0% found this document useful (0 votes)
5 views42 pages

Itws Notes 1

Uploaded by

Sid kulkarni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views42 pages

Itws Notes 1

Uploaded by

Sid kulkarni
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

ITWS NOTES

1. Identify the peripherals of a computer, components in a CPU and its functions. Draw
the block diagram of the CPU along with the configuration of each peripheral and submit
to your instructor.
AIM: To identify the peripherals of a computer, assemble and disassemble
the system.

Software Requirement: No Software Required.

Hardware Requirement: Desired Configuration for the above task is


• System unit
• CPU
• Mother Board
• FDD
• CD ROM Drive
• HDD
• Ethernet Card
Monitor, Keyboard, Mouse & Speakers

1. computer cases/chassis
This is the housing that helps protect and organize all the components that make up your
computer.

2. Processor/CPU
It was first developed by Intel in 1974. The computer cpu is responsible for handling all
instructions and calculation it receives from other hardware components in the computer and
software programs running on the computer. CPU is the central processing unit contains the
heart of any computer, the processor. The processor is fitted on to a mother board. The mother
board contains various components, which support the functioning of a pc.
3. system board/motherboard
which holds the processor, random access memory and other parts, and has slots for
expansion cards

4. Hard drive
computer's main storage media device, also called a hard disk drive or abbreviated as hd or
hdd

5. Memory stick
also known as an USB flash drive, is a portable memory disk, a small device (about the size
of your index finger) that connects to a computer's USB port and often is capable of storing
512mb, 1 GB, or more
6. Keyboards
Keyboard is one of the main input devices used on a computer, a pc's keyboard looks very
similar to the keyboards of electric typewriters, with some additional keys.

7. Mouse
Mouse is an input device that allows an individual to control a mouse pointer in a
graphical user interface (GUI). Utilizing a mouse a user has the ability to perform
various functions such as opening a program or file and does not require the user to
memorize commands, like those used in a text-based environment such as ms-dos.

8. Memory/ram
Is a term commonly used to describe the memory within a computer
9. Blank media & mass storage
It refers to cd and dvd disc. Cd, a compact disc is a flat round storage medium that is read by a
laser in a cd-rom drive. The standard cd is capable of holding 72 minutes of music or 650 mb
of data. 80 minute cds are also commonly used to store data and are capable of containing 700
mb of data.

10. Digital versatile disc or digital video disc, dvd or dvd-rom


Is a type of disc drive that allows for large amounts of data on one disc, the same size
of a standard compact disc.

11. Modems

A hardware device that enables a computer to transmit and receive information over
telephone lines.
12.Monitor & display
This a video display screen and the hard shell that holds it and use to view or watch over
someone or something.

13.Network card
Network interface card, a nic, also referred to as a "network adapter", is a printed circuit board
containing the necessary hardware used to connect a computer to a network or other computer.

14. Power supply


The ps is an internal hardware component used to supply the components within the computer
with power. Besides properly supplying power to the computer and all its internal components,
the power supply also converts the ac electrical current found in most standard wall sockets
throughout the United States into a lower dc voltage that the computer components use.
15. Printers
An external hardware device responsible for taking computer data and generating a hard copy
of that data. Printers are one of the most used peripherals on computers and are commonly used
to print text, images, and/or photos.

16. Scanners
hardware input device that allows a user to take an image and/or text and convert it into a
digital file, allowing the computer to read and/or display the scanned object. A scanner is
commonly connected to a computer usb, firewire, parallel or scsi port.

17. Sound cards


also known as a sound board or an audio card, a sound card is an expansion card or integrated
circuit that provides a computer with the ability to produce sound that can be heard by the user.
18. Speakers
a hardware device connected to a computer's sound card that outputs sounds generated by the
card.

19. TV tuners
A TV tuner card is a computer component that allows television signals to be received by a
computer. Most tv tuners also function as video capture cards, allowing them to record
television programs onto a hard disk.

20. UPS (uninterruptible power supply)


uninterruptible power supply, ups is a hardware device that provides a backup power source in
case of a power outage (blackout), brownout, or a surge in power. A ups provides enough power
for the computer or computers to shut down properly or to remain up during a temporary power
outage. A hardware device that supplies power to a device or appliance and enables that device
or appliance to work without a power cord.
21. Video/graphic cards
also known as a graphics card, video card, video board, or a video controller, a video adapter
is an internal circuit board that allows a display device, such as a monitor, to display images
from the computer.

22. Video projectors


A hardware device that enables an image, such as a computer screen, to be projected onto a flat
surface. These devices are commonly used in meetings and presentations as they allow for a
large image to be shown so everyone in a room can see.

23. Webcams
A camera connected to a computer or server that allows anyone connected to the internet to
view still pictures or motion video of a user.
A. Block diagram of the CPU along with the configuration of each
peripheral:
A computer can process data, pictures, sound and graphics. They can solve highly
complicated problems quickly and accurately.

Input unit:
Computers need to receive data and instruction in order to solve any problem. There for we
need to input the data and instructions into the computers. The input unit consists of one or
more input devices. Keyboard is the one of the most commonly used input device. other
commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. all the input
devices perform the following functions.

Storage unit:
The storage unit of the computer holds data and instructions that are entered through the input
unit, before they are processed. it preserves the intermediate and final results before these are
sent to the output devices. it also saves the data for the later use. The various storage devices
of a computer system are divided into two categories.
1. Primary storage: stores and provides very fast. This memory is generally used to hold
the program being currently executed in the computer, the data being received from the
input unit, the intermediate and final results of the program. The primary memory is
temporary in nature. The data is lost, when the computer is switched off. In order to
store the data permanently, the data has to be transferred to the secondary memory. The
cost of the primary storage is more compared to the secondary storage. There fore most
computers have limited primary storage capacity.
2. Secondary storage: secondary storage is used like an archive. It stores several programs,
documents, data bases etc. the programs that you run on the computer are first
transferred to the primary memory before it is actually run. Whenever the results are
saved, again they get stored in the secondary memory. The secondary memory is slower
and cheaper than the primary memory. Some of the commonly used secondary memory
devices are hard disk, cd, etc.

Memory size:
All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is
represented by an 8 bit code.The set of 8 bits is called a byte. A character occupies 1 byte space.
A numeric occupies 2 byte space. Byte is the space occupied in the memory.The size of the
primary storage is specified in kb (kilobytes) or mb (megabyte). One kb is equal to 1024 bytes
and one mb is equal to 1000kb. the size of the primary storage in a typical pc usually starts at
16mb. Pcs having 32 mb, 48mb, 128 mb, 256mb memory are quite common.

Output unit:
The output unit of a computer provides the information and results of a computation to outside
world. Printers, visual display unit (vdu) are the commonly used output devices. Other
commonly used output devices are floppy disk drive, hard disk drive, and magnetic tape drive.

Arithmetic logical unit:


All calculations are performed in the arithmetic logic unit (alu) of the computer. it also does
comparison and takes decision. the alu can perform basic operations such as addition,
subtraction, multiplication, division, etc and does logic operations viz, >, <, =, ‘etc. whenever
calculations are required, the control unit transfers the data from storage unit to alu once the
computations are done, the results are transferred to the storage unit by the control unit and
then it is send to the output unit for displaying results.

Control unit:
It controls all other units in the computer. The control unit instructs the input unit, where to
store the data after receiving it from the user. It controls the flow of data and instructions from
the storage unit to alu. It also controls the flow of results from the alu to the storage unit. the
control unit is generally referred as the central nervous system of the computer that control and
synchronizes it’s working.

Central processing unit (CPU)


The alu and the cu of a computer system are jointly known as the central processing unit. You
may call cpu as the brain of any computer system. It is just like brain that takes all major
decisions, makes all sorts of calculations and directs different parts of the computer functions
by activating and controlling the operations.
The control unit and alu of the computer are together known as the central processing unit
(cpu).The cpu is like brain performs the following functions:
• it performs all calculations. •it takes all decisions. •it controls all units of the
computer.
a pc may have cpu-ic such as intel 8088, 80286, 80386, 80486, celeron, pentium, pentium
pro, pentium ii, pentium iii, pentium iv, dual core, and amd etc.
2. Every student should disassemble and assemble the PC back to working condition. Lab
instructors should verify the work and follow it up with a Viva. Also students need to go
through the video which shows the process of assembling a PC. A video would be given as
part of the course content.

Computer assembling and troubleshooting:


For many, building a computer is scarier than working on a car. Saving money isn’t the only
benefit to building your own computer. In addition, you will acquire knowledge otherwise
required for an upgrade further down the road. You’ll also get exactly what you want. Before
you can sit down at your new computer desk though, you’ll need to actually build the system.
Piecing a computer together may sound like a tough task, but if you take a couple of
precautions, there is nothing to worry about. Most components include warranties and a toll-
free number. If you suspect a particular piece of hardware is causing dissention in the ranks,
don’t hesitate to ask for help.

Before We Begin:
In order to ensure everything goes smoothly, gather a few important tools. A head screwdriver
is a must and needle-nosed pliers are often helpful. Buy quality thermal grease to keep the
processor in contact with the heat sink. If you don’t have an anti-static wrist band, make a
conscious effort to touch a ground point every so often (exposed metal on the case works fine)
to keep electrostatic discharge from damaging any of your components.

Step 1: Case Preparation


You need to make sure your case is ready to accept the insides of a computer. After opening
the empty case (usually accomplished by removing two screws on one side), lay the case on its
side, so the motherboard can be dropped into place. If the case includes screws and cables, take
those out and set them aside. There should be a set of copper colored spacers in the bag of
screws – we’ll use those to mount the motherboard above the metal plate on the side of the
case. You may need to lay your motherboard down in the case to determine where the copper
spacers are needed, but be extra careful – if you add a spacer that doesn’t correspond to a
mounting hole in the motherboard, you risk a short-circuit.
Next, you want to check the thin, metal plate towards the rear of the case that includes holes
for the PS/2, serial, parallel, and USB ports. If it matches the configuration of your
motherboard, you’re set. If not, you’ll need to remove the plate by sliding it out. Again, be
careful; the sides of the plate are sharp. Once the proper plate is in place, set the case aside for
a moment and focus on the motherboard.

Step 2: Populate the Motherboard


Working on a motherboard that has already been mounted can get tricky, so it is best to install
the processor and memory before the board is installed in a case. Both the Pentium 4 and Athlon
XP plug into a processor socket with no force, so there should be no reason to apply pressure
when installing the processor. First, lift the arm adjacent to the socket. Then align the processor
with the socket according to the pattern of pins on the socket interface. There is only one way
the processor will fit, so again, do not apply pressure while inserting the chip. Finally, close the
arm, securing the processor on the motherboard. Now, using the thermal grease mentioned
previously, apply a thin film over the processor’s core.
The process isn’t nearly as graceful for Athlon XP owners. In fact, be forewarned that the
processor core is sensitive to pressure, so if you feel you may be pushing too hard to affix the
heat sink, take a quick break to re-evaluate your strength, tough guy. There is only one way
that a Socket A heat sink should fit, so be sure that the larger end of the socket aligns with the
cut-out section of the heat sink. One end will clip easily onto the motherboard, while the other
will require more persuasive coercion. In the following picture, I’ve demonstrated a technique
for attaching a heat sink. Use a screwdriver to push down on the clip while pulling outwards
with a set of pliers.

Step 3: Fixing Memories:


Depending on what type of motherboard you’ve got, there may be some variation in how
memory is installed. Still, there are a few general rules of thumb you’ll want to abide by. First,
don’t immerse the modules in water.
Second, pay close attention to the type of RAM supported by your motherboard. Some boards
support both PC133 and DDR memory, but the majority is constrained to a single standard. If
DDR is your poison of choice, note that the modules will only fit into the 184-pin slots one
way. Boards that support 16-bit RDRAM require that two modules be used at a time. If the
board has four slots and you’ve only got two modules, be sure that the remaining two are
terminated with a CRIMM module (usually included with i850 motherboards). The installation
process itself is simple: pull the plastic clips on each end of the slot, inset the module according
to the slot’s keying, and apply equal force to the entire module until it clicks into place. Repeat,
if necessary.
Step Four: Fixing your motherboard
Since the motherboard now houses a processor and memory, it can be installed in the already-
been-prepped case. Line up the mounting holes with the copper spacers and use the included
screws to mount the board. Now that your custom machine is taking shape, it may be a good
time to step back for a break. Relax, meditate, take some pictures, watch Friends, or have a
Big Blue Banana.

Step Five: Prepare the Cables


Most motherboards include two IDE cables and a floppy drive connector. While the interior of
the case is still clean (thus reasonably accessible), attach the cables to the motherboard. Note
that one end of the cable has two connectors close together – this end attaches to your IDE
device of choice, while the other end goes to the motherboard. Each cable should be marked
with a red wire to indicate Pin 1. It is imperative to match Pin 1 on the cable with Pin 1 on the
motherboard and again with Pin 1 on the hard disk drive or CD- ROM. Conventional IDE
cables are fine for the most part, but in the interest of cleanliness, we’ve developed a soft spot
for round cables. Not only do these cables take up less room, but they are also easier to tuck
away, promoting better air flow throughout your case.
Step Six: Install Your Media
With the cables out of the way, you can now install your hard disk drive, CD-ROM drive and
floppy disk drive. First, you’ll want to make sure each drive is designated as a ‘master’ or
‘slave’ drive using the jumpers on the back of each drive. If you’ve got one hard drive and one
CD-ROM, you’ll see the best performance from both devices if each is installed onto its own
channel. In that case, both drives can be set as ‘masters.’ With the addition of a CD-RW drive,
you would want to assign one drive as a ‘master’and one as a ‘slave,’
leaving the hard drive on its own channel. Now, you’re ready to add a CD-ROM drive. You
may have a metal panel preventing you from inserting the drive into a 5.25" slot. If so, remove
the panel by rocking it back and forth until it comes loose. If your case uses rails, attach them
to the drive and slide it into the chassis. Otherwise, use the included screws to secure the drive.

The floppy drive can be installed using the same method, only use one of the external 3.5" inch
bays. Attach the appropriate cable and secure the drive using the same small screws.
Finally, install your hard disk drive in an internal 3.5" bay. Many cases sport detachable disk
drive bays that often ease installation, but if we were really looking for the easy way out, we
would have picked up a G4 Cube. Attach the ends of each
cable to the corresponding drive. For instance, the end of the primary IDE cable should run to
the hard drive. Similarly, the end of the secondary cable
should go to the secondary ‘master’ drive, while the second connector attaches to the secondary
‘slave.’

Step Seven: Cards


Expansion cards add capabilities beyond what integrated sound and graphics can do.
Additionally, you can buy cards that add SCSI, USB 2.0, Gigabit networking – even cable
television support!Unless your new system is to be used exclusively for business, it’s a safe bet
that a new graphics card will find its way into your AGP slot (the brown one in the middle of
the motherboard). Nowadays, graphics cards are cooled by heat sinks and fans, much like
processors. It should come as no surprise, then, that high-end cards generate lots of heat. When
I build a computer, I typically leave the white PCI slot closest to the video card empty for plenty
of air flow. Installing the card itself is a snap – position the card over the slot and push down
gently until it is fully inserted. Use one of the screws included with the case to secure the card
to the chassis. Use the same procedure to install each of your other cards. If you haven’t yet
purchased them, consider an upgraded sound card and network card, at the least.
Step Eight: Connecting the Connectors
In order for your computer to turn on when you hit the power button, you need to connect the
switches and light emitting diodes (LEDs) from your case to the motherboard. The connectors
themselves are usually labeled, but it can be a little harder to locate the pins on the motherboard.
Your best source for this data is the manual included with the board. Once you have the
connectors, well, connected, we can move on to the next step. Don’t worry; we’ll test the lights
and switches a little later.Dont forget refer to the motherboard manual while connecting the
connectors
.

Step Nine: Power supply


We’ve waited a long time for this – simply, I have no desire to play with hardware actively fed
by an electrical socket. I have no desire to look like Carrot Top, so I never add power until I’m
done under the proverbial hood. We’re pretty much done though, so go ahead and connect the
large 4-pin power connectors to the hard disk drive and CD-ROM drive. The small 4-pin Molex
connector is required for the floppy disk drive.
If you’ve got a Pentium 4 processor, not only will you need to connect the ATX power
connector, but you’ll also require a 4-pin 12V auxiliary connector. Athlon XP-compatible
motherboards only need power from the standard ATX connector. At this point, feel free to
connect the case’s power supply to a wall socket
Step Ten: Check Properly
Before you put the cover back on the case, it would be wise to test the machine. Connect a
keyboard and mouse to the motherboard and a display to the video card. Press the power button
and immediately hit the ‘Delete’ key to enter the motherboard’s BIOS. Check the front of the
case to ensure both the power and hard drive lights are functioning (you will probably need
disk activity before you can check the hard drive LED). Eject the CD-ROM tray to check power
to the drive. Finally, check the BIOS to make sure the drives are configured as you originally
intended. This, unfortunately, is where we part ways – for tips on configuring your BIOS,
reference your motherboard’s manual.
Hopefully you haven’t electrocuted yourself. I think you’d agree that building a new computer
is a learning experience, regardless if it’s your first time or fiftieth. There is always something
that can go wrong, and if you build new machines for long enough, anything and everything
will happen. If things don’t go your way the first time, be patient and troubleshoot the problem.
Always remember to keep manuals of all components with you while fixing your PC
Assembling and disassembling a personal computer
Requirements: A CPU with Intel G31 Mother board, 250 GB Hard Disk, Processor, Data
Cables, SMPS, DDR2 2-GB RAM, DVD Drive etc..
Step 1: Preparing and chasing according to the mother board
Step 2: place the ID shield in the cabinet
Step 3: Installing the mother board
Step 4 : Place the motherboard in the cabinet according to the ID shield.
Step 5: Fix the motherboard with screws.
Step 6: Installing the processor
Step 7: first unlock the level of the processor
Step 8: Insert the processor according to the PIN indicator by applying Zero external force on
the Processor.
Step 9: lock the processor by using the locking levers.
Step 10: Installing the heat sink & fan
Step 11: lock the heat sink and fan units using the locking levers.
Step 12: Provide the power supply to the fan by inserting the fan power connector to the
motherboard.
Step 13: installing RAM
Step 14: Identifying the type of RAM (SD, DD)
Step 15: Insert the SD-RAM into respective slot.
Step 16: verify whether the two ends of the RAM got locked or not
Step 17: Installing the SMPS into the cabinet and fill the screws.
Step 18: Installing the ATX power connector into the mother board.
Step 19: Installing the hard disk drive (HDD) into the specific slot provided by the hard disk.
Step 20: Insert the data cable into the motherboard and the hard disk.
Step 21: we have to provide power supply to the hard disk by force pin connectors from
SMPS
Step 22: Installing the floppy disk drive into the respective slot provided in the cabinet.
Step 23: Insert the floppy drive connector into the mother board and to the floppy drive.
Step 24: we have to provide power supply to the floppy disk drive from the SMPS.
Step 25: Installing the CD-ROM drive
Step 26: Connect the data cable into the motherboard and the CD-ROM drive.
Step 27: Provide the power supply to the CD-ROM drive from the SMPS.
Step 28: Installing the LAN card into the PCI slot provided in the motherboard.
Result: The given task of dissembling and assembling a personal computer is done.

Viva Questions:

1) Define assembling of a system?


2) Explain the steps involved in the installation of the mother board
3) What is the use of pin 1 indicated on the processor?
4) What is the use of locking level at the processor slot?
5) Define a port?
6) Define a computer?
7) Define hardware and software?
8) What are the functional units of a computer?
9) Define the following: ram, rom, bios, bus and program.
10) What is the use of a mother board?
3.Every student should individually install MS Windows on the personal computer Lab
instructor should verify the installation.
AIM: To install Windows XP
Software Requirement: Windows XP Compact Disc
Hardware Requirement: Personal computer
Windows 7 installation step by step
In order to install your copy of the windows 7 operating system, please make sure to have the
following items:
 Windows 7 installation disk.
 Drivers cd: * use after installation process if needed.
 Note: please make sure to back up all of your important data before
proceeding with this installation.
step1: insert the windows 7 operating system disk into your dvd drive, and then restart your
computer
step2: you will see a prompt that says ‘press any key to continue’ after the zt logo
disappears. When you see this press any key immediately.
Note: the following screen shots may differ from what you may see during your installation.
(i.e. win7 version, hdd disk space etc
step3: ‘starting windows’ with the windows7 logo will appear.

step 4: language options, by default english will be set along with “time and currency
format” and “keyboard or input method”.
Step 5: click “install now”.

step 6: end user license agreement (e.u.l.a.), check the box to accept, and click “next”.
step 7: “which type of installation?” window will appear. upgrade will be greyed out; the
only option you should be able to choose is custom (advanced).

step 8: “where do you want to install windows?” make sure the partition is highlighted.

step 9: delete the partition by clicking on drive options (advanced) on the bottom right corner
of the field. make sure the partition is highlighted and click on delete. if drive advanced options
is greyed out, then the partition will not have to be deleted.
note: deleting the partitions will erase all data on the system.
step 10: disk 0 unallocated space should be the only listing at this point. if it is press next, if
not please proceed to delete any additional partitions that may be listed.

step 11: the next screen will show “installing windows”. this process should take
approximately 10 minutes after which the system will reboo.

note: do not press any keys during this boot up process so as to not disturb the rest of the
installation.
step 12: the next screen will show “installing windows” again to complete the installation
process.
step 13: “setup is starting windows” will appear on the screen, then you will be asked to
create a user name and a computer name.

step 14: the next step will prompt you to create a password for your account (optional).

step 15: the next screen will come up and ask you to choose one of three options: “use
recommended settings”, “install important updates only” and “ask me later”.
step 16: this screen will allow you to choose your local time zone and also adjust the date and
time.

step 17: click on the appropriate location of your computer to enable windows 7 to apply the
correct network settings.

The installation is done! you have successfully installed windows 7 on your computer.
Viva questions:
1) What do you mean by open source OS?
2) What do you mean by dual boot systems?
3) Explain the main purpose of an operating system?
4) What is NTFS?
5) What is the purpose of creating partitions for a Windows operating system?
6) What is the advantage of open source.
INTERNET AND WORLD WIDE WEB
4. Search engines & netiquette: students should know what search engines are and how
to use the search engines. a few topics would be given to the students for which they need
to search on google. This should be demonstrated to the instructors by the student.

Aim: To know about what is a netiquette, search engine and how to use a search engine and
also to know what are various threats in internet and how to configure the system so as to make
it safe in internet.

Software Requirement: Local Area Network to access the Internet.


Hardware Requirement: Personal computer.
Procedure:
Netiquette: netiquette means network etiquette, the do's and don'ts of online
communication. Netiquette is also defined as a set of rules talking about your online behavior
and simple rules that one should follow.
 to have a good netiquette here are three tips to keep in mind:
 We can show emotions etc..., while writing mails to others using the feature
“emoticons”.
 We can also use short hands and abbreviations while writing mails to others.
 Example: short hands are lol(laughing out loud), imho(in my humble
opinion), btw(by the way), np(no problem).
 Keep in mind that representing who you are while writing mails.
 Never send anything that will reflects badly on you or anyone.
 Don’t type the mails in all caps or in all small letters as it makes recipient
more difficult to read.
 Write clear, organized messages with subject line that gives enough
information for the reader to file it and find it later.

Search engine:
Software that lets the user to specify the search terms. The search engine then finds the websites
that contains those search terms. Overtime a search engine builds a database of searchable
terms that can be matched to the websites.
A web search engine is a software system that is designed to search for information on the
World Wide Web. The search results are generally presented in a line of results often referred
to as search engine results pages. The information may be a mix of web pages, images, and
other types of files. Some search engines also mine data available in databases or open
directories. Unlike web directories, which are maintained only by human editors, search
engines also maintain real-time information by running an algorithm on a web crawler.
Example: www.google.com, www.altavista.com, www.ask.com, www.askjeeves.com, etc...
List of top most popular search engines in the world

 google:
Google search, commonly referred to as google web search or simply google, is a web search
engine developed by google. It is the most-used search engine on the World Wide Web,
handling more than three billion searches each day. as of February 2016, it is the most used
search engine in the us with 64.0% market share. The search engine giant holds the first place
in search with a stunning difference of 43% from second in place Bing. Google is also
dominating the mobile/tablet search engine market share with 89%!

 Bing:
Bing is a web search engine owned and operated by Microsoft. The service has its origins in
Microsoft’s previous search engines: msn search, windows live search and later live search.
Bing provides a variety of search services, including web, video, image and map search
products. It is developed by using asp.net.

 yahoo:
yahoo! search is a web search engine owned by yahoo, headquartered in sunnyvale, California.
as of February 2015 it is the third largest search engine in the us by the query volume at 12.8%,
after its competitors google at 64.5% and bing at 19.8%.

 ask.com:
ask.com (originally known as ask jeeves) is a question answering-focused e-business and web
search engine founded in 1996 by Garrett gruener and david warthen in Berkeley, California.

 aol.com:
aol (formerly a company known as aol inc., originally known as america online, and stylized
as aol) is a web portal and online service provider based in new york. it is a brand marketed by
oath, a subsidiary of verizon communications. aol was one of the early pioneers of the internet
in the mid-1990s, and the most recognized brand on the web in the us it originally provided a
dial-up service to millions of Americans, as well as providing a web portal, e-mail, instant
messaging and later a web browser following its purchase
of Netscape.

 baidu:
baidu, incorporated on 18 january 2000, is a chinese web services company headquartered at
the baidu campus in Beijing’s haidian district. it is one of the largest internet companies, and
one of the premier ai leaders in the world. the holding company of the group was incorporated
in the cayman islands. baidu offers many services, including a chinese search engine for
websites, videos, multimedia files, news, translations and other useful functions, as well as
global mapping service baidu maps.
To use search engine we need to follow some steps given as follows:
 Type the domain name for example www.google.com in the address bar (called as url)
in the internet explorer and press the return key.

 now we can see an empty text box where we can type the key words (search terms)
which is as shown in the figure below:

 Now type the keywords (search terms) in the text box without any mistake.
 Now click on the button google search, by default radio button with the label “the
web” is selected, which is appeared below the google search button.
 It will provide the websites that contain the search terms throughout the world.
 But to get only the web sites from India then select the radio button “pages from
India” which is below the radio button “I’m feeling lucky”.
 While searching the web we can use + sign in the keywords.
Result: I have successfully learned about search engine, netiquette.
Viva questions:
1) Define search engine
2) What is a spider?
3) What are popular search engines?
4) what is a meta search engine
Give the main purpose of www.
5. Cyber hygiene: students would be exposed to the various threats on the internet and
would be asked to configure their computer to be safe on the internet. They need to first
install an antivirus software, configure their personal firewall and windows update on
their computer. Then they need to customize their browsers to block pop ups, block active
downloads to avoid viruses and/or worms.
AIM: To learn various threats on the internet and configure the computer to be safe on the
internet.
Software Requirement: Antivirus Software.
Hardware Requirement: Personal computer.

Cyber hygiene:
Cyber hygiene is the establishment and maintenance of an individual's online safety. It is the
online analogue of personal hygiene, and encapsulates the daily routines, occasional checks
and general behavior Is required to maintain a user's online "health"
 It is defined as an electronic sanitation. Refers to securing a company’s systems and
networks against attacks. Hygiene is common to talk about cleaning up a system or a
pc after a virus attack.
 Threat is defined as the expressed potential for the occurrence of harmful even such as
an attack.
 Attack is defined as an action taken against target with the intention of doing harm.
 Vulnerability is defined as the weakness that makes the target to be attacked.
 There are various types of threats. some of them are: The types of computer security
threats
 Trojan:. Trojan is one of the most complicated threats among all.
 Virus. Looking at the technology 10 years back, virus is something really popular.
 Worms. One of the most harmless threats where it is program designed only to spread.
 spyware.(malicious s/w that enters a user’s computer, gathers data from the device
and user, and sends it to third parties without their consent)
 scareware.(tricks user into buying and downloading unnecessary and potentially
dangerous s/w, such as fake antivirus)
 key logger.
 Adware.(unwanted advertisements on your computer)
 Backdoor. (installing malicious s/w that creates an entry point for the attacker)
Virus:
A program written intentionally to alter the way your computer operates without your
permission or without your knowledge. a virus attaches copies of itself to other files like
documents, program files and is inactive until you run an infected program.
When activated virus may damage or delete files, cause erratic system behavior.

1. Macro virus:
 Macros are simple programs that can be written to automate the repetitive
tasks in a document or make calculations in spreadsheets.
 Macros are written in documents using ms word, in spreadsheets using ms
excel.

2. Trojan horse:
 These are the programs that appear to serve some useful purpose or provide
entertainment, which encourages you to run, which can place virus on your
computer or allow a hacker to gain access to your computer.

 By clicking on a link Trojan horse may place the virus on your computer. But
a Trojan horse is not a virus because it doesn’t replicate and spreads like a
virus.

3. Worms:
 These are programs that replicate and spread, often opening a backdoor to
allow hackers to gain access to your system that they infect.

 Worms can also spread by copying themselves from disk to disk or by e-mail.

4. Zombie:
 A zombie is a dormant program that lies inactive in your computer, which can
activated remotely i.e. zombie’s don’t normally damage the computer on
which they reside but can damage other computer.
 Zombies often arrived as email attachments and when the attachment is
opened then they install themselves secretly and then wait to be activated.

5. Phishing:
 A phishing attack is a one, when you sent an e-mail address that asks you to
click on a link and re-enter your bank or credit card details.
 Both email and the website it links appeared to be genuine but when you
entered your bank or credit card details they are then used fraudulently.
6. Spyware:
 It does not usually carry viruses but it can use your system resources and slow
down your internet connection with the display of ads.
 this will be installed with other applications usually without your knowledge,
which records your behavior on the internet, display the targeted ads to you
and can even download other malicious (hateful) software on to your
computer.
To make the internet and your system safe, we must need to install antivirus software
(example avg, norton, node32, avast etc...) on your system. Also we need to download and
install the updates of operating system frequently.

Customize the browsers to block pop ups:


Turn pop-ups on or off
1. On your computer, open chrome.
2. at the top right, click more.
3. click settings.
4. at the bottom, click show advanced settings.
5. under "privacy," click content settings.
6. under "pop-ups," select an option: do not allow any site to show pop-ups
(recommended).

block active x downloads to avoid viruses and/or worms:


1. install anti-virus/malware software.
2. keep your anti-virus software up to date.
3. run regularly scheduled scans with your anti-virus software.
4. keep your operating system current.
5. secure your network.
6. think before you click.
Many users install antivirus software that can detect and eliminate known viruses when the
computer attempts to download or run the executable file (which may be distributed as an email
attachment, or on usb flash drives, for example). Some antivirus software blocks known
malicious websites that attempt to install malware. Antivirus software does not change the
underlying capability of hosts to transmit viruses. Users must update their software regularly
to patch security vulnerabilities("holes"). Antivirus software also needs to be regularly updated
in order to recognize the latest threats.
Result: I have successfully learned about cyber hygiene and also about various threats.
Latex and word
6. Word orientation: the mentor needs to give an overview of latex and microsoft (ms)
office 2007/ equivalent (foss) tool word: importance of latex and ms office 2007/ equivalent
(foss) tool word as word processors, details of the four tasks and features that would be
covered in each, using latex and word – accessing, overview of toolbars, saving files, using
help and resources, rulers, format painter in word.

AIM: To create a document applying the above-mentioned techniques.


Software Requirement: MS-WORD
Hardware Requirement: Personal computer
Formatting fonts in word
1. Select the text you want to format.
2. click the home tab.
3. click the font dialog box launcher.
4. click the font tab, there we have different types of fonts, font style, font size, font
color, underline style, text effects options.
Drop cap
pen a document in word 2007, and select the letter you want to insert as drop cap. click on
the "insert" tab, and in the "text" group you ocan find "drop cap" button. click it, and hold
the mouse pointer over your choice to see a preview in your document.

Applying text effects (ctrl+d)


To add an effect to text.
1. Select the text that you want to add an effect to.
2. On the home tab, in the font group, click text effect.
3. Click the effect that you want. for more choices, point to outline, shadow, reflection,
or glow, and then click the effect that you want to add.
Using character spacing
1. Select the text you want to format.
2. Click the home tab.
3. Click the font dialog box launcher.
4. Click the character spacing tab.
5. Click the spacing list arrow, click an option, and then specify a point size to
expand or condense spacing by the amount specified

Borders and colors


Page border and page colors:
1. select the page layout tab.
2. in the page background group we have page borders and page color commands.
3. click either the page borders and page color. a menu appears with a list of built-in
options you can use.
4. left-click one of the built-in options, and it will appear in the document.
5. Click the “Text Box” button on the ribbon and choose the “Draw Text Box” option
from the drop-do menu. Draw the text box on the page. It appears with a basic black
Word default border. Click the t box, which opens the orange “Text Box Tools” tab.
Inserting header and footer
To insert a header or footer:
1. select the insert tab.
2. click either the header or footer command. a menu appears with a list of built-in
options you can use.
3. left-click one of the built-in options, and it will appear in the document. or.
4. left-click blank to select it.
Using date and time option
To insert the date or time into your document, follow these steps:
1. Position the insertion point where you want the date or time inserted.
2. Display the insert tab of the ribbon.
3. click date & time in the text group. ...
select a format for the date or time.
A. Using latex and word to create a project certificate. features to be covered: - formatting
fonts in word, drop cap in word, applying text effects, using character spacing, borders
and colours, inserting header and footer, using date and time option in both latex and
word.

AIM: To create a document applying the above-mentioned techniques.

Software Requirement: MS-WORD.


Hardware Requirement: Personal computer.
Creating project certificate:

Here we are creating project certificate by using all the formatting fonts (different fonts, font
sizes, using clipart for logo, text box, border for the page and some font styles.

Keshav Memorial Institute of Technology


Department of Computer Science and Engineering (CSE)

CERTIFICATE
This is the Bonafide record of the practical work done by
Mr. / Ms. Roll no. i / ii / iii /iv-year b. tech / m. tech / MBA /
Semester branch in the Laboratory during the academic year 20 20
.

Faculty in-charge Head of the department


Viva questions:
1) What are the benefits of ms-office?
2) What is a word processor?
3) Explain the basic features of ms-word
4) How can you save a document?
B. Creating project abstract Features to be covered: -Formatting Styles, inserting table,
Bullets and Numbering, Changing Text Direction, Cell alignment, Footnote, Hyperlink,
Symbols, Spell Check, Track Changes.
AIM: To create a document applying the above-mentioned techniques.
Software Requirement: Ms-word
Hardware Requirement: Personal computer
Procedure:
Changing Text direction:
1. Click the drawing object or table cell that contains the text you want to
change.
2. On the Format menu, click Text Direction.
3. Click the orientation you want.
Table:

S.NO ROLLNO NAME YEAR BRANCH


1 22BD1AO543 RAJU I CSE

1. Click where you want to create a table.


2. On the Table menu, point to Insert, and then click Table.
3. Under Table size, select the number of columns and rows.
4. Under AutoFit behavior, choose options to adjust table size.
5. To use a built-in table format, click AutoFormat .

Cell Alignment:

S.NO ROLLNO NAME YEAR BRANCH


1 22BD1AO543 RAJU I CSE

1. Click the cell that contains text you want to align.


2. On the Tables and Borders toolbar, select the option for the horizontal and vertical
alignment you want— for example, Align Bottom Center or Align Top Right.

Foot Note:

1. In print layout view, click where you want to insert the note reference mark.
2. On the Insert menu, point to Reference, and then click Footnote.
3. Click Footnotes or Endnotes.
By default, Word places footnotes at the end of each page and endnotes at the end of the
document. You can change the placement of footnotes and endnotes by making a selection in
the Footnotes or Endnotes box.
1.In the Number format box, click the format you want.
2.Click Insert.
Word inserts the note number and places the insertion point next to the note number.
1.Type the note text.
2.Scroll to your place in the document and continue typing.
As you insert additional footnotes or endnotes in the document, Word automatically applies
the correct number format.
Example: A user writes a research paper and adds a footnote to cite a source.
Smith, J. (2023). The Future of AI. Tech Press.
Hyper link:
www.google.com

Select the text or picture you want to display as the hyperlink, and then click Insert Hyperlink
on the Standard toolbar
Do one of the following: yahoo.com
1. Link to an existing file or web page:
1.Under Link to, click Existing File or Web Page.
2.In the Address box, type the address you want to link to or, in the Look in box, click the down
arrow, and navigate to and select the file
3.Link to a file you haven‘t created yet
Under Link to, click Create New Document.
1.In the Name of new document box, type the name of the new file.
2.Under When to edit, click either Edit the new document later or Edit the new document now
An e-mail address:
1. Select the text or picture you want to display as the hyperlink, and then click Insert
Hyperlink on the Standard toolbar
2. Under Link to, click E-mail Address.
3.Either type the e-mail address you want in the E-mail address box, or select an e-mail
address in the recently used e-mail addresses box.
4.In the Subject box, type the subject of the e-mail message
A specific location in another document

1. Insert a bookmark in the destination file or Web page.


2. Open the file that you want to link from, and select the text or object you want to display
as the hyperlink.
3. On the Standard toolbar, click Insert Hyperlink .
4. Under Link to, click Existing File or Web Page.
5. In the Look in box, click the down arrow, and navigate to and select the file that you want
to link to.
6. Click Bookmark, select the bookmark you want, and then click OK.

Symbols: €,¥,±,≤,∑,α,©

1. Click where you want to insert the symbol.


2. On the Insert menu, click Symbol, and then click the Symbols tab.
3. In the Font box, click the font that you want.
4. Double-click the symbol that you want to insert.
5. Click Close.

Spell check:
1. On the Standard toolbar, click Spelling and Grammar .
2. When Word finds a possible spelling or grammatical problem, make your changes in
the Spelling and Grammar dialog box.
Bullets and Numbering:
 Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then press
SPACEBAR or TAB.
 Type any text you want.
1. Press ENTER to add the next list item.
Word automatically inserts the next number or bullet.

2. To finish the list, press ENTER twice, or press BACKSPACE to delete the last bullet
or number in the list .
1. Select the words, paragraph, list, or table you want to change.
2.If the Styles and Formatting task pane is not open, click Styles and Formatting on the
Formatting toolbar
3.Click the style you want in the Styles and Formatting task pane. If the style you want is not
listed, click All Styles in the Show box

Track Changes:
1. Open the document you want to revise.
On the Tools menu, click Track Changes.
RESULT: A document is created by applying the above-mentioned techniques.

You might also like