MSC Computer Proficiency Syllabus
MSC Computer Proficiency Syllabus
S NO TOPICS PAGE NO
1 COMPUTER HARDWARE AND SOFTWARE 1.1 – 1.1
1
RESTRICTED
RESTRICTED
DEFINITIONS
What is a Computer?
Hardware
(b) Output Devices. The final part of a computer is the out put unit. Which
Monitor, printer etc?
Software
Types of software
2
RESTRICTED
RESTRICTED
Windows-XP
Introduction
1. Windows-XP is easier to use, more reliable and more entertaining than ever.
Navigation around your computer through desktop options has become simple such as
single clicking to open files and the browse button in every window. You can access the
Online Support Web site for common questions and to keep your copy of Windows up
to date.
1. Various items appear on the desktop when we start windows. Here are four
important ones.
(c) Recycle Bin. The Recycle Bin is a temporary storage place for deleted
files. It allows users to recover deleted files. Files that have been deleted can be
easily returned to their original location on the user’s local system.
(d) Task bar. The objective of the taskbar is to make switching among
multiple applications or windows as simple as changing channels on a television
set. Every new windows that is opened automatically gets a button on the taskbar
that greatly improves the visualization to the user that which windows or
applications are presently opened.
(a) Programs. It is the powerful option of the Start menu that provides quick
access to launch programs.
(b) Documents. The Documents option of the start menu contains a list of
the last 15 documents the user recently opened. It provides quick access to the
files most recently worked with. It helps people to prevent time-consuming and
frustrating browsing and start work in terms of documents rather than applications.
(c) Settings. Gives quick access to the changing or viewing settings and
options of the PC, including Control Panel (for computer settings), the start menu
(via the taskbar command) and the Printers folder. It also enables the user to
customize the taskbar itself (for example, what programs to include into the
programs submenu) to suit personal working preferences.
3
RESTRICTED
RESTRICTED
(d) Search. Search is a feature of Windows-XP that goes far beyond the
early search features (e.g. in Windows 3.1) file Manager. Searches do not need to
conform the *.* searching syntax and criteria such as last modification date; size of
file and actual text within a document can now be used to find information.
(e) Help. Help has been overhauled in Windows-XP and is easily accessible
from the Stat menu.
(f) Run. It provides enhanced command-line type functionality from the start
button. We can directly run any file from this option.
(g) Log off. Closes your account but the computer remains ON for easy
access the next time you long on.
(h) Shut down. It allows easily accessible and safe shutdown, restart, and
log off the computer.
4
RESTRICTED
RESTRICTED
MICROSOFT WORD
Introduction
1. A word processor is software (package) that enables the computer user to create
documents containing text or graphics. It also provides ease of editing, deleting or
adding any text in already created documents. By using Ms Word one can create a new
document, type in the text or copy text from already created documents and can save it
on the disk/diskette with or without protection (security).
Starting MS Word
2. The preferred method of starting Ms Word is to double click its icon on the
desktop. An equally handy way to start word is to double click on a word document
icons. This will launch word and immediately open the document itself that can get right
to work on it.
(b) Points to the Ms Word icon using your mouse then double click it to
launch the program. The left mouse button does all the clicking.
(a) Title bar. Contains title of the software i.e. Microsoft word and name of
the current opened document.
(b) Menu bar. Contains different major options, which show sub options for
the desired operation.
(c) Tool bar. Contains a number of buttons, which are shortcut keys to
operations done by menu. There are some standard toolbars provided with the
package, but the user can also design its own customized toolbar.
(d) Click ok. Word has now created a blank document for you. You can start
your job now.
5
RESTRICTED
RESTRICTED
Saving a document
5. Once you think your job is over or even if it is not, you can save the document by
the following procedure:-
(b) Select “Save As” from the file menu or simply press Ctrl+S, dialogue box
is displayed, asking for the name under which document is to be saved.
(c) Write the name of the document where It prompts for the file name.
(d) You can also specify the place i.e. drive or directory where the document
is to be saved.
Cut command
6. This option is used to remove selected text and graphics and put it on the
clipboard. This command is available only when you select text or graphic. Text and
graphic that you can place on the clipboard remains there until you replace it with a new
item.
6
RESTRICTED
RESTRICTED
To quickly remove selected information from the document and place it on the
clipboard, click the button on Standard Toolbar.
Copy command
7. It copies selected text and graphic to the clipboard. This command is available
only when you selected text or graphic.
(c) Select the “Copy” option from Edit Menu bar or press Ctrl+C.
Text and graphics that you copy to the clipboard replaces the previous contents. To
quickly copy the information to the clipboard, click the copy button on the standard
toolbar.
Paste Command
8. Insert a copy of the clipboard contents at the insertion point replacing the
selection (if any) with the text on the clip board. This command is not available if the
clipboard is empty or if the selected text cannot be replaced.
(a) Place the cursor where you want to paste the text.
(c) Select the “Paste” option from the Edit menu or simply presses Ctrl+P.
To quickly insert the clipboard contents at the insertion point, click the paste button on
the standard toolbar.
Spell check
Grammar check
10. checks your document for possible grammar and style errors and displays
suggestions for correcting them
7
RESTRICTED
RESTRICTED
11. Add or changes text that word repeats at the top if every page (header) or at the
bottom of every page (footer) in a section or in a entire document.
When you choose this command, word displays the header & footer toolbar. Use
the toolbar to quickly add the current time, current date, and page numbers; to move
between the headers and footers in the document, and to display or hide the document
text.
Insert table
(c) Insert table dialogue box is displayed; you can adjust number of columns
or rows for your table.
13. The format\paragraph dialogue box provides independent control over indents
and spacing and text flow.
8
RESTRICTED
RESTRICTED
(c) Indents: This option controls the indentation from the left and right
margins, and the indent level of the second and subsequent lines (hanging
indent).
Adjust the Left & Right Indent you want.
14. Creates a bulleted or numbered list from a selected series of the items in text or
a series of cells in a table. To add or remove bullets or numbers quickly, click the
bullets button or the Numbering button on the formatting toolbar.
(b) Select “Bullets & Numbering” from Menu, a dialogue box is displayed.
9
RESTRICTED
RESTRICTED
Page Margin
(c) In the dialog box you can see paper margins i.e. Top, Bottom, Left, Right,
Header and Footer. You can change these values by typing or pressing up/down
arrows according to the service writing.
Printing a Document
10
RESTRICTED
RESTRICTED
(d) You can change the Page range and you get printed selected Pages.
(f) Once you have made an option click “OK”. Your Printing would go to the
selected printer.
(d) Type the password you want to use to protect a document. A password
can contain up to 15 characters and can include letters, numbers, symbols, and
spaces. As you type the password. Word displays an asterisk (*) for each
character you type.
(e) Once you have assigned a password, you must use the same password
each time you want to remove protection from the document, typing uppercase
and lowercase letter exactly as you did for the original password.
11
RESTRICTED
RESTRICTED
ASSIGNMENTS
Microsoft Word Assignment # 1
(Opening MS Word Document, Desktop and Word Screen)
Following are the methods which tell us how to open MS-Word document.
First: Right Click on the empty place of ‘Desktop’, Point ‘New’ then click
‘Microsoft Word document’.
Icons
Empty Area
Start Button
Start Button Button Task Bar
12
RESTRICTED
RESTRICTED
TITLE BAR:
NOTE: The topmost BLUE bar is called the Title Bar which tells us the
Application Name and the document name.
MENU BAR:
NOTE: The second horizontal listed Bar below the title bar is called
Menu Bar which on clicking open menus.
TOOL BARS:
NOTE: The next two Bars, below the Menu Bar, which shows small colourful
pictures or buttons called ICONS are known as Tool Bars.
Type the following few lines in the Insertion Area by using the Keyboard.
BY USING KEYBOARD:
BY USING MOUSE:
Second Method: Bring the cursor on the left side & inline of the
first line. The cursor style will change to then click once.
15
RESTRICTED
RESTRICTED
1. CUT
Third Select the text then Click Edit Menu then Click Cut.
2. Copy
Third: Select the text then Click Edit Menu then Click Copy.
16
RESTRICTED
RESTRICTED
3. PASTE
Following are methods to Paste the copied or cut items.
To carry out any change in Font first select the text as taught. Now click Format
menu and then click Font
17
RESTRICTED
RESTRICTED
Font Option *
Font Sytle **
Size ***
These two options for font colour and underline style by opening the
OR
You may change these options by using the Formatting ToolBar after you
select your text.
Left Align Center Right Align Justified
Font Type Font Size Bold Italic Underline Line Colour Font Colour
18
RESTRICTED
RESTRICTED
1. CREATION OF A TABLE.
Click on the Table menu of the Menu Bar, Point to Insert and then click Table
It will open a windows like the following asking you the Number of Rows and
Columns
Toggle Button
Columns Cell
Rows
19
RESTRICTED
RESTRICTED
Bring the cursor pointer to the left margin and the inline of the row you
want to select and just click.
Bring the cursor pointer on the top on the column you want to select and
then just click.
NOTE: The above table can be arranged in Left Align , Center and Right
Align by clicking on left top corner of the table to select the whole table and
then using ALIGNMENT BUTTONS (ICONS) on the Formatting Toolbars.
Alignment Icons
20
RESTRICTED
RESTRICTED
(a) ROWS
Example
(b) COLUMNS
21
RESTRICTED
RESTRICTED
Example:
22
RESTRICTED
RESTRICTED
1. SAVING A DOCUMENT
After you have completed your document the document needs to be saved onto
your hard disk or some other location according to your needs.
Second Method: Click File Menu and then Click Save Option.
In all the above cased below windows will open asking you some information
before saving the document.
Notes: Difference between Save & Save As is that when you save a
document first time you take Save option and if you want to save the same
document at other location and with a different name you choose Save As
option. Saving in both cases is same.
2. PRINT A DOCUMENT.
Second Method: Click File from Menu Bar and then Click Print Option.
23
RESTRICTED
RESTRICTED
In all cases a windows will appear where decision be made according to the
requirements.
1
2
Notes :
1.
2.
3.
Here the name of the Printer is displayed means that the printout will directly go
onto this specified Printer. However the printer can be changed by clicking
button
and select the printer.
25
RESTRICTED
RESTRICTED
POWER POINT
Introduction
2. There are a number of ways to start power point. The most common ways are:
(a) Double click the power point icon if it is present on the desktop.
(b) Click start button, point to program and then click Ms PowerPoint.
Views in PowerPoint
3. Microsoft PowerPoint comes with different views to help you while you are
creating a presentation. The two main view used in PowerPoint are normal view and
slide sorter view. To easily switch between views, you click the buttons at the lower left
of the PowerPoint window.
(a) Normal View: Normal view contains three panes the outline pane,
slide pane and the notes pane. These panes let you work on all aspects of your
presentation in one place. You can adjust the size of the different panes by
dragging the pane borders.
(b) Slide Sorter View: In slide sorter view we see all the slides present in
the presentation on screen at the same time, displayed in miniature. This makes
it easy to add, delete and move slides, at timings and select animated transitions
for moving from slide to slide. You can also preview animations on multiple
slides by selecting the slide you want to preview and then clicking animation
preview on the slide show menu.
(c) Slide View: In this view, we can work with only one slide at a time. We
can add title and body text, graphs, organization chat, clip art and word art. We
can also draw shapes and access all of the toolbars.
(d) Outline View: In this view, we can organize and develop the
contents of the Presentation.
(e) Slide Show View: This view is used to display the presentation on the
full screen of the computer’s monitor. In this view, all the bars will be hidden.
26
RESTRICTED
RESTRICTED
(b) Select new. A dialogue box will appear, select blank presentation and
press ok.
(d) Click OK. A blank slide with the selected Auto layout is displayed on the
screen.
Saving a Presentation
(a) Select option File+Save from the Menu Bar or simply press CTRL+S or
click save icon present.
(c) Select the drive & directory in which you want to save the presentation.
(d) Write the name of the presentation in the File Name Area.
6. We can change the appearance of the slide background by changing its color,
shade, pattern or texture. We can also use any of a slide background, but can use only
one type of background on a slide.
(b) Under Background fill, click the down arrow & then select the color.
(c) To change to a color in the color scheme, click one of the eight colors
below Automatic.
(d) To change to a color that isn’t in the color scheme, click More Colors. Click
the color you want on the standard tab, or click the Custom tab to mix own color,
and then click OK
27
RESTRICTED
RESTRICTED
Slide Transition
8. Movement of the slide with a special effect is called slide transition. Following
points are necessary to apply the transition on any slide.
(a) In slide or slide sorter view, select the slide or slides on which we want to
apply transition.
(c) In the Effect box, select the transition and see the preview in the preview
box.
(d) Select the Speed (Slow, Medium, and Fast) for the transition effect
(f) To apply the transition to all the slides, click Apply to all
(b) Select the Slide Object from” Slide Objects without Animation” box of
the timing tab.
28
RESTRICTED
RESTRICTED
ASSIGNMENTS
Microsoft Power point Exercise # 1
(Opening MS PowerPoint Presentation, inserting new slide /applying design & entering data)
Click on button
Right click on empty space of Desktop and point to New and click on
Microsoft PowerPoint Presentation.
29
RESTRICTED
RESTRICTED
Title Bar
Menu Bar
Tool Bar
Slide index
Once you have decided and selected the text layout and design of your
presentation …. You can start typing / adjusting your ideas as text, charts, graphs,
pictures etc
31
RESTRICTED
RESTRICTED
1. Working area.
After you have opened the MS PowerPoint presentation …. It looks like this;
2. Views of Presentation.
Normal view
Note: In this View you can edit, update and change the contents and
other properties.
Normal View
Slide sorter view
Note: In this View you can see all the slides on one screen allowing you
ease to arrange the slides.
32
RESTRICTED
RESTRICTED
Note: In this View You can run the show of your presentation. In this view
you will not see any of the Bars and other areas of the screen except your
working area.
33
RESTRICTED
RESTRICTED
These views are also present on the lower left side of the screen. You can
click any of them accordingly.
Normal View
34
RESTRICTED
RESTRICTED
1. First Slide:
When you open PowerPoint Presentation you will see your first slide called as
Title Slide. This Slide will let you enter the Title and sub title of the Slide.
ACTIVITY:
1. Click on the item ‘Click to add title’ and add a suitable Title e.g
(Pakistan Air Force)
2. Similarly click on the item ‘Click to add subtitle’ and add a suitable subtitle
e.g (I T School)
2. Text Slide :
ACTIVITY:
1. Click on the item Click to add title and add a suitable title to the slide e.g
Role & Task of ITS
35
RESTRICTED
RESTRICTED
2. Click on the item Click to add text and add text to the slide e.g
3. Organization Chart:
ACTIVITY:
1. Click on the item ‘Click to add title’ and add a suitable title e.g
36
RESTRICTED
RESTRICTED
2. Double Click on the item ‘Double click to add diagram or organization chart’ to
add chart.
Chart Toolbar
Click inside
this box to
enter your
text
5. Insert at least 02 Subordinates to each and one Assistant to the first box to the
chart by clicking Insert Shape Icon on the Organization chart toolbar.
• First select the Slide then go to Slide Show on MenuBar and click Slide
Transition.
• A pane will appear on the right side showing different options. Select the
options and these will apply to the selected slide.
No Transition means no
effects have been assigned.
Definition: Animation means to add any special sound or visual effects to the
contents of the slide is called Animation.
• First Select the select of the slide e.g ‘Pakistan Air Force’ is selected.
38
RESTRICTED
RESTRICTED
Main Categories
of Animation.
Similarly you can select the second element of the slide i.e
Note: you can view your Transition and Custom Animation setting by running your
presentation in Slide Show view or by Pressing F5 key on the keyboard.
39
RESTRICTED
RESTRICTED
1. SAVING A DOCUMENT
After you have completed your Presentation the Presentation needs to be saved
onto your hard disk or some other location according to your needs.
Second Method: Click File Menu and then Click Save Option.
In all the above cases below windows will open asking you some information
before saving the document.
Save
button
Notes: Difference between Save & Save As is that when you save a
document first time you take Save option and if you want to save the same
document at other location and with a different name you choose Save As
option. Saving in both cases is same.
40
RESTRICTED
RESTRICTED
2. PRINT A DOCUMENT.
Second Method: Click File from Menu Bar and then Click Print Option.
Select Printer
41
RESTRICTED
RESTRICTED
MICROSOFT EXCEL
Introduction
1. MS Excel is the spreadsheet and data analysis program in Office XP. It combines
incredible power with ease of use, giving professionals and occasional users the
features they need. MS Excel is designed such that you can use it as a basic
spreadsheet program, and learn more advanced skills as you need to.
3. When you will open MS Excel following window will appear on the screen:
Standard
Toolbar
Formatting
Formula Bar Toolbar
Worksheet
Window Task
Pane
Status Bar
42
RESTRICTED
RESTRICTED
Microsoft Excel.
OR
(b) By double clicking MS Excel icon on the desktop (If present there).
OR
(c) By double clicking any existing file previously created in MS Excel.
5. You can close Excel from the File menu (Click on File and then on Exit)
OR
By clicking on the red X in the upper right hand corner.
(a) Title Bar contains title of the software i.e. Microsoft Excel and name of
the currently opened file e.g. Book1
(b) Main Menu Bar contains different major options like File, Edit and View.
(c) Toolbars are located at the top, under the Main Menu bar
(d) Formula Bar is located under the Toolbars displays contents (data or
formula) of the highlighted cell. To the left of the Formula Bar is the Name Box;
it displays the Cell name or address of the highlighted cell.
(e) Task Pane is the panel to the right of the Worksheet. The Task Pane lists
some of the most common tasks you may want to accomplish in Excel. The
tasks are descriptive to help you quickly locate the task you want. To perform
the task, simply click on the task description.
(i) To display the Task Pane: From the main menu, choose View >
Task Pane (you will see a check mark beside it when the Task Pane is
visible).
Note: You can put your mouse over a button or area to see the Tool Tip description
of that button or area.
43
RESTRICTED
RESTRICTED
Toolbars in MS Excel
7. Excel has 19 Toolbars. By default, the Standard and Formatting Toolbars will be
displayed. Most of the other Toolbars are used only for specific functionality in Excel.
9. The Standard Toolbar provides quick access to commonly used actions. Each
action is represented by an icon. When you put your mouse pointer over an icon, it is
highlighted in blue and a descriptive tool tip appears. Locate the icon for the action you
want to use and click on the icon.
44
RESTRICTED
RESTRICTED
11. The Formatting Toolbar provides quick access to commonly used formatting
actions. Each action is represented by an icon. When you put your mouse pointer over
45
RESTRICTED
RESTRICTED
12. To start working in Excel first we will need to create a new workbook or Open
an existing one. MS Excel automatically starts with a new Workbook containing three
Worksheets.
(a) From the main menu, choose File > New and
click on the Blank Workbook link in the New
Workbook Pane
OR
(b) Click on New icon on Standard toolbar
OR
(c) Press Ctrl+N key combinations from keyboard.
(a) From the main menu, choose File > Open and select your required
workbook from using Open Dialog.
(b) Open Dialog can also be opened by Open icon on Standard toolbar
OR
(c) By Pressing Ctrl + O key combinations from keyboard.
46
RESTRICTED
RESTRICTED
Note: When you will save a workbook for first time, the Save As dialog box will
appear. Enter a file name in the File Name text box, and click Save.
(a) From the main menu, choose File > Save As to display the Save As
dialog box.
(b) Enter a new file name in the File Name text box. Click Save.
22. A Range is made up of Cells. Ranges can be any rectangular area of Cells
within a Worksheet. You can refer to a Range by using the Cell Reference of the top-
left and the bottom-right Cells. For example, B2:D8 defines the rectangular range
bounded at the top-left by the Cell in Column B and Row 2 and at the bottom-right by
the Cell in Column D and Row 8.
of the Cell =2000+2 is displayed in the Formula Bar. Result will be displayed in the cell
itself, in this case, 2002, that is a calculated value from 2000+2.
26. Navigating to a specific cell: If you know the Cell Reference of the Cell you
want to move to, you can navigate directly to it. Click on the Name Box on the Formula
bar, enter the Cell Reference, and press the Enter key. Excel will make it as a new
active cell.
27. Moving around the worksheet: A common way to navigate around the
worksheet is to use your keyboard. To move from cell to cell use following keys or key
combinations from the keyboard:
48
RESTRICTED
RESTRICTED
28. To Select different items like Cell, Row, Column with the following way:
To Select What to Do
A Cell Click on the Cell.
A Complete row Select a Row by clicking on the Row-header-number.
A Complete Column Select a Column by clicking on the Column-header-letter
Click on the first cell in the range and drag over the cells
you want in the range
OR Click on the first cell in the range (i.e. the top-left
A Range of cells
corner), move the mouse to the opposing cell in the range
(i.e. the bottom-right corner), hold down the Shift key, and
click on the opposing cell.
Non-contiguous Select the first range, hold down the Ctrl key, and select
ranges the other ranges you want
Click the Select All square in the top-left corner of the
Worksheet. (The Select All square is located at where the
row headings and column headings meet)
OR
Press Ctrl + A key combination.
Click on the first sheet tab of the Worksheet you want to
Several Worksheets select, hold down the Ctrl key, and click on the other sheet
tabs of the Worksheets you want to select
All Worksheets of a Right-click on a sheet tab, and choose Select All Sheets
workbook from the pop-up menu
30. By default, text is left-aligned and numeric values are right-aligned you can
change the alignment of the text/numbers using
alignment tools from formatting toolbar.
32. If the adjacent cell (in this case B1) contains data, the text display is truncated.
The full text is still available in the Formula bar.
49
RESTRICTED
RESTRICTED
36. One of the basic functionality of a spreadsheet is the ability to calculate values
based on numeric data. A formula is a mathematical expression that can consist of
operands, values, variables, and symbols. For example, calculate the total of a column
of sums, interest amount, or cost per unit.
37. In MS Excel, operators are executed in a specific order. You can use
parentheses ( ) to change the order of execution.
38. Entering an equal (=) sign in a cell will bring up the Formula toolbar. The
following are icons on the Formatting Toolbar:
(a) Begin by clicking in the cell in which you want to put your result.
(b) Type an equal (=) sign followed by the expression that will calculate the
result you want.
50
RESTRICTED
RESTRICTED
(ii) To add range of addresses (e.g. A1 to A4) there are two ways
=A1+A2+A3+A4
OR
=Sum(A1:A4) (Here Sum is a function and functions are coming
up next)
(iii) To divide F9 with 12, Multiply E8 with 2 & with A12 and subtract
result of F9/12 enter formula
=A12+E8*2-F9/12
39. The calculated value of a formula is displayed in the Worksheet cell. You can
display the formula in the Formula bar by making the cell active.. If there is an error
in the formula, the upper-left corner will be marked with a green triangle and the cell
will display a short error message beginning with a # symbol
(a) Select cell where you want your result and type =
(b) Now you can use the arrow keys (on keyboard) to move to the desired
cell. Your formula will change to display the current cell reference; when you
reach the desired cell, Press the Enter key to return to your formula.
41. Enter a range reference: Instead of typing in a range reference, you can use
the arrow keys to select the desired range. Begin by moving the cell pointer to the first
cell in your range. Enter a period (.) to mark the beginning of the range, and move the
cell pointer to the last cell in your range
42. You can also use the mouse to select the cell or range reference you want. This
is especially useful when entering a cell or range reference that is on another
Worksheet within the same Workbook.
43. When referring to a cell or range that is not on the same Worksheet as your
formula, the sheet name and the exclamation mark (!) appear in front the cell/range
reference. For example, =Sheet2!C2 represents cell C2 of sheet Sheet2.
Understanding a Function
commas, and a closing parenthesis, press the Enter key to calculate the result. The
following is an
Example: In the picture total marks obtained are calculated by a SUM function:
46. If you perform a task repeatedly in Excel, you can automate the task with a
macro. A macro is a series of commands and functions that are stored in Excel and can
be run whenever you need to perform the task.
47. For example, if you often enter long text strings in cells, you can create a macro
to format those cells so that the text wraps.
48. Recording macros. When you record a macro, Excel stores information about
each step you take as you perform a series of commands. You then run the macro to
repeat, or "play back," the commands. If you make a mistake when you record the
macro, corrections you make are also recorded.
(d) In the Store macro in box, click the location where you want to store the
macro.
52
RESTRICTED
RESTRICTED
(g) Carry out the actions you want to record. For example
(ii) Now press Ctrl+Shift+T (OR any other key combination you set for
your macro)
53
RESTRICTED
RESTRICTED
Example:
(d) Now to calculate total marks obtained by each student by using SUM
Function
54
RESTRICTED
RESTRICTED
I12
J12
(f) Now to calculate result by using IF() conditional function (If percentage is
greater than or equal to 50 then print “Pass” other wise print “Fail”. Formula will
be IF(Percentage >= 50 “Pass”, “Fail”):
(i) Click
on Cell
K12K4
(ii) Enter
formula as =IF(J4>=50, “Pass”, “Fail”)
55
RESTRICTED
RESTRICTED
When you will Press Enter Key it will check value of J4 if it is less
than 50 “Fail” will appear in K4 other wise “Pass”
(iii) Copy K4 and paste it to K5 to K12
Same formula will be applied for remaining cells.
(g) Now to calculate grades by using IF() and nested IF() (IF within IF)
conditional function (If percentage is less than 50 then print “D”, if it is Less than
60 then print “C”, if it is less than 80 then print “B” other wise “A”. Formula will be
IF(J12<50,”D”,IF(J12<=59,”C”, IF(J12<=79,”B”,IF(J12<=100,”A”))))
L12
56
RESTRICTED
RESTRICTED
ASSIGNMENTS
MICROSOFT EXCEL ASSIGNMENT NO # 1
(Starting MS-Excel Document, Screen and Definitions)
Icons
Start button
Empty area
Use aero key
57
RESTRICTED
RESTRICTED
Title Bar
Menu Bar
Tool Bar
Formula Bar
Cell Address
Cell
Main Working
Area
Row
Sheets
58
RESTRICTED
RESTRICTED
TITLE BAR:
NOTES: The topmost BLUE bar is called the Title Bar which tells us
the Application Name and the document name.
MENU BAR:
NOTES: The second horizontal listed Bar is called Menu Bar which
by clicking will open menus.
TOOL BARS:
NOTES: The next two Bars shown and those not shown reflecting
small colourful pictures called ICONS are Tool Bars.
FORMAULA BAR:
59
RESTRICTED
RESTRICTED
New Worksheet
2. RENAMING A WORKSHEET
Right click on the Worksheet and Click on Rename and Give an Appropriate
name e.g Class and Press Enter Key.
60
RESTRICTED
RESTRICTED
3. MOVING OF A WORKSHEET
Click and hold the sheet you want to move and then click where you want
to move i.e before or after any sheet.
Right Click on the Sheet you want to move, select Option Move or Copy a
small window will appear asking you the location where you want to move the
worksheet. Select the location and Press Enter Key.
For example you opted to move the sheet before sheet3 then your Sheet named
CLASS will be lying between Sheet2 & Sheet3 as shown below.
61
RESTRICTED
RESTRICTED
4. DELETING A WORKSHEET.
Right Click on the Worksheet you want to delete e.g Class Worksheet and
Select Delete option.
Simply select the worksheet by just click it once and Press Delete Key
from Keyboard.
Select the Worksheet by just click it once and Click Edit on Menu Bar and
click Delete.
62
RESTRICTED
RESTRICTED
1. ENTERING OF DATA
Click on the cell where Area to select for Entering, the Name Box shows the cell
where you want to Enter Data. You can navigate through the Worksheet by
using the Arrow Keys on the Keyboard.
63
RESTRICTED
RESTRICTED
64
RESTRICTED
RESTRICTED
3. FORMULAE
(a) Addition:
When you Press Enter Key after writing Formula the total of the sum is shown in
J4
Now you can apply the same formula on the entire data by Two methods.
First Step: Select The Cell J4 and Apply Copy Command by using
CTRL+C shortkey Command, Simply click Icon on the
Standard Toolbar or Select Copy Option from Edit Menu.
65
RESTRICTED
RESTRICTED
Second Step: Now Select Cells from J5 to J20 and Apply Paste
Command by using CTRL + V shortkey command, simply click
Icon on
the Standard Toolbar or Select Paste Option from Edit Menu.
Cell J5 to J20
(b) SECOND METHOD: Select Cell J4 you will find a rectangular box
around the cell with a + sign at the lower rightmost corner. Place the cursor
on the sign and drag the mouse down to Cell J20. It will copy the same formula
till Cell J20.
A sign that is to be
expanded
66
RESTRICTED
RESTRICTED
(b) Multiplication:
After you press ENTER Key you will get Product like this:
4. SORTING
STEPS:
You can extend the same Product Formula down to L20 by selecting the
Cell L4 and extend the down to the L20. which will look like this:
67
RESTRICTED
RESTRICTED
(c) Subtraction:
(d) Division:
NOTES: You can extend the Subtraction and Division down to the
column by the same Procedure as in case of Addition and Multiplication.
68
RESTRICTED
RESTRICTED
1. SORTING:
For Sorting do the following steps:
• First select the data as shown below:-
69
RESTRICTED
RESTRICTED
Press This
Button
70
RESTRICTED
RESTRICTED
2. PRINTING:
71
RESTRICTED
RESTRICTED
• Now set the Print area by Clicking File from Menu Bar and the Click Set
Print Area.
NOTE: It will set the printable area instead of the whole sheet.
Now Click File on Menu Bar and click Print. Following Windows will open. Make
necessary changes and then click OK
72
RESTRICTED
RESTRICTED
Here give a
reasonable
name to the
file.
73
RESTRICTED
RESTRICTED
PAF INTRANET
Introduction
Main/Home page of PAF Intranet will be shown to user after some time.
74
RESTRICTED
RESTRICTED
Main/Home page
3. The first page which is shown on the screen after we are connected to PAF
Intranet is called Main / Home page. This is the screen / page which give user, access
to the other sites or pages of the site. Main / home page of PAF Intranet is featured as
followed:-
75
RESTRICTED
RESTRICTED
(f) Training
• Aircraft CBTs
• E-LearningFIS
• Air War College
• HM-10 Lectures
• PAF e-Testing System
76
RESTRICTED
RESTRICTED
5. Several software applications are placed under this tab for PC-based application
being used by PAF users like
6. All AFOs, AFIs, AFLs, AFMs and JSIs being updated for PAF Intranet users.
77
RESTRICTED
RESTRICTED
Downloads
News
8. Dte of Media Affairs is updating and storing the national, international, sports and
PAF News under this tab.
Contact Us
10. The contacts of the administrative team are placed under this tab for the
information of the PAF Users.
78
RESTRICTED
RESTRICTED
INTERNET
Introduction
1. Internet is the world’s largest computer network. It is coined from the words,
“Interconnection” and “Network”. The Internet is often called the Net, the Information
Superhighway because there is a lot of interesting and varied information available on
the Internet and everyone can access these information within a second. It consists of
thousands of connected networks around the world. There is no limitation about the
network. Any type of network can be connected to the Internet.
Definition
79
RESTRICTED
RESTRICTED
Terminologies
(a) Web Server. The computer connected to the Internet that makes the
web pages available to the world.
(b) Client. The computer that requests the document is called client. It may
be any node or computer on the Internet.
(c) Web Page. Any single document on the WWW that is viewed by others
or it is simply a title, a collection of information and hyperlinks to other
information. Web pages may include text, pictures, sound, animation and videos.
(e) Home Page. The first page of the web site is called home page.
(f) Web Browser. It is a program that lets the user to view or explore the
information on the Web. Most popular Web Browser is Internet Explorer.
(h) Download. To bring any software or any information from any computer
down to your computer.
(k) URL. URL (Uniform Resource Locator) is an address of the web page
because each web page must have a unique address through which related
information will be displayed in front of the user. User can instantly display any
web page if he/she knows its URL. All web page URLs start with HTTP. e.g
http//:www.yahoo.com
(l) ISP. Internet Service provider that sells access to the Internet.
80
RESTRICTED
RESTRICTED
(a) E-Mail. E-mail can be defined as “A message sent from one computer
to another over telephone line”. It is a asynchronous activity means two
communication parties need not to be connected to the Internet at the same time
that is most common method of the communication used by people on the
Internet.
(d) Click Microsoft, select Client for Microsoft Network and then click Ok.
81
RESTRICTED
RESTRICTED
(b) Double click Dial Up Networking and then double click Make New
Connection.
(c) Write down the name of the computer in the related box and then select
the Modem.
(d) Type Area code, Telephone number of the ISP and selects required
Country or region code.
(f) Now take the properties of the icon, which you have made now by right
click it.
(h) Click the Server Types tab and select only these options.
(j) Now double click the Internet connection icon and type User ID and
Password that ISP has given you. A network icon will be place in the notification
area of the taskbar after connected to the Internet. Open the Web Browser and
write down the site name in the Address Window that you want to visit.
10. An email address defines the location of an individual’s mailbox on the Internet.
An email address consists of three parts:
82
RESTRICTED
RESTRICTED
(c) For making an e-mail address, user has to decide the site that where
he/she wants to make the e-mail address. Lets consider that user wants to make
an e-mail address on Yahoo site. So, following are the steps to make an e-mail
address on Yahoo:
(iii) Click Sign Up Now. If user has already an email address on yahoo
then click Existing Yahoo! Users.
(iv) A registration form will be displayed on the screen. Fill this form
and follow the instructions.
11 For checking or sending an Email on Yahoo, download the home page of the
Yahoo by writing www.yahoo.com in the address window of the browser and do the
following:-
(e) Click the Coming Mail. Computer will display the mail in front of you.
Read the mail and then click Back. If user wants to reply this mail then click
Reply and write down the message and click Send.
(f) For sending the mail, click Compose. This page consists of different
options. They are:-
(iii) Cc. Stands for Carbon Copy. A carbon copy is an exact copy of
a message. By this option, user can send the same message to different
persons. It shows the addresses of all those persons who will receive the
mail.
(iv) Bcc. Stands for Blind Carbon Copy. This lets the user to send
the same message to several people knowing them that others have also
received the same message. Means, it will not show the address of all
receiving personnel.
83
RESTRICTED
RESTRICTED
84
RESTRICTED
RESTRICTED
Information
Information Technology
2. Information Technology (IT) is the science dealing with the use of computers and
telecommunications equipment to store, retrieve, transmit and manipulate information /
data.
Computer
Software
4. Software consists of programs and data that reside in the memory and storage
devices. It is a set of programs, procedures, algorithms and its documentation
concerned with the operation of a data processing system. Program software performs
the function of the program it implements, either by directly providing instructions to the
computer hardware or by serving as input to another piece of software. The term was
coined to contrast to the old term hardware (meaning physical devices). In contrast to
hardware, software "cannot be touched". Software is also sometimes used in a more
narrow sense, meaning application software only. Sometimes the term includes data
that has not traditionally been associated with computers, such as film, tapes, and
records.
Hardware
6. The CPU is the nerve center and brain of the computer system, it coordinates
and controls the activities of all the other units and performs all the arithmetic and
logical processing to be applied to data.
85
RESTRICTED
RESTRICTED
7. Peripheral units consist of input, output and storage devices. Input devices are
used in entering data and programs into the computer memory. Examples are
keyboard, mouse, scanner, joystick, digital camera etc. Output devices are used in
transcribing data in computer system into information that can be used by human
beings as and when they require it. Examples are monitor, printer, speaker, plotter
etc. Storage devices are used to store both data and program instructions. Examples
are hard disks, RAM, ROM, etc.
Figure 1.1. A layer structure showing where the operating system software and
application software are situated while running on a typical desktop computer
Network
86
RESTRICTED
RESTRICTED
ICT Security
10. ICT security is the set of products, services, organizational rules and
individuals’ behavior that protect the ICT assets of an organization. ICT security is
achieved by implementing a suitable set of controls, including policies, processes,
procedures, organizational structures and software and hardware functions. In PAF
directorate of Cyber Warfare is responsible to formulate policies for ICT security.
Cyber Security
11. Cyber Security is the body of technologies, processes and practices designed
to protect networks, computers, programs and data from attack, damage or
unauthorized access. In a computing context, the term security implies cyber security.
Ensuring cyber security requires coordinated efforts throughout an information
system. One of the most problematic elements of cyber security is the quickly and
constantly evolving nature of security risks. The traditional approach has been to
focus most resources on the most crucial system components and protect against the
biggest known threats, which necessitated leaving some less important system
components undefended and some less dangerous risks not protected against. Such
an approach is insufficient in the current environment as it is said, "The threat is
advancing quicker than we can keep up with it. The threat changes faster than our
idea of the risk. It's no longer possible to write a large white paper about the risk to a
particular system. You would be rewriting the white paper constantly..."
12. ICT security threats can be categorized into two main categories namely
malicious codes and network based attacks. Malicious codes include computer
viruses, worms, Trojan horses, backdoors etc. Network based attacks typically include
intrusions, eavesdropping, DoS (Denial of Service) attacks etc.
Vulnerability
13. In network security, vulnerability refers to any flaw or weakness in the network
defense that could be exploited to gain unauthorized access to, damage or otherwise
affect the network.
87
RESTRICTED
RESTRICTED
Types of Security Threats
15. There are two types of threat categories: natural and human threats. A natural
or environmental threat is either from nature or a system's environment. Natural
threats can include lightning, fires, earthquakes or floods. Environmental threats can
include poor building wiring or insufficient cooling for the systems. Human threats are
caused through unintentional or intentional actions. An unintentional threat is a human
accident, bad habit or carelessness. An intentional threat, whether caused by an
insider or outsider, can be a spy, hacker or a disgruntled employee. The insider’s
intentional threat is one of the most challenging security problems because insiders
have the working knowledge and access to the PAF Intranet.
(b) The Intruder. The external threat to the PAF Information Systems also
exists from hackers, crackers or phreakers. Today's hackers are far more
advanced in computer skills. Using hacking tools available on the Internet, a
hacker is capable of executing automated attacks on Networks by exploiting
weaknesses.
88
RESTRICTED
RESTRICTED
for a number of reasons. Their small size and low cost make them easy to obtain and
difficult to control. The USB based storage devices pose the greatest security threat to
classified information than any other existing medium. Additionally, the Wireless
LANs, GSM (Mobile chip) cards, Bluetooth, Wi-Fi and WiMax technologies etc are
also impending threats to the Security of Information if used innocently.
Malicious Codes
17. Malicious code is the term used to describe any code in any part of a software
system or script that is intended to cause undesired effects, security breaches or
damage to a system.
18. Virus. A computer virus is a program or piece of code that is loaded onto the
computer without the knowledge and runs against the wishes. Viruses can also
replicate themselves. All computer viruses are man-made. A simple virus that can
make a copy of itself over and over again is relatively easy to produce. Even such a
simple virus is dangerous because it will quickly use all available memory and bring
the system to a halt. An even more dangerous type of virus is one capable of
transmitting itself across networks and bypassing security systems.
19. Worm. A program or algorithm that replicates itself over a computer network
and usually performs malicious actions, such as using up the computer's resources
and possibly shutting the system down.
22. Without security measures and controls in place, the data might be subjected to
an attack. Some attacks are passive, meaning information is monitored; others are
active, meaning the information is altered with intent to corrupt or destroy the data or
the network itself. A few of the most common attacks utilizing networks are discussed
in the following paras.
89
RESTRICTED
RESTRICTED
24. Data Modification. After an attacker has read the data, the next logical step
is to alter it. An attacker can modify the data in the packet without the knowledge of
the sender or receiver. Even if you do not require confidentiality for all
communications, you do not want any of the messages to be modified in transit. For
example, if you are exchanging purchase requisitions, you do not want the items,
amounts, or billing information to be modified.
Encryption
28. Encryption is taking your text, data or other communications and encoding it so
that those who should not see or hear it will not be able to. An encrypted file will
appear as gibberish unless you have the password or key necessary to decrypt the
information.
Authentication
29. One of the keys in determining if the message or file you are receiving is safe is
to first authenticate that the person who sent it is who they say they are.
Authentication is the process of determining the true identity of someone. Basic
authentication is simply using a password to verify that you are who you say you are.
There are also more complicated and more precise methods such as biometrics
(fingerprints, retina scans).
Biometrics
30. Biometrics is a form of authentication using unique physical traits of the user.
Unlike a password, a hacker cannot “guess” your fingerprint or retinal scan pattern.
Biometrics is a relatively new term used to refer to fingerprinting, retinal scans, voice
wave patterns and various other unique biological traits used to authenticate users.
90
RESTRICTED
RESTRICTED
ICT Users in PAF
(a) Users. Personnel / Units / Formations of PAF using the ICT assets for
day-to-day working. For example, a person working in Orderly room using a
computer for mail handling is a user of ICT asset in PAF.
DG C4I
ACAS (NCW)
91
RESTRICTED
RESTRICTED
4. Authorization Process for ICT Systems. All units of PAF involved in the
procurement and commissioning of ICT systems are to ensure that the security
requirements for the systems are met in line with the provisions mentioned in
AFM 12-1. In this regards all Air Staff Requirements (ASRs) / Request for Proposals
(RFPs) for new measures in case of ICT systems are to be routed through NCW Sub
Branch.
5. Risks from External Agencies. The risks from external agencies to PAF’s
ICT assets cannot be ruled out. The following must be ensured by all PAF personnel
while interacting with external parties (vendors/consultants/suppliers etc) for any ICT
related job:-
(c) A record of all such activities performed on any ICT system of the PAF
must be maintained for any future reference.
7. Acceptable Use of Assets. All PAF personnel must use ICT assets as per
the following acceptable usage policy rules:-
(a) Users are only allowed to use ICT assets for official work as per their
authorized access rights.
92
RESTRICTED
RESTRICTED
(b) Owners / Custodians / Managers / ISOs of ICT assets would grant
access rights to users for the operation of Dte / Unit’s Application or Servers as
per the procedure outlined by the domain specialists.
(j) Executing any form of monitoring which would intercept, sniff, tamper, or
capture data from PAF Networks, PC’s, Communication equipment and
associated accessories.
(l) Web vandalism (deface web pages, denial of service, etc) in PAF.
(n) Forging of any kind of information including but not limited to e-mail
headers, MAC addresses, IP addresses, Usernames etc.
93
RESTRICTED
RESTRICTED
(r) Use of insecure protocols such as telnet, ftp etc over PAF networks.
(u) Providing any ICT related information to a person who is not authorized
for it.
94
RESTRICTED
RESTRICTED
or be of advantage to a foreign nation. Such information may be sent in clear
by a communication channel approved as secure for the grade concerned by
Dte of Cyber Warfare.
11. ICT Users. All ICT users are responsible for the following:-
(a) Read, understand and implement AFM 12-1 and AFO 20-25.
(c) Provide physical security to PCs and ensure that they carry appropriate
security markings.
(f) Use official eMail service for exchanging files with other users as per security
classification.
(g) Always lock computer when going away for short duration (Press
CTRL+ALT+DEL then click on ‘Lock Computer’ button).
(h) Do not connect personal Laptops / readable or writeable media to any PAF
Network.
95
RESTRICTED
RESTRICTED
Internet Usage Policy
12. There are security risks associated with connecting the PCs with the Internet.
As mobile codes and cookies can be used by a malicious entity to obtain classified
information stored on a system connected with internet, hence elaborate guidelines
must be defined by respective domain specialists to avoid disclosure of PAF’s
classified information over the internet. To implement and enhance Internet security,
IS and NW sub-branches must coordinate and incorporate measures in their
respective domains. Additionally, Dte of NW (Bases) through Base Comm Centres
must provide the list of authorized internet users to respective Base IT Centers and
Dte of Cyber Warfare. Any change in the list must also be communicated promptly.
13. A hacker can intrude into the Users’ PC through Internet easily and consequently
extract information from victim’s PC or any PC connected to it through LAN. Likewise, if a
hacked PC is connected to Internet and also having connectivity to other PAF PCs’
through PAF Intranet, an Intruder can access the service PCs by obtaining information
through Cookies and Mobile Codes. A cookie is a text file that a web server stores on
hard drive when a site is visited, and retrieves information whenever revisited. All cookies
are not harmful. The security problems with cookies occur when the cookie has "saved"
personal information, such as password or it is tracking the Users’ activities on the web.
Mobile code, such as ActiveX and Java, are scripting languages used for Internet
applications. Mobile code embedded in a web page can recognize and respond to events
such as mouse clicks, form input, and page navigation. It can cause hostile programs to
automatically execute on a computer without the user’s knowledge. The downloaded
programs could access or damage the data on the user’s PC, or inserts a virus as well;
therefore no classified information is to be exchanged on internet.
(c) Maintaining accounts and use of social media sites such as facebook, twitter
etc is strictly prohibited for all PAF personnel.
(e) Do not include Rank, word ‘PAF’, ‘GD’, ‘Unit name’ or ‘Branch’ with ‘Course
number’ in personal eMail address.
(f) Personnel are not to use Golden Chains (eMails forwarded for rewards and
incentives) as they are designed to collect personal information.
(g) Peer to Peer (P2P) software is the hackers’ paradise for foot printing the
victim’s PCs, therefore their use is discouraged.
96
RESTRICTED
RESTRICTED
(h) In offices, the Internet PC should preferably not be installed with Microsoft
Office (MS Word, MS Power Point, MS Excel etc) so as to alleviate the possibility
of personnel using it for official purposes.
15. All internet users are to ensure through respective IT Centre that following software
are installed / updated on the Internet connected PCs:-
(a) The Operating System (OS) is patched with the latest security patches issued
by the OEM of the Operating System.
(c) The PC has a Personal Firewall or Anti Spyware / AdAware or Spy Sweeper
etc installed.
Password Security
17. The User ID owner is responsible to securely manage his / her password.
Passwords should incorporate the following rules: -
(c) Don't use a word contained in the dictionary. It should not be based on
Designation, Names or Pak No and instead; alphanumeric with special
characters like “& $ @ _ ^” etc be used.
(d) All default guest accounts should be removed / disabled. The default
Administrator Accounts (Tiger / Scott etc) should be renamed.
(e) The administrative accounts should not be used for routine tasks.
(f) All vendors supplied and default passwords should be changed before the
equipment is brought on the network or operated on as standalone.
(g) Passwords must not be stored in readable form in batch files, automatic
login scripts, software macros, terminal function keys, or in other locations.
97
RESTRICTED
RESTRICTED
(h) User accounts that have system-level privileges granted through group
memberships or programs such as ‘Administrator / Master’ must have a unique
password from all other accounts held by that user. Administrators’ passwords
should be copied and held under dual control in a secure location to enable
access to the system by an authorized person in the event of a contingency
with the password holder.
(j) No information system should allow a ‘user’ to remain on-line for trying all
possible combinations of passwords. A lockout must be activated after a
predetermined number of maximum five failed attempts or a fixed amount of
time of 45 seconds.
18. Following are the guidelines for creating a good password (having all the above
mentioned functionalities) and is also easy to remember:-
(b) Replace certain letters in the word with numbers or special characters like
‘kh@k1s’; replacing ‘a’ with ‘@’ and ‘i’ with ‘1’ or ‘!’ etc.
(c) Additionally replace some lower case letters with uppercase letters eg
“kH@k1s” likewise “s” can be replaced with ‘z’ making “kH@k1z”.
(d) One can select a word and deliberately misspell it. The password can also
be used with small phrases and special characters and/or numbers like
“Kaala_Jadoo”, or “Tea1&Coffee2” etc.
1. Various security issues associated with using email include email borne
viruses, hidden file extensions and email spoofing.
2. Email Borne Viruses. One of the main attack vectors for a virus is through
your email. While it is possible to get a virus by using an infected floppy disk or
compact disc one of the main methods of propagation is through email. From the
standpoint of trying to do the most damage it makes sense for a virus author to use
email as a means for spreading the virus. The authors of Trojans, worms and viruses
are sometimes exceptionally clever and ingenious in finding and exploiting
weaknesses in both the computer system and in human nature in order to make their
attack successful. Unfortunately, sometimes even viruses that aren’t so clever
manage to spread quickly and do lots of damage due to uneducated and naïve users.
To get you to open the email in the first place viruses try to use Subject Lines for the
email messages that will get your attention. Some will come disguised as important
alerts from major companies like Microsoft. Recent viruses will also reply to existing
emails in the infected computer. When you receive a message in response to a
message you know you sent someone you have no reason to suspect it would be
98
RESTRICTED
RESTRICTED
harmful so you are more likely to open it. Typically, the email itself is not the problem.
The Subject Line and the Message Body are worded with the intent and goal of
getting you to double-click on the attached file to execute the actual virus. With HTML-
based email it is possible to embed the virus directly in the message. Major viruses
and worms in the past couple of years like CodeRed and Nimda have exploited this
flaw to cause the virus to execute as soon as someone opened the email message,
rather than waiting for them to click on the attachment. In 2001, Microsoft released a
Security Bulletin, MS01-020, including a patch to protect users from this happening.
99
RESTRICTED