IT Skills Lab Manual by Subhash J R
IT Skills Lab Manual by Subhash J R
Prepared by
Mr. SUBHASH J R
Senior Grade Lecturer
Exercise 1
Write an algorithm for programmable problems Example for Reference:
• Add/subtract two numbers
• Find the largest/smallest of 3 numbers
• Calculate and print sum of 'N' numbers
Algorithm:
An algorithm is a set of computation steps performed to obtain the solution for a given problem.
OR
A procedure for solving a mathematical problem (as of finding the greatest common divisor) in a
finite number of steps that frequently involves repetition of an operation.
OR
A step-by-step procedure for solving a problem or accomplishing some end.
2
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 2
Design a flowchart for programmable problems Example for Reference:
Add/subtract two numbers
Find the largest/smallest of 3 numbers
Calculate and print sum of 'N' numbers
Flowchart:
A flowchart is a graphical representation of steps. It was originated from computer
science as a tool for representing algorithms and programming logic but had extended to use in all
other kinds of processes.
Benefits:
1. It helps to clarify complex processes.
2. It helps team members gain a shared understanding of the process and use this knowledge
to collect data, identify problems, focus discussions, and identify resources.
3. It serves as a basis for designing new processes.
Flowchart Symbols
3
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
4
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
b) FIND THE LARGEST/SMALLEST OF 3 NUMBERS
5
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
6
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 3
Design and create simple game using MIT-scratch / Code.org
Menu Bar: It gives easy access to commands that you will use while creating your projects.
Stage Size: It allows you to toggle between three stage sizes: Small stage layout, Regular, and Full
screen.
The Stage: It is the background of your project. It can have scripts, backdrops and sounds like a
sprite, but with a few restrictions.
Sprite: A Sprite is an object in your project controlled by your scripts.
Sprite Info Pane: It is where you will find a thumb nail for each sprite in your project.
Choose a Backdrop: It is marked with a symbol of a background image, and its located to the
right of the choose sprite button.
Code Area: It is where you will build your scripts.
7
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Step 2: Using the Programming Blocks create a story like a project and present it as
8
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
9
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
10
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 4
Design and create simple android application (MIT App Inventor)
The Designer view gives you a visual representation of the application you are building.
Whereas block view shows the visual scripts just like in MIT Scratch
To start developing our app we need to open App Inventor and create a new project.
11
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
1. Go to the App Inventor website:
http://appinventor.mit.edu/explore/
2. Now login with your Gmail account in another tab (new tab)
3. Click on Create Apps in the top right corner of the page:
6. Drag and drop the Text Box from the user interface (left side of the panel) on the canvas.
7. Drag and drop Button from the user interface and rename it as “speak”
10. That’s it, Now go to Blocks Editor (Which is in top right side of the window)
14. Now click on Connect from menu and click the AI Companion
16. Open MIT AI2 Companion app in your phone and scan the QR Code or enter the 6-digit
code to test the project.
14
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
OUTPUT
Output is observed in the android mobile screen with the help of interfacing app
(MITAI2 Companion) installed in your mobile
15
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
16
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
17
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 5
Design and create webpage for displaying your poem (Title, header, paragraph,
formatting tags)
<html>
<head><title>my first webpage</title></head>
<body bgcolor=cyan>
<center>
<h1><b><u> POEM </b></u></h1> <br>
<h2> <u><i> WE NEED A TEACHER </u></i> </h2> <br>
<h3><p> <i>KRISHNA NEE BEGANE BAARO</i> <br>
<i>KRISHNA NEE BEGANE BAARO</i> <br>
<p>Darkness comin' 'round<br>
And everybody fighting with their brothers<br>
Everybody wants control<br>
Don't hesitate to kill one another<br>
So come back as Jesus<br>
Come back and save the world<br>
Bless all the future<br>
Of every boy and girl<br>
Come back as Rama<br>
Forgive us for what we've done<br>
Come back as Allah<br>
Come back as anyone<br>
19
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 6
Design and create webpage for your wish list (What you want to do). Also list
challenges and opportunities along with images to present your dreams
(List ordered and unordered, Image, table - use these tags)
<html>
<head>
<title> wish list </title>
</head>
<body bgcolor= lightgreen>
<center>
<strong>MY WISH LIST</strong> <br>
</center>
<p>First i will go with my Dreams<br>
<ol>
<li>Always i wanted to be a good child to my parents as well as to my society
<li>i know i cant satisfy everyone but within my limits i can achieve all my goals.
<li>firstly i should get a good job, so i dreampt to get distinction in my studies and i am trying it everyday honestly.
<li>i wanted to keep my parents always happy in their rest of life.
<br><img src="D:\dreams.jpeg" width=600 height=150>
<br>
<strong>CHALLENGES:</strong>
<ul>
<li>I know life is full of challenges
<li>challenges are like keys to open the door of success in our lives, everyday is a challenge
<li>always i will be ready to accept challenge and i dont turn back until i finish/succeed in my dreams.
<li>so my suggestion to you all: Do not give up, the beginning is always the hardest :)
<br> <img src="D:\challenge.jpeg" width=600 height=100>
<p>
<strong> OPPORTUNITIES:</strong>
<br>A time or set of circumstances that makes it possible to do something.
As i have got opportunities everyday every minute <br>to achieve my dreams, some of them i have mentioned in
the below table
20
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
<table border=3>
<tr>
<td> </td><td>Dream</td><td>oppurtunity</td><td>challenge</td>
</tr>
<tr>
<td>1</td><td>happy schoolings</td><td>i joined to a very good school</td><td>but it was a challenge to me
their to stay happy</td>
</tr>
<tr>
<td>2</td><td>dreamt to join a good college and <br> with very good marks</td><td>i studied hard and found
success <br> to achieve my dream</td><td>i accepted this challenge i made good friends and <br> i studied hard
to get good marks</td>
</tr>
</table>
<br> <img src="D:\opportunity.jpeg" width=600 height=200>
</body>
</html>
21
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
OUTPUT
22
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 7
Design and create webpage using HTML and CSS about an awesome animal
(Use necessary CSS tags)
<html>
<head>
<title> About an Awesome Animal you like </title>
<style>
div img
{
margin:10px;
padding:10px;
border:10px
solid red;
height:250px;
width:250px;
float:left;
}
</style>
</head>
<body bgcolor="pink">
<h1> <font color="Blue">Awesome Animal </font></h1>
<h2><font color="Green">Horse</font></h2>
<div class="img">
<iframe width="790" height="444"
src="https://www.youtube.com/embed/Hxm56tAENx0"
title="YouTube video player" frameborder="0" allow="accelerometer; autoplay;
clipboard-write; encrypted-media; gyroscope; picture-in-picture"
allowfullscreen></iframe>
</div>
</body>
</html>
23
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
OUTPUT
24
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 8
Design and create web page for a travel book / reciepe book with more than
3pages, table to list places/recipes (iframe, hyperlink)
Here we implemented 4 web pages for Travel book, so we should create 4 web pages namely
1. travelbook.html (Homepage)
2. ladakh.html (Location1 –Ladakh Range)
3. goa.html (Location2 -Goa)
4. ckm.html (Location3 - Chikkamagalur)
<iframe> tag specifies an inline frame. An inline frame is used to embed another document
within the current HTML document.
<hyperlink> The HTML <a> tag defines a hyperlink. You can click on a link and jump to
another document.
Travelbook.html (Homepage)
<html>
<body bgcolor=grey>
<h1>MY TRAVEL BOOK</h1><br>
<u><h3>LIST OF PLACES I VISITED</h3><br></u>
<font size=20>
<table border="1px" class="center">
<tr>
<th>Serial Number</th>
<th>places I visited</th>
</tr>
<tr>
<td>1.</td>
<td><a href="ladakh.html">LADAKH</a></td>
</tr>
25
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
<tr>
<td>2.</td>
<td><a href="goa.html">GOA</a></td>
</tr>
<tr>
<td>3.</td><td>
<a href="ckm.html">CHIKKAMAGALURU</a></td>
</tr>
</table>
<img src="D:\ex8image1.jfif">
<img src="D:\ex8image2.jfif">
<img src="D:\ex8image3.jfif">
<img src="D:\ex8image4.jfif">
</body>
</html>
OUTPUT
26
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Ladakh.html (Location1 –Ladakh Range)
<html>
<head>
<title> ladakh</title>
</head>
<body bgcolor=orange>
<p align="center">
<font size="20"><u>Best Places To Visit Leh Ladakh </u> </font></p>
<h2><u>1.Pangong Tso Lake </h2></u>
<img src="https://images.outlookindia.com/public/uploads/articles/2019/9/12/13_571_855.jpg">
<br>
Pangong Tso lake found fame thanks to Aamir Khan's 3 Idiots so without a doubt, this place
deserves to be <br> on your itinerary of places to visit in Ladakh. Pack a sweet picnic basket
and head with your folks to the lake <br>and maybe even camp next to it as you enjoy every
moment of peace and tranquillity.</p>
</body>
</html>
OUTPUT
27
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Goa.html (Location 2- Goa)
<html>
<head>
<title>GOA</title>
</head>
<body bgcolor=brown>
<p align="center">
OUTPUT
28
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
ckm.html (Location 3- chikkamagalur)
<html>
<head>
<title>CHIKKAMAGALURU</title>
</head>
<body>
<p align="center">
<font size="20"><u>Best Places To Visit in Chikkamagaluru </u> </font></p>
<iframe width="1280" height="720" src="https://www.youtube.com/embed/tGJmv06my1w" frameborder="0"
allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture"
allowfullscreen></iframe><br>
Kudremukha is a mountain range and name of a peak located in Chikkamagaluru district, in Karnataka, India. It is
also the name of a small hill station cum mining town situated near the mountain,
about 20 kilometres from Kalasa. ... Kuduremukha is Karnataka's 2nd highest peak after Mullayanagiri.</p>
</body>
</html>
OUTPUT
29
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
30
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 9
Design and create web page with JavaScript to design a simple calculator to
perform the following operations: sum, product, difference and quotient
<html>
<head>
<title> MY BASIC CALCULATOR </title>
<script>
function dis(val)
{
document.getElementById("result").value+=val
}
function solve()
{
let x= document.getElementById("result").value
let y= eval(x)
document.getElementById("result").value=y
}
function clr()
{
document.getElementById("result").value=" "
}
</script>
</head>
<body>
<tr>
<td colspan="3"><input type="text" id="result" /></td>
<td><input type="button" value="c" onclick="clr()"/> </td>
</tr>
<tr>
<td><input type="button" value="1" onclick="dis('1')"/></td>
<td><input type="button" value="2" onclick="dis('2')"/></td>
<td><input type="button" value="3" onclick="dis('3')"/></td>
<td><input type="button" value="/" onclick="dis('/')"/></td>
</tr>
<tr>
<td><input type="button" value="4" onclick="dis('4')"/></td>
<td><input type="button" value="5" onclick="dis('5')"/></td>
<td><input type="button" value="6" onclick="dis('6')"/></td>
<td><input type="button" value="+" onclick="dis('+')"/></td>
</tr>
<tr>
<td><input type="button" value="7" onclick="dis('7')"/></td>
<td><input type="button" value="8" onclick="dis('8')"/></td>
31
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
<td><input type="button" value="9" onclick="dis('9')"/></td>
<td><input type="button" value="-" onclick="dis('-')"/></td>
</tr>
<tr>
<td><input type="button" value="0" onclick="dis('0')"/></td>
<td><input type="button" value="." onclick="dis('.')"/></td>
<td><input type="button" value="*" onclick="dis('*')"/></td>
<td><input type="button" value="=" onclick="solve()"/></td>
</tr>
</table>
</body>
</html>
OUTPUT
32
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 10
Design and create a personal webpage with dashboard
<html>
<head>
<title>MY DASHBOARD</title>
</head>
<body bgcolor="yellow">
<div align="center">
<font size=20> RJS Polytechnic</font><br>
<img src="D:\logo2.jfif"><br>
#1, Mahayogi vemana Road, Koramangala 3rd Block, <br>Beside BDA Complex, Bengaluru-
560034.
</center>
<br><p>
<div align="left">
<font size=5>
Infra Structure
</font>
              &n
bsp             &nbs
p              &
nbsp             &nb
sp      
<font size=5>
Courses
</font>
              &n
bsp 
<font size=5>
Achievements
</font>
              &n
bsp 
<font size=5>
Placements
</font>
              &n
bsp 
<font size=5>
33
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Admissions
</font>
<br>
<img src="D:\front.jfif">
<img src="D:\courses.png" width=200 height=170>
<img src="D:\achieve.png" width=200 height=170>
<img src="D:\place.png" width=200 height=170>
34
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
OUTPUT
35
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 11
Design and create web page about advantages of business process automation
with respect to your branch of engineering
<html>
<head>
<title>BUSINESS PROCESS AUTOMATION</title>
</head>
<body bgcolor=gold>
<p align="center">
<font size=20><u>BUSINESS PROCESS AUTOMATION in the field of Mechanical
Engineering.</h1></u></font></p>
<font face="calibri">
<u><h1>Why Automation is Important? </h1></u> <br>
Process automation industry mainly consists of equipment process control through software engineering .
<p>
Although, the process automation industry nowadays has become a platform for software engineer the core
behind the industry
or we can say a heart of the industry beats with the mechanical engineering or the mechanical engineer. Process
automation,
with the help of sensors at thousands of spots around the plant that collect data on temperatures, pressures, flows
and so on.
The information is stored and analyzed by mechanical engineer so as to get proper, efficient output to control the
process as
well as production. Putting your mechanical theory across the manufacturing line to make an efficient process
line.
Software engineer and electronics/electrical engineers are just like a cap for this industry, but the head and hairs
are of
mechanical engineer only. Starting from process knowledge, it's design, R&D, control-analysis, manufacturing,
maintenance,
output, everything is under a mechanical engineer.
<p>
This industry is a couple of steps behind the automotive industry as far as technology and my knowledge is
concern, but the software managed control is putting cherry on icecream of process automation industry.
<p>
Robotic Process Automation in mechanical engineering
Robotic Process Automation is one of the most advanced technologies in the area of computers science,
electronic and communications, mechanical engineering and information technology. It is a combination of both
hardware and software, networking and automation for doing things very simple.
36
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
OUTPUT
37
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 12
Create a workflow for education loan approval in bank / diploma admissionprocess
(Use any tool)
Visit the below URL to create a sequence diagram for creating Diploma Admission
Process:
https://sequencediagram.org/
Sequence of steps
38
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
OUTPUT
39
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 13
Demonstrate ERP with ERPNext Demo for manufacturing, retail and service
sector (Use any other ERP tools)
Click the below web portal and register your free account to maintain a Financial accounts
OUTPUT
40
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
41
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 14
Create user account and demonstrate use of Google drive, Google docs, GoogleCo-lab
(Usage of Jupyter Notebook)
GOOGLE DRIVE
42
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
GOOGLE DOCS
Google Docs is used to create and edit documents right in your browser and no dedicated or
specific software is required. Multiple people can work at the same time and every change is
saved automatically.
GOOGLE COLABS
43
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Step 2 − Click on the NEW PYTHON 3 NOTEBOOK link at the bottom of the screen. Anew
notebook would open up as shown in the screen below.
44
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
As you might have noticed, the notebook interface is quite similar to the one provided in
Jupyter. There is a code window in which you would enter your Python code.
We will call this notebook as MyFirstColabNotebook. So type in this name in the edit
box and hit ENTER. The notebook will acquire the name that you have given now.
Entering Code
You will now enter a trivial Python code in the code window and execute it.Enter the following two Python
statements in the code window
Executing Code
To execute the code, click on the arrow on the left side of the code window.
After a while, you will see the output underneath the code window, as shown here −
Mon Jun 17 05:58:40 2019
45
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
You can clear the output anytime by clicking the icon on the left side of the output
display.
46
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 15
Demonstrate Internet of Things using
with examples
a. Smart home
b. Smart city
c. Smart farming
a. Smart home
We live in an exciting time where more and more everyday things are becoming smart. Appliances
have sensors and can sensors and can communicate to other things and can provide control to more
things. Homes of the 21 st century will become more and more self-controlled and automated due
to the comfort it provides, especially when employed in a private home. A home automation system
is a means that allows users to control electric appliances of varying kind.
1.) Smart Lighting: Helps in saving energy by adapting the lighting to the ambient conditions
and switching on / off or diming the light when needed.
2.) Smart Appliances: Make the management easier and also provide status information to
theusers remotely.
47
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
3.) Intrusion Detection: Use security cameras and sensors (PIR sensors and door sensors) to
detect intrusion and raise alerts. Alerts can be in the form of SMS or E-Mail sent to the user.
4.) Smoke / Gas Detectors: Smoke detectors are installed in homes and buildings to detect that is
typically an early sign of fire. Alerts raised by smoke detectors can be in the form of signals to a
fire alarm system. Gas detectors can detect the presence of harmful gases such as CO, LPG etc.
b. Smart City
Smart Cities is not just a global trend, it’s not some fancy technology revolution that everyone
dreams about, in fact smart cities is a need and have to be apply as soon as possible. It is quite
clear that technology has been filling the gap that could not be solved before such as inequity
information availability and an equal standard life quality for all citizen.
In order to create an ideal Smart Cities for the citizen, there are least 5 element that a city must
have:
Smart Governance: “SMART Governance” is about the future of the public services, SMART
Governance utilize technology such as business application to facilitate and support better
planning, decision and even the monitoring, it will also be improving governance transparency to
transform the way public services are delivered.
Smart Living: Smart Living is about providing opportunities to improve the quality of its citizens’
lives by guaranteeing a sustainable social including healthcare education and safety. By
incorporating the latest technology into citizen daily activity, it will not only boost their
productivity but also will help accelerating growth through digital world.
Smart Health Monitoring: Uses a network of sensors to monitor the vibration levels in the
48
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
structure such as bridges and buildings.
Smart Environment: Ensuring liveable conditions within the cities is also an important matter in
developing smart cities, the concept of smart city is the use of technology to improve sustainability
and better manage natural resources.
Smart Grid: Smart grids are digitally monitored, self-healing energy systems that deliver
electricity or gas from generation sources. Smart grid solutions can be across industrial, residential
as well as in transmission and distribution projects.
c. Smart farming
By using IoT sensors to collect environmental and machine metrics, farmers can make informed
decisions, and improve just about every aspect of their work – from livestock to crop farming. For
example, by using agriculture sensors to monitor the state of crops, farmers can define exactly how
many pesticides and fertilizers they have to use to reach optimal efficiency.
There are many types of IoT sensors for agriculture as well as IoT applications in agriculture in
general:
b.) Gren House Control: Typically, farmers use manual intervention to control the greenhouse
environment to improve productivity.
c.) Monitoring of climate conditions: Probably the most popular smart agriculture gadgets are
49
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
weather stations, combining various smart farming sensors. Located across the field, they collect
various data from the environment and send it to the cloud. The provided measurements can be
used to map the climate conditions, choose the appropriate crops, and take the required measures
to improve their capacity.
d.) Crop Management: You can monitor your crop growth and any anomalies to efficiently
prevent any diseases or infestations that can harm your yield.
e.) Agricultural drones: Perhaps one of the most promising advancements is the use of
agricultural drones in smart farming. Also knows ad UAVs (Unmanned Aerial Vehicles), drones
are better equipped than airplanes and satellites to collect agricultural data.
50
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 16
Installation of Antivirus Software
There are many antivirus products available in market like Avast, Quick Heal, McAfee, Kaspersky,
Norton, Trend, AVG Antivirus, Avira, etc.
Now we are considering Avast Antivirus and below are the steps to install.
Step 1: Click or Type the below link in your internet browser’s address bar (URL).
https://www.quickheal.com/download-free-antivirus
This link redirects you to file download page.
51
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Step 5: Read the User and License and Agreement carefully and check the box that says ‘I Agree’
52
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Step 7: Let it install files in the selected drive, till it is 100% complete.
Step 8: Once completed, it will ask you to register the product. Click on ‘Register Now’.
53
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
There are two ways of registering your Quick Heal copy. You can register offline if the system or
device isn’t connected to the Internet.
Before visiting the offline activation page, ensure that you have the product key and the installation
number with you.
The product key can be found printed either on or inside the product packaging or will be provided
when you purchase Quick Heal Antivirus Total Security online.
With the help of a connected device, visit the offline activation page
Fill the registration form and enter the product key received after buying the product.
Step 10: Installing Quick Heal Antivirus with Product Key Online
Buy Quick Heal Total Security key after installing the free version from the .exe file downloadedfrom the website.
For premium and pro versions, register the product key provided with the productpurchase.
54
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 17
Demonstration and hands-on browser settings
Google Chrome
55
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
5. Switch between profiles
Just like you can have user profiles for different people on Windows or macOS, you can have
multiple Chrome profiles. It keeps passwords, history, settings, and more separate, and it works
for different family members or just for different parts of your life, like work versus home.
Click your avatar (top right) then Manage People to get started.
6. Embrace the emoji
If you think one emoji is worth a thousand words, you'll be interested in this one. You can right-
click inside any text box in Chrome on Windows or macOS, then
choose Emoji & Symbols to quickly access a gallery of icons and pictures. If you can't find
what you're looking for straightaway, use the search box at the top or the category list at the
bottom.
7. Find tabs you've opened elsewhere
As long as you're signed into the same Google account, you can quickly access open tabs on
other computers where Chrome is installed. It's helpful for bringing back a tab from your office
computer while you're at home, for example. From the Chrome menu, choose History, then
History again, then click on Tabs from other devices to see a list.
56
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 18
Demonstration and hands-on privacy settings and password policy.
There are many steps you can take to keep your private data secure.
All your digital devices like computers, tablets, smartphones or any other gadget with
personal data on them should be password protected for increased security. A lost or stolen
gadget without password protection is a source of personal information for whoever has it.
This can lead to identify theft and worse.
The same advice goes for online accounts. Since most of these need a password to set up,
the challenge is making strong passwords.
Change the default passwords for anything connected to your home network.
Digital security has a lot to do with digital privacy. If your computer, infected by a virus or
malware, not only can hackers dig through your data to steal your identity, but they maylock
up your files and ask for a ransom to get them back. The solution is to run an antivirus
program to watch for viruses and keep your information very safely.
Make sure your operating system is up to date with latest security patches. To make that
process easier, we recommend turning on auto-update features for OS that you use.
Your browser is how you interact with the digital world, and if you aren’t careful, you
could be leaving a trail of footprints behind you as you browse.
The first step for keeping advertisers out of your browser is turning off third part cookies.
Use Incognito Mode / private browsing mode. This deleted your cookies, browsing history
and other temporary files whenever you close the windows. (For example: In Firefox
Go to File / Menu Click on New Private Window.)
Most search engines keep tabs on what you’re looking for so they can target ads
your tastes. If you have a habit to use multiple browsers then the site doesn’t track any of your
personal data.
57
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
5.) Be careful what you share on social media
Social media can feel like a conversation with your closest friends, but it may be
a conversation the whole world can see. If you post enough on social media, the information can
be used to track where you are and what you’re up to.
Beware of websites, phone calls and emails that try to part you from your personal information. A
common tactic with scammers is to pressure you into giving up your personal information.
Example: A Scammer may tell you that you’re being audited by the IRS or that your computer
has a dangerous virus and they can fix it by handing over your personal information.
Whether you’re installing new software on your phone or your computer, make sure you’re getting
it from a source you trust. Legitimate-looking software can sometimes turn out to be a complete
scam.
It’s not convenient to use the free Wi-Fi service at coffee shops, railway stations or airports, because there is no
one telling who is watching that internet traffic. If you use public Wi-Fi, don’tuse it to convey private information.
58
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Exercise 19
Demonstration of common security threats (using videos)
A. Phishing
B. DoS attack
C. Man in the middle attack
D. Spamming
E. Virus
Cyber security threats reflect the risk of experiencing a cyber attack. A cyber attack is an
intentional and malicious effort by an organization or an individual to breach the systems of
another organization or individual. The attacker’s motives may include information theft,
financial gain, espionage, or sabotage.
Check this link to watch about “8 Most Common Cybersecurity Threats | Types
of Cyber Attacks | Cybersecurity for Beginners | Edureka” and the link is
https://www.youtube.com/watch?v=Dk-ZqQ-bfy4
A. PHISHING
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or textmessage by someone
posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable
information, banking and credit card details, andpasswords. The information is then used to access important
accounts and can result in identitytheft and financial loss.
59
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
Browsers keep a list of fake websites and when you try to access the website, the
address is blocked or an alert message is shown. The settings of the browser should
only allow reliable websites to open up.
3. Many websites require users to enter login information while the user image is
displayed. This type of system may be open to security attacks. One way to ensure
security is to change passwords on a regular basis, and never use the same password
for multiple accounts. It’s also a good idea for websites to use a CAPTCHA system
for added security.
B. DOS ATTACK
There are two general methods of DoS attacks: flooding services or crashing services. Flood
attacks occur when the system receives too much traffic for the server to buffer, causing them
to slow down and eventually stop.
60
IT SKILLS, 20CS01P Subhash J R, SGL/CS RJS Polytechnic-372
https://www.youtube.com/watch?v=ilhGh9CEIwM(DoS
Attack Explained)
A man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to
secretly eavesdrop or modify traffic traveling between the two. Attackersmight use MitM attacks to steal login
credentials or personal information, spy on the victim, or sabotage communications or corrupt data.
https://www.youtube.com/watch?v=DgqID9k83oQ (
What Is A Man-in-the-Middle Attack?)
D. SPAMMING
Sending junk email sent in bulk by email, most email spam messages are commercial in nature.
Whether commercial or not, many are not annoying, but also dangerous because they may
contain links that lead to phishing web sites or sites that are hosting malware or include
malware as file attachments. Spammers collect email addresses from chat rooms, websites,
customer lists, newsgroups and viruses that harvest users address books. These collected email
addresses are sometimes also sold to other spammers.
E. VIRUS
causing infection and damage. A computer worm does not need a host
program, as it isan independent program or code chunk. Therefore, it is
not restricted by the host program, but can run independently and actively
carry out attacks.
Trojan Horse is another type of Virus
A Trojan Horse is any malware which misleads users of its true intent.
The term is derived from the ancient Greek story of the deceptive Trojan
horse that led to fall of thecity of Troy.
62