Copa Lesson Plan
Copa Lesson Plan
LESSON PLAN
Question:
List the special features of Babbage Analytical engine.
How do you they compare with the modern computers?
Classify the generation of computers.
What is the main difference between different generation computers?
Summary: Babbage in conceded one of the great performs in the trade of compaction for this foresight to
design the analytical engine.
The developments of the computers are closely associated with the development in mechanical technology,
particularly the semi conductor technology.
Application: Now days there are the most widely used machine, education, Business, Communication,
Personal, and Fun.
Such system would integrate the advantage in the both hard were and soft were technology and would
facility computer added problems slowing with the help of organized information many specialize area.
Reference: Early one chemical compute.
IBM PC CLONES – B Gonvindarajalu.
INTRODUCTION TO MICROPROCESSORS – R. Gaonkar.
Next Lesson: Function of Computer.
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Title: Function Of Computer. ( Input, Output, ALU, Control Unit, Memory) & Application of Computer
Objectives:
Introduction
Development
Components
Application
E-governance Application
Commercial application use like railway reservation, telephone billing etc.
Aids: Chalk, Duster, Black Board, Pointer.
Preparation:
The applications of components are so wide that they will be playing vary important rots and future life of man
to relieve him from many physical and mental ban dens.
The complain does everything as per the instructions given by the programmer in his program. It
cannot think of its own like human being.
Introduction:
The first mechanical calculation machine was made in 1642 by the great French matumatwan and
philosopher Blasé Pascal pres.
Motivation:
Before use of computer all work was done by paper and it was very lengthy process to do and after use of
computer in various application paper is work is reduced and work is become very fast.
Presentation:
Topics Information Points Spot Hints
Input BLOCK DIAGRAM OF COMPUTER
unit Input unit: The purpose of the input unit is to accept the
memor input data which is required to store the problems ALU
y unit Memory unit: the memory unit retains the slips for
ALU solution and initial input –data, the intermediate and final
Control results. I/P O/P
CU
unit Arithmetic unit: the arithmetic unit per forms all
Output mathematical computation apon receiving instruction
unit from control unit. MEMORY
Control unit: This unit performs the most vital function in
the computer. It actual all this unit and controls the data
flow between them to solve the problem.
Output units: The output unit accepts the final result and
translates them from machine code to the readable from.
Computer Computer- controlled seat reservation bring It saves your valuable time.
Application in benefit to customers. This is achieved by
railway reservation using computer networks.
Electricity billing by maintaining the list of You can even get the status
Electricity all the user name, connection number, update.
number of units and the amount to be paid.
Question: Classify the Computer according to the their speed and storage capacity
(1) What do you mean by ‘Machine language’?
(2) Why H.L.L. is required?
(3) Function of Translator.
(4) Difference between Compiler and Interpreter.
Summary: Computers are classified according to their technology and extreme use of its purpose.
Application: Application of each computer varies from business to business and it s potential capacity of
processing. Application in the electronic, petroleum engineering Weather for casting structural analysis
chemistry, medicine and physics.
Next Lesson: Input / Output device & their Features
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
* Introduction : various input & Output devices are used to give data to system & to get information from
system.
Motivation :
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Input device Input devices are used to enter data from outside
world into primary storage.
Keyboard devices Allow data entry into a computer system by pressing 101 keys QWERTY key
a set of keys board is most popular.
Monitor Monitor are most popular o/p devices used for Display o/p on a television
producing soft-copy o/p. like screen.
Its advantages like low
Cathode ray tube The cathode ray tube (CRT) is a vacuum tube energy consumption, smaller
containing an electron gun (a source of electrons) and lighter.
and a fluorescent screen.
LCD
LCD was introduced in the 1970s and is now applied
to display terminals also. they can be classified as
Printer Impact or Non-impact
Printers are used to produce paper (commonly printers.
known as hardcopy) output. Based on
the technology used.
Impact printers they use typewriting printing mechanism wherein a Dot-matrix and Character
hammer strikes paper through a ribbon in order to printers fall under this
produce output. category.
Non-impact printers printers do not touch the paper while printing. They Inkjet, Deskjet, Laser,
use chemical, heat or electrical signals to etch the Thermal printers fall under
symbols on paper. Inkjet, Deskjet, Laser, Thermal this category of printers.
printers fall under this category of printers.
APPLICATION :
SUMMARY : Input devices are the devices through which we can give instruction to system.
output device gives the output of our given instructions .
ASSIGNMENT/ : (1) What is the full form of VDU,LCD?
QUESTION (2) What is Soft Copy & Hard Copy?
(3) Explain it’s feature
REFERENCE : Computer Operator & Programming Assistant – NIMI
NEXT LESSON : BIOS Settings & Various Type of Memories
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
* Introduction : various types of storage devices are used to store data temporary or permanent..
Motivation :
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Types of memory - Primary storage
device - Secondarty storage
Every computer has a
Primary storage RAM (Random Access Memory) temporary storage built into
devices Primary storage of a computer is often referred as computer hardware. This
RAM because of its random access capabilities. temporary storage is known
as main memory.==
RAM chips are volatile memory.
Topic / Aim : Basic Hardware & Software Issues & Software Installation
Objective : What is hardware and software, Types of Software and It’s Installation
Aids : Marker, White Board ,Duster ,Computer ,Projector
Preparation :
* Review : Types of Input / Output device & their Features
APPLICATION :
SUMMARY :
ASSIGNMENT/ : (1) What is Required to Install any Software
QUESTION (2) Describe Hardware and Software Issue
Advantage Of Linux There is no any owner of Linux Os . So any one What are the advantages
: can debug it without License Permission. Of Linux Operating System?
Echo Command : This command is use to display message on E.g. echo HELLO_COPA
screen. We can also display echo in a color.
Different escape sequence code is used to display
foreground color as well as back ground color.
Rm command : This command is use to delete file. It deletes the E.g. $ rm test.txt
file with message or without message with sub It removes test.txt file.
option –f and –i.
Mv command : This command is use to rename file and moves E.g. mv mycopa.txt c.txt
the file from one directory to another.
Syntax : cd directory_name
Grep Command : Syntax : grep [option] string file_name E.g. $ grep ‘copa’ itibbr.txt
Insert menu. In Insert menu following Options are available. Detail Discussion of all
Break, Page Number, date & Time, auto text, Field, above option of Insert Menu.
Symbol, Comment, Footnote, Caption, Cross
reference, index & Tab, picture, Book mark, file,
object.
APPLICATION : Edit , View and Insert menu is useful for editing word document.
SUMMARY : View for Different view of document, Insert and Edit menu for editing document
ASSIGNMENT/ : (1) Work all short cut key of option of edit, view and insert menu?
QUESTION (2) What is the use of Header & Footer?
(3) difference between paste and paste special?
(4) How to add new page in document?
REFERENCE :
NEXT LESSON : Format & Tools menu, Table and Windows menu.
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Motivation : Window & dos base program like typing tutor ,Ms-Office etc.
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Format menu --> Font: This will change the font attributes of --> What is the use of font
either the currently selected text command?
-->Paragraph: select the text you wish to change and
then use this command to make the alterations, such --> What is the use of borders
as alignment, indentation, and spacing. and shading?
-->Bullets and Numbering: This is a handy
command, it creates indented lists with various --> What is the use of change
formats. case?
-->Borders and Shading: This command allows you
to create borders and shading on elements within
your Microsoft Word document.
-->Columns: The Columns command will split the
current document into the number of columns you
specify.
-->Drop Cap:This tool allows you to either add a
drop cap character to your document or change an
existing letter (at the start of a sentence) to a drop
cap.
-->Text Direction: This allows you to change the
text direction of a text object, for example a text
box.
-->Change Case: The Change case tool allows you
to alter the case of existing text.
-->Background: This changes the background color
of your Microsoft Word document. It also allows
you to add watermarks and use different gradient
effects.
-->Styles and Formatting: This will open the Styles
and Formatting toolbar, allowing you create
headings, lists and more.
Tools Menu -->Spelling and Grammar: This command will check --> What is the use of
spelling and grammer?
the spelling and grammar of the current Microsoft
Word document. --> Explain mail merge.
-->Language: The language tool has various options,
including setting the language of the document, explain macro.
translating text, open the thesaurus and manage
hyphenation.
-->Word Count: This will open the Word Count
dialogue box, enabling you to count the amount of
words in the whole document, or the currently
selected text.
-->Protect Document: This command allows you to
control the protection of the document, including
tracked changes, comments and forms.
-->Letters and Mailing: Gives you access to various
features, including the Mail Merge Wizard, the
Letter Wizard, the Envelopes and Labels tool, and
the Mail Merge Toolbar.
-->Macro: This opens the Macro Dialogue box,
allowing you to manage subsequent and existing
macros. We will be covering Microsoft Word
macros in a future tutorial.
-->Templates and Add-Ins: Opens the Templates
and Add-Ins Dialogue box, allowing you to add,
remove or update styles and template.
-->AutoCorrect Options: Opens the AutoCorrect
dialogue box, enabling you to manage capitalization,
and also the replace text as you type settings.
-->Options: This opens the main options dialogue
box in Microsoft Word. It allows you to change
many aspects of the current document and Microsoft
Word environment.
Table menu -->Draw Table: This command opens the Tables --> What is the use of merge
cells?
and Borders dialogue box with the draw table
tool active. --> What is the use of split
-->Insert: Allows you to insert a whole table or just cells?
columns, rows and cells into the current document.
--> What is the use of sort?
-->Delete: Delete complete tables, columns, rows
and selected cells.
-->Select: This command allows you to select the
current table, column, row or cell.
-->Merge Cells: This tool will merge the currently
selected cells into one.
-->Split Cells: This will split the selected cell/s into
your chosen amount of columns and rows, it will
also offer (if more than one cell selected) to merge
the selected cells before the split.
-->Table AutoFormat: This command will open the
Microsoft Word Table AutoFormat dialogue box,
where you can choose from a number of different
table templates, including preset fonts and cell
background colours (colors).
-->Convert: This command will convert existing
text into a table format. The text will have to have a
common separator to indicate the different columns,
it will also needs new paragraphs where you would
like each row.
-->Sort: This opens the Sort Table dialogue box.
You can choose which column you would like to
sort and by what order.
APPLICATION :
SUMMARY : Thus, format,tools and table menu is very useful for making document attractive.
ASSIGNMENT/ : (1) Explain mostly used commands of format menu in word.
QUESTION (2) Explain mostly used commands of tools menu in word.
(3) Explain mostly used commands of table menu in word.
REFERENCE :
NEXT LESSON : Introduction of EXCEL & File menu
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Motivation : Window & dos base program like typing tutor ,Ms-Office etc.
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Introduction to excel Microsoft excel is a spreadsheet software and a --> What is the use of
Microsoft excel?
software of microsoft office suite. It is used to store
numeric data very easily. You can also add formula --> Explain different ways to
and function to analyze the data. You can also add start excel
graphics like charts to manipulate the data very
easily. Excel files called workbook. Each workbook
has three worksheets. Worksheets are the are where
you can enter data in tabular format. Each worksheet
have 255 columns and 65536 rows. Excel files are
saved using .xls extension. Microsoft excel is used
for creating marksheets, payroll of employees,
production reports for companies. You can start
excel by start->all programs->Microsoft office->
Microsoft excel. You can also open excel by typing
“excel” in run menu. Excel screens have different
areas like title bar, menu bar, standard toolbar,
formatting toolbar, formula bar, worksheet etc.
File menu -->New... Opens a new Excel Workbook. --> What is the use of
-->Open... Opens many types of Excel documents, new,open,save command ?
even text files.
-->Close: Closes the current Workbook. --> Explain page setup,print
-->Save As... Saves your Workbook under a preview,print area.
different name or different format.
-->Page Setup Controls how your page prints out.
-->Print Area: Is how you specify the part of your
worksheet that you wish to print.
-->Print Preview Shows you what your document
looks like before you waste paper printing out
something that doesn't look the way you want it to.
-->Print... Prints the selected area, current
Worksheet all Worksheets in your Workbook.
Properties Allows you to look up or add detailed
information about your document.
Below this is a list of the files opened recently by
Excel.
--> Exit Closes Excel and all open Workbooks.
APPLICATION :
SUMMARY : Thus, Microsoft excel is very useful software for calculations on data.
ASSIGNMENT/ : (1) Write short note on Microsoft excel
QUESTION (2) Explain mostly used commands of file menu.
REFERENCE :
NEXT LESSON : Edit, View & Insert Menu
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Insert menu --> Cells: Inserts new cells into your worksheet, --> What is use of chart?
prompting you to ask how you would like to move
--> What is use of pagebreak?
the surrounding cells out of the way.
--> Rows : Inserts a new row above the selected --> What is the use of
cell(s). function?
-->Columns: Inserts a new column to the left of the
selected cell(s).
--> Worksheet: Inserts a new Worksheet, with its tab
to the left of that of the selected Worksheet.
--> Chart... Launches the Chart Wizard to help you
insert a chart based on given data within your
Worksheet.
--> Page Break: Inserts a page break above the
selected cell(s).
--> Function: Launches the Function Wizard to
insert a function based on given given data within
your Worksheet. Picture: Inserts a Clip Art, an
image file, WordArt or acquires a new file from a
scanner.
--> Object: Inserts an object such as a Windows
Media Player video or other OLE (Object Linking
and Embedding) compatible file.
--> Hyperlink : Inserts a link to a specified website
or file location. If you click on the link, you will be
brought to that location.
APPLICATION :
SUMMARY :
ASSIGNMENT/ : (1) Explain mostly used commands of edit menu in excel.
QUESTION (2) Explain mostly used commands of view menu in excel.
(3) Explain mostly used commands of insert menu in excel.
REFERENCE :
NEXT LESSON : Format , Tool And Data menu of EXCEL
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Row And Column:- This option is use to set How can you set row height
height and width of the cell should be adjustable as or column width ?
per data.You can also hide Row and Column.
Sheet :- Using this option, User can gives the Is it possible to set back
name to sheet as per its requirement and also set ground image to sheet ?
background picture for the sheet and tab color. User How?
can hide the sheet using this option.
Auto Format:- It is a collection of different How can you set Auto format
inbuilt formats for sheet with designs and different of sheet in excel?
colors.
Auto correct :- It’s automatically corrects the E.g. Spelling ‘The’ is type
spellings or word if we specify it in auto correct Like “ Teh” then it will
option. automatically converted in to
“ The“ if we already added
that spelling into this option.
Macro:- If you perform a task repeatedly in excel E.g. If you often enter long
, you can automate the task with a macro. It is a text strings in cells, you can
series of command and functions that are stored in create a macro to format
Microsoft Visual Basic modules and can be run those cells so that the text
when ever you need to perform the task. wraps.
Sort :- Use to sort data according to specific sort How can you arrange data in
DATA MENU : order like ascending or descending. particular order ?
If data in one column will be same then it
will checks the 2nd and 3rd column which we specify
in sort option of data menu.
Filter :- We can filter data as per our E.g. In result sheet we have to
requirement. Sheet contains different cell values in see only those rows which
different rows but if we want to see particular cells contains “Science” as a
which contains same value or value to above or stream then it should be
below to specific criteria , then it should be done possible with filter option.
only with filter option.
E.g. In mark sheet , percen-
Validation :- We can specify the particular rules tage must be between 1 to
for particular cell using this option. 100 so if any one can enter
Above or below value , it
Text to Column :- User can converts the text display error like “The val- ue
data into column automatically using this option you entered is not valid.
Topic / Aim Introduction to power point & File , Edit , View menu.
Objective 1. A universally designed presentation enhances student learning by presenting
information in a variety of formats , text , images , and multimedia.
2. To create useful and proper presentation so that any persons can understand it
easily.
Aids Marker pen , duster , pointer.
Preparation
Review
Introduction Power point is the presentation graphics program that helps you create lasting visual
impact either in person or online. With enhanced multimedia support , save your
presentation to storage device for distribution and play streaming audio and video within a
slide show.
Motivation To create presentation like Business strategy , science and technology etc…
Presentation
Topics Information Points To Tell Spot Hint / Questions (Ask)
Introduction To Power point is a very powerful software using What Is Power Point ?
Power point : which we can create suitable presentation , slides on
particular topics.
It becomes very easy to present
data on a computer using the power point software.
View Show :- We represent our presentation in What is the short cut key of
SLIDE SHOW full screen view using this option. The short cut key slide show ?
MENU : for this option is F5.
Set up Show :- We sets how many slides have to What is the use of Action
display and also sets slide show resolution using this Buttons ?
option.
Action Buttons :- We add different buttons
icons like next , previous , home etc.. using this
option.
After adding buttons specify hyperlink for
that button. So when we click on that button during
slide show , we moves on slide which set into How we can apply animation
hyperlink. to our content ?
Data V/S Information Data From Latin Word “Datum” and -->Difference Between Data
Information From Latin Word “ Informare” and Information
Data is Formatted Information and
Information is result of Data Processing
Data may be meaningful and Information
must be Meaningful
Data consider as system input and
Information Consider as Data Output
Data is Basic Raw materials and
Information is Product.
Data require to process for understanding
and No need to require for Information
Database Collection of Information with proper -->what is Database?
format
Collection of Arranged data in format --> Why Database?
Collection of Table
DBMS Full form of DBMS -->what is DBMS ?
Maintaining Different Types of Information --> what is Full form of
Example.Foxpro,dbase etc. DBMS ?
Advantages of DBMS Packages -->Explain Advantages of
1. Complex Relationship DBMS
2. Data redundancy
3. User Define Table Form
4. Maintain Dictionary
5. Automatic Backup And Recovery
Topic / Aim : Rules for designing good tables, Data Integrity Constraints and Relationships in tables.
Objective : (1)Rules for Designing Table
(2) Data Integrity constraints
(3)Relationship In Table.
Aids : Chalk, Duster, Pointer.
Preparation :
* Review :
* Intoduction : Designing Good Table With Relationship.
Motivation : Data integrity in Relationship of Tables.
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Rules for Designing Field name Must be Between 0 to 255 --> What is Table?
Table Characters.
Select proper Data type of Field. -->what is Row and Column?
Set the primary key. For NO-Duplication
Set Default Value . For Blank Value --> What are the rules of
Set Validation of Field Table Designing ?
Set Format of Number Field
Set Yes of Field for Data Must Be entered
Set validation text for Validation Error
Data Integrity What is Data Integrity ? -->what is Data Integrity?
Constraints Primary key -->what is Primary key?
Check Constraints --> what is Check Constraints
Default Constraints ?
Foreign Key -->What is Default
Unique Constraints Constraints ?
-->What is Foreign Key?
--> What is Unique Key?
Relationship In Table What is Relationship ? -->what is RDBMS ?
Explain Types of Relation ship --> what is Relationship?
1. One – to –one --> Explain Types of
2. One – to – many Relationship.
3. Many –to –many
4. Many – to – one
APPLICATION :
SUMMARY : Rules of Designing Table with Data Integrity and Relationship
ASSIGNMENT/ : (1) Explain Rule of Designing Table .
QUESTION (2) Explain Data integrity .
(3) Difference Between Primary key and Foreign key
(4) Explain Check, Default and Unique Constraints
Create Database and Select Blank Database of File menu Or Task -->How to Create Database in
Store database Panel Ms-Access ?
Store The Database with Database name In
Storage Drive
Create Table by Select table Object and Create Table by -->write steps of create table
Using Wizard using Wizard by using wizard
Select the table type business or personal
Select table and set the Fields as required
Store the table with name and enter the data
in the table
Create Table By Select the table object and create table by -->write the steps for create
Entering Data using entering data table by entering data
You can directly entered the data in the
sheet
APPLICATION :
SUMMARY : Create Database and Table in Ms-Access
ASSIGNMENT/ : (1) How to Awaking in Ms-Access?.
QUESTION (2) How To Create Database in Ms-Access ?
(3) Explain Data types In Ms-Access.
(4) Explain Types Of Create Table.
(5) How to create table in Design View?
(6) Explain Properties of Data Types.
(7) Write Steps for Create table by using Wizard.
(8) Write steps For Create Table By Entering Data.
REFERENCE : Complete Reference of Microsoft Access - 2007
NEXT LESSON : . Creating Queries & Forms
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
operation.
--> Select the fields that you need on your form and
click "Next". In this case, we only need the user to
enter first name and last name, so we choose those two
fields:
APPLICATION :
SUMMARY : Queries are used to do task and forms are collectors of multiple objects.
ASSIGNMENT/ : (1) What is the full form of DBMS?
QUESTION (2) What is Query and Form?
(3) Explain Query creation.
(4) Explain form creation.
REFERENCE : .
NEXT LESSON :
Creating Report Using Different Views
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Use the Report Wizard You can also use the Report Wizard to create a report.
The Report Wizard provides you with more flexibility
than you get by using the Report button. You can
choose the tables and fields, group the data, sort the
data, summarize the data, choose a layout and
orientation, apply a style, and title your report. Follow
the steps shown here to create a report by using the
Report Wizard:
APPLICATION :
SUMMARY : Reports organize and summarize data for viewing online or for printing.
ASSIGNMENT/ : (1) What is the Report?
Topic / Aim : Introduction to network, Client Server & Peer to Peer Network
Objective : 1) Networking.
2) Client and Server.
3) Peer to Peer Network.
Aids : Chalk, Duster, Pointer.
Preparation : Importance of Networking in Computing Environment..
* Review :
* Intoduction : Networking.
Motivation :
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Network A computer network or data network is a --> What is the Network?
telecommunications network that allows computers to
exchange data. In computer networks, networked
computing devices pass data to each other along data
connections. Data is transferred in the form of packets
Topic / Aim : Understanding concepts of Proxy Server, Firewall Server & Network Topologies
Objective : (1) Server Details
(2) Different Types of Servers & Network Topologies
(3) Difference between Proxy , Firewall and other Servers
Modem Modem stands for MOdulator DEModulator. --> What is full form of
Modem is known as Data Phone. Modem?
It is used to send and receive data to the
computer using phone line. --> Why it is used?
It is Asynchronous device. Types of Modem.
Types of modems are internal modem,
external modem and removable modem.
Switch Switch is used to connect more than one Where we use switch?
computer in a LAN.
According to the speed of network we use Types of Switch.
switches.
For better work more than one switch can be
connected to network which is called daisy
chaining.
It works on datalink layer.
Routers Router is a physical device which is used in Types of router.
network layer. Protocol used for routing of
It is called as a Gateway device. packets.
In network Wireless and Wired both routers
are used.
It works like switch and bridge in which it
filters packets and used to connect two
networks.
Router divides network logically.
Topic / Aim : Understanding Network Cables, Wireless Networking & Blue Tooth Technology
Objective : (1) Types of cables.
(2) Wireless technology
(3) Bluetooth technology.
Aids : Chalk, Duster, Pointer.
Preparation :
* Review :
* Intoduction : Networking Cables and Mediums.
Motivation :
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Network Cables Networking cables are used to connect one Types of Network Cables.
network device to other network devices or
to connect two or more computers to
share printer, scanner etc.
Different types of network cables
like Coaxial cable, Optical fiber
cable, Twisted Pair cables are used
depending on the
network's topology, protocol and size.
Twisted pair cabling is a form of wiring in
which pairs of wires are twisted together for
the purposes of canceling out
electromagnetic (EMI) from other wire pairs
and from external sources. This type of cable
is used for home and
corporate Ethernet networks.
An optical fiber cable consists of a center
glass core surrounded by several layers of
protective material. The outer insulating
jacket is made of Teflon or PVC to prevent
interference. It is expensive but has higher
bandwidth and can transmit data over longer
distances.
Coaxial lines confine the electromagnetic
wave to area inside the cable, between the
center conductor and the shield. The
transmission of energy in the line occurs
totally through the dielectric inside the cable
between the conductors.
Wireless Networking Using Infrared Signals or Radio Frequency What is Wireless
Signals connect computer or any other Technology?
device in the home or any other place is What is Ad-hoc Network?
called Wireless Networking.
Two types of Wireless LANs are there. (1)
Infrastructure Network (2) Ad-hoc Network.
Wireless Network mediums are Radio
Waves and Microwave.
Network Protocol: TCP/IP (Transmission Control Protocol) --> To which OSI layer does
TCP is known as a connection- TCP/IP protocol belong?
oriented protocol, which means that a
connection is established and maintained until --> What is the full form of
the application programs at each end have SMTP ?
completed exchanging messages.
FTP (File Transfer Protocol): This is a --> Explain FTP protocol.
popular way to transfer files from machine to
machine across a network.
SMTP (Simple Mail Transfer Protocol): It's
a set of communication guidelines that allow
software to transmit email over the Internet.
HTTP (Hyper Text Transfer Protocol):
HTTP is the underlying protocol used by
the World Wide Web.
POP (Post Office Protocol): POP is an
application layer internet standard protocol
used by local e-mail clients to retrieve e-mail
from remote server over a TCP/IP connection.
Logical And Physical Logical Address: An address generated by -->What is the Logical
Addresses: the CPU is commonly referred to as a logical a Address?
logical address. The set of all logical addresses
generated by a program is known as logical --> What is the Physical
address space. Address?
Physical Address: Address seen by the
memory unit- that is, the one loaded into the
memory-address register of the memory- is
commonly referred to as physical address. The
set of all physical addresses corresponding to
the logical addresses is known as physical
address space.
Classes Of Network: Class A: The high-order bit in a class A -->What is the range of
address is always set to zero. The next seven Class B IP Address?
bits (completing the first octet) complete the
network ID. The remaining 24 bits (the last -->Which Class is reserved
three octets) represent the host ID. for multicast addresses?
Class B:.The two high-order bits in a class B
address are always set to binary 1 0. The next
14 bits (completing the first two octets)
complete the network ID. The remaining 16
bits (last two octets) represent the host ID.
Class C: The three high-order bits in a class C
address are always set to binary 1 1 0. The next
21 bits (completing the first three octets)
complete the network ID. The remaining 8 bits
(last octet) represent the host ID.
Class D: Class D addresses are reserved for IP
multicast addresses. The four high-order bits in
a class D address are always set to binary 1 1 1
0. The remaining bits are for the address that
interested hosts recognize.
APPLICATION :
SUMMARY : OSI reference model is to make networks more manageable and to aid the problem
of moving data between computers.And communications protocol is a system of
digital rules for data exchange within or between computers.
ASSIGNMENT/ : (1) What is the full form of SMTP ?
QUESTION (2) What is the Logical Address?
(3) Explain layer of OSI model
(4) What is the full form of OSI?
REFERENCE :
NEXT LESSON : Concepts of FIREWALL & DHCP Server
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Concept Of DHCP • Dynamic Host Configuration Protocol --> What is the full form of
Server • Standard protocol DHCP?
• Defined by RFC 1541 (superseded by RFC
2131) --> What is DHCP ?
• Runs over UDP
• Utilizing ports:
67 – connections to server
68 – connections to client
• Extension of BOOTP (protocol used for simple
interaction)
• Uses client–server model
• support of dynamic allocation of Network
Addresses
• IP addresses are assigned on-demand
• Avoid manual IP configuration
• Support mobility of laptops
Benefits Of DHCP: Configuration is reliable
Reduced effort.
Central control.
No duplicate IP addresses.
Easy to update.
Benefits to the clients.
APPLICATION : Firewalls are software programs or hardware devices that filter the traffic that flows
into you PC or your network through a internet connection. They sift through the
data flow & block that which they deem (based on how & for what you have tuned
the firewall) harmful to your network or computer system.
SUMMARY : A firewall is a system designed to prevent unauthorized access to or from a private
network or also controls the incoming and outgoing network traffic
ASSIGNMENT/ : (1) What is firewall??
QUESTION (2) What is the full form of DHCP?
(3) What is DHCP ?.
(4) Explain Benefits of DHCP.
REFERENCE :
NEXT LESSON : Concept of Internet, Web Browser, Search Engines & E-Mail Communication
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Topic / Aim : Concept of Internet, Web Browser, Search Engines & E-Mail Communication
Objective : (1) Services provided by Internet.
(2) Access Internet
Aids : Chalk, Duster, Computer with Internet connectivity
Preparation :
* Review :
* Intoduction : Internet Services & Application
Motivation : Internet is very famous nowadays for satisfying people with various services related to
each and every different field. It is a very versatile facility which can help you in
completing many tasks easily and conveniently with few clicks.
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
Introduction Of The Internet is the physical connection of Ex.
Internet & history millions of networks. 1. Apply for jobs or schools
It’s the first mass medium that involves 2. Fill out government
computers and uses digitized data. forms
ARPANET was the network that became the 3. Check bank accounts
basis for the Internet 4. Communicate with
loosely hierarchical “network of networks” family, friends and co-
Uses TCP/IP protocols and packet workers
switching. 5. Do research
How To Access Internet: 6. Learn new skills
Computer 7. Read news
Modem 8. Watch videos
Telephone Connection
Shell or TCP/IP account from the
ISP
Internet browser.
WWW(World Wide WWW is the acronym for the World Wide -->What is Full Form Of
Web): Web. WWW?
It is also commonly known as ‘The Web’.
The WWW is hypertext based information
retrieval tool.
The World Wide Web (The Web) is only a
portion of what makes up the internet, but it
is the fastest growing part of the interne
The functionality of the WWW is based on
3 main standards:
URL (Universal Resource Locator)
HTML (Hypertext Markup Language)
HTTP (Hypertext transfer Protocol)
Terminology : ISP(Internet Service Provider): Provide --> What is full form of ISP?
Internet Connection
Browser: programs used to explore the -->What is URL?
Internet.
Home Page: First hypertext Document. --> What is full form of
Internet Protocol: Defines rules and HTML?
conventions for communication between
network devices -->What is full form of
Hypertext: www is based on this term. HHTP?
HTML: Used to create Web pages.
--> Give name of popular
HTTP: Hypertext transfer Protocol
web browser.
URL: Universal Resource Locators
Web Browser A web browser or Internet browser is a Ex .Internet Explorer,
software application for retrieving, Netscape, Mozilla, Firefox,
presenting, and traversing information Opera
resources on the World Wide Web
Search Engine: A Web Search Engine is designed to Ex. Google, Yahoo
search for information on the World Wide
Web.
The search results are generally presented in
a line of results often referred to as search
engine results pages (SERPs).
Email Electronic mail, most commonly referred to Ex. Different e-mail service
Communication: as email or e-mail. providers
It is a method of exchanging digital • GMail
messages from an author to one or more • Yahoo Mail
recipients. Modern email operates across • Hot Mail
the Internet or other computer networks.
APPLICATION : The Internet changed our life enormously; there is no doubt about that. The computer
is a fix part of every modern office, companies, schools etc and also at our home and
the greatest part has also an access to the Internet.
SUMMARY : The Internet is a global system of interconnected computer networks
ASSIGNMENT/ : (1)Explain Application Of Internet.
QUESTION (2)What is Full Form Of WWW?
(3)Give Different Web browser name.
REFERENCE :
NEXT LESSON : Concept of Cloud Storage & Internet Security
GOVERNMENT INDUSTRIAL TRAINING INSTITUTE, SIRAULIGAUSPUR, BARABANKI
LESSON PLAN
Types of security
Network layer security
Motivation : Improve content accessibility, provide more flexibility and control in the specification of
presentation characteristics, enable multiple pages to share formatting, and reduce
complexity and repetition in the structural content.
Presentation :
Spot hints /
Topics Information Points Tell
Question (Ask)
About CSS Cascading Style Sheets (CSS). --> What is the full form of
CSS?
Cascading Style Sheets (CSS) is a style
sheet language used for describing the look --> What is use of CSS?
and formatting of a document written in a
markup language. --> What are the advantages
of CSS?
CSS is designed primarily to enable the
separation of document content from
document presentation, including elements
such as the layout, colors, and fonts.
It can also be used to allow the web page to
display differently depending on the screen
size or device on which it is being viewed.
Before CSS, nearly all of the presentational
attributes of HTML documents were
contained within the HTML markup; all font
colors, background styles, element
alignments, borders and sizes had to be
explicitly described, often repeatedly, within
the HTML.
How to insert CSS? External style sheet: An external style --> What is External and
sheet is ideal when the style is applied to Internal style sheet?
many pages. With an external style sheet,
you can change the look of an entire Web --> What is the use of
site by changing just one file. multiple style sheets?
Internal style sheet : An internal style sheet
should be used when a single document has
a unique style. You define internal styles in
the head section of an HTML page, inside
the <style> tag.
Inline styles : An inline style loses many of
the advantages of a style sheet (by mixing
content with presentation). To use inline
styles, add the style attribute to the relevant
tag. The style attribute can contain any CSS
property.
Multiple style sheet : If some properties
have been set for the same selector in
different style sheets, the values will be
inherited from the more specific style sheet.
Terminology : Selectors: Selectors are needed to complete --> What are selectors?
an entire line of CSS code. These are what
we declare to set what type of element we --> What is style?
are targeting.
Styles: Styles define how to display HTML
elements
You have learned how to use CSS to add backgrounds, format text, add and format
borders, and specify padding and margins of elements.
What is Threats ?
Risk Management Definition of risk management: "Risk management
is the process of identifying vulnerabilities and
threats to the information resources used by an
organization in achieving business objectives, and What is Risk Analysis?
deciding what countermeasures, if any, to take in
reducing risk to an acceptable level, based on the ->How Risk communication
value of the information resource to the is useful ?
organization."[7]
Risk Assesment
->Risk analysis
(1)Defining Threats
(2)Defining Vulnerability
(3)Defining Risk Types
->Risk Evaluation
Risk Treatment.
->Risk Avoidance
->Risk Reduction
->Risk Transfer
->Risk Retention
Risk Acceptancee
Risk Communication
Terminology : Threat:- In computer security a threat is a possible --> What is Risk evaluation ?
danger that might exploit a vulnerability to breach
security and thus cause possible harm.
Vulnerability:- a vulnerability is a weakness
which allows an attacker to reduce a system's
information assurance.
APPLICATION :
SUMMARY : information security as applied to computing devices such as computers and
smartphones, as well as computer networks such as private and public networks,
including the whole Internet.
ASSIGNMENT/ : (1) What is the Risk Management?
QUESTION (2) What is Cyber Security ?
(3) Explain step of Risk assessment .
REFERENCE : www.Wikipedia.com
NEXT LESSON :