IT Tools XI 802 PDF
IT Tools XI 802 PDF
Student Handbook
Class XI
Price : `
First Edition :
© CBSE, India
Copies :
Design & Layout : India Offset Press, A-1, Mayapuri Industrial Area, Ph-1, ND-64
BY
PRINTED BY : M/s.
Preface
Chairman, CBSE
v
Acknowledgements
Advisors
1. Shri Y.S.K. Seshu Kumar, Chairman, CBSE.
2. Shri K.K. Choudhury, Controller of Examinations & Director (V.E.), CBSE
Authors
1. Naveen Kumar, Associate Professor, Computer Science Department, Delhi University,
Convener
2. Anita Goel, Associate Professor, Computer Science Department, Dyal Singh College,
University of Delhi
3. Hema Banati, Associate Professor, Computer Science Department, Dyal Singh College,
University of Delhi
4. Sheetal Taneja, Assistant Professor, Computer Science Department, Dyal Singh College,
University of Delhi
5. Shikha Badhani, Assistant Professor, Computer Science Department, Maitreyi College,
University of Delhi
6. Jyotsna Talreja Wassan, Assistant Professor, Computer Science Department,
Maitreyi College, University of Delhi
7. Mona Adlakha, Visiting Faculty, ARSD College, University of Delhi
vi
Contents
Unit–1: Computer Organization & OS : User Perspective 1
Chapter–1: Computer Organization & OS: User Perspective 2
vii
viii
Paper - I
ix
Unit Code Unit Title Total Hours
ITDC-305 Troubleshooting: Hardware, Software and Networking 10
• Commonly Encountered Problems
• (Monitor: No display, KB/Mouse not responding,
monitor giving beeps, printer not responding, check for
virus, Delete temporary files if system is slow, adjust
mouse speed)
ITDC-306 Work Integrated Learning IT - ISM 14
• Identification of Work Areas
• Work Experience
124
x
Unit - 1
Unit - 1
Unit - 1
Computer Organization
& OS : User Perspective
IT Tools
1
Chapter
1
Unit - 1
u Understanding of Hardware
u Basics of Operating System
This unit aims at making the students aware of the fundamental concepts of a computer
system. The key concepts that will be addressed are
u Hardware
u Software
u Functionality of a computer
u Operating system
u Types of operating system
1.1 Fundamentals
In the technological era that we live in, we use computer day in and day out. It is therefore
but natural that we be aware of what constitutes this machine which solves so many of our
technological and apparently not so technological problems.
In common terminology, we talk of a computer as a machine which executes a set of
instructions provided by the user to produce the desired output. As per Oxford Dictonary,
a computer is defined as “an electronic device which is capable of receiving information
(data) in a particular form and of performing a sequence of operations in accordance with
a predetermined but variable set of procedural instructions (program) to produce a result in
the form of information or signals.”
The language understood by computers is what is termed as binary language, a language
formulated as sequences of 0s and 1s. However, the instructions which are provided by
the user are in the form of English like language. These therefore need to be converted to
2
machine readable format (the binary format i.e. 0 and 1) and then processed by the machine.
Unit - 1
Similarly, the result of the processing is also in a format understandable only to the machine.
This also needs to be converted back into a format which humans can understand. All
this is achieved by an effective co-ordination of the components of the computer; broadly
categorized as hardware and the software.
The term hardware refers to the tangible components of a computer that we can touch and
feel like the keyboard, mouse, monitor. However, the term software refers to the intangible
components like word processor, operating system, and data. The data and/or instructions
given by the user to the machine are termed as Input and the result generated by the machine
for use by humans is termed as Output.
Before we look in detail these concepts let us understand the characteristics of computer that
make it so special!!
IT Tools
3
u Memory: One of the notable features of a computer is its memory. However, the
computer’s main memory is volatile, i.e., it is lost when we switch off the computer.
Unit - 1
Therefore, computers are provided another form of memory that does not fade away
when it is switched off. It is called secondary memory and is available in the form of
floppy disks, pen drives, portable hard disks.
u Storage: Huge amount of data and information can be stored in a computer for
future retrieval. The human memory is limited and fades away with time, which is
not true for a computer.
u Intelligence: In the early days, although computers possessed striking characteristics
yet a prominent drawback was that they are merely dumb machines which were
programmed to perform certain tasks. With the advent of artificial intelligence
techniques, we now have machines which can drive a car without a human driver or
play chess against the best players.
Thus to summarize, this electronic device is capable of storing, processing huge amount of
data and/or instructions with accuracy, diligence and high speed in an untiring manner.
Having seen the characteristics of a computer, now let us understand the way a computer
works.
4
To understand the functionality of a computer we need to understand the processes of task
Unit - 1
execution. Following are the steps to be performed
1. Accepts Input: To initiate the process, the computer needs to be told of the problem
to be solved. For this purpose, a set of instructions and data is provided through the
input devices such as keyboard and mouse. A set of instructions provided to the
computer for doing a task is called a program.
2. Storage: The inputs received in the above step are stored in the computer memory,
called random access memory (RAM). It is also called main memory, primary
memory, or working memory of the machine. Storage plays a very important role.
All the inputs, the intermediate results of computation carried out, and the final
result are stored in the memory of the computer. The computer also has another form
of memory called secondary memory. The programs and data not currently required
are stored in secondary memory. It comes in the forms such as a hard disk, pen drive,
and CDROM. When required, for processing, these can be retrieved and transferred
to the main memory of the computer,
3. Control: The manner in which the program is to be executed is managed by the
control unit of the computer. This entails deciding the address from which the
instructions to be executed is to be picked up, the memory location where the data or
intermediate result is to be stored, etc.
4. Processing: The inputs provided by the user are processed by the central processing
unit as per the specified instructions. The result of the processing is then either
directed to the output devices or to a memory location for storage.
5. Provides Output: The outcome of the computation carried out by the computer is
often directed to the display device such as the monitor or printer. Other forms of
devices are not uncommon, for example, the computer may output music or video.
We have seen above that the input unit receives data, which is stored in the main memory,
from where it gets transferred to the Central Processing Unit and subsequently to the output
device. The Central Processing Unit comprises of two modules; the Arithmetic Logic Unit
and the Control Unit.
Arithmetic Logic Unit (ALU) is responsible for processing of data. It retrieves the data from the
storage unit and performs the arithmetic calculations and/or comparisons on them and the
processed data is then sent back to the storage.
IT Tools
5
Control Unit is responsible for coordination between the different units of a computer. For
example, it coordinates with the peripheral devices to accept the input or display the output.
Unit - 1
6
1.4.1 Components
Unit - 1
u Motherboard: This is the main circuit board which holds together various components
like CPU, memory, connectors for the hard drive and optical drives, expansion cards
to control the video and audio, and connections in the form of various ports (such as
USB ports). It provides a connection to every component of the computer.
u CPU: The motherboard houses the main processor or the CPU (Central Processing
Unit). CPU executes the user instruction and coordinates amongst all other units of
the computer. Thus, it is primarily responsible for the performance of the machine.
There are a variety of processors in the market categorized on the basis of their
speed, technology (dual-core, quad-core, octa-core) and their manufacturers (Intel
and AMD to name just two). Speed of a processor usually measured in megahertz
(MHz) – millions of instructions per second; and gigahertz (GHz) – billions of
instructions per second, is indicative of its power.
u Power Supply Unit: This component of the computer is the one which converts the
alternate current power supply being received by homes or offices to the low voltage
direct current required by the machine.
IT Tools
7
u Hard disk: It is the secondary storage device for storing the data. The program
which is to be executed is first stored in the hard disk from where it is transferred to
Unit - 1
RAM. On completion of work, the program is again saved on the hard disk.
8
Unit - 1
Figure 1.6: A Compact Disk Drive
u Random Access Memory (RAM): This memory storage plays an important role
in the functioning of a computer system. Every time you start up the computer, the
operating system (the system software that manages the device’s interaction with the
peripherals and the internal resources) is loaded in the RAM. The program that needs
to be executed at any point of time also needs to be brought in the RAM. These days
the PCs have around 8-32 GB RAM. More the RAM, more will be the space for the
programs leading to faster execution. Of course, everything in computers is subject
to some limits.
All these components need to work in co-ordination and this is accomplished by the
operating system. It initializes the system for our use. In the next section, we study the basics
of operating systems.
IT Tools
9
Unit - 1
10
Communication Manager: Manages the communication needs of the system, be it
Unit - 1
communicating with the peripheral devices or the internet, are addressed by the operating
system. Each of the peripheral devices like printer, mouse have unique characteristics and
the computer needs to know these unique properties, to interact with them. For this, the
operating system uses special programs called drivers which enable recognition of these
devices and their properties.
Resource Management: The working of a computer system is predominantly dependent on
how its resources are being managed. The resources that we talk of here; are the memory of
the computer, the CPU time, files,secondary storage, input/output devices etc. The operating
system handles the allocation of all such resources, the priority in which these are allotted to
the various processes to get an optimum performance from the system. We discuss here the
prime resource management.
Process Management: A process is a program currently executing in the memory or waiting
for the CPU. In a computer there are multiple processes in the system. The OS manages,
controls, schedules all the processes being executed in the computer. It decides which process
gets the processor and for how long.
Memory Management: For a process to be executed, it has to be loaded in the working
memory that is the RAM (Random Access Memory). The memory management component
of an operating system allocates memory to the processes in a dynamic manner that is
allocated on demand and released when not needed.
File Management: Operating system takes care of all the files and folders (directories)
maintained on the computer disk. The basic tasks that a user needs to perform on files are
creation, renaming, deletion, copying or moving of a file or folder. All the files stored in a
computer system can be located through the file system. Two main types of file system are
File Allocation table (FAT) or New Technology File system (NTFS).
1.5.2 Types of Operating system
Operating systems can be classified in different ways; depending on various parameters.
l Single-tasking and Multi-tasking
Single tasking such operating systems allow execution of only a single program at any given
instant
Mutli-tasking As the name suggests, multi-tasking operating system can execute more than one
programs simultaneously. The processor time, in this case, is divided amongst various processes.
IT Tools
11
l Single user and Multi-user
Unit - 1
Single-user operating systems allow only one user to use the system. The desktop systems
can be classified as typical single user systems
Multi-user operating systems allow many users to access the system by maintaining an
account of all the registered users.
l Real-time Operating System
Operating systems which ensure that the response time is fixed are categorized as real-time
operating systems. They are intended for applications where data needs to be processed
quickly, without any significant delays. For example, an antiaircraft missile system must fire
as soon as it receives signal from the enemy aircraft, before it leaves the bomb and flies away.
l Batch Processing Systems
In a batch processing systems, similar jobs are clubbed together and submitted as a block
to the processor for execution. User intervention is minimal in such systems. The jobs are
picked up one by one and executed.
Exercises
Fill in the blanks
1. The unit used to measure the performance of a computer is ..................... .
2. Two main types of File system are ..................... and ..................... .
3. 1 petabyte = ..................... bytes
Short Answer questions
1. List the various functions of an operating system.
2. Compare batch processing systems and multiprogramming systems.
3. Why do devices need device drivers?
Hands-on Exercise
Check up the configuration of your personal computer and find out the following
a) The processor type, make, speed
b) Amount of RAM
12
c) Hard disk capacity
Unit - 1
d) Number of ports
Do this for few more machines and tabulate the data. Analyze how each of them influences
the performance of the computer system
Identify the operating system installed on your home computer. Classify it on the basis of operating
systems studied in the chapter.
Identify two instances of hard real-time and soft real time systems.
IT Tools
13
14
Unit - 2
Unit - 2
Networking and
Internet
Chapter
2
Networking and Internet
Unit - 2
In the beginning of civilization humans communicated via means such as oral, gestures,
and touch. Knowledge transcended from one generation to another largely by way of oral
traditions, and later on by inscriptions on stone and metal until early forms of paper were
developed. However, education remained largely confined to the elite until the invention of
printing press by Johannes Gutenberg, around 1440. It lead to dissemination of information
through newspapers and books and provided a new and versatile method of communication
of information. This was followed by the era of telegraph and telephone marking nineteenth
century. Twentieth century saw the development of commercially viable radio and television
which became instrumental in dissemination of information and entertainment. ARPANET
that began with a network connecting computers in a few organizations in early sixties paved
the way for Internet in early eighties that revolutionized not only the exchange of information
amongst individuals and organizations, but also the way organizations do business, and the
people educate, entertain, and organize themselves. Social networking, instant messaging,
voice calls (through VOIP), media are influencing the definition of Internet being used.
16
Len Kleinrock came forward with the idea of digital packet switching in which the message
to be transmitted is divided into small chunks called packet. Unlike circuit switching in
which resources are reserved along the dedicated path of communication, packet switching
is based on link sharing.
US Department of Defense realized the need to connect geographically separated research
computers together to form a network. This led to the development of Advanced Research
Projects Agency Network (ARPANET) in 1969 (Figure 2.1). ARPANET made use of
Unit - 2
technology called digital packet switching. Initially its use was restricted to non-commercial
purpose such as military and research. Subsequently, its use extended to education by
supporting various educational institutes.
Source: http://personalpages.manchester.ac.uk/staff/m.dodge/cybergeography/atlas/arpanet4.gif
Figure 2.1: ARPANET
Need for communication between various heterogeneous networks led to the development
of TCP/IP (Transmission Control Protocol/Internet Protocol) in 1970. Along with several
smaller networks, another large network called NSFNET was developed in 1984 by NSF,
U.S. National Science Foundation for research and education purpose. When ARPANET
and NSFNET were interconnected, the network growth increased tremendously. TCP/
IP protocol (rules for communication) acted as a glue to connect various heterogeneous
networks together into a single network. This wide network is an Internet (network of
networks).
IT Tools Level - 3
17
With the advent of Internet, the whole world got connected on a global level. In mid 1990s,
the number of nodes connected through Internet began to grow exponentially. Several
government and private organizations, collectively called Internet Service Providers (ISPs)
joined hands to provide connectivity for Internet. Internet made it possible to exchange
information and communicate with remote nodes. There are several applications of Internet
such as e-mail, file transfer, remote login, and World Wide Web (WWW).
Nodes or stations are electronic devices such as computers, printers, Fax machines, and
telephones which communicate with each other by sending and receiving data/message.
Figure 2.2 depicts a one-way simple communication system that comprises the following
components:
u Sender: The node that is responsible for sending the data.
u Receiver: The node that is responsible for receiving the data.
u Message: Message is the information or meaningful data that is being communicated
in a structured form.
u Channel: Channel is the communication medium through which message is
transmitted.
Channel
Message
Sender Receiver
Figure 2.2: One-way Communication System
18
receive at the same time. The interactive applications use this mode of communication, thus
speeding up the data transfer. NIC (Network Interface Card) on the systems for networking
supports full-duplex mode.
Computer networks can be used as means of resource sharing and communication.
u Resource Sharing: Connecting computers through networking allows us to
share hardware and software resources. Examples of hardware resources include
Unit - 2
peripherals (for example, printers and scanners), CPU, and memory. Examples
of software resources include system and application software, and files that
may include text, audio, and video content. Note that in the network shown in
Figure 2.3, all the three computer systems are connected with each other and to the
printer through the network facilitating sharing of printers.
Printer
IT Tools Level - 3
19
2.2.1 Transmission Medium
A transmission medium refers to the channel of transmission through which data can be
transmitted from one node to another in the form of signal. A signal encodes the data in a
form suitable for transmission on the medium. A medium is characterized by its bandwidth
defining the information carrying capacity of the medium. A transmission medium may
belong to one of the following two categories:
u Guided Medium: The term refers to physical conductor such as twisted pair, coaxial
Unit - 2
cable, and fiber optics. In twisted pair and coaxial cable, the signal travels as voltage
and current signal whereas in optical fibre, the signal is in the form of light.
u Unguided Medium: The unguided medium uses electro-magnetic waves that do not
require a physical conductor. Examples of unguided medium include infrared, radio,
and microwave.
2.2.2 Topology
The arrangement (also called layout) of nodes in a network is called network topology.
There are broadly two types of topologies – broadcast and point to point. In broadcast
topology, all nodes share the same physical link. When one node transmits, all nodes
receive. Collision may occur when more than one node simultaneously transmits, and there
is collision resolution mechanism for handling it. Broadcast topologies are mainly bus and
ring. In point to point topology, every pair of nodes has a dedicated link. Popular point to
point topologies are star and mesh.
u Bus Topology
In bus topology, there is a long cable, called backbone cable (or simply backbone), that
connects various nodes through connector called tap as shown in Figure 2.4. In this, a
message sent by one is received by all devices connected to backbone cable. This topology
requires less cabling and is easy to install and extend the network laid using it. However,
fault detection and isolation is difficult.
Terminator
Tap
Cable
Tap Tap Tap
20
u Ring Topology
In ring topology, all the devices are attached through a cable in the form of ring as shown
in Figure 2.5. The message to be communicated is transmitted in one direction, thereby,
relaying the message to the intended recipient. Addition and deletion of devices, and fault
detection and isolation is easy. However, the topology suffers from the limitation of single
point failure leading to disruption of entire network. Sending a message from one node to
another node may take more time (four steps while sending message from device A to E)
Unit - 2
Device A
Device B
Device E Device C
Device D
u Star Topology
In star topology, all the devices are connected to the central controller called hub as shown
in Figure 2.6. Communication between any two devices takes place through the hub
responsible for relaying messages. Star network can be easily installed and configured. Also,
fault detection and isolation is easy. However, it requires more cabling as compared to bus
and ring topology. Also, hub failure will lead to network failure.
IT Tools Level - 3
21
HUB
Unit - 2
u Tree Topology
Tree topology is a hybrid topology using combination of star and bus topology. Backbone
cable in a bus topology acts like the stem of the tree, and star networks (and even individual
22
nodes) are connected to the main backbone cable like the branches of tree as shown in
Figure 2.8. Damage to a segment of a network laid using tree topology will not affect other
segments. Installation and configuration is difficult as compared to other topologies. Also, if
the backbone cable is damaged, the entire network communication is disrupted.
S
R
Unit - 2
H3
B
C Hub Q
H1
Hub
P
D O
E N
F M
G
H4
L
Hub
H H2
Hub Backbone
Cable
K
I J
IT Tools Level - 3
23
Unit - 2
Headphone
u MAN stands for Metropolitan Area Network. It may be owned by a single organization
or by many individuals or organizations. These networks are used to establish link
within a city, and span an area of radius up to 50 Km. MANs facilitate sharing of
resources by connecting various local area networks (Figure 2.10). For example, a
cable television network within a city.
LAN 1
MAN
LAN 2
LAN 3
u WAN stands for Wide Area Network. Typically a WAN spans a segment of about
1000 Km. They are used for long distance communication and are well suited for
connecting remote areas. They establish link within a country or continent. A WAN
may be owned and managed by several organizations. It connects various local and
metropolitan area networks as shown in Figure 2.11.
24
MAN
MAN
N
MA
Unit - 2
N
LA
IT Tools Level - 3
25
u Hub
Unlike a repeater which connects two cables, a hub connects several lines, also called, cable
segments. A hub comprises several input/output (I/O) ports, each of which connects to a
single cable as shown in Figure 2.13. Data arriving on an incoming line is output to all lines
except the line on which the hub receives the data.
Unit - 2
HUB
u Bridge
A bridge is a multiport device used for connecting two or more local area networks (LAN),
possibly operating at different speeds as shown in Figure 2.14. Thus, a bridge may be used
to produce bigger LAN by combining smaller LANs. A bridge enables devices on one LAN
segment to communicate with the devices on another LAN segment. Unlike hubs, they
are intelligent devices which exercise discretion while forwarding data to the outgoing line
leading to destination.
26
u Switch
Unlike bridges which connect two or more LAN segments, switches are used to connect
individual nodes in the network with each other. Each node within network is connected to
a unique port in the switch as shown in Figure 2.15. On receiving the incoming data frame,
it forwards it to only single line connecting to the destination node. All the nodes connected
through switch forms only one LAN.
Unit - 2
Figure 2.15: Switch
u Router
Routers are used for connecting various networks (LAN or WAN) with each other as shown
in Figure 2.16. A router transmits data from incoming network to another network. A router
maintains a routing table of various networks. Based on the destination address, the router
determines to which network the incoming packet should be transmitted.
IT Tools Level - 3
27
u Gateway
A gateway connects networks based on different protocol technologies to communicate with
each other. Data coming from one network operating on one protocol is converted according
to the protocol of outgoing network, and then forwarded. Thus a gateway may be thought of
as a router equipped with software for protocol conversion.
2.3 Internet
Unit - 2
A wide network of networks i.e. interconnection of WANS form the global Internet. It
is neither owned by any single individual nor by any single organization. It has made it
possible to exchange information and communicate with remote nodes. One can access the
Internet using several means such as leased line, dial-up access, and wireless connectivity.
The machines on the Internet are known as hosts. The machine that initiates a request is
called client and the machine that processes a client request is called server.
Communication between any two machines on the Internet is governed by the universal
TCP/IP protocol – glue that holds entire Internet together. A network protocol defines
the rules and conventions of communication that must be followed when two devices
interact with each other. It specifies what should be communicated, and how and when
communication should take place.
There are several applications of Internet such as e-mail, file transfer, remote login, and
World Wide Web (WWW) listed below:
u Electronic Mail (E-Mail)
An email may be a written text and may include multimedia attachment consisting of text,
audio, image, or video. Sender of the e-mail may send it to one or more intended recipients.
Sending and receiving of mails can take place through web based e-mail application also
called webmail application, (such as, Gmail, Windows Live Hotmail, and Yahoo), or a
desktop based e-mail applications (such as, Microsoft outlook, Thunderbird, mail application
on mobile phone). Transferring mail over the Internet is governed by a set of rules known
as email protocols such as SMTP (Simple Mail Transfer Protocol) and POP3 (Post Office
Protocol).
u File Transfer
Transferring files from one machine to another through a TCP based network is done using
FTP (File Transfer Protocol). File Transfer Protocol is based on client server architecture.
Using FTP, local host (client) can download or upload files to and from remote host (server).
28
u Remote Login (TELNET)
TELNET stands for TErminaL NETwork. It is a client server based application that allows
the user working on one system to access a remote system. For initiating remote login, the
user (client) should specify the address of remote system, and should authenticate himself/
herself using username and password mechanism. On successful login, the client can access
the remote system. TELNET service is often used for accessing data on the remote host, or
executing on the server the applications installed on it (server).
Unit - 2
u World Wide Web (WWW)
World Wide Web (WWW), commonly known as web, is a repository of information on
machines spread all over the Internet and linked to each other. The information is organized
in the form of documents called web pages. A web page may contain text, images, audio,
videos, and information for linking the web pages in the form of hyperlinks. WWW uses
distributed client server architecture based on HTTP (Hyper Text Transfer Protocol). The
client request is relayed through Internet to the appropriate server, which sends back the reply
through Internet to the host system. A simplified view of how a request for information on
WWW may be handled on WWW is shown in Figure 2.17.
IT Tools Level - 3
29
requires several sub-tasks such as specifying sender and receiver’s network and physical
address, dividing the message into smaller fragments so that they can be easily transmitted
over Internet, taking appropriate measures for error and flow control, and taking necessary
action on receiving the message. These sub-tasks or functions are performed by different
layers of TCP/IP model as shown in Figure 2.18.
Application Layer
Unit - 2
Transport Layer
Internet Layer
Link Layer
As shown above, TCP/IP model comprises of four layers, Application layer, Transport layer,
Internet layer, and Link layer. On each layer, several protocols operate which define rules for
transmission of data.
Data/message is created at the sender’s end at Application layer. At the receiving end
it is examined and processed (possibly displayed) at Application layer. This layer is also
responsible for enveloping the message to be sent with the header. Several protocols such as
HTTP, SMTP, POP3, and TELNET (remote login) operate on this layer.
Application layer passes the message to the Transport layer which appends the information
about the source and destination ports of the processes at two ends. At the ends, the ports
process the message. Mainly two end-to end protocols operate at this layer, namely TCP
and UDP. TCP (Transmission Control Protocol) is a reliable connection-oriented protocol
needed when timely and error free delivery of data is important. UDP (User Datagram
Protocol) is an unreliable connectionless protocol needed in a scenario such as exchange
of short messages and client server request-reply messages, where immediate response is
more important rather than assured delivery. Also it may be used as a transport protocol
for streaming video because the occasional loss of a packet is acceptable. Further, transport
layer divides the message into a number of fragments, called segments, depending upon
the maximum transmission size permitted. In TCP, each segment will carry the sequence
number denoting its relative position in the message, so that, the message can be assembled
at the receiver end by the transport layer at recipient’s end.
Transport layer hands over the segments to the Internet layer which adds source and
destination machine network address (also termed IP address). Internet layer is mainly
30
responsible for packet routing and injects packets into the network that may take independent
path to the destination, and thus may arrive out of order at the destination. At the receiving
layer, message is reassembled in the correct order. In the Internet layer, Internet Protocol
(IP) is used. IP defines the format of packets exchanged over the Internet. This protocol is
usually accompanied by three other protocols, namely, Internet Control Message Protocol
(ICMP), Address Resolution Protocol (ARP), and Dynamic Host Configuration Protocol
(DHCP).
Unit - 2
Link layer is also called Host to Internet layer. This layer is responsible for adding the header
containing sender and receiver physical address to the packet received from Internet layer.
The resulting message is called frame. It may be noted that recipient’s physical address
corresponds to the physical address of the next host on the network to which message is to
be relayed, and not (necessarily) the physical address of the destination machine.
Suppose host 1 wishes to send a message Hello to host 2. Diagram in Figure 2.19 illustrates
how layer by layer message is processed at the host 1 and host 2.
TCP/IP TCP/IP
stack of stack of
Host 1 Host 2
IT Tools Level - 3
31
number of users are leading to security issues such as misuse of data, hacking, copyright
issues and many more.
2.5.1 Malwares
The term malware refers to malicious software (programs) designed with the intension to
affect the normal functionality by causing harm to the system, or with the intension of
getting unauthorized access to the system, or denying access to legitimate users of computing
resources. A malware may be virus, worm, Trojan horse, or spam.
Unit - 2
u Virus
A virus is a software code that may harm your system by overwriting or corrupting the
system files. A computer virus is similar in action to viruses in our body which replicate
themselves and affect body cells. The affected part is called infected area. A computer virus
may make several copies of it by inserting its code onto the system programs, files or boot
sector of hard drives and thereby may corrupt them. This causes the system to slow down or
even stop functioning. The viruses are mainly categorized as boot sector virus, file infector
virus, and macro virus.
Boot sector viruses affect boot record of the disks. These are the memory resident viruses
that embed themselves into the disk area and are activated when the drive is started (booted
up), for example, Michelangelo virus. File Infectors are the viruses that attach themselves
to executable files either by overwriting a part of their code or by appending their code to
the files, for example, Romeo and Juliet virus. Macro viruses embed themselves into the
documents. These viruses are executable files which are often received as email attachments.
When attachment is opened, viruses starts functioning by affecting the system programs (by
deleting, creating or overwriting other files), and may get forwarded to others whose email
id appears in the address book. Melissa is an example of such a virus, which got spread
through a Microsoft word document sent as an email attachment.
u Worm
A worm is often received via network, and it automatically keeps on creating several copies
of itself on the hard disk thereby flooding the hard disk. When worm is received as an email
attachment, it is automatically forwarded to the recipients leading to network congestion.
Thus a worm may crash the system and entire network. No host application is required
for worms to replicate themselves. For example, Code Red Worm which makes more than
2,50,000 copies of itself in approximately 9 hours.
32
u Trojan Horse
Trojan Horse is a code that appears to be desirable and useful but ends up harming the system.
Trojan horse can attach itself with a safe application. For example, it may be attached to any
game downloaded over Internet. Such an application when executed creates a backdoor in
the system through which a hacker can access the system. The hacker can monitor all the
activity performed on the system. He can also control the infected system by harming the
data on the system. For example, in late 1990s, Trojan Horse named Sub7 was created which
Unit - 2
took advantage of security flaw of earlier version browsers such as Internet Explorer and
Chrome to illegally access the host computer.
u Spam
Spams are the unwanted electronic mails, generally sent in bulk over the Internet to recipients.
Such undesirable mails are generally commercial mails sent for advertisement purpose.
However, they may contain link to phishing sites that attempts to steal user information or
link to sites that contain malware or infected files. Spam mail filters used by e-mail software
can be used to prevent spam mails.
2.5.2 Phishing
Phishing refers to the act of stealing user’s personal information through fraud mails. These
mails either entail personal information through embedded forms, or contain links to the
web page that may prompt you to provide this information. Information attempted to be
stolen may include bank account number, debit/credit card number, passwords or any other
valuable data.Few main causes that make end users victims of phishing include:
u Lack of awareness
Many a times we end up providing our account information in the mails received from our
bank. Such mails though appear to be legitimate but are fraudulent. Lack of awareness that
bank will never ask for account PIN and password either through mail or message make us
prey of these targeted attacks.
u Misleading Mails
Often fraud mails received contains tempting information such as bag a lottery prize, or a
warning indicating closing of account in case of failure in proving account details.
u Lack of Security
Lack of inadequate security measures on computers is also a main cause that makes us fall
prey to phishing.
IT Tools Level - 3
33
2.5.3 IPR Issues
The intellectual property is the work produced by a person or an organization using the mind
and creativity. The intellectual property comprises of intangible assets such as literary work,
artistic work, a work of music, and an engineering design. Intellectual Property Rights (IPR),
are the rights of a person or an organization on intellectual property. Commonly defined
Intellectual Property Rights include patents, copyright, industrial design rights, trademarks,
trade dress like visual appearance of a product or its packaging, and trade secrets. There are
Unit - 2
various issues concerned with these rights such as piracy of software, plagiarism (presenting
the literary work done by someone as own work), trademark violations, patent violations,
and copyright violations.
2.5.4 Hacking
Hacking may be described as having unauthorized access to someone’s computer or
computer network for stealing resources such as password or confidential files, or causing
harm to network or system. A hacker identifies the vulnerabilities of the system in order to
achieve this. A hacker may be driven by several reasons for doing so such as his/ her own
personal interest, as a means of fun, or protest. Hackers are also categorized as good hacker
and bad hacker. Bad hacker hacks the system with bad intensions whereas good hacker tries
to hack system in order to identify its weaknesses so that they can be isolated. These bad
(unethical) hackers are termed crackers, as opposed to good (ethical) hackers.
34
a match. In case of a match, they are declared as potentially harmful, and are disabled and
removed depending upon anti-virus software settings.
2.6.2 Protection using Firewall
A firewall aims at protecting the internal network of an organization, home, or individual
from malicious traffic from external networks. A router or a computer (often dedicated to
serve as a firewall) may be installed between external network and internal network for this
purpose. Firewall inspects the network traffic, and allows only that data to pass through
Unit - 2
the network that does not violate the security constraint. Hardware firewall in form of
router prevents malicious software from entering your network from outside network.
However, software firewall installed on personal computer prevents unauthorized access or
malwares from gaining access to personal computer. An example of a firewall is shown in
Figure 2.20. Network firewalls may also encrypt the incoming data by converting it to non-
readable format, thus, adding further protection.
d
cke
Blo
T
RNE
INTE
Computer
Firewall
IT Tools Level - 3
35
u Never disclose personal information such as account details, passwords, credit and
debit card details, and other valuable information. Also, report phishing issues to the
concerned authorities. In case of unsolicited mails, mark them as spam mails.
u Security of the communication made over the Internet can be indicated by the
security of protocol being used. Secured Hyper Text Transfer Protocol (HTTPs) is a
secure version used for communication between client and host on the Internet. So,
ensure that all communications are secure, especially online transactions.
Unit - 2
u The security of website can be ensured of there is padlock on the left side of address
bar. It indicates that website has a SSL (Secure Socket Layer) digital certificate issued
by trusted party which ensures and proves identity of remote host.
u Ensure that the web browser being used for accessing web is updated and is secure.
For example, chrome browser is up to date, if the security patch indicated by three
horizontal lines on top right corner is grey in color. Green, orange and red color
security patch indicates that browser update is available for two, four and seven days
respectively.
u Make sure that the website address is properly spelled. Because there may be two
websites with almost same name, one being a phishing website.
u The anti-virus software should be up to date.
u Delete cookies periodically. A cookie is small piece of information about the client
browsing a website. On receiving a request from a client, the server records the client
information such as domain name and registration id on the server site in the form
of a file or a string. The server sends this cookie along with response requested by
the client. At the client side, the browser stores this cookie received from the server
in a directory called cookie directory. By obtaining access to these cookies, hacker
may gain unauthorized access to these websites. Thus, cookies should be deleted
occasionally along with the temporary files stored on our system during web browsing.
36
3. Stealing someone’s personal information through phishing
4. Hosting a site carrying lots of malwares or being a source for spreading them.
5. Harassing someone through mails, messages or social networking.
6. Posting offensive content on any site or sending it to anyone.
7. Defaming someone using Internet.
Unit - 2
8. Forging someone’s digital signatures
9. Indulging in fraudulent financial transaction
10. Providing misleading information to clients/ general public through use of Internet
resources
11. Intellectual Property theft
Cyber laws are the laws for systematic use of e-resources, for example, e-business, and
serve as a measure against illegal cyber-crime. Various cyber laws have also been enacted
to prevent cyber-crimes and take action against those involved in such crimes. These laws
define the action that would be taken against people committing the offences. For cyber
security, an amendment in IT Act 2000 named Information Technology Amendment Act,
2008 was also introduced. The act also defines offences and penalties for cyber-crime. Cyber
police is responsible for detecting such crimes and taking the necessary measure against it in
accordance with IT Act.
IT Tools Level - 3
37
available on these sites. So, users need to be aware while posting or accessing any data as it
may lead to data theft, data misuse or can be a source of malware.
Social networking can also take place in discussion forum and chat room setting. Discussion
forums allow people to share their queries and views by posting on them. Anyone can initiate
a discussion by placing a post on discussion board, and can also comment on the posts
initiated by others. People participating in a discussion need not be online all the time. These
forums are managed by a moderator, who control the content posted on it. Chat room
Unit - 2
setting is similar to discussion forums, where people can discuss their ideas and queries;
however, they need to be present online in order to participate in the currently ongoing
discussion.
Though social networking offers several benefits to the users, it also has various safety
concerns. One need to follow below mentioned safe practices while getting involved in social
networking:
u Do not post any personal information and photos on the social networking site as
it may be misused against you by some unethical user. Personal information even
includes details such as date of birth, home address, personal phone number, and
work history details.
u Take accountability while posting anything on the social networking site as it will be
permanent and can be used for making analysis about you.
u It is always better to set your own privacy settings, rather than going for default
settings. You should limit the access to your profile only to selected group of people.
Also, you can limit the people who can search you by your name.
u Be selective while making friends on the social networking site. Do not send or accept
friendship request from any unknown user. Also, trust the authenticity of a message
only if you are sure about its origin (sender).
u Do not post any offensive content on social networking site as it may lead to a criminal
action against you.
u Beware before spreading any kind of a rumor as it may be treated as a cyber-crime.
u If someone is harassing or threatening you, take snapshot of it as a proof, and block
the person. Also, report the incident to the site administrator.
u Also, take all protective measures while accessing Internet such as protecting the
system using anti-virus and firewall, secure browsing, and password management.
38
2.9 Digital Literacy
Digital literacy refers to raising knowledge and awareness about technology such as desktop
computers, smartphones, tablets, and other electronic gadgets. It also includes familiarity
with software tools and Internet. This knowledge facilitates people to acquire, analyze, share,
create, and deliver information in efficient and constructive way. Digital literacy also aids
people in several arenas such as education, social networking, e-commerce, healthcare, and
tourism. Especially in education, it provides learners with the digitally enhanced learning
Unit - 2
through use of technology. They can use technology to access Massive Open Online Courses
(MOOCs) which are providing opportunities to study irrespective of the boundaries of time
and space. Moreover, Prime Minister Narendra Modi has taken an initiative to makeIndia,
a Digital India to use technology proficiently and ethically. The campaign promotes building
up of India-wide digital infrastructure to provide government services digitally to people
even in remote areas.
Points to Remember
u A communication system comprise of four components: sender, receiver, messages,
and channel.
u A collection of interconnected nodes (electronic devices such as computers, printers,
fax machines, and telephones) which communicate by means of some channel form
computer network.Computer networks can be used as means of resource sharing and
communication.
u A transmission medium refers to the channel of transmission through which data can
be transmitted from one node to another. A transmission medium can be categorized
as guided and unguided medium.
u Guided medium refers to the physical conductor such as twisted pair, coaxial cable,
and fiber optics. The unguided medium uses electro-magnetic waves that do not
require a physical conductor, for example, infrared, radio, microwave, and satellite
links.
u The arrangement (also called layout) of nodes in a network is called network topology.
u In bus topology, there is a long cable, called backbone cable (or simply backbone),
that connects various nodes through connector called tap.
u In ring topology, all the devices are attached through a cable in the form of ring.
u In star topology, all the devices are connected to the central controller called hub.
IT Tools Level - 3
39
u In mesh topology, all nodes are connected with every other node in the network.
u Tree topology is a combination of star and bus topology. Backbone cable in a bus
topology acts like the stem of the tree, and star networks (and even individual nodes)
are connected to the main backbone cable like the branches of tree.
u LAN stands for Local Area Network. They are private networks and can span a
radius of up to 1Km. They are generally established within a building or campus.
Unit - 2
u MAN stands for Metropolitan Area Network. It may be owned by a single organization
or by many individuals or organizations. These networks are used to establish link
within a city, and span an area of radius up to 50 Km.
u WAN stands for Wide Area Network. Typically a WAN spans a segment of about
1000 Km. They establish link within a country or continent.
u A repeater is used to restore the input signal to its original form, so that it can travel
a larger distance. It is also known as digital regenerator.
u A hub comprises several input/output (I/O) ports, each of which connects to a single
cable segment.
u A bridge is a multiport device used for connecting two or more local area networks
(LAN), possibly operating at different speeds.
u Switches are used to connect individual nodes in the network with each other.
u Routers are used for connecting various networks with each other. A router transmits
data from incoming network to another network.
u A gateway connects networks based on different protocol technologies to communicate
with each other.
u A wide network of networks is known as Internet. It has made it possible to exchange
information and communicate with remote nodes.
u A network protocol defines the rules and conventions of communication that must
be followed when two devices interact with each other. It specifies what should be
communicated, and how and when communication should take place.
u An email may be written text and may include multimedia attachment. Sender of the
e-mail may send it to one or more intended recipients. Sending and receiving of mails
can take place through web based e-mail application.
40
u FTP is a File Transfer Protocol used for transferring files from one machine to another
through a TCP based network.
u TELNET stands for TErminaL NETwork. It is a client server based application that
allows the user working on one system to login and access a remote system.
u World Wide Web (WWW), commonly known as web, is a repository of information
on machines spread all over the Internet and linked to each other.
Unit - 2
u A web page may contain text, images, audio, videos, and information for linking the
web pages in the form of hyperlinks.
u The TCP/IP (Transmission Control Protocol/Internet Protocol) is the glue which
holds Internet and WWW (collection of servers where information is stored) together.
u The term malware refers to malicious software (programs) designed with the intension
to affect the normal functionality by causing harm to the system, or with the intension
of getting unauthorized access to the system, or denying access to legitimate users of
computing resources.
u A virus is a software code that may harm your system by overwriting or corrupting
the system files. A computer virus may make several copies of it by inserting its code
onto the system programs, files or boot sector of hard drives and thereby may corrupt
them.
u A worm is a malware often received via network, and it automatically keeps on
creating several copies of itself on the hard disk thereby flooding the hard disk.
u Trojan Horse is a code that appears to be desirable and useful but ends up harming
the system. Trojan horse can attach itself with a safe application. Such an application
when executed creates a backdoor in the system through which a hacker can access
the system.
u Spams are the unwanted electronic mails, generally sent in bulk over the Internet
to recipients. Such undesirable mails are generally commercial mails sent for
advertisement purpose. However, they may contain link to phishing sites that attempts
to steal user information or link to sites that contain malware or infected files.
u Phishing refers to the act of stealing user’s personal information through fraud mails.
These mails either entail personal information through embedded forms, or contain
links to the web page that may prompt you to provide this information.
IT Tools Level - 3
41
u The intellectual property is the work produced by a person or an organization using
the mind and creativity. Intellectual Property Rights (IPR), are the rights of a person
or an organization on intellectual property. Commonly defined Intellectual Property
Rights include patents, copyright, industrial design rights, trademarks, trade dress
like visual appearance of a product or its packaging, and trade secrets.
u Hacking may be described as having unauthorized access to someone’s computer
or computer network for stealing resources such as password or confidential files, or
Unit - 2
Exercises
1. Give the full form of following terms:
(a) ARPA
(b) LAN
(c) MAN
42
(d) WAN
(e) WWW
(f) TELNET
(g) IPR
2. Differentiate between the following:
Unit - 2
(a) Bus and Star Topology
(b) Star and Tree Topology
(c) Star and Mesh Topology
(d) Ring and Bus Topology
(e) LAN and WAN
(f) LAN and MAN
(g) MAN and WAN
(h) Internet and WWW
(i) Hacker and Cracker
3. What is the purpose of network devices? Explain following network devices.
(a) Bridge
(b) Router
(c) Repeater
(d) Switch
4. Which of the following listed acts are cyber-crimes?
(a) Copying data from someone’s computer without his permission.
(b) Stealing someone’s device.
(c) Accessing one’s bank account for carrying online transactions.
(d) Modifying the official documents without permission.
IT Tools Level - 3
43
(e) Creating a fake identity and posting on someone’s behalf.
(f) Sending friend request to someone on social networking site.
5. What is the difference between Email and Chat?
6. What are cookies?
7. Differentiate between firewall and antivirus. How both contribute to the security of
the system?
Unit - 2
8. Define protocol.
9. Explain TCP/IP Model.
10. What is the significance of cyber law?
11. How TELNET is used for remote login?
12. List the various security issues concerned with using Internet. Explain each of them
by giving proper examples.
13. List various protective measures that can be taken for network security.
14. Define cyber-crime and cyber law.
15. Define social networking. List safe practices that should be followed on social
networking.
16. Define Digital Literacy.
44
Unit - 3
Unit - 3
Office Automation
Tools
Chapter
3
Word Processing
3.1 Introduction
A word processing software is required for the creation of documents that are text-based. It
has tools that allow the user to edit, format and print document. A word document may also
contain pictures and tables. It may be a report, letter, drawing, webpage etc.
Unit - 3
OpenOffice Writer is a popular open source software for word processing. It can be
downloaded from Internet and installed for free, on Linux-based machines as well as
Windows-based machines. In this chapter we discuss the usage of OpenOffice Writer
software in detail.
46
3.3 Openoffice Screen and its Components
The main screen of OpenOffice Writer is shown in Figure 3.2. It consists of different
components like Tabs, Ruler bar, Status bar, Scroll bar and Work Area. The Writer layout
and its general features are described as follows:
Unit - 3
Figure 3.2: OpenOffice Writer Screen
u Tabs: (File, Edit, View, Insert, etc.) contain drop down menu which have commands
provided by the tab.
u Ruler Bar: There are two rulers – Horizontal and Vertical. The Ruler Bar allows us
to adjust the indentation and margins.
u Status Bar: It displays information about the current open document. It displays the
current page number, total pages in the document, zoom slider etc.
u Scroll Bar: There are two scroll bars – horizontal and vertical. They help to scroll the
content or the body of document.
u Work area: It is the working area where the text of the document is typed.
IT Tools Level - 3
47
3.4 Writer Tabs
The OpenOffice Writer has the following tabs: File, Edit, View, Insert, Format, Tools,
Modify and Window. There is also a help tab. On clicking any of the tabs, a drop down
menu appears which has several commands and options. Select the command that you want
to execute.
The key tasks that can be performed using the tabs are as follows-
u File: To apply commands to current document, to open or close document
u Edit: For editing the current document, for example, cut, paste
u View: For controlling display of document on the screen
Unit - 3
u Insert: For inserting new elements in document, like, comments, special characters,
graphics, and objects
u Format: For formatting the layout and content of document
u Tools: For spelling check, gallery of object art to add to document, to configure
menus
u Table: To insert, edit, delete a table in a text document
u Windows: For manipulating and displaying document windows
48
Unit - 3
Figure 3.3(a): File tab
IT Tools Level - 3
49
Some operations performed using the commands of the File tab are described as follows -
u Using New: When you click <File><New>, a drop down menu appears Figure 3.3
(b). To create a document, select <Text Document>.
u Using Save As: This is used when you want to
(1) Save a file for the first time, or
(2) Save an already saved file with a different name.
When you click <File Tab> <Save As>, a Save As dialog box appears Figure 3.4. You can –
r Select folder (directory) where the file is to be saved,
r Type the File name for the document,
r Select “save as type” of document (.odt etc.)
Unit - 3
u To preview your document before printing: <File><Page Preview>. You can see
how the printed page will look like after printing. You can see multiple pages, full
50
pages (use magnifying glass to zoom in and out). Click <Close Preview> to go back
to the document.
u To Make Printer Setting: <File Printer Setting>. Make settings for the printer.
u To Print:<File><Print>: Print the document to the connected printer. You can select the size of
the paper, print multiple pages on a single sheet etc.
3.4.2 Edit Tab
The Edit tab consists of commands required to perform editing on the current document. It
contains several commands as shown in Figure 3.5. The commands which are required to
be known at this stage are described in the figure. The commonly used commands allow the
user to – cut, copy, paste, find & replace, undo and redo changes in the current document.
Unit - 3
IT Tools Level - 3
51
Some operations performed using the commands of the Edit tab are described as follows:
u Move Text: Remove the text to be moved by selecting the text and then applying
<File><Edit><Cut>. Then take the cursor to the place in document where you
want to move the text. Then do <File><Edit><Paste>.
u Copy Text: Select the text to be copied and then apply <File><Edit><Copy>. Then
take the cursor to the place in document where you want the copied text. Then do
<File><Edit><Paste>.
u Find and Replace: This is used to find words and then replace it with the new one
(Figure 3.6). This option is useful to find word at multiple places in the document and
replace all of them with the new one.
Unit - 3
52
Unit - 3
Figure 3.7: View Tab
IT Tools Level - 3
53
Some operations performed using the commands of the Edit tab are described as follows -
u Toolbars: Select <View><Toolbars>. A drop down menu appears, as shown in
Figure 3.8. Select the toolbars that you want to be displayed on the screen. A displayed
toolbar shows the icons for the commands, as shown in Figure 3.8. Generally, Standard
and Formatting options of toolbars are always selected.
be known at this stage are described in the figure. The commonly used commands allow the
user to insert page number, date, header, footer, tables, hyperlinks etc. in the current document.
54
When using an Insert tab to insert an element, the insertion of element in the document
happens at the location where the cursor is present on the screen. So you must place the
cursor at the right location on the screen before inserting the element. Also, when using
insert, a dialog box may open for further settings and selection. Please choose the options
in the dialog box and proceed further. The dialog box are self-explanatory. Some operations
performed using the commands of the Insert tab are described as follows -
u Insert Header: <Insert> <Header> <Default> : A Header box opens in the upper
part of the document. Enter the content you want to write in the header.
u Insert Footer: <Insert> <Footer> <Default>: A Footer box opens in the lower part
of the document. Enter the content you want to write in the header.
u Insert Fields: <Insert> <Fields>: A pop-up menu appears (Figure 3.10). Select the
element to be inserted. The selected element will insert at the location of the cursor.
Unit - 3
If you want to insert the field in the header or footer, then first select header/footer.
Place the cursor in the correct position and then insert page number, time, date,
author name, etc.
u Insert Hyperlink: <Insert> <Hyperlink>: A dialog box opens. On the left side of
the dialog box, select where you want to link – a webpage, document, mail or to a
new document. Then fill the details path, Form (text, button), etc. The Text is the
name that appears in your document as hyperlink. Figure 3.11 shows an example.
u Insert Table of Content: <Insert> <Indexes & Tables> <Indexes & Tables>: A
dialog box appears. In Type, select Table of Content. Click OK. A table of content
will be inserted in your document.
u Insert Table: <Insert> <Table>: A dialog box appears. Enter the table name, number
of rows and columns. Click OK. A table is inserted in the document. A table toolbar
appears which allows you to format the table.
u Insert Formula: <Insert> <Object> <Formula>: A pop up menu of elements
appears (Figure 1.12a). Select the element and write the formula. Figure 1.12b shows
an example.
IT Tools Level - 3
55
Figure 3.10: Insert Fields Option
Unit - 3
56
Figure 3.12: Insert Formula (a) Formula menu (b) An example
Unit - 3
several commands as shown in Figure 3.13. The commands which are required to be known
at this stage are described in the figure. The commonly used commands allow the user to
format a page, paragraph, insert bullets, styles, formatting, etc. in the current document.
IT Tools Level - 3
57
When using the Format tab, the formatting happens on the text that has been selected. So
you must select the text on which the formatting has to be applied and then use the relevant
command from the Format tab. Some operations performed using commands of the Format
tab are described as follows:
u Format Character: <Format> <Character>: A dialog box opens (Figure 3.14). Select
the font type, typeface, and size. Select font effects, background etc. The changes happen
to the text selected.
u Format Paragraph: <Format> <Paragraph>: A dialog box opens (Figure 3.15). You
can change the indentation and spacing, borders, alignment, etc.
u Format Bullets and Numbering: <Format> <Bullets and Numbering>: A dialog box
opens (Figure 3.16). You can select from bullets of different kinds or numbering. In the
document the bullets are inserted at the location at which the cursor is present.
Unit - 3
u Format Page: <Format> <Page>: A dialog box opens (Figure 3.17). This allows to
format the whole page – borders, color, alignment, number of columns etc.
u To Change case of Text: <Format> <Change Case>: A dialog box opens
(Figure 3.18a).
u To Change Number of Columns: <Format> <Columns>: A dialog box opens. You can
select 2-column page, three column page etc.
u To Change Alignment of Text: <Format> <Alignment>: A dialog box opens (Figure
3.18b). Select from left, right, centered, and justified.
58
Unit - 3
Figure 3.15: Format Paragraph
IT Tools Level - 3
59
Unit - 3
60
Unit - 3
Figure 3.19: Table Tab
When using the Table tab, a new table is inserted at the location of the cursor on the screen.
For merge or split, select the cells on which the operation has to be applied. When a table is
inserted, a table toolbar appears for the formatting of the table (Figure 3.20). Some operations
performed using the commands of the Table tab are described as follows -
u Convert Table to Text or Text to Table: <Table> <Convert>: A pop up menu
appears. If text is to be converted to table, the Text to Table option appears, Select it
IT Tools Level - 3
61
to convert text to table. If a table is already present, then Table to Text option appears.
Select it to convert table to text.
3.4.7 Tools Tab
The Tools tab consists of commands that can be used on the document for better results. It
contains several commands as shown in Figure 3.21. The commands which are required to
be known at this stage are described in the figure. The commonly used commands allow the
user to check spelling and grammar of the content in the document, and count the number
of words and characters in the document.
Unit - 3
Some operations performed using the commands of the Tools tab are described as follows -
u Check Spellings and Grammar: <Tools> <Spelling and Grammar>: The grammar
and spelling of the document is checked. A window as shown in Figure 3.22 appears
if there are no grammatical and spelling errors in the document. If errors are there,
62
then the errors are displayed with suggestions of correcting it. The user can decide to
accept the suggestion or ignore it.
u Find Number of Words: <Tools> <Word Count>: If the text is already selected,
then word count displays the number of words and characters in the selected text.
Otherwise the word count displays the number of words and character in the whole
document (Figure 3.23).
Unit - 3
Figure 3.22: Tools Spelling and Grammar
IT Tools Level - 3
63
3.4.8 Window Tab
The Window tab consists of commands that work on a window, as shown in Figure 3.24.
The commands in this tab allow the user to open a new window or close an existing window.
Also, the name of all currently open windows is also displayed.
Points to Remember
u A word processing software has tools that allow creation of text-based documents.
u OpenOffice Writer is an open source software for word processing.
u OpenOffice Writer consists of different components like tabs, ruler bar, status bar,
scrollbar and work area.
u File, Edit, View, Insert, Format, Tools, Modify and Window are the tabs in OpenOffice
Writer.
u File tab consists of commands like, create, save, print, open and close.
u Save As option is used to save a file for the first time, or save an already saved file with
a different name.
64
u Edit tab consists of commands for editing a document, like, cut, copy, paste, find &
replace, undo and redo changes.
u Move Text moves the text from the current location to the target location.
u Copy Text copies the text from the current location to the target location.
u View tab consists of commands like, view status bar, ruler, sidebar, that help during
viewing a document on the screen.
u Insert tab allows insertion of page number, date, header, footer, tables, hyperlinks in
a document.
u Format tab consist of commands to format a page, paragraph, insert bullets, styles,
formatting in a document.
u Table tab commands operate on a table - insert table, insert/delete rows/columns in
Unit - 3
a table, in a document.
u Tools tab consists of commands to check spelling and grammar of content in the
document and count words/characters.
u Window tab allow the user to open a new window or close an existing window.
u The user can use Help tab to understand the working of any command of the
OpenOffice Writer.
Exercises
1. What is the need of a word processing software?
2. What is the task of a word processing software?
3. Name an open source word processing software.
4. List the steps to start an OpenOffice Writer.
5. List the components of the main screen of OpenOffice Writer.
6. Define the following:
a. Tabs
b. Ruler Bar
c. Status Bar
IT Tools Level - 3
65
d. Scroll Bar
e. Work Area
7. List the tabs in the OpenOffice Writer. What are the key tasks performed by the tabs.
8. What is the extension of the file created in OpenOffice Writer?
9. What is the purpose of the following tabs?
a. File
b. Edit
c. View
d. Insert
e. Format
f. Table
Unit - 3
g. Tools
10. What is the difference between Save command and Save As command?
11. What is the difference between Move text and Copy text?
12. How is Find and Replace option useful.
13. List the steps for inserting a hyperlink to a web page in a document.
14. What is the difference between toggle case and sentence case when using change
case?
15. Name the tabs in which the following commnds are present:
a. Header
b. Find&Replace
c. Status Bar
d. Ruler
e. Hyperlink
f. Formula
g. Paragraph
h. Alignment
i. Word and Count
66
16. Use OpenOffice Writer to create the following documents:
a. A Birthday invitation card.
b. A farewell invitation card.
c. A one page article that lists the steps that you take to clean the environment
(use bullets). Format the page. Insert header and footer in the document.
d. Write the quadratic equation using formula symbols.
e. A grocery bill using tables. Then convert this table to text.
f. A 2-page 2-column article having pictures and text. Create a hyperlink to a
web page. Also state the number paragrahs, lines, words and characters in the
document. Perform spell check on the document.
g. Create a document with text and then use find and replace option to replace
a word in the document.
Unit - 3
IT Tools Level - 3
67
Chapter
4 Spreadsheet
(OpenOffice Calc)
4.1 Introduction
A spreadsheet stores data in the form of a table comprising of rows and columns. It is used
to store, arrange, and sort data, and perform calculations on numeric data. It is similar to the
ruled paper accounting worksheets traditionally used for bookkeeping. The computerized
Unit - 3
version of a worksheet is called a Spreadsheet application that lets you quickly perform
calculations on numerical data, represent data with charts, analyze, and print. Spreadsheets
are used in various fields such as banking, finance, accounting, and education. Following are
some of the popular uses of spreadsheets:
1. Managing financial data such as bank account information, budgets, transactions,
billing, and receipts.
2. Handling inventory, reviews, employee information, surveys, etc., using data entry
forms.
3. Tracking student performance by calculating grades and other relevant information
such as attendance, highest score, and lowest score.
4. Creating lists of items which may not be numeric such as student list, grocery list.
5. Managing company information such as profit and sales by creating graphs from the
data.
There are various spreadsheet applications available that can be used to create and
manipulate a spreadsheet. The most commonly used are – Microsoft Office Excel, Apache
OpenOffice Calc, LibreOffice Calc, Google Sheets etc. Microsoft Excel is a proprietary
software from Microsoft for Windows. Both OpenOffice and Libre Calc are free and open-
source alternatives to Excel. Google sheets is a web-based spreadsheet application which
allows you to store and edit the spreadsheets online and access them from any computer. In
this chapter we’ll study spreadsheets using Apache OpenOffice Calc. Figure 4.1 shows how
an OpenOffice Calc spreadsheet looks like.
68
Figure 4.1: OpenOffice Calc Spreadsheet
Unit - 3
Calc is offered free of charge and can be downloded from HYPERLINK ‘http://www.
openoffice.org’ www.openoffice.org calc is the spreadsheet component of Apache OpenOffice
an open source office software suite. We will install the complete Apache OpenOffice which
include calc
1. Open the URL: https://www.openoffice.org/download/index.html.
2. Select the operating system and language.
3. Click on – Download full Installation
4. Installing OpenOffice on Windows
a. Double click on the downloaded exe file and then click Next on the following
screen:
IT Tools Level - 3
69
b. Click on Unpack
Unit - 3
70
d. Enter User information and then click on Next
Unit - 3
e. Choose the setup type and then click on Next. It is recommended that the
beginners should choose typical.
IT Tools Level - 3
71
f. Click on Install
Unit - 3
72
h. Run OpenOffice to check if it has been installed successfully.
i. Click on the Spreadsheet to open OpenOffice Calc.
Unit - 3
4.3 Main Features of OpenOffice Calc
Calc offers the several features. In this section, we shall describe several features. If you do
not understand everything, do not worry about it. Things will become clear as we move on.
4.3.1 Starting Calc
To start OpenOffice Calc, there are various ways in which you can start it:
u As a Windows application, you can click Start -> Programs ->OpenOffice
u If the OpenOffice icon as shownin Figure 4.2 is on the desktop, double click the icon.
IT Tools Level - 3
73
Calc’s default file format is the Open Document Format (ODF), an ISO/IEC standard,
which originated with OpenOffice.org.
4.3.2 Calc Main Window
Before using Calc to create spreadsheets, let us study the various menus and toolbars
available in the main window of Calc as shown in Figure 4.3.
Unit - 3
u Title Bar: The title bar at the top displays the information about the spreadsheet such
as name of the current spreadsheet (ExampleSheet), extension of the spreadsheet
(.ods), and name of the software (OpenOffice Calc). If the spreadsheet is new then
its name is Untitled N where N is a number. The ellipsis (three dots ...) in front of an
option implies that a dialog box will open when this option is selected. For example,
on selecting the Open option, a dialog box will appear which is meant for the user to
enter the location of the file to be opened.
u Menu Bar: Just below the title bar is the menu bar. It contains various menu options.
On selecting a menu option, a submenu appears which contains other options related
to the main menu option. The menu options and few of their submenu options are
discussed below:
74
File: It contains commands to create a new file (New), open an existing file
(Open), save a file (Save , Save As), print a file (Print), preview a page (Preview
Page), close a file (Close), exit the software (Exit) etc.
Edit: It contains commands to edit a file such as Cut, Copy, Paste, Paste
Special, Select All, Find & Replace, Delete Contents, Delete Cells, Headers &
Footers.
View: It contains commands to modify the view of the Calc such as Toolbars,
Full Screen, Zoom. A small in front of the Toolbars options means on selecting
it, another submenu appears as shown in Figure 4.4 which shows the list of all
the toolbars which can be selected or deselected based on the user’s choice of
toolbars to be displayed on the Calc main window.
Unit - 3
Figure 4.4: Toolbars Options
IT Tools Level - 3
75
Help: It contains the options getting help related to OpenOffice Calc such as
OpenOffice Help, What’s This?, Check for Updates etc. Placing the mouse
pointer on any of the icons on the Calc window displays a small box which
is called a tooltip which gives a brief explanation of the icon’s function. For
a more detailed explanation of any icon or function, select Help > What’s
This? and hover the mouse pointer over the icon or function. To turn this
feature off again, click once or press the Esc key twice.
u Standard Bar: It lies below the Menu bar. It contains icons which perform similar
operations as contained in the Menu bar options such as New, Open, Save, Print,
Page Preview, Cut, Copy, Paste, Sort, Chart, Find & Replace, Spelling.
u Find Bar: It contains a text box which can be used to enter text which is meant to
be searched in the spreadsheet. It highlights the cell which contains the text to be
searched. Multiple search results can be traversed by clicking on the up and down
Unit - 3
76
Borders of cells can be modified by using the border styles available by clicking
on the drop-down of the Border icon ( ).
Background Color of cells can be changed by clicking the Background Color
icon ( ). Click on the drop-down for more options of colors.
Text color can also be changed by clicking the Font Color icon ( ). Click
on the drop-down for more options of colors.
u Formula Bar: On the left side of the Formula bar is the Name box which contains a
letter and name combination such as C4, whenever you select a cell on the spreadsheet.
This combination is called as a cell reference. The cell reference is the address of a
cell. The letter is meant for the column and the number for the row.
To the right of the Name box, one can see the Function Wizard ( ), Sum ( ),
Function ( ) icons. Function Wizard opens a dialog box from which you can search
Unit - 3
through a list of available functions. Sum icon inserts a formula into the current cell
that totals the numbers in the cells above the current cell. If there are no numbers above
the current cell, then the cells to the left are placed in the Sum formula. Function icon
inserts an equals (=) sign into the selected cell and the Input line, thereby enabling the
cell to accept a formula. When new data is entered into a cell, the Sum and Function
icons change to Cancel ( ) and Accept ( ) icons.
The contents of the current cell (data, formula, or function) are displayed in the Input
line, which is the remainder of the Formula Bar. You can either edit the cell contents
of the current cell here, or you can do that in the current cell. To edit inside the Input
line area, click in the area, then type your changes. To edit within the current cell, just
double-click the cell.
u Sheet Tabs: A single spreadsheet Calc file can contain multiple sheets. You can
traverse individual sheets by using the Sheet tabs. The current active sheet has a
white tab. Clicking on another sheet tab displays that sheet, and its tab turns white.
Right click on the Sheet tabs will display various options such as inserting, deleting,
renaming, moving sheets, as shown in Figure 4.5.
IT Tools Level - 3
77
Figure 4.5: Menu displayed when you right-click any Sheet tab
Unit - 3
u Status Bar: Status bar at the bottom provides information about the spreadsheet and
convenient ways to quickly change some of its features. Sheet Sequence number shows
the number of the current sheet / total number of sheets in the spreadsheet as shown in
Figure 4.6.
Selected cell (or cells) information is also displayed on the Status bar. When a group
of cells is selected, the sum of the contents is displayed by default. You can right-click
on this field and select other functions, such as the average value, maximum value,
minimum value, or count (number of items selected) as shown in Figure 4.6.
78
When the cursor is on an object such as a picture or chart, the information displayed
includes the size of the object and its location as shown in Figure 4.7. To change the view
magnification, drag the Zoom slider (bottom left corner) or click on the + and – signs.
Unit - 3
Figure 4.7: Information of Chart Displayed in the Status Bar
Zoom Slider
u Sidebar: Located on the right side of the edit views of Calc, sidebar contains
frequently used tools grouped in decks such as Properties, Styles and Formatting,
Gallery, Navigator. Clicking on any of the vertical tabs opens the deck for that tab.
u Active Cell: When you select a cell, you will notice a heavy black border around the
selected cell as shown in Figure 4.3. The heavy black border indicates that selected
cell is the active cell.
u Row Headers: Row headers are in the form of numbers -1,2,3.... which are present
at the left of each row.
u Column Headers: Column headers are in the form of alphabets – A,B,C,...shown at
the top of each column.
IT Tools Level - 3
79
4.3.3 Working with Spreadsheets
A Spreadsheet consists of a number of individual sheets, each containing cells arranged in
rows and columns. A particular cell is identified by its column letter and row number. These
cells hold the individual elements—text, numbers, formulas, and so on—that make up the
data to display and manipulate. Each spreadsheet can have many sheets and each sheet can
have many individual cells.
u Create a New Blank Worksheet : There are many ways to create a new blank
worksheet as discussed below:
On the menu bar, click File-> New->Spreadsheet as shown in Figure 4.8.
Unit - 3
On the Standard bar, click on drop-down of the New icon ( ) -> Spreadsheet
as shown in Figure 4.9.
80
Figure 4.9: Creating New Blank Spreadsheet Using Standard Bar
Unit - 3
On the keyboard type – Ctrl + N. The keyboard shortcuts are also displayed
next to the menu options as shown in Figure 4.8 and Figure 4.9.
u Open an existing Spreadsheet :
On the menu bar, click File->Open as shown in Figure 4.8 and then a dialog
box opens up which is used to locate the spreadsheet to be opened as shown
in Figure 4.10.
IT Tools Level - 3
81
On the Standard bar, click on the Open icon ( ). Click on the drop-down
to open a list of recently opened OpenOffice files.
u Navigating within Spreadsheets: There are many ways to navigate within a
spreadsheet from cell to cell and sheet to sheet.
Accessing a particular cell – Place the mouse pointer over the cell and click to
access that cell. Another way is to type the cell reference or address in the Name
box in the Formula bar and press Enter. For example, if you want to access
cell D5, then type D5 in the Name box and press Enter. You can see cell D5 is
highlighted as shown in Figure 4.11.
Unit - 3
You can also use the Calc Navigator ( ) on the Standard bar or Press F5 which
opens the following Navigator dialog box in which you can enter the row number and
column letter which you want to access.
82
Unit - 3
Figure 4.12: Calc Navigator
Cell to Cell Navigation: You can use the Mouse and various keys on the
keyboard such as Tab, Enter keys, and Arrow keys to navigate from one cell
to another.
Sheet to Sheet Navigation: Using sheet tabs at the bottom of the spreadsheet,
you can navigate between sheets. If you have a number of sheets, then some of
the sheet tabs may be hidden behind the horizontal scroll bar at the bottom of the
screen. If this is the case, then the four buttons at the left of the sheet tabs as shown in
Figure 4.13 can move the tabs into view.
u Saving Worksheet:
On the menu bar, click File->Save as shown in Figure 4.8.
On the Standard bar, click on Save icon ( ).
IT Tools Level - 3
83
While saving a new spreadsheet for the first time, a dialog box will open to enter a name and
select the location for saving the spreadsheet. For example, in Figure 4.14 a spreadsheet file
is saved on the Desktop with the name ExampleSheet and type .odf.
Unit - 3
u Closing Worksheet:
On the menu bar, click File->Close (Figure 4.8). A dialog box opens up if the
spreadsheet has not been saved as shown in Figure 4.15. The dialog box gives
options to the user to Save the file, Discard the changes or Cancel the close
operation.
You can also directly close the OpenOffice Calc main window.
4.3.4 Working with Data:
u Data – There are various types of data that can be entered in a cell:
84
Labels – These are alphabetic or alphanumeric entries without numeric value.
They can be a combination of letters, numbers, space, special characters etc.
Labels are left justified by default.
Numbers or Values – These are numeric data which may be integers or can
contain decimals or fractions. Values are right-justified by default.
Formulas – Used to perform calculations such as addition, subtraction,
multiplication, division, average. Formulas must begin with an = sign.
u Entering Data: Data can be entered in an active cell. Following are the steps to enter
data in say cell A1 (Figure 4.16):
i) Click on the A1 cell which is at the top left of the spreadsheet. The heavy
black border around the A1 cell indicates that it is the active cell.
Unit - 3
ii) Start typing some text or numbers say “Room 1” and press Enter.
iii) On pressing Enter the cell below becomes the next active cell. Now the active
cell is now A2.
Figure 4.16: Entering Data in Cell A1
u Moving Data within a Spreadsheet: For moving data from one cell to another we
have the cut-copy-paste functions. There are various ways to use these functions as
described below:
Using the Edit Menu: The Cut, Copy, and Paste functions are available in the
Edit menu. Following example illustrates the steps to do cut/copy-paste using
Edit Menu:
i) Select the cell whose contents you want to cut or copy (say cell D5).
ii) Go to the Edit menu on the menu bar and click on Cut/Copy.
iii) Select the cell where you want to paste the contents of cell D5 (say cell
F5).
iv) Go to the Edit menu and click on Paste. If you have selected Cut option
then the contents of D5 will be removed from D5 and pasted in F5.
But if you have selected the Copy option, then the contents of cell D5
will remain in intact and the same will be copied in F5.
Using the Standard bar: The icons are Cut ( ), Copy ( ), and Paste ( ).
Following example illustrates the steps to do cut/copy-paste using Standard
bar:
IT Tools Level - 3
85
i) Select the cell whose contents you want to cut or copy (say cell D5).
ii) Click on the Cut / Copy icon in the Standard bar.
iii) Select the cell where you want to paste the contents of cell D5 (say cell
F5).
iv) Click on the Paste icon in the Standard bar.
By Right -Click: Following example illustrates the steps to do cut/copy-paste
by right clicking on the cell:
i) Right-Click on the cell whose contents you want to cut or copy (say
cell D5). The following menu is displayed:
Unit - 3
86
Using AutoFill: This feature in Calc is used to automatically generate data
based on a defined series. A very common example is to enter numbers in the
serial number (S.No) column of a table. This is a very frequently used column
which usually contains consecutive numbers. Instead of manually typing the
serial numbers (say 1 to 100), you can use the AutoFill command in Calc. The
procedure to generate the series of numbers from 1 to 5 is as follows (Figure
4.18):
i) Click on the first cell of the serial number column and type 1.
ii) Now drag the fill handle in the bottom right corner of the cell (a solid white
+ sign) across the cells that you want to fill (in the given example till 5)
and release the mouse button. The cells will be filled with ascending
numbers 2, 3, 4, 5.
Unit - 3
Figure 4.18: Using AutoFill
Try doing the same exercise with “Monday” typed a cell and you’ll observe
that the subsequent cells will be filled with the days – Tuesday, Wednesday,….
etc.
The AutoFill command also recognizes customized sort lists that are defined
under menu Tools -> Options -> OpenOffice Calc -> Sort Lists. You can also
define your own sort list.
In case you want to enter the same value, say, 1 in 10 consecutive cells simply
press the Ctrl key while dragging the fill handle.
Suppose you want to enter even numbers in a column. For example entering
2, 4, 6, 8….20. Then follow the procedure:
i) Type the first two values (2 and 4) in the first two cells.
ii) Then select both the cells and drag the fill handle of the cell containing
value 4. You will observe that now the values filled by Calc will be 6,
8, 10…20.
IT Tools Level - 3
87
Thus if you want to generate your own series, then you have to specify two
values so that Calc can determine how to generate the subsequent values.
4.3.5 Formatting Data
Formatting a document means adding elements of style and presentation to documents
to improve the readability and make them more attractive. To enhance the appearance of
spreadsheets various formatting options are available in the Formatting Bar and Format
Menu such as alignment, font, size, and style. Various formats for numbers are also available
such as percentage and decimals. Following are the various formatting options available on
the Formatting Bar as shown in Figure 4.19.
Unit - 3
u Numbers as Text: Calc evaluates each cell and determines whether the entry is a
Value or Label. Cells containing a combination of values and text is automatically
treated as a label such as code of a product - COMP123. Such entries cannot be used
for calculations. However there might be a requirement that a cell containing numbers
be treated like a label. For example telephone numbers, aadhar card number, ZIP
codes etc. should be treated as labels and not values. Whenever such a requirement
arises, prefix each such entry with a single quotation mark (‘). The quotation mark
will be invisible and the numbers in the cell will be treated as labels.
u Font: Font refers to the design for a set of characters. It is the combination of typeface
and other qualities, such as size, pitch, and spacing. The font can be changed from the
Formatting bar.
88
Let us discuss various Font changing options on the Formatting bar:
Font Name: Various font types are there in Calc such as Arial, Arimo, and
Century Schoolbook L. The font type can be selected from the Font Name
box in the Formatting bar as shown in Figure 4.19. Using the drop down, you
can select from the list of font types available in Calc. The appearance of the
font types listed in the drop down is how the text will look when a font type
setting is applied as shown in Figure 4.20.
Unit - 3
Figure 4.20: Font Names
Font Size: Click on the drop down arrow of the font size which is next to the
Font Name box and then select the size you want to use.
Font Style: You can also make the text bold, italics or underlined by clicking
on the , or icons available on the formatting bar respectively.
u Horizontal Alignment: Alignment of data in cell with respect to the border of the
cells can be done by using the Alignment options:
Left Align : The left edge of the text is along the left cell border.
Center Align : Both the left and right edges are equally distant from the
left and right cell borders respectively.
Right Align : The right edge of the text is along the right cell border.
IT Tools Level - 3
89
Justify : Aligns the text to the left and the right cell borders.
u Changing Color : You can easily change the color of the background of the cells as
well as the text color as shown in Figure 4.21. On the left the background color is
changed and on the right the text color is changed.
90
ii) Click on the Text color icon .
iii) Select the color from the palette as shown in Figure 4.23.
Unit - 3
Figure 4.23: Font Color Palette
u Gridlines and Borders : The gray gridlines (vertical and horizontal lines) that you can
see in a Calc spreadsheet help you while you’re working in a spreadsheet. Gridlines
appear automatically showing you how the data is organized into rows and columns.
Borders are different from gridlines because they help you highlight important
information for people to see as shown in Figure 4.24.
IT Tools Level - 3
91
Borders need to be added if you want to highlight certain cells. One more difference
is that gridlines aren’t automatically printed, while borders are. Thus, to draw borders
around a cell or multiple cells, you can use the Border icon on the Formatting bar
. A drop down (Figure 4.25) in the same icon provides various options to draw
the left or right or top or bottom border, all borders, outer border etc. In order to
create borders, select the cells around which you want borders and then click on the
required border option.
Unit - 3
u Flow of Text: In order to control the flow of text within cells, Calc provides various
ways:
1) Merging / Splitting Cells: In order to merge cells, select the cells and click on
the Merge Cells icon in the Standard Bar. To split the merged cells, select
the cell and click on the Merge Cells icon.
2) Wrap Text: It means to break the text into multiple lines i.e., adjusting the
row height to fit the text within the cell but keeping the column width of the
cell same. Steps to wrap text:
i) Right-click on the cell.
ii) Select the option – Format Cells.
iii) A dialog box opens up. Open the Alignment Tab and check the option
– Wrap text automatically as shown in Figure 4.26.
92
Unit - 3
Figure 4.26: Wrap Text
3. Shrink to Fit : This option shrinks the text to fit in the size of the existing cell.
In this case neither the row height nor the column width is changed. The text
size is decreased according to the cell. Steps to shrink the text size to fit the cell:
i) Right-click on the cell.
ii) Select the option – Format Cells.
iii) A dialog box opens up. Open the Alignment Tab and check the option
– Shrink to fit cell size as shown in Figure 4.26.
Following example illustrates the difference between Wrap text and Shrink to fit. Given the
text “OpenOffice Calc” which cannot fit in a single cell as shown in Figure 4.27, we have
two options – either to wrap the text or to shrink it to fit the cell.
IT Tools Level - 3
93
u Numeric Data Formatting
In Calc, there are many ways in which numerical data can be formatted i.e., changing
the appearance of numbers. Some of the number formats are available on the Standard
Toolbar (Currency , Percent , Standard , Add/Delete Decimal place ).
For more options, right-click on the cell and click on Format Cells to open a dialog
box as shown in Figure 4.28. Click on the Numbers tab and then you can select the
category of the format as per requirement.
Unit - 3
94
2. Percent: It displays the number as a percentage. Two decimal places are added
to the number and the percent symbol (%) is suffixed at the end.
3. Standard: It sets the number in the cell to the default format by removing any
other numeric formatting applied.
4. Decimals: Decimal places can be inserted or removed by using the Add
Decimal place or Delete Decimal place icon respectively.
If you want to remove fractional part of a cell or group of cells then you can
either use the Delete Decimal place icon on the Standard toolbar or another
option is to right-click on the cell (s) and then click on Format Cells to open
the dialog box. On the Number tab, you can see the Decimals spin box in the
Option section. You can increase or decrease the number of decimal places
by using the up and down arrows. Zeros can also be prefixed to the numbers
Unit - 3
by setting the number of zeros to be prefixed in the Leading Zeros spin box.
Figure 4.29 shows an example of how the number – 23456.78 changes when
different formatting options are applied on it.
5. Date: By default the date format in Calc is dd/mm/yy. But in case you want
to change the format, you can find various date formats in the Format Cells
dialog box.
4.3.6 Finding and Replacing Data
Data can be searched by using the Find toolbar. If you want to find and replace the data then
perform the following steps:
i) Click on the Edit menu and select the Find & Replace option.
ii) A dialog box opens (Figure 4.30) in which you can type the text to be searched
in the “Search for” text box and the replaced text in the “Replace with” text
box. You can find or replace the results individually (Find or Replace) or all
of them at one go by clicking on the Find All or Replace All button.
IT Tools Level - 3
95
Unit - 3
iii) The Match case check box when checked implies that the searching is
sensitive to the case of the text i.e., uppercase and lowercase letters are treated
differently. Otherwise uppercase and lowercase letters are treated as equal.
iv) Entire cells check box when checked implies that Calc will search for the
whole words that are identical to the text to be searched and if the text to be
searched is part of some other text then it will not highlight that in its results.
If this check box is not checked then the text to be searched is highlighted even
if it is part of cell contents.
4.3.7 Deleting
u Delete Data: For removing data from a cell, click inside the cell (double-click) and
then press the Backspace key according to the text you want to delete. However if
you only select the cell (single-click) and then press the Backspace key then this will
result in the deletion of all the text within the cell, though the formatting of the cell
remains.
u Deleting Data and Formatting: Delete key (or Right-click the cell and select Delete
All option) can be used to remove data as well as the formatting from a cell. Selecting
the cell and pressing the Delete key opens a dialog box (Figure 4.31) which can be
96
used to delete different aspects of the cell. To delete everything in a cell (contents and
format), check Delete all.
Unit - 3
Figure 4.31: Delete Contents Dialog Box
u Deleting Cell(s): Single or multiple cells can be deleted by selecting them and then
right-click and select the Delete option. On doing so, a dialog box (Figure 4.32) opens
which asks the user to shift cells up or left or delete an entire row or column after
deleting the cell(s).
IT Tools Level - 3
97
menu appears (Figure 4.33) which can be used to insert and delete rows or columns and also
adjust the height or width of a row or column.
Unit - 3
Insertion of row and columns can also be performed by using the Insert menu on the Menu
bar as shown in Figure 4.34.
98
4.3.9 Using Formulas and Functions
Formulas can be used for basic operations such as addition, subtraction, as well as more
complex calculations such as income tax calculations, averaging. The advantage of using
formulas is that even if the data is changed, Calc will automatically recalculate the answer
without the need to rewrite the formula again. Another advantage of using formulas is that
they can be easily copied to a number of cells.
Let us study some examples of creating basic formulas in Calc.
Example 1: Adding data in two numbers and storing the result in cell D6.
Step 1: In cell D6, type the equal sign (=). This informs Calc that D6 will contain a
formula.
Step 2: Now type 4+5
Unit - 3
Step 3: Press Enter
Cell D6 will contain 9. You can see the formula (=4+5) in the Input line in the
formula toolbar as shown in Figure 4.35.
In the above example, we have used numbers for addition. What if we were supposed to add
the contents of cell D4 and D5 and then store the result in cell D6? This can be achieved
using cell reference or address of a cell.
IT Tools Level - 3
99
In Calc, a cell reference identifies the location of a cell or group of cells in the worksheet. The
cell reference is also called address of a cell. Cell references are used in formulas, functions,
and other commands.
Individual cell reference: Each cell is identified by its column letter and row
number in this order. For example, the cell reference of the topmost and
leftmost cell is A1 (Column=A, Row=1).
Range of cells – You can use cell referencing for a consecutive range of cells
also using a colon (:). For example, cell reference for the range of first five cells
in column D is D1:D5 (i.e., D1, D2, D3, D4, and D5). Cell reference for the
range of first five cells in row 5 is A5:E5 (i.e., A5, B5, C5, D5, and E5). Cell
reference for a group of four cells spanning first 2 columns and first 2 rows of
the spreadsheet is A1:B2 (i.e., A1, A2, B1, and B2).
Unit - 3
When you wish to add a reference to a cell in some other cell then there are
two ways. First is to type the cell reference using the keyboard. Second is using
the mouse. The steps to insert cell reference using the mouse is as follows:
Step 1: Double-Click on the cell in which you want to insert cell reference.
Step 2: Type equal sign (=)
Step 3: Now click on the cell whose reference you want to add. On clicking
you will notice that the address of the cell which you have clicked is
inserted.
For example, steps to add data in two cells D4 and D5 and store the result in cell D6.
Step 1: Enter numbers in cell D4 and D5.
Step 2: Double-click on the cell D6 and type =.
Step 3: Click on cell D4. The address D4 will be inserted in cell D6 after the = sign.
Alternatively you can type D4.
Step 4: Type plus sign (+) in cell D6.
Step 5: Click on cell D5, The address D5 will be inserted in cell D6 after the + sign.
Alternatively you can type D5.
Formula in cell D6 =D4+D5
100
After you press Enter, D6 will contain the sum of the numbers stored in cells D4 and D5.
You can view the formula of cell D6 in the Input line of Formula toolbar as shown in . If
you double-click on cell D6, then also you can see the formula in cell D6.
Unit - 3
Figure 4.36: Example of Adding Contents of Two Cells
Try changing the values in cell D4 and D5 and you will observe that the result in cell D6 will
be automatically recalculated and updated. This is one of the most important use of Calc.
Just like the plus (+) operator, you can use various other operators in Calc as shown in
Table 1.
Type of Operators Operator Operation Example
Arithmetic Operators + Addition =D4 + D5
=5+3
- Subtraction =A2-A3+B1
=3+4+5
* Multiplication =D4 * E4
=56*100
/ Division =E3/E2
=34/4
=5/0 will result in an
error
^ Exponentiation =D4^D5
=5^2
IT Tools Level - 3
101
Type of Operators Operator Operation Example
Comparison Operators = Equal to =4=5
=D2=D3
< Less than =4<9
=D4<D5
> Greater than =4>9
=F1>D3
<= Less than or equal =2<=3
=D2<=A1
>= Greater than or equal =2>=3
=D2>=C2
<> Not equal to =2<>5
=A1<>A2
Unit - 3
Precedence of Operations:
If multiple operators occur in a formula then the calculation is performed by using the
following order:
1. Operations enclosed in parentheses.
2. Exponentiation.
3. Multiplication and division. (If both multiplication and division occurs in a formula
then the calculation is performed from left to right.)
4. Addition and Subtraction. (If both addition and subtraction occurs in a formula then
the calculation is performed from left to right.)
For example, consider the following formula:
=1000+3000*500
In the above formula, multiplication will be performed first and then addition will be
performed. If you want to perform addition first then you have to enclose the addition
operation in parentheses as shown below:
= (1000+3000)*500
102
Functions
Calc has a set of predefined formulas called functions. They differ from formulas in the
sense that in a formula we provide both the operands and the operator, however in functions
we only provide operands (or arguments) as functions have predefined operation to be
performed on the arguments. Just like a formula, the function also begins with an equal (=)
sign. We specify the arguments enclosed in parenthesis () and separated by a comma (,). For
example, SUM function is used to add as shown below:
= SUM (3, 4) – This will add numbers 3 and 4.
= SUM (A3, A4) – This will add numbers in cell A3 and A4.
= SUM (3, 4, A3, A4) – This will add number 3, 4, contents of cell A3 and A4.
Apart from SUM () there are various commonly used mathematical functions in Calc which
Unit - 3
are discussed as follows:
1. PRODUCT (n1; n2…) – To calculate the product of arguments n1, n2…
2. SQRT (n) – To calculate the square root of a number n.
3. POWER (n; p) – To calculate power p of a number n.
4. LOG (n; b) – To calculate log a number n to base b.
5. ROUND (n; d) – To round a number n to digits d.
6. SIN (n), COS (n), TAN (n) – To calculate sine, cosine and tangent of n.
7. RANDBETWEEN (f; l) – Returns a random number between f and l.
8. QUOTIENT (a; b) – To calculate integer quotient of division a/b.
9. ABS (n) – To calculate the absolute value of a number n.
10. AVERAGE (n1; n2….) – To calculate average of arguments n1, n2….
For the function which contains multiple arguments such as SUM (), PRODUCT (),
AVERAGE (), if the arguments are consecutive then you can use a range of cells such as
A1:A5 which means cells A1, A2, A3, A4, and A5.
For example, addition of the numbers in cells A1:A5 in cell A6 is shown in Figure 4.37.
IT Tools Level - 3
103
Unit - 3
104
Unit - 3
Figure 4.38: Example of Relative Addressing
The same example can also be performed by using AutoFill. Instead of copying and then
pasting the formula from cell A6 to B6, you can use AutoFill. Select cell A6 and move the
mouse pointer to the bottom-right corner of the cell A6 until you see a hollow “+” sign. Then
drag this sign towards cell B6. The formula in cell A6 will be copied relatively into cell B6.
Absolute Addressing: In some cases the requirement is to retain the cell address even if it
is copied to some other cell or when using AutoFill. In such cases, absolute addressing is
used. Dollar signs ($) are used to hold a column and/or row address constant. When you
enter an address in a cell that is prefixed with a $ sign, then Calc stores the absolute address
of the cell.
For example, cell A4 contains the absolute address of A3 (=$A$3). Now if you will copy
the contents of A4 to B4 then it will contain the same address A3 (=$A$3) because absolute
address is used as shown in Figure 4.38.
IT Tools Level - 3
105
Unit - 3
106
4.3.11 Sorting and Filtering Data
Sorting: Data can be easily sorted in Calc by using the sort command available on the
Standard toolbar (Sort Ascending , Sort Descending ) and also in the Data menu which
opens a dialog box for more options as shown in Figure 4.41.
Unit - 3
Figure 4.41: Sort Dialog Box
IT Tools Level - 3
107
Sorting using Multiple Columns:
You can also select multiple criteria (up to 3) to sort with each criterion applied one after the
other. For example, you have the following data as given in Table 2 and you want to sort it
in ascending order according to the price per item and then if two items have the same price
then in descending order of the number of items and if two items have the same price and
the number then according to their code sorted alphabetically in increasing order.
Item Code Number of Items Price per Item (in Rs.)
B45 34 234
A23 22 234
A43 12 65
S12 10 30
S13 22 234
Unit - 3
Step 1: Select the cells you want to sort including the headings
Step 2: Since the data you have selected contains headers (Price per Item and Number
of Items) which you don’t want to be included in sorting then open the Options
tab in the same dialog box and check the option Range contains column
headers.
Step 3: Click on the Sort option in the Data menu which opens a dialog box.
Step 4: In the Sort by section select the Price per Item column and ascending radio
button.
Step 5: In the Then by section select the Number of Items column and descending
radio button.
Step 6: Lastly in the next Then by section select the Item Code and ascending radio
button as shown in Figure 4.42.
108
Unit - 3
Figure 4.42: Sort Criteria
Step 6: Click on OK
The result after sorting is shown in Figure 4.43.
In the Options tab, you can see various other options for sorting as shown below:
Case Sensitive – If the cells to be sorted contain the same letter in the same position but
different in case then the one in uppercase is placed after the one in lowercase if the sort is
ascending and vice versa if the sort is descending.
Direction (sorting rows or columns) – It selects whether sorting is to be performed row wise
(vertically) or column wise (horizontally).
IT Tools Level - 3
109
Filtering Data : Applying a filter means displaying data based on some conditions or filters.
Filters can be applied by using the Filter option in the Data menu.
Three types of filters can be applied – AutoFilter, Standard Filter and Advance Filter. Let us
study AutoFilter and Standard filter in detail.
AutoFilter – This filter is added on the topmost row of the selected data in the
form of a drop down list from which you can select data to be displayed or in
other words apply filters.
Example:
Given the following data in Table 3, the following are the steps to apply
AutoFilter to display all the Female candidates.
Name of the Student Gender Marks (out of 100)
Unit - 3
Aditi Female 89
Piyush Male 75
Bharti Female 98
Suman Female 59
Gaurav Male 98
Table 3: Example of Filter
110
Figure 4.44: Selecting Auto Filter Option
Unit - 3
The resulting sheet will contain all the female entries and the drop-down in the column in
which filter is applied (Gender) will be colored in blue as shown in Figure 4.45.
You can apply filters to other columns also. Suppose in the above example, data was to be
filtered for all the females students having 98 marks. Then click on the drop-down of the
Marks column and select the 98 entry in the drop-down. The output will be as shown in
Figure 4.46.
2. Standard Filter
Standard filter is used to provide more options for filtering such as combining multiple
filters by using AND and OR operator. AND operator implies that all the filters must
be satisfied for displaying the data. OR operator implies that at least one filter should
be satisfied for displaying the data.
IT Tools Level - 3
111
AND Operator Example - Suppose in Table 3, you have to select the male students
having more than 75 marks. Following are the steps to filter data based on this
criterion:
Step 1: Select the data
Step 2: Select Data menu and click on Filter->Standard Filter. A dialog box will open.
Step 3: Add the criteria for Gender = Male AND Marks > 75 as shown in Figure 4.47.
Unit - 3
The AND operator ensures that all the criterion are satisfied.
Step 4: Click on Ok. The output will be as shown in Figure 4.48.
OR Operator Example – Suppose in Table 3, you have to select the female students or
students having more than 75 marks. Following are the steps to filter data based on
these criterion:
Step 1: Select the data
Step 2: Select Data menu and click on Filter->Standard Filter. A dialog box will open.
Step 3: Add the criteria for Gender = Female OR Marks > 75 as shown in Figure 2.49.
112
Figure 4.49: Standard Filter using OR
Unit - 3
Step 4: Click on Ok. The output will be as shown in Figure 4.50.
AND-OR Operators Example - Suppose in Table 3, you have to select the female
students whose name begins with the letter “S” or male students whose name begins
with letter “G”. Following are the steps to filter data based on this criterion:
Step 1: Select the data
Step 2: Select Data menu and click on Filter->Standard Filter. A dialog box will open.
Step 3: Add the criteria for Gender = Female AND Name of the Students Begins with
“S” OR
Gender = Male AND Name of the Students Begins with “G” as shown in Figure 2.51.
IT Tools Level - 3
113
Figure 4.51: Standard Filter using AND-OR
Removing AutoFilter – Select the cells as selected while adding the filter. From the
Data menu, select Filter->Remove Filter as shown in Figure 4.53. The filters will be
removed.
114
5.3.12 Creating Charts and Graphs
In Calc, you can create graphs and charts to represent the data graphically. Sometimes,
it is very difficult to analyze spreadsheets containing huge amount of data. For example,
analyzing the academic performance of students of a school over the past 10 years. Such
analysis can be done effectively by using charts which provide a visual presentation of data.
Various types of charts can be created in Calc. It offers a choice of 10 chart types such as
Column chart, Bar chart, Pie chart, Area chart. Each of the chart types has several sub-types.
Creating Charts : Following are the steps required to insert a chart:
Step 1: Select the data which is to be included in the chart.
Step 2: Go to the Insert menu and select the Chart option as shown in Figure 4.54 or
another way is to click on the Chart icon in the Standard toolbar.
Unit - 3
Figure 4.54: Inserting Chart from Menu Bar
Step 3: Chart wizard dialog box is displayed as shown in Figure 4.55 which is used to
insert various options related to the chart such as the type of chart, data range,
data series and elements of the chart.
IT Tools Level - 3
115
Unit - 3
Step 4: Select the chart type (Column chart, Bar chart, Pie chart etc.) and click on the Finish
button.
Let us create different types of charts for the following data as shown in Table 4.
Month Expenditure
Jan 200
Feb 300
Mar 150
Apr 223
May 34
Jun 12
Jul 70
Aug 133
Sep 245
Oct 354
Nov 221
Dec 567
Table 4: Monthly Expenditure of a Firm for the Year 2015
116
Column Chart: A Column chart is used to compare values across categories by using vertical
bars. The Column chart can be inserted by selecting the Column option in the Chart type of
the Chart Wizard. You can also select from the various subtypes of Column chart from the
Wizard. The Normal Column chart for the data in Table 4 is shown in Figure 4.56.
Unit - 3
Figure 4.56: Normal Column Chart
Bar Chart: A Bar chart is the horizontal version of a column chart. It is used if you have
large text labels. Select the Bar chart option in Step 3 above to create a Normal Bar chart for
the Table 4 is shown in Figure 4.57.
IT Tools Level - 3
117
Pie Chart : A Pie chart is used to display the contribution of each value (slice) to a total (pie)
i.e., it can be used to plot various pieces of a single entity. The Normal Pie chart for Table 4
is shown in Figure 4.58.
Unit - 3
Line Chart : A Line chart is used to compare trends and changes in values over time. The
line chart (lines only) for the data in Table 4 is shown in Figure 4.59.
118
Scatter Chart : A Scatter chart is used to display relationships between variables. The scatter
chart for the data in Table 4 is shown in Figure 4.60. Note that the X axis labels are not the
month names as in the case of line chart but numbers.
Unit - 3
Figure 4.60: Scatter Chart
Apart from changing the chart type, chart wizard is also used to set various other options of
the chart as discussed below:
u Inserting Title : You can insert title and subtitle of the graph and titles of X-axis and
Y-axis in the Chart Elements of the Chart Wizard as shown in Figure 4.61.
IT Tools Level - 3
119
After inserting the chart elements, the Points and Lines chart for the Table 4 is shown in
Figure 4.62.
Unit - 3
u Legends : Most commonly located on the right of the chart, legends help the readers
of the chart to decode the charted data by associating descriptive text with the colors
or patterns of data in the chart.
You can modify the placement of legends or even remove them in the chart by using
the Chart Wizard->Chart Elements as shown in the right panel of Figure 4.61.
u Grids: To make the data in a chart that displays axes easier to read, you can display
horizontal and vertical chart gridlines. By default the horizontal gridlines are
displayed. You can turn on and off the gridlines by using the Chart Wizard->Chart
Elements as shown in Figure 4.61.
Resizing and Moving Charts
After the chart has been inserted, you can easily move and resize it. Click anywhere in
the chart area and drag it to another position in the spreadsheet for moving the chart. For
resizing it, click on the chart and then click and drag any of the chart resizing handle (Eight
green small squares on the border of the chart as shown in Figure 4.63).
120
Figure 4.63: Points and Lines Chart with Resizing Handles
Unit - 3
Deleting Charts
Select the chart and then press the Delete key on the keyboard for deleting a chart.
Modifying Charts
After the chart has been inserted you easily modify the chart. Double-click on the chart and
then right- click. You can see various options such as Chart type, legends, titles, as shown in
Figure 4.64 which can be changed.
4.3.13 Macros
A macro is a recording of each and every command and action you perform to complete a
task. A macro records your mouse clicks and keystrokes while you work and play them back
IT Tools Level - 3
121
later. When you run the macro, it plays those actions back in the exact same order. Thus, if
you want to repeat the actions multiple times you just need to run the macro.
Create/Record Macros:
Following are the steps to record/create a macro:
1. Go to the Tools tab on the Menu bar->Macros->Record Macro as shown in
Figure 4.65.
Unit - 3
Observe a small dialog box (Figure 4.66) has appeared on the worksheet displaying Stop
Recording.
2. Calc has started recording the Macro. Until you stop the recording, every Calc
command and keystroke will be recorded in the macro, in the order in which
they are entered. Suppose the following tasks were performed:
a) We created all borders in the cells A1:C3.
b) Then we changed the background color of cells A1:C3 to green.
3. After we have done all the required tasks, we will stop recording the macro by
clicking on the Stop recording option on the dialog box (Figure 4.66). A new
122
dialog box will open (OpenOffice Basic Macros) in which you have to specify
the name of the macro and the location for saving it (We have named the macro
as ColorChange and saved it in My Macros folder) as shown in Figure 4.67.
Unit - 3
Figure 4.67: Saving a Macro
Now we have a macro that can perform in a single operation all the tasks we have performed
during recording of the macro.
Run/Use Macros created:
Following are the steps to run/use a macro that we have already created:
1. Go to the Tools tab on the Menu bar->Macros->Run Macros (Figure 4.65).
2. A dialog box will open as shown in Figure 4.68 showing all the macros created. We
will select the one to run and then click on Run button.
IT Tools Level - 3
123
3. The tasks performed during recording of the macro will be repeated in the same order
in which they were performed. (Running ColorChange Macro will create borders
around the cells A1:C3 and set their background color to green.)
By default, recorded macros use absolute cell referencing, which means that exact cell
locations are recorded into the macro.
Delete Macros:
Following are the steps to delete a macro that we have already created:
1. Go to the Tools tab on the Menu bar->Macros->Organize Macros and select the
OpenOffice Basic option.
2. A dialog box listing the macros created will open as shown in Figure 4.69. Select the
macro you want to delete and then click on the Delete button.
Unit - 3
124
2. All pages or specific pages. Specific page numbers separated by comma or range of
pages (such as 1:10) can be entered in the Pages box.
3. Number of Copies
Unit - 3
Figure 4.70: Print Dialog Box
Points to Remember
u A spreadsheet stores data in the form of a table comprising of rows and columns.
u Spreadsheets are used to store, arrange, and sort data, and perform calculations on
numeric data.
u OpenOffice Calc is a free and open-source spreadsheet application available that can be
used to create and manipulate a spreadsheet.
u Calc Main Window contains various toolbars such as – Title Bar, Menu Bar, Standard
Bar, Formatting Bar, Status Bar, Find Bar, Side Bar, etc.
u A Spreadsheet consists of a number of individual sheets, each containing cells arranged
in rows and columns.
u A particular cell is identified by its column letter and row number.
u The selected cell is called as an Active Cell.
u Various types of data can be entered in a cell such as labels, numbers or values, formulas.
u AutoFill feature in Calc is used to automatically generate data based on a defined series.
IT Tools Level - 3
125
u To enhance the appearance of spreadsheets various formatting options are available in
the Formatting Bar and Format Menu such as alignment, font, size, color, and style.
u Data can be searched and even replaced by using the Find toolbar.
u Formulas in Calccan be used for basic operations such as addition, subtraction, as well
as more complex calculations such as income tax calculations, averaging.
u The advantage of using formulas in thecell is that even if the data in the cell is changed,
Calc will automatically recalculate the answer without the need to rewrite the formula
again. Another advantage of using formulas is that they can be easily copied to a number
of cells.
u A cell reference identifies the location of a cell or group of cells in the worksheet. The
cell reference is also called address of a cell.
u Calc has a set of predefined formulas called functions.
Unit - 3
u Functions differ from formulas in the sense that in a formula we provide both the operands
and the operator, however in functions, we only provide operands (or arguments) as
functions have predefined operation to be performed on the arguments.
u Some of the commonly used functions in Calc are: SUM (), PRODUCT (), SQRT (),
POWER (), ROUND (), AVERAGE (), etc.
u All cell references are by default relative i.e., they adjust and change when copied or
when using AutoFill.
u Absolute addressing is used when the requirement is to retain the cell address even if it
is copied to some other cell or when using AutoFill. Dollar signs ($) are used to hold a
column and/or row address constant.
u Mixed addressing is a combination of absolute and relative cell addressing. Whichever
part (row or column) is prefixed with $ remains unchanged and the ones not prefixed
with $ are calculated in a relative manner.
u Data can be easily sorted (increasing or decreasing order) in Calc by using the sort
command available on the Standard toolbar and also in the Data menu.
u Data can be filtered in Calc for displaying it based on some conditions or filters. Filters
can be applied by using the Filter option in the Data menu.
u Three types of filters can be applied – AutoFilter, Standard Filter, and Advance Filter.
126
u In Calc, you can create graphs and charts to represent the data graphically which help in
analyzing spreadsheets containing ahuge amount of data.
u Various types of charts can be created in Calc. It offers a choice of 10 chart types such
as Column chart, Bar chart, Pie chart, Area chart, Line chart, Scatter chart, etc. Each of
the chart types has several sub-types.
u A macro is a recording of each and every command and action you perform to complete
a task.
u Calc offers various options for printing spreadsheets such as a number of copies, selected
sheets, selected cells etc.
Exercise
1. Open a new spreadsheet in Open Office Calc and save it as InternetHours
Unit - 3
The following table records the number of hours each student uses Internet in a week:
Name Monday Tuesday Wednesday Thursday Friday Saturday Sunday
IT Tools Level - 3
127
2. ABC Sports expects its sales figures for 2015 to exceed the sales in 2014 by 10%. Create
the following spreadsheet:
ABC Sports
Yearly Sales Report
2015 Sales 10%
Increase
2014 2015
Football 102,078
Basketball 202,090
Tennis 20,034
Netball 50,234
Unit - 3
Golf 12,211
Total
a) Enter a formula in C54 that will calculate the amount of the sales for 2015.
Use an absolute reference in order that the manager can change the rate of the
expected increase to be able to view likely sales figures for 2015.
b) Change the rate of the sales increase to 20% and then 25% and see what
happens to the 2015 figures.
c) Total the sales for the year 2014 and 2015.
3. Create the following worksheet which contains information about the subscribers of a
newspaper “Daily News” during the period 21st – 25th August 2015
Daily News
New Subscribers
August 2015
Date Name Number of years Sunday Special State
21-Aug-15 Ayesha Verma 2 Yes Delhi
21-Aug-15 NipunSachdeva 3 Yes Mumbai
21-Aug-15 Ram Kapoor 2 No Kanpur
21-Aug-15 Divya Sharma 2 Yes Delhi
128
Date Name Number of years Sunday Special State
22-Aug-15 Neha Mehra 3 No Madras
22-Aug-15 Varun Dhingra 1 No Madras
22-Aug-15 MeghaNangia 1 Yes Delhi
22-Aug-15 SnehaBahl 1 No Delhi
22-Aug-15 Drishti Khanna 2 Yes Mumbai
23-Aug-15 Gauri Yadav 1 Yes Kanpur
23-Aug-15 Jasjit Singh 2 Yes Madras
23-Aug-15 Tarun Mehta 3 No Kanpur
Unit - 3
4. Create the following worksheet:
X Y
2 5
1 3
0 4
3 7
5 7
4 5
IT Tools Level - 3
129
Chapter
5
Presentation
5.1 Introduction
Presentation software is required for the creation of the presentations for a larger audience.
The presentation software has tools that allow the user to create presentations with sound,
text, movies, pictures, and tables.
Unit - 3
OpenOffice Impress is a popular open source software for presentation. The OpenOffice
Impress software can be downloaded from Internet for free, and can be installed on Linux-
based machines and also on Windows-based machines.
This chapter discusses the usage of OpenOffice Impress software in detail.
130
5.3 Openoffice Screen and its Components
The main screen of OpenOffice Impress is shown in Figure 5.2. It consists of different
components like Tabs, Ruler bar, Status bar, Scroll bar, and Slide Pane. The Impress layout
and its general features are described as follows:
Unit - 3
Figure 5.2: OpenOffice Impress Screen
u Tabs (File, Edit, View, Insert etc.) contain drop down menu which have commands
provided by the tab.
u Status Bar: It displays information about the current open presentation. It displays
the current slide number, total slides in the presentation, zoom slider, etc.
u Scroll Bar: There are two scroll bars – horizontal and vertical. They help to scroll the
content or the body of the slide.
u Work Area: It is the working area where the text of the slide is typed.
u View Options: The slides can be viewed in different views – Normal, Outline, Notes,
Handout, and Slide Sorter. Normal is the main view. Notes shows the Notes pane
where notes can be viewed and edited, Outline gives the outline of the slides, Handout
allows the user to print two or more slides on a single page, and Slide Sorter view
presents miniature slides where the user can change the order of the slides, delete the
slide, etc.
IT Tools Level - 3
131
u Slide Pane: It displays the slides as thumbnails. The user can view all slides in the
presentation, rearrange them or hide slides.
The key tasks that can be performed using the tabs are as follows:
u File: To apply commands to current presentation, to open or close presentation
Unit - 3
u Edit: For editing the current presentation, like cut, paste etc.
u View: For controlling display of slides on the screen
u Insert: For inserting new elements in the presentation, like slide, page number,
hyperlink etc.
u Format: For formatting the layout and content of slides
u Tools: For spelling check, gallery of object art to add to slides, to configure menus
u Slide Show: To make settings for slide show, animation and transition in a presentation
u Window: For manipulating and displaying presentation windows
132
Unit - 3
Figure 5.3: File tab
Some operations performed using the commands of the File tab are described as follows -
u Using New: When you click <File><New>, a drop down menu appears. To create
a presentation, select < Presentation >.
u Using Save As: This is used when you want to
(1) Save a file for the first time, or
(2) Save an already saved file with a different name.
When you click <File Tab> <Save As>, a Save As dialog box appears. You can –
l Select folder (directory) where the file is to be saved,
l Type the File name for the presentation,
IT Tools Level - 3
133
l Select “save as type” of presentation (.odp etc.)
l Click “Save: button to save the file.
u To Print:<File><Print>: Print the presentation to the connected printer. You can
select the size of the paper, the slides to be printed, the number of slides on a single
sheet to be printed etc.
5.4.2 Edit Tab
The Edit tab consist of commands required to perform editing on the current presentation.
It contains several commands as shown in Figure 5.4. The commands which are required
to be known at this stage are described in the figure. The commonly used commands allow
the user to – cut, copy, paste, find & replace, undo, and redo changes in the current
presentation.
Unit - 3
134
Some operations performed using the commands of the Edit tab are described as follows -
u Move Text: Remove the text to be moved by selecting the text and then applying
<File><Edit><Cut>. Then take the cursor to the place in the slide where you want
to move the text. Then do <File><Edit><Paste>.
u Copy Text: Select the text to be copied and then apply <File><Edit><Copy>. Then
take the cursor to the place in the slide where you want the copied text. Then do
<File><Edit><Paste>.
u Find and Replace: This is used to find words then replace it with the new one. This
option is useful to find the word at multiple places in the presentation and replace all
of them with the new one.
5.4.3 View Tab
Unit - 3
The View tab consist of commands required for viewing the current presentation on the
screen. It contains several commands as shown in Figure 5.5. The commands which are
required to be known at this stage are described in the figure. The commonly used commands
allow the user to view slides in different layouts, status bar, ruler, sidebar, etc.
IT Tools Level - 3
135
Some operations performed using the commands of the View tab are described as follows -
u Different ways in which presentation slides can be viewed:
l <View><Normal>: This is the main editing view for writing and creating
slides
l <View> <Outline>: This displays an outline of the text in the slides.
l <View> <Slide Sorter>: This presents all slides of the presentation in a
miniature form. It helps in viewing all slides together and allows easy moving
of slides
l <View> <Slide Show>: It shows slides as they will be actually presented. No
editing can take place in this view.
l <View> <Notes Page>: Allows user to make notes for the selected slide. The
Unit - 3
notes can be seen only by the presenter while making a presentation. The note
page is not visible to the audience of the slide show presentation Figure 5.6.
l <View> <Handout Page>: It displays slides on a page as seen when printed.
The user can vary the number of slides to be visible in a handout.
Figure 5.6: Different views (a) Normal (b) Outline (c) Notes (d) Slide Sorter
136
u Use Slide Master: Select <View> <Slide Master>: This allows changing the
background color, text color, bullet type, bullet color, etc. The change in the slide
master is visible in all slides of the presentation.
u Insert Header and Footer in slides: Select <View> <Header and Footer> Figure
5.7.
Unit - 3
Figure 5.7: Header and Footer Window
Tip: First make the Slide Master and then start making the presentation.
Formatting of slide master gets applied to all slides.
IT Tools Level - 3
137
Unit - 3
When using an Insert tab to insert an element, the insertion of an element in the presentation
happens at the location where the cursor is present on the slide. So you must place the
cursor at the right location on the screen before inserting the element. Also, when using
insert, a dialog box may open for further settings and selection. Please choose the options
in the dialog box and proceed further. The dialog box is self-explanatory. Some operations
performed using the commands of the Insert tab are described as follows -
u Insert Page Number, Date and Time: <Insert> <Page Number> : A Header and
Footer Window opens. Make settings here for date, time and page number.
u Insert Fields: <Insert> <Fields> : A pop-up menu appears (Figure 5.9). Select
the element to be inserted. The selected element will insert at the location of the
cursor.
138
Figure 5.9: Insert Fields Option
u Insert Hyperlink: <Insert> <Hyperlink> : A dialog box opens. On the left side
of the dialog box, select where you want to link – current presentation slides, new
presentation or Internet link. Then fill the details path, Form (text, button), etc. The
Unit - 3
Text is the name that appears in your document as a hyperlink.
4.4.5 Format Tab
The Format tab consist of commands required for formatting the presentation slides. It
contains several commands as shown in Figure 5.10. The commands which are required to be
known at this stage are described in the figure. The commonly used commands allow the user
to format a character, paragraph, slide design and slide layout, etc. in the current presentation.
IT Tools Level - 3
139
When using the Format tab, the formatting happens on the text or the figure that has been
selected. So you must select the text or the figure on which the formatting has to be applied
and then use the relevant command from the Format tab. Some operations performed using
the commands of the Format tab are described as follows -
u Format Character: <Format> <Character>. A dialog box opens. Select the font
type, typeface and size. Select font effects, background etc.
u Format Paragraph: <Format> <Paragraph>. A dialog box opens. You can change
the indentation and spacing, borders, alignment etc.
u Format Line: <Format> <Line>. A dialog box opens (Figure 5.11). You can select
from line style, width, color etc. In the slide, formatting applies to the selected line.
u Format Slide Layout: <Format> <Slide Layout>. You can select a slide layout for
the slide from the different slide layouts presented to you. (Figure 5.12).
Unit - 3
140
Unit - 3
Figure 5.12: Format Slide Layout
4.4.6 Tools Tab
The Tools tab consists of commands that can be used on the presentation for better results.
It contains several commands as shown in Figure 5.13. The commands which are required
to be known at this stage are described in the figure. The commonly used commands allow
the user to check the spelling of content in the presentation.
IT Tools Level - 3
141
Some operations performed using the commands of the Tools tab are described as follows -
u Check Spellings: <Tools> <Spelling>. The spelling of the presentation is checked.
A window appears if there are no spelling errors in the document. If errors are there,
then the errors are displayed with suggestions of correcting it.
5.4.7 Slide Show Tab
The Slide Show tab consists of commands that can be used on the presentation for better
results. It contains several commands as shown in Figure 5.14. The commands which are
required to be known at this stage are described in the figure.
Unit - 3
When using the Slide Show tab, it contains commands that are required during the
presentation of the slide show. Some operations performed using the commands of the Slide
Show tab are described as follows:
u Slide Show Settings: <Slide Show> <Slide Show Settings>. A dialog box opens
(Figure 5.15). Select the slide to start from, animation allowed etc.
u Custom Animation: <Slide Show> <Custom Animation>. A dialog box opens on
the right side of the screen. Select the element on the slide on which the animation
has to be applied. Click <Add>. Select the animation to be applied.
u Slide Transition: <Slide Show> <Slide Transition>. A dialog box opens on the
right side. Select the transition you want to apply to the slide.
142
There is a difference between animation and transition. Slide transition applies to the pattern
that will show up when one slide goes to the next (for example, wheel, diamond etc.). Slide
animation applies to elements of a single slide, i.e., how the different elements in a slide will
appear on the screen, their order, etc.
Unit - 3
Figure 5.15: Slide Show Settings
IT Tools Level - 3
143
5.4.9 Help Tab
The Help tab consists of commands that provide help to the user of the OpenOffice
Impress software. On clicking on the help tab, a screen as shown in Figure 5.17 appears.
You can browse the Help for the command you want.
Points to Remember
u Presentation software allows creation of presentations having text, audio, video and
pictures.
u OpenOffice Impress is an open source software for presentation.
u Tabs, Ruler bar, Status bar, Scrollbar and Slide Pane are the different components of
OpenOffice Impress.
u OpenOffice Impress has eight tabs – File, Edit, View, Insert, Format, Tools, Slide
Show, and Window.
u The slides can be viewed in different views – Normal, Outline, Notes, Handout, and
Slide Sorter.
u Normal view is the main editing view for creating slides.
u Notes allows the user to make notes for the selected slides.
u Slide Sorter view presents slides in a miniature form.
u Slide Master allows making changes in appearance of the slides, applying changes to
all slides in the presentation.
u File tab allows operations on a presentation, like, create, save, print, open and close.
144
u Edit tab is required to perform editing on the presentation, like, cut, copy, paste, find
& replace, undo and redo changes.
u View tab consist of commands required for viewing the current presentation on the
screen to view slides in different layouts, status bar, ruler and sidebar.
u Insert tab is required for inserting slide, page number, date and time, pictures, sound
and hyperlinks in a presentation.
u Format tab allows formatting the slides - character, paragraph, slide design and slide
layout.
u Tools tab contains commands to check spelling of content in the presentation.
u Slide Show tab consists of commands used on the presentation for better results.
u Slide transition is the pattern that applies when a slide goes from one to next.
Unit - 3
u Slide animation is the pattern that applies to elements of a single slide.
u Windows tab consists of commands that work on a window, like, open and close a
window.
u Help tab provides help to the user of OpenOffice Impress software.
Exercises
1. What is the need of a presentation software?
2. What is the task of a presentation software
3. Name an open source presentation software
4. List the steps to start an OpenOffice Impress.
5. List the components of the main screen of OpenOffice Impress.
6. Define the following-
a. Tabs
b. Ruler Bar
c. Status Bar
d. Scroll Bar
e. Slide Pane
IT Tools Level - 3
145
f. Work Area
7. List the different view options in OpenOffice Impress.
8. List the tabs in the OpenOffice Impress. What are the key tasks performed by the tabs
9. What is the extension of the file created in OpenOffice Impress.
10. What is the purpose of the following tabs-
a. File
b. Edit
c. View
d. Insert
e. Format
Unit - 3
f. Tools
g. Slide Show
11. What is the difference between Save command and Save As command.
12. What is the difference between Move text and Copy text.
13. How is Find and Replace option useful.
14. What is the purpose of the following views -
a. Normal
b. Outline
c. Slide Sorter
d. Slide Show
e. Notes Page
f. Handout Page
15. What is the need to use the Slide Master.
16. List the steps for inserting a hyperlink to a video in a presentation.
17. What is the difference between slide transition and slide animation.
18. Name the tabs in which the following commnds are present-
a. Header and Footer
146
b. Find&Replace
c. Status Bar
d. Ruler
e. Hyperlink
f. Animation
g. Transition
h. Normal view
i. Copy
19. Use OpenOffice Writer to create the following presentations-
a. A five slide presentation showing five years of your life
b. A presentation about the farewell party
Unit - 3
c. A five slide presentation showing the importance of saving the environment
d. A presentation having hyperlink on each slide to a web resource (audio, page,
video) around the theme of beautiful nature.
e. A presentation that tells about you as in your resume.
f. Use Animation, Transition and Notes Page in all presentations.
IT Tools Level - 3
147
148
Unit - 4
Unit - 4
Multimedia Design
Chapter
6
Multimedia Design : (Open Source Design Tools)
6.1 Background
6.1.1 Multimedia Design Tools
The term multimedia is a combination of two terms multi (meaning more than one) and
media (meaning a mode of transmitting information). Thus, multimedia deals with using
more than one concurrent medium, in an integrated manner. It may include the following
forms of media:
u Text
u Graphics and Images
u Audio
Unit - 4
u Video
u Animation
Multimedia design is an art that integrates multiple forms of media for designing various
applications such as video games, educational software, navigation systems, entertainment,
hospital information systems. Multimedia Systems encompass computer and software systems
which could easily be used in an interactive manner. Multimedia development incorporates
rendering the input to multimedia design tools for processing to achieve the final product.
150
Attractions in using Multimedia Technology:
u Yielding Simplicity and Ease of use
u Interactive Interface
u Better Understanding of the Content
u Cost Effectiveness
u Having Fun element
In this chapter, our focus will be on learning open source multimedia design software for
manipulating and enhancing multimedia features of images.
Open source multimedia design tools are gaining importance in today’s world as not only
open source software is freely available, its source code is also freely available, and we can
develop new features to enhance its capability.
Adobe Photoshop software has been used predominantly over the years for image editing.
But now various open source tools for image editing are available. We list below a few of
them and mention the operating environments that support them against their names in
parentheses:
u GIMP (Windows, Linux, OSX)
Unit - 4
u Fotor (Windows, OSX, Android, Online)
u Fooflexer (Online)
u Snapseed (Android, iOS)
u Paint.net (Windows)
u Autodesk Pixlr (Windows, OSX, iOS, Android, Online)
u Picasa (Google’s photo manager: Windows, OSX)
GIMP is multimedia software having a variety of powerful tools for image editing and
manipulation. We will take a tour of GIMP and discuss its important features in the following
sections.
GIMP as a Multimedia Tool for Image Manipulation
GIMP is an acronym for GNU Image Manipulation Program. It is an open source software
suite to create, edit, enhance and manipulate images. GIMP is a full software suite consisting
of a variety of painting tools (like brushes, pencil and cloning), image manipulators, built-
IT Tools Level - 3
151
in filters for rendering effects (like blur, distort, colorize, and transform), layers dialogue to
work in layers, etc. It is designed to support various plugins for extensions and compatibility.
By default, the image is stored in .xcf image format.
The first version of the GIMP (x0.54) was written by Peter Mattis and Spencer Kimball, students
at Berkeley, back in 1996.Gimp 1.0, an enhanced version, was released in 1998 and an official website
was established for the tool usage. It had extensive functionality for image manipulation from its earlier
versions itself.
Gimp is extensible. Nowadays, prevailing Gimp 2 series (version 2.8) is under use for image
manipulation, with enhanced interfaces and design tools. The software suite is available for
download at http://www.gimp.org/. It is supported on operating systems such as UNIX/
LINUX, Windows, and MacOSX.
Few attractive features of GIMP
u Software suite of painting and drawing tools with various brushes, a pencil, an
airbrush, cloning, etc.
u Paint tools supporting high-quality anti-aliasing.
u Multiple Layers and channels for image manipulations.
u Transformation tools including rotate, scale, shear and flip.
Unit - 4
Installing GIMP is similar to installing any other software package. In the case of Windows,
we download the installer and execute it. In Linux environment (platforms like Ubuntu or
Debian), it could simply be installed by running the following commands in the terminal
window:
152
sudo apt- get update
sudo apt-get install gimp
Alternatively, GIMP is also available in Ubuntu software center in Ubuntu Unity.
Installation on Windows
Unit - 4
Figure 6.2: Download Installer
2. Execute the Installer: The installer is usually saved in the Downloads folder. Run the
installer.
IT Tools Level - 3
153
Figure 6.3: Execute Installer
Unit - 4
154
4. Start Installation: Click on install button to initiate the process.
5. Follow the Trailing pPrompts for Installation: The sequences of prompts are executed.
Unit - 4
IT Tools Level - 3
155
6. Finish Installation: GIMP will be launched just after the click on Finish button.
Installation on Linux
Unit - 4
156
2. Continue with installation
Unit - 4
IT Tools Level - 3
157
The GIMP is also available in UBUNTU Software Center and is directly accessible.
GIMP may be launched in two ways: i) clicking on a GIMP icon (GUI) or ii) by typing
gimp command on command line interface. It detects and uses the system language by
default and configures various directories and options on start-up. The configuration
Unit - 4
158
1. Basic Image/File Handling : Opening, Creation, Cropping, Resizing and Saving
Images
The first thing we are going to do is to open an image file in GIMP. For opening a file
we need to go to:
File Menu Open or press Ctrl + O (Figure 6.13).
Then a dialogue box with Open Image will be displayed. The folders are displayed
on the left hand side of the dialogue box and image file to be opened, is selected. A
preview will appear on the right- hand side of the dialogue box (Figure 6.14).
Unit - 4
IT Tools Level - 3
159
Figure 6.14: Open Image Dialogue
To search an image file manually, “Pencil” icon in the “Open Image” box is clicked and a
user may type the location of a file in the “Location” column and then opens the image file
(Figure 6.15).
Unit - 4
160
Unit - 4
Figure 6.16: Resizing Images
IT Tools Level - 3
161
Image could also be resized using “Scale Image” in Image menu (Figure 6.17).
The image may be cropped using “crop” tool in Toolbar (Transform tools) or by going to
the “Image” menu and choosing “Autocrop.”
Unit - 4
The creation of the new file is also one of the initial steps in GIMP which helps users to
create a new image file by setting up height and width properties.
The new image file could be created as follows:
File Menu New or by pressing Ctrl+N (Figure 6.18 a).
A dialogue box named “Create a New Image” gets popped up.
162
Unit - 4
Figure 6.18 (a): Creating New Image
The dialogue “Create a New Image” displays the default image size (Figure 6.18 b). A user
can alter the size either manually or through the up and down arrow keys. A user can also
set the type/nature of picture file size by clicking pixels.
“Template” could be used to pre-define the picture size and the “Advanced Options” which
supports additional features like “Resolution, Color space, Fill with and Comment”.
After setting these features and finally we can click the Ok button to create a new image box.
IT Tools Level - 3
163
Figure 6.18(b): Setting up Parameters and Click OK
Now the new file has been created. A sample new file created has been shown below (Figure
6.18 c).
Unit - 4
164
Finally, the file is saved by choosing “Save” or “Save as” in “File” menu. On clicking
the “Save” button, modifications are done on the current image will be saved whereas on
clicking “Save as”, a dialogue box pops up to indicate , where a user wants to save file,
maybe with a different extension or on a different path (Figure 6.19).
Unit - 4
GIMP is a powerful tool for image processing and its interface has the following
main panels docked with variety of functionalities or dialogue boxes (Figure 6.20):
i) The Toolbox: A comprehensive set of icons/buttons for selecting tools for
image manipulation.
ii) Tool Options: The docked window renders options or features available for
currently selected tool.
iii) An Image Manipulating Window: An image to be modified in GIMP; is
opened in the image manipulating window. Many images could be opened in
parallel for processing.
iv) Layers Dialog: This allows multiple images to be stacked over each other in
layers for manipulations. Layers can be decomposed into sub-layers known
as Channels. Mostly layers consist of RGB (Red, Green, and Blue) channels.
Paths are arcs or curves, and the path tool is powerful for performing the
selection or to paint on an image in the desired area with the help of arc
curves.
IT Tools Level - 3
165
v) Brushes/Patterns/Gradients: The docked dialogue for selecting brushes,
patterns, or gradients allows us to colorize an image or fill it with some
pattern. Brushes are pixmaps used for painting, erasing, copying, smudging,
lightening or darkening etc. Patterns are small images used for filling regions
of original images or for changing the background of an image. Gradients are
set of colors arranged in linear ordering and control the way colors could be
filled or modified within the image.
Unit - 4
166
Figure 6.21: GIMP Interface
GIMP is flexible in arranging dialogues which are actually the windows containing
options for a tool or are dedicated to special purpose tasks. The persistent dialogues (Tool
Options, Layers/Channels, Brushes/ Patterns/ Gradients) are dockable. The docks are thus
containers for persistent dialogues. The non-persistent dialogues such as an Image-Window,
Unit - 4
Preferences dialogues, etc. are not the part of docks.
** If docks are trashed or closed for some ** The docks could also be added by using
reason; the interface arrangement could
be recovered from
Windows Recently Windows Dockable Dialogues
closed
Docks.
IT Tools Level - 3
167
Figure 6.22: GIMP Toolbox Preset
c. Transform Tools
d. Color Tools
e. Others
The above-mentioned tools are described as follows:
6.2.1 Selection Tool
i) Introduction
Selection tools form an essential part of GIMP. Often a user wants to operate on a portion
of an image instead of using the whole image. Selection tools (Figure 6.23), support
the functionality of selecting portions/regions from the current layer of an image, for
manipulation. Once a selection is made, anything the user does will apply only to the area
that the selection covers. The selection tools may be accessed in different ways via:
u Clicking tool icon in the Toolbox
u Tool Menu Bar (Tools Selection Tools Rectangle Select/or any other select)
u Shortcut keyboard key
168
The selection area is drawn with left click mouse button, stretching downwards. The
selection could be deleted by clicking anywhere outside the selection area.
Unit - 4
Rectangle R It selects square or rectangular regions.
IT Tools Level - 3
169
Amongst the above-listed tools in Table 6.2.1.1, “Rectangle”, “Ellipse”, “Free Select”,
“Foreground and Scissors” are area selection tools whereas “Fuzzy Select” and “By
Color Select” are color selection tools.
ii) Tool Options
The most commonly associated features with selection tools are modes, antialiasing and
feather edges (Figure 6.24).
Unit - 4
Mode governs the interaction of new selection with the already existing selection. Various
modes available with Selection tools are Replace, Add, Subtract, and Intersection
(Figure 6.25 a).
170
u Replace mode will cause existing selection is replaced by new selection.
u Add mode will cause new selection to be added to existing selection
u Subtract mode will remove the new selection from existing selection.
u Intersection mode will overlap the new selection with existing selection i.e. final
selection contains the area common to both the selections.
The behavior of selection tools could be altered, if a user presses and holds down the Ctrl,
Shift, and/or Alt keys. These keys and/or combinations of these keys are known as key
modifiers that could be associated with a mode (Table 6.2.1.2).
Unit - 4
Ctrl + Alt +Drag Move Selections.
Space Bar Transforms the tool to navigate across by pressing the space bar instead
of scrolling.
Ctrl + I Reverses the selection
Table 6.2.1.2: Key Modifiers with Modes in Selection Tools
Antialiasing makes the edge boundaries of the selected image smoother. Various selection
tools create sharp selections with selected pixels inside the boundary and unselected pixels
outside the boundary.
An option on Feather Edges makes the boundary of selection blur, faded or fuzzy. It also
smoothens the sharp image selections with outside graduated ones like antialiasing. But it
works by setting the radial distance from the selection edge (Figure 6.25 b).
IT Tools Level - 3
171
Figure 6.25(b): Radius Setting for Feather Edges
Feathering edges of an image helps to integrate the image into the background or to tone
Unit - 4
down a harsh outline of the image for merging it with the background. This feature is also
useful in cutting and pasting operations.
iii) How to use Selection Tools?
The steps to execute selection tools on images are listed below:
u Step 1 : Click “File” then “Open” to open an image from the computer drive.
u Step 2 : Click on the selection tool icon in GIMP’s toolbox. Alternatively, the
selection tool could be chosen by selecting “Tools” from the program’s menu, and
then clicking the desired “Selection tools”. The chosen tool is dragged over the
current image to select the desired area.
u Step 3 : Once the area has been selected, a boundary (rectangle/ellipse/marquee/
etc.) is visible around the selected portion.
u Step 4 : Selected portion is used for further image manipulations and other operations.
172
6.2.2 Rectangle Select
The rectangle is the most commonly used tool that creates a rectangular or square selection
frames with small squares in each corner around the image to select rectangular regions of
the active layer.
The steps for rectangular selection are listed below:
1. Select the tool, click on its tool icon or use the Keyboard shortcut “R”.
2. Draw the rectangle/square selection by placing the Rectangle Selection tool icon at
the top left corner of where you want to initiate your selection and then dragging over
the area to be covered.
3. When the tool is released the rectangular outline is replaced by a marquee i.e. the
little dash lines moves around the active selection.
4. Once drawn, the Target icon changes to the “Move” icon indicated by the four
directional arrows. The Move icon allows the selection to be moved anywhere.
5. If we click outside the marquee area, the selection will disappear.
3. Marquee and Move
tool
Unit - 4
2. Dragging
1. Tool Icon to Selection
start rectangle
selection
The selection will be constrained to a “square” if a user holds down the Shift key while
drawing the selection. It will draw from the center outwards if Alt Key is pressed while
selection.
The selection boundary can be expanded or contracted through the corner areas indicated
by small rectangles/squares. Dragging the corner area upwards or outwards (diagonally)
expands the selection and dragging down or inwards (diagonally) contracts the selection.
An illustration of rectangle selection is shown in Figure 6.27. As the house in the image has
been selected, any action like manipulation/enhancement on the image will only apply to
the selected portion of the house.
IT Tools Level - 3
173
For example, if we use a Brush tool or adjust colors, it would only affect the selected part.
The selected image could also be copied and pasted into another image.
A few of the other options available with this tool are listed below:
u Rounded Corners: It is used to make the corners of the current selection, round. A
Unit - 4
slider appears for adjusting the radius of the selection on enabling this option.
u Expand from Center: The point where the selection is started by clicking the mouse
button is used as the center of the image.
u Fixed: This enables the option for constraining the shape of image selection.
u Aspect Ratio: This enables a user to resize the selection by changing or inverting the
default aspect ratio of 1:1(square).
u Width: It fixes the width of the selected image.
u Height: It fixes the height of the selected image.
u Size: It fixes both width and height.
u Position: It adjusts selected position by setting the horizontal and vertical coordinates.
u Highlight: It enables the selected area to be emphasized. If the Highlight box is
checked, the image will darken except for the selection area. This enables us to see
exactly what is selected.
174
u Guides: It creates a compositional grid. It has a variety of guides to make selection
easier in the form of center lines, rules of thirds, the rule of fifths, golden lines,
diagonal lines, no guides etc. it is highly useful in cropping an image.
u Auto Shrink: It intelligently makes an image to shrink to fit the nearest rectangular
selected shape available over the layers.
u Sample Merged: It helps Auto Shrink to extract pixel information directly from the
visible display of an image.
Unit - 4
It has mainly the same options as those in Rectangle select discussed above in section 6.2.2.
IT Tools Level - 3
175
6.2.4 Free Select
The Free Select (Lasso) tool uses mouse clicking and dragging in the image window to trace
the selection shape. The action is completed with the release of the mouse button and the
selection is shown by Marching Ants ((Figure 6.29).
It works by choosing tool icon for Free Select, or by using the Keyboard shortcut “F”.
It functions in two modes: Straight Line mode or Free Drawing mode as listed in Table
6.2.1.3.
3. Click to set another point indicated by 3. Click back on the first initial point.
the yellow circle to change direction and
4. The line will turn into the selection
move further around the selection.
boundary.
4. The process is continued until we return
5. Press ENTER key to complete the
to the first point.
selection at any time.
5. Click back on the first point.
6. The line segments will turn into the
selection boundary.
7. Press ENTER key to complete the
selection at any time.
Table 6.2.1.3: Steps for Free Selection
176
1. Straight Line 2. Free Drawing
Selection Selection
The main advantage of Lasso is that it can be used to select arbitrarily number of complex
objects. The disadvantage is that it is difficult to use this tool for precision work as it is
dependent on mouse clicks (which cannot be released in between of any selection). The
predominant options available with this tool are antialiasing and feather edges.
6.2.5 Intelligent Scissors
Unit - 4
Intelligent Scissors selects a part of an image automatically by high contrast or differences in
colors, with constant-valued color contours. It is inspired by the features of Lasso and path
tools. The region to be selected is surrounded by boundary created by joining the nodes or
anchor points clicked by mouse at the edges.
This tool works in the following manner.
1. Click and select Intelligent Scissors tool icon or use the Keyboard shortcut “I”.
2. Point and click at various points around the edge of the input image.
3. As the anchor points are marked on the edges with this point and click technique, the
tool automatically draws the selection line around the edges that it detects.
4. Press Enter outside the boundary.
5. The selection marquee is created.
IT Tools Level - 3
177
The Scissor Select Tool consists of five different icons during its functioning (Table 6.2.1.4):
It contains a small “+” to indicate that new anchor points can be added, over
existing selection line.
Indicates Move allowing selected control point to be moved to another location.
Appears when we click back on the first anchor point to complete the selection
boundary.
Appears when the selection boundary is complete & clicking within the boundary
of the selection makes the selection marquee.
Table 6.2.1.4: Various Icons and their roles in using Intelligent Scissors
The advantage that this tool has for detecting edges is that as we point and click, it
automatically redraws the selection line around the edges for tracing. Hence, we can edit the
current selection line by just adding or repositioning the control points.
Also, keeping the anchor points close will aid in more accurate boundary detection for an
image.
Unit - 4
This tool also supports the option Interactive boundary, besides antialiasing and feather
edges.
178
Figure 6.30: Scissors Tool
Unit - 4
u Lasso tool: used to select a foreground area (similar to the Free Select tool)
u Paintbrush tool: used to paint over selection to indicate the foreground color
The tool works as follows ( Figure 6.31):
1. The lasso tool is used to draw around an area that user wants to select.
2. After selection, the image goes dark.
3. Then the paintbrush tool is used to paint a brushstroke over the foreground area so
that the tool can differentiate the foreground colors from the background colors.
4. Once it determines the boundary difference between foreground and background
colors, a “mask” i.e. a bluish marker is placed over the foreground area to mark it.
5. Pressing ENTER key converts the mask to a selection marquee.
The steps are indicative in Figure 6.31.
Besides mode, antialiasing and feather edges, it has the following tool option settings:
IT Tools Level - 3
179
u Contiguous: To select a contiguous area of color strokes.
u Interactive refinement : To handle settings for the brush
u Smoothing : To control the smoothness of selection
u Preview color : To do the background color selection.
u Color Sensitivity : To set the color sensitivity of the selected region.
Unit - 4
180
6.2.7 Fuzzy Select
Fuzzy Select is a color based tool. Fuzzy selection (also called ‘magic wand’) is used for
selecting areas in an image with the similar color component (Figure 6.32). The functionality
of this tool is based on examining the RGB color components of the pixels that it clicks on.
It is very important to pick the starting point correctly.
To make a selection with the Fuzzy Select tool,
1. We first have to click on an image at a point that is the color you want to select.
2. The pixels immediately surrounding the selected pixel and falling within the threshold
of similarity will be included in the selection.
3. The size of the selection could be adjusted by holding the mouse click button down
and dragging downwards or to the right-hand side to increase the size or dragging
upwards or to the left-hand side to decrease it.
This tool has the following additional option-suite:
u Select transparent areas : To select transparent pixels within the set threshold.
u Threshold : It determines the basic range of colors. Increasing the threshold (either
by clicking on the number in a box or by dragging the blue slider), increases the range
Unit - 4
of colors to be selected. Most of the color variations in the image will be selected if a
threshold is too high. The maximum value is 255.
u Select by : To select the color component for calculating the similarity. It has following
available basic options:
r Composite : the default setting
r Red : focuses on the selection of red color.
r Green : focuses on the selection of green color.
r Blue : focuses on the selection of blue color.
r Hue : focuses on a specific color
r Saturation : focuses on the purity of colors
r Value : focuses on the light/dark values of colors
IT Tools Level - 3
181
Figure 6.32: Fuzzy Select Tools
pixels are selected in the whole image. It has the same tool options as that of fuzzy select.
182
6.2.9 Paint Tools
i) Introduction
A paint tool is a comprehensive suite consisting of 13 basic paint features as shown in
Figure 6.34
Unit - 4
Figure 6.34: Paint Tools in GIMP
The paint tools could also be selected by clicking an icon in the toolbox or by selecting a tool
from the Paint Tool tab. Shortcut keys may also be used. The functionalities of these tools
are listed in Table 6.2.1.5. The Paint tools share the same basic brushes, and the same options
for choosing colors, either from the basic palette or from a gradient. The Paint tools support
a variety of modes for painting.
IT Tools Level - 3
183
Bucket Fill Shift + B It fills an area with a selected color or pattern.
Pencil N It paints lines with hard -edges; that is, the pixels are not
anti-aliased.
Paintbrush P It paints lines with soft- or fuzzy edges; that is, the pixels
are anti-aliased and/or feathered.
Eraser Shift + E It erases pixels of an image from the current layer.
i) Tool Options
The most common tool options available in paint tools are as follows:
u Mode : The Mode drop-down list provides various application modes such as
Dissolve, Hue, Behind, Soft Light, and Hard Light, supporting a variety of special
effects. The Mode option is suitable for tools that aid in adding color to the image: the
184
Pencil, Paintbrush, Airbrush, Ink, and Clone tools. The option is usually grayed
out for rest of the paint tools.
u Opacity : The Opacity option is responsible for setting the opacity of the brush
stroke to be applied and hence controls the strength for brush operations in paint
tools. The tool creates a transparent layer above the active layer and acts on that layer
for operations.
u Brush : GIMP allows a user to use various kinds of brushes for all brush tools except
the Ink tool. The Pencil, Paintbrush, and Airbrush tools support the use of colors in
brushes and rest of the tools see intensity distribution by brushes.
u Scale : The Scale option is used to modify precisely the size of the brush.
u Brush Dynamics : It majorly considers three dynamics: pressure, velocity, and
random to map brush parameters.
u Rate : This option is applicable to the Airbrush, Convolve tool, and Smudge tool, for
rendering time-based effects.
u Size : If enabled, it increases the size of an area affected by the brush.
u Color : It supports higher gradient colors and is applicable to painting tools such as
Unit - 4
pencil, paint brush, air brush.
u Fade Out : It causes a fade out over the specified distance of a stroke and behaves
equivalently to gradually reduce the opacity along the trajectory of the stroke.
u Apply Jitter : It controls the spacing in brush stroking to make lines continual or
jittery on shaking of brush strokes.
u Incremental : This is selected if a user does not want to enhance color strokes while
reducing opacity settings.
u Color from Gradient : This allows the usage of gradient color in brush strokes.
u Hard Edge : This places colors in a rough manner when it is applied to a selected
portion of an image.
u Source : This determines the source of the image which needs to be copied for
cloning.
u Alignment : This determines the relation between brush position and the source
image that needs to be cloned.
IT Tools Level - 3
185
The varieties of brushes (for paint tool), with following setting attributes, are available in
GIMP.
u Brush Size and Shape : Selecting brush shape and size.
u Spacing : By default, it is set to 20.0.
u Brush Editor : Editing the properties of customized brushes (Aspect Ratio, Angel,
Radius etc.)
u New Brush : Creates a new customized brush.
u Duplicate Brush : Create a duplicate of selected brush.
u Delete Brush : Deletes the selected brush.
u Refresh Brushes : Refreshes the view in brushes dialogue.
copy and the actual image in the clone painting tool. For the Convolve tool, the
ctrl key toggles blur and sharpen mode and it toggles between dodging and burning
for the Dodge/Burn tool.
u Shift : Shift key renders an effect of placing the tool into straight line mode especially
with brush tools. First the starting point is chosen and clicked, and then Shift key is
pressed continuously to create line segments.
u Ctrl + shift : It renders the tool into constrained straight line mode to create perfect
horizontal, vertical or diagonal lines over the image objects. It can be used to constrain
the angle between two successive lines.
iv) How to use paint tools?
The steps to execute paint tools on images are listed below:
u Step 1 : Click on the paint tool icon in GIMP’s toolbox. Alternatively, the paint tool
could be chosen by selecting “Tools” from the program’s menu, and then clicking
the desired “Paint tool”.
186
u Step 2 : To create a canvas, choose “File” and then “New” from the GIMP menu.
One can also paint over an existing image. Click “File” then “Open” to open an
image from the computer drive. Hold the left mouse button and drag the paint tool
icon on the GIMP canvas. A small circle will occur above your mouse cursor over the
GIMP canvas to create strokes of tools like pencil, brush, eraser, etc.
u Step 3 : The color for your paint tool could be chosen by clicking on the color box,
which is located just under the tool icons on GIMP’s toolbox. The color is black
by default but can be changed by clicking any of the square color samples or by
adjusting the gradient sliders.
u Step 4 : The paint tool options could be adjusted to customize pencil, brush, eraser,
etc. These options appear on the lower half of the GIMP toolbox when the paint tool
is selected. Slide the “Opacity” slider to determine the translucency of the painting
brush. One can adjust parameters like size, aspect ratio and angle for various paint
tools. Click on the icon next to “Brush” and choose a brush shape and size that alters
the shape of the stroke of paint tools on the canvas. Several other options could be set
according to the chosen paint tool. For example; “Apply Jitter” is used to change the
stroke of brushes from a continuous line to a broken-up, scattered line.
Unit - 4
A sample image is pictured in Figure 6.35. We will apply few of the paint tools on sample
image and the results are demonstrated in Figure 6.35 (a-d).
IT Tools Level - 3
187
Figure 6.35(a): Sample Image for applying Paint tools
1. Click File
Menu
and Open
image
2. Click and
choose bucket
5. OUTPUT
after applying
bucket tool
Unit - 4
4. Set up
the tool
options
3. Choose
Color for
bucket
188
Pencil Tool
4. Use Pencil to
write and modify 1. Click and
the image choose Pencil
tool
Unit - 4
IT Tools Level - 3
189
Dodge/Burn Tool
1. Click
Dodge tool
3. Apply Dodge
tool on image 2. Set Tool Options,
to produce brush properties and
OUTPUT select intensities
ranging from
shadows, midtones to
highlights and type
from Dodge or burn
i) Introduction
Smudge tool (Figure 6.36 a), is used for smearing color pixels on a selected layer. Smudging
is used to soften color transitions, make the image blurry, hide objects, and to create textures.
smudge When a smudge tool is applied on an image, it selects the available color and merges
it with the other colors present on the image.
190
Unit - 4
Figure 6.36(b): Smudge Tool Options
ii) Tool Options
The options available with Smudge tools are (Figure 6.36 b):
Mode (disabled), Opacity, Brush, Scale, Brush Dynamics, Rate, Fade out, Apply
Jitter and Hard Edge
iii) How to use the Tool
To use smudge tool, firstly a brush type is chosen from the toolbox options and then
the mouse cursor is clicked and dragged over the selected image portion (Figure
6.36 c).
IT Tools Level - 3
191
Smudge Tool 2. Set up tool options
and select the
Original Image
brush type
1. Click
smudge
tool
3. Click and
drag the
Mouse
Cursor
over the
image
Modified Image
portion
Stamping tool (Figure 6.37 a) is used for copying the pixels from selected portions of an image
to a destination area, the user wants to cover, or for reproducing the selected portions of an
image. It uses the current brush to copy from a source image.It has a variety of applications
Unit - 4
and the famous one is to repair digital pictures or images by painting them with cloned
pixels from the selected area.
192
Unit - 4
Figure 6.37(b): Stamp Tool Options
u Tool Options
The options available with Smudge tools are (6.37 b):
Mode (disabled), Opacity, Brush, Scale, Brush Dynamics, Rate, Fade out, Apply Jitter,
Hard Edge, Source and Alignment
u How to use the Tool
Stamping is done via following steps:
i) “Clone” tool from the toolbox menu is selected. Its icon is shaped like a traditional
stamp.
IT Tools Level - 3
193
ii) One of the brush types is selected from brush Menus in GIMP.
iii) Ctrl key is pressed while using mouse to click and select the area of the source image
for pixel extraction.
iv) The selected pixels are applied by left click of a mouse in the destination areas.
v) The process is repeated if necessary.
In Figure 6.37 c, star brush is selected; the ctrl key is pressed over a green region of the parrot
appearing in the image. The selected green pixels are stamped in the background by left
clicking of the mouse.
Stamping may occur across the layers as shown in Figure 6.37 d. The image of parrot could
also be cloned onto an image having a tree with the house. The brush size is set according to
the size of a selection of parrot. Ctrl key is pressed over the image of parrot and it is released
with a left click of the mouse, on the image having a tree (to clone parrot on the tree).
An interesting feature here is to explore and set up different opacity or transparency levels
while cloning. If we change the opacity level, the clone stamp also changes the brush stroke
intensity over the image. One cannot clone from a fully transparent source. If a user tries to
clone from a partially transparent source, the effect is weighted by the opacity of the source
as shown in Figure 6.37 e.
Unit - 4
194
1. Select Stampp
tool
Stamping TTool
3. Select Pixels
P from
parrot picture by
clickingg over mouse ;
Press Cttrl Key while
clicking stamp tool
Unit - 4
4. Rellease the mousee by left click andd stamping the
bacckground
IT Tools Level - 3
195
3. Release the held Ctrl Key Cloning
with Left mouse click on
the picture having house 1. Select suitable
and a tree. brush type after
the clone tool
2. Select Parrot
picture and press
Ctrl Key.
2. Open Destination
1. Open Source Image/Picture
Image/Picture
Unit - 4
Opacity: 100
3. Click Stamp
Opacity: 40.9 Tool and Set
Tool Options
4. Apply Stamp and Change
tool Opacity level to
~ 40 from 100
196
The various transform tools in GIMP and their functionalities are listed in Table 6.2.1.6.
Align Q It is used to align or arrange layers and/or other
image objects.
Move M It is used to move layers and selections.
Unit - 4
Table 6.2.1.6: Transform Tools in GIMP
IT Tools Level - 3
197
GIMP offers three buttons which let the user select portion of an image on which transform
tool will be applied.
u If the first button is activated, then the tool works on the active layer. If no
selection exists in this layer, the whole layer will be transformed.
u If the second button is activated, then the tool works on the selection contour
only (the whole layer contour if no selection).
u If the third button is activated, the tool works on the path only.
The commonly used options available in transform tools are as follows in Table 6.2.1.7.
Align Relative To : It allows modification of the edges w.r.t. the left, right, center,
top, bottom and middle of the selected target by applying Selection option.
The rest of the options are used to align the layer, path, and channel.
Distribute : It distributes the left, right, center edges, top, bottom and middle
edges of the chosen target.
Offset : It sets the desired value to align the image.
Move Move : It allows the image to be transformed or moved.
Tool Toggle : It allows switching from one option to another.
Crop Current layer only : It is utilized only for the current layer.
Unit - 4
198
Preview : It helps a user to see the preview of an image. The subsidiary
options available are Outline, Image, and Grid. The Image and Grid can be
used together in an image and viewed or else just the outline/image option
can be seen separately.
Opacity : It makes the background of an image to be unclear or vague
when the image is filled with color.
A number of grid lines : We set the Grid option in the preview to enable
this option. This option lists the Grids which are placed on the image while
making changes.
15 degrees : This is a default option to turn an image by 15 degrees.
Scale Same as options in “Rotate” except “15 degrees” option is not available in
Scale.
Keep Aspect : This option can be made as default using the Ctrl button.
Shear Same as options in “Rotate” except “15 degrees” option is not available in
in “Shear”.
Perspective Same as options in “Rotate” except “15 degrees” option is not available in
in “Perspective”.
Flip Horizontal : It turns the image to horizontal position.
Vertical : It turns the image to a vertical position.
* Shift button is used to switch between the tools available under the Flip.
Unit - 4
Cage Create or adjust the cage.
Transform Deform the cage to deform the image.
Fill the original position of the cage with plain color.
Table 6.2.17: Options available with Transform Tools in GIMP
IT Tools Level - 3
199
Figure 6.39 (a): GIMP Crop Transform Tool
Unit - 4
Figure 6.39 (b): GIMP Image after applying Crop Transform Tool
200
Figure 6.40: GIMP Rotate Transform Tool
Unit - 4
IT Tools Level - 3
201
Figure 6.41 (b): GIMP Shear Transform Tool
6.2.12 How to change the perspective/View of an image?
The Perspective of an image can be modified to either forward or backward direction. By
Unit - 4
202
3. After altering the outline, just click the Transform button in the “Perspective” box.
4. Image is transformed and new Perspective matrix is displayed.
Unit - 4
shape of deformation. The image appears in a deformed manner after pressing “Enter” key.
IT Tools Level - 3
203
Unit - 4
204
Brightness-Contrast It adjusts brightness and contrast.
Levels It adjusts the intensity range w.r.t. the image in every channel.
Unit - 4
Figure 6.45: GIMP Color Tool
IT Tools Level - 3
205
Figure 6.46: GIMP Color Menus
The color tools except “Desaturate” and “Posterize” have preset. The presets are saved
tool settings which can be retrieved later (Figure 6.47). The features of Hue, Saturation, and
Lightness w.r.t color adjustments could be set with the help of sliders in colorizing the image.
Unit - 4
206
Figure 6.48 (a): Color Adjustment with Curves
Unit - 4
IT Tools Level - 3
207
Figure 6.48 (c): Desaturation of Colors in Images
Colors of images could also be manipulated from Colors pallet. Some more options like
Color to Alpha that converts specific color to transparency, Maximize RGB (Reduces image
to Red, Green and Blue composition), Info, Map, and Filer Pack are also available in Colors
Unit - 4
208
6.2.15 Path tool for Drawing
It is used to create paths which can be edited and may be shifted anywhere in the file. The
tool options with path tool are listed in Figure 6.49.
Unit - 4
Figure 6.49: Tool Options with Path Tool
A step by step procedure to create a polygon using the path tool is as follows (Figure 6.50):
i) Set Design and Polygonal options in the toolbox.
ii) Draw the path lines for polygon shape with the rider.
iii) Use any of the two options available to create a path: Selection from path or Stroke
path.
iv) Save the file.
IT Tools Level - 3
209
Unit - 4
Final Image
210
6.2.16 Other tools
The other miscellaneous tools in GIMP are listed in Table 6.2.1.9.
Unit - 4
Measure Text
It calculates the distance, angle, height, and It is used to create or edit text layer over
width of the selected portion of the image. images.
It is used to see the measurement
information of the selected part of the image.
IT Tools Level - 3
211
Tool Options: Tool Options:
212
Image menu supports various operations for image manipulations as listed in Figure 6.51.
We may create a new image or open an existing image for manipulation which was described
in section 1.
6.3.1 Creating Images in GIMP
Let’s explore how to create an image in GIMP. We create a sample image of the rectangular
window giving a view of moon and stars. For creating images, we need to use File Menu
and Edit Menu. A step by step procedure for creating a sample image is illustrated below
(Figure 6.52 a-j).
i) Open-File Tab.
Unit - 4
IT Tools Level - 3
213
ii) Choose and click on “New” option.
214
iv) Let’s create an image by applying rectangular selection manually.
Unit - 4
v) Draw a thick line around the selection using Edit Stroke Selection.
IT Tools Level - 3
215
Figure 6.52 (f): Stroked Selection with Black Solid Line in GIMP
Unit - 4
vi) Use paint tool brushes to draw stars and moon effect.
Figure 6.52 (g): Drawing Stars in Selected Window with Paint tool in GIMP
216
Figure 6.52 (h): Drawing Moon in
Selected Window with Paint tool in GIMP
Unit - 4
IT Tools Level - 3
217
vii) Save the created image.
viii) The image so created is saved in the desired folder and may be opened for further
processing.
218
ii) Select a gradient to fill the background.
iii) Use Dodge tool to draw the clouds and smudge tool may be used to give the little
Unit - 4
hazy appearance.
IT Tools Level - 3
219
Let’s now create a sample smiley face in GIMP (Figure 6.54 a-f).
220
iii) Stroke the eclipse boundary (Edit Stroke Selection).
Unit - 4
Figure 6.54 (d): Completing the face of smiley with paint brush
IT Tools Level - 3
221
v) Let’s make mouth with path tool (Tools Path)
Figure 6.54 (e): Completing the face of smiley with path tool
222
An image dialogue window supports various functionalities for image editing (Table
6.2.1.10).
Canvas size It adjusts the size of the image by setting image dimensions.
Unit - 4
Scale Image It changes the size of image content
Merge visible layers, These options are used for merging and aligning multiple
Flatten image, layers of images.
Align Visible layers
IT Tools Level - 3
223
Name of the Feature Description
Figure 6.55 (a): Duplicating an image in GIMP by Image Duplicate or pressing Ctr+D
224
Figure 6.55 (b): Transforming an image in GIMP by rotating by 180 degrees
Cropping Image
Unit - 4
Cropped Portion
Figure 6.55 (c): Cropping an image in GIMP by Selection
IT Tools Level - 3
225
Figure 6.55 (c): Viewing Image Properties in GIMP
6.3.2 Editing Images
The commonly used functionalities related to image editing are cut, copy, paste, foreground,
background color, pattern, and stroke selection as shown in Figure 6.56.
GIMP Edit
Unit - 4
226
6.3.2.1 Cut, Copy & Paste
It fills the image with the default foreground color. A user may select any part of an image
and fill it with the foreground color by following the steps given below:
u Open Gimp Image Window
u Select a portion in the image using rectangle/eclipse/free select
u Edit Fill with FG color
u File save
Unit - 4
6.3.2.3 Background Color
It fills the image with the default background color. A user may select any part of an image
and fill it with the background color.
u Open Gimp Image Window
u Select a portion in the image using rectangle/eclipse/free select
u Edit Fill with BG color
u File save
6.3.2.4 Fill with Pattern
It fills the image with any of the patterns available in GIMP (Figure 6.57).
IT Tools Level - 3
227
Figure 6.57: Image Editing Patterns in GIMP
A user may select any part of an image and fill it with the desired pattern by following the
Unit - 4
228
Unit - 4
Figure 6.58: Stroke Selections in GIMP
The Antialiasing option softens the curved strokes drawn over an image and makes it
smoother.
6.3.2.6 Stroke with Paint Tool
It aids in striking the selected portion of the image using the available paint tools (Figure
6.58, discussed in section 6.2.1) in GIMP. The steps are as follows:
IT Tools Level - 3
229
u Open Gimp Image Window
u Select a portion in the image using rectangle/eclipse/free select
u Edit Stroke with Paint tool
u File save
Unit - 4
Preferences tab in GIMP allows adjustment features like configuring keyboard shortcuts,
enabling previews, maintaining interfaces, calibrating monitors, editing window appearances,
and doing color management. It supports the following options:
i) Customize Environment: It enables a user to modify and set the amount of system
memory allocated for various purposes.
ii) User Interface: It enables a user to set the layer or channel previews and keyboard
shortcuts in GIMP.
iii) Change theme: It enables a user to select a theme which determines the appearance
of GIMP.
iv) Modify Help System: It helps a user to modify help feature of GIMP.
v) Customize Tool Options: It lets a user change the way the tools function in GIMP.
230
vi) Customize toolbox appearance: It enables a user to modify the appearance of the
Toolbox.
vii) Customize Default Image size: It enables a user to customize the default image size. The
user can alter the default screen size in the “Default New Image” dialog box.
viii) Configure Default Image Grid: It allows altering the default properties of GIMP grid.
This feature is enabled using View Show Grid from the image menu.
ix) Change Image Window: It enables a user to change and set features related to Mouse
Pointer, Space Bar, Zoom, and Resize effects of an image.
x) Set Display Mode: It enables a user to set the display modes for customizing the visible/
transparent portion of an image.
xi) Color Management: It enables a user to modify the features of the GIMPs Color
Profile.
xii) Configure Input Devices: It enables a user to manage and control the input devices
connected to your computer system.
xiii) Configure Window Management: It allows a user to customize the appearance of
various windows in GIMP.
xiv) Folder Options: It enables a user to change and set new location/path for two main
folders utilized by GIMP to store the temporary files.
Unit - 4
IT Tools Level - 3
231
6.4 Applying Filters
Gimp has various powerful graphical features and may render diversified effects or textures
to images. A filter tool (Filters) in GIMP is one such special plug-in feature that may modify
the image appearance on the current layer by running algorithms. These algorithms support
activities like inserting lightening effects on the image, distorting an image etc. and generate
a modified image. There is a variety of effects within filters tool as shown in Figure 6.61.
Unit - 4
232
GIMP FILTERS Click on any fiter to be applied
It provides a set of filters (Table 6.2.1.11, Figure 6.62 a) to make a whole image or a part of
an image blurry with various parameter settings like defining magnitude or type of blurring.
Unit - 4
Figure 6.62 (a): Blur Effects
IT Tools Level - 3
233
Blur Effect Purpose
Motion Blur It creates motion effects in a particular direction with Linear, Radial or
Zoom movements which could be enhanced with length (1-256) and angle
(0-360) settings.
Pixelize It is known as Abraham Lincoln Effect and converts an image into an
array of solid squares. The similar concept is used many times in identity
masking. Pixel width and height of the color blocks of an image could be
set by the user.
Selective It is used to enhance the depth of an image. It doesn’t consider all the pixel
Gaussian Blur values of an image rather it applies blur effect only if the difference between
current value and value of surrounding pixels is less than some threshold
delta i.e. it sets up a threshold to blur all the pixels similar to each other.
A good example of this kind of filter is to highlight the foreground and
making background blur so that the foreground is enhanced and highlighted.
It sets Blur radius (Blur intensity) and Max Delta (the difference between
the pixel value and the surrounding ones in the range [0-255]).
Tileable It merges, blurs, and wraps the borders of an image making it appear like
Gaussian Blur a tiling concept. It reduces edge effects. Blur vertically or horizontally
Unit - 4
The three most commonly used Blur filters are illustrated in Figure 6.62 (b-d).
Blurred Image
234
Radial Motion Blurred Image
Unit - 4
IT Tools Level - 3
235
The rest of the blur filters could be experimented with various options to see the blurriness
effects.
6.4.2.2 Enhance Filter
It is used to remove image imperfections such as noise distortion (possibly caused due to
dust particles), inappropriate sharpness, and intermixed frames.
the image. A user can select and drag the “Black Level” or “White
Level” slider left and right until he/she reaches the point at which
GIMP removes unwanted pixels without affecting the rest of the
image.
Destripe It removes the vertical stripes in an image, caused by poor quality
scanners. It works by adding a pattern which interferes with the
image to remove strips. The strength of the filter is set using “Width”
option, available with this filter.
NL (Non-Linear) It combines Despeckle, Sharpen, and Smooth enhancement
Filter functions to improve the appearance of focus on the entire image, not
on any particular selection.
Red Eye Removal It performs red-eye corrections. It may set threshold parameter to
eliminate the amount of red eye color.
236
Enhance Filters Purpose
Sharpen It is useful for correction of sharpness in digitized images by
accentuating edges and any kind of noise. It allows a user to set
sharpness for the image and preview it.
UnSharp Mask It sharpens the image without increasing noise. It allows a user to
select where sharpening is required and with what strength via
Radius, Amount, and Threshold parameters.
Table 6.2.1.12: Enhance Effects/Filters in GIMP
Unit - 4
Figure 6.63 (a): Enhance Effects
IT Tools Level - 3
237
Figure 6.63 (b): Application of Enhance Effects
These filters may transform the shape of an image in several ways (Table 6.2.1.13, Figure
6.64):
238
Enhance Effect Purpose
Engrave It produces an engraving effect, like one found on coins. The image is
simulated with black and white horizontal lines of varying height based
on the value of underlying pixels.
Erase Every Other row It erases row and columns by changing them to the background color.
Unit - 4
Orientation, and Wrap Type.
Shift It shifts pixels rows horizontally or vertically.
Value Propagate It works on color borders by spreading pixels that differ in a specified
way from their neighboring pixels and setting mode and propagate
options.
Video It simulates distortion produced by low-resolution monitors.
Waves, Whirl, and Pinch, It distorts an image with waves, whirling and pinching and wind-blow
Wind effects.
Table 6.2.1.13: Distortion Effects/Filters in GIMP
IT Tools Level - 3
239
Unit - 4
These filters render various kinds of illuminations or shadows on the current image. The
basic filters are listed in Table 6.2.1.14.
Effect Purpose
Gradient & Lens Flare They simulate the sun like flares in images by putting a lens like effects
in gradients.
Lighting Effects Lighting Effects is a powerful tool for creating effects similar to of studio
lighting. One application of such tool is to put spot lights to emphasize
certain parts of the image. The basic settings consider both directional
lights and point lights. Other settings include precise positioning and
glowing settings, intensity settings, and bump & environment map
settings.
240
Effect Purpose
Sparkle It creates a sparkle-like effect by using a sequence of tiny flare effects
for highlighting areas of the current image. This tool has options
for adjusting the threshold, intensity, spike length, points, and angle
direction with hue, saturation, and transparency.
Supernova Supernova tries to create a flare with long lines of light that originate
from the center. The predominant settings available in this filter are
color, the radius of the center, the number of rays or spokes, and a
random hue setting that generates a rainbow kind of effect in the light
rays.
Unit - 4
as the distance from the horizon.
iii) Each Effect to apply the 3D effect to a selected region of an image.
The following image ( Figure 6.65), is taken as input to apply the succeeding filters.
Figure 6.65: An input image for Lighting, Noise, and Edge Detection Filters
IT Tools Level - 3
241
The basic Lighting filter effects are illustrated in Figure 6.66 (a, b, c, d).
Unit - 4
242
Unit - 4
IT Tools Level - 3
243
Unit - 4
244
Figure 6.67 (a): Gradient Flare Effects
Unit - 4
IT Tools Level - 3
245
Figure 6.67 (c): Supernova Effect
Unit - 4
246
6.4.2.5 Noise Filters
Noise filters add noisy pixels/disturbance to the current image. “HSV noise” creates
disturbances in hue, saturation or luminosity value of an image under consideration. “Hurl”
as a Noise filter, adds random pixels to the image, making it look disturbed. “Slur” makes
a ragged edge to all of the elements in an image by sliding the pixels downwards. “Pick”
interchanges few of the pixels with neighboring ones. RGB noise behaves as “Hurl”, besides
it also allows selecting pixel colors. The “Spread” works by swapping pixel in one place
with a randomly chosen pixel from another source considering color transitions. The Figure
6.68 (a, b, c) demonstrates the application of various noise filters.
a) HSV Noise
Unit - 4
IT Tools Level - 3
247
b) Random Hurl, Slur, and Pick
Unit - 4
248
c) RGB Noise
Unit - 4
Figure 6.68 a, b, c Illustrations of Noise Tools and Effects in GIMP
GIMP also renders edge-detecting filters for searching boundaries between various colors
of an image based on gradient calculus methods. One of the famous tools is Difference
of Gaussians, which can detect salient details of a photographed figure with an important
feature of controlling edge thickness. “Edge” detects edge boundaries. “Neon” simulates
the glowing boundary on edges, “Laplace” detects high-resolution edges and “Sobel”
simulates direction dependent edge detection (Figure 6.69).
IT Tools Level - 3
249
Unit - 4
250
Figure 6.69: Illustration of Edge Detection in GIMP
Unit - 4
6.4.2.7 Generic Filters
IT Tools Level - 3
251
Final Value after applying enhancement by multiplying with enhancement/Kernel
matrix is: g × 1 + h × 2 + i × 3+l × 4 + m × 5+ .................................. s × 9.
ii) Dilate Filter: It detects lighter areas of an image to widen and enhance them.
ii) Filmstrip : It combines layers in the image into a single image that seems like a
35mm film strip.
6.4.2.9 Artistic Filters
These filters enhance the image with impressionist work of art such as sketches, paintings,
making cartoons etc.
Effect Purpose
Apply canvas It renders canvas texture to an image.
Cartoon It renders cartoon version of an image. This filter has a functionality to adjust
the “Mask” and “Percent” sliders in the Cartoon window to modify the photo.
Clothify It renders a cloth-like texture to an image
Cubism It converts an image to cubic art. Cubic art is a form of modern painting.
GIMPressionist It performs artistic operations on an image.
GlassTile It renders a simulation of distortion caused by glass tiles.
Oilify It renders an oil painting effect via smearing colors.
252
Photocopy It makes the image appear as the output of a copier machine with overdone
edges.
Predator It renders a predator effect to an image (i.e. it reduces image into few basic
colors on a dark background).
Softglow It renders an effect that makes a photo softly blurred and overexposed. This
filter allows the user to alter the glow radius (i.e. effect spreads), the brightness
and sharpness (level of detailing in the image).
Weave It renders a knitted texture like of woven bucket.
Van Gogh It renders an effect based on the mathematical operation of Line Integral
Convolution.
Table 6.2.1.15: Artistic Filters in GIMP
Unit - 4
Apply Canvas Weaves
IT Tools Level - 3
253
Soft Glow Oilfy
Preda Photocopy
Unit - 4
This filter provides borders to the selected image.The three main filters under this category
are as follows:
Effect Purpose
Add Bevel It adds a bevel to the current image.
Add Border It adds borders to the current image.
Round Corners It makes corners of the current image
smoother by curving them.
254
The two filters: Add Border and Round Coroners are illustrated in Figure 6.72.
Figure 6.71
Add Borders
Unit - 4
IT Tools Level - 3
255
Figure 6.72 (a): Illustration of Add Border and
Unit - 4
Map filters simulate 3D effects in an image by mapping the image into an object. It has the
collection of various filters listed in Table 6.2.1.17 (illustrated in Figure 6.73)
Effect Purpose
Bump Map It renders an embossing effect.
Displace It displaces pixels according to maps.
Fractal Trace It transforms image with Mandelbrot fractal.
Illusion It superimposes the altered copies of an image.
Make Seamless It makes an image seamlessly tileable.
Paper tile It cuts and breaks the image into the paper tile-like structure.
Table 6.2.1.17: Map Filters in GIMP
256
The other three useful filters: “Tile”, “Small Tiles”, “Warp” are also available for applying
the 3D Tile effects.
Bump Map Illusion Fractal Trace
Map to Object
Paper Tile
Make Seamless
Unit - 4
Figure 6.73: Illustrations of few of the Map Filters in GIMP
This class of filters behaves differently, as they may overwrite a current layer by applying the
effect from scratch. It is, therefore, safe to duplicate layer while working with these filters. It
has various filters as listed in Table 6.2.1.18.
Effect Purpose
Clouds Difference Clouds: It adds Difference layer Mode in cloud-like areas.
Fog: It adds Layer of Fog.
Plasma: It generates colorful clouds which can be used for textures.
Solid Noise: It adds random gray smoky cloud textures.
Nature Flame: It creates cosmic recursive frames.
IFS: It is Iterated Function System to create organic shapes.
IT Tools Level - 3
257
Effect Purpose
Patterns It renders various patterns to images from check-board, grid, jigsaw,
maze, qbist, Sinus, CML explorer and diffraction patterns.
Circuit It superimposes image with traces of circuit boards like pattern.
Gfig It renders geometric shapes and scales.
Lava It fills the image with lava effects.
Line Nova It uses foreground color to generate rays from the center, spreading
in an outward direction.
Sphere Designer It adds sphere like texture to the current image.
Spyrogimp It adds Spiro-graph curves to the current image.
Table 6.2.1.18: Render Filters in GIMP
The web filters support the use of images in Web pages. They are mainly of three kinds:
i. “Image Map”, which runs a javascript engine and allows the user to quickly divide the
image and creates a hyperlink kind of area; where a user can click and reach the various
258
links, ii. “Semi-Flatten” renders semitransparent levels with the background color. “Slice”
generates tiled table of the current image for use in Web pages.
6.4.2.14 Animation
Animation filter renders a sequence of images, with timing information attached to each
frame of the image. The GIMP considers each layer in an image as an animation frame. It
supports the conversion of layered images to Indexed format and outputs as GIF files. It
has the following emphasizing effects:
Effect Purpose
Blend It creates an intermediate layer to blend two or more image
frames over the background.
Rippling It applies Ripple effect to the current image to create a
multi-layer effect.
Spinning Globe It creates an animation via spinning sphere effect.
Waves It creates an animation via an effect which appears as if
the stone was thrown on the image. One can choose the
number of frames required for animation. The amplitude
Unit - 4
and wavelength for the animation could be adjusted.
Optimize Difference & GIF They help in reducing the size of animation via
optimization (reducing the size of layers by saving only the
changes made with time in layers instead of saving again
the whole image).
Table 6.2.1.19: Animation Filters in GIMP
When applying animation is finished, one will see a still image of the effect, in the image
window. But to view the animated effect, FILTERS/ANIMATION and PLAYBACK option
may be selected.
The steps to make a sample wave animation in GIMP are listed below:
i) Open an image file in GIMP.
ii) Under the FILTERS menu, select ANIMATION and WAVES to open the waves
control panel. A user can choose a number of frames for the animation.
IT Tools Level - 3
259
iii) Adjust the amplitude and wavelength for the animation which may change the nature
of the wave.
iv) The program will begin rendering on click of an OK button. When it is finished a
user can see a still image of the effect (GIF).
v) To view the animation, choose FILTERS/ANIMATION and PLAYBACK
vi) The text could be added and its color, font and others factor could be adjusted.
vii) The image is now the way we want it, the text being in the proper place for the final
frame.
viii) SAVE AS from the FILE menu is used to save the animation. The animation is saved
as GIF animation and, therefore, selects GIF from the file type menu.
ix) The animated image could be exported for future references.
6.4.2.15 Alpha to Logo
This filter is useful in the creation of logos and also in adding special effects to alpha channels
that represent the degree of transparency of the color (majorly red, green and blue channels)
in an image. Alpha channels define transparent areas. The various effects in this filter are
listed below:
Effect Purpose
Unit - 4
3D Outline It outlines the non-transparent areas of the active layer and adds a drop
shadow.
Alien Glow It adds an eerie glow to the image.
Alien Neon It adds psychedelic outlines to the image.
Basic I and II They add gradient effect, drop shadow and highlighting effects.
260
Effect Purpose
Frosty It adds a frost effect to the image.
Glossy It adds a glossy effect to the image.
Glowing Hot It adds a glowing hot metal effect to the image.
Gradient Bevel It adds a shiny look and bevel effect to the image.
Neon It converts the image to the neon object.
Particle Trace It adds a trace of particles effect to the image.
Textured It fills the image with texture and shadows.
This filter is very useful in adding effects to text in GIMP. The steps for adding effects to text
are as follows:
i) Use “File” from the menu bar to select “New” for creating a new document or
“Open” if the text is to be added to an existing image.
ii) Click “Tools” from the menu bar and then click “Text.”
iii) Left-click the canvas to type the text. It might be customized with Tool Options.
Unit - 4
iv) “Filters” from the menu bar is clicked to select “Alpha to Logo.”
v) Select one of the preset effects mentioned in Table 6.2.1.20.
vi) The selected effect is customized by adjusting the parameters on the Script-Fu
window. For example, when applying the “Alien Glow” effect, a user can adjust the
glow size and color while for the “Bovination” effect one can specify the spot density
and background color.
vii) Click “OK” to apply the selected effect to your text.
The effect of using Alpha to Logo filters on text is demonstrated in Figure 6.75.
IT Tools Level - 3
261
Alien Neon Chalk Cool Metal
Gimp has support for extending and applying macros by using the following supporting
language scripts:
u Gimp Script-Fu, SCM scripting system, based on the Scheme language
Gimp-Perl
Unit - 4
u Gimp#
u Ruby
u C or C++ to code a binary plugin
262
Figure 6.76: Layer Menus in GIMP
Layer Dialogue has many options available to perform various functionalities. They are
listed as follows (Figure 6.77):
A. Adding a new layer: It allows the user to add a layer by naming the layer, setting up
Unit - 4
width and height, and choosing whether it should be transparent, white, or black in
the background.
B. Create New Layer Group: It creates a new layer group and adds it to an image.
C. Move the layer up: It simply moves the layer up in the stack of layers for processing.
D. Move layer down: It moves the layer down and the layer would be placed underneath
the background layer.
E. Duplicate the layer: It creates an identical layer by duplicating.
F. Anchor the layer: It merges the image on current layer to another image on the layer
below Gimp creates a “floating layer” and this layer contains what a user wants to
copy to other layers. Pressing the anchor option will make floating layer disappear,
the contents of the floating layer are transferred to the destination layer.
G. Delete the layer: It removes the currently selected layer.
IT Tools Level - 3
263
Figure 6.77 (a): Layer Dialogue Options
Unit - 4
Layers of Images
264
Opacity: It acts a slider to change the transparency of the selected layer.
Lock: A locked layer prevents modification of the Layer’s pixels. ‘Lock Alpha channel’
feature is to keep transparent regions intact and confines editing to only opaque portions of
the layer.
Layers are important to make up an image composition if a bunch of different images from
different files are combined into one image. While creating an image composition in this
manner, one could copy and paste images from different files into his/her file but keep them
on separate layers. An image on each layer can be scaled, moved, enhanced, re-colored, etc.,
without affecting the images on the other layers.
A simple example is shown below (Figure 6.77 c).
1. We have an image of a tree (File Open Image).
2. Let’s try to put up an apple on the tree.
3. We open the image of fruit basket in another layer by using File Open as Layers.
4. The
Selection tool is used to isolate the apple image pixels.
5. The selection is pasted as a Layer into the tree image (Edit Paste As New
Layer).
Unit - 4
IT Tools Level - 3
265
Figure 6.77 (c): Layer Image Montage
266
iv) The New Layer window opens up.
Unit - 4
v) Set up the parameters like Layer Name, Height, Width and Fill Type as listed in
Figure 6.78 b.
vi) Save the File.
Besides New Layer we have the following options available with Layers in GIMP:
u Edit Layer Attributes: It allows the user to enter a new name for the layer.
u New Layer from visible: It creates a new layer comprising of all the elements of the
currently visible layers, merged into one layer.
u Duplicate/Anchor/Delete Layer: These are similar functions to their icon
counterparts.
u Merge Down: It merges the currently selected layer with the next visible layer below
it.
u Layer Boundary Size: Every layer has its boundary and this option adjusts the layer
dimensions making it easier for you to demarcate selected and non-selected layers.
IT Tools Level - 3
267
u Layer to Image Size: It resizes the layer boundary to the image size.
u Scale Layer: It changes the size of layer content.
u Auto crop: It removes empty borders from the image layer.
u Stack: It supports selecting previous, next, top and bottom layers.
u Add Layer Mask: It adds a layer mask to the selected layer to avoid destructive
changes in editing transparency. This option lets you choose the type of mask you
want to apply on the particular layer.
u Apply/Delete Layer Mask: Apply layer mask appends the changes done in the mask
to the current layer and Delete layer removes the mask.
u Show Layer Mask: It reflects the changes done in the applied mask.
u Edit Layer Mask: It allows switching between the layer and its applied mask by
either using it or by clicking on the preview.
u Mask to Selection: It replaces the selection with the mask layer.
u Add Alpha Channel: It adds transparency to the selected layer. It is a very handy tool
for creating quick animation with the GIMP.
Unit - 4
268
Figure 6.79 (a): Opacity level of 100
Unit - 4
IT Tools Level - 3
269
Figure 6.79 (c): Opacity level of 0
Unit - 4
270
Figure 6.80: Adding Text over Image in layers
Unit - 4
IT Tools Level - 3
271
4. Scale Layer
Layer Scale Layer
272
6.5.3 Layer Masking
Layer masks in GIMP offer an elegant way to edit specific portions of images placed in layers
within a GIMP document. It may produce more attractive outputs by refining selections.
When a layer mask is applied to an image over the layer, the mask makes parts of the layer
transparent so that any layers below are shown through. This could prove to be an impressive
way of combining two or more images to produce a final image which combines selected
portions of each of them.
The steps for layer masking are as follows:
i) Right Click on the layer needed to be masked and Click on Add Layer Mask.
Unit - 4
Figure 6.84: Add Layer Mask Options in GIMP
ii) A mask layer option is chosen and thumbnail will appear in right layers window with
the image.
iii) Now all the operations performed on the canvas will be on the mask.
iv) Operations like selection; paint etc. could be applied to the mask.
IT Tools Level - 3
273
v) After operations, setting the transparency levels will generate an effect in which
layer below the mask is visible depending on transparency from black to light gray
gradients.
The steps to Add Alpha Channel to a sample image are given below and their use is
demonstrated in Figure 6.85.
i) The default layer i.e. background layer opens up in the editor layers dialogue.
ii) Give this layer a color, say, sea green.
iii) Add another layer and let us call it a tree. Paste an image of some tree on this layer.
iv) Drag the background layer above the tree layer. It may be observed that the tree is
hidden in the background.
v) Right-click on the background layer and click on Add layer Mask.
vi) A window pops up with several options. Select white (full opacity).
vii) A thumbnail mask, indicated by a white box in front of the background layer in the
layers stack, is created.
viii) Select the rectangle tool and draw a rectangle via selection on the background layer.
ix) Change the color to black from foreground and background color option at the end
of the toolbox.
Unit - 4
x) Select edit menu and click on fill with FG (foreground) color. This will show the
selected portion of the tree with full transparency.
xi) Repeat the steps with some dark shade of gray color, light shade of gray color, and
light shade of white color.
Please note that black will mean full transparency and white will mean full opacity. The
colors lying in between will act as translucent according to the shades.
274
Figure 6.85 (a): Creating a layer with a Foreground Gradient Fill
Unit - 4
IT Tools Level - 3
275
Figure 6.85 (c): Add a layer mask to the image
Unit - 4
276
Figure 6.85 (d): Selection a portion from an image of mask layer and changing foreground to black
IT Tools Level - 3
277
Figure 6.85 (g): Result of masking after multiple selections and changing foreground gradients
within the alpha channel indicate that transparency should appear at that part of the image.
The creative use of alpha channels allows partial transparency or fading effects due to the
inclusion of a gradient design in the alpha channel.
The steps to Add Alpha Channel to a sample image are given below and their use is
demonstrated in Figure 6.86:
1) Default Background layer will appear in the layers dock with a default color white.
Change its color to Yellow.
2) Add another layer from layer menu new layer
3) Let us name this layer as House and paste the image of some house
4) Using the selection tool and select a portion the house.
5) Go to Layer menu Transparency Color to Alpha
6) Select white (here white means transparency)
7) The selected portion will get a yellow color similar to the background.
278
8) Transparency tool has various other options like removing alpha channel which will
remove this yellow color and the house will revert to its normal color.
Unit - 4
IT Tools Level - 3
279
Figure 6.86 (c): Result after applying Color to Alpha for selection
Channels in GIMP are very similar to layers; however, each layer corresponds to a particular
level in the color model of the image (RGB, HSV or CMYK). Channels dialogues (Figure
6.87) can be selected in any combination, and appear as gray shaded, if currently active.
Unit - 4
280
The purpose of ‘Channels’ is to process color channels (applied to images) and maintain
selection masks. And the ‘Path’ dialogue with layers and Channels is used to manage paths
of images for creation, deletion, saving, converting to or from selections etc.
GIMP is versatile image manipulation software packed with various attractive features,
many of which are explored in this chapter. It can be explored for other aspects too for image
manipulations and making images more attractive.
Points to Remember
u GIMP is an acronym for GNU Image Manipulation Program.
u It is a freely distributed, versatile image manipulation software package with a
customizable interface.
u It has support for multiple platforms including Windows and Linux.
u It supports various file formats including .gif, .jpeg, .png, .tiff etc.
u It is a full suite of painting tools including a variety of brushes, pencil etc.
u It has selection tools (Rectangle, Eclipse, free lasso, fuzzy etc., for selecting portions
of an image.
u It has transformations tools like rotate, flip, scale and shear.
Unit - 4
u It has support for high-quality antialiasing.
u It also supports a variety of Filters for image enhancement or modification in
appearance.
u It has full Alpha Channel Support.
u It has the functionality of Layers and Channels.
u It has the functionality of masking of images.
u It also has Plug-ins for easy addition of new file formats, filters and scripting
capabilities.
Exercises
u What does GIMP stand for?
u What is Gimp’s default graphics file format?
u List five main components of GIMP environment.
u What are Dockable Dialogues in GIMP?
IT Tools Level - 3
281
u Create a file in GIMP and demonstrate the purpose of paint tools and selection tools.
u Open an image of human eyes with red eyes effect in GIMP and perform red-eye
correction.
u Draw i) a smiley face ii) a house with the help of GIMP.
u Apply Comic Book effect to an image in GIMP.
u List the steps for cloning in GIMP.
u Open an image and change the background of an image in GIMP.
u Implement the following features of GIMP on an image:
i) Resize-Crop
ii) Brightness/Contrast
iii) Colorize with Hue and Saturation
iv) Zoom
v) Add a border to an image
vi) Add text to an image.
vii) Rotate an image by 90 degrees
u Animate a bouncing ball in GIMP.
Unit - 4
282
u List the possible steps to create a red colored balloon with some text in GIMP.
u How can GIMP be used to create a speech bubble on some cartoon?
u List any two plugins with their purpose available in GIMP.
Unit - 4
Combine New Zoom
Copy Noise
Crop Open
Curves Open as Layers
Cut Paste
Desaturate Patterns
Dockable Dialogues Perspective
Dodge Posterize
Preferences
IT Tools Level - 3
283
284
Unit - 5
Unit - 5
Troubleshooting -
Hardware, Software
and Networking
Chapter
7
Troubleshooting - Hardware,
Software and Networking
7.1 Introduction
While working with a computer you are sure to come across some hardware, software and
networking problems. The objective of this chapter is to help you find a solution to some
commonly encountered problems. Having gone through this chapter you will be able to
diagnose and fix minor issues. You may need expert advice for advanced problems not
covered here. As you gain experience, you would be more confident to handle problems.
Some of these problems would not occur if you work carefully and ensure that connections
are in place and proper settings are done. There could be many reasons/ causes for a problem
on a computer. It is sometimes difficult to judge if it is a hardware-related or software-related
problem. Troubleshooting is generally a trial and error process, requiring persistence and
patience. Starting with the simplest possible cause, we use the process of elimination to
diagnose the problem. One needs to figure out the cause of the problem, i.e., identify the
part of the computer system that is not functioning well.
Always take a backup of your important files to another source, like a pen drive or an external
Unit - 5
hard disk. In case the problem is not solved, this ensures that a copy of your data is available.
286
of these devices is ON. For wireless devices, make sure it is turned on and the batteries are
charged.
For example, a laptop’s battery may not be charged. Plug the AC adapter into the electric
socket, wait a few minutes, and then try to turn on the laptop.
Repeat the Steps to See if the Problem Recurs: Repeat the sequence of steps that you
performed before the problem occurred. Observe if it causes the same response from your
computer.
Use Help: Access the Help window by pressing the F1 key. This window helps to find a
solution to the problem.
Record Error Messages: Record the full error message for future reference.
Restart the Computer: Restart the peripheral device. If the device still does not switch on,
shut down the computer and start it again.
Unit - 5
laptop will start charging, and in a few minutes, the laptop can be switched on.
7.3.2 Keyboard Troubleshooting
If the keyboard is not responding, try the following:
Check Connections: Check the connection of the keyboard to the computer. If it is not
connected, or the connection is loose, connect it properly to the computer.
Check for any Damage: Inspect the keyboard cord for any damage. If any damage is found,
the keyboard may need to be repaired or replaced.
Change Batteries: For a wireless keyboard, the batteries may have discharged. You may
need to change the batteries.
IT Tools Level - 3
287
Keys are Stuck: If one of the keys on your keyboard is stuck, you need to clean the keyboard.
You will have to first turn off the computer. As the keyboard is stuck, you may need to use a
mouse if required. Remove dust with the help of a brush, and wipe the keyboard clean with
a damp cloth (water should not be dripping from the cloth).
7.3.3 Mouse Troubleshooting
In case the mouse is not working, try the following troubleshooting options:
Check Connections: Make sure that the mouse is securely plugged into the computer.
Check for any Damage: Inspect the mouse cord for any damage. If the damage is noticed,
the mouse may need to be replaced.
Check the Cordless Mouse: For a cordless mouse which is not working, switch off, and
then switch on the cordless mouse. This should re-establish a connection with the system.
Clean the Mouse: Try cleaning the mouse with a damp cloth. Clean the area around the
button located on the underside of the mouse.
7.3.4 Troubleshooting Printer Problems
7.3.4.1 Printer is Not Responding (Not Printing)
The printer could not be responding due to a number of reasons. Check for each of the
following causes, taking necessary action as required:
The Printer is Not Connected Properly or Not Switched On: Ensure that the printer cables are
connected properly. If the printer is not switched on, switch it on.
The Printer is Out Of Paper: If the printer does not have paper, put paper in the paper tray
and try printing again.
Unit - 5
The Printer Paper Jam (Paper is Caught in the Printer): Open the printer and remove the paper
caught in the printer. Close the printer and try printing again.
The Ink Cartridge of Printer is Empty: Most printers give a warning message when the ink
levels are low (insufficient for printing). Change the ink cartridge and try again.
Incorrect Printer Driver: The printer driver may be incorrect. You would need to install a new
printer driver. The latest driver can be downloaded from the manufacturer’s website. Some
printers, when connected to the internet, give a message when driver updates are available.
Consult your system administrator before installing any new software.
288
The Printer and Computer are Communicating Properly: This problem is more common when
a wireless connection is being used to connect a PC/ laptop to a printer. Check that the IP
address configured on your computer matches the Dynamic IP address allocated to the
printer (If the printer is connected through WI-FI (a wireless network) the configured IP
Address could be different from the one stored on your PC).
Before troubleshooting the printer’s IP address, you need to ensure that both your system
and printer are connected by means of a network – through a wireless connection or through
Ethernet. (Discussed in Section 7.5)
You can access your printer settings and check the IP address and change the settings (if
required). Follow the following steps:
Step 1: Open the devices and printer dialog box by clicking Start button > Control
Panel > Hardware and Sound > Devices and Printers (or Start button > Control Panel >
All Control Panel Items > Devices and Printers), and select the printer whose IP address
you wish to check/change. (The example below, Figure 7.1, shows an HP Printer. Other
printer models also have similar interfaces).
Unit - 5
IT Tools Level - 3
289
Step 2: Select the desired Printer (here HP Deskjet 3540 was selected). The following screen
(Figure 7.2) shows the programs that can be selected to manage the printer, change its
settings, etc.
Step 3: Run the HP Print Assistant (as shown in Figure 7.3). This program manages
Unit - 5
the printer and gives access to the Help information. The HP Print Assistant program may
take some time to open, as your PC/ laptop would try to establish a connection with the
printer.
290
Figure 7.3: HP printer Assistant: Processing
Step 4: Click on the Utilities icon to get the printer utilities screen (Figure 7.4).
Unit - 5
IT Tools Level - 3
291
Step 5: Run the ‘Update IP Address’ utility. Before the utility program starts, a pop-up
message appears - “Do you want to allow the following program to make changes to your computer?”.
On confirmation, a screen (Figure 7.5) showing the printer’s Previous IP address appears (in
this case 192.168.1.11). Please note that the box next to the Test button would be blank.
Unit - 5
Step 6: We have to now check whether the printer’s Previous IP address matches the Printer’s
current IP address.
Your system may be connected to the printer through a wireless or an Ethernet connection.
For Wireless Connection: Press the Wireless button or touch the wireless icon on the
printer display. The printer’s IP address appears (see Figure 7.6). As shown in this screen, it
is 192.168.1.5. In case, the printer does not have a display, print the Wireless Network Test
Report. This report includes the printer’s IP address.
292
Figure 7.6: Current IP address of Printer
For an Ethernet Connection: Press the Ethernet icon on the printer display. The printer’s IP
address appears. In case the printer does not have a display, print the Network Configuration
page. This report includes the printer’s IP address.
Step 7: Update HP Software with Printer IP Address: From the above screens (Figure 7.5
and Figure 7.6), we can see that the Printer’s previous IP address saved on your system
(192.168.1.11) does not match the Printer’s current IP address (192.168.1.5). Enter
Printer’s current IP address or hostname in the box provided (HP Software screen is shown
in Figure 7.5) and Click Test (to test the printer connection with the changed IP address).
On successfully connecting to a printer with the current IP address, the software shows a
Success message. Click Save to update the software with this new IP address.
7.3.4.2 Print Jobs are Being Sent to the Wrong Printer
When there are multiple printers on a network, a possible problem could be that a print
job is being sent to a wrong printer. This is because your system has set the default printer
Unit - 5
as Printer A, but you had actually wanted the print job to go to Printer B. You could either
change the default printer to Printer B or choose Printer B for the current job.
Change the Default Printer
To change the Default Printer, open the devices and printer dialog box. Click Start button
> Control Panel > Hardware and Sound > Devices and Printers. Alternatively, click Start
button > Control Panel > All Control Panel Items > Devices and Printers. The screen
below (Figure 7.7) shows the default printer as HP Deskjet 3540 (Printer A). There is a tick
inside a small green circle next to its icon (this signifies that HP Deskjet 3540 has been set
as the default printer).
IT Tools Level - 3
293
Figure 7.7: Change the Default Printer
Suppose you wish to change the default printer to say, HP Laserjet 1020 (Printer B).
Right click on the icon for this printer, a pop-up menu is displayed (as shown in screen in
Figure 7.7). Select, Set as default printer from this pop-up menu. The screen will now look
like the one below (Figure 7.8). The tick next to the HP Laserjet 1020 icon shows that it is
now the default printer.
Unit - 5
294
Note: Changing the default printer to Printer B, as described above, is possible even if Printer
B is not connected to your network. Give a print job only if your system and Printer B are
connected via a network. You must ensure that Printer B is on your network and that your
system can establish a connection with it.
Choose an Alternate Printer for the Current Print Job
When you give a print job, a Print screen opens, as shown in Figure 7.9. The Default Printer
(here HP Deskjet 3540) is automatically selected for the print job.
Unit - 5
If you wish to change to an alternate printer for the current print job, click on one of
the available printer icons in the list. The next screen (Figure 7.10) shows HP Laserjet 1020
as the printer selected for the current job. As you can see, printer HP Laserjet 1020 is offline
(not connected to your system via a network/ cable). The Print program allows you to select
the printer even when the printer is offline. Ensure that this printer is online (connected to
your system via a network / cable), before you click on the Print button and start the print
job.
IT Tools Level - 3
295
Figure 7.10: Print Screen
The printing speed can be improved by reducing the printing quality and using Fast Draft/
Fast Printing. This works well for everyday printing. Change the default printer quality
setting from Normal to Fast Draft.
To do this, click the Preferences button (as seen on the screen in Figure 7.9 and 7.10).This
will open the Printing Preferences screen (Figure 7.11). Under the Printing Shortcuts Tab
choose Fast/ Economical Printing.
Unit - 5
296
7.3.5 Sound Troubleshooting
When you are not getting sound from the speakers, troubleshoot using the suggestions given
below:
Check Speaker Volume
Check the volume level of the speakers. Click the Audio button in Task Bar to make sure
the sound is turned on and that the volume is up (Figure 7.12).
Unit - 5
sound is turned on and that the volume is set large enough to be heard.
Check the Cables
In case external speakers are used, ensure that the speakers are plugged into the electric
socket, turned on, and connected to the correct audio port or a USB port on your system. If
your computer has color-coded ports, the audio output port will usually be green.
Check the Sound Using Headphones
Connect headphones to the audio output port of your computer, and check whether you can
hear sound from the headphones. If you can, that means there is something wrong with your
speakers. Contact a Service Engineer.
IT Tools Level - 3
297
7.4 Troubleshooting Software Problems
7.4.1 Common Troubleshooting Technique - Close the Program and Reopen it
A simple troubleshooting technique would be to close the application/program and reopen
it. If the problem persists, try other troubleshooting techniques.
7.4.2 An Application is Running Slow
Check for Available Updates
If restarting the application does not improve the speed of the application, check for updates.
Click the Help menu and look for an option to check for Updates. In case this option is
unavailable, you can search online for application updates.
7.4.3 An Application is Frozen
Sometimes an application may freeze. When this happens, you will not be able to close the
window or click any button within the application. The following troubleshooting options
may be tried:
Forcefully End the Application
On a PC / Laptop keyboard, press (and hold) Ctrl+Alt+Delete (the Control, Alt, and
Delete keys). This will open the Windows Task Manager (Figure 7.13). Open the
Applications tab on this screen. You will see a list of applications. The applications should
have the status as Running. An application which is not responding would have the status as
Not Responding. Select the application which is not responding from the list and click the End
Task button. This forcefully terminates the application. Now restart the application.
Restart the Computer
Unit - 5
If you are unable to forcefully end an application, close all running programs and restart the
computer.
If you are unable to shutdown/ restart your system, perform a hard reboot by pressing
the Power button, i.e. manually turn off the computer. This step should be performed in
extreme situations, as a last resort. Remember that hard reboot may cause data loss.
Once the system is responding, run the virus check to scan the system for viruses.
7.4.4 All Programs on the Computer Run Slowly
7.4.4.1 Check for Viruses
You may have malware running in the background, which is slowing applications on your
298
system. Viruses generally lower the system’s performance. Run the virus scanner installed
on your system.
7.4.4.2 Free Space on the Hard Drive
Unit - 5
IT Tools Level - 3
299
Select the Properties option from this pop-up Menu. Choose the General Tab of this application.
The screenshot in Figure 7.15 shows the available Free Space on the C Disk, shown by the
purple area in the Pie chart (here 69.1 GB).
300
Delete Unused Files and Programs
Periodically delete files and programs you do not need. This will increase the free space on
your disk, increasing the performance of your computer. Images and videos take up a lot of
space. These can be moved to an external drive. This will free some space on the disk drive.
Empty Your Recycle Bin
This can be done by right-clicking on the Recycle Bin icon (usually on the desktop), and
then selecting Empty Recycle Bin.
Unit - 5
the network and sharing dialog box. Click Start button> Control Panel > Network and
Internet > Network and Sharing Center (Figure 7.18, same as Figure 7.25). Alternatively
click, Start button> Control panel > All Control Panel Items> Network and Sharing
Center.
IT Tools Level - 3
301
Figure 7.18: Network and Sharing Center Dialog Box
On the bottom left corner of this screen, click on the link Internet Options. This opens
the Internet Properties dialog box (Figure 7.19). Select the General tab. Under Browsing
History, check the Delete browsing history on exit checkbox, and then click the Delete…
button. This deletes the browsing history. Click the OK button to exit.
Unit - 5
302
Disk Defragmentation
The information in our files changes frequently. This results in gaps or spaces in the file
stored in the memory (hard disk). The file thus takes more space on the computer, and may
cause the computer to slow down. You need to run a Disk Defragmentation program to
reclaim these gaps in space. This can be achieved as follows.
Open the Windows Explorer Application and click on My Computer. Highlight the C drive
and right click to get a pop-up menu (Figure 7.14). Select the Properties option from this pop-
up Menu. The dialog box showing the properties of the local disk (C:) is displayed (Figure
7.20).Choose the Tools Tab of this application. Click the Defragment now… button.
IT Tools Level - 3
303
this purpose, from the Windows startup, click Start button > All Programs > Startup.
Right-click the shortcuts that you do not need and click Delete (Figure 7.21).
Disable Unused Program Services: This is done in two steps. First, the unused program service
is stopped. It is then disabled so that it does not run at Startup.
Click Start button> Control Panel> Administrative Tools> Services. For each program/
service that you are sure that you do not need, click on the Service to highlight it, click the
Stop link to stop the service from running (Figure 7.22).
Now double-click the stopped service and choose Startup Type as Disabled, and click OK
(Figure 7.23).
304
Figure 7.22: Stopping an unused program service
Unit - 5
Figure 7.23: Disabling a program Service
IT Tools Level - 3
305
Force System Restart
In such a situation, you would have to force a system shutdown. Press and hold the Power
button. The Power button is usually located on the front or side of the computer. On a
laptop, the Power button is usually located in the top center or left/ right corner of the
keyboard. Press and hold the Power button for 5-10 seconds to force the computer to shut
down. Now switch on the computer again.
An alternate method to check for network connectivity is to click Start button >
Control Panel > Network and Sharing Centre (Figure 7.25). The red cross between the
USER-PC and Internet shows that the computer is not connected to the Internet. You
would have to establish an internet connection. You may need to run the diagnosis to find
the cause of the problem.
306
Figure 7.25: Checking for network connectivity through Control Panel
On the Task Bar, click the Network icon to see the available Internet connections. If you have
opened the Network and Sharing dialog box (Start button > Control Panel > Network and
Sharing Center), click on the link Connect to a network. This will open a list of Wireless
Network Connections in the vicinity of your system, (Figure 7.26). Click on one of the
connections and then click the Connect button.
Unit - 5
IT Tools Level - 3
307
Once you have requested for network connectivity, the troubleshooting application will
display a few screens while the system attempts to diagnose the issue: Windows Network
Diagnostics: Investigate router or access point issues, Detecting problems, Resolving the
problems, Detecting additional problems, etc. These screens will guide you in establishing
a connection. For example, while investigating router or access point issues, it would ask you
to turn off the router and restart it again (Figure 7.27).
If you are still unable to connect to the internet, the troubleshooting application would
report the Problem in network connectivity. Figure 7.28 shows ‘Problem with wireless adapter
or access point’. Try Switching Off and then Switching On the adapter. If that still does
not work, repeat the whole process again after some time. Your network connectivity issue
would probably be solved after a few attempts.
308
Figure 7.28: Troubleshooting application showing the Problem in network connectivity
If the above steps do not help in establishing a network connection, you would have to check
a few more system settings.
First check the validity of the IP address of your system. In the bottom left corner of your
Windows screen click Start. In the Search box type CMD and press Enter (Figure 7.29a).
Unit - 5
IT Tools Level - 3
309
Alternatively, in the bottom left corner of your Windows screen click Start. In the Search
box type Run and press Enter. This will open the Run application, which opens a program or
document that you request it to. Type CMD in the Open textbox and press Enter (Figure 7.29b).
The COMMAND PROMPT (an MS-DOS window) will open. Type IPCONFIG and press
Enter. The results should show the Connection-specific DNS Suffix, IP Address, etc.,
as seen in Figure 7.30. This information will only show if your system is connected to the
internet, else, it will show Media State: Media disconnected.
Unit - 5
Figure 7.30: IPCONFIG showing the system’s IP address in the COMMAND PROMPT WINDOW
310
7.5.1.3 The Network Fly lead is Not Working Properly
The fly lead is the cable that connects the network card in your computer to a network point
(usually on the wall). A non-operational network fly lead could also cause failure in the
internet connection. The network fly lead is seated in the network slot on your computer.
This slot is located either at the back of the computer or on the side, depending on your
PC/laptop. Ensure that the fly lead is plugged securely into the network point on the wall.
Check whether the cable or point has been damaged. If so, seek assistance from a network
administrator.
Your fly lead could be faulty or damaged. To check if your fly lead is faulty, borrow a
working fly lead from someone and repeat the previous steps with the borrowed fly lead.
If this borrowed fly lead works, your own fly lead is faulty. Seek assistance from a network
administrator.
Sometimes, the network point on the wall may not be activated. A network point will not
work until it is activated. For this purpose, get help from your network administrator.
7.5.1.4 The Network Card is Not Working Properly
A working network card is essential to connect to the Internet. The network card lights
must be flashing or lit up. If there are no lights, either the network card is broken, or there
is no network to connect to. A broken network card needs repair or replacement. Contact a
Service Engineer.
Seek assistance from a network administrator to check whether the fly lead is plugged into
the correct network card. If the machine has more than one network cards, you need to
ensure that the cable is plugged into the network card configured for it (i.e. the fly lead should
connect the network card to the network point on the wall, for which it is configured).
Unit - 5
To check whether the network card is working open a command prompt window (Start
>Run >type CMD) (as discussed in Section 7.5.1.2). An MS-DOS window will open, type
ping 127.0.0.1 at the prompt.
Alternatively, click Start and in the Search box type ping 127.0.0.1 and press Enter. This
will run the ping command in the command prompt window.
If you get a reply (as seen in Figure 7.31), the network card is working.
IT Tools Level - 3
311
Figure 7.31: PING showing that the Network Card is working
Contact a Service Engineer/ your Network Administrator in case there is no reply when you
ping.
Points to Remember
While working with a computer one comes across hardware, software and networking
problems. In this chapter, we learned how to diagnose and fix minor problems. The following
summarizes what we learned:
u It is sometimes difficult to judge if the problem is hardware-related or software-
related. Identify the part of the computer system that is not functioning properly.
u Before handing over your machine to an engineer, take a backup of important files to
Unit - 5
another source, like a pen drive or an external hard disk. This would ensure a copy
of your data is available, in case something unforeseen happens while your computer
is being repaired.
u Most systems produce a beep when a system boots successfully (i.e. all peripheral
devices have been successfully detected). If any connected device does not switch
on, try the common troubleshooting tips: close running programs that are not being
currently used; check the cables; repeat to see if the problem recurs; use help; record
error messages and restart the computer.
u If the monitor is not showing any display or the screen is blank: the system could be
in sleep mode; check all the connections; the laptop’s battery may be low.
312
u If the keyboard is not responding: check connections; check for any damage; try
changing batteries in a wireless keyboard; the keys may be stuck, replacing the
keyboard.
u In case the mouse is not working: check connections; check for any damage and
replace the mouse if required; restart the cordless mouse; clean the mouse.
u The printer may not be responding because: it may not be connected properly or not
switched on; the printer could be out of paper; there could be apaper caught in the
printer; printer’s ink cartridge could be empty; an incorrect printer driver may be
configured.
u The printer and computer may not be communicating properly when a wireless
connection is being used to connect a PC/ laptop to a printer. The IP address
configured on your computer should matches the Dynamic IP address allocated to
the printer.
u When the print jobs are being sent to the wrong printer: change the default printer or
choose an alternate printer for the current print job.
u To improve the printing speed, reduce the printing quality by using Fast Draft/ Fast
Printing.
u When there is no sound from the speakers: check speaker volume; check audio player
controls; check the cables; check the sound using headphones.
u When an application is running slow, check for available updates.
u Sometimes an application may freeze. Forcefully end the application or restart the
computer.
Unit - 5
u When all programs on the computer run slowly, check for viruses or try freeing space
on the hard disk.
u To free space on the hard drive: check minimum free disk space required; run a disk
clean up application; delete unused files and programs; empty the recycle bin; remove
temporary files; run the disk defragmentation program; remove unused shortcuts and
program services
u Force system restart when the computer freezes.
u When the computer is unable to connect to the network: check the network
connectivity; check the validity of IP address; the network fly lead or network card
may not be working properly.
IT Tools Level - 3
313
Exercises
1. List some common troubleshooting steps that you should keep in mind.
2. What steps would you take if the monitor is not showing any display, or the screen is
blank?
3. What would you do when your keyboard or mouse is not responding/ working
properly?
4. What troubleshooting step will you take when the printer is not responding?
5. How can you check the IP address of a printer connected through a wireless
connection?
6. What steps do you need to take to change the default printer?
7. What could be the reasons for the print jobs being sent to the wrong printer?
8. What checks would you undertake when the speaker is not working?
9. What are the troubleshooting steps taken when an application freezes?
10. What could be the possible cause for all the applications to be running slow?
11. How can one free disk space on the computer?
12. How do we remove temporary files?
13. Why is disk defragmentation required? How can we achieve disk defragmentation?
14. What steps do we take to remove unused shortcuts and program services?
15. How can we check the network connectivity of your system?
Unit - 5
16. Explain how you would check the validity of the IP address.
17. How will you check whether the network fly lead is working properly?
18. Describe the procedure to check whether the network card is working properly.
314
Unit - 6
Unit - 6
Work Integrated
Learning IT-ISm
Chapter
8
Work Integrated Learning IT-ISm
8.1 Introduction
Previous chapters provided an insight into the working of a computer system, the various
automation tools , multimedia tools and ways of troubleshooting any problem you encounter
while working with a computer. An insight into how computers can be connected together
as a network and the various relevant issues associated with a network, in today’s life, such
as network security, social networking was also presented. This chapter will focus on helping
you understand the various domains where you can apply this knowledge with the help of a
typical case study of an educational organization.
domains .Let’s see a few areas and, by the end of list, we are sure you will be able to create
a much bigger list than this
316
u Banking
u Hotel industry
u Travel industry
u Education
u Research
u Medical
u Finance
u Entertainment
IT Tools Level - 3
317
Step I : Set up Laboratory
Explore in the market what all type of processors is being offered by various
Unit - 6
companies and what will suit your organization. Common examples are Intel
Core i3/i5/i7processors from a leading vendor Intel, AMD’s APU and FX
series. Remember machines are not changed every day, so it is critical that you
choose a reliable vendor!
318
r Speed
Ideally we want the highest possible speed, but that comes with a high cost.
On the other hand a low-speed processor will demotivate the employees from
using the system So balancing the choice of speed, should be your priority.
This will depend on the kind of work to be done commonly to be done.
u Memory
r RAM
Amount of RAM (preferably in Gigabytes) will decide how many tasks your
computer can perform at hand! So more the memory better it is.
r Hard disk
This is the place where almost all of your data is stored. So without much of
reasoning, go for higher capacity (gigabytes/Terabytes) hard disk, unless you
want to use cloud storage. Options of flash hard drive or the solid-state one
should only be used if extra fast speed is required and you can settle in for a
small hard disk, as this is expensive!
u Monitor
Various visual display units (popularly known as monitor) are available in the market.
The prime purpose of these is to connect the user with the machine, by providing
an interface where the information from the machine can be visualized. There are
three main kind of display devices available: the CRT (the Cathode Ray tube), the
LCD (Liquid Crystal Display) and the LED (Light emitting diodes). The variation
not only is in their back-end technology used but also in the power consumption,
resolution, weight and cost, to name a few. Explore and see what suits best, given the
organization’s resources and constraints
u Networking
Resources should be pooled. So networking is essential. For a small organization a
LAN will perfectly suit the needs. However connection to the outside world can be
Unit - 6
IT Tools Level - 3
319
Choose the Software
u Operating System
As discussed in the previous chapter, if you need a multiuser operating system then
go ahead and choose one such as Linux. A single-user system like Windows is
commonly used, but you need to pay for it.
u Protecting your machine
Your computer is susceptible to outside attacks which threaten to destroy your files
and the crucial data/information lying therein. You need to protect your machine
against malicious programs like Viruses, Worms and Trojans. Investment in a good
anti-virus will definitely be a good option.
a) Teaching
In teaching work you can utilize the IT tools for the following purpose
– Create Notes (Writer)- The faculty can use Office Writer to create
320
notes for teaching the students. Managing notes digitally not only
keeps them handy, but also allow for easy up gradation as and when
required. Suitable integration with references from related field will
help the current students but will also provide reference points for
coming generations!
– Teaching slides(Impress)- Notes provide detailed information, but
during the class teaching presentations can be more effective as they
provide a point-bu-point information to be disseminated through the
lecture.
IT Tools Level - 3
321
Figure 8.3: Sample attendance sheet of a class of students
322
– Communication with students/parents (Writer): Usually the organization
needs to contact the parents of the students. Sending of customized individual
letters addressed to parents can be easily achieved through the features of
Writer such as Mailmerge.
In a similar manner the Office of your organization can utilize these tools for
u Official documentation
u Financial management (Fee calculation,Salary generation,Bills )
And the list is big……
Step III: Web presence
The computerization of your organization is not complete, if you have not shown its web
presence. That is creating a web site or most simply put up your organization on a social
network for it to garner more popularity and bind its alumni /students/faculty together.
Create a blog for people who want to share their view/knowledge with others!
Unit - 6
IT Tools Level - 3
323
time is also yours. This is where your knowledge of trouble shooting skills will help. At times
you may encounter problems such as machine not working. By skilful tracing you need to
decide if you can fix it yourself (if it is a simple case of dangling connection ) or you need
an engineer to handle (if the power supply unit has stopped working)
Exercises
1. Go ahead and identify the possible areas around you where automation would of
help
2. List the hardware requirements at each of these places. Remember not each would have
the same requirement
3. List the software requirements at each of these places. This has to be done keeping in
mind the nature of work done there!
4. Create a list of vendors and the services provided for possible assistance in case of
technical trouble.
Give it back to the community!
You can always bring out your creative spirit and through social networking sites, bring together
all such information which can be of help for automation in your neighbourhood for easy access
to all. Such as Name, Contact numbers, email ids, service provided etc of all service providers
Unit - 6
324