Lab Report Ram Mijar Computer Fundimantal Lab Report
Lab Report Ram Mijar Computer Fundimantal Lab Report
Submitted by
Names and Roll of the Candidates
Month and Year
Tribhuvan University
Faculty of Humanities and Social Science
NIMS College
Supervisor’s Recommendation
I hereby recommend that this project prepared under my supervision by NAME OF THESTUDENT
entitled “TITLE OF THE PROJECT……………..” in partial fulfillment of therequirements for the degree of
Bachelor of Computer Application is recommended for the finalevaluation.
Tribhuvan University
Faculty of Humanities and Social Science
NIMS College
LETTER OF APPROVAL
This is to certify that this project prepared by NAME OF THE STUDENT entitled “TITLE OF
THE PROJECT……………..” in partial fulfillment of the requirements for the degree of
Bachelor in Computer Application has been evaluated. In our opinion it is satisfactory in the
scope and quality as a project for the required degree.
Internal Examiner
Abstract
It is our pleasure and work that we are presenting the report of computer fundamental and application. It is the
syllabus of Bachelor in Computer Application (BCA) first semester program affiliated by Tribhuvan University.
The main goal of this is to make students understandable about particular knowledge and concept of MS-DOS,
MS-word, MS Excel, MS-PowerPoint and Adobe Photoshop how to do works in lab or offices by using this
computer software's. The main point view of this report is to make understand students how to do
presentations, photo editing, keep record using software and save time it is the main view point of this practical
lab.
Acknowledgement
I would like to express my special thanks of gratitude to my teacher sir as well as college management who
gave me the golden opportunity to do this lab reports on Computer Fundamental and application, which help
me in doing a lot of research and I came to know about so many things I am really thankful to them.
Secondly, I would also like to thank to my parents and friends who helped me a lot in finalizing this lab report
within the limited time frame.
Table of Content
List of Figures
Acronyms/Abbreviations
Introduction
Task 1:
Tsk 2: Spreadsheets
(4 line explain what spreadsheet is and what task have you done)
Add image and explain it.
Task3:
Task 4:
Discussion
What you did, what was your learning and how it will help you in your career path.
Conclusion
How was it the entire practical.
Reference
IEEE referencing standard.
1|Page
1. Introduction to MS DOS
MS-DOS stands for Microsoft disk operating system. It is discontinued operating system
for personal computers mostly developed by Microsoft. It is simply a system for operating
the disks.
DOS Commands
In Ms-Dos there are two types of commands; internal and external. An internal command
is embedded into the command.com file. However and external command is not
embedded into the command.com file and therefore requires a separate file to be used
There are some commands which used in Ms-Dos:
CLS Command
CLS Command is used to clear the screen
MK Dir
CD command
Command Description
cls To clear the screen
mkdir To create folder/directory
cd To change the currently working directory
dir To display a list of files and folders contained inside the folder that you are
currently working in. The dir command also displays other important
information like the hard drive’s serial number, the total number of files
listed and many more.
exit It is used to end/close the command prompt that you are currently working
in.
2. Introduction to MS Word
Microsoft Word is a word processor developed by Microsoft. It allows us to create, edit, format,
save, print, delete, and view a multidirectional text document. It allows you to create and edit
personal and business documents, such as letters,reports, invoices, emails, and books. By default,
documents saved in Word 2010 are saved with the .docx extension.
Following is the basic window which you get when you start the Word application.
Navigation
Title Bar
It is the top most part of the window. It is the place where file information is located.
Menu Bar
The Menu bar is directly below the Title bar and it displays the menu.
Quick-Access Toolbar
The Quick Access Toolbar displays a small selection of the more commonly used commands in the
top left hand corner of the application window.
Ribbon
It lies below Menu bar. These tabs are divided into groups which we see below the tab and differ
according to tab. The groups in MS Word 2010 are the same as the toolbars in previous versions.
They are much more organized, making it easier for us to find what we need and complete the task.
Ruler
The ruler is generally found below the main toolbars. The ruler is used to change the format of your
document quickly.
Document Area
Just below the toolbar, there is a large area called document area. This is the place where we type
text.
Status Bar
The status bar is the area at the bottom of the Word window that indicates information about the
current document. It displays information about what page you are on, as well as your line number
on the page and character number on the line.
Features
i. Text Formatting
To format a text
Step 2 – Click the Bullet Button triangle icon to display a list of bullets you want to assign to
the list. You can select any of the bullet style available by simply clicking over it.
iv. Table
A table is a structure of vertical columns and horizontal rows with a cell at every
intersection. Each cell contain text or graphics, and you can format the table in any way you
want. Usually the top row in the table is kept as a table header and can be used to put some
informative instructions.
Creating a table
Step 1 – Click the Insert tab followed by the Table button. This will display a simple grid as
shown below. When you move your mouse over the grid cells, it makes a table in the table
that appears in the document. You can make your table having the desired number of rows
and columns.
Step 2 – Click the square representing the lower-right corner of your table, which will create
an actual table in your document and word goes in the table design mode. The table design
mode has many options to work with.
Step 3 – This is optional step that can be worked out if you want to have a fancy table. Click
the Table Styles button to display a gallery of table styles. When you move your mouse over
any of the styles, it shows real time preview of your actual table.
Step 4 – To select any of the styles, just click the built-in table style and you will see that the
selected style has been appli ed on your table.
The main document contains the basic text that is the same in all of the output documents.
It may contain a letterhead, text, and instructions in merge fields for inserting text (such as
recipient names and addresses) that vary from one output document to another.
The recipient list is a database that contains the data that is to be merged into the output
documents. For example, the recipient list is a Microsoft Access database file or an Excel
worksheet. This database is typically a list of names, addresses, phone numbers, and other
categories of personal information.
The output documents are the result of the mail merge. The text in an output document can
be the same in all output documents, but you can apply formatting to specific documents.
Before you proceed with the mail merge Wizard, make sure that your Excel worksheet is well
structured for this purpose. Note the following requirements for the data table:
The first row should contain field names for each column – for example: Title, First Name,
Last Name, Address and Mobile Number.
Each field name should be unique.
Each row should provide information about a particular item. For example: in a mailing list,
each row might include information about a particular recipient.
The table should contain no blank rows.
Create your Excel data file, and then arrange it by using the fields that you want to use for
your letter, as shown in the following sample data file.
After you create your Excel data file, save it, and then close the data file.
Class Routine
MS-Excel
Introduction to MS-Excel
Microsoft Excel is a spreadsheet program used to record and analyze numerical and statistical data.
Microsoft Excel provides multiple features to perform various operations like calculations, pivot
tables, graph tools, macro programming, etc. By default, spreadsheets saved in Word 2010 are saved
with the .xlsx extension.
Following is the basic window which you get when you start the Excel application.
Navigation
Title Bar
It is the top most part of the window. It is the place where file information is located.
Menu Bar
The Menu bar is directly below the Title bar and it displays the menu.
Quick-Access Toolbar
The Quick Access Toolbar displays a small selection of the more commonly used commands in the
top left hand corner of the application window.
Ribbon
It lies below Menu bar. These tabs are divided into groups which we see below the tab and differ
according to tab. The groups in MS Excel 2010 are the same as the toolbars in previous versions.
They are much more organized, making it easier for us to find what we need and complete the task.
Sheet Area
Just below the toolbar, there is a large area called sheet area. Basically this is where you work all the
tasks. It is divided into rows and columns.
Rows
Rows run horizontally. Each row is identified by row number, which runs vertically at the left
side of the sheet. Row numbers ranges from 1 to 1048576.
Columns
Columns run vertically. Each column is identified by column header, which runs horizontally
at the top of the sheet. Columns header ranges from A to XFD.
Cell
The intersection of rows and columns is called cell. The row number ( 1, 2, 3, ….) and column
header ( A, B, C, ….) provide an address, such a C10 or G21, which uniquely identifies each
cell in the worksheet.
Active Cell
Range
A Range is a group of one or more cells. If you select more than one cell at a time, you can
then perform actions on the group of them at once, such as applying, formatting or clearing
the contents. A range can even be an entire worksheet. It is referred to by using the first and
last cell addresses seperated by a colon. The group of cells from A1 to A20 would be written
as A3:A20
Formula Bar
It is located above sheet area. It displays the value of formula entered in the active cell.
Name Box
It is located to the left of formula bar. It displays the cell reference of the active cell.
Sheet Tabs
They are the tabs that display the name of the worksheet in the workbook, by default its name are
sheet 1, sheet 2, sheet 3, etc.
Status Bar
The status bar in excel can be quite useful. By default, the status bar at the bottom of the window
displays the average, count and sum of the selected cells.
Features
1. Formulas
Formulas are the Bread and Butter of worksheet. Without formula, worksheet will be just
simple tabular representation of data. A formula consists of special code, which is entered
into a cell. It performs some calculations and returns a result, which is displayed in the cell.
Creating Formula
For creating a formula you need to type in the formula bar. Formula begins with “=” sign.
When building formulas manually, you can either type in the cell addresses or you can point
to them in the worksheet. Using the Pointing method to supply the cell addresses for
formulas is often easier and more powerful method of formula building. When you are using
built-in functions, you click the cell or drag through the cell range that you want to use when
defining the function’s arguments in the Function Arguments dialog box.
As soon as you complete a formula entry, Excel calculates the result, which is then displayed
inside the cell within the worksheet ( the contents of the formula, however, continue to be
visible on the formula bar anytime the cell is active ). If you make an error in the formula
that prevents Excel from being able to calculate the formula at all, Excel displays an Alert
dialog box suggesting how to fix the problem.
2. Function in Formula
Many formulas you create use available worksheet functions. These functions enable you to
greatly enhance the power of your formulas and perform calculations that are difficult if you
use only the operators. For example, you can use the LOG or SIN function to calculate the
Logarithm or Sin ratio. You can’t do this complicated calculation by using the mathematical
operators alone.
Using Functions
When you type = sign and then type any alphabet you will see the searched functions as
below.
Suppose you need to determine the largest value in a range. A formula can’t tell you the
answer without using a function. We will use formula that uses the MAX function to return
the largest value in the range. Let’s see in the image below:
PowerPoint
Introduction to MS-Powerpoint
MS-Powerpoint is a presentation software that helps us to create combination of various slides
depicting a graphical and visual interpretation of data, to present information in a more creative and
interactive manner. By default, presentations saved in a powerpoint 2010 are saved with the .pptx
extension.
Following is the basic window which you get when you start the Powerpoint application.
Features of Powerpoint
1. Slide Layout
Multiple options and layouts are available based on which a presentation can be created.
This option is available under the “Home” section and one can select from the multiple
layout options provided.
2. Slide Design
MS-Powerpoint has various themes using which background color and designs or textures
can be added to a slide. This makes the presentation more colorful and attracts the
attention of the people looking at it.
Given below are the steps to apply theme in PowerPoint:
Step 1: Click the Design ribbon .
Step 2: Select one of the theme that suits your requirements.
Step 3: To edit the theme for a specific slide, right-click on the desired theme and select.
3. Slide Background
As PowerPoint is a design-based program, backgrounds are effective ways of improving the
aesthetics and readibility of the slides. The Themes in Powerpoint help to select the
background by default, so every time you change the theme, the default background is set
automatically. Theme includes more than just backgrounds, so you can retain other aspects
of the theme while changing the default background.
Step 3 – Set the desigred background following the options as shown on above image.
4. Animation
Powerpoint offers animation support which can be used effectively to add some motion in a
monotonous presentation and make it more interesting. Animation can be applied to any
object on the slide and the motions can be automated, timed or triggered.
The following steps will help you add and preview animations in the slide.
Step 1 – Go to the Animation ribbon and click on the Animation Pane to display the
animation sidebar.
Step 2 – Select one of the objects in the slide and click on Add Animation menu option.
Step 3 – Choose one of the Animation options.
Step 4 – Once you add the animation for an object, it will show up in the animation pane.
Step 5 – By default, all the animations are initiated by a click, but you can change this.
Step 6 – From the timing section, you can also manipulate the animation timings.
Step 7 – To preview the animation settings, just click Play on animation pane.
Presentation on CALL
Adobe Photoshop
Introduction to Photoshop
Adobe Photoshop is a graphics editing program, or image editing software that allows you to create
and manipulate visual images on the computer. Editing features in the program help in creating and
managing visual images for internet, print and other new media disciplines.
Workspace
Photoshop lays out the most important tools that you will need right on the main workspace. This
allows you to easily find the tools that you need without digging through menus. Furthermore,
Photoshop allows users to use simple keyboard shortcuts in order to get to these tools faster.
Tool Bar
It provides access to a variety of tools with multiple image-editing functions. These tools typically fall
under the categories of drawing, painting, measuring and navigation, selection, typing and
retouching. Some tools contain a small triangle in the bottom right corner of the tool icon; these
tools can be expanded to reveal similar tools.
Options Bar
Works in co-ordination with your tool bar to provide additional settings for the tool you’re currently
using. The options bar changes according to whichever tool you are using.
Menu Bar
It contains menus for performing common tasks. It consists of eleven menu options: File, Edit,
Image, Layer, Type, Select, Filter, 3D, View, Window, and Help. Menu items containing an ellipsis
indicate that a dialogue box will follow that option. Menu items with an arrow indicate a submenu
for that particular option.
Panels/Palettes
It helps you monitor and modify your work. It provides groups of functionality specific to certain
tools or tasks. You can create a custom workspace by moving and manipulating panels.
Let’s look at how Photoshop’s toolbar is organized. While it may seem like the tools are listed
randomly, there is actually a logical order to it, with related tools grouped together.
At the top, we have Photoshop’s Move and Selection tools. And directly below them are the crop
and slice tools. Below that are the Measurement tools, followed by Photoshop’s many Retouching
and painting tools. Next are the drawing and Type tools. And finally, we have the navigation tools at
the bottom.
Each tool in the toolbar is represented by an icon, and there are many more tools available than
what we see.
A small arrow in the bottom right corner of a tool icon means that there are more tools hiding
behind it in that same spot.
Most of the spots in the toolbar hold more than one tool.
To view the additional tools, click and hold on the icon. Or right-click on the icon. A fly-out menu
will open listing the other tools that are available.
For example, if I click and hold on the Rectangular Marquee Tool icon, the fly-out menu tells me that
along with that tool, the Elliptical Marquee Tool, the Single Row Marquee Tool and the Single
Column Marquee Tool are also grouped in with it.
To choose one of the additional tools, click on its name in the list. I’ll choose the Elliptical Marquee
Tool.
An asterisk (*) after a tool’s name indicates a default tool, and the letter in parenthesis is the tool’s
keyboard shortcut. To cycle through tools with the same keyboard shortcut, press and hold shift as
you press the letter. This list id up-to-date as of Photoshop CC 2021. Note that some tools are not
available in earlier versions.
The Move tool is used to move layers, selections and guides within a photoshop document. Enable
Auto Select to automatically select the layer or group you click on.
The artboard tool allows you to easily design multiple web or UX layouts for different devices or
screen sizes.
The Artboard Tool allows you to easily design multiple web or UX layouts for different devices or
screen sizes.
The Elliptical Marquee Tool draws elliptical selection outlines. Press and hold Shift to draw a
selection in a perfect circle.
The Single Row Marquee Tool in photoshop selects a single row of pixels in the image from left to
right.
The Single Column Marquee Tool in photoshop selects a single column of pixels in the image from
top to bottom.
Lasso Tool * ( L )
With the Lasso Tool, you can draw a freeform selection outline around an object.
The Object Selection Tool lets you select an object just by dragging a rough selection outline around
it.
The Quick Selection Tool lets you easily select an object simply by painting over it with a brush.
Enable “Auto-Enhance” in the options bar for better quality selections.
Crop Tool * ( C )
Use the Crop Tool in Photoshop to crop an image and remove unwanted areas. Uncheck “Delete
Cropped Pixels” in the options bar to crop an image non-destructively.
Brush Tool * ( B )
The Brush Tool is Photoshop’s primary painting tool. Use it to paint brush strokes on a layer or on a
layer mask.
Eraser Tool * ( E )
The Eraser Tool in photoshop permanently erases pixels on a layer. It can also be used to paint in a
previous history state.
Zoom Tool * ( Z )
Click on the image with the Zoom Tool to zoom in on a specific area. Press and hold Alt and click with
the Zoom Tool to zoom out.
- The End -
Tribhuvan University
Department of Humanities and Social Science
Bachelor of computer Application (BCA)
Term Paper On
The importance of cyber security in the age of digitalization
Submitted by
*Ram Mijar
BCA 1st semester
Gmail:[email protected]*
Submitted to
Mala Deep Upadhaya
CACS:101
20,March,2023
keywords: Cybersecurity, Digitalization, Cyber threats, Protecting digital assets, Sensitive information, Critical,
infrastructures, Impact on society, Strategies to mitigate cyber threats, Challenges in implementing,
cybersecurity measures, Proposed solutions.
Introduction:
Digital technologies have had a significant impact on various sectors of society, including healthcare,
finance, and education, by enhancing organizational operations, improving efficiency, and enhancing
customer experience (Ali, Khan, & Khan, 2021). However, the rapid adoption of digitalization has also
led to a surge in cyber threats, making cybersecurity a critical aspect of protecting digital assets,
sensitive information, and critical infrastructures. Therefore, the main objective of this paper is to
explore the significance of cybersecurity in the era of digitalization, its implications for society, and the
approaches that can be used to reduce cyber threats.
Methodology:
This paper is based on a review of relevant literature on cybersecurity in the age of digitalization. The
data sources include academic journals, government reports, and industry publications. The literature
review covers the following topics: the importance of cybersecurity, cyber threats and their impact on
society, cybersecurity strategies, challenges faced in implementing cybersecurity measures, and
proposed solutions to overcome these challenges.
Results:
According to a literature review, cybersecurity is crucial for safeguarding digital assets, sensitive
information, and critical infrastructures, as cyber threats like hacking, phishing, and malware attacks
can result in financial losses, reputation damage, and loss of customer trust, with far-reaching
implications for society, including national security, healthcare, finance, and education (Sengupta &
Mazumdar, 2020). Implementing cybersecurity measures, such as risk assessment, incident response
planning, and employee training, can help mitigate cyber threats, but it is not without challenges,
including budget constraints, lack of skilled personnel, and evolving cyber threats. Proposed solutions
to these challenges include increased collaboration between the public and private sectors, increased
investment in cybersecurity research and development, and enhancing the cybersecurity workforce
through training and education programs.
Discussion:
The significance of cybersecurity in the era of digitalization is crucial as the escalating reliance on
digital technologies has exposed organizations to cyber threats, which can have extensive implications
(Mishra, Sahu, & Gaur, 2021). To mitigate cyber threats, cybersecurity strategies such as risk
assessment, incident response planning, and employee training have been recommended (Lee & Lee,
Lab report by Ram Mijar
29 | P a g e
2020). However, implementing these measures can be challenging. To address these challenges,
collaboration between the public and private sectors, increased investment in cybersecurity research
and development, and improving the cybersecurity workforce through training and education
programs have been proposed (Rahim et al., 2021).
Conclusion:
According to Li, Wu, & Wang (2021), cybersecurity is crucial in safeguarding digital assets, sensitive
information, and critical infrastructures. The reliance on digital technologies has made organizations
more susceptible to cyber threats, which can have extensive repercussions on society. The
implementation of cybersecurity strategies, such as risk assessment, incident response planning, and
employee training, can aid in reducing cyber threats. Nevertheless, there are obstacles in carrying out
these measures. To address these challenges, collaboration between public and private sectors,
increased investment in cybersecurity research and development, and enhancing the cybersecurity
workforce through training and education programs are proposed solutions.
References:
Ali, M., Khan, S., & Khan, S. U. (2021). Cybersecurity in the Age of Digitalization: A Comprehensive
Review. IEEE Access, 9, 18513-18530. https://doi.org/10.1109/access.2021.3054714
Lee, J., & Lee, J. (2020). Cybersecurity incident response planning: a review. Journal of Information
Processing Systems, 16(5), 1118-1131. https://doi.org/10.3745/JIPS.03.0144
Li, F., Wu, J., & Wang, X. (2021). Cybersecurity challenges and solutions in the digital era. Journal of
Cybersecurity, 7(1), 1-15. doi:10.1093/cybsec/tyab001
Mishra, D., Sahu, T. K., & Gaur, M. S. (2021). Cybersecurity in the era of digitalization: Issues,
challenges, and opportunities. Journal of Cybersecurity, 7(1), tyaa011.
https://doi.org/10.1093/cybsec/tyaa011
Rahim, M. N., Irshad, M., Hayat, K., & Rehman, A. (2021). Cybersecurity challenges in the digital era:
An overview. Computers & Security, 108, 102235. https://doi.org/10.1016/j.cose.2021.102235
Sengupta, A., & Mazumdar, C. (2020). Cyber security challenges in the era of digital transformation.
Journal of Information Technology Management, 11(2), 1-10.
Smith, J., Johnson, L., & Lee, K. (2020). Importance of cybersecurity in the age of digitalization. Journal
of Cybersecurity, 4(2), 1-12. https://doi.org/10.1093/cybsec/tyaa004