It Workshop LAB MANUAL
It Workshop LAB MANUAL
Identify the peripherals of a computer, components in a CPU and its functions. Draw the
block diagram of the CPU along with the configuration of each peripheral .
A computer can process data, pictures, sound and graphics. They can solve highly
complicated problems quickly and accurately.
InputUnit:
Accept the data and instructions from the outside world.
1. Convert it to a form that the computer can understand.
2. Supply the converted data to the computer system for further processing.
StorageUnit:
The storage unit of the computer holds data and instructions that are entered through
the input unit, before they are processed. It preserves the intermediate and final
results before these are sent to the output devices. It also saves the data for the later
use. The various storage devices of a computer system are divided into two
categories.
1. Primary Storage: Stores and provides very fast. This memory is generally used to
hold the program being currently executed in the computer, the data being received
from the input unit, the intermediate and final results of the program. The primary
memory is temporary in nature. The data is lost, when the computer is switched off.
In order to store the data permanently, the data has to be transferred to the
secondary memory.
The cost of the primary storage is more compared to the secondary storage.
Therefore most computers have limited primary storage capacity.
2. Secondary Storage: Secondary storage is used like an archive. It stores several
programs, documents, data bases etc. The programs that you run on the computer
are first transferred to the primary memory before it is actually run. Whenever the
results are saved, again they get stored in the secondary memory. The secondary
memory is slower and cheaper than the primary memory. Some of the commonly
used secondary memory devices are Hard disk, CD, etc.,
Memory Size:
All digital computers use the binary system, i.e. 0’s and 1’s. Each character or a
number is represented by an 8 bit code.
The set of 8 bits is called a byte. A character occupies 1 byte space.
A numeric occupies 2 byte space.
Byte is the space occupied in the memory.
The size of the primary storage is specified in KB (Kilobytes) or MB (Megabyte). One
KB is equal to 1024 bytes and one MB is equal to 1000KB. The size of the primary
storage in a typical PC usually starts at 16MB. PCs having 32 MB, 48MB, 128 MB,
256MB memory are quite common.
Output Unit:
The output unit of a computer provides the information and results of a computation
to outside world. Printers, Visual Display Unit (VDU) are the commonly used output
devices. Other commonly used output devices are floppy disk drive, hard disk drive,
and magnetic tape drive.
Arithmetic Logical Unit:
All calculations are performed in the Arithmetic Logic Unit (ALU) of the computer. It
also does comparison and takes decision. The ALU can perform basic operations
such as addition, subtraction, multiplication, division, etc and does logic operations
viz, >, <, =, ‘etc. Whenever calculations are required, the control unit transfers the
data from storage unit to ALU once the computations are done, the results are
transferred to the storage unit by the control unit and then it is send to the output unit
for displaying results.
Control Unit:
It controls all other units in the computer. The control unit instructs the input unit,
where to store the data after receiving it from the user. It controls the flow of data and
instructions from the storage unit to ALU. It also controls the flow of results from the
ALU to the storage unit. The control unit is generally referred as the central nervous
system of the computer that control and synchronizes its working.
Central Processing Unit:
The control unit and ALU of the computer are together known as the Central
Processing Unit (CPU). The CPU is like brain performs the following functions:
• It performs all calculations.
• It takes all decisions.
• It controls all units of the computer.
A PC may have CPU-IC such as Intel 8088, 80286, 80386, 80486, Celeron, Pentium,
Pentium Pro, Pentium II, Pentium III, Pentium IV, Dual Core, and AMD etc.
3. RAM (Random Access Memory)- For program execution and short term data-
storage, so the computer doesn't have to take the time to access the hard drive to
find something. More RAM can contribute to a faster PC.
4.Buses : PCI bus, PCI-E bus, ISA bus (outdated), USB, AGP
5. Power Supply - a case that holds a transformer, voltage control and fan
INCLUDEPICTURE
"http://2.bp.blogspot.com/_rNO9omSbocY/S0q_AWakPBI/AAAAAAAACcw/2Ux7
OBPmyvo/s400/img.jpg" \* MERGEFORMATINET
6. Storage controllers, of IDE, SCSI or other type, that control hard disk, floppy
disk, CD-ROM and other drives; the controllers sit directly on the motherboard
(on-board) or on expansion cards
7. Video display controller that produces the output for the computer display
8. computer bus controllers (parallel, serial, USB, Fire wire) to connect the
computer to external peripheral devices such as printers or scanners
9. Some type of a removable media writer:
10. CD - the most common type of removable media, cheap but fragile.
11. Floppy disk
13. Internal storage - keeps data inside the computer for later use.
16. Sound card - translates signals from the system board into analog voltage
levels, and has terminals to plug in speakers.
Mouse
Types of monitors
CRT(cathode ray tube) monitors
Types of printers
Non impact printers: This type uses other means to create an image for example
in ink jet printers tiny nozzles are used to spray droplets of ink on the page.ex: Ink
jet printer
Laser Printer
Inkjet printer
Speakers
LCD Projectors:
Viva Questions:
1) Define a computer?
2) Define hardware and software?
3) What are the functional units of a computer?
4) Define the following: RAM,ROM,BIOS,BUS,BIT,PROGRAM.
5) What is the use of a mother board?
TASK 2:
Assembling and disassembling the PC back to working condition.
AIM: To assemble and disassemble the system
Safety Precautions:
1. Beware of electrostatic discharge (ESO)
2. Build computer on a hard surface, away from concepts.
3. Wear shoes and the short sleeved cotton wear.
4. Use Phillips, head screw driver.
5. Keep the components away from moisture.
6. Avoid using pressure while installing.
Viva Questions:
1) Define assembling of a system?
2) Explain the steps involved in the installation of the mother board?
3) What is the use of pin 1 indicated on the processor?
4) What is the use of locking level at the processor slot?
5) Define a port?
TASK3
Insert the windows XP cd in your cdrom and than go to the BIOS by hitting “DEL” or
“F12″ when your system in powering on. Go to Boot order and make sure cdrom is
on the first place.
Save settings and restart your computer.
Once you have successfully booted from the CD, you will see the Windows XP
“Welcome to Setup” screen. Press ENTER to begin the setup process.
Step 5: Partitions
If there are multiple partitions on your hard drive, or you have multiple hard drives in
the computer, use the UP or DOWN arrow keys to choose your install partition.
Please note that your system partition needs to be a primary partition (usually the
first partition that shows up in the list), not a logical partition.
The partition should be at least 10 GB in size. Make sure that all the data you need
from this partition is copied elsewhere, because it will be deleted.
Once you have selected the right partition selected, press ENTER. You will see the
next “you already have a system installed” screen only if you already have Windows
installed on this partition. If you are installing on a brand-new hard drive, skip to Step
7.
STEP 10: Setup will show a progress box and reboot when copying files is complete.
When you see the "Press any Key to Reboot" do not Press any Key. If CD boots
anyway, remove CD and reboot.
Step 11:From this point, you will follow the on screen prompts.
Step 12:If you live outside the US, you will probably need to modify the default
settings.
Step 13:If you live outside the US, you will probably need to modify the default
settings.
Step 16:Choose a name for the computer, this should be a unique name for the
computer, especially if it is to be connected to a network. In Pro, you are given the
option of creating a password or leaving it blank.
Step 17:Set your Time Zone and Time and Date.
Step 18: If detected you will have the choice to choose a typical configuration or
custom. Choose typical if you are unsure.
Step 19: For home you will choose your workgroup, if a network is already
established and you intend to connect to it, use the existing workgroup name,
otherwise, I suggest using the default.
Step 20:For Pro, the same goes for Pro as suggested for Home, but you will have the
choice to join a Domain, if you do not have a Domain or do not know leave blank.
Setup will continue and reboot when completed ignore the "Press Any Key".
The XP loading window will now display after reboot.
Viva Questions:
1) NTFS stands for---------?
2) What is the use of product key in the installation process of a software?
3) How many characters does a product key contain fro windows XP?
4) Describe different kinds of Microsoft Operating systems?
5) What are the pre-arrangements for installing the windows OS?
TASK-4
FEDORA Linux Installation Process:
Graphical Mode.
Text Mode.
Graphical Mode - In this you can work with Graphical Interface (i.e., it supports
mouse and Icons ). By clicking the icon with the mouse, you can perform related
action.
Text Mode - In this mode you have to interact with character based interface ( i.e.,
Command prompt ).
To install Linux in Text Mode Type : Linux text and Press Enter.
After selecting the mode of installation, it goes on detecting the basic input output
devices and file systems. And at last it displays a screen asking whether to test the
CD inserted to install or to Skip the test process. Otherwise we can test total
installation CD’s.
On completion of testing the CD’s, it goes on loading an installation program
“ANACONDA” which helps us in the installation of the remaining part.
2 WELCOME TO INSTALLATION PROCESS
It starts with the display of the welcome screen containing the online help ,
and four buttons to help us in the different activities in the installation process.
Hide Help/Show Help - Which helps you in guiding the installation process,
which can be activated or hidden.
Release Notes - Which contain the Basic Hardware Requirements that are necessary
for the installation of the Red Linux 9.0 and some other post-installation issues.
Next - This button allows you to go to next step of the installation process by the
current step.
Back - This button allows you to move back of the installation process to make any
changes that previously mentioned.
Action: click “Next” to move to next screen.
3. SELECTING A LANGUAGE
It displays a screen containing various languages, to select a language you would
like to use during this installation process.
Here we need to select our own keyboard and mouse layouts which will help you to
interactively proceed in the installation process.
At this point of time it displays you the different types of keyboard layouts. So that
you can select your desired one that you would like to use for the system.
And also choose the appropriate Mouse for the system, based on the following:
5. TYPE OF INSTALLATION:
There are different installation types that are available which will enable you to select
that will best meet your needs.
6. PARTITIONING THE DISK
AUTOMATIC PARTITIONING
– By selecting automatic portioning, you will not have to use partitioning tools to
assign mount points, create partitions, or allocate space for your installation.
Automatic partitioning allows you to have some control concerning what data is
removed from your system.
Now the boot loader GRUB will be installed. You can leave the default settings
unchanged and click on Next:
The GRUB boot loader will allow you to boot other operating systems. It will
allow you to select an operating system to boot from the list. To add another
operating system. You can also add other operating systems that are not detected
automatically.
8. NETWORK CONFIGURATION
With this option you can set your Network devices manually or using DHCP
(Dynamic Host Configuration Protocol) which will automatically takes default IP
address, and Net mask addresses. The DHCP also set your Hostname.
9. FIREWALL CONFIGURATION
A firewall configuration is set between yours computer and network. And decides
which resources of your computer are accessible by the remote users on the
network. On proper configuration of firewall we can set different security levels for the
system.
By using firewalls we can avoid any entrusted passage of data and also we can set
our own protocol supports.
To set our time zone we can do it either by selecting computers physical location or
by your time zone’s offset from Universal Time, Coordinated. This screen shows two
tabs namely location and UTC Offset. First tab offers you the ability to configure by
location. Second tab allows to set UTC Offset.
12. ROOT PASSWORD SETTINGS
With this screen we can accept the default package list or we can customize the set
of packages to be installed.
On selecting the customized set of packages we can select our own selection of
desktops, applications, servers, development tools and system tools to be installed
among the available.
And also we have an option to select a minimal set of packages and all the packages
that are available which will install complete set of packages(about 1400) which will
require about 4850 MB of space.
15. ABOUT TO INSTALL
This is the final step to make any modifications to the installation process. Once you
click the next button you cannot do any modifications.
First it formats the file systems and copies the files to our hard disk to continue
installation. Then there starts the installing of packages which may take up to several
minutes of time during which we need to insert next two CD ROMs to complete the
installation process.
Here the prompts you to create a Linux boot disk on your choice for your further
requirement.
18. CONFIGURING YOUR DISPLAY
At this stage you need to select your video card type and monitor configuration and
also you restore to the original values.
19. END OF INSTALLATION PROCESS At the end of the installation process it will
remove all the media that is used by the installation. And reboots your system again.
After the installation your computer will reboot and you will go through a simple
configuration procedure to get your computer ready for use. It includes such things
as setting the time, setting the password for the "root" user, and creating other user
accounts.
Out-Of-The-Box Experience:
Viva Questions:
1) Give the advantages of Linux over other OS?
2) What do you mean by open source OS?
3) What are the commands used to make disk partitioning manually in Linux
OS?
4) What do you mean by dual boot systems?
5) Which type of file systems are required to install hard disk at the time of
installation of Linux OS?
TASK 5:
Several mini tasks would be that covers Basic commands in Linux and Basic
syatem administration in Linux which includes: Basic Linux commands in
Bash, create hard and symbolic links, text processing, using wild cards.
AIM: To learn basic Linux commands.
/ Root directory
/bin Essential commands
/boot Boot loader files , Linux kernel
/dev Device files
/etc System configuration files
/home User home directories
/lib Shared libraries , kernel modules
/mnt Usual mount files for local , remote file
system
/opt Ad- on software packages
/proc Kernel information, process control
/root Superuser directory
/sbin System commands directory
/tmp Temporary files
/usr Secondary software file directory
/var Variable data directory
To edit a file-$vi
i-for insert mode, character you type will show up as text
x-for deleting a character
3x-for deleting 3 consecutive characters
a-for appending characters
[esc}-to get into command mode
u-to undo the most recent change
U-to undo all the changes made to the line
p-to put the contents of the recent buffer back to where the cursor is
press [esc]-wq to write the file to disk and quit
press [esc]-q! to quit without writing the file to disk
1 or space bar or right arrow – To move right one character
h or crtl+h or left arrow-To move left one character
j or ctrl+j or ctrl+n or down arrow –To move down one line
k or ctrl+p or up arrow- To move up one line
0-To move to the top of the line
$- To move to the end of the current line
+ or RETURN – To move to the beginning of the next line
. – To move to the beginning of the previous line
CTRL+f – move forward one full screen
Ctrl+d – move forward one half screen
Ctrl+b – move back one full screen
Ctrl+u – move back one half screen
G-move to the end of the file
R b – replace the current character with b
3rd-replace 3 characters with b
/look-search forward for the first occurrence of look
//-repeat search
n-repeat search
N-reverse search direction
?look-search backward for the first occurrence of look
Wild cards:
Wild cards are a shell feature that makes the command line much more powerful
than any GUI file managers.
Wild card Matches
* 0 or more characters
? Exactly one character
[abcde] Exactly one character listed
[a-e] Exactly one character in the given range
[!abcde] Any character that is not listed
[!a-e] Any character that is not in the given
range
{debian,linux} Exactly one entire word in the options
given
s.no Command name description example
1 Date Display or set the $date
he linux system
time
2 Ls Viewing linux file $ls
system
3 Tree Show the root or $tree
base directory lay
out,along sub
directories
4 Man Display the manual $man
pages
5 Cat Outputs contents of $cat
file name to display
6 Mv Moves specific $mv file(s)/dir(s)
files/directories to files(s)?dir(s)
specific
files/directories
7 Cp Copies one file and $cp file 1 file 2
creates another file
8 Rm Deletes file $rm file
9 Grep Searching through $grey string files(s)
file and displays
lines containing
matching string
10 Mkdir Creates an empty $mkdir dirname
directory
11 Rmdir Deletes directory(if $rm dir dirname
empty)
12 Ps Displays quick list $ps
of process
13 Pwd Displays the path of $pwd
current directory
14 Clear Clears all textand $clear
leave you with the
and promt at the
top of the window
15 Head Display the first few $head-line count
Lines of a file file name
16 Tail Display the last few $tail-line count file
lines of a file name
17 Wc Count number of $wc file name
lines/words
/characters in a file
18 Who List users currently $who
loggedin
Viva Questions:
1) What are the default directories in the Linux operating systems?
2) Is command used for?
3) What are the various directory commands in Linux?
4) How can you search a file for key words in Linux?
5) What is the function of ‘cat’ and ‘clear’ command?
TASK 6:
Search Engines & Netiquette: Students should know what search engines are
and how to use the search engines. A few topics would be given to the
students for which they need to search on Google. This should be
demonstrated to the instructors
PURPOSE: To know what search engines are and how to use the search engines.
THEORY:
Search engine:
A search engine can be defined as a web site with tools which help you to find
information on the internet
Function of a search engine:
You can find anything from a schedule of White house tours to instructions for
removing stains from clothes.
Limitations:
Search engines visit web sites only several weeks. Search engines cannot see
information in other data bases later on.
On the internet a search engine is a coordinated set of programs that includes: A
spider (crawler or bot) that goes to every page or representative pages on every web
site that wants to be searchable and reads it, using hypertext links on each page to
discover and read site’s other pages.
Pros:
You can select the search terms
You can use the same search terms with multiple search engines
You can change search terms as much as you wish
You will normally receive numerous links
Its fast
Cons:
There are so many different search engines it may be difficult to
choose
You will normally receive too many links often making it difficult to
identify the most relevant sites.
The vast majority of links may be only marginally relevant or
altogether irrelevant
EX:
Alta Vista
Ask Jeeves
Google
Lycos etc.,
Viva Questions:
1) Define search engine
2) What is a spider?
3) What are popular search engines?
4) What is a meta search engine
5) Give the main Purpose of WWW
TASK 7:
Cyber Hygiene: Students would be exposed to the various threats on the
internet and would be asked to configure their computer to be safe on the
internet. They need to first install an anti virus software, configure their
personal firewall and windows update on their computer. Then they need to
customize their browsers to block pop ups, block active x downloads to avoid
viruses and/or worms
PURPOSE: To learn various threats on the internet and configure the computer to be
safe on the internet.
THEORY:
Antivirus:
Antivirus software is a program that either comes installed on your computer or that
you purchase and install yourself. It protects your computer against most viruses,
worms, Trojan horses and other unwanted invaders that can make your computer
sick.
Firewall:
A firewall is a special software or hardware designed to protect a private computer
network from unauthorized access. A firewall is a set of related programs located at a
network gateway server which protects the resources of the private network from
users from other networks.
PROCEDURE:
Installing Symantec antivirus for Windows:
Insert Symantec antivirus CD into your CD drive
Double click on the Symantec-setup.exe
The installer will open
Click next to proceed
License agreement will open. Click I accept the terms of the license
agreement and then click next.
Follow the instruction on the screen to complete the installation.
Get Computer Updates:
Click start settingscontrol panel
Click Automatic Updates icon to open Automatic Updates dialog box
Check the box Keep my computer up to date
Choose a setting
Click OK
Block Pop ups:
In the Internet explorer open toolspop-up blocker
Click on Turn on Pop- up blocker
Windows Firewall:
Go to Startcontrol panelNetwork and Internet
Connectionswindows firewall
In the general tab check the On(recommended) box
If you don’t want any exceptions check on Don’t allow exceptions
box
Viva Questions:
1) What is antivirus software?
2) Define virus
3) Define worm
4) What are the advantages of antivirus software?
5) What are the types of antivirus software’s available?