The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.
Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by downloadsection1, 2021-04-28 04:09:28

Information Tech

Information Tech

The Coordination Committee formed by GR No. Abhyas - 2116/(Pra.Kra.43/16) SD - 4 Dated 25.4.2016
has given approval to prescribe this textbook in its meeting held on 20.6.2019 and it has been decided to

implement it from academic year 2019-20.

INFORMATION
TECHNOLOGY

STANDARD ELEVEN

(Arts, Commerce and Science)

Maharashtra State Bureau of Textbook Production and Curriculum Research, Pune.

Download DIKSHA App on your smartphone. If
you scan the Q.R. Code on this page of your
textbook, you will be able to access full text. If you
scan the Q.R. Code provided, you will be able to
access audio-visual study material relevant to each
lesson, provided as teaching and learning aids.

First Edition: 2019 © Maharashtra State Bureau of Textbook Production and

Reprint: 2020 Curriculum Research, Pune- 411004.
The Maharashtra State Bureau of Textbook Production and

Curriculum Research reserves all rights relating to the book.

No part of this book should be reproduced without the written

permission of the Director, Maharashtra State Bureau of Textbook

Production and Curriculum Research, ‘Balbharati’, Pune.

Information Technology Subject Cover & Illusatrations
Committee and Study group Smt. Pradnya Kale

Shri. Sanjay Kulkarni, Chairman Typesetting
Smt. Julie Kanade Textbook Bureau, Pune
Smt. Neha N. Katti
Shri. Prashant M. Patil Production
Smt. Vijaya A. Parekar Shri. Sachchidanand Aphale
Smt. Archana K. Mulay
Smt. Dipali G. Dhumal Chief. Production Officer
Smt. Jyoti J. Barge
Smt. Aasha C. Mohite Shri. Sachin Mehta
Smt. Sushama S. Patil
Smt. Sangita A. Jaju Production Officer
Shri. Tayyabali M. Sayyed
Shri. Nilesh S. Ghavate Shri. Nitin Wani
Shri. Milind Oka
Shri. Prashant D. Hakim Asst. Production Officer
Shri. Satyawan B. Guram
Shri. Nitin R. Choubey Paper
Dr. Ajaykumar Lolage 70 GSM Creamwove
(Member Secretary)
Print Order

N/PB/2020-21/75,000

Printer

M/S. MAYUR INDUSTRIES,
KOLHAPUR

Chief Co-ordinator Publisher
Smt. Prachi Ravindra Sathe Vivek Gosavi,

Co-ordination Controller
Dr. Ajaykumar Lolage
Maharashtra State Textbook
Special Officer, Work Experience, Bureau, Prabhadevi,
Incharge Special Officer, Mumbai-400025

Health and Physical Education,
Textbook Bureau, Pune



NATIONAL ANTHEM

Foreword

Dear Students,

First of all Congratulations for completing your school education and welcome
into the world of 10+2, which is often called as Junior College or Higher Secondary
Education. Now you have stepped into the new horizon of education which is
waiting for you. In these golden years of education, you are being exposed to
many new technologies and skills. The skills, which you will acquire in these two
years, are definitely going to help you throughout your life.

You all are blessed as you are born in this new era of technology and digital world
where the word “Impossible” made it “I-m-possible” where I stand for Internet.
Use of Information and communication Technology made your life pleasant and
comfortable.

It is often seen that to handle the technology is quite easy but nobody is bothered
to identify the know-how and pros and cons of the same.

In this book you will venture into the new technologies of Information
Technology. The book is a combination of theoretical as well as practical skills.
The Skill Oriented Practical (SOP) will give you a peek into the world of digital
technology. You will certainly master a specific skill set which will help you further
to enhance your higher education or job opportunities.

In this book new techniques of learning by doing are incorporated such as
‘quizzes’, ‘do it yourself’, ‘activity sheets’ which will promote thought provoking
skills within you. The different activity sections in the textbook will definitely
improve your logical, analytical and creative skills. You will learn about the
emerging technologies of the digital world, which is the need of the era.

This book will surely create interest in the field of Information Technology due
to its colourful presentation and enriching content. You will definitely appreciate
and learn the contents with interest and enthusiasm through Q.R. Code.

Please do inform us what part of this book you found useful or difficult to
understand.

We wish you the best in your future academic life.

Pune (Dr. Sunil Magar)
Date : 20 June 2019 Director

Maharashtra State Bureau of Texbook

Indian Solar Year : 30 Jyeshtha 1941 Pro duct ion and Curriculum Research, Pune

For Teachers

Dear Teacher,

In this world of globalisation, Information Technology is a mature part of
curriculum and has become a daily bread of Life. Technology changes with time,
but concepts of handling data and converting data into information are constant and
it is reflected in the terminology of Information Technology.

We present this book which is a combination of Computer basics, concepts, ideas
and skill oriented practicals (SOP) in view of Digital India.

This duplet is entrusted upon you to bring about advanced computer literacy in our
students. This combination of Theory and skill Oriented Practical’s (SOP) will make
a remarkable computer based revolution in the knowledge of students. This book
will achieve our objective of career developing and enhancing the skills as well as
immediate employment in future.This book is designed with eye catching images in
order to appeal the students to learn with interest and enthusiasm. The book has
different activities to develop the students skills, and give him opportunity to explore
different computer related aspects based on different topics. ‘Case studies’ , ‘Quizzez’,
‘Do it yourself’, ‘Test your skills’ these small sections will definitely add a third
dimensional thinking skills within the students. The book has been designed in such a
way that the contents will be useful to the students from any stream in junior college
whether Arts, Commerce or Science.

Dear Teachers, the Skill Oriented Practical (SOP) has six topics. You can select any
four skills or practicals for your students based on his subject of choice and liking.
It is recommended that teachers should conduct one practical based on stream
(Science - Client Side Scripting (JavaScript), Commerce - Accounting Packages
and Arts - Digital Content Creation).

This book will definitely create job opportunities like Jr. web designers, Jr. Account
Assistant, Jr. Multimedia Designers/editors etc. at this 10+2 level. It will boosts his
further career prospects be it in engineering CS, BCS BCA, B.Pharm CA, ICWA and
even creative field like advertisements. The books gives hands on experience to the
students and will definitely create confidence to handle the digital equipments. The
Students will imbibe digital competency with your guidance and efforts. The ‘Cyber
law’ topic will make our youngsters ethical users of digital media and create social
awareness. The contents will help learners to develop ideas, find things out, make
things happen, exchange and share information. We are confident that enthusiastic
teachers and creative teachers like you will welcome the book.

This book has potential to create awareness about open source softwares. The
book has adopted FOSS policy as per the Government of India regulation. This will
definitely take our students towards Digital India Program.

Information Technology
Subject Committee and Study Group

Textbook Bureau, Pune

Competency Statements For Information Technology
Standard - XI

Competency

Theory
1. Key Concepts to create basic understanding about IT Enabled Technologies.
2. To acquire technical know-how about different types of software.
3. To acquire knowledge about 'Open source software'
4. To get knowledge about LINUX Commands.
5. To make the students aware about database concepts.
6. To introduce students to different terminologies used in database management

systems.
7. To develop logical, problem solving, analytical and cognitive skills.
8. To acquire knowledge about webpage development.
9. To get technical knowledge to create dynamic web pages.
10. To make student socially aware while using internet / computer.
11. To create awareness about ethical ways of dealing with cyber world.
12. To develop problem solving skills using case studies, programs, activities etc.

Skill Oriented Practicals (SOP)
1. To develop ability to use workplace productivity tool.
2. To develop ability to create presentations, handle documentation, easy way of

calculation or computation.
3. To acquire web development skills.
4. To collect user data with the help of 'Form' feature.
5. To create dynamic web pages with the help of scripting language.
6. To develop logical skill by using different structures.
7. To acquire knowledge about Built-in-Functions in scripting language.
8. To introduce skill sets regarding use of computerized accounting.
9. To maintain & display ledger accounts using accounting software.
10. To create & edit image by using different tools.
11. To develop raster and vector images using image manipulation tools.
12. To enhance the creative ability by developing digital contents.
13. To acquire basic knowledge to use database commands.
14. To create & maintain tables in a database.
15. To acquire knowledge to Insert, update & delete data in tables.
16. Use of computing skills for career opportunities.

INDEX

Information Technology

Standard - XI

(Arts, Commerce and Science)

No. Title of the Chapter Page No

Theory 1
1. Basics of Information Technology 20
2. Introduction to DBMS 30
3. Impressive Web Designing 60
4. Cyber Law
72
Skill Oriented Practicals (SOP) 84
85
(Select Any Four Skill Oriented Practicals from the following list) 86
96
1. Daily Computing (Libre Office) 113
2. Web Designing (HTML - 5)
3. Client Side Scripting (JavaScript)
4. Accounting Package (GNUKhata)
5. Digital Content Creation (GIMP, Inkscape)
6. DBMS (PostgreSQL)

Appendix : Steps for Installing

Linux OS 119

Libre Office 127

PostgreSQL 129

GNUKhata 131

Abbreviations 133

It is recommended that teachers should conduct one practical based on stream
(Science - Client Side Scripting (JavaScript), Commerce - Accounting Packages
and Arts - Digital Content Creation).





1 1Basics of Information Technology

Let us Learn is the foundation of economy and a
driving force of social changes in the 21st
 Definition of IT and ICT century. Distance is no longer an issue
when it comes to accessing information;
 To understand concepts like data for example, work-from-home, distance
and information. learning, e-banking, and e-governance
are now possible from any place with
 Various concepts used under IT an internet connection and a computing
device. Lets first perceive two important
 Different types of Operating concepts - Data and Information :
Systems with its features and uses
1.2 Data and Information
 Architecture of Computer System
It is being said that the terms "data"
 Units of Memory and "information" are interchangeable
and mean the same thing. However, they
 Concepts related to Internet and are not same and there is a difference
Network with its types between the two words. Data can be any
character, text, word, number or raw facts.
 Recent trends, IT Enabled Services However, Information is data formatted
and careers in IT in a manner that allows it to be utilized by
human beings in some significant way. In
1.1 An introduction to IT
(Information Technology) Example of Data :
Umbar, 1234, Xyz, MG Road,
Information Technology has great Calcutta, 9111111111, 84084
influence on all aspects of life. Almost Example of Information :
all work places and living environments Xyz, 1234, MG Road, Umbar 84084,
are being computerized and the use Calcutta, 9111111111
of Information Technology is being
enhanced. the above example, the data appears to
be a set of random words and numbers.
Definition of Information Technology : However, when that data is interpreted,
organized and formatted, one can tell
“IT (Information Technology) that it is contact information of a person
encompasses all of the technologies that named as XYZ.
we use in order to create, collect, process,
protect and store information. It refers to
hardware, software (computer programs),
and computer networks”.

ICT (Information and Communication
Technology) concept involves transfer
and use of all kinds of information. ICT

1

Need of information : Information is Computer System :

required to take short term and long term A computer can process data, images,
decisions and also to make strategic audio, video and graphics. A computer
decisions in an organization. Since we performs five major computer operations
live in the “Information age”, Information or functions irrespective of their size and
Technology has become a part of our make. These are -
everyday life.
1) It accepts data or instructions by way
1.3 Various concepts used under IT of input.

Before getting started let us learn 2) It stores data.
some of the important concepts used
under Information Technology : 3) It can process data as required by the
user.
1.3.1 Computer : The word Computer is
derived from a Latin word “computare” 4) It gives results in the form of output.
which means to “to calculate”, “to count”,
“to sum up” or “to think together”. An 5) It controls all operations inside a
electronic device which accepts input computer.
from the user, processes it according to
the instructions given to it and gives the 1.3.2 Architecture of Computer :
required result in the form of output, is a Computer Architecture is a specification
computer. detailing of how a set of software and
hardware technology standards interact
to form a computer system. In short, com-
puter architecture refers to how a comput-
er system is designed and how it works.

MONITOR CD/DVD/DRIVE SYSTEM UNIT PRINTER

An output device Reads CD/DVD The case that contains the CPU, Produces printed copies
that lets you see discs. memory, the power supply, disck of computer output.
your work as you go. drives, and all other hardware-such as
a modem that are in an interal format.

SPEAKERS

Used to produce
audio output

MICROPHONE HARD DRIVE

Used to get Located inside the system
spoken input. unit and used to store
programe and data.

USB FLASH MEMORY
PORT
CARD READER
KEYBOARD CD/DVD DISCS MOUSE WEB CAMERA Used to read flash
memory card.
A pointing device use to captures either still
The principal input device; Commonly used to deliver used to make on- picture or motion video
used to type instructions programs ans store large screen selections.
into the computer. multimedia files.

Fig : 1 Computer System and Peripherals
2

Every computer system has the following Another example of input devices

three basic components : is touch-screens. Users can simply

1. Input Unit touch these screens without using any
2. Central Processing Unit other device to enter commands. From
3. Output Unit smartphones to ATM machines, these
input devices are becoming very popular
1. Input Unit : This unit helps users to now a days.
enter data and commands into a computer
system. Data can be in the form of 2. Central Processing Unit (CPU) :
numbers, words, actions, commands, etc. After receiving data and commands from
The main function of input devices is to users, a computer system has to process
direct commands and data into computer. it according to the instructions provided.
Computer then uses its CPU to process Here, it has to rely on a component called
data and produce output. the Central Processing Unit. The CPU
further uses these three elements :
For example, a keyboard is an
input device that enters numbers and a) Arithmetic and Logic Unit :
characters. Similarly, even a mouse can This part of the CPU performs
be an input device for entering directions arithmetic operations. It does basic
and commands. Other examples include mathematical calculations like
barcode reader, Magnetic Ink Character addition, subtraction, division,
Recognition (MICR), Optical Character multiplication, etc. Further, it can

Recognition (OCR), etc. Memory

Data Input Secondary Output Information
Unit Memory Unit

Primary
Memory

Control Data Flow
Unit Control Flow
(CU)
3
Arithmatic And
Logical Unit
(ALU)

Central Processing Unit (CPU)

Fig : 2 Block Diagram of a Computer

even perform logical functions Primary Memory holds the data and
like the comparison of data. instruction on which computer is
currently working.
Fig : 3 CPU Internal View
b) Control Unit : This unit is the back Types of Primary Memory– Primary
memory is generally of two types.
bone of computers. It is responsible
for coordinating tasks between all 1. RAM 2. ROM
components of a computer system.
The control unit collects data 1. RAM (Random Access
from input units and sends it to Memory): It stands for Random
processing units depending on its Access Memory. RAM is known as
nature. Finally, it further transmits read /write memory. It is generally
processed data to output units to referred to as main memory of the
facilitate users. computer system. It is a temporary
c) Memory Unit : Once a user memory. The information stored in
enters data using input devices, this memory is lost as the power
the computer system stores this supply to the computer is switched
data in its memory unit. This data off. That’s why RAM is also called
will now remain here until other as “Volatile Memory”.
components of CPU process it.
The memory unit uses a set of 2. ROM (Read Only Memory) : It
pre-programmed instructions to stands for Read Only Memory.
further transmit this data to other ROM is a Permanent Type
parts of the CPU. memory. The content is not lost
Types of Memory– There are two types when power supply is switched
of memory off. Content of ROM is decided by
1) Primary Memory 2) Secondary Memory the computer manufacturer and
1) Primary Memory : Primary memory permanently stored at the time
is internal memory of the computer. of manufacturing. ROM cannot
It is also known as main memory. be overwritten by the computer.
4 It is also called “Non-Volatile
Memory”.

2) Secondary Memory : It is an external
memory of the computer. It is used
to store the huge amount of different
programs and information.

The secondary storage devices are :

1. Magnetic (Hard) Disk

2. Magnetic Tapes

3. Pen Drive

4. Flash memory

5. Optical Disk (CD,DVD)

6. SSD etc.

3. Output Unit : The third and final 1.3.4 Concept of Hardware and
Software :
component of a computer system is
the output unit. After processing of Hardware : Computer hardware
data, it is converted into a format comprises of the physical components
which human can understand. After that a computer system requires to
conversion, the output unit displays function. In simple words hardware
this data to users. Examples of output are the parts which we can see, we can
devices include monitors, screens, touch them, feel them. It encompasses
printers and speakers etc. Thus, output everything with a circuit board that
units basically reproduce the data operates within a Personal Computer
formatted by the computer for user's or Laptop; including the motherboard,
benefit. graphics card, CPU (Central Processing
Unit), ventilation fans, webcam, power
 Do it yourself supply, and so on.

 Try to find out names of the modern Software : A set of instructions given
to the computer is known as a program.
input devices used in shops/malls. Program or set of programs are called as
software. This helps us to interact with the
1.3.3 Units of Memory : Computer computer in order to perform a particular
storage and memory is often measured in task. Software is a generic term used to
Megabytes (MB) and Gigabytes (GB). Let describe computer programs.
us understand the evolution of memory.
1.3.5 Categories of a software :
Bit : It is a binary digit that holds only
one of two values : 0 or 1. Open source software : It refers to the
software which releases code in public
Nibble : A group of 4 bits is called a domain for anyone to use. The source code
nibble (For example:1011, 1001, can be copied, modified or distributed
1111). by other users and organizations. As the
software is open to the public, the result is
Byte : A group of 8 bits is called a that it constantly updates, improves and
byte. A byte is the smallest unit, expands as more people can work on its
which can represent a data item improvement. Many states are following
or a character. (For example : FOSS policy i.e. Free Open Source
11101100, 10000001) Software Policy and it enabled them to
save some million of rupees each year
Different Units of Memory in licensing costs. The Kerala state is in
news as they have adopted FOSS policy
Data Measurement Size and saved rupees 300 crore as a license fee
for proprietary or closed source software.
Bit Single Binary Digit
5
(1 or 0)

1 Byte 8 Bits

1 KiloByte (KB) 1,024 Bytes

1 MegaByte (MB) 1,024 KiloBytes

1 GigaByte (GB) 1,024 MegaBytes

1 TeraByte (TB) 1,024 GigaBytes

1 PetaByte (PB) 1,024 TeraBytes

1 ExaByte (EB) 1,024 PetaBytes

Table: 1 Different Units of Memory

Closed source software : It is opposite to  The operating system boots up the
Open Source Software and means that the computer and makes sure that
software is used by the proprietary and has everything is operational.
a closely guarded code. Only the original
authors of organization of a software can  The operating system is also what
access, copy, and alter that software. In runs the cell phone and most of the
case of closed source software, user has to electronic devices.
purchase the software before using it.
 The operating systems usually come
1.3.6 Computer software can be preloaded on any computer, tablet,
classified into two types based on its laptop or cell phone that you buy.
utility :
 Most people use the operating system
Application Software : Application that comes with their device as
software is a program or group of default.
programs designed for end users.
Applications software (also called  It is necessary to use licensed operating
end-user programs) include programs system and not a copied or a pirated
like database programs, word processors, one.
web browsers, presentation software,
spreadsheets etc.  There are many open source operating
systems available on the web which are
System Software : System Software is a freely downloadable. It is advisable to
set of instructions required for a computer use those OS instead of pirated ones.
to work. For Example, Linux Operating *Refer Page 61(Software Piracy)
system is a program that allows different
applications and various components of  Do it yourself
hardware such as monitor, printer, mouse,
keyboard etc. to communicate with each  List out the open source and closed
other. source software.

Let’s understand more about an 1.3.7 Operating Systems for Personal
Computers :
operating system
DOS : DOS (Disk Operating System)
 A computer would not be able was the dominant operating system for
to function correctly without an microcomputers in the 1980's and the
operating system. early 1990's. For working with DOS
the user needs to know how to input the
 An operating system is a software commands using the Command Prompt
program that empowers the computer Window.
hardware to communicate and operate
with the computer software. Windows : Windows is a series of
operating systems that are designed by
Microsoft. The first two versions of the
Windows operating system, introduced

6

in 1985 and 1987 respectively, were iOS : iOS is Apple's closed source
primitive. Windows is the most commonly operating system for Apple's iPhone,
used operating system. iPod Touch, iPad and second-generation
Apple TVs.
Mac OS : Apple Corporation’s registered
operating system is called Mac OS. Windows Phone : Windows Phone is
developed by Microsoft as a closed source
Chrome OS : Chrome OS is an operating system for mobile phones.
open-source operating system created
by Google to create a better computing 1.4 Introduction to GNU/Linux (GNU
experience for people who spend most of Not Unix)
their time on the web.
GNU/Linux is a family of operating
UNIX : UNIX was trademarked in 1969 systems that are created by various
by a group of AT&T employees at Bell companies, organizations, and individuals.
Labs as a multitasking, and multi-user It is created by using Free Software
computer operating system. Philosophies. This means that GNU/
Linux operating systems are usually free
Linux : Linux is an open-source, portable, of charge, free to distribute, and they
multi-user (multiple users can access are open source. Open Source is when
system resources like memory/RAM/ a person can view and modify the code
application programs at the same time), for a piece of software. This is important
multiprogramming, operating system. It because by having the ability to look
is very similar to other operating systems, and audit the code, user can be sure that
such as Windows and a source code is the program does not perform malicious
available to the public. tasks. It also allows the user to program
their own features, or fix problems, and
1.3.8 Operating Systems for Mobile help the developers. This results in higher
Phones : quality code and more secure programs.
This is why GNU/ Linux is used as the
There are many different operating predominantly backbone of the Internet.
systems for mobile phones and devices. Most websites that user visits run on
These are Android, Asha, Blackberry, GNU/Linux. In fact, as of 2018, all the
iOS, Windows Phone etc. world’s fastest 500 computers run Linux.

Android : Android is a free and open Ubuntu is one of the most popular
source operating system provided by GNU/Linux distribution.
Google. It is most popular OS amongst
all other OS. There are two main ways to interact
with the computer : The GUI (Graphical
Asha : Asha is used by Nokia phones. User Interface) and the CLI (Command
This is closed source OS. Line Interface)

Blackberry : This is a closed source 7
operating system for smartphone and
tablet devices.

Graphical User Interface (GUI) a list of all the apps installed on the
computer. The search option is used for
The graphical user interface is when quick search of the application.
the user interacts with the computer using
images, icons, and dialog boxes. The The home folder is where all the
Fig. no. 4 shows what the Ubuntu 18.04 personal documents and settings are
looks like. This GUI is called GNOME. stored, and every user has their own home
There are a lot of GUI's (Or desktop folder.
environment) that user can install, but
this is the default. Note : Installing new software on
Ubuntu is done using the 'Ubuntu
The left bar is called the Panel. There Software' Center.
are shortcuts to programs, as well as
currently open programs. The top bar  Do it yourself
has the date and time. If it is clicked a
menu will pop up with the calendar and  Open the Ubuntu Software Center
notifications. Fig. no. 4 shows that the from the panel.
top right side will show user the battery
information, if on a laptop, network  Search for GIMP (it is an image
information (such as WiFi, or Ethernet), editing program) and install.
and options for logging in, restarting, and
shutting down the computer.  Run updates and uninstall software
from the software center.
At the bottom left, there is an icon for
the app menu. Clicking on it will show  Log out, Log in, and Restart the
computer.

APP Menu

Fig. : 4 Desktop Environment of Ubuntu 18.04
8

Command Line Interface (CLI)  Do it yourself

The command line interface is when  Open Firefox browser from the
user interacts with the computer using command line.
text. This is done by typing commands
into a terminal. The default CLI on  Create a new file on the Desktop
Ubuntu 18.04 is called 'bash'. It is a called hello.txt.
command processor that runs in a text
window where the user types commands  Change directory to Desktop using
that causes actions. The commands are 'cd' command.
programs that are run when user types
command name. There are number of  Open hello.txt in Nano text editor.
different commands that user can use.
Some are explained in Table no. 2.  Write a message in hello.txt and
save it.

 Print the contents of hello.txt with
'cat' command.

Fig. : 5 Ubuntu Dashboard

Fig. : 6 File Explorer and Software Center

9

Command Short Usage Detailed description

Discription example

ls List Directories ls [List Directories] Prints the list of directories in the

current one.

pwd Print Working pwd [Print Working Directory] Prints the path to the cur-

Directory. rent directory.

whoami Who Am I ? whoami [Who Am I ?] Prints the name of the current user

on terminal.

lscpu List CPU lscpu [List CPU] Prints information about your CPU on

terminal.

touch Touch touch [Touch] Creates a new file.

filename.txt

cd Change cd Down- [Change Directory] Control goes to a different

Directory laods directory.

nano Nano is a text nano [Nano] Nano is a text editor. This command will

editor filename.txt open the file FileName.txt (or create it if it doesn't

exist). You can type text in Nano, and when you are

done you can press Control + O followed by Enter to

save and Control + X followed by Enter to exit

Nano.

cat Concatenate cat file1.txt [Concatenate] Prints the contents of the files listed

file2.txt on the screen.

Echo A built in echo -- Used to display line of text or string that are passed

command help as an argument.

Clear To clear clear To clear the command prompt.

Table: 2 Few Linux Commands

The GNU/Linux File System Hierarchy  /bin : Essential system programs are
Standard
stored here.

In GNU/Linux, the topmost directory  /dev : All connected devices are
is called the root directory, and it is stored here. Including internal devices,
written as /. All directories are stored temperature sensors, and batteries.
under the root directory. For example if
the user is ABC, the home directory will  /etc : System configuration files are
be created at /home/ABC. Everything in stored here.
Linux is represented as a file, this includes
Cameras, Storage devices, Microphones,  /proc : Files that provide information
Network devices, etc. about processes. This is information
like, how much RAM is free, or how
This is a brief summary of the file fast the CPUs are running.
system :
 /tmp : Temporary files are stored here

 / : The root directory. All files and  /home : Users home directories are
directories are stored under this stored here.
directory, including all hard drives,
pen drives, CD-Drives, etc. There are many more directories.
The user can read more about them by

10

searching for "File System Hierarchy application on his own. Linux
Standard (FHS)" online. distributions mostly use free software
so it keeps track of all the softwares
Why Learn and Use GNU/ Linux ? through repositories. Repositories is
a collection of software for a Linux
There are huge number of benefits of distribution on the server. The package
learning GNU/Linux. Sooner or later in manager updates the operating system
the career, GNU/Linux will be used in as well as other softwares periodically.
the workplace. Millions of desktops and
servers run on GNU/Linux. The Android 4. Linux is flexible and easily
operating system, that the smartphone customizable : The user can change
runs on, is a modified version of GNU/ the desktop, the position of the menus,
Linux. status bar position, style, default
file manager, icon theme and lot
1. Linux is Free and Open Source : more. Almost everything in Linux is
The word “Free” here does not just customized.
mean free of charge but also means
“Freedom”. Anyone is free to use this 5. Excellent Support : There are
software, distribute them freely and thousands of forums and millions
even study and modify the source of people ready to help open source
code to suit one's own need. software users. Each distribution has its
own community of users and they help
2. Linux Operating System is free from each other. Many software companies
viruses : The user need not install any and developers of free software
anti-virus software. This saves money also offer solutions to the problems
as well as valuable time. The users through community platforms and
are free from the trouble of updating also through professional channels.
the virus definitions and checking
unknown USB disk that is plugged 1.5 Computer Network
in. Moreover, anti-virus software is
not hundred percent reliable. The user 1.5.1 Introduction : It is a group
always runs the risk of losing the data of interconnected computers or devices to
if the computer is infected due to the have communication within themselves.
failure of anti-virus software. Finally, A computer network consists of a
anti-virus software often gives a collection of computers, printers and other
false alarm and may delete the files equipment that is connected together so
assuming the existence of the virus. that they can communicate with each
other.
3. Easy to keep all the software up-
to-date : Proprietary operating 1.5.2 Types of networks : There are
systems can update themselves. But three types of network based on the
they cannot update other software, geographical area they cover : LAN,
especially proprietary software. MAN and WAN.
The user has to keep track of each
11

The entire use and implementation  Examples of a MAN are the part
of these types depends upon the of the telephone company network
geographical area they cover, i.e. LAN that can provide a high-speed DSL
covers the smallest area; MAN covers line to the customer or the cable
an area larger than LAN and WAN TV network in a city.
comprises the largest of all.
 Wide Area Network (WAN) :
 Local Area Network (LAN) :
 Wide Area Network is a computer
 LAN covers smaller geographical network that extends over a large
area (Size is limited to a few geographical area.
kilometers) and are privately
owned.  It might be confined within the
bounds of a state or country.
 Usage area is limited to areas
such as an office building, home,  A WAN could be a connection of
hospital, schools, etc. LAN connecting to other LAN’s
via telephone lines and radio
 It covers a short distance, and so waves.
the error and noise are minimized.
 The technology is high speed and
 LAN is easy to setup. relatively expensive.

 Data transmits at a very fast rate  A Communication medium used
as the number of computers linked for WAN is Telephone Network or
are limited. Satellite Link.

 It is a less expensive hardware and  Due to long distance transmission,
maintenance cost is also low. the noise and error tends to be more
in WAN.
 Metropolitan Area Network
1.6 Network Configurations :
(MAN) :
Network architecture is the design of
 MAN is larger area than that a computer network. It is a framework
of a LAN and smaller area as for the specification of a network's
compared to WAN. physical components and their functional
organization and configuration.
 It connects two or more separate
computers that reside in the same Two of the most widely used types of
or different cities. network architecture are peer-to-peer and
client/server.
 It covers a large geographical area
and may serve as an ISP (Internet 1. Peer-to-Peer Architecture : In this
Service Provider). type of architecture, all the machines,
called as “peers”, have the same
 It is hard to design and maintain a status and they can communicate with
Metropolitan Area Network.

12

any other peer directly. A Peer-to-Peer for a network user to browse in
network has no dedicated servers. Its internet or do spreadsheet work.
implementations are meant for small For Example : Multimedia server, File
networks. For Example, when students storage servers, Webserver etc.
creates a network to share files through
Bluetooth or SHAREit, the mobile
device forms peer-to-peer network for
transfer of files.

Fig. : 8 Client-Server Architecture

Fig. :7 Peer-to-Peer Architecture 1.6.1 Internet :

2. Client-Server Architecture : This Internet means connecting computer
type of architecture is most suitable to any other computer anywhere in
for larger network. So there are two the world. Internet is the highway of
types of machines in network, client information.
and server.
The Internet has one very simple
Client : A computer which is seeking job: to move computerized information
any resource from another computer (known as data) from one place to
is a client computer. For Example: another. The Internet is generally defined
Downloading an image file from a as a global network connecting millions
website, browsing Intranet/Internet of computers.
etc. The network user normally uses a
client computer to perform his day to The Internet is a massive network of
day work. networks, a networking infrastructure.
With the help of the internet one can
Server : If a computer has a resource easily be in touch with any one in the
which is served to another computer, whole world by sending electronic mail,
it is a server computer. The client by chatting. Travel bookings can be
establishes a connection to a server made very easily, one can order books or
and accesses the services installed buy anything online. In simple terms it
on the server. A server is not meant can be said that internet provides a very

13

strong connection or network between  DNS : Domain Name System-It
computers globally, bringing people and translates network address (such as
their working close to each other. IP addresses) into terms understood
by humans (such as Domain Names)
1.6.2 History of Internet : and vice-versa.

The first workable prototype of the  DHCP : Dynamic Host Configuration
internet came in the late 1960's with the Protocol - It can automatically assign
creation of ARPANET, or the Advanced internet addresses to computers and
Research Projects Agency Network. users.
Originally funded by the U.S. Department
of Defense, ARPANET used packet  FTP : File Transfer Protocol - A
switching to allow multiple computers protocol that is used to transfer and
to communicate on a single network. manipulate files on the internet.
The technology continued to grow in
the 1970's after scientists Robert Kahn  HTTP : HyperText Transfer Protocol-
and Vinton Cerf developed Transmission An internet-based protocol for sending
Control Protocol and Internet Protocol, and receiving web pages.
or TCP/IP, a communications model
that set standards for how data could be  IMAP : Internet Message Access
transmitted between multiple networks. Protocol - A protocol for receiving
ARPANET adopted TCP/IP on January 1, e-mail messages from server on the
1983, and from there researchers began to Internet. It maintains a copy of all the
assemble the “network of networks” that emails on server. We can sort, filter
became the modern Internet. The online emails.
world then took on a more recognizable
form in 1990, when computer scientist  IRC : Internet Relay Chat - A
Tim Berners-Lee invented the World protocol used for Internet chat and
Wide Web (WWW). other communications. It facilitates
communication in the form of text.
1.6.3 Protocols :
 POP3 : Post Office Protocol Version 3
A protocol is a set of rules that - A protocol used for receiving e-mail
governs the communications between from remote mail servers. It does not
computers on a network. In order to have maintain copy on the server.
two computers to talk to each other, they
must be speaking the same language.  SMTP : Simple Mail Transfer
Protocol - A protocol for sending
Examples of Protocols are- e-mail messages to the Server on the
Internet.
 TCP/IP : Transmission Control
Protocol & Internet Protocol - It
breaks down the message into packets
and sends them out into the network.

14

1.7 IT Enabled Services 1.8 Careers in IT

1.7.1 Meaning of IT Enabled Services : Various career opportunities are
available for IT professions. These vary
IT Enabled Services (ITES), also from operator to Specialised skilled
called web enabled services or remote programmers. Some of the career
services or tele-working, covers the opportunities are as follows :
entire amount of operations which exploit
Information Technology for improving 1. Web Designer and Developer : One
efficiency of an organization. The most can develop interactive websites
important aspect is the value addition of using knowledge of HTML, PHP
IT Enabled Service. The value addition and various other programming
could be in the form of Customer languages.
relationship management, improved
database, improved look and feel, etc. 2. Software Developer : It is possible to
The outcome of an IT Enabled Service is have career as a software developer
in two forms : with the scripting skills.

 Direct Improved Service. 3. Database Manager : After getting
knowledge about Database
 Indirect Benefits. management one can work as a
Database Manager with the help of
Whereas direct benefits can be SQL skills.
realised immediately, indirect benefits
can occur over a period of time, and can 4. Information Security Analyst :
be harnessed very effectively, if planned Information Security Analysts are
well up front. responsible for ensuring that networks
are watertight. They educate staff to
1.7.2 Popular IT Enabled Service avoid unintended disclosures and keep
centers : up to speed with potential external
threats.
Popular IT Enabled Service centers are -
5. Professional Accountant : Using
 Call Centers computerized accounting software one
can successfully handle accounting
 Electronic Publishing work of any small or large scale
organization.
 Medical Transcription
6. Financial Advisor : After getting
 Data Centers IT knowledge one can advise and
guide others in investing the money in
 GIS Mapping various investment schemes with their
(Geographic Information System) calculations and benefits in future.

 ERP ( Enterprise Resource Planning ) 7. Cyber Advisor : Anyone can develop
his or her career as a cyber-advisor.
 Knowledge Management & 15
archiving.

8. Animator:Thisisthemostdemanding home appliances, and other items
career in today’s era. It is possible to embedded with electronics, software,
become a successful animator using sensors, actuators, and connectivity
one's own creation and innovation which enables these things to
with the help of software like GIMP, connect, collect and exchange data
Inkscape etc. creating opportunities for more direct
integration of the physical world into
9. Games developer : Perhaps one of computer-based systems, resulting in
the trendiest and most fun jobs in the efficiency improvements, economic
sector, a games developer gets to work benefits, and reduced human
on titles for consoles, computers, smart exertions.
phones, tablets and online. Creativity
and imagination are important but the 3. Cloud Computing : It is the delivery of
ability to work in a highly pressurised computing services - servers, storage,
environment is also crucial. databases, networking, software, data
analytics and more - over the internet.
10. Audio / Video Editor : As a career
opportunity, to become an Audio / 4. Data Analytics (DA) : It is the process
Video Editor, one should be good in of examining data sets in order to draw
tools such as Kdenlive, Audacity. conclusions about the information
With the help of these tools one can they contain, increasingly with the
develop a career as a video journalist. help of specialized systems and
software. Data analytics technologies
1.9 Recent trends in IT and techniques are widely used in
commercial industries to enable
1. Green Computing : It is the study organizations to make more-informed
and practice of environmentally business decisions and by scientists
sustainable computing or IT. and researchers to verify or disprove
scientific models, theories and
The goals of green computing are hypothesis.
similar to green chemistry :
5. Artificial Intelligence (AI) : It
 To reduce the use of hazardous is intelligence demonstrated by
materials machines, in contrast to the natural
intelligence displayed by humans
 To maximize energy efficiency and other animals. Computer science
during the product's lifetime defines AI research as the study of
"intelligent agents": any device that
 To recycle or biodegradation of non- perceives its environment and takes
functional products and factory actions that maximize its chance of
waste. successfully achieving its goals.

Green computing is important for 6. Machine Learning (ML) : It is the
all classes of systems, ranging from scientific study of algorithms and
handheld systems to large-scale data statistical models that computer
centers. systems use to effectively perform a

2. Internet of Things (IoT) : The
Internet of Things (IoT) is the
network of physical devices,vehicles,

16

specific task without using explicit many cases offer greater statistical
instructions, relying on patterns and power, while data with higher
inference instead. It is seen as a subset complexity may lead to a higher false
of artificial intelligence. discovery rate.

7. Big Data : It refers to data sets that are 8. Blockchain : It is a growing list of
too large or complex for traditional records, called blocks, which are
data-processing application software linked using cryptography. It can be
to adequately deal with. Data with defined as a distributed, decentralized,
public ledger.

Summary

 Data can be any character, text, word, number or raw facts. Information is data
formatted in a manner that allows it to be utilized by human beings in some
significant way.

 IT (Information Technology) involves all of the technology that we use to
collect, process, protect and store information.

 Computer architecture refers to how a computer system is designed and how it
works.

 Computer hardware is the set of physical components that a computer system re-
quires to function.

 Software is a set of instructions or programs instructing a computer to do specific
tasks.

 Computer storage and memory is often measured in MegaBytes (MB) and
GigaBytes (GB).

 Computer software can be classified into two types-Application Software and
System Software.

 Open Source Software is a code free software available freely to copy and
modify.

 Closed source Software is having proprietary rights with the developers and are
paid ones.

 GNU/Linux operating systems are usually free of charge, free to distribute, and
they are open source.

 There are two main ways to interact with the computer : GUI and CLI

 Internet means connecting computer to any other computer anywhere in the world.

 A protocol is a set of rules that governs the communications between computers
on a network.

 A computer network consists of a collection of computers, printers and other equip-
ment that is connected together so that they can communicate with each other.

 LAN, MAN, WAN are types of network

 Massive career opportunities are available for IT professionals.

17

Exercise

Q.1 Complete the following activity 5)
1 )

Disk MAN Area
System Network
DOS

2) Tick the appropriate box Q.2 Divide the following list of devices
into appropriate categories.
Internet is a .................. network
connecting millions of computer. (Monitor, Barcode reader, Printer,
Keyboard, Optical character reader,
Speaker)

Re gional Global Local Categories Names
3) Input Devices

Output Devices

USB Serial Q.3 M ultiple choice two correct
Bus answers.

4 ) Tick the appropriate box. 1) The primary memory consists of
.................. and ..................
whoami Print CPU
information a) Pendrive b) Hard Disk c) RAM
d) Scanner e) ROM
Print path of
current directory 2) The network architectures which are
widely used are ..................
Print the name
of current user a) Server b) Client c) Peer to peer
d) Client-server e) Internet

Q.4 Match the following.

(1) IS (a) change directory

(2) FTP (b) Translates Network Address

(3) CD (c) List of Directory

( 4) DNS (d) To transfer file on interent

18

Q.5 Name the following and complete Q.8 C omplete the following Long

the diagram. form.

LAN Local .........Network

Mobile GUI .........User interface
Operating OSS Open Source...........

System

Q. 6 Complete the following with Linux Q.9 Identify the following activity.
commands with their use.
You are typing a letter using a
Commands IT's Use computer and suddenly there is a
power failure.
pwd
Which type of Memory does this
ls activity deal ?
Q.7 Complete the list of following
Q.10 Answer the following
protocols.
1) What is Data and Information?
Internet Give examples of data and
Protocol information.

2) Explain functional units of a
computer system.

3) What is a storage unit ? Explain
types of primary memory storage.

4) Explain how Linux is different
from Windows.

5) Write down the difference
between LAN, MAN and WAN.


19

2 Introduction to DBMS

Let us Learn card. In a report card, the combined
(marks) data of all subjects speaks about
 Concept of Database. students performance. Thus when data
is maintained in an organized manner
 Introduction to DBMS and RDBMS it becomes meaningful or organized
information.
 Advantages of using database
management system. Data vs Information

 Type for storage of data in a database. Data Information

 To understand Structured Query Data is raw facts Information is
Language. processed data

2.1 Introduction Data does not help Information
in decision making helps in decision
In our day to day life every person
uses database in various ways. Like making
people use phone diary or phone book
which contains name, address email id, Data could Without data
phone number etc. be relevant or information
irrelevant cannot be
Doctor maintains medical history of processed
patients. Librarian maintains records of
their book details, issue date, return date. Each student's The average
etc. Teacher keeps records of students like
name, roll number, Marks etc. In these exam score is one score of a
examples every one maintains records in
a systematic manner. piece of data. class or of the

In a computer system, we always entire school is
maintain our records. At this point a
database is very useful. information that

2.2 Definition of a Database can be derived

Database is collection of interrelated from the given
data which helps in efficient retrieval,
inserting and deleting of data. In exams, data.
marks obtained by the student in subjects
is data before it is entered in the report Table: 1 Data vs Information

 Do it yourself

 Collect five examples of data and
information

20

2.3 Introduction to Database customers can send or get money
Management System (DBMS) through banks. All this is possible just
because of DBMS that manages all
A database, often abbreviated as DB, the bank transactions.
is a collection of information organized
in such a way that a computer program  Universities and Colleges :
can quickly select desired pieces of data. Examinations are done online today

A Database Management System and universities and colleges maintain
(DBMS) is a software for creating all these records through DBMS.
and managing databases. The DBMS Student’s registration details, results,
provides users and programmers with a courses and grades all the information
systematic way to create, retrieve, update is stored in a database.
and manage data. It stores data in such
a way that it becomes easier to retrieve,  Credit Card Transactions :
manipulate, and update information. For purchase of credit cards and

Examples of popular DBMS are : all the other transactions are made
possible only by DBMS. A credit
MySQL, PostgreSQL, Access, Oracle, card holder knows the importance of
SQL Server, IBM, DB2 and Sybase. his information that all are secured
through DBMS.
2.4 Some Applications of DBMS
 Social Media Sites :
 Railway Reservation System : We all are on social media websites to
Database is required to keep record of
share our views and connect with our
ticket booking, train’s departure and friends. Daily, millions of users sign
arrival status, status of seats available up for these social media accounts
etc. like Facebook, Twitter, Pinterest
and Google plus. But how is all the
 Library Management System : information of users stored and how
There are thousands of books in the are we able to connect to other people?
Yes, this is all because of DBMS.
library so it is very difficult to keep
a record of all the books in a copy or 2.5 Advantages of DBMS
register. So DBMS is used to maintain
all the information related to book  Reducing Data Redundancy :
issue dates, name of the book, author The file based data management
and availability of the book.
systems contained multiple files
 Banking : that were stored in many different
People make thousands of locations in a system or even across
multiple systems. Because of this,
transactions through banks daily and there were sometimes multiple copies
they can do this without going to the of the same file which lead to data
bank. So now banking has become redundancy.
so easy that by sitting at home bank
21

This is prevented in a database  Privacy :
as there is a single database and any The privacy rule in a database means
change in it is reflected immediately.
Because of this, there is no chance of only the authorized users can access
encountering duplicate data. a database according to its privacy
constraints. There are levels of
 Sharing of Data : database access and a user can only
In a database, the users of the view the data. For example - In social
networking sites, access constraints
database can share the data among are different for different accounts a
themselves. There are various user may want to access.
levels of authorisation to access
the data, and consequently the data  Backup and Recovery :
can only be shared based on the Database  Management System
correct authorisation protocols being
followed. automatically takes care of backup
Many remote users can also access and recovery. The users don't need
the database simultaneously and to backup data periodically because
share the data between themselves. this is taken care of by the DBMS.
Moreover, it also restores the database
 Data Integrity : after a crash or system failure to its
Data integrity means that the data previous condition.

is accurate and consistent in the  Development and Maintenance Time :
database. Data Integrity is very DBMS reduces application
important as there are multiple
databases in a DBMS. All of these development and maintenance
databases contain data that is visible time. It supports many important
to multiple users. So it is necessary functions that are common to many
to ensure that the data is correct and applications, accessing data stored
consistent in all the databases and for in the DBMS, which facilitates the
all the users. quick development of application.

 Data Security : 2.6 Data types in the DBMS
Data Security is vital concept in
When you create a table or add a
a database. Only authorised users field to a table in the database, fields
should be allowed to access the are created with specific data type. Data
database and their identity should be types are classifications that identify
authenticated using a username and possible values for and operations that
password. Unauthorised users should can be done on the data, as well as the
not be allowed to access the database way the data in that field is stored in the
under any circumstances as it violates database.
the integrity constraints.

22

Class Data Type Description 2.7 Data model

CHAR Holds a Database is designed according to
fixed length certain rules. This logical structure of
Text string (can database is known as a model. Data
contain letters, models define how the data is connected
Numeric numbers, to each other and how they are processed
Date and special and stored inside the system.
characters).
The fixed size It describes the method of storing and
is specified in retrieving the data. There are different
parenthesis. models like network model, hierarchical
model and relational model. Let us see
VARCHAR Holds a relational model.
variable length
string (can Relational Model :
contain letters,
numbers, The most popular data model in DBMS
and special is the Relational Model. Relational data
characters). model is the primary data model, which
The maximum is used widely around the world for data
size is specified storage and processing. This model is
in parenthesis. simple and has all the properties and
capabilities required to process data with
DECIMAL It can represent storage efficiency.
numbers with
or  A transaction is a unit of work that
without the is performed against a database.
fractional part For example, if you are creating
a record or updating a record or
It is used for deleting a record from the table, then
INT storing integer you are performing a transaction on
that table. It is important to control
values. these transactions to ensure the data
integrity and to handle database
DATE It holds the date errors.
including day,
month and year Properties of Transactions :

Time TIME() It holds time. Transactions have the following four
Format: standard properties, usually referred to
HH:MM:SS by the acronym ACID.

Table: 2 Data types in DBMS  Atomicity : It ensures that all
operations within the work unit are
 Do it yourself completed successfully. Otherwise,
the transaction is aborted at the
 You have scored 75.56% in the
recent examination. Which data 23
type would you prefer to use for
storing this data ?

point of failure and all the previous stored in a table. Database designer
operations are rolled back to their decides the name of the table and
former state. titles of columns.

 Consistency : It ensures that the da-  Field : A table consists of information
tabase properly changes states upon a which is stored under different
successfully committed transaction. headings, called as fields or columns.
Columns are shown vertically in a
 Isolation : It enables transactions to table. Each field or column has an
operate independently of and individual name. Two columns cannot
transparent to each other. have the same name. In Fig. no. 1, the
first row represents the different field
 Durability : It ensures that the result names or titles of columns.
or effect of a committed transaction
persists in case of a system failure.  Record : All the columns in a table
make a row. Each row contains
2.8 Introduction of RDBMS information on individual topics.
A record is composed of fields and
RDBMS stands for Relational contains all the data about one
Database Management System. In particular person, company, or item
RDBMS a database is considered as a in a database. Record is also called
collection of interrelated data. as a Tuple.

Basic Database Concept  Key : A column or a combination of
columns which can be used to identify
 Table : The table is the basic data one or more rows (tuples) in a table is
storage unit in a Relational database. called a key of the table.
Table consists of columns and rows.
A database consists of one or more
tables according to which data is

Column (field)

Position Title Education Requirements Functional Area Max Pay Min Pay
Executive Assitant
Row (record) Recruiter Associate degree Human Resource 60,000 40,000
SW Engineer
SQA Engineer Bachelor's degree Human Resource 110,000 85,000

Bachelor's degree Engineering 140,000 110,000

Bachelor's degree Engineering 140,000 110,000

Data Value

Table (object)

Fig. 1 : Table in Database
24

 Primary Key : The group of one each Passport_ ID is assigned to only one
or more columns used to uniquely person.
identify each row of a relation is
called its Primary Key. A one-to-one relationship looks like
below in the relationships graph :
 Foreign Key : It is a field (or collection
of fields) in one table that refers to the Fig. 2
Primary Key in another table.
One-to-Many (or Many-to-One)
Relationships in database : This is the most common relationship

Relationships link data from type. In this type of relationship, a row
individual tables to increase the usefulness in table City can have many matching
of the database. rows in table Customer, but a row in table
Customer can have only one matching
A relationship in the context of row in table City
databases, is a situation that exists
between two relational database tables Fig. 3
when one table has a foreign key that is Example of one-to-many relationship
used as a reference to the primary key of
the other table. One-to-Many relationships can also
be viewed as Many-to-One relationships,
For example, a table called Employees depending on which way you look at it.
has a primary key called employee_id.
Another table called Employee Details In the above example, the Customer
has a foreign key which references table is the “many” and the City table
employee_id in order to uniquely identify is the “one”. Each customer can only
the relationship between the two tables. be assigned one city,. One city can be
assigned to many customers.
There are 3 types of relationships in
relational database design. They are :

 One-to-One

 One-to-Many (or Many-to-One)

 Many-to-Many

These are explained below.

One-to-One :

In a one-to-one relationship, one
record in a table is associated with one
and only one record in another table. For
example, in a company database, each
employee has only one Person_ ID, and

25

Many-to-Many  Delete records from a database
 Execute queries against a database
A many-to-many relationship occurs  Create stored procedures in a
when multiple records in a table are
associated with multiple records in database
another table.  Create views in a database.

Multiple records in Table Product  Do it yourself
are linked to multiple records in Table
Suppliers.  Explain the purpose of SQL

Product Supplier 2.10 Categories of SQL Commands

Prod ID Supplier ID Data Definition Language (DDL)
Description Description Commands
Price Address
Supplier Telephone DDL statements or commands are
used to define and modify the database
Fig. 4 structure of your tables or schema. When
you execute a DDL statement, it takes
2.9 Introduction to SQL effect immediately.

SQL is Structured Query Language, Data Definition Language
which is a computer language for (DDL) commands
storing, manipulating and retrieving data
stored in a relational database. SQL is COMMAND USED FOR
the standard language for Relational
Database Management System. All CREATE DATABASE Creates database
relational database management systems
like MySQL, Base, Oracle, Sybase, CREATE TABLE Creates a new table
Informix, Postgres and SQL Server use
SQL as standard database language. ALTER TABLE Modifies a table

S QL became a standard of the American DROP TABLE Deletes a table or
National Standards Institute (ANSI) DROP DATABASE Database
in 1986, and of the International
Organization for Standardization (ISO) Table: 3 DDL Commands

in 1987. Data Manipulation Language (DML)
Commands
Using SQL You Can :
 Create new databases. Data Manipulation Language (DML)
 Create new tables in a database statements or commands are used for
 Insert records in a database managing data within tables.
 Retrieve data from a database
 Update records in a database

26

Data Manipulation Language DCL is used to control user access
(DML) Commands in a database. it is related to security
issue. it is also deals with the rights and
COMMAND USED FOR permissions of the databse access.

SELECT Extracts data from a table Data Control Language
(DCL) commands
UPDATE Updates data in a table

DELETE Deletes data from a table COMMAND USED FOR

INSERT Insert data into a table GRANT To provide access or
INTO privileges on the database
objects.
Table: 4 DML Commands
REVOKE To remove access rights or
privileges on the database
Data Control Language (DCL) object.
Commands

Table: 5 DCL Commands

Summary

 Basic concepts of database.

 We get to know difference between Data and Information.

 Database management system(DBMS) is used to create,
manipulate and retrieve database.

 DBMS is used in various fields like railway, library, schools,
colleges, credit transactions, banking.

 Benefits of DBMSaredatasharing,dataintegrity,security,consistency,
recovery.

 RDBMS means relational database management system.

 Relations in database are one to one, one to many or (many to one)
and many to many.

 Categories of SQL Commands : DDL, DML and DCL

27

Exercise

Q. 1 Complete the following activity. Q. 2 Observe the field names of a
1. Tick whichever box is not valid. database given below in ‘Column
A’ related to Bus reservation.
Graphic Write suitable data types for each
Date field in front of the respective field
in ‘Column B’
Number
Data type Text Column A Column B

(Field Name) (Data Type)

Passenger Name

Age
Gender
Mobile Number

2. Student wants to create a field Q. 3 Write the use of following SQL
pincode in a table, which data command.
type he will choose ?
Command Use

INSERT ________________

3. Tick the appropriate box.

Primary key is also called UPDATE ________________
foreign key
Q.4 Create a table for the information
Uniquely identifies given below by choosing
a record appropriate data types. Specify
proper primary key for the table
4. Tick the appropriate circle. 1) Movie 2) Actor

Database has Only one 1. Movie ( Registeration_no,
record movie_name, Realease_Date)
None of these
28 Only single 2. Actor ( actor_id, Actor_name,
table birth_date )

One or many
tables

Q. 5 Consider the following table Q .7 In a company the data is stored in
Stationary. Write SQL commands a table under the following fields
for following statements. Employee number, Last name,
Date of birth, Address. Which
Table : Stationary data type will you use for the
above field.
S_ID S_Name C_ Name Price Quantity

001 NoteBook ABC 20 50 Datatype??? ???
002 Pencil box XYZ 10 80 Employee Name last name
003 A4Pages PQR 600 2

rim

1) Write SQL command to create
above Table

company table

2) Write SQL command to insert ??? ???
above mentioned record in table Address
Date of birth


3) To delete above table. Q.8 Multiple choice select three correct
answers.
Q.6 Answer the following questions.
1) What is a database ? 1) Valid relationships in RDBMS are
2) What are the advantages of a a) one to one b) one to two
c) one to many d) many to two
DBMS ? e) many to many f) one to three
3) What do you understand by Data Q.9 Complete the following.

Model ? Use Command
4) What is a primary key ?
To remove access rights or
previleges from the database

5) What is DDL(Data Definition Extracts data from
language) a table


29

3 Impressive Web Designing

Let us Learn The internet is a powerful media
to transmit information. The pages of
 Working of web information displayed on the internet are
 Components of web referred to as webpages. The standards
 Introduction to HTML5 and formats for presenting text and
 Basics related to tags & graphics on the internet are developed
and approved by WWW governing
text-formatting tags authorities.
 Heading levels
 Inserting Images in a webpage & The growing demand for attractive
presentation of information using
creating hyperlinks electronic means gave rise to the invention
 Forms in HTML of websites.
 Use of Scripting in HTML
 Basics of JavaScript 3.2 How does the web work ?
 Simple JavaScript programs
WWW stands for world wide web
3.1 Introduction normally referred to as web. Fig. 3.1
describes the working of web.

Online resources have become a part
of our day to day life.

Step 1 : When you type domain name & click on browser, it

sends request to DNS server for finding WebServer IP

Step 2 : IP Address is 10.0.2.3 DNS Server

It has mapping of URL &
Server IP Similar to
phonebook

Client Machine Working of WWW
(YOU)

eg: www.EBalbharti.in

Step 3 : Request for EBalbharati Webpage

Step 4 : Response of actual Webpage

Fig. : 3.1 Working of Web EBalbharti WebServer
IP : 10.0.2.3

30

3.3 Components of web 3.4 Introduction to HTML5

Web uses the following Terms : HTML is a standard language for
developing and creating interactive
 Webpage : A simple text file created websites, introduced by Tim Berners Lee.
using HTML. HTML documents are created in any
text editor for and can be run(executed)
 Website : A collection of interlinked on any computer that has a web browser.
web pages containing text, images, HTML is compatible with most of the
audio and videos. For Example, www. web browsers.
ebalbharati.in
Basic structure : HTML tags are
 Web Browser : A web browser is a keywords enclosed within angular
software used to view web pages or brackets, that define how your web
websites available on the internet For browser must format and display the
Example Internet Explorer, Google content. Tags are not case sensitive. Every
Chrome, Mozilla Firefox. HTML page is enclosed within two tags
<html> and </html>. This page is divided
 Web Server : A Web server is an into two sections internally, head section
application or a computer that sends and body section. Head section contains
webpages over the internet using the title of the document which is enclosed
HTTP protocol. The functionality of within <Title> and </Title> of <Head> and
website is managed by web server. For </Head>. The actual text of the document
Example Apache, nginx, IIS, etc.. is written within <Body> and </Body>.

 URL(Uniform Resource Locator) : An attribute : An attribute defines a
It is an address of a web page on the property for an element, consists of an
internet. The web pages are retrieved attribute/value, and appears within the
from the original location with the element's start tag. Sometime we need
help of URL. additional information with a tag.

 HTTP : HTTP (HyperText Transfer <html>
Protocol) is a protocol used by WWW <head>
for client server communication.
<title> First Page </title>
 HTML : Hyper Text Markup </head>
Language, enables to write code for
a webpage. All the webpages in a <body bgcolor = green >
website are linked with one another,
with the help of hypertext links. attribute value of attribute
This is my first web page
 Do it yourself </body>
</html>
 A collection of webpages is called...

 …………is an address of a webpage.

31

Classification of HTML Tags <!DOCTYPE html>
<html>
HTML tags are categorized as : <head> <title>Your Website</title>
</head>
1. Container tags 2. Empty tags
<body>
1. Container Tags : Container Tags are <header>
also called paired tags. Container <nav>
Tags have a beginning tag and an </nav>
end tag. The end tag is similar to the </header>
beginning tag but with a ''/'' in front <section>
of it. For Example <head> </head>, <article>
<body> </body>. </article>
</section>
2. Empty Tags : Empty tags are <aside>
standalone tags and do not have </aside>
an end tag. <Br> is an example of <footer>
singular tag/Empty tag. </footer>

Basic structure of HTML </body>
</html>
Purpose of tags :
<header>
 <html> and </html> : This tag
indicates that the document is an html <nav>
file.
<section>
 <head> and </head> : It includes
<Title> within it, the text within <article> <aside>
<head> is not displayed on the
webpage. This is used for search <footer>
engine optimization.
This is representation of HTML5
 <title> and </title> : The content Document structure
within this tag is displayed on the title
bar.

 <body> and </body> : This tag
includes all content which is to be
developed in the web browser. Most
of the tags are included in this tag.

Structure of web page using HTML5 :

The first line on the top, <!DOCTYPE
html>, is a document type declaration
and it lets the browser know the flavor of
HTML.

32

 <header> - Defines a header for a Tag Name Description
document or a section.
<b> Displays text within it in Bold
 <nav> - Defines a container for like Hello.
navigation links.
Displays text within it in
 <section> - Defines a section in a <i> italicized manner like
document.
Hello.
 <article> - Defines an independent
self-contained article. <u> Displays text with underline
like Hello.
 <aside> - Defines content apart from
the content (like a sidebar). <small> Displays text in small font
size.
 <footer> - Defines a footer for a
document or a section. <sub> Displays text in subscript
form.
 <details> - Defines additional details.
<sup> Displays text in superscript
3.5 Text formatting element form.

Text formatting is used to make <ins> Anything that appears within
a document look attractive thereby <ins>...</ins> element is
enhancing it’s appearance. The list of displayed as inserted text.
different text level formatting tags are as
shown in Table no. 1 : <del> Anything that appears within
<del>...</del> element, is
displayed as deleted text.

The HTML <mark> element
<mark> defines marked or highlighted

text :

Table: 1 Text Formating Elements

Program 1 : Output 1 :

<!DOCTYPE html> This text is bold
<html><head> This text is italic
<title>Example of HTML5 text formatting tags</title> This text is marked
</head><body> This is subscript and superscript
<b>This text is bold</b><br><br> This text is inserted to the document
This text is deleted from the document
<i>This text is italic</i><br><br>
<mark>This text is marked</mark><br><br> Note : <BR> tag is
This is <sub>subscript</sub> and <sup>superscript
</sup><br><br> used to specify a line
<ins>This text is inserted to the document</ins><br><br> break.
<del>This text is deleted from the document</del><br><br>
</body> </html>

33

3.6 Heading levels Note : All the heading levels have
attribute align with values left, right
HTML provides six levels of heading and center..
tags. The range is from 1 to 6. These
heading levels are represented as <H1> For Example : <h1 align="center">
Text content </H1>. The <H1> tag Largest heading size which is center
displays text in bold and with largest aligned. </h1>
heading level whereas <H6> tag displays
text in the smallest heading level.  Do it yourself

Program 2 :  Create a simple web page using
following features.
<!DOCTYPE html>
<html>  Largest heading level ‘Biodata’ text
<head> in centre.
<title>Heading levels</title>
</head>  Name in Bold.
<body bgcolor=skyblue>  Address in Italics.
 Standard with underline.
<H1>Heading level 1 Text is largest in size</H1>
<H2>Heading level 2 </H2> Note : Use any text editor to type the
<H3>Heading level 3</H3> code and save it with ‘ filename. html’
<H4>Heading level 4</H4> or ‘ filename. htm’. Use a browser to
<H5>Heading level 5</H5> display the output.
<H6>Heading level 6 Text is smallest in size</H6>
</body> 3.7 Inserting an image, a horizontal
</html> ruled line and a paragraph

Output 2 :  <IMG> tag is used to insert an image
within a webpage. It uses following
attributes :

 src : It is used to specify the path of
an image file. The popular extensions
of image file are png, jpg and gif.

 height : Specifies height of the image
in pixels.

 width : Specifies width of the image
in pixels.

 alt : It is referred as alternate text. It
specifies the description of the image.

34

<IMG> is a empty tag. The syntax used <td> : It specifies data within the table
in code is as : (cell content).

<IMG src="Desert.jpg" height="400" The attributes of table are :
width="400" alt="Desert image"> 1. border : This attribute is required to

 <HR> tag : <Hr> tag is used to display display a border for the entire table.
horizontal ruled line. It is a singular It has a numbered value. If border
tag. The attributes with <hr> tag attribute is not specified, a table is
created without the border for both
 color : Sets color for the horizontal table as well as columns.
ruled line.
2. bordercolor : It displays border in a
 width : It specifies the length of the specific color.
ruled line in % or pixels.
3. align : It aligns the table either to the
 size : It sets thickness of a ruled line. left, right or center.

 <P> tag : It is used to define paragraphs. 4. bgcolor : Sets the background color
It is a container tag. for the table.

3.8 Creating a table The attributes of the <tr>, <th>, <td> :
1. align : It aligns the text horizontally.
A table is made up of rows and
columns. A table in a webpage is created The values are aligned to the left, right
by using <table> tag, which is a container or center.
tag. The tags and attributes used to create
a table are as follows : 2. colspan : This attribute is used within
<td> or <th>. It creates a single column
<table> : It is used to indicate creation of spanning across the table. It takes a
a table. numbered value, based on the number
of columns to be spanned in a table.
<caption> : It is used to specify a table
heading. It has align attribute which can 3. rowspan : This attribute is used within
have 'top' or 'bottom' as it’s values. Top is <td> or <th>. It creates a single row
the default value. spanning across the table. It takes a
numbered value, based on the number
<tr> : This tag is used to create each of rows to be spanned in a table.
row of the table.
<tr>, <th>, <td> tags can have bgcolor
<th> : It indicates table heading. <th> attribute for specifying background
is generally used for first row column color to a row or a column respectively.
content of the table. It displays content in
the bold format. It can be replaced with 35
<td>.

Program 3 : Output 3 :

<!DOCTYPE html>  Do it yourself
<html>
<head>  To insert your photograph in
<title>Table with 4 rows and 3 columns a webpage the required tag is
</title> …………….
</head>
<body>  Can the ruled line be coloured in
<table border="2"> blue ?
<tr><th>Sr. No.</th>
<th>Input Device</th>  To display table without borders the
<th>Output Device</th> </tr> syntax can be as ……………..
<tr> <td>1</td> <td>Keyboard</td>
<td>Monitor</td> </tr>  Which attribute spans two or more
<tr> <td>2</td> <td>Mouse</td> columns of the table ?
<td>Printer</td> </tr>
<tr> <td>3</td> <td>Joystick</td>
<td>Plotter</td> </tr>
</table>
</body>
</html>

Use of rowspan attribute in a table :

Program 4 : Output 4 :

<!DOCTYPE html> Colors Red
<html> Green
<head><title> Table with rowspan attribute </title></head>
<body> Note

<table border="3"> bgcolor attribute is
<tr><td rowspan=2> Colors </td>
deprecated in Html5
<td bgcolor=red>Red</td></tr>
<tr> but supported by

<td bgcolor=green>Green</td></tr> browsers. The textbook
</table>
</body> uses it for presentation
</html>
purpose. Html5
36
recommends using

CSS.

Use of colspan attribute in a table : Output 5 :
Colors
Program 5 :
Red Green
<!DOCTYPE html>
<html> Note
<head><title> Table </title></head>
<body> bgcolor attribute is
<table border ="3">
<tr><td colspan="2" align="center"> Colors </td></tr> deprecated in Html5
<tr><td bgcolor=red>Red</td>
but supported by
<td bgcolor=green>Green</td>
</tr> browsers. The textbook
</table>
</body> uses it for presentation
</html>
purpose. Html5

recommends using

CSS.

Note : Html5 related <table> elements are described on page no. 54,55

3.9 Creating hyperlinks in a webpage HTML Link colours :

Hyperlinks are used to connect one  A hyperlink by default appears blue
document with another document. in colour with an underline.

In HTML, Links are created by using  It is not visited by any user.
<a> tag.
 A visited link is underlined and purple.
Note : When you open any website and
click on a text or an image it takes you  An active link is underlined and blue.
to that page. It is known as hyperlink.
Image hyperlink :
Syntax :
Many websites have images as
<a href = ''Mypage. htm''> Click here for hyperlink. For example The previous
my page </a> arrow is an image which on clicking
displays a previous webpage. The arrow
The href attribute in the above syntax is actually an image hyperlink.
is used to specify address of the file (URL)
which needs to be opened on clicking. Syntax :

<a href = "Mypage2.htm"><Img src =
"arrow. gif" alt = "Click on arrow"></a>

37

3.10 Forms in HTML personal information. It does not have
size limitations as in GET method.
Forms in HTML is used to accept
user input. The form in html is created by The <Input> tag
using <form> element as <form></form>.
The <Input> tag is used to specify
Form controls the different types of controls by using
type attribute. Syntax of using <Input>
A form is a collection of different with type attribute is;
elements also called as controls like
textbox, radio button, checkbox, submit Type of control Purpose
button and many more.
<Input type = Creates a one line textbox
Attributes used with form element and
Input element. "text">

<Form> tag can have following attributes Creates a radio button.

 Name : It specifies a name to a form. <Input type = The radio button allows one

 Action : The action attribute "radio"> option selection against
specifies the path where the form is
to be submitted. When user clicks on multiple choices.
submit button if the action attribute Creates a checkbox. It
is committed, the action is set to the
current page. <Input type = allows more than one

 Method : The method attribute "checkbox"> selection against multiple
specifies get or post method to be
used when submitting the form data. <Input type = choices.
Method of form are GET or POST. "submit"> Displays a button for
submitting the form data to
i) GET method : The default method a server.
of submitting form data is GET. The The password input type is
data submitted by using GET is visible
in the address bar. It is better for data <Input type = used to create text
which is not sensitive. The number of
characters in GET method depends on "password"> contents in the form of '*'
browser.
<Input type = asterik or '•' disc.
ii) POST Method : The POST method "reset"> The reset control clears the
of sending data does not display the text content entered in the
form data in the address bar. So it is <Input type = form.
a secure method to submit sensitive or It displays push button

"button"> which activates on events.

Table: 2 <Input> with values of type
attribute

 Attributes of <Input> : Apart from
type attribute, there are attributes
which are specific to a particular
type of controls. The following table
specifies the description.

38

Attribute Description <Textarea> tag :
Type
It describes, the name of the The <textarea> is used to create a
control like text radio etc. eg textbox with multiple lines. The number
type = "radio" of lines and width of the textbox are
specified by using rows and cols attribute
Name Each input field must have respectively. The <textarea> can have
a name. The name attribute following attributes.
is a user defined value. If
the name attribute is not  name : It is used to specify name for
specified, the data of that the textarea. For example name =
input field will not get "ta1".
submitted.
 rows : It specifies the number of lines
Maxlength This attribute is used with in a textarea. For example rows = "5"
text and password type.
It specifies the maximum  cols : It specifies the width of a text
number of characters which area.
can be entered in a text or
password box.  maxlength : It specifies the maximum
number of characters allowed in the
The 'Size' attribute can be textarea.

Size used with text and password  placeholder : It specifies a short hint
type. It specifies the width of that describes the expected value of a
textarea. For example placeholder
the text box. = "your address"

Checked The 'Checked' attribute  required : It specifies that textarea
specifies the default selection must be filled out. i.e. It can not be
for options in a checkbox or blank.
radio button.
Syntax :
Value The 'Value' attribute can be
used with text, checkbox, <textarea name = "tal" rows = "5" cols
radio, submit or reset. = "30" placeholder = "your address"
required> </textarea>
 When used with text type
it specifies default value <Select> tag : <select> tag is used.
in a text box. to create drop-down list.

 For checkbox and radio it The attributes of <select> tag are :
defines value which is sent
on submit. 1) Name - Assigns name to the
control.
Table: 3 Attributes of <Input>
2) Multiple - It allows the user to
select more than one value.

39


Click to View FlipBook Version