0% found this document useful (0 votes)
110 views97 pages

It Workshop Lab Manual

The IT Workshop Lab Manual outlines the curriculum for B.Tech first-year students, focusing on practical skills in PC hardware, operating systems, internet usage, and productivity tools like LaTeX and Microsoft Word. It includes detailed instructions for lab activities, safety guidelines, and course objectives aimed at providing hands-on experience with engineering materials and tools. The manual also specifies assessment methods and resources for further learning.

Uploaded by

csedsa23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
110 views97 pages

It Workshop Lab Manual

The IT Workshop Lab Manual outlines the curriculum for B.Tech first-year students, focusing on practical skills in PC hardware, operating systems, internet usage, and productivity tools like LaTeX and Microsoft Word. It includes detailed instructions for lab activities, safety guidelines, and course objectives aimed at providing hands-on experience with engineering materials and tools. The manual also specifies assessment methods and resources for further learning.

Uploaded by

csedsa23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 97

DEPARTMENT OF CSE- CyS, DS, (AI & DS)

B.TECH I YEAR- II SEM

IT WORKSHOP LAB MANUAL

Prepared by:

Mr. Srinivasa Rao Duggineni,


Asst. Professor,
CSE- CyS, DS,(AI&DS)
Table of contents

S.No Content Pg.No

PC Hardware
1.
i. Identify the peripherals of a computer, components in
a CPU and its functions. Draw the block diagram of 1-5
the CPU along with the configuration of each
peripheral and submit to your instructor.
ii. Every student should individually install MS windows
5-23
on the personal computer using Virtual Machine. Lab
instructor should verify the installation and follow it
up with a Viva.
iii. Every student should install Linux on the computer
using Virtual Machine. This computer should have
windows installed. The system should be configured 23-26
as dual boot with both Windows and Linux. Lab
instructors should verify the installation and follow it
up with a Viva

2. Internet & World Wide Web

i. Web Browsers, Surfing the Web: Students customize


their web browsers with the LAN proxy settings, 26-27
bookmarks, search toolbars and pop-up blockers. Also,
plug-ins like Macromedia Flash and JRE for applets
should be configured.

ii. Search Engines & Netiquette: Students should know


what search engines are and how to use the search 27-35
engines. A few topics would be given to the students for
which they need to search on Google. This should be
demonstrated to the instructors by the student.

iii. Cyber Hygiene: Students would be exposed to the


various threats on the internet and would be asked to
35-45
configure their computer to be safe on the internet. They
need to customize their browsers to block pop ups, block
active x downloads to avoid viruses and/or worms.

3. LaTeX and WORD


i. Word Orientation: The mentor needs to give an
overview of LaTeX and Microsoft (MS) office or
equivalent (FOSS) tool word: Importance of LaTeX 45-57
and MS office or equivalent (FOSS) tool Word as
word Processors, Details of the four tasks and features
that would be covered in each,
ii. Using LaTeX and word – Accessing, overview of
toolbars, saving files, Using help and resources,
rulers, format painter in word. Using LaTeX and
Word to create a project certificate. Features to be 57-71
covered- Formatting Fonts in word, Drop Cap in
word, Applying Text effects, Using Character
Spacing, Borders and Colours, Inserting Header and
Footer, Using Date and Time option in both LaTeX
and Word.
iii. Creating project abstract Features to be covered-
Formatting Styles, inserting table, Bullets and 71-76
Numbering, Changing Text Direction, Cell alignment,
Footnote, Hyperlink, Symbols, Spell Check, Track
Changes.
iv. Creating a Newsletter: Features to be covered- Table
of Content, Newspaper columns, Images from files 76-83
and clipart, Drawing toolbar and Word Art,
Formatting Images, Textboxes, Paragraphs and Mail
Merge in word.
PowerPoint
i. Students will be working on basic power point utilities
and tools which help them create basic power point
83-86
presentations. PPT Orientation, Slide Layouts, Inserting
Text, Word Art, Formatting Text, Bullets and
Numbering, Auto Shapes, Lines and Arrows in
PowerPoint.
ii. Interactive presentations - Hyperlinks, Inserting –
Images, Clip Art, Audio, Video, Objects, Tables and
Charts,Master Layouts (slide, template, and notes), Types 87-88
of views (basic, presentation, slide slotter, notes etc), and
Inserting – Background, textures, Design Templates,
Hidden slides.
1. INSTRUCTIONS FOR LABORATORY – (Do’s & Don’ts)

Computer Lab DO’s

1. Read and understand how to carry out an experiment / activity thoroughlybefore coming
to the laboratory.
2. Report any broken plugs or exposed electrical wires and any rectificationneeded, to
your faculty/staff immediately.
3. Know the location of the fire extinguisher and the first aid box and have an
understanding of how to use them in case of an emergency.
4. Report fires or accidents to your Faculty / Staff immediately.

5. Students have to come in formal wear and wear ID cards.


6. Should bring observation books and lab records for each lab session.

Computer Lab Don’ts

1. Do not open the system unit casing or monitor casing particularly unless you are agreed
to do so and under supervision of Faculty / Staff. Some internal components hold
electrical voltages of up to 30000 volts, which can be fatal.
2. Avoid stepping on electrical wires or any other computer cables.
3. Do not insert any material and particularly metal objects such as clips, pinsand needles
into computer casings. They may cause fire / electric shock.
4. Do not touch, connect or disconnect any plug or cable without your Faculty / Staff
permission /assistance.
5. Do not remove anything from the computer laboratory without permission.

6. Do not disobey the instructions given and cause problems.


7. Do not eat or drink in the laboratory.
8. Any external storage device for loading / copying can be used only withprior permission
from the lab-in charges.
9. Browsing internet during the Academic Schedules is prohibited
Course Objectives

 To provide hands-on experience about use of different engineering

materials, tools, equipment and processes those are common in the

engineering field.

 To study different hand operated power tools, uses and their demonstration.

 To provide training on PC Hardware, Installation of Operating system,

Internet & World Wide Web .

 To study productivity tools including Word, PowerPoint, and Publisher.


LAB SYLLABUS

IT WORKSHOP:
1. PC Hardware
i. Identify the peripherals of a computer, components in a CPU and its functions. Draw the block
diagram of the CPU along with the configuration of each peripheral and submit to your
instructor.

ii. Every student should individually install MS windows on the personal computer using Virtual
Machine. Lab instructor should verify the installation and follow it up with a Viva.

iii. Every student should install Linux on the computer using Virtual Machine. This computer
should have windows installed. The system should be configured as dual boot with both
Windows and Linux. Lab instructors should verify the installation and follow it up with a Viva
2. Internet & World Wide Web
i. Web Browsers, Surfing the Web: Students customize their web browsers with the LAN proxy
settings, bookmarks, search toolbars and pop-up blockers. Also, plug-ins like Macromedia Flash
and JRE for applets should be configured.

ii. Search Engines & Netiquette: Students should know what search engines are and how to use
the search engines. A few topics would be given to the students for which they need to search
on Google. This should be demonstrated to the instructors by the student.

iii. Cyber Hygiene: Students would be exposed to the various threats on the internet and would
be asked to configure their computer to be safe on the internet. They need to customize their
browsers to block pop ups, block active x downloads to avoid viruses and/or worms.
3. LaTeX and WORD
i. Word Orientation: The mentor needs to give an overview of LaTeX and Microsoft (MS) office
or equivalent (FOSS) tool word: Importance of LaTeX and MS office or equivalent (FOSS) tool
Word as word Processors, Details of the four tasks and features that would be covered in each,
Using LaTeX and word – Accessing, overview of toolbars, saving files, Using help and
resources, rulers, format painter in word.
ii. Using LaTeX and Word to create a project certificate. Features to be covered- Formatting
Fonts in word, Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and
Colours, Inserting Header and Footer, Using Date and Time option in both LaTeX and Word.

iii. Creating project abstract Features to be covered- Formatting Styles, inserting table, Bullets
and Numbering, Changing Text Direction, Cell alignment, Footnote, Hyperlink, Symbols, Spell
Check, Track Changes.

iv. Creating a Newsletter: Features to be covered- Table of Content, Newspaper columns,


Images from files and clipart, Drawing toolbar and Word Art, Formatting Images, Textboxes,
Paragraphs and Mail Merge in word.
4. PowerPoint
i. Students will be working on basic power point utilities and tools which help them create basic
power point presentations. PPT Orientation, Slide Layouts, Inserting Text, Word Art,
Formatting Text, Bullets and Numbering, Auto Shapes, Lines and Arrows in PowerPoint.

ii.Interactive presentations - Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects,
Tables and Charts,Master Layouts (slide, template, and notes), Types of views (basic,
presentation, slide slotter, notes etc), and Inserting – Background, textures, Design Templates,
Hidden slides.
Course Outcomes

After completion of the course, the student should be able to

CO-3: Understand Hardware components, Operating system and inter


dependencies Safeguard computer systems from viruses/worms

CO-4: Apply the basic knowledge on Document/PowerPoint Preparation

Bibliography

TEXT BOOKS:
IT Essentials PC Hardware and Software Companion Guide, Davis Anfinson
and Ken Quamme, 3rd Edition, CISC Press, Pearson Education

PC Hardware and A+ Handbook, Kate J. Chase, PHI (Microsoft)

REFERENCES:
1. LaTeX Companion, Leslie Lamport, PHI/Pearson
2. The Complete Computer Upgrade and Repair Book, 3rd Edition, Cheryl
A. Schmidt, Wiley Dreamtech
3. Introduction to Information Technology, ITL Education Solutions limited,
Pearson Education

ONLINE RESOURCES:

https://www.youtube.com/watch?v=ctAVC2JwEwI
https://www.youtube.com/watch?v=ZXAPCy2c33o
ASSESSMENT

Internal Assessment (40 M):

Staff should maintain the assessment register and Head of the department should

monitor it.

Template of internal marks

Day to day evaluation 10

Practical Examinations & Viva 20


(1 & 2)
Laboratory Record 10

Total 40

External Assessment (60 M):

Exam will be conducted at the end of Lab


Experiment 1:

(i) Identify the peripherals of a computer,

Computer peripherals are external devices that connect to and extend the functionality of a computer, including input
devices like keyboards and mice, output devices like monitors and printers, and storage devices like hard drives and flash
drives.

Here's a more detailed breakdown of common computer peripherals:

Input Devices:

Keyboards: Used for typing text and commands into the computer.

A keyboard is an input device used to enter text and commands into a computer or other
electronic device, featuring a set of keys arranged in a specific layout like QWERTY, allowing
users to type letters, numbers, and symbols.

Function:
 Input Device
 Character Input
 Command Execution
Key Types :
 Alphanumeric Keys
 Control Keys
 Function Keys
 Navigation Keys
 Numeric Keypad
 Special Keys
 Modifier Keys
Mice: Used for navigating the screen and interacting with graphical elements.

A computer mouse is a handheld input device used to control a cursor on a computer screen, allowing users
to navigate and interact with a graphical user interface (GUI) by clicking buttons, scrolling, and moving the
cursor.

Function:
 Pointing
 Clicking
 Scrolling
 Dragging
Types of Mice:
 Mechanical Mice
 Optical Mice
 Wireless Mice
 Wired Mice

IT Workshop Lab Manual Page 1


Microphones: Used for audio input, such as recording voice or participating in online calls.

A microphone, or "mic" for short, is a transducer that converts sound waves into electrical signals,
allowing you to capture and transmit audio.

Purpose: Microphones capture sound vibrations (sound waves) and transform them into electrical
signals that can be recorded, amplified, or transmitted.

How it works:The sound waves cause a diaphragm (a thin, flexible membrane) inside the microphone to vibrate. These
vibrations are then converted into electrical signals by the microphone's internal mechanism.

Webcams: Used for video input, such as video conferencing or recording videos.

A webcam – short for ‘web camera’ – is a digital camera that’s connected to a computer. It can send live
pictures from wherever it’s sited to another location by means of the internet. Many desktop computer
screens and laptops come with a built-in camera and microphone, but if yours doesn’t, you can add a
separate webcam at any time.
There are various types. Some are plugged into computers through USB ports, but others are wireless (wifi). Other features
might include:
 an integral microphone
 the ability to pan and tilt
 in-built sensors that can detect movement and start recording
 a light that, when on, will let you know that the camera is in use.
Scanners: Used to convert physical documents into digital images.

A scanner is a device that converts physical documents, images, or objects into a digital format,
allowing them to be stored, edited, and shared electronically.

A scanner is commonly known as an input device that captures magazine pages, texts, posters and
photographic prints through computer software. Scanners are hand-held devices that help in
scanning objects in both black-and-white and colour images.

Scanners can be used for printing high-resolution printings that are commonly used for different purposes like education,
work etc. High-resolution scanners are capable of assisting people with detailed and meticulous details for implementing
them for proper purposes. Scanners are generally software-operated and come with features like resizing and modifying
pictures and documents based on the purpose of the scanning.

Output Devices:

 Monitors: Display information from the computer to the user.

A computer monitor is an output device that displays visual information, like text, images, and videos, generated by a
computer, acting as the primary interface for users to see and interact with the computer's output.

Types:
LCD (Liquid Crystal Display): The most common type, known for their thin, lightweight design and good image
quality.
LED (Light Emitting Diode): Uses LED backlighting for LCD panels, offering better brightness and energy efficiency.
OLED (Organic Light Emitting Diode): Offers excellent contrast, color accuracy, and fast response times, but can be
more expensive.
CRT (Cathode Ray Tube): Older technology, bulky, and less common now.

 Printers: Used to print documents and other materials.

IT Workshop Lab Manual Page 2


A printer is a device that accepts text and graphic output from a computer and transfers it to a medium, usually
paper, creating a physical copy of the digital content. Printers come in various types, including inkjet, laser, thermal,
and 3D printers, each utilizing different technologies to produce printed output.

Types:

Inkjet Printers: Use ink cartridges to spray tiny droplets of ink onto paper, forming text and images.
Laser Printers: Employ a laser beam to create an image on a drum, which is then transferred to paper using toner (a
dry ink).
Thermal Printers: Use heat to transfer images from a heat-sensitive paper or film, commonly used for receipts and
labels.
3D Printers: Create three-dimensional objects by layering materials, like plastic or metal, based on a digital design.
Dot Matrix Printers: Impact printers that use pins to strike a ribbon and create an image on paper, characterized by a
dot-matrix pattern.
Impact vs. Non-Impact:
Impact Printers: (like dot matrix) physically strike the paper to create an image.
Non-Impact Printers: (like inkjet and laser) use non-physical methods to create the image, such as spraying ink or
using a laser beam.
 Speakers: Used for audio output, such as playing music or hearing sound effects. A speaker, or loudspeaker, is a
device that converts electrical signals into sound waves, allowing you to hear audio from various devices

 Headphones: Used for personal audio output. Headphones are small speakers worn over or in the ears to allow
private listening to audio, converting electrical signals into sound, and come in various types like over-ear, on-ear,
and in-ear models.

 Projectors: Used to display images and videos on a large screen. A projector is an output device that displays images
or videos onto a surface, like a screen or wall, by projecting light through a lens, making it suitable for presentations,
movies, and other visual displays.

Storage Devices:

 Hard Disk Drives (HDDs): Used for storing large amounts of data.

 Solid State Drives (SSDs): Used for storing data, offering faster performance than HDDs.

 Flash Drives (USB Drives): Portable storage devices for transferring data between computers.

 CD/DVD Drives: Used for reading and writing optical discs.

 Modems: Used for connecting to the internet.

 Graphics Cards: Used for processing and displaying graphics and video.

 RAM: Random Access Memory, used to store data and instructions that the computer is currently using.

InputAll the data received by the computer goes through the input
unit. The input unit comprises different devices like a mouse,
keyboard, scanner, etc. In other words, each of these devices acts as
a mediator between the users and the computer.

The data that is to be processed is put through the input unit. The
computer accepts the raw data in binary form. It then processes the
data and produces the desired output.

Input

IT Workshop Lab Manual Page 3


All the data received by the computer goes through the input unit. The input unit comprises different devices like a mouse,
keyboard, scanner, etc. In other words, each of these devices acts as a mediator between the users and the computer.

The data that is to be processed is put through the input unit. The computer accepts the raw data in binary form. It then
processes the data and produces the desired output.

CPU – Central Processing Unit

Central Processing Unit or the CPU, is the brain of the computer. It works the same way a human brain works. As the brain
controls all human activities, similarly the CPU controls all the tasks.

Moreover, the CPU conducts all the arithmetical and logical operations in the computer.

Now the CPU comprises of two units, namely – ALU (Arithmetic Logic Unit) and CU (Control Unit). Both of these units work in
sync. The CPU processes the data as a whole.

ALU – Arithmetic Logic Unit

The Arithmetic Logic Unit is made of two terms, arithmetic and logic. There are two primary functions that this unit
performs.

1. Data is inserted through the input unit into the primary memory. Performs the basic arithmetical operations on it,
like addition, subtraction, multiplication, and division. It performs all sorts of calculations required on the data. Then,
it sends back data to the storage.

2. The unit is also responsible for performing logical operations like AND, OR, Equal to, Less than, etc. In addition to
this, it conducts merging, sorting, and selection of the given data.

CU – Control Unit

The control unit as the name suggests is the controller of all the activities/tasks and operations. All this is performed inside
the computer.

The memory unit sends a set of instructions to the control unit. Then the control unit in turn converts those instructions.
After that these instructions are converted to control signals.

These control signals help in prioritizing and scheduling activities. Thus, the control unit coordinates the tasks inside the
computer in sync with the input and output units.

Memory Unit

All the data that has to be processed or has been processed is stored in the memory unit. The memory unit acts as a hub of
all the data. It transmits it to the required part of the computer whenever necessary.

The memory unit works in sync with the CPU. This helps in faster accessing and processing of the data. Thus, making tasks
easier and quicker.

There are two types of computer memory-

Primary Memory

This type of memory cannot store a vast amount of data. Therefore, it is only used to store recent data. The data stored in
this is temporary. It can get erased once the power is switched off. Therefore, is also called temporary memory or main
memory.

RAM stands for Random Access Memory. It is an example of primary memory. This memory is directly accessible by the CPU.

IT Workshop Lab Manual Page 4


It is used for reading and writing purposes. For data to be processed, it has to be first transferred to the RAM and then to the
CPU.

Secondary Memory

As explained above, the primary memory stores temporary data. Thus it cannot be accessed in the future. For permanent
storage purposes, secondary memory is used. It is also called permanent memory or auxiliary memory. The hard disk is an
example of secondary memory. Even in a power failure data does not get erased easily.

(ii) install MS windows on the personal computer using Virtual Machine.

VirtualBox a free and open-source virtualization software by Oracle is used to run various operating systems within your
existing Windows 10 environment. This enables you to test new software, explore different operating systems, or even run
legacy applications that might not be compatible with your current system.
Virtualization essentially creates a virtual machine a software program that mimics a physical computer. This virtual machine
can then run its operating system, separately from the host machine. This allows you to experiment with different operating
systems without affecting your primary system or provides a safe environment to test untrusted software. Here are some of
the key benefits of using VirtualBox:
 Install and run various operating systems like Linux, macOS, or older versions of Windows within your Windows 10
environment.
 Test new software or applications in a sandboxed environment without risking your main system.
 Keep legacy applications that might not be compatible with your current operating system functional.
 VirtualBox allows you to allocate specific resources like RAM and CPU cores to each VM optimizing resource
utilization.
Installing VirtualBox in Windows 10
Open your preferred web browser then navigate to the official VirtualBox download page. Under “Windows hosts” click
the link to download virtualbox for Windows 10.

2. Locate the
downloaded installer
file in

your Downloads folder or wherever you saved it. Double-click the installer file to launch the VirtualBox Setup Wizard. In
the welcome screen, click “Next” to proceed with the installation.

3. The next screen presents customization options for the virtual box installation which include:

IT Workshop Lab Manual Page 5


 VirtualBox will be installed in the C directory.
 Creates a shortcut icon for VirtualBox on your desktop for easy access.
 Creates an entry for VirtualBox in your Start menu.
 Network adapter allows you to choose the adapter that VirtualBox will use.
 USB option allows you to configure USB device access for virtual machines.

4. Once you’ve reviewed the customization options click “Next” to proceed then a Warning Network interface option
appears click “Yes” to proceed with the installation.
5. Ready to Install wizard appears, Click “Install” to begin the installation.

6. After the installation is complete, click “Finish” to complete the installation process.
Step 7: Get/Download the Windows 10 ISO File

IT Workshop Lab Manual Page 6


Get/Download the Windows 10 ISO File.- https://www.microsoft.com/en-us/software-download/windows10
Step 8. Start the Installation.

Step 9. Start Virtualbox.(launch the Software and Click New in the Manager Window.)

IT Workshop Lab Manual Page 7


Step 10. in the Create Virtual Machine Dialog Box Enter 'Windows 10' As the Name of the Operating System.

Step 11. Select Windows 10 As the Version. (Choose 'Windows 10 (64bit)' If You Have a 64-bit ISO).
Step 12. Hit Next, Then Set the Memory Size. Select the Amount of RAM.

Step 13. Create a Virtual Hard Drive. on the Following Screen Choose to 'Create a Virtual Hard Drive Now' and Click Create.

IT Workshop Lab Manual Page 8


Step 14. Accept VDI (VirtualBox Disk Image) As the Hard Drive File Type.

Step 15. You’ll Be Asked If You Want the New Virtual Hard Drive to Be Dynamically Allocated or a Fixed Size. Choose Any
Option and Click Next.

IT Workshop Lab Manual Page 9


Step 16. Enter File Location or Leave the Default Location and Select the Size of Virtual Machine in Megabytes. Then Click
Create and VirtualBox Will Begin Building the Drive.

Step 17. When Done,Select Created Virtual Machine and Then Click the Start Button in the Manager.

IT Workshop Lab Manual Page 10


Step 18. Select Your ISO As the Startup Disk. in the 'Select Start-up Disk' Window, Click the Folder Icon and Navigate to the
Windows 10 ISO.

IT Workshop Lab Manual Page 11


Step 19. Click Start and Windows 10 Should Begin to Load.

Step 20. Select Your Language Settings.

IT Workshop Lab Manual Page 12


Step 21. Click the 'Install Now' Button.

Step 22. Activate Windows by Entering a Product Key.

Activate windows by entering a product key. If you don't have product key click "I don't have a product Key". (You'll be
prompted to enter your license key but you can skip this step for now (useful if you don't actually have a Windows 10
key). Otherwise enter The Product Key.)
Select the Operating System You Want to Install and Click Next.

IT Workshop Lab Manual Page 13


IT Workshop Lab Manual Page 14
Step 23. Accept the License Terms.

Step 24. Choose the 'Custom: Install Windows Only (advanced)' Option.

Step 25. Choose the Drive Where You Want to Install Windows.

IT Workshop Lab Manual Page 15


Step 26. Click Next, and the Installation Process Will Begin.

IT Workshop Lab Manual Page 16


Step 27. Windows Restarts Automatically.

Step 28. Installation Continues.

IT Workshop Lab Manual Page 17


Step 29. Getting Device Ready.

Step 30. Just a Moment.

IT Workshop Lab Manual Page 18


Step 31. Choose Region and Click Yes.

Step 32. Select the Right Keyboard Layout and Click Yes.

Step 33. Add Second Keyboard Layout or Skip.

IT Workshop Lab Manual Page 19


Step 34. Connect to the Network or Choose "I Don't Have Internet".

Step 35. Click "continue With Limited Setup" or Connect Now.

Step 36. Enter Username Then Click Next.

IT Workshop Lab Manual Page 20


Step 37. Enter Password Then Click Next.

Step 38. Choose No or Yes to Continue.

Step 39. Choose Privacy Settings for Your Device and Click "Accept".

Step 40. Windows 10 Will Finalize Everything and You Can Begin Exploring.

IT Workshop Lab Manual Page 21


IT Workshop Lab Manual Page 22
Step 41: Installation Complete

If your computer successfully boots into Windows, you're all set to move on to the next step.

(iii) Every student should install Linux on the computer using Virtual Machine.
Install Ubuntu

Whether it was already there or you worked through the steps above, at this point you have Windows installed. Now use the
Ubuntu installation media you created earlier to boot into Ubuntu. Insert the media and boot your computer from it. Again,
the exact sequence of keys to access the boot menu varies from one computer to another, so check your documentation if
you're not sure. If all goes well, you see the following screen once the media finishes loading:

Here, you can select between Try Ubuntu or Install Ubuntu. Don't install just yet; instead, click Try Ubuntu. After it finishes
loading, you should see the Ubuntu desktop.

IT Workshop Lab Manual Page 23


By clicking Try Ubuntu, you opt to try out Ubuntu before you install it. Here, in Live mode, you can play around with Ubuntu
and make sure everything works before you commit to the installation. Ubuntu works with most PC hardware, but it's always
better to test it out beforehand. Make sure you can access the internet and get audio and video playback. Going to YouTube
and playing a video is a good way of doing all of that at once. If you need to connect to a wireless network, click on the
networking icon at the top-right of the screen. There, you can find a list of wireless networks and connect to yours.

Once you're ready to go, double-click on the Install Ubuntu 20.04 LTS icon on the desktop to launch the installer.

Choose the language you want to use for the installation process, then click Continue.

Next, choose the keyboard layout. Once you've made your selection, click Continue.

You have a few options on the next screen. You can choose a Normal or a Minimal installation. For most people, Normal
installation is ideal. Advanced users may want to do a Minimal install instead, which has fewer software applications installed
by default. In addition, you can choose to download updates and whether or not to include third-party software and drivers.
I recommend checking both of those boxes. When done, click Continue.

IT Workshop Lab Manual Page 24


The next screen asks whether you want to erase the disk or set up a dual-boot. Since you're dual-booting, choose Install
Ubuntu alongside Windows 10. Click Install Now.

The following screen may appear. If you installed Windows from scratch and left unallocated space on the disk, Ubuntu will
automatically set itself up in the empty space, so you won't see this screen. If you already had Windows 10 installed and it's
taking up the entire drive, this screen will appear and give you an option to select a disk at the top. If you have just one disk,
you can choose how much space to steal from Windows and apply to Ubuntu. You can drag the vertical line in the middle left
and right with your mouse to take space away from one and gives it to the other. Adjust this exactly the way you want it,
then click Install Now.

You should see a confirmation screen indicating what Ubuntu plans on doing. If everything looks right, click Continue.

Ubuntu installs in the background, but you still have some configuration to do. While Ubuntu tries its best to figure out your
location, you can click on the map to narrow it down to ensure your time zone and other things are set correctly.

Next, fill in the user account information: your name, computer name, username, and password. Click Continue when you're
done.

IT Workshop Lab Manual Page 25


Once the installation finishes, reboot your PC.
If all went according to plan, you should see a screen similar to this when your computer restarts. Choose Ubuntu or
Windows 10; the other options are for troubleshooting, so I won't go into them.
Try booting into both Ubuntu and Windows to test them out and make sure everything works as expected. If it does, you
now have both Windows and Ubuntu installed on your computer.

Setting up a web browser involves configuring proxy settings, bookmarks, toolbars, pop-up blockers, and plugins
for optimal functionality and security.

Experiment 2: Internet & World Wide Web


(i) Students customize their web browsers with the LAN proxy settings, bookmarks, search
toolbars and pop-up blockers.
Step 1: Configure LAN Proxy Settings
If your network requires a proxy server to access the internet, you'll need to configure your browser to
use it. This usually involves:

1. Opening your browser's settings (often found under a menu labeled "Settings," "Preferences," or a gear

icon).

2. Searching for "Proxy settings," "Network," or a similar term.

3. Entering the proxy server address and port number provided by your network administrator. This

information is usually provided by your school or workplace IT department.


Step 2: Manage Bookmarks

IT Workshop Lab Manual Page 26


Bookmarks save your favorite websites for easy access. Most browsers have a star icon or a "bookmark"
option to add a website to your bookmarks. You can organize bookmarks into folders for better
management.
Step 3: Customize Search Toolbars
Many browsers allow you to change the default search engine or add additional search toolbars. This is
usually done within the browser's settings under "Search Engine" or a similar option. You can choose
from various search engines like Google, Bing, DuckDuckGo, etc.
Step 4: Configure Pop-up Blockers
Pop-up blockers prevent unwanted pop-up windows from appearing. Most browsers have built-in pop-
up blockers that can be enabled or disabled in the browser's settings. Look for options related to "Pop-
ups," "Block Pop-ups," or similar terms.
Step 5: Install and Configure Plug-ins
Plug-ins extend browser functionality. For Macromedia Flash (now largely obsolete) and Java Runtime
Environment (JRE) for applets:

1. Check for necessity: Many modern websites no longer use Flash. Check if the websites you need to

access actually require Flash. If not, skip this step.

2. Download and install: If needed, download the appropriate plug-in from the official website (be

cautious of unofficial sources). Follow the installation instructions.

3. Enable the plug-in: In your browser's settings, find the section for plug-ins or extensions. Ensure that

Flash and JRE are enabled. Note that enabling Java can pose security risks, so only do this if absolutely

necessary.
Successfully customizing a web browser involves configuring LAN proxy settings (if needed), managing
bookmarks, choosing a search toolbar, enabling pop-up blockers, and installing and enabling necessary
plug-ins like JRE (with caution). Remember to always download software from trusted sources.

A search engine is a software system that provides hyperlinks to web pages and other relevant
information on the Web in response to a user's query. The user inputs a query within a web browser or a
mobile app, and the search results are often a list of hyperlinks, accompanied by textual summaries and
images.

(ii) Search Engines & Netiquette:

Using search engines

With billions of websites online today, there is a lot of information on the Internet. Search engines make
this information easier to find. Let's look at the basics of using a search engine, as well as some
techniques you can use to get better search results.

Search Engine Components Generally there are three basic components of a search engine as listed
below:
IT Workshop Lab Manual Page 27
1. Web Crawler

2. Database

3. Search Interfaces

Web crawler It is also known as spider or bots. It is a software component that traverses the web to
gather information.

Database All the information on the web is stored in database. It consists of huge web resources.

Search Interfaces This component is an interface between user and the database. It helps the user to
search through the database.

Search Engine Working

Web crawler, database and search interface are the major components of a search engine that actually
makes search engine to work. Search engines make use of Boolean expressions AND, OR, NOT to restrict
and widen the results of a search. Following are the steps that are performed by the search engine:

 The search engine looks for the keyword in the index for pre-defined database instead of going
directly to the web to search for the keyword.
 It then uses software to search for the information in the database. This software component is
known as web crawler.
 Once web crawler finds the pages, the search engine then shows the relevant web pages as a result.
These retrieved web pages generally include title of page, size of text portion, first several sentences
etc.

These search criteria may vary from one search engine to the other. The retrieved information is ranked
according to various factors such as frequency of keywords, relevancy of information, links etc.

User can click on any of the search results to open it.

How to search the Web

There are many different search engines you can use, but some of the most popular
include Google, Yahoo!, and Bing. To perform a search, you'll need to navigate to a search engine in
your web browser, type one or more keywords—also known as search terms—then press Enter on your
keyboard. In this example, we'll search for recipes.

IT Workshop Lab Manual Page 28


After you run a search, you'll see a list of relevant websites that match your search terms. These are
commonly known as search results. If you see a site that looks interesting, you can click a link to open it.
If the site doesn't have what you need, you can simply return to the results page to look for more
options.

Most browsers also allow you to perform a web search directly from your address bar, although some have a
separate search bar next to the address bar. Simply type your search terms and press Enter to run the search.

Search suggestions

IT Workshop Lab Manual Page 29


If you don't find what you're looking for on the first try, don't worry! Search engines are good at finding
things online, but they're not perfect. You'll often need to try different search terms to find what you're
looking for.

If you're having trouble thinking of new search terms, you can use search suggestions instead. These will
usually appear as you're typing, and they're a great way to find new keywords you might not have tried
otherwise. To use a search suggestion, you can click it with your mouse, or select it with the arrow keys
on your keyboard.

Refining your search

If you're still having trouble finding exactly what you need, you can use some special characters to help
refine your search. For example, if you want to exclude a word from a search, you can type a hyphen (-)
at the beginning of a word. So if you wanted to find cookie recipes that don't include chocolate, you
could search for recipes cookies -chocolate.

You can also search for exact words or phrases to narrow down your results even more. All you need to
do is place quotation marks (" ") around the desired search terms. For example, if you search
for recipes "sugar cookies", your search results will only include recipes for sugar cookies, instead of any
cookies that happen to use sugar as an ingredient.

IT Workshop Lab Manual Page 30


These techniques may come in handy in certain cases, but you probably won't need to use them with most searches.
Search engines can usually figure out what you're looking for without these extra characters. We recommend trying
a few different search suggestions before using this method.

Content-specific searches

There may be times when you're looking for something more specific, like a news article, picture, or video. Most
search engines have links at the top of the page that allow you to perform these unique searches.

In the example below, we've used the same search terms to look for images instead of websites. If you see an image
you like, you can click to visit the website it originally came from.

IT Workshop Lab Manual Page 31


You can use the extra search tools to narrow down your results even more. These tools will change based on the
type of content you're looking for, but in this example we can filter our images by size, color, image type, and
more. So if you wanted to find cookies with pink frosting, you could search for images that are mostly pink.

Advertisements

One final thing to note: Most search engines include advertisements with search results. For example,
you can see advertisements at the top of the search results below.

These ads are based on your search terms, and they often look similar to other search results. While they
may be useful in some cases, it's usually more helpful to focus on the actual search results.

IT Workshop Lab Manual Page 32


Understanding URLs

Every time you click a link on a website or type a web address into your browser, it’s a URL. URL stands
for Uniform Resource Locator. Think of it like a street address, with each portion of the URL as different
parts of the address, and each giving you different information. Let’s examine each component of a URL
and what we can learn from it.

Scheme

Every URL begins with the scheme. This tells your browser what type of address it is so the browser
connects to it correctly. There are many types of schemes, but for typical web browsing you will mostly
see http and https. Your browser usually won’t show the scheme in the address bar, and usually you
don’t need to type the scheme when typing a web address; instead, you can just begin with the domain
name. The scheme is still always part of the URL; it just isn’t being displayed.

Domain name

The domain name is the most


prominent part of a web address.
Typically, different pages on the
same site will continue to use the
same domain name. For example, all
pages on this site share the
GCFLearnFree.org domain name.

IT Workshop Lab Manual Page 33


Each segment of the domain name separated by a period is called a domain. The domain on the right is
called a top-level domain, with the
domain to the left of it called the second-
level domain, then third- level domain,
and so on.

You can often learn something


about the site from the domains. One of the domains usually identifies the organization, while the top-
level domain may give you more general information on what kind of site it is. For example, in the
domain name nc.gov, the .gov domain means it is a government website in the United States,
the nc domain identifies it as the website of North Carolina.

In most URLs, the www domain can be omitted. Google.com and www.google.com lead to the same
page. However, other subdomains cannot be omitted. For example, all pages
under news.google.com require the news subdomain in the URL.

File path

The file path—often just called the path—tells your browser to load a specific page. If you don’t specify
a path and only enter
a domain name, your browser is still
loading a specific page; it’s just
loading a default page, which
usually will help you navigate to
other pages.

URLs that end with the domain name without a file path usually will load a homepage or an index page
that's designed to help you navigate to specific pages on the site. Often, if you can’t remember the file
path for a specific page, you can go to the homepage and search for it.

Parameters

IT Workshop Lab Manual Page 34


Some URLs include a string of characters after the path—beginning with a question mark—called
the parameter string. You have
probably noticed this part of
a URL appear in your address bar
after performing a search on
Google or YouTube. The parameter
string can be clear or confusing to a
human user, but it is critical
information for the server.

Anchor

Also appearing after the path, the anchor tells your browser to scroll to or load a specific part of the
page. Usually
the anchor begins with a
hashtag and is used to direct
your browser to a specific part of a
very long page, much like a
bookmark.
Different anchors don’t load
different pages; they simply tell the browser to display different parts of the page.

A whole URL

When combined, these elements make up a URL, although not all URLs will have all five parts.

(iii) Students would be exposed to the various threats on the internet and would be
asked to configure their computer to be safe on the internet.

Cyber Hygiene:

Cyber hygiene is about developing good habits to protect yourself and your devices from online threats,
just like personal hygiene protects your physical health. Here's a breakdown of what you should know
and do:
1. Understand the Threats:

IT Workshop Lab Manual Page 35


 Malware:
This includes viruses, worms, and ransomware that can damage your computer or steal your data.
 Phishing:
Cybercriminals use fake emails or websites to trick you into revealing personal information or installing
malware.
 Social Engineering:
Attackers manipulate you into giving them access to your devices or information by appearing
trustworthy.
 Weak Passwords:
Easy-to-guess passwords can be easily cracked, giving attackers access to your accounts.
 Outdated Software:
Software with known vulnerabilities can be exploited by attackers.
2. Configure Your Computer for Safety:
 Install and Update Antivirus Software: Use a reputable antivirus program and keep it updated.
 Use a Firewall: A firewall acts as a gatekeeper, blocking unauthorized access to your computer.
 Update Software Regularly: Keep your operating system, web browser, and other software up to
date to patch security vulnerabilities.
 Use Strong, Unique Passwords: Create long, complex passwords for each online account.
 Enable Two-Factor Authentication (2FA): 2FA adds an extra layer of security by requiring a
second verification method, like a code sent to your phone, in addition to your password.
 Secure Your Wi-Fi Network: Use a strong password for your Wi-Fi router and enable encryption
(WPA2 or WPA3).
 Back Up Your Data: Regularly back up important files to an external hard drive or cloud storage
to protect against data loss.
 Be Cautious of Phishing Attempts: Don't click on suspicious links or open attachments from
unknown senders.
 Be Mindful of Social Media: Be cautious about what you share online and avoid posting
excessive personal information.
 Keep Your Devices Secure: Wipe your devices before donating or recycling them.

TYPES OF INTERNET THREATS

 Viruses
 Network Worms
 Trojans
 Spyware / Adware
 Other Malware
 Other Threats

Viruses

A virus is a program that replicates itself, usually by attaching itself to other files and programs. A worm
IT Workshop Lab Manual Page 36
is a program that does not infect other programs but makes copies of itself. Trojan horse programs do
not replicate nor make copies of themselves, but rely on other "manual" methods of distribution. We
use the term "viruses" on this page to cover all forms of infections.

Viruses are spread in a variety of ways. Some Examples:

• email attachments (such as Klez, Badtrans, MyParty)


• instant messaging links and attachments (such as Aplore)
• compromised web servers (such as Nimda)
• Usenet news groups
• Inernet Relay Chat channels
• floppy diskettes
• file downloads (many backdoor Trojans are embedded with other files)

All viruses are different. Some activate on a certain day, but remain dormant until then. Others begin
the attack as soon as the machine has been infected. Viruses can be very damaging and some are just
annoying.

More than 1,00,000 known viruses exists in the world today Several hundred new viruses are discovered
every month

Protecting from viruses:

A good way to protect yourself is to have a virus protection program and keep it up- to-date.
Before running a download from an unknown site, or opening an email attachment, always be sure to
scan it to ensure that it is not infected. If you do not know the source of a file do not open it. Even if
you know the person who sent you a file, if you were not expecting it you may want to contact them
before opening it. This is because many viruses automatically send themselves out to addresses it finds
in files on the infected computer.

Anti-virus program:
An anti-virus program is designed to protect your computer from possible virus infections. Most
viruses are designed to operate in the background in a way that the user will not notice. Virus protection
programs search for, detect, and attempt to remove these viruses.

IT Workshop Lab Manual Page 37


Anti-virus programs must be kept up-to-date in order for them to provide adequate protection. New
viruses are being created every day and your anti-virus program can't always predict what they will be
able to do or how they will work.

Due to the nature of the operating system, Linux, and other UNIX-like operating systems are not as
susceptable to viruses. Thus an anti-virus program is not necessary.

Network Worms

Network Worm is a Self-replicating Viruses that reside in the active memory of a computer. A worm is
a computer program that has the ability to copy itself from machine to machine. Worms use up
computer processing time and network bandwidth when they replicate, and often carry payloads that
do considerable damage. Worms send themselves out to the Internet from infected systems. Either
include tiny e-mail server or search for unprotected shared network drives to unload.

Trojan Programs:

Trojan, is a standalone malicious program that does not attempt to infect files unlike a computer
virus or replicate itself with the intent of infecting other computers unlike a computer worm. Trojan
horses can make copies of themselves, steal information, or harm their host computer systems

Trojan horses are often destructive programs that masquerade as benign applications. Unlike viruses
and worms, Trojan horses do not replicate themselves, but they can be just as destructive. One of the
most insidious types of Trojan horse is a program that claims to get rid of viruses but instead introduces
viruses onto the computer.

• Threats enabled by (/through) Trojans


◻ DDos attacks
◻ Data stealing
◻ Distributed spam eMails

Spyware / Adware:

• Cookies – Track you online

• Browser Hijackers – Changes default home page

• Tracking Cookies – Gathers info of web usage

• Trickles – Reinstalls spyware when deleted

• Keyloggers – Records anything you type! …. Etc.

Other malware:

IT Workshop Lab Manual Page 38


• Dos & DDos attacks

• Flooders

• FileCryptors & PolyCryptors

• Nukers … Etc.

Other Threats:

• Phishing

◻ Confidential information stealing by fraud emails & web sites (author falsified)

◻ Several millions of Phishing messages have been sent world wide

◻ Fastest growing threat today

• SPIM

◻ Instant Messaging SPAM

◻ Estimated: 4 billion SPIM's during 2004

Diagnosing Infections:

• Slow computer, system reboots


• Mouse moves by itself
• Browser goes to unexpected web sites
• Slow internet access
• Endless popup ads
• New desktop toolbars

Solutions to Overcome:

• Disabled antivirus scanner or firewall


• Check startup program group regularly for software you didn’t install
• Check Add/Remove programs for software you didn’t install (make a list of installed
items on a new machine and check the list regularly)
• Check running services monthly
• Check running processes in Task Manager
• Monitor open ports
• Monitor outgoing and incoming connections

Anti-Virus Software:

Antivirus software is used to prevent, detect, and remove malware, including but not limited to
the computer viruses, computer worms, Trojan horses, spyware and adware. Computer security,
including protection from social engineering techniques, is commonly offered in products and services

IT Workshop Lab Manual Page 39


of antivirus software companies.

Some of the Antivirus software’s

• Norton Anti-Virus
• McAfee Anti-Virus
• AVG Anti-Virus

INSTALLATION OF ANTI-VIRUS

Steps for installing antivirusSoftware

 Head over to the Microsoft Security Essentials page and download the software. Double-click on
the installer to begin the installation process.
 The installation should be pretty self-explanatory. Just follow the steps it gives you. Make sure
you've checked the box to turn on the Windows Firewallwhen prompted, and give the whole
thing a few minutes to install.
 When it's done, it will ask you to run a scan. Hit yes, and it will download the latest
virus definitions and run its first scan. All of this will take a few minutes, so just leave the program
alone and let it do its thing.
 When it's finished it's scan (hopefully without finding anything), it will begin monitoring your
computer. Click the "Change My Scan Schedule" button to schedule a regular scan of your
computer. I usually like to run mine on Sunday at 2:00 AM, when I know I'll be sleeping. Save
your settings and you're done!

Now, Microsoft Security Essentials will run in the background, constantly monitoring your computer
for any viruses. If it catches anything, it will let you know and tell you how to proceed. It will also run a
scan during the time you've scheduled it for, so make sure your computer's running at that time (in the
above case, Sunday at 2 AM). You can check to make sure it's running by going to your system tray in
the bottom-right corner and looking for the green castle icon.

Remember, good anti-virus software is important, but even more important is practicing safe
browsing habits. The best way to avoid viruses is to make sure you don't download them in the first
place. Don't click on anything that claims its anti-virus software unless you know where it came from,
don't click on any suspicious Facebook posts, and make sure that you don't click on any fake email
links. If you get an email from ebay.com, hover over the link and look at the bottom of your
screen to make sure it actually goes to somewhere at www.ebay.com—if it goes somewhere else,
it's probably going to harm your computer.

IT Workshop Lab Manual Page 40


Firewalls:

In very simple terms, a firewall is a device or program that allows you to monitor and control what comes
into and goes out of your network. Almost every major business will use a firewall to protect its internal
network from the outside world.

Traditionally firewalls were, and in many cases still are, very expensive, dedicated pieces of hardware
that use something called a "ruleset" to either allow or disallow connections through it. An effective
firewall will do this at the "packet" level, that is it looks at every piece of data, or packet, individually
before deciding to either allow it or drop it.

Firewall forces every piece of information entering or leaving the castle to pass over a single
drawbridge, where they could be inspected by the I/O police. The diagram below shows a very basic
small network and firewall.

Windows Firewall

A number of significant changes have been made to Windows Firewall (formerly called Internet
Connection Firewall or ICF) in Service Pack 2 - all designed to help improve computer security.

Prior to Service Pack 2, Windows XP shipped with the firewall disabled by default. Activating the firewall
meant having to either run a wizard or navigate through the Network Connections folder to turn it on
manually.

With installation of Service Pack 2, Windows Firewall is turned on by default, providing improved default
levels of protection on all new installations and upgrades. This also helps protect any new network
connections as they are added to the system.

How Windows Firewall Works

When someone on the Internet or on a network tries to connect to your computer, we call that attempt
an "unsolicited request." When your computer gets an unsolicited request, Windows Firewall blocks the
connection. If you run a program such as an instant messaging program that needs to receive
information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the
IT Workshop Lab Manual Page 41
connection. You should see a window like the one below.

Fig. 5. Firewall security alert


If you choose to unblock the connection, Windows Firewall creates an exception so that the firewall
won't bother you when that program needs to receive information in the future.

Allowing Exceptions - the Risks

Each time you allow an exception for a program to communicate through Windows Firewall, your
computer is made more vulnerable. To allow an exception is like poking a hole through the firewall. If
there are too many holes, there's not much wall left in your firewall. Hackers often use software that
scans the network looking for computers with unprotected connections. If you have lots of exceptions
and open ports, your computer can become more vulnerable.
To help decrease your security risk:
• Only allow an exception when you really need it.
• Never allow an exception for a program that you don't recognize.
• Remove an exception when you no longer need it.

Allowing Exceptions Despite the Risks

Sometimes you might want someone to be able to connect to your computer, despite the risk - such as
when you use VNC to let support staff to connect to your computer.

To add a program to the exceptions list

1. Click Start and then click Control Panel.


2. In the control panel, click Security Center, and then click Windows Firewall.
3. On the Exceptions tab, under Programs and Services, select the check box for the program
or service that you want to allow, and then click OK.

IT Workshop Lab Manual Page 42


If the program (or service) that you want to allow is not listed

1. Click Add Program.


2. In the Add a Program dialog box, click the program that you want to add, and then click OK. The
program will appear, selected, on the Exceptions tab, under Programs and Services.
3. Click OK.

If the program (or service) that you want to allow is not listed in the Add a Program dialog box click
Browse , locate the program that you want to add, and then double- click it. (Programs are usually
stored in the Program Files folder on your computer.) The program will appear under Programs , in the
Add a Program dialog box.

Reducing the Risks of Allowing an Exception

By default when you enable an exception it will unblock access from all computers that are on the same
network as you, e.g. the whole Internet. You can restrict this access to only those systems or networks
that you trust. You do this by changing the scope of the exception.

To change the scope of an exception

1. On the Exceptions tab, under Programs and Services, select the program or service that you
want to change the scope of, and then click Edit.
2. Click Change scope on Edit a Program.

IT Workshop Lab Manual Page 43


Fig. 7. Editing a program

3. Select Custom list in Change Scope. Then add the details of the hosts and/or networks you wish to
unblock.

Windows Update:

You might need to have a computer administrator account to perform some tasks. Windows Update is
the online extension of Windows that helps you keep your computer up to date. Microsoft offers
important updates-which include security updates and other critical issues—to help protect your
computer against new viruses and other security threats that can spread over the Internet or a network.
Other updates contain enhancements such as upgrades and tools that can help your computer run
more smoothly. Windows Update scans your computer and provides you with a tailored selection of
updates that apply only to the software and hardware on your computer.

Using Windows Update:

• To open Windows Update, click Start, click All Programs, and then click Windows Update.
• The first time you go to the Windows Update Web site, click Yes when prompted to install any
required software or controls.
• To use Windows Update, you need to establish a connection to the Internet.
• For more information, click Related Topics.

IT Workshop Lab Manual Page 44


Using Automatic Windows Update:

To turn on Automatic updates

You must be logged on as a computer administrator to complete this procedure.


1. Open SYSTEM, and then click the Automatic updates tab. – or – If you are running Windows
2000, click Start, point to Settings, click Control Panel, and then double- click Automatic
updates.
2. Click Automatic (recommended).
3. Under Automatically download recommended updates for my computer and install them,
select the day and time you want Windows to install updates.

Procedure:

• To open System, click Start, click Control Panel, click Performance and Maintenance, and then
click System.

• Automatic updates provides high-priority updates, which include security and other critical
updates that can help protect your computer. It's a good idea to visit the Windows Update Web
site (http://www.microsoft.com/) on a regular basis to get optional updates, such as
recommended software and hardware updates, that can help improve your computer's
performance.

Experiment 3: LaTeX and WORD

(i) overview of LaTeX and Microsoft (MS) office

LaTeX is a powerful typesetting system, especially for technical documents and mathematical content,
while Microsoft Office (or its FOSS equivalent, LibreOffice) is a general-purpose word processing
suite. LaTeX focuses on the quality of the final output, while MS Office prioritizes ease of use and
WYSIWYG (What You See Is What You Get) editing.

To work with LaTeX, we’ll need a TeX distribution and a LaTeX editor:

TeX distribution: This includes the LaTeX typesetting system as well as various tools and packages. Some
popular TeX distributions include Tex Live and MikTeX.

LaTeX editor: While it is possible for users to create LaTeX documents using a plain text editor (e.g.,
NotePad or NotePad++), specialized LaTeX editors provide a more user-friendly interface with features
like syntax highlighting and error checking. Some LaTeX editors include TeXShop (for macOS users);
TeXworks, TeXstudio, LyX (for both Windows and Linux users); or Overleaf (an online and collaborative
LaTeX editor that doesn’t require local software installation).

IT Workshop Lab Manual Page 45


LaTeX’s user interface is distinct from conventional word processors, as it relies on a markup
language for document creation rather than a graphical interface. While its learning curve may
appear steep for newcomers, it offers a unique level of control and precision in typesetting documents.
The above image shows the screenshot of TeXmaker opening a LaTeX template provided by IEEE for
conference proceedings:

The first step is to create a new LaTeX project. You can do this on your own computer by creating a new
.tex file; alternatively, you can start a new project in Overleaf.

Let’s start with the simplest working example, which can be opened directly in Overleaf:

\documentclass{article}
\begin{document}
First document. This is a simple example, with no extra parameters or packages included.
\end{document}

This example produces the following output:

Including title, author and date information


\documentclass[12pt, letterpaper]{article}
\title{My first LaTeX document}
\author{Hubert Farnsworth\thanks{Funded by the Overleaf team.}}
\date{August 2022}
\begin{document}
\maketitle
We have now added a title, author and date to our first \LaTeX{} document!
\end{document}
This example produces the following output:

IT Workshop Lab Manual Page 46


Bold, italics and underlining
Bold: bold text in LaTeX is typeset using the \textbf{...} command.
Italics: italicised text is produced using the \textit{...} command.
Underline: to underline text use the \underline{...} command.
Some of the \textbf{greatest}
discoveries in \underline{science}
were made by \textbf{\textit{accident}}.

Adding images

Adding images

1. Use the Insert Figure button( ), located on the editor toolbar, to insert an image into Visual
Editor or Code Editor.

2. Copy and paste an image into Visual Editor or Code Editor.

3. Use Code Editor to write LaTeX code that inserts a graphic.

\documentclass{article}
\usepackage{graphicx} %LaTeX package to import graphics
\graphicspath{{images/}} %configuring the graphicx package

\begin{document}
The universe is immense and it seems to be homogeneous,
on a large scale, everywhere we look.

% The \includegraphics command is


% provided (implemented) by the
% graphicx package
\includegraphics{universe}

There's a picture of a galaxy above.


\end{document}

IT Workshop Lab Manual Page 47


Creating lists in LaTeX
Unordered lists
Unordered lists are produced by the itemize environment. Each list entry must be preceded by
the \item command, as shown below:
\documentclass{article}
\begin{document}
\begin{itemize}
\item The individual entries are indicated with a black dot, a so-called bullet.
\item The text in the entries may be of any length.
\end{itemize}
\end{document}
This example produces the following output:

Ordered lists

Ordered lists use the same syntax as unordered lists but are created using the enumerate environment:
\documentclass{article}
\begin{document}
\begin{enumerate}
\item This is the first entry in our list.
\item The list numbers increase with each entry we add.
\end{enumerate}
\end{document}
This example produces the following output:

Adding math to LaTeX

One of the main advantages of LaTeX is the ease with which mathematical expressions can be
written. LaTeX provides two writing modes for typesetting mathematics:
 inline math mode used for writing formulas that are part of a paragraph
 display math mode used to write expressions that are not part of a text or paragraph and are
typeset on separate lines
\documentclass[12pt, letterpaper]{article}
\begin{document}
In physics, the mass-energy equivalence is stated
by the equation $E=mc^2$, discovered in 1905 by Albert Einstein.
\end{document}

IT Workshop Lab Manual Page 48


\documentclass[12pt, letterpaper]{article}
\begin{document}
The mass-energy equivalence is described by the famous equation
\[ E=mc^2 \] discovered in 1905 by Albert Einstein.

In natural units ($c = 1$), the formula expresses the identity


\begin{equation}
E=m
\end{equation}
\end{document}

When you create a document in Word, you can choose to start from a blank document or let a template
do much of the work for you. From then on, the basic steps in creating and sharing documents are the
same. And Word's powerful editing and reviewing tools can help you work with others to make your
document great.

Some of the MS-Office Versions are:

Microsoft Office for Windows (Office 1.0) (1990)


Microsoft Office for Mac (Office 1.0) (1990)
Microsoft Office 1.5 for Mac (1991)
Microsoft Office 3.0 for Windows (Office 3.0) (1992)
Microsoft Office 4.x (Office 4.0, 4.2, 4.3) (1994-1995)
Microsoft Office 95 (Office 7.0) (1995)
Microsoft Office 97 (Office 8.0) (1996)
Microsoft Office 2000 (Office 9.0) (1999)
Microsoft Office XP (Office 10.0) (2001)
Microsoft Office 2003 (Office 11.0) (2003)
Microsoft Office 2007 (Office 12.0) (2007)
Microsoft Office 2010 (Office 14.0) (2010)
Microsoft Office 2013 (Office 15.0) (2013)
Microsoft Office 2016 (Office 16.0) (2015)
Microsoft Office 2019 (2018)
Microsoft Office 2021 (2021)
Office 365 (2011-Present)

IT Workshop Lab Manual Page 49


Start a document
Each time you start Word, you can choose a template from the gallery, click a category to see more
templates, or search for more templates online.
For a closer look at any template, click it to open a large preview.
If you'd rather not use a template, click Blank document.
Open a document
Every time you start Word, you'll see a list of your most recently used documents. If the document you're
looking for isn't there, select Open.
If you're already in Word, click File > Open and then browse to the file's location.
Save a document
To save a document for the first time, do the following:
1. On the File tab, click Save As.
2. Browse to the location where you'd like to save your document.
Note: To save the document on your computer, choose a folder under This PC or click Browse. To save
your document online, choose an online location under Save As or click Add a Place. When your files are
online, you can share, give feedback and work together on them in real time.
3. Click Save.
Note: Word automatically saves files in the .docx file format. To save your document in a format other
than .docx, click the Save as type list, and then select the file format that you want.
Formatted text
Formatted text can draw the reader's attention to specific parts of a document and emphasize important
information. In Word, you have several options for adjusting text, including font, size, and color. You can
also adjust the alignment of the text to change how it is displayed on the page.
To change the font size:
1. Select the text you want to modify.
2. On the Home tab, click the Font Size drop-down arrow. Select a font size from the menu. If the
font size you need is not available in the menu, you can click the Font Size box and type the
desired size, then press Enter.
3. The font size will change in the document.

IT Workshop Lab Manual Page 50


You can also use
the Grow
Font and Shrink Font commands to change the font
size.

To change the font:


By default, the font of each new document is set to Calibri. However, Word provides many other fonts
you can use to customize text.
1. Select the text you want to modify.

2. On the Home tab, click the drop-down arrow next to the Font box. A menu of font styles will
appear.
3. Select the font style you want to use.

IT Workshop Lab Manual Page 51


4. The font will change in the document.

When creating a professional document or a document that contains multiple paragraphs, you'll want to
select a font that's easy to read. Along with Calibri, standard reading fonts include Cambria, Times New
Roman, and Arial.
To change the font color:
1. Select the text you want to modify.

IT Workshop Lab Manual Page 52


2. On the Home tab, click the Font Color drop-down arrow. The Font Color menu appears.

3. Select the font color you want to use. The font color will change in the document.

Your color choices aren't limited to the drop-down menu that appears. Select More Colors at the bottom
of the menu to access the Colors dialog box. Choose the color you want, then click OK.

To use the Bold, Italic, and Underline commands:


The Bold, Italic, and Underline commands can be used to help draw attention to important words or
phrases.
1. Select the text you want to modify.

IT Workshop Lab Manual Page 53


2. On the Home tab, click the Bold (B), Italic (I), or Underline (U) command in the Font group. In our
example, we'll click Bold.

3. The selected text will be modified in the document.

To change text case:


When you need to quickly change text case, you can use the Change Case command instead of deleting
and retyping text.
1. Select the text you want to modify.

2. On the Home tab, click the Change Case command in the Font group.
3. A drop-down menu will appear. Select the desired case option from the menu.

IT Workshop Lab Manual Page 54


4. The text case will be changed in the document.

To highlight text:
Highlighting can be a useful tool for marking important text in your document.
1. Select the text you want to highlight.

2. From the Home tab, click the Text Highlight Color drop-down arrow. The Highlight Color menu
appears.

3. Select the desired highlight color. The selected text will then be highlighted in the document.

IT Workshop Lab Manual Page 55


To remove highlighting, select the highlighted text, then click the Text Highlight Color drop-down
arrow. Select No Color from the drop-down menu.

If you need to highlight several lines of text, changing the mouse into a highlighter may be a helpful
alternative to selecting and highlighting individual lines. Click the Text Highlight Color command, and
the cursor changes into a highlighter. You can then click and drag the highlighter over the lines you want
to highlight.
To change text alignment:
By default, Word aligns text to the left margin in new documents. However, there may be times when
you want to adjust text alignment to the center or right.
1. Select the text you want to modify.

2. On the Home tab, select one of the four alignment options from the Paragraph group. In our
example, we've selected Center Alignment.

3. The text will be realigned in the document.

IT Workshop Lab Manual Page 56


In Microsoft Word, the Format Painter lets you copy formatting (like font, size, color, and paragraph
styles) from one piece of text or a shape to another, saving you time and effort.
Here's how to use it:
 Select the formatted text or shape: Highlight the text or shape with the formatting you want to
copy.
 Click Format Painter: Go to the Home tab, find the Format Painter button (it looks like a
paintbrush) in the Clipboard group, and click it once.
 Apply the formatting: Select the text or shape where you want to apply the copied formatting.
 Double-click for multiple applications: To apply the formatting to multiple selections, double-
click the Format Painter button before selecting the text.
 Turn off Format Painter: Click the Format Painter button again or press the Esc key to turn off the
feature.
(ii) Using LaTeX and Word to create a project certificate.
https://www.overleaf.com/project online Latex Compiler

\documentclass[16pt,a4paper]{scrartcl} %class
\usepackage[landscape,left=2cm,right=2cm,top=2cm,bottom=2cm]{geometry} %for layout
\usepackage{setspace} % for spacing between lines
\usepackage{graphicx} %for including images
\usepackage{eso-pic} %package for including background image
\usepackage{color}
\definecolor{a}{rgb}{0,0.08,0.45}

\definecolor{red}{rgb}{0.5,0,0}
%---------------------------------------------------------------
\newcommand\BackgroundPic{
\put(0,0){
\parbox[b][\paperheight]{\paperwidth}{%
\vfill
\centering

IT Workshop Lab Manual Page 57


\includegraphics[width=\paperwidth,height=\paperheight,
keepaspectratio]{} % here include background image
\vfill
}}}
%----------------------------------------------------------------
%=============================
\usepackage{datatool} % This package is required to include database file as .csv
\DTLloaddb{name}{data.csv} % data.csv includes information from database
%=============================
%=============================
\def\signature#1#2{\parbox[b]{1in}{\smash{#1}\vskip12pt}
\hfill \parbox[t]{2.8in}{\shortstack{\vrule width 2.8in height 0.4pt\\\small#2}}}
\def\sigskip{\vskip0.4in plus 0.1in}
\def\beginskip{\vskip0.5875in plus 0.1in}
%=============================
\begin{document}
\AddToShipoutPicture{\BackgroundPic} % here background image is called
%=============================
\DTLforeach{name}{
\name=Name, \dep=Dep, \photo=photo}{
%=============================
\noindent
\begin{minipage}[l]{1.5in}
\includegraphics[width=.92\linewidth]{logo.png} %Here include left side image
\end{minipage}
\hfill
%=============================
\begin{minipage}[c]{6.5in}
{\centering
{\onehalfspacing
{\LARGE\bfseries\color{a}VNR Vignana Jyothi Institute of Engineering and Technology}\\
{\bfseries\color{red}(An Autonomous Institute, Bachupally, Hyderabad, Telangana)}\\

}}
\end{minipage}
\hfill
%=============================
\begin{minipage}[r]{1.0in}
\includegraphics[width=1.2\linewidth]{\photo} %here include right side image
\end{minipage}
\hfill

IT Workshop Lab Manual Page 58


%=============================
\noindent
\begin{minipage}[l]{1.5in}
\end{minipage}
\hfill
%=============================
\begin{minipage}[c]{6.5in}
{\centering
{\doublespacing
{\LARGE\bfseries\color{a} Certificate}\\
{\LARGE\bfseries\color{a} Of}\\
{\LARGE\bfseries\color{a} (Project Completion)}\\
}}
\end{minipage}
\hfill
%=============================
\begin{minipage}[r]{1.0in}
\end{minipage}
\hfill

%=============================

\vspace{4cm}
\doublespacing
\noindent{{\bfseries This is to certified that {{\underline{\name}}} student of {{\underline{\dep}}}
department
of VNR VJIET,Hyderabad has successfully completed Semester Project work on the day \underline{ 15 },in
the month of \underline{ June }, the year\underline{ 2024 }.
}}
\noindent
%\beginskip
{\singlespacing
\vfill
\begin{minipage}[l]{2.8in}
\sigskip \signature{}{\bfseries\color{a} Mr. D.Srinivasa Rao \\ \bfseries\color{a} Co-ordinator }
\end{minipage}
\hfill
\begin{minipage}[c]{2.8in}
\sigskip \signature{}{\bfseries\color{a} Mr. Srikanth Reddy \\ \bfseries\color{a} Co-ordinator }
\end{minipage}
\hfill
\begin{minipage}[r]{2.8in}

IT Workshop Lab Manual Page 59


\sigskip \signature{}{\bfseries\color{a} Dr.T. Sunil Kumar \\ \bfseries\color{a} Professor and HOD }
\end{minipage}}
%=============================
\pagebreak
}
\end{document}

data.csv
Name Dep photo
CSE-(DS,CyS) and AI
Rajdeep & DS img/image1.jpeg
CSE-(DS,CyS) and AI
Reena & DS img/image2.jpeg
CSE-(DS,CyS) and AI
Rajan verma & DS img/image3.jpeg
CSE-(DS,CyS) and AI
Sham kumar & DS img/image4.jpeg
CSE-(DS,CyS) and AI
Rita Verma & DS img/image1.jpeg

Instructions to execute the above code:

 Create and Upload above CSV file into Latex Environment


 Create a Folder as img and keep some student images into that folders and Upload this folder into
environment.
 Upload logo of college into environment.

IT Workshop Lab Manual Page 60


IT Workshop Lab Manual Page 61
The following guide will explain two simple ways to create a certificate in Microsoft Word:

1. Using a certificate template — This is the easier way to generate certificates in Word. All you
need to do is choose a template and edit the text.
2. Without using a template — This is a lengthier method since you’re starting with a blank page.
You must choose every design element, from borders to text boxes, and fix the alignment.

Create a certificate using a Word template


Using Microsoft Word templates is one of the quickest ways to create certificates for most occasions. It is
free, customizable, and offers a considerable number of pre-made templates.

This step-by-step guide will teach you how to create a certificate in Word with a template.
Step 1: Open a new Word document
Launch the Microsoft Word application from your Desktop or the taskbar. Once you’ve opened the
application, you’ll see a blank document. If you don’t, click on File, and from the side menu, click
on New on the Home tab to open a fresh document for editing.

Create a New Word Document

IT Workshop Lab Manual Page 62


Step 2: Search for certificate templates
Click in the Search box on the New screen, type “certificate” and press Enter. This will display a bunch
of certificate templates for you to pick from.

Search through Templates

Next, select a certificate template that fits your requirements and click Create. It should now open the
template as a new document.

Select a Template

IT Workshop Lab Manual Page 63


Step 3: Customize your template
You can now start customizing your selected template. Select the Design tab on the topmost menu, and
under Page Borders, go to the second tab: Page Border.

Design Your Template

Unable to find your preferred border? Click on Custom under Setting, and select your favorite border
design. Finally, click OK to apply your chosen border.

Does your organization have specific brand colors? If so, it's recommended to select your brand colors
for your certificates. To do this, under the Design tab, expand the Colors option.

Next, hover over a theme that best fits your brand colors. Select your theme and Save changes. This
action will automatically change the default colors on your certificate template to the chosen theme.

Adjust the Colors

IT Workshop Lab Manual Page 64


Step 4: Edit certificate content
Once you’ve finalized the design, you must now edit the text. Word lets you change the text font, color,
size, and spacing.

To edit content:
 Start by updating the certificate title. Click inside the title box to edit.
 In the Home tab, you can find the current font style and size. Click on the font name to access a
drop-down menu. Scroll down and choose your favorite font. You could also change the font size
if you’d like.

Add Your Desired Text

 Type your personalized text, such as “Certificate of Award,” “Certificate of Achievement,” etc. Add a
message to highlight the recipient’s achievements and more.
 Repeat the same steps for the rest of the content on your template.
You now have your very own certificate that’s ready to download and send.

Your Final Product

Create a certificate without using a Word template

IT Workshop Lab Manual Page 65


If you’re creative, Microsoft Word also lets you design certificates without using templates. However,
since you’re starting with a blank canvas, this method is more complex.
Step 1: Launch a new Word document and choose a layout
Open and launch a new blank Word document. Once opened, select the Layout tab on the topmost
menu. Under Orientation, select Portrait or Landscape as the preferred certificate configuration. We’ve
chosen Portrait for this example.

Adjust the Document Layout

Step 2: Choose and add borders


Once you’ve selected your certificate’s orientation, start adding borders.

Like the previous method, under the Design tab, select Page Borders. Now, in the pop-up menu,
select Page Border and choose either Style or Art (for professional certificates, choose only Style).

Select your preferred border color under the Color dropdown, and choose the line width. Finally, select
the Box option under Setting, and click on OK to apply the changes.

Add Borders
Step 3: Add text boxes for certificate content

IT Workshop Lab Manual Page 66


Your certificate will need a ton of text boxes for various elements, such as title, message, participant
name, date, signature, etc.

To add a text box, under the Insert tab of the main menu, click on Text Box and select Simple Text Box.
Next, start placing text boxes on your blank canvas, and modify content using your preferred font styles,
sizes, colors, and more.

Once complete, you can save and preview the certificate. Download the file to print your certificate once
you’re satisfied with your design.

AIM: To create a document applying the above mentioned techniques.


Hardware Requirements: Personal Computer

Software Requirements: Operating System, MS Office Package (MS- Word Application)

MS- WORD 2007:

 The HOME Tab includes commands related to the Clipboard, font selections, paragraph

settings, and styles and editing.

 The INSERT tab includes what you need to add pages, tables, illustrations, links, headers and
footers, text objects, and symbols in your document.

 The PAGE LAYOUT tab contains the commands for working with themes page backgrounds,

and paragraph spacing in your document.

 The REFERENCES tab includes special elements you will use when you create longer or
more complete documents.

 The MAILINGS tab is a new addition in the Office Word 2007 interface. Here you can find

everything you need to creating, previewing, and producing a mail merge project.

Ribbons or Tool Bars:

IT Workshop Lab Manual Page 67


Creating and Saving a File:

The Office Button is the round icon at the top left-hand corner. It includes the

basic File Functions from the older version of Office

New, Open, Save, Save As, Print, etc.

Click on the Office Button icon. You will see the main file functions in the pull-down
menu.

From these options you can Create a File, you can open existed files, save a file, Save

As option to save another copy with another name, print option, close option, etc.

Rulers and Scroll Bars:

Ruler and Scroll Bar (Top) Ruler and Scroll Bar (Bottom)

IT Workshop Lab Manual Page 68


Status Bar

THEORY:

Drop cap: To create a large dropped initial capital letter

Header and Footer:


1. To create a header, enter text or graphics in the header area or click button on the

header and footer tool bar.

2. To create footer, click switch between header and footer.

3. Then click exit.

Border:

On the format menu, click borders and shadings.


To specify that the border appears on a particular side of a page, such as only at the top, click

custom under setting.

To specify a particular page or section for the borders to appear, click the option you

want to apply. To specify the exact position of the border on the page.

Finally, click OK.

IT Workshop Lab Manual Page 69


Color:

Select the text you want to make a different color.

To apply the color most recently applied to text, click font color.

To apply different colors, click the arrow on the right of the font color button, select the color

you want and then click the button.

Result: Creation of project Certificate using MS Word completed successfully by applying different
options.

Procedure:

1. Insert Date from “Date and Time” Option.

2. Form Field – Text Form Field


a. To display the Forms toolbar, point to Toolbars on the View menu, and then click Forms.
b. In the document, click where you want to insert the form field. c. Click
Text Form Field.

3. Form Field – Drop-Down Form Field


a. In the document, click where you want to insert the form field. b. Click
Drop- Down Form Field.
c. If needed, a user can scroll through the list to view additional choices.

d. To edit these fields, you must use the Form Field Options button on the

Forms toolbar.

4. Form Field – Check Box Form Field

IT Workshop Lab Manual Page 70


a. In the document, click where you want to insert the form field. b. Click
Check Box Form Field.
c. To edit these fields, you must use the Form Field Options button on the

Forms toolbar.

5. Mail Merge

a. On the Tools menu, point to Letters and Mailings, and then click

Mail Merge.

b. Word displays the Mail Merge task pane.


(iii) Creating project abstract Features to be covered:-Formatting Styles, Inserting table,

Bullets and Numbering, Changing Text Direction, Cell alignment, Footnote,

Hyperlink, Symbols, Spell Check, Track Changes.

AIM:

To create a document applying the above mentioned techniques.

Software Requirement: MS-WORD

Hardware Requirement: Personal computer

THEORY:

Table:

A table consists of rows and columns.

Cell Alignment:

Aligns contents written in a table in the top left corner or top right corner
or in the center etc...

Foot Note:

Foot notes are used to comments on, or provide references for text in a document.

Hyperlink:

It is a colored and underlined text or a graphic that you click to go to a file, a location in
a file, an HTML page on the World Wide Web, or an HTML page in an intranet.

Symbols:
You may not be able to enter certain symbols into your word document, as there is a
limitation on the keys on the key board. Creating these new symbols especially when

IT Workshop Lab Manual Page 71


working with mathematical terms it becomes very difficult .For example we can insert
symbols such as≡,≈, ,..
Spell check:

It automatically checks for spelling and grammatical errors

Bullets and Numbering:

In Microsoft word we can easily create bulleted or numbered list of items.

Formatting Styles:
o A style is a set of rules to be followed for the effective document.
o Style can be applied to text, paragraph, table or a list.

Changing text direction:

You can change the text orientation in drawing objects, such as text boxes, shapes,
and callouts, or in table cells so that the text is displayed vertically or horizontally.

Track changes:

A track change is an excellent feature of Microsoft word as it enables a user or


reviewer to keep track of the changes that have taken a period. Changes like insertion,
deletion or formatting changes can be kept track of.

Procedure:

Changing Text direction:

1. Click the drawing object or table cell that contains the text you want to
change.
2. On the Format menu, click Text Direction.
3. Click the orientation you want.

Table:

1. Click where you want to create a table.


2. On the Table menu, point to Insert, and then click Table.
3. Under Table size, select the number of columns and rows.
4. Under AutoFit behavior, choose options to adjust table size.
5. To use a built-in table format, click AutoFormat.

IT Workshop Lab Manual Page 72


Select the options you want

Cell Alignment:

1. Click the cell that contains text you want to align.


2. On the Tables and Borders toolbar, select the option for the horizontal and
vertical alignment you want— for example, Align Bottom Center or Align Top
Right.

Foot Note:

1. In print layout view, click where you want to insert the note reference mark.
2. On the Insert menu, point to Reference, and then click Footnote.
3. Click Footnotes or Endnotes.

By default, Word places footnotes at the end of each page and endnotes at the
end of the document. You can change the placement of footnotes and endnotes
by making a selection in the Footnotes or Endnotes box.

4. In the Number format box, click the format you want.


5. Click Insert.

Word inserts the note number and places the insertion point next to the note
number.

6. Type the note text.


7. Scroll to your place in the document and continue typing.

As you insert additional footnotes or endnotes in the document, Word


automatically applies the correct number format.

Hyper link:

Select the text or picture you want to display as the hyperlink, and then click Insert
Hyperlink on the Standard toolbar

Do one of the following:

1. Link to an existing file or web page:

1. Under Link to, click Existing File or Web Page.

IT Workshop Lab Manual Page 73


2. In the Address box, type the address you want to link to or, in the Look in
box, click the down arrow, and navigate to and select the file

2. Link to a file you haven‘t created yet

Under Link to, click Create New Document.

3. In the Name of new document box, type the name of the new file.
4. Under When to edit, click either Edit the new document later or Edit the
new document now

An e-mail address:

1. Select the text or picture you want to display as the hyperlink, and then
click Insert Hyperlink on the Standard toolbar
2. Under Link to, click E-mail Address.
3. Either type the e-mail address you want in the E-mail address box, or select an
e-mail address in the recently used e-mail addresses box.
4. In the Subject box, type the subject of the e-mail message A

specific location in another document

1. Insert a bookmark in the destination file or Web page.


2. Open the file that you want to link from, and select the text or object you want
to display as the hyperlink.
3. On the Standard toolbar, click Insert Hyperlink .
4. Under Link to, click Existing File or Web Page.
5. In the Look in box, click the down arrow, and navigate to and select the file
that you want to link to.
6. Click Bookmark, select the bookmark you want, and then click OK.
Symbol:

1. Click where you want to insert the symbol.


2. On the Insert menu, click Symbol, and then click the Symbols tab.
3. In the Font box, click the font that you want.
4. Double-click the symbol that you want to insert.
5. Click Close

IT Workshop Lab Manual Page 74


Spell check:

1. On the Standard toolbar, click Spelling and Grammar .


2. When Word finds a possible spelling or grammatical problem, make your
changes in the Spelling and Grammar dialog box.

Bullets and Numbering:

1. Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then
press SPACEBAR or TAB.
2. Type any text you want.
3. Press ENTER to add the next list item.

Word automatically inserts the next number or bullet.

4. To finish the list, press ENTER twice, or press BACKSPACE to delete the last
bullet or number in the list

Formatting Styles:

1. Select the words, paragraph, list, or table you want to change.


2. If the Styles and Formatting task pane is not open, click Styles and
Formatting on the Formatting toolbar
3. Click the style you want in the Styles and Formatting task pane. If the

style you want is not listed, click All Styles in the Show box

Track Changes:

1. Open the document you want to revise.


2. On the Tools menu, click Track Changes

TEST DATA: No Test data for this Experiment

ERROR: No Errors for this Experiment

RESULT: A document is created by applying the above mentioned techniques


c. Select type as “Letters” and click “Next: Starting Document”.
d. Click Use the current document, and Click “Next: Select recipients”. e. Under
Select recipients, click Use an existing list.
f. Click Browse.
g. In the Select Data Source dialog box, locate and click the data source you want.

h. Browse for the given “List.txt” file., and Click Open.


i. All of the entries in the data source appear in the Mail Merge

IT Workshop Lab Manual Page 75


Recipients dialog box, where you can refine the list of recipients to include in
the merge.
j. Click Next: Write your letter.
k. Click on the location where you want to put a merge field. Click on more items.

l. Select and Insert the merge field at that location.


m. Click Next: Preview your letters.

n. To preview the items in order, click the arrow buttons.

o. To exclude a particular recipient from the merge, click Exclude this recipient.

p. Click Next: Complete the merge.

q. You can either print all the letters or Edit individual letters

i. Click Edit individual letters.

ii. To merge all the documents, click All.

iii. Save it to a separate document for future use.


(iv) Creating a Newsletter: Features to be covered:- Table of Content, Newspaper
columns, Images from files and clipart, Drawing toolbar and Word Art, Formatting
Images, Textboxes, Paragraphs in word.

AIM : Create a news Letter

Software Requirement: MS-WORD

Hardware Requirement: Personal computer

THEORY:

Table of contents:

Table of contents displays a list of headings in a created document. It


basically provides an outline of the entire document created

Newspaper columns:

One can create a newspaper columns document by specifying the number


of new letter-style column required and then adjust their width , and add vertical lines
between columns.

Images from files and clipart:

Inserting a picture (graphic) from a file and clipart may be required for a
document. This picture could be a scanned photograph or any other digitally produced
IT Workshop Lab Manual Page 76
one. This pictures can be modified , resized, cropped and enhanced.

Drawing toolbar and Word Art:

One can create his/her own drawings in Microsoft word. Ms word provides a full

fledged drawing tool bar.

Word Art in Microsoft word enables you to create special and decorative text.

Formatting Images, Textboxes and Paragraphs:

Formatting an image includes selecting appropriate color, size, layout and


cropping.
Generally the text in a document follows a standard orientation (line after line). A
text box provides a different orientation to the text with in a document. It can arrange
the text in anywhere and can be resized and moreover moved to any section of the
document or even outside.
When you are formatting a paragraph, you do not need to highlight the entire
paragraph. Placing the cursor anywhere in the paragraph enables you to format it. After
you set a paragraph format, subsequent paragraphs will have the same format unless
you change the format

PROCEDURE:

Table of contents:

1. Click where you want to insert the table of contents.


2. On the Insert menu, point to Reference, and click Index and Tables.
3. Click the Table of Contents tab.
4. To use one of the available designs, click a design in the Formats box.
5. Select any other table of contents options you want.

Newspaper columns:

1. Select the entire or part of document to be converted into a newsletter-style

2. Click on format menu , select columns

3. Any desired number of columns are presets-one or two or three or left or right
b\can be selected.

4. Width and spacing can be fixed and equal columns width can be checked for
uniformity
5. If newspaper columns are to be separated by a line, then check line between

6. Under apply to will be whole document if entire document is selected else we have

IT Workshop Lab Manual Page 77


to select a selected text.

7. Click ok

Inserting images from files and clip art:

1. Click where you want to insert the picture.


2. On the Insert menu, point to Picture, and then click From File.
3. Locate the picture you want to insert.
4. Double-click the picture you want to insert.

CLIP ART:

1. On the Insert menu, point to Picture, and then click Clip Art.
2. In the Clip Art task pane, in the Search for box, type a word or phrase that
describes the clip you want or type in all or some of the file name of the
clip.
3. To narrow your search, do one or both of the following:
To limit search results to a specific collection of clips, in the Search
in box, click the arrow and select the collections you want to search.
To limit search results to a specific type of media file, in the Results
should be box, click the arrow and select the check box next to the
types of clips you want to find.
4. Click Go.

5. If you don't know the exact file name, you can substitute wildcard
characters for one or more real characters. Use the asterisk (*) as a substitute for
zero or more characters in a file name. Use the question mark (?) as a substitute
for a single character in a file name.

6. In the Results box, click the clip to insert it.

Drawing Toolbar and Word Art:

1. Click in your document where you want to create the drawing.


2. On the Insert menu, point to Picture, and then click New

Drawing. A drawing canvas is inserted into your document.

3. Use the Drawing toolbar to add any shapes or pictures that you

want

WORD ART:

1. On the Drawing toolbar, click Insert WordArt .

IT Workshop Lab Manual Page 78


2. Click the WordArt effect you want, and then click OK.

3. In the Edit WordArt Text dialog box, type the text you want.

4. Do any of the following:

□ To change the font type, in the Font list, select a font.


□ To change the font size, in the Size list, select a size.
□ To make text bold, click the Bold button.
□ To make text italic, click the Italic button.
Formatting Images:

1. Formatting of the images can be achieved by selecting the image and


double click on the picture, format picture dialog box appears.

2. The same can be achieved by selecting the tools menu > customize>tool
bars tab>picture and click close.

Basic formatting features of an image

Resize a drawing

1. Select the drawing canvas


2. On the Drawing Canvas toolbar, do one of the following:
o To make the drawing canvas boundary larger without changing the size
of the objects on the canvas, click Expand .
o To make the drawing canvas boundary fit tightly around the drawing

objects or pictures, click Fit .

o To scale the drawing and make the objects and canvas proportionately
smaller or larger, click Scale Drawing, and then drag the edges of the
canvas.

Resize a picture or shape

1. Position the mouse pointer over one of the sizing handles


2. Drag the sizing handle until the object is the shape and size you want.

To increase or decrease the size in one or more directions, drag the mouse
away from or toward the center, while doing one of the following:

o To keep the center of an object in the same place, hold down CTRL
while dragging the mouse.
o To maintain the object's proportions, drag one of the corner sizing
IT Workshop Lab Manual Page 79
handles.
o To maintain the proportions while keeping the center in the same place,
hold down CTRL while dragging one of the corner sizing handles.
Crop a picture
1. Select the picture you want to crop.
2. On the Picture toolbar, click Crop .
3. Position the cropping tool over a cropping handle and then do one of the
following:
o To crop one side, drag the center handle on that side inward.
o To crop equally on two sides at once, hold down CTRL as you drag
the center handle on either side inward.
o To crop equally on all four sides at once, hold down CTRL as you
drag a corner handle inward.
4. On the Picture toolbar, click Crop to turn off the Crop command.
Text Box:
1. On the Drawing toolbar, click Text Box .
2. Click or drag in your document where you want to insert the text box
3. You can use the options on the Drawing toolbar to enhance a text box— for
example, to change the fill color— just as you can with any other drawing
object
Paragraphs: Change line spacing
Select the text you want to change.
1. On the Formatting toolbar, point to Line Spacing, and then do one of the
following:
o To apply a new setting, click the arrow, and then select the number that
you want.
oTo apply the most recently used setting, click the button.

o To set more precise measurements, click the arrow, click More,


and then select the options you want under Line Spacing.
Change spacing before or after paragraphs
1. Select the paragraphs in which you want to change spacing.
2. On the Format menu, click Paragraph, and then click the Indents and
Spacing tab.
3. Under Spacing, enter the spacing you want in the Before or After box.
Change paragraph direction
1. Place the insertion point in the paragraph that you want to change, or select
several paragraphs.

IT Workshop Lab Manual Page 80


2. Do one of the following:
o To have text begin from the left, click Left-to-Right on the Formatting
toolbar.
o To have text begin from the right, click Right-to-Left on the Formatting
toolbar.
When you change the paragraph direction, Microsoft Word leaves justified and centered
text as it is. In the case of left-aligned or right -aligned text, Word flips the alignment to
its opposite. For example, if you have a left-to-right paragraph that is right aligned, such
as the date at the top of a letter, clicking Right-to-Left results in a right-to-left paragraph
that is left aligned.

Forms:

Using Microsoft word one can create an organized and structured document with a
provision to enter the required information into it. A document of such nature is called a
form.

Mail Merge:
It helps us to produce from letters mailing labels envelopes catalogs and others
types of merged document. It is so found in the tools option on the menu bar. In tools
we have letters and mailing. In letters and mailing we have mail merge mail merge tool
box envelopes tables and letters wizard. In mail merge select the required document
you are working on. A window for customizing the data base structure appears. This file
contains the names, address details with contact numbers etc of people you wish to
send the letters.

Inserting objects:

Insert an object such as drawing word art text effects or an equation at the
inserting point.
Fields:

It inserts a field at the inserting font fields are used to insert a variety of

information automatically. Select table in table select insert. In that select insert table a

box containing number of rows and columns will appear. Select six colors and four rows
and click o.k. Given the first row as date, problem repeated

IT Workshop Lab Manual Page 81


student‘s signature action recommended problem status and councilors sign. Insert the

objects in the feedback form and apply the text fields in the form.

PROCEDURE:

Mail Merge:

1. Open a document and type the complete body of the letter and format it as
required.

2. Create a data source and choose mail merge from tool bar a window is
displayed.

3. Click on create button and choose from letter options. Then a window is
displayed.

4. Click active window choose currently active document. Click on data and
create data source option.

5. A window for customizing the data base structure appears and this file
contains the names address details with contact number etc. we can add or
remove fields from this file.

6. Once the list of fields is finalized a window of same is displayed and types the
required file names and click on save button.

7. A window is displayed. Type the details of 10 candidates. After typing details


of one person, click on add menu.

8. Click on the o.k. to finish entering the records mail merge tool bar is displayed.
9. Place the curser at the place where you wish to insert names and click on
insert mail merge button. A drop list is displayed all fields created would be
shown.

10. By highlighting to desired file and click on it we can insert the field into the
main document and go to begin the mail merge click on mail merge.

IT Workshop Lab Manual Page 82


11. A window is displayed click once on the merge button to generate
letters for all records in your data source file.

Forms:

1. Design the form by sketching a layout first, or use an existing form template as a
guide. Tables, text boxes, borders, and shading are all design elements that can
help you create a well-designed form that's easy to use.

2. On the Standard toolbar, click New Blank Document .


3. Add the text or graphics you want. For example, enter the questions you want
answered, and list the available choices.
4. To insert a text box where users can enter their responses, click the document,
and then click Text Form Field on the Forms toolbar. If you need more space, you
can insert multiple text boxes side by side. To insert check boxes that list choices,
such as Yes and No, click the document, and then click Check Box Form Field on
the Forms toolbar.
5. Save the form.

Insert line numbers:

1. On the File menu, click Page Setup, and then click the Layout tab.
2. In the Apply to box, click Whole document.
3. Click Line Numbers.
4. Select the Add line numbering check box, and then select the options you want.

TEST DATA: No Test data for this Experiment

ERROR: No Errors for this Experiment

RESULT: A document is created by applying the above mentioned techniques

IT Workshop Lab Manual Page 83


Experiment 4:
(i) Creating Power Point:Student should work on basic power point utilities and tools .
presentation. PPT Orientation, Slide Layouts, Inserting Text, Formatting Text, Bullets and
Numbering, Auto Shapes, Lines and Arrows, Hyperlinks, Inserting Images, Tables and Charts

TITLE:

Create a power point presentation consists of slide layouts inserting text,


formatting text, bullets and numbering of five slides with following information’s.

Slide 1 – contents

Slide 2 – Name Slide

3 – Address Slide 4 –

Hobbies Slide 5 –

Friends

AIM:

To maintain a PowerPoint presentation with some specifications

THEORY:

SLIDE LAYOUT:

1. On the format menu, click slide layout.


2. On the slides tab in normal view, select the slides; you want to apply a
layout too.

3. In the slide layout task pane, point to layout you and then click it.
4. A new slide can also be inserted within the task pane. Point the layout you
want the slide to have, click the arrow and then click the insert new slide.

IT Workshop Lab Manual Page 84


INSERT TEXT:

1. Text can be added to layout.


2. Align text in the top, middle or bottom of a cell.
3. Align text on the right or left, or in the center of a cell.
4. Change cell margins.
5. Insert a tab in a table.
6. To make the symbol command available, in normal view, place the
insertion point on the outbox tab or in a text place holders on the slide.

7. On the insert menu, click symbol.


8. To change fonts, click a name in the font box.

FORMATTING TEXT:

1. Select the text you want to format as superscript or subscript.


2. On the format menu, click font.
3. To show or hide text formatting, on the standard toolbar, click show
formatting.

BULLETS AND NUMBERINGS:

1. Select the lines of text that you want to add bullets or numbering to.
2. Click bullets or numbering.

AUTOSHAPES:

1. Select the auto shape that has the text you want to position.
2. Double-click the selection rectangle of the auto shape or text box and then
click the text box tab in the format dialog box.

3. In the text anchor point box, click the position you want the text to start in.

LINES AND ARROWS:

1. In Microsoft power point, double click the chart.


2. Double click the chart item you want to change.

3. On the patterns tab, do one or both of the following.


IT Workshop Lab Manual Page 85
4. To change the colors, patterns or lines, select the options you want.

5. To specify a fill effect, click fill efeect and then select the options you
want on the gradient, text patterns or picture tabs.

To return to the slide, click outside the about

PROCEDURE:

First click on start button at the button of the screen on status bar. Click on programs and

then Microsoft PowerPoint. Go to file and new. Then you find different pattern of slides on right side of

your screen. Then select which is completely empty. Then enter the contents in the first slide as per given
information, name in the second slide, Address in the third slide, Hobbies in the fourth slide and friends in

the fifth slide. Except first slide, all the second, third, fourth, fifth slides should be inserted. When you select

pattern of slide from a new slide, on slide which you selected you will find an arrow towards its right side,

click that arrow and then again click insert slide. Then save it. Then adjust the layout. Then format the text
then give bullets or numbering to the text if required. Go to auto shapes. Select more auto shapes and

insert wherever required. Then again go to insert option and select new slides. And select chart and a chart

with datasheet appear. Give the name, roll no, marks in three subjects and calculate the total. Then save

the file.
TEST DATA: No Test data for this Experiment

ERROR: No Errors for this Experiment

RESULT: A Power point Presentation is created by applying the above mentioned

techniques

IT Workshop Lab Manual Page 86


(ii) AIM:

To maintain a PowerPoint presentation using some specifications

THEORY:

HYPERLINK:

(iii) Select the text or object that you want to represent the hyperlink.

(iv) Click insert hyperlink.

(v) Under link to, click place in this document.

INSERT IMAGES:

1. Click where you want to insert the picture.


2. On the drawing tool bar, click insert picture.
3. Locate the folder that contains the picture that you want
to insert, and then click the picture file.

CLIP ART:

1. On the insert menu, point to structure and then click clipart.


2. In the clipart task pane, in the search for box, type a word
or phrase that describes the clip, you want to type in all
or some of the file menus of the clip.

3. In the results box, click the clip to insert it.

AUDIO VIDEO OBJECTS:

1. On the slide show menu, click setup show. Under


performance check box. If your computer has their
capability, office PowerPoint will attempt to use it.

2. Animation performance will be much better with a video


card that has Microsoft direct 3D.

CHART:
IT Workshop Lab Manual Page 87
1. Click the slide where you want to place the embedded object.
2. On the insert menu, click chart.

3. Click a cell on the data sheet and then type the information you
want
To return to the slide, click outside the chart.

PROCEDURE:

First click on start button at the bottom of the screen on status bar.

Click on programs and then Microsoft power point goes to file menu.

Then you find different pattern of slides on right side of your screen.

Then select which is completely empty. Then enter the name of your college in bold
letters.

Address of your college in bold letters in the second slide.

List of all the available courses in the third slide, extra co-curricular activities in the
fourth slide except first slide, all the second, third, fourth slide should be inserted.

When you select pattern of slide from a new slide, on slide which you selected, you will
find an arrow towards it right side click that arrow and then again click insert slide.

Then save it the select the slide show and then select the view show option.

Then review the presentation in slide show by selecting next and after completing the
slide show then click end show.

Click on start button at the button of the screen on status bar, click on programs and
then Microsoft power point. Go to file menu.

On insert menu and select table option and give no. of rows and no. of columns and
give the name, Roll no and marks in three subjects and find the total

TEST DATA: No Test data for this Experiment

ERROR: No Errors for this Experiment

RESULT: A Power Point Presentation is created by

applying the above mentioned techniques

IT Workshop Lab Manual Page 88

You might also like