Académique Documents
Professionnel Documents
Culture Documents
The participation of the State English Academy was decisive for the
achievement of the required academic materials that would be needed for the
starting date of such project, furthermore their participation was materialized by
designing 100 percent of the booklet that is now in your hands, they also
created a teacher guide booklet. This is why I strongly thank the Academy that
put in a great effort that is shown in these resources.
I want to ask the fifth semester students in the pilot group to optimize the
use of these materials that contain the minimum required to obtain the
competencies of the English program, as well as the program for Informatics but
in English.
I wish you a great success in the new adventure and may we achieve
this highly important purpose.
I. Competencies 5
III. Glossary 51
V. Glossary 67
X. Rubrics 178
5.- Develops innovations 5.1.-Reflexively follows instructions and processes, considering how each
and proposes solutions of its steps helps in the achievement of an objective.
to problems from 5.2. - Sets information according to category, hierarchy and relationship.
established methods. 5.3.-Identifies systems and rules or medullar principals that underlay from
a series of phenomenon.
5.4. - Constructs a hypothesis and designs and applies protocols to proof
its validity.
5.5.-Synthesizes evidence obtained during the experimentation to make
out conclusions and formulate new questions.
5.7. - Manages information and communication technologies to process
and interpret information.
C.2. - Evaluates a text through the comparison of its content with another, by means of his previous
and new knowledge.
C3. - Establishes hypothesis over natural and cultural phenomenon of his ambient with consultation
of diverse sources.
C4. - Produces texts on basis of the normative use of the language, considering the intention and
communicative situation.
C.5. - States ideas and concepts in creative and coherent essays, with introduction, body
development, and clear conclusions.
C.6. - Expresses a point of view in public in a precise, coherent and creative manner.
C.7. - Values and describes the role of art, literature, and the media in the recreation or
transformation of a culture, keeping in mind the communicative purposes of the different genres.
C.8. - Values logical thinking in the communicative process in his academic and everyday life.
C.9. - Analyzes and compares the origin, development and diversity of the means and systems of
communication.
C10. - Identifies and interprets the main idea and possible development of an oral or written
message in a second language, noticing previous knowledge, nonverbal elements and cultural
contexts.
C11. - Communicates in a second language through an oral, logical or written speech congruent
with the communicative situation.
C12. - Uses the information and communication technologies to investigate, solve problems,
produce materials and transmit the information.
What is ?
Tags
Example Explained
"HTML tags" and "HTML elements" are often used to describe the same thing.
But strictly speaking, an HTML element is everything between the start tag and
the end tag, including the tags:
Web Browsers
Page Structure
Adobe Dreamweaver
Microsoft Expression Web
CoffeeCup HTML Editor
However, for learning HTML we recommend a text editor like Notepad (PC) or
TextEdit (Mac). We believe using a simple text editor is a good way to learn
HTML. Follow the 4 steps below to create your first web page with Notepad.
Select Save as.. in Notepad's file menu. When you save an HTML file,
you can use either the .htm or the .html file extension. There is no
difference; it is entirely up to you.
Start your web browser and open your html file from
the File, Open menu, or just browse the folder and double-click your
HTML file.
Don't worry if the examples use tags you have not learned. You will learn about
them in the next chapters.
Headings
Example
<h1>This is a heading</h1>
<h2>This is a heading</h2>
<h3>This is a heading</h3>
Paragraphs
Links
Example
<a href="http://www.w3schools.com">This is a link</a>
Images
HTML images are defined with the <img> tag.
Example
Note: The filename and the size of the image are provided as attributes.
Element Syntax
An HTML element starts with a start tag / opening tag
An HTML element ends with an end tag / closing tag
The element content is everything between the start and the end tag
Some HTML elements have empty content
Most HTML elements can have attributes
Nested Elements
Most HTML elements can be nested (can contain other HTML elements). HTML documents
consist of nested HTML elements.
Empty Elements
HTML elements with no content are called empty elements. <br> is an empty element without a
closing tag (the <br> tag defines a line break).
Description
1.
2.
3.
4.
5.
Attributes
HTML elements can have attributes
Attributes provide additional information about an element
Attributes are always specified in the start tag
Attributes come in name/value pairs like: name="value"
Attribute Example
HTML links are defined with the <a> tag. The link address is specified in the href attribute:
Example
Double style quotes are the most common, but single style quotes are also allowed.
Tip: In some rare situations, when the attribute value itself contains quotes, it is
necessary to use single quotes: name='John "ShotGun" Nelson'
Headings
Headings are defined with the <h1> to <h6> tags. <h1> defines the most important heading.
<h6> defines the last important heading.
Example
Note: Browsers automatically add some empty space (a margin) before and after each heading.
Search engines use your headings to index the structure and content of your web pages. Since
users may skim your pages by its headings, it is important to use headings to show the
document structure.
H1 headings should be used as main headings, followed by H2 headings, then the less
important H3 headings, and so on.
Lines
The <hr> tag creates a horizontal line in an HTML page. The hr element can be used to
separate content:
Example
There are two common mistakes designers do: Using the tags <p>, <br> y
<hr> and write the HTML code in order to write build up a text.
TEXT FORMATTING
Formatting Tags
HTML uses tags like <b> and <i> for formatting output, like bold or italic text. These HTML tags
are called formatting tags (look at the bottom of this page for a complete reference).
<strong> or <em> means that you want the text to be rendered in a way that
the user understands as "important". Today, all major browsers render strong
as bold and em as italics. However, if a browser one day wants to make a
text highlighted with the strong feature, it might be cursive for example and
not bold!
Always know when a stage comes to an end. Closing cycles, shutting doors,
finishing chapters, it doesnt matter the name we give it, what it matters is to
Links are found in nearly all Web pages. Links allow users to click their way
from page to page.
Hyperlinks (Links)
The HTML <a> tag defines a hyperlink.
A hyperlink (or link) is a word, group of words, or image that you can click on to jump to
another document.
When you move the cursor over a link in a Web page, the arrow will turn into a little hand.
The most important attribute of the <a> element is the href attribute, which indicates the links
destination.
Link Syntax
The HTML code for a link is simple. It looks like this:
Example
Tip: The "Link text" doesn't have to be text. It can be an image or any other HTML element.
Example
Tip: Bookmarks are not displayed in any special way. They are invisible to the reader.
Example
Create a link to the "Useful Tips Section" inside the same document:
Or, create a link to the "Useful Tips Section" from another page:
<a href="http://www.w3schools.com/html_links.htm#tips">
</a>
_________________________________________________
In the above example, above write the HTML code that would create a
link in "elm.html" which being clicked, would replace the display in the web
browser with the "elmleaf.gif" image.
_______________________________________________
The <img> tag is empty, which means that it contains attributes only, and has no closing tag.
To display an image on a page, you need to use the src attribute. Src stands for "source". The
value of the src attribute is the URL of the image you want to display.
The alt attribute provides alternative information for an image if a user for some reason cannot
view it (because of slow connection, an error in the src attribute, or if the user uses a screen
reader).
Tip: It is a good practice to specify both the height and width attributes for an image. If these
attributes are set, the space required for the image is reserved when the page is loaded.
However, without these attributes, the browser does not know the size of the image. The effect
will be that the page layout will change during loading (while the images load).
A. HTML Exercise 3
B. exercise3.htm
C. exercise3.html
2. Now look at the source code for A third simple web page on the left.
To insert the JPEG image, what do you have to write?
Attributes
New : New in HTML.
The most common HTML lists are ordered and unordered lists:
Lists
An ordered list: An unordered list:
1. The first list item List item
2. The second list item List item
3. The third list item List tem
Unordered Lists
Ordered Lists
Description Lists
Fruit
Apple
Pear
Orange
How should the word "fruit" be handled, particularly if I want it to be semantically associated
with the list itself?
Nested List
<ul>
<li>
Fruit
<ul>
<li>Apple</li>
<li>Pear</li>
<li>Organge</li>
</ul>
</li>
</ul>
Definition List
<dl>
<dt>Fruit</dt>
<dd>Apple</dd>
<dd>Pear</dd>
<dd>Orange</dd>
</dl>
Tables
Tables are defined with the <table> tag.
A table is divided into rows (with the <tr> tag), and each row is divided into data cells (with the
<td> tag). td stands for "table data," and holds the content of a data cell. A <td> tag can contain
text, links, images, lists, forms, other tables, etc.
COLUMN #1
COLUMN #2
COLUMN #3
Tables are one of the most useful tools for page layout that you will find. One of
the most common questions I hear is "How can I put some text next to an
image?" One simple solution is a table...
Fresh Fruits
Fill in the blanks the tags needed to create a table in the way as shown
in the figure above, include the attribute for borders. Note: The name of the
image is frutero.jpeg.
<col> Specifies column properties for each column within a <colgroup> element
Forms
HTML forms are used to pass data to a server. An HTML form can contain input elements like
text fields, checkboxes, radio-buttons, submit buttons and more. A form can also contain select
lists, textarea, fieldset, legend, and label elements.
Text Fields
<input type="text"> defines a one-line input field that a user can enter text into:
<form>
First name: <input type="text" name="firstname"><br>
Last name: <input type="text" name="lastname">
</form>
First name:
Last name:
Note: The form itself is not visible. Also note that the default width of a text field is 20
characters.
Password:
Note: The characters in a password field are masked (shown as asterisks or circles).
Radio Buttons
<input type="radio"> defines a radio button. Radio buttons let a user select ONLY ONE of a
limited number of choices:
<form>
<input type="radio" name="sex" value="male">Male<br>
<input type="radio" name="sex" value="female">Female
</form>
Male
Female
Checkboxes
<input type="checkbox"> defines a checkbox. Checkboxes let a user select ZERO or MORE
options of a limited number of choices.
<form>
<input type="checkbox" name="vehicle" value="Bike">I have a bike<br>
<input type="checkbox" name="vehicle" value="Car">I have a car
</form>
I have a bike
I have a car
Submit Button
<input type="submit"> defines a submit button.
Submit
Username:
If you type some characters in the text field above, and click the "Submit" button, the browser
will send your input to a page called "html_form_action.asp". The page will show you the
received input.
Form Tags
New : New tags in HTML5.
Tag Description
In teams of four members study and discuss the following information and then
answer the examples below.
G.C. 8.1,8.2 & 8.3
POSITIVE AGREEMENT
If the principal verb is the verb to be, we use it as auxiliary. Subject Auxiliary
I am
He is
Petes web page is gorgeous and so is yours. She
HTML is a language to build up web pages and so is CSS. it
You are
We
They
If the principal verb is in past, we use it as the auxiliary Did.
Note
Special verbs that never use Do are: have, can, could, will, would, shall,
should, may, might. These verbs are used as the auxiliary.
NEGATIVE AGREEMENT
Note
The auxiliary will follow the same rules as the ones we use them with So.
NEITHER is a negative word so it is used with an affirmative verb form (we can't have a double
negative in a sentence).
Colloquial Me neither (we can only use it with the subject "Me", but not with other subjects)
Grammar in Action. Now lets see what you all have learned.
Circle the correct answer. G.C. 5.1
1.- I don't believe she can design a web 2.- I think his web page looks great. (+)
page. (-)
a)Neither do I. b)Neither can I. a)So do I. b)So will I.
c)Neither am I. c)Neither did I. c)So am I. c)So did I.
3.- I'm so tired . (+) 4.- I'm not saying that is your fault!
a)So do I. b)So will I. a)Neither do I. b)Neither can I.
c)So am I. c)So did I. c)Neither am I. c)Neither did I.
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
Read the following sentences and circle the correct answer. G.C. 5.1
2.-I've spent all my money in this laptop. I think Ive paid too mucho for it.
5.-I would like to have a break, Im tired of been programming this web page.
9.-I went to the computer room yesterday and I think the workstations are terrific.
10.-Tom paid $200 for that router but I think he paid too much for it.
B: _______________________________________________________________. (So)
B: _____________________________________________________________. (Neither)
B: ____________________________________________________________. (Neither)
B: _______________________________________________________________. (Too)
A: I disagree with Marys web page body; I think is boring and monotone.
B: _______________________________________________________________. (So)
A: Yesterday, in Martins presentation, I didnt like the web pages headings, they were too big.
B: ____________________________________________________________. (Neither)
A: I agree with the HTML formatting tags that Ann used in her web page.
B: _______________________________________________________________. (Too)
...on account of The mistakes were attributed to the lack of knowledge about the HTML tags
.
...owing to
There were mistakes on account of the lack of knowledge about the HTML
tags.
Owing to the lack of knowledge about the HTML tags there were mistakes.
(These cause-effect phrases are all followed by noun phrases; i.e. ' the lack
of knowledge about the HTML tags .)
Grammar Note: Don't use 'Because' as the first word in a sentence: It's bad style.
There are a number of alternatives. You can use:
'Due to...'; e.g. 'Due to the lack of knowledge about the HTML tags there were
mistakes.'
'Owing to ...'; e.g. 'Owing to the lack of knowledge about the HTML tags
there were mistakes.'
Because As a result
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
owing to
1. Programmers believe some languages are better nowadays because the
development of new design programs. caused by
due to
2. Hes embarrassed about being bald because of he always wears a wig.
thats why
This reason
3. Because of the traffic jam I arrive late for work every day.
As a result
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
In teams of four members study and discuss the following information and then
answer the examples below.
G.C. 8.1, 8.2 & 8.3
Nine Expressions to Use In Speaking And How To Use These Phrases In Your English
Writing
In my opinion, this one would be Its the classic expression but its not the only one
better.
To my mind this one's better. Is a common spoken form - and it can be used in
writing, too
If you ask me, this one's better. Is very, very common in spoken English, and can
come first or last in a sentence
To my way of thinking, this one's fine. Is often used with emphasis on 'my' to give a
strong opinion
In my view, this one is best. Is common in spoken and written English
Know what I think? That one's best. The abbreviated question '(Do you) know what I
think?' is very popular and is not rude
I'd say tomorrow that one's better. The conditional structure I'd say is rarely taught
as a conditional, but this is one of the most
common ways of giving an opinion in English
For me, that one's better. Is like 2 and 5
I tell you what I think, that one's best. This one is similar to 6, and is quite direct
Solve the clues. Complete the crossword. What is 1 down? G.C. 5.1
3.- To my __________________ this link offers you better information than the other one. What do you think?
4.- To my way of ______________________ your web page is lacking of good headings design.
5.- Id say ______________________ is the correct imagine tag that we need to use for this picture format.
6.-I tell you what I think; this ________________ text tags list has been very useful for all of us.
7.- If you ask me, I love your design, specially the ___________________ you used in the headings, is that Comic
San Ms?
1 1
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
Individually study the following information and then answer the exercise below.
G.C. 7.1
Complete the sentences with appropriate words or phrases from the box . G.C. 5.1
2. These scanners are cheap and immediately available. __________, they are almost
obsolete.
3. __________, the majority of the programmers are more interested in the design
than in the content.
4. A __________ of these kind of links, is that they are online today and tomorrow
they wont.
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
Individually study the following information and then answer the exercise below.
G.C. 7.1
CONNECTORS
Addition Contrast Sequence
Before we
( ) We should improve d) However, we are aware that our content and links are not
our web site. as good as we expected.
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
So congratulations!!!!!!!!!!!!!!!!!
Your final project is to create a Web page design in which you must include the
following sections.
1. Heading designs
2. Different text formatting
3. Different pictures formats and aligned in different positions.
4. At least 2 different links
5. Include at least a table with a heading, text and image.
6. Include a form.
After you finish your web page design you must work in pairs and you must do the
following.
Alt text: Text description of a graphic that appears before the graphic is loaded into the browser. After
an image has been downloaded on the browser, the alt text may briefly appear over the graphic as you
rollover the mouse over the graphic.
Attribute: A property of an HTML element used to provide additional instructions to a given HTML tag.
The attribute is specified in the start of HTML tag.
Browser: A program used to access and display HTML documents. Common examples: Internet Explorer,
Netscape, and Mozilla Firefox.
Closing tag: An HTML instruction that tells the browser to turn off a specific feature of an opening tag.
Containers: Containers refer to the area enclosed by <start> and </stop> tags where the commands
take effect. Some tags, such as <HTML> enclose the entire document, others enclose lists, and others
can enclose a single world.
<!DOCTYPE>: The DTD (Document Type Declaration), this tells your browser which version of HTML
you're using. Make sure you use the right DTD, or your page may display incorrectly.
Elements: An element in HTML refers to a tag (such as <head>, <body>, and <p>) or element of
structure of a document(such as body, title, and paragraph).
Entities: Entities are those characters that do not appear on the keyboard (i.e., , , etc.) or
characters that have special meaning in HTML (i.e., <, >, &, etc.).
Frames: HTML supports frames to divide a web page into independent and scrollable sections. Having
two frames on a web page is like loading three separate pages in the browser. A common use for frames
is to place the navigation on the left, and content on the right.
FTP: FTP stands for File Transfer Protocol. FTP is a robust method for transferring files between
computers using TCP/IP. TCP stands for Transmission Control Protocol and IP stands for Internet
Protocol.
GIF (Graphics Interchange Format): A file format (commonly used for web pages) used for storing image
files.
HEAD or HEADER (of HTML document): The top portion of the HTML source code behind Web pages,
beginning with <HEAD> and ending with </HEAD>. It contains the Title, Description, Keywords fields and
others that web page authors may use to describe the page. The title appears in the title bar of most
browsers, but the other fields cannot be seen as part of the body of the page. To view the <HEAD>
portion of web pages in your browser, click VIEW, Page Source.
<html>...</html>: Standard opening and closing tags for any HTML page. Enclose everything else in
these. Container tag.
HTML editor: A software that inserts HTML code as you work to create an HTML file.
Hypermedia: Hypertext that may include multimedia like text, images, sound, and video.
Imagemap: A graphic that has clickable areas (or hotspots) defined to allow a user to move to another
URL.
Inline: Elements those that are supported directly by HTML are known as inline. Also, another
characteristic of inline element is that their output can be seen or heard without the user taking any
additional action (such as clicking, and installing of a plug-in) because the output is directly placed on
the webpage. Inline elements include, for instance, animated graphics, graphics, and sound.
JPEG or JPG (Joint Photographic Experts Group): A common cross-platform image format that is used on
the web.
Link: The URL imbedded in another document, so that if you click on the highlighted text or button
referring to the link, you retrieve the outside URL. If you search the field "link:", you retrieve on text in
these imbedded URLs which you do not see in the documents.
Nesting/nested tags: Nesting occurs when you place tags within other tags. Anytime you create an
HTML document, you will end-up using nested tags. For example, the <title>, and <body>, tags are
nested inside the root <html> tag. The <body> tag is likely to also nest inside of itself other tags.
Notepad: Is a generic text editor included with Microsoft Windows that enables someone to open and
read plaintext files. If the file contains special formatting or is not a plaintext file, it will not be able to be
read in Microsoft Notepad.
Pixels: Pixels are a method of measurement used in the computer world. Your computer screen's
resolution is measured in pixels, 832*624, 640*480, etc. They are the number of "dots, or pixels, that
computer displays horizontally and vertically. This allows for a standard to be set, so that a 100*50
picture always comes up as the same relative size, but could vary in absolute size depending on the
resolution of your monitor.
Relative and Absolute Links: Relative and absolute links are styles of links that one finds connecting a
web page to other pages, files, etc. Relative links look like this /~ahetting/htmlprimer.html. They consist
of telling the link where to find what it is looking for, but leave out the server that the page is attached
to because the original page and the one being sought after are in the same directory(folder or server).
The same link in absolute link format would look like this
Site or WEB-Site: This term is often used to mean "web page," but there is supposed to be a difference.
A web page is a single entity, one URL, one file that you might find on the Web. A "site," properly
speaking, is an location or gathering or center for a bunch of related pages linked to from that site. For
example, the site for the present tutorial is the top-level page "Internet Resources."
Style sheet: A style sheet includes styling syntax that dictates how your web page will look. Style sheets
are very useful as they help web developers create uniform presentation of web pages.
Syntax: Syntax basically refers to the rules a computer language uses to perform a task. Without syntax,
a computer language would not be functional or useful at all. HTML syntax dictates what and how a web
page will display.
Syntax error: A syntax error basically refers to a situation in which the rules (or a rule) of the computer
language are (is) broken. In HTML, depending on the syntax error you produce, the web page may look
completely different than what you had intended.
Tags: Are the commands that give HTML documents their functionality. They consist of commands
placed within < and >. Some tags work by placing a start and stop tag at each end of the desired text,
such as below <big>.This makes the text bigger <big>.The stop tags are often the same as the start with
the addition of "/" at the beginning of the stop tag.
TITLE (of a document): The official title of a document from the "meta" field called title. It is what
appears in the top bar of the window when you display the document and it is the title that appears in
search engine results. The "meta" field called title is not mandatory in HTML coding. Sometimes you
retrieve a document with "No Title" as its supposed title; this is caused when the meta-title field is left
blank.
URL: Uniform Resource Locator. The unique address of any Web document. May be keyed in a browser's
OPEN or LOCATION / GO TO box to retrieve a document. There is a logic the layout of a URL:
Anatomy of a URL:
Type of file Domain name (computer Path or directory on the Name of file, and its file
file is on and its location computer to this file extension (usually ending
on the Internet) in .html or .htm)
Web Browsers: Are the applications that allow one to view HTML documents from either your own
computer or from any other computer connected to the internet.
802.11 a
802.11 b
802.11 g
802.11 n
Teacher gives the correct answers and the students check their answers and all doubts are clarified
by the teacher.
2. IEEE 802.11g, uses the 2.4 GHz band, but allows it to transmit on theoretical
speeds of 54 Mbps. How can it achieve this change?
Component Description
Wireless NIC
Directional Antenna.
Antennas.
Omnidirectional antenna.
Sector Antennas
Wireless Router.
Wireless Bridge.
.
Wireless Client.
VI.- Look the pictures and write a brief description about How infrastructure and ad hoc
connect computers with wireless network adapters.
G.C.5.1 and 8.3
Infraestructure Ad Hoc
Wireless Security. Security comprises IEEE 802.11 authentication and encryption. Encryption is used to
encrypt or scramble data from wireless frames before being sent to the wireless network. With
authentication requirements, wireless clients authenticate themselves before they are allowed to join
the wireless network.
Encryption. The following types are available for use encryption with 802.11:
WEP Encryption: For encryption of wireless data, the original 802.11 standard defined wired equivalent
privacy (WEP). Due to the nature of wireless networks, protecting the physical access to the network is
difficult. Unlike a wired network which requires a direct physical connection, it is possible that any user
within range of a wireless access point or a wireless client can send and receive frames, as well as listen
to other frames sent, so that interception and eavesdropping remote wireless frames are very simple.
WEP uses a shared secret key to encrypt the sending node data. The receiving node uses the same WEP
key to decrypt the data. For infrastructure mode, the WEP key must be configured on the wireless
access point and all wireless clients. For ad hoc mode, the WEP key must be configured on all wireless
clients.
Choosing a WEP key
The WEP key should be a random sequence of keyboard characters (uppercase and lowercase letters,
numbers and punctuation marks) or hexadecimal digits (numbers 0 through 9 and letters A to F). The
more random WEP key, the more secure use.
WPA Encryption: IEEE 802.11i is a new standard that specifies security improvements in wireless local
networks.
With WPA, encryption is performed using TKIP (Temporal Key Integrity Protocol temporary), which
replaces WEP for stronger encryption algorithm. Unlike WEP, TKIP provides the determination of a
single unicast encryption key for each authentication startup and synchronized change of the unicast
encryption key for each frame. Because TKIP keys are automatically determined, it is not necessary to
configure an encryption key for WPA.
WPA2 Encryption: WPA2 is a product certification that the Wi-Fi Alliance that certifies wireless
devices are compatible with the 802.11i standard. WPA2 supports the additional mandatory security
features of the 802.11i standard that are not included for products that support WPA. With WPA2,
encryption is performed using AES (Advanced Encryption Standard), which also replaces WEP for
stronger encryption algorithm. As for WPA TKIP, AES provides the determination of an encryption key
unique starting unicast for each authentication and synchronized change of unicast encryption key for
each frame.
WEP
WAP
WAP2
True False
True False
True False
Self evaluation
G.C. 6.3
Zero Conditional
It refers to a situation that always is true (universal true)
If clause (If+present) Main clause (Simple present)
If you freeze water It turns into ice
If I work too much, I get tired.
If she eats chocolate, she gets an allergy
If she doesn't know the answer, she keeps silent.
If we don't go out on Saturdays, we rent a video and stay home.
First Conditional
It is used when a situation is real or possible.
If clause (If + present) Main clause (will / can / may / must +
verb)
If it rains today, I'll stay at home
If he is busy now, I will come back tomorrow.
If he doesn't do his homework, He can not go to the party.
If you work hard, you may become a millonaire someday.
If they don't invite you, you must not go.
Second conditional
It refers to a hypothetic situation
If clause (If + past) Main clause (would / could / might +
verb)
If I won the lottery, I would travel around the world.
If I were in Brazil, I could go to Rio de Janeiro.
If they worked for that company, they might have better salaries
If he didn't live by the river, he couldn't go fishing.
Third conditional
It refers to a hypothetic situation in the past
If clause (If + past perfect Main clause (would/could/might + have +
tense) past participle)
If I had won the lottery, I would have traveled around the world.
If I had known the answer, I would have raised my hand.
If I hadn't been so busy, I could have helped you.
If they hadn't drunk so much they wouldn't have felt sick today.
last night,
If we had studied harder, we might have passed the test.
Conditional exercises
2) If the sun _____________________ (to shine), we ______________________ (to walk) to the town.
5) If she __________________ (to earn) a lot of money, she ___________________ (to fly) to New York.
7) If you __________________ (to wear) sandals in the mountains, you _________________ (to slip) on
the rocks
8) If Rita _________________ (to forget) her homework, the teacher _________________ (to give) her
a low mark.
9) If they _______________________ (to go) to the disco, they ______________________ (to listen) to
loud music.
10) If you _____________________ (to wait) a minute, I _____________________ (to ask) my parents.
Second Conditional
prepare) dinner.
visit) us.
3) If Tim and Tom _____________________ (to be) older, they _____________________ (to
to my birthday party.
Third Conditional
play)football.
documents.
understand) him.
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
For the authentication of an open system and encryption WEP, you must
configure the access point with the following options:
2.
3. If you write the WEP key with characters from the keyboard, you must include
five characters of 40 bits
4.
5.
6.
7.
Self evaluation
G.C. 6.3
So congratulations!!!!!!!!!!!!!!!!!
But you havent finished it yet, there is
something you havent done , and that is
the main target and the real challenge for
what I dare you,
You can choose between WEP, WPA or WPA2, according to the security and justify your
selected option.
1. INVESTIGATE THE TOPIC (How to configure wireless access point with TP-LINK)
2. CREATE THE SPEECH (Dont forget to include at least 5 sentences with Conditionals
3. SAVE YOUR VIDEO IN AVI FORMAT
4. BURN A CD TO DELIVER YOUR FINAL PROJECT
CHECK LIST
From 802.11a to 802.11m and beyond: How much do you know about essential wireless LAN
terminology? Our handy WLAN glossary provides concise definitions with links to more complete
explanations and further information. Want to test your knowledge? Try our WLAN quiz .
802.11: an evolving family of specifications for wireless LANs, developed by a working group of the
Institute of Electrical and Electronics Engineers(IEEE). 802.11 standards use the Ethernet protocol and
CSMA/CA (carrier sense multiple access with collision avoidance) for path sharing.
802.11a: provides specifications for wireless ATM systems. 802.11a is also used in wireless hubs.
Networks using 802.11a operate at radio frequencies between 5.725 GHz and 5.850 GHz. The
specification uses a modulation scheme known as orthogonal frequency-division multiplexing (OFDM)
that is especially well suited to use in office settings.
802.11b: WLAN standard often called Wi-Fi; backward compatible with 802.11. Instead of the phase-
shift keying (PSK) modulation method historically used in 802.11 standards, 802.11b uses
complementary code keying (CCK), which allows higher data speeds and is less susceptible to multipath-
propagation interference.
802.11d: a wireless network communications specification for use in countries where systems using
other standards in the 802.11 family are not allowed to operate. Configuration can be fine-tuned at the
Media Access Control layer (MAC layer) level to comply with the rules of the country or district in which
the network is to be used. Rules subject to variation include allowed frequencies, allowed power levels,
and allowed signal bandwidth. 802.11d facilitates global roaming.
802.11e: a proposed adaptation to the 802.11a and 802.11b specifications that enhances the 802.11
Media Access Control layer (MAC layer) with a coordinated time division multiple access (TDMA)
construct, and adds error-correcting mechanisms for delay-sensitive applications such as voice and
video. The 802.11e specification provides seamless interoperability between business, home, and public
environments such as airports and hotels and offers all subscribers high-speed Internet access with full-
motion video, high-fidelity audio, and Voice over IP (VoIP).
802.11g: offers transmission over relatively short distances at up to 54 megabits per second (Mbps),
compared with the 11 Mbps theoretical maximum of 802.11b. 802.11g employs orthogonal frequency
division multiplexing (OFDM), the modulation scheme used in 802.11a, to obtain higher data speed.
Computers or terminals set up for 802.11g can fall back to speeds of 11 Mbps, so that 802.11b and
802.11g devices can be compatible within a single network.
802.11h: intended to resolve interference issues introduced by the use of 802.11a in some locations,
particularly with military radar systems and medical devices. Dynamic frequency selection (DFS) detects
the presence of other devices on a channel and automatically switches the network to another channel
if and when such signals are detected. Transmit power control (TPC) reduces the radio-frequency (RF)
output power of each network transmitter to a level that minimizes the risk of interference.
802.11i: provides improved encryption for networks that use 802.11a, 802.11b, and 802.11g standards.
Requires new encryption key protocols, known as Temporal Key Integrity Protocol (TKIP) and Advanced
Encryption Standard (AES). Other features include key caching, which facilitates fast reconnection to the
802.11j: proposed addition to the 802.11 family of standards that incorporates Japanese regulatory
extensions to 802.11a; the main intent is to add channels in the radio-frequency (RF) band of 4.9 GHz to
5.0 GHz. WLANs using 802.11j will provide for speeds of up to 54 Mbps, and will employ orthogonal
frequency division multiplexing (OFDM). The specification will define how Japanese 802.11 family
WLANs and other wireless systems, particularly HiperLAN2 networks, can operate in geographic
proximity without mutual interference.
802.11k: proposed standard for how a WLAN should perform channel selection, roaming, and transmit
power control (TPC) in order to optimize network performance. In a network conforming to 802.11k, if
the access point (AP) having the strongest signal is loaded to capacity, a wireless device is connected to
one of the underutilized APs. Even though the signal may be weaker, the overall throughput is greater
because more efficient use is made of the network resources.
802.1X: standard designed to enhance 802.11 WLAN security. 802.1X provides an authentication
framework, allowing a user to be authenticated by a central authority. The actual algorithm that is used
to determine whether a user is authentic is left open and multiple algorithms are possible.
Access point (AP): a station that transmits and receives data (sometimes referred to as a transceiver).
An access point connects users to other users within the network and also can serve as the point of
interconnection between the WLAN and a fixed wire network. The number of access points a WLAN
needs is determined by the number of users and the size of the network.
Access point mapping (also called war driving): the act of locating and possibly exploiting connections to
WLANs while driving around a city or elsewhere. To do war driving, you need a vehicle, a computer
(which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind of an
antenna which can be mounted on top of or positioned inside the car. Because a WLAN may have a
range that extends beyond an office building, an outside user may be able to intrude into the network,
obtain a free Internet connection, and possibly gain access to company records and other resources.
Ad-hoc network : a LAN or other small network, especially one with wireless or temporary plug-in
connections, in which some of the network devices are part of the network only for the duration of a
communications session or, in the case of mobile or portable devices, while in some close proximity to
the rest of the network.
Antenna: a specialized transducer that converts radio-frequency (RF) fields into alternating current (AC)
or vice-versa. There are two basic types: the receiving antenna, which intercepts RF energy and delivers
AC to electronic equipment, and the transmitting antenna, which is fed with AC from electronic
equipment and generates an RF field.
Digital pulse wireless: (see also: ultra wideband or UWB) is a wireless technology for transmitting large
amounts of digital data over a wide spectrum of frequency bands with very low power for a short
Evil twin: a home-made wireless access point that masquerades as a legitimate one to gather personal
or corporate information without the end-user's knowledge. It's fairly easy for an attacker to create an
evil twin by simply using a laptop, a wireless card and some readily-available software. The attacker
positions himself in the vicinity of a legitimate Wi-Fi access point and lets his computer discover what
name and radio frequency the legitimate access point uses. He then sends out his own radio signal,
using the same name.
Extensible Authentication Protocol (EAP): authentication protocol for wireless networks that expands
on methods used by the Point-to-Point Protocol (PPP), a protocol often used when connecting a
computer to the Internet. EAP can support multiple authentication mechanisms, such as token cards,
smart cards, certificates, one-time passwords, and public key encryption authentication.
Fixed wireless: wireless devices or systems in fixed locations such as homes and offices. Fixed wireless
devices usually derive their electrical power from the utility mains, unlike mobile wireless or portable
wireless which tend to be battery-powered. Although mobile and portable systems can be used in fixed
locations, efficiency and bandwidth are compromised compared with fixed systems.
HiperLAN: WLAN communication standards primarily used in European countries. There are two
specifications: HiperLAN/1 and HiperLAN/2. Both have been adopted by the European
Telecommunications Standards Institute (ETSI). The HiperLAN standards provide features and
capabilities similar to 802.11. HiperLAN/1 provides communications at up to 20 Mbps in the 5-GHz range
of the radio frequency (RF) spectrum.
Hot spot: (see also access point) a WLAN node that provides Internet connection and virtual private
network (VPN) access from a given location. A business traveller, for example, with a laptop equipped
for Wi-Fi can look up a local hot spot, contact it, and get connected through its network to reach the
Internet and their own company remotely with a secure connection. Increasingly, public places, such as
airports, hotels, and coffee shops are providing free wireless access for customers.
Hot zone: a wireless access area created by multiple hot spots located in close proximity to each other.
Hot zones usually combine public safety access points with public hot spots. Each hot spot typically
provides network access for distances between 100 and 300 feet; various technologies, such as mesh
network topologies and fiber optic backbones, are used in conjunction with the hot spots to create
areas of coverage.
Optical wireless: the combined use of conventional radio-frequency (RF) wireless and optical fiber for
telecommunication. Long-range links are provided by optical fiber and links from the long-range end-
points to end users are accomplished by RF wireless or laser systems. RF wireless at ultra-high
frequencies (UHF) and microwave frequencies can carry broadband signals to individual computers at
substantial data speeds.
Radio frequency (RF): alternating current (AC) having characteristics such that, if the current is input to
an antenna, an electromagnetic (EM) field is generated suitable for wireless broadcasting and/or
communications.
Transponder: a wireless communications, monitoring, or control device that picks up and automatically
responds to an incoming signal. The term is a contraction of the words transmitter and responder.
Transponders can be either passive or active.
Ultra wideband (UWB): (see also: digital pulse wireless) is a wireless technology for transmitting large
amounts of digital data over a wide spectrum of frequency bands with very low power for a short
distance. Ultra wideband broadcasts very precisely timed digital pulses on a carrier signal across a very
wide spectrum (number of frequency channels) at the same time. UWB can carry a huge amount of data
over a distance up to 230 feet at very low power (less than 0.5 milliwatts), and has the ability to carry
signals through doors and other obstacles that tend to reflect signals at more limited bandwidths and a
higher power.
Virtual private network (VPN): a network that uses a public telecommunication infrastructure, such as
the Internet, to provide remote offices or individual users with secure access to their organization's
network. A VPN ensures privacy through security procedures and tunneling protocols such as the Layer
Two Tunneling Protocol ( L2TP ). Data is encrypted at the sending end and decrypted at the receiving
end.
VoWLAN (Voice over WLAN, sometimes called wireless VoIP, Wi-Fi VoIP): a method of routing telephone
calls for mobile users over the Internet using the technology specified in IEEE 802.11b. Routing mobile
calls over the Internet makes them free, or at least much less expensive than they would be otherwise.
WAP (Wireless Application Protocol): a specification for a set of communication protocols to standardize
the way that wireless devices, such as cellular telephones and radio transceivers, can be used for
Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging.
War driving (also called access point mapping):, the act of locating and possibly exploiting connections
to WLANs while driving around a city or elsewhere. To do war driving, you need a vehicle, a computer
(which can be a laptop), a wireless Ethernet card set to work in promiscuous mode, and some kind of an
antenna which can be mounted on top of or positioned inside the car. Because a WLAN may have a
range that extends beyond an office building, an outside user may be able to intrude into the network,
obtain a free Internet connection, and possibly gain access to company records and other resources.
W-CDMA (Wideband Code-Division Multiple Access): officially known as IMT-2000 direct spread; ITU
standard derived from Code-Division Multiple Access (CDMA). W-CDMA is a third-generation (3G)
mobile wireless technology that promises much higher data speeds to mobile and portable wireless
devices than commonly offered in today's market.
Wi-Fi (short for wireless fidelity): a term for certain types of WLANs. Wi-Fi can apply to products that use
any 802.11 standard. Wi-Fi has gained acceptance in many businesses, agencies, schools, and homes as
an alternative to a wired LAN. Many airports, hotels, and fast-food facilities offer public access to Wi-Fi
networks.
Wired Equivalent Privacy (WEP): a security protocol specified in 802.11b, designed to provide a WLAN
with a level of security and privacy comparable to what is usually expected of a wired LAN. Data
encryption protects the vulnerable wireless link between clients and access points; once this measure
has been taken, other typical LAN security mechanisms such as password protection, end-to-end
encryption, virtual private networks (VPNs), and authentication can be put in place to ensure privacy.
Wireless: describes telecommunications in which electromagnetic waves (rather than some form of
wire) carry the signal over part or all of the communication path.
Wireless Abstract XML (WAX): an abstract markup language and associated tools that facilitate wireless
application development. The major features of WAX include: the WAX language itself; translation
stylesheets, which are used to translate the WAX language into the most suitable language for the
requesting device; the device registry, which includes an XML database of device particulars; dynamic
image and text selection, which allows content to be written a single time for multiple transformations;
and the application foundation, a WAX servlet that creates a foundation for WAX applications.
Wireless adapter: A device that adds wireless capability to a desktop or laptop machine. Different
varieties plug into a PC Card slot, USB port or PCI bus.
Wireless application service provider (WASP): provides Web-based access to applications and services
that would otherwise have to be stored locally and makes it possible for customers to access the service
from a variety of wireless devices, such as a smartphone or personal digital assistant (PDA).
Wireless ISP (WISP): an Internet service provider (ISP) that allows subscribers to connect to a server at
designated hot spots (access points) using a wireless connection such as Wi-Fi. This type of ISP offers
broadband service and allows subscriber computers, called stations, to access the Internet and the Web
from anywhere within the zone of coverage provided by the server antenna, usually a region with a
radius of several kilometers.
Wireless LAN: A local area network that uses radio frequency transmission over the air. Wi-Fi is the
standard, and it works like a cellular phone system. See wireless LAN and Wi-Fi.
Wireless local area network (WLAN): a local area network (LAN) that users access through a wireless
connection. 802.11 standards specify WLAN technologies. WLANs are frequently some portion of a
wired LAN.
Wireless service provider: a company that offers transmission services to users of wireless devices
through radio frequency (RF) signals rather than through end-to-end wire communication.
Yagi antenna (sometimes called a Yagi-Uda array or simply a Yagi): a unidirectional antenna commonly
used in communications when a frequency is above 10 MHz.
Style Tags
Tag Description
<style> Defines style information for a document
<link> Defines the relationship between a document and an external
resource
Rounded Corners
After adding rounded corners in CSS was tricky. We had to use different images for each corner. Now in
CSS, creating rounded corners is easy. In CSS, the border-radius property is used to create rounded
corners:
Example
div
{
border:2px solid;
border-radius:25px;
}
Box Shadow
In CSS, the box-shadow property is used to add shadow to boxes:
Example
div
{
box-shadow: 10px 10px 5px #888888;
}
Border Image
With the CSS border-image property you can use an image to create a border:
Example
div
{
border-image:url(border.png) 30 30 round;
-webkit-border-image:url(border.png) 30 30 round; /* Safari 5
and older */
-o-border-image:url(border.png) 30 30 round; /* Opera */
}
Border Properties
Property Description
border-image A shorthand property for setting all the border-
image-* properties
border-radius A shorthand property for setting all the four border-
*-radius properties
box-shadow Attaches one or more drop-shadows to the box
Background Color
The background-color property specifies the background color of an element. The background color of a
page is defined in the body selector:
Example
Look at CSS Color Values for a complete list of possible color values. In the example below, the h1, p,
and div elements have different background colors:
Example
Example
Example
If the image is repeated only horizontally (repeat-x), the background will look better.
Note: When using a background image, use an image that does not
disturb the text.
Example
In the example above, the background image is shown in the same place as the text. We want to change
the position of the image, so that it does not disturb the text too much.
Example
Text Color
The color property is used to set the color of the text. With CSS, a color is most often specified by:
Example
Note: For W3C compliant CSS: If you define the color property, you
must also define the background-color property.
Text Alignment
The text-align property is used to set the horizontal alignment of a text. Text can be centered, or aligned
to the left or right, or justified.
When text-align is set to "justify", each line is stretched so that every line has equal width, and the left
and right margins are straight (like in magazines and newspapers).
Example
h1 {text-align:center;}
p.date {text-align:right;}
p.main {text-align:justify;}
Example
Text Effects
CSS contains several new text features. In this part you will learn about the following text properties:
text-shadow
word-wrap
Text Shadow
In CSS, the text-shadow property applies shadow to text.
You specify the horizontal shadow, the vertical shadow, the blur distance, and the color of the shadow:
Example
h1
{
text-shadow: 5px 5px 5px #FF0000;
}
Word Wrapping
If a word is too long to fit within an area, it expands outside. In CSS, the word-wrap property allows you
to force the text to wrap - even if it means splitting it in the middle of a word.
Example
Property Description
hanging-punctuation Specifies whether a punctuation character may be placed
outside the line box
punctuation-trim Specifies whether a punctuation character should be
trimmed
text-align-last Describes how the last line of a block or a line right before
a forced line break is aligned when text-align is "justify"
text-emphasis Applies emphasis marks, and the foreground color of the
emphasis marks, to the element's text
text-justify Specifies the justification method used when text-align is
"justify"
text-outline Specifies a text outline
text-overflow Specifies what should happen when text overflows the
containing element
text-shadow Adds shadow to text
text-wrap Specifies line breaking rules for text
word-break Specifies line breaking rules for non-CJK scripts
word-wrap Allows long, unbreakable words to be broken and wrap to
the next line
CSS font properties define the font family, boldness, size, and the style of a text.
Font Families
In CSS, there are two types of font family names:
generic family - a group of font families with a similar look (like "Serif" or
"Monospace")
font family - a specific font family (like "Times New Roman" or "Arial")
Font Style
The font-style property is mostly used to specify italic text. This property has three values:
p.normal {font-style:normal;}
p.italic {font-style:italic;}
p.oblique {font-style:oblique;}
Example
h1 {font-size:40px;}
h2 {font-size:30px;}
p {font-size:14px;}
The example above allows Internet Explorer 9, Firefox, Chrome, Opera, and Safari to resize the text.
1em is equal to the current font size. The default text size in browsers is 16px. So, the default size of 1em
is 16px. The size can be calculated from pixels to em using this formula: pixels/16=em
Example
h1 {font-size:2.5em;} /* 40px/16=2.5em */
h2 {font-size:1.875em;} /* 30px/16=1.875em */
p {font-size:0.875em;} /* 14px/16=0.875em */
Font Descriptors
The following table lists all the font descriptors that can be defined inside the @font-face rule:
Styling Links
Links can be styled with any CSS property (e.g. color, font-family, background, etc.). In addition, links
can be styled differently depending on what state they are in.
Example
When setting the style for several link states, there are some order rules:
Background Color
The background-color property specifies the background color for links:
Example
List
In HTML, there are two types of lists:
With CSS, lists can be styled further, and images can be used as the list item marker.
Example
Some of the values are for unordered lists, and some for ordered lists.
Example
When using the shorthand property, the order of the values are:
list-style-type
list-style-position (for a description, see the CSS properties table below)
list-style-image
It does not matter if one of the values above are missing, as long as the rest are in the specified order.
Table Borders
To specify table borders in CSS, use the border property. The example below specifies a black border for
table, th, and td elements:
Example
table, th, td
{
border: 1px solid black;
}
Notice that the table in the example above has double borders. This is because both the table and the th/td
elements have separate borders. To display a single border for the table, use the border-collapse property.
Collapse Borders
The border-collapse property sets whether the table borders are collapsed into a single border or
separated:
Example
Example
table
{ width:100%; }
th
{ height:50px; }
Example
td
{ text-align:right; }
The vertical-align property sets the vertical alignment, like top, bottom, or middle:
Example
td
{
height:50px;
vertical-align:bottom;
}
Table Padding
To control the space between the border and content in a table, use the padding property on td and th
elements:
Example
I. Watch the following video and listen carefully to the information. Take
notes for answering the question below. CSS Tutorial Part 1 Basic
Webpage Layout or CSS Tutorial Pt 1 Basic Layout
<style src="mystyle.css">
<stylesheet>mystyle.css</stylesheet>
<css>
<script>
style
font
styles
class
{body;color:black;}
{body:color=black;}
background-color
bgcolor
font-style
text-size
font-size
a {text-decoration:no-underline;}
a {underline:none;}
a {decoration:no-underline;}
The CSS box model is essentially a box that wraps around HTML elements, and it consists of: margins,
borders, padding, and the actual content.
The box model allows us to place a border around elements and space elements in relation to other
elements. The image below illustrates the box model:
Margin - Clears an area around the border. The margin does not have a
background color, it is completely transparent
Border - A border that goes around the padding and content. The border is
affected by the background color of the box
Padding - Clears an area around the content. The padding is affected by
the background color of the box
Content - The content of the box, where text and images appear
In order to set the width and height of an element correctly in all browsers, you need to know how the box
model works.
Important: When you set the width and height properties of an element
with CSS, you just set the width and height of the content area. To
calculate the full size of an element, you must also add the padding,
borders and margins.
width:250px;
padding:10px;
border:5px solid gray;
margin:10px;
Assume that you had only 250px of space. Let's make an element with a total width of 250px:
Example
Total element width = width + left padding + right padding + left border + right border + left
margin + right margin
Total element height = height + top padding + bottom padding + top border + bottom border +
top margin + bottom margin
Border Style
The CSS border properties allow you to specify the style and color of an element's border. The border-
style property specifies what kind of border to display.
Note: None of the border properties will have ANY effect unless the
border-style property is set!
border-style values:
none: Defines no border
double: Defines two borders. The width of the two borders are the same as the border-width value
groove: Defines a 3D grooved border. The effect depends on the border-color value
ridge: Defines a 3D ridged border. The effect depends on the border-color value
inset: Defines a 3D inset border. The effect depends on the border-color value
outset: Defines a 3D outset border. The effect depends on the border-color value
Note: The "border-width" property does not work if it is used alone. Use the "border-style" property to set
the borders first.
Example
p.one
{
border-style:solid;
border-width:5px;
}
p.two
{
border-style:solid;
border-width:medium;
}
Border Color
The border-color property is used to set the color of the border. The color can be set by:
Note: The "border-color" property does not work if it is used alone. Use the "border-style" property to set
the borders first.
Example
p.one
{
border-style:solid;
border-color:red;
}
p.two
{
border-style:solid;
border-color:#98bf21;
}
Example
p
{
border-top-style:dotted;
border-right-style:solid;
border-bottom-style:dotted;
border-left-style:solid;
}
The border-style property is used in the example above. However, it also works with border-width and
border-color.
Margin
The margin clears an area around an element (outside the border). The margin does not have a
background color, and is completely transparent.
The top, right, bottom, and left margin can be changed independently using separate properties. A
shorthand margin property can also be used, to change all margins at once.
Possible Values
Value Description
auto The browser calculates a margin
length Specifies a margin in px, pt, cm, etc. Default value is 0px
% Specifies a margin in percent of the width of the containing element
inherit Specifies that the margin should be inherited from the parent element
Example
margin-top:100px;
margin-bottom:100px;
margin-right:50px;
margin-left:50px;
Property Description
margin A shorthand property for setting the margin properties in one
declaration
margin- Sets the bottom margin of an element
bottom
margin-left Sets the left margin of an element
margin-right Sets the right margin of an element
margin-top Sets the top margin of an element
Padding
The padding clears an area around the content (inside the border) of an element. The padding is affected
by the background color of the element.
The top, right, bottom, and left padding can be changed independently using separate properties. A
shorthand padding property can also be used, to change all paddings at once.
Possible Values
Value Description
Example
padding-top:25px;
padding-bottom:25px;
padding-right:50px;
padding-left:50px;
Property Description
padding A shorthand property for setting all the padding properties in
one declaration
padding-bottom Sets the bottom padding of an element
padding-left Sets the left padding of an element
padding-right Sets the right padding of an element
padding-top Sets the top padding of an element
p1:
o left and right margins of 20 pixels
o background color of Pink (#FF00FF)
o foreground color of blue.
o font-family of Arial,Helvetica,sans-serif
o font-size 10pt
o font-weight normal
o left aligned text
p2:
o left and right margins of 30 pixels
o background color of black
o foreground color of #FFFF00
o font-family of Arial,Helvetica,sans-serif
o font-size 10pt
o font-weight normal
p3:
o text indent of 1 centimeter
o background color of rgb(204, 51, 51)
o foreground color of white
o font-family of Arial,Helvetica,sans-serif
o font-size 10pt
o font-weight normal
Introduction
JavaScript is the world's most popular programming language. It is the language for
HTML, for the web, for servers, PCs, laptops, tablets, phones, and more.
is a Scripting Language
A scripting language is a lightweight programming language.
JavaScript is programming code that can be inserted into HTML pages.
JavaScript code can be executed by all modern web browsers.
JavaScript is easy to learn.
You can only use document.write in the HTML output. If you use it after
the document has loaded, the whole document will be overwritten.
The alert() function is not much used in JavaScript, but it is quite handy for trying out code.
The onclick event is only one of the many HTML events you will learn about in this tutorial.
Changing Content
Using JavaScript to manipulate the content of HTML elements is a very common.
Example
You will often see document.getElementById("some id"). This is defined in the HTML DOM. The
DOM (Document Object Model) is the official W3C standard for accessing HTML elements.
Changing Images
This example dynamically changes the source (src) attribute of an HTML <image> element:
Example
Validate Input
JavaScript is commonly used to validate input.
Example
in <body>
In this example, JavaScript writes into the HTML <body> while the page loads:
Example
<!DOCTYPE html>
<html>
< body>
.
<script>
document.write("<h1>This is a heading</h1>");
document.write("<p>This is a paragraph</p>");
< /script>
.
< /body>
< /html>
The JavaScript statements, in the example above, are executed while the page loads. More often, we want
to execute code when an event occurs, like when the user clicks a button.
If we put JavaScript code inside a function, we can call that function when an event occurs. You will
learn much more about JavaScript functions and events in later chapters.
Example
<!DOCTYPE html>
<html>
<head>
<script>
function myFunction()
{
document.getElementById("demo").innerHTML="My First JavaScript Function";
}
< /script>
< /head>
<body>
<h1>My Web Page</h1>
<p id="demo">A Paragraph</p>
<button type="button" onclick="myFunction()">Try it</button>
</body>
< /html>
External
Scripts can also be placed in external files. External files often contain code to be used by several
different web pages. External JavaScript files have the file extension .js. To use an external script, point to
the .js file in the "src" attribute of the <script> tag:
Example
<!DOCTYPE html>
<html>
<body>
<script src="myScript.js"> </script>
< /body>
< /html>
You can place the script in the <head> or <body> as you like. The script will behave as if it was located
exactly where you put the <script> tag in the document.
Output
Example
Access the HTML element with the specified id, and change its content:
<!DOCTYPE html>
<html>
< body>
< h1>My First Web Page</h1>
< p id="demo">My First Paragraph</p>
<script> document.getElementById("demo").innerHTML="My First
JavaScript"; < /script>
< /body>
< /html>
The JavaScript is executed by the web browser. In this case, the browser will access the HTML element
with id="demo", and replace its content (innerHTML) with "My First JavaScript".
Example
<!DOCTYPE html>
<html>
< body>
< h1>My First Web Page</h1>
<script> document.write("<p>My First JavaScript</p>");
< /script>
< /body>
< /html>
in Windows 8
English State Academy 111 |
Page
Microsoft supports JavaScript for creating Windows 8 apps.
JavaScript is definitely the future for both the Internet and Windows.
I. Watch the following video and listen carefully to the information. Take
notes for answering the question below. What is JavaScript
JavaScript QUIZ
<javascript>
<scripting>
("Hello World");
document.write("Hello World");
Both the <head> section and the <body> section are correct
<script src="xxx.js">
<script name="xxx.js">
alertBox("Hello World");
msg("Hello World");
alert("Hello World");
Variables
Example
In algebra we use letters (like x) to hold values (like 5). From the expression z=x+y above, we can
calculate the value of z to be 11. In JavaScript these letters are called variables.
Variables
As with algebra, JavaScript variables can be used to hold values (x=5) or expressions (z=x+y). Variable
can have short names (like x and y) or more descriptive names (age, sum, totalvolume).
Data Types
JavaScript variables can also hold other types of data, like text values (person="John Doe"). In JavaScript
a text like "John Doe" is called a string. There are many types of JavaScript variables, but for now, just
think of numbers and strings.
When you assign a text value to a variable, put double or single quotes around the value. When you
assign a numeric value to a variable, do not put quotes around the value. If you put quotes around a
numeric value, it will be treated as text.
Example
After the declaration, the variable is empty (it has no value). To assign a value to the variable, use the
equal sign: carname="Volvo";
However, you can also assign a value to the variable when you declare it: var carname="Volvo";
In the example below we create a variable called carname, assigns the value "Volvo" to it, and put the
value inside the HTML paragraph with id="demo":
Example
<p id="demo"></p>
var carname="Volvo";
document.getElementById("demo").innerHTML=carname;
var lastname="Doe",
age=30,
job="carpenter";
Value = undefined
In computer programs, variables are often declared without a value. The value can be something that has
to be calculated, or something that will be provided later, like user input. Variable declared without a
value will have the value undefined.
The variable carname will have the value undefined after the execution of the following statement:
var carname;
Re-Declaring Variables
If you re-declare a JavaScript variable, it will not lose its value. The value of the variable carname will
still have the value "Volvo" after the execution of the following two statements:
var carname="Volvo";
var carname;
Example
y=5;
x=y+2;
Data Types
Strings
A string is a variable which stores a series of characters like "John Doe".
A string can be any text inside quotes. You can use single or double quotes. You can use quotes
inside a string, as long as they don't match the quotes surrounding the string:
Example
Numbers
JavaScript has only one type of numbers. Numbers can be written with, or without decimals:
Example
Extra large or extra small numbers can be written with scientific (exponential) notation:
Booleans
Booleans can only have two values: true or false.
var x=true;
var y=false;
Arrays
The following code creates an Array called cars:
or (condensed array):
or (literal array):
Example
var cars=["Saab","Volvo","BMW"];
Array indexes are zero-based, which means the first item is [0], second is [1], and so on.
Functions
A function is a block of code that will be executed when "someone" calls it:
Example
<!DOCTYPE html>
<html>
< head>
< script>
function myFunction()
{
alert("Hello World!");
}
< /script>
< /head>
< body>
< button onclick="myFunction()">Try it</button>
< /body>
< /html>
Function Syntax
A function is written as a code block (inside curly { } braces), preceded by the function keyword:
function functionname()
{
You can send as many arguments as you like, separated by commas (,)
myFunction(argument1,argument2)
function myFunction(var1,var2)
{
some code
}
Example
< script>
function myFunction(name,job)
{
alert("Welcome " + name + ", the " + job);
}
< /script>
The function above will alert "Welcome Harry Potter, the Wizard" when the button is clicked.
Example
The example above will alert "Welcome Harry Potter, the Wizard" or "Welcome Bob, the Builder"
depending on which button is clicked.
When using the return statement, the function will stop executing, and return the specified value.
Syntax
function myFunction()
{
var x=5;
return x;
}
Note: It is not the entire JavaScript that will stop executing, only the function. JavaScript
will continue executing code, where the function-call was made from.
You can make a return value based on arguments passed into the function:
Example
Operators
The assignment operator = is used to assign values to JavaScript variables. The arithmetic operator + is
used to add values together.
Example
Arithmetic operators are used to perform arithmetic between variables and/or values.
Given that y=5, the table below explains the arithmetic operators:
Assignment Operators
Assignment operators are used to assign values to JavaScript variables.
Given that x=10 and y=5, the table below explains the assignment operators:
Example
To add two or more string variables together, use the + operator.
txt1="What a very";
txt2="nice day";
txt3=txt1+txt2;
To add a space between the two strings, insert a space into one of the strings:
Example
txt1="What a very ";
txt2="nice day";
txt3=txt1+txt2;
Example
txt1="What a very";
txt2="nice day";
txt3=txt1+" "+txt2;
Example
x=5+5;
y="5"+5;
z="Hello"+5;
10
55
Hello5
The rule is: If you add a number and a string, the result will be a string!
Logical Operators
Logical operators are used to determine the logic between variables or values.
Conditional Operator
JavaScript also contains a conditional operator that assigns a value to a variable based on some condition.
Syntax : variablename=(condition)?value1:value2
Example
If the variable age is a value below 18, the value of the variable voteable will
be "Too young, otherwise the value of voteable will be "Old enough":
If...Else Statements
Conditional statements are used to perform different actions based on different conditions.
Conditional Statements
Very often when you write code, you want to perform different actions for different decisions. You can
use conditional statements in your code to do this.
If Statement
Use the if statement to execute some code only if a specified condition is true.
Syntax
if (condition)
{
code to be executed if condition is true
}
Note that if is written in lowercase letters. Using uppercase letters (IF) will generate a JavaScript error!
Example
if (time<20)
{
x="Good day";
}
Notice that there is no ..else.. in this syntax. You tell the browser to execute some code only if the
specified condition is true.
If...else Statement
Use the if....else statement to execute some code if a condition is true and another code if the condition is
not true.
Syntax
if (condition)
{
code to be executed if condition is true
}
else
{
Example
If the time is less than 20:00, you will get a "Good day" greeting, otherwise
you will get a "Good evening" greeting
if (time<20)
{
x="Good day";
}
else
{
x="Good evening";
}
Syntax
if (condition1)
{
code to be executed if condition1 is true
}
else if (condition2)
{
code to be executed if condition2 is true
}
else
{
code to be executed if neither condition1 nor condition2 is true
}
Example
If the time is less than 10:00, you will get a "Good morning" greeting, if not,
but the time is less than 20:00, you will get a "Good day" greeting,
otherwise you will get a "Good evening" greeting:
Good day
For Loop
Loops
Loops are handy, if you want to run the same code over and over again, each time with a different value.
Often this is the case when working with arrays:
Instead of writing:
Example
Example:
And you can omit statement 1 (like when your values are set before the loop starts):
Example:
var i=2,len=cars.length;
for (; i<len; i++)
{
document.write(cars[i] + "<br>");
}
Statement 2
Often statement 2 is used to evaluate the condition of the initial variable. This is not always the case,
JavaScript doesn't care, and statement 2 is optional. If statement 2 returns true, the loop will start over
again, if it returns false, the loop will end.
If you omit statement 2, you must provide a break inside the loop.
Otherwise the loop will never end. This will crash your browser. Read
about breaks in a later chapter of this tutorial.
Statement 3
Often statement 3 increases the initial variable. This is not always the case, JavaScript doesn't care, and
statement 3 is optional. Statement 3 could do anything. The increment could be negative (i--), or larger
(i=i+15). Statement 3 can also be omitted (like when you have corresponding code inside the loop):
Example:
English State Academy 130 |
Page
var i=0,len=cars.length;
for (; i<len; )
{
document.write(cars[i] + "<br>");
i++;
}
Example
var person={fname:"John",lname:"Doe",age:25};
for (x in person)
{
txt=txt + person[x];
}
While Loop
Syntax
while (condition)
{
The loop in this example will continue to run as long as the variable i is less than 5:
Example
while (i<5)
{
x=x + "The number is " + i + "<br>";
i++;
}
If you forget to increase the variable used in the condition, the loop will
never end. This will crash your browser.
Syntax
do
{
code block to be executed
}
while (condition);
The example below uses a do/while loop. The loop will always be executed at least once, even if the
condition is false, because the code block is executed before the condition is tested:
Example
do
{
x=x + "The number is " + i + "<br>";
i++;
}
while (i<5);
Do not forget to increase the variable used in the condition, otherwise the loop will never end!
The loop in this example uses a for loop to display all the values in the cars array:
Example
cars=["BMW","Volvo","Saab","Ford"];
var i=0;
for (;cars[i];)
{
document.write(cars[i] + "<br>");
i++;
}
The loop in this example uses a while loop to display all the values in the cars array:
Example
cars=["BMW","Volvo","Saab","Ford"];
var i=0;
while (cars[i])
{
document.write(cars[i] + "<br>");
i++;
}
JavaScript QUIZ
if i==5 then
if i=5
while (i<=10;i++)
while (i<=10)
for (i = 0; i <= 5)
rnd(7.25)
round(7.25)
Math.round(7.25)
Grammar in Context
Read this information about the main characteristics of formal and informal e-mails,
so you could learn the correct style to write them.
G.C. 8.1,8.2 & 8.3
English State Academy 134 |
Page
Think about Formal Informal
Beginning and ending Start and end appropriately No rules - your choice
Read the example then by teams choose the correct name of each letter shown
below and write them on the lines.
G.C. 8.1,8.2 & 8.3
request for body greeting senders job Opening phrase Closing phrase
action
b) I write on behalf of my CEO, Ms. Douglas, of the Dutch cell phone company cell.com.
Youve met Ms. Douglas at the Cebit Trade Fair in Hannover. She was highly satisfied with your
inspirational inventions, especially the auto rechargeable cell phone. This new technique is not
only eco friendly, but also very efficient in many ways. This is why our company has a positive
vision of our potential collaboration.
c) Considering the fact that our eye went to your invention, we would like to set up a deal.
Ms. Douglas wants to draw up an order of 3,000 of your cell phones. But instead of 130, - a
piece, a descent settlement would be more appropriate, seen the extent of the purchase.
First we would like to receive a small amount of your cell phones. This is to confirm our decision
and test the Dutch view on your product. Then, we would like to discuss the business aspect of
this matter, which we also prefer on black and white. However, we most certainly are in doubt
of the success.
e) Yours sincerely.
f) Lara Porter,
Manager cell.com
a) c) e)
b) d) f)
Teacher gives the correct answers and the students check their answers and all doubts
are clarified by the teacher.
Grammar in Context
Analyze the following chart then identify the different ways to express requests and
preferences.
G.C. 8.1,8.2 & 8.3
English State Academy 136 |
Page
REQUEST PREFERENCE
We often have to make requests and ask for In preference to asking a direct question, formal
things in our letters and e-mails. To do this, e-mails frequently use indirect questions.
we use phrases like Could you and Would you.
If you make two requests in a letter or email,
the second request should include the
word also/therefore.
Would you be able to deliver the I wonder if you would like to join us for
report by tomorrow? dinner on Tuesday.
Could you ask Pierre to come to the We would like to eat at 1:30 pm
meeting? We are interested
Could you also send me ? I would appreciate if you
Could you therefore send me ? I would be grateful if
Would you be so kind as to
Read the following sentences and complete it with the correct word. G.C. 5.1
____________Sir,
We are a company dedicated to the sale and distribution of garden furniture called "Mi Jardn".
The company is based in Valencia, Spain. We invite you to visit our web page in English at www.
my garden.com, where you will be able to ___________our product lines.
We are ____________in the garden products you have advertised in the publication "Gardens
Today" of March 20th especially "Garden benches in pine". We should be ____________if you
__________send us your wholesale price list by email. Please advise of per unit cost for 10 items.
Is a discount offered for frequent orders? Do you ship abroad? If so, please advise of the shipping
cost to Valencia, Spain.
_________________________
Teacher gives the correct answers and the students check their answers and all doubts
are clarify by the teacher.
Steps Phrases
Look
English andAcademy
State read the following example
140G.C.
| 8.1,8.2 & 8.3
Page
79 Horwood Hall
Keele University
Keele
Newcastle
Staffordshire
ST5 5BJ
11/11/2010
Mrs. Jane Job
Recruitment Officer
Jobs For Us
Newcastle
Staffordshire
ST5 8LB
Application for the post of Community Development Officer: Post No. 513/6
I am writing in response to your advertisement in The Sentinel Newspaper last week, and I am
enclosing my CV for your review.
As you will see, I have gained valuable experience in working with many different people in the
local community, and have a strong understanding of community development. I am self-
motivated, and can work as an efficient leader of a team.
I look forward to have the opportunity to discuss this further with you.
Yours sincerely,
Mr. Bob Seeker
Teacher gives the correct answers and the students check their answers and all doubts are
clarified by the teacher.
The start of any business letter Dear Sir or Madam: (use if you don't know who you are
begins by addressing the recipient writing to).
of the letter.
Dear Dr, Mr, Mrs, Miss or Ms Smith: (Use if you know who
you are writing to, and have a formal relationship with -
VERY IMPORTANT use Ms for women unless asked to use
Mrs. or Miss).
Note: If you are unsure how formal you should be, always
choose a more formal form. Writing to a specific person is
always preferred if at all possible.
Examples:
Enclosing Documents
I am enclosing
Please find enclosed
Enclosed you will find
Closing Remarks Thank you for your help Please contact us again if we can
help in any way.
there are any problems.
you have any questions.
The End Yours faithfully, (If you don't know the name of the person
you're writing to)
Best wishes,
Fred Flintstone
Sales Manager
Cheese Specialists Inc.
456 Rubble Road
Rockville, IL
With reference to our telephone conversation today, I am writing to confirm your order for: 120 x
Cheddar Deluxe Ref. No. 856
The order will be shipped within three days via UPS and should arrive at your store in about 10
days.
Yours sincerely,
Kenneth Beare
Director of Ken's Cheese House
Number from 1 to 8 to order these lines, then write the complete paragraph as it is.
G.C. 5.1
Teacher gives the correct answers and the students check their answers and all doubts
are clarified by the teacher.
Problem Cause:
Effect:
Fortune Goods
317 Orchard Road
Singapore
October 24, 2013
I am writing to inform you that the goods we ordered from your company have not been supplied
correctly.
On 17 October 2013 we placed an order with your firm for 12,000 ultra super long-life batteries.
The consignment arrived yesterday but contained only 1,200 batteries.
This error put our firm in a difficult position, as we had to make some emergency purchases to
fulfil our commitments to all our customers. This caused us considerable inconvenience.
I am writing to ask you to please make up the shortfall immediately and to ensure that such
errors do not happen again. Otherwise, we may have to look elsewhere for our supplies.
Yours sincerely
J. Wong
Purchasing Officer
By teams of four, write a complaint letter with the information given below
G.C. 8.1,8.2 & 8.3
May 30,
2014
The situation is completely
unacceptable. We demand
immediate delivery of the printer or a
complete refund.
(Signature)
Tom Harvey
Purchasing manager
Respectfull Aluminum Articles
y,
Self evaluation
G.C. 6.3
So congratulations!!!!!!!!!!!!!!!!!
Your final project is to design a job application by a web page in which you must
include 3 sections:
1. Personal information.
2. Knowledge about the company interested on and personal interests
about the job asked.(you have to choose a real company where you
would like to work)
3. Education, skills, abilities and experience.
After you finish your web page you must work with a partner doing the following:
A relation to CSS positioning: Absolute positioning is used for elements that would be out of place if
allowed to flow with the surrounding elements. e.g. The background on the CodeHelp site uses absolute
positioning to eliminate the border that would appear if the image was placed with relative positioning,
even as the first line of the body section. Use relative to provide access with Javascript without affecting
the position of the element relative to the rest of the page. (The default in HTML is static positioning and
Javascript requires the use of the relative position attribute to access the element.
Background: Formerly found in the <body> tag or in tables, the background attribute is deprecated and
must be replaced by CSS. The background attribute specifies the URL of an image to use behind the page
content. The image is tiled by default (repeated in each direction until the space is filled). To set the
background to a color use the CSS below instead of the deprecated bgcolor attribute.
Base tag: (Must be within the <head></head> section.) Common use is to specify the target for all links
in a frameset document. If the document is part of a frameset, you can specify an output frame by
name. To override the base target, specify a target as <a href="" target="differentframe">. HTML4
requires the tag to specify the base URL for all relative links in the document (which is otherwise
assumed to be the current directory).
Bgcolor attribute: Deprecated Sets the color background. Use either a color name or describe the exact
color using hexadecimal numbers to describe the settings for red, green and blue. Color names are
preferable.
Body tag: Every HTML document, except a frameset, needs a <body> </body> tag as the beginning and
end of the content area. Attributes specified in the body tag apply equally to all parts of the document.
CSS allows the usual body attributes to be specified as part of the style, including backgrounds,text
colors, and link colors. The body tag is also the home of the onLoad() Javascript function which is only
called once, after the document has finished loading - executing configuration code outside onLoad can
cause errors if certain parts of the document have not yet been downloaded over a slow connection.
Button: A real 3D button is only available within a form. You can make an image into a button (2D by
default) by putting the <img> tag within a <a></a> tag.
Class: Use the keyword class to assign the settings declared in the style sheet to the HTML tag: <p
class=indent> </p> Only <base> <basefont> <head> <html> <meta> <param> <script> <style> and <title>
cannot contain a class selector.
CSS: The Cascading Style Sheets Specification (CSS) is a computer language that is used to write
formatting instructions (rules). These rules tell a web browser how webpage content should look in
terms of:
CSS and Backgrounds: Style sheets can put a background behind individual elements, position the main
background away from the page edges, stop background images repeating in either or both directions
and dictate whether the image scrolls with the page or remains fixed.
Document Javascript: Document inherits properties and methods from HTMLElement. Netscape4 and
Internet Explorer add numerous incompatible methods and properties (see this site or DHTML in this
glossary and the Javascript Pocket Reference for details). The onLoad(); and onUnload(); are part of the
window object rather than document.
Extension or File extensin: In Windows, DOS and some other operating systems, one or several letters
at the end of a filename. Filename extensions usually follow a period (dot) and indicate the type of file.
For example, this.txt denotes a plain text file, that.htm or that.html denotes an HTML file, that.js an
JavaScript file. Some common image extensions are picture.jpg or picture.jpeg or picture.png or
picture.gif
External Stylesheets: Stylesheets are particularly suitable as external links. Using a single file for all
appropriate pages makes updating and amending the site simple. One change to the stylesheet file and
all pages on the site could reflect the amendments without you having to alter any HTML or upload any
of the HTML files themselves using FTP. The syntax is <link rel="stylesheet" href="URL"
type="text/css"> The stylesheet file itself should be a plain text file with a .css extension contain only the
text you would otherwise enter between the <style></style> tags. Only one stylesheet can be linked to
any one HTML page.
External Javascript: If more than one page uses the same functions (such as the one that loads some
pages in new browser windows) the javascript code can be imported from an external text file - with the
.js externsion - using the following syntax in the HTML document: <script language="Javascript"
type="text/javascript" src="URL"></script>
Font property (CSS): If you want to specify more than one font control in a single class or rule, use the
shorthand font property and separate each value with a space. Weight values
precede style, variant, size line height and font names in that order.
Height property (CSS): Stylesheets can use the height property for text elements as easily as images and
objects. The property can use absolute measurements in pixels or percentages of the available area.
HTMLElement Javascript: Browser dependent properties and methods are not covered here. See
the Javascript Pocket Reference for details. Only the event handlers within the HTMLElement object are
browser-independent, and only inJavascript1.2.
In relation to CSS positioning: Relative positioning provides an offset from the current flow of the page
and allows elements to be accessed by a Javascript function. A relative position of top:0 left:0 is no
different to the default static position.
Margin property: See also padding. The margin is a calculated space around any element - a transparent
space around any border drawn. Use margin in your stylesheet to remove the need for the deprecated
hspace and vspace attributes and to precisely control the relative positioning of page elements. Use
margin-top margin-right margin-bottom and margin-left if you want to position the element off center
compared to adjacent elements.
Padding: See also the more commonly required margin. Padding space is only within the border of an
element (whether the border is drawn or not) so does not affect other objects on the page. Padding, by
default is even on all sides. Use padding-top, padding-right, padding-bottom and padding-left to position
an element off center inside the invisible box that contains each individual element on the page.
Paragraphs: Publishing any kind of written work requires the use of a paragraph. The paragraph tag is
very basic and a great introductory tag for beginner's because of its simplicity.
Script: A script is a type of programming language that can be used to fetch and display Web pages.
There are many kinds and uses of scripts on the Web. They can be used to create all or part of a page,
and communicate with searchable databases. Forms (boxes) and many interactive links, which respond
differently depending on what you enter, all require some kind of script language. When you find a
Script tag: If your code defines new Javascript functions, put the <script> tag in the <head> section of
your HTML document to make sure the functions are available to all parts of the document. If you want
your Javascript to execute inline, for example, to print a customised part of the page, the code may not
need a function declaration and the tag should be in the <body> at the point where the output is
required.
Stylesheets: Cascading style sheets: Users of some browsers can set up their own stylesheets that will
be applied to all sites the user visits. Eventually, one of these settings will conflict with another setting
on the web site. The style sheets are applied in a cascade to avoid this problem. The site style sheet will
overrule the visitors style sheet. Also, if two site rules conflict, the more specific rule will be applied, ID
being more specific than class and class being more specific than HTML tag alterations.
Validation: For solutions to problems validating forms which use Javascript, see the CodeHelp site.
To validate your own HTML (after uploading it to suitable webspace) go to the W3C Validator.
Validation at least ensures that you should not get nasty suprises from visitors viewing your HTML in
other browsers.
Var tag: Similar to <code> - use to display a program argument or variable. Usually renders in italic.
Visibility: Set the initial visibility state of any CSS element in the stylesheet: visibility:visible or hidden.
When hidden, the element takes up the same amount of space on the page as when it is visible.
Compare with display. Visibility can be changed dynamically using Javascript but remember that IE and
Netscape have differing ways ofaccessing CSS elements through Javascript. The following code shows
how to manipulate the visibility of an element with the id active in IE which was previously declared as
hidden.
I. Watch the following video and take notes from it, the notes will help you to learn about the
program Packet Tracer.
G.C.4.3
II.- Exercise.
Using the notes you took during the video answer the following question. G.C. 5.7
III.- Compare your answer with a partner and try to get a single answer between your
definitions.
G.C. 5.2
Teacher gives the correct answer and the students check their answer and all doubts are
clarified by the teacher.
Look at the picture and label the parts of it. G.C. 8.2
Teacher gives the correct answer and the students check their answer and all doubts are
clarified by the teacher.
Cisco IOS
Access Levels
Cisco IOS permits to configure multiple privilege access levels for different accounts.
This is very useful when many people work on the same router or switch, but with
different access levels and there is no time to implement an authentication server.
Cisco IOS supports 16 different privilege levels from 0 through 15. Level 0 is user mode.
Level 15 is the privileged mode. Level 1 through 14 is available for customization and
use. By default, any user who can furnish the user-level password or user
name/password combination can gain User exec mode access to the device, which is
privilege level 1. From there, if the user knows the enable secret password, they can
access the Privilege exec mode, or privilege level 15. The three predefined privilege
levels on Cisco devices include the following:
Level 1 is User exec mode only (prompt is router>), the default level for login
Level 15 is Privileged exec mode (prompt is router#), the Enable mode
Level 0 Seldom used, but includes five commands: disable, enable, exit, help,
and logout and these commands can be executed at any level.
Command Hierarchy
After an EXEC session is established, commands within Cisco IOS Software are
hierarchically structured. Understanding this hierarchy is important for successfully
configuring a router. The following figure illustrates a simple high-level schematic
diagram of some Cisco IOS commands.
To assist you in navigation through the Cisco IOS CLI, the command prompt changes to
reflect your position within the command hierarchy. This setup allows you to easily
identify where within the command structure you are at any given moment. The
following table is a summary of command prompts and the corresponding location
within the command structure.
VI.- Exercise.
Using the information about the reading answer the following questions. G.C.4.3
Teacher gives the correct answers and the students check their answer and all doubts
are clarified by the teacher.
VIII. - Exercise. Match the columns by writing the letter in the parentheses according
to the information in the text.
G.C. 5.1
Teacher gives the correct answers and the students check their answer and all
doubts are clarify by the teacher.
VLAN
A VLAN is a group of end stations in a switched network that is logically segmented by
function, project team, or application, without regard to the physical locations of the
users. VLANs have the same attributes as physical LANs, but you can group end
stations even if they are not physically located on the same LAN segment.
Any port can belong to a VLAN, and unicast, broadcast, and multicast packets are
forwarded and flooded only to end stations in that VLAN. Each VLAN is considered a
logical network. Packets destined for stations that do not belong to the VLAN must be
forwarded through a router.
VLANs are usually associated with IP subnetworks. For example, all the end stations in
a particular IP subnet belong to the same VLAN. To communicate between VLANs, you
must route the traffic.
By default, a newly created VLAN is operational; that is, the VLAN is in the no
shutdown condition. Additionally, you can configure VLANs to be in the active state,
which is passing traffic, or the suspended state, in which the VLANs are not passing
packets. By default, the VLANs are in the active state and pass traffic.
VLAN Advantages.
XI. - Decide whether each sentence is True or False and write the corresponding letter
in the parentheses.
G.C. 6.2
Teacher gives the correct answers and the students check their answer and all doubts
English State Academy
are clarified by the teacher. 168 |
Page
XII. - Read the following information and use it to answer the exercise below.
Types of VLANs
Several types of VLAN are defined, depending on switching criteria and the level at
which the VLAN is conducted:
A level 1 VLAN (also called a Port Based VLAN) defines a virtual network
according to the connection ports on the switch;
A level 2 VLAN (also called a MAC Address-Based VLAN) comprises of defining a
virtual network according to the MAC addresses of the stations; This type of
VLAN is much more flexible than the port based VLAN because the network is
independent from the location of the station;
A level 3 VLAN: there are several types of level 3 VLANs:
The Network Address Based VLAN links subnets according to the source
IP address of the datagrams. This type of solution provides great
flexibility in so far as the configuration of the switches changes
automatically when a station is moved. On the other hand there may be
slight degradation in performance since the information contained in
the packets must be analyzed more closely.
The Protocol Based VLAN makes it possible to create a virtual network
by protocol type (for example TCP/IP, IPX, AppleTalk, etc.), therefore
grouping together all the machines using the same protocol on the
same network.
G.C. 6.2
Teacher gives the correct answers and the students check their answer and all doubts
are clarified by the teacher.
In teams of four members study and discuss the following information and then
answer the examples below.
G.C. 8.1,8.2 & 8.3
Explanation: This sentence has a reversed structure where the object (who
receives the action) becomes the subject, and you add the correct form of
auxiliary BE( is / are / am / isnt / arent / am not ), and change action verb to
past participle form.
I. - Grammar exercise.
Put in the SIMPLE PRESENT passive form tense the verbs in brackets. G.C. 5.1
3. Books ___________ (borrow) from the library on Friday and then they
___________ (return) on Tuesday.
Teacher gives the correct answers and the students check their answers and all
doubts are clarified by the teacher.
Read next passage and underline the sentences with simple present passive G.C. 5.1
voice.
Teacher gives the correct answers and the students check their answers and all doubts
are clarify by the teacher.
Self evaluation
G.C. 6.3
In teams of four members study and discuss the following information and then
answer the examples below.
G.C. 8.1,8.2 & 8.3
NOTE: Remember to keep the same rules only use WAS / WERE to signal the past.
Look at the following examples.
I. - Grammar exercise.
Put in the Simple Past Passive form tense the verbs in brackets. G.C. 5.1
Teacher gives the correct answers and the students check their answers and all doubts
are clarified by the teacher.
Write the Simple Past Passive form of the sentences. G.C. 5.1
Teacher gives the correct answers and the students check their answers and all doubts
are clarified by the teacher.
10. - Three boys __________________ (inform) about test results last lesson.
Teacher gives the correct answers and the students check their answers and all doubts
are clarified by the teacher.
Self evaluation
English State Academy 177 |
Page G.C. 6.3
Goal Yes No Ways to
improve
FINAL PROJECT
G.C. 4.5,8.1 and 8.3. D.C. 4.12
So congratulations!!!!!!!!!!!!!!!!!
1. Using the theory about wireless nets and VLANs, elaborate the design and
configuration of a VLAN for an organization.
2. Write the dialogue.
3. Deliver a report about the development of the project using passive voice.
4. Save the video in AVI format.
5. Burn it on a CD.
GLOSSARY
IP address: An IP address is a binary number that uniquely identifies computers and other devices on a
TCP/IP network.
Packet: A term first coined by Donald Davies in 1965, a packet is a segment of data sent from one
computer or network device to another computer or network device over a network. A packet contains
the source, destination, size, type, data, and other useful information that helps packet get to its
destination and then read. Below is a breakdown of a TCP packet.
Protocol: Sometimes referred to as an access method, a protocol is a standard used to define a method
of exchanging data over a computer network such as local area network, Internet, Intranet, etc. Each
protocol has its own method of how data is formatted when sent and what to do with it once received,
how that data is compressed or how to check for errors in data.
Router: Routers are small physical devices that join multiple networks together. Technically, a router is a
Layer 3 gateway device, meaning that it connects two or more networks and that the router operates at
the network layer of the OSI model.
Subnet: Subnet is a method of dividing a network of IP addresses into groups. Subnetting allows each
computer or networking device in its own subnet to communicate with each other and still allow
communication between subnets by routing the traffic through the network router
TCP/IP: Short for Transmission Control Protocol/Internet Protocol, TCP/IP also commonly abbreviated as
TCP was developed in 1978 and driven by Bob Kahn and Vint Cerf. Today, TCP/IP is a language governing
communications among all computers on the Internet.
VLAN: Short for Virtual Local Area Network, VLAN is a virtual LAN that allows a network administrator to
setup separate networks by configuring a network device, such as a router, and not through cabling.
This allows for a network to be divided, setup and changed, allowing for a network administrator to
organize and filter data accordingly in a corporate network.
INDICADORES % CRITERIOS
Excelente Suficiente Insuficiente
Elabora guin de conversacin Elabora guin de conversacin con Utiliza un tema distinto al
con base en el diseo de la base en el diseo de la Pgina establecido.
Pgina Web del compaero en el Web del compaero en el cual Omite uno o varios de los
cual incluye: incluye: siguientes aspectos al elaborar
Planteamiento de opinin Planteamiento de opinin guin:
personal sobre el diseo en personal sobre el diseo en Planteamiento de opinin
general y especfico de algunas general y especfico de algunas personal sobre el diseo en
secciones de la Pgina Web. secciones de la Pgina Web. general y especfico de algunas
Planteamiento de ideas Planteamiento de ideas secciones de la Pgina Web.
personales. personales. Planteamiento de ideas
Desacuerdos y acuerdos respecto Desacuerdos y acuerdos respecto personales.
al diseo. al diseo. Desacuerdos y acuerdos respecto
Elementos Opciones de mejora al diseo Opciones diferentes a las al diseo.
discursivos del texto 20 desde su punto de vista a las planteadas. Opciones diferentes a las
oral planteadas. Propuestas de ideas distintas a las planteadas.
Propuestas de ideas distintas a planteadas. Propuestas de ideas distintas a
las planteadas. Defensa de punto de vista las planteadas.
Defensa de punto de vista basada basada en argumentos. Defensa de punto de vista
en argumentos. Complementa frases utilizadas con basada en argumentos.
Complementa frases utilizadas lxico y estructura Complementa frases utilizadas
con lxico y estructura correspondiente. con lxico y estructura
correspondiente. Cumple con todos los puntos de correspondiente.
Cumple con todos los puntos de una manera muy superficial y
una manera muy especfica y escueta y con dificultades para Emite frases utilizadas con lxico
profunda donde se refleja el darse a entender y estructura que no
anlisis en todos los contenidos corresponde impidiendo la
del diseo de la pgina web y comprensin.
mostrando gran dominio del
idioma.
INDICADORES % CRITERIOS
Excelente Suficiente Insuficiente
Redacta lineamientos para Redacta lineamientos para Redacta los lineamientos sin
configurar redes inalmbricas configurar redes inalmbricas considerar la cantidad
utilizando vocabulario utilizando vocabulario establecida.
referente a derechos y referente a derechos y Omite uno o varios de los
obligaciones siguientes: obligaciones siguientes: componentes de WLAN.
Componentes de WLAN. Nombra algunos componentes No presenta propuestas de
Adicionalmente, realiza de WLAN. Seguridad inalmbrica.
procedimientos o presenta Presenta propuestas para la Derechos del empleado.
Elementos propuestas que mejoren la seguridad inalmbrica. Actividades prohibidas dentro
discursivos del texto 30 seguridad de la red La redaccin de los del espacio laboral.
inalmbrica. lineamientos se desarrolla con La redaccin de los
10 actividades prohibidas el formato de folleto lineamientos omite uno o
dentro del espacio laboral. informativo. varios aspectos para
La redaccin de los La redaccin de los desarrollarse bajo el formato
lineamientos se desarrolla con lineamientos se desarrolla bajo de folleto informativo.
el formato de folleto la estructura de introduccin, La redaccin de los
informativo. lineamientos e informacin de lineamientos no se desarrolla
La redaccin de los la empresa. bajo la estructura de
lineamientos se desarrolla introduccin, lineamientos e
bajo la estructura de informacin de la empresa.
introduccin, lineamientos e
informacin de la empresa.
Entrega el trabajo cuidando Entrega el trabajo cuidando Entrega el trabajo sin cuidar
aspectos de orden, limpieza y aspectos de orden y limpieza. aspectos de orden y limpieza.
diseo amigable. Muestra responsabilidad al Muestra falta de
Muestra organizacin y entregar en la fecha responsabilidad al entregar en
responsabilidad al entregar en establecida por el docente. fecha posterior a la
Actitudes 20 fecha previa establecida por el Muestra perseverancia al establecida por el docente, u
docente. aprovechar los errores omite la entrega del trabajo.
Muestra perseverancia al marcados en actividades Muestra inconstancia al no
aprovechar los errores previas para mejorar su corregir errores marcados en
marcados en actividades trabajo. actividades previas.
previas para mejorar su
trabajo.
100
INDICADORES % CRITERIOS
Excelente Suficiente Insuficiente
Escribe discurso con el formato Escribe discurso con el formato de Omite realizar el discurso con el
de carta con base en el diseo de carta con base en el diseo de formato de carta con base en el
Pgina Web acorde con el Pgina Web acorde con el diseo de Pgina Web.
siguiente orden de ideas: siguiente orden de ideas: Omite uno o varios de los
Referencia de anuncio de puesto Referencia de anuncio de puesto siguientes aspectos de orden de
ofertado. ofertado. ideas:
Expresin de inters en el puesto Expresin de inters en el puesto Referencia de anuncio de puesto
ofertado. ofertado. ofertado.
Motivos de inters personal del Motivos de inters personal del Expresin de inters en el puesto
puesto ofertado. puesto ofertado. ofertado.
Habilidades personales acorde Habilidades personales acorde con Motivos de inters personal del
con el puesto ofertado. el puesto ofertado. puesto ofertado.
Experiencia y/o elementos que se Planteamiento de opinin Habilidades personales acorde
pueden ofrecer a la empresa. personal sobre la carta de trabajo con el puesto ofertado.
Planteamiento de opinin en base al diseo de la Pgina Planteamiento de opinin
personal sobre la carta de trabajo Web. personal sobre la carta de trabajo
Elementos
en base al diseo de la Pgina Redacta carta bajo la siguiente en base al diseo de la Pgina
discursivos del texto 30 Web. estructura: Web.
oral Redacta carta bajo la siguiente Nombre del solicitante. Redacta la carta sin emplear uno
estructura: Datos personales de localizacin o varios de los siguientes
Nombre del solicitante. del solicitante. aspectos de estructura:
Datos personales de localizacin Fecha. Nombre del solicitante.
del solicitante. Tipo de carta. Datos personales de localizacin
Fecha. Dirigida a quien se considere. del solicitante.
Tipo de carta. Frase de encabezado. Fecha.
Dirigida a quien se considere. Introduccin e inters en el Tipo de carta.
Frase de encabezado. empleo. Dirigida a quien se considere.
Introduccin e inters en el Argumentos a favor del solicitante Frase de encabezado.
empleo. para obtener el empleo. Introduccin e inters en el
Argumentos a favor del Resumen de educacin y empleo.
Emplea formato de carta de Emplea formato de carta de Redacta la carta sin utilizar
solicitud de empleo con base en solicitud de empleo con base en el formato de carta de solicitud de
el diseo de la Pgina web. diseo de la Pgina Web. empleo con base en el diseo de
Elabora documento con una Elabora documento con una la Pgina Web.
extensin mnima de 1 cuartilla y extensin mnima de 1 cuartilla. Omite cubrir uno o varios de los
media y mxima de 2 cuartillas. Evita faltas de ortografa. siguientes aspectos:
Evita faltas de ortografa. Reduce errores gramaticales o de Extensin mnima de 1 cuartilla.
Reduce errores gramaticales o de estructura. Oraciones completas.
Presentacin escrita
estructura. Presenta oraciones completas. Uso de puntos, comas y
del documento 20 Presenta oraciones completas. Emplea puntos, comas y maysculas.
Emplea puntos, comas y maysculas. Comete faltas de ortografa que
maysculas. impiden la comprensin.
Comete errores gramaticales o de
estructura que impiden la
comprensin.
Emplea frase hecha para Emplea frase hecha para Utiliza errneamente o no
encabezados y desarrollo de encabezados y desarrollo de carta emplea uno o varios de los
carta laboral en base al diseo de laboral en base al diseo de siguientes aspectos de desarrollo
pgina Web. pgina Web. de carta de solicitud de empleo
Emplea frase hecha de Emplea frase hecha de en base al diseo de pgina Web:
introduccin para carta de introduccin para carta de Frase hecha para encabezado y
solicitud de empleo en base al solicitud de empleo en base al desarrollo.
diseo de pgina Web. diseo de pgina Web. Frase hecha de introduccin.
Gramtica 30 Emplea dos frases hechas de Emplea dos frases hechas de Frase hecha de argumentos.
argumentos para cartas de argumentos para cartas de
solicitud de empleo en base al solicitud de empleo en base al
100
INDICADORES % CRITERIOS
Excelente Suficiente Insuficiente
Utiliza la estructura de dilogo de Utiliza la estructura de dilogo de Emplea errneamente o no
prestador de servicios-cliente con prestador de servicios-cliente con emplea la estructura de dilogo
cambio de toma de palabra. cambio de toma de palabra. de prestador de servicios-cliente
Elabora guin de conversacin Elabora guin de conversacin con con cambio de toma de palabra.
con base en la oferta de servicio base en la oferta de servicio Utiliza un tema distinto al
especfico que incluya lo especfico que incluya lo siguiente: establecido.
siguiente: Servicio que solicitara o prestara Omite uno o varios de los
Servicio que solicitara o prestara en su rea de especialidad. siguientes aspectos al elaborar
en su rea de especialidad. Lxico relacionado con guin:
Elementos Lxico relacionado con advertencia, peligro o riesgo. Servicio que solicitara o prestara
discursivos del texto 30 advertencia, peligro o riesgo. Fases de atencin al usuario en su rea de especialidad.
oral Lxico relacionado con conductas Complementa frases utilizadas con Lxico relacionado con
y procedimientos. lxico y estructura advertencia, peligro o riesgo.
Frases de atencin al usuario. correspondiente. Fases de atencin al usuario.
Complementa frases utilizadas Emite frases utilizadas con
con lxico y estructura lxico y estructura que no
correspondiente. corresponde impidiendo la
comprensin.
Pronuncia oraciones y frases Pronuncia oraciones y frases Pronuncia oraciones y frases
completas. completas. incompletas.
Presenta las acciones con una Presenta las acciones con una Presentas las acciones sin
secuencia lgica. secuencia lgica. secuencia lgica.
Existe cohesin y coherencia en Existe cohesin y coherencia en su Presenta un discurso sin cohesin
su discurso. discurso. ni coherencia.
Exposicin oral 30
Corrige lapsus de confusin o Corrige lapsus de confusin o Omite corregir lapsus de
error. error. confusin o error.