0% found this document useful (0 votes)
198 views

MSC Computer Proficiency Syllabus

The document provides an overview of a computer proficiency test, including: 1) A table of contents listing the topics covered in the test such as computer hardware/software, Windows XP, Microsoft Word, PowerPoint, Excel, internet/network security, and assignments for each application. 2) Definitions of key computer concepts like hardware, software, operating systems, and applications. 3) Descriptions of features and functions in Windows XP and Microsoft Office applications like Word, PowerPoint, and Excel. 4) Instructions for common tasks in these applications such as creating and saving documents, using cut/copy/paste, and an overview of toolbars and menus.

Uploaded by

Safeer Ahmed
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
198 views

MSC Computer Proficiency Syllabus

The document provides an overview of a computer proficiency test, including: 1) A table of contents listing the topics covered in the test such as computer hardware/software, Windows XP, Microsoft Word, PowerPoint, Excel, internet/network security, and assignments for each application. 2) Definitions of key computer concepts like hardware, software, operating systems, and applications. 3) Descriptions of features and functions in Windows XP and Microsoft Office applications like Word, PowerPoint, and Excel. 4) Instructions for common tasks in these applications such as creating and saving documents, using cut/copy/paste, and an overview of toolbars and menus.

Uploaded by

Safeer Ahmed
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 99

RESTRICTED

COMPUTER PROFICIENCY TEST


CONTENTS

S NO TOPICS PAGE NO
1 COMPUTER HARDWARE AND SOFTWARE 1.1 – 1.1

2 WINDOWS-XP 1.2 – 1.3

3 MICROSOFT WORD 1.4 – 1.10

4 ASSIGNMENTS MS WORD 1.11 – 1.24

5 POWER POINT 1.25 – 1.27

6 ASSIGNMENTS MS POWER POINT 1.28 – 1.40

7 MICROSOFT EXCEL 1.41 – 1.55

8 ASSIGNMENTS MS EXCEL 1.56 – 1.72

9 PAF INTRANET 1.73 – 1.77

10 INTERNET 1.78 – 1.83

11 (ICT) SECURITY 1.84 – 1.98

1
RESTRICTED
RESTRICTED

DEFINITIONS

What is a Computer?

1. A computer is an electronic device capable of performing many tasks like


accepting data, process that information to produce output for users & also can store
that output. It can take logical decisions or perform any task faster than human beings.

Hardware

2. The physical components of a computer are called hardware.

(a) Input Devices. The initial unit, which provides communication


between the user and the computer, is the input unit. This unit is used to given
information to a computer. For example: key board, mouse scanner etc.

(b) Output Devices. The final part of a computer is the out put unit. Which
Monitor, printer etc?

(c) CPU (Central Processing Unit). This unit of a computer is responsible to


process the data, which is given by the user.

Software

3. Software is a set of computer programs required to utilize and control the


operation of the computer. Such as Disk Operating System (DOS), Windows,
M/S World, M/S Excel etc.

Types of software

4. There are two types of software.

(a) Application software. Computer programs which directs the computer


system to perform specific or other problems of computer users. For example
MS Word, Ms Power Point etc.

(b) Operating System. It is a type of system software, which supervises all


the activities or operations of the computer. It consists of program(s), which
provides communication between the user & the computer hardware e.g.
Window 98. Window XP etc.

2
RESTRICTED
RESTRICTED

Windows-XP

Introduction

1. Windows-XP is easier to use, more reliable and more entertaining than ever.
Navigation around your computer through desktop options has become simple such as
single clicking to open files and the browse button in every window. You can access the
Online Support Web site for common questions and to keep your copy of Windows up
to date.

What’s on your Windows-XP desktop?

1. Various items appear on the desktop when we start windows. Here are four
important ones.

(a) My computer. It displays all the contents of the computer.

(b) Network Neighborhood. In the world of mapped drives and complex


interfaces, users are unable to browse the network. The Network Neighborhood
makes browsing networks possible and easy, independent of the network provider
(such as Windows NT server, or Windows-XP itself). Double-click this icon to see
available resources on the network, if the computer is connected to other one.

(c) Recycle Bin. The Recycle Bin is a temporary storage place for deleted
files. It allows users to recover deleted files. Files that have been deleted can be
easily returned to their original location on the user’s local system.

(d) Task bar. The objective of the taskbar is to make switching among
multiple applications or windows as simple as changing channels on a television
set. Every new windows that is opened automatically gets a button on the taskbar
that greatly improves the visualization to the user that which windows or
applications are presently opened.

2. The start button

(a) Programs. It is the powerful option of the Start menu that provides quick
access to launch programs.

(b) Documents. The Documents option of the start menu contains a list of
the last 15 documents the user recently opened. It provides quick access to the
files most recently worked with. It helps people to prevent time-consuming and
frustrating browsing and start work in terms of documents rather than applications.

(c) Settings. Gives quick access to the changing or viewing settings and
options of the PC, including Control Panel (for computer settings), the start menu
(via the taskbar command) and the Printers folder. It also enables the user to
customize the taskbar itself (for example, what programs to include into the
programs submenu) to suit personal working preferences.

3
RESTRICTED
RESTRICTED

(d) Search. Search is a feature of Windows-XP that goes far beyond the
early search features (e.g. in Windows 3.1) file Manager. Searches do not need to
conform the *.* searching syntax and criteria such as last modification date; size of
file and actual text within a document can now be used to find information.

(e) Help. Help has been overhauled in Windows-XP and is easily accessible
from the Stat menu.

(f) Run. It provides enhanced command-line type functionality from the start
button. We can directly run any file from this option.

(g) Log off. Closes your account but the computer remains ON for easy
access the next time you long on.

(h) Shut down. It allows easily accessible and safe shutdown, restart, and
log off the computer.

4
RESTRICTED
RESTRICTED

MICROSOFT WORD

Introduction

1. A word processor is software (package) that enables the computer user to create
documents containing text or graphics. It also provides ease of editing, deleting or
adding any text in already created documents. By using Ms Word one can create a new
document, type in the text or copy text from already created documents and can save it
on the disk/diskette with or without protection (security).

Starting MS Word

2. The preferred method of starting Ms Word is to double click its icon on the
desktop. An equally handy way to start word is to double click on a word document
icons. This will launch word and immediately open the document itself that can get right
to work on it.

To start word through the icon, proceed as follows:-

(a) Locate the Ms Word icon on the desktop.

(b) Points to the Ms Word icon using your mouse then double click it to
launch the program. The left mouse button does all the clicking.

3. Understanding Screen Of MS Word

(a) Title bar. Contains title of the software i.e. Microsoft word and name of
the current opened document.

(b) Menu bar. Contains different major options, which show sub options for
the desired operation.

(c) Tool bar. Contains a number of buttons, which are shortcut keys to
operations done by menu. There are some standard toolbars provided with the
package, but the user can also design its own customized toolbar.

Creating a New Document

4. for creating a new document proceed as follows:-

(a) Select option “File” from the menu bar.

(b) Select “New” a dialogue box will appear.


(c) It asks for templates under which the document is to be crated.

(d) Click ok. Word has now created a blank document for you. You can start
your job now.

5
RESTRICTED
RESTRICTED

Saving a document

5. Once you think your job is over or even if it is not, you can save the document by
the following procedure:-

(a) Select option “File” from the Menu Bar.

(b) Select “Save As” from the file menu or simply press Ctrl+S, dialogue box
is displayed, asking for the name under which document is to be saved.

(c) Write the name of the document where It prompts for the file name.

(d) You can also specify the place i.e. drive or directory where the document
is to be saved.

(e) It also offers different saving formats.

Cut, copy & paste (Edit Menu)

Cut command

6. This option is used to remove selected text and graphics and put it on the
clipboard. This command is available only when you select text or graphic. Text and
graphic that you can place on the clipboard remains there until you replace it with a new
item.

(a) Select the text you want to cut.

6
RESTRICTED
RESTRICTED

(b) Select the “Edit” menu from the Menu Bar.


(c) Select the “Cut” option from Edit Menu or simply press Ctrl+X.

To quickly remove selected information from the document and place it on the
clipboard, click the button on Standard Toolbar.

Copy command

7. It copies selected text and graphic to the clipboard. This command is available
only when you selected text or graphic.

(a) Select the text you want to copy.

(b) Select the “Edit” Menu from Menu Bar.

(c) Select the “Copy” option from Edit Menu bar or press Ctrl+C.

Text and graphics that you copy to the clipboard replaces the previous contents. To
quickly copy the information to the clipboard, click the copy button on the standard
toolbar.

Paste Command

8. Insert a copy of the clipboard contents at the insertion point replacing the
selection (if any) with the text on the clip board. This command is not available if the
clipboard is empty or if the selected text cannot be replaced.

(a) Place the cursor where you want to paste the text.

(b) Select the “Edit” Menu from Menu Bar.

(c) Select the “Paste” option from the Edit menu or simply presses Ctrl+P.

To quickly insert the clipboard contents at the insertion point, click the paste button on
the standard toolbar.

Spell check

9. Checks spelling in the active document including text in headers, footers,


footnotes, endnotes, and annotations.

Grammar check

10. checks your document for possible grammar and style errors and displays
suggestions for correcting them

Header and footer (view menu)

7
RESTRICTED
RESTRICTED

11. Add or changes text that word repeats at the top if every page (header) or at the
bottom of every page (footer) in a section or in a entire document.

(a) Select “View” from Menu Bar.


(b) Select “Header & Footer” option from view menu bar a dialogue box is
appeared

When you choose this command, word displays the header & footer toolbar. Use
the toolbar to quickly add the current time, current date, and page numbers; to move
between the headers and footers in the document, and to display or hide the document
text.

Insert table

12. to insert table in your document do the following:-

(a) Select “Table” menu from the Menu Bar.

(b) Select “Insert Table” option from table menu.

(c) Insert table dialogue box is displayed; you can adjust number of columns
or rows for your table.

Paragraph formatting (format menu)

13. The format\paragraph dialogue box provides independent control over indents
and spacing and text flow.

(a) Select option “Format” Menu from Menu Bar.


(b) Select “Paragraph” from format Menu, a dialogue box as given below is
displayed.

8
RESTRICTED
RESTRICTED

(c) Indents: This option controls the indentation from the left and right
margins, and the indent level of the second and subsequent lines (hanging
indent).
Adjust the Left & Right Indent you want.

(d) Spacing/Line Spacing Spacing determines the amount of space between


lines and between paragraphs. We can adjust spacing before or after the
selected line.
Line spacing determines the amount of vertical space between lines of
text. This option provides the users with multiple choices to set single, 1.5 lines,
double, At Least, exactly & multiple line spacing.

Bullets & Numbering (Format Menu)

14. Creates a bulleted or numbered list from a selected series of the items in text or
a series of cells in a table. To add or remove bullets or numbers quickly, click the
bullets button or the Numbering button on the formatting toolbar.

(a) Select option “Format” Menu from Menu Bar.

(b) Select “Bullets & Numbering” from Menu, a dialogue box is displayed.

9
RESTRICTED
RESTRICTED

(c) Select the style of Bullets or Numbers or you want to insert.

Page Margin

15. For setting page margin proceed as follows:-

(a) Select option “File” from Menu Bar.

(b) Select Page Setup.

(c) In the dialog box you can see paper margins i.e. Top, Bottom, Left, Right,
Header and Footer. You can change these values by typing or pressing up/down
arrows according to the service writing.
Printing a Document

16. it is a very simple process involving following steps

(a) Select File from the menu

(b) Select Print. It will open a dialogue box as show below

10
RESTRICTED
RESTRICTED

(c) It asks for different option, you can make

(d) You can change the Page range and you get printed selected Pages.

(e) You can change the printer attached to your system.

(f) Once you have made an option click “OK”. Your Printing would go to the
selected printer.

Protect Document (Tools Menu)

17. To protect document do the following

(a) Select “Tools” menu from Menu Bar.

(b) Select “Protect Document” option from Tools menu

(c) Enter password for you document and press OK.

(d) Type the password you want to use to protect a document. A password
can contain up to 15 characters and can include letters, numbers, symbols, and
spaces. As you type the password. Word displays an asterisk (*) for each
character you type.

(e) Once you have assigned a password, you must use the same password
each time you want to remove protection from the document, typing uppercase
and lowercase letter exactly as you did for the original password.

11
RESTRICTED
RESTRICTED

ASSIGNMENTS
Microsoft Word Assignment # 1
(Opening MS Word Document, Desktop and Word Screen)

1. OPENING MS-WORD DOCUMENT

Following are the methods which tell us how to open MS-Word document.

First: Right Click on the empty place of ‘Desktop’, Point ‘New’ then click
‘Microsoft Word document’.

Icons

Empty Area

Start Button
Start Button Button Task Bar

12
RESTRICTED
RESTRICTED

Second: Click ‘Start button’ on Desktop, Point to ‘Programs’


then Point to ‘Microsoft Office’ and click ‘Microsoft Word’.

2. UNDERSTANDING THE MS-WORD SCREEN

TITLE BAR:

NOTE: The topmost BLUE bar is called the Title Bar which tells us the
Application Name and the document name.

MENU BAR:

NOTE: The second horizontal listed Bar below the title bar is called
Menu Bar which on clicking open menus.

TOOL BARS:

NOTE: The next two Bars, below the Menu Bar, which shows small colourful
pictures or buttons called ICONS are known as Tool Bars.

VERTICAL & HORIZONTAL RULERS:

NOTE: These rulers provide better control in page formatting and


spacing.
STATUS BAR:

NOTE: Provides different kinds of information e.g Page No, Cursor


Position, Current System Time etc
13
RESTRICTED
RESTRICTED

Microsoft Word Assignment # 2


(Creation, Typing and Selection in a document)

Creating, Typing and Selection Options

1. CREATION OF A NEW DOCUMENT

(a) FIRST METHOD:

Click File Menu and then click New.

A pane will appear Select the


Blank Document.
A blank document will open.

(b) SECOND METHOD:


Simply press keys CTRL + N from the keyboard. This is the shortcut
command from the Keyboard to open a new blank document.

2. TYPING IN THE DOCUMENT

Type the following few lines in the Insertion Area by using the Keyboard.

Information Technology’s rapid expansion and its emergence in


every domain are quite inevitable. Today’s PC is much capable than
yesteryears mini and mainframe computers. An organization’s success
clearly depends on adaptation of information Technology.

The content of the manual will be subsequently updated as and


when required. It is expected that these manuals will provide a firm base
for IT Asstts for their growth in PAF.

3 FORMATTING THE DOCUMENT

(a) SELECTION OF A PART OF TEXT:


14
RESTRICTED
RESTRICTED

BY USING KEYBOARD:

First Method: Click at the start of the first sentence then


Press SHIFT Key on either side and hold and Press Forward arrow
Key for required selection.

Second Method: Click at the End of the first sentence then


Press SHIFT Key on either side and hold and Press Backward
arrow Key for required selection.

BY USING MOUSE:

First Method: Double click on NAME will select the single


word and triple Click at any place of the sentence will select the whole
sentence

Second Method: Bring the cursor on the left side & inline of the
first line. The cursor style will change to then click once.

(b) SELECTION OF WHOLE DOCUMENT

USING SHORTCUT COMMAND:

First Method: CTRL + A is the shortcut command from


Keyboard to select the whole document.

Second Method: Click EDIT Menu and


then click Select All

15
RESTRICTED
RESTRICTED

Microsoft Word Assignment # 3


(Cut, copy, Paste & Font Options)

Use of CUT, COPY & PASTE OPTION

1. CUT

Following methods are used to Cut selected text.


Note: Selection is necessary for these options.

First: Ctrl+X is the Shortcut Command from Keyboard.

Second First Select the Text then click on the toolbar

Third Select the text then Click Edit Menu then Click Cut.

2. Copy

Following methods are used to Copy selected text.


Note: Selection is necessary for these options.

First: Press Ctrl+C from Key Board


Second: First Select the Text then Click on the toolbar

Third: Select the text then Click Edit Menu then Click Copy.

16
RESTRICTED
RESTRICTED

3. PASTE
Following are methods to Paste the copied or cut items.

First: Press Ctrl + V shortcut command from Keyboard.


Second: Click button on the Toolbar.
Third: Click on Edit menu and then click Paste

4 Use of CHANGE FONT OPTIONS.

To carry out any change in Font first select the text as taught. Now click Format
menu and then click Font

17
RESTRICTED
RESTRICTED

Following Window will be opened


3 tabs

Font Option *
Font Sytle **
Size ***

(*) You can change the font type from


here in the below list simply by
clicking your required choice.

(**) Font style (Bold, Italic etc) can


be chosen in the below available 4 Other effect
choices. options

(***) Size of the font can be chosen


from the below list.

These two options for font colour and underline style by opening the

list. Just click on button of the corresponding option.

OR
You may change these options by using the Formatting ToolBar after you
select your text.
Left Align Center Right Align Justified

Font Type Font Size Bold Italic Underline Line Colour Font Colour

18
RESTRICTED
RESTRICTED

Microsoft Word Assignment # 4


(Table and working in a Table)

CREATING AND WORKING IN A TABLE.

1. CREATION OF A TABLE.

Click on the Table menu of the Menu Bar, Point to Insert and then click Table

It will open a windows like the following asking you the Number of Rows and
Columns

Enter the No of Columns and No of


Rows by using the Toggle Button and
Press OK button

Toggle Button

In the present setting you will have


following table of 06 columns and 02 rows.

Columns Cell

Rows

19
RESTRICTED
RESTRICTED

2. WORKING IN THE TABLE

SELECTING ROW, COLUMN AND A SINGLE CELL

(a) SELECTION OF ROW

Bring the cursor pointer to the left margin and the inline of the row you
want to select and just click.

(b) SELECTION OF COLUMNS

Bring the cursor pointer on the top on the column you want to select and
then just click.

(c) SELECTION OF A CELL

Click inside a cell you want to select.

(d) SELECTION OF WHOLE TABLE

Simply click on this mark which is on left top of the table

3. TYPING & ARRANGING A TABLE

Follow the following steps:


• Click inside the cell.
• Start writing something as shown below.
• New Row can be Adding by clicking Tab key in the last cell.

S.No Name PakNO Trade Unit


01 Irfan 485166 IT Asstt AHQ Pesh
02 Javed 485161 IT Asstt IT School
03 Maqsood 485189 Sectt Asstt Flying wing

NOTE: The above table can be arranged in Left Align , Center and Right
Align by clicking on left top corner of the table to select the whole table and
then using ALIGNMENT BUTTONS (ICONS) on the Formatting Toolbars.

Alignment Icons

20
RESTRICTED
RESTRICTED

4. INSERTING NEW ROWS AND COLUMNS

(a) ROWS

Do the following steps:


• First select the row to which above or below a row can be inserted.
• Click Table on Menu Bar , Point insert and then click one of the last
two options according to your choice.

Example

It will insert a row just


just above the 2nd row and
your table will be the following.

S.No Name PakNO Trade Unit


01 Irfan 485166 IT Asstt AHQ Pesh

02 Javed 485161 IT Asstt IT School


03 Maqsood 485189 Sectt Asstt Flying wing

(b) COLUMNS

Do the following steps:


• First select the column to which left or right a column can be
inserted.
• Click Table on the Menu Bar, Point to Insert and then Click any of
the 2nd or 3rd item.

21
RESTRICTED
RESTRICTED

Example:

It will insert a blank column after the


selected column.

Your table will look like the following.

S.No Name PakNO Trade Unit


01 Irfan 485166 IT Asstt AHQ Pesh
02 Javed 485161 IT Asstt IT School
03 Maqsood 485189 Sectt Asstt Flying wing

22
RESTRICTED
RESTRICTED

Microsoft Word Assignment # 5


(Save and Print Options)
Save & Print Option

1. SAVING A DOCUMENT

After you have completed your document the document needs to be saved onto
your hard disk or some other location according to your needs.

There are following few methods for saving the document.

First Method: Press CTRL + S shortcut keys.

Second Method: Click File Menu and then Click Save Option.

Third Method: Click on the ICON of the Standard Toolbar.

In all the above cased below windows will open asking you some information
before saving the document.

Here select the Location

Here give a reasonable name.

& finally Click the Save Button.

Notes: Difference between Save & Save As is that when you save a
document first time you take Save option and if you want to save the same
document at other location and with a different name you choose Save As
option. Saving in both cases is same.

2. PRINT A DOCUMENT.

First Method: Press Ctrl + P shortcut Key from the Keyboard.

Second Method: Click File from Menu Bar and then Click Print Option.

23
RESTRICTED
RESTRICTED

Third Method: Click Print Icon on the Standard Toolbar.

In all cases a windows will appear where decision be made according to the
requirements.

1
2

Notes :

1.

ALL: means entire document will be printed.


Current Page: means that only current page will be printed.
Pages : means you have to specify the pages to be printed.
Selection: means a part selected of the document.

2.

Here specify the No of copies of the Printing.


24
RESTRICTED
RESTRICTED

3.

Here the name of the Printer is displayed means that the printout will directly go
onto this specified Printer. However the printer can be changed by clicking
button
and select the printer.

After you made your necessary changes click on Ok Button.

25
RESTRICTED
RESTRICTED

POWER POINT

Introduction

1. PowerPoint is a component of Ms Office, which is used to create presentations


or transparencies. A presentation consists of one or more slides. Slides by combining
text, graphics, organization chars, clipart, word art and templates.

Starting MS Power Point

2. There are a number of ways to start power point. The most common ways are:

(a) Double click the power point icon if it is present on the desktop.

(b) Click start button, point to program and then click Ms PowerPoint.

Views in PowerPoint

3. Microsoft PowerPoint comes with different views to help you while you are
creating a presentation. The two main view used in PowerPoint are normal view and
slide sorter view. To easily switch between views, you click the buttons at the lower left
of the PowerPoint window.

(a) Normal View: Normal view contains three panes the outline pane,
slide pane and the notes pane. These panes let you work on all aspects of your
presentation in one place. You can adjust the size of the different panes by
dragging the pane borders.

(b) Slide Sorter View: In slide sorter view we see all the slides present in
the presentation on screen at the same time, displayed in miniature. This makes
it easy to add, delete and move slides, at timings and select animated transitions
for moving from slide to slide. You can also preview animations on multiple
slides by selecting the slide you want to preview and then clicking animation
preview on the slide show menu.

(c) Slide View: In this view, we can work with only one slide at a time. We
can add title and body text, graphs, organization chat, clip art and word art. We
can also draw shapes and access all of the toolbars.

(d) Outline View: In this view, we can organize and develop the
contents of the Presentation.

(e) Slide Show View: This view is used to display the presentation on the
full screen of the computer’s monitor. In this view, all the bars will be hidden.

Creating a New Presentation

4 For creating a new presentation, we need to follow these points:-

26
RESTRICTED
RESTRICTED

(a) Select option File from the menu.

(b) Select new. A dialogue box will appear, select blank presentation and
press ok.

(c) Select an Auto layout.

(d) Click OK. A blank slide with the selected Auto layout is displayed on the
screen.

Saving a Presentation

5 We can save the presentation by the following procedure:-

(a) Select option File+Save from the Menu Bar or simply press CTRL+S or
click save icon present.

(b) Select Save from the Menu in the standard toolbar.

(c) Select the drive & directory in which you want to save the presentation.

(d) Write the name of the presentation in the File Name Area.

(e) Click Save.

Apply or Change Slide Background Color

6. We can change the appearance of the slide background by changing its color,
shade, pattern or texture. We can also use any of a slide background, but can use only
one type of background on a slide.

(a) Click Background on the Format menu.

(b) Under Background fill, click the down arrow & then select the color.

(c) To change to a color in the color scheme, click one of the eight colors
below Automatic.

(d) To change to a color that isn’t in the color scheme, click More Colors. Click
the color you want on the standard tab, or click the Custom tab to mix own color,
and then click OK

(e) To change background color to its default click Automatic


(f) To apply the change to the current slide, click Apply.
(g) To apply the change to all slides and the slide master, click Apply to all.

27
RESTRICTED
RESTRICTED

Apply Design Template to a Presentation

7. (a) Click Apply Design on the Format menu

(b) Select the Design and then click Apply

Slide Transition

8. Movement of the slide with a special effect is called slide transition. Following
points are necessary to apply the transition on any slide.

(a) In slide or slide sorter view, select the slide or slides on which we want to
apply transition.

(b) On the slide show menu, click Slide Transition

(c) In the Effect box, select the transition and see the preview in the preview
box.

(d) Select the Speed (Slow, Medium, and Fast) for the transition effect

(e) To apply the transition to the selected slide, click Apply

(f) To apply the transition to all the slides, click Apply to all

Adding Animation In a Presentation

9. Animation means,” To add a special visual or sound effect to text or an object.


We can animate text, graphics, sounds, movie and other objects on the slides with the
help of the Custom Animation option. By this option, we can focus on important points,
control the follow of information and add interest to the presentation. To set up and
preview the animation of the text and objects, follow the followings points,

(a) Click Custom Animation on the Slide Show menu.

(b) Select the Slide Object from” Slide Objects without Animation” box of
the timing tab.

(c) Click the Effect tab & select the effect.

(d) Then Click OK.

28
RESTRICTED
RESTRICTED

ASSIGNMENTS
Microsoft Power point Exercise # 1
(Opening MS PowerPoint Presentation, inserting new slide /applying design & entering data)

1. Open a new MS Power point Presentation.

(a). First Method:

Click on button

Go to Programs by the help of arrow keys

Click on Microsoft Power point

(b). Second Method:

Right click on empty space of Desktop and point to New and click on
Microsoft PowerPoint Presentation.

In either case a new Microsoft Power point Presentation with Name


‘Presentation 1’ will open

29
RESTRICTED
RESTRICTED

Title Bar
Menu Bar
Tool Bar

Slide index

You can choose a Blank presentation.

2. Inserting a New slide.

(a). First Method:

Shortcut Key from Keyboard is Ctrl+M

(b). Second Method:

click on button on the ToolBar.

(c). Third Method:

Click on Insert Menu and then Click New Slide

In all cases you will find a Pane on the right side.

You can choose certain


Text or Content Layout
30
RESTRICTED
RESTRICTED

patterns before starting ….

“SELECT SOME LAYOUTS AND ENTER DATA”

3. Applying design Template.

Click on the Format Menu and then Click


on Slide design.

A slide Pane on the right Side will appear

Choose Design Templates


before starting (with colorful backgrounds)

“MAKE FOUR SLIDES IN DIFFERENT DESIGN TEMPLATES”

4. Entering Data in the Slide.

Once you have decided and selected the text layout and design of your
presentation …. You can start typing / adjusting your ideas as text, charts, graphs,
pictures etc

Enter data and work with Font , Font size


and Font Styles as you have practiced in MS Word
application.

31
RESTRICTED
RESTRICTED

Microsoft Power point Exercise # 2


(Working Area, Views and Switching among Views)

1. Working area.

After you have opened the MS PowerPoint presentation …. It looks like this;

2. Views of Presentation.

A slide can be in one of the following views ………..

™ Normal view

Note: In this View you can edit, update and change the contents and
other properties.

Normal View
™ Slide sorter view

Note: In this View you can see all the slides on one screen allowing you
ease to arrange the slides.
32
RESTRICTED
RESTRICTED

Slide Sorter View


™ Slide show view

Note: In this View You can run the show of your presentation. In this view
you will not see any of the Bars and other areas of the screen except your
working area.

Slide Show View

There are two ways to switch among these Views.

(a). First Method:

Click View on Menu Bar and then choose accordingly.

33
RESTRICTED
RESTRICTED

(b). Second Method:

These views are also present on the lower left side of the screen. You can
click any of them accordingly.

Normal View

Slide Sorter View Slide Show View

34
RESTRICTED
RESTRICTED

Microsoft Power point Exercise – 3


(Working with Different Slides)

1. First Slide:

When you open PowerPoint Presentation you will see your first slide called as
Title Slide. This Slide will let you enter the Title and sub title of the Slide.

ACTIVITY:

1. Click on the item ‘Click to add title’ and add a suitable Title e.g
(Pakistan Air Force)

2. Similarly click on the item ‘Click to add subtitle’ and add a suitable subtitle
e.g (I T School)

2. Text Slide :

Insert a Text Slide as you have learnt.

ACTIVITY:

1. Click on the item Click to add title and add a suitable title to the slide e.g
Role & Task of ITS

35
RESTRICTED
RESTRICTED

2. Click on the item Click to add text and add text to the slide e.g

• To provide computer knowledge to all PAF personnels.


• To provide Software & Hardware Support to all units in PAF Camp
Badaber.
• To provide E-Testing facility to all units in Badaber.

3. Organization Chart:

Insert an Organization chart.

ACTIVITY:

1. Click on the item ‘Click to add title’ and add a suitable title e.g

36
RESTRICTED
RESTRICTED

Organization Chart of ITS.

2. Double Click on the item ‘Double click to add diagram or organization chart’ to
add chart.

3. Select the layout of Organization Chart.

4. The following window will appear

Chart Toolbar

Click inside
this box to
enter your
text

5. Insert at least 02 Subordinates to each and one Assistant to the first box to the
chart by clicking Insert Shape Icon on the Organization chart toolbar.

6. Apply suitable Slide design to all slides as learnt.

Microsoft Power point Exercise # 4


(Transition & Custom Animation)
1. Transition:
37
RESTRICTED
RESTRICTED

Definition: Movement of the whole slide with special effects is called


Transition.

How To Apply Transition:

• First select the Slide then go to Slide Show on MenuBar and click Slide
Transition.

• A pane will appear on the right side showing different options. Select the
options and these will apply to the selected slide.

No Transition means no
effects have been assigned.

Choose a style of your choice from this


list. Just click on the choice.

You can set speed


and sound options.

If you want to apply the


selected style to all slides
then click this button.
2. Custom Animation:

Definition: Animation means to add any special sound or visual effects to the
contents of the slide is called Animation.

How To Apply Transition:

• First Select the select of the slide e.g ‘Pakistan Air Force’ is selected.
38
RESTRICTED
RESTRICTED

• Then go to Slide show on MenuBar and click on Custom Animation. A


pane will appear on the right side. Click Add effect & point to one category
out of the available four and select your choice.

Main Categories
of Animation.

Select your choice

You can select more


effect option by
clicking this.

Similarly you can select the second element of the slide i.e

‘IT School, PAF Camp Badaber’

and proceed as learnt.

Note: you can view your Transition and Custom Animation setting by running your
presentation in Slide Show view or by Pressing F5 key on the keyboard.

39
RESTRICTED
RESTRICTED

Microsoft Power point Exercise # 5


(Printing and saving MS PowerPoint Presentation)

1. SAVING A DOCUMENT

After you have completed your Presentation the Presentation needs to be saved
onto your hard disk or some other location according to your needs.

There are following few methods for saving the Presentation.

First Method: Press CTRL + S shortcut keys.

Second Method: Click File Menu and then Click Save Option.

Third Method: Click on the ICON of the Standard Toolbar.

In all the above cases below windows will open asking you some information
before saving the document.

Here select the Location

Here give a reasonable name.

& finally Click the Save Button.

Save
button

Notes: Difference between Save & Save As is that when you save a
document first time you take Save option and if you want to save the same
document at other location and with a different name you choose Save As
option. Saving in both cases is same.

40
RESTRICTED
RESTRICTED

2. PRINT A DOCUMENT.

First Method: Press Ctrl + P shortcut Key from the Keyboard.

Second Method: Click File from Menu Bar and then Click Print Option.

Third Method: Click Print Icon on the Standard Toolbar.

Select Printer

ALL means the whole presentation will


be printed out.
Current slide means only selected
slide will be printed.
Slides means you have to select the
slides.
Selection means some part of the
slide to be printed out.

Print Handout / 6 per page

Finally Press this Button to


take the print out.

41
RESTRICTED
RESTRICTED

MICROSOFT EXCEL

Introduction

1. MS Excel is the spreadsheet and data analysis program in Office XP. It combines
incredible power with ease of use, giving professionals and occasional users the
features they need. MS Excel is designed such that you can use it as a basic
spreadsheet program, and learn more advanced skills as you need to.

2. A basic spreadsheet is comprised of a table of values, some of which are


calculated by formulas and functions. MS Excel can check your formulas and help you
define functions using wizards. With a computer-based spreadsheet, you can change a
particular data value in the spreadsheet and all the values that are affected by the
change are re-calculated. To take full advantage of this feature, you should use
formulas and functions instead of numbers where possible.

Understanding screen of |MS-Excel

3. When you will open MS Excel following window will appear on the screen:

Standard
Toolbar
Formatting
Formula Bar Toolbar

Worksheet
Window Task
Pane

Status Bar

How to Open MS Excel

4. Microsoft Excel can be opened by any one of the following ways:


(a) Clicking on Start then choose All Programs and then click on

42
RESTRICTED
RESTRICTED

Microsoft Excel.
OR
(b) By double clicking MS Excel icon on the desktop (If present there).
OR
(c) By double clicking any existing file previously created in MS Excel.

How to Close MS Excel

5. You can close Excel from the File menu (Click on File and then on Exit)
OR
By clicking on the red X in the upper right hand corner.

Understanding the Excel window

6. The Excel window can be divided into following areas:

(a) Title Bar contains title of the software i.e. Microsoft Excel and name of
the currently opened file e.g. Book1

(b) Main Menu Bar contains different major options like File, Edit and View.

(c) Toolbars are located at the top, under the Main Menu bar

(d) Formula Bar is located under the Toolbars displays contents (data or
formula) of the highlighted cell. To the left of the Formula Bar is the Name Box;
it displays the Cell name or address of the highlighted cell.

(e) Task Pane is the panel to the right of the Worksheet. The Task Pane lists
some of the most common tasks you may want to accomplish in Excel. The
tasks are descriptive to help you quickly locate the task you want. To perform
the task, simply click on the task description.

(i) To display the Task Pane: From the main menu, choose View >
Task Pane (you will see a check mark beside it when the Task Pane is
visible).

(ii) To switch to other Task Panes: Click on


the Other Task Pane down arrow and select
another Task Pane from the menu (the New
Workbook Pane is the default pane)

(f) The Worksheet window is the main working


area. It consists of vertical Columns A B C D etc. and horizontal rows 1 2 3
onward. You enter data in cells. Cell is the area where a column and a row meet.
The cell address is represented in “column letter-row number” format like A1, B4
etc. Here B4 represents 4th Cell in column B.

Note: You can put your mouse over a button or area to see the Tool Tip description
of that button or area.
43
RESTRICTED
RESTRICTED

Toolbars in MS Excel

7. Excel has 19 Toolbars. By default, the Standard and Formatting Toolbars will be
displayed. Most of the other Toolbars are used only for specific functionality in Excel.

(a) All Toolbars are dock able. This


means that the Toolbar can be moved
around the Desktop or locked to the Excel
interface.

(b) From the main menu, choose View >


Toolbars and select the Toolbar
you want to display (you will see a check
mark beside a Toolbar when
it is visible).

8. To Move or Dock a toolbar begin by


placing the mouse over the left side of the
Toolbar you want to move (your mouse
cursor should change to the move cursor

(a) To Move Click and drag the


Toolbar to where you want to move it

(b) To Dock Click and drag the


Toolbar to one of the four sides of the Excel window

Note: The main menu can also be moved and docked

9. The Standard Toolbar provides quick access to commonly used actions. Each
action is represented by an icon. When you put your mouse pointer over an icon, it is
highlighted in blue and a descriptive tool tip appears. Locate the icon for the action you
want to use and click on the icon.

44
RESTRICTED
RESTRICTED

10. The following are icons on the Standard Toolbar:

1. New - Create new workbook. 2. Open - Display Open dialog


box
3. Save - Save Workbook 4. E-mail - Send the
Workbook as an email
5. Search - Display the Basic Search 6. Print - Print the
Workbook
7. Print Preview – change display to print preview 8. Spelling - Start the
Spell Check
9. Cut - Cut the selected range 10. Copy - Copy the
selected range
11. Paste - Paste the last cut or copied item 12. Format Painter- copy
formatting
13 Undo - Undo the last action 14. Redo - redo the last
Undo action
15. Insert Hyperlink - insert a hyperlink. 16. AutoSum - create a
sum function
17/18. Sort Ascending/Sort Descending - sort the selection in ascending or
descending order.
19. Chart Wizard - start the Chart Wizard. 20. Drawing - display the
Drawing toolbar.
21. Zoom - Zoom the Worksheet to specified %age. 22. Excel Help - display
the Office Assistant.
23. Toolbar Options - select custom Toolbars options from a drop-down list.

11. The Formatting Toolbar provides quick access to commonly used formatting
actions. Each action is represented by an icon. When you put your mouse pointer over

an icon, it is highlighted in blue and a descriptive tool tip appears.

45
RESTRICTED
RESTRICTED

Working with Workbooks and Worksheets

12. To start working in Excel first we will need to create a new workbook or Open
an existing one. MS Excel automatically starts with a new Workbook containing three
Worksheets.

13. A Worksheet is essentially a very


large table, consisting of rows and columns.
Rows are identified by numbers while
columns are identified by letters. This is
where you would enter your data. Within
MS Excel, you can have up to 65,536 rows
and up to 256 columns

14. A Workbook consists of one or more


Worksheets. The name of the Worksheets is
displayed on the sheet tabs at the bottom of the
Excel window. By default the Worksheets in a new
Workbook will be named Sheet1, Sheet2, and
Sheet3.

15. To rename a worksheet


(a) Double-click on the sheet tab of the Worksheet you want to rename, enter
a new name for the Worksheet, and press the Enter key
OR
(b) Right-click on the sheet tab, choose
Rename from the pop-up menu, enter a new
name for the Worksheet, and press the
Enter key

16. To Create a new workbook:

(a) From the main menu, choose File > New and
click on the Blank Workbook link in the New
Workbook Pane
OR
(b) Click on New icon on Standard toolbar
OR
(c) Press Ctrl+N key combinations from keyboard.

17. To open an existing workbook:

(a) From the main menu, choose File > Open and select your required
workbook from using Open Dialog.
(b) Open Dialog can also be opened by Open icon on Standard toolbar
OR
(c) By Pressing Ctrl + O key combinations from keyboard.

18. To save a workbook:

46
RESTRICTED
RESTRICTED

(a) From the main menu, choose File >Save


OR
(b) Press the Ctrl + S key combination
OR
(c) Click on the Save icon on Standard toolbar

Note: When you will save a workbook for first time, the Save As dialog box will
appear. Enter a file name in the File Name text box, and click Save.

19. To save a copy of the workbook:

(a) From the main menu, choose File > Save As to display the Save As
dialog box.

(b) Enter a new file name in the File Name text box. Click Save.

Understanding Cells and ranges

20. A Worksheet is made up of Cells. You can refer to a


Cell by using the Column letter and Row number. For
example, D8 refers to the Cell in Column D and Row 8. In
this case, D8 is known as the Cell Reference or Cell
Address and is also used as the default name for the Cell.

21. You can enter numbers, formulas, functions, and


text into an individual Cell. Cells containing numbers can
be used as part of a formula or function in Cells with
calculated values, and Cells containing text provide labels
and descriptions to your numbers and calculated values.

22. A Range is made up of Cells. Ranges can be any rectangular area of Cells
within a Worksheet. You can refer to a Range by using the Cell Reference of the top-
left and the bottom-right Cells. For example, B2:D8 defines the rectangular range
bounded at the top-left by the Cell in Column B and Row 2 and at the bottom-right by
the Cell in Column D and Row 8.

Understanding Active Cell?

23. Excel identifies the Active Cell with a bold outline


around the Cell and highlighting the Column-heading-letter
and Row-heading-number of the Cell. In our example as
shown in the picture, B2 is the Active Cell

24. You can make a Cell active simply by clicking on it or


by navigating to it (how to navigate to a cell is coming up next).

25. Click on B2. It will become active cell. Now enter


any text or formula from keyboard. For example enter
“=2000+2” (without quotes) and press enter key. Notice
that B2 is displayed in the Name Box, and the contents
47
RESTRICTED
RESTRICTED

of the Cell =2000+2 is displayed in the Formula Bar. Result will be displayed in the cell
itself, in this case, 2002, that is a calculated value from 2000+2.

Navigating within a worksheet

26. Navigating to a specific cell: If you know the Cell Reference of the Cell you
want to move to, you can navigate directly to it. Click on the Name Box on the Formula
bar, enter the Cell Reference, and press the Enter key. Excel will make it as a new
active cell.

27. Moving around the worksheet: A common way to navigate around the
worksheet is to use your keyboard. To move from cell to cell use following keys or key
combinations from the keyboard:

Press This: To Move the Active Cell To:


Tab or One cell to the right
Shift+Tab or One cell to the left
Shift+Enter or One cell up
Enter or One cell down
Ctrl + To the left edge of the current region
Ctrl + To the right edge of the current region
Ctrl + To the top edge of the current region
Ctrl + To the bottom edge of the current region
Home To the first cell in the row
Ctrl + Home To the first cell in the Worksheet
Ctrl + End To the bottom right cell that contains data
Page Up One screen Up
Page Down One screen Down
Alt + PgUp One screen to the left
Alt + PgDown One screen to the right

48
RESTRICTED
RESTRICTED

Selecting Items in Excel

28. To Select different items like Cell, Row, Column with the following way:

To Select What to Do
A Cell Click on the Cell.
A Complete row Select a Row by clicking on the Row-header-number.
A Complete Column Select a Column by clicking on the Column-header-letter
Click on the first cell in the range and drag over the cells
you want in the range
OR Click on the first cell in the range (i.e. the top-left
A Range of cells
corner), move the mouse to the opposing cell in the range
(i.e. the bottom-right corner), hold down the Shift key, and
click on the opposing cell.
Non-contiguous Select the first range, hold down the Ctrl key, and select
ranges the other ranges you want
Click the Select All square in the top-left corner of the
Worksheet. (The Select All square is located at where the
row headings and column headings meet)
OR
Press Ctrl + A key combination.
Click on the first sheet tab of the Worksheet you want to
Several Worksheets select, hold down the Ctrl key, and click on the other sheet
tabs of the Worksheets you want to select
All Worksheets of a Right-click on a sheet tab, and choose Select All Sheets
workbook from the pop-up menu

Entering Data into Cells


29. Data is always entered into Active Cell with your keyboard. Press the Enter key
when you want to move to the next cell. Begin by clicking in the cell you want, making it
the Active Cell. Type the text and press the Enter key.

30. By default, text is left-aligned and numeric values are right-aligned you can
change the alignment of the text/numbers using
alignment tools from formatting toolbar.

31. If your text is longer than the width of the


column, it will run over to the cell in the next
column if that cell is empty.

(a) For example if A1 is our Active


Cell then type text “Islamic republic of
Pakistan.” and press enter key.
(b) Now B1 will become Active Cell
and your text will run over to the cells in Column A to Column C.

32. If the adjacent cell (in this case B1) contains data, the text display is truncated.
The full text is still available in the Formula bar.
49
RESTRICTED
RESTRICTED

(a) Select A2 and Type


“President of Pakistan” and press
enter key.

(b) Now Text of A1 will be


truncated (only “Islamic rep” is
being displayed in A1, although it
still contains whole string that we
typed earlier.

(c) You will have to reformat


your cells to accommodate long text.

Calculating values and Entering Formulas

36. One of the basic functionality of a spreadsheet is the ability to calculate values
based on numeric data. A formula is a mathematical expression that can consist of
operands, values, variables, and symbols. For example, calculate the total of a column
of sums, interest amount, or cost per unit.

37. In MS Excel, operators are executed in a specific order. You can use
parentheses ( ) to change the order of execution.

38. Entering an equal (=) sign in a cell will bring up the Formula toolbar. The
following are icons on the Formatting Toolbar:

Functions - select recently used


function from drop-down list.
Cancel - exit formula editing without
saving your changes.
Enter - save and calculate the
formula.
Insert Function - display the Insert
Function dialog box.

Formula Bar- display the formula of the Active Cell.

(a) Begin by clicking in the cell in which you want to put your result.

(b) Type an equal (=) sign followed by the expression that will calculate the
result you want.

(c) Press the Enter key to calculate the result.

(d) The following are some examples:

(i) To add contents of two cells enter =A4+B4

50
RESTRICTED
RESTRICTED

(ii) To add range of addresses (e.g. A1 to A4) there are two ways
=A1+A2+A3+A4
OR
=Sum(A1:A4) (Here Sum is a function and functions are coming
up next)

(iii) To divide F9 with 12, Multiply E8 with 2 & with A12 and subtract
result of F9/12 enter formula
=A12+E8*2-F9/12

39. The calculated value of a formula is displayed in the Worksheet cell. You can
display the formula in the Formula bar by making the cell active.. If there is an error
in the formula, the upper-left corner will be marked with a green triangle and the cell
will display a short error message beginning with a # symbol

40. Enter a cell reference: Instead of typing in a cell reference

(a) Select cell where you want your result and type =

(b) Now you can use the arrow keys (on keyboard) to move to the desired
cell. Your formula will change to display the current cell reference; when you
reach the desired cell, Press the Enter key to return to your formula.

41. Enter a range reference: Instead of typing in a range reference, you can use
the arrow keys to select the desired range. Begin by moving the cell pointer to the first
cell in your range. Enter a period (.) to mark the beginning of the range, and move the
cell pointer to the last cell in your range

42. You can also use the mouse to select the cell or range reference you want. This
is especially useful when entering a cell or range reference that is on another
Worksheet within the same Workbook.

43. When referring to a cell or range that is not on the same Worksheet as your
formula, the sheet name and the exclamation mark (!) appear in front the cell/range
reference. For example, =Sheet2!C2 represents cell C2 of sheet Sheet2.

Understanding a Function

44. Excel provides a wide range of predefined


formulas called functions to help you quickly setup
simple and complex calculations. The Functions are
formula shortcuts that only require the values or
arguments needed for the specific calculation. This
saves you the hassle of creating a formula from
common mathematical equations.

45. Begin by clicking in the cell you want, making it


the Active Cell. Start entering a formula by typing an
equal (=) sign. Enter the function name, followed by an
opening parenthesis, arguments, separated by
51
RESTRICTED
RESTRICTED

commas, and a closing parenthesis, press the Enter key to calculate the result. The
following is an

Example: In the picture total marks obtained are calculated by a SUM function:

(a) Click on Cell C10 (to put result into it)

(b) Enter function =SUM(C4:C9)

Automating tasks through Macros

46. If you perform a task repeatedly in Excel, you can automate the task with a
macro. A macro is a series of commands and functions that are stored in Excel and can
be run whenever you need to perform the task.

47. For example, if you often enter long text strings in cells, you can create a macro
to format those cells so that the text wraps.

48. Recording macros. When you record a macro, Excel stores information about
each step you take as you perform a series of commands. You then run the macro to
repeat, or "play back," the commands. If you make a mistake when you record the
macro, corrections you make are also recorded.

49. Making a macro easy to run. You can


run a macro by choosing it from a list in the
Macro dialog box. To make a macro run
whenever you click a particular button or press a
particular key combination, you can assign the
macro to a toolbar button, a keyboard shortcut,
or a graphic object on a worksheet.

50. How to create or Record a Macro:

(a) On Tools menu, point to Macro, and


then click Record New Macro.

(b) In the Macro name box, enter a


name for the macro e.g. mystyle

(c) If you want to run the macro by


pressing a keyboard shortcut key, enter a
letter in the Shortcut key box. You can use
CTRL+ letter (for lowercase letters) or
CTRL+SHIFT+ letter (for uppercase letters),
where letter is any letter key on the
keyboard. The shortcut key letter you use cannot be a number or special
character such as @ or #. e.g. choose Ctr+Shift+T.

(d) In the Store macro in box, click the location where you want to store the
macro.
52
RESTRICTED
RESTRICTED

(e) If you want to include a description of the macro, type it in the


Description box

(f) Click OK.

(g) Carry out the actions you want to record. For example

(i) Font Size set to 14 and bold, Fill color to Green

(ii) Put a border around the cell

(iii) Any other action you want to record

(h) On the Stop Recording toolbar, click Stop Recording.

(j) To repeat same settings on any other cell

(i) Select the Cell

(ii) Now press Ctrl+Shift+T (OR any other key combination you set for
your macro)

53
RESTRICTED
RESTRICTED

(iii) Same settings will be applied on selected cell

Example:

51. Creating a result sheet of students of class 10th.

(a) Enter data of the students in


a worksheet.

(b) We need to calculate

(i) Total Marks Obtained


by each student
(ii) Percentages
(iii) Result (Pass or Fail)
(iv) Grade of each
student

(c) Create new columns for each category.

(d) Now to calculate total marks obtained by each student by using SUM
Function

(i) Click on Cell I4


(ii) Enter formula as =SUM(C4:G4)
(iii) When you will Press Enter Key total marks will appear in I4
(iv) Copy I4 and paste it in all cells against each student (I5 to I12)

54
RESTRICTED
RESTRICTED

(v) Same formula will be applied for remaining cells.

I12

(e) Now to calculate percentage by using formula (Marks


Obt x 100 / Total Marks):

(i) Click on Cell J4


(ii) Enter formula as =I4*100/H4
(iii) When you will Press Enter Key percentage will be calculated and
will appear in J4
(iv) Copy J4 and paste it to J5 to J12
(v) Same formula will be applied for remaining cells.

J12

(f) Now to calculate result by using IF() conditional function (If percentage is
greater than or equal to 50 then print “Pass” other wise print “Fail”. Formula will
be IF(Percentage >= 50 “Pass”, “Fail”):

(i) Click
on Cell
K12K4
(ii) Enter
formula as =IF(J4>=50, “Pass”, “Fail”)
55
RESTRICTED
RESTRICTED

When you will Press Enter Key it will check value of J4 if it is less
than 50 “Fail” will appear in K4 other wise “Pass”
(iii) Copy K4 and paste it to K5 to K12
Same formula will be applied for remaining cells.

(g) Now to calculate grades by using IF() and nested IF() (IF within IF)
conditional function (If percentage is less than 50 then print “D”, if it is Less than
60 then print “C”, if it is less than 80 then print “B” other wise “A”. Formula will be
IF(J12<50,”D”,IF(J12<=59,”C”, IF(J12<=79,”B”,IF(J12<=100,”A”))))

(i) Click on Cell L4


(ii) Enter formula as
= IF(J4<50,”D”,IF(J4<=59,”C”, IF(J4<=79,”B”,IF(J4<=100,”A”))))
(iii) When you will Press Enter Key it will check value of J4 if it is less
than 50 “D” will appear in L4 , If it is between 50 to 59 then “C”, “B”
if between 60 and 79 and if it is greater than 79 then “A” will be
appear in grade column.

L12

(iv) Copy L4 and paste it to L5 to L12


(v) Same formula will be applied for remaining cells.

(h) Now your Result Sheet is finalized.

56
RESTRICTED
RESTRICTED

ASSIGNMENTS
MICROSOFT EXCEL ASSIGNMENT NO # 1
(Starting MS-Excel Document, Screen and Definitions)

1. How to start working with MS Excel

Icons

Start button

Empty area
Use aero key

(a) FIRST METHOD: Click Start Button, Go to Program


& select “Microsoft Excel”

57
RESTRICTED
RESTRICTED

(b) SECOND METHOD: Click on the Empty Area of the


Desktop, right Click, select New and then
Microsoft Excel Worksheet.

2 UNDERSTANDING MS EXCEL SCREEN


Column

Title Bar
Menu Bar
Tool Bar
Formula Bar
Cell Address

Cell

Main Working
Area

Row

Sheets

58
RESTRICTED
RESTRICTED

3. DETAILED DEFINITIONS OF MS-WORD SCREEN

TITLE BAR:

NOTES: The topmost BLUE bar is called the Title Bar which tells us
the Application Name and the document name.

MENU BAR:

NOTES: The second horizontal listed Bar is called Menu Bar which
by clicking will open menus.

TOOL BARS:

NOTES: The next two Bars shown and those not shown reflecting
small colourful pictures called ICONS are Tool Bars.

FORMAULA BAR:

NOTES: A Bar shows the cell formula.

4. NOTES ABOUT MS-EXCEL:


• MS-Excel document is called Workbook.
• MS-Excel Workbook contains Worksheets.
• There are 65536 rows and 256 columns in a sheet.
• By Default there are 03 Worksheets available on every Workbook.
• You can open maximum 255 Worksheets in a Workbook.

59
RESTRICTED
RESTRICTED

MICROSOFT EXCEL ASSIGNMENT NO # 2


(Inserting, Renaming, Moving & deleting a sheet)

1. INSERTING A NEW WORKSHEET

Click Insert on Menu Bar and then click WORKSHEET.

Your New Worksheet will be added alongwith the other Worksheets.

New Worksheet

2. RENAMING A WORKSHEET

Right click on the Worksheet and Click on Rename and Give an Appropriate
name e.g Class and Press Enter Key.

60
RESTRICTED
RESTRICTED

Your New Sheet will be renamed as follows:

3. MOVING OF A WORKSHEET

(a) FIRST METHOD:

Click and hold the sheet you want to move and then click where you want
to move i.e before or after any sheet.

(b) SECOND METHOD:

Right Click on the Sheet you want to move, select Option Move or Copy a
small window will appear asking you the location where you want to move the
worksheet. Select the location and Press Enter Key.

For example you opted to move the sheet before sheet3 then your Sheet named
CLASS will be lying between Sheet2 & Sheet3 as shown below.

61
RESTRICTED
RESTRICTED

4. DELETING A WORKSHEET.

(a) FIRST METHOD:

Right Click on the Worksheet you want to delete e.g Class Worksheet and
Select Delete option.

(b) SECOND METHOD:

Simply select the worksheet by just click it once and Press Delete Key
from Keyboard.

(c) THIRD METHOD:

Select the Worksheet by just click it once and Click Edit on Menu Bar and
click Delete.

62
RESTRICTED
RESTRICTED

MICROSOFT EXCEL ASSIGNMENT NO # 3


(Entering Data and Applying Formulae)

1. ENTERING OF DATA

Click on the cell where Area to select for Entering, the Name Box shows the cell
where you want to Enter Data. You can navigate through the Worksheet by
using the Arrow Keys on the Keyboard.

63
RESTRICTED
RESTRICTED

2. AFTER ENTERING THE DATA


After entering the Data, your sheet would be look like …..

64
RESTRICTED
RESTRICTED

3. FORMULAE

(a) Addition:

1. First select cell where you want to place Total suppose J4


2. Go to formula bar and then Enter following Formula
“=sum(E4:H4 ) Here E4:H4 is a range as shown in the formula.

Note : Formula always start with = sign


Formula bar

When you Press Enter Key after writing Formula the total of the sum is shown in
J4

Now you can apply the same formula on the entire data by Two methods.

(a) FIRST METHOD: COPY AND PASTE METHOD

First Step: Select The Cell J4 and Apply Copy Command by using
CTRL+C shortkey Command, Simply click Icon on the
Standard Toolbar or Select Copy Option from Edit Menu.

65
RESTRICTED
RESTRICTED

Second Step: Now Select Cells from J5 to J20 and Apply Paste
Command by using CTRL + V shortkey command, simply click
Icon on
the Standard Toolbar or Select Paste Option from Edit Menu.

Cell J5 to J20

(b) SECOND METHOD: Select Cell J4 you will find a rectangular box
around the cell with a + sign at the lower rightmost corner. Place the cursor
on the sign and drag the mouse down to Cell J20. It will copy the same formula
till Cell J20.

A sign that is to be
expanded

66
RESTRICTED
RESTRICTED

In either case your data will look like this:

(b) Multiplication:

To find out the Product do the following steps:

• First select cell where you want to place Product suppose L4


• Select the Range Suppose E4 to H4
• Write Formula ‘=Product(E4:H4)’ and press Enter.

After you press ENTER Key you will get Product like this:

4. SORTING

STEPS:

• For sorting the result Select area as under

You can extend the same Product Formula down to L20 by selecting the
Cell L4 and extend the down to the L20. which will look like this:

67
RESTRICTED
RESTRICTED

• Click Data on Menu Bar and then Sort option.

(c) Subtraction:

• First select cell where you want to place Subtraction suppose J4


• Select the cells you want to make subtraction suppose E4-F4
• Write Formula ‘=(E4:F4)’ and press Enter.

(d) Division:

• First select cell where you want to place Division suppose J4


• Select the cells you want to make Division suppose E4/F4
• Write Formula ‘=(E4/F4)’ and press Enter.

NOTES: You can extend the Subtraction and Division down to the
column by the same Procedure as in case of Addition and Multiplication.

68
RESTRICTED
RESTRICTED

MICROSOFT EXCEL ASSIGNMENT NO # 4


(Sorting, printing and saving a Worksheet)

1. SORTING:
For Sorting do the following steps:
• First select the data as shown below:-

• Select Data on Menu Toolbar and then Click Sort.

• Following windows will open:

69
RESTRICTED
RESTRICTED

Notes: In the windows there are 03 options available means you


can sort your data with three fields of your own choice and in the way
(ascending or descending) you want to sort it.

Suppose the above table is to be sorted with respect to


Column ‘J’ and in descending order means that the person whose
marks are greater should come on Top.

Select the Check the


column TOTAL
in the List
Descending
option

Press This
Button

70
RESTRICTED
RESTRICTED

After sorting, your data will look like this.

2. PRINTING:

• For printing, first we select the area to be printed.

71
RESTRICTED
RESTRICTED

• Now set the Print area by Clicking File from Menu Bar and the Click Set
Print Area.

NOTE: It will set the printable area instead of the whole sheet.

Now Click File on Menu Bar and click Print. Following Windows will open. Make
necessary changes and then click OK

72
RESTRICTED
RESTRICTED

3. SAVING MS EXCEL DOCUMENT.

(a) FIRST METHOD:

Press Ctrl + S keys from Keyboard.

(b) SECOND METHOD:

Click icon on the Standard Toolbar

(c) THIRD METHOD:

Click File on Menu Bar then Click Save option.

In all the three cases following windows will open.

Here select the


location of the
file required to
be saved.

Here give a
reasonable
name to the
file.

73
RESTRICTED
RESTRICTED

PAF INTRANET

Introduction

3. PAF Intranet is a network of networks which gives different types of e-services


within the organization.

How to start PAF Intranet?

4. To start PAF Intranet:

(a) To work with PAF Intranet, one should be connected to the


PAF Intranet Server places at Network Operation Cell, PAF.

(b) We can access PAF Intranet by


• Double click on internet explorer and type address
http://172.16.3.18/intranet/default_files/default.php

• Type http://net.paf/intranet/ in explorer address bar.

Main/Home page of PAF Intranet will be shown to user after some time.

74
RESTRICTED
RESTRICTED

Main/Home page

3. The first page which is shown on the screen after we are connected to PAF
Intranet is called Main / Home page. This is the screen / page which give user, access
to the other sites or pages of the site. Main / home page of PAF Intranet is featured as
followed:-

(a) Services: Following services are given by PAF Intranet:


• E-Courier
• Personal Mail
• PAF Website
• Weather
• IT Complaints
• PAF e-Forms
• PAF Forms
• Islamic Guidance

(c) PAF Gallery


• Air crafts
• Wallpapers
• Paintings
• Vedio Songs
• Media Coverage
• Screen saver

75
RESTRICTED
RESTRICTED

(d) Digital Library


• Information Resources
• Audio & Videos
• PAF Doctrine
• ALMS Manuals
• C4I
• Aviation articles
• PAF Law Manual
• Jane’s Online Resource (for authorized users only)

(e) Branch Portal


• VCAS Secretariat JF-17 PMO
• Operations DGAI
• Engineering DGC4I
• Administration Command & Bases Portals
• Training Personal Portals
• Personnel Safety
• Support Cyber Security
• IGAF Air Intelligence

(f) Training
• Aircraft CBTs
• E-LearningFIS
• Air War College
• HM-10 Lectures
• PAF e-Testing System

76
RESTRICTED
RESTRICTED

PAF Intranet Users

4. Two types are users are working on PAF Intranet.

(a) Secured Users: Users which have relatively more access to


resources and services provided by PAF Intranet.

(b) Unsecured Users: Users which have limited access to resources.


Software Applications

5. Several software applications are placed under this tab for PC-based application
being used by PAF users like

• Payroll System for Account users


• SNA Clients for Log users
• E-testing for Q-Es or CTTB users etc
Publications

6. All AFOs, AFIs, AFLs, AFMs and JSIs being updated for PAF Intranet users.

77
RESTRICTED
RESTRICTED

Downloads

7. CAS current messages / videos, computer softwares (antiviruses, patches,


offices, operating systems etc) are made available in this tab.

News

8. Dte of Media Affairs is updating and storing the national, international, sports and
PAF News under this tab.

Contact Us

10. The contacts of the administrative team are placed under this tab for the
information of the PAF Users.

78
RESTRICTED
RESTRICTED

INTERNET

Introduction

1. Internet is the world’s largest computer network. It is coined from the words,
“Interconnection” and “Network”. The Internet is often called the Net, the Information
Superhighway because there is a lot of interesting and varied information available on
the Internet and everyone can access these information within a second. It consists of
thousands of connected networks around the world. There is no limitation about the
network. Any type of network can be connected to the Internet.

Definition

2. Internet can be defined as “The Network of Networks”.

World Wide Web

3. It is also called WWW or W3 or simply the Web. It was originally developed at


CERN in 1991, the high energy physics research center in Switzerland where it was
used for publishing scientific research papers and the result of experiments. In 1992,
the system and the software were made available to the rest of the world. The locus of
the Web system is the “Home Page” which is the place from which the server to which
user is connected to starts.

4. Web is a part of the Internet that consists of a huge collection of documents


store on computers around the world or it is a distributed, hypertext collection of clients
and servers that link a page to other pages throughout the global Internet. It is a tool
that helps user to find and retrieve information, using links to other WWW pages. Web
links are stored within the page itself; there is no need to know the address of the page
that user wish to reach as long as you can find a page to which it is linked.

Pre-Requisites For Using Internet

5. Following is the checklist for using Internet:-

(a) Computer with any operating system


(b) Modem
(c) Telephone Line
(d) Web Browser

(e) ISP connection

79
RESTRICTED
RESTRICTED

Terminologies

6. Following are the common Internet terminologies:-

(a) Web Server. The computer connected to the Internet that makes the
web pages available to the world.

(b) Client. The computer that requests the document is called client. It may
be any node or computer on the Internet.

(c) Web Page. Any single document on the WWW that is viewed by others
or it is simply a title, a collection of information and hyperlinks to other
information. Web pages may include text, pictures, sound, animation and videos.

(d) Web Site. A web site is a collection of web pages maintained by a


college, university, government agency, company or individual.

(e) Home Page. The first page of the web site is called home page.

(f) Web Browser. It is a program that lets the user to view or explore the
information on the Web. Most popular Web Browser is Internet Explorer.

(g) Hypertext. Web pages are hypertext documents. A hypertext


document contains highlighted text that connects to other pages on the web.
Hypertext is a way of presenting information so that user can look at it in a non-
sequential way, regardless of how the original topics were organized by the
prepares of the document. It was designed to allow the computer to respond to
the nonlinear way that humans think and access information. Means user can
select highlighted text on a web page to display a page regardless of that where
it is located and how it will be access or what is its address. Hypertext basically
allows user to easily navigate through a vast amount of information by jumping
from one web page to another.

(h) Download. To bring any software or any information from any computer
down to your computer.

(j) HTTP. HTTP (Hyper Text Transfer Protocol) is a protocol that is


used to transfer the information or document from one computer to another.

(k) URL. URL (Uniform Resource Locator) is an address of the web page
because each web page must have a unique address through which related
information will be displayed in front of the user. User can instantly display any
web page if he/she knows its URL. All web page URLs start with HTTP. e.g
http//:www.yahoo.com

(l) ISP. Internet Service provider that sells access to the Internet.

80
RESTRICTED
RESTRICTED

Common Applications of the Internet


7. Some common applications of Internet are:-

(a) E-Mail. E-mail can be defined as “A message sent from one computer
to another over telephone line”. It is a asynchronous activity means two
communication parties need not to be connected to the Internet at the same time
that is most common method of the communication used by people on the
Internet.

(b) Chat. It is a synchronous activity means two communication parties


must be connected to the Internet at the same time in order to exchange
information. Chat is of two types:

Configure Windows for Internet

8. Follow the steps below for configuring windows for internet:-

(a) Right click the Network Neighborhood and click Properties.

(b) Click the Add button to install the Client.

(c) Select the Client and then click Add.

(d) Click Microsoft, select Client for Microsoft Network and then click Ok.

81
RESTRICTED
RESTRICTED

How to connect to the Internet


9. For connecting to the Internet, user has to make the connection icon because
due to this icon user connects to the ISP server and then connect to the Internet.

(a) Double click My Computer icon.

(b) Double click Dial Up Networking and then double click Make New
Connection.

(c) Write down the name of the computer in the related box and then select
the Modem.

(d) Type Area code, Telephone number of the ISP and selects required
Country or region code.

(e) Click Finish.

(f) Now take the properties of the icon, which you have made now by right
click it.

(g) Select 115200 from the Maximum Speed list.

(h) Click the Server Types tab and select only these options.

(i) PPP: Windows 98,Windows NT from Type of Dial-Up Server list.


(ii) Log on to Network.
(iii) Enable Software Compression.
(iv) TCP/IP

(j) Now double click the Internet connection icon and type User ID and
Password that ISP has given you. A network icon will be place in the notification
area of the taskbar after connected to the Internet. Open the Web Browser and
write down the site name in the Address Window that you want to visit.

Make an E-mail Address

10. An email address defines the location of an individual’s mailbox on the Internet.
An email address consists of three parts:

(a) User Name or ID. It is the name of the person’s account.

(b) Domain Name. It is the location of the person’s account on the


Internet. Dot (.) separate the various parts of the domain name. For example,
[email protected]. Where max is the Name or id of the person and
Yahoo.com is the Domain name.

82
RESTRICTED
RESTRICTED

(c) For making an e-mail address, user has to decide the site that where
he/she wants to make the e-mail address. Lets consider that user wants to make
an e-mail address on Yahoo site. So, following are the steps to make an e-mail
address on Yahoo:

(i) Write www.yahoo.com in the address window of the Internet


explorer or any browser.

(ii) Click Check Email option.

(iii) Click Sign Up Now. If user has already an email address on yahoo
then click Existing Yahoo! Users.

(iv) A registration form will be displayed on the screen. Fill this form
and follow the instructions.

Check or Send an Email

11 For checking or sending an Email on Yahoo, download the home page of the
Yahoo by writing www.yahoo.com in the address window of the browser and do the
following:-

(a) Click Check Email.

(b) Write down the ID and Password.

(c) Click Sign In. It will open the related mailbox.

(d) Click Check Mail for checking.

(e) Click the Coming Mail. Computer will display the mail in front of you.
Read the mail and then click Back. If user wants to reply this mail then click
Reply and write down the message and click Send.

(f) For sending the mail, click Compose. This page consists of different
options. They are:-

(i) To. Address of the person receiving the message.

(ii) Subject. Identifies the contents of the message.

(iii) Cc. Stands for Carbon Copy. A carbon copy is an exact copy of
a message. By this option, user can send the same message to different
persons. It shows the addresses of all those persons who will receive the
mail.

(iv) Bcc. Stands for Blind Carbon Copy. This lets the user to send
the same message to several people knowing them that others have also
received the same message. Means, it will not show the address of all
receiving personnel.

83
RESTRICTED
RESTRICTED

(g) Click Send to send the composed email.

Attach a File to a Mail


12. User can attach a document, picture, sound, video or program to email.

(a) Open Yahoo Home page.


(b) Click Check Email.
(c) Write down the ID and Password.
(d) Click Sign In.
(e) Click Compose.
(f) In To window, write down the address of the receiver.
(g) Click Add/Delete Attachments.
(h) Follow the instructions.
(j) Click Send.

Closing the Mail Box


14. After completing the task, user has to close the mailbox. For closing the mailbox,
click Sign Out.

84
RESTRICTED
RESTRICTED

ICT SECURITY FUNDAMENTALS

Information

1. Information is a sequence of symbols that can be interpreted as a message.


Information can be recorded as signs, or transmitted as signals. In PAF, official
correspondence in any form is considered as official information that needs to be
protected. Similarly, any official data stored or transmitted in soft or hard copy form is
official information.

Information Technology

2. Information Technology (IT) is the science dealing with the use of computers and
telecommunications equipment to store, retrieve, transmit and manipulate information /
data.

Computer

3. A computer is a general purpose device that can be programmed to carry out a


finite set of arithmetic or logical operations. Since a sequence of operations can be
readily changed, the computer can solve more than one kind of problems. A general
purpose computer comprises two sub units: software and hardware.

Software

4. Software consists of programs and data that reside in the memory and storage
devices. It is a set of programs, procedures, algorithms and its documentation
concerned with the operation of a data processing system. Program software performs
the function of the program it implements, either by directly providing instructions to the
computer hardware or by serving as input to another piece of software. The term was
coined to contrast to the old term hardware (meaning physical devices). In contrast to
hardware, software "cannot be touched". Software is also sometimes used in a more
narrow sense, meaning application software only. Sometimes the term includes data
that has not traditionally been associated with computers, such as film, tapes, and
records.

Hardware

5. Hardware is the physical component of the computer system. It consists of


mechanical and electronic devices. Hardware mainly consists of Central Processing
Unit (CPU) and Peripheral Devices.

6. The CPU is the nerve center and brain of the computer system, it coordinates
and controls the activities of all the other units and performs all the arithmetic and
logical processing to be applied to data.

85
RESTRICTED
RESTRICTED
7. Peripheral units consist of input, output and storage devices. Input devices are
used in entering data and programs into the computer memory. Examples are
keyboard, mouse, scanner, joystick, digital camera etc. Output devices are used in
transcribing data in computer system into information that can be used by human
beings as and when they require it. Examples are monitor, printer, speaker, plotter
etc. Storage devices are used to store both data and program instructions. Examples
are hard disks, RAM, ROM, etc.

Figure 1.1. A layer structure showing where the operating system software and
application software are situated while running on a typical desktop computer

Network

8. A computer network, or simply a network, is a collection of computers and


other hardware components interconnected by communication channels that allow
sharing of resources and information. Where at least one process in one device is
able to send/receive data to/from at least one process residing in a remote device,
then the two devices are said to be in a network. Simply, more than one computer
interconnected through a communication medium for information interchange is called
a computer network. Computers may be connected in different topologies such as
ring, star or bus. The most commonly used networking devices include hub, switch
and router.

Figure 1.3. Computers connected in different topologies.

86
RESTRICTED
RESTRICTED

Information and Communication Technology (ICT)

9. Information and Communication Technology (ICT) consists of all technical


means used to handle information and aid communication including computer and
network hardware, telecommunication middleware as well as necessary software.

ICT Security

10. ICT security is the set of products, services, organizational rules and
individuals’ behavior that protect the ICT assets of an organization. ICT security is
achieved by implementing a suitable set of controls, including policies, processes,
procedures, organizational structures and software and hardware functions. In PAF
directorate of Cyber Warfare is responsible to formulate policies for ICT security.

Cyber Security

11. Cyber Security is the body of technologies, processes and practices designed
to protect networks, computers, programs and data from attack, damage or
unauthorized access. In a computing context, the term security implies cyber security.
Ensuring cyber security requires coordinated efforts throughout an information
system. One of the most problematic elements of cyber security is the quickly and
constantly evolving nature of security risks. The traditional approach has been to
focus most resources on the most crucial system components and protect against the
biggest known threats, which necessitated leaving some less important system
components undefended and some less dangerous risks not protected against. Such
an approach is insufficient in the current environment as it is said, "The threat is
advancing quicker than we can keep up with it. The threat changes faster than our
idea of the risk. It's no longer possible to write a large white paper about the risk to a
particular system. You would be rewriting the white paper constantly..."

ICT Security Threats

12. ICT security threats can be categorized into two main categories namely
malicious codes and network based attacks. Malicious codes include computer
viruses, worms, Trojan horses, backdoors etc. Network based attacks typically include
intrusions, eavesdropping, DoS (Denial of Service) attacks etc.
Vulnerability

13. In network security, vulnerability refers to any flaw or weakness in the network
defense that could be exploited to gain unauthorized access to, damage or otherwise
affect the network.

14. Threat vs Vulnerability. A threat is a circumstance or event with the potential


to cause harm to an Information System in the form of Denial of Service (DoS),
destruction, disclosure or modification of data. Vulnerability is a weakness in an
Information System, Network’s components, Cryptographic or Operating System
which could be exploited.

87
RESTRICTED
RESTRICTED
Types of Security Threats

15. There are two types of threat categories: natural and human threats. A natural
or environmental threat is either from nature or a system's environment. Natural
threats can include lightning, fires, earthquakes or floods. Environmental threats can
include poor building wiring or insufficient cooling for the systems. Human threats are
caused through unintentional or intentional actions. An unintentional threat is a human
accident, bad habit or carelessness. An intentional threat, whether caused by an
insider or outsider, can be a spy, hacker or a disgruntled employee. The insider’s
intentional threat is one of the most challenging security problems because insiders
have the working knowledge and access to the PAF Intranet.

(a) Insider’s Threat. An insider can be from PAF personnel, contractors, or


someone who has legitimate access to a computer system. Most insiders
intentionally misuse or exploit weakness in the existing system or procedure
known to them. Others, are those who due to lack of training and awareness,
cause serious damage to the Information Systems. All insiders have some
degree of physical or administrative access to the Information Systems.
Stresses, lack of career opportunities, leave or financial problems are some
examples of what might turn a "trusted" user into “an insider’s threat”.

(b) The Intruder. The external threat to the PAF Information Systems also
exists from hackers, crackers or phreakers. Today's hackers are far more
advanced in computer skills. Using hacking tools available on the Internet, a
hacker is capable of executing automated attacks on Networks by exploiting
weaknesses.

(c) Social Engineering. It is a term used amongst hackers for cracking


techniques that rely on weakness in human nature rather than software. The
goal is to trick people into revealing passwords and other information that can
compromise the security of a system.

(d) Malicious Code. Malicious Code is a software or firmware capable of


performing an unauthorised function on an Information System. It is designed
with a malicious intent to deny, destroy, modify or impede system’s
configuration, programmes, data files, or routines. Malicious Code can be in
several forms to include computer Viruses, Trojan horses, logic bombs, Worms
& Malware / Spyware.

(e) Distributed Denial of Service Attacks (DDoS). The DDoS attacks


involve bombarding a web server or a Network Router with huge amounts of
data from different machines by hiding the true origin of the attack and
locations in an effort to bring the System / Network down and deny its
availability to the users.

Technology Specific Vulnerabilities

16. Information stored or transmitted on devices other than a computer including


Fax, Cell phones, Laptops, PDAs or Palm Pilots, Digital Cameras and Players is also
required to be protected. The Cell phones are the transmitters. The convenience of
laptops also makes them vulnerable to theft or security breaches. The Personal Digital
Assistants (PDAs) such as Palm Pilots, iPods or Pocket PCs, pose a security threat

88
RESTRICTED
RESTRICTED
for a number of reasons. Their small size and low cost make them easy to obtain and
difficult to control. The USB based storage devices pose the greatest security threat to
classified information than any other existing medium. Additionally, the Wireless
LANs, GSM (Mobile chip) cards, Bluetooth, Wi-Fi and WiMax technologies etc are
also impending threats to the Security of Information if used innocently.

Malicious Codes

17. Malicious code is the term used to describe any code in any part of a software
system or script that is intended to cause undesired effects, security breaches or
damage to a system.

18. Virus. A computer virus is a program or piece of code that is loaded onto the
computer without the knowledge and runs against the wishes. Viruses can also
replicate themselves. All computer viruses are man-made. A simple virus that can
make a copy of itself over and over again is relatively easy to produce. Even such a
simple virus is dangerous because it will quickly use all available memory and bring
the system to a halt. An even more dangerous type of virus is one capable of
transmitting itself across networks and bypassing security systems.

19. Worm. A program or algorithm that replicates itself over a computer network
and usually performs malicious actions, such as using up the computer's resources
and possibly shutting the system down.

20. Trojan Horse. A destructive program that masquerades as a


benign application. Unlike viruses, Trojan horses do not replicate themselves but they
can be just as destructive. One of the most insidious types of Trojan horse is a
program that claims to rid the computer of viruses but instead introduces viruses onto
the computer.

21. Backdoor. It is known as a trapdoor. An undocumented way of gaining


access to a program, online service or an entire computer system. The backdoor is
written by the programmer who creates the code for the program. It is often only
known by the programmer. A backdoor is a potential security risk.
Network Attacks

22. Without security measures and controls in place, the data might be subjected to
an attack. Some attacks are passive, meaning information is monitored; others are
active, meaning the information is altered with intent to corrupt or destroy the data or
the network itself. A few of the most common attacks utilizing networks are discussed
in the following paras.

23. Eavesdropping. In general, the majority of network communications occur in


an unsecured or "cleartext" format, which allows an attacker who has gained access
to data paths in the network to "listen in" or interpret (read) the traffic. When an
attacker is eavesdropping on the communications, it is referred to as sniffing or
snooping. The ability of an eavesdropper to monitor the network is generally the
biggest security problem that administrators face in an organization like PAF.

89
RESTRICTED
RESTRICTED
24. Data Modification. After an attacker has read the data, the next logical step
is to alter it. An attacker can modify the data in the packet without the knowledge of
the sender or receiver. Even if you do not require confidentiality for all
communications, you do not want any of the messages to be modified in transit. For
example, if you are exchanging purchase requisitions, you do not want the items,
amounts, or billing information to be modified.

25. Password-Based Attacks. A common denominator of most operating system


and network security plans is password-based access control. This means the access
rights to a computer and network resources are determined by who you are, that is,
the user name and the password. Older applications do not always protect identity
information as it is passed through the network for validation. This might allow an
eavesdropper to gain access to the network by posing as a valid user. When an
attacker finds a valid user account, the attacker has the same rights as the real user.
Therefore, if the user has administrator-level rights, the attacker also can create
accounts for subsequent access at a later time.

26. Denial-of-Service Attack. Unlike a password-based attack, the denial-of-


service attack prevents normal use of the computer or network by valid users. After
gaining access to the network, the attacker can flood a computer or the entire network
with traffic until a shutdown occurs because of the overload.

27. Man-in-the-Middle Attack. As the name indicates, a man-in-the-middle


attack occurs when someone between you and the person with whom you are
communicating is actively monitoring, capturing, and controlling the communication
transparently. For example, the attacker can re-route a data exchange. When
computers are communicating at low levels of the network layer, the computers might
not be able to determine with whom they are exchanging data.

Encryption

28. Encryption is taking your text, data or other communications and encoding it so
that those who should not see or hear it will not be able to. An encrypted file will
appear as gibberish unless you have the password or key necessary to decrypt the
information.

Authentication

29. One of the keys in determining if the message or file you are receiving is safe is
to first authenticate that the person who sent it is who they say they are.
Authentication is the process of determining the true identity of someone. Basic
authentication is simply using a password to verify that you are who you say you are.
There are also more complicated and more precise methods such as biometrics
(fingerprints, retina scans).

Biometrics

30. Biometrics is a form of authentication using unique physical traits of the user.
Unlike a password, a hacker cannot “guess” your fingerprint or retinal scan pattern.
Biometrics is a relatively new term used to refer to fingerprinting, retinal scans, voice
wave patterns and various other unique biological traits used to authenticate users.

90
RESTRICTED
RESTRICTED
ICT Users in PAF

1. Personnel / Units / Formations that handle ICT assets in PAF can be


categorized as under :-

(a) Users. Personnel / Units / Formations of PAF using the ICT assets for
day-to-day working. For example, a person working in Orderly room using a
computer for mail handling is a user of ICT asset in PAF.

(b) Owners. Users having ownership of information, application or physical


asset would be considered as owners. For example Ops Sub Branch is the
owner of the data available in Flying Information System on PAF Intranet.

(c) Custodians. Users who would store or transport information without


using or owning it. Users in possession of or made responsible for an asset
also fall under this category. For example, IS Sub Branch is the custodian of
the data available on PAF Intranet regarding Flying Information System

(d) Managers/Administrators. Users having privileged access to manage


the PAF ICT assets on behalf of the owners/custodians. Information Security
Officers (ISOs) who are designated by each unit of PAF with privileged access
rights to manage the day to day affairs of the unit also fall in this category.
Similarly personnel administering PAF Intranet and various applications
available over it fall in the administrators/ managers category.

Organizing ICT Security within PAF

2. ICT Security Management. Under the purview of AFM 12-1, Management of


ICT security is the responsibility of respective domain specialist. A domain specialist is
the Unit / formation in PAF which controls an ICT asset. Dte of Cyber Warfare is to
review the defined policies / guidelines and disseminate the same for formulation of
detailed procedures by all stakeholders. The organization of Dte of Cyber Warfare
within the Directorate General C4I is as under:-

DG C4I

ACAS (NCW)

Dir Cyber Warfare

DD Security & Crypto DD Security & Audit DD Forensics

3. Allocation of Responsibilities. There must be no ambiguity regarding the


role of every individual of PAF with respect to ICT security. For example every user is
responsible for the security of his password. Respective domain specialists must
clearly define the specific roles and responsibilities of owners, custodians, managers
and users with respect to ICT security in their own domains.

91
RESTRICTED
RESTRICTED
4. Authorization Process for ICT Systems. All units of PAF involved in the
procurement and commissioning of ICT systems are to ensure that the security
requirements for the systems are met in line with the provisions mentioned in
AFM 12-1. In this regards all Air Staff Requirements (ASRs) / Request for Proposals
(RFPs) for new measures in case of ICT systems are to be routed through NCW Sub
Branch.

5. Risks from External Agencies. The risks from external agencies to PAF’s
ICT assets cannot be ruled out. The following must be ensured by all PAF personnel
while interacting with external parties (vendors/consultants/suppliers etc) for any ICT
related job:-

(a) Under circumstances where other entities (organizations / vendors /


contractors) are required for installation or maintenance of hardware/software,
the work shall be carried out under supervision. In such cases, the vendors’
passwords / passwords exposed to vendor shall be changed immediately after
the work has been completed. Help in this regards may be sought from
respective domain specialists, if required.

(b) It must be ensured that no information that compromises PAF operations


is exposed to the external parties. The asset exposed to the external parties
must be scrutinized for any undesirable functionality to whatever extent
possible before being put back in service.

(c) A record of all such activities performed on any ICT system of the PAF
must be maintained for any future reference.

Management of ICT Assets

6. ICT Assets. The PAF ICT assets include the following:-

(a) Information Assets (information stored or in transit). All official


correspondence falls in this category of ICT assets.

(b) Software Assets (applications, operating systems, databases,


development tools and utilities).

(c) Hardware Assets (computer equipment, communication equipment,


networking equipment, storage media).

(d) Services (intranet, internet, computing, communication and allied


services).

7. Acceptable Use of Assets. All PAF personnel must use ICT assets as per
the following acceptable usage policy rules:-

(a) Users are only allowed to use ICT assets for official work as per their
authorized access rights.

92
RESTRICTED
RESTRICTED
(b) Owners / Custodians / Managers / ISOs of ICT assets would grant
access rights to users for the operation of Dte / Unit’s Application or Servers as
per the procedure outlined by the domain specialists.

8. Unacceptable Use of Assets. All relevant stakeholders will identify


unacceptable use of ICT assets and devise respective procedure / policies to prevent
such unacceptable use. The following actions / usages with respect to ICT assets are
prohibited and any breach or violation identified at any level will be considered as a
security incident and would be processed in accordance with the Incident
Management System (paras 83-93):-

(a) Breaching any ICT infrastructure’s access control.

(b) Circumventing authentication or security of any host, network or


account.

(c) Possessing, accessing, disclosing, stealing, destroying, disrupting or


modifying any file / application / service / information / data / device for which
the user had no authorization.

(d) Hacking/ cracking, fraudulent activity or any attack on PAF ICT


infrastructure.

(e) Misuse of official e-mail or other e-communication resources.

(f) Providing passwords or other information used to access the


data / information / device / application of PAF ICT infrastructure to a person
who is not entitled for it.

(g) Deliberate introduction of virus/ malicious/ harmful content or information


gathering software or hardware on any part of ICT infrastructure.

(h) Port scanning, sniffing or collecting information about other users by


employing information gathering techniques/devices.

(j) Executing any form of monitoring which would intercept, sniff, tamper, or
capture data from PAF Networks, PC’s, Communication equipment and
associated accessories.

(k) Interfering with or causing Denial of Service (DoS) to any


ICT System / user by any means.

(l) Web vandalism (deface web pages, denial of service, etc) in PAF.

(m) Using any program / script / command, or sending messages of any


kind, with the intent to interfere with, or disable, a user's terminal session, via
any means, locally or through network.

(n) Forging of any kind of information including but not limited to e-mail
headers, MAC addresses, IP addresses, Usernames etc.

(p) Use of default passwords for any operational ICT system.

93
RESTRICTED
RESTRICTED

(q) Use of save passwords options in applications.

(r) Use of insecure protocols such as telnet, ftp etc over PAF networks.

(s) Providing platform, access or facilitation in any manner to conduct the


above mentioned unacceptable activities on PAF ICT Systems.

(t) Launching of personal web portals or web sites on internet as well as


intranet.

(u) Providing any ICT related information to a person who is not authorized
for it.

(v) Providing Air Force specific information on social networking websites


on the internet.

(w) Getting involved in any ICT related crime / undesirable activity.

(x) Violation of ICT intellectual property rights.

(y) All offences mentioned in Chapter 2 of the Prevention of Electronic


Crime Ordinance 2009 or any ordinance, act, code and/or rule issued by the
Government of Pakistan with respect to electronic crimes.

9. Information Classification. Any information stored in or communicated via


ICT assets must be classified and graded as per the following guidelines:-

(a) Top Secret. Any information in the shape of a document, executable


code, source code, key material, passwords or message is classified as “TOP
SECRET” if its unauthorized disclosure would cause exceptionally grave
consequences to the nation. “TOP SECRET” information must be encrypted
with at least 256 bit symmetric cipher (approved / provided by Dte of Cyber
Warfare) and digitally signed before transmission. The complete encryption
mechanism must be evaluated and approved by Dte of Cyber Warfare before a
communication link is cleared for top secret communication. Additionally, Top
Secret/Accountable PAF document stored in or communicated via ICT Assets
must be handled as per AFO 20-25.

(b) Secret. Information is classified as “SECRET” if its unauthorized


disclosure would endanger national security, cause serious injury to the interest
or prestige of the nation, or any government activity thereof, or would be of
great advantage to a foreign nation. All Secret information in any form must be
encrypted with at least 128 bit symmetric cipher (approved/provided by Dte of
Cyber Warfare) and digitally signed while communicated through any
communication link. Additionally the stored Secret information should also be
encrypted with at least 128 bit symmetric cipher.

(c) Confidential. Information is classified as “CONFIDENTIAL” if its


unauthorized disclosure while not endangering the national security, would be
prejudicial to the interest or prestige of the nation, or of any government activity
or of an individual, or would cause administrative embarrassment or difficulty,

94
RESTRICTED
RESTRICTED
or be of advantage to a foreign nation. Such information may be sent in clear
by a communication channel approved as secure for the grade concerned by
Dte of Cyber Warfare.

(d) Restricted. Information is classified as “RESTRICTED” if the subject


matter is such that it should not be published or communicated to anyone
except for official purpose. Restricted information may be sent in clear by a
communication channel approved as secure for the grade concerned by Dte of
Cyber Warfare.

(e) Unclassified. Information is graded as “UNCLASSIFIED” if the subject


matter does not come within any of the foregoing categories. Unclassified
information may be sent in clear by the originator directly to the addressees
without approval of the communication channel from Dte of Cyber Warfare.

10. Information Labeling and Handling. Any information while in storage or in


transit via a communication medium must be clearly labeled as per the security
grades mentioned in para 15 above. Digital signatures are mandatory for information
of security grade of Confidential and above.

11. ICT Users. All ICT users are responsible for the following:-

(a) Read, understand and implement AFM 12-1 and AFO 20-25.

(b) Report any information security breach / observation to the ISO.

(c) Provide physical security to PCs and ensure that they carry appropriate
security markings.

(d) Do not share password with anyone and change it regularly.

(e) Follow password security guidelines given at para 59.

(f) Use official eMail service for exchanging files with other users as per security
classification.

(g) Always lock computer when going away for short duration (Press
CTRL+ALT+DEL then click on ‘Lock Computer’ button).

(h) Do not connect personal Laptops / readable or writeable media to any PAF
Network.

(j) Do not keep official data at home PCs / devices / media.

(k) Use of Internet in office or home is to be as per internet usage guidelines


given at para 44.

95
RESTRICTED
RESTRICTED
Internet Usage Policy

12. There are security risks associated with connecting the PCs with the Internet.
As mobile codes and cookies can be used by a malicious entity to obtain classified
information stored on a system connected with internet, hence elaborate guidelines
must be defined by respective domain specialists to avoid disclosure of PAF’s
classified information over the internet. To implement and enhance Internet security,
IS and NW sub-branches must coordinate and incorporate measures in their
respective domains. Additionally, Dte of NW (Bases) through Base Comm Centres
must provide the list of authorized internet users to respective Base IT Centers and
Dte of Cyber Warfare. Any change in the list must also be communicated promptly.

13. A hacker can intrude into the Users’ PC through Internet easily and consequently
extract information from victim’s PC or any PC connected to it through LAN. Likewise, if a
hacked PC is connected to Internet and also having connectivity to other PAF PCs’
through PAF Intranet, an Intruder can access the service PCs by obtaining information
through Cookies and Mobile Codes. A cookie is a text file that a web server stores on
hard drive when a site is visited, and retrieves information whenever revisited. All cookies
are not harmful. The security problems with cookies occur when the cookie has "saved"
personal information, such as password or it is tracking the Users’ activities on the web.
Mobile code, such as ActiveX and Java, are scripting languages used for Internet
applications. Mobile code embedded in a web page can recognize and respond to events
such as mouse clicks, form input, and page navigation. It can cause hostile programs to
automatically execute on a computer without the user’s knowledge. The downloaded
programs could access or damage the data on the user’s PC, or inserts a virus as well;
therefore no classified information is to be exchanged on internet.

14. Internet users are to abide by the following:-

(a) Transmission / Storage of official data through internet / eMail is prohibited.


All public eMail systems like Yahoo, gmail and Hotmail etc are monitored by local /
foreign security agencies and are also vulnerable to hacking.

(b) Unless explicitly cleared by DGAI, official information should not be


communicated on the internet.

(c) Maintaining accounts and use of social media sites such as facebook, twitter
etc is strictly prohibited for all PAF personnel.

(d) Participation in online interaction (discussion forums, text/ audio/video, ICQ,


mIRC, MSN, Yahoo messenger etc) or maintaining even unofficial information
online should be exercised with caution.

(e) Do not include Rank, word ‘PAF’, ‘GD’, ‘Unit name’ or ‘Branch’ with ‘Course
number’ in personal eMail address.

(f) Personnel are not to use Golden Chains (eMails forwarded for rewards and
incentives) as they are designed to collect personal information.

(g) Peer to Peer (P2P) software is the hackers’ paradise for foot printing the
victim’s PCs, therefore their use is discouraged.

96
RESTRICTED
RESTRICTED
(h) In offices, the Internet PC should preferably not be installed with Microsoft
Office (MS Word, MS Power Point, MS Excel etc) so as to alleviate the possibility
of personnel using it for official purposes.

15. All internet users are to ensure through respective IT Centre that following software
are installed / updated on the Internet connected PCs:-

(a) The Operating System (OS) is patched with the latest security patches issued
by the OEM of the Operating System.

(b) Have an Antivirus with latest definitions.

(c) The PC has a Personal Firewall or Anti Spyware / AdAware or Spy Sweeper
etc installed.

Password Security

16. The objective when choosing a password, is to make it as difficult as possible


for a hacker (or even a colleague), to guess. Using only the Standard English alphabet
and numerals, a non-case-sensitive password of 6-characters offers over 2 million
possible combinations. In case-sensitive password applications ‘a’ is not the same as
‘A’, which doubles the number of available characters. Thus, making that same 6
character password case-sensitive, and allowing the shifted version of the numerical
keys increases the number of combinations to 140 million. Each additional character
increases the number of combinations exponentially, so a 7-characters, case-sensitive
password would offer over a billion combinations.

17. The User ID owner is responsible to securely manage his / her password.
Passwords should incorporate the following rules: -

(a) On PAF Secure LAN, it should be having a minimum 6 characters length


and Password changes must be forced by implementing an expiry period of
every 30 days.

(b) Passwords on non-Secure LANs / isolated PCs should be having a


minimum of 8 characters length should be changed every 15 days.

(c) Don't use a word contained in the dictionary. It should not be based on
Designation, Names or Pak No and instead; alphanumeric with special
characters like “& $ @ _ ^” etc be used.

(d) All default guest accounts should be removed / disabled. The default
Administrator Accounts (Tiger / Scott etc) should be renamed.

(e) The administrative accounts should not be used for routine tasks.

(f) All vendors supplied and default passwords should be changed before the
equipment is brought on the network or operated on as standalone.

(g) Passwords must not be stored in readable form in batch files, automatic
login scripts, software macros, terminal function keys, or in other locations.
97
RESTRICTED
RESTRICTED

(h) User accounts that have system-level privileges granted through group
memberships or programs such as ‘Administrator / Master’ must have a unique
password from all other accounts held by that user. Administrators’ passwords
should be copied and held under dual control in a secure location to enable
access to the system by an authorized person in the event of a contingency
with the password holder.

(j) No information system should allow a ‘user’ to remain on-line for trying all
possible combinations of passwords. A lockout must be activated after a
predetermined number of maximum five failed attempts or a fixed amount of
time of 45 seconds.

18. Following are the guidelines for creating a good password (having all the above
mentioned functionalities) and is also easy to remember:-

(a) Choose a normal everyday word eg ‘khakis’.

(b) Replace certain letters in the word with numbers or special characters like
‘kh@k1s’; replacing ‘a’ with ‘@’ and ‘i’ with ‘1’ or ‘!’ etc.

(c) Additionally replace some lower case letters with uppercase letters eg
“kH@k1s” likewise “s” can be replaced with ‘z’ making “kH@k1z”.

(d) One can select a word and deliberately misspell it. The password can also
be used with small phrases and special characters and/or numbers like
“Kaala_Jadoo”, or “Tea1&Coffee2” etc.

(e) Another approach could be using a combination of first letters of family


names, calendars, or specifics personal memorable events but ‘without taking
one anyone as a whole word or a number’ and then applying the case
variations.

Threats from Email

1. Various security issues associated with using email include email borne
viruses, hidden file extensions and email spoofing.

2. Email Borne Viruses. One of the main attack vectors for a virus is through
your email. While it is possible to get a virus by using an infected floppy disk or
compact disc one of the main methods of propagation is through email. From the
standpoint of trying to do the most damage it makes sense for a virus author to use
email as a means for spreading the virus. The authors of Trojans, worms and viruses
are sometimes exceptionally clever and ingenious in finding and exploiting
weaknesses in both the computer system and in human nature in order to make their
attack successful. Unfortunately, sometimes even viruses that aren’t so clever
manage to spread quickly and do lots of damage due to uneducated and naïve users.
To get you to open the email in the first place viruses try to use Subject Lines for the
email messages that will get your attention. Some will come disguised as important
alerts from major companies like Microsoft. Recent viruses will also reply to existing
emails in the infected computer. When you receive a message in response to a
message you know you sent someone you have no reason to suspect it would be
98
RESTRICTED
RESTRICTED
harmful so you are more likely to open it. Typically, the email itself is not the problem.
The Subject Line and the Message Body are worded with the intent and goal of
getting you to double-click on the attached file to execute the actual virus. With HTML-
based email it is possible to embed the virus directly in the message. Major viruses
and worms in the past couple of years like CodeRed and Nimda have exploited this
flaw to cause the virus to execute as soon as someone opened the email message,
rather than waiting for them to click on the attachment. In 2001, Microsoft released a
Security Bulletin, MS01-020, including a patch to protect users from this happening.

99
RESTRICTED

You might also like