It Workshop Lab Manual Modified
It Workshop Lab Manual Modified
Objective:
The IT Workshop for engineers is a training lab course spread over 60 hours. The
modules include training on PC Hardware, Internet & World Wide Web and Productivity
tools including Word, Excel, Power Point and Publisher.
PC Hardware introduces the students to a personal computer and its basic peripherals, the
process of assembling a personal computer, installation of system software like MS Windows
, Linux and the required device drivers. In addition hardware and software level
troubleshooting process, tips and tricks would be covered.
Internet & World Wide Web module introduces the different ways of hooking the PC on to
the internet from home and workplace and effectively usage of the internet. Usage of web
browsers, email, newsgroups and discussion forums would be covered. In addition,
awareness of cyber hygiene, i.e., protecting the personal computer from getting infected with
the viruses, worms and other cyber attacks would be introduced.
Productivity tools module would enable the students in crafting professional word
documents, excel spread sheets, power point presentations and personal web sites using the
Microsoft suite of office tools and LaTeX.
1
LIST OF PRESCRIBED PROGRAMS
TASK 1:
Identify the peripherals of a computer, components in a CPU and its functions. Draw the block
diagram of the CPU along with the configuration of each peripheral .
A computer can process data, pictures, sound and graphics. They can solve highly
complicated problems quickly and accurately.
InputUnit:
Computers need to receive data and instruction in order to solve any problem. Therefore we
need to input the data and instructions into the computers. The input unit consists of one or
more input devices. Keyboard is the one of the most commonly used input device. Other
commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. All the
input devices perform the following functions.
1. Accept the data and instructions from the outside world.
2. Convert it to a form that the computer can understand.
3. Supply the converted data to the computer system for further processing.
StorageUnit:
The storage unit of the computer holds data and instructions that are entered through the input
unit, before they are processed. It preserves the intermediate and final results before these are
2
sent to the output devices. It also saves the data for the later use. The various storage devices
of a computer system are divided into two categories.
1. Primary Storage: Stores and provides very fast. This memory is generally used to hold the
program being currently executed in the computer, the data being received from the input
unit, the intermediate and final results of the program. The primary memory is temporary in
nature. The data is lost, when the computer is switched off. In order to store the data
permanently, the data has to be transferred to the secondary memory.
The cost of the primary storage is more compared to the secondary storage. Therefore most
computers have limited primary storage capacity.
2. Secondary Storage: Secondary storage is used like an archive. It stores several programs,
documents, data bases etc. The programs that you run on the computer are first transferred to
the primary memory before it is actually run. Whenever the results are saved, again they get
stored in the secondary memory. The secondary memory is slower and cheaper than the
primary memory. Some of the commonly used secondary memory devices are Hard disk, CD,
etc.,
Memory Size:
All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is
represented by an 8 bit code.
The set of 8 bits is called a byte. A character occupies 1 byte space.
A numeric occupies 2 byte space.
Byte is the space occupied in the memory.
The size of the primary storage is specified in KB (Kilobytes) or MB (Megabyte). One KB is
equal to 1024 bytes and one MB is equal to 1000KB. The size of the primary storage in a
typical PC usually starts at 16MB. PCs having 32 MB, 48MB, 128 MB, 256MB memory are
quite common.
Output Unit:
The output unit of a computer provides the information and results of a computation to
outside world. Printers, Visual Display Unit (VDU) are the commonly used output devices.
Other commonly used output devices are floppy disk drive, hard disk drive, and magnetic
tape drive.
Arithmetic Logical Unit:
All calculations are performed in the Arithmetic Logic Unit (ALU) of the computer. It also
does comparison and takes decision. The ALU can perform basic operations such as addition,
3
subtraction, multiplication, division, etc and does logic operations viz, >, <, =, ‘etc.
Whenever calculations are required, the control unit transfers the data from storage unit to
ALU once the computations are done, the results are transferred to the storage unit by the
control unit and then it is send to the output unit for displaying results.
Control Unit:
It controls all other units in the computer. The control unit instructs the input unit, where to
store the data after receiving it from the user. It controls the flow of data and instructions
from the storage unit to ALU. It also controls the flow of results from the ALU to the storage
unit. The control unit is generally referred as the central nervous system of the computer that
control and synchronizes its working.
Central Processing Unit:
The control unit and ALU of the computer are together known as the Central Processing Unit
(CPU). The CPU is like brain performs the following functions:
• It performs all calculations.
• It takes all decisions.
• It controls all units of the computer.
A PC may have CPU-IC such as Intel 8088, 80286, 80386, 80486, Celeron, Pentium,
Pentium Pro, Pentium II, Pentium III, Pentium IV, Dual Core, and AMD etc.
1. CPU The central processing unit contains the heart of any computer, the processor.
The processor is fitted on to a Mother Board. The Mother Board contains various
components, which support the functioning of a PC.
4
2. System board/Motherboard which holds the Processor, Random Access Memory and
other parts, and has slots for expansion cards
3. RAM (Random Access Memory)- For program execution and short term data-storage, so
the computer doesn't have to take the time to access the hard drive to find something. More
RAM can contribute to a faster PC.
The main memory of the computer is called as Random Access Memory (RAM). The
name derives from the fact that data can be stored in and retrieved at random, from anywhere
in the electronic main memory chips in approximately the same amount of time, no matter
where the data is.
Main memory is in an electronic or volatile state. When the computer is off, main memory is
empty, when it is on it is capable of receiving and holding a copy of the software instructions,
and data necessary for processing.
Because the main memory is a volatile form of storage that depends on electric power can go
off during processing, users save their work frequently on to non volatile secondary storage
devices such as diskettes or hard disk.
5
1. Storage of the copy of the main software program that controls the general operation
of the computer. This copy is loaded on to the main memory when the computer is
turned on, and it stays there as long as the computer is on.
2. Temporary storage of a copy of application program instruction, to be received by
CPU for interpretation and processing or execution.
3. Temporary storage of data that has been input from the key board, until instructions
call for the data to be transferred in to CPU for processing.
Instructions which are critical to the operation of a computer are stored permanently
on Read only Memory. (ROM) chip installed by the manufacturer inside the computer. This
ROM chip is also called firm ware, retains instructions in a permanently accessible
nonvolatile form. When the power in the computer is turned off, the instructions stored in
ROM are not lost.
It is necessary and also convenient to have instructions stored in ROM. The more instructions
in ROM, the fewer diskettes you may have to handle. Until recently the process of
manufacturing ROM chips and recording data on them was more expensive than the process
of producing RAM chips. As a result the manufacturers tended to record in ROM only those
instructions that were crucial to the operation of thecomputer.
Today, due to improvements in the manufacturing process of ROM chips have lowered the
cost to the point where manufacturers are beginning to include additional software
instructions.
In addition to ROM, three additional categories of non volatile memory are used in
some computer systems. They are PROMs, EPROMs, and EPROMs. PROM stands for
programmable read only memory.
It works similar to that of ROM. PROM chips are custom made for the user by the
manufacturer. The user determines what data and instructions are to be recorded on them.
The data on PROM is permanent and cannot be erased.
Erasable programmable read only memory (EPROM), developed as an improvement over
PROM. The data on the EPROM can be read with the help of a special device that uses ultra
6
violet light. The data or instructions on the EPROM are erasable and new data can be entered
in its place. EPROM functions exactly same as PROM.
Electronically erasable programmable read only memory (EEPROM) avoids the
inconvenience of having to take chips out of the computer to change data and instructions.
Changes can be made electrically under software control. These are used in point of sale
terminals to records price related data for products. The prices recorded on them can be easily
updated as needed. The only disadvantage of EEPROM is, the regular ROM chips.
7
o Static RAM (SRAM)
4.Buses : PCI bus, PCI-E bus, ISA bus (outdated), USB, AGP
5. Power Supply - a case that holds a transformer, voltage control and fan
6. Storage controllers, of IDE, SCSI or other type, that control hard disk, floppy disk,
CD-ROM and other drives; the controllers sit directly on the motherboard (on-board)
or on expansion cards
8
7. Video display controller that produces the output for the computer display
8. computer bus controllers (parallel, serial, USB, Fire wire) to connect the computer to
external peripheral devices such as printers or scanners
10. CD - the most common type of removable media, cheap but fragile.
9
12. Tape Drive - mainly for backup and long-term storage
13. Internal storage - keeps data inside the computer for later use.
16. Sound card - translates signals from the system board into analog voltage levels, and
has terminals to plug in speakers.
10
17. Networking - to connect the computer to the Internet and/or other computers
19. Network card - for DSL(Digital Subscriber Line)/Cable internet, and/or connecting
to other computers.
11
20.Other peripherals: In addition, hardware can include external components of a
computer system. The following are either standard or very common.
Mouse
12
21. Output : The output devices are:
Types of monitors
13
LCD(liquid crystal display) monitors
14
Printer
Types of printers
Impact printers: An impact printer create an image by using pins or hammers to press an
inked ribbon against the paper.ex. Dot matrix printer.
Non impact printers: This type uses other means to create an image for example in ink jet
printers tiny nozzles are used to spray droplets of ink on the page.ex: Ink jet printer
Laser
Printer
15
Inkjet printer
Speakers
16
LCD Projectors:
Viva Questions:
1) Define a computer?
2) Define hardware and software?
3) What are the functional units of a computer?
4) Define the following: RAM,ROM,BIOS,BUS,BIT,PROGRAM.
5) What is the use of a mother board?
17
TASK 2:
Assembling and disassembling the PC back to working condition.
AIM: To assemble and disassemble the system
Safety Precautions:
1. Beware of electrostatic discharge (ESO)
2. Build computer on a hard surface, away from concepts.
3. Wear shoes and the short sleeved cotton wear.
4. Use Phillips, head screw driver.
5. Keep the components away from moisture.
6. Avoid using pressure while installing.
18
Connect the network interface and other cards to motherboard by inserting in right
slots and fix them in cabinet using the screws provided.
Place the cabinet in right position.
Fix the doors of the cabinet.
Connect the data cable of monitor to the CPU.
Connect the keyboard cable to the CPU.
Connect the mouse cable to the CPU.
Connect other devices to CPU.
Connect the LAN cable to NIC in CPU.
Connect the power supply to CPU.
Connect the power supply to Monitor.
Switch on the computer after giving the power supply.
19
Mother board parts:
1. ACR slot.
2. PCI Slot.
3. AGP Slot.
4. ATX Connectors.
5. CPU Fan.
6. Chipset North Bridge.
7. CPU socket.
8. Floppy.
9. System memory.
10. Chipset south bridge.
11. Panel connector.
12. Power supply.
13. IDE connectors.
ATX Connectors:
1. PS, Mouse.
2. Key board.
3. USB.
4. Parallel ( Prints )
5. Serial COM1.
6. Serial COM 2.
7. Joystick.
8. Sound.
20
1. The RAM must be suitable for motherboard.
2. There are currently 3 types of RAM available.
a) SD RAM.
b) DDR SD RAM.
c) RD RAM.
3. The mother board’s chipset determines which type of RAM may be used.
21
Final Check:-
1. Mother board jumper configurations are the settings for the processor operator.
2. Drive jumper settings, master/ slave correct?
3. Are the processor, RAM modules and plug in cards finally seated in there sockets?
4. Did you plug all the cables in? Do they all fit really?
5. Have you frightened all the screws in plug- in cards or fitted the clips?
6. Are the drive secure?
7. Have u connected the power cables to all driver?
Powering up for the first time:
1. Ensure that no wires are touching the CPU heat sink fan.
2. Plug your monitor, mouse and keyboard.
3. Plug in power card and switch the power supply.
4. If everything is connected as it should be
All system, fans should start spinning.
U should hear a single beep and after about 5-10 sec.
Amber light on monitor should go green.
You will see computer start to boot with a memory check.
Now check front LED’S to see if u plugged them in correctly.
Check all other buttons.
Power afford change any wrong settings.
22
Place the cabinet such that motherboard faces the ceiling.
Disconnect the NIC and other cards from mother board by removing from slots and
unscrewing from cabinet.
Disconnect the wires of speakers from mother board.
Remove power supply cables from HDD, FDD, CD-ROM drive etc.
Disconnect the HDD, FDD, CD-ROM drive from mother board by removing flat
ribbon cable.
Remove CR-ROM from cabinet.
Remove the FDD from cabinet by unscrewing it.
Remove the HDD from cabinet by unscrewing it.
Removing RAM cards from slots on mother board.
Disconnect the power cables from processor fan.
Remove the processor fan by unlocking clips on it.
Disconnect the power cables from SMPS on power cabinet.
Remove mother board from cabinet by unscrewing it.
Remove the SMPS from cabinet of PC by unscrewing it.
Viva Questions:
1) Define assembling of a system?
2) Explain the steps involved in the installation of the mother board?
3) What is the use of pin 1 indicated on the processor?
4) What is the use of locking level at the processor slot?
5) Define a port?
23
TASK3
Windows XP (codename Whistler, also known as Windows NT 5.1) is the latest desktop
version of the Microsoft Windows operating system. It was made publicly available on
October 25, 2001. Two editions of Windows XP are most commonly available: Windows XP
Home Edition which is targeted at home users and Windows XP Professional which has
additional features such as dual-processor support and the ability to join a domain, a grouping
of centrally managed Windows computers. The letters "XP" originate from the word
"Experience".
Insert the windows XP cd in your cdrom and than go to the BIOS by hitting “DEL” or “F12″
when your system in powering on. Go to Boot order and make sure cdrom is on the first
24
place.
Save settings and restart your computer.
Once you have successfully booted from the CD, you will see the Windows XP “Welcome to
Setup” screen. Press ENTER to begin the setup process.
25
Step 2: Accept the license agreement
When you see the Windows XP license agreement press F8 to accept it and proceed.
26
Step 4:Continue Installing a Fresh Copy
Press ESC. You will be given a list of partitions available on your hard drive.
Step 5: Partitions
If there are multiple partitions on your hard drive, or you have multiple hard drives in the
computer, use the UP or DOWN arrow keys to choose your install partition. Please note that
your system partition needs to be a primary partition (usually the first partition that shows up
in the list), not a logical partition.
27
The partition should be at least 10 GB in size. Make sure that all the data you need from this
partition is copied elsewhere, because it will be deleted.
Once you have selected the right partition selected, press ENTER. You will see the next “you
already have a system installed” screen only if you already have Windows installed on this
partition. If you are installing on a brand-new hard drive, skip to Step 7.
28
Step 8: Continue With The Format
Press F to continue formatting selected partition. If you still haven’t backed up, this is the last
change to backup your important data, after this step you will not to able to go back and
restore your data.
29
/
STEP 10: Setup will show a progress box and reboot when copying files is complete.
When you see the "Press any Key to Reboot" do not Press any Key. If CD boots anyway,
remove CD and reboot.
Step 11:From this point, you will follow the on screen prompts.
30
Step 12:If you live outside the US, you will probably need to modify the default settings.
31
32
33
Step 13:If you live outside the US, you will probably need to modify the default settings.
34
Step 14:Personalize your XP Enter your Name and Organization.
Step 15:Enter the Product Key. The Key is located on the back of the CD folder in the Retail
versions, and on a holographic label with the OEM versions purchased with a piece of
hardware. Write this key down and secure it in a safe place in case the original is misplaced
35
or destroyed through natural causes .
Step 16:Choose a name for the computer, this should be a unique name for the computer,
especially if it is to be connected to a network. In Pro, you are given the option of creating a
password or leaving it blank.
36
Step 18: If detected you will have the choice to choose a typical configuration or custom.
Choose typical if you are unsure.
Step 19: For home you will choose your workgroup, if a network is already established and
you intend to connect to it, use the existing workgroup name, otherwise, I suggest using the
default.
37
Step 20:For Pro, the same goes for Pro as suggested for Home, but you will have the choice
to join a Domain, if you do not have a Domain or do not know leave blank.
Setup will continue and reboot when completed ignore the "Press Any Key".
The XP loading window will now display after reboot.
Viva Questions:
1) NTFS stands for---------?
2) What is the use of product key in the installation process of a software?
3) How many characters does a product key contain fro windows XP?
4) Describe different kinds of Microsoft Operating systems?
5) What are the pre-arrangements for installing the windows OS?
38
TASK 4: INSTALLATION OF UBUNTU:
Step 1:
The first thing you should do is head
to http://www.ubuntu.com/download/ubuntu/download and download Ubuntu 11.10
LiveCD. Just click the big orange Start download box.
Step 2:
Using your disc burning software, burn the .iso you downloaded to a CD.
Step 3:
Before you go any further, ensure all important data is backed up in case of data loss on your
drives. This guide assumes you have media backups of your Windows partitioned hard drive
and you are safe to proceed.
Step 4:
Ensure you have a network cable connected, restart your computer, and boot from the CD
drive.
Step 5:
The LiveCD will load up, and you'll be presented by the following box:
39
For the purposes of this guide, we will assume you've already tried Ubuntu and want to
proceed with an installation, so click "Install Ubuntu."
Step 6:
You'll be greeted by the "Preparing to install Ubuntu" screen, exactly as below:
40
I recommend you select "Install third-party software" as I have done in the screenshot above.
I prefer to do system updates once up and running, but if you have the extra time you can also
select "download updates while installing" as well. Then click continue.
Step 7:
The next screen you will see is "installation type," what you see will be dependent on
whether you have an existing Windows installation or not.
I'm going to split this into three different sub-steps, to make it as simple as possible.
Step 7-A:
For those installing in a virtual machine or to hard disks without an OS you will see the
following screen:
41
You have two choices:
1. Erase the entire disk and use all of it for installation -- Ubuntu will automatically partition
your disk and proceed with installation.
2. Select "something else" and manually create your partitions (which is covered in detail in
step 7-C).
If you are choosing the first option, select the radio button and then click continue,
proceeding to step 8.
Step 7-B:
Those of you that have current Windows installations or are going to dual-boot with another
existing OS will be presented with a screen similar to below:
42
You have three options available:
1. You can choose the first option and install Ubuntu alongside your existing OS.
2. You can opt to replace your Windows installation with Ubuntu, allowing the installer to
format your current partitions and automatically create new ones for Linux.
3. You can choose "something else" and create your own partition scheme and sizing
(covered in detail in step 7-C).
Once you have selected which route you wish to proceed with click continue and proceed to
step 8.
Step 7-C:
Having selected the "something else" option you will be presented with the following
window:
43
Linux recognizes and assigns IDs to drive in a different manner to Windows. In the above
image, you can clearly see my hard disk in the list. It is identified by "/dev/sda." Linux
recognizes drives in the following way:
• Sda = 1st drive
• Sdb = 2nd drive
• Sdc = 3rd drive and so on
Partitions are also shown after the drive letters. So if I had 2 partitions on my first disk, they
would be identified as:
• Sda1 – 1st drive, 1st partition
• Sda2 – 1st drive, 2nd partition
You will not see the common Windows C: label in the disk menu in the above list. You do,
however, have key things to help you recognize your Windows C: drive. Both of these can be
used to identify which is your Windows disk.
44
• The size of the disk is shown
• The name of the drive is shown
This is your current partition layout for your hard disks. If you have more than one disk, they
will show up as /dev/sda, /dev/sdb etc.
Firstly, identify your Windows installation. In my case, it's sda1 (which is my first hard disk,
first partition). What you see depends on how you created the extra space. I just resized the
Windows partition from within Windows, and left the free space ready to install Linux. I
recommend using Windows or a free utility from within Windows to resize your partition as
most beginners will understand it more.
You will notice I have already filled out the example above to create a 10GB root partition.
You can have a maximum of 4 primary partitions, or 3 primary partitions and 1 logical
(which allows for another 64 partitions)
The size above is 10.00GB. e.g 1,000 = 1GB 10,000 = 10GB (Remember to leave enough
45
free remaining space to create your SWAP partition!)
Location for new partition: e.g. do you want it at the start or end of the free space. Select
beginning.
Use as: Ext4 is the recommended file system for Ubuntu, much the same as NTFS is
Windows. SWAP is for SWAP space.
Mount point: This is where you want the partition to mount. E.g. we need a root partition,
which in Linux is denoted by a "/".
Click OK once you have finished setting the partition information and you will return to your
partition screen, now showing the root partition you just created. Using the same methods as
before, create a SWAP partition.
I recommend you set the size of your SWAP partition to at least the size of your available
RAM. If you have plenty of hard disk capacity I would suggest you use double the size. So if
you have 2GB of RAM, set it to either 2GB or 4GB. For best performance it is recommended
you have your SWAP partition at the beginning or end of your drive.
46
So to re-cap the above, (in my example) we have the following:
Once you are happy with the changes you have made, click install now and proceed to the
next step.
Step 8:
As the installation starts to copy the required files to the hard disk, you will be presented with
a screen to select your locale. It should automatically find where you are, as it has for me
already:
47
Just double check it is correct, and then select continue.
Step 9:
The next screen to appear will be keyboard layout:
48
Ensure the correct option is selected, above you will see the correct (and default UK)
selection has been automatically made for me.
Step 10:
You will now be greeted by the "who are you" screen, ready for you to fill out with your user
details:
49
The computers name and username will automatically populate when you type your full
name. You can however edit them as you please. Fill in the details and then click continue.
You can opt to have Ubuntu automatically log in for you -- even with a password set -- or
you can choose the traditional option requiring a password to log in. You really don't need to
choose the encrypt option unless you're installing on a laptop and are dealing with highly
secure information.
Step 11:
The installation information screens will now appear as Ubuntu continues the installation:
50
Step 12:
Once installation has finished, you will be presented with the following box:
Select "restart now" and when requested, remove your installation CD, then press enter to
reboot.
Step 13:
For those of you that have Ubuntu as the only OS the computer will boot directly into Linux.
If you're dual-booting, you will see the GRUB menu appear similar to below:
51
Hit enter, to select the first option and load your newly installed Ubuntu OS.
Step 14:
For those that elected to automatically log into Ubuntu, you will go straight to the desktop in
Step 15. For everyone else, you will be greeted with the new login manager for Ubuntu:
Step 15:
Your desktop should look like this:
52
Step 16:
Before we proceed further, let's check for updates. Click on the power button on the top right
corner of the screen and select "check for updates," or words to that effect.
I'd already run updates on this install so the example above is displaying "software up to
date," but the picture highlights where you need to select anyway.
Upon selecting the update option, the update manager will appear, as below:
53
If it comes up with no available updates, just select "check" again to verify that it is correct.
Having done the same thing myself, I was presented with the updates you see above. For
those that opted to install updates during installation it is unlikely there will be further
updates required.
You might be asked to enter your password to confirm changes. If prompted, enter your
password and click OK. The same is true of any notifications that may appear during
updating the OS.
Once complete select close, and restart Ubuntu.The power button is located on the top right
corner of the screen. Click this and select shutdown.
No install is complete without full support for mp3s, core MS fonts, DVD playback codecs,
Flash and Java, so let'sgo ahead and sort this now.
54
Click the black Ubuntu menu button at the top left corner of the screen and in the menu that
appears, type "software centre" and select the Ubuntu Software Centre. Once open, click the
search bar, type "restricted" and the following should appear:
55
To make a local area connection:
If you have a network adapter installed, and have set up a
home or small office network, you are connected to a local
area network (LAN). You are also connected to a LAN if
your Windows XP Professional computer is part of a
corporate network. When you start your computer, your
network adapter is detected and the local area connection
automatically starts. Unlike other types of connections, the
local area connection is created automatically, and you do
not have to click the local area connection in order to start it.
A local area connection is automatically created for each
network adapter that is detected.
If more than one network adapter is installed, you can
eliminate possible confusion by immediately renaming each
local area connection to reflect the network that it connects
to.
If your computer has one network adapter, but you need to
connect to multiple LANs (for example, when traveling to a
regional office), the network components for your local area
connection need to be enabled or disabled each time you
connect to a different LAN.
If more than one network adapter is installed, you need to
add or enable the network clients, services, and protocols
that are required for each local area connection. When you
do so, the client, service, or protocol is added or enabled for
all other network and dial-up connections.
56
o If you are connecting to your ISP using a
standard 28.8 Kbps, 56 Kbps, or ISDN modem,
click Connect using a dial-up modem, click
Next, and follow the instructions in the wizard.
o If your DSL or cable modem ISP connection
requires a user name and password, click
Connect using a broadband connection that
requires a user name and password, click
Next, and then follow the instructions in the
wizard.
o If your DSL or cable modem ISP connection is
always on and does not require you to type a
user name and password, click Connect
using a broadband connection that is always
on, click Next, and then click Finish.
Procedure:
To open Network Connections, click Start, point to
Settings, click Control Panel, and then double-click
Network Connections.
If your DSL or cable modem is always connected and your
ISP does not require a user name and password, you do not
need to run the New Connection Wizard. No additional
configuration is required for your broadband connection.
Before you create an Internet connection, check with your
Internet service provider (ISP) to verify the required
connection settings. A connection to your ISP may require
one or more of the following settings:
o A specific IP address.
o DNS addresses and domain names.
o POP3 settings for incoming e-mail.
57
o SMTP settings for outgoing e-mail.
58
Every IP address can be broken down into 2 parts, the Network ID
(netid) and the Host ID (hostid).
All hosts on the same network must have the same netid. Each of
these hosts must have a hostid that is unique in relation to the netid.
IP addresses are divided into 4 octets with each having a maximum
value of 255. We view IP addresses in dotted decimal notation such
as 124.35.62.181, but it is actually utilized as binary data so one
must be able to convert addresses back and forth.
IP Address Classes:
Class A.
When written in a binary format, the first (leftmost) bit of a
Class A address is always 0. An easy way to recognize
whether a device is part of a Class A network is to look
at the first octet of its IP address, which will range from
0-
126. (127 reserved for loopback and diagnostics.) 224 - 2 =
16,777,214, possible IP addresses to devices that are
attached to its network.
Class B.
The first 2 bits of a Class B address are always 10. Class B
IP addresses always have values ranging from 128 to 191 in
their first octet. 216 - 2= 65,534 possible IP addresses to
devices that are attached to its network.
Class C.
The first 3 bits of a Class C address are always 110. Class C
IP addresses always have values ranging from 192 to 223 in
their first octet. 28 -2 = 254 possible IP addresses to devices
that are attached to its network.
59
Other Classes.
In addition to the three most popular classes, there are two
additional classes, class D and class E. Class D addresses
have their leading four bits set to 1110 and are used to
support IP Multicasting. Class E addresses have their
leading five bits set to 11110 and are reserved for future use.
What is Email?
60
Blind Carbon Copy Section
The recipients won’t see others’ addresses.
When email is sent to a large group of people
who don’t know each other.
Email Services:
Web Mail
POP
IMAP
POP:
Don’t have to know the name of your machine
POP mail server is installed on a computer always ON
Use Windows interface to read email
The email at the mail server is popped to your local machine
IMAP:
Internet Message Access Protocol
Permits a "client" email program to access remote
message stores as if they were local
No need to transfer messages or files back and forth between computers
SPAM:
SPAM is flooding the Internet with many copies of the same message
Force to send message to people
Junk electronic mail.
Why cause problem?
Cost-shifting – very cheap to send thousands of emails
Fraud – not an advertisement subject
Waste of others’ resources – stealing bandwidth
Displacement of Normal Email–destroy the
usefulness and effectiveness of email
Ethics problem
Web-based e-mail – HTTP: Can deliver mail message in web
page format. Some of the free email/web mail service providers are
Yahoo! mail, Hotmail, Gmail etc.
61
62
Task 6: Web Browsers and Surfing the Web
Many people tend to browse the Web using Netscape and Internet
Explorer (IE) somewhat interchangeably. The problem is that some
bookmarks end up in Netscape and others in IE. Having your
favorite bookmarks organized and available in both browsers makes
Web browsing easier. There’s a simple way to do this.
Before you start, clean up your Netscape bookmarks so they are up-
to-date and arranged in the right folders, if you have set up subject
folders. Then you will be ready to import them into IE.
63
Choose Import from a File or Address. The location of your
Netscape Bookmark.htm file might be automatically
selected. If not, and then click on the Browse button to
locate the Netscape file. When you’ve found
Bookmark.htm, click on it and then click on Save , which
will close the window. Hit Next.
This opens up the Import Favorites Destination Folder.
Click on the Netscape Bookmarks folder you just made.
Click on Next , then Finish. A small window will appear
saying, “Successfully imported favorites”.
64
Search Toolbars:
There are a variety of ways you can search and navigate the web
without first going directly to a search engine. Search toolbars
provide direct access to search engines from within your browser,
while meta search utilities make it easy to search more than one
search engine at the same time.
Google Deskbar
http://toolbar.google.com/deskbar/
Provides the ability to search with Google from the
taskbar within Windows. In other words, you can search
without having to be in your browser.
Google Toolbar
http://toolbar.google.com
Special toolbar for Internet Explorer users that puts a Google
search box right into your browser. In addition, you can use it
to see the "PageRank" popularity score of any page you are
viewing, search within the particular site you are viewing, see
a previous of "cached" copy of any dead pages, find pages
similar to the one you are viewing, block pop- ups and more. It
loads within seconds and is well worth adding to your
browser. Using the toolbar with PageRank enabled sends some
65
information back to Google. If that concerns you, choose the
"Install Without Advanced Features" option. Highly-
recommended.
MSN Toolbar
http://toolbar.msn.com/
Provides the ability to search the web using MSN Search,
perform site specific searches, term highlighting and pop-up
blocking.
Yahoo Companion
http://companion.yahoo.com/
Search Yahoo, access Yahoo Mail, check on stocks and more
via a toolbar within your browser.
66
• Internet
• Local intranet
• Trusted sites
• Restricted sites
Click the zone where you want to change the settings.
4. Under Security level for this zone, click Custom Level.
5. Under ActiveX controls and plug-ins, under Automatic
prompting for ActiveX controls, click Disable or click
Enable.
6. Under Downloads, under Automatic prompting
for file downloads, click Disable or click Enable,
and then click OK two times.
Some pop-ups are helpful. For example, if you click an image to see
a larger version, it might open in a pop-up window. Unfortunately,
some pop-up windows can contain inappropriate content or can be a
way for you to accidentally download dangerous software (called
spyware or adware) onto your computer.
Pop-up Blocker will also play a sound and show the Information
Bar when a pop-up is blocked. You can adjust these settings so that
Pop-up Blocker works the way you want it to.
67
To change Pop-up Blocker settings
If you want to see pop-up windows from a specific Web site, type
the address (or URL) of the site in the Address of Web site to
allow box, and then click Add.
68
To block pop-ups even if they are launched when you click a link or button
on a Web site:
Note If you want to see pop-ups that are blocked when you have
this setting turned on, hold down the CTRL key while the window
opens.
69
high-impact Web site user interfaces, interactive online advertising,
and short-form to long-form animation.
The Flash files, which usually have an SWF file extension, may
appear in a web page for viewing in a web browser, or standalone
Flash players may "play" them. Flash files occur most often in
animations on web pages and rich-media web sites, and more
recently Rich Internet Applications. They are also widely used in
web advertisements.
70
Flash Saving Plugin comes with SWF Cache Viewer - a utility for
browsing Internet Explorer and Mozilla Firefox cache. It searches
for Flash movies in the browsers' cache and displays all found
movies as a list. You can view and save found Flash animation to a
predefined folder. You can also browser custom folders with Flash
animation. SWF Cache Viewer also comes in handy when a Flash
movie is displayed in a popup window without the toolbar, thus
making it impossible to use the button or the context menu
command.
71
How to play saved Flash animation
You can play Flash movies with Internet Explorer, but if you don't
want to bother yourself with "file association configuration" use
SWF Opener - swf files player! SWF
Opener lets you control playback, set scale modes, change
background color and go fullscreen.
Download and install Flash and Pics Control. Flash and Pics Control
is an Internet Explorer add-on that allows you to easily enable or
disable Flash, pictures, cookies, java script, java applets or
ActiveX right from Internet Explorer. It adds a button to the Internet
Explorer toolbar which allows you to turn Flash animation on/off
with a few clicks.
72
This extension allows Microsoft to support the MSJVM until
December 31, 2007, providing customers with the ability to
transition from the MSJVM on a schedule and plan that is most
effective for them.
Cookie
A small text file of information that certain Web sites attach
to a user's hard drive while the user is browsing the Web
site. A Cookie can contain information such as user ID, user
preferences, archive shopping cart information, etc. Cookies
can contain Personally Identifiable Information.
A cookie is a small piece of data, which is sent from a web
server to a web browser and stored locally on the user's
machine. The cookie is stored on the user's machine but is
73
not an executable program and cannot do anything to the
machine. Whenever a web browser requests a file from
the same web server that sent the cookie, the browser sends
a copy of that cookie back to the server.
A unique string of letters and numbers that the web server
stores in a file on your hard drive. This method is used by
web designers to track visitors to a website so the visitors do
not have to enter the same information every time they go to
a new page or revisit a site. For example, web designers use
cookies to keep track of purchases a visitor wants to make
while shopping through a web catalog.
Search Engines:
Search engine is a software that lets a user specify search terms. The
search engine then finds sites that contain those terms. Over time a
search engine builds a database of searchable terms that can be
matched to web sites.
There are dozens of search engines on the Internet, but just a few
that are considered major search engines, and they are;
Google,
Overture,
Inktomi,
Teoma, and
74
Looksmart.
Lycos
AltaVista
The top five search engines provide search results for many other
companies including; Yahoo, MSN, AOL Search, AltaVista, Lycos
and Ask Jeeves.
Entering the same search query using different search engines will
not produce the same list of sites. Each search engine uses a
different method when it comes to doing a search.
Methods of searching
Use more than one word.
Use quotes
Use boolean queries
Use + sign or - sign
Use * (wild card)
Searching for
shelf ice - results in URLs of pages containing the words
shelf and ice, or just the word “shelf” or just the word
“ice”. Results in many hits.
“shelf ice” - results in URLs of pages containing the exact string “shelf
ice”.
Searching for
shelf AND ice – results in URLs of pages containing
the word “shelf” and the word “ice” (in any order).
shelf OR ice – results in URLs of pages containing the
words “shelf” and ”ice”, or just the word “shelf” or just the
word “ice”.
computers NOT notebook – results in URLs of
pages containing the word “computers” but not
containing the word “notebook”.
75
wild card:
Some search engines use the asterisk as a wild card to include
variations on a word. For example, kayak* would search for
kayaks, kayaking, kayaker.
+ sign or – sign:
Prefix + in order to include a word. Generally, “A”, “and”
or “the” - such words are usually ignored by the search
engine. To include a word, use + before it.
76
Meta Search Engine:
Performs a search by using more than one search engine to do the search.
www.metasearch.com
www.metacrawler.com
www.dogpile.com
www.infind.com
All viruses are different. Some activate on a certain day, but remain
dormant until then. Others begin the attack as soon as the machine
77
has been infected. Viruses can be very damaging and some are just
annoying.
More than 1,00,000 known viruses exists in the world today Several
hundred new viruses are discovered every month
Anti-virus program:
Due to the nature of the operating system, Linux, and other UNIX-
like operating systems are not as susceptable to viruses. Thus an
anti-virus program is not necessary. Network Worms:
Self-replicating Viruses that reside in the active memory of a computer.
Worms send themselves out to the Internet from infected systems.
Either include tiny e-mail server or search for
unprotected shared network drives to unload.
Trojan Programs:
Programs that installs themselves stealthly via Internet
& provide access for malicious use
Threats enabled by (/through) Trojans
DDos attacks
Data stealing
Distributed spam eMails
78
Do not
replicate
S
p
y
w
a
r
e
/
A
d
w
a
r
e
:
Other malware:
Phishing
Confidential information stealing by fraud
emails & web sites (author falsified)
Several millions of Phishing messages have been sent world wide
Fastest growing threat today
SPIM
Instant Messaging SPAM
Estimated: 4 billion SPIM's during 2004
Diagnosing Infections:
79
Slow computer, system reboots
Mouse moves by itself
Browser goes to unexpected web sites
Slow internet access
Endless popup ads
New desktop toolbars
Solutions:
Disabled antivirus scanner or firewall
Check startup program group regularly for software you didn’t install
Check Add/Remove programs for software you didn’t
install (make a list of installed items on a new
machine and check the list regularly)
Check running services monthly
Check running processes in Task Manager
Monitor open ports
Monitor outgoing and incoming connections
Updating:
Few pieces of software are perfect. Many have security
flaws that can allow an intruder to take over your system.
80
AVG Anti-Virus
AntiSpyWare Tools:
Only Software tools exist at the moment
Programs are trying to detect distinctive signs that
spyware places on system Popular software
Lavasoft: Ad-Aware SE
Spybot: Search & Destroy
Firewalls:
Windows Firewall
81
run a wizard or navigate through the Network Connections folder to
turn it on manually.
82
To help decrease your security risk:
If the program (or service) that you want to allow is not listed
83
1. Click Add Program.
2. In the Add a Program dialog box, click the program that
you want to add, and then click OK. The program will
appear, selected, on the Exceptions tab, under Programs
and Services.
3. Click OK.
If the program (or service) that you want to allow is not listed in the
Add a Program dialog box click Browse , locate the program that
you want to add, and then double-click it. (Programs are usually
stored in the Program Files folder on your computer.) The program
will appear under Programs , in the Add a Program dialog box.
84
Other Methods:
Content-filtering
Intrusion-detection Software
Close your Internet connection when not using it
Make sure connection is secure when inputting for example credit card
number
http:// Addresses can be trusted as secure.
Windows Update:
You might need to have a computer administrator account to
perform some tasks. Windows Update is the online extension of
Windows that helps you keep your computer up to date. Microsoft
offers important updates-which include security updates and other
critical issues—to help protect your computer against new viruses
and other security threats that can spread over the Internet or a
network. Other updates contain enhancements such as upgrades and
tools that can help your computer run more smoothly. Windows
Update scans your computer and provides you with a tailored
selection of updates that apply only to the software and hardware
on your computer.
To open Windows Update, click Start, click All Programs, and then
click
Windows Update.
The first time you go to the Windows Update Web site, click
Yes when prompted to install any required software or
controls.
To use Windows Update, you need to establish a connection to the
Internet.
85
For more information, click Related Topics.
Procedure:
TASK 9:
To create project certificate, Features to be covered:-Formatting Fonts in word, Drop
Cap in word, Applying Text effects, Using Character Spacing, Borders and Colors,
Inserting Header and Footer, Using Date and Time option in both LaTeX and Word.
PURPOSE:
To create a document applying the above mentioned techniques.
86
THEORY:
Header and Footer:
1. To create a header, enter text or graphics in the header area or click button
on the header and footer tool bar.
2. To create footer, click switch between header and footer.
3. Then click exit.
Date and Time:
Insert a date field that automatically updates so that the current date is displayed when
you open or print the file.
Insert a time field that automatically updates so that the current time is displayed
when you open or print the file.
Border:
87
Finally, click OK.
Color:
88
On the view menu, click header and footer option. From dialogue box, make the
required changes and then click OK.
On the format menu, click borders and shading s make required changes and the click
OK.
Select the text you want and make the different color. Click on right of the font color
button,
Then select the color you want and then click on the button.
Viva Questions:
1) What are the benefits of MS-Office?
2) What is a word processor?
3) Explain the basic features of Ms-word
4) How can you save a document?
5) What is the function of tile bar, menu bar, and status bar, tool bar?
TASK 10:
89
Formatting Styles, Inserting table, Bullets and Numbering, Changing Text Direction,
Cell alignment, Footnote, Hyperlink, Symbols, Spell Check and Track Changes.
PURPOSE:
To create a document applying the above mentioned techniques.
THEORY:
Table:
Aligns contents written in a table in the top left corner or top right corner or in
the center etc...
Foot Note:
Foot notes are used to comments on, or provide references for text in a
document.
90
Hyperlink:
You may not be able to enter certain symbols into your word document, as
there is a limitation on the keys on the key board. Creating these new symbols especially
when working with mathematical terms it becomes very difficult .For example we can insert
symbols such as,,, ..
Spell check:
91
It automatically checks for spelling and grammatical errors
Bullets and Numbering:
Formatting Styles:
A style is a set of rules to be followed for the effective document. Style can be
applied to text, paragraph, table or a list.
Changing text direction:
92
You can change the text orientation in drawing objects, such as text boxes,
shapes, and callouts, or in table cells so that the text is displayed vertically or
horizontally.
Track changes:
Track changes are an excellent feature of Microsoft word as it enables a user
or reviewer to keep track of the changes that have taken a period. Changes like insertion,
deletion or formatting changes can be kept track of.
Procedure:
Changing Text direction:
1. Click the drawing object or table cell that contains the text you want to change.
2. On the Format menu, click Text Direction.
3. Click the orientation you want.
Table:
93
3. Under Table size, select the number of columns and rows.
4. Under AutoFit behavior, choose options to adjust table size.
5. To use a built-in table format, click AutoFormat.
Select the options you want
Hyper link:
Select the text or picture you want to display as the hyperlink, and then click Insert Hyperlink
on the Standard toolbar
Do one of the following:
1. Link to an existing file or web page:
1. Under Link to, click Existing File or Web Page.
2. In the Address box, type the address you want to link to or, in the Look in box,
click the down arrow, and navigate to and select the file.
2. Link to a file you haven’t created yet
Under Link to, click Create New Document.
3. In the Name of new document box, type the name of the new file.
4. Under When to edit, click either Edit the new document later or Edit the new
document now
94
Bullets and Numbering:
1. Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then press
SPACEBAR or TAB.
2. Type any text you want.
3. Press ENTER to add the next list item.
Word automatically inserts the next number or bullet.
4. To finish the list, press ENTER twice, or press BACKSPACE to delete the last bullet
or number in the list
Formatting Styles:
95
TASK 11:
Create a Newsletter. Features to be covered:-Table of content. Newspaper columns,
Images from files and clipart, Drawing toolbar and Word Art, Formatting Images,
Textboxes and Paragraphs.
PURPOSE:
To create a news Letter
THEORY:
Table of contents:
Table of contents displays a list of headings in a created document. It basically
provides an outline of the entire document created
Newspaper columns:
96
Inserting a picture (graphic) from a file and clipart may be required for a
document. This picture could be a scanned photograph or any other digitally produced one.
These pictures can be modified, resized, cropped and enhanced.
Drawing toolbar and Word Art:
One can create his/her own drawings in Microsoft word.Ms word provides a
full fledged drawing tool bar.
Word Art in Microsoft word enables you to create special and decorative text.
Formatting Images, Textboxes and Paragraphs:
97
Formatting an image includes selecting appropriate color, size, layout and
cropping.
Generally the text in a document follows a standard orientation (line after
line). A text box provides a different orientation to the text with in a document. It can arrange
the text in any where and can be resized and moreover moved to any section of the document
or even outside.
When you are formatting a paragraph, you do not need to highlight the entire
paragraph. Placing the cursor any where in the paragraph enables you to format it. After you
set a paragraph format, subsequent paragraphs will have the same format unless you change
the format
PROCEDURE:
Table of contents:
1. Click where you want to insert the table of contents.
2. On the Insert menu, point to Reference, and click Index and Tables.
3. Click the Table of Contents tab.
4. To use one of the available designs, click a design in the Formats box.
5. Select any other table of contents options you want.
Newspaper columns:
1. Select the entire or part of document to be converted into a newsletter-style
2. Click on format menu, select columns
98
3. Any desired number of columns are presets-one or two or three or left or right b\can be
selected.
4. Width and spacing can be fixed and equal columns width can be checked for uniformity
5. If newspaper columns are to be separated by a line, then check line between
6. Under apply to will be whole document if entire document is selected else we have to
select a selected text.
7. Click ok
Inserting images from files and clip art:
1. Click where you want to insert the picture.
2. On the Insert menu, point to Picture, and then click From File.
3. Locate the picture you want to insert.
4. Double-click the picture you want to insert.
CLIP ART:
1. On the Insert menu, point to Picture, and then click Clip Art.
2. In the Clip Art task pane, in the Search for box, type a word or phrase that
describes the clip you want or type in all or some of the file name of the clip.
3. To narrow your search, do one or both of the following:
To limit search results to a specific collection of clips, in the Search in
box, click the arrow and select the collections you want to search.
To limit search results to a specific type of media file, in the Results
should be box, click the arrow and select the check box next to the
types of clips you want to find.
4. Click Go.
5. If you don't know the exact file name, you can substitute wildcard characters for
one or more real characters. Use the asterisk (*) as a substitute for zero or more
characters in a file name. Use the question mark (?) as a substitute for a single
character in a file name.
6. In the Results box, click the clip to insert it.
Drawing Toolbar and Word Art:
1. Click in your document where you want to create the drawing.
2. On the Insert menu, point to Picture, and then click New Drawing.
A drawing canvas is inserted into your document.
3. Use the Drawing toolbar to add any shapes or pictures that you want.
WORD ART:
99
1. On the Drawing toolbar, click Insert WordArt .
2. Click the WordArt effect you want, and then click OK.
3. In the Edit WordArt Text dialog box, type the text you want.
4. Do any of the following:
To change the font type, in the Font list, select a font.
To change the font size, in the Size list, select a size.
To make text bold, click the Bold button.
To make text italic, click the Italic button.
Formatting Images:
1. Formatting of the images can be achieved by selecting the image and double click on the
picture, format picture dialog box appears.
2. The same can be achieved by selecting the tools menu customizetool bars
tabpicture and click close.
Basic formatting features of an image
Resize a drawing
1. Select the drawing canvas
2. On the Drawing Canvas toolbar, do one of the following:
o To make the drawing canvas boundary larger without changing the size of the
objects on the canvas, click Expand.
o To make the drawing canvas boundary fit tightly around the drawing objects or
pictures, click Fit.
o To scale the drawing and make the objects and canvas proportionately smaller or
larger, click Scale Drawing, and then drag the edges of the canvas.
100
Crop a picture
Text Box:
101
Viva questions:
1) Define undo, redo
2) What is the main Purpose of a drop cap?
3) What are footnotes and end notes?
4) How can you print a document ?
5) How can you make alignment of text in a table?
TASK 12:
Creating a Feed Back Form:-Features to be covered: Forms, Text Fields, Inserting
objects and Mail Merge in Word.
PURPOSE: To create a Feed Back form, text fields, inserting objects, mail merging,
THEORY:
Forms:
Using Microsoft word one can create an organized and structured document with a
provision to enter the required information into it. A document of such nature is called a
form.
Mail Merge:
102
It helps us to produce from letters mailing labels envelopes catalogs and others types
of merged document. It is so found in the tools option on the menu bar. In tools we have
letters and mailing. In letters and mailing we have mail merge mail merge tool box envelopes
tables and letters wizard. In mail merge select the required document you are working on. A
window for customizing the data base structure appears. This file contains the names, address
details with contact numbers etc of people you wish to send the letters.
Inserting objects:
Insert an object such as drawing word art text effects or an equation at the inserting
point.
Fields:
It inserts a field at the inserting font fields are used to insert a variety of information
automatically. Select table in table select insert. In that select insert table a box containing
number of rows and columns will appear. Select six colors and four rows and click o.k. Given
the first row as date, problem repeated student’s signature action recommended problem
status and councilors sign. Insert the objects in the feed back form and apply the text fields in
the
form.
PROCEDURE:
Mail Merge:
1. Open a document and type the complete body of the letter and format it as
required.
103
2. Create a data source and choose mail merge from tool bar a window is displayed.
3. Click on create button and choose from letter options. Then a window is displayed.
4. Click active window choose currently active document. Click on data and create
data source option.
5. A window for customizing the data base structure appears and this file contains the
names address details with contact number etc. we can add or remove fields from
this file.
6. Once the list of fields is finalized a window of same is displayed and types the
required file names and click on save button.
7. A window is displayed. Type the details of 10 candidates. After typing details of
one person, click on add menu.
8. Click on the o.k. to finish entering the records mail merge tool bar is displayed.
9. Place the curser at the place where you wish to insert names and click on insert
mail merge button. A drop list is displayed all fields created would be shown.
10. By highlighting to desired file and click on it we can insert the field into the main
document and go to begin the mail merge click on mail merge.
11. A window is displayed click once on the merge button to generate letters for all
records in your data source file.
Forms:
1. Design the form by sketching a layout first, or use an existing form template as a
guide. Tables, text boxes, borders, and shading are all design elements that can help
you create a well-designed form that's easy to use.
104
2. In the Apply to box, click Whole document.
3. Click Line Numbers.
4. Select the Add line numbering check box, and then select the options you want.
Viva Questions:
1) What is the functionality of print payout view?
2) How can you insert a picture from another file?
3) How can you start a mail merge?
4) How can you customize a mail merge?
5) What is a mail merge?
TASK 13:
Calculating GPA-Features to be covered-Cell Referencing, Formulae in excel – average,
std. deviation, Charts.
PURPOSE:
To maintain a control chart for printing books with given data.
THEORY:
105
3. In the tools menu click options and then click chart tab.
4. To show all worksheet data in the chart even if some rows and columns are hidden,
clear the plot visible cells by check box.
5. To prevent hidden rows and columns from displaying in the chart, select the plot cells
only check box.
Hyper Linking:
1. Create a worksheet: On the file menu, click new, and then click blank workbook
task pane.
2. Insert a worksheet: C lick worksheet on the insert menu. Right click on sheet tab
and then click insert double click the template for the type of sheet you want.
3. Hyperlink: Using hyperlink we can insert one more sheet in the present sheet
4. Count function: Create a blank worksheet press control +c. In the worksheet select
cell A and press control +c. On the tools menu point to formula auditing and then
click formula auditing menu.
Worksheet:
106
1. In the file menu go to menu then a new worksheet is created.
2 To add a single worksheet, click worksheet on the Insert menu. To add
multiple worksheets hold down shift and then click the number of worksheet tasks to add in a
open workbook
Sort:
107
4. Click any other sorting option you want.
PROCEDURE:
Formulae in Excel:
First click on start button at the bottom of the screen on status bar. Click on programs
and then on Microsoft excel. Then open a new document. Give the main heading and
subheading by changing the size so that they look in block letters. Enter the data. To calculate
go to Insert menu in the menu bar and then click on function and then ok. Then select the data
to which you want to calculate mean. Then you get the required answer. In same way, sample
means standard deviation lower count limit and upper count limit. Go to insert menu and
click on function and select the required operation to be done and select the data and
calculate. Formulas for all the above are given below.
Hyper linking:
108
First click on start button of the screen on status bar. Click on programs and then
Ms-excel. To get a new blank worksheet go to programs and then click on excel sheet.
Rename the first sheet as student by right clicking on sheet 1 and renaming. Insert hyperlink
insert and click on hyperlink. Then go to sheet 2 and rename as CSE type in particulars of
ECE right click on sheet 3. Then go to sheet -4 rename as IT. In this type all the four sheets
are created.
First click on start button at the bottom of the screen on status bar. Click on
programs and then Ms-excel. Then enter the data as given. Enter the student’s names,
Subjective wise marks, total and avg. Then calculate the total and avg by using formula. Then
go to Data menu and click sort. Under first key sort, click custom sort order needed i.e.
ascending order or alphabetical order and then click o.k. Then the required worksheet is
prepared,
109
Viva Questions:
1) What is an average function?
2) Explain about chart
3) How can you open chart wizard?
4) Explain about chart formatting tool bar
5) How can you resize a chart?
TASK 14:
PPT Orientation, Slide Layouts, Inserting Text, Word Art, Formatting Text, Bullets
and Numbering, Auto Shapes, Lines and Arrows in PowerPoint.
TITLE:
Create a power point presentation consists of slide layouts inserting text,
formatting text, bullets and numbering of five slides with following information’s.
110
Slide 1 – contents
Slide 2 – Name
Slide 3 – Address
Slide 4 – Hobbies
Slide 5 – Friends
PURPOSE:
To maintain a PowerPoint presentation with some specifications
THEORY:
SLIDE LAYOUT:
1. On the format menu, click slide layout.
2. On the slides tab in normal view, select the slides; you want to apply a layout too.
3. In the slide layout task pane, point to layout you and then click it.
4. A new slide can also be inserted within the task pane. Point the layout you want
the slide to have, click the arrow and then click the insert new slide.
INSERT TEXT:
111
6. To make the symbol command available, in normal view, place the insertion point
on the outbox tab or in a text place holders on the slide.
7. On the insert menu, click symbol.
8. To change fonts, click a name in the font box.
FORMATTING TEXT:
112
1. Select the lines of text that you want to add bullets or numbering to.
2. Click bullets or numbering.
AUTOSHAPES:
1. Select the auto shape that has the text you want to position.
2. Double-click the selection rectangle of the auto shape or text box and then click
the text box tab in the format dialog box.
3. In the text anchor point box, click the position you want the text to start in.
LINES AND ARROWS:
113
4. To change the colors, patterns or lines, select the options you want.
5. To specify a fill effect, click fill effect and then select the options you want on the
gradient, text patterns or picture tabs.
Viva Questions:
1) Explain about power point
2) What is word art?
3) Explain about slide transition
4) How can you rotate the picture in power point?
5) What are the different auto shapes available in power point?
TASK 15:
Hyperlinks, Inserting –Images, Clip Art, Objects, Tables and Charts
TITLE:
Create a power point presentation consisting of hyperlinks, inserting images, clip
art, audio, video objects of 4 slides with the following information.
114
HYPERLINK:
1. Select the text or object that you want to represent the hyperlink.
2. Click insert hyperlink.
3. Under link to, click place in this document.
INSERT IMAGES:
115
1. Click where you want to insert the picture.
2. On the drawing tool bar, click insert picture.
3. Locate the folder that contains the picture that you want to insert, and then click
the picture file.
CLIP ART:
116
CHART:
1. Click the slide where you want to place the embedded object.
2. On the insert menu, click chart.
3. Click a cell on the data sheet and then type the information you want.
Viva Questions:
1) Define hyper link
2) Define slide show
3) Define slide transition
4) What is animation
5) How can you insert a table in power point?
117