Class VII Computer Education Syllabus PDF
Document Details
Kendriya Vidyalaya Sangathan
KVS
KVS REGIONAL OFFICE GUWAHATI
Tags
Summary
This is a syllabus for Computer Science class 7, strictly following KVS syllabus. It covers topics such as Computer Security, HTML, and Photoshop. It's developed by KVS Regional Office Guwahati.
Full Transcript
Patron Shri C. Neelap Deputy Commissioner, KVS RO Guwahati Regional Co-ordination & Compilation Shri D. Patle Asstt. Commissioner, KVS RO Guwahati School Co-ordination Shri. K. Alung...
Patron Shri C. Neelap Deputy Commissioner, KVS RO Guwahati Regional Co-ordination & Compilation Shri D. Patle Asstt. Commissioner, KVS RO Guwahati School Co-ordination Shri. K. Alung Khumba Principal, KV NFR, Maligaon, Guwahati Subject Expert Dr. K. K. Motla, PGT(CS), KV NFR, Maligaon, Guwahati Sh. Rajendra Gavahle, PGT(CS), KV NFR, Maligaon, Guwahati Syllabus Content VII Quarter – April to June Sl. Units Contents No. of Periods No. 1 1. Computer 1.1 Threats to computer QUR 2. Security 1.2 Virus and its types 1.3 Anti Virus software and examples 1.4 Firewall and its use 1.5 Cyber Crime and Computer Ethics 1.6 Hackers and crackers 1.7 Cyber law and importance 1.8 Backup and Restore 2 3. HTML 2.1 Heading (H1 to H6) 9 2.2 , , 2.3 Background Color ,font tag(size, face, color) 2.4 Text alignment (center, left , right) Minimum level of learning Child should be able to secure his/her computer from various threats Can tell what is cyber crime and understand the importance of cyber law Formative Assessment – 1 Quarter – July to September 3 4. HTML 3.1 Paragraph formatting Tags 10 3.2 List Tags 3.3 Order (start and type attribute) and Un order List 3.4 Background Image and other Image Insertion in Web Page with alignment 3.5 Creation of table 3.6 Anchor Tag 3.7 Hyper Link 5. Photoshop 4.1 DTP and its softwares 12 4 Introduction 4.2 Starting Photoshop 4.3 Tool Palette 4.4 How to create a new file 4.5 How to save a file 4.6 How to open an Existing file Using Layers 4.7 How to use Photoshop tools 4.8 Using Layers 4.7.1 Learning Layer Basics 4.7.2 Using Layers palette 4.7.3 Rearranging Layers 4.7.4 Applying a Layer Style 4.7.5 Flattening and saving files Minimum level of learning Child should be create a web page using tags taught in the class Formative Assessment – 2 Summative Assessment – 1 Quarter – October to December 5 Photoshop 20 (continued) 5.1 Rectangular Rectangular Marquee Marquee 5.1.1. Elliptical Marquee 5.2.1. Single column Marquee 5.3.1. Single Row Marquee 5.2 Lasso Lasso 5.1.2. Polygonal Lasso 5.2.2. Magnetic Lasso 5.3.2. Quick Selection 5.4.2. Magic Wand 5.3 Crop and Slice Crop and Slice tools tools 5.3.1 Crop 5.3.2 slice 5.3.3 Slice Select 5.4 Measuring Measuring tools tools 5.4.1 Eyedropper 5.4.2 color Sampler 5.4.3 Ruler 5.4.4 Note 5.4.5 Count 5.5 Retouching Retouching tools tools 5.5.1 Spot Healing Brush 5.5.2 Healing Brush 5.5.3 Patch 5.5.4 Red Eye 5.5.5 Magic Eraser 5.5.6 Blur 5.5.7 Sharpen 5.5.8 Smudge 5.5.9 Dodge 5.5.10 Burn 5.5.11 Sponge Minimum level of learning Introduction of tool with its use to be demonstrated to students Practical exercise to be given to students so that they can learn the specified tool Child should be able to understand the use of Photoshop Should be able to identify various tools and where to use the tool Should be able to make changes in the picture using tools taught in the class Formative Assessment – 3 Quarter – January to March 6 Painting Tools in 6.1 Brush 12 Photoshop 6.2 Pencil 6.3 Color Replacement 6.4 Mixer Brush 6.5 History Brush 6.6 Art History Brush 6.7 Gradient 6.8 Paint Bucket Minimum level of learning Should be able to identify various tools and where to use the tool Should be able to make changes in the picture using tools taught in the class Introduction of tool with its use to be demonstrated to students Practical exercise to be given to students so that they can learn the specified tool Formative Assessment – 4 Summative Assessment – 2 Projects to be completed in the session :- Work Experience :- 1. Chicken Coop Design Art Education:- 1. Composition, Animal Poster 2. Shapes, Small Park Design Contents Computer Security 1 Photoshop 40 Threats to computer Rectangular Marquee Virus and its types Elliptical Marquee Anti-Virus software and examples Single column Marquee Firewall and its use Single Row Marquee Cyber Crime and Computer Ethics Hackers and crackers Lasso Cyber law and importance Polygonal Lasso Magnetic Lasso Html 12 Quick Selection Magic Wand Heading (H1 to H6) Crop and Slice tools , , Crop Background Color ,font tag(size, face, color) slice Text alignment (center, left , right) Slice Select Html 21 Measuring tools Eyedropper color Sampler Paragraph formatting Tags Ruler List Tags Note Order (start and type attribute) and Un order List Count Background Image and other Image Insertion in Web Page with alignment Retouching tools Creation of table Spot Healing Brush Anchor Tag Healing Brush Hyper Link Patch Red Eye Photoshop Introduction 31 Magic Eraser Blur Sharpen DTP and its softwares Smudge Starting Photoshop Dodge Tool Palette Burn How to create a new file Sponge How to save a file Brush How to open an Existing file How to use Photoshop tools Painting Tools in Photoshop 53 Using Layers Learning Layer Basics Pencil Using Layers palette Color Replacement Rearranging Layers Mixer Brush Applying a Layer Style History Brush Flattening and saving Brush Art History file Gradient Paint Bucket Lesson-1 Computer Security Threats to computer Security What do they mean by a threat? A threat, in the context of computer security, You will learn refers to anything that has the potential to Threats to computer Virus and its types cause serious harm to a computer system. Anti Virus software A threat is something that may or may not and examples Firewall and its use happen, but has the potential to cause serious Cyber Crime and damage. Threats can lead to attacks on computer Computer Ethics Hackers and crackers systems, networks and more. A threat can be Cyber law and important either "intentional"(i.e., intelligent; e.g., an individual Backup and Restore cracker ora criminal organization) or "accidental" (e.g., the possibility of a computer malfunctioning, or the possibility of a natural disaster such as an earthquake, a fire, or a tornado) or otherwise a circumstance, capability, action, or event. Virus Computer Virus are nothing but computer program that do unwanted things with your computer resources e.g. you are working on PC and you are repeatedly receiving annoying message Viruses: A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc. E-mail viruses: An e-mail virus travels as an attachment to e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book. Some e- mail viruses don't even require a double-click -- they launch when you view the infected message in the preview pane of your e-mail software. Page |1 Trojan horses: A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically. Worms: A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. Virus Origins (http://computer.howstuffworks.com/virus1.htm) Why they are called Virus? Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person. Similar to the way a biological virus must hitch a ride on a cell, a computer virus must piggyback on top of some other program or document in order to launch. Once a computer virus is running, it can infect other programs or documents. What /who make virus? who: People write computer viruses. A person has to write the code, test it to make sure it spreads properly and then release it. A person also designs the virus's attack phase, whether it's a silly message or the destruction of a hard disk. Why: 1. The first is the same psychology that drives vandals and arsonists. For some people, that seems to be a thrill. If that sort of person knows computer programming, then he or she may funnel energy into the creation of destructive viruses. 2. The second reason has to do with the thrill of watching things blow up. Some people have a fascination with things like explosions and car wrecks. Creating a virus is a little like that -- it creates a virtual bomb inside a computer, and the more computers that get infected, the more "fun" the explosion. 3. The third reason involves bragging rights. Sort of like Mount Everest -- the mountain is there, so someone is compelled to climb it. If you are a certain type of programmer who sees a security hole that could be exploited, you might simply be compelled to exploit the hole yourself before someone else beats you to it. Page |2 4. And then there's cold, hard cash. Viruses can trick you into buying fake software, steal your personal information and use it to get to your money, or be sold on the digital equivalent of the black market. Powerful viruses are valuable -- and potentially lucrative -- tools. Virus History Traditional computer viruses were first widely seen in the late 1980s, Some Virus the Melissa virus in March 1999 was spectacular in its attack. Melissa spread in Microsoft Word documents sent via e-mail. The ILOVEYOU virus, which appeared on May 4, 2000, was even simpler. It contained a piece of code as an attachment. People who double-clicked on the attachment launched the code. It then sent copies of itself to everyone in the victim's address book and started corrupting files on the victim's machine. Worms: A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. Worms use up computer processing time and network bandwidth when they replicate, and often carry payloads that do considerable damage. Some example of worms: A worm called Code Red made huge headlines in 2001. The Slammer worm (which caused mayhem in January 2003) exploited a hole in Microsoft's SQL server. A worm called Storm, which showed up in 2007, immediately started making a name for itself. Storm used social engineering techniques to trick users into loading the worm on their computers. Trojan Horse: A Trojan Horse is full of as much trickery as the mythological Trojan Horse it was named after. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer. Some Trojan are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create Page |3 a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. How to protect your system Keep The Operating System Updated Use a Firewall Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You cannot get a virus by simply being online or by reading e-mail. Anti-Virus Software: vast, Avira, McAfee, Nortan and many more Firewall A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. Hardware and Software Firewalls: Firewalls can be either hardware or software but the ideal firewall configuration will consist of both. Hardware firewalls can be purchased as a stand-alone product but are also typically found in broadband routers, and should be considered an important part of your system and network set-up. Most hardware firewalls will have a minimum of four network ports to connect other computers, but for larger networks, business networking firewall solutions are available. Page |4 Common Firewall Techniques: There are several types of firewall techniques that will prevent potentially harmful information from getting through: 1. Packet Filter Looks at each packet entering or leaving the network and accepts or rejects it based on user-defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to configure. In addition, it is susceptible to IP spoofing. 2. Application Gateway Applies security mechanisms to specific applications, such as FTP and Telnet servers. This is very effective, but can impose a performance degradation. 3. Circuit-level Gateway Applies security mechanisms when a TCP or UDP connection is established. Once the connection has been made, packets can flow between the hosts without further checking. 4. Proxy Server Intercepts all messages entering and leaving the network. The server effectively hides the true network addresses. In practice, many firewalls use two or more of these techniques in concert. A firewall is considered a first line of defense in protecting private information. Cyber Crime Cybercrime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cybercrime also includes traditional crimes conducted through the Internet. For example; hate crimes, telemarketing and Internet fraud, identity theft, and credit card account thefts are considered to be cybercrimes when the illegal activities are committed through the use of a computer and the Internet. Page |5 Computer as a target These crimes are committed by a selected group of criminals. Unlike crimes using the computer as a tool, these crimes require the technical knowledge of the perpetrators. There are numerous crimes of this nature committed daily on the internet: Crimes that primarily target computer networks or devices include: Computer viruses Denial-of-service attacks Malware (malicious code) Computer Ethics Computer Ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights (such as copyrighted electronic content), privacy concerns, and how computers affect society. 1. You shall not use a computer to harm other people. 2. You shall not interfere with other people's computer work. 3. You shall not snoop around in other people's computer files. 4. You shall not use a computer to steal. 5. You shall not use a computer to bear false witness 6. You shall not copy or use proprietary software for which you have not paid. 7. You shall not use other people's computer resources without authorization or proper compensation. 8. You shall not appropriate other people's intellectual output. 9. You shall think about the social consequences of the program you are writing or the system you are designing. 10. You shall always use a computer in ways that ensure consideration and respect for your fellow humans. Page |6 Hackers and Crackers A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. As such, hackers obtain advanced knowledge of operating systems and programming languages. They might discover holes within systems and the reasons for such holes. Hackers constantly seek further knowledge, freely share what they have discovered, and never intentionally damage data. A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets. Crackers can easily be identified because their actions are malicious. 1. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system 2. A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" 3. A grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf the Internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, 4. A social status among hackers, elite is used to describe the most skilled. 5. A blue hat hacker is someone outside computer security consulting firms who is used to bug- test a system prior to its launch, looking for exploits so they can be closed CyberLaw Cyber means the use of Internet technologies and computers it includes computers, networks, software, data storage devices, Internet, websites, emails, ATM machines etc. To protect the cybercrime over Internet, this law is Passed to protect the Internet cybercrime. This law is approved by the government. Page |7 Cyber law Includes: 1. Cybercrimes 2. Electronic and Digital Signatures 3. Intellectual Property 4. Data protection and privacy Importance of Cyber Law: Companies now be able to carry out electronic commerce using the legal infrastructure provided by the Act allows Government to issue notification on the web thus heralding e-governance Protect Computer fraud and Unauthorized access. Consumers are now increasingly using credit cards for shopping. Most people are using email, cell phones and SMS messages for communication as well as Deal with Internet Banking Transactions. Backup and Restore Backup and Restore (formerly Windows Backup and Restore Center) is a component of Microsoft Windows introduced in Windows Vista and included in later versions that allows users to create backups and restore from backups. There are two different types of backup supported: File backup and system image. 1. File backups are saved to ZIP files. Two methods of file backup are supported: The first, normal backup, stores everything selected for backup. The second, incremental backup stores only files that are changed after a previous backup. 2. System image: The image-based full system backup option, called Complete PC Backup in Windows Vista or system image in Windows 7, allows for the imaging of the entire system including operating system and data volumes. The backed up image can later be restored through the Windows Recovery Environment either to the same computer or to a new computer of different brand and type. Page |8 To back up your files 1. Open Backup and Restore by clicking the Start button , clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore. 2. Do one of the following: If you've never used Windows Backup before, click Set up backup, and then follow the steps in the wizard. If you've created a backup before, you can wait for your regularly scheduled backup to occur, or you can manually create a new backup by clicking Back up now. Restore files from a backup 1. Open Backup and Restore by clicking the Start button , clicking Control Panel, clicking System and Maintenance, and then clicking Backup and Restore. 2. Do one of the following: To restore your files, click Restore my files. To restore the files of all users, click Restore all users' files. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. SUMMARY 1. A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. 2. Computer Virus are nothing but computer program that do unwanted things with your computer resources e.g. you are working on PC and you are repeatedly receiving annoying message. 3. Viruses are of many types like Email viruses, Trojan Horse, Worm, ILOVEYOU. 4. We can protect our system by Keeping The Operating System Updated, Use a Firewall, Anti-virus software is crucial to preventing virus attacks, but this strategy only works if users update their software. 5. A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. 6. Common Firewall techniques are Packet Filter, Application Gateway, Circuit-level Gateway, Circuit-level Gateway, and Proxy Server. Page |9 7. Any criminal act dealing with computers and networks (called hacking). Additionally, cybercrime also includes traditional crimes conducted through the Internet referred to as Cyber Crime. 8. Computer Ethics is set of moral principles that regulate the use of computers. 9. A hacker is a person intensely interested in the arcane and recondite workings of any computer operating system. Hackers are most often programmers. 10. A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. 11. Cyber means the use of Internet technologies and computers it includes computers, networks, software, data storage devices, Internet, websites, emails, ATM machines etc. 12. Backup and Restore (formerly Windows Backup and Restore Center) is a component of Microsoft Windows introduced in Windows Vista and included in later versions that allows users to create backups and restore from backups. 13. Two different types of backup supported: File backup and system image. EXERCISES A. Fill in the blanks: i. ____________ has the potential to cause serious harm to a computer system. ii. A threat can be ____________ and ___________. iii. ____________Uses computer networks and security holes to replicate itself. iv. ____________program can erase your hard disk. v. Computer viruses were first widely seen in the late___________. vi. Crime conducted with internet called ____________. vii. ____________ is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. viii. File backup and System image are two ___________________methods. P a g e | 10 B. Find true or false: i. Computer viruses are nothing but computer program that do unwanted things. ii. A hacker is hacking software which access in sensitive information from your computer. iii. Backup and Restore is a component of Microsoft Windows. iv. Cyber means the use of internet technologies and computers. v. We shall use a computer to harm other people is one of the ethics of computer. C. Short answer questions: i. What is threat in computer? ii. Give one difference between Trojan Horse and worms? iii. What is Firewall in windows? iv. List two ethics of computer? v. Give one difference between Hackers and Crackers? vi. Why we need Backup? vii. What are the types of Backup? Write name of each. viii. What do you mean by Restore? How it is helpful for you? P a g e | 11 Lesson-2 Hyper Text Markup Language (HTML) HTML: You will learn HTML is the building block for web pages. Prerequisites: You will need a text editor, such as Notepad and an Internet browser, Heading (H1 to H6) , such as Internet Explorer or Netscape. , Background Color ,font tag(size, face, What is an html File? color) i. HTML is a format that tells a computer Text alignment (center, left , right) how to display a web page. ii. An HTML file is a text file containing small markup tags iii. The markup tags tell the Web browser how to display the page iv. An HTML file must have an htm or html file extension What are HTML tags? i. HTML tags are used to mark-up HTML elements. ii. HTML tags are surrounded by the two characters < and >. iii. HTML tags normally come in pairs like and. iv. The first tag in a pair is the start tag, the second tag is the end tag. v. HTML tags are not case sensitive, means the same as. P a g e | 12 Tag Description This tag marks the start of an html document...This tag represents the document's header which can keep other HTML tags like , etc. The tag is used inside the tag to mention the document title. This tag represents the document's body which keeps all the contents of a web page- text, images, sound etc. This tag represents the heading tags of different sizes. Where n is the number start from 1…6 Like ,…….. This tag is used to write a line or text in center This tag represents a paragraph. This tag is used to write paragraph alignment in html. This tag is used to insert new line or insert enter in html Bold, Italics, Underline : tag is used to make a text bold in html. tag is used to make a text italics in html. tag is used to make a text underlined in html. P a g e | 13 Background color and text color: tag is used to change the background color of an html page and changes text color. How to create webpages? 1.click Start-> All Programs->Accessories. Open notepad and type the code given below My First Webpage Webpage This is my first homepage. This text is bold This line is in italics text. This line is in underline text. This is the 1st line. This is the 2nd line. 2. Click File, Click Save as 3.Type a Name of your webpage dot html.e.g.: -mypage.html P a g e | 14 4. Open the Place where you saved your file. Double click on the file. Assignment Question Q. Write the code to create the following Webpage with background color ‘green’ and text color ‘red’ My School Im a student of K.V,NFR Maligaon. I read in class 7. My Webpage My School Im a student of K.V,NFR Maligaon. I read in class 7. Q. Write an html code to show the working of various Paragraph alignment tags P a g e | 15 Paragraph in html This is an html document. This is a left paragraph in html This is a right paragraph in html This is a center paragraph in html Inserting Images in Webpage: We can insert images to our Html pages to make it look more beautiful. tag is used to insert images in webpage. There are two ways to insert images in a webpage: 1. Internal: Steps: 1. Open My Pictures or Sample Pictures or any folder containing pictures Copy the picture you want 2. Create a folder on the Desktop or in My Documents 3.Open the Folder, and paste the Picture. 4.Right click, and click new and click text document. P a g e | 16 5.Open the text document and type the code given below. Webpage with Pictures 4.Save the file giving a name with dot html(mypage.html). 5.Open the webpage using browser 2. External: Here we type the location or address of the picture where it is, instead of simply writing the name of the picture. Steps: 1.Open a text document and type the code given below. P a g e | 17 Webpage with Pictures 2.Save the file giving a name with dot html(mypage.html). 3.Open the webpage using browser To insert images with adjusted height and width: We can change the width and height of the inserted image in our webpage by simply writing the ‘width’ and ‘height’ options inside the tag SUMMARY 1. HTML is a format that tells a computer how to display a web page; it is the building block for web pages. 2. HTML tags normally come in pairs like and. 3. This tag marks the start of an html document 4....This tag represents the document's header which can keep other HTML tags like , etc. 5. The tag is used inside the tag to mention the document title. 6. This tag represents the document's body which keeps all the contents of a web page- text, images, sound etc. 7. ,,……This tag represents the heading tags of different sizes. P a g e | 18 8. This tag is used to write a line or text in center 9. This tag represents a paragraph. 10. tag is used to insert images in webpage EXERCISES A. Fill in the blanks i. _____________ is the building block of HTML ii. HTML document must have.html or ___________ extensions. iii. _____________tag is used to write line or text in center. iv. _____________tag is used to set paragraph. v. To insert image ___________tag is used. B. Find true or false i. HTML tags are case sensitive. ii. …….. tags represent heading tags of different size. iii. tag is used to insert new line or insert enter in HTML. iv. tag is used to insert images in webpage. v. tag is used to make text italics. C. Short answer question i. What is HTML? ii. Name any two attributes used with the BODY tag.? iii. Write the HTML code to set the background color to yellow.? iv. How would you insert image in an Html document? v. What does the ‘n’ in the tag indicate? P a g e | 19 In the lab 1. Ankita has made the HTML document shown below, which displays headings in different Sizes. Write the HTML code for creating a similar document. 2. Anita wants to create simple Web page on Input devices. Help her by listing the steps required for creating the web page. P a g e | 20 Lesson-3 You will learn HTML LISTS Lists in HTML Paragraph formatting Tags 1. Unordered Lists - An unordered list has no List Tags specific numbering or ordering. It starts with Order (start and type attribute) and Un order the tag. Each list item starts with the List tag.Example: Create the following List in HTML Background Image and other Image Insertion in Web Page with alignment Creation of table Anchor Tag Hyper Link Unordered list Unordered List with Bullets Unordered List with Bullets Coffee I like to drink the following: Tea Coffee Milk Tea Milk Unordered list styling- OR P a g e | 21 11. Ordered Lists - An ordered list can be numerical or alphabetical in a specific order. Example: Create the following List in HTML Ordered List with Numbers I like to drink the following: 1. Coffee Ordered list 2. Tea 3. Milk Ordered List with Numbers Coffee Tea Milk Ordered list styling- To change the starting number from default 1 to any number we use the ‘start’ option. To Change from numbers to alphabet or to roman numbers we use the ‘type’ option. Example: