful when you need to send reference list. links to others via email. By clicking the hyperlink in an email, you can quickly get to the resource. To begin with, open emailmessaging software. If you want to include links to website in a mail message, do the following: • Compose a new mail message. • Type the website URL in the body text area. For example, if you want to include a hyperlink to Wikipedia, type Modify a distribution list www.wikipedia.org or If you add/remove a name in the http://www.wikipedia.org and press distribution list temporarily, Enter. Notice the URL is automatically • Click on the plus sign icon converted into a hyperlink. preceding the list name in the To... text • Send the message to a contact. box. To insert a hyperlink manually, do the • In the Expand List message box, following: click OK to replace the distribution list • Compose a new mail message. with its members. • To insert a hyperlink, click the • Add or delete the user name(s) Hyperlink option available under the from the To… text box. Links group in the Insert tab (shown To modify a list permanently, double click below). the list you want to modify. Edit the list, Save and Close to update the list. Print a distribution list Page 105 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 2. Type the list of website URL using the procedure mentioned in this session. 3. You can include the mail address in one of the two methods: • A dialog box for inserting a a) Type the email address and Press hyperlink appears (shown below). Enter. For example: someone@web site.com. b) Include simple text content and link that to an email address. For example type job1, select the text. Select Hyperlink in Links group under Insert tab. Type the mail address as mailto: someone@web site.com and click OK. 4. Send the mail to a contact. • Type the website URL in the The person you sent the mail to will Address: text box.For example, receive the websites and email addresses www.google.com and click OK. as hyperlinks (embedded in the mail), • Now send the message to a contact. which when clicked upon, will open with Inserting lengthy website hyperlinks can web browsers and email clients. look odd or difficult to read. For example: http://en.wikipedia.org/wiki/Etiquette_ SESSION 6: SORT & FILTER %28technology%29. You can insert text to include lengthier hyperlink. To set MESSAGES USING MULTIPLE hyperlinks through text, do the following: CRITERIA • Compose a new mail message As messages accumulate, in your mailbox • Type Etiquette in the message it becomes important to organize and find body. Select the text Etiquette, select messages as quickly as you can. In Hyperlink from Links group. addition, you would want to filter out • Type the complete website URL, unnecessary mails (advertisements etc.) for example: rightly called Junk. The next two sessions http://en.wikipedia.org/wiki/Etiquette_ guide you through these options in a %28technology%29 and click OK. Notice email messaging software. the text is hyperlinked to the lengthy RELEVANT KNOWLEDGE URL. You have already learnt to create, send, • Send this message to a contact. receive and open email messages. Over When the contact receives the mail and time, searching for a particular email moves the mouse over the hyperlinked messages could prove to be difficult as text, the entire link is visible. By clicking your mailbox might have innumerable the link, the website can be accessed. mails. If you want to send a list of hyperlinks in To help you out of this issue, an email for example a list of job websites emailmessaging software has features to and important email address, do the sort and filter messages using single or following: multiple criteria. For example, if you 1. Compose a new mail message want to locate a mail that has a large Page 106 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query attachment, you can sort mails by size and locate the specific mail from the sorted list. Sorting Messages By default, messages are listed based on timestamp, with most recent mails at the top. You can change the arrangement to suit your needs. Single criteria To sort mail messages based on size (single criteria), do the following: • Click View > Current View. • Select Customize Current View. A Notice the email messages are now sorted Customize View: Messages dialog box by Size, with the mail with the biggest appears. Notice the default value under attachment, irrespective of when it was Sort… is specified as Received received, being at the top. (descending). Using multiple criteria In the previous case, a mail, received long ago with a huge attachment, could appear at the top. It just might be that what you wanted was a mail, recently sent but with a huge attachment. In such a case, you need to specify multiple criteria. So, to sort emails first by date received and then by size, do the following: • Click View > Current View and select Customize Current View. • Click Sort.. A Sort dialog box • Select Size from Sort Items by appears. dropdown menu as the first criteria • Select Size from the Sort Items by (figure below). dropdown menu (figure below) • Click Ok and move to the previous • Click Ok and move to the previous dialog box. Click Ok here too. Notice now dialog box. Click Ok here too. the mails are sorted based on most recent timestamp and size. Page 107 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Filtering mail messages the keyword. Since both subject field and Mailboxes can be flooded within a short email content are scanned, you may see span of time. Messages from friends, more number of mails in the search colleges, subscriptions, etc. need to proper results than in the previous search. management to avoid issues locating • If you remember the email address important mails. However, an alternative of the person, you can specify the email is to use the filtering feature available in address in the From: text box and mail messaging software to locate mails. perform the search. To filter mails, do the following: Note that if you are using a keyword • Click View > Current View and during this search, messaging software select Customize Current View. will look for a combination (multiple • Click the Filter button (which is set criteria) of the specific keyword sent from to Off by default) from the Customize particular email address and you may View: Messages. A Filter dialog box notice a very limited number of mails as appears similar to the one below: the search output. You can filter messages using the options in Filter dialog box i.e. recipients mail address, time sent, time received, expiration status, unread status, with or without attachments, flagged, size, etc. You can combine more than one criteria from this list to filter messages further. SESSION 7: MANAGE JUNK EMAIL RELEVANT KNOWLEDGE Junk mails, also known as Spam are the unwanted mails you receive (sometimes • To filter using a keyword (only unintentionally sent to you). You can subject field), type the keyword in Search configure the email messaging software to for the word(s): text box. Click OK twice filter junk mails and keep your mailbox to save and move to the previous dialog cleaner. Some junk mails anchor viruses box. that could potentially harm a computer, • Notice the search results match the remove data, send personal information keyword in the subject area of the mails. from the computer to unknown recipients, Since this searches only the subject field, etc. and are considered extremely you may see limited mails in your search dangerous. results. Email messaging software include spam • To filter using a keyword (subject filters that can block mails that have field and content), select subject field and potentially dangerous content such as message body from In: dropdown list. scripts or viruses. Click OK twice to save and move to the Email messaging software protects by previous dialog box. maintaining the following lists: • Notice the list of mails matching Page 108 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 1. Blocked senders: Email address specified in this list are automatically blocked; you can specify: • An individual mail address such as [email protected]. This will block mails from only that particular email address. • A domain name such as example.com. This will block mails from any mail address that belongs to this domain. 2. Safe senders are email addresses of individuals and domain that you always receive mails from. • Click on Junk Email… button. A 3. Safe recipients are email addresses Junk Email Options dialog box appears that you don’t like to block such as a wherein you can configure Junk Emails. subscription. Notice the tabs in this dialog box. By Email messages in Safe senders and safe default, the Options tab is selected and recipients list are never sent to the Junk level of junk email protection specified Email folder unless blocked by the ISP or here is selfexplanatory. settings based on a mail server. Email messaging software includes four junk filters that are capable of filtering junk emails (however, it needs to be setup accordingly). These junk filters are: 1. Safe Senders 2. Safe Recipients 3. Blocked Senders 4. International Managing junk mail To manage junk email, open the email messaging software and do the following: • Go to Tools > Options…, an 1. To block senders, click on Block Options dialog box appears. Senders tab, a window similar to the one below appears. Page 109 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query • To block receiving mails from a particular address, click Add and type the email addresses. For example, • The procedure to receive mails [email protected]. from a particular address, or a particular • To block receiving mails from a domain name or a list of email addresses particular domain name (note: all mail and/or domain names, is the same as the address from that particular domain will procedure to block senders. be blocked), click Add and type the Notice that the default setting Also trust domain name. for example, example.com. email from my contacts is checked; • If you want to block a list of email indicating that mails received from your addresses and/or domain names, first contacts are always on the safe list. create the list in a text file. Then 2. To receive mails from mailing lists • Click Import from File, and choose or newsletters you have subscribed to, the text file that has the list. you can add those addresses in the Safe • Click Open and then click OK. Recipients list. To add entries, do the 1. To receive emails from email following: • addresses or domains from known and/or Click on Safe Recipients tab, a trusted sources, you can specify them in a window similar to the one below appears. • safe senders list. To add entries, click on The procedure to receive mails Safe Senders tab, a window similar to the from a particular address, or a particular one below appears. domain name or a list of email addresses and/or domain names, is the same as the procedure to block senders. Page 110 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query • Select from the list the countries/ regions you want to block and click OK. • Click Ok again. You have successfully configured your junk mail box! 3. You use the International tab to Filter Modes block email messages based on TLD Email messaging software provides four (TopLevel Domains). Some examples of filter modes : Toplevel domains are: .ca, .us, etc. To • No Automatic Filtering block mails using Toplevel domains, do • Low the following: • High • You use the International tab to • Safe Lists Only block email messages based on TLD Note: It is recommended to keep the (TopLevel Domains). Some examples of default settings. However, if you want a Toplevel domains are: .ca, .us, etc. To tighter messaging security, you can select block mails using Toplevel domains, do the Safe Lists Only option (Options tab). the following: By doing so, every mail other than the • Click International Tab. (figure one sent from the Safe Senders and below). Recipients list will be considered as a • Click the button Blocked TopLevel junk email. You will need to check the Domain List… The Block TopLevel junk folder manually. Domain List dialog box appears (figure Junk filters need to be updated below) periodically with most recent definitions to protect new variants of junk mails. You can download Junk filter updates from downloads section of the mail messaging software vendor’s website. SESSION 8: SET WORKDAYS AND TIME IN A CALENDAR Lesson Objectives: Suppose your normal workday hours need to change due to the needs of a new project, or you have to coordinate appointment times with someone across Page 111 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query the country or the globe (different time 2. Click on the button Calendar zones) and need to indicate your Options…. A dialog box with calendar availability. At the same time, you may settings appears as shown below. need to create a calendar group to send mails to. How would you manage all these activities? Additionally, you receive so many meeting requests, can you configure the system to automatically respond to them? Email messaging software provides tools and options for you as a solution to all these issues. In the next five sessions, you will learn about all these tools and options. 3. Check/select the relevant workweek days and change the Start time RELEVANT KNOWLEDGE and End time. You have learnt how to work with To view the changes, calendar using email messaging software. • Click Go > Calendar. The default workdays and work time are • Select View > Work Week. Notice set in the email messaging software. You the start work day and end work day can configure the workdays and time along with start time and end time according to your preferred schedule. displayed in the calendar (figure below). Typically, workdays start on a Monday ending Friday. However, in some countries and even in some jobs, workdays could be different. To modify workdays and time in a calendar, open the email messaging software and do the following: 1. Go to Tools > Options…, an Options dialog box similar to the one below appears. SESSION 9: DISPLAY AN ADDITIONAL TIME ZONE RELEVANT KNOWLEDGE Places around the world have different time zones and calendar software is set to match the current geographic schedule. Calendar software include option for adding additional time zones; this could be beneficial to work if you are working with colleagues from different time zone. Page 112 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query By default, email messaging software displays the local time in your calendar. To add an additional time zone, do the following: 1. Open the email messaging software. 2. Go to Tools > Options…. The Options dialog box appears. In this example, do the following 1. Type India in the Label under Current Windows Time zone Group 2. Check Show an additional Time Zone under Additional Time Zone Group 3. Type Singapore in the Label under Additional Time Zone Group 3. Click on Calendar Options…..A 4. Select (GMT+08:00) Kuala Calendar Options dialog box appears as Lumpur, Singapore from Time Zone shown below. dropdown under Additional Time Zone Group 5. Click Ok to move back and save the changes made. 6. Now when you click the Calendar View, you will see both India and Singapore time zones. (figure below). 4. Click Time Zone. Another dialog box similar to the one below appears. Calendar displaying multiple time zones Now change different time zones in the calendar software and observe the changes in the calendar view. Page 113 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query SESSION 10: SET AVAILABILITY OPTIONS RELEVANT KNOWLEDGE You have already learnt to share your calendar through email. When you schedule activities and share, the persons who you have shared with on viewing Options group your calendar can see your availability as a. Schedule 3 either busy or a blank. Informing others i. Subject: Free about your availability assists them in ii. Timing – 3 PM – 5 PM fixing a meeting or requesting an iii. Reoccurrence: Monday to Friday appointment with you. You can indicate (10 occurrences) your availability by using the builtin i. Mark the entire appointment as indicators of the calendar software. Free. Select Free from Show As dropdown Specifying your availability in Options Group. Notice the entries in Before you share your calendar, use the your calendar (weekly view). inbuilt indicators of the messaging software to schedule tasks or meetings. To use the indicators, do the following: 1. Open your calendar software 2. Select Go > Calendar 3. Schedule appointments based on the following guidelines: a. Schedule 1 i. Subject: Team Meeting Calendar, Weekly View ii. Timing – 10 AM to 11 AM Sharing your calendar iii. Reoccurrence: Monday to Friday To let others know your schedule and (10 occurrences) availability, you need to share your b. Schedule 2 calendar. You can share your calendar by i. Subject: Vendor Meeting publishing to a web server, ftp server or ii. Timing – 2 PM – 3 PM to a computer in your local network. iii. Reoccurrence: Monday to Friday (10 Note: Setting up Web Server or FTP occurrences) server require additional technical To mark the entire appointment as expertise. Only the procedure for sharing tentative, select Tentative from Show As a calendar on LAN is included in this dropdown in Options group session. (figure below) Sharing on LAN To share your calendar using another computer in your local network, do the following: • Set up a shared folder on another computer that will be used for storing this Page 114 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query calendar. the shared folder using the specific • Create a New Folder. For example, format C:\CALSHARE File://\\COMPUTERNAME\SHARENA • Rightclick CALSHARE, select ME\%name%.vfb. (For example, if your Properties shared folder is located on a computer • Select Sharing tab named “SERVER” and the shared folder • Select Advanced Sharing… is given the share name as “CALSHARE”, • Check Share this folder enter File://\\SERVER\CALSHARE\ • Select Permissions %name%.vfb. Note the %name% is a • Select Full Control under variable and will automatically create the Permissions for Everyone required filename based on the email • Click Apply, click OK twice and the account name. If the email account is click Close. [email protected], then the filename • From another computer, confirm if will be user01.vfb.) you have read and write access to the Your calendar will be published shared folder by doing the following: periodically every 15 minutes by default. ◦ Click Start If you want to force the update, select ◦ Click Run Tools > Send/Receive > Free/Busy ◦ Type Information. \\COMPUTERNAME\SHARENAME. Viewing calendar published by For example, if the computer name is others DESKTOPONE and the share name is To view calendars published by others, CALSHARE, type add their contact to your address book \\DESKTOPONE\CALSHARE. and then do the following: To configure your calendar software to • Doubleclick on the contact. store the calendar in a shared folder, do • Select Details in Show group under the following: Contact tab. (figure below) • Select Tools > Options • Select Calendar Options (figure below) • Click the button Free/Busy Options…. • Specify the location under Address Text box in Internet FreeBusy section. For example to include the calendar Free/Busy Options shared by someone@ example.com, type • You need to specify the location of the location using the following format, Page 115 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query File://COMP UT take few minutes. ERNAME/SHARENAME/someone.vfb. For example, File://SERVER/ CALSH SESSION 11: CREATE CALENDAR ARE/ user01.vfb . GROUPS • Select Save & Close. To view the schedule or availability of the RELEVANT KNOWLEDGE contact, do the following: You have learnt to work with calendar • Schedule an appointment in the and make appointments using it. calendar Calendar groups are useful in scenarios when two or more individuals work together and need to schedule meetings in sync with each other. To schedule a meeting you need to select the list of recipients to be invited for the meeting. Do the following: • Open your calendar software. • Select Actions > View Group Schedules…. The Group Schedules dialog • Select Scheduling under Show box appears (figure below). group • Select Add Others dropdown and select Add from Address Book…. Select the recipient’s email address and click OK. A window similar to the one below appears. You can view their availability and schedule a meeting accordingly. • Click the button New… • Type a name, for example, GS1. Click OK. A window appears similar to the one below. • You need to add list of participants. Select Add Others dropdown and select Add from Address Book…(figure below). Note: Fetching the calendar details of another user from a shared folder may Page 116 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query • The Address book appears with list of contacts. Select the recipient, Click • Type Team Building in the Subject: To>. Add more recipients and when and 1st Floor in the Location:. Select a done, click OK. date from the Start time: and End time: • Once all the recipients are added, dropdown with a schedule between 10 select Make Meeting dropdown and select AM to 1 PM. Once complete, send the New Meeting with All… invitation by clicking Send. • Click Save and Close. Notice the meeting scheduled is displayed • The Meeting dialog box appears in your calendar. similar to the one below. Recipients when they open their mail will receive an invitation similar to the one below. Page 117 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query If they select Accept, you will receive a mail that the recipient has accepted your invitation. Resource Scheduling dialog box 1. Check Automatically accept SESSION 12: MANAGE AUTOMATIC meeting requests and process MEETING RESPONSES cancellations to automatically accept requests. RELEVANT KNOWLEDGE 2. Check Automatically decline You have learnt to set up meeting conflicting meeting requests to decline requests in the earlier sessions. You can meeting requests if a conflict arises. This configure the email messaging software to is helpful when meeting requests conflict respond to meeting requests with other scheduled meetings. automatically. 3. Check Automatically decline Using automated meeting responses recurring meeting requests if you want to could be useful in situations when you decline meeting requests fearing that a want to accept meeting requests from conflict could arise due to recurring your team members or colleagues. meetings. Generally, recurring meetings To automate meeting responses, do the span over a period of time and can flood following: your calendar with too many schedules in 1. Go to Tools > Options. Select no time hence it is recommended to use Calendar Options under Calendar Group. this option in this case. 2. Click the button Resource SESSION 13: MANUALLY MODIFY A Scheduling… in the Advanced options JOURNAL ENTRY section. A window similar to the one below appears. RELEVANT KNOWLEDGE In real work life, it is important to track your time and tasks and thus document the efforts needed to complete a project. As you know, using the Journal feature you have a way to track time, tasks, and “project manage” your assignments. In an earlier session, you learnt to set up journal to track time automatically. You Page 118 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query can also track journal entries manually select Start Timer. Notice the Start Timer using the email messaging software. is grayed out and Pause timer is available You can record time spent on a variety of indicating the progress of this Journal. items such as meetings, phone calls, etc. 6. When you are ready to dial the call, by recording journals manually. For select Start Timer. Notice the Start Timer billing purpose (when the time spent on is grayed out and Pause timer is available an activity is billed to the client), you indicating the progress of this Journal. want to know the amount of time spent 7. You can use the text area to record on an activity. This tracking can also help the comments of this call. Once the call is in effective time management. complete, select Pause Timer. For example, if you want to record the 8. Click Save & Close. Notice the time spent on a phone call, do the Journal entry is created and displayed in following: your calendar (figure below). 1. Open your calendar software. 2. Select Go > Journal. Now create manual entries for activities such as meeting, sending letters, etc. using the procedure outlined in this 3. Select File > New Journal Entry. A session. window similar to the one below appears. SESSION 14: REPLY TO A TASK REQUEST RELEVANT KNOWLEDGE When working together as a team, you may have a list of tasks assigned to each person in the team. For example, if you want to organize a school annual day 4. Enter the following details: function, a team is formed and tasks are a) In the Subject: text box, type A/C assigned to each student. This makes it Repair Service, Maintenance Feedback easier to complete the project on time. Call. This is also called work delegation. The b) Select Phone Call from the Entry same scenario exists in a real work life. Type: dropdown menu Tasks can be assigned to coworkers and c) If you plan to complete this call subordinates. Each Task has a due date, within ten minutes (based on your a priority, and other settings such as experience), select 10 minutes from whether you want status updates, privacy Duration: dropdown menu. options, etc. 5. When you are ready to dial the call, Page 119 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query You have learnt to create tasks in earlier sessions. You can create task requests for others using the email messaging software. Create a task If you want to assign an existing task from your calendar, do the following: • Open your calendar software • Select Go > Tasks • Create a task, for example: • Select Assign Task from Manage • Subject: Collect donation from all Task group. A window similar to the one students below appears. • Select a target date from Start Date: and Due Date: dropdown • Use the Task body to include task items or instructions for this task. • Notice the Owner: field (Currently you are owner of this task) (figure below). • Select Save & Close. Notice the task is created in your task list (image • Select To…, and then select the below). contact (whom you want the task assigned) from your address book. • Select the schedule using Start Date: and End Date: to indicate timelines for the activity. • To keep track the progress of the assigned task, select both Keep an updated copy of this task on my task list and Send me a status report when this Assign a task task is complete. • Click OK. A window similar to the one below appears. To assign this task to someone, do the following: • Doubleclick the task to open the task (figure below). • You have assigned the task to the contact. To send this task, select Send. Page 120 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query The task is sent to the contact through Do you notice a difference? List them out. email. Sending updates • Accept the request (Recipient’s Now the assignee will send updates of the end) progress and complete this task. To send The contact(s) whom you have assigned an update, you need to do the following: this task to receive a notification on • Open the task to be updated. opening their email (refer figure below). • In the task form, enter the updated information. Any previously entered information can be modified and new information added. Note: To view who will receive updates, select Details. The Update List line displays the user name(s) of who will receive updates. • On the task request tool bar, click The contact(s) can either Accept or Reject Save & Close. A task update is the request. If they select Accept, the task automatically sent to those on the update will is added and can be viewed in their list. Tasks list (figure below). Once the task is completed, the sender can indicate so by doing the following 1. Select Mark Complete Mark Complete in Manage Task group to indicate to the sender that the task is complete. 2. On doing so, an email is automatically sent to the contact who originally assigned this task. The sender (Original owner) receives a Once the task is accepted, the ownership mail similar to the one below: is transferred and now when you view the task by double clicking on it, you see the following details: Sender’s task list is automatically updated with the status of this task and can be viewed in their task list as being struck out.(figure below): Page 121 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query This method of assigning existing tasks from your task list can also be used when To view the status of the task, do the the task is originally assigned to you and following: you to transfer the task to someone else. a) Select Go > Tasks Tracking task status b) Doubleclick on the task. A window Just because you delegate a task to similar to the one below appears: someone does not mean your responsibility is over. Hence, even though you assigned a task to someone else, you will still need to keep track of the progress on the task. This helps to avoiding any last minute surprises. You will receive a status report from the recipient similar to the one below: c) Notice the Status: displayed as In Progress as updated by the recipient. Also notice the highlighted message above subject indicating the deadline and the date & time of the last update received. IT/ITES 307: COMPUTER NETWORKS SESSION 1: INTRODUCTION TO computers or devices connected to provide NETWORKING access to resources. Resources include a range of devices (example, Printer, RELEVANT KNOWLEDGE CDROM, Hard Drives, etc.) and services A computer network, often simply (example, web service, mail service, etc.). referred to as a network, is a collection of Networks are used widely used for web computers and other hardware browsing, file transfers, file & printer components interconnected by sharing, etc. and has become an integral communication channels that allow part of our daily activities. Today, sharing of resources and information. networks are now popular across private A network may consist of one or more and business users across the globe making it difficult to work without it. Page 122 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Networks can also help in reducing costs; meant for a maximum of 1020 for example you can buy a single printer, computers. Herein, each computer can act attach it to a single computer and share it both as a server as well as a client. P2P across multiple users. networks are simple to setup and use, Networks based on size are broadly normally home and small office networks classified into LAN & WAN. fall in this category. P2P networks are 1. LAN: Local Area Network refers to also referred to as the Workgroup model group of computers networked within a and have their own security database, i.e. limited geographical area such as schools, User accounts are present on each and colleges, offices, etc. every computer on a network. 2. WAN: Wide Area Network refers to computers networked across geographical areas, in other words they connect LAN's between different locations. For example, computers or devices in a branch office Fig. PeertoPeer Network could connect to the computer networks Client/Server: These are large networks at the head office through telephone lines with 10 to hundreds of computers and or satellites. may have dedicated servers and devices. Ways to form a computer Network Office networks that require centralized There are several ways to form a network security and administration fall in this as listed below: category. Common servers on these • Use a crossover cable (also networks include File Servers, Print referred to as Peertopeer cable) Servers, Messaging Servers, Database • Use Serial and Parallel ports Servers, Domain controllers, etc. • Use Bluetooth • Use WiFi (for more than two computers) • Use Hub or Network Switch (for more than two computers) Fig. ClientServer Network • SOHO Router or WiFi Router Note: Clients are referred to as "Service (Commonly found in home & small Requestors" and Servers as "Service business networks) Providers". Any machine that request a Though technically it is possible to service is called as the client and connect computers using the above machines that fulfill the requests is called mentioned options, practices such as the client. using a crossover cable, WiFi or a Networks can have a combination of both network switch are most common Client/Server models and PeertoPeer. methods. The technology or option choice For example, you may be using a is generally based on the number of centralized mail server and/or access files connections, speed and distance from other machines in the network. constraints. Intranet Networking Models Intranet refers to private computer PeertoPeer(P2P): This is usually network used by organizations for Page 123 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query sharing resources; Intranets can be International Standards Organization simple within a building or very large (ISO) to provide a conceptual model for spread across the globe connected networking. The OSI model describes how through various networking technologies. data is sent and received over a network. Intranets help employees of an This model breaks down data organization to locate information much transmission over a series of seven layers. faster resulting in increased productivity. Each layer has a responsibility to perform Though popularly referred to a company’s specific tasks regarding sending and internal website or portal, Intranet receiving of data. All the layers are usually employs other protocols such as needed for a message to reach its POP3, SMTP, FTP, etc. and may even destination. offer a variety of services (you will read The OSI model provides the standard for more about these in later sessions). communication so that different Extranet manufacturers' computers can be used on Extranet is a computer network used the same network. Though each layer in outside the Intranet. For example, an the model performs a specific function, all organization may allow a vendor to view the layers have one common function to or access their resources such as their communicate with the layers above and internal website for updating a product below them in the model. catalog or training material. However, this is highly restricted to Internet users (public). Extranets are usually accessed using VPNs (you will read more about this protocol later). Internet Referred to as network of networks, the Internet uses TCP/IP protocol suite. Internet consists of billions of computing devices and is the largest network in the Data flow in the OSI Model world. Internet is used for various Data sent from one computer to another on a purposes such as network flows two ways in the OSI model, browsing, email, Down (data encapsulation) and Up (data chatting, social decapsulation). OSI model ensures that networking, everyone follows certain guidelines and online shopping, hence each computer is able to etc. communicate with every other computer, regardless of whether one computer is a Macintosh and the other is a PC. SESSION 2: THE OSI MODEL For example when data is sent by a network application such as a web RELEVANT KNOWLEDGE browser to the application layer, the In 1978, Open Systems Interconnect application layer adds specific (OSI) model was introduced by the information and passes on to the Page 124 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Presentation layer. Likewise presentation Address. layer adds presentation layer specific • Network Interface Cards, Bridges information and passes the result to and Switches operate at this layer. session layer. This process is repeated till • Unit of measurement in data link Physical layer. Process of adding layer layer is frames (data packet). specific information is termed as • Protocols include Ethernet, PPP, “encapsulation”. SLIP, Token Ring, etc. On the receiving computer, the various • This layer can be subdivided into headers and the data trailers are stripped two layers: off one by one by each layer and passed ◦ Logical Link Control (LLC). on to the next upper layer till the packet • Media Access Control (MAC). finally reaches the receiving process. c) Network Layer, is also referred to Process of removing layer specific as Layer 3. This layer: information is termed as “decapsulation”. • Logical addressing and routing functions. • Handle routing of packets. • Routers operate at this layer. • Unit of measurement in network layer is packets or datagram. • Protocols include IPv4, IPv6, IPX, RIP, OSPF, ICMP, etc. d) Transport Layer • Ensures endtoend communication and errorfree transmission. Seven layers of OSI model are: • Provides connection/connectionless a) Physical Layer oriented packet delivery & Sequencing. • Only layer that deals with • Unit of measurement in transport hardware – media, signals and binary layer is segments. transmission. • Protocols include TCP, UDP, etc. • Modulate and demodulate signals. e) Session Layer • Define Electrical signals and • Manages user sessions and cabling specifications. dialogues (Logon/Logoff). • Unit of measurement (called as • Controls establishing, maintaining Protocol Data Units, PDU) at physical layer (synchronizing) and terminating sessions is bits. (conversations)/logic links between users/ • Hubs & Repeaters Operate at this network applications. layer. • • Protocols include 100BASET, Protocols include NetBIOS, PAP, 1000BASESX, DSL, etc.. PPTP, L2TP, etc. b) Data Link Layer f) Presentation Layer • • Delivery of frames between Specifies architectureindependent stations in a network. data transfer format. • • Physical addressing using MAC Encodes/ decodes, encrypts/ decrypts, compresses/decompresses data. Page 125 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query • Protocols in this layer include IEEE 802.10 LAN / MAN Security ASCII, EBCDIC, MIDI, SSL, TLS, etc IEEE 802.11 Wireless LAN g) Application Layer Wireless Personal Area • Responsible for processtoprocess IEEE 802.15 Network communication. • Provides standardized services SESSION 3: TERMINOLGIES AND such as virtual terminal, file and job TECHNOLOGIES transfer and operations (provides services to endusers such as browsing, email, file RELEVANT KNOWLEDGE transfers, etc.). • Protocols include HTTP, FTP, Signaling Methods SMTP, POP3, DNS, DHCP, NNTP, etc. In a network, communication happens Note: Unit of measurement at Session, between devices or computers through Presentation & Application layers is data. electrical, optical or radiowave signals. Hint: A simple acronym that will help Methods of signaling are widely you to remember the layer names is All categorized into baseband and broadband. People Seem To Need Data Processing. • Baseband: Data is sent as digital Physical layer is concerned with signals by using entire bandwidth of the hardware and the rest with software. media (Single Channel), supporting single IEEE 802 Standards communication at a time. Signals are IEEE (Institute of Electrical and sent over coaxial, twisted pair or fiber Electronics Engineers) is an international optic cables. Baseband supports higher nonprofit organization that set transfer rates as compared to broadband; standards, IEEE 802 deals with LAN and however, baseband is limited with WAN related technologies. Services and distance. Baseband uses TDM (Time protocols specified in IEEE 802 map to Division Multiplexing) to send multiple the lower two layers (Data Link and signals over a single cable. Example: Physical) of the sevenlayer OSI Ethernet, Token Ring & FDDI. networking reference model. In fact, • Broadband: Data is send as IEEE 802 splits the OSI Data Link Layer analog signals by using portion of a into two sublayers named Logical Link bandwidth. Broadband supports use of Control (LLC) and Media Access Control multiple signals at different frequencies (MAC). Following table summarizes the (multiple channels). Signals are split into IEEE 802 standards. channels by using FDM (Frequency Standard Description Division Multiplexing). Example: xDSL, IEEE 802.1 LAN/ MAN Management where telephone lines are used for both IEEE 802.2 LLC voice (telephone) calls and data (Internet IEEE 802.3 Ethernet connectivity). IEEE 802.4 Token Bus IEEE 802.5 Token Ring IEEE 802.7 Broadband LAN IEEE 802.8 Fiber Optic LAN / MAN IEEE 802.9 Isochronous LAN Page 126 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query can be sent at the same time over a single channel using this technique. For example, a device sends multiple signals at the same time using different frequencies similar to that of a radio (FM) or cable TV and the end device receives Fig. Baseband vs. Broadband by tuning in to a particular channel. Channel Operation Data Transmission methods Channel operation refers to the mode of Data can be transferred over a network communication between connected using the following techniques: devices or computers. Channel operation a) Circuit Switching: In this can be simplex, halfduplex or fullduplex. method, a dedicated path is established Simplex is a one way communication, between the endpoints before the data is similar to that of a radio. Halfduplex is a transferred. Once a dedicated path is two way communication but only one way established, no other devices can use the at a time, similar to that of a circuit. Example: DialUp, ISDN. walkietalkie. Fullduplex is two way b) Packet Switching: In this simultaneous communication (data can be method, data is divided into blocks received and sent at the same time), referred to as packets. Multiple packets similar to that of a telephone. can be sent via different paths allowing Multiple Signaling Methods more than two devices to communicate at When multiple devices or computers are the same time. Modes of operation can be connected in a network, they use multiple connectionless or connection oriented. signals that are combined at the source ◦ In connectionless mode, packets and separated at the destination by use of have source & destination address for a technique called multiplexing. For routing that may take different paths. multiplexing, a device called the Example: Ethernet, IP, UDP. multiplexer is used for multiplexing / ◦ In connectionoriented mode, demultiplexing signals. Types of connection is defined (a virtual circuit is multiplexing include: created) before a packet is transferred. 1. TDM (Time Division Packet switching supports variable Multiplexing) is a method in which packet sizes. Example: X.25, Frame multiple signals are combined and send Relay, TCP. over a single transmission media such as c) Cell Switching: Cell switching wires or radio waves. This is achieved by method is similar to that of packet use of time sharing; multiple signals are switching but has a fixed size for the cells transmitted for a defined amount of time transmitting data. Cell switching is in cycles. For example, a device sends and efficient when large amounts of data need receives signals every alternate second. to transferred. Example: ATM. 2. FDM (Frequency Division Channel Access Methods Multiplexing) is a method in which Channel access methods refer to how multiple signals are transmitted at devices communicate using a shared different frequencies. Multiple signals medium such as bus networks, star Page 127 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query networks, ring networks, hub networks & connects to a hub that represents only wireless networks. When multiple devices one collision domain and only one or computers are used in a shared broadcast domain. Modern wired medium, a predefined method of networks use a network switch to transmission needs to be defined. eliminate collisions. By connecting each Channel access methods in circuit device directly to a port on the switch, switching networks include FDM, TDM, either each port on a switch becomes its etc and in packet switching networks own collision domain (in the case of half include CSMA/CD, CSMA/CA, Token duplex links) or the possibility of passing, etc. collisions is eliminated entirely in the Ethernet case of full duplex links. Collision Ethernet is a family of computer domains are also found in wireless networking technologies for local area networks such as WiFi.; CSMA/CA is networks (LANs) and has largely replaced used in wireless networks. competing wired LAN technologies. CSMA/CA Ethernet standard defines how Carrier sense multiple access with communication happens between network collision avoidance (CSMA/CA) is a interface cards, hub, switches, repeaters, network multiple access method in which etc. Devices on Ethernet networks use nodes attempt to avoid data collisions by frames or Ethernet frames for transmitting only when the channel is communication. IEEE 802.3 standard sensed to be "idle". Token Passing defines the Media Access Control (MAC) Token passing is a channel access method portion of the data link layer and the where a signal called a token is passed physical layer of the OSI model. Ethernet between nodes that authorize the node to protocols are covered by this standard. communicate. The most wellknown CSMA/CD examples are token ring and ARCNET. CSMA/CD (Carrier Sense Multiple Addressing methods Access/Collision Detect) as per IEEE When multiple computers or devices are 802.3 standard is a mechanism that connected in a network, signals can be defines how transmission takes place in a addressed as: network. Only one device in the collision 1. Unicast refers to onetoone domain may transmit at any one time, communication, for example signal is sent and the other devices in the domain listen from one computer to another. to the network before sending any 2. Multicast refers to onetomay packets in order to avoid data collisions. communication, for example signal from Collisions also decrease network one computer or device is sent to selective efficiency on a collision domain. If two set of computers or devices. devices transmit simultaneously, a 3. Broadcast refers to onetoall collision occurs, and both devices device communication, for example single from will wait for a random amount of time one computer or device is sent to all before attempting to transmit again. devices and computers in a network. Collision domains are found in a hub environment where each host segment SESSION4: NETWORK TOPOLOGIES Page 128 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query & ACCESS METHODS troubleshooting can be difficult. Though bus topology is the simplest form RELEVANT KNOWLEDGE for connecting multiple computers, issues In communication networks, a topology shows may arise when two computers have a the layout and describes the arrangement of need to transmit at the same time. To a network. A graphical representation of a handle such collisions, CSMA/CD protocol physical network is best illustrated through is used in Bus (Ethernet) topology. There are two ways of showing implementations. IEEE Standards network geometry: the physical topology and related to bus topology are 10BASE2 the logical (or signal) topology. (Thinnet) and 10BASE5 (Thicknet). Physical topology refers to the placement of Star Topology network components including device Star topology is the most common and (computers and network peripherals) location & cable installation. Logical topology refers to widely used topology today. Each how data is sent or received in a network. computer is connected to a centralized Basic topologies include Bus, Star, Ring, device called the hub or switch using Mesh and Hybrid. dedicated cable such as the TwistedPair. Bus or Linear Topology All signals need to pass through the In bus topology, each node (computer) is centralized device. Star topology is connected through a single cable (known considered to be the easiest topology to as backbone or trunk) used as a common design and implement as adding transmission medium for communication. additional nodes is simple and easy to Signal from the source computer travels troubleshoot in case of single cable to all computers connected to the cable failure. However, entire network is until the destination computer accepts affected if the hub or switch goes down. the data; if not, the machines ignore the data. Hub Switch RJ45 Fig. Bus or Linear Topology Nodes are interconnected using coaxial cables through the TConnector that splits the connection between nodes. Ring Topology Terminators are used at both ends to In a ring topology, each node connects to absorb the signal. exactly two other nodes, forming a single A device called the Repeater is used to continuous pathway for signals through amplify and retransmit weak signals to each node. Data travels from node to cover longer distances. Advantages include node, with each node along the way ease of installation and low cost; however, handling every packet. Ring topology since all the computers depend on a single provides only one pathway between any cable, a single break or loose connection can two nodes, ring networks may be cause the entire network to be down and disrupted by the failure of a single link. A Page 129 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query node failure or cable break can isolate 3 ernet) Mbps MHz ted Pair/8 every node attached to the ring. Ring CAT Data (Fast 100 100 FourTwis topology uses physical star topology and 5 Ethernet) Mbps MHz ted Pair/8 CAT Data (Gb 1000 100 FourTwis logical ring for communication. 5e Ethernet) Mbps MHz ted Pair/8 Devices used in ring topology include the Token Ring Network Interface card, • CAT 1 is primarily used on Twister pair or fiber optic cables telephone networks (PSTN), ISDN connected to a centralized device called connections the MSAU (Multistation Access Unit). • CAT 2 7 is used for data transmissions (Computer Networks) IEEE Standards related to star topology are 10BASET, 100BASETX, 1000BASET & 10GBASET. Maximum distance supported by twisted pair is 100 meters. Twistedpair Ethernet cables can be wired "straightthrough" or “Crossover”. Other topologies include the Mesh To connect a network interface card to a Topology where all nodes are connected to switch, hub or router, straightthrough or each other one way or the other and the patch cables are used. Hybrid Topology which is a combination To connect similar devices (network of one or more topologies. interface card on computer to another Twisted Pair network interface on another computer, TwistedPair cables are widely used in hub to hub or switch to switch), crossover Local Area networks and telephone cables are used. networks. In a twisted pair cable, two conductors of a single circuit are twisted Pin No. T568B T568A together for canceling out electromagnetic (RJ45) interference (EMI) from external sources. 1 White / White / Types include the UTP (Unshielded Orange Green Twisted Pair) and STP (shielded Twisted 2 Orange Green Pair). 3 White / White / UTP cables are found in Ethernet Green Orange networks and telephone systems. RJ45 4 Blue Blue (Registered Jack) connectors are used to 5 White / White / connect the twisted pair cables to Blue Blue endpoints on computer networks. RJ11 6 Green Orange is a connecter used on telephone 7 White / White / networks. Some of the UTP cable grades Brown Brown include: 8 Brown Brown Spee Pairs / Table: Straightthrough & Crossover reference Type Use d MHz Wires Fiber Optic CAT Voice (Tel < 1 1 TwoTwis 1 ephones) Mbps MHz ted Pair/4 A fiber optic cable is a cable containing CAT Data (Eth 10 16 FourTwis one or more optical fibers. FiberOptic Page 130 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query cables are ideal for transmitting data over very long distances at great speeds TCP/IP Utilities as light is used for the medium for On computers that have support for transmission. Fiber optic cables are not networking, a list of utilities is available susceptible to any EMI, Nearend to configure and troubleshoot network Crosstalk(NEXT), or Farend Crosstalk related issues. Often referred to as (FEXT). TCP/IP utilities, these utilities are Note that you require special network bundled along with the operating system. interface cards & network switch that Though the names of the utilities could support the fiber optic interface which is vary in spelling, the underlying function usually expensive and common only in is almost the same across operating large enterprise networks or locations systems. Given below is a list of utilities that are susceptible to EMI such as (with simple description) You will learn factories that use heavy machineries. more about them in later sessions. FiberOptic cables consist of a high Utility Description quality glass or plastic strands and a IPCONFIG Internet Protocol plastic jacket made of Teflon or PVC that Configuration Utility protects the cable. GETMAC View MAC or Physical Two types of FiberOptic cable exist: Address of an NIC SingleMode Fiber (SMF) used for longer PING Test network connectivity distances and MultiMode Fiber (MMF) TRACERT Trace Route from source used for shorter distances. Signals are to destination transmitted as light signals from source ARP Resolve IP address to to destination. Either LED or Laser is MAC address used. In multimode fiber, light signals Hostname View computer name or are transmitted in numerous dispersed hostname path (singlemode fiber use single light NETSTAT View TCP/IP statistics source) and making it unsuitable for long Nbtstat View NetBIOS over distance transmissions. TCP/IP statistics Nslookup View DNS related information 1. Core, 2. Cladding, 3. Buffer, 4. Jacket Route View or modify routing In some cases, plenum rated cables are table used that have a special jacket to protect PATHPING Trace packets and view against fire and emit less smoke than detailed packet normal cables. However, this is rare and information often seen only in industrial or manufacturing sites. Note: Use /? for additional help/syntax for each command listed here. For SESSION 5: NETWORK HARDWARE: example to know more about IPCONFIG, NETWORK INTERFACE CARD (NIC) type IPCONFIG /? Network devices such as NIC, hub, RELEVANT KNOWLEDGE bridge, switch & routers are devices that Page 131 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query help computers to network and administrators need to configure or communicate. There are a variety of modify NIC settings to match their network devices equipped with a wide network environment. Common settings range of functions. found in most NIC include settings for Network Interface Card (NIC) controlling speed & duplex modes, WOL Network cards are devices that connect settings, Power Management, VLAN computers to the network. Network cards settings, etc. are both Layer 1 (Physical) & 2 (Data Network Interface Cards have one or Link) devices as they provide physical more LED (Light Emitting Diodes) to access to the medium and also provide indicate network conditions like Link physical addressing through the MAC status, Network Speed, etc. Usually there Address. are Light Emitting Diodes to indicate Network Interface Cards are available for Link/Speed (labeled as LINK) and desktop, laptop and server computers. A activity (labeled as ACT). For example variety of interface such as PCI, CardBus, solid green could mean the device is USB are available today. Most desktops, properly connected to a switch auto laptops, servers and motherboards have negotiated at 100 Mbps / full duplex, builtin NIC. blinking orange could mean network activity, no light indicate a problem with PCI Cardbus USB network connection, etc. Ethernet Ethernet Ethernet Lab: View status indicators in a network Card for Card for Card interface card. use in use in (USB Lab: View connectivity status through an Desktops older Ethernet Operating System. laptops converter) Lab: View connectivity status through an Operating System. 1. Click Start > Run and type NCPA.CPL Then click OK. 2. Rightclick Local Area Connection, and click Status. Lab: View Network Interface card installed on a computer Device Manager is a utility used for configuring & troubleshooting hardware devices such as Network Interface card, sound card, video card etc. Device manager display the status of devices along with error codes if any. It is commonly used for updating device drivers, disabling/reinstalling devices etc. Ref.http://support.microsoft.com/kb/310123 NIC’s mostly work out of the box, but there might be instances where Page 132 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 1. Lab: View settings of a Network interface card. MAC addresses are Interface card. integrated with the NIC and usually not 2. Click Start > Run and type possible to change. On a network, each Devmgmt.msc. Then click OK. station is identified by its MAC Address. 3. Device Manager opens. Expand MAC Addresses are governed by IEEE 48 Network Adapters. and use 48bit (2 ) addressing scheme 4. Doubleclick on the Network providing a total of 281,474,976,710,656 Adapter (For example, RealTek RTL MAC addresses. GETMAC is a command line utility used 8139 Family PCI Fast Ethernet NIC). for viewing the MAC address of an NIC. Network Adapter properties is displayed. Lab: View MAC Address of a Network Interface Card using GETMAC. 1. Click Start > Run and type CMD to activate the command screen. Click OK. 2. Type GETMAC. Notice the MAC address displayed. Lab: View MAC Address of a Network Interface Card using IPCONFIG. Autonegotiation 1.Click Start > Run and type CMD to Auto negotiation is an Ethernet activate the command screen. Click OK. procedure by which two connected devices 2.Type IPCONFIG/ALL. Notice the MAC choose common transmission parameters, address displayed under Physical such as speed, duplex mode, and flow Address. control. In this process, the connected devices first share their capabilities regarding these parameters and then choose the highest performance transmission mode they both support. Due to affordability of high speed devices (NIC & Switch), 100 or 1000 Mbps speed and full duplex settings are used usually through autonegotiation, eliminating the need to configure this setting. MAC Address Also known as physical address, MAC Boot ROM Addresses are unique to each network Normally operating systems are installed Page 133 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query on the computer. However, if the connect network segments and separate computer does not have an operating network traffic based on broadcasts. system installed, you can configure the Bridges examine the frames and computer to load an operating system selectively transfer frames according to from another computer on its network. To their MAC address. Bridges operate at load an operating system from another Layer 2 of the OSI Model. computer on the network, these Switch: Switch or Network Switch is computers require a special chip called similar to hub but manage traffic based the BOOT ROM. Boot ROM can be added on MAC address and are efficient in large to the NIC through a special socket or in networks. Switches are considered most cases today, it is often integrated intelligent as they build a table of MAC within the NIC. Computers that are not Addresses of devices connected to it and equipped with floppy disk drives or hard when each packet is received, they are disk drives (disk less workstations) to analyzed and forwarded to the device save cost and to keep the network secure, with matching MAC Address. can be used by loading necessary files Using switches can eliminate collision as from a remote computer on a network. each port in the switch acts as a collision Some computers such as public terminals domain. Since switches isolate collision used in libraries, schools, etc. rely on a domains, they are referred to as centralized computer for processing and multiport bridges. When forwarding storing capabilities; referred to as Thin frames, switches use Store and forward, Clients these computers load their cut through, Fragment free or Adaptive operating system and applications from a switching methods. Unlike a hub that much powerful computer. uses halfduplex communication, a network switch can send and receive at SESSION 6: NETWORK HARDWARE the same time (fullduplex mode) HUB, SWITCH & ROUTERS resulting in faster performance. Number of computers that you can connect to a RELEVANT KNOWLEDGE switch depends on the number of ports While setting up a network, you will come available (Typically 4 or 8 on SOHO across different types of hardware used. switches designed for use in home and The commonly used hardware are hubs, small business networks and 8 – 32 or 64 switches and routers. on switches designed for use in an Hub: Hubs are Layer 1 (Physical Layer) enterprise network.). The networks can devices that connect multiple computers. be extended by adding additional Number of computers that can be switches usually cascaded from the connected depends on the number of ports primary switch. Switches designed for available on a hub, typical 4 to 8 larger networks are cascaded through a computers. Hubs broadcast data to all special port called the Uplink port. devices connected to it leading to collisions; hence they are referred to as multiport repeaters. Bridge: Bridge is a device that can Page 134 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query provide electrical power supply through Ethernet cables; generally, UTP cables carry only signals necessary for data communication. Switches that have support for PoE are generally expensive and in some cases only limited number of Ethernet ports are capable of supporting PoE. Advantages of PoE include the ability to provide power up to 25 watts and distance factor that allows devices to Simple Network Setup. be connected up to 100 meters from the switch. Router Routers are Layer 3 devices that route packets to different logical networks. Routers can discover and transfer packets based on routing table that are predetermined or selfdiscovered. Routing tables are either managed by an administrator by manually defining the An Enterprise network with a variety of routes or automated through special networking devices. configuration to exchange the routing Categories of switches include: tables with other routers on a logical • Unmanaged switches are network network. SOHO Routers are found in switches used typically for homes or small home and small business environments offices requiring no administrative and Enterprise Routers are found in ISP’s configuration. and enterprise networks. • Managed switches are widely used in enterprise networks and ISP’s. These need to be configured by the network administrator before it is used in a network. SOHO Router Enterprise Router VLAN A single layer2 network can be Notable manufacturers of routers include partitioned to create multiple distinct Cisco, Nortel Networks, Avaya, HP, Dell, broadcast domains, enabling data to be Huawei, etc exchanged only between the computers SOHO Router within the domain. This is referred to as Also referred to as a residential gateway, VLAN or Virtual LANs. This is created to SOHO (Small Office Home Office) routers reduce collisions and to implement are devices designed for use in small to security. medium sized networks. Most SOHO Power over Ethernet routers have combinations of a switch, PoE describes a standardized system to DSL or cable modem and an access point Page 135 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query for WiFi connectivity. These devices are computers with MAC OS. However, when used for two primary purposes: connecting computers with different 1. Connecting desktops & laptops operating systems you need to use a across home or office. standardized protocol such as the TCP/IP 2. Sharing a single Internet protocol. connection across desktops & laptops. Proprietary & Open Standard Some models include support for Protocols connecting peripherals such as printers, Proprietary protocols are communications USB hard disk drives, etc. through USB protocol owned by a single organization or ports. individuals. Usually proprietors enforce technical and licensing restrictions through patents to keep the specification SESSION 7: PROTOCOLS as a trade secret. Examples include NETBEUI from Microsoft, IPX/SPX from RELEVANT KNOWLEDGE Novell, AppleTalk from Apple, etc. Protocols are a set of standards that allow Open Standard protocols are network devices to communicate and communication protocols that are publicly exchange information. Protocols define available, have various rights to use how devices start, manage and end associated with it, and may also have communication; most protocols are various properties of how it was designed. described by IETF (Internet Engineering Example, TCP/IP. Task Force) as RFC's (Request for TCP/IP Comments). TCP/IP (Transmission Control Protocol / Protocols are set of rules for Internet Protocol) is a routable protocol communication. In a computer network, suite that is also known as the Core all computers need to use the same Protocol of the Internet Protocol protocol for communication. Protocols Suite. TCP/IP has gained popularity as it may include signaling, authentication is very efficient in very large networks; and error detection and correction most operating systems include support capabilities. Protocols address data for TCP/IP. Unlike many other protocols, formats, address formats, error detection TCP / IP have the following benefits: techniques, sequence & flow control, 1. Open Standard (not tied to any routing and other requirements for vendor unlike proprietary protocols) communication. In a network, multiple 2. Enable communication between protocols are used during communication. different Operating Systems (almost Examples of protocols at the network every operating system including flavors layer are NetBEUI, IPX/SPX, TCP/IP, of Unix, Windows, Mac OS support TCP / AppleTalk, etc. IP) The NetBEUI protocol is used to connect 3. Runs on any network framework and communicate between computers (Ethernet, Token Ring, DialUp with Microsoft Windows as the operating connections) system. Similarly AppleTalk protocol is 4. Routable & a common addressing used to connect and communicate among scheme. Page 136 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query TCP/IP protocol suite is the most widely used protocol today including LAN’s and WAN’s. Internet uses TCP/IP as its protocol. IP Internet Protocol is the primary communication protocol used for relaying data across network boundaries. IANA Functions include logical addressing and Internet Assigned Numbers Authority routing. The first major version of IP, (IANA) is the entity that oversees global Internet Protocol Version 4 (IPv4), is the IP address allocation, autonomous system dominant protocol of the internet. Its number allocation, root zone management successor is Internet Protocol Version 6 in the Domain Name System (DNS), (IPv6), which is increasingly being used. media types, and other Internet IPv4 Protocolrelated symbols and numbers. IPv4 is a connectionless protocol for use IANA is a department operated by the on packetswitched Link Layer networks Internet Corporation for Assigned Names (e.g., Ethernet). It operates on a best and Numbers, also known as ICANN. effort delivery model; in that it does not IANA manage the IP Address space guarantee delivery, nor does it assure through regional Internet registries proper sequencing or avoidance of (RIRs) to allocate IP address blocks duplicate delivery. These aspects, across the globe. including data integrity, are addressed by Classful Network an upper layer transport protocol, such as Classful network is an addressing the Transmission Control Protocol (TCP). schedule originally introduced in 1981 IP (IPv4) use a 32bit address that will and used for several years until the provide 4,294,967,296 (232) possible introduction of CIDR method. In this addresses and has two parts: Network ID method, the 32bit address space is (Portion of the address that represents divided into five addresses classes namely the network that a device belongs to) and A, B, C, D and E. Each class defines a Host ID (Portion of the address that fixed network size and number of hosts represents the host on a particular within networks. network). Network & Host portion of an Following table summarizes the classes of IP address is decided based on an IPv4 addressing: s additional value called the Subnet Mask. s No. of a Each device on an IP network must have l Range Subnet C Networks a unique IP address for communication. 0.0.0.0 IP addresses are binary numbers (image A 126.255.2 255.0.0.0 126 below), but they are usually stored in text 55.255 files and displayed in humanreadable notations such as 10.3.5.10 (image below). 128.0.0.0 B 191.255.2 255.255.0.0 16,384 55.255 Page 137 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 192.0.0.0 IP addresses assigned to a host or a 255.255.255 C 223.255.2 2,097,152 computer can be public or private. .0 55.255 Public IP Address Public IP addresses are IP addresses 224.0.0.0 obtained from an ISP by organizations to D 239.255.2 Multicast provide services such as web hosting, 55.255 email, etc. This is similar to that of a cell 240.0.0.0 phone number that is required for your E 255.255.2 Reserved for future use make and receive phone calls. If you want 55.255 to provide a service such as free email for users (like Gmail) or an online shopping Examples of Class A IP Addresses: mall for your customers, you must have a 5.2.2.1, 12.1.1.14, 72.34.23.23 public IP address assigned to the Examples of Class B IP Addresses: computer serving such requests. 129.1.2.3, 160.2.3.34, 190.2.3.4 When you rent or lease an Internet Examples of Class C IP Addresses: connection from an ISP such as DSL, 200.12.3.4, 202.13.14.15, 220.3.2.3 Cable, Dialup, etc. you are given only a dynamic IP address that changes in most IPv6 cases every time you reconnect; ISP’s Internet Protocol version 6 (IPv6) is the issue the same IP address to different latest revision of the Internet Protocol customers on a rotation basis to reduce (IP), intended to replace IPv4. IPv6 was the incurred cost. If you want to provide developed by IETF to address the IPv4 an Internet based service such as free issue of address exhaustion. IPv6 uses a mails or a website on your computer, you 128bit address, allowing for 2128, or need to get a dedicated or static IP approximately 3.4×1038 addresses, or address which can be leased from the ISP more than 7.9×1028 times more than IPv4. for a fixed fee. IPv6 addresses consist of eight groups of Private IP Address four hexadecimal digits separated by Private IP addresses are addresses used colons, for example: in private networks such as homes and 2001:0db8:85a3:0042:1000:8a2e:0370:733 internal office networks. Private IP 4. Most operating systems support IPv4 addresses need not be purchased as it is and IPv6. meant for private use and anyone can use SESSION 8: IP ADDRESS the private address without approval from a regional Internet Registry (RIR); RELEVANT KNOWLEDGE private IP addresses will not connect to As you have learnt about IP addresses in public address and vice versa. This is the previous session, you know that IP similar to that of extension numbers that addresses are seen as numbers or can be used only for calling each other numeric values such as 10, 192, 182, etc. telephone numbers with an office. However, computers use binary language The Internet Engineering Task Force and translate decimal to binary and vice (IETF) has directed the Internet Assigned versa behind the scene. Numbers Authority (IANA) to reserve the Page 138 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query following IPv4 address ranges for private Private or Public using IPCONFIG networks: Lab: Converting from Binary to Decimal Class IP address range & vice versa. A 10.0.0.0 – 10.255.255.255 Lab: Identifying Network & Host ID of B 172.16.0.0 – 172.31.255.255 the IP Addresses. C 192.168.0.0 – 192.168.255.255 Internet service providers (ISPs) only SESSION 9: IP ADDRESS allocate a single public IP address to each ASSIGNMENT residential customer, but many homes has more than one computer or other RELEVANT KNOWLEDGE Internet connected device, such as IP IP addresses are assigned by telephones or IP televisions. In this administrators either manually or situation, a network address translator automated through DHCP servers. In this (NAT/PAT) gateway is usually used to session, you will learn about IP address provide Internet connectivity to multiple assignment. hosts that translates private to public IP IP Address Assignment address and vice versa. Private addresses Internet Protocol addresses is assigned to are also commonly used in corporate or a host either on booting (when on the OS enterprise networks. starts), or permanently by a fixed configuration of its hardware or software. Subnet Mask Administrators can allocate and assign When you assign IP addresses, you need unique nonchanging IP addresses to to provide the subnet mask value. Subnet hosts or computers. Such addresses are masks are used for dividing logical called Static IP address. On large networks into one or more subnetworks, networks, administrators automate the a practice referred to as “subnetting”. IP address assignment using a special Providing a subnet mask helps devices or service called the DHCP that assigns IP computers calculate and indicate portions addresses automatically; such of network ID for a given IP address; this dynamically assigned addresses are in turn is used for determining if the host called Dynamic IP address. belongs to the same or different logical network. If the host is identified to be in a different logical network, then the packet is sent to the gateway IP address for routing. IPCONFIG is a command line utility used for managing IP configuration. IPCONFIG is used for viewing IP configuration of a computer; however, Static IP provided by Administrator for additional administrative tasks are also each computer or host (left) and a DHCP possible using this command. Server configured to assign a dynamic IP address through a predefined range. Lab: Determine if the IP address is If you want to host a website or provide Page 139 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query email services to employees or users, layer of the OSI model. generally you should use static IP Lab: Check network connectivity using addresses. If you want to provide Internet PING (LAN). access to users, you can use dynamic IP address. Dynamic IP addresses are assigned by a network device such as SOHO Router or Servers that have DHCP capability. Lab: Assign static IP address to computers. 1. Click Start > Run > Type NCPA.CPL > click OK. ARP or Address Resolution Protocol is 2. Rightclick Local Area Connection, used for resolving IP addresses to MAC Click Properties. address. When two computers 3. Select Internet Protocol Version 4 communicate using IP address (Layer 3) (TCP/IPv4) and click Properties. on the same subnet, IP address will be resolved to MAC address (Layer 2) and they start communicating using MAC Address through Network Switch. Thus ARP, a layer 3 protocol serves as an intermediate between Layer3 and Layer2 establishing connectivity between network layer and the Ethernet. Once resolved, mapping of IP Address to MAC addresses are stored in cache for Lab: To view IP Configuration some time for future use. Entries resolved (Command Prompt). automatically are referred as dynamic entries and is used most of the time. Lab: Use ARP to view current entries (Command Prompt). PING is a command line utility used for testing network connectivity. PING operates using ICMP echo request Loopback IP Address packets for its response from another Loopback IP address is a special IP computer and measures the time taken address reserved for testing local by the packet (from transmission to machine’s NIC or device drivers or reception referred to as RoundTrip). TCP/IP stack within the local computer. PING is widely used by administrators to It cannot be assigned to any computer understand and troubleshoot network and is implemented at the software level. related issues particularly at the network IP address in the range of 127.0.0.1 to Page 140 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 127.255.255.254 is reserved for loopback 0.0.0.0 Refers to unspecified IP address. However, 127.0.0.1 is most address indicating the commonly used for testing and absence of an IP address. management purposes by administrators. 255.255.25 Refers to the broadcast Lab: Test Loopback IP 5.255 address, used for broadcasting in a network. IP broadcasts are used by DHCP & BOOTP clients. 127.0.0.1 Referred to as loopback CIDR address, it is assigned to Assigning numbers based on Classful the internal network network was easier during early stages of adapter. networking networks were smaller. As 169.254.x. Reserved for Auto IP. time evolved, due to explosive growth of x the Internet, IP addresses were getting exhausted. An addressing scheme, CIDR SESSION 10: TRANSPORT LAYER (Classless Interdomain Routing), was PROTOCOLS – TCP & UDP introduced for efficient use of IP addresses. RELEVANT KNOWLEDGE If you have noticed, a Class A IP address While network layer protocols are used can accommodate 16 million hosts. for logical addressing and routing, However, in most organizations the transport layer protocols provide number of computers will be probably in endtoend communication between hosts thousands and not millions. Assuming if or computers on a TCP/IP Network. an organization has around 2000 Transport Layer Protocols computers, imagine the wastage of The transport layer provides convenient number of IP addresses if Class A was services such as connectionoriented data used. Similarly, a Class C IP address can stream support, reliability, flow control, accommodate only 254 host; and in the and multiplexing. Wellknown protocols same situation, the IP address range is at this layer are TCP & User Datagram insufficient and multiple ranges from Protocol (UDP). Class C will be needed. CIDR helps User Datagram Protocol (UDP) is a resolve these issues. transport layer protocol that is used for Lab: Use CIDR Method sending messages to other hosts on the Lab: Use the decimal to binary network without prior communications, conversion to determine network ID & to set up special transmission channels or Host ID by using CIDR Method. data paths. UDP does not provide Special IPv4 Addresses reliability, ordering, or data integrity. Given below is a list of special IP UDP assumes that error checking and addresses that cannot be assigned to any correction is either not necessary or computer as they are reserved for specific performed in the application, hence functions. avoiding the overhead of such processing IP Address Description at the network interface level. Page 141 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query UDP's stateless nature is also useful for different port numbers eliminating the servers answering small queries from need for having multiple IP address. For huge numbers of clients, such as Domain example, a computer assigned with an IP Name System (DNS), streaming media address 12.1.1.1 can run a web server applications such as IPTV, Voice over IP using port 80 and an FTP server using (VoIP), Trivial File Transfer Protocol port 21. (TFTP), IP tunneling protocols and many Port numbers range from 0 to 65,535 as it online games. uses a 16bit scheme (216 = 65,536). 0 is Transmission Control Protocol (TCP) reserved and cannot be used; actual range provides reliable, ordered delivery of a is between 1 to 65535. stream of bytes from a program on one Some network applications such as computer to another program on a network & Internet games, video different computer on the network. conferencing software, etc. may use a TCP is the protocol used by major range of port numbers for communication. Internet applications such as the World For example Apple’s QuickTime Wide Web, email, remote administration Streaming Server uses UDP as its and file transfer. UDP is used either by transport protocol in the 69709999 applications that have a builtin facility range. to check reliability or when transfers Note: To know about the port numbers happen that do not require reliability. and range for specific network UDP has less overhead than TCP. application, refer to product manual or TCP UDP the vendor’s website. Reliable Unreliable Note: To know about the port numbers Connection Connectionless and range for specific network Oriented application, refer to product manual or Segment No Sequencing the vendor’s website. Sequencing IANA WellKnown Ports Acknowledge No Acknowledgement Port numbers in the range from 0 to 1023 Segments are referred to as wellknown ports. Look Segment No retransmission at the following table that summarizes retransmission the standardized port numbers for and flow control common application layer protocols: Port Number Transport Description Ports & Sockets 0 TCP, UDP Reserved When a network application from a client attempts to connect to corresponding 20 TCP FTP (Data) network application to a server, the 21 TCP FTP (Control) operating system uses a combination of 23 TCP Telnet the assigned IP address along with a port number referred to as a socket for 25 TCP SMTP endtoend communication. 53 UDP DNS Query Computers that have single IP address 69 UDP TFTP can host a variety of services using Page 142 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 80 TCP HTTP 110 TCP POP3 111 UDP RPC 119 TCP NNTP NETBIOS 137 UDP Name Service 143 TCP IMAP4 161 UDP SNMP OSI (7 Layers) vs. TCP/IP Model (4 389 TCP LDAP Layers) 443 TCP HTTPS 1. Network Interface or Link Layer Note: See Service Name and Transport specifies how data is physically sent on a Protocol Port Number Registry of IANA network using electrical, optical or radio for complete list of assigned ports. waves. This layer includes devices such Port numbers from 1024 to 49151 are the as NIC that directly interface with a registered ports and are assigned by network medium such as a UTP Cable. IANA for specific applications from 2. Internet Layer specifies IP packets products from a variety of vendors. Port sent on a Packet Switched Network and numbers above 49151 are dynamic or is same as the Network Layer. private ports. 3. Transport Layer specifies how NETSTAT communication session takes place NETSTAT (i.e. Network statistics), is a between computers and is the same as command line utility used for viewing the Transport Layer discussed earlier. port numbers used by network 4. Application Layer specifies how applications. This command is used to applications and protocols communicate understand and troubleshoot any network between end points. This layer combines or transport later issues. Session, Presentation & Application layers of the OSI Model. Lab: Use NETSTAT to view Ports & Different applications use several status. Note: protocols that are a part of the TCP/IP Protocol Suite operating at each layer of the OSI model. Lab: Refer to common protocols TCP/IP protocol suite. TCP/IP model SESSION 11: SERVER OPERATING DoD (Department of Defense) or TCP/IP SYSTEMS Model simplifies the 7 layer OSI Model into a 4 layer model (figure below): RELEVANT KNOWLEDGE Server Operating Systems (SOS) are system software that allows us to manage Page 143 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query data, users, groups, security, Standard, Enterprise & Datacenter applications, and other networking Editions functions. SOS are commonly used on • Microsoft Windows 2008 Web, medium to large networks and uses the Standard, Enterprise & Datacenter client/server architecture. Editions Advantages Disadvantages • Microsoft Windows 2012 Centralized Initial cost can be Foundation, Essentials, Standard & Management high Datacenter Editions Higher Level of Requires special UNIX Security technical expertise UNIX is a multitasking, multiuser Can be accessed Requires regular computer operating system. UNIX from remote maintenance operating system is widely used in locations servers, workstations, and mobile devices. Server Operating systems include Based on UNIX Kernel, there are several support for a variety of functions (not variants available today. Following is a limited to): partial list of UNIX Variants: 1. Name Server (DNS, WINS, DDNS) • SUN Solaris 2. Database Server • IBM AIX 3. Communications Server • BSD OS 4. Mail Server • Digital Unix 5. File Server • HPUX 6. Print Server • MAC OS X Server, etc. 7. Proxy Server Linux 8. Web Server Linux is a Unixlike operating system 9. Remote Access Server assembled under the model of free and 10. Gaming Server open source software development and 11. Terminal Server, etc. distribution. Linux kernel was initially Generally, computers serving large conceived and created by Finnish number of requests and/or offering computer science student Linus Torvalds multiple services require powerful in 1991 and today, Linux kernel has hardware and appropriate support from received contributions from thousands of the Operating system. Popular server programmers across the globe. operating systems listed below are It is one of the leading Operating System designed to support such hardwar.: used on Servers, Mainframes, Smart Microsoft Windows Servers Phone and Supercomputers. Users & Windows Servers refers to the brand of administrators operate a Linuxbased Server Operating Systems released by system through a command line interface Microsoft. Following are the list of Server (CLI) or a graphical user interface (GUI). Operating Systems till date: Linux is packaged in a format known as a • Microsoft Windows NT 4.0 Server Linux distribution through which users • Microsoft Windows 2000 Server, install Linux on their desktops or servers. Advanced Server & Datacenter Editions Popular distributions include: • Microsoft Windows 2003 Web, • Debian Page 144 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query • Redhat Router. Following is an example of • openSUSE implementing DHCP using SOHO router. • Android • Login to the Router. • Ubuntu • Select LAN Settings (Refer to • Bharat product manual for exact details). • Fedora, etc. SESSION 12: NETWORKING SERVICES DYNAMIC HOST CONFIGURATION PROTOCOL RELEVANT KNOWLEDGE DHCP Dynamic Host Configuration Protocol (DHCP) is a network protocol used to configure network devices to enable them to communicate on an IP network. • Specify the DHCP range from DHCP infrastructure consists of: which the IP addresses will be allocated • DHCP Servers to the computers in a network and select • DHCP Clients the lease duration. Click Apply DHCP server maintains a database of IP Changes. addresses and configuration information. When it receives a request from a client, Lab: Configure clients for Dynamic IP. the DHCP server allocates an IP address By default, most operating systems will from a given range and sends the be automatically configured as a DHCP configuration information to the client. client. If you have modified the computer DHCP servers are preconfigured with a to use static IP address, you should range of IP address and additional reconfigure the computer to act as a network configuration information by the DHCP Client by using the procedure administrator. Like other TCP/IP, DHCP below: uses port numbers 67 & 68. •Click Start > Run > type NCPA.CPL > DHCP Process click OK. DHCP follows a basic process widely • referred to as DORA. Rightclick Local Area Connection, select Properties. •Select Internet Protocol Version 4 (TCP/IPv4) and Click Properties •Select obtain an IP address automatically and Obtain DNS server : Configure DHCP. Lab address automatically. Click OK You can use the DHCP Service bundled twice. along with server operating system such Now go the command prompt, check if the as Windows Server, Linux or a SOHO computer has received IP address from a Page 145 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query DHCP Server. Use Ping to verify Prompt). connectivity with other computers in the network. Computer Names Computers that run Microsoft windows use unique NetBIOS names that are 16 characters in length. (The 16th character is reserved for NETBIOS suffix to Workgroups represent service and as a result Workgroup or PeertoPeer computer computer names are maximum 15 network refers to decentralized model characters long.) Computer names use where the user name and password is alphanumeric characters for naming stored on individual computers. convention and are assigned by the Workgroup model is suitable for 1015 administrator. computers or fewer numbers of users and On a Microsoft windows network that requires additional administration as the uses IP, computers can be accessed using number of computer or user grows. Since computer names instead of IP addresses the permissions are managed locally at as these are easier to remember and identify. Lab: View and Change Computer Name. • Rightclick My Computer, select Properties. • Select Computer Name tab. each computer, each user or owners of a • Click Change. computer act as an administrator. File and Print Sharing Once you have setup the computer to work in a network, you can share files and printers among other computers in a network. Lab: Share files on a computer. • Create a folder that you want to share, for example. C:\Monthly Reports. • Rightclick the folder, select Properties. Select Sharing tab. Click Advanced Sharing. • Click OK twice. Note: You may need to restart the Note: computer. • Windows XP allows maximum 10 HOSTNAME concurrent connections; Vista and above Hostname is a command line utility that allows 20. can retrieve computer name. • Everyone is a special group that is Lab: Use HOSTNAME (Command created and managed by the Operating Page 146 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query system; any user account that is logged Lab: Access a shared printer. on to a network becomes a member of the • Click Start > Run. Everyone group. You cannot modify the • Type \\COMPUTERNAME. members of Everyone group; however, • Notice the shared printer you can remove the Everyone group from displayed. You need to install the printer the Share Permissions list by adding a drivers on other computers in order to use desired user or a group account manually. this printer; to automatically install the • Select Read under Allow column printer driver on your computer, if you don’t want to allow users to modify doubleclick on the printer. Once contents. installed, you can use any application • Select Change or Full Control such as word processing software to open under Allow column if you want to allow a document, select print and choose this user to modifying contents. printer. Notice the printing request will be automatically forwarded to the printer available on the other computer. To set permissions, select Security tab. • Select Print if you want to allow users to just print (default permission). • Select Manage this Printer if you want to allow users to have administrative control over the printer. • Select Manage Documents if you want users to manage document Lab: Access a shared folder from another queue. This should be used when you computer. want to allow users to pause, rearrange • Click Start > Run. or delete documents in print queue. • Type\\COMPUTERNAME\SHA AutoIP RENAME. (example, \\LABPC\Monthly Computers configured as DHCP Clients Reports) will not able to communicate with each • You may be prompted to enter other if they don’t receive an IP address username and password, type them and from a DHCP Server. In such cases click OK. You should be able to access the AutoIP feature of operating system shared folder. selfassigns IP address from a builtin Lab: Share a printer attached to a range so that client computers can computer. communicate at least with each other. • Go to Control Panel > Devices and Internet Engineering Task Force has Printer. reserved the address block 169.254.1.0 • Install a printer. through 169.254.254.255 for AutoIP • Rightclick the Printer, select reserve range in IPv4. AutoIP is a Properties. feature found on most recent operating • Select Sharing tab. systems such as Microsoft Windows, MAC OS X & Linux. • Select Share this Printer, click OK. Page 147 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Lab: APIPA demonstration. 1. Stop or disable the DHCP Service (on the Router). 2. Type IPCONFIG /RELEASE on all DHCP Clients (to release the IP address). 3. Type IPCONFIG /RENEW on all Active Directory DHCP Clients (attempt to receive an IP Active Directory is a directory service address). used in Microsoft Windows Domain 4. Notice the IP address assigned to each networks. Here, a domain controller is client computer in the 169.254.x.x range. configured to authenticate and authorize 5. Use PING to verify connectivity all users and computers in a network. between different computers. Active Directory enforces security policies 6. Start or enable the DHCP Service (on such as password length, password the Router). complexity, user restriction, etc. Active 7. Repeat steps 2, 3 & 5. Directory or an equivalent directory service is widely used in medium to large Additional Information corporate networks. Active Directory uses Network Controllers the LDAP Protocol for directory service, On medium to large sized networks, it is Kerberos protocol for authentication and a practice to have centralized security. DDNS for name resolution. Network or Domain Controllers are used for authenticating user accounts and SESSION 13: NETWORKING permissions are tightly controlled. This SERVICES NAME RESOLUTION helps the administrators as everything is centralized and users can login to any of RELEVANT KNOWLEDGE the computer within a network using a Name Resolution single username &password combination. Name resolution refers to the process of Domains converting host names or domain names Domain refers to a centralized model to an IP address. On an IP network, where a centralized database stores all computers communicate using the IP the credentials (usernames, passwords, address. On an IP network, computers security policies, etc.). Domain models communicate using the IP address; assist administrators to control however, computers are assigned names Domain Model, User Accounts on Domain which are easy to remember. When a user Controller the computers in a network attempts to access a computer by using from a single station making it easier to the computer or hostname, it is administer. Permissions (or restrictions) translated to the IP address assigned to it to change wallpaper, access control panel and then, the communication takes place. items, etc. can be set across the network Name resolution methods include using keeping all the computers secure. Domain HOSTS file, DNS, WINS & DDNS. models are suitable for small, medium to HOSTS File extremely large networks and can scale to The hosts file is a computer file used by thousands of users. Page 148 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query the operating system to map host names to IP addresses. The hosts file is a plain DNS (Domain Name System) text file and is conventionally named Since HOSTS file needs to be maintained hosts. on each computer, this method is not Note: Though it’s a plain text file, this file possible on large networks and the does not have extension as .TXT. Internet. On large networks and the HOSTS use a simple mechanism of Internet, a hierarchical distributed separating hostnames and IP addresses naming system called the DNS is used. by white space or tabs; this is very DNS provides centralized name similar to that of a phonebook having resolution and can help reduce entries of customers and their phone administrative costs and efforts. DNS numbers. You can map friendly names uses a method is analogous to retrieving such as John, PRINTSERVER, etc. that phone numbers from a centralized service will be easier for users to remember; such as the yellow pages instead of our however for the computers to identify and personal phone books. DNS provides a connect, you need to map the name with worldwide, distributed keywordbased respective IP address. Following are the redirection service and serves as an attributes of a host name: essential component for the functionality • Host name can contain maximum of the Internet. Unlike HOSTS file, DNS 255 characters. can be quickly updated and updates are • Multiple host names can be distributed to other DNS servers across assigned to single host. the globe. • Host name need not match the NetBIOS computer name (Microsoft Domain name space Windows). Domain name space consists of trees of • Comments can be included by domain names and has multiple levels. including a hash character (#). For example, for a domain mail.google.com, .com refers to the Operating System Location toplevel domain, google refers to Unix / Linux /etc/hosts secondlevel domain and mail refers to Microsoft %SystemRoot thirdlevel domain. A single DNS zone Windows XP / 7 %\system32\drive may consist of one or more domains and rs\etc\hosts subdomains. Domain names are not case Mac OS X 10.2 /private/etc/hosts sensitive. Novell NetWare SYS:etc\hosts Android /system/etc/hosts Lab: View HOSTS file • Click Start > Run > type C:\Windows\system32\drivers\etc • Click OK. Notice the contents of this folder. To view HOSTS file, open it with a text editor such as Notepad. Page 149 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query DNS Server responds to ISP’s DNS Server with the IP address of www.example.org. 5. Client communicates with www.example.org using its IP address. Lab: View DNS Settings (Command Prompt). DNS settings are usually pushed along with IP address. To view, do the following: Address resolution mechanism • Click Start > Run > Type CMD > Click When you use an application such as web OK. browser or mail client, the domain names • Type IPCONFIG /ALL, press Enter. (e.g. Wikipedia.org or mail.google.com) Notice the DNS server IP address are translated to an IP address enabling displayed under DNS Servers. your computer to communicate. Domain If you receive request timed out or name resolvers determine the appropriate extremely delayed response from your domain name servers responsible for the external DNS servers, try using other domain name to be accessed, by a DNS Server’ IP address such as one of the sequence of queries, starting with the Public DNS servers. Using Public DNS rightmost (toplevel) domain label. Servers can improve performance and DNS Process resolve issues related to DNS name The DNS process is explained below. resolutions; for example, Google provides 1. User opens an URL, free Public DNS to be used as alternate to www.example.org. Client sends a query to DNS Servers. Typically ISP’s provide ISP’s DNS for the IP address of Primary and alternate DNS’s server’s IP www.example.org. address pushed along with your IP 2. ISP’s DNS searches its database or address when you subscribe; if you have cache to find matching IP address. If not performance or name resolution issues found, query is forwarded to the root with your ISP’s DNS Servers, then it is server. recommended to use the Public DNS Server’s IP address. For example, to use Google’s Public DNS Servers on a computer, do the following: Lab: Use Public DNS IP Address. 3. Root server traces the IP address of the .org DNS Server and sends it to ISP’s DNS Server. 4. ISP’s DNS Server contacts the .org DNS Server by its IP Address. The .org Page 150 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Lab: Clear DNS resolver cache (Command Prompt). Now use IPCONFIG /ALL and notice the Type IPCONFIG / FLUSHDNS, press DNS server IP address displayed. Enter. Type IPCONFIG / NSLOOKUP (Name Server Lookup) DISPLAYDNS, press Enter. Notice the NSLOOKUP is a command line utility results in DNS Resolver Cache. used for querying DNS servers. Lab: Use NSLOOKUP (Command SESSION 14: NETWORKING Prompt). SERVICES – NETBIOS, WINS & DDNS RELEVANT KNOWLEDGE NetBIOS over TCP/IP NetBIOS over TCP/IP (NBT, or DNS Client Resolver Cache sometimes NetBT) is a networking (Microsoft Windows XP / 7) protocol that enables legacy computer DNS client resolver cache is a RAMbased applications (relying on the NetBIOS table that contains entries of Hosts file API) to run on modern TCP/IP networks. and host names that Windows has tried NetBIOS was developed in the early to resolve through DNS. The DNS client 1980s, targeting very small networks resolver cache stores entries for both (about a dozen computers). successful and unsuccessful DNS name resolutions. This in turn can improve NBTSTAT performance as Windows can locate the NBTSTAT is a command line utility for destination IP address directly from viewing statistics of NetBIOS over Cache (RAM) instead of initiating another TCP/IP. query to an internal or external DNS server. Lab: Use NBTSTAT to view registered Lab: View DNS Resolver Cache names (Command Prompt). (Command Prompt). Page 151 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Today, there are a many DDNS providers on the Internet, offering their service free or for a small fee. Examples of service providers include (not limited to): • http://www.dnsdynamic.org • http://www.changeip.com • http://www.dyndns.com • http://www.changeip.com • http://freedns.afraid.org WINS • http://www.dnsmadeeasy.com Windows Internet Name Service (WINS) : Sign up with one of the free DDNS is Microsoft's implementation of NetBIOS Lab Name Service (NBNS), a name server and providers. service for NetBIOS computer names. WINS is to NETBIOS Names just as DNS SESSION 15: WIRELESS is to hostnames, providing name NETWORKING resolution services for computers running windows on Microsoft Windows network. RELEVANT KNOWLEDGE DDNS Introduction to Wireless Networking, DNS requires hosts to be assigned static RF Communication IP addresses. DNS is not suitable when Wireless network refers to a computer using DHCP environments; as the IP network that is not connected by any addresses keeps changing over time and cables. Typically Wireless networking is the DNS service requires permanent IP used where wired connectivity is not addresses for its records. For example if a possible or feasible due to technology consumer using a DSL or cable modem costs or availability. Wireless wants to host a website (accessible to the telecommunications networks are public) on his computer, it is not implemented and administered using a practically possible as the public IP transmission system called radio waves. address changes over shorter period of This implementation takes place at the times. In such a scenario, DDNS can be physical level (layer) of the OSI model used. network structure. Similar to WINS, DDNS clients can make Types of wireless networks use of dynamic IP address and computers • Wireless personal area network can be accessed using hostnames or (WPANs) interconnect devices within a domain names. How? For example, if you relatively small area usually within a are initially assigned a dynamic public person's reach. For example, usage of address of 202.1.2.3 , your computer can Bluetooth to connect a mobile phone to a be configured to update its IP address laptop. along with the hostname or domain name • Wireless metropolitan area network to a machine with DDNS. If the public (WMANs) is a wireless network that address changes, the DDNS client will connects several wireless LANs. WiMAX automatically contact and update the is a type of Wireless MAN and is DDNS with the changed IP address. Page 152 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query described by the IEEE 802.16 standard. networks thus acting like a bridge • Wireless wide area network between wired and wireless networks. (WWANs) is a wireless network that WAP have builtin antennas for covers large areas, such as one between communicating with WNIC and other neighboring towns and cities, or city and WAP’s. WAP are generally connected to a its suburbs. This network can connect network switch or router providing branch offices of business or function as a internet connectivity to its client over public internet access system. wireless networks. Since wireless Note: Though there are a variety of networks use radio waves, their Wireless Networks, this course focuses transmission capability is limited. Range only on Wireless LAN. extenders are devices used for extending Wireless LAN wireless LAN similar to that of repeaters WLAN refers to connectivity between two used in wired networks. Most SOHO or more devices within short distances routers have integrated access point and such as homes or campus. WLAN uses they are commonly referred to as WiFi or spreadspectrum or OFDM technologies Wireless Routers. that enable users to have mobility within IEEE 802.11: IEEE 802.11 standard the coverage area. WLAN corresponds to defines the WiFi standard, used for IEEE 802.11 standards and are marketed wireless networks and is Sub classified commonly under the WiFi brand name. into IEEE 802.11b, a, g and n. WNIC: Wireless network interface IEEE 802.11x Standards controller (WNIC) is a network interface Note: IEEE 802.11 b, g & n are controller using radio waves for compatible with each other. IEEE connectivity instead of wires. WNIC is 802.11n is compatible with IEEE 802.11a. usually found integrated with mobile Types of wireless LAN include the devices such as laptops; however, to use ADHOC & Infrastructure Network. on a desktop, you may need a dedicated Stand Radio Speed Range Range card. ard Frequ (Indoo (outdo ency r) or) PCI WINC IEEE 2.4 Up to Up to Up to 802.11 GHz 11 35 m 140 m b Mbps CardBus WINC IEEE 5 GHz Up to Up to Up to 802.11 54 35 m 120 m USB WINC a Mbps IEEE 2.4 Up to Up to Up to 802.11 GHz 54 38 m 140 m WAP g Mbps IEEE 2.4 / 5 Up to Up to Up to Range Expander 802.11 GHz 600 70 m 250 m n Mbps WAP (Wireless Access Points): WAP ADHOC are devices that connect WNIC to wired Page 153 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query A wireless adhoc network is a access points for connecting wired and decentralized type of wireless network. wireless devices in home or small Also known as peertopeer (P2P) business networks. Dedicated access network, ADHOC mode allows wireless points are used usually in enterprise devices to directly communicate with each networks. other. Wireless devices within range of SSID each other can discover and communicate SSID or Service Set Identifier is a unique directly without involving central access alphanumeric name used for naming points. wireless networks. SSID’s can be 32 character’s long and is casesensitive. Wireless clients continuously scan the wireless network for available SSID’s. Users or administrators can connect to a wireless network. Any wireless device can associate with only one SSID at a time This method is usually used by two or (similar to that of cell phone associated more wireless computers that connect to with a single ISP or number). each other to form a network. This is Wireless Zero Configuration & considered the quickest method as no Proprietary Utility other devices are required other than the Wireless connection management utility WNIC and the procedure is refers to software provided by a vendor straightforward and simple. that is used for managing wireless Infrastructure Mode network connections. Also referred to as In infrastructure mode, communication proprietary utility, this is usually happens via a centralized device called installed along with the drivers and the access point that serves as a bridge to accessed through a program shortcut. a wired network infrastructure. Usually, Mostly utilities from different vendors this is used for utilizing resources on the have different user interface that may be wired networks. confusing to end users. Wireless Zero Configuration (WZC), also known as Wireless Auto Configuration or WLAN AutoConfig, is a wireless connection management utility included with Microsoft Windows. You can use For example, you may have an existing WZC to manage wireless network wired network with two desktops connections. It works with all wireless connected for Internet access; to add adapters. WZC is used for providing an wireless clients such as a laptop, you can interface that looks similar irrespective of attach an access point to the network the wireless card used. This is useful to switch. All wireless clients will access the consumers who work with different desktops and the Internet through the WNIC from a variety of vendors. access point. You may also find SOHO routers (figure above) that has integrated Page 154 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query following: • Click the Wireless Network Icon in the System Tray. • Notice the list of connection(s) displayed. To connect to the ADHOC network LABWIFI created earlier, doubleclick LABWIFI from this list. You DLink WLAN Utility WLAN (Windows 7) will be connected to the other computer. Note: You will be able to access each other computer by its computer name or by IP address. Since there was no IP set, both this connection will have the autoconfigured IP address (169.254.x.x range) and should be able to communicate between these two. You can also specify Linksys WLAN Utility an IP address. Use the procedure for Setting up Wireless Networks setting static IP address covered earlier. Lab: Set up a ADHOC network Lab: Set up a Infrastructure Network Install WNIC (Use a WAP or WiFi Router). • Connect the WNIC; install the device Lab: Set up a Infrastructure Network drivers by referring to the product • Connect the WAP to a free manual. computer on the network via LAN port • Verify if it properly installed using (Advisable for first time setup). Device Manager. • Open the web browser, type the IP Set up ADHOC Network (Vista / 7) address of the WAP. • Click Start > Control Panel > • Select Wireless > Channel and Network and Sharing Center. SSID. • Select Set up a new connection • Select Wireless > Security. or network. • Select Set up a wires ad hoc (computertocomputer) network, click Next. • Click Next. • Type a name, for example To connect to this WAP, Click the LABWIFI in the Network Name:, select Wireless Network Icon in the System No authentication (open) from Tray. Security type: dropdown list, select Notice the list of connection(s) displayed. Save this network. To connect, doubleclick INFRADEMO • Click Next, click Close. Now from this list. You will be connected to the this computer is configured to accept WAP. WLAN connections. Wireless Site Survey To connect to this computer, do the Before you implement a WLAN, you need Page 155 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query to understand the requirements such as subscribed by others. For example, a user coverage, number of computers that will can connect to his/her neighbor’s WLAN connect, roaming, data rates, etc. This and access the Internet without process requires planning and designing, permission. Such practices are unethical commonly referred to as Site Survey. and considered illegal in some countries. WLAN, since it uses radio waves they are Protecting WLAN prone to interference and the effect range In order to protect wireless networks, can be determined only after a thorough there are a variety of methods available study. You can analyze the signal listed below (not limited to): strength, coverage, etc. by placing a WAP Note: Some of these methods may not be at a fixed location, move a client device to possible if the WAP or SOHO router with measure and conclude the actual integrated AP lacks such capabilities. requirements. 1. Use MAC address authentication / filtration: You can add the list of MAC SESSION 16: WIRELESS SECURITY addresses of computers or devices to the WAP. Connection to the WAP will be RELEVANT KNOWLEDGE allowed only if the WAP finds matching Overview of Wireless Security MAC address. Wireless security is the prevention of Lab: Use MAC Address authentication / unauthorized access or damage to filtration. computers using wireless networks. Due • Login to the WiFi Router. to affordability of WiFi Routers, Internet • Select MAC Address Filtering. access through wireless means have • Type the MAC Addresses of the gained popularity. Today, almost every computers or devices that you would like laptop and Smartphone is equipped with to allow. Click Add and Click Apply wireless cards enabling users to access Changes. Repeat to add more MAC network or the Internet through a addresses. wireless connection. Data transmitted 2. Implement WEP over wireless LAN using radio waves can WEP (Wired Equivalent Privacy) be trapped and unauthorized users can WEP is a widely used security algorithm gain access to internal network resources and is often the first security choice. or access to the Internet without the Although its name implies that it is as consent of the owner. In most cases, secure as a wired connection, due to unprotected WLAN’s acts like a free numerous flaws and has lost out to newer hotspot for wireless users. standards such as WPA2. WEP uses You can protect WLAN’s by using 64bit or 128bit encryption. wireless security such as Wired WPA (WiFi Protected Access) & Equivalent Privacy (WEP) and WiFi WPA2 (WiFi Protected Access II) Protected Access (WPA) to encrypt and WPA and WPA2 are two security decrypt network traffic. protocols and security certification Piggybacking programs developed by the WiFi Alliance Piggybacking refers to the practice of to secure wireless computer networks. using wireless Internet connection WPA protocol implements a lot of the Page 156 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query IEEE 802.11i standard, especially the network secure. Though there is no Temporal Key Integrity Protocol (TKIP). guarantee of 100% protection, the TKIP employs a perpacket key, i.e. it discussed methods definitely make it dynamically generates a new 128bit key difficult for unauthorized users to for each packet thus preventing attacks penetrate and access the network. which compromised WEP. Troubleshooting Wireless Networks WPA2 has replaced WPA. WPA2 uses Given below are guidelines to optimize CCMPa new AESbased encryption mode and troubleshoot wireless networks based with strong security and is considered on best practices: most secure. • WLAN’s use radio waves that is Lab: WPA / WPA2. limited in distance. If the end device such • Connect to the WAP, login. as desktop or a laptop is quite far away • Select Wireless > Security. from the WAP, the signal would be weak. • Click Apply Changes. Now attempt to It is advisable to either move the devices connect to this wireless network and as close as possible or to place the devices observe the changes. (at least the WAP) at a higher level to avoid interference from obstacles such as cupboards, etc. Anything made of wood, steel, concrete, glass, etc. absorbs signals resulting in poor signals. Use a range extender to increase coverage area. • Change channels (optional) to 3. Disabling SSID broadcasts: If SSID move away from other consumer devices broadcast is disabled, SSID’s will not be such as cordless phones, microwave oven, displayed when computers attempt to etc. that may use the same frequency. discover WLAN’s. • Use external antennas if supported Lab: Disable SSID broadcast. by the WAP or WiFi Router. • Connect to the WAP by using the web browser SESSION 17: WIDE AREA • Select Channel and SSID NETWORKS CONCEPTS • Uncheck Broadcast SSID. Click Apply Changes. Now click the Wireless RELEVANT KNOWLEDGE icon on a client computer and notice this A Wide Area Network (WAN) is a SSID is not listed anymore. network that covers a broad area 4. Implement Wireless intrusion detection (metropolitan, regional, or national systems and monitor your network for boundaries) using private or public any intruders attempting to access your network transports. Using WANs, data network through WLAN. This method is can be transmitted over very long most expensive as it involves use of distances. special devices and requires additional There are a variety of WAN technologies research. available offering temporary (pay as per To summarize, it is best to use a usage) and permanent (24/7 availability) combination of methods to keep the connectivity. Some of the common Page 157 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query connectivity includes: DialUp, ISDN, telephone network. This is achieved by DSL, Cable, Satellite and Wireless. using different frequencies for voice and Dialup data. A Dialup connection is a form of network connectivity using telephone networks. In the initial stages of networking, dialup connections were used to connect to the ISP for Internet connectivity. In this, computers are connected over telephone The service is offered by installing a networks using a device called the DSLAM (Digital Subscriber Line Access MODEM (a device used for modulating Multiplexer) (at telephone exchanges) and demodulating signals from analog and a DSL filter (at customer’s premises) signals to digital signals and vice versa). to split voice and data thereby enabling simultaneous transmission of voice and data. Since multiple signals are sent over pairs of wires at different frequencies, this is categorized as broadband. DSL uses PPPoE (PointtoPoint Protocol Over Ethernet). Following is a summary of some of xDSL standards: Protocols used in dialup networking are SLIP (Serial Line Internet Protocol) & PPP (PointtoPoint Protocol). Dialup is now widely replaced by DSL & Cable modem due to increased speeds and lower cost today. However, you may still DSL is offered by vendors with a variety find people using dialup connections for of options and sometimes with usage Internet Access or for connecting to restrictions based on quota and/or offices in remote location. bandwidth. For example, an ISP may offer a download speed of 2 Mbps and ISDN (Integrated Services Digital configure it in a way that it steps down automatically to 512 Kbps or lower once Network) ISDN is a circuit switched network that you reach a download limit of 10 GB. enables digital transmission over However, this depends on the plan taken telephone lines. It allows data, voice; from an ISP. video transmissions over a single line and Lab: Set up a DSL Connection. multiple devices can use the same Note: Your facilitator can demonstrate to communication line. ISDN is widely used set up a DSL connection only if a DSL for high speed Internet access in most router and an active internet connection countries. is available. You need an active DSL DSL: connection from an ISP, a DSL Modem Digital subscriber line is a family of and a computer to use DSL. technologies that provide Internet access 1. Connect the DSL Modem to the by transmitting digital data over splitter. Page 158 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 2. Turn on the DSL Modem. not possible or available. 3. Open the web browser, type the IP As compared to other wireless address of the Router and login. technologies, WiMAX is preferred as it 4. View DSL Connection properties economically viable and easier to (Use the Router Product Manual). implement. WiMAX can provide speeds of 30 to 40 Mbps with current trend at Cable Internet Access around 1 Gbps; however, the actual speed Cable Internet access is a form of offered depends on the ISP. broadband communication that uses cable VPN television infrastructure. Like DSL, cable Virtual Private Network (VPN) allows Internet access is provided through private network (LAN) to be extended coaxial or fiber optic cables from the ISP outside the network. Users of VPNs to customer’s premises. Unlike DSL that access resources as if they are present provides dedicated bandwidth, cable locally though actually they are located Internet users share the available remotely. A VPN connection is created bandwidth. Depending on the provider, through a WAN link such as the Internet varying speeds are offered in the range of but appears as a private link to the 1 Mbps to over 400 Mbps. endusers hence the name Virtual Private Network. Though accessed through the Internet in most cases, high level of security is maintained between the host computer and the network through use of tunneling protocols and encryption. VPN uses PPTP (Point to Point Tunneling Wireless WAN Protocol) or L2TP (Layer 2 Tunneling Wireless Internet access is used where protocol). wired connectivity is not possible or for Routing & Remote Access Server remote locations. Wireless WAN uses (RRAS) technologies such as LTE, WiMAX, GSM, RRAS is a feature in server operating CDMA, etc. for providing connectivity. systems used for managing remote connections. RRAS supports a variety of connections including Dialup & Virtual Private Network (VPN) you will read about this later) and usually support tens to hundreds of incoming connections. This is usually used by large organizations and WiMAX ISPs. WiMAX or Worldwide Interoperability for Routing Microwave Access is a wireless Routing is the process of selecting paths communication standard used for in a network when sending or receiving providing Internet Access to fixed packets across computers or devices. stations. WiMAX is used where wired Imagine if you are planning to send a Internet access such as DSL or Cable is parcel to someone; the parcel will travel Page 159 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query through different offices, change routes if dynamic routing protocols are roadblocks are detected and finally be Distancevector protocols and delivered to the recipient. Similarly when Linkstate protocols. you browse the Internet or send an email, 1. Distancevector protocols use packets take different routes (from your some form of distance to calculate the computer to your ISP, from your ISP to route metric. Examples include RIPv1, the next ISP etc.) until it reaches its RIPv2 & IGRP. destination. 2. Linkstate routing protocols On packet switching networks, routers operate by building topology table based use static or dynamic methods: on links and its status from neighboring 1. In Static routing, packets are routers. Examples include OSPF & ISIS. transmitted through a fixed route as set Routing Commands in the routing table defined by an TRACERT administrator. It is not faulttolerant as it TRACERT is a command line utility used can lead to a single point failure; for displaying path taken by a packet and however, as the route path is known to measuring transmit delays across an IP the administrator, static route is network. TRACERT uses ICMP. considered to be secure. Lab: Use TRACERT (Command Prompt). 2. Dynamic routing refers to the capability where the routes are determined by the router automatically based on conditions. Packets may take alternate routes in case of a change in network condition. When you specify an IP address and a ROUTE subnet mask, you also need to specify an Route is a command line utility that is IP address in the default gateway used for viewing and manipulating column. Routing takes place when a routing tables. Routing table on packet is identified for delivery to a computers is automatically built based on remote network. Once the packet is the IP configuration of your computer. determined not a part of the local Route command is also used by network, it is forwarded to the default administrators to make manual entries in gateway. Such packets forwarded to the the routing table to define static routes. default gateway, are routed and sent to Lab: Use Route (Command Prompt). the destination network. Routing Protocols In dynamic routing, routing tables are created and managed by routing protocols that automatically run on a router. Routing protocols enable routers to exchange the routing table between them periodically or when there is a change in PATHPING network condition. Two categories of PATHPING is a command line utility Page 160 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query that combines the power of both PING for more than a decade due to IPv4 and TRACERT. PATHPING can provide address exhaustion. Classic example PINGlike statistics between each host includes the Internet Café (referred to as traced through TRACERT. browsing centers) which uses a single Lab: Use PATHPING (Command public IP among multiple clients having Prompt). private IP addresses. For example, look at the illustration. ISP SESSION 18: NETWORKING has issued a Public address of SERVICES – PROXY SERVERS & 202.12.12.18 for this connection (WAN ADDRESS TRANSLATION Interface) that is connected to a NAT device. NAT device’s internal IP address (LAN Interface) is 192.168.1.1 and the RELEVANT KNOWLEDGE clients are assigned 192.168.1.2 and Proxy Server 192.168.1.3 which are private IP A proxy server is an application that acts addresses. Clients cannot send any as an intermediate between internal and request directly to 73.12.34.54 as it’s a external networks for processing public IP address. Listed below is the requests. Proxy servers hide internal NAT process in this case: networks and hence provide an additional 1. Client 1 sends a request to layer of security. They are used to share 73.12.34.54. internet connections across multiple 2. LAN interface assigned with IP computers such as an Internet Café. 192.168.1.1 receives the request. Some proxy servers’ cache resources such 3. NAT software on the Router as web pages, videos to prevent content replaces 192.168.1.1 with 202.12.12.18 being redownloaded thus saving network and sends the request to 73.12.34.54. bandwidth referred to as caching proxies. 4. 73.12.34.54 replies to 202.12.12.18. Proxy servers can also be used to restrict 5. NAT software replaces or bypass Internet access. 202.12.12.18 with 192.168.1.1 based on NAT its NAT table. Network Address Translation or NAT is 6. Reply is sent to 192.168.1.2. the process of modifying a private IP The process is repeated for all other address to a public address and vice clients in the network. Thus though they versa. NAT is commonly used where a are assigned Private IP addresses, single public address is used for sharing computers in a network can access the Internet access to multiple computers Internet by using a single public IP hence, multiple private IP addresses. address. NAT is a feature used widely in home, SOHO Routers are NAT devices widely small & medium to enterprise networks Page 161 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query found in home and small business Firewall networks. Since routing happens between Firewalls are software or hardware public & private IP addresses and vice devices that protect a computer and/or a versa depicting the function of routing, network by analyzing and controlling NAT devices are commonly referred to as both incoming and outgoing network Routers. traffic. Firewalls act like a window Note to Instructor: Lab: Work with between internal and external network NAT Device (Use Product Manual) allowing authorized users to access 1. Login to SOHO Router. resources. Most operating systems 2. Select WAN. Notice the settings include a software firewall and are and values displayed for DSL connection. configured to keep your computer secure. Internet Connection Sharing (ICS) Windows Firewall Internet Connection Sharing is a feature Windows Firewall is a builtin firewall in Windows Operating System that software bundled and installed by default enables you to share Internet access with on most Microsoft Windows Operating other computers on a network. ICS can be systems like Windows XP, Vista & 7. used when there is no availability of Lab: View Windows Firewall Status WiFi Routers or other NAT Devices and Click Start > Run and type also on dialup, DSL, Cable, WiMAX and FIREWALL.CPL. Click OK. other connections. ICS uses IP addresses Windows Firewall protects the computer in the reserved range 192.168.0.x to by using the default settings (firewall 192.168.0.255; however, this cannot be rules) that can be modified anytime. Most changed. commonly used network applications Lab: Use ICS such as web browsers, email client software, etc. work without the need for SESSION 19: NETWORK SECURITY I modifying the settings on the firewall. Some network applications may not work RELEVANT KNOWLEDGE as intended if it is blocked by the firewall Network security refers to the practice of (for example, an antivirus software may securing computers and devices in a not be able to update itself from the network from unauthorized users and Internet); in such cases, you need to add attacks. Network security can range from the application to the exception list simple procedure such as using a indicating that application is permitted to username and password to using complex use the network or the Internet. network devices to protect a network. When you connect to the Internet, your computer and/or network is exposed to a public network where anyone could possibly attack and gain access to resources including data. You can implement certain measure such as using a firewall to protect a computer or a network from such situations. Page 162 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query be corrected using by applying security patches, a process referred to as Patch Management. Since presence of flaws is considered as a security risk & threat, these vulnerabilities must be addressed as quickly as possible. Most vendors analyze weaknesses and provide updates called as patches on a periodic basis. In most cases, the updates are automatically downloaded and updated by corresponding applications. Lab: View Automatic Update Settings (Windows). Lab: Add a program to the Exception List Click Start > Control Panel > in Windows Firewall. Automatic Updates Select Exceptions tab. Patch Management When you install an Operating System or applications, they may have flaws, also referred to as security holes. This can be an opportunity for people who can manipulate and gain control of a computer or network resources using these flaws. Lab: Update an Application (Firefox). Popular applications such as Firefox include option for checking updates directly from within the software. 1. Start Mozilla Firefox. 2. Select Help > About Firefox. 3. Click Check for Updates. If there are any updates available, it will be downloaded, installed and program will Operating systems and applications may be updated. have vulnerabilities (weakness) that can You can use products such as Belarc Page 163 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query Advisor & Microsoft Baseline Security found: Indicates issue with network Analyzer (MBSA) to analyze the card, IP settings or Name resolution computer for any risks or threats and problems. Use the File and Print Sharing take corrective action. troubleshooting procedure. • Windows has detected an IP AntiVirus Software address conflict: Indicates issue with IP Antivirus software can help in protecting address; assign another static IP address your computer against viruses. It is that is different than the one assigned to highly recommended that you use an other computers within the same antivirus software and most importantly, network. keep it up to date! Some of the popular • A duplicate name exists on the antivirus software vendor include AVG, network: Indicates two or more AVAST, McAfee, Symantec, Kaspersky, computers in a network have the same Microsoft, etc. name; assign another computer name that is different than the one assigned to SESSION 20: TROUBLESHOOTING other computers. NETWORKS Use the following checklist and scenarios as a general guideline when RELEVANT KNOWLEDGE troubleshooting: Troubleshooting Networks • Unable to connect to a network You have learnt a variety of utilities and (LAN) concepts. When you manage a network, it If you are unable to connect to another is quite common to face a number of computer on the same network, do the issues related to network or Internet following: connectivity. Always check for any recent • Verify the cables are connected changes made to a computer or network properly at both ends. before starting to troubleshoot; it’s most 1. Use a cable tester if required. likely that you find a clue that will save 2. Replace RJ45 Jacks or use time. Some of the wellknown error different cable if possible. messages include: 3. Check LED indicators on the NIC • Network cable unplugged: to verify connectivity status, interpret Indicates issue with cable; check if the based on NIC product manual. cables are properly connected to both • Check if the NIC is installed and computer and network switch or SOHO working properly using Device Manager. Router. Use alternate cables to confirm. 1. Sometimes the device drivers may • Limited or No Network be updated when operating system Connectivity: Indicates issue with downloads and installs updates network card or IP settings, later more automatically. In some cases, updated common. Check if the computer is drivers may be pushed through special configured as a DHCP client and verify software bundled along with device its IP address, gateway and other drivers. Typically updated drivers work relevant settings. properly as they address technical issues • The Network Path cannot be caused in earlier versions. In rare cases, Page 164 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query these device drivers cause problems and IP address (Use IPCONFIG). need to be replaced with the drivers that 1. Computers are usually configured worked earlier. to receive IP address from DHCP in most 2. Use device manager to find if the networks to ease administration. If there driver was updated to a most recent one are issues with the DHCP server, and if that’s causing the problem; if yes, computers configured as DHCP clients try using Rollback driver to replace the will not receive any IP address resulting current driver with the previous device in network issue. In home and small driver. business networks, devices such as SOHO 3. If Rollback driver did not fix the routers provide IP addresses to client problem, reinstall device drivers from computers. the original compact disc. If original • Check if the DHCP Service is compact disc is not available, then functional by logging to the SOHO router. download the drivers from Vendor’s • If all other computers configured as website and complete the installation. DHCP clients receive IP address from Verify if the issue is fixed. DHCP Service, then do the following (try 4. Always use device drivers intended each step and verify if the issue is for the correct version of the operating resolved): system. Device drivers designed for 32bit • Use IPCONFIG/RENEW. operating systems are NOT compatible • Disable and enable Network with 64bit operating systems and vice Adapter (Local Area Connection). versa. • Check if any firewall or startup 5. Download drivers ONLY from the program is blocking (Use MSCONFIG to manufacturer’s website; never download reduce startup programs and check drivers from 3rd party websites that may firewall settings). be modified internally and may cause • Test the affected computer by major problems. Contact the vendor for assigning a static IP address in the same correct or compatible device drivers. subnet. Verify if the issue is resolved. • Check if the NIC settings are • Unable to connect to Internet proper (if altered) using Device Manager. (WAN). 1. In general, settings are managed Always verify if the issue is associated automatically and usually not modified in with a particular program or all programs home, small business or enterprise on a computer. You can save time by networks. Sometimes, network card proper probing to understand the exact settings are modified to match a network issue. For an example, if you hear a environment and incorrect settings can complaint like “Internet not working”, it lead to problems in network connectivity. could actually refer to an issue when a 2. Use Device Manager to verify if user is unable to use their email client, a settings such as duplex settings, etc. are web browser, video conferencing software intact. If unsure, reset the settings to the or a game. default value indicated as Auto; refer to In addition to the above mentioned NIC’s product manual. procedure (Unable to connect to a • Check if the computer has a Valid network (LAN)), use the following Page 165 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query guidelines. SOHO router’s product manual to alter 1. Test if the computer is able to this setting. communicate with the gateway (Ping • Use NSLOOKUP to verify name gateway’s IP address). resolution functionality. 2. Test if the computer is able to b) You can also use OpenDNS, a communicate with the DNS server (Ping name resolution service that is offered for DNS Server’s IP address). free. As compared to public DNS servers, a) If you receive request timed out or OpenDNS offers additional facilities such extremely delayed response from your as Phishing & Botnet Protection, Web external DNS servers, try using other Content Filtering, etc., refer to OpenDNS DNS Server’ IP address such as one of the for more information. Public DNS servers. Using Public DNS 3. If you do not have issues with name Servers can improve performance and resolution, but a problem associated with resolve issues related to DNS name a specific program such as a web browser resolutions; for example, Google provides or an email client, do the following: free Public DNS to be used as alternate to a) Try using programs of similar DNS Servers. Typically ISP’s provide nature. For example, if the issue is Primary and alternate DNS’s server’s IP related to a web browser such as Mozilla address pushed along with your IP Firefox, try using Google Chrome or address when you subscribe; if you have Internet Explorer. performance or name resolution issues • If it works fine with other with your ISP’s DNS Servers, then it is browsers. recommended to use the Public DNS • Clear the browser’s Server’s IP address. For example, to use cache; web browsers store cached copies Google’s Public DNS Servers on a of content when you visit websites that computer, do the following: could lead to problems. • Click Start > Run > Type • Check the settings of the ncpa.cpl > Click OK. web browser that related to this issue. • Rightclick Local Area Reset it to defaults or the value Connection, select properties. associated with the issue. Refer to • Select TCP/IP (TCP/IPv4), browser’s help file for further select Properties. instructions. • Enter 8.8.8.8 and 8.8.4.4 as • Web browser addon’s or primary and alternate DNS Servers, click pluggin’s offer additional functionality; OK. some addons cause problems when in use. Now your computer will use the Google’s In such cases, you can disable the Public DNS servers for name resolution particular addon by using the addon instead of your ISP’s DNS Server. You settings within the web browser. If you can also specify the Google’s Public DNS are not sure of the addon that is causing Server’s IP address in your SOHO the problem, try disabling all addons and Router, if you want to use Google’s Public verify if the issue is resolved. If the issue DNS Servers for all computers and appears fixed, then try enabling each devices within your network; refer to addon to confirm the issue with an addon. Page 166 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query b) If the issue is related to a email such as Skype, do the following: client such as Microsoft outlook • Verify and confirm if other configured to download copies of emails applications are working from a service provider such as Gmail, • Some video conferencing software Live or Yahoo!. Or custom email use TCP or UDP ports that may be messaging providers, do the following: disallowed by default in the firewall • Check if any other settings of a local computer. Open the programs are using the network or firewall and the application to the Internet bandwidth; stop or exit all other exception list and verify if it is working. network applications that consume • If you are using a computer behind bandwidth for testing. a SOHO Router, you may have to open • Check Username & certain port numbers or port range for the password combinations, if you are unable application to work. Usually port to login; some services require just the numbers required by such applications username (SOMENAME) and some are documented and labeled as “Port require username along with domain Forwarding” by respective vendors. Refer name suffix (SOMENAME@ to the application software and the SOHO EXAMPLE.COM) for login names. Verify router to configure. password as well; check if the password • In certain cases you may have to was recently changed. expose all port numbers for a particular • Check if this the ports are blocked computer in a network; for example, by a firewall by using TELNET multiplayer games designed for use in the • Verify the email client POP3/SMTP Internet or an organization providing a settings of the email client by referring to range of services from set of computers or the settings as required by the ISP. hosts. Demilitarized Zone or DMZ, is a • Some ISP’s offer complimentary perimeter network that separates a single email addresses when customers avail computer or a network from the LAN web hosting services; usually the (though it is a part of the LAN) allowing POP3/SMTP settings are different than access to a specific computer or the the conventional port numbers or network. Computers that belong to DMZ settings, contact ISP for exact details if typically used in SOHO Routers are required. Check if the ports are accessible exposed to the Internet, prone to direct using TELNET. attacks. Refer to SOHO Router manual Tip: Most ISP’s allow email access for further reference. through a web browser pointing to • Unable to connect to a network customer’s domain names, commonly share (File & Print Sharing). referred to as webmail such as 1. File and Print sharing service is mail.domainame.extension. Check widely used in most networks, especially customers webmail to verify the status of on Microsoft Windows Networks. On a mail service and to provide alternate Microsoft Windows Network, computers access until the actual issue is resolved. are accessed each other by computer c) If the issue is related to a chat names. For example, a folder with a share software or video conferencing software name “MYSHARE” on a computer named Page 167 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query “DESKTOP01” is accessed through the For example, you may use the Repair or UNC path, \\DESKTOP01\ MYSHARE. Diagnose option to fix network issues If you are unable to access shares, do the automatically. This could be useful for following: users who do not have sufficient • Confirm the share name and computer knowledge to fix network issues or even name. understand their network setup. Network • Check if its computer or network troubleshooter designed to run series of specific; for example, if this share is not tests and present friendly messages that accessible only a particular computer or is understandable by nontechnical the entire network. persons. To repair your network • If it is across the entire network, then connection automatically, do the do the following on the computer that is following: configured to act as a server: 1. Click Start > Control Panel > • Check network adapter & IP Troubleshooting. address settings. 2. To troubleshoot issues related to • Check if File and Printer Sharing Internet connectivity, select Connect to is allowed in Windows Firewall or 3rd the Internet. party firewall. 3. Click Next. Follow the onscreen • If it is only on a single computer, instructions. then do the following on the computer TELNET where the share is being accessed: Telnet (Terminal Emulation) is a • Check network adapter & IP clientserver protocol used for established address settings. connections to a remote host. Telnet is • Check if you are able to access the also a utility used by administrators for computer by IP address instead of troubleshooting network applications. computer name. TELNET can be used for connecting to • If you are able to access the remote computers, switches and routers computer by IP address but not by as well. Telnet provides bidirectional computer name, it indicates a problem textoriented communication using a with name resolution. Add the remote virtual terminal connection. Telnet uses computer along with its IP address in the TCP and port number 23. HOSTS file for quick resolution. Lab: Use TELNET (Command Prompt) • Check if NETBIOS over TCP/IP is for troubleshooting. enabled (Advanced Settings of TCP/IP Consider this situation when you want to Properties). understand if a web or an email server is • Check Firewall settings. If unsure, functioning properly and you send disable firewall and verify. packets to a remote computer using the Note: On computers running vista/7/8 PING utility. PING works based on additional procedures may be required, ICMP, a protocol that operates at the refer to the manual for detailed network layer; whereas a web works at instructions. the application layer listening for HTTP Some operating systems include builtin requests. If you receive replies when facilities for fixing issues automatically. using the PING utility, it indicates the Page 168 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query computer providing the service works, not communication and TCP port 3389. the service itself. Lab: Remote Desktop Usually you will use a web browser to • On computer A, click Start > Run and connect to a web server by sending HTTP type SYSDM.CPL, click OK. requests. However, in this scenario you are not sure if the web server is listening or not. Hence, you can use the TELNET (to emulate an HTTP request) to confirm if the web server is listening or not. To test if the web server is listening to incoming requests, do the following: • On computer B, click Start > Run and type MSTSC.EXE, click OK. Notice the first line displaying HTTP 400 Bad Request and rest of the screen filled with HTML code. Typically web browsers send HTTP requests in a format that only a web server can understand. In this case Now you should be able to perform we have used TELNET program to send a administrative tasks on the remote request and the connection was accepted. computer. rd This indicates and confirms that the web You can also use other 3 party software server was listening to port 80. such as VNC, TeamViewer, GoToAssist, Ammyy admin, GoToMyPC, LogMeIn, Remote Desktop Radmin, Symantec pcAnywhere, Google Remote Desktop is a feature that enables Chrome Remote Desktop, etc. for taking computers to be managed remotely from remote control of a computer. other computers. This feature is commonly used by administrators to take Troubleshooting Model remote control of a computer for As general practice, you need to adopt a performing administrative tasks such as troubleshooting model that can help you installing or removing software, stay organized and troubleshoot managing user accounts, troubleshoot effectively. Following is a general application issues, etc. The functions are guideline: similar to that of normal system • Gather Information about the administration, except these are all done Issue or Statement. remotely. Remote Desktop uses the 1. Probe to differentiate if it is a Remote Desktop Protocol (RDP) for request or an issue. Page 169 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query 2. Probe to find out if it is affecting about to be shipped out) usually single computer or an entire network. documented in a file labeled as • Determine if any recent changes Readme.txt or Readme.htm. were made. b) Vendors also provide additional 1. Examples: was any software Selfhelp through community forums downloaded and installed with or without setup for each product or feature at their their knowledge, any settings was websites. You may submit your question changed, any hardware device added or or issue that may be answered by experts removed. for a possible resolution. Be aware that • Determine the most probable you may even receive an answer from a cause. normal registered user who may or may • Create an action plan. not be 100% competent in the particular • Verify the result and apply area; if the answer is vague, try preventive measures. validating the answer from another • Document the resolution. expert in such cases. Though this gives you a broad picture c) Paid or Free Support is offered by a about troubleshooting, you may have to variety of vendors; some vendors offer use additional resources in certain free support through email or chat while situations. Use the following guidelines to charge a fee for voice support. Research enhance your knowledge on by visiting the website and find out if troubleshooting further: there is a way to get your solution, either a) Most product manuals or help files for free or for a small fee. include detailed instructions for d) Make use of free eBooks or training completing most tasks. It is highly materials that are widely available on the recommended to read the product manual Internet. Use free resources such as to understand features and limitations Wikipedia, eHow.com, about.com, etc. for prior to troubleshooting. Sometimes, you articles on networking, troubleshooting, may also find latebreaking information etc. (most recent issues when the product is Page 170 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query IT/ITES 308: WEB DESIGNING PART 1 SESSION 1: INTRODUCTION TO Preprocessor), ASP.net etc. WEB DESIGN AND HTML Understanding HTML HTML or Hypertext Markup Language is RELEVANT KNOWLEDGE a language used for created web pages that can be viewed in a web browser. You have surfed several websites, yper – means active and all over the exchanged emails, performed online H transactions, etc. in the previous sessions. place! When you use a Web browser, you If you want to create websites like the can move all over the place, without a ones you have seen, you need to learn a specified order as to how to access variety of technologies, tools and pages/sites. techniques. Text – You will be working with text files Web designing refers to the skills that are only. required to create and manage websites. Markup – To create a Web page, you will Web design as a whole refers to designing type in the text and then “Mark up” the a user interface, authoring (programing) text. or a combination of both. Designing a Language – This is a method of creating website requires multiple skills. However, something or communicating and in this it is recommended to master and become case, you are creating Web pages using a skilled in one particular technology once particular syntax. you get a taste of various technologies HTML elements are the building blocks of involved. a website. Web browsers interpret the Following topics are covered in this tags written in HTML and display a web module: page. Hypertext refers to the text that • HTML & CSS can be linked to another text or page • Web Authoring Tools, Microsoft which a user can access. Hypertext is the Expression Web underlying concept behind the World Wide Web. • Overview of Clientside & Serverside scripting, JavaScript & HTML is developed and maintained by VBScript World Wide Web Consortium abbreviated as W3C. When HTML was first released, Web Publishing there were a handful of tags available A number of markup languages such as and used for basic web page structures. HTML, DHTML, XML are used to create As time evolved, several new tags and web based content. Apart from these, attributes were introduced. Popular software products such as FrontPage, HTML versions include HTML 4.01 and Dream Weaver etc are also used to HTML 5.0. develop web based content. Web based Designing Web pages using HTML applications are built using technologies such as ASP (Active Server Pages), JSP All you need is a text editor such as (Java Server Pages), PHP (Hypertext notepad to create a web page using HTML. HTML files have the extension Page 171 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query .htm or .html. You can open the web links or continuation to related articles, pages using web browsers such as Mozilla advertisements, etc. They appear as a Firefox, Internet Explorer, Google single web page to visitors. Have you Chrome, etc. noticed that the headings are of varying Viewing Source Code sizes to indicating topics and subtopics and different from the content? All this Web browsers have the ability to display formatting is possible using combinations the source code used for a web page. You of several HTML elements. can use this to enhance your knowledge To view the code, do the following: Elements & Attributes 1. Open the Web Browser and Elements have content placed between a rightclick anywhere in the web page start tag and an end tag. Tags act as and select View Page Source from containers for text, images and other the context menu similar to the one types of content. Tags start an opening below: tag and end with a closing tab, using angle brackets (<>) to define the 2. Notice, the source code of the web structure. page is visible with different color codes. The colors have no meaning in Note: To learn to use the tags, terms of function and are only used to throughout this document, you will find differentiate different sets of code. examples of code displayed within dotted boxes. Copy it in a text editor, save it in Saving a web page your local computer and view using web You can save web pages browsers. for future reference using Writing your First HTML Code the following procedure: HTML uses tags enclosed in angle 1. Select File > Save brackets; most tags are used in pairs such Page As… as , etc. Following is a 2. Type a file name and simple example of HTML code: click Save. SESSION 2: HTML ELEMENTS & Hello World!
Page 172 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query edit the HTML file, open the file using that contains body content and is notepad and save the changes. displayed in the web browser. Most In the above mentioned code, there are a HTML elements are used within the few HTML tags used. All HTML body element between
and documents start with and end tags. with . The rest of the document • If you want to place hidden text in a contains other elements and web page web page, you can use the comment content placed using elements. element ( and <> tags). Text placed using comment element will not be displayed in a web browser but can seen when viewing the source code. This is useful to developers or users who would like to share their experience in writing HTML code but • Document type or DOCTYPE is an hide the text from general visitors. element used for indicating the version of HTML used in a web page. This is used by the web browser to apply a set of rules for understanding the document structure. • HTML element indicates the start and end of an HTML document. HTML Attributes indicates the beginning of this HTML Attribute are used to provide additional document and indicates the information about an element. Attribute end. HTML is also the root of an contains values and some elements use HTML document and has two parts, multiple attributes. Head and Body elements. Nesting • Head element represents the header You can nest other elements within section of a document and contains elements. Elements nested within information about a web page. Head another element are referred to as a child elements start with and end elements and the nesting element is with . This element includes referred to as a parent element. all other elements that need to be executed or understood before the content (included in the body element) is displayed to the user. • Content placed within thePage 173 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query ensure the elements are used in proper Mark: To highlight the text in a order. Observe the correct way of using sentence, enclose the text within mark opening and closing tags illustrated in the element : and adjacent figure. Big: If you want to display a particular SESSION 3: HTML ELEMENTS & text in a sentence bigger than rest of the ATTRIBUTES: TEXT text in a sentence, enclose the text within FORMATTING the big element : and . Small: To display a particular text in a RELEVANT KNOWLEDGE sentence as smaller than the rest of the text in a sentence, enclose the text within Text formatting the small element: and You can format the text content of a web . page to make it attractive by using other Subscript & Superscript: Text enclosed HTML elements such as Headings, Bold, within and are displayed Italics, etc. as subscripts and Text enclosed within Heading: There are six levels of heading and are displayed as elements from H1 to H6. H1 has the superscripts. largest text size and H6 has the smallest heading text size. Pre: Text enclosed using
andtags are displayed as it is (in the Emphasize: To emphasize a particular example below using a monospace font text in a sentence (for example a text that such as Courier). should be pronounced different), use this element. Text enclosed within and INS & DEL: Text enclosed within
. No Strong: If you want to emphasize a text closing tag is needed. with stronger importance in a sentence, HR: To separate sections, use a use the strong element. Text enclosed horizontal line to indicate distinctiveness. within and are Horizontal line is indicated through use displayed in bold. of
element and requires no closing tag. Bold: To make the text such as keywords visually bold, enclose the text within Sample Code Text Elements and , the bold element. Underline: To underline the text, enclose the text within and , the underline element.
Page 174 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
entreprenaur
HTML supports six levels of headings, H1 to H6 with H1 being the largest.
Main Heading
Sub heading, Level 1
Sub heading, Level 2
Referencing ElementsSub heading, Level 3
Quote: To include short text such asSub heading, Level 5
name of an author, publisher, etc. inSub heading, Level 6
quotes, use the quote element. You canYou are required to agree also use the cite attribute to indicate the with our terms and conditions.
source. Text included withinandis displayed within quotations.HTML is simple to learn.
It is important to know the common Blockquote: To include lengthy quotes, HTML Elements and include text within and attributes.
This an example of text displayed in Cite: To specify a tile of a work such as bold.
title of a book, movie, painting, etc.This an example of text displayed include text within and underlined.
elements.This is an example of highlighted Abbreviation: To include abbreviations text.
of acronyms, include the abbreviationSun is the largest of all between and elements. planets with 696,000 KM as it’s radius.
Text included within this element will beMercury is the smallest displayed when the cursor is moved over planet in the Solar System ever since Pluto the text. lost its status and was reclassified as a dwarf planet.
Sample Code Referencing Elementsthis is an example of subscript for a formula, H2O
this is an example of superscript for a
formula, (A+B)2/* Hello World program */ #includeGoogle Analytics (GA) is a service offeredHTML Tutorial main()
Created by Author Name{
this is the correct spelling of by Google that generates detailed statistics
Page 175 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query about a website's traffic and traffic sources
- and
You can learn more about web design OL: To create a list with sequence, use at the Ordered List element, the tags HTML has several Definition: Definition lists are used elements and attributes. http://en.wikipedia.org/wiki/Web_design represent an ordered list and te>
- and
Junk food refers to food items that have less nutritional value and considered unhealthy. Health food provides healthy diet and has high nutritional value.
- Junk Food
- Potato Chips
- Pizza
- Soda
- Health Food
- Milk
- Fruits
- Raw or Cooked Vegetables
Sample Code – Ordered Lists UL: To create a list with no sequence, use the Unordered List element, the tags
Page 176 of 240 Draft NVEQF Teacher's Handbook IT/ITES Level 3 under Pilot Testing. Contact the Coordinator on [email protected], 9425018802 for any Query
flower, one or more ovaries, and in some- Cookies
- Muffins
- Yogurt
- Ic e cream
- Cakes, and many more.
To check if the HTML code works in a
- Instructions to use Mozilla Firefox
- Go to Links http://www.mozilla.org/en-US/firefox Links are used for interlinking to web
- Select Mozilla Firefox Free download for desktop pages of other websites, different sections of a web page, display email addresses,
- Install once complete links to websites etc. Links that are used
- Open the web page in Mozilla Firefox within a website are referred to as