Sunteți pe pagina 1din 170

Chapter 1 Web publishing

Introduction
A web page or web document is a document or information resource onwww and can be accessed
through a Web browser and displayed on a monitor. Web publishing describes the software and
methodologies to design the web pages and website.

Common terms
Web server is computer that stores websites.
Web browser is software program through which we can access webpage. For e.g. Internet
Explorer,Netscape Navigator, Mozilla Firefox etc.
Website is a collection of web pages.
Homepage is the First page of website.
1.1 HTMLPAGE FRAMES
Frame divides browser window into several parts through which we can see more than one web page
at a time. Multiple scrollable sections can be created using frames. Each HTML document is called a
frame, and each frame is independent of the others. Frame pages can also be hyperlinked.

1.1.1 Creating Frames


The <frameset>----</frameset>Tags:

The<frameset> tag is container tag for all other tags that are used to create frames.
The<frameset>tag replaces the <body>tag in frameset documents.
The <frameset> tag defines how to divide the window into frames.
Each frameset defines a set of rows or columns. If you define frames by using rows then
horizontal frames are created. If you define frames by using columns then vertical frames are
created.
The values of the rows/columns indicate the amount of screen area each row/column will
occupy.
Each frame is indicated by <frame> tag and it defines what HTML document to put into the
frame.

1.1.2 The rows attribute


The rows attribute divides the screen into Horizontal frames.
Following example shows Horizontal frames.
Output of example

<html>
<head>
<title>frame</title>
</head>
<frameset rows="25%, 75%">
<frame src="page1.html">
<frame src="page2.html">
</frameset>
</html>

Figure 1.1 Horizontal Frame

In the above example we have a frameset with two rows. The first row is set to 25% of the width of
the browser window and the second row is set to 75% of the width of the browser window. The
document "page1.html" is put into the first row, and the document "page2.html" is put into the second
row.

1.1.3 The cols attribute


The Cols attribute divides the browser window into vertical frames depending upon the width defined.
The following example illustrates the concept.
Output of the example

<html>
<head>
<title>frame</title>
</head>
<frameset cols="100, 45 %,*">
<frame src="page1.html">
<frame src="page2.html">
<frame src="page3.html">
<frameset>
</html>
Figure 1.2 Vertical Frames
The above example, the file page1.html is set to 100 pixels, page2.html is set to 45% of the available
area and the page page3.html takes up the remaining area.
The total area of all the rows and cols must be either defined in terms of pixels, or a percentage
value(%) or relative value by using (*) asterisk sign.

1.1.4 The<frame> tag


The <frame> tag is used to create frame within frameset. The attributes of this tag can be used to
specify the name of a frame and HTML page that you need to display in the frame.
The following are the various attributes of the <frame> tag:
Src

Frameborder=0/1

This attribute is used to specify HTML page that you want to


display in the frame
<frame src=URL of an Html page>
This attribute shows border around the frame.
The value 0 creates borderless frame. The value 1 gives border.

Marginwidth

This attribute sets left and right frame margin in pixels.


e.g. <frame src=page1.html marginwidth=25>

Marginheight

This attribute sets Top and Bottom frame margin in pixels.


e.g. <frame src=page1.html marginheight=25>

Noresize

This attribute prevents the user from resizing the frames. By


default user can resize frame by dragging to new position.
e.g. <frame src=page1.html noresize>
It is used to assign the name to the frame for targeting and linking
purpose
e.g. <frame src=page1.html name=xyz>
Scrolling has three values YES, NO, AUTO
The value YES specifies that a scrollbar should
always be visible on the frame.
The value NO specifies that a scrollbar should
never be visible on the frame.
The value AUTO specifies the browser to
automatically display or remove the scrollbars

Name
Scrolling=yes/no/auto

from a frame. This is default value.

1.1.5 Nested frames


You can nest a <frameset> tag within another <frameset> tag.
See the following codes as an example of nested frame:

Example-1
<html>
<head>
<title>frame</title>
</head>
<frameset cols="50%, 50 %">
<frame src="page1.html">
<frameset rows=50%, 50 %">
<frame src="page2.html">
<frame src="page3.html">
</frameset>
</frameset></html>

Output of example

Figure 1.3 Nested frame

Example-2

Output of the example

<html>
<head>
<title>frame</title>
</head>
<frameset cols="50%, 50 %">
<frameset rows="50%, 50 %">
<frame src="page1.html">
<frame src="page2.html">
</frameset>
<frameset rows="50%, 50 %">
<frame src="page3.html">
<frame src="page4.html">
</frameset>
</frameset>
</html>

Figure 1.4 Nested frame

1.1.6 Linking frame or Target attribute


Linking is one of the advantages of using frame. In linking there is menu/links on the left side of
browser and the content is displayed on the right side while clicking on links.
Steps to create linking frame
First create a frameset with 2 vertical frames. Give name to the frames using the name
attribute of the <frame> tag.
Giving the name to the first frame is optional, but the target frame must be given a name

<framesrc="left.html"><framesrc="right.html" name="xyz">
Here the name of frame isxyz

Create HTML document containing menu. The menu item will be hyperlink to other pages.
The hyperlink when clicked should be displayed in the right frame which is target name.
The target attribute in the <A> tag specifying the name of frame as follows:

<A href=input.html target=xyz>Input</a>


<A href=Output.html target=xyz>Output</a>

For example see the following html code:

<html>
<head>
<title>linking frame</title>
</head>
<frameset cols="40%, 60 %">
<frame src="left.html">
<frame src="right.html" name="xyz">
</frameset>
</html>

Initially the following Figure 1.5 will be


displayed

Left.html

<html>
<head>
<title>left</title>
</head>
<body>
<a href="input.html"
target="xyz">Input</a><br>
<a href="output.html"
target="xyz">Output</a>
</body>
</html>

Figure 1.5 Linking Frame


The output for Input link is as follows

Right.html

<html>
<head>
<title>Right</title>
</head>
<body>
<p>This is Right page</p>
</body></html>
Input.html

<html>
<head>
<title>input</title>
</head>
<body>
<p>The list of Input devices</p>
<ol>
<li>keyboard</li>
<li>mouse</li>
<li>Joystick</li>
</ol>

Figure 1.6 Linking Frame


And If we click on Output link, then the
following output will be displayed
The output for output link is as follows

</body>
</html>
Output.html

<html>
<head>
<title>output</title>
</head>
<body>
<p>The list of output devices</p>
<ol>
<li>Monitor</li>
<li>Printer</li>
<li>Speaker</li>
</ol>
</body>
</html>

Figure 1.7 Linking Frame

It means while clicking on the links the content will be displayed in right side browser window.

1.1.7 Magic target names


There are some target names that will open the link in different frames. They are called as
Magictargetnames.
Following are some Magic Targetnames(Table No 1)
Target=_self
This will open the page in the same window as link
Target=_blank
This will open the page in new blank window
Target=_top
This will open a link in top frame of browser window
Target =_parent
This will open the page in the main or parent frame
Table No. 1

1.1.8 Inline or floating frame


<Iframe>----</Iframe> tag is used to create inline frame. This <tag> displays frame along with the
text and graphics in an HTML page. The inline frame appears within <body> Tag.
The following is an example of an inline frame:

<html>
<head>
<title>inline</title>
</head>
<body>
<p>This is an Inline Frame</p>
<br>
<iframe src="page1.html"width=400 height=200
scrolling=yes></iframe>
</body>
</html>

This code is stored in the inline.html and


<iframe> tag is used to display inline
frame as shown in Figure 1.8.

Figure 1.8 an Inline Frame

Attributes of <Iframe>tag
Src
This attribute is used to specify HTML page that you want to display in
the inline frame
Width
Sets the width of inline frame.
Height
Sets the Height of inline frame.
Align
This aligns the inline frame as left, right and center of the page
Name
This attribute is used to assign the name to the inline frame for linking
purpose
Scrolling=yes/no/auto
Scrolling shows the scrollbars in inline frame if the value as yes and
auto and value no hide the scrollbars
Border
Displays the border around the inline frame.
Table No. 2

1.2 Image mapping


Image mapping is a single graphic image that consists of number of hyperlinks incorporated within
an image. The specific areas within an image are known as hotspot. Each hotspot is a link. These
regions are clickable. The map itself is either separate file(Server side map) or part of HTML
document(client side map). Image format can be used are either JPEG or GIF.MAP FILE isa text file
that contains the information of an image and the mapped areas of an image. These areas can be
rectangles, circles, or polygons defined in an image and are done by specifying screen coordinates in
pixels.
Image maps are of two types-client side image map and server side image map.

1.2.1Client side image maps


Client side image maps are not dependent on server. They are executed on client machine from web
browser itself. Since all information for a client-side image map is loaded along with the image, it
works more quickly than server-side image map.
Creating client side image map
In order to mention that image map is client side, use USEMAP attribute of the <img>tag. <map> and
<area>tags are used to define hotspot in an image. The <map> tag has name attribute which is
referenced within the <img> tag with USEMAP attribute.
For example, see the code

<img src="C:\Users\Public\Pictures\Sample Pictures\tulips.jpg" usemap="#test">


<map name="test">
---------------------------------</map>
In above example tulips.jpg is the image.
The attribute usemap="#test" says that this is client side image map and its mapping name is test.
For specifying the areas of the hotspot, the <area> tag is used within <map> tag.
The attribute of <area> tag are as follows

Shape-specifies as Rectangle, circle and polygon.


Coords- specifies coordinates forRectangle, circle and polygon.
Alt - specifies alternate text given to hotspot.
Href-specifies path of html file or URL of website.

To find coordinates of this shape we have to find pixel location of image for that you will have to use
a graphic editing program, such as paint brush or adobe Photoshop. The pixel locations are measured

from the upper left corner of the image. Each pixel locationconsistsof horizontal X and vertical Y
axis
.
RECTANGLE (RECT):This requires the upper left and right bottom (X, Y) coordinates.
<area shape="rect" coords="22, 37, 123, 97" alt="rectangle" href="page1.html">
CIRCLE (CIRCLE):This requires the coordinates of center point and radius (in pixels).
<area shape="circle" coords="406, 38, 30" alt="circle" href="page2.html">
POLYGON (POLY): This requires3 ormore pair of coordinates to form polygon.
<area shape="poly" coords="48, 169, 142, 234, 50,248" alt="polygon" href="page3.html">

The following code is an example of client side image map

<html>
<body>
<img src="C:\Users\Public\Pictures\Sample
Pictures\tulips.jpg" alt="image
usemap="#test">
<map name="test">
<area shape="rect" coords="22, 37, 123, 97"
alt="rectangle" href="page1.html">
<area shape="circle" coords="406, 38, 30"
alt="circle" href="page2.html">
<area shape="poly" coords="48, 169, 142, 234,
50,248" alt="polygon" href="page3.html">
</map>
</body>
</html>

Output of the example

Figure 1.9 Client side image map

1.2.2 Server side image map


When a server side image map is displayed on the browser, then the program that executes the links is
placed on the server. The browser activates program on the server by sending x and y coordinates of
the position where the hyperlink was created. On receiving these coordinates the program on the
server looks at the map file for close match to these coordinates and then loads the file that is closest
to this range.

Creating server side image map


Server side image is not used often but it is very important to know how it works
Server side image map require following elements A map file on the server that contains the coordinated regions and the web pages or URL
Html code to indicate an image map
Steps to create server side image map
1. Using a text editor, create a text file and save it with the extension (.map) and place this file to
same folder in which you have placed html document containing the image. In this map file
you have to include following:
Default http://servername/folder/xyz.html
Recthttp:// servername/folder /yahoo.com 39, 61,179,135
Circle http:// servername/folder/google.com 286, 90, 45
Poly http:// servername/folder/hotmail.com 115, 35,169,117,156,174

A default URL is the location where the user is taken on clicking on part of image map which
is not hotspot. It is important to specify default URL for server side image map.
2. Once you have created your external map file, add the following lines in to your html
document.
<a href=http://servername/folder/server.map>
<img src=cloud.gif ISMAP></a>
The < a href> tag specifies the location of external map file and the server side image map program on
the web server. The<img>tag is reference for the mapped file. The ISMAP attribute in the <img> tag
specifies that the image is mapped file. ISMAP indicates a server side image map.

1.2.3 Combining Client and server side image maps


Most of the steps we have already done in client side and server side image map such as defining
pixel locations and then creating an external map file. The difference is in the step where you have to
reference your external map file and create an internal map file within your html document that
contain image map.
This can be done with the help of combination of server side and client side image mapping.
Once you have pixel location of your hotspot area, then you have to create external map file with
name server. Map,place it in the same folder as your html document. The content of this would be:
Default http://servername/folder/xyz.html
Rect http:// servername/folder /yahoo.com 39, 61,179,135
Circle http:// servername/folder/google.com 286, 90, 45
Poly http:// servername/folder/hotmail.com 115, 35,169,117,156,174
As it is the combination of server side/client side image maps,so it must contain element of both.
Therefore the need for two map filesan internal map file and external map file. The client side map
file is included in html code as-<a href=http://servername/folder /server.map><imgsrc=cloud.gif ISMAP></a>
<map name="test">
<area shape="rect" coords="22, 37, 123, 97" alt="rectangle" href="page1.html">
<area shape="circle" coords="406, 38, 30" alt="circle" href="page2.html">
</map>
The server side map file created earlier will be used only if browser cannot use the client side map
file. In above code
<a href=http://servername/folder /server.map><img src=cloud.gif ISMAP></a>
Links both the client side and server side image maps. This tells the browser where to look client side
map (#test) information in the HTML page and also link the server side image map (server.map) in
case the users browser does not support the client side image map.
The method will make your image map independent of the browser or server.

1.3 Forms and Forms object


Forms are used to accept or input the data from user. The forms that consist form object/elements.
Form elements or objects are Textbox, radio button, checkbox, drop down list, submit and reset button
etc.

1.3.1 The <form> tag


Form is created using <Form> </Form> tag. All form elements are placed inside the body of the
form. Form cannot be nested.
Syntax
<Form>
.
Input elements
.
</Form>

1.3.2 Attributes of <Form> tag


Method: This attribute has two values GET or POST. The POST value is used to send the data to the
server for processing. The GET is the default method by which appends the form-data to the URL in
name/value pairs:
URL?name=value&name=value
Action: This attribute is used to the specify the location/path or URL of the server where form
information submitted.
Name: This attribute is used to assign the name to form.
For example:<form method=post action=http://someserver/xyz/formname.asp>
In above example the forms data is stored at assigned location in action attribute.

1.3.3 Text input fields or textbox


Text field or input field allows the user to key in text in to the field. <Input> tag is used to create a
text/input field or single line text box. It has no ending tag. <input type=text> is used to create
single entry text box. By default the value of type is text.
<Form>
First name: <input type="text" name="firstname" >
Last name: <input type="text" name="lastname >
</Form>
The above HTML code looks in a browser as follows:
First name:
Last name:

Attributes of <Input> tag


Size
Maxlength

Name
Value
Checked
Type
Readonly

This attribute assign the limit to display size of a text box.


<Input type=text size=35 name=xyz>
This limits the number of character that the user can key in a text field.
<input type =text name=xyz maxlength=3> i.e. maximum 3 characters can be
entered in the text box.
Is used to assign the name to the textbox for processing of information contained in
the text box, at the server end.
Is used to assign the default value to text box
Attribute is used for default selection of radio button and checkbox
Indicates the type of form objects like text(default),radio, submit,reset,radio,checkbox
etc.
Indicates that changes to the form element cannot occur
Table No.3

Password Field
When user types in a text field of type PASSWORD then text entered is displayed as asterisk(*)or
disc()sign.
<input type="password"> defines a password field:
<Form>
Password: <input type="password" name="pwd">
</Form>
The above HTML code looks in a browser as follows:

Password:

********

Radio Buttons
Radio buttons are something like toggle button and only one button can be selected at a time. If user
selects a radio button from a group then all other become deselected. You can group RADIO buttons
by giving them the same NAME but different VALUE. By default all radio buttons are unselected.
You can control this status by defining the CHECKED attribute within the INPUT tag.
See the following example
<Form>
<input type="radio" name="sex" value="male"> Male<br>
<input type="radio" name="sex" value="female"> Female
</Form>
The above HTML code looks in a browser:
Male
Female

Checkboxes
<input type="checkbox">creates a checkbox. Checkbox is used to select ONE or MORE options of a
limited number of choices. Checked attribute will select the checkbox by default. Following code
shows two checkboxes. Using checked attribute, Tuesday checkbox get selected by default.
<Form>
<input type="checkbox" name="day1">Monday<br>
<input type="checkbox" name="day2" checked>Tuesday
</Form>
The above HTML code looks in a browser:

Submit button
<input type="submit"> defines a submit button. A submit button is used to send form data to a server
for processing. The data is sent to the page specified in the form's action attribute.
<form name="xyz" action="html_form.asp" method="post">
Username: <input type="text" name="user">
<input type="submit" value="Submit">
</form>
The above HTML code looks in a browser:
Username:
If you type some characters in the text field above, and click the "Submit" button, the browser will
send your input to a page called "html_form.asp". The page will show you the received input.
Using the VALUE attribute you can change the label of the button to of your choice. If you have not
specified the value attribute, then submit query will be displayed by default.

<input type=submit value=Hello world! >


Or
<input type=submit>
The above code displayed in a browser:

Or

RESET BUTTON
The RESET button usually used along with SUBMIT button resets the value of the form to its original states.

<input type=reset value=Reset>


Or
<input type=reset value=clear form>

Using Button value also we can create button. Remember, whatever button we have created using
Button value that is only for clicking only not submitting the form data.
<form>
<input type="button" value="CLICK>
</form>

Hidden fields
Hidden is value of <input>type tag. The main purpose for the hidden field is to store the value that
need to be sent to server along with form submission. The web browser does not display these values.

<input type=hidden name=xyz>


The<SELECT> TAG
The<select>--</select> tag allows the user to select an option from menu kind of drop-down list or
scrolling list box.
Each item in the drop- list can be created using <option>--</option>tag which is used within
<select> tag. The closing</option> tag is optional. You can use VALUE attribute along with each
<option> tag to assign a value to each option. (Figure1.10)

<html>
<body>
<form>
<p> please select the car</p>
<select name="car">
<option value="volvo">Volvo</option>
<option value="saab">Saab</option>
<option value="fiat">Fiat</option>
<option value="audi">Audi</option>
</select>
</form>
</body>
</html>

The output of example

Figure 1.10 select tag

Attributes of <select> tag


Name
Size
Multiple

Is used to assign the label to selection. This helps to identify which item
user has selected.
Allows to specify the number of list items to be displayed at one time. e.g.
size=value
It is used to select more than one selection from the same list
Table No.4

This display the option as selected by using the SELECTED attribute with <option> tag. If this is not
included, the form displays the first element listed as default selected choice.
The following example includes the entire SELECT attribute

<html>
<body>
<Form>
<p>Select the city
<select name="city">
<option value="1">Mumbai</option>
<option value="2">Pune</option>
<option value="3">Delhi</option>
</select></p>
<p>select multiple option</p>
<select name="city" multiple>
<option value="1">Mumbai</option>
<option value="2">Pune</option>
<option value="3">Delhi</option>
</select><br><br>
<input type="submit" value="submit">
<input type="Reset" value="Reset">
</form>
</body>
</html>

The output of example

Figure1.11 a select tag showing multiple options

1.3.4 The <Textarea> tag


The <Textarea>--</Textarea> is used to create multiline textbox or large editable area. It is useful in
those forms where you want detailed feedback with multiline entries.

Attribute of <textarea> tag


Name: =text attribute sets the name of the textarea to the script on the server when the form is
submitted.
Cols=number: specifies the width of the text entry area as columns.
Rows=number: specifies the height of the text entry area as rows.

For example

<html>
<body>
<form>
<p>Extra-curricular Activities
description</p>
<textarea rows="3"
cols="30"></textarea>
<p>Extra-curricular Activities
description</p>
<textarea rows="3" cols="30"> Please
enter your comment</textarea><br>
<input type="submit" value="submit">
<input type="Reset" value="Reset">
</form></body></html>

The output of example

Figure 1.12 textarea tag within form

<input type=file> This attribute is used for uploading the files.


Observe the following example

<html>
<head><title>form</title>
</head>
<form>
<p align="center"><b>File Upload system</b></p>
File Description:<br>
<input type="text"><br>
Specify File to post<br>
<input type="file"><br>
<input type="submit" value="Send it"></form>
</body>
</html>

Output of the example

Figure 1.13 File form control rendering the


dialog box

Sample Feedback Form


<html>
<head>
<title>Form</title>
</head>
<bodybgcolor="yellow">
<h2 align="center">Feedback Form</h2>
<form>
<P>
First name: <INPUT type="text" name="firstname"><BR>
Last name: <INPUT type="text" name="lastname"><BR>
Email address:<INPUT type="text" name="email"><BR>
Sex:<BR>

<INPUT type="radio" name="sex" value="Male"> Male<BR>


<INPUT type="radio" name="sex" value="Female"> Female<BR>
Hobbies
<ol>
<li><Input type="checkbox">Reading Books</li>
<li><Input type="checkbox">Listening to music</li>
<li><Input type="checkbox">Playing Games</li>
</ol>
What would you like to do today? <BR>
<SELECT size=2>
<OPTION value=drink>Drink Coffee
<OPTION value=read selected>Read A Book
<OPTION value=walk>Take A Walk
<OPTION>Exercise
</SELECT><BR>
Please enter your comments below: <BR>
<TEXTAREA name=positive rows=10 cols=20></TEXTAREA><BR>
<INPUT type="submit" value="Send">
<INPUT type="reset" value="Clear Form"></form></body></html>
Output of the example:-

Figure 1.14 Form objects

1.4 Inserting Sound and Video


Inserting audio and video increases the effectiveness of web pages. We can insert sound and video in
addition to hyperlink for video in web page.
Popular sound/audio formats for the web are
1. .WAV format developed by Microsoft and IBM. It is audio standard for windows platform.
2. .AIFF (Audio Interchange File Format) was developed by Apple and is mainly used for MAC
platform.
3. .Ra (Real Audio Format) is lower quality audio, but loads much more quickly due to file size
the Real audio file is much smaller WAV,AIFF format. The sound quality is not as good.
4. .MPEG/.MPG(Moving Picture Experts Group) format does not occupy space and gives very
good sound quality. This is very popular sound format for the web.
5. .AU (Audio) is a Sun Microsystems format. It is for UNIX platform.

6. .MIDI (Musical Instrument Digital Interface) format is basically music industries standard
format that uses very less disk space than that of WAV formats. This format is used for
instrumental music.

1.4.1 Linking to an Audio/Midi files


Hyperlink the audio file format that would like to use in web page.Using <A>anchor tag.
Output of the example

<html>
<head>
<title>audio in webpage</title>
</head>
<body>
<a href=C:\Users\Public\Music\Sample
Music\Sleep Away.mp3> click here to play
the song</a>
</body>
</html>

Figure 1.15 Hyperlink the audio

1.4.2 Adding sound to web pages


To add music/audio file in to web page, <Bgsound>and<Embed> both tags can be used.

1.4.2.1 <Bgsound> tag


Using <Bgsound> tag background sound can be added to an HTML page. Using this tag you can play
audio format like WAVE, AU and MIDI. The <Bgsound> tag does not have any control attribute. It is
supported by only Internet Explorer Browser .
Syntax
<Bgsoundsrc=audio file loop=2>
Attributes of <Bgsound>tag ( Table 5)
Src
Loop

Specify the name of audio file that you want as background sound
This attribute specify number of times the file must be played. The
attribute takes number as value e.g. Loop=2 plays sound file twice,
loop=infinite or -1 plays sound file continuously/ forever
Table 5

The following example shows the background sound and their attribute

<html>
<head>
<title>audio</title>
</head>
<body>
<h1>Inserting Background sound</h1>
<bgsound src=C:\Users\Public\Music\Sample
Music\Sleep Away.mp3loop =-1>

The output of example

Figure 1.16<Bgsound> tag

</Body></html>
1.4.2.2<Embed> tag

This tag is used to insert audio as well as video both. With <embed> you have several options for
customizing the console.
Attributes of<Embed>tag (Table 6)
Src
Autostart=true/false
Hidden= true/false
Volume
Width
Height
Controls=consoles/small
consoles

Specify the name of audio or video file that isembeded in HTML page.
True tell the browser to play the music when page is loaded. Using false
as a value will mean that the sound will have to play by the user clicking
on play button.
False value shows the console(Default) where as true value hide the
console so you can only listen the audio or video
Sets the volume of music. The volume can be set to any value between 1
to 100, 50 being the default value.
specifies the width of console
specifies the height of console
Value Console gives the complete console with play, stop and pause
button and small consoles displays play and stop button.

Table 6

For example
Output of the example

<html>
<head>
<title>embed</title>
</head>
<body>
<h1>Inserting sound using Embed tag</h1>
<embed src=song.mp3 height=200
width=200>
</body>
</html>

Figure 1.17 Sound using Embed Tag

1.4.2Video file formats


Inserting video or movie files in the web page makes it more attractive. Like sound file format there
are video formats which can be inserted into the web page. Some of video formats are:
.AVI (Audio Video Interleave) format for windows was developed by Microsoft and it is windows
standard.
.QT (QuickTime)formats developed by Apple for MAC platform.
MPEG /mpg/.mp3 format produces fine picture quality and is widely used for web.

1.4.4Adding video using the DYNSRC and EMBED tag

<embed> tag is used to insert video on the web page. Dynsrc (Dynamic source) attribute is used
along with <img> tag which is used specify the name of video file.
Syntax
<img dynsrc=name of video file>
For example

<html>

Output of example

<head>
<title>adding video</title>
</head>
<body>
<h1> Adding video using DYNSRC</h1>
<img
Dynsrc=C:\Users\Mr.Ashish\Desktop\Shala
[2012] Marathi Movie.avi height=200
width=200>

Figure 1.18 VIDEO with DYNSRC

</body></html>

Example with <Embed> tag


Output of example

<html>
<head>
<title>adding video 1</title>
</head>
<body>
<h1> Adding video using EMBED</h1>
<embed
src=C:\examples\media\sample.avi
height=200 width=200>
</body>
</html>

Figure 1.19 video with <EMBED>

1.5Creation of Web Content using Indian Languages by using standard Unicode and
Indian Language fonts such as Arial Unicode MS and Mangal
We were facing many problems while typing regional languages other than English in Computer. It
was trouble for us while working with other languages; but it is possible through standard Unicode
We shall learn use of Unicode to establish regional language.
Unicode is an standard character set encoding developed and maintained by The Unicode
Consortium. The Unicode character set has the capacity to support over one million characters, and is

being developed with an aim to have a single character set that supports all characters from all scripts,
as well as many symbols, that are in common use. Unicode, also known as UTF-8 (Unicode
Transformation Format-8) or the "Universal Alphabet. After creating your multilingual Web pages,
you should test them on as many browsers and operating systems as you can. Nearly all of the current
Web browsers include Unicode support and can therefore display text simultaneously in several
scripts and languages, provided that suitable fonts are installed and that the browser has been
configured to use them. We can read easily typed content on any computer. For using Unicode in
computer, installation of font Mangaland Arial Unicode MS is necessary.
Steps to create WebPages using Indian languages.

1.5.1 Language setting in windows 7


The default language setting of windows does not give permission to type the content in
certain languages so you have to make certain changes in windows 7/Vista to make it
compatible to the fonts of that particular language.
Go to control panel in windows 7 operating system and add Devnagari keyboard to it. Click
on the start button on the Taskbar and click on Control panel (Figure 1.20).
Next, click on Clock, Language and Regional and Click on Change Keyboards or Other
Input Methods options. Now in the Regional and Language Options window in the
Keyboards and Languages Tab, click on the change keyboards option. (Figure 1.20 and
1.21).
Now in the Text Services and Input Languages window, in the General Tab, click on
Add button. In the Add Input Language window, in front of the Marathi (India) font,
click on plus sign. Now click on plus sign in the front of the word on the plus sign in the front
word Keyboard and click on Devnagari In script and Marathi (India) and click on the OK
button.(Figure 1.23 and 1.24).
Now in the Text Services and Input Languages window, in the Default Input Languages,
include Marathi (India) -Devnagari In script option and click on the Apply button. Then
click on OK button.(Figure 1.25).
The above procedure shown in Figure 1.20 to 1.25

Figure 1.20 start menu

Figure 1.21 control panel

Figure 1.22 region and dialog box

Figure 1.23 Text services and input language

Figure 1.24 Add input language

Figure 1.25 Add input language

For the example

<html>
<head>
<title>Indian language</title>
</head>
<body><h1>
</h1>
</body>
</html>

Type this code in the notepad by setting Marathi India


and save as html extension and UTF-8 Format.
Output of the example

Figure 1.26 web pages using Indian Languages

1.6 Cross browser testing


Testing your website on different browser is known as Cross browser testing. Once website is ready,
it must be tested on different browser i.e. Internet explorer and Mozilla Firefox is called as Cross
Browser Testing Method. This shows limitation of the web site and functional features. Some html
tags are not supported by certain versions of different browser.
For example
<html>
<head><title>cross browser</title>
<body>
<bgsound src=ding.wav loop=2>
<img src=noimage.jpg alt=broken image>
<br>
<blink> This blinks the text</blink><br>
<table border bordercolorlight=red bordercolordark=yellow>
<Caption>temperature</caption>
<tr>
<th>City</th>
<th>Max</th>
<th>Min</th>
</tr>
<tr>
<td>Mumbai</td>
<td>30</td>
<td>25</td>
</tr>
<tr>
<td>Pune</td>
<td>35</td>
<td>30</td>
</tr>
<tr>
<td>Nagpur</td>
<td>40</td>
<td>35</td>
</tr>
</table></body></html>
Cross browser testing by using Internet Explorer and Mozilla Firefox browser. Output of the example
in figure 1.27 and figure 1.28

Figure1.27 Cross browser test in Internet Explorer Browser

Figure 1.28 Cross browser test in Mozilla Firefox Browser

1.7 Introduction to CSS


CSS stands for Cascading Style Sheet. Style defines how to display html element/tags. CSS allows
styling of web page. CSS is an advance tool for web designer to create professional WebPages that
cannot be made using regular HTML attribute.CSS can be Internal, External and Inline.

1.7.1 Internal CSS


Internal style sheet can be defined internally within the web document. To define CSS into html code
<style> tag is used within <head> tag.
CSS syntax
A style sheet is a set of rules. To define a rule you need a

a Selector
a Declaration- i.e. Property and value

Selector {property: value}

The selector is normally the HTML element/tag you want to style.


Each declaration consists of a property and a value.
The property is the style attribute you want to change. Each property has a value.
A CSS declaration always ends with a semicolon (;), and declaration groups are surrounded by curly
brackets. Property and value can be separated by colon (:).
Example program

<html>
<head>

Output of example

<title>CSS Example</title>
<style>
p{background-color: red; text-align: center}
</style>
</head>
<body>
<p>this is paragraph</p>
</body>
</html>
Figure1.29 CSS Effect

1.7.2 External style sheet


An external style sheet is ideal when the style is applied to many pages. In this method style
definitions are stored in a separate file with an extension .css . Link the file with the HTML document
using <Link>tag within<head> tag.

Consider the following example


The first file style.css is external file that stores style definitions. The second file, external.html, is
HTML document that uses the style definitions stored in the file style.css.
Style.css

h2 {font-style: italic; background-color: yellow; color: red}


P {background-color: pink}
In the preceding code, the style for <h1> and <p> tags are defined.Save this file with style.css

The following is the code for the external.html file


Output of example
External.html

<html>
<head>
<title>external css</title>
<link rel="stylesheet"
type="text/css"href="style.css">
</head>
<body>
<h2>This is heading style
example</h2>
<p>This is Paragraph</p>
</body>
<html>

Figure 1.30 External style sheet

1.7.3<Link> Tag and their attribute


<Link> tag is used to link style sheet properties to an HTML document. You can also define by
linking to an external style sheet.<link> tag used within <head> tag.
Attributes of <link>
REL

This attribute is used to define the relationship between the linked file and the
HTML document.

TYPE

This attribute is used to specify a media type=text/css for a Cascading Style


Sheet.

HREF

Specifies the css filename to be linked..

1.7.4 Inline style sheet


In Inline style sheet we can use style element as an attribute of any tag. To include the style definition
with the tag, we use STYLE property. For example, to define a style for <p> tag with the properties a
font face Arial and text italicized, you can use following code.
<p style=font-family: Arial; font-style: italic>This came from a paragraph tag with a style</p>
An inline style affects only the element for which the style is defined.
In the code line, the first <p> tag has an inline style defined as <font-family: Arial; font-style:
italic>. This style will be only applied to the text written within that <p> tag.

For example

<html>
<head><title>inline css</title>
</head>
<body>
<p style=font-family: Arial; font-style:
italic>This came from a paragraph tag with a
style</p>
</body>
</html>

The output of example

Figure 1.31 Inline style sheet

1.7.5 The classes IDs


The CLASS selector is used formatting variations for different instances of a single element. For
example, using the CLASS selector, you can define different styles for the different instances of the
H1 element in an html document. The CLASS selector can be used to share the same format.
A class selector definition starts with a period (.) followed by a name, and then the style definition.
Consider the following example

<html>
<head><title>Class Selector Example</title>
</head>
<style>
.xyz {color: green; background-color: yellow}
</style>
</head>
<body>
<h1 class=xyz>Heading with style definition from the class .xyz</h1>
<p class=xyz>This is first Paragraph taking the style definition from class</p>
<p>This is another paragraph with no style</p>
</body>
</html>
In the above code .xyz is a class name. <H1> tag and the first <p> tag share the same styles defined in
the class .xyz. The second <p> tag does not take this style because the class is not applied to it.

The output of example

Figure 1.32 class selector


Notice that although <H1> and <p> tags are of the different types, they pick up the styles defined by
the .xyz class. An ID is similar to CLASS selector. However, there is difference between ID selector
and a CLASS selector. Unlike a CLASS selector, an ID selector applies to exactly an element in an
HTML document. ID gives identification to a particular element.
An ID selector definition starts with (#) hash symbol, followed by name, and then the style definition.
Consider the following code

<html>
<head><title>ID Selector</title>
</head>
<style>
#pqr {color: green; background-color: pink}
</style>
</head>
<body>
<p ID=pqr>This Paragraph taking the style definition from ID selector</p>
</body>
</html>
In the above code #pqr is the name of ID selector. When the ID, pqr, is applied to the <p> element,
the ID is not applied to any other element.

Figure 1.33 ID Selector

1.7.6 The contextual selector


There may situations when you want a given style to be applied to instance of one selector within
another. For example, when <i>---</i> tags occur inside <p>---</p>tags, the text color should be
green. You can do this by declaring the style tag.
<style>
P I {color: green}
</style>
Here, only instances of the<I> tag within the <p> tag will have the style as declared above.

<html>
<head><title>contextual Selector</title>
<style>
PI{color: green}
H1{color: red}
</style>
</head>
<body>
<H1>Using <I> Selector</I></H1>
<p> contextual <I>selector</I></p>
</body>
</html>
In the above code, the <I> tag enclosed in the <p> tag will have the text in green and the <I> tag
enclosed in the <H1> tag will take the color of <H1> tag.

Figure 1.34 displays the output of the above code

Figure 1.34 Contextual selector

1.7.7 Grouping selector


This property can be used when same style has to be applied to different tags.
Without grouping, the syntax will be
H1 {font-family: arial ; color: red; background-color: yellow}
H2 {font-family: arial ; color: red; background-color: yellow}
H3 {font-family: arial ; color: red; background-color: yellow}
It can be grouped as
H1, H2, H3 {font-family: arial; color: red; background-color: yellow}

1.7.8 Positioning using CSS


With CSS positioning, one can place an element exactly where user want it on the web page. By
applying CSS positioning to the elements, user can control the positioning of the elements.
There are two ways of positioning

Absolute positioning
Relative positioning

The principle behind CSS positioning is that you can position any box anywhere in the system of
coordinates.
Imagine a browser window as a system of coordinates

Figure 1.35 coordinate window


Let's say we want to position a headline. By using the box modelthe headline will appear as follows:

If user want this headline positioned 100px from the top of the document and 200px from the left of
the document, then the code is asfollows in our CSS(Figure 1.35a)
h1 {
position: absolute;
top: 100px;
left: 200px;
}
The result will be as follows:

Figure 1.35(a)

1.7.8.1Absolute positioning
The absolute positioning define the exact pixel value where the specified HTML element will appear.
To position an element absolutely, the position property is set as absolute.The properties left, right,
top, and bottom to place the box.
For the example

<html>
<head>
<style>
h3 {position: absolute; top: 200px;left: 150px}
p {position: absolute; top: 75px;left: 75px}
</style>
</head>
<Body>
<h3>This is my h3 header</h3>
<p>This is my paragraph</p>
</body></html>
The output of example

Figure1.36
In above example the heading tag positioned 200px from the top of the document and 150px from the
left of the document, and paragraph tag positioned 75px from the top of the document and 75px from
the left of the document

1.7.8.2 Relative positioning


It is the distance from previous element of the web page or offset the box from other element on the
web page. To position an element relatively, the property position is set as relative.
The position for an element which is relatively positioned is calculated from the original position in
the document. That means that you move the element to the right, to the left, up or down.
In the example given below first row of the text normally across the page. The second row, displayed
using <P> tag positioned 35 pixels to the right of the element above it as shown in Figure 1.37

<html>

Output of example

<head>
<title>Relative position</title>
<style>
#xxx {position:relative;Top:70px;left:35px}
</style>
</head>
<body>
<p>This is normal flow text row</p>
<p id=xxx>This text is offset from the
above line 70 pixels from top and 35 pixels
on the left<p></body></html>
Figure 1.37 Relative positioning

1.7.9 3-D Layers


Using the Z axis positioning you can layer objects on top of each other. If you position multiple
elements at the same x and y coordinates, each new element will cover up the earlier elements.
To avoid this, z-index property is used. You can specify the layer on which an object is to be
positioned by setting the z-index higher or lower.
In the following example, shows how by using the z-index two lines of the text with approproximately
the same absolute location are placed on the page as shown in figure 1.38

<html>
<head>
<title>3 d layers</title>
<style>
.upper {position: absolute; Top: 35px; left: 30px; width: 200px; height: 150px; z-index: 2;
background-color: yellow}
.lower {position: absolute; Top: 65px; left: 90px; width:300px;height:150px;zindex:1;background-color:green}
</style>
</head>
<body>
<div class=upper>this layer is positioned at 30 px from the left and 35 px from the top of
the window.
</div>
<div class=lower>this layer is positioned just below the above text, and would usually be
placed on the top using z index </div>
</body>
</html>

Observe the following Figure 1.38

Figure 1.38 3-D layers

1.7.10Letter-spacing property
This property adjusts the amount of space between letters in the content.
Following example give 20 pixels space has been placed as in Fig1.39

<html>
<body>
<p style=letter-spacing: 20px>In this line each letter has been placed 20 pixels apart</p>
</body>
</html>
The output of example

Figure 1.39 Letter Spacing

1.7.11.1Text-Decoration
This property allows the user formatting like underline, line-through, overline or no line at all the text.
Syntax
Selector {Property: Value}
Where values are

Value

Description

None

Defines a normal text. This is default

Underline

Defines a line under the text

Overline

Defines a line above the text

line-through Defines a line throughi.e. strike out the text


Blink

Defines a blinking text. The "blink" value is not supported in IE, Chrome
browser supported in Mozilla Firefox

The following code demonstrate text-decoration property

<html>
<head>
<style type="text/css">
h1 {text-decoration: overline}
h2 {text-decoration:line-through}
h3 {text-decoration:underline}
h4 {text-decoration:blink}
</style>
</head>
<body>
<h1>This is heading 1</h1>
<h2>This is heading 2</h2>
<h3>This is heading 3</h3>
<h4>This is heading 4</h4>
<p><b>Note :< /b>the "blink" value is not supported in IE, Chrome, It is supported in Mozilla
Firefox<p>
</body>
</html>
Output of the example

Figure1.40 Text decoration property


1.7.11.2 TEXT ALIGN
The text-align property allows you to adjust the text alignment of your content. You can align to the
left, right and center or justify.
Syntax
Selector {Property: value}
Where the values are
Left, right and center or justify
For example
h1 {Text-align: center}
In above code line displays the content of <h1> as a center of the page.

Style Properties
Property

Description

background-color

Sets the background color of an element

Color

Sets the color of the text

background-image

Sets the background image for an element

border

Sets all the border properties in one declaration

border-color

Sets the color of the four borders

height

Sets the height of an element

width

Sets the width of an element

font

Sets all the font properties in one declaration

font-family

Specifies the font family for text

font-size

Specifies the font size of text

font-style

Specifies the font style for text

font-variant

Specifies whether or not a text should be displayed in a small-caps


font

font-weight

Specifies the weight of a font

Table No.7
1.8 Web server
Web server can be refered to either the hardware (the computer) or the software (the computer
application) that helps to Transfer Web pages that can be accessed through the Internet. The most
common use of web servers is to host websites or provide access to content and responds to requests
received from web browsers. A web server uses one or more protocols such as HTTP (Hyper Text
Transfer Protocol), FTP (File Transfer Protocol) and for transfer.
Web server also performs file management, execute script, process form data, authenticate data and
perform security checks.
1.8.1 Locating web server
At the time of visiting an FTP server with a WYSIWYG (What You See Is What You Get) * FTP
program (like CuteFTP) you will be presented with a list of directories. A directory is identified by
the characters "dir", for "directory" or a little yellow folder icon. If click on this line you will go down
the directory tree to more directories or to the files in that directory, or both. Today most FTP sites
can be viewed using a standard web browser. The web browser will list the directories and files in
blue (denoting a link below). You can click on these links to commence a download. Simply type the
URL of the server into the location box.
For example:
ftp://name.of.site/ will give you a listing of all the directories of
the FTP server;
ftp://name.of.site/directory/ which will give you a listing of all the
files available in that directory; and
ftp://name.of.site/directory/filename will download the actual file
to your computer
1.8.2 Directories and File Organisation
To move through levels of directories in the same way that you do in Windows Explorer in Windows.
In other words, mouse click on a directory to see its contents. Move up the directories by clicking on
the up arrow folder icon and down directories by clicking on the directory's folder icon. Lets say you
had built a web site and you wanted to upload all your files to your ISP's web server. In the left pane
you would go to the directory with your HTML files and picture files in it. In the right pane find your
"work space. In the left pane you would highlight the files you want to move to the web server and
then click the up pointing arrow. Note that file names can be deleted or renamed in FTP program.

1.8.3 Moving files to web server


To move files to the web server use FTP, FileZilla or some other way. While transferring the file
following points are important
File name restrictions are to be considered.
Watch out for upper/lower case sensitivity as web servers (namely, those of the UNIX and
Linux variety) are sensitive to the case use in file names.INDEX.html and index.html are
considered as two different files.
Transferring mode of file: when you transfer file using Filezilla FTP or any other program
will be provided with option like binary or ASCII mode of transfer. Always transfer your
HTML files, images and other media in binary format.

1.8.4 Commercial web services


Using Internet access through ISP (Internet service Provider) via commercial online service, then this
method is expensive method and there may be space and script restrictions. These can solve these

issues with the help of ISP or Commercial Web services. There are many services are available on
internet that provide assistance in web publishing. They provide disk space,FTP and other programs
to upload files to their server. These commercial services have administrator, which maintain the
server and it is running all the time. Some of these services charge monthly or some of them free of
cost.
For example
http://www.geocities.com, http://www.tripod.com
Most of commercial internet services providers give web space on their own server and account name
is added on to the server address.

1.8.5 Setting up the web server


Websites on server maintained by someone else may have to face lot of restrictions such as space,
script and content in some cases. By setting up own server a lot of these problems can be erased.
There are many things to consider when setting up own web server. A computer that can be dedicated
as a web server with broadband connection.
A high upload rate is of the utmost importance. A computer that will be enough to keep up with server
requests. Processor intensive web sites will require a higher quality PC than a web site that only has a
few static HTML pages. An ISP or Internet Connection that supports web traffic. Many ISPs will not
allow users to run a web server unless they pay an additional fee.

1.8.6 Windows IIS server and UNIX Server


Windows IIS server
Internet Information Services (IIS) formerly called Internet Information Server is a web
server application created by Microsoft for use with Windows. It comes with three other servers web,
FTP and Gopher. IIS is for Windows XP, Windows Vista and Windows 7 operating systems. It is
used for building and administering web sites.An ASP (Active Server Pages) scripts processed on web
server (IIS).

Servers for UNIX systems


The NCSA (National Center for Supercomputing Applications) and Apache are twopopular
serveravailable for UNIX systems.NCSA HTTPD was a web server originally developed at the
NCSA by Robert McCool. It includes security, authentication, and login and password validation. It
supports form processing and CGI script. The Apache HTTP Server commonly referred to as
Apache. Apache was originally based on NCSA HTTPD server. This server is faster than many other
free servers available.
References

1. web publishing by Monica Dsouza Jude Dsouzatata McGraw-Hill


ISBN 0-07-040270-1
Chapter 6,9,13,14
2. HTML and XML introduction Prentice-Hall of india 2003 ISBN 81-203-2389-0 Chapter 9
3. http://www.w3schools.com
4. http://www.html.net/tutorials/css/lesson14.php

EXERCISE
1. Fill in the blanks
1.
2.
3.
4.

The ----------- attribute of <form> tag is used to specify path the file to be sent to the server.
The---------------- tag encloses client side image map specifications like shape and coordinates.
------------- audio tag can only be used with Internet Explorer.
For floating frame---------- tag is used.
5. IIS stands for---------------------2. True or False
1. FTP stands for file transporter protocol
2. Dynamic and src are supported attributes of <img> tag
3. To create server side image map ISMAP is used.

4. Noresize is attribute of <form> tag.


5. To add sound file in the web page <embed> tag is used.
3. Multiplechoice (ONE correct)
1. ________ tag is used to create Inline frame
a. <frame> b. <iframe> c. <framset> d.<Noframe>
2. Target = ____________ will open the new html page in new window
a. a._parent
b. _blank c._self d. _top e._bottom
3. Browser which does not support frame and to avoid blank screen ____ tag is used
a. <frame set> b. <frame> c .<noframe> d. <iframe> e.<nframe>
4. ________tag defines client side image map
a. <map> b.<name> c.<iframe> d.<name> e.<usemap>
5. _________tag is used to create single line textbox.
a. <input type=text> b. <text field> c. <text> d. <inputfield>
6. IIS is ___________ server.
a. Unix
b. Linux c. Opera d. windows
4. Multiple choices (TWO correct)
1.<iframe> tag supports following attributes
a. src b. Align c.frameborderd.getpos()
2. Following tags are used in client side image maps
a. <Area> b. <shape> c. <Map> d. <Ismap>
3. The valid values for method attributes of <form> tag in HTML are___
a. post b. get c. send d. retrieve
4. Sound can be added in web page using
a. <bgsound> b. <sound> c. <audio> d. <embed>
5. Style tag can be present inside______
a. <title> b. <head> c. <body> d. </title>

5. Write HTML code for the Following


1.

Chapter 2.Cyber Laws and Ethics Syllabus


2.1 Moral, Ethics and Law
2.2 Ethics culture and ethics for computer users, professionals and business
2.3 information service
2.4 code and guidelines of ethics
2.5 Introduction to cyber Laws and IT Act of India 2000
2.6 Digital Signature, Electronic Records-Attribution, acknowledgment and dispatch
2.7 Ten Commandments of Computing
2.8 Security and Privacy Control
2.9 Intellectual Property Rights
Scope and Limitations
2.1 Moral, Ethics and Law
2.2 Need for Ethics culture and ethics for -- computer users, professionals and business
2.3 Information service
2.4 code of ethics and ethic guidelines
2.5 Introduction to cyber Laws and
2.6 IT Act of India 2000 Definitions, Digital Signature, Electronic Records-Attribution,
acknowledgment and dispatch
2.7 Ten Commandments of Computing
2.8 Security and Privacy Controls
2.9 Intellectual Property Rights

Chapter 2
Cyber Laws and Ethics
Introduction:
With the widespread usage of IT, computers, mobile phones, Internet and other components of
the ICT technologies in India over the last couple of decades, there is increase in misuse (cyber
crimes) as well. Internet is easy to use and low cost fastest mode of communication. Majority of
the people are using it. Hence there is rise in cyber crimes. Cyber crimes such as spreading
computer virus, hacking, online financial frauds, email spamming, phishing etc. So to get remedy
for all these cyber crimes, IT act in India was finally articulated in the form of IT act 2000 in
year 2000 and modified in 2008 IT Act 2008 (Amendment). Ethics identify what is wrong and
what is rigt.
2.1 Moral, Ethics and Law
Moral: Moral refers to generally accepted standards of right and wrong in a society. Parents
guide their child to learn how to behave in society. e. g. Do not lie, do not steal, etc. In cyber
world, there are also such standards. e.g Do not make use of pirated software CDs, Do not use
computers for wrong and illegal hacking, stealing of passwords etc. A set of moral principles
which systematically links moral beliefs to each other is called as moral theory.
Ethics: The parents guide child to identify what is wrong and what is right; and select the right
thing. This determination of right and wrong, following right behavior, using morals is called as
ethics.
Laws: Law includes any act of parliament or of state legislature, ordinance promulgated by the
president or a Governor, as the case may be; Bills enacted as Presidents Act and includes rules,
regulations, bye-laws and order issued there under.
2.2 Ethics Culture and ethics for computer users:
It depends on a person that how to make appropriate use of any means. We always observe that
our society consists of various types of people. Constructive minded people make decent and
appropriate use of their knowledge and technology; by thus helping society in most preferred
way. Whereas, there can be also people who utilize their knowledge in destructive way for
various reasons.
Internet is communication media which is easily accessible & open to all. The word Cyber
Ethics refers to the code of responsible behavior, one has to demonstrate while using Internet.
In a way, it is the code of conduct which defines what is right and what is wrong. It can be also
termed as netiquette i.e. net etiquette to be ensured. As a part of responsible computer user in
the society, one shall use the system in ethical and lawful manner.
Ethics for Computer User Any ethical computer user should avoid
1. Software piracy
2. Unauthorised access

Software Piracy: Software Piracy is nothing but copyright violation of software created
originally by individual or institution. In includes stealing of codes / programs and other
information illegally and creating the imitated copy by unauthorized means and utilizing this
data either for own benefit or for profit making is violation of copyright act. Piracy is possible in
many forms and few most common are: duplication of original license copy, distribution and
usage of the same.
Types of software piracy include:

Borrowing and installing a copy of a software application from a person


Installing more number of copies of the software than authorized number of licenses
copies available
Installing and selling unauthorized copies of software while purchasing new computers.
Duplicating and selling copyrighted programs.
Downloading software illegally from peer-to-peer network, Internet auction or blog.

Unauthorized written CDs / DVDs for music, various software & utilities, etc. are the most
commonly observed examples of piracy.
Unauthorized Access:
Authorization means granting access rights to resources, which is related to information security,
computer security and to access control in particular. This is typically possible when the
particular software / service is purchased through legal and formal procedure.
Gaining access without user permission is known as Unauthorised Access.
Attempting to get information (like e-mails, bank account, intellectual or any other personal &
confidential information) from unauthorised person is known as accessing the machine illegally.
Examples of Unauthorized Access are :
-

Hacking financial / bank account related information


Stealing organizational / intellectual information
Illegal monitoring of information owned by other users including mails and messaging
Illegal use / break of login and password of other users
Causing intentional irritation to other users by means of damaging software and
important information, etc.

Security technologies are used to manage access and prevent unauthorized access. It includes:
Firewalls
Intrusion Detection Systems (IDS)
Virus and content scanners
Patches and hotfixes
Hardening operating systems and applications

Unauthorised access can be overcome by


1. Users vigilance / monitoring
2. Updating installed softwares regularly with proper permissions and certifications
3. Installing patches regularly released by software companies

2.3 Information Services


1. Ensuring accuracy and authenticity
2. Properly designed database
3. Information provided should be complete without ambiguity
4. Providing proper security from unauthorized access
2.4 code and guidelines of ethics: Following are few key points which user should follow as
guidelines.
1. Honesty: As a part of decent behavior (netiquette), user shall always demonstrate the truth
while using internet.
2. Respect: User shall respect the privacy of the other users
3. Confidentiality: User shall keep confidentiality while using internet and do not share any such
information to anybody which will be breach and user should not try to get confidential data of
other users
4. Professionalism: User shall maintain professional conduct and well-mannered approach
5. Responsibility: User shall take ownership and responsibility of own data on internet and shall
also ensure that it contains authenticity and truth
6. Communication: User shall ensure decent and polite communication with others.
7. Obeying the law: Use should strictly ensure to obey the law and demonstrate decent internet
usage.

2.4.1 Ethics for Computer Professionals:


1. Computer professional is obligated to perform assigned tasks competently, according to
professional standards.
2. These professional standards include technical excellence and concern for the social effects of
computers on operators, users and the public.
3. Computer professionals shall ensure that their technical knowledge and efforts to create
desired output are getting utilized in the development of society.
4. Computer professionals are bound to operate on ethical grounds and with legal functions.
5. There are key factors and responsibilities that a computer professional shall take into account:

Key factors and responsibilities of Computer Professional


-

Before processing on defined activities, computer professional must ensure availability


of authentic and legal version of purchased software products. User must avoid usage of
pirated copy, thereby respecting legality of the product.
Privacy is individuals right. Hence Computer Professional should ensure that they design
the product with high security and avoid any attempt of unauthorized access to specific
site / server.
Confidentiality of the data shall be ensured so that it should be accessed by only intended
user.
Data storage shall be ensured at well protected servers
All defects must be rectified before launching the product of that version.
All applicable cyber laws shall be taken into consideration while developing or launching
any software product.

2.4.2 Ethics for business:


With the help of internet, world has now become a global village. Internet has been proven as
boon to individuals as well as various organizations and business. E-commerce is becoming very
popular among businessmen as it is helping reach consumers faster than any other means. Every
consumer will expect that business deals should be carried out in the most legal and efficient way
and he should be benefited with service and product obtained through internet.
1. Business should have ethical policies and guidance on the proper use of business
computers.
2. Business should have authenticity and quality of product
3. Business should have Branding and quality services
4. Business should have proper data security services.

2.5 Introduction to Cyber Laws:


Cyber law deals with issues generated by the use of computer and internet. Cyber law examines
the technological aspects of law. The name Information Technology Act has been suggested
because it is the law which governs information processing.
2.6 IT Act of India 2000 Definitions, Digital Signature, Electronic Records-Attribution,
acknowledgment and dispatch:
Information Technology Act 2000:
IT Act 2000 is an Act to provide legal recognition for transactions carried out by means of
electronic data interchange and other means of electronic communication i.e. legal recognitions
for transactions carried out by e- commerce. E-commerce is paperless method for carrying out
transactions using electronic data exchange, electronic filing and electronic storage of
information.
Some of the definitions given in IT Act 2000 are as follows:

1. Access : "access" with its grammatical variations and cognate expressions means gaining
entry into, instructing or communicating with the logical, arithmetical, or memory
function resources of a computer, computer system or computer network.
2. Addressee: "addressee" means a person who is intended by the originator to receive the
electronic record but does not include any intermediary.
3. Computer: "computer" means any electronic magnetic, optical or other high-speed data
processing device or system which performs logical, arithmetic, and memory functions
by manipulations of electronic, magnetic or optical impulses, and includes all input,
output, processing, storage, computer software, or communication facilities which are
connected or related to the computer in a computer system or computer network.
4. Computer network : "computer network" means the interconnection of one or more
computers through
(i) the use of satellite, microwave, terrestrial line or other communication media. and
(ii) terminals or a complex consisting of two or more interconnected computers whether
or not the interconnection is continuously maintained.
5. Computer resource: "computer resource" means computer, computer system, computer
network, data, and computer data base software.
6. Computer System :"computer system" means a device or collection of devices,
including input and output support devices and excluding calculators which are not
programmable and capable of being used in conjunction with external files, which
contain computer programmes, electronic instructions, input data and output data, that
performs logic, arithmetic, data storage and retrieval, communication control and other
functions.
7. Data :"data" means a representation of information, knowledge, facts, concepts or
instructions which are being prepared or have been prepared in a form , deletion, storage
and retrieval and communication or telecommunication from or within a computer.
8. Information :"information" includes data, text, images, sound, voice, codes, computer
programs, software and databases or micro film or computer generated micro fiche:
9. Intermediary: "intermediary" with respect to any particular electronic message means
any person who on behalf of another person receives, stores or transmits that message or
provides any service with respect to that message.
10. Key pair: "key pair", in an asymmetric crypto system, means a private key and its
mathematically related public key, which are so related that the public key can verify a
digital signature created by the private key.
11. License: "license" means a license granted to a Certifying Authority under section 24.
12. Private key: "private key" means the key of a key pair used to create a digital signature.
13. Public key: "public key" means the key of a key pair used to verify a digital signature
and listed in the Digital Signature Certificate.
2.6.1 Digital Signature:
The purpose of digital signature is to provide authenticity to user for Information. It is a
safeguard for information or data. Digital signatures secure your data by encoding it. It
contains a key pair i.e. private key and public key like a Lock and key. The IT act 2000 has
provided a legal recognition to digital signature. It uses public key cryptography."Subscriber"
means a person in whose name the Digital Signature Certificate is issued; the initial electronic
record was affixed with the digital signature by the use of private key corresponding to the public
key of the subscriber. Any person by the use of a public key of the subscriber can verify the
electronic record. The private key and the public key are unique to the subscriber and constitute a

functioning key pair. Digital signature uses public key cryptography. In public key cryptography
one can make a encryption key public without sacrificing the secrecy of the information or
decryption key.
Working of digital signature is as follows:
Receiver B

Sender A
Encrypts the message
using public key

Encrypted
Message

Receiver B

Sender A
decrypts the message
using his private key

decrypts the message using his


private key

Encrypted
Message

encrypts the message(reply to


sender) using his public key

Sender A wants to send message for B is called as plain text. A encrypts that message
which gets converted into cipher text.Plain text is a simple text which can be read by human
while cipher text is unreadable to humans.

Plain text

Encryption

Cipher text

Decryption

Plain text

2.6.2 Electronic Records-Attribution, acknowledgment and dispatch:


2.6.2.1 Attribution of electronic records:
An electronic record shall be attributed to the originator
(a) if it was sent by the originator himself;
(b) by a person who had the authority to act on behalf of the originator in respect of that
electronic record;
(c) by an information system programmed by or on behalf of the originator to operate
automatically.
2.6.2.2 Acknowledgment of receipt: Acknowledgment does not mean the acceptance.
Acknowledgment just signifies that the message has been received where the originator has not
agreed with the addressee that the acknowledgment of receipt of electronic record be given in a
particular form or by a particular method, an acknowledgment may be given by
(a) any communication by the addressee, automated or otherwise;
(b) any conduct of the addressee, sufficient to indicate to the originator that the electronic record
has been received.
2.6.2.3 Time and place of dispatch and receipt of electronic record: Dispatch of an
electronic record includes successful communication of an electronic record to the intended
addressee.

(a) if the originator or the addressee has more than one place of business, the principal place of
business, shall be the place of business;
(b) if the originator or the addressee does not have a place of business, his usual place of
residence shall be deemed to be the place of business;
(c) "usual place of residence", in relation to a body corporate, means the place where it is
registered.
2.7 Ten Commandments of Computing:
These are ethics principles written in statements Commandments of computing guides computer
users and professional about dos and donts.
i.
ii.
iii.
iv.
v.
vi.
vii.
viii.
ix.
x.

Thou shalt not use a computer to harm other people.


Thou shalt not interfere with neighbors computer work.
Thou shalt not watch around the neighbors computer files.
Thou shalt not use a computer for the purpose of steal.
Thou shalt not use a computer to bear a false witness.
Thou shalt not copy or use the software for which Thou has not paid.
Thou shalt not use other persons computer resources without authentication or without
proper authorization.
Thou shalt not copy / use other persons intellectual output.
Thou shalt think about the social awareness and consequence of the program the Thou is
writing or the system the one is designing.
Thou shalt always use a computer by means that show due considerations and due respect
for ones fellow humans.

2.8 Security and Privacy Controls:


Security : The virus attacks, unethical hackers, crackers may damage or corrupt or destroy or
disclose information. Security is the quality or state of being protected from unauthorized
access or uncontrolled losses or effects. There are security procedures like passwords,
encryption, firewalls, digital signatures, antivirus, SSL (Secure Socket Layers) to protect
Information. Still it is impossible to achieve the absolute security in day to day practice. The
quality of a given security system is relative. The duty of securing an electronic record rests with
the creator. Its the responsibility of recipient to verify the secured electronic record.
Privacy: Privacy is the right of a person. It is concerned with the publication of true account of
private life of individual, medical confidentiality, privacy in electronic communication etc.
2.9 Intellectual Property Rights:
It is assumed that software, photographs, images, documents available on internet can be used
and distributed by downloading it. But its a wrong assumption as copyright law protects this
work as well. The intellectual property right consists of copyright, trademarks, patent, design and
geographical indications. A person or a company can protect their rights against infringers. The
web pages downloaded only for viewing does not violet the copyright act as material on websites

are published for reading and view of public. But this material may not be available for
commercial use or reproduction by any one.
1. Copyright: is an intellectual property right attached to original works in which the right
exists with him. Copyright is a form of protection provided by the law to the authors of
original works of authorship. If you do any work originally, then you can place the
copyright symbol next to your name. Copyright law is useful for authorship
determination, duration of protection and requirement for transfer of right to others. . The
copyright act can be applied to Original literary work including computer programs,
computer tables, databases etc, 2. Dramatic work, 3.Musical work, 4.Artistic work 5.
Cinematograph of films.
2. FairUse: is the exceptional case of copyright which allows copying of a limited amount
of materials in certain cases without permission of the copyright owner. Even for this use,
whether a specific use is fair or not depends on number of factors such as purpose, nature,
amount and effect. In 1978, FairUse had become a law in United States.
3. Attribution: Attribution term is related to the originator (sender) who sends the products
to the other persons.
4. Acknowledgment: Acknowledgment term is related to the receiver who receives the
product from the originator. Attribution of the electronic record can be defined as :An
electronic record shall be attributed to the originator :
a. If it was sent by the originator himself.
b. If it was sent by a person who had the authority to act on behalf of the originator in
respect of that electronic record.
c. If it was sent by the information system Programmed by/on behalf of the originator to
operate automatically.
Shareware, Freeware and Public Domain Software or Distinguish Between:
Shareware:
Shareware programs can be freely distributed and freely tested.
This program can be shared with other user with owner permission.
A trail period (generally 30 days) is given to test those programs. After this trial period,
the user who wants to keep using the program has to register or pay a fee.
The softwares which are made available with magazines are normally of this type.
Freeware:
Freeware is termed as free software that allow everyone to copy, redistribute and modify
it with free of cost.
But still its copyright is hold by authors.
Freeware is programming that is offered at no cost.
Linux is an example of freeware.
Public Domain Software:

Public Domain Software is software that is not copyrighted. It implies the authors have
waived copying over the software.
Anybody can copy them, modify them or use them in any manner they want.
Public Domain programs can be freely incorporated into new works without paying
royalties for the original material.
There are several software available on internet which are public domain.

THE INFORMATION TECHNOLOGY (AMENDMENT) ACT 2008


Provisions
1. Amendment of section 2 - Communication device means cell phones, personal digital
assistance or combination of both or any other device used to communicate, send or
transmit any text, video, audio or image.
2. Cyber caf means any facility from where access to the internet is offered by any
person on the ordinary course of business to the members of the public.
3. Cyber security means protecting information equipment devices, computer, computer
resource, communication device and information stored therein from unauthorized
access, use, disclosure, disruption, modification or destruction.
4. Delivery of Services by service provider - For efficient delivery of services to the
public through electronic means authorize, by order, any service provider to set up,
maintain and upgrade the computerized facilities and perform such other services as it
specify by notification in the Official Gazette. Service provider so authorized includes
any individual, private agency, private company, partnership firm, sole proprietor firm or
any other body or agency which has been granted permission by the Government to offer
services through electronic means in accordance with the policy governing such service
sector.
5. Audit of documents, etc maintained in electronic form - Wherein any law for the time
being in force, there is a provision for audit of documents, records or information that
provision shall also be applicable for audit of documents, records or information
processed and maintained in electronic form.
6. Duties of subscriber of electronic signature certificate - In respect of Electronic
Signature Certificate the subscriber shall perform such duties as may be prescribed.
7. Powers to issue directions for blocking for public access for any information through any
computer resource.
8. Powers to authorize to monitor and collect traffic data or information through any
computer resource for cyber security.
9. Indian Computer Emergency Response team to serve as National Agency for incident
response.

Q. 1] Fill in the Blanks :

1.

The official gazette published in electronic form is called as _______

2.

_______ provides legal recognition of transaction carried out by means of Ecommerce.

3.

To change the original Data into Code _______ technique is used.

4.

_______ means a person who is intended by the originator to receive an electronic


record.

5.

_______ is used to verify the identity of each persons in an electronic transaction.

6.

_______ process consists of encryption and decryption.

7.

_______ Key is used to create Digital Signature.

8.

_______ key is used to verify the digital signature.

9.

_______ is a legal use of copyrighted material without explicit permission from copyright
holder.

10.

To decide what is right and wrong and then doing the right thing is called as
_______.

11.

LINUX is a _______ type of software.

12.

Unauthorized duplication and use of software is called as ______

13.

Software which is available for limited period is known as _______

14.

Accessing of data without having permission is called _______

15.

_______ value guide how we have behave in society.

16.

_______ deals with the determination of what is right and wrong.

17.

_______ protection covers original work.

18.

_______ term is related to the sender who sends the product to other person.

19.

_______

is

useful

to

Authorship

determination,

duration

of

protection

and

requirement for transfer of right to others.


20.

_______ refers to all activities done with criminal activity in cyber space.

21.

Promoting Data integrity means _______

22.

CD received with magazine is a _______ type of software.

23.

_______ means representation of instruction or knowledge.

24.

IPR stands for _______.

25.

_______ means representation of facts, concepts or instructions.

26.

Norms and principles are stated under _______

27.

_______ software is not copyrighted.

28.

_______ is an unauthorized duplication, distribution and use of computer software.

29.

Public key means a key of a pair used to verify the _______.

30.

The _______provides the legal recognition for transaction carried out by means of
electronic data interchange and other means of electronic communication commonly
referred to as Electronic Commerce.

31.

_______ gives respect to individual persons by considering his opinions and choices.

32.

_______contribute their efforts to the analysis, specification, design and development


of software systems.

33.

_______ indicates what is wrong in the workplace.

34.

The purpose of _______is to identify the sender and verify the message has not been
altered in transit.

35.

is a _______ symbol.

36.

_______ is organizational concern.

37.

_______is an individual concern.

38.

_______includes policies, procedures, tools and techniques designed to protect a


companies computer assets from accidental damage and unlawful use.

39.

_______are policies, procedures, tools and techniques design to prevent errors in


data,

software and system.

Q. 2] True or False :

1.

A Computer Professional should always maintain Data confidentiality.

--------

2.

Business Ethics is considered as management discipline.

--------

Shareware programs can be copied.

--------

3.

Intellectual Property Right refers to all the legal and regulatory aspects of internet and www.

4.

-------Programs can be copyrighted under Literacy Work Heading.

5.

According to Software Ethics any user is allowed to access data of another user with authorization.

6.

-------Controls are the organizational Policies and procedure to ensure that laws and regulations are

--------

followed.

--------

7.

Software Piracy should be practiced for maintaining ethics.

--------

8.

Antivirus helps a user to access information from another computer.

--------

9.

@ is a copyright Symbol.
10. Copying of Shareware programs is legal.

---------------

11.

Private Key is one of the pair of keys used to create Digital Signature.
12. Ethical Principles are based on Law values.

---------------

13.

Cyber Crime refers to all the legal aspects of Internet and WWW.

--------

14.

Private key is used for Encryption.

--------

15.

It is ethically permitted to buy pirated softwares.

--------

16.

Digital Signature identifies the sending system and a person.

--------

17.

License agreement must differ from publisher to publisher.

--------

18.

Computer Professional should not appreciate other peoples intellectual output.

19.

Code of Ethics is a combination of Dos and Donts.


--------

20.

Software theft is not a serious matter.

--------

21.

UNIX operating system is freeware.

--------

22.

Rules for computing are called commandments.

--------

23.

Law indicates rules and regulations to be obeyed in the organization.

--------

24.

Copying Software from a friend is unethical.

--------

25.

Accessing of data without permission is called authorized access.

--------

26.

Fair use does not allow copying of limited amount of material without permission.

--------

27.

Fair use allow limited amount of data to be copied without permission.

--------

28.

--------

Cyber Law refers to all the legal aspects of Law.


29. Shareware is software that can be distributed freely for trial period .

---------------

30.

Pirated software means software without license.

--------

31.

Ethics improved transitional effect efficiency.

--------

32.

Unauthorized access means damage to software or data of other user.

--------

Ethics principle acts as a justification for evaluation of human action.


34. Respect and honest are moral values.

---------------

35.

User must install and use the software according to license agreement.

--------

36.

Right thing do not depends upon moral principle.

--------

37.

Though Freeware is available at no cost it is Copyright.

--------

Antivirus detects and prevents known and unknown viruses.


39. Freeware software are available free of cost to the user.

---------------

40.

Fair use allows copying of a limited amount of material without permission.

--------

41.

There are 10 commandments of computing proposed by computer ethics institute

--------

42.

User can purchase the pirated software.

--------

43.

Public Domain Software is copyrighted.

--------

33.

38.

44.

Ethics builds trust and teamwork.


45. Linux is public domain software.

---------------

46.

Pirated software means software with license.

--------

47.

To use software product it is not necessary to register it.

--------

48.

Information includes data, text, images, sound, voice etc.

--------

49.

It is not necessary to register before using shareware


50. Moral refers to generally accepted standards of right and wrong in a society.

---------------

51.

Cyber crime refers to all the activities done with criminal invent in cyber space.

--------

52.

Shareware is completely free.

--------

53.

Ethics refers to generally accepted standards of right and wrong.

--------

54.

is a copyright symbol.

--------

55.

Justice indicates to treat each person on equal share basis.

--------

56.

Copyright can be used to preserve musical works.

--------

57.

Moral and Ethical Statement are different from law.

--------

58.

Copyright is exact copy of a program.

--------

59.

Ethics is an art of determining what is right or good.


60. Purchasing legitimate license product is the remedy for stopping software piracy.

---------------

61.

--------

Copyright is the protection that covers published and unpublished literary.

Q. 3] Multiple Choice Single Answer :

1.
Acquire and maintain Professional Competence is _______________ responsibility.
a. Leader
b. User
c. Professional
d. Developer
2.
The largest source of software piracy is ________.
a. End user
b. Companies
c. Cyber Law

d. School

3.
Confidential data is protected from outsiders is using __________.
a. Locker method
b. Decryption method c. Decoding method d. Encryption method
4.
When software is free to copy it is called ___________.
a. Freeware
b. Shareware
c. Useware

d. Liveware

5.
________ is the official gazette which is published in electronic form.
a. E-mail
b. Cyber Crime c. Electronic Gazette
d. Software Piracy
6.
Norms and principles are stated under _________.
a. IT Act 2000b. Code of Ethics
c. Cyber Law
d. Moral
7.
______ allows the user to support and test the product behavior before paying for it.
a. Shareware b. Freeware c. Public Domain
d. Pirated Software
8.
_______ refers to standards of right conduct and judgment of particular action
a. Moral
b. Ethics
c. Cultural Values
d. Law
9.
_______ gives respect to individual person by considering his opinions and choice
a. Ethics
b. Moral
c. society
d. Friendship
10. Shareware is a __________ method
a. Copyright
b. Distribution c. License

d. Selling

11.

____ means data, record, image or sound stored, received or send in an electronic
form.
a. Electronic record b. Information c. Electronic gazette
d. Digital record
12.

_________ is a discipline that deals with issues in copyright trademark and patent
laws.
a. Cyber laws
b. India IT act c. Cyber Crime d. Intellectual Property Rights
13.

To determine what is right and wrong and then doing the right thing is called as

a. Moral
14.

b. Ethics

c. Patent

d. Laws

________ ensures that the document originated with the person signing it and that
was not tempered with after the signature was applied.

a. Digital signature

b. Coded signature

c. Double signature

d. Simple signature

15.

________ law grants the creator the exclusive rights to reproduce, perform, distribute
and display the works publicly.
a. Cyber crime
b. Copyright
c. Cyber law
d. Fair use
16. License means a license
a. granted by owner
c. granted to a certifying authority

b. granted by operator
d. None of these

17. ________ is a contract between purchaser and publisher of the software.


a. License
b. Copyright
c. Cyber law
d. None
18. ________ is also called as equity.
a. Honesty
b. Fair treatment

c. Quality

d. None

19. As per the IT ACT _______ cannot be in Electronic Form.


a. License
b. Cheque
c. Record
d. Form
20. Promoting data integrity means ________.
a. Encouraging data duplication
b. Establishing privacy polic
c.

Ensuring accuracy,
information

reliability,

completeness and time


d. None of the above.

21. The software created can be protected by ________.


a. Software Piracy
b. Copyright
c. Ethics

limit

of

d. Authorization

22. The Ethical issues for computer users are _____.


a. Software Piracy
b. Professional Standard c. Competency

d. Authorized assets

23. _________ is a non-copyrighted program.


a. Shareware
b. Freeware
c. Public domain

d. Fair use

Q. 5] Multiple Choice Triple Answer :


1.
Ethics for computer professionals will be categorized as follows:
a. Professional software
b. Professional Standards
c. Professional principles
d. Professional responsibility

personal

e. Professional ethics

f. Programmers liability

2.
Security is _______________
a. Unauthorization
b. Availability

c. Integrity

d. Access Control

3.

e. Data Confidentiality

Generally code of ethics for computer professionals and user are

a. fair treatment
d. system integrity
4.

b. pirated
e. information access

c. communication

Intellectual Property Rights are related with _______.

a. Copyright
d. Fair Use
5.

f. Inconsistency

b. Attribution and Acknowledgement


e. Copied Software

c. Digital Signature
f. Firewall

Pirated software means _________.

a. Software without license b. Copied Software


c.
Software
d. Software with digital signature e. Unauthorized duplicate software

Q. 7] Answer the Following :

1.

Explain areas considered by I.T. Act?

2.
3.
4.
5.

Define Ethics? Explain need of Ethics?


Write down the importance of cyber law?
What is shareware and public domain software?
What is the need for Ethics Culture? Explain.

6.
7.
8.

Write a note on Ethics for Computer Users?


Explain the Objectives of Cyber Laws?
Describe IT act of India?

9.

Define Data & Digital Signature?

10.

What is Security?

11.

Explain Copyright and Fair Use?

12.

Give Ten Commandments of Computing?

13.
14.
15.

What is Secure System?


Compare between Shareware, Freeware and Public Domain Softwares?
List any four responsibilities of Computer Professionals?

16.

What is Unauthorized access? Explain its three categories?

17.
18.

What is Fair Use? Write any two advantages of Fair Use?


Write a note on Intellectual Property Right?

19.
20.
21.

Explain Cyber Laws?


Define Software Piracy? Explain how it is harmful to the society?
Write a note on code of ethics?

22.

Define: Moral,

23.

What is Freeware?

Ethics

and

Law

with

License

Chapter 3 . E-COMMERCE

Introduction:
After the Internet and dot com revolution, electronic commerce (e-commerce) remains a new,
emerging and constantly changing in the field of information technology and business
management. With the advent of the Internet, the term e-commerce gained popularity. It
includes:a. Electronic trading of physical goods and of intangibles such as information.
b. All the steps involved in trade, such as on-line marketing, ordering payment and support for
delivery.
c. The electronic provision of services such as after sales support or on-line legal advice.
d. Electronic support for collaboration between companies such as collaborative on-line design
and engineering or virtual business consultancy teams.
Thus E-commerce is an emerging concept that describes the process of buying and selling or exchanging
of products, services, and information via computer networks including the internet.
3.1 E-commerce: E-Commerce is more than just buying and selling products online. Instead, it
encompasses the entire online processes of developing, marketing, selling, delivering, and
paying for products and services purchased on internet.
3.1.1 Definition: Electronic Commerce (e-Commerce) is a general concept covering any
form of business transaction or information exchange executed using information and
communication technologies (ICTs). E-Commerce takes place between companies, between
companies and their customers, or between companies and public administrations. Electronic
Commerce includes electronic trading of goods, services and electronic material.
Classification of E-Commerce: E-Commerce exchanges may be business-to-business,
business-to-consumer or, with facilities such as online auctions, consumer-to-consumer. The eCommerce customer may be a home computer user, a business computer user, a commercial
intermediary or the transactions may be generated from the customers' business information
system. The first two of these may use internet e-Commerce, the commercial intermediary an eMarket, whereas the exchange of data between business information systems is properly the
province of EDI.
Classification of E-Commerce is based on:
a. who orders, the goods and services to be sold
b. who sold those goods and services and the nature of transactions
Based on above two criteria, e-commerce can be further classified as:
a. Business-to-Business (B2B) model
b. Business-to-Consumer (B2C) model
c. Consumer-to-Business (C2B) model
d. Consumer-to-Consumer (C2C) model

a. Business-to-Business (B2B) model: This


model describes commerce transactions
between businesses, such as between a
manufacturer and a wholesaler, or
between a wholesaler and a retailer.It is
the largest form of ecommerce. In this
form the buyers and sellers are both
business entities and do not involve and
individual consumer. It is commonly
known as EDI (Electronic Data
Interchange). In the past EDI was
conducted on a direct link of some form
between the two businesses where as
today the most popular connection is the internet. The two businesses pass information
electronically to each other.

b. Business-to-Consumer (B2C) model: In this mode, business and consumers


Business sell to the public typically
through catalogs utilizing shopping cart
software. (i.e. typical online buying)
Customer identifies a need. Searches for
the product or services to satisfy the
need. Selects a vendor and negotiates a
price. Receives the product or services
(delivery logistics, inspection and
acceptance). Makes payment.
Gets service and warranty claims.
Example websites like Amazon.com,
Flipcart etc.

are involved.

c. Consumer to-Business model: In this model , the customer requests a specific service from
the business. Consumer to Business is a growing arena where the consumer requests a specific
service from the businessIt enables buyers to name their own price, often binding, for a specific
good or services generating demand. A consumer posts his project with a set budget online and
within outs; companies review the customers requirements and bids out the project Example
online trading, tenders ,freelancing with website like Bazee.com

d. Consumer-to-Consumer (C2C) model:


It facilitates the online transaction of goods
or services between two peoples.
Consumer-to-consumer (C2C) (or citizento-citizen) model involves the electronically
facilitated transactions between consumers
through some third party. A common
example is the online auction, in which a
consumer posts an item for sale and other
consumers bid to purchase it; The sites are
only intermediaries, just there to match
consumers.
Example :OLX,ebay

3.1.2 Scope of E-Commerce: E-Commerce uses three 'technologies': Electronic Markets,


Electronic Data Interchange (EDI) and Internet Commerce, see Figure 1.E-Commerce systems
include commercial transactions on the Internet but their scope is much wider than this. They can
be classified by application type:

Electronic Markets:
The principle function of an
electronic market is to facilitate the
search for the required product or
service. Example Airline booking
systems
Electronic Data Interchange (EDI):
EDI provides for the efficient
transaction of recurrent trade
exchanges between commercial
organizations. Example :Large retail
groups and vehicle assemblers when
trading with their
suppliers(supermarket)
Internet Commerce:
The Internet can be used for advertising goods and services and transacting once-off
deals.Internet commerce has application for both business to business
and business to consumer transactions. Example purchasing book through amazon.com.

3.2. Trade Cycle:


A trade cycle is the series of exchanges, between a customer and supplier that take place when a
commercial exchange is execute.
3.2.1 Phases of trade cycle: Trade cycle has to support:

Finding goods or services appropriate to the requirement and agreeing the terms of trade
Placing the order, taking delivery and making payment
After sales activities
A general trade cycle consists of following phases :
Pre-Sales: Finding a supplier and agreeing the terms. It is a search and negotiate phase
Execution: Selecting goods and taking delivery .It is Order and Delivery phase
Settlement: Invoice (if any) and payment
After-Sales: Following up complaints or providing maintenance. It is a service and
warrantee pase

3.2.2 Three generic trade cycles can be identified as:


Repeat: Regular repeat transactions between commercial trading partners
Credit: Irregular transactions between commercial trading partners where execution and
settlement are separated (credit transactions)
Cash: Irregular transactions in once off trading relationships where execution and settlement
are typically combined.
Trade Cycle:

Repeat

Credit

Cash

Search
Pre-Sale
Negotiate
Order
Execution
Deliver
Invoice
Settlement
Payment
After Sales

Figure 2: Generic trade cycle

After Sale

3.3. Electronic Market:


Definition: An electronic market is an information system (virtual market) that provides
facilities for buyers and sellers to exchange information about price and product offerings.
Electronic market also tend to be available only to the intermediaries
Electronic Market bring together product, price and service information from many suppliers
Electronic Market can thus act as database or catalogue. Electronic market is the virtual
representation of physical market.
Electronic markets are used for passenger ticket reservations, an airline booking system and in
various financial and commodity markets. These markets give the customer (or the customer's
intermediary) easy access to comparative data on price, and other attributes, of the goods or
services on offer. Access to this information is advantageous for the consumer but making the
information available is not necessarily beneficial to the supplier.
E-Market and Trade cycle:
The Electronic market is primarily
search phase of trade cycle. Typically
an inter-organisational credit trade
cycle. Normally includes facilities for
Execution and Settlement

Figure 3 : E-Market and Trade cycle


Usage of electronic markets
a. Application has been limited to specific sectors:
Airline Booking Systems
Financial and Commodity Markets
b. Use is typically via an intermediary (i.e. only for dealers)
c. Study of Share and stock market
Advantages :
1. Customer Advantage: Easy access to comparative price/service information. These
markets give the customer (or the customer's intermediary) easy access to comparative
data on price, and other attributes, of the goods or services on offer.
2. Supplier: For supplier it facilitates easy access to market.

3. Search cost lowered: An effective E-Market increases the efficiency of market; it


reduces the search cost for buyers.
4. Assistance to buyers: E-Market is most effective in assisting the buyer.
5. Awareness of market: The use of information and communication technologies to
provide geographically dispersed traders with the information necessary for the fair
operation of the market.
6. Best negotiations: Easy access to information on a range of competing product offerings
reduces the search cost of finding the supplier that best meets the purchase requirement.
Disadvantage: It becomes difficult for sellers to maintain high price levels, because due to the
introduction of an electronic market search cost is reduced for the buyer.And also second
disadvantage for seller is buyer can make easy price comparison.

3.4. Electronic Data Interchange (EDI):


Definition: The transfer of structured data, by agreed message standards, from one computer
system to another, by electronics means.
This definition has four elements, each of them essential to form EDI system
1. Structured Data: EDI transactions are composed of code, values and short pieces of text;
each element with strictly defined purpose.
2.Agreed message standards: The EDI transactions has to have a standards format .The
standard is not just agreed between the trading partners but is a general standard agreed at
national or international level.
3. From one computer system to another: The EDI message sent is between two computer
applications There s no requirement for people to read the message or re-key it into computer
system
4. By electronics means: Usually this is
by data communication but the physical
transfer of magnetic tape or floppy disc
would be within the definition of EDI
Thus there are two important things in
EDI. First, EDI replaces paper-based
documents with electronic ones. And,
second, the data in a document is
transmitted in a standardised format so
that both the sender and the receiver can
accurately read the document.

Figure 4: EDI and trade cycle


EDI and Trade Cycle: Commercial transactions that are repeated on a regular basis, such as
supermarkets replenishing their shelves, is one category of trade cycle. EDI is the e-Commerce

technology appropriate to these exchanges.EDI is mapped with settlement and execution phase
of trade cycle.
Benefits of EDI:
1. Shortened ordering time: EDI orders are sent straight into the network. Orders can be in
suppliers system within a day.
2. Reduction in cost: The use of EDI can cut cost. These include the costs of stationary and
postage. EDI is the potential to save staff costs.
3. Eliminition of errors: EDI eliminates the source of errors i.e. data entry errors.
4. Fast response: With EDI, customer can be informed directly for any inconvenience, so that
the customer can take fast decision.
EDI security: When an organization adopts EDI, security controls becomes important factor.
Because when transaction takes place between two trading partners, confidentiality is necessary
and important.
A full EDI security system should include three levels of security:
(1) Network level security: This level of security ensures that users not registered in the EDI
network are not able to gain access to its facilities.
(2) Application level security: In any given EDI application or software, there might be some
data you are not allowed to see, some you can see but not alter.
(3) Message level security: Here the data should be secured against non-bonafide messages,
duplication, loss or replay of messages, deletion of messages.
3.5 Internet Commerce: is the use of the Internet for all phases of creating and completing
business transactions. In broad sense Internet Commerce includes:
Full sales and marketing cycle - for example, by analyzing online feedback to ascertain
customer's needs.
Identifying new markets - through exposure to a global audience through the World
Wide Web.
Developing ongoing customer relationships - achieving loyalty through ongoing email
interaction.
Assisting potential customers with their purchasing decision - for example by guiding
them through product choices in an intelligent way.
Providing round-the-clock points of sale - making it easy for buyers to order online,
irrespective of location.
Supply Chain Management - supporting those in the supply chain, such as dealers and
distributors, through online interaction.
Ongoing Customer Support - providing extensive after-sales support to customers by
online methods; thus increasing satisfaction, deepening the customer relationship and
closing the selling loop through repeat and ongoing purchases.
Definition: Internet Commerce.
Internet commerce is once off sale / once of transaction done using information and
communication technology (Internet to be specific). Consumer purchasing over internet typifies
this trade. Internet commerce is also mentioned as Business-to-Consumer E-Commerce. But
internet commerce can also be used by organizations to make once off or infrequent purchases of
items such as computer and office supplies.

Internet commerce and Trade cycle: Consumer transactions tend to be once-off (or at least
vary each time) and payment is made at the time of the order. Internet e-Commerce is the
technology for these exchanges.
The third generic trade cycle is the nonrepeating commercial trade cycle and
Internet e-Commerce or an electronic
market is the appropriate e-technology
Advantages of Internet Commerce
1.Home Shopping: Quick and convenient
2.World Wide and 24 hours: Anywhere any time
3.Home Delivery of the product.
Figure 5 : Internet commerce and trade cycle
Disadvantages of internet commerce:
1. Privacy and security: Privacy of personal details and security of transactions.
2. Delivery of product: Delay in delivery can be inconvenient and can add other costs.
3. Inspecting goods: You cannot actually see, feel or try goods.
4. Social interaction: Shopping with family and friends will stop.
3.6 E-Commerce Perspective: E-Commerce can be seen from different Perspective
1. Communications Perspective:
E-Commerce is the delivery of information, products/services, or payments over the telephone
lines, computer networks or any other electronic means.
2. Business Process Perspective:
E-Commerce is the application of technology toward the automation of business transactions and
work flow.
3. Service Perspective:
E-Commerce is a tool that addresses the desire of firms, consumers, and management to cut
service costs while improving the quality of goods and increasing the speed of service delivery.
4. Online Perspective:
E-Commerce provides the capability of buying and selling products and information on the
internet and other online services.
3.6.1 EDI security standards:
The important aspect of EDI is security and privacy. The first point is to ensure the interchange
of message is reliable. Hence EDI security standards include:
controls designed to protect against errors in, and corruption of message.
Where there is concern that transmission is not reliable it can be protected by digital
signature and filters like firewall
Where the contents of message are sensitive, the privacy of message can be protected
using encryption.
The receipt acknowledgement message is to ensure the recipient of the message does
deny having received it

Exercise:
Q1. Fill in the blanks.
1. Selling and buying products and services through web means ________
2. E-Commerce is the ________ exchange of business information.
3. In traditional marketing focus is _______ oriented.
4. An online action is the best example of _______.
5. Electronic market is the ________ representation of physical market.
6. Regular, repeat transaction between commercial trading partners are called ______ trade
cycle.
7. E-Market is primarily about ______ phase of the trade cycle.
8. Order and Delivery are ________phase of the trade cycle.
9. Invoice and payment are ________phase of the trade cycle.
10. Warranty, services etc. are ________ activities.
11. Final use of Internet E-Commerce is for _______ service.
12. Marketing focus is related to ________ position in traditional commerce
13. EDI stands for ____________ .
14. EDI is commonly applied to Execution and _______ phase of trade cycle.
15. EDI replaces paper-based documents with _______ ones.
Q2.State True or False.
1. In E-Commerce scope is local
2. In E-Commerce 24 hours service is available for all 7 days.
3. In E-Commerce time required is more as compare to traditional commerce.
4. E-Commerce is fully service oriented.
5. E-Commerce is applied to all phases of trade cycle.
6. In E-Commerce payments are done with the help of credit card.
7. E-Commerce gives the guarantee of the good ordered about their quality and reliability.
8. Search comes under execution phase of Trade Cycle.
9. Order and Delivery are the part of presale phase trade cycle.
10. After sales services are the parts of Settlement phase of trade cycle.

11. In Cash trade cycle execution and settlement are combined.


12. E-Market deals with all phases of the trade cycle.
13. E-Market is a common place for worldwide buyers and sellers.
14. Online Airline booking system is an example of E-Market.
15. Online Airline booking system is an example of E-Commerce.
16. EDI does not require printed order and invoice.
17. EDI means paperless trading.
18. EDI is commonly applied to Execution and Settlement phase of trade cycle.
19. EDI increases data entry errors.

Q3. Multiple choice question (choose one correct alternative)


1. Online buying and selling the products is called as _________
(a) Internet Commerce
(b) Traditional Commerce
(c) E-Commerce
(d) None of these
2. ICT stands for ___________
(a) Indian Communication Industry
(b) Information and Communication Technology
(c) Information and Computing Technology
3. ___________ is fully product oriented commerce.
(a) Traditional Commerce
(b) E-Commerce
(c) M-Commerce
(d) None of these
4. _________ is the last phase of trade cycle.
(a) Order (b) Payment
(c) Search (d) After sales
5. Search and ________ comes under presale phase of trade cycle.
(a) Order (b) After sales
(c) Delivery
(d) Negotiate
6. Online trading and auction are called as ________ .
(a) E-Market
(b) E-Commerce
(c) EDI
(d) Traditional Commerce
7. EDI helps to _________.
(a) Reduce paper works
(b) Increase paper works
(c) Higher security
(d) reduce Accuracy
8. _______cause reduced data entry errors.
(a) EDI
(b) E-Commerce
(c) Internet Commerce
(d) E-Market
Q4. Multiple choice question (choose two correct alternative)
1.______ and ______ are last phases of trade cycle.
a)Presale b) Execution c) Settlement d) After sales
2. After sales phase of trade cycle consist of ______ and _____

a)Warranty b)search c)service d)payment


3. EDI includes forms for ____ and _____
a) Invoice b) Stock c) Purchase order d) Documents
Q5. Multiple choice question (choose three correct alternative)
1. The three generic trade cycles can be identified as ___, ___ and __
a) Repeat trade cycle b) Credit trade cycle c) Cash trade cycle d)Routine trade cycle
2. Benefits of EDI are_______,_______ and __________
a)Reduces paper work b)increases paper work c)reduces data entry b)reduces cost
Q6. Answer the following questions
1. Explain classification of E-commerce in detail.
2. Give scope of E-commerce in brief.
3. Give different perspectives of E-Commerce.
4. Explain generic trade cycles.
5. Explain EDI security and standards.
Q7. Write short note on:
1. Internet commerce.
2. EDI.
3. Usage and Advantages of E-Market.

Reviewed by:
Sr no Name

Sign

Traditional commerce and E-commerce

Commercial
Intermediaries

Electronic
Markets
Business
Information
Systems

Home
Computer
Users
EDI

Internet
Comerce

consider the difference between the


traditional paper purchase order and its electronic
Business
Computer
counterpart:
Users

A Traditional Document Exchange Of a Purchase Order

Buyer makes a buying decision, creates the purchase order and prints it.
Buyer mails the purchase order to the supplier.
Supplier receives the purchase order and enters it into the order entry system.
Buyer calls supplier to determine if purchase order has been received, or supplier mails
buyer an acknowledgment of the order.

This process normally takes between three and five days!


An EDI Document Exchange Of a Purchase Order

Buyer makes a buying decision, creates the purchase order but does not print it.
EDI software creates an electronic version of the purchase order and transmits it
automatically to the supplier.
Supplier's order entry system receives the purchase order and updates the system
immediately on receipt.
Supplier's order entry system creates an acknowledgment an transmits it back to confirm
receipt.

This process normally occurs overnight and can take less than an hour!

Teachers Training Program

Networking
Scope and Limitations
4A Communication and Network Technologies,
4B Internet, Network Communication and Protocols,
4C Transmission Media, Communication over Wires and Cables, Wireless
Communication and Standards
4D Network Architecture, Relationships and Features
4E Cable Topologies
4F Network Hardware

Weightage to Objectives
Sr. No

Objectives

Marks

Marks with
Option

Knowledge

15

15

Understanding

20

20

Application

30

30

Skill

15

15

80

80

Total

Weightage to Type of Questions


Sr. No

Type of Question

Marks

Marks with
Option

Objective Type

60

60

Short Answer

10

10

Long Answer

10

10

80

80

Total

Unit wise Weightage

Topic/Unit

Marks

Mark
(With
option)

Lectures

Approx.
Pages

10

10

12

22

Introduction To Networking

Networking
Introduction
The concept of networking is probably as old as the concept of telecommunication
itself. Over the years computing networks have advanced from pair of wires to fiber
optics and microwaves through Wi-Fi networks. A computer network is a group of
interconnected computers or a collection of hardware components and computers
interconnected by communication channels that allow sharing of date, resources,
hardware, programs and information provides a means of e-mail communication and
video conferencing. Besides the hardware needed for networking it also requires
special software to enable communication which are in built to all major operating
system.

Network Characteristics
Cost - Includes the cost of network components, their installation and maintenance.
Reliability - Reliability defines the reliability of the network components and the
connectivity between them.
Security - Security includes the protection of the network components and the data
they contain and/or the data transmitted between them.
Speed - Speed includes how fast data is transmitted between network end points.
Scalability - Scalability defines how well the network can adapt to new growth,
including new users, applications, and network components.
Topology - Topology describes the physical cabling layout and the logical way data
moves between components.

Network Classification
Computer network is classified into three categories based on the geographical area.
1. Local Area Network (LAN)
2. Metropolitan Area Network (MAN)
3. Wide Area Network (WAN)
Local Area Network (LAN)
LANs are privately-owned networks within a building or campus (upto few kms range)
They are mainly used to connect PCs and workstations in company offices.
Main idea is resource (printers ,files) sharing.
Traditional LANs run at speeds of 10 to 100 Mbps (Recent trend is in GBPS)

Metropolitan Area Network (MAN)


A MAN is basically a bigger version of LAN and normally uses similar technology.
It might cover a group of nearby corporate offices or city.
MAN can be related to the local cable television network.

Wide Area Network (WAN)


A WAN spans a large geographical area , often a country or a continent.
WAN have irregular topologies.
Typically many LANs put together forms a WAN
A WAN provides long distance transmission of data, voice image and video information.

Network Classification
Internet - Individual networks are joined into internetworks with the help of
internetworking devices. The internet is networking of million of networks. These
networks are connected to each other either by wired or wireless technologies.
Network Communication and Protocol
A protocol is a formal description of a set of rules and conventions that govern a
particular aspect of how devices on a network communicate. Protocols determine the
format, timing, sequencing, and error control in data communication.

Protocols are used for communication between computers in different computer


networks. TCP/IP, HTTP, POP, PPP are some examples of the protocols.
Network Communication and Protocol
A protocol is a formal description of a set of rules and conventions that govern a
particular aspect of how devices on a network communicate. Protocols determine the
format, timing, sequencing, and error control in data communication. Protocols are
used for communication between computers in different computer networks. TCP/IP,
HTTP, POP, PPP are some examples of the protocols.

Transmission Media
Transmission media can be defined simply as the means by which signals (data) are
sent from one computer to another (either by wired or wireless means).
Communication can be broadly classified on the basis of transmission media used into
two categories wired communication and wireless communication. Wired media are
also called as bounded media and wireless media as unbounded media.

TRANSMISSION
MEDIA

CO-AXIAL
(THICKNET&
THINNET)

WIRED

WIRELESS

(GUIDED)

(UNGUIDED)

TWISTED PAIR
(UTP &STP)

OPTICAL FIBER
(SINGLEMODE &
MULTIMODE)

MICROWAVE
RADIO SIGNALS

(TERRESTRIAL &
SATELLITE)

INFRA RED

WI-FI

Network Classification
A transmission media is a material substance that can propagate energy waves. For
example, the transmission medium for sound received by the ears is usually air, but
solids and liquids may also act as transmission media for sound.
The absence of a material medium in vacuum may also constitute a transmission
medium for electromagnetic waves such as light and radio waves. While material
substance is not required for electromagnetic waves to propagate, such waves are
usually affected by the transmission media they pass through, for instance by
absorption or by reflection or refraction at the interfaces between media.
The term transmission medium also refers to a technical device that employs the
material substance to transmit or guide waves. Thus, an optical fiber or a copper cable
is a transmission medium.

Communication over Wires and Cables


Data transmission, digital transmission, or digital communications is the physical
transfer of data (a digital bit stream) over a point-to-point or point-to-multipoint
communication channel.
There are two categories of transmission media used in computer communications.

1. WIRED / GUIDED /BOUNDED MEDIA


2. WIRELESS / UNBOUNDED / UNGUIDED MEDIA
Examples of such channels are copper wires, optical fibers, wireless communication
channels, and storage media. The data is represented as an electromagnetic signal,
such as an electrical voltage, radio wave, microwave, or infrared signal.

Bounded Media
Bounded media are the physical links through which signals are confined to narrow
path. These are also called guided/wired media. Bounded media are made up of an
external conductor (Usually copper) bounded by jacket material.
Bounded media are great for LABS as
1. They offer high speed
2. Good security
3. Low cast.
Three common types of bounded media are
Coaxial Cable
Twisted Pairs Cable
Fiber Optics Cable

Coaxial Cable
Coaxial cable is very common & widely used commutation media. (TV wire is usually
coaxial). Coaxial cable gets its name because it contains two conductors that are
parallel to each other. The center conductor in the cable is usually copper. The copper
can be a solid wire. Outside this central Conductor is a non-conductive material
(insulation). It is usually white, plastic material used to separate the inner Conductor
form the outer Conductor. The other Conductor is a fine mesh made from Copper. It is
used to help shield the cable form EMI. Outside the copper mesh is the final protective
cover. The actual data travels through the center conductor (copper wire) in the cable.
EMI interference is caught by outer copper mesh.

Coaxial Cable
There are different types of coaxial cable vary by gauge. Gauge is the measure of the
cable thickness. It is measured by the Radio grade measurement, or RG number. The
high the RG number, the thinner the central conductor core, the lower the number the
thicker the core.
Two types of co-axial cables are usedBase-band co-axial cables: These cables are used for digital transmission
Broadband co-axial cables : These cables are used for analog transmission
Here the most common coaxial standards.
50-Ohm RG-7 or RG-11: used with thick Ethernet.
50-Ohm RG-58 : used with thin Ethernet
75-Ohm RG-59 : used with cable television
93-Ohm RG-62: used with ARCNET.

Coaxial Cable

Characteristics of
Coaxial Cable

Advantages Coaxial
Cable

Disadvantage Coaxial
Cable

Low cost
Easy to install
Up to 10Mbps capacity
Medium immunity from EMI
Medium of attenuation

Inexpensive
Easy to wire
Easy to expand
Moderate level of EMI
immunity

Single cable failure can take


down an entire network

Twisted Pair Cable


The most popular network cabling is Twisted pair. It is
1. Light weight
2. Easy to install
3. Inexpensive
4. Support many different types of network.
Twisted pair cabling is made of pairs of solid or stranded copper twisted along each
other. The twists are done to reduce vulnerably to EMI and cross talk. The number of
pairs in the cable depends on the type. The copper core is usually 22-AWG or 24-AWG,
as measured on the American wire gauge standard. There are two types of twisted
pairs cabling
1. Unshielded Twisted Pair (UTP)
2. Shielded Twisted Pair (STP)

Twisted Pair Cable


1. Unshielded Twisted Pair (UTP)
UTP is more common. It can be either voice grade or data grade depending on the
condition. UTP cable normally has an impedance of 100 ohm. UTP cost less than STP
and easily available due to its many use. There are five levels of data cabling
Category 1
These are used in telephone lines and low speed data cable.
Category 2
These cables can support up to 4 mps implementation.
Category 3
These cable supports up to 16 mps and are mostly used in 10 mps.
Category 4
These are used for large distance and high speed. It can support 20mps.
Category 5
This is the highest rating for UTP cable and can support up to 100mps.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11
connector and 4 pair cable use RJ-45 connector.

1. Unshielded Twisted Pair (UTP) Cable


1. Unshielded Twisted Pair (UTP)
UTP is more common. It can be either voice grade or data grade depending on the
condition. UTP cable normally has an impedance of 100 ohm. UTP cost less than STP
and easily available due to its many use. There are five levels of data cabling
Category 1 - These are used in telephone lines and low speed data cable.
Category 2 - These cables can support up to 4 mps implementation.
Category 3 - These cable supports up to 16 mps and are mostly used in 10 mps.
Category 4 - These are used for large distance and high speed. It can support 20mps.
Category 5 - This is the highest rating for UTP cable and can support up to 100mps.
UTP cables consist of 2 or 4 pairs of twisted cable. Cable with 2 pair use RJ-11
connector and 4 pair cable use RJ-45 connector.

1. Unshielded Twisted Pair (UTP) Cable


Characteristics Of UTP
low cost
easy to install
High speed capacity
High attenuation
Effective to EMI
100 meter limit

Advantages Of UTP
Easy installation
Capable of high speed for LAN
Low cost
Disadvantages Of UTP
Short distance due to attenuation

2. Shielded Twisted Pair (STP) Cable


It is similar to UTP but has a mesh shielding thats protects it from EMI which allows
for higher transmission rate. IBM has defined category for STP cable
Type 1 - STP features two pairs of 22-AWG
Type 2 - This type include type 1 with 4 telephone pairs
Type 6 - This type feature two pairs of standard shielded 26-AWG
Type 7 - This type of STP consist of 1 pair of standard shielded 26-AWG
Type 9 - This type consist of shielded 26-AWG wire

2. Shielded Twisted Pair (STP) Cable

Characteristics of STP
1. Medium cost
2. Easy to install
3. Higher capacity than UTP
4. Higher attenuation, but same as UTP
5. Medium immunity from EMI
6. 100 meter limit

Advantages of STP
1. Shielded
2. Faster than UTP and coaxial
Disadvantages of STP
1. More expensive than UTP and coaxial
2. More difficult installation
3. High attenuation rate

Fiber Optic Cable


Fiber optic cable uses electrical signals to
transmit data. It uses light. In fiber optic
cable light only moves in one direction for
two way communication to take place a
second connection must be made between
the two devices. It is actually two strands of
cable. Each strand is responsible for one
direction of communication.
A laser at one device sends pulse of
light through this cable to other
device. These pulses are translated
into 1s and 0s at the other end.

In the center of fiber cable is a glass stand or


core. The light from the laser moves through
this glass to the other device. Around the
internal core is a reflective material known
as CLADDING. No light escapes the glass
core because of this reflective cladding.
Fiber optic cable has bandwidth more than 2
gbps (Gigabytes per Second)

Fiber Optic Cable


Characteristics of Fiber Optic Cable
1. Expensive
2. Very hard to install
3. Capable of extremely high speed
4. Extremely low attenuation
5. No EMI interference
Advantages of Fiber Optic Cable
1. Fast
2. Low Attenuation
3. No Emi Interference

Disadvantages of Fiber Optics


1. Very costly
2. Hard to install

Fiber Optic Cable


Characteristics of Fiber Optic Cable
1. Expensive
2. Very hard to install
3. Capable of extremely high speed
4. Extremely low attenuation
5. No EMI interference
Advantages of Fiber Optic Cable
1. Fast
2. Low Attenuation
3. No Emi Interference

Disadvantages of Fiber Optics


1. Very costly
2. Hard to install

Wireless Communication over Radio Signals


It is difficult to lay down cables due to the terrain (mountains, jungles, swamps, etc.),
wireless may be better. Modern wireless digital communication began in the Hawaiian
Islands, where large chunks of Pacific Ocean separated the users and the telephone
system was inadequate.
For mobile users, twisted pair, coaxial cables and fiber-optics are of no use. They need
to get their hits of data for their i-pad, i-phone, laptop, palmtop or wristwatch
computers without being tethered to the terrestrial communication infrastructure and
the only way their queries and interest can be catered to be through the wireless
communication.
Wireless/ Unguided media or unbounded media doesn't use any physical connectors
between the two devices communicating. Wireless media is used when a physical
obstruction or distance blocks are used with normal cable media. The three types of
wireless media are:
a. RADIO WAVES
b. MICRO WAVES
c. INFRARED WAVES

Radio Waves
Radio waves are easy to generate and they can travel longer distance It has frequency between
10 KHz to 1 GHz. They can travel in all directions and hence they are also called omni
directional. They can easily penetrate through obstacles. Hence they are widely used in
communication Radio waves has the following types.

Short waves
VHF (Very High Frequency)
UHF (Ultra High Frequency)
Microwaves
Microwaves travels at high frequency than radio waves and provide throughput as wireless network media.
Microwave transmission requires sender to be inside of the receiver. Following are the types of Microwaves.
Terrestrial Microwaves
Satellite Microwaves

Terrestrial Microwaves
Terrestrial Microwaves are used to transmit wireless signals across a few miles. Terrestrial
system requires that direct parabolic antennas can be pointed to each other. These systems
operate in a low Giga Hertz range.

Characteristics of Terrestrial Microwaves


a. Moderate to high cost.
c. 1 M bps to 10 M bps capacity
e. Low immunity to EMI

b. Moderately difficult installation


d. Variable attenuation

Radio Waves
Satellite Micro Waves
The main problem with micro wave communication is the curvature of the earth, mountains &
other structure often block the line of sight. Due to this reason, many repeaters are required for
long distance which increases the cost of data transmission between the two points.

Satellite micro wave transmission is used to transmit signals throughout the world. These system
use satellites in orbit about 50,000 Km above the earth. Satellite dishes are used to send the
signals to the satellite where it is again sent back down to the receiver satellite. These
transmissions also use directional parabolic antenna within line of sight.
In satellite communication micro wave signals at 6 GHz are transmitted from a transmitter on
the earth through the satellite position in space. By the time signal reaches the satellites
becomes weaker due to 50,000 Km distance. The satellite amplifies week signals and transmits it
back to the earth at the frequency less than 6 GHz.

Characteristics Satellite Micro Waves


1. High cost
2. Extremely difficult.
3. Variable attenuation.
4. Low immunity to EMI
5. High security needed because a signal send to satellite is broadcasts through all receivers with
in satellite.

Infrared

Radio Waves

Infrared frequencies are just below visible light. These high frequencies allow high speed data transmission.
This technology is similar to the use of a remote control for a TV. Infrared transmission can be affected by
objects obstructing sender or receiver. These transmissions fall into two categories.
Point to point
Broadcast

Point to Point
Point to point infrared transmits signal directly between two systems. Many lap top system use point to
point transmission. These systems require direct alignment between many devices.

Characteristics of Point to Point


Wide range of cost
Moderately easy installation.
100 kbps to 16 Mb of capacity.
Variable attenuation.
High immunity to EMI

Broad Cast
These infrared transmissions use sprayed signal, one broad cast in all directions instead of direct beam. This
help to reduce the problems of proper alignment and abstraction. It also allows multiple receiver of signal

Characteristics of Broad Cast


Inexpensive.
Single installation.
1Mbps capacity.
Variable attenuation.

Wireless Standards
Wireless Standards
Home and business networkers looking to buy wireless local area network gear face an array of
choices .The products conforming to the 802.11a, 802.11b, 802.11g or 802.11n wireless
standards collectively are known as Wi-Fi technologies.
802.11 - In 1997, the institute of Electrical Engineers (IEEE) created the first WLAN standard. They called it
802.11 after the name of the group formed to oversee its development.Unfortunately, 802.11 only
supported a maximum network bandwidth of 2Mbpswhich was too slow for most applications. For this
reason, ordinary 802.11 wireless products are no longer manufactured.

802.11b - IEEE expanded on the original 802.11 standard in July 1999, creating the 802.11b
specification.802.11b supports bandwidth up to 11Mbps, comparable to traditional Ethernet. It uses the
same unregulated signaling frequency (2.4 GHz) as the original 802.11 standard. Thus 802.11 gear can incur
interference from microwave ovens, cordless phones, and other appliances using the same 2.4GHz range but
if a reasonable distance is maintained then the interference could be avoided.

802.11a - While 802.11b was in development, IEEE created a second extension to the original 802.11
standard called 802.11a, In fact 802.11b and 802.11a was created at the same time but 802.11b gained more
popularity. Also due to its higher cost 802.11a is usually found on business networks whereas 802.11b better
serves the home market. It supports bandwidth up to 54 MBPS and signals in the regulated frequency
spectrum around 5 GHZ, which means 802.11A signals have more difficulty in penetrating walls and other
obstructions. Because 802.11A and 802.11B use different frequencies, the two technologies are
incompatible with each other.

Wireless Standards
802.11g
In 2002 and 2003 WLAN products supporting a newer standard called 802.11g emerged on the market.
802.11g attempts to combine the best of both 802.11a and 802.11b.
802.11g supports bandwidth up to 54MBPS, and it uses the 2.4 GHz frequency for greater range.
802.11n
The newest in the IEEE standard in the Wi-Fi category is 802.11n; It was designed to improve on 802.11g. In
the amount of bandwidth supported by utilizing multiple wireless signals and antennas instead of one.
When this standard is finalized, 802.11n wireless connection should support data rates of over 100 MBPS.
802.11n offers better range over earlier Wi-Fi standards due to its increased signal intensity.
Apart from these general purpose Wi-Fi standards, several other related wireless technologies exist.
Other IEEE 802.11 working group standards like 802.11h and 802.11j are extensions or off shoots of Wi-Fi
technologies that each serves a very specific purpose.
Bluetooth is an alternative wireless network technology that followed a different development path than the
802.11 family, it supports a very short range (approximately 10 meters and relatively low bandwidth - i.e. 1-3
MBPS) designed for low power network devices like hand helds.

WiMax
WiMax was developed separately from Wi-Fi for long range networking spanning miles or kilometers.

Network Architecture
Network Architecture
Network architecture is a design of a computer network. The design includes the physical
structure and functionalities of the network. The role of computer is very important in the
network architecture.
OSI Reference Model
In 1977, the international organization for standardization (ISO) composed of industry
representatives developed data communication standards that promote multi vendor inter
operability and universal accessibility. The result was the open system connection (OSI reference
model).

The ISO issued a recommendation for a standard network architecture that defines the
relationships and interactions between network services and functions through common
interfaces and protocols. It is in the form of a seven layered model for network architecture and is
known as OSI reference model. It defines the rules and conventions for various function within
each layer and notes the constraints. Neither the details of the implementation nor the
specification of the interlayer interfaces are part of the architecture. Thus the OSI reference
model is just a Model. It cannot be implemented. It serves only as a framework for standards
which can be implemented at each layer by a variety of protocols.

Network Architecture

Network Architecture
The Physical Layer
Physical layer is concerned with transmitting raw bits over a communication channel. The design
issues here largely deals with mechanical, electrical and the physical transmission medium,
which lies below the physical layer.
The Data Link Layer
The main task of Data Link layer is to take a raw transmission facility and transform it into a line
that appears free of transmission errors to the network layer. Packet from the network layer is
modified to include the source and the destination address MAC (Media Access Control)
address. The sender breaks the input data into data frames, transmit the frames sequentially,
and process the acknowledgement frame sent back by the receiver.
The Network Layer
The Network Layer is concerned with the controlling of operation of the subnet; at this layer a
packet is created. A key design issue is how packets are routed from source to destination.
Controlling the congestion belongs to network layer. Network layer overcomes all the problems
to allow heterogeneous networks to be interconnected.

Network Architecture
The Transport Layer
The basic function of the transport layer is to accept data from the session layer, split it up into
smaller units if need be, pass these to the network layer and ensure that the pieces all arrive
correctly at the other end. The transport layer multiplex several transport connection onto the
same network connection to reduce the cost. It determines the kind of service to provide to the
session layer and the users of the network. In addition to multiplexing it should take care of
establishing and deleting connections across the network.
The Session Layer
The Session Layer allows users on different machines to establish sessions maintain and end the
session. One of the services of the session layer is to manage dialogue control. The decision to
transmit data using half duplex or full duplex is made at this layer.
The Presentation Layer
The presentation layer converts application layer information into a common format on the
sending computer. It converts the common format to the application format at the receiving
computer.
The formats include: ASCII- text files, JPG, BMP, GIFF- Pictures, MPG, AVI, MOV- Videos and
MP3, WAV- Music.
The Application Layer
The Application Layer contains a variety of protocols that are commonly needed, it includes all
the network applications a user interacts with. E.g.: HTTP, FTP, SMTP, Telnet etc.

TCP/IP Reference Model


ARPANET was a research network sponsored by US Department of Defense, which eventually
connected hundreds of Universities and government installations using leased telephone lines.
When satellites and radio networks were added later, the existing protocols had trouble
interworking with them, so new reference architecture was needed. This architecture was based
on the ability to connect multiple networks together in a seamless way, which later became
known as the TCP/IP reference model. The internet layer is a packet switching network based on
a connectionless internetworking layer. This layer called the internet layer which is the lynchpin
that holds the whole architecture together. Its job is to permit host to inject IP packages into any
network and have them travel independently to their destination. Packet routing is clearly the
major issue here as is avoiding congestion.
The Transport Layer
Layer above the internet layer is the transport layer, it is designed to allow peer on the source
and destination host to carry on a conversation. Two end-to-end protocols are defined here.
TCP- Transmission control protocol, is a reliable connection oriented protocol that allows a byte
stream originating on one machine to be delivered without error on any other machine in the
internet.
UDP- User Datagram protocol is an unreliable, connectionless protocol for applications that do
not want TCPs sequencing or flow controls and wish to provide their own. It is also widely used
for client server type request-reply queries and applications in which prompt delivery is more
important that accurate delivery.

Networking
The Application Layer - Above the transport layer is the application layer, which
contains all the higher- levels protocols. E.g.: HTTP, FTP, SMTP, Telnet etc. Many
protocols have been added to this such as domain name service (DNS) for mapping
host name on to their network addresses.
The Host-To-Network Layer - This model does not say much about what happens here
except to point out that the host has to connect to the network using some protocol so
it can send IP packets over it. This protocol is not defined and varies from host to host
and network to network.
Address Resolution Protocol (ARP) - ARP is the protocol used by the internet protocol to
map IP network addresses to the hardware addresses used by a data link protocol. The term
address resolution refers to the process of finding an address of a computer in the network. The
addresses resolved using a protocol in which a piece of information is sent by a client process
executing on the local computer to a server process executing on a remote computer. The
address resolution procedure is completed when the client receives a response from the server
containing the required address.
Reverse Address Resolution Protocol (RARP) - RARP is a protocol by which a physical
machine in a local area can request to learn its IP address from a gateway servers ARP table or
cache. It is used for diskless computers to determine their IP address using the network.

Networking
Point To- Point Communication - A point to- point connection is a dedicated link
between two systems or processes. Think of a wire that directly connects two systems.
The systems use that wire exclusively to communicate. The opposite of point to point
communication is broadcasting where one system transmits to many systems. Point
to-point communication is defined in the physical and data link layers of the OSI
protocol stack.
Hyper Text Transfer Protocol (Http) - It is the underlined protocol used by the World
Wide Web. HTTP defines how messages are formatted and transmitted, and what
actions web servers and browsers should take in response to various commands. HTTP
is called a stateless protocol because each command is executed independently,
without any knowledge of the commands that came before it.

Networking
Network Relationship - Prior to understanding the network relationship it is important to
know some networking terminologies which are as follows:

Node - A node is anything connected to the network, usually a computer, but it could be a
printer or a scanner.

Segment - A segment is any portion of a network that is separated by a switch, bridge or a


router from another part of a network.

Backbone - Backbone is the main cabling of a network that all of the segments connect to.
Usually, the backbone is capable of carrying more information than the individual segments.

Topology - The way each node is physically connected to the network.

Client - A client is an application or system that accesses a service made available by a server.
Server - A server is a computer designed to process requests and deliver data to other
(client) computers over a local network or the Internet.
Networks can be broadly classified into one of the two categories depending upon the
structures, sizes and budgets of different organization:
Client-Server Network (Centralized)
Peer-to-Peer Network (Decentralized)

Networking

Client-Server Network :
In Client-Server network client applications request services from server. Clients and servers typically run on
different computers interconnected by a computer network. It provides for centralized administration. All
users and resources can be managed from a single location or security database The file servers become the
heart of the system, providing access to resources and providing security

Advantages of Client-Server Networks


1.
2.
3.
4.

Facilitate resource sharing centrally administrate and control


Facilitate system backup and improve fault tolerance
Enhance security only administrator can have access to Server
Support more users difficult to achieve with peer-to-peer networks

Disadvantage of Client-Server Networks


1. High cost for Servers
2. Need expert to configure the network
3. Failure of the Server leads to the failure of the entire network

Networking

Peer To Peer Network


Peer-to-peer networks allow users to share resources and files located on their computers and to access
shared resources found on other computers. They do not have a file server or a centralized management
source . All computers are considered equal. They all have the same abilities to use the resources available
on the network. This network is designed primarily for small to medium local area networks.

Advantages of Peer To Peer Networks


1. Low cost
2. Simple to configure
3. User has full accessibility of the computer
4. Security is not an issue

Disadvantages of Peer To Peer Networks


1. No need for a dedicated server.
2. No central repository for files and applications
3. Does not provide the security available on a client/server network.
4. May have duplication in resources
5. Difficult to uphold security policy
6. 10 or less users

Network Features
Network Features
File and Printer Sharing
Network allows users to share information in different ways but the common way of sharing
information is through file sharing. The file could be either on the server or on other hosts and
when in network can be shared by all. Resources like printer can be shared by many systems at a
given point of time thereby saving on the cost and space.
Application Services and E-mail
One of the most common reasons for networking in many businesses, institutions and
organizations is that several users can work together on a single application which will be on the
server and can be shared by all. In larger office, personnel can use e-mails and instant messaging
tools to communicate and store messages.
Remote Access
With remote access, different users can access same files, data and messages in the office as
well as when they are not in the office. Now a days mobiles, i-pad, i-phones make use of this
technology.

Cable Topologies
It is also known as Network topology. Network Topology defines the way in which
computers, printers and other devices are connected in other words - the structure of
the network. Network topology describes the layout of the wire and devices as well as
the paths used by data transmissions.

Types Of Topologies: Topologies can be majorly classified as follows:


BUS
RING
STAR

Bus Topology

In Bus topology all devices are connected to a common cable called trunk/bus also
known as backbone with terminators provided at each end. Maximum length of the
cable can be 200m. Maximum nodes that can be attached are 30. This topology is
popular on LAN because it is inexpensive due to single cable connection and easy to
install.

Advantages of Bus Topology


1. Installation of devices is easy.
2. Requires less cable as compared to Star topology.
3. Less expensive and works better for smaller networks.

Disadvantages of Bus Topology


1. If backbone breaks entire network gets down.
2. Difficult to isolate problems due to single cable.
3. Limited number of devices can only be attached.

Star Topology

In star Topology each device is connected to a central device called hub/switch


through cable. All data transferred from one node to another passes through
hub/switch before reaching the destination
Advantages of Star Topology
1. Centralized management and security can be implemented in the hub/switch.
2. Adding or removing of node does not affect the whole network.
3. Easy to detect faults and to remove parts.

Disadvantages of Star Topology


1. Requires more cable length.
2. Failure of hub/switch affects the entire network.
3. It is more expensive.

Ring Topology

In Ring topology, devices are connected in a closed loop with all the nodes arranged
along a ring. All devices have equal access to media. Data travels from one device to
another around entire ring in one direction. It is primarily used for LANs but also used
in WANs.
Advantages of Ring Topology
Data travels at greater speed.
Data is quickly transferred without collision/bottlenecks.
Handles large volume of traffic.
Transmission of data is relatively simple as packets travel in one direction only.

Disadvantages of Ring Topology


More cabling is required compared to bus.
One faulty device affects the entire network.
Addition of devices affects the network.
Difficult to troubleshoot.
A data packet passes through every node between the sender and receiver making it slow.

Network Hardware
1. Repeater
A repeater is an electronic device that receives a signal and retransmits it at a higher level
and/or higher power, or onto the other side of an obstruction, so that the signal can cover
longer distances.

2. Hub
A hub is the place where data converges from one or more directions and is forwarded out in
one or more directions. It can be seen in local area networks. Hubs are of three types Active
hubs, Passive hubs and intelligent hubs. An active hub possesses all the usual features of a
passive hub besides having some more.
An active hub takes a larger role in Ethernet communications with the help of technology called
store & forward.
A passive hub on the other hand, do very little to enhance the performance of the network.
Neither, it helps in any way in the troubleshooting operations.
Intelligent hub is another form of hub that is increasingly being used.
An advanced version that comprises the best of both active and passive hubs is the intelligent
hub, it provides with the ability to manage the network from one central location. With the help
of an intelligent hub, one can easily identify, diagnose problems and even come up with
remedial solutions.

3. Bridge

Network Hardware

A bridge is a product that connects a local area network (LAN) to another local area network
that uses the same protocol. A bridge examines each message on a LAN, "passing" those known
to be within the same LAN, and forwarding those known to be on the other interconnected LAN
(or LANs).

4. Router
A router is a device or a software in a computer that determines the next network point to
which a packet should be forwarded toward its destination. It allows different networks to
communicate with each other. A router creates and maintains a table of the available routes and
their conditions and uses this information along with distance and cost algorithms to determine
the best route for a given packet. A packet will travel through a number of network points with
routers before arriving at its destination.

5. Switch
A network switch is a small hardware device that joins multiple computers together within one
local area network (LAN). Technically, network switches operate at layer two (Data Link Layer) of
the OSI model. Network switches appear nearly identical to network hubs, but a switch
generally contains more intelligence (and a slightly higher price tag) than a hub. Unlike hubs,
network switches are capable of inspecting data packets as they are received, determining the
source and destination device of each packet, and forwarding them appropriately. By delivering
messages only to the connected device intended, a network switch conserves network
bandwidth and offers generally better performance than a hub.

THANK YOU

Chapter -5 Cs3
DTP using Adobe InDesign
Introduction to Adobe InDesign:-

Adobe InDesign is a page-layout software that takes print


publishing and page design beyond current boundaries. Replacing popular software such as PageMaker and Quark
Express, InDesign is a desktop publishing program that incorporates illustration capabilities into its interface. It also
allows cross platform interaction with Illustrator, Photoshop, and Acrobat. Adobe InDesign Creative Suite (CS5)
software is a versatile desktop publishing application that gives you pixel-perfect control over design. We need
minimum Pentium Processor Core 2 Duo or higher with 2 GB RAM or higher and preferably with graphics card for
better performance.

Getting Started:-Procedure : To start - Adobe InDesign CS5.


click Start > Programs > Adobe InDesign CS5 or click on the InDesign short cut on the desktop.

5.1 Document Setup and Working Environment:5.1.1 Document Setup:-To create a new document, Click on File menu New Document. This will open
the Document Setup dialog box, Here user will be able to set up the correct page size, margins and page columns for
document as shown in fig.5.1

Ruler Guide

Fig 5.1 Document Setup

Window in as shown above diagram include following options :


Number of Pages
Type a value for the total number of pages for this document.

Facing Pages
Select this option to make left and right pages face each other in a double-page spread. Deselect this option to let
each page stand alone, such as user plan to print on both sides of a sheet of paper or want objects to bleed in the
binding.
Master Text Frame
Select this option to create a text frame the size of the area within the margin guides, matching the column settings
specified. The master text frame is added to the master.
Page Size
Choose a page size from the menu, or type values for Width and Height. Page size represents the final size user want
after bleeds or trimming other marks outside the page. There are presets for common sizes such as letter, legal, and
A4.
Orientation
Click the Portrait (tall) or Landscape (wide) icons. These icons interact dynamically with the dimensions user have
entered in Page Size. After entering all document settings, click OK.

5.1.2 Working Environment:User create and manipulate documents and files using various elements, such as panels, bars, and windows. Any
arrangement of these elements is called a workspace. The workspaces of the different applications in Adobe
Creative Suite 5 share the same appearance so that user can move between the applications easily.

5.1.3 Toolbox:(Fig.
5.2)

Fig 5.2 Tool Box


Tools overview
2

Type tools:-Create and format type in standard or customized blocks or paths.


Drawing tools:-Draw and style simple and complex objects, including rectangles, ellipses, polygons, freeform
shapes.
Selection tool:-Select (activate) objects, points, or lines.
Transform tools:-Reshape, reorient, and resize objects.
Navigation tools:-Move around in, control the view of, and measure distances in a document.
The Scissors tools:-Splits paths and frames.

5.1.4 Ruler Guides:Ruler guides are different from grids in that they can be positioned freely on a page or on a pasteboard. User can
create two kinds of ruler guides, page guides which appear only on the page, or spread guides, which span all pages
and the pasteboard of a multiple-page spread. User can drag any ruler guide to the pasteboard. A ruler guide is
displayed or hidden with the layer on which it was created. New ruler guides always appear on the target spread.

5.1.5 Zooming and Scrolling:- Zoom Tool is helpful because it allows user to focus in on specific areas of
documents to make the placement of text and graphics as accurate as possible. User can access the Zoom Tool by
selecting it from the Tool Box (Fig. 5.2). Zoom tool adjusts the view magnification in the document window. With
help of scrolling user can scroll the page vertically & horizontally.

5.2 Creating Frames, Moving Objects, Selection Techniques


5.2.1 Creating Frames :User can draw objects in a document and use them as paths or as frames. Frames can be containers for text or other
objects. A frame can also exist as a placeholdera container without contents. As containers and placeholders,
frames are the basic building blocks for a documents layout.
Frames can contain text or graphics. A text frame determines the area to be occupied by text and how text will flow
through the layout. User can recognize text frames by the text ports in their respective upper left and lower right
corners.
A graphics frame can function as a border and background, and can crop or mask a graphic. When acting as an
empty placeholder, a graphics frame displays a crossbar. (Fig 5.3)

Fig 5.3 Empty Graphical Frames

5.2.2 Moving Objects:


Paste an object into a frame:-Use the Paste Into command to nest graphics within container frames. User can insert
nested t graphics into nested frames by any one of the following method.
To paste one object inside a frame, select the object.
To paste two or more objects inside a frame, group them first, because a frame can contain only one object.
To paste a text frame inside another frame and preserve its current appearance, select the entire text frame using the
Selection tool or Direct Selection tool , not the Type tool.
2. Choose Edit > Copy (or Edit > Cut, if you dont want to keep the original).
3

3. Select a path or frame, and then choose Edit > Paste Into.
Fit an object to its frame:- 1.Select the frame of the object.
2.Choose Object > Fitting and one of the following options:
Fit Content To Frame Resizes content to fit a frame and allows the content proportions to be changed. The frame
will not change, but the content may appear to be stretched if the content and the frame have different proportions.
Fit Frame To Content Resizes a frame to fit its content. The frames proportions are altered to match the content
proportions, if necessary. This is useful for resetting a graphics.
Center Content Centers content within a frame. The proportions of the frame and its content are preserved. The
size of the content and frame are unaltered.
Fit Content Proportionally Resizes content to fit a frame while preserving the content proportions. The frames
dimensions are not changed. If the content and the frame have different proportions, some empty space will result.
Fill Frame Proportionally Resizes content to fill the entire frame while preserving the contents proportions. The
frames dimensions are not changed. If the content and the frame have different proportions, some of the content
will be cropped by the bounding box of the frame.

5.2.3 Selection Techniques


Selection methods and tools:
Selection tool:- Allows to select text and graphics frames, and work with an object using its bounding box. If user
click the content grabber that appears while holding the mouse pointer over an image, user can manipulate the image
within the frame without switching to the Direct Selection tool.
Direct Selection tool:- Allows user to select the contents of a frame, such as a placed graphic, or work directly with
editable objects, such as paths, rectangles, or type that has been converted to a text outline.
Select submenu:- Allows user to select an objects container (or frame) and its contents. The Select submenu also
facilitates select objects based on their position relative to other objects.
Select All and Deselect All commands:- Allows to select or deselect all objects on the spread and pasteboard,
depending on which tool is active and what is already selected. Choose Edit > Select All or Edit > Deselect All.
Select objects:-An object is any printable element on a page or on the pasteboard, such as a path or an imported
graphic. A frame or path is a shape drawn or a container for text or graphics. A bounding box is a rectangle with
eight selection handles that represents an objects vertical and horizontal dimensions. .
Select text inside a frame
To select text by dragging, click on a text frame using the Type tool. An insertion point appears.
To create an insertion point in text, double-click a text frame using any selection tool. InDesign switches to the
Type tool automatically.
Select an object inside a frame Click the object using the Direct Selection tool The Direct Selection tool
automatically changes to the Hand tool when placed over a graphic object inside a frame.
Select multiple objects
To select all the objects in a rectangular area, use the Selection tool to drag a marquee over the objects want to
select.
To select nonadjacent objects, use the Selection tool to select an object and then press Shift as user click additional
objects. Clicking selected objects deselects them.
To add more objects to a selection, press Shift as user clicks the Selection tool to drag a marquee over additional
objects. Dragging over selected objects deselects them.

5.2.4 Control and Transforming objects


Transform panel overview:-Use the Transform panel to view or specify geometric information for any selected
object, including values for position, size, rotation, and shearing. Commands in the Transform panel menu provide
additional options and quick ways to rotate or reflect objects.
4

Fig 5.4 Transform


A. Reference point locator
B. Constrain Proportions icon
C. Panel menu
View geometric information about objects:-When user select an object, its geometric information appears in the
Transform and Control panels. If user select multiple objects, the information represents all selected objects as a
unit. Select one or more objects, and display the Transform panel (Window > Object & Layout >
Transform).Position information is relative to the ruler origin and the reference point of the object. Angle
information is relative to the pasteboard, where a horizontal line has an angle of 0.
Change transformation settings:-The Transform panel includes several options that determine how objects are
transformed and how transformations are displayed in the Transform and Control panels
Change the reference point for selected objects:-All transformations originate from a fixed point on or near the
object, called the reference point. The reference point is marked by an icon when a transformation tool, such as the
Scale tool, is active.
Transform objects with the Selection tool:-

To move objects, click anywhere within the bounding box, and then drag.
To scale objects, hold down Ctrl key and drag any bounding box handle until the object is the desired size. Include
the Shift key to preserve the selections proportions. Include the Alt key to scale objects from the center.
To rotate objects, position the pointer anywhere outside a bounding box handle. When the pointer changes to ,
drag until the selection is at the desired angle of rotation
To reflect objects, drag a handle of the bounding box past the opposite edge or handle, until the object is at the
desired level of reflection.
Transform objects with the Free Transform tool

Rotate an object using the Rotate tool


Select an object to rotate. To rotate both the frame and its content, use the Selection tool to select the frame.
To rotate the content without rotating its frame, click the Content Grabber or use the Direct Selection tool
to select the object. To rotate a frame without rotating the content, direct-select the frame, and select all the
anchor points
Select the Rotate tool .
5

If user want to use a different reference point for the rotation, click where user want the reference point to
appear.
Position the tool away from the reference point, and drag around it. To constrain the tool to multiples of
45, hold down Shift while dragging. For finer control, drag farther from the objects reference point. User
can also rotate by using the Free Transform tool.

Rotate an object using the Selection tool:-Using the Selection tool, position the pointer anywhere outside a
selection handle. When the pointer changes to, drag until the selection is at the desired angle of rotation.

5.2.5 Lines:direction handles

direction

points.

5.2.6 Manually Resizing Objects:-

5.3 Working with Text


5 .3.1 Entering, Editing and Importing Text
Text in InDesign resides inside containers called text frames.
Like graphics frames, text frames can be moved, resized, and changed. The tool with which user select a text frame
determines the kind of changes user can make:
Use the Type tool to enter or edit text in a frame.
Use the Selection tool for general layout tasks such as positioning and sizing a text frame.
Use the Direct Selection tool to alter a text frames shape.
Text frames can have multiple columns. Text frames can be based on, yet independent of, page columns. Text
frames can also be placed on master pages and still receive text on document pages.
When user place or paste text, user dont need to create a text frame; InDesign automatically adds frames based on
the pages column settings either by
Select the Type tool , and then drag to define the width and height of a new text frame. Hold down Shift as user
drag to constrain the frame to a square. When user release the mouse button, a text insertion point appears in the
frame.
Using the Selection tool, click the in port or out port of another text frame, and then click or drag to create another
frame.
Use the Place command to place a text file.
Using the Type tool , click inside any empty frame. If the Type Tool Converts Frames To Text Frames option is
selected in Type preferences, the empty frame is converted to a text frame.
Place (import) text:-When user place a text or spreadsheet file, user can specify options to determine how the
imported text is formatted.

1. To create links to the files being placed, click File Handling in the Preferences dialog box and select Create Links
When Placing Text and Spreadsheet Files. Selecting this option creates a link to the placed file. User can use the
Links panel to update, relink, or remove links to text files. However, if user format linked text in InDesign, the
formatting may not be preserved when user update the link. If this option isnt selected, imported text and
spreadsheet files are embedded (not linked).
To create a new frame for the placed text, make sure that no insertion point is present and that no text or frames are
selected.
To add text to a frame, use the Type tool to select text or place the insertion point.
To replace the contents of an existing frame, use a selection tool to select the frame. If the frame is threaded, a
loaded text cursor appears.
3. Choose File > Place.
4. Select Replace Selected Item if user want the imported file to replace the contents of a selected frame, to replace
selected text, or to be added to the text frame at the insertion point. Deselect this option to flow the imported file
into a new frame.
5. Select Show Import Options, and then double-click the file user want to import.
6. Set import options, and then click OK.

5.3.2 Highlights and Threading Text:Thread text frames:-The text in a frame can be independent of other frames, or it can flow between connected
frames. To flow text between connected frames (also called text boxes), user must first connect the frames.
Connected frames can be on the same page or spread, or on another page in the document. The process of
connecting text among frames is called threading text.

5.3.3 Understanding Text Thread:- Each text frame contains an in port and an out port, which are used to
make connections to other text frames. An arrow in a port indicates that the frame is linked to another frame. A red
plus sign (+) in an out port indicates that there is more text in the story to be placed but no more text frames in
which to place it. This remaining unseen text is called overset text.

5.3.4 Story Editor:-

Fig 5.5 Story Editor

5.3.5 Glyphs:-1.Using the Type tool , click to place the insertion point where user want to enter a character.
2.Choose Type > Glyphs to display the Glyphs panel.
3.To display a different set of characters in the Glyphs panel, select a different font and type style, if available. From
the Show menu, choose Entire Font. Or, if user selected an OpenType font, choose from a number of OpenType
categories.Choose a custom glyph set from the Show menu.
4.Scroll through the display of characters until user see the glyph user want to insert. If user selected an OpenType
font, user can display a pop-up menu of alternate glyphs by clicking and holding the Glyph box.
5.Double-click the character user want to insert. The character appears at the text insertion point.

5.3.6 Special Character and White Space:Special Character :-User can insert common characters such as em dashes and en dashes, registered trademark
symbols, and ellipses.
1. Using the Type tool, position the insertion point where user want to insert a character.
2. Choose Type > Insert Special Character, and then select an option from any of the categories in the menu. If
special characters that user use repeatedly do not appear on the list of special
White space options:-The following options appear on the Type > Insert White Space menu:
Em Space Equal in width to the size of the type. In 12-point type, an em space is 12 points wide. En Space Onehalf the width of an em space. Nonbreaking Space The same flexible width as pressing the spacebar, but it prevents
the line from being broken at the space character.

5.3.7 Text Frame Options-Columns:Add columns to a text frame


User can create columns within a text frame by using the Text Frame Options dialog box.

Using the Selection tool, select a frame, or using the Type tool, click inside the text frame or select text.
Choose Object > Text Frame Options.
Specify the number of columns, the width of each column, and the spacing between each column (gutter)
for the text frame

Select Fixed Column Width to maintain column width when user resize the frame. If this option is selected,
resizing the frame can change the number of columns, but not their width.

5.3.8 Text Frame Insets & Vertical Alignment:For text frames, specify columns, vertical alignment, and inset spacing in the Text Frame Options dialog box. Set
horizontal alignment in the Paragraph panel (Type > Paragraph). For graphics and text frames, use subcommands on
the Object > Fitting menu to fit content to a frame (or vice versa).

5.4 Character Settings


5.4.1 Font, Size & Style
Fonts:- A font is a complete set of charactersletters, numbers, and symbolsthat share a common weight, width,
and style, such as 10-pt Adobe Garamond Bold. Typefaces (often called type families or font families) are
collections of fonts that share an overall appearance, and are designed to be used together, such as Adobe
Garamond.A type style is a variant version of an individual font in a font family. Typically, the Roman or Plain (the
actual name varies from family to family) member of a font family is the base font, which may include type styles
such as regular, bold, semibold, italic, and bold italic.
Apply a font to text:-When user specify a font, user can select the font family and its type style independently.
When user change from one font family to another, InDesign attempts to match the current style with the style
available in the new font family. For example, Arial Bold would change to Times Bold when user change from Arial
to Times.
Specify a typeface size:-By default, typeface size is measured in points (a point equals 1/72 of an inch). User can
specify any typeface size from 0.1 to 1296 points, in 0.001-point increments.
1Select the characters or type objects user want to change. If user dont select any text, the typeface size applies to
new text user create.
In the Character panel or Control bar set the Font Size option
Choose a size from the Type > Size menu. Choosing Other lets user type a new size in the Character
Character style attributes:-Unlike paragraph styles, character styles do not include all the formatting attributes of
selected text. Instead, when user create a character style, User can create a character style that, when applied to text,
changes only some attributes, such as the font family and size, ignoring all other character attributes. If user want
other attributes to be part of the style, add them when editing the style.
Apply a character style:1.Select the characters to which user want to apply the style.
Click the character style name in the Character Styles panel
.Select the character style name from the drop-down list in the Control panel

5.4.2 Leading
The vertical space between lines of type is called leading. Leading is measured from the baseline of one line of text
to the baseline of the line above it. The default auto-leading option sets the leading at 120% of the type size (for
example, 12-point leading for 10-point type). When auto-leading is in use, InDesign displays the leading value in
parentheses in the Leading menu of the Character panel.
Change leading : By default, leading is a character attribute, which means that user can apply more than one
leading value within the same paragraph. The largest leading value in a line of type determines the leading for that
line. However, user can select a preferences option so that leading applies to the entire paragraph, instead of to text
within a paragraph. This setting does not affect the leading in existing frames
Change leading of selected text:1. Select the text user want to change.
In the Character panel or Control panel, choose the leading user want from the Leading menu .Select the existing leading
value and type a new value.
While creating a paragraph style, change the leading using the Basic Character Formats panel.
If InDesign ignores the leading change, it may be due to Vertical Justification or Align To Baseline Grid being selected.
Choose Object > Text Frame Options and make sure Vertical Justification is set to Top, and make sure Do Not Align To
Baseline Grid is selected in the Paragraph panel, Control panel, or paragraph style.

5.4.3 Kerning and Tracking


Kerning is the process of adding or subtracting space between specific pairs of characters. Tracking is the process
of loosening or tightening a block of text.

Types of kerning:-User can automatically kern type using metrics kerning or optical kerning. Metrics kerning uses
kern pairs, which are included with most fonts. Kern pairs contain information about the spacing of specific pairs of
letters. Some of these are: LA, P., To, Tr, Ta, Tu, Te, Ty, Wa, WA, We, Wo, Ya, and Yo. InDesign uses metrics
kerning by default so that specific pairs are automatically kerned when user import or type text. To disable metrics
kerning, select "0". Optical kerning adjusts the spacing between adjacent characters based on their shapes. Some
fonts include robust kern-pair specifications. However, when a font includes only minimal built-in kerning or none
at all, or if user use two different typefaces or sizes in one or more words on a line, user may want to use the optical
kerning. User can apply kerning, tracking, or both to selected text. Tracking and kerning are both measured in
1/1000 em, a unit of measure that is relative to the current type size. In a 6-point font, 1 em equals 6 points; in a 10point font, 1 em equals 10 points. Kerning and tracking are strictly proportional to the current type size.

5.4.4 Horizontal and Vertical Scale


Scale type:-User can specify the proportion between the height and width of the type, relative to the original width
and height of the characters. Unscaled characters have a value of 100%. Some types (families) include a true
expanded font, which is designed with a larger horizontal spread than the plain type style. Scaling distorts the type,
so it is generally preferable to use a font that is designed as condensed or expanded.
Adjust vertical or horizontal scaling:1Select text user want to scale.
2In the Character panel or Control panel, type a numeric value to change the percentage of Vertical Scaling or
Horizontal Scaling .
Scale text by resizing the text frame in InDesign:Using the Selection tool, hold down Ctrl (Windows) and then drag a corner of the text frame to resize it
Using the Scale tool , resize the frame.

5.4.5 Baseline Shift and Slanted Text


Apply baseline shift:-

Make characters superscript or subscript in a non-OpenType font:1. Select text.


2. Choose Superscript or Subscript in the Character panel menu or in the Control panel. When user choose
Superscript or Subscript, a predefined baseline shift value and type size are applied to the selected text. The values
applied are percentages of the current font size and leading, and are based on settings in the Type Preferences dialog
box. These values do not appear in the Baseline Shift or Size boxes of the Character panel when user select the text
(Fig. 5.6)

10

Fig 5.6 Subscript

5.5 Paragraph Settings


5.5.1 Indents:- 1)Left Indent: This option provide space to left side of the entire paragraph.
2) Right Indent: This option provide space to right side of the entire paragraph.
3) First Line Left Indent:-This option provide space to left side of the first line of the paragraph.
4) First Line Right Indent:-This option provide space to right side of the first line of the paragraph.

Fig 5.7 Indents

5.5.2 Space Before/Space After:1.Space Before :- Provide space before or Above the paragraph .
2.Space After :- Provide space After or Below the paragraph .
5.5.3 Alignment of the Paragraph :- Paragraph may be align left ,align center, align right and justify with
different options like justify with last line aligned left , justify with last line aligned right etc.
11

5.5.4 Use drop caps:-User can add drop caps to one or more paragraphs at a time. The drop caps baseline sits
one or more lines below the baseline of the first line of a paragraph. User can also create a character style that can
be applied to the drop-cap characters. For example, user can create a tall cap (also called a raised cap) by specifying
a 1-line, 1-character drop cap and applying a character style that increases the size of the first letter. (Fig. 5.8)

Fig 5.8 Drop Cap


1.With the Type tool selected, click in the paragraph where user want the drop cap to appear.
2In the Paragraph panel or Control panel, type a number for Drop Cap Number Of Lines to indicate the number of
lines user want the drop cap to occupy
3. For Drop Cap One Or More Characters , type the number of drop cap characters user want.
4. To apply a character style to the drop cap character, choose Drop Caps and Nested Styles from the Paragraph
panel menu, and then choose the character style user created.

5.5.5 Aligning to a Baseline Grid:When the Align to Baseline Grid option is applied to paragraphs with Top, Center, or Bottom alignment, all lines
will be aligned to the baseline grid. With the Justified option, only the first and last lines will be aligned to the
baseline grid.

With out Baseline Grid

With Baseline Grid


Fig 5.9 BaseLine Grid

5.5.6 Hyphenation:-with help of this option user can apply hyphenation or remove the hyphenation from the
paragraph.

5.5.7 Control paragraph breaks using Keep Options:To highlight paragraphs that violate Keep Options, choose Edit >
Preferences > Composition (Windows)

5.5.8 Text Composers:-The appearance of text on user page depends on a complex interaction of processes
called composition. Using the word spacing, letter spacing, Glyph scaling, and hyphenation options user has

12

selected, InDesign composes user type in a way that best supports the specified parameters. InDesign offers two
composition methods: Adobe Paragraph Composer (the default) and Adobe Single-line Composer (both are
available from the Control panel menu). User can select which composer to use from the Paragraph panel menu, the
Justification dialog box, or the Control panel menu.

5.5.9 Paragraph Rules:Add rules (lines) above or below paragraphs:- Rules are paragraph attributes that move and are resized along with
the paragraph on the page. If userre using a rule with headings in user document, user may want to make the rule
part of a paragraph style definition. The width of the rule is determined by the column width. The offset for a rule
above a paragraph is measured from the baseline of the top line of text to the bottom of the rule. The offset for a rule
below a paragraph is measured from the baseline of the last line of text to the top of the rule.

Fig 5.10 Rules

5.5.10 Bullet Points and Lists:Create bulleted or numbered lists:-In bulleted lists, each paragraph begins with a bullet character. In numbered
lists, each paragraph begins with an expression that includes a number or letter and a separator such as a period or
brackets. The numbers in a numbered list are updated automatically when user add or remove paragraphs in the list.
User can change the type of bullet or numbering style, the separator, the font attributes and character styles, and the
type and amount of indent spacing. User cannot use the Type tool to select the bullets or numbers in a list. Instead,
edit their formatting and indent spacing using the Bullets and Numbering dialog box, the Paragraph panel, or the
Bullets and Numbering section of the Paragraph Styles dialog box (if the bullets or numbers are part a style).

13

Fig 5.11 Number List

5.5.11 Paragraph styles or Character styles:- By default, each new document contains a [Basic

Paragraph] style that is applied to text user type. User can edit this style, but user cant rename or delete it. User can
rename and delete styles that user create. User can also select a different default style to apply to text.
Open the Paragraph Styles panel:-Choose Type > Paragraph Styles, or click the Paragraph Styles tab, which
appears by default on the right side of the application window.

5.5.12 Editing paragraph or character styles:1 If user want to base a new style on the formatting of existing text, select that text or place the insertion point in it.
If a group is selected in the Styles panel, the new style will be part of that group.
2 Choose New Paragraph Style from the Paragraph Styles panel menu, or choose New Character Style from the
Character Styles panel menu.
3 For Style Name, type a name for user new style.
4 For Based On, select which style the current style is based on.
5 For Next Style (Paragraph Styles panel only), specify which style is applied after the current style when user press
Enter or Return.
6 To add a keyboard shortcut, position the insertion point in the Shortcut box, and make sure Num Lock is turned
on. Then hold down any combination of Shift, Alt, and Ctrl or Shift, Option and press a number on the numeric
keypad. User cannot use letters or non-keypad numbers for defining style shortcuts. If user keyboard does not have a
Num Lock key, user cannot add keyboard shortcuts to styles.
7 If user want the new style to be applied to the selected text, select Apply Style To Selection.
8 To specify the formatting attributes, click a category (such as Basic Character Formats) on the left, and specify the
attributes user want to add to user style. When specifying a Character Color in the Style Options dialog box, user
can create a new color by double-clicking the fill or stroke box.

5.6 Working with Images in Indesign


5.6.1 Placing an Image & Image Fitting Options (Fig. 5.12):Place (import) graphics:-The Place command is the primary method used to insert graphics into InDesign because
it provides the highest level of support for resolution, file formats, multipage PDF files, and color. To place graphics
is also referred to as import images and insert pictures.

. To replace an existing image, select its graphics frame.


o Choose File > Place and select one or more graphics files of any available format.
o To replace an object user selected, select Replace Selected Item.
o To add a caption based on the image metadata, select Create Static Captions.
o To set format-specific import options, do one of the following:
o Select Show Import Options, and then click Open
o Hold down Shift as user click Open or Shift-double-click a file name.
o If the Image Import Options dialog box appears (because user chose to set format-specific import options),
select import options and click OK.
.
14

Fig 5.12 placing Image

5.6.2 Scaling Images and Cropping Images :Scale objects or image:-Scaling an object enlarges or reduces it horizontally (along the x axis), vertically (along the
y axis), or both horizontally and vertically, relative to the reference point user specify. By default, InDesign scales
strokes. User can change the default stroke behavior by deselecting Adjust Stroke Weight When Scaling in the
Transform or Control panel menu.
Scale an object using the Selection tool:-To scale the content and frame simultaneously, use the Selection tool to
select the object and hold down Ctrl. Add the Shift key to resize the object proportionally.
Scale an object using the Scale tool:1. Select an object to scale. To scale both the frame and its content, use the Selection tool to select the frame. To
scale the content without scaling its frame, click the Content Grabber to direct-select the object. To scale a frame
without scaling the content, direct-select the frame, and select all the anchor points.
2.Select the Scale tool .
3.Position the Scale tool away from the reference point and drag. To scale the x or y axis only, start dragging the
Scale tool along one axis only. To scale proportionally, hold down Shift as user drag the Scale tool. For finer
control, start dragging farther from the objects reference point.
Scale an object using the Transform panel:-To maintain the original proportions of the object when using the
Transform panel, make sure the Constrain Proportions icon is selected.
1. Select an object to scale. To scale both the frame and its content, use the Selection tool to select the frame. To
scale the content without scaling its frame, direct-select the object. To scale a frame without scaling the content,
direct-select the frame, and select all the anchor points.
2. In the Transform or Control panel, do one of the following:
Choose a preset percentage value in the Scale X Percentage or Scale Y Percentage pop-up menu.
Type a percentage value (such as 120%), or a specific distance (such as 10p) in the Scale X Percentage or Scale Y
Percentage box, and then press Enter or Return.
Crop or mask objects or Image Cropping and masking are both terms that describe hiding part of an object. In
general, the difference is that cropping uses a rectangle to trim the edges of an image, and masking uses an arbitrary
shape to make an objects background transparent. A common example of a mask is a clipping path, which is a mask
made for a specific image. Use graphics frames to crop or mask objects. Because an imported graphic is
15

automatically contained within a frame, user can crop or mask it immediately without having to create a frame for it.
1. To crop an imported image or any other graphic already inside a rectangular frame, click the object using the
Selection tool and drag any handle on the bounding box that appears. Press Shift as user drag to preserve the frames
original proportions.
2. To crop or mask any object, use the Selection or Direct Selection tool to select one object user want to mask.
Choose Edit Copy, select an empty path or frame smaller than the object, and choose Edit > Paste Into.
3. To crop frame content precisely, select the frame with the Direct Selection tool, and use the Transform or Control
panel to change the size of the frame.
4. To specify crop settings for an empty placeholder frame, choose Object > Fitting > Frame Fitting Options, and
then specify the crop amount.

Fig 5.11 Crop Image

5.7 The Pages Panel:5.7.1 Pages Panel:-The Pages panel provides information about and control over pages, spreads, and masters
(pages or spreads that automatically format other pages or spreads). By default, the Pages panel displays thumbnail
representations of each pages content.
1. If the Pages panel isnt visible, choose Window > Pages.
2. Choose Panel Options in the Pages panel menu.
3. In the Icons section, specify which icons appear next to the page thumbnails in the Pages panel. These icons
indicate whether transparency or page transitions have been added to a spread, and whether the spread view is
rotated.
4. In the Pages and Masters sections:
Select an icon size for pages and masters.
Select Show Vertically to display spreads in one vertical column. Deselect this option to allow spreads to be
displayed side-by-side.
Select Show Thumbnails to display thumbnail representations of the content of each page or master.
5. In the Panel Layout section, select Pages On Top to display the page icon section above the master icon section,
or select Masters On Top to display the master icon section above the page icon section.
6. Choose an option in the Resize menu to control how the sections are displayed when user resize the panel:
To resize both the Pages and Masters sections of the panel, choose Proportional.
To maintain the size of the Pages section and resize only the Masters section, choose Pages Fixed.
16

To maintain the size of the Masters section and resize only the Pages section, choose Masters Fixed.

5.7.2 Inserting and Deleting Pages


To Add new pages to a document
To add a page after the active page or spread, click the New Page button in the Pages panel or choose Layout >
Pages > Add Page. The new page uses the same master as the existing active page.
To add multiple pages to the end of the document, choose File > Document Setup. In the Document Setup dialog
box, specify the total number of pages for the document. InDesign adds pages after the last page or spread.
To add pages and specify the document master, choose Insert Pages from the Pages panel menu or choose Layout >
Pages > Insert Pages. Choose where the pages will be added and select a master to apply.
To Delete a page from the document: In the Pages panel, drag one or more page icons or page-range numbers to the Delete icon.
Select one or more page icons in the Pages panel, and click the Delete icon.
Select one or more page icons in the Pages panel, and then choose Delete Page(s) in the Pages panel menu.

5.7.3 Repositioning Document Pages


Move or copy pages between documents
1. To move pages from one document to another, open both documents.
2. Choose Layout > Pages > Move Pages, or choose Move Pages from the Pages panel menu.
3. Specify the page or pages user want to move

5.7.4 Setting Adding and Deleting Master Pages:Create master Pages


By default, any document user created has a master page. User can create additional masters from scratch or from
an existing master page or document page. After user apply master pages to other pages, any changes made to the
source master carry forward to the masters and document pages that are based on it.
Delete a master from a document:1.In the Pages panel, select one or more master page icons.
2.Do one of the following:
Drag a selected master page or spread icon to the Delete icon at the bottom of the panel.
Click the Delete icon at the bottom of the panel.
Choose Delete Master Spread [spread name] in the panel menu.
When user delete a master, the [None] master is applied to any document page to which the deleted master was
applied.

5.7.5 Auto page numbering

Procedure to Auto page numbering:- Right click on Page Panel Select Numbering & Section Options. (Fig
5.14)

17

Fig 5.14 Numbering & Section Options

5.8 Working with tables


5.8.1. Tables:-

5.8.2 Adding and deleting rows and columns:Insert a row


1. Place the insertion point in a row below or above where user want the new row to appear.
2. Choose Table > Insert > Row.
3.Specify the number of rows user want.
4. Specify whether the new row or rows should appear before or after the current row, and then click OK. The new
cells have the same formatting as the text in the row in which the insertion point was placed.
Insert a column
1Place the insertion point in a column next to where user want the new column to appear.
2Choose Table > Insert > Column.
3Specify the number of columns user want.
4Specify whether the new column or columns should appear before or after the current column, and then click OK.
The new cells have the same formatting as the text in the column in which the insertion point was placed

5.8.3 Resizing Columns and Rows:-

5.8.4 Entering Content:Add text to a table:-User can add text, anchored objects, XML tags, and other tables to table cells. The height of a
table row expands to accommodate additional lines of text, unless user set a fixed row height. User cannot add
footnotes to tables.
18

Using the Type tool T, do any of the following


Position the insertion point in a cell, and type text. Press Enter or Return to create a new paragraph in the same
cell. Press Tab to move forward through cells (pressing Tab in the last cell inserts a new row). Press Shift+Tab to
move backwards through cells.
Copy text, position the insertion point in a cell, and then choose Edit > Paste
Position the insertion point in a cell where user want to add text, choose File > Place, and then double-click a text
file.

5.9 Exporting to PDF:About Adobe PDF:-Portable Document Format (PDF) is a universal file format that preserves the fonts, images,
and layout of source documents created on a wide range of applications and platforms. Adobe PDF is the standard
for the secure, reliable distribution and exchange of electronic documents and forms around the world.
Export to PDF:-

Export in PDF format.


1. Choose File > Export.
2. Specify a name and location for the file.
3. For Save As choose Adobe PDF (Print),\and then click Save. When user select the Adobe PDF (Print) option,
user cannot include interactive elements in the PDF.
To use a predefined set of job options, choose a preset from the Adobe PDF Preset menu
To create a PDF/X file, either choose a PDF/X preset from the Adobe PDF Preset menu, or choose a predefined
PDF/X format from the Standard menu
To customize options, select a category from the list on the left and then set the options.
5. For Compatibility, choose the lowest PDF version necessary to open the files user create.
6. Click Export.

19

Fig 5.15 Exporting to PDF File

Exercise
Q1. Fill in the blanks:
1.
2.
3.
4.
5.

_________ is page layout software that takes print publishing and page design beyond current boundaries.
Using __________ option , user can make left and right pages face each other.
_________ is used to view or specify geometric information for any selected object.
___________ use as containers for text or other objects..
Text in Indesign reside inside containers called as ___________.

Q2. True or False:


1.
2.
3.
4.
5.

Adobe InDesign allows cross platform interaction with Illustrator , Photoshop and Acrobat.
A text frame can function as border and can be cropped.
Each frame contain an In port and an Out port.
Auto Page Numbering is not possible in Adobe InDesign.
Leading is the process of adding or subtracting space between specific pairs of characters.

Q3. MCQ( Single Correct Answers):


1) Any arrangement of elements such as panels , bars and windows is called as_________.
a) Workspace
b) Workgroup
c) Worktask
d) All
2) ______ is desktop publishing software.
a) Ms-Office
b) Browser
c) Adobe InDesign
d) PDF.
3) ______ option is used from file menu to import the text in InDesign.
a) Place
b) Export
c) Save
d)none
4) User can change the text in InDesign either on layout page or in the ________ window.
a)Story Editor
b)Leading
c)Kerning
d)Crop
5. The process of connected text among frames is called as ___________.
a)Tracking
b)Leading
c)Kerning
d)Crop
Q4 . Write Answers of the following questions.
1. Explain the terms cropping and masking.
2. What are the uses of the Selection Tool in InDesign?
3 .Explain any four option from Toolbox in InDesign.
4. What is Composition ? Explain in detail.

20

Std. XIIth Arts I.T.


Chapter 6: Adobe Acrobat
Introduction
Portable Document Format (PDF) is a format designed by Adobe and is used to represent a document in a
manner independent of the application software, hardware, and operating system used to create it. It is a well
documented and established standard and is a popular and widely used format for document distribution. It is
common to find web pages offer the same document in both formats, HTML for immediate display, and PDF
format for downloading (to print). PDF (Portable Document Format) is an electronic portable document file
format that has captured all the elements of a printed document as an electronic image that you can view,
navigate, print, or forward to someone else. A PDF document will have a .pdf filename extension Their icon
looks like this:
6.1 Concept of PDF

It is a cross platform standard. This means that somebody can create a PDF file in Windows
environment and the same can viewed in Unix environment.
PDF files are device independent: These files can be printed on any inkjet printer or on any image
printer.
PDF files are compact. PDF supports a number of sophisticated compression algorithms.
PDF files can contain multimedia elements like movies or sound as well as hypertext elements like
bookmarks, links to e-mail addresses or web pages and thumbnail views of pages.
PDF supports security. The creator of a PDF file can set various security options. It is possible to lock
a PDF so it can only be opened with a password. It is also possible to prohibit changing the content of
a PDF or disable the option to print a PDF file.

Disadvantages of PDF

Portable Document Format is not that portable as it was named. Roughly every two years Adobe have
released a new version of PDF, each time adding new features or expanding the scope of existing
ones.
PDF tries to be everything to everybody, meaning that it may not be as efficient for a specific task
than a tool optimized for that task. User can use PDF to exchange small graphic elements like ads,
drawings or pictures but more prepare applications can handle the EPS file format.
PDF is geared towards visualizing documents. Using metadata it is possible to preserve the logical
structure of a document.
PDF files are not meant to be edited. Small changes can be made to a PDF file but it is fairly difficult
to add complete blocks of text or images to an existing PDF file. There are specialized tools in the
market.

6.1.1 Applications of PDF:


1) Platform independent: PDF document can be viewed on any computer platform and can print on
most printers regardless of the operating system, such as MS Windows, UNIX and other platforms.
2) Extensible: PDF based solutions includes creation, plug in, consulting, training and support tools.
3) Maintain information integrity: Adobe PDF files look exactly like original document and preserve
source file information i.e text, drawings, photos etc. regardless of the application used to create it.
4) Open File Format: PDF is an open file format for representing 2-D documents in a device
independent and resolution independent fixed layout document format.

5) Application free of cost: PDF applications are free of cost. Anyone may encode information that is
specific to the application software, hardware or operating system used to create or view the
document.
6) Useful for Artistic Work: PDF files are useful for documents such as magazine articles, product
brochures etc.
6.1.2 Features of PDF:
1) Adding links: In a PDF document, it is not necessary to view pages in sequence. User can jump
immediately from one section of a document to another using links. Links are also used to add
interactivity.
2) Easy to add bookmarks: A Bookmark is a link represented by text in the bookmarks palette. In PDF,
bookmarks are used to create a brief custom outline of a document or to open other documents.
3) Ability to embed images: In PDF, it is possible to capture the image to change the bitmap text to
regular PDF text that can be edited and searched in Acrobat.
4) Ability to embed font: In PDF, it is possible to embed different fonts as per need.
5) Ability to edit text: PDF text tool lets user to edit text, one line at a time and change text attributes
such as spacing, point size and color.
Screen Shot of Adobe Acrobat:

Use the Acrobat Menu Commands


Acrobat has five command groups, described as follows in order from left to right on the menu bar.
File The commands in the File group are used to create PDF files; create PDF Portfolios; and to open, close,
and save documents. Additional commands are used to attach the current PDF to an e-mail, share files online,
view document information, and launch the new Action Wizard.
Edit The commands in the Edit group are used to edit the current PDF document. There are also commands
to search for items in the current document, search for words or phrases in PDF documents stored in folders
on computer, find words or phrases in a document, check spelling in comments and editable text, and set
Acrobat preferences (Windows).
View The commands in the View group are used to change view of the document. User use menu
commands in this group to navigate to a specific page in the document, zoom in or out, change the manner in
which the page is displayed, rotate the view, and so on. User also find commands in this group to access
Navigation panels and the toolbars.
Window The commands in the Window group are used to select documents user currently have opened,
split the view into two panes or spreadsheet view, as well as arrange the view of multiple documents. User
can also view a document in full-screen mode by accessing a command from this menu. Another command
enables user to open the active document in a new window.
Help In the Help command group, user can find access to complete program help, links to online help and
program updates, as well as a feature user can use to repair the Acrobat installation. User can use Acrobat to
read e-books, manage digital editions from the Help command group.
6.1.3 Embedding Images in a PDF:
A PDF file is a faithful reproduction of a document. Obviously it can also contain images. The PDF file
format has been designed to cope with a wide range of image types and color spaces. Images in PDF files can
be:
Black-and-white images (line-art) Older versions of Acrobat (<4.0) occasionally had problems
when such images were colorized in a front-end application like QuarkXPress. Nowadays this should
no longer be a problem.
Grayscale images These can be 2, 4, 8 or 16 bit. Usually images are 8 bit, which means that there
are 256 shades of grey going from white to black.
Multitones Duotones, tritones, Hexachrome files, were not possible in PDF 1.2 files (created
using Acrobat 3) but PDF 1.3 provided a new color space called DeviceN which is specifically meant
for such images.
Color images These can be 1, 2, 4, 8 or 16 bit. Usually each color plane is 8-bit (256 colors) which
means that an RGB image can contain 16 million colors. Instead of gradual tints, an image can also
contain a fixed list of a limited number of colors. This is called indexed color. The following color
spaces are supported:
o RGB
o LAB/ICC based
o CMYK
Sometimes the creation of a PostScript file and the subsequent conversion to a PDF changes the content of
images. Fairly common things that can go wrong are CMYK images that end up as RGB images in the PDF
document or documents in color that get converted to black-and-white PDF files. In most cases, images are
compressed to limit the file size of the resulting PDF.

Images embedded as Form XObjects


Sometimes images are embedded as an object called a Form XObject within a PDF. Internally to PDF, Form
XObjects are the logical equivalent of EPS files. Some PDF tools are not capable of handling Form
XObjects.
6.1.4 PDF font basics:
The PDF file format supports the use of the following font formats:
TrueType
Type 1
Type 3
Composite fonts (Type 0): both Type 1 (CIDFontType0) and TrueType (CIDFontType2) are
supported.
OpenType: From PDF 1.6 onwards, OpenType fonts can be stored directly in PDF files. In prior
releases OpenType fonts are embedded as either Type 1 or TrueType fonts. The ability to embed
OpenType directly was added for the forms capabilities of PDF.
There are two mechanisms to include fonts in a PDF:
Embedding A full copy of the entire character set of a font is stored in the PDF.
Subsetting Only those characters that are actually used in the lay-out are stored in the PDF. If the
$ character doesnt appear anywhere in the text, that character is not included in the font. This
means that PDF files with subsetted fonts are smaller than PDF files with embedded fonts. For
subsetted fonts, the font name is preceded by 6 random characters and a plus sign.
If certain fonts are missing from the PDF file, Adobe Acrobat and Adobe Reader will automatically try to
emulate the missing font by using one of the Multiple Master fonts that are built into these programs. The
Multiple Master fonts that are used for this are:
Adobe Serif MM
Adobe Sans MM
6.2 Adobe PDF Writer Printer
An Adobe Acrobat file (more commonly referred to as a PDF file) is the required format for all
documents
submitted for publication collections. Using Adobe Acrobat Writer will also make doing your
publication collection easier and make your documents more readable, hence saving you a lot of time.

Adobe Acrobat Writer allows to:

also

create a PDF directly from a website


combine multiple files to create a single PDF
save time by not having to print pages and pages from the internet and then re-scan them and

not needing to copy and paste from the internet into another document
User can create a single PDF from multiple PDFs through the scanner program.

Adobe Acrobat Writer on a Personal Computer


The working page for Adobe writer (as it would appear on a standard PC) is shown below. If user have
Adobe writer installed, all PDFs you open will have this toolbar. Creating a PDF from a File
User can create a PDF from another file which you already have, such as a Microsoft Word

document. To
do this, you will be using the From File option under the Create PDF button on the toolbar.

Click on Create PDF and scroll down to and click on the From File option. This opens a browser window
which allows user to select the file user want to create a PDF document of. Click on document/s, and then
click Open.

Document will open in the Adobe page. To create the PDF, simply save the open file.

Creating a PDF from a web page


Using an Adobe Acrobat window, click on Create PDF and scroll down to the From Web Page
option. This will bring up a window requesting a URL address. Copy the website URL from internet
browser window and paste it into the field. Then click Create.

User will need to wait a few seconds until the full websites contents have been downloaded and converted
to a PDF file.

Once it is downloaded, name and save a copy of PDF file.

Creating a PDF from Multiple files


User can create a single PDF from multiple PDFs by either going through the Create PDF function on the
toolbar or by directly clicking on the Combine files button on the toolbar.

In the first case, user would click on Create PDF, and then choose From Multiple files A Combine
Files window will open to allow you to select your multiple files. The second option is to click directly on
Combine Files on the toolbar, which will take you directly to this same window.

User can add any open PDF files by clicking on Add Open Files. Add each of the files user want by
clicking on the Add Files button at the top left of the page. This will open another window which will
allow user to find and select each chosen file. Once user have chosen your files, they will appear in the
Combine Files window.

Once user have selected and added all the files you wanted, you can use the Move Up and Move Down
buttons (found nearer the bottom of the Combine Files window) to re-order the files into your desired
order. There is an alternative to manually navigating to the files user wish to combine. If the files user
wish to combine are already open in Adobe Acrobat Writer, user can use the Add Open Files...
function. Whilst in the Combine Files window, click the Add Open Files... button at the top right of the
page. This will open another window showing all currently open PDFs. Highlight all the files user want to
add, then click Add Files.

Once user have a list of all the files you wanted to combine, and have rearranged them to be in the correct
order, click Next at the bottom of the page.

User will now be given two options for how the files are to be combined. Most often, user will use the
default first option, Merge files into a single PDF. Click the Create button at the bottom of the window to
combine all your files together.

User can choose a name for your new file and click Save, user will have finished creating combined
PDF file.

6.2.1 PDF Conversion Settings


When user want to convert a Word document to a PDF file, Acrobat PDFMaker uses the currently selected
conversion settings, it also allows user to modify document security, specify how Microsoft Office features are
converted to PDF, specify how Acrobat PDFMaker creates bookmarks, and specify display options.

Open Acrobat PDFMaker dialog box that modifies conversion settings, the Settings tab is active.
1. Click the Conversion Settings dropdown arrow and choose one of the
preset options: High Quality Print,
Oversized Pages, PDF/A-1b 2005
(CMYK), PDF/A-1b 2005 (RGB),
PDF/X-1a 2001, PDF/X-3-2002, Press
Quality, Smallest File Size, Standard,
or any custom conversion setting you
have created. To apply the new settings,
click OK. To modify additional
conversion
settings,
click
the
appropriate tab and modify the
parameters to suit the intended
destination of your document.

2. In the PDFMaker Settings area, user can choose the following options, the first three of which are
selected by default:
View Adobe PDF Result Opens the document in Acrobat after the conversion process is
completed.
Prompt For Adobe PDF File Name Prompts for a filename before the document is converted
to a PDF file. If user deselect this option, the resulting PDF file adopts the filename of the
Microsoft Office document user is converting.
Convert Document Information Converts certain information (document title, author,
keywords, and subject) from the Microsoft Office Properties dialog box into the PDF files
Document Properties, which can be displayed by opening the files Document Properties dialog
box.
Create PDF/A-1a: 2005 Compliant File Creates a document that is compliant with PDF/A-1a:
2005 standards.
3. In the Application Settings area, you can choose the following options, the last three of which are
selected by default:
Attach Source File Attaches the source file to the converted PDF document. Viewers can open
the source file by opening the Attachments panel and double-clicking the file title.
Create Bookmarks Uses headings or styles from the Microsoft Office document to create
bookmarks in the PDF document. User can specify which styles are converted to bookmarks on
the Bookmarks tab of the Acrobat PDFMaker dialog box.
Add Links Preserves any links present in the Microsoft Office file. The links in the converted
PDF file maintain a similar appearance to those found in the original file.

Enable Accessibility And Reflow With Tagged Adobe PDF Creates tags (objects that
reference document structure objects, such as images and text objects) in the PDF document
based on the structure of the source Microsoft Office file. This structure can be used to reflow a
document when viewed on different devices.
4. Click OK to apply the settings. Alternatively, you can click a different tab to modify additional
settings.
User can create custom conversion settings by clicking Advanced Settings. When user click this button, the
Acrobat PDFMaker dialog box opens the Adobe PDF Settings dialog box for the currently selected job option.
6.2.2 Create PDF Files Using an Applications Print Command
When Acrobat software is installed on system, Adobe PDF is automatically added as a system printer. You can
use Adobe PDF to print from the authoring application file to disk in PDF format in the same manner as you use
a printer to print a hard copy of a file.
User can create a PDF file using following steps:
1. Choose the applications Print command.
2. Choose Adobe PDF from the applications Printer menu. The actual Print dialog box varies, depending
on operating system (OS) and the software from which user is printing the file.
3. Click Properties to reveal the Adobe PDF Document Properties dialog box, which has three sections,
separated by tabs. Click the Layout tab, as shown next.

4. In the Orientation area, choose Portrait, Landscape, or Rotated Landscape.


5. Click the Pages Per Sheet drop-down arrow and choose an option from the drop-down menu. The
default option of 1 displays one document page on one PDF page. If user choose one of the other options,
multiple pages of the original document are displayed on a single PDF page. After selecting number of
pages per sheet, the Preview window updates to give an idea of how the finished document will look.
6. Click the Paper/Quality tab, shown on the top of the next page, and then click the Paper Source dropdown arrow and choose an option from the drop-down menu.
7. Click the corresponding icon to print the document in color or black and white.
8. Click Advanced to open the Adobe PDF Converter Advanced Options dialog box.
In the Paper/Output section the options are:
Paper Size Click the drop-down arrow and choose one of the presets from the drop-down menu.
Copy Count Click Copy Count and enter a value for the number of copies to print. When user
choose this option, the Collate option is available. This option is enabled by default and causes
Acrobat to collate the pages for each copy printed.

9. Click the plus sign (+) to the left of the Graphic title to set the following parameters:
Print Quality Click Print Quality, click the drop-down arrow, and then choose an option from the
drop-down menu. The default resolution, 1200 dpi (dots per inch), works well in most instances. If the
document to be converted to PDF contains images choose resolution that closely matches the intended
output device.
Image Color Management Click the plus sign to the left of the Image Color Management title to set
the parameters:
ICM Method Click ICM Method, click the drop-down arrow that appears, and then choose one
of the following options: ICM Disabled, to disable color management; ICM Handled By Host
System, to handle color management through the color management profile used by computer;
ICM Handled By Printer, to handle color management through the output device; or ICM
Handled By Printer Using Printer Calibration. Refer printer operation manual to choose the right
setting,
ICM Intent Click ICM Intent, click the drop-down arrow that appears, and then choose one of
the following options: Graphics, if the document predominantly contains images with large areas
of solid color; Pictures, if the document is largely made up of full-color photographs; Proof, to
create a black-and-white proof for a customer; or Match, to match the document colors.
Scaling Click Scaling and then enter a value to which you want the document scaled when distilled to
PDF format. This value is a percentage of the document size as created in the authoring application.
TrueType Font Click Substitute With Device Font (the default), or click the drop-down arrow that
appears, and choose Download As Softfont. This determines how Acrobat Distiller handles TrueType
fonts used in the original document.
10. Click the plus sign to the left of Document Options and then click the plus sign to the left of PostScript
Options to set the following parameters:
PostScript Output Option Click the PostScript Output Option, click the drop-down arrow that
appears, and then choose any one of the following :
Optimize For Speed Choose this option to speed the distilling process. This
option is not
useful in networking environment as print spooling is not supported in network.
Optimize For Portability Choose this option to have the distilled file conform to Adobe
Document Structuring Conventions (ADSC). When user choose this option, each PostScript page

is independent of the other pages in the document. Choose this option if user printing the file on a
network spooler. When user choose network spooler, printing happens in the background, which
frees up workstation for other tasks. When user choose this option, the network spooler prints the
PDF document one page at a time.
Encapsulated PostScript (EPS) Choose this option to create EPS files composed of single
pages in the authoring application user intend to use in documents of other applications.
Archive Format Choose this option to improve file portability. When user choose this option,
printer settings that may prevent the distilled PDF file from printing on other output devices are
suppressed.
TrueType Font Download Option Click TrueType Font Download Option, click the drop-down arrow
that appears are:
Automatic Choose this option to automatically embed any TrueType fonts from the source
document to the resulting PDF file.
Outline Choose this option to embed any TrueType font in the source file as outlines in the
resulting PDF file.
Bitmap Choose this option to convert TrueType fonts in the source file to bitmap images in the
resulting PDF document. The resulting PDF document cannot be searched.
Native TrueType Choose this option, and TrueType fonts will not be embedded with the
document. The resulting PDF file will download font information from the source computer from
which the document is viewed.
PostScript Language Level Click this option and then use the spinner buttons to select 1, 2, or 3.
Alternatively, you can enter the desired value.
Send PostScript Error Handler Click this option and then choose Yes or No from the drop-down
menu.
Mirrored Output Click this option and then, from the drop-down menu, choose No to print the PDF
document the same as the source file, or click Yes to print the PDF document as a mirror image of the
source document.
11. Click OK to close the Adobe PDF Converter Advanced Options dialog box.
12. Click the Adobe PDF Settings tab to set the parameters shown on the top of the next page.
13. Click the Default Settings drop-down arrow and then choose one of the presets from the drop-down menu.
14. Click the Adobe PDF Security drop-down arrow and choose one of the following options:
None No security is applied to distilled documents.
Reconfirm Security For Each Job You will be prompted for security settings each time you use the
Adobe PDF printer.

Use Last Known Security Settings On future printing jobs, Acrobat will use the last security
settings you specified.

15. After choosing one of the preceding options, the Edit button to the right of the field becomes available. Click
the Edit button to edit security settings.
16. Leave the Adobe PDF Output Folder field at its default setting, Prompt For Adobe PDF Filename, which
prompts for a document name and a folder in which to save the document, or choose My Documents\*PDF to
save the file in My Documents folder.
17. Click the Adobe PDF Page Size drop-down arrow and choose the desired size for the resulting PDF
document.
18. At the bottom of the Adobe PDF Settings tab, check one or more of the following options.
View Adobe PDF Results This default option opens the resulting PDF document in Acrobat. Deselect
this option to print the document without previewing the end result.
Add Document Information This default option adds information from the source document to the
PDF file as Document Information.
Rely On System Fonts Only; Do Not Use Document Fonts No fonts will be embedded in the PDF; if
the document contains an embedded font, it will be unavailable in the PDF. Instead, the MM (Multiple
Master) fonts will be used to reproduce the font if it is not available on the users system; otherwise, the
font will be missing from the PDF.
Delete Log Files For Successful Jobs Acrobat Distiller creates a log file whenever Adobe PDF is used
to create a PDF file. By default, the file is deleted when the distilling job is successful. If you deselect
this option, Acrobat creates a log file that can be viewed with a text editor.
Ask To Replace Existing PDF File Select this option if user want Acrobat to prompt before
overwriting a PDF file with the same filename as the one selected for the current printing job.
19. Click OK to apply the settings and then close the Adobe PDF Document Properties dialog box.
20. Click OK in the Application Print dialog box to print the document in PDF format.

6.2.3 Create PDF Files from Microsoft Office Software


When user install Acrobat, the
install utility searches your
machine for Microsoft Office
applications. When a supported
Microsoft Office application is
found, Acrobat installs Acrobat
PDFMaker as a helper utility. With
Acrobat PDFMaker, user can
create a PDF file that looks
identical to the Microsoft Office
file by clicking a Convert To
Adobe PDF icon, which is added
to your Microsoft Office 2003
application.

If you own a Windows Microsoft Office 2007 or 2010 application, Acrobat creates an
Acrobat ribbon with icons to convert files to PDF, attach files to e-mail messages, and
so on. There are several default conversion settings for Acrobat PDFMaker. User can
use Acrobat PDFMaker to create PDF files from within the following Microsoft
Office applications:
Word 2003, 2007, and 2010 Use Acrobat PDFMaker to convert documents you
create with Word to PDF files. The resulting PDF file retains font information and
embedded graphics, as well as header and footer attributes.
Excel 2003, 2007, and 2010 Use Acrobat PDFMaker to convert an Excel spreadsheet
to PDF format. The converted PDF file retains column formatting, as well as column
and row headers and embedded graphics
PowerPoint 2003, 2007, and 2010 Convert PowerPoint presentations to PDF files and
provide additional functionality to the presentation with many features of Acrobat
PDFMaker.
Outlook Convert Microsoft Outlook e-mail messages to PDF files. This is a wonderful
way of archiving selected e-mail messages or a folder of e-mail messages. File
attachments are also archived with the PDF document.
The Acrobat PDFMaker plug-in is, for all intents and purposes, identical in all supported Microsoft Office
applications, with the exception of the options available in each application when modifying conversion settings.

6.3 Create Bookmarks from the Document Structure


User can create bookmarks from the document structure only if enabled the Enable Accessibility And Reflow
With Tagged PDF option when choosing conversion settings in the authoring application from which user has
created the PDF. To create bookmarks from the document structure, follow the steps:
1. Open the document in bookmarks are to be created.
2. In the Navigation pane, click the Bookmarks icon to open the Bookmarks panel.
3. Click the Options dropdown arrow and choose New Bookmarks From Structure to open the Structure
Elements dialog box.
4. Click a structure element name to select it. To add additional structure elements, hold down shift and
click to add contiguous elements, or hold down Ctrl (Windows) and then click to add noncontiguous
elements. To select all structure elements, click the Select All button.

5. Click OK. Acrobat scans the document and creates a bookmark for each selected structure element
located. The bookmarks are untitled and nested in tree fashion. Click the plus sign (+) to the left of the
top element to expand the first bookmark.

Change Bookmark Settings


The settings you modify on the Bookmarks
tab determine which Word text styles Acrobat
PDFMaker converts to bookmarks. To change
bookmark settings for the document
conversion, do the following:
1. Open the Acrobat PDFMaker dialog
box.
2. Click the Bookmarks tab and
modify the settings.
Convert Word Headings To
Bookmarks (default option) Acrobat
PDFMaker converts all Word headings
in the document to PDF bookmarks.
By default, Heading 1 through
Heading 9 styles are converted to
bookmarks. To modify headings to be
converted to bookmarks, click a
heading name in the Bookmark
column to select or deselect it.
Convert Word Styles To Bookmarks By default, no Word styles are converted to
bookmarks. Choose this option, all Word styles used in the document are converted to
bookmarks when Acrobat PDFMaker converts the document.
Convert Word Bookmarks Converts any user-created Word bookmarks to PDF
bookmarks.
3. Click OK to apply the new settings, or click another tab to make additional modifications
to the document conversion settings.
Use the Bookmarks Options Menu
Use the Bookmarks Options menu to perform functions associated with bookmarks. User can use commands
from this menu to modify bookmarks, navigate to bookmarks, and maintain the Bookmarks panel. To do so,
follow these steps:

1. To open the Bookmarks Options menu, click Bookmarks in the Navigation pane to open the Bookmarks panel
and then click the Options icon.
2. After you open the Bookmarks Options menu, click the menu command you want Acrobat to perform. Some
of the commands in this menu were already presented; others will do the same job as their toolbar counterparts.
6.3.3 Change/Edit a Bookmark Destination
User can change the destination of a bookmark, change its zoom, or change both. By modifying the view of a
bookmark, user call attention to a specific part of the document. To modify a bookmark destination, follow these
steps:
1. In the Bookmarks panel, select the bookmark whose destination user want to modify.
2. In the Document pane, change to the location user want the bookmark to link to by using the Hand tool,
navigation tools, or menu commands. Alternatively, you can click a thumbnail in the Pages panel to navigate to a
page.
3. Change the zoom of the document by using the viewing tools or menu commands.
4. Choose Set Bookmark Destination from the Bookmarks Options menu. Alternatively, user can right-click and
choose Set Destination from the context menu. When user selects this option, a dialog box appears asking the
user whether user really want to change the bookmark location.
5. Click Yes to change the bookmark destination and close the dialog box.
6.3.4 Rename a Bookmark
To rename / change a bookmark follow the steps
1. Select the bookmark and then click inside the text box to select the bookmark text.
2. Enter a new name for the bookmark and then press enter or return.
Delete a Bookmark
User can delete any bookmark. When user delete a bookmark, only a link has been removed without any change
in the content of the document. There is no warning before the bookmark is deleted.
1. Select the bookmark. To add contiguous bookmarks to the selection, press shift and click the
bookmark(s) user want to add to the selection. To add noncontiguous bookmarks to the selection, press
ctrl (Windows) and then click the bookmark(s) user want to add to the selection.
2. Choose Edit | Delete, press delete, or click the Delete Selected Bookmarks icon (looks like a trash
can). Alternatively, user can choose Delete Selected Bookmarks from the Options menu.
T

Arrange Bookmarks
When user create a PDF document, bookmarks are created in descending order from the first page of the
document to the last. Acrobat nests bookmarks when user convert a document with multiple heading levels or if
user use the New Bookmarks From Structure command. User can create own bookmark nests to organize a
cluttered Bookmarks panel.
1. Select the bookmark(s) user want to nest. User can select contiguous (shift + click) or noncontiguous
(ctrl + click) for Windows bookmarks.
2. Click and drag the bookmarks toward the bookmark under which user want to nest them. As user drag
the bookmarks toward another bookmark, a right-pointing arrowhead with a dashed line appears.
3. Drag right so that the right-pointing arrow appears underneath the bookmark with which user want to
nest the selected bookmark.
4. Release the mouse button when user reach the desired bookmark location. As soon as the mouse
button is released, Acrobat nests the bookmark(s) in the new location. If the bookmark to which user is
nesting is collapsed, Acrobat expands it. Collapse the bookmark by clicking the minus sign () to its left
(Windows).
User can remove a bookmark from a nested position by doing the following:
1. Expand the bookmark that contains the bookmark user want to remove from a nested position.

2. Select the bookmark user want to move.


3. Drag the bookmark under the minus sign up and to the left of the parent bookmark. Nested bookmarks
are noted by a left-pointing triangle.
When user select and drag a branch that has children, the children of the parent are moved as well,
maintaining the structure of the branch.
4. Release the mouse button. Acrobat moves the bookmark out of a nested position.
6.3.1 Adobe Tools:
Use Acrobat Toolbars
Many of the tools in Acrobat are conveniently grouped and laid out as a task button and tool groups on a toolbar.
User
can
access
the
rest
of
the
Acrobat
tools
by
choosing View | Show/Hide Toolbar Items and then selecting the desired tool from the submenu. In the default
display of toolbars, user can find a Create task button that is used to create PDF documents. Other toolbars
includes related tools to edit, view, and navigate documents, and to perform many other operations. In addition,
the Quick Tools toolbar has what the Acrobat designers deem as tools that are frequently used by most Acrobat
users. User can customize the Quick Tools toolbar to add to favorite tools, or remove tools which user dont use
frequently. Many of the toolbars have drop-down menus containing other options.
The Create Task Button
The Create task button, accesses commands used to create a PDF document. After clicking this button, a dropdown menu appears with all the commands to create PDF documents from files stored on computer, from web
pages, from documents to scan into the Document pane, and from images copied to the system clipboard.
These commands are as follows:
PDF From File Click the PDF From File button to navigate to a file on computer and convert it to a
PDF document.
PDF From Scanner Click the PDF From Scanner button to create a PDF document from a scanner or a
digital camera attached to your computer.
Create PDF From Web Page Click the PDF From Web Page button, and a dialog box appears in
which user enters URL of the web page to be converted to a PDF document. After converting the web
page, user can modify it by clicking Tools, clicking Document Processing, choosing Web Capture, and
then choosing the desired command from the submenu.
PDF From Clipboard Click the PDF From Clipboard button to create a PDF document after using the
Snapshot tool to select an area from an open PDF document and copy it as an image to the clipboard.
Combine Files Into A Single PDF Click this button to open the Combine Files dialog box, which
enables user to create a PDF from supported files or existing PDF documents. User can also specify
which pages of each document are combined into the resulting PDF.
PDF Form Click this button to open the Create Or Edit Form dialog box, enabling to use the current
document as the basis for a PDF form, browse for a file to make into a PDF form, or scan a paper form.
PDF Portfolio Click this button to open the Create PDF Portfolio dialog box, which enables user to
create a sophisticated portfolio of documents in PDF format.

The File Toolbar


The File toolbar, shown here, consists of four tools - open, print, save, and e-mail PDF documents.
Open Click this button to navigate to and open an existing PDF file stored on computer or network.

Save This tool is used to save the current PDF document. This command is dimmed out (unavailable) if
user open an existing PDF document. When user open an existing document and apply changes, the Save
button becomes available.
Print This tool is used to print a document with a system printer.
Email Click this button to send a PDF document as an e-mail attachment using default e-mail
application.
The Page Navigation Toolbar
The Page Navigation toolbar is composed of the tools to navigate from one page to the next. The toolbar has
forward and back buttons, which you use to go to the next or previous page, respectively. User can also navigate
to a page by entering its number in the text box.
The Select & Zoom Toolbar
The tools in this toolbar (shown here) are used to select objects, manually navigate to different parts of a
document, and activate links in the document.
Select This tool enables user to select text, tables, or images in a PDF document. User can then copy
selected objects to the clipboard for use in other applications.
Hand This rightly named tool is used to manually navigate through the pages of a PDF document. First,
click the tool to select it; then, when user click inside the Document pane to navigate with this tool,
cursor becomes a closed fist. To navigate from the top to the bottom of a page, and vice versa, select the
Hand tool, move the tool over the document, and then click and drag. Release the left mouse button to
stop scrolling the page. The Hand tool is also used to find and activate links within the document. When
user pass the cursor over a document link or a bookmark in the Bookmark tab, the cursor becomes a
pointing finger. Click the link or bookmark to navigate to the specified destination within the document.
Zoom Out Click this tool to zoom out to the next lowest level of magnification.
Zoom In Click this tool to zoom in to the next highest level of magnification.
Magnification Window Acrobat displays the current percentage level of magnification in this window.
User can click the triangle to the right of the window and select a magnification percentage from the
drop-down menu, or user can enter the desired level of magnification directly into the window and then
press enter or return to apply. User can also specify a magnification level by choosing View | Zoom |
Zoom To and then entering a value between 1 percent and 6400 percent in the Zoom To dialog box (the
available range of magnification in Acrobat). Note that the lowest magnification level available from the
Magnification drop-down list is 10 percent, but you can enter a value of 1 if desired.
The Page Display Toolbar
The Page Display toolbar has two buttons by default. User use these buttons to control your view of the page.
Continuous This page display option adjusts the width of the page to fit within the width of the
Document pane. User can use the Hand tool to navigate within the page and scroll to different pages.
Single Page This option displays a single page. User can use the Hand tool to pan within the page and
use the navigation tools to navigate to different pages.
6.3.2 Use the Panes:
Acrobat has lots of tools and menu commands. Previous versions of Acrobat displayed most
of the tools on the menu command bar. In Acrobat X Pro, user can perform tasks by
choosing menu commands that are conveniently located in panes on the right side of the
interface to work : Tools, Comment, and Share.
Use the Tools Pane
In the Tools pane, you find commands to edit pages, edit content, create forms, use the
Action Wizard, recognize text from scanned documents, and protect the document. To access
the Tools pane, click the Tools icon. The illustration at left shows the default sections in the

Tools pane. Click a section title to reveal a group of related commands. The Tools pane is
divided into the following sections.
Pages
The Pages section, shown,
has commands that enable
user to edit pages, insert
pages, and edit page
design. The commands to
rotate pages, delete pages,
extract
pages,
replace
pages, crop pages, insert a
header or footer, insert a
background,
insert
a
watermark, and implement
Bates Numbering are also
available.

Content
The Content section, shown, has commands
that enable user to add bookmarks, attach
files, edit text and objects, add or edit
interactive content, add links, add buttons,
and select objects.

Forms
The Forms section, shown, has commands
that you use to create forms. After creating a
form, you can add and edit form fields as
well as distribute and track forms.

Action Wizard
The Action Wizard section, shown, has
commands to create and edit actions. User
can find the default actions in this section of
the Tools pane.

Recognize Text
The Recognize Text section, shown, is used
after you create a PDF by scanning a
document. User can recognize text in a single
document or multiple documents. User can
also scan for suspects.

Protection
The Protection section contains commands
that you use to protect documents. You can
encrypt pages, remove sensitive information
from documents, remove hidden information,
and sanitize documents.

Sign & Certify


In the Sign & Certify section, you can add
digital signatures to a document and certify a
document.

6.3.3 Use the Comments Pane


Acrobat has some powerful commands you use to review documents and collaborate with other members of
your team. This pane has commands to add annotations to a document, mark up a document, and much more.
The Comments pane contains the following sections.
Annotations
In the Annotations section, user can add
sticky notes, add attachments, add sound
annotations, add your stamp of approval to a
document, highlight text, and much more.

Drawing Markups
In the Drawing Markups section, user can
annotate a document with shapes, text, lines,
pencil marks, and much more. There is also
an eraser that you use to edit pencil marks.
Review
In the Review section, user can send a
document for a shared review, send a
document for e-mail review, collaborate live,
and track reviews.

Comments List
In the Comments List section (not shown),
you find a list of all comments in a
document. You can also search comments.

6.3.4 Create a User Profile


User can create a profile to for identification and a password that links to digital signature. To create user profile
follow the steps:
1. Click Tools, click Protection, and then choose More Protection | Security Settings to open the Security
Settings dialog box.
2. Click Digital IDs to display the options for Digital IDs.
3. Click the Add ID button to open the Add Digital ID Wizard. On the first page (shown next), choose
My Existing Digital ID From and then select one of these options: A File, A Roaming Digital ID Stored
On A Server, or A Device Connected To This Computer. Alternatively, to create a new digital ID, choose
A New Digital ID I Want To Create Now.

4. Click Next. The steps for New Digital ID.


If you already have an existing digital ID, such as a Windows certificate, on your
computer, click the A File radio button and then click Next. The next wizard page
prompts you to locate the ID file and enter your password. After following these steps,
you can use the digital ID from within Acrobat to certify documents and apply security
settings. The second Add Digital ID Wizard page, shown on the next page, enabling the
following options
New PKCS#12 Digital ID File Creates a digital ID file using the PKCS#12 standard.
Digital IDs created with this standard have a .pfx or .p12 file extension, and can be used
with most applications that require secure digital IDs, including certain browsers.
Windows Certificate Store Creates a digital ID file that can be used with most
applications supported by Windows.

5. Click Next to open the next page of the Add Digital ID Wizard, shown here.
6. Enter name in the Name field. If desired, supply additional contact information in the Organizational
Unit and Organizational Name fields.
7. Enter e-mail address in the Email Address field.
8. Click the Country/Region drop-down arrow and choose an option from the
dropdown menu.
9. Click the Enable Unicode Support check box if you want to include Unicode information with the
certificate. The Unicode standard provides a unique number for every character. Each number is crossplatform. The Unicode standard for most English documents is UTF-8. If you choose this option,
Unicode fields appear to the right of your contact information. Enter the appropriate Unicode information
in the desired fields.
10. Click the Key Algorithm drop-down arrow and choose 1024-bit RSA or 2048-bit RSA. The latter
choice offers better security, but it may not be available to all users.
11. Click the Use Digital ID For drop-down arrow and choose an option from the drop-down menu. The
default option, Digital Signatures and Data Encryption, enabling to use the digital ID for signing
documents and encrypting. Alternatively, you can choose Digital Signatures Or Data Encryption to limit
your use of the digital ID.
12. Click Next to open the password page of the Add Digital ID Wizard.
13. Accept the default location and filename for digital ID, or enter a different path and filename.
14. Enter and confirm your password. Password must be at least six characters and cannot contain any of
the following symbols:
! @ # $ % ^ & * , | \ < > _ or "
When user enter characters for password, the rating changes from Weak to Medium, to Strong, to Best.
Create a password with a rating of Strong or Best. These are the types of passwords that are hard to hack.
15. Click Finish to complete the process and exit the wizard. Your new digital signature appears in the
Digital IDs section of the Security Settings dialog box.
16. Close the Security Settings dialog box.

6.3.5 Digital Signature


A digital signature, like a conventional handwritten signature, identifies the person signing a document. Unlike a
handwritten signature, however, a digital signature is difficult to forge because it contains encrypted information
that is unique to the signer and easily verified. To sign a document, user must obtain a digital ID from a thirdparty provider or create a self-signed digital ID. The digital ID contains a private key that is used to add the
digital signature and a certificate that you share with those who need to validate your signature.
6.3.6 Signing Certified Documents
User should sign the document that user has just certified, to verify that filling in a signature field doesn't
invalidate the certification.
1. With the Hand tool selected, click in the Approved Signature box at the bottom of the document. Click
Continue to clear the message box. Then click the Sign Document button on the document message bar.
2. In the dialog box, if user have more than one digital IDs defined, select your digital ID.
3. Enter your password.
4. Leave the other values, click Sign, and save the file in the folder using the same filename.
5. Click the Signatures button in the navigation pane, and expand the certification entry marked with the
blue ribbon icon. Notice that the certification is still valid even though a signature has been added.
6. Choose File > Close.
6.4 Document Security Options
User can secure a PDF using any of the following security methods:
Add passwords and set security options to restrict opening, editing, and printing PDFs.
Encrypt a document so that only a specified set of users has access to it.
Save the PDF as a certified document. Certifying a PDF adds a (visible or invisible) certifying signature
that lets the document author restrict changes to the document.
Apply server-based security policies to PDFs (for example, using Adobe LiveCycle Rights
Management). Server-based security policies are especially useful user want others to have access to
PDFs for a limited time.
Securing PDFs in FIPS Mode (Windows)
Acrobat and Reader (version 8.1 and later) provide a FIPS mode to restrict data protection to Federal
Information Processing Standard (FIPS) 140-2 approved algorithms using theRSA BSAFE Crypto-C 2.1
encryption module. The following options are not available in FIPS mode:
Applying password-based security policies to documents. User can use public key certificates or
Adobe LiveCycle Rights Management to secure the document, but user cannot use password encryption
to secure the document.

Creating self-signed certificates. In FIPS mode, user cannot create self-signed certificates. In FIPS
mode, user can open and view documents that are protected with nonFIPS-compliant algorithms, but
user cannot save any changes to the document using password security. To apply security policies to the
document, use either public key certificates or LiveCycle Rights Management.

6.4.1 Adding Security (permission for Editing) to PDF Files


User can add security to Adobe PDF files when user first create them or after the fact. User can even add
security to files that you receive from someone else, unless the creator of the document has restricted, who can
change security settings.
Adding Passwords
User can add two kinds of passwords to protect Adobe PDF documents. User can add a Document Open
password so that only users who have the password can open the document, and also user can add Permissions
password so that only users who have the password can change the permissions for the document.
User will add protection to your logo file so that no one can change the contents of the logo file and so that
unauthorized users can't open and use the file.
2. Choose File > Open, and open the SBR_Logo.pdf file.
3. Choose File > Save As, name the file SBR_Logo1.pdf, and save it in the specified folder.
4. Click the Secure task button (with the padlock icon), and choose Show Security Properties. User first
chooses the type of security to add.
4. From the Security Method menu, choose Password Security. The Password Security Settings dialog box
opens automatically.
5. Select compatibility level from the Compatibility menu. (For Acrobat 7.0 or later).
6. Select the "Require a password to open the document" option, and then type
password. Type SBRLogo. User can share this password with anyone that user want to be able to open the
document. Remember that passwords are case-sensitive.
Now user will add a second password that controls who is allowed to change printing, editing, and security
settings for the file.
7.Under Permissions, select "Restrict editing and printing of the document," and type a second password. Type
SBRPres. (Note that your Open password and Permissions password can't be the same.
8. From the Printing Allowed menu, choose whether to allow printing at all, printing at low resolution, or
printing at high resolution. We chose Low Resolution (150 dpi).
Always record passwords in a secure location. There is no way by which you can recover your password.
9. From the Changes Allowed menu, specify the type of changes which user is allowed. Choose "Commenting,
filling in form fields, and signing existing signature fields" to allow users to comment on the logo.
10. Click OK to apply changes.
11. In the first dialog box, reenter the Open password. Type SBRLogo, then click OK, and click OK again to
clear the alert box.
12. In the second dialog box, reenter the Permissions password. Type SBRPres, then click OK, and click OK
again to clear the alert box.
13. Click OK to exit the Document Properties dialog box.
14. Click File > Save to save work and apply the security changes.
15. Choose File > Close to close the SBR_Logo1.pdf file.
6.4.2 Opening Password-Protected Files
1. Choose File > Open and reopen the SBR_Logo1.pdf file in the specified folder.
User prompted to enter the required password to open the file.
2. Type SBRLogo and click OK.
Notice that "(SECURED)" has been appended to the filename at the top of display.
3. Click the Secure task button, and choose Show Security Properties from the menu.

4. In the Document Properties dialog box, try changing the Security Method from Password Security to No
Security. Acrobat prompts you to enter the Permissions password.
5. Type SBRPres and clicked OK and then OK again. All restrictions are now removed from the file.
6. Click OK to close the Document Properties dialog box.
7. Choose File > Close, and close the file without saving the changes.

6.5 Creating a Form


Adobe Acrobat can create a form from any type of PDF file. It is of the interactive type. Its just a matter of
converting your document from within Acrobat and creating fields with the tools provided. You can enter
information in predefined formats.
1. Open .PDF file in Acrobat.
2. Open the TOOLS tray on the right side of
the document and click the FORMS header
to toggle it open. Click CREATE to
convert the current document to a form.

3. Clicking CREATE will cause a series of two


dialogue boxes to appear. Choose Use
Current Document for both.

4. After conversion, the tray on the right side


will have changed as well.You will see a list
of TASKS followed by a list of FIELDS. (Fig.
22)

5. Under the TASKS menu, choose Add New


Field to show a list of the types of fields
Which user can add.

6. Select Text Field from the menu. A target


Field will open that will allow user to click
and drag a box in the position required in
the document. When the mouse is released,
a dialogue box remains open asking user to
label the newly-created field. Use
something appropriate so you can easily
navigate back to it.

7. To set the rest of your options, such as how


the text will appear in the field, whether or
not to put an outline around the box, the
fill color (if any), etc, simply double-click the
field. A dialogue box will appear.
Indicate your custom settings here.
8. To preview what your form will look like to
an end user, just click the PREVIEW button.

9. This is a preview of the newly-created form,


showing how it will look to the end user.
Note that the blue tint in the field is merely
a document indicator and WILL NOT
PRINT.
10. Notice that the button that said PREVIEW
in the last step now says EDIT. To continue
adding fields or adjusting the appearance of
existing fields, click this button.
Fig. 26

11. When finished, save it, the form is ready.

Exercise
Q1: Fill in the blanks:
1. PDF stands for _______.
2. PDF format is designed by _______.
3. When PDF files are produces, by default it gets _______.
4. PDF document is _______ of the application software, hardware and operating system used
to create it.
5. PDF files retain all the formatting, fonts and graphics of the _______ document.
6. _______ software is used To open PDF file.
7. _______ tools allow to select text or text formatted in a table or column.
8. PDF is smaller than the same document in _______ format.
9. A _______ security is used for PDF document.
10. The commands in the _______ group are used to edit the current PDF document.
Q2: True or False:
1. PDF files have a .PDF extension.
_______
2. PDF files cannot be edited.
_______
3. Images in PDF files can only be black and white.
_______
4. Images are embedded as an object called a Form XObject within a PDF. _______
5. PDF document is platform dependent.
_______
6. PDF is widely used format for document distribution.
_______
7. When PDF files are produced, it remains in uncompressed state.
_______
8. PDF files must be read sequentially.
_______
9. PDF format is designed for distribution over the network.
_______
10. PDF software is free software.
_______
11. To navigate the document, links can be used.
_______
12. Generally PDF document is displayed at 100% zoom level.
_______
13. PDF files can be printed easily.
_______
14. Size of PDF document is same in postscript format.
_______
Q3: MCQ( Single Correct Answers):
1) ______ is a popular and widely used format for document distribution.
a) BMP
b) TIG
c) PDF d) All
2) ______ government is the first user of PDF document.
a) India
b) France
c) British
d) U.S.
3) Size of PDF file is _____ as compared to the same document in postscript format.
a) Same
b) Smaller
c) Larger
d) Reduced
4) PDF document consists of ______ table which is same as index that list the exact
position of each object in the file.
a) Cross-Reference
b) Multiple
c) Index
d) Log
5) To navigate the document ______ are used.
a) Page Break
b) View
c) Line
d) Next page
6) When PDF file is created, look of the original document will be ______.
a) Retained
b) Lost
c) Changed
d) Modified
7) To adjust the view of the document displayed on the screen use ______ tools.

a) Zoom
b) Arrow
c) First
d) Line
8) To convert postscript file to PDF.
a) Acrobat Writer
b) Acrobat Distiller
c) Ms-Word
d) Ms-Access
9) Contents in PDF documents can be saved in _____ format.
a) Text
b) .doc
c) Rich Text
d) none
10) ______ is used to provide copy and print protection in PDF.
a) Password
b) User name
c) Used - id
d) Firewall
Q4: MCQ (Triple Answers):
1) Important characteristics of PDF are:
a) It is platform independent
b) It is popular format used for document distribution
c) It modifies the look of original document
d) It is a universal file format.
e) It is platform dependent
f) Object oriented language.
2) PDF Document:
a) By default gets compressed
b) Requires to read sequentially
c) Consist of cross reference table
d) Compact and smaller than original document
e) Size of file is larger
f) by default gets uncompressed
3) PDF files can be created using:
a) Adobe Writer
c) Excel document
e) Word Document

b) Access document
d) Adobe Distiller
e) Adobe Reader

4) Advantages of PDF are:


a) Object oriented documents
c) Platform Dependent
e) Object oriented Language

b) Easy access
d) Easy to add bookmark
e) Software Dependent

5) In PDF, documents security is provided by:


a) Using Password
b) Using Encryption
d) Cross table
e) Using Decryption

c) Digital signature
f) None

S-ar putea să vă placă și