Itws Notes 1
Itws Notes 1
1. Identify the peripherals of a computer, components in a CPU and its functions. Draw
the block diagram of the CPU along with the configuration of each peripheral and submit
to your instructor.
AIM: To identify the peripherals of a computer, assemble and disassemble
the system.
1. computer cases/chassis
This is the housing that helps protect and organize all the components that make up your
computer.
2. Processor/CPU
It was first developed by Intel in 1974. The computer cpu is responsible for handling all
instructions and calculation it receives from other hardware components in the computer and
software programs running on the computer. CPU is the central processing unit contains the
heart of any computer, the processor. The processor is fitted on to a mother board. The mother
board contains various components, which support the functioning of a pc.
3. system board/motherboard
which holds the processor, random access memory and other parts, and has slots for
expansion cards
4. Hard drive
computer's main storage media device, also called a hard disk drive or abbreviated as hd or
hdd
5. Memory stick
also known as an USB flash drive, is a portable memory disk, a small device (about the size
of your index finger) that connects to a computer's USB port and often is capable of storing
512mb, 1 GB, or more
6. Keyboards
Keyboard is one of the main input devices used on a computer, a pc's keyboard looks very
similar to the keyboards of electric typewriters, with some additional keys.
7. Mouse
Mouse is an input device that allows an individual to control a mouse pointer in a
graphical user interface (GUI). Utilizing a mouse a user has the ability to perform
various functions such as opening a program or file and does not require the user to
memorize commands, like those used in a text-based environment such as ms-dos.
8. Memory/ram
Is a term commonly used to describe the memory within a computer
9. Blank media & mass storage
It refers to cd and dvd disc. Cd, a compact disc is a flat round storage medium that is read by a
laser in a cd-rom drive. The standard cd is capable of holding 72 minutes of music or 650 mb
of data. 80 minute cds are also commonly used to store data and are capable of containing 700
mb of data.
11. Modems
A hardware device that enables a computer to transmit and receive information over
telephone lines.
12.Monitor & display
This a video display screen and the hard shell that holds it and use to view or watch over
someone or something.
13.Network card
Network interface card, a nic, also referred to as a "network adapter", is a printed circuit board
containing the necessary hardware used to connect a computer to a network or other computer.
16. Scanners
hardware input device that allows a user to take an image and/or text and convert it into a
digital file, allowing the computer to read and/or display the scanned object. A scanner is
commonly connected to a computer usb, firewire, parallel or scsi port.
19. TV tuners
A TV tuner card is a computer component that allows television signals to be received by a
computer. Most tv tuners also function as video capture cards, allowing them to record
television programs onto a hard disk.
23. Webcams
A camera connected to a computer or server that allows anyone connected to the internet to
view still pictures or motion video of a user.
A. Block diagram of the CPU along with the configuration of each
peripheral:
A computer can process data, pictures, sound and graphics. They can solve highly
complicated problems quickly and accurately.
Input unit:
Computers need to receive data and instruction in order to solve any problem. There for we
need to input the data and instructions into the computers. The input unit consists of one or
more input devices. Keyboard is the one of the most commonly used input device. other
commonly used input devices are the mouse, floppy disk drive, magnetic tape, etc. all the input
devices perform the following functions.
Storage unit:
The storage unit of the computer holds data and instructions that are entered through the input
unit, before they are processed. it preserves the intermediate and final results before these are
sent to the output devices. it also saves the data for the later use. The various storage devices
of a computer system are divided into two categories.
1. Primary storage: stores and provides very fast. This memory is generally used to hold
the program being currently executed in the computer, the data being received from the
input unit, the intermediate and final results of the program. The primary memory is
temporary in nature. The data is lost, when the computer is switched off. In order to
store the data permanently, the data has to be transferred to the secondary memory. The
cost of the primary storage is more compared to the secondary storage. There fore most
computers have limited primary storage capacity.
2. Secondary storage: secondary storage is used like an archive. It stores several programs,
documents, data bases etc. the programs that you run on the computer are first
transferred to the primary memory before it is actually run. Whenever the results are
saved, again they get stored in the secondary memory. The secondary memory is slower
and cheaper than the primary memory. Some of the commonly used secondary memory
devices are hard disk, cd, etc.
Memory size:
All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a number is
represented by an 8 bit code.The set of 8 bits is called a byte. A character occupies 1 byte space.
A numeric occupies 2 byte space. Byte is the space occupied in the memory.The size of the
primary storage is specified in kb (kilobytes) or mb (megabyte). One kb is equal to 1024 bytes
and one mb is equal to 1000kb. the size of the primary storage in a typical pc usually starts at
16mb. Pcs having 32 mb, 48mb, 128 mb, 256mb memory are quite common.
Output unit:
The output unit of a computer provides the information and results of a computation to outside
world. Printers, visual display unit (vdu) are the commonly used output devices. Other
commonly used output devices are floppy disk drive, hard disk drive, and magnetic tape drive.
Control unit:
It controls all other units in the computer. The control unit instructs the input unit, where to
store the data after receiving it from the user. It controls the flow of data and instructions from
the storage unit to alu. It also controls the flow of results from the alu to the storage unit. the
control unit is generally referred as the central nervous system of the computer that control and
synchronizes it’s working.
Before We Begin:
In order to ensure everything goes smoothly, gather a few important tools. A head screwdriver
is a must and needle-nosed pliers are often helpful. Buy quality thermal grease to keep the
processor in contact with the heat sink. If you don’t have an anti-static wrist band, make a
conscious effort to touch a ground point every so often (exposed metal on the case works fine)
to keep electrostatic discharge from damaging any of your components.
The floppy drive can be installed using the same method, only use one of the external 3.5" inch
bays. Attach the appropriate cable and secure the drive using the same small screws.
Finally, install your hard disk drive in an internal 3.5" bay. Many cases sport detachable disk
drive bays that often ease installation, but if we were really looking for the easy way out, we
would have picked up a G4 Cube. Attach the ends of each
cable to the corresponding drive. For instance, the end of the primary IDE cable should run to
the hard drive. Similarly, the end of the secondary cable
should go to the secondary ‘master’ drive, while the second connector attaches to the secondary
‘slave.’
Viva Questions:
step 4: language options, by default english will be set along with “time and currency
format” and “keyboard or input method”.
Step 5: click “install now”.
step 6: end user license agreement (e.u.l.a.), check the box to accept, and click “next”.
step 7: “which type of installation?” window will appear. upgrade will be greyed out; the
only option you should be able to choose is custom (advanced).
step 8: “where do you want to install windows?” make sure the partition is highlighted.
step 9: delete the partition by clicking on drive options (advanced) on the bottom right corner
of the field. make sure the partition is highlighted and click on delete. if drive advanced options
is greyed out, then the partition will not have to be deleted.
note: deleting the partitions will erase all data on the system.
step 10: disk 0 unallocated space should be the only listing at this point. if it is press next, if
not please proceed to delete any additional partitions that may be listed.
step 11: the next screen will show “installing windows”. this process should take
approximately 10 minutes after which the system will reboo.
note: do not press any keys during this boot up process so as to not disturb the rest of the
installation.
step 12: the next screen will show “installing windows” again to complete the installation
process.
step 13: “setup is starting windows” will appear on the screen, then you will be asked to
create a user name and a computer name.
step 14: the next step will prompt you to create a password for your account (optional).
step 15: the next screen will come up and ask you to choose one of three options: “use
recommended settings”, “install important updates only” and “ask me later”.
step 16: this screen will allow you to choose your local time zone and also adjust the date and
time.
step 17: click on the appropriate location of your computer to enable windows 7 to apply the
correct network settings.
The installation is done! you have successfully installed windows 7 on your computer.
Viva questions:
1) What do you mean by open source OS?
2) What do you mean by dual boot systems?
3) Explain the main purpose of an operating system?
4) What is NTFS?
5) What is the purpose of creating partitions for a Windows operating system?
6) What is the advantage of open source.
INTERNET AND WORLD WIDE WEB
4. Search engines & netiquette: students should know what search engines are and how
to use the search engines. a few topics would be given to the students for which they need
to search on google. This should be demonstrated to the instructors by the student.
Aim: To know about what is a netiquette, search engine and how to use a search engine and
also to know what are various threats in internet and how to configure the system so as to make
it safe in internet.
Search engine:
Software that lets the user to specify the search terms. The search engine then finds the websites
that contains those search terms. Overtime a search engine builds a database of searchable
terms that can be matched to the websites.
A web search engine is a software system that is designed to search for information on the
World Wide Web. The search results are generally presented in a line of results often referred
to as search engine results pages. The information may be a mix of web pages, images, and
other types of files. Some search engines also mine data available in databases or open
directories. Unlike web directories, which are maintained only by human editors, search
engines also maintain real-time information by running an algorithm on a web crawler.
Example: www.google.com, www.altavista.com, www.ask.com, www.askjeeves.com, etc...
List of top most popular search engines in the world
google:
Google search, commonly referred to as google web search or simply google, is a web search
engine developed by google. It is the most-used search engine on the World Wide Web,
handling more than three billion searches each day. as of February 2016, it is the most used
search engine in the us with 64.0% market share. The search engine giant holds the first place
in search with a stunning difference of 43% from second in place Bing. Google is also
dominating the mobile/tablet search engine market share with 89%!
Bing:
Bing is a web search engine owned and operated by Microsoft. The service has its origins in
Microsoft’s previous search engines: msn search, windows live search and later live search.
Bing provides a variety of search services, including web, video, image and map search
products. It is developed by using asp.net.
yahoo:
yahoo! search is a web search engine owned by yahoo, headquartered in sunnyvale, California.
as of February 2015 it is the third largest search engine in the us by the query volume at 12.8%,
after its competitors google at 64.5% and bing at 19.8%.
ask.com:
ask.com (originally known as ask jeeves) is a question answering-focused e-business and web
search engine founded in 1996 by Garrett gruener and david warthen in Berkeley, California.
aol.com:
aol (formerly a company known as aol inc., originally known as america online, and stylized
as aol) is a web portal and online service provider based in new york. it is a brand marketed by
oath, a subsidiary of verizon communications. aol was one of the early pioneers of the internet
in the mid-1990s, and the most recognized brand on the web in the us it originally provided a
dial-up service to millions of Americans, as well as providing a web portal, e-mail, instant
messaging and later a web browser following its purchase
of Netscape.
baidu:
baidu, incorporated on 18 january 2000, is a chinese web services company headquartered at
the baidu campus in Beijing’s haidian district. it is one of the largest internet companies, and
one of the premier ai leaders in the world. the holding company of the group was incorporated
in the cayman islands. baidu offers many services, including a chinese search engine for
websites, videos, multimedia files, news, translations and other useful functions, as well as
global mapping service baidu maps.
To use search engine we need to follow some steps given as follows:
Type the domain name for example www.google.com in the address bar (called as url)
in the internet explorer and press the return key.
now we can see an empty text box where we can type the key words (search terms)
which is as shown in the figure below:
Now type the keywords (search terms) in the text box without any mistake.
Now click on the button google search, by default radio button with the label “the
web” is selected, which is appeared below the google search button.
It will provide the websites that contain the search terms throughout the world.
But to get only the web sites from India then select the radio button “pages from
India” which is below the radio button “I’m feeling lucky”.
While searching the web we can use + sign in the keywords.
Result: I have successfully learned about search engine, netiquette.
Viva questions:
1) Define search engine
2) What is a spider?
3) What are popular search engines?
4) what is a meta search engine
Give the main purpose of www.
5. Cyber hygiene: students would be exposed to the various threats on the internet and
would be asked to configure their computer to be safe on the internet. They need to first
install an antivirus software, configure their personal firewall and windows update on
their computer. Then they need to customize their browsers to block pop ups, block active
downloads to avoid viruses and/or worms.
AIM: To learn various threats on the internet and configure the computer to be safe on the
internet.
Software Requirement: Antivirus Software.
Hardware Requirement: Personal computer.
Cyber hygiene:
Cyber hygiene is the establishment and maintenance of an individual's online safety. It is the
online analogue of personal hygiene, and encapsulates the daily routines, occasional checks
and general behavior Is required to maintain a user's online "health"
It is defined as an electronic sanitation. Refers to securing a company’s systems and
networks against attacks. Hygiene is common to talk about cleaning up a system or a
pc after a virus attack.
Threat is defined as the expressed potential for the occurrence of harmful even such as
an attack.
Attack is defined as an action taken against target with the intention of doing harm.
Vulnerability is defined as the weakness that makes the target to be attacked.
There are various types of threats. some of them are: The types of computer security
threats
Trojan:. Trojan is one of the most complicated threats among all.
Virus. Looking at the technology 10 years back, virus is something really popular.
Worms. One of the most harmless threats where it is program designed only to spread.
spyware.(malicious s/w that enters a user’s computer, gathers data from the device
and user, and sends it to third parties without their consent)
scareware.(tricks user into buying and downloading unnecessary and potentially
dangerous s/w, such as fake antivirus)
key logger.
Adware.(unwanted advertisements on your computer)
Backdoor. (installing malicious s/w that creates an entry point for the attacker)
Virus:
A program written intentionally to alter the way your computer operates without your
permission or without your knowledge. a virus attaches copies of itself to other files like
documents, program files and is inactive until you run an infected program.
When activated virus may damage or delete files, cause erratic system behavior.
1. Macro virus:
Macros are simple programs that can be written to automate the repetitive
tasks in a document or make calculations in spreadsheets.
Macros are written in documents using ms word, in spreadsheets using ms
excel.
2. Trojan horse:
These are the programs that appear to serve some useful purpose or provide
entertainment, which encourages you to run, which can place virus on your
computer or allow a hacker to gain access to your computer.
By clicking on a link Trojan horse may place the virus on your computer. But
a Trojan horse is not a virus because it doesn’t replicate and spreads like a
virus.
3. Worms:
These are programs that replicate and spread, often opening a backdoor to
allow hackers to gain access to your system that they infect.
Worms can also spread by copying themselves from disk to disk or by e-mail.
4. Zombie:
A zombie is a dormant program that lies inactive in your computer, which can
activated remotely i.e. zombie’s don’t normally damage the computer on
which they reside but can damage other computer.
Zombies often arrived as email attachments and when the attachment is
opened then they install themselves secretly and then wait to be activated.
5. Phishing:
A phishing attack is a one, when you sent an e-mail address that asks you to
click on a link and re-enter your bank or credit card details.
Both email and the website it links appeared to be genuine but when you
entered your bank or credit card details they are then used fraudulently.
6. Spyware:
It does not usually carry viruses but it can use your system resources and slow
down your internet connection with the display of ads.
this will be installed with other applications usually without your knowledge,
which records your behavior on the internet, display the targeted ads to you
and can even download other malicious (hateful) software on to your
computer.
To make the internet and your system safe, we must need to install antivirus software
(example avg, norton, node32, avast etc...) on your system. Also we need to download and
install the updates of operating system frequently.
Here we are creating project certificate by using all the formatting fonts (different fonts, font
sizes, using clipart for logo, text box, border for the page and some font styles.
CERTIFICATE
This is the Bonafide record of the practical work done by
Mr. / Ms. Roll no. i / ii / iii /iv-year b. tech / m. tech / MBA /
Semester branch in the Laboratory during the academic year 20 20
.
Cell Alignment:
Foot Note:
1. In print layout view, click where you want to insert the note reference mark.
2. On the Insert menu, point to Reference, and then click Footnote.
3. Click Footnotes or Endnotes.
By default, Word places footnotes at the end of each page and endnotes at the end of the
document. You can change the placement of footnotes and endnotes by making a selection in
the Footnotes or Endnotes box.
1.In the Number format box, click the format you want.
2.Click Insert.
Word inserts the note number and places the insertion point next to the note number.
1.Type the note text.
2.Scroll to your place in the document and continue typing.
As you insert additional footnotes or endnotes in the document, Word automatically applies
the correct number format.
Example: A user writes a research paper and adds a footnote to cite a source.
Smith, J. (2023). The Future of AI. Tech Press.
Hyper link:
www.google.com
Select the text or picture you want to display as the hyperlink, and then click Insert Hyperlink
on the Standard toolbar
Do one of the following: yahoo.com
1. Link to an existing file or web page:
1.Under Link to, click Existing File or Web Page.
2.In the Address box, type the address you want to link to or, in the Look in box, click the down
arrow, and navigate to and select the file
3.Link to a file you haven‘t created yet
Under Link to, click Create New Document.
1.In the Name of new document box, type the name of the new file.
2.Under When to edit, click either Edit the new document later or Edit the new document now
An e-mail address:
1. Select the text or picture you want to display as the hyperlink, and then click Insert
Hyperlink on the Standard toolbar
2. Under Link to, click E-mail Address.
3.Either type the e-mail address you want in the E-mail address box, or select an e-mail
address in the recently used e-mail addresses box.
4.In the Subject box, type the subject of the e-mail message
A specific location in another document
Symbols: €,¥,±,≤,∑,α,©
Spell check:
1. On the Standard toolbar, click Spelling and Grammar .
2. When Word finds a possible spelling or grammatical problem, make your changes in
the Spelling and Grammar dialog box.
Bullets and Numbering:
Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then press
SPACEBAR or TAB.
Type any text you want.
1. Press ENTER to add the next list item.
Word automatically inserts the next number or bullet.
2. To finish the list, press ENTER twice, or press BACKSPACE to delete the last bullet
or number in the list .
1. Select the words, paragraph, list, or table you want to change.
2.If the Styles and Formatting task pane is not open, click Styles and Formatting on the
Formatting toolbar
3.Click the style you want in the Styles and Formatting task pane. If the style you want is not
listed, click All Styles in the Show box
Track Changes:
1. Open the document you want to revise.
On the Tools menu, click Track Changes.
RESULT: A document is created by applying the above-mentioned techniques.