Itworkshop Lab Manual
Itworkshop Lab Manual
Lab Manual
Prepared by
Mr.M.Ramakrishna
Mrs.Anitha
Mrs.K Anusha
1
ITWORKSHOP LAB MANUAL
CERTIFICATE
This is to certify that this manual is a bonafide record of practical work in the IT Work Shop in
First Semester of II year B.Tech (CSE) programme during the academic year 2019-20. This book is
2
ITWORKSHOP LAB MANUAL
3
ITWORKSHOP LAB MANUAL
S.No Content Page No:
6
1 Preface
2 7
Acknowledgement
3 8
General Instructions
4 9
Institute Vision and Mission
5
ITWORKSHOP LAB MANUAL
PREFACE
This book entitled “IT WORKSHOP Lab” is intended for the use of Second year First
semester (i.e, II-I) B.Tech(CSE) students of Marri Laxman Reddy Institute of Technology
and Management, Dundigal, Hyderabad. The main objective of The IT Workshop is a
training lab course to get training on PC Hardware, Internet & World Wide Web, and
Productivity tools for documentation, Spread sheet computations, and Presentation.
By
Mr.M.Ramakrishna
Mrs.Anitha
Mrs.K.Anusha
6
ITWORKSHOP LAB MANUAL
ACKNOWLEDGEMENT
It was really a good experience, working with It Workshop lab. First we would like to thank Mr.K.Abdul
Basith, Assoc.Professor, HOD of Department of Computer Science and Engineering, Marri Laxman Reddy
Institute of technology & Management for his concern and giving the technical support in preparing the
document.
We are deeply indebted and gratefully acknowledge the constant support and valuable patronage of
Dr.R.Kotaiah, Director, Marri Laxman Reddy Institute of technology & Management for giving us this
wonderful opportunity for preparing the It Workshop laboratory manual.
We express our hearty thanks to Dr.K.Venkateswara Reddy, Principal, Marri Laxman Reddy Institute of
technology & Management, for timely corrections and scholarly guidance.
At last, but not the least I would like to thanks the entire CSE Department faculties those who had inspired
and helped us to achieve our goal.
By
Mr.M.Ramakrishna
Mrs.Anitha
Mrs.K.Anusha
7
ITWORKSHOP LAB MANUAL
GENERAL INSTRUCTIONS
1. Students are instructed to come to It Workshop laboratory on time. Late comers are not entertained in the lab.
2. Students should be punctual to the lab. If not, the conducted experiments will not be repeated.
3. Students are expected to come prepared at home with the experiments which are going to be performed.
4. Students are instructed to display their identity cards before entering into the lab.
6. Any damage/loss of system parts like keyboard, mouse during the lab session, it is student’s responsibility and
penalty or fine will be collected from the student.
7. Students should update the records and lab observation books session wise. Before leaving the lab the student
should get his lab observation book signed by the faculty.
8. Students should submit the lab records by the next lab to the concerned faculty members in the staffroom for
their correction and return.
9. Students should not move around the lab during the lab session.
10. If any emergency arises, the student should take the permission from faculty member concerned in written
format.
11. The faculty members may suspend any student from the lab session on disciplinary grounds.
12. Never copy the output from other students. Write down your own outputs.
8
ITWORKSHOP LAB MANUAL
INSTITUTION VISION AND MISSION
VISION
To establish as an ideal academic institutions in the service of the nation, the world and the humanity by
graduating talented engineers to be ethically strong, globally competent by conducting high quality research,
developing breakthrough technologies, and disseminating and preserving technical knowledge.
MISSION
To fulfill the promised vision through the following strategic characteristics and aspirations:
➢ Contemporary and rigorous educational experiences that develop the engineers and managers.
➢ An atmosphere that facilitates personal commitment to the educational success of students in an environment
that values diversity and community.
➢ Undergraduate programs that integrate global awareness, communication skills and team building.
➢ Education and Training that prepares students for interdisciplinary engineering research and advanced
problem solving abilities.
9
ITWORKSHOP LAB MANUAL
DEPARTMENT VISION AND MISSION
Department Vision:
To empower the students to be technologically adept, innovative, self-motivated and responsible global
citizen possessing human values and contribute significantly towards high quality technical education
with ever changing world.
Department Mission:
To offer high-quality education in the computing fields by providing an environment where the
knowledge is gained and applied to participate in research, for both students and faculty.
To develop the problem solving skills in the students to be ready to deal with cutting edge
technologies of the industry.
To make the students and faculty excel in their professional fields by inculcating the communication
skills, leadership skills, team building skills with the organization of various co-curricular and extra-
curricular programmes.
To provide the students with theoretical and applied knowledge, and adopt an education approach
that promotes lifelong learning and ethical growth.
PSO2: Programming Skills: Identify required data structures, design suitable algorithms, develop and
maintain software for real world problems.
10
ITWORKSHOP LAB MANUAL
PROGRAM OUTCOMES
The Program Outcomes (POs) of the department are defined in a way that the Graduate
Attributes are included, which can be seen in the Program Outcomes (POs) defined. The
Program Outcomes (POs) of the department are as stated below:
e : An ability to use appropriate techniques, skills and tools necessary for computing practice.
f : Ability to apply reasoning informed by the contextual knowledge to assess social issues,
consequences & responsibilities relevant to the professional engineering practice.
11
ITWORKSHOP LAB MANUAL
Course Objectives
Course Outcomes
Apply knowledge for computer assembling and software installation.
Able to understand how to solve the trouble shooting problems.
Apply the tools for preparation of PPT, Documentation and
Able to understand the Linux Environment.
LEARNING OUTCOMES
1. Be able to build their own PC and able to solve Software and Hardware problems.
2. Demonstrate proficiency in Microsoft Office and Windows.
3. To acquire hands-on experience in OS installation.
4. Be able to assist in the creation of an effective Power point presentation.
5. Be able to assist in the creation of an effective Excel sheets.
12
ITWORKSHOP LAB MANUAL
Content of Lab Experiments
Problem 1:
Every student should identify the peripherals of a computer, components in a CPU and its functions. Draw the
block diagram of the CPU along with the configuration of each peripheral and submit to your instructor. Every
student should disassemble and assemble the PC back to working condition.
i). AIM: To Identify the peripherals of a computer, components in a CPU and its functions and to draw the block
diagram of the CPU along with the configuration of each peripheral.To assemble an disassemble the PC back to
working condition..
Hardware Requirements: Cabinet, Hard Disk, CD/DVD Drive, Floppy Drive, Monitor, Mouse, Keyboard, Mother
Board, Socket 478, Processor, Heat Sink Fan, RAM Slots, PCI Slot, AGP Slots, CMOS Battery, BIOS, North Bridge,
South Bridge, IDE Slots, SMPS, ATX power Connector.
INTRODUCTION TO COMPUTER:
A computer is a programmable machine or computer is an electronic device which takes the input information from
the input device, process or executes the input in Processor or CPU and generates the output information through
output devices. Computer enables arithmetic computations, data processing, information management (storage) and
knowledge reasoning in an efficient manner.
Basically the computer system has three major components. These are
13
ITWORKSHOP LAB MANUAL
1. CENTRAL PROCESSING UNIT:
The Central Processing Unit takes the input data from the input devices and processes it according to the set
of instructions. After that generate the output and sends the output to the output devices. The CPU is composed three
parts. These are
a) ALU:
Arithmetic Logical Unit (ALU) is used to do the arithmetic operations on data by adding, subtracting, dividing,
multiplying and incrementing and decrementing.
It is also used for Logical operations like AND, OR, NOT and X-OR.
b) CU:
Control unit is mainly used for generating the electronic control & timing signals for program execution. It
controls all the operations of the computer.
c) Registers:
CPU also possesses the memory to hold the data temporarily during the execution of an instruction. These are
small memory locations in CPU.
INPUT DEVICE:
Input devices accept the data and instructions from the user.
OUTPUT DEVICE:
3. MEMORY UNIT:
Memory is like an electronic scratch pad inside the computer. It is a storage unit to hold the data.
In the computer the data will be stored and retrieved in the form of bits and bytes. The byte will store a single
character such as a letter of the alphabet or a numeral.
a) 8 BITS = 1 BYTE
14
ITWORKSHOP LAB MANUAL
b) 1024 BYTES = 1 KB
c) 1024 KB = 1 MB
d) 1024 MB = 1 GB
e) 1024 GB = 1 TB.
Primary memory is the fastest memory in a computer. This memory is primarily (temporarily) used to store the data
and programs during the execution of a program.
Secondary memory used to store the data permanently. The data will be stored in storage devices. Storage
devices are like Magnetic disks, Hard disks, Floppy disks, Compact disks
IDENTIFICATION OF PERIPHERALS:
1. Cabinet:
It is used to install all hardware devices like (Mother Board, SMPS, HDD, CD ROM, and FDD). It has Start,
Restart Button, Led’s, Audio and USB Connecters are available at front side.
15
ITWORKSHOP LAB MANUAL
2. The Mother Board/ System Board
In Personal Computers, a Mother Board is the central printed circuit Board (PCB) in many modern
computers and holds many of the crucial components of the system, providing connectors for other
peripherals. It is also called as main board or system board.
1) Integrated Mother Boards have all the peripheral device slots, input output ports, serial and parallel
ports are mounted on the board.
2) Non-Integrated Mother Boards have all peripheral device slots and input output ports,, serial and
parallel ports are connected using expansion Boards.
List of Mother Board Manufactures are: Intel, Zebronics, Acer Inc.,VIA Technologies, etc.
Mother Board
a) Socket 478: It has 478 pin slots to place the CPU in it and above the CPU place the Heat Sink Fan to cool
the processor when it generates the heat and we can fix the fan with locks.
16
ITWORKSHOP LAB MANUAL
b) CPU or Processor
CPU The central processing unit contains the heart of any computer, the processor. The processor is fitted on
to a Mother Board. The Mother Board contains various components, which support the functioning of a PC.
Clock Speed measures how fast a processor completes operations, usually measured in megahertz and
gigahertz. A 1.8GHz processor runs at 1,800,000,000 cycles per second. List of CPU Manufacturers are:
AMD, INTEL, Samsung, IBM, Transmeta, etc
DDR RAM
17
ITWORKSHOP LAB MANUAL
SD RAM
d) North Bridge:
It is also called as controller. It converts electronic signals to binary values and binary values to electronic
signals.
e) South Bridge:
It is controls major components of mother board and it is a back bone of the input out devices. It is
communicates PCI slots, IDE-1, IDE-2, floppy connecter, BIOS chip.
18
ITWORKSHOP LAB MANUAL
g) Primary & Secondary(IDE-1 & IDE-2) :
Mainly there are three IDE slots and cables i.e. IDE-1 (Primary) to connect Hard Disk Drive having 40
pin slot and 80 wire cable, IDE-2 (Secondary) to connect CD/DVD Drive having 40 pin slot and 40 wire
cable, IDE-3 (Tertiary) to connect Floppy Drive having 35 pin slot 3.5inch wire with a cut in middle. But
present mother boards does not have IDE-3 slot.
To supply the power to all the components inside the cabinet and it is a case that holds a transformer, voltage
control and fan.
HDD is a device for storing and retrieving digital information, primarily computer data. It consists of rotating
discs (often referred to as platters), coated with magnetic material and with magnetic heads arranged to write
data to the surfaces and read it from them.
List of Manufacturers of HDD Devices are: Hitachi, Samsung, Toshiba, Seagate Technology
20
ITWORKSHOP LAB MANUAL
5. CD-ROM Drive/ DVD ROM Drive
The common types are: CD-ROM, CD-RW, CD-R, DVD, DVD-ROM., DVD-RW, DVD-R
21
ITWORKSHOP LAB MANUAL
AIM: TO assemble and disassemble the system
Hardware Requirements: Cabinet, Hard Disk, CD/DVD Drive, Floppy Drive, Monitor, Mouse, Keyboard, Mother
Board, Processor, Heat Sink Fan, RAM Cards, PCI Cards, AGP Card, CMOS Battery, IDE cables, SMPS, ATX
power Connector.
Safety Precautions:
1. Check how to open the cabinet and determine where to fix the components.
2. Determine if the case has the appropriate risers installed.
1.
1. Line up the patch on the motherboard with the appropriate holes in the block panel I/O shield of the case.
2. Check the points where you and to install
3. Install them and make the mother board sit on them and fix screws if required
23
ITWORKSHOP LAB MANUAL
2. There are currently 2 types of RAM available.
a) SD RAM.
b) DDR RAM.
3. The mother board’s chipset determines which type of RAM may be used.
24
ITWORKSHOP LAB MANUAL
Connecting the BUS Cables, power connectors:-
1. Attach the long end of the cable to the IDEU connector on the motherboard first.
2. The red stripe on the IDE cable should be facing the CD Power.
Final Check:-
1. Mother board jumper configurations are the settings for the processor operator.
2. Drive jumper settings, master/ slave correct?
3. Is the processor, RAM modules and plug in cards finally seated in their sockets?
4. Did you plug all the cables in? Do they all fit really?
5. Have you frightened all the screws in plug- in cards or fitted the clips?
6. Are the drive secure?
7. Have u connected the power cables to all driver?
Result: Introduction to computers and Identification peripherals task completed. Assembling and disassembling
procedure is successfully completed.
25
ITWORKSHOP LAB MANUAL
Viva Questions:
1) What is a computer?
Ans: Computer is a electronic device which receive, stores ,process the data and gives output
7) What do you mean by a processing device? What are the various types of processing devices?
Ans:The main function of a computer is to process data. The various types of processing device in a
computer are;
a) Microprocessor
b) Chipset
c) BIOS
9) What is an interface?
Ans:These are the communication channel that enables your computer to exchange information with
various devices.
26
ITWORKSHOP LAB MANUAL
10) What is a microprocessor?
Ans:The most important electronic component on the computer. It is a programmable logical device for
processing data. In the world of personal computers, the termsMICROPROCESSOR and CPU are used
interchangeably.
11) What are the factors affecting the speed of the microprocessor?
Ans:The following are the factors affecting the speed of the microprocessor.
a) Number of instructions build in the processor.
b) Bandwidth
c) Clock Speed
d) Number of transistors inside the processor
16) What is Heat Sink? What is its use? If it is not in the system what will happen?
Ans:A heat sink is a component used to lower the temperature of a device.It is most commonly there on the
microprocessor. If it is not properly fixed the system, the system will shutdown automatically to prevent
further damage to the processor.
27
ITWORKSHOP LAB MANUAL
for the central processing unit (CPU) to have fast and direct access when needed to perform tasks.
20)What is Cache memory? What is the advantage if a processor with more cache memory you are
using?
Ans:Cache memory is the memory area between RAM and Processor. If cache memory increases the speed
of the system will also improved.
21) What is the name of the printed circuit board?
Ans.Motherboard
Ans:CMOS
23) What is the name of the card that controls read,write head and motor in the hard disk
Disc Controller Card
24) Which of the following retains the information it's storing when the power to the system is turned
off?
ROM
28
ITWORKSHOP LAB MANUAL
33)What is Upgrading the memory?
Ans: Adding a memory module to the existing bank on the available slot or replacing the previous one with
the increased memory size is also called upgrading memory. This will surely increase the performance of
the computer.
42) What is ATX? How it is different from AT? Which is using now?
Ans:AT is a short for advanced technology, the AT is an IBM PC model introduced in 1984. It includes
an Intel 80286 microprocessor, a 1.2MB floppy drive, and an 84-key AT keyboard. The ATX form factor
specified changes to the motherboard, along with the case and power supply. Some of the design
29
ITWORKSHOP LAB MANUAL
specification improvements of the ATX form factor included a single 20-pin connector for the power
supply, a power supply to blow air into the case instead of out for better air flow, less overlap between the
motherboard and drive bays, and integrated I/O Port connectors soldered directly onto the motherboard.
The ATX form factor was an overall better design for upgrading.
44) What is PCI slot? How is different from PCI Express (PCI-E)?
Ans:Short for PERIPHERAL COMPONENT INTERCONNECT, a local bus standard developed by Intel
Corporation. PCI Express (Peripheral Component Interconnect Express), officially abbreviated as PCIe, is
a computer expansion card standard designed to replace the older PCI, PCI-X, and AGP bus standards.
50) What are the different types of Form Factors of Power Supply?
AT , ATX, Flex ATX, Micro ATX etc…
30
ITWORKSHOP LAB MANUAL
PROBLEM 3:
Every student should individually install operating system like Linux or MS windows on the personal
computer. The system should be configured as dual boot with both windows and Linux.
THEORY:
WINDOWS XP Wide Interactive Network for Development of Office Work Solutions- Experience
Microsoft Windows XP was introduced in 2001 and is the most significant upgrade to the Windows operating system
since Windows 95.
PROCEDURE:
Step 1 - Start your PC and place your Windows XP CD in your CD/DVD-ROM drive.
Step 2 – Your PC should automatically detect the CD and you will get a message saying "Press any key to boot from
CD". Soon as computer starts booting from the CD your will get the following screen:
31
ITWORKSHOP LAB MANUAL
Step 3 - You will then get a Windows XP Professional Setup screen. You have the following options:
i) To set up Windows XP now, press Enter
ii) To repair a Windows Xp Installation, press R
iii) To quit set up without installing windows XP, press F3.
Step 4 - You will be presented with the End User Licensing Agreement. Press F8 to accept and continue
Step 5 – You will get Windows XP Professional Setup screen and having the following options:
i) To set up windows XP on selected item, press Enter
ii) To create a partition in the unpartitioned space, press C
iii) To delete the selected item , press D
When you are doing new partition in hard disk press C to create partition in unpartitioned space
and give required size for the drive and press Enter.
32
ITWORKSHOP LAB MANUAL
Step 6 – After completion of creating partitions Select Partition 1 (C: Drive) to install operating system on C
Drive and press Enter.
Step 7 - Choose format of the partition using NTFS/FAT file system. NTFS is the recommended file system
with Quick option. If the hard drive has been formatted before then you can choose quick NTFS format. We
chose NTFS because it offers many security features, supports larger drive size, and bigger size files.
NTFS:
i) New/Network Technology File System
ii) It supports larger drive size, bigger size files
iii) It is more faster to allocate the memory, accessing the data
iv) Provides more security features.
v) Provides more Networking options
vi) Partition size can be of 2 TB or more and file size can be 16 GB
FAT:
i) File Allocation Table File System
ii) It supports low drive size, lesser size files
iii) It is more slower to allocate the memory, accessing the data
iv) Provides less security features.
v) Provides less Networking options
vi) Partition size can be of 2 TB or more and file size can be 4 GB
33
ITWORKSHOP LAB MANUAL
Step 8 - Windows will now start formatting drive C: and start copying setup files from CD to C Drive.
Step 9 - After the setup has completed copying the files the computer will restart. Leave the XP CD in the
drive but this time DO NOT press any key when the message "Press any key to boot from CD" is displayed.
In few seconds setup will continue. Windows XP Setup wizard will guide you through the setup process of
gathering information about your computer.
34
ITWORKSHOP LAB MANUAL
Step 11: Enter your product key. XP Product Key has 25 Characters.
Step 12 - Name the computer, and enter an Administrator password. Don't forget to write down your
Administrator password.
Step 13 - Enter the correct date, time and choose your time zone.
35
ITWORKSHOP LAB MANUAL
Step 14 - For the network setting choose typical and press next.
Step 15 - Wait for the installation to finalize. This will only take a few minutes, and the computer will
reboot when it is finished installing
Step 16 - Set your display preferences. Once Windows loads, you will be told that Windows will
automatically configure your display. Click OK to start the configuration. Your screen will flash a couple
times, and then you will be asked if you can read the box that appears.
36
ITWORKSHOP LAB MANUAL
Step 17 - Set your connection preferences. If your computer is connected to the internet, select your
connection type. Press Next to continue.
Step 18 - Activate your copy of Windows. If connected to the Internet, Select "Activate Now." Windows
will connect to the activation server and automatically authenticate your copy of Windows. If you haven’t
entered your Product Key yet, you will need to enter it now.
Step 19 - Add users that will sign on to this computer and click next.
37
ITWORKSHOP LAB MANUAL
Step 20: Log in, to your PC for the first time.
THEORY: Linux is a Unix-like operating system that was designed to provide personal computer users a free or
very low-cost operating system comparable to traditional and usually more expensive Unix systems. Linux has a
reputation as a very efficient and fast-performing system. Linux's kernel (the central part of the operating system) was
developed by “Linus Torvalds” at the University of Helsinki in Finland. To complete the operating system, Torvalds
and other team members made use of system components developed by members of the Free Software Foundation for
the GNU Project.
38
ITWORKSHOP LAB MANUAL
PROCEDURE:
1. Language Selection
Using your mouse select the language you would prefer to use for the installation
Click next to continue.
2. Key Board Configuration:
Using your mouse select the correct layout type for the keyboard you would prefer to use for the installation
and as the system default.
Once you have made the selection click next to continue.
3. Mouse Configuration:
If you have a PS/2, USB or Bus mouse you do not need to pick a port and device. If you have a serial mouse,
you should choose the correct port and device that your serial mouse is on.
The Emulate 3 buttons checkbox allows you to use a two-button mouse as if it had three buttons. If you
select this check box you can emulate a third “middle” button by pressing both mouse buttons simultaneously.
4. Installation Type:
You can chose automatic partitioning or manual partitioning using Disk Druid of fdisk.
Automatic partitioning allows you to perform an installation without having to partition your drives yourself.
Automatic partitioning allows you to have some control concerning what data is removed from your system.
Your options are:
Remove all Linux partitions on this system.
Remove all partitions on this system
Keep all partitions and use existing free space.
To partition manually choose either Disk druid or fdisk partitioning tool.
Lick next once you have made your selections.
5. Partitioning your system:
If you chose automatic partitioning and did not select Review skip ahead
If you choose automatic partitioning and selected review you can either accept the current
partition settings (click next) or modify the setup using Disk Druid, the manual partition tool.
If you choose manual partition with fdisk skip ahead.
39
ITWORKSHOP LAB MANUAL
At this point you must tell the installation program where to install Linux. This is done by
defining mount points for one or more disk partitions in which Linux will be installed.
6. Adding Partitions:
Boot loader is the first software program that runs when a computer starts.
The installation program provides two boot loaders GRUB ( GR and Unified Boot Loader) which is the
default and LILO
If you do not want GRUB as your boot loader click Change Boot Loader.
You can then choose to install LILO or choose not to install boot loader at all by clicking Do not install boot
loader on the change boot loader button.
Network devices are automatically detected and displayed in Network Devices list,
Select a network device and click Edit
Here you can configure IP address and net mask of the device.
8. Firewall configuration:
You can set your time zone by selecting your computers physical location or by specifying your time zones offset
from Universal Time.
You can select package groups which groups components together or individual packages or a combination of the two.
40
ITWORKSHOP LAB MANUAL
41
ITWORKSHOP LAB MANUAL
42
ITWORKSHOP LAB MANUAL
43
ITWORKSHOP LAB MANUAL
44
ITWORKSHOP LAB MANUAL
45
ITWORKSHOP LAB MANUAL
46
ITWORKSHOP LAB MANUAL
47
ITWORKSHOP LAB MANUAL
48
ITWORKSHOP LAB MANUAL
49
ITWORKSHOP LAB MANUAL
50
ITWORKSHOP LAB MANUAL
51
ITWORKSHOP LAB MANUAL
52
ITWORKSHOP LAB MANUAL
LINUX Commands:
syntax
$ls
syntax
$clear
syntax
$exit
syntax
$touch
syntax
$cd /home/mango
6.cat to view the contents of a file and it is also used for creating a new file with some contents
Syntax
$cat > newfilename enter,then you can write something in the file and then to save the file contents press clt+d then
enter
syntax
$mkdir newdirname
you can also create a directory at your desired path without changing your present working directory
53
ITWORKSHOP LAB MANUAL
syntax
$mkdir /home/mango/newdirname
syntax
$rm filename
syntax
$rmdir directoryname
10.rm [-i/-r/-f] to remove a directory with its subdirectories as well as its files that is to remove a directory which
already contains some files in it
syntax
$rm -i directory/filename
syntax
12.mv to move one file or directory from one place to another place, it
syntax
$man commandname
syntax
$mkdir info
syntax
$commandname –help
16.who by this command you can see the user name and their ip addresses who have loged in on your server
Syntax $who
17.whoami this command shows your current logged in terminal user name
syntax
$whoami
◮ / - the topmost
Viva Questions:
Viva Questions:
Ans:Operating systems exist for two main purposes. One is that it is designed to make sure a computer
system performs well by managing its computational activities. Another is that it provides an environment
for the development and execution of programs
The letters XP actually stands for eXPerience. It was designed as an enhancement of Windows 2000, with a
totally different and more attractive user interface/console.
4) What is a Hotfix?
Hotfix are files that are distributed by Microsoft Customer Service. These are intended to address issues
such as bugs and errors within existing software.
5) What is NTFS?
NTFS is short for New Technology File System. It is the standard file system that is being used by operating
systems starting from Windows NT, Windows 2000, Windows XP, and even the newer versions like Vista
and 7. It was originally designed to have a better performance on file storage and retrieval under the
Windows NT family.
DLL is short for Dynamic Link Library. These are shared library files that contain usable codes and routines
that other applications can utilize to create other new applications.
It is the Microsoft Certified Systems Engineer (MCSE). This certification deals with skills related to
applying solutions to business productivity by utilizing Microsoft Server operating system.
8) What is registry?
Registry is a very important component of the Windows Operating System. It stores important information,
such as setup and configuration, installation settings, and user settings.
56
ITWORKSHOP LAB MANUAL
ScanDisk is a diagnostic tool that checks a hard drive for errors, file corruptions and data integrity. It can do
repairs on errors that it detects.
To do this, start from the head and traverse to the end. For each node in the list that was traversed, swap the
values of the links “Next” and “Prev”. After that, set the “Head” to link to the last node or tail.
Windows 98 – Memphis
Windows Me – Millenium
Windows XP – Whistler
Windows Vista – Longhorn
Windows 7 – Vienna and Blackcomb
Cookies are small pieces of information that are stored in a browser. It keeps track of user preference, like
what sites are visited, what keywords are used, among others.
Windows XP supports four major file systems: FAT12, FAT16, FAT32 and NTFS. This means that
Windows XP can be installed on these file systems. The use of NTFS is preferred especially when using a
bigger hard drive space.
A Service Pack combines hotfixes and updates into one installer module. These are mainly used to upgrade
an existing software version without the need to uninstall and reinstall an entire software package.
Option Explicit ensures that all variables to be used in a program are defined or declared, therefore
specifying what data type it is intended for.
Arrays can store data in a fix allotted space. The use of linked list allows more flexibility because space is
dynamically allocated as needed.
Defrag is a system utility tool under Windows operating system that is designed to rearrange the ordering of
data on disk. This action makes the disk run faster and access to data more efficient.
18) What is the difference between a Windows server operating system and a workstation version?
57
ITWORKSHOP LAB MANUAL
The server version of a Windows operating system is designed to provide more optimized networking
services over a network. It can manage domains better and it includes more security feature and data backup
support. Workstation versions act merely as clients and therefore do not need to have as much resources
when compared to the server versions.
19) What is the purpose of creating partitions for a Windows operating system?
Creating partition may serve different purposes. The common reason is that a separate partition can be used
to store data files so that when Windows needs to be reinstalled, the main partition can be formatted without
fear of loosing data, which are stored on the other partition.
20) How do you correctly arrange the order by which pressing the tab key will move from one control
object to another?
You do that by setting the tabIndex property. Click on one control object to another in the sequence that you
want, and then each time you set the tabIndex property of each object as 0. That will automatically arrange
according to the sequence that you want.
The Linux Kernel is a low-level systems software whose main role is to manage hardware resources for the
user. It is also used to provide an interface for user-level interaction.
58
ITWORKSHOP LAB MANUAL
A swap space is a certain amount of space used by Linux to temporarily hold some programs that are
running concurrently. This happens when RAM does not have enough memory to hold all programs that are
executing.
30) Does it help for a Linux system to have multiple desktop environments installed?
In general, one desktop environment, like KDE or Gnome, is good enough to operate without issues. It’s all
a matter of preference for the user, although the system allows switching from one environment to another.
Some programs will work on one environment and not work on the other, so it could also be considered a
factor in selecting which environment to use.
The key differences between the BASH and DOS console lies in 3 areas:
– BASH commands are case sensitive while DOS commands are not;
– under BASH, / character is a directory separator and \ acts as an escape character. Under DOS, / serves as
a command argument delimiter and \ is the directory separator
– DOS follows a convention in naming files, which is 8 character file name followed by a dot and 3
character for the extension. BASH follows no such convention.
The root account is like a systems administrator account, and allows you full control of the system. Here you
can create and maintain user accounts, assigning different permissions for each account. It is the default
account every time you install Linux.
CLI is short for Command Line Interface. This interface allows user to type declarative commands to
instruct the computer to perform operations. CLI offers an advantage in that there is greater flexibility.
However, other users who are already accustom with using GUI find it difficult to remember commands
including attributes that come with it.
To open the default shell (which is where the command prompt can be found), press Ctrl-Alt-F1. This will
provide a command line interface (CLI) from which you can run commands as needed.
37) How can you find out how much memory Linux is using?
From a command shell, use the “concatenate” command: cat /proc/meminfo for memory usage information.
You should see a line starting something like: Mem: 64655360, etc. This is the total memory Linux thinks it
has available to use.
38) What is typical size for a swap partition under a Linux system?
The preferred size for a swap partition is twice the amount of physical memory available on the system. If
this is not possible, then the minimum size should be the same as the amount of memory installed.
Symbolic links act similarly to shortcuts in Windows. Such links point to programs, files or directories. It
also allows you instant access to it without having to go directly to the entire pathname.
41) Which tool can you use to prepare a USB device so that you can boot from it to install Windows 7
on a netbook?
Diskpart
42). Which of the following versions and editions of Windows 7 can you install to take advantage of
the hardware resources on a computer that has 16 GB of RAM? (Choose all that apply.)
43. Windows 7 comes in several different versions such as Home, Professional and Ultimate. You can
also run Windows 7 in 32 or 64 bit versions. If you want to install and run a 64 bit version of Windows
7 which one of the following is NOT a requirement?
44). Windows 7 comes in a variety of versions including Home, Professional and Ultimate. Which
version of Windows 7 comes with a form of encryption designed to help protect data on your PC and
portable storage devices against loss or theft?
Ultimate x64
45. Windows 7 comes in both a 32 bit and 64 bit versions. What is the minimum processor speed
recommended by Microsoft for running the 64 bit version of Windows 7?
1 GHz
60
ITWORKSHOP LAB MANUAL
46)Which version of Windows 7 comes with Windows Touch built in?
47). What is the minimum number of volumes that a computer running Vista should have if you want
to support dual-booting with Windows 7?
48). In which of the following scenarios must you perform a migration rather than an upgrade?
49). You are using sysprep to prepare a system for imaging. You want to reset the security ID (SID)
and clear the event logs. Which option should you use?
/generalize
50). You want to create a 30GB native VHD called MySystem.vhd in a folder called Windows 7 on an
external USB hard disk with the drive designation H. Which command do you use?
61
ITWORKSHOP LAB MANUAL
PROBLEM 5:
Hardware Troubleshooting: Students have to be given a PC which does not boot due to improper assembly or
defective peripherals. They should identify the problem and fix it to get the computer to working back condition.
THEORY:
If your PC hangs up or freezes it may be due to the hardware/software conflicts, faulty processor fan, inadequate
RAM and a virus/spyware attack. To deal with the security related threats such as viruses, hacking attacks, spyware,
adware, Trojan horses, browser hijacks and other, you need to install up-to-dated antivirus, anti spyware software and
properly configured firewall software or hardware. This article will provide you help in troubleshooting the most
common problems with your PC.
If you hard disk does not spin up then you need to do the following.
Check if the IDE ribbon cable is properly connected with the motherboard and hard disk.
If the problem still not resolved then there may be bad sectors or other physical defects in your hard disk. Use a hard
disk diagnostic utility, it will diagnose the health status of your hard disk and will help you to troubleshoot the
common problems.
Printer Problems
If your printer does not print, then you need to do the following.
If the problem is still not resolved then you need to reinstall the printer.
Memory Problems
62
ITWORKSHOP LAB MANUAL
Sometimes bad or low memory leads to system crash, slow response time and the system freeze. To troubleshoot the
memory related problems in your system you need to do the following.
Increase the amount of memory in your system. It will fix a number of system errors that are caused due to the low
memory.
Motherboard Problems
A PC motherboard consists of an I/O ports, expansion slots, input device ports, RAM memory and CPU socket. A
misconfigured motherboard may results in the system errors or no display at all. To troubleshoot the errors with your
system’s motherboard you need to do the following.
Upgrade the drivers of the newly installed motherboard and set the BIOS according to the manufacturer’s manual.
Remove all the optional devices and see if the problem is solved or not.
Make sure that the keyboard and mouse are properly inserted into the motherboard.
63
ITWORKSHOP LAB MANUAL
Test Data: No Test Data for this Experiment
Viva Questions:
1. Which of the following would you use to keep the power supply working properly?
To keep your power supply up and running and to help prevent damage from power surges, you should use
a surge protector. The UPS will supply power for a short period of time to the computer system in case of
total power outage.
3. Newer tower-case computers’ power supplies typically have which of the following power output
ratings?
Most newer tower computers have 500 watt or larger power supplies in them because of the greater number
of drives and expansion cards that are available now
4. Most power supplies in use today are designed to handle which two voltage ranges?
Standard North American power is 115 volts, and power in most parts of Europe and Asia is 230 volts.
Some power supplies have a slider on the back to switch between the two voltages.
6. How many pins are used for the main power connection by recent ATX/BTX motherboards with
ATX12V 2.2 power supplies?
Most of the newer power supplies in use today have 24 pins. Older motherboards have a 20-pin connection.
7. What is the four-pin square power connector on the motherboard used for
This connector is the ATX12V connector, which provides 12V power dedicated to the processor (a voltage
regulator on the motherboard reduces 12V to the actual power required by the processor).
8. What is the six-pin power lead on the power supply used for?
The six-pin (or 6+2 pin) power supply lead provides additional power needed by high-performance PCIe
x16 cards, such as those used for SLI or for CrossFire X multi-GPU installations
9. Which of the following steps would you use to remove a power supply?
You must disconnect from the wall first; then once inside the computer unhook the connection to the
motherboard, drives, and other devices
10. To avoid power supply hazards you must never do which of the following
The capacitors inside the power supply retain potentially fatal voltage levels. To prevent shock you should not
disassemble power supplies or stick in a metal object such as a screwdriver.
64
ITWORKSHOP LAB MANUAL
11. Which device provides emergency power to a computer in case of a complete power failure?
A UPS (uninterruptible power supply) will keep a standard desktop up and running in case of a complete power
outage.
12. What is the minimum time recommendation for a UPS to supply power for an individual
workstation?
UPSs are designed to supply power to a computer long enough for you to complete a formal shutdown
13. Which of the following correctly describe an SPS? (Choose all that apply.)
When an SPS is used there is a momentary gap, usually about 1ms or less, between when the power goes off and
when the SPS starts supplying power. SPSs are also less expensive and are not used at all times.
14. When a system is dead and gives no signs of life when you turn on the computer, which of the
following might be the cause?
When turning on a system that shows no signs of life you must consider all of these as potential problems.
15. Processors and other components use a finned metal device to help with cooling. What is this
device called?
All processors require a heat sink. A heat sink is a finned metal device that radiates heat away from the processor. An
active heat sink (a heat sink with a fan) is required for adequate processor cooling on current systems. Some older
systems used a specially designed duct to direct airflow over a processor with a passive heat sink (a heat sink without
a fan). Most motherboards’ northbridges use passive heat sinks or heat pipes.
18. If the Picture of the Monitor is not visible, give the solution?
Ans: Check the power connections on both sides of cabinet and monitor, check the Brightness control.
65
ITWORKSHOP LAB MANUAL
PROBLEM 6:
Students have to be given a malfunctioning CPU due to system software problems. They should identify the
problem and fix it to get the computer back to working condition. The work done should be verified by the
instructor and followed up by the viva.
PROCEDURE:
Ensure that your computer BIOS settings are correctly configured to the hardware that is installed in your
computer
Error messages while windows loading
1. If you have recently installed or changed something that could have caused normal windows to stop loading, try
loading the last known good configuration
2. If you are unable to get into Normal windows and believe that removing or uninstalling a program or changing a
setting may help enable you to get into windows, boot the computer into windows XP safe mode
3. If your computer has worked fine in the past but recently has been experiencing the issue you are encountering run
the system restore option to restore the computer to an earlier date
Other error messages that occur while windows is loading or after windows is loaded
1. If error occurs but windows still loads, verify no issues or conflict exits in device manager
2. Ensure that if programs are loading automatically that these errors are not associated with these programs
4. If your computer has virus protection installed make sure that it is up to date and that no virus are being detected
5. If your computer has worked fine in the past but recently has been experiencing the issue you are encountering run
the system restore option to restore the computer to an earlier date
REINSTALL: When a particular program is not working, reinstalling the failing application may be the fix you
need. Save any settings and data used by the program, and then use the original install disks to recopy the program
components to your hard drive.
66
ITWORKSHOP LAB MANUAL
ELIMINATE TROUBLESOME PROGRAMS: If you notice that consistent problems began when you installed an
unnecessary program, then uninstall that program from your system (click on START -> SETTINGS -> CONTROL
PANEL -> ADD/REMOVE PROGRAMS).
REINSTALL/UPDATE DRIVERS: Many hardware associated problems are caused by driver conflicts, corrupt
driver components, and drivers which need to be updated for use with new program releases. When a piece of
hardware stops working or continually produces errors, try reinstalling the driver disk that came with it.
DEFRAG THE HARD DRIVE: After a computer has been used for a while, data and software components tend to
get scattered around the surface of the hard drive. This can lead to cross linked files, problems with software, and
reduced system performance. Running a “defrag” takes each of these scattered bits of information and lines them up
neatly in concentric circles on the hard drive. Your system will perform faster after defragmentation, and certain types
of software problems will be eliminated. To run the built in Windows defrag program, click on START ->
PROGRAMS -> ACCESSORIES - SYSTEM TOOLS -> DISK DEFRAGMENTER.
REINSTALL THE OS: Reinstalling your Windows operating system is one of the best cures to an enormous
number of common computer problems.
Viva Questions:
2. What isVirus
It is a very generic problem with your computer. Your computer gets this problem by merely visiting a
website. Some of the symptoms of PC viruses are strange behavior in the OS, non-responsive applications
and slow performance.
However, do not get scared because the solution to this problem is not hard. You can install antivirus
program in your computer to get rid of this problem
.
3. What is Malware
It is another generic problem that infects your computer. Malware means malicious software. Worms and
Trojan Horses are some of the examples of common malware. Malware often enters your computer via mail
attachments.It is really difficult to free your computer from malware. It is always suggested that you do a
system restore and reinstall your operating system. You can go for program such as Malwarebytes Anti-
Malware for less powerful malware.
4.Spyware
67
ITWORKSHOP LAB MANUAL
It is the most generic computer problem. Your computer can pick spyware from just about anything.
Slowdown of computer is a symptom of spyware. You may also notice some certain programs that you have
never installed in your computer.
But the good thing is that you can find numerous programs in the market that can remove spyware, some of
them are free as well.
5. What are the measures should be taken when system slows down
If your computer doesn’t have any of the aforementioned problems, but still it is performing slowly, you
need to do some couple of actions to fix the problem.
Just execute a disk cleanup: “Start > All Programs > Accessories > System Tools > Disk Cleanup.”
Defragment your hard drive: “Start > All Programs > Accessories > System Tools > Disk Defragmenter.”
If your PC gets stuck in a cycle of rebooting during the update process, you need to undo the updates using System
Restore. If your computer came without a Windows disc, look for an option to access recovery options, or tap [F8]
before Windows starts loading, and then choose "Repair your computer".
If you have an installation disc, boot from it, select your language and then choose "Repair your computer". In both
cases, when the menu appears, choose System Restore to undo the update.
Ans: Anti virus Software is a program that installed on your computer, it helps to protect computer against most
viruses, worms,Trojan Horses.
9. Define worm?
Ans:Worms are self replicating viruses that reside in the active memory of computer.
By using Anti virus Software you can keep your computer healthy and protects from malicious act.
A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not
replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a
program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
68
ITWORKSHOP LAB MANUAL
14. What is phishing?
phishing is a term used to describe a malicious individual or group of individuals who scam users. They do
so by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit
card, or other login information. Because these e-mails and web pages look like legitimate companies users
trust them and enter their personal information.
Trouble shooting is the procedure to solve the problems and giving the solutions to them.
Is referred to removal of the problems arising due to system software or application software
Defragmenting a computer is a process for cleaning out fragmented files and folders on a hard drive.
Device Driver is a computer program allowing higher-level computer programs to interact with a hardware
device
19 What should be done when Error messages encountered during boot before Windows loads
Ensure that your computer BIOS settings are correctly configured to the hardware that is installed in your
computer Error messages while windows loading
If you are unable to get into Normal windows and believe that removing or uninstalling a program or
changing a setting may help enable you to get into windows , boot the computer into windows XP safe mode
69
ITWORKSHOP LAB MANUAL
PROBLEM 7:
Orientation & Connectivity Boot Camp: Students should get connected to their Local Area Network and access the
Internet. In the process they configure the TCP/IP setting. Finally students should demonstrate, to the instructor, how
to access the websites and email. If there is no internet connectivity preparations need to be made by the instructors to
simulate the WWW on the LAN
AIM: To learn Local Area Network and access the Internet. In the process they configure the TCP/IP setting. Finally
students should demonstrate, to the instructor, how to access the websites and email
THEORY:
LANs are privately owned networks within a single building or campus of up to few kilometers in size.
MANs are group of networks which are located in different metropolitan cities, within a city covering different areas.
A WAN is a network that connects computers across a large geographic area such as a city or country.
Classes of Networks:
Collection of methods used to connect servers on the internet and to exchange data.
70
ITWORKSHOP LAB MANUAL
HTTP (Hyper Text Transfer Protocol):
Part of a URL that identifies the location as one that uses HTML
IP (Internet Protocol):
A format for contents and addresses of packets of information sent over the internet
IP ADDRESS:
SEARCH ENGINE:
A program that searches documents located on the Internet for keywords or phrases entered by a person browsing the
net.
TCP/IP protocol
Client Software
ISP Account
Means of communication to the net
telephone Modem
Ethernet
ISDN(Integrated Services Digital Network)
DSL(Digital Subscriber Line)
Satellite.
PROCUDURE:
Click the connection you want to configure, and then, under Network Tasks, click Change settings of this
connection.
If the connection is a local area connection, on the General tab, under This connection uses the following items,
click Internet Protocol (TCP/IP), and then click Properties.
If this is a dial-up, VPN, or incoming connection, click the Networking tab. In This connection uses the following
items, click Internet Protocol (TCP/IP), and then click Properties.
71
ITWORKSHOP LAB MANUAL
If you want IP settings to be assigned automatically, click Obtain an IP address automatically, and then click OK.
Click Use the following IP address, and in IP address, type the IP address.
Click Use the following DNS server addresses, and in Preferred DNS server and Alternate DNS server, type the
addresses of the primary and secondary DNS servers.
If you have a network adapter installed, and have set up a home or small office network, you are connected to a local
area network (LAN). You are also connected to a LAN if your Windows XP Professional computer is part of a
corporate network. When you start your computer, your network adapter is detected and the local area connection
automatically starts. Unlike other types of connections, the local area connection is created automatically, and you do
not have to click the local area connection in order to start it.
Viva Questions:
1) What is a Link?
A link refers to the connectivity between two devices. It includes the type of cables and protocols used in
order for one device to be able to communicate with the other.
There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer,
Presentation Layer and Application Layer.
4) What is a LAN?
LAN is short for Local Area Network. It refers to the connection between computers and other network
devices that are located within a small physical location.
5) What is a node?
A node refers to a point or joint where a connection takes place. It can be computer or device that is part
of a network. Two or more nodes are needed in order to form a network connection.
Routers can connect two or more network segments. These are intelligent network devices that store
information in its routing table such as paths, hops and bottlenecks. With this info, they are able to
determine the best path for data transfer. Routers operate at the OSI Network Layer.
72
ITWORKSHOP LAB MANUAL
7) What is point to point link?
It refers to a direct connection between two computers on a network. A point to point connection does not
need any other network devices other than connecting a cable to the NIC cards of both computers.
8) What is anonymous FTP?
Anonymous FTP is a way of granting user access to files in public servers. Users that are allowed access to
data in these servers do not need to identify themselves, but instead log in as an anonymous guest.
A single segment of UTP cable has an allowable length of 90 to 100 meters. This limitation can be
overcome by using repeaters and switches.
VPN means Virtual Private Network, a technology that allows a secure tunnel to be created across a network
such as the Internet. For example, VPNs allow you to establish a secure dial-up connection to a remote
server.
NAT is Network Address Translation. This is a protocol that provides a way for multiple computers on a
common network to share single connection to the Internet.
15) What is the job of the Network Layer under the OSI reference model?
The Network layer is responsible for data routing, packet switching and control of network congestion.
Routers operate under this layer.
16) How does a network topology affect your decision in setting up a network?
Network topology dictates what media you must use to interconnect devices. It also serves as basis on what
materials, connector and terminations that is applicable for the setup.
73
ITWORKSHOP LAB MANUAL
There are several ways to do this. Install reliable and updated anti-virus program on all computers. Make
sure firewalls are setup and configured properly. User authentication will also help a lot. All of these
combined would make a highly secured network.
WAN stands for Wide Area Network. It is an interconnection of computers and devices that are
geographically dispersed. It connects networks that are located in different regions and countries.
It is the 48 bit hardware address of LAN card. MAC address is usually stored in ROM on the network
adapter card and it is unique.
Ping 127.0.0.1
Workgroup:-
Domain: -
(ii)Centralize administration
74
ITWORKSHOP LAB MANUAL
(iii)Main aim is to secure data
ipconfig
28)Which command is used to check the physical connectivity between two computers?
Ping
Most large businesses, organizations, and universities these days use a proxy server. This is a server that all
computers on the local network have to go through before accessing information on the Internet. By using a
proxy server, an organization can improve the network performance and filter what users connected to the
network can access.
75
ITWORKSHOP LAB MANUAL
PROBLEM 8:
Web Browsers, Surfing the Web: Students customize their web browsers with the LAN proxy settings, bookmarks,
search toolbars and pop up blockers. Also, plug-ins like Macromedia Flash and JRE for applets should be configured
THEORY:
Web browser provides the means to the searching and also helps to download the web content.
Web browsers support most of the famous Internet Protocols like HTTP, FTP.
Common file formats a browser accepts are HTML
Well known browsers natively support a variety of other formats in addition to HTML such as
JPEG,PNG,GIF image formats
Different web browsers available in the market are:
Silver Smith
Mosaic
Netscape
Mozilla
Opera
Lynx
Safari
Bookmark:
Each web browser is built-in with the support of Internet Bookmarks which serve as a named anchor – primarily to
URLs. The primary purpose of this book mark is to easily catalog and access web pages that the web browser user has
visited or plans to visit, without having to navigate the web to get there.
Pop-up Blockers:
Pop-ups are a form of online advertising on the WWW intended to attract the attention of the users. These pop ups are
hosted on the web sites which are frequently visited by the netizens. These pop ups are activated when these web sites
open a new web browser window and there by displaying the advertisements.
Plug-ins:
A plug-in is a software component program that interacts with a main application to provide a better integration of the
media. The basic difference between application programs and plug-ins is that multimedia files are launched in a
separate window where as in plug-ins multimedia play in the browser window.
76
ITWORKSHOP LAB MANUAL
Few famous plug-ins are:
Viva Questions:
1) Define surfing?
Ans: Surfing is an analogy to describe ease with which an expert can use the waves of information
flowing around the Internet to get where he wants.
2) Abbreviate HTML,WWW?
Ans: HTML (Hyper Text Markup Language), WWW (World Wide Web)
3) What is a bookmark?
Ans: A bookmark is a saved link to a Web page that has been added to a list of saved links.
4) Define a plug-in?
Ans: Plug-in is a set of software components that adds specific abilities to a larger software application.
11) What is your definition of the term Cross-Site Scripting? What is the potential impact to
servers and clients?
Goal of question This question will determine if the applicant is well versed in the terminology used
in web security. The applicant needs to be able to articulate highly technological topics to a wide
audience. The second question will help to verify that the applicant fully understands how XSS
attacks work and the impact to client information.
78
ITWORKSHOP LAB MANUAL
15) What is hyperlink?
In computing, a hyperlink (or link) is a reference to a document that the reader can directly follow,
or that is followed automatically. The reference points to a whole document or to a specific element
within a document. Hypertext is text with hyperlinks. Such text is usually viewed with a computer.
A software system for viewing and creating hypertext is a hypertext system. To hyperlink (or
simply to link) is to create a hyperlink. A user following hyperlinks is said to navigate or browse the
hypertext.
- It uses protocols that support the transaction of one form to another form using the web browsers.
79
ITWORKSHOP LAB MANUAL
- Web browsers use the components that support the e-mail or other features like IRC that
22)What are the privacy and security features being provided by web browsers?
- Web browser supports HTTP secure method that allows more security for the sites that are involved in day
to day basis transaction.
- Security offers quick and easy way to remove the unwanted material or the things that are stored without
permission like cache, cookies and history.
- Security is being provided by the use of blockers that blocks unwanted access to the websites from the
outside.
- Web browser uses other features like disabling of JavaScript and pop up blockers to block any unwanted
scripts or messages to run on the system.
- Web browser also uses the security concerns in regard of blocking the access to the secure sites that
provides money transfer facilities, etc.helps in communication purpose with other platforms.
- Web browser supports the HTML version that is used to create the website in a very simple manner
without using the complex tools.
- Web browser supports rapid development of the websites and tools that can be used for the creation of it.
24).What are the different web browser tools available to accelerate the speed of the web page?
- Web accelerators are used to increase the loading of the web page faster and by providing extra features of
caching, etc.
- There are tools that are provided like internet accelerator of browser accelerator that provides security from
the spyware and adware programs.
- The security from the programs are required as they are harmful for the computer and the tools uses the
strategies of pre-caching in which the data is automatically cached and when the website is opened again
then the fetching is being done from the place where the content is saved.
- Registry tweaks are used to improve the performance offering the risk management techniques for
downloading the resources.
80
ITWORKSHOP LAB MANUAL
- The browser cache consists of the temporary storage space on the computer’s disk or the device that is
being used for storing all the information.
- The browser cache consists of the information regarding the recently viewed web pages and the files that
are in association with them.
- The cache allows the browser to render the pages that are being visited and allow them to reload using the
entire page.
- Incognito browsing keeps the website secure and safe as it doesn’t store any cookies for the sites that are
being visited.
- Web pages that are viewed in the incognito mode are not visible in the browser’s history or the search
history that is being performed.
- No trace is being left of the website being visited as it doesn’t store the cookies or any files.
- It ensures the activities performed by the user are not traced and the security is being provided to the user
for the use of web application.
- It is the safest methods to use as it leave no track behind and save the user from the sites that ask for
private information.
Web browser is used to run the software application that allows retrieving, presenting and traversing the
information from one place to another.
- Web browser functions are to provide the resources or information to the user when asked by them.
- It processes the user inputs in the form of URL like http://www.google.com in the browser and allows the
access to that page.
- URL is used to identify the resources and fetch them from the server and displays it to the client.
81
ITWORKSHOP LAB MANUAL
- URI is known as Uniform Resource Identifier as it identifies the resources requested by clients and fetches
them from the server.
- http: is the first thing that is used in a URL and it is used to tell what kind of resource that needs to be
retrieved over the server.
> This includes the server details and it is itself a protocol known as Hypertext Transfer Protocol (HTTP)
that is used to fetch the information.
- Web browsers sometimes use the secure protocol that is represented using HTTPs used in case of secure
transaction over the internet.
- ftp: is also a protocol that is known as File Transfer Protocol that allows the transfer from a file from local
computer to server.
PROBLEM 9:
Search Engines & Netiquette: Students should know what search engines are and how to use the search engines. A
few topics would be given to the students for which they need to search on Google. This should be demonstrated to
the instructors
AIM: To know what search engines are and how to use the search engines.
THEORY:
Search engine:
A search engine can be defined as a web site with tools which help you to find information on the internet
82
ITWORKSHOP LAB MANUAL
Function of a search engine:
Search Engine can the search any data based on keywords, searches on web and finding the locations various web
sites databases with the related information and gives the different list of results to the Web Browser.
Limitations:
Search engines visit web sites only several weeks. Search engines cannot see information in other data bases later on.
On the internet a search engine is a coordinated set of programs that includes: A spider (crawler or bot) that goes to
every page or representative pages on every web site that wants to be searchable and reads it, using hypertext links on
each page to discover and read site’s other pages.
Pros:
EX: Alta Vista, Ask Jeeves, Google, Lycos, Yahoo, Bing, Etc...
Meta search engines or “metacrawlers” don’t crawl the web themselves. Instead they search the resources of multiple
search engines by sending a search to several search engines at once aggregating the result.
Pros:
You only need to use one search tool which is time- efficient
You only need to learn how to use one search engine reducing learning curve
You benefit from the difference among several search tools at once
Cons:
Meta search services may not be able to leverage each individual search engines full range of query
tools resulting in less refined searches
83
ITWORKSHOP LAB MANUAL
You can not personally select the search engines queried by Meta search services.
Ex: DogPile, Mamma, Vivisimo, Meta Search Engine, etc.
Viva Questions:
2) What is a spider?
Ans: A spider is a program that visits Web sites and reads their pages and other information in order to create
entries for a search engine index.
6) What is SEO?
SEO stands for Search Engine Optimization and It is a process/ technique to optimize your website or
WebPages according to improve its SERP (Search Engine Result Pages) Ranking.
1. On-Page SEO
2. Off-Page SEO
Onpage SEO contains all measures (that search engines took from the website) on your website coding that
is fully controlled by the developer. It contains title, meta keywords, meta descriptions, heading tags,
content optimization etc. In simple words any changes that made within the websites ranging from website
navigation structure to content placement strategy is known as on-page optimization.
Offpage SEO Activities that are done outside your website to improve it’s position in Google search result
is called off page SEO. Generally all link building activities comes in this category. Below is the list of few
off page methods.
Directory Submission
Social Bookmarking
84
ITWORKSHOP LAB MANUAL
Search Engine Submission
Profile Submission
Business Listing
Press Release
Article Submission
Social Media Submissions
Google Analytics - This tool is Freemium (Free + Premium) that tracks and reports Website Traffic, like
how many visitors are online, from which location, how much time they spend time to particular page. You
can check your website traffic in different segments like traffic from organic search, paid search or direct
search. You can also monitor your traffic from different devices like Desktop, Mobile, Tablest, I-Phones
with search keywords and landing pages.
The searching made through the Search Engines Query box known as Organic Search and the listing of
pages that appears below the query box is called organic search result.
Black Hat SEO refers the technique to improve website ranking by breaking the rules, policies of Search
Engines. Hidden text, Cloaking, Spamdexing etc are some well known Black Hat SEO practices.
White Hat SEO refers the technique to improve website ranking by following the rules, policies of Search
Engines like quality content, related Title, Meta tags, H1, etc.
All links outside from your own website that link back to your website or webpage are called backlinks.
Googlebot is software or a program that automatically crawled, indexed and cached the new or old
webpages over the internet and adds them to Google index. It is also known as spider or crawler.
It's a special kind of text file containing the instruction for Crawlers to crawl webpage(s), domains, files or
directory. We can also instruct to crawlers to not do crawl particular webpage(s), domains, files or directory.
No, extensions do not effect to the SEO. You can use .html, .htm, .asp, .aspx, .php etc depending on used
technology to create website.
85
ITWORKSHOP LAB MANUAL
robots.txt enables restricting crawling where it is not needed. This file has set of instruction that tell to the
Search Engines to access and not to crawl any part of the website.
To use littering keywords that are not relevant to the page, and using of same keywords on the multiple
pages known as keyword stuffing, to fix this issues use Unique and Meaning, Descriptive keywords for
different pages.
Webmasters and Website owners need to submit their website and web pages to the search engines along
with the keywords, soon after submission the website and web page URL a Search Engine bot will crawl
submitted URL and update the URL in their indexes.
PROBLEM 10:
Cyber Hygiene: Students would be exposed to the various threats on the internet and would be asked to configure
their computer to be safe on the internet. They need to first install an antivirus software, configure their personal
firewall and windows update on their computer. Then they need to customize their browsers to block pop ups, block
active x downloads to avoid viruses and/or worms
AIM: To learn various threats on the internet and configure the computer to be safe on the internet.
THEORY:
Antivirus:
86
ITWORKSHOP LAB MANUAL
Antivirus software is a program that either comes installed on your computer or that you purchase and install yourself.
It protects your computer against most viruses, worms, Trojan horses and other unwanted invaders that can make your
computer sick.
Firewall:
A firewall is a special software or hardware designed to protect a private computer network from unauthorized access.
A firewall is a set of related programs located at a network gateway server which protects the resources of the private
network from users from other networks.
Viruses
Network Worms
Trojans
Spyware / Adware
Other Malware
Other Threats
Viruses
Programs that installs themselves stealthily via Internet & provide access for malicious use
Data stealing
Distributed spam eMails
Spyware / Adware
Viva Questions:
2) Define virus
Ans: Virus is a program which performs malicious acts, such as deleting files, accessing personal data, or using
your computer to attack other computers.
3) Define worm?
Ans: Worms are self replicating viruses that reside in the active memory of computer.
A is software used or created to disrupt computer operation, gather sensitive information, or gain access
to private computer systems.
It can appear in the form of code, scripts, active content, and other software.
Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software
Many early infectious programs, including the first Internet Worm, were written as experiments or
pranks.
Today, malware is used primarily to steal sensitive personal, financial, or business information for the
benefit of others.
• Malware is sometimes used broadly against government or corporate websites to gather guarded
information, or to disrupt their operation in general.
However, malware is often used against individuals to gain personal information such as social security
numbers, bank or credit card numbers, and so on.
Viruses
Trojan horses
Worms
Spyware
Zombie
Phishing
Spam
Adware
Ransomware
9) What Is A Virus?
A program or piece of code that is loaded onto your computer without your knowledge and runs against
your wishes.
Viruses can also replicate themselves.
All computer viruses are manmade.
Viruses copy themselves to other disks to spread to other computers.
They can be merely annoying or they can be vastly destructive to your files.
Macro virus.
Boot virus.
Logic Bomb virus.
Directory virus.
Resident virus.
89
ITWORKSHOP LAB MANUAL
A Trojan Horse program has the appearance of having a useful and desired function.
A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of
the computer.
A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of a
joke program or software of some sort.
These are often used to capture your logins and passwords.
Spyware is a type of malware installed on computers that collects information about users without their
knowledge.
The presence of spyware is typically hidden from the user and can be difficult to detect.
Spyware programs lurk on your computer to steal important information, like your passwords and logins
and other personal identification information and then send it off to someone else.
Zombie : Zombie programs take control of your computer and use it and its Internet connection to
attack other computers or networks or to perform other criminal activities.
• Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing
information like your social security number or bank account information or logon and password for a
web site.
• The message may claim that if you do not click on the link in the message and log onto a financial web
site that your account will be blocked, or some other disaster.
Ransomware is a form of malware that essentially holds a computer system captive while demanding a
ransom.
90
ITWORKSHOP LAB MANUAL
The malware restricts user access to the computer either by encrypting files on the hard drive or locking
down the system and displaying messages that are intended to force the user to pay the malware creator
to remove the restrictions and regain access to their computer.
Spam is email that you did not request and do not want.
One person's spam is another's useful newsletter or sale ad.
Spam is a common way to spread viruses, trojans, and the like.
Adware (short for advertising-supported software) is a type of malware that automatically delivers
advertisements.
Common examples of adware include pop-up ads on websites and advertisements that are displayed by
software.
Often times software and applications offer “free” versions that come bundled with adware.
Malware is a program that must be triggered or somehow executed before it can infect your computer
system and spread to others.
Social network.
Pirated software.
Removable media.
Emails.
Websites.
PROBLEM 9:
Develop your home page using HTML consisting of your photo, name, address and education details as a table
and your skill set as a list.
THEORY:
HTML is a language for describing web pages. HTML stands for Hyper Text Markup Language. A markup
language is a set of markup tags. The tags describe document content. HTML documents contain HTML tags and
plain text. HTML documents are also called web pages.
HTML tags are keywords (tag names) surrounded by angle brackets like <html>.HTML tags normally come
in pairs like <b> and </b> i.e. Start Tag (<>) and End Tag (</>).
91
ITWORKSHOP LAB MANUAL
HTML Page Structure
<html>
<head>
</head>
<body>
……….
</body>
</html>
The text between <html> and </html> describes the web page
The text between <body> and </body> is the visible page content
The text between <head> and </head> is the description about the document.
The text between <title> and </title> shows the title of the document
HTML Versions
Version Year
HTML 1991
HTML+ 1993
HTML5 2012
XHTML5 2013
92
ITWORKSHOP LAB MANUAL
1 <!--...--> Defines a comment <!--This is a comment. Comments are not
displayed in the browser-->
</audio>
7 <br> Defines a single line break This text contains<br>a line break.
</dl>
93
ITWORKSHOP LAB MANUAL
16 <hr> Defines a thematic change in the content <p> </p><hr> Horizontal line<p></p>
30 <textarea> Defines a multiline input control (text area) <textarea rows="4" cols="50">
Enter the message
</textarea>
94
ITWORKSHOP LAB MANUAL
32 <title> Defines a title for the document <title>HTML Reference</title>
35 <marquee> The marquee tag used to scroll the text up, <marquee direction="right">Welcome to
down, left or right. HTML</marquee>
HTML Code:
<html>
<head>
</head>
<body>
<header><u><center><b>Personal Profile</b></center></u><header>
<text>
Name: <br>
<u><b>Education Details</b></u><br>
<table border="1">
<tr>
95
ITWORKSHOP LAB MANUAL
<th>S.No.</th>
<th>Qualification</th>
<th>College/University</th>
<th>Year passing</th>
<th>Percentage></th>
</tr>
<tr>
<td>1</td>
<td>SSC</td>
<td>AP Board</td>
<td>2003</td>
<td>72</td>
</tr>
<tr>
<td>2</td>
<td>Intermediate</td>
<td>AP Board</td>
<td>2005</td>
<td>72</td>
</tr>
<tr>
<td>3</td>
<td>B.Tech</td>
<td>JNTUH</td>
<td>2009</td>
<td>66</td>
</tr>
<tr>
<td>4</td>
<td>M.Tech</td>
96
ITWORKSHOP LAB MANUAL
<td>JNTUH</td>
<td>2012</td>
<td>70</td>
</tr>
</table>
<b><u>Skill Set:</b></u>
<ul>
<li>Cricket Player</li>
<li>etc.</li>
</ul>
</body>
</html>
OUTPUT:
97
ITWORKSHOP LAB MANUAL
Result: Creating a Sample Web Page for student personal profile is completed by using HTML Tags.
Viva Questions:
1) What is HTML?
Ans: HTML is a Hyper Text Markup Language used to design the Web Pages
5) What is <br> tag? Is there any end tag for this like </br>?
98
ITWORKSHOP LAB MANUAL
Ans: It is used to separate the lines or to start with a new line. End tag </br> is required for this tag.
Semantic HTML is a coding style. It is the use of HTML markup to reinforce the semantics or meaning
of the content. For example: In semantic HTML <b> </b> tag is not used for bold statement as well as
<i> </i> tag is used for italic. Instead of these we use <strong></strong> and <em></em> tags.
Image map facilitates you link many different web pages using a single image. You can define shapes in
images that you want to make part of an image mapping.
A style sheet is used to build a consistent, transportable, and well designed style template. You can add
these templates on several different web pages.
Yes. To create a multicolor text on a web page you can use <font color ="color"> </font> for the specific
texts you want to color.
The color of the bullet is always the color of the first text of the list. So, if you want to change the color of
the bullet, you must change the color of the text.
Marquee is used to put the scrolling text on a web page. You should put the text which you want to scroll
within the <marquee>......</marquee> tag.
There are three tags used to separate the texts. i.e. usually <br> tag is used to separate line of texts. Other
tags are<p> tag and <blockquote> tag.
99
ITWORKSHOP LAB MANUAL
16) How to make a picture a background image of a web page?
To make a picture a background image on a web page, you should put the following tag code after the
</head> tag.
Here, replace the "image.gif" with the name of your image file which you want to display on your web
page.
HTML elements with no content are called empty elements. For example: <br>, <hr> etc.
Example:
1. <p>
2. <span style="color:#ffffff;">
3. In this page we use span.
4. </span>
5. </p>
Syntax:
1. <iframe src="URL"></iframe>
Example:
Target to a link:
100
ITWORKSHOP LAB MANUAL
20) What is SVG?
HTML SVG is used to describe the two dimensional vector and vector/raster graphics.
21) Can attribute values be set to anything or are there specific values that they accept?
Some attribute values can be set to only predefined values. Other attributes can accept any numerical value
that represents the number of pixels for a size.
To insert the copyright symbol, you need to type © or & #169; in an HTML file.
22) How do you create links to sections within the same page?
Links can be created using the <a> tag, with referencing through the use of the number (#) symbol. For
example, you can have one line as <a href=”#topmost”>BACK TO TOP</a>, which would result in the
words “BACK TO TOP” appearing on the webpage and links to a bookmark named topmost. You then
create a separate tag command like <a name=”topmost”> somewhere on the top of the same webpage so that
the user will be linked to that spot when he clicked on “BACK TO TOP”.
24) Is there any way to keep list elements straight in an HTML file?
By using indents, you can keep the list elements straight. If you indent each subnested list in further than the
parent list that contains it, you can at a glance determine the various lists and the elements that it contains.
25) If you see a web address on a magazine, to which web page does it point?
Every web page on the web can have a separate web address. Most of these addresses are relative to the top-
most web page. The published web address that appears within magazines typically points this top-most
page. From this top level page, you can access all other pages within the website.
When you use image maps, it can easily become confusing and difficult to determine which hotspots
correspond to which links. Using alternative text lets, you put a descriptive text on each hotspot link.
No, hyperlinks can be used in the text as well as images. That means you can convert an image into a link
that will allow users to link to another page when clicked. Surround the image within the <a href=”
“>…</a> tag combinations.
29) If the user’s operating system does not support the needed character, how can the symbol be
represented?
In cases wherein their operating system does not support a particular character, it is still possible to display
that character by showing it as an image instead.
30) How do you change the number type in the middle of a list?
101
ITWORKSHOP LAB MANUAL
The <li> tag includes two attributes – type and value. The type attribute can be used to change the
numbering type for any list item. The value attribute can change the number index.
PROBLEM 10:
102
ITWORKSHOP LAB MANUAL
To create project certificate, Features to be covered:-Formatting Fonts in word, Drop Cap in word, Applying
Text effects, Using Character Spacing, Borders and Colors, Inserting Header and Footer, Using Date and Time
option in Word and Latex
The HOME Tab includes commands related to the Clipboard, font selections, paragraph settings, and styles
and editing.
The INSERT tab includes what you need to add pages, tables, illustrations, links, headers and footers, text
objects, and symbols in your document.
The PAGE LAYOUT tab contains the commands for working with themes page backgrounds, and paragraph
spacing in your document.
The REFERENCES tab includes special elements you will use when you create longer or more complete
documents.
The MAILINGS tab is a new addition in the Office Word 2007 interface. Here you can find everything you
need to creating, previewing, and producing a mail merge project.
Ribbons or Tool Bars:
103
ITWORKSHOP LAB MANUAL
Creating and Saving a File:
The Office Button is the round icon at the top left-hand corner. It includes the basic File
Functions from the older version of Office
Click on the Office Button icon. You will see the main file functions in the pull-down menu.
From these options you can Create a File, you can open existed files, save a file, Save As option
to save another copy with another name, print option, close option, etc.
Ruler and Scroll Bar (Top) Ruler and Scroll Bar (Bottom)
Status Bar
104
ITWORKSHOP LAB MANUAL
THEORY:
1. To create a header, enter text or graphics in the header area or click button on the header and footer
tool bar.
Border:
To specify that the border appears on a particular side of a page, such as only at the top, click custom under
setting.
To specify a particular page or section for the borders to appear, click the option you want to apply.
Color:
105
ITWORKSHOP LAB MANUAL
Select the text you want to make a different color.
To apply the color most recently applied to text, click font color.
To apply different colors, click the arrow on the right of the font color button, select the color you want and
then click the button.
Result: Creation of project Certificate using MS Word completed successfully by applying different options.
Viva Questions:
Ans: Menu Bar displays the menu; we use the menus to give the instructions to the software.
Ans: Status Bar provides information as current page, current section, total no of pages, inches from the
top of the page, current line number and column number.
Ans: Different Scroll Bars are Horizontal Scroll Bar and Vertical Scroll Bar.
Ans: The extension of word 2003 file is .doc and for word 2007 .docx
Ans: To justify the text you can click on Justify option in Styles and Formatting Tool Bar or Press
Ctrl+J.
In the upper-left corner of the Word program window, click the File tab, and then click New. The
New Document dialog box opens. With Blank document selected, click Create.
106
ITWORKSHOP LAB MANUAL
To save a document for the first time, you can press Ctrl+S, click the Save button on the Quick
Access toolbar, or click Save on the File tab. All three options display a dialog box in which you
specify a name for the document.
You can use Word's Track Changes feature to record the changes made to a document. Click the
Track Changes button in the Tracking group on the Review tab. Word highlights the button,
indicating that the Track Changes feature is turned on.
To format text, in the Font group on the Home tab, click the Bold, Italic or Underline button. To
change the font and font size click on the toolbar. Click the Font arrow to display a list of available
fonts. Then click the Font Size arrow to select the size.
Place the cursor at the beginning of the document or at the beginning of the section that you want to
check. Click the Review tab on the tool bar. Click Spelling & Grammar on the Proofing group.
When you start Excel without specifying a document to open you get a blank workbook in a new
workbook window. This workbook, temporarily named Book1, contains three blank worksheets
(Sheet1, Sheet2, and Sheet3). To begin to work on a new spreadsheet, you simply start entering
information in the first sheet of the Book1 workbook window.
Click the Save button on the Quick Access toolbar or press Ctrl+S; then designate the drive and
folder directory where the file should be located.
First, use the Print Preview feature before you print any worksheet to see exactly how the worksheet
data will be paged when printed. You then can click the print icon in the toolbar.
First, you highlight the entire block of cells you wish to format. You then can either right click the
block of cells to format or select one of the formatting buttons on the toolbar. Microsoft PowerPoint
You would click the Office button to open the File menu and choose New to display the New
Presentation window. Double-click Blank Presentation to open a new presentation based on the
blank template.
107
ITWORKSHOP LAB MANUAL
17) How do you view your presentation in full screen mode?
Click the Slide Show view button to display the slide show starting with the currently selected slide.
Click the Office button and choose Save from the File menu to display the Save As dialog box. Type
a name for the document and then click save.
Click the New Slide button to insert a new title and content slide. To change the layout click the
arrow on the New Slide button and click another option from the drop-down box to insert a slide
with a different layout.
Select the slide you wish to modify. Click on the Transitions tab. Locate the preferred transition
type to apply. Click on the transition to apply it to the selected slide.
Procedure:
Merge.
b. Word displays the Mail Merge task pane.
108
ITWORKSHOP LAB MANUAL
c. Select type as “Letters” and click “Next: Starting Document”.
d. Click Use the current document, and Click “Next: Select recipients”. e. Under Select
recipients, click Use an existing list.
f. Click Browse.
g. In the Select Data Source dialog box, locate and click the data source you want.
h. Browse for the given “List.txt” file., and Click Open.
i. All of the entries in the data source appear in the Mail Merge
Recipients dialog box, where you can refine the list of recipients to include in the
merge.
j. Click Next: Write your letter.
k. Click on the location where you want to put a merge field. Click on more items.
l. Select and Insert the merge field at that location.
m. Click Next: Preview your letters.
n. To preview the items in order, click the arrow buttons.
o. To exclude a particular recipient from the merge, click Exclude this recipient.
p. Click Next: Complete the merge.
q. You can either print all the letters or Edit individual letters
109
ITWORKSHOP LAB MANUAL
MICROSOFT EXCEL
Microsoft Excel is one of the most widely used Spreadsheet applications for performing financial, statistical and
computational analysis for the purpose of business and administration.
The tool is so flexible enough to get integrated with other applications for providing the best output. For instance, it can be
integrated to web servers and the students marks, percentile etc. calculated can be generated onto the web. Similarly it can be
integrated with the other Office Applications for providing Charts, Statistics etc. It can also be used as a backend
database for any applications involving high-end calculation of the data that is stored.
Task 16:
Please see the page number 148.
110
ITWORKSHOP LAB MANUAL
MICROSOFT POWER POINT
PowerPoint is a high-powered software tool used for presenting information in a dynamic slide show format. Text,
charts, graphs, sound effects and video are just some of the elements PowerPoint can incorporate into your presentations with
ease. Whether it's a classroom lesson, a parents' group meeting, a teachers' seminar - PowerPoint shows you how to make a
powerful impression on your audience
5. Design Template
Task 21: Create a presentation to conduct a creativity session using the following tools:
1. Slide transition
4. Action button
6. Hyperlink
7. Custom animation
8. Hide slide
9. Wash out
1. Slide Layout
2. fill color
5. Security – password
7. Rehearse timings
8. Recording Narrations
112
ITWORKSHOP LAB MANUAL
Task 23:
Create a website for your college. The website should have the following pages
2. About Us page which tells about the college vision, when it was established...etc
5. Contact page which contains address and contact information about the college
Homepage
113
ITWORKSHOP LAB MANUAL
Task 23: Repeat the tasks 12-15 using LaTex.
PROBLEM 11:
Formatting Styles, Inserting table, Bullets and Numbering, Changing Text Direction, Cell alignment, Footnote,
Hyperlink, Symbols, Spell Check and Track Changes.
THEORY:
Table:
Cell Alignment:
Aligns a contents written in a table in the top left corner or top right corner or in the center etc..
114
ITWORKSHOP LAB MANUAL
Foot Note:
oot notes are used to comments on, or provide references for text in a document.
Hyperlink: It is a colored and underlined text or a graphic that you click to go to a file, a location in a file, an HTML
page on the World Wide Web, or an HTML page in an intranet.
Symbols: You may not be able to enter certain symbols into your word document, as there si a limitation on the keys on
the key board. Creating these new symbols especially when working with mathematical terms it becomes very difficult
.For example we can insert symbols such as ,,, ..
115
ITWORKSHOP LAB MANUAL
Formatting Styles:
A style is a set of rules to be followed for the effective document. Style can be applied to text, paragraph, table or a list.
Procedure:
Table:
Cell Alignment:
Foot Note:
1. In References Menu, click where you want to insert the note reference mark and then click Footnote.
2. Click Footnotes or Endnotes.
3. In the Number format box, click the format you want.
4. Click Insert.
116
ITWORKSHOP LAB MANUAL
Word inserts the note number and places the insertion point next to the note number.
As you insert additional footnotes or endnotes in the document, Word automatically applies the correct
number format.
Hyper link:
Select the text or picture you want to display as the hyperlink, and then click Insert Hyperlink on the Standard
toolbar
3. In the Name of new document box, type the name of the new file.
4. Under When to edit, click either Edit the new document later or Edit the new document now
An e-mail address:
1. Select the text or picture you want to display as the hyperlink, and then click Insert Hyperlink on the
Standard toolbar
2. Under Link to, click E-mail Address.
3. Either type the e-mail address you want in the E-mail address box, or select an e-mail address in the recently used
e-mail addresses box.
4. In the Subject box, type the subject of the e-mail message
Symbol:
1. Click where you want to insert the symbol.
2. On the Insert menu, click Symbol, and then click the Symbols tab.
3. In the Font box, click the font that you want.
117
ITWORKSHOP LAB MANUAL
4. Double-click the symbol that you want to insert.
5. Click Close
Spell check:
1. Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then press SPACEBAR or
TAB.
2. Type any text you want.
3. Press ENTER to add the next list item.
Word automatically inserts the next number or bullet.
4. To finish the list, press ENTER twice, or press BACKSPACE to delete the last bullet or number in the
list
Formatting Styles:
If the style you want is not listed, click All Styles in the Show box
Track Changes:
Result: Creating a document using MS Word completed successfully by inserting Formatting styles, Bullets and
numbering, and tables.
Viva questions:
118
ITWORKSHOP LAB MANUAL
3)What is the extension of Microsoft Word file?
Ans:The extension of word 2003 file is .doc and for word 2007 .docx
Ans:CTRL+N
Ans: Menu Bar displays the menu; we use the menus to give the instructions to the software.
Ans: Different Scroll Bars are Horizontal Scroll Bar and Vertical Scroll Bar.
Ans: Status Bar provides information as current page, current section, total no of pages, inches from the top of
the page, current line number and column number.
Ans: To justify the text you can click on Justify option in Styles and Formatting Tool Bar or Press Ctrl+J.
Ans: The spell check function is used to spell check a series of words
Ans:Go to insert tab ,click on table option and select required number of rows and columns
119
ITWORKSHOP LAB MANUAL
14)What are the formatting styles in word
Ans: select the cells for which you want to change the text direction and click the Layout tab under Table
Tools. Click Text Direction in the Alignment section of the Layout tab
Ans: Select the cells, columns, or rows, with text that you want to align (or select your entire table). Go to the
(Table Tools) Layout tab. Click an Align button.
Ans: Position the cursor where you want to insert the number list. Either click on the number button
or bullet button
Ans: ALT+CTRL+F
120
ITWORKSHOP LAB MANUAL
PROBLEM 12:
Create a Newsletter. Features to be covered:-Table of content. Newspaper columns, Images from files and clipart,
Drawing toolbar and Word Art, Formatting Images, Textboxes and Paragraphs and Mail Merge in Word.
THEORY:
Table of contents:
Table of contents displays a list of headings in a created document. It basically provides an outline of the
entire document created
Newspaper columns:
One can create a newspaper columns document by specifying the number of new letter-style column
required and then adjust their width, and add vertical lines between columns.
Inserting a picture (graphic) from a file and clipart may be required for a document. This picture could be
a scanned photograph or any other digitally produced one. This picture can be modified, resized, cropped and enhanced.
One can create his/her own drawings in Microsoft word. Ms Word provides a full fledged drawing tool
bar.
Word Art in Microsoft word enables you to create special and decorative text.
121
ITWORKSHOP LAB MANUAL
Formatting Images, Textboxes and Paragraphs:
Formatting an image includes selecting appropriate color, size, layout and cropping.
Generally the text in a document follows a standard orientation (line after line). A text box provides a
different orientation to the text with in a document. It can arrange the text in anywhere and can be resized and moreover
moved to any section of the document or even outside.
When you are formatting a paragraph, you do not need to highlight the entire paragraph. Placing the
cursor anywhere in the paragraph enables you to format it. After you set a paragraph format, subsequent paragraphs will
have the same format unless you change the format.
Mail Merge:
It helps us to produce from letters mailing labels envelopes catalogs and others types of merged document. It is so
found in the tools option on the menu bar. In tools we have letters and mailing. In letters and mailing we have mail merge
mail merge tool box envelopes tables and letters wizard. In mail merge select the required document you are working on.
A window for customizing the data base structure appears. This file contains the names, address details with contact
numbers etc of people you wish to send the letters.
PROCEDURE:
Table of contents:
3. Any desired number of columns are presets-one or two or three or left or right b\can be selected.
4. Width and spacing can be fixed and equal columns width can be checked for uniformity
6. Under apply to will be whole document if entire document is selected else we have to select a selected text.
7. Click ok
CLIP ART:
1. On the Insert menu, point to Picture, and then click Clip Art.
2. In the Clip Art task pane, in the Search for box, type a word or phrase that describes the clip you want or
type in all or some of the file name of the clip.
3. To narrow your search, do one or both of the following:
To limit search results to a specific collection of clips, in the Search in box, click the arrow and
select the collections you want to search.
To limit search results to a specific type of media file, in the Results should be box, click the
arrow and select the check box next to the types of clips you want to find.
4. Click Go.
5. If you don't know the exact file name, you can substitute wildcard characters for one or more real
characters. Use the asterisk (*) as a substitute for zero or more characters in a file name. Use the
question mark (?) as a substitute for a single character in a file name.
3. Use the Drawing toolbar to add any shapes or pictures that you want.
123
ITWORKSHOP LAB MANUAL
WORD ART:
2. Click the WordArt effect you want, and then click OK.
3. In the Edit WordArt Text dialog box, type the text you want.
Formatting Images:
1. Formatting of the images can be achieved by selecting the image and double click on the picture, format picture
dialog box appears.
2. The same can be achieved by selecting the tools menu > customize>tool bars tab>picture and click close.
Resize a drawing
.
o To scale the drawing and make the objects and canvas proportionately smaller or larger, click
Scale Drawing, and then drag the edges of the canvas.
To increase or decrease the size in one or more directions, drag the mouse away from or toward the
center, while doing one of the following:
o To keep the center of an object in the same place, hold down CTRL while dragging the mouse.
o To maintain the object's proportions, drag one of the corner sizing handles.
124
ITWORKSHOP LAB MANUAL
o To maintain the proportions while keeping the center in the same place, hold down CTRL while
dragging one of the corner sizing handles.
Crop a picture
Text Box:
1. Place the insertion point in the paragraph that you want to change, or select several paragraphs.
2. Do one of the following:
o To have text begin from the left, click Left-to-Right on the Formatting toolbar.
o To have text begin from the right, click Right-to-Left on the Formatting toolbar.
When you change the paragraph direction, Microsoft Word leaves justified and centered text as it is. In the case
of left-aligned or right-aligned text, Word flips the alignment to its opposite. For example, if you have a left-to-
right paragraph that is right aligned, such as the date at the top of a letter, clicking Right-to-Left results in a
right-to-left paragraph that is left aligned.
Mail Merge:
125
ITWORKSHOP LAB MANUAL
1. Open a document and type the complete body of the letter and format it as required.
2. Create a data source and choose mail merge from tool bar a window is displayed.
3. Click on create button and choose from letter options. Then a window is displayed.
4. Click active window choose currently active document. Click on data and create data source option.
5. A window for customizing the data base structure appears and this file contains the names address details with
contact number etc. we can add or remove fields from this file.
6. Once the list of fields is finalized a window of same is displayed and types the required file names and click on
save button.
7. A window is displayed. Type the details of 10 candidates. After typing details of one person, click on add
menu.
8. Click on the o.k. to finish entering the records mail merge tool bar is displayed.
9. Place the curser at the place where you wish to insert names and click on insert mail merge button. A drop list
is displayed all fields created would be shown.
10. By highlighting to desired file and click on it we can insert the field into the main document and go to begin
the mail merge click on mail merge.
11. A window is displayed click once on the merge button to generate letters for all records in your data source file.
Viva questions:
126
ITWORKSHOP LAB MANUAL
5. How can you insert a picture from another file?
Ans: 1.Click where you want to insert a picture in your document.
2 On the Insert tab, in the Illustrations group, click Picture.
3.In the Insert Picture box, browse to the location of the picture on your computer, select the
picture, and then click Insert.
Ans:CTRL+Y
Ans: In a blank Microsoft Word document, click on the Mailings tab, and in the Start
Ans: Mail Merge is an important functionality in Word 2013, one that has improved across versions
of Word but remains a difficult thing to do. Word provides a Mailings Tab which contains numerous
groups and commands useful in Mail Merge, such as the Create, Write and Insert Fields, and Preview
Results groups.
Ans: Drop Cap is used to create a large dropped initial capital letter. Select Format-> Drop
Cap.
Ans: In Print layout View we can see the rulers, status bar of the document and displays the fixed page
length of your document.
Ans: Word Art in Microsoft word enables you to create special and decorative text. Click
Ans: Formatting of the images can be achieved by selecting the image and double
Ans:
On the Format menu, click Paragraph, and then click the Indents and Spacing tab.
Under Spacing, enter the spacing you want in the before or after box
Ans: CTRL+A
Ans: 1.On the Insert tab, in the Text group, click Text Box, and then click Draw Text Box.
2.Click in the document, and then drag to draw the text box the size that you want.
128
ITWORKSHOP LAB MANUAL
PROBLEM 13:
Creating a Scheduler:-Features to be covered: - Gridlines, Format Cells, Summation, auto fill, Formatting Text
THEORY:
Microsoft Excel is a proprietary commercial spreadsheet application written and distributed by Microsoft for Microsoft
Windows. It features calculation, graphing tools, pivot tables, and a macro programming language called Visual Basic for
Applications.
Tool Bars:
Grid lines:
129
ITWORKSHOP LAB MANUAL
1. Click the worksheet.
2. On the file menu, click page Layout and the go to sheet options.
3. Click gridlines.
Format Cell:
PROCEDURE:
First click start button of the screen on status bar. Click on programs and then Microsoft excel. To get a new blank
work sheet go to programs and then click on excel sheet. On the file menu click page setup and then click sheet tab click
gridlines. In this way do the required changes using format cell, make the required changes using formatting text also
130
ITWORKSHOP LAB MANUAL
make the required changes. Enter the data in the data in the worksheet consisting of week name person name and timings
7 a.m. to 3 p.m. Make all the above changes to the text.
Result: Creating a MS- Excel sheet is completed by inserting grid lines, formatting text options.
Viva Questions:
Ans: It allows to quickly filling cells with repetitive or sequential data such as date or numbers or text.
Ans: Grid lines are the border lines of the cells within a spread sheet.
Ans: It allows to quickly filling cells with repetitive or sequential data such as date or numbers or text.
Ans: Grid lines are the border lines of the cells within a spread sheet.
Ans: Click the Microsoft Office Button , and then click Save As.
Ans: he Formatting toolbar provides many of the most common options for formatting selected text, such as
font, font size, font weight, alignment, and color.
Ans: The status bar at the bottom of Microsoft Office programs displays status on options that are selected to
appear on the status bar.
131
ITWORKSHOP LAB MANUAL
10)What are the contents of a spread sheet?
Ans: preadsheets are developed as computerized simulations of paper accounting worksheets. Each cell may
contain either numeric or text data, or the results of formulas that automatically calculate and display a value
based on the contents of other cells
Ans:There are two types of tool bars.1.Standard tool bar 2.Formatting tool bar
Ans: By using Fx function (or) by using Auto sum (or)we can write the formula for addition like this
=SUM(A1:A4) or =SUM(A1,A2,A3,A4).
132
ITWORKSHOP LAB MANUAL
PROBLEM 14:
Calculating GPA-Features to be covered-Cell Referencing, Formulae in excel – average, std. deviation, Charts,
Renaming and Inserting worksheets, Hyper linking, Count Function, HLOOKUP/VLOOKUP, sorting, &
Conditional formatting
i). AIM : To maintain a control chart for printing books with given data.
THEORY:
Formulae in Excel:
Hyper Linking:
1. Create a worksheet: On the file menu, click new, and then click blank workbook task pane.
2. Insert a worksheet: C lick worksheet on the insert menu. Right click on sheet tab and then click insert double
click the template for the type of sheet you want.
3. Hyperlink: Using hyperlink we can insert one more sheet in the present sheet
4. Count function: Create a blank worksheet press control +c. In the worksheet select cell A and press control +c.
On the tools menu point to formula auditing and then click formula auditing menu.
Worksheet:
Sort:
Formulae in Excel:
Conditional Formatting:
1. Select the cells for which you want to add, change, or remove conditional formatting
2. On the Home menu, click Conditional Formatting.
Result: Creating a MS- Excel Sheet is completed by calculating various formulas for the database.
134
ITWORKSHOP LAB MANUAL
Viva Questions:
Ans: blank entries are not counted, text entries are not counted.
2) What is a Sort?
Ans: The average function finds the average of the specified data.
Ans: It will return the number of entries in the selected range of cells.
Ans: The Excel AVERAGE function returns the arithmetic mean of a list of supplied numbers.
Ans: A chart is a powerful tool that allows you to visually display data in a variety of different chart formats
such as Bar, Column, Pie, Line, Area, Doughnut, Scatter, Surface, or Radar charts.
Ans: 1.Select the cells that contain the data that you want to display in your chart.
2.Select the Insert Tab.
3.Select the Chart type you want to create.
135
ITWORKSHOP LAB MANUAL
9)Explain about chart formatting tool bar ?
Ans: The formatting toolbar found in most applications with text editing features is used to change the
format of selected text.
Ans: 1.To change the size manually, click the chart, and then drag the sizing handles to the size that you want.
2.To use specific height and width measurements, on the Format tab, in the Size group, enter the size in the
Shape Height and Shape Width box.
Ans: 1.Pivot Tables 2. Conditional Formatting 3. Sorting and Filtering 4. Basic Math 5. Mixed
Type Charts
Ans: The Split Cells feature allows you to split cells into two or more cells.
Ans: Click the short horizontal bar at the top of the right scroll bar and drag the horizontal separator to your
desired location. Doing so splits the window horizontally.
Ans: 1.Select the row below the row(s) you want to freeze. Click the View tab on the Ribbon.
2.Select the Freeze Panes command, then choose Freeze Panes from the drop-down menu. ...
3.The rows will be frozen in place, as indicated by the gray line.
Ans: 1.Select any one of the pictures or objects that were previously in a group.
2.Under Picture Tools, on the Format tab, in the Arrange group, click Group , and then click Regroup.
136
ITWORKSHOP LAB MANUAL
16).How many types of charts are there in excel ?
Ans: 1) The Pie Chart 2) The Column Char 3) The Line Chart 4)The Bar Chart
5)The Area Chart 6)The Scatter Chart and Other Chart Types
137
ITWORKSHOP LAB MANUAL
PROBLEM 15
PPT Orientation, Slide Layouts, Inserting Text, Word Art, Formatting Text, Bullets and Numbering, Auto Shapes,
Lines and Arrows in PowerPoint.
TITLE:
Create a power point presentation consists of slide layouts inserting text, formatting text, bullets and
numbering of five slides with following information’s.
Slide 1 – contents
Slide 2 – Name
Slide 3 – Address
Slide 4 – Hobbies
Slide 5 – Friends
Software Requirements: Operating System, MS Office Package (MS- Power Point Application)
THEORY:
138
ITWORKSHOP LAB MANUAL
Click Delete button to delete the current slides.
INSERT TEXT:
139
ITWORKSHOP LAB MANUAL
Click on the Format tab. Format the selected text box in Shape Styles:
o Shape Fill -- Changes the fill color
o Shape Outline -- Changes the color, width, line style of outline
o Shape Effects -- Applies visual effects (shadow, bevel, etc.) to the text box
BULLETS AND NUMBERINGS:
1. Select the lines of text that you want to add bullets or numbering to.
2. Click bullets or numbering.
ADD SHAPES:
Slide transitions are animation effects that appear between slides. While they look fancy, these transitions can
be distracting if overused. It is often good to keep this kind of animation to a minimum.
Animation Tabs >> Animations >> Transition to This Slide
Move the cursor over the transition buttons to preview the effects.
Click on the Transition effect button to apply the slide transition effect.
Click on Transition Sound button to apply sound effect for transition.
Click on Transition Speed button to adjust the speed.
Click on Apply to All to apply the same transition effect to all the slides.
Result: Creating MS Power Point presentation by applying animations, transitions, and backgrounds is
completed.
Viva Questions:
140
ITWORKSHOP LAB MANUAL
Ans: Slide transitions are the visual movements as one slide changes to another. Many different slide transitions are
available in programs such as PowerPoint or Open Office Impress. Transitions differ from animations, in that
animations are the movements of the objects on the slide.
ii) AIM:
Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects, Tables and Charts
TITLE:
Create a power point presentation consisting of hyperlinks, inserting images, clip art, audio, video objects
of 4 slides with the following information.
And apply the transaction effects and set the time three seconds for each slide and view it in slide show.
Software Requirements: Operating System, MS Office Package (MS- Power Point Application)
THEORY:
HYPERLINK:
1. Select the text or object that you want to represent the hyperlink.
2. Under insert menu click on Hyperlink.
3. Under link to, click place in this document.
141
ITWORKSHOP LAB MANUAL
INSERT IMAGES:
CLIP ART:
1. In the clipart task pane, in the search for box, type a word or phrase that
describes the clip, you want to type in all or some of the file menus of the
clip.
2. In the results box, click the clip to insert it.
AUDIO VIDEO OBJECTS:
1. On the insert menu, go to Media Clips option and select Movie for Video Objects and Sound for Audio
Objects.
2. You can select a movie from a file and you can record sound or select a sound or audio from a file.
TABLE:
1. Click the slide where you want to place the embedded object.
2. On the insert menu, click chart.
142
ITWORKSHOP LAB MANUAL
3. Click a cell on the data sheet and then type the information you want.
To return to the slide, click outside the chart.
Viva Questions:
Ans: Hyperlinks are created with an "href" tag (hyperlink reference). In it's simplest form the tag looks like
this:
The slide show can be enhanced using transitions and animations. Music, sounds or narration can be added
to these slide shows and they can run unattended by using custom timings. The slide show is most often
projected on a screen using a digital projector.
3) Define slide transition?
Ans: A slide transition is the visual motion when one slide changes to the next during a presentation. By default,
one slide simply replaces the previous one on screen, much the same way that a slide show of photographs would
change from one to the next.
4) What is animation?
Ans: Animations in Microsoft PowerPoint refer to the way that items, such as text boxes, bullet points or
images move onto a slide during a slide show. There are two types of animations available in PowerPoint -
Preset Animation Schemes, that affect all of the content on a slide, and Custom Animations, that allow you
to apply a variety of animation effects to individual items on a slide.
143
ITWORKSHOP LAB MANUAL
TASK 19:
Master Layouts (slide, template, and notes), Types of views (basic, presentation, slide slotted, notes etc), Inserting –
Background, textures, Design Templates, Hidden slides.
TITLE:
Create a power Point presentation on business by using master layouts and see the presentation in different
views.
Software Requirements: Operating System, MS Office Package (MS- Power Point Application)
THEORY:-
144
ITWORKSHOP LAB MANUAL
1. On the slides tab in the normal view, select the slides you want to set the things for.
2. On the Animations menu, click side transition.
3. Under advance slide, select the automatically after checkbox, and then number of seconds you want the slide
to appear on the screen.
4. And then click on Slide Show option from view menu or press F5 Key from keyboard.
PROCEDURE:
First click on start button. Then click programs, and then power point presentation. Then select file menu and
click on new. Then you get a new blank presentation. Then in the first slide, enter the title as business and give product
name as sub title. Then insert the second slide. Then enter the title as about the product and give description as sub title.
Then insert the third slide and enter the title as sales about product and enter something about it sales. In this way,
complete the three slides. Then click on view and then master and then enter date in the space provided for footer. Then
you find these two in all slides and then again go to view and click on slide show.
Viva Questions:
145
ITWORKSHOP LAB MANUAL
4) How can you rotate the picture in power point?
Ans: Double click on the picture and you then ribbon will automatically switch to "Format",
below it, in the "Arrange" section; you will find the "Rotate" button.
Ans: Hyperlinks are created with an "href" tag (hyperlink reference). In it's simplest form the tag looks like
this:
Ans:There is option Automatically after on animations tab.Set the time and click on
automatically after.
Ans: Slide shows have come a long way since those shown on the slide projectors of old. Many digital
presentations, such as those created in PowerPoint or Open Office Impress are composed of several slides.
The slide show can be enhanced using transitions and animations. Music, sounds or narration can be added
to these slide shows and they can run unattended by using custom timings. The slide show is most often
projected on a screen using a digital projector.
Ans: A slide transition is the visual motion when one slide changes to the next during a presentation. By
default, one slide simply replaces the previous one on screen, much the same way that a slide show of
photographs would change from one to the next.
10)What is animation?
Ans: Animations in Microsoft PowerPoint refer to the way that items, such as text boxes, bullet points or
images move onto a slide during a slide show. There are two types of animations available in PowerPoint -
Preset Animation Schemes, that affect all of the content on a slide, and Custom Animations, that allow you
to apply a variety of animation effects to individual items on a slide.
146
ITWORKSHOP LAB MANUAL
REFERENCES:
www.google.co.in
http://en.wikipedia.org/wiki/Main_Page
http://www.gcflearnfree.org/office2007
http://www.w3schools.com
vii
147
ITWORKSHOP LAB MANUAL