It Workshop Lab Manual
It Workshop Lab Manual
Prepared by:
PC Hardware
1.
i. Identify the peripherals of a computer, components in
a CPU and its functions. Draw the block diagram of 1-5
the CPU along with the configuration of each
peripheral and submit to your instructor.
ii. Every student should individually install MS windows
5-23
on the personal computer using Virtual Machine. Lab
instructor should verify the installation and follow it
up with a Viva.
iii. Every student should install Linux on the computer
using Virtual Machine. This computer should have
windows installed. The system should be configured 23-26
as dual boot with both Windows and Linux. Lab
instructors should verify the installation and follow it
up with a Viva
1. Read and understand how to carry out an experiment / activity thoroughlybefore coming
to the laboratory.
2. Report any broken plugs or exposed electrical wires and any rectificationneeded, to
your faculty/staff immediately.
3. Know the location of the fire extinguisher and the first aid box and have an
understanding of how to use them in case of an emergency.
4. Report fires or accidents to your Faculty / Staff immediately.
1. Do not open the system unit casing or monitor casing particularly unless you are agreed
to do so and under supervision of Faculty / Staff. Some internal components hold
electrical voltages of up to 30000 volts, which can be fatal.
2. Avoid stepping on electrical wires or any other computer cables.
3. Do not insert any material and particularly metal objects such as clips, pinsand needles
into computer casings. They may cause fire / electric shock.
4. Do not touch, connect or disconnect any plug or cable without your Faculty / Staff
permission /assistance.
5. Do not remove anything from the computer laboratory without permission.
engineering field.
To study different hand operated power tools, uses and their demonstration.
IT WORKSHOP:
1. PC Hardware
i. Identify the peripherals of a computer, components in a CPU and its functions. Draw the block
diagram of the CPU along with the configuration of each peripheral and submit to your
instructor.
ii. Every student should individually install MS windows on the personal computer using Virtual
Machine. Lab instructor should verify the installation and follow it up with a Viva.
iii. Every student should install Linux on the computer using Virtual Machine. This computer
should have windows installed. The system should be configured as dual boot with both
Windows and Linux. Lab instructors should verify the installation and follow it up with a Viva
2. Internet & World Wide Web
i. Web Browsers, Surfing the Web: Students customize their web browsers with the LAN proxy
settings, bookmarks, search toolbars and pop-up blockers. Also, plug-ins like Macromedia Flash
and JRE for applets should be configured.
ii. Search Engines & Netiquette: Students should know what search engines are and how to use
the search engines. A few topics would be given to the students for which they need to search
on Google. This should be demonstrated to the instructors by the student.
iii. Cyber Hygiene: Students would be exposed to the various threats on the internet and would
be asked to configure their computer to be safe on the internet. They need to customize their
browsers to block pop ups, block active x downloads to avoid viruses and/or worms.
3. LaTeX and WORD
i. Word Orientation: The mentor needs to give an overview of LaTeX and Microsoft (MS) office
or equivalent (FOSS) tool word: Importance of LaTeX and MS office or equivalent (FOSS) tool
Word as word Processors, Details of the four tasks and features that would be covered in each,
Using LaTeX and word – Accessing, overview of toolbars, saving files, Using help and
resources, rulers, format painter in word.
ii. Using LaTeX and Word to create a project certificate. Features to be covered- Formatting
Fonts in word, Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and
Colours, Inserting Header and Footer, Using Date and Time option in both LaTeX and Word.
iii. Creating project abstract Features to be covered- Formatting Styles, inserting table, Bullets
and Numbering, Changing Text Direction, Cell alignment, Footnote, Hyperlink, Symbols, Spell
Check, Track Changes.
ii.Interactive presentations - Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects,
Tables and Charts,Master Layouts (slide, template, and notes), Types of views (basic,
presentation, slide slotter, notes etc), and Inserting – Background, textures, Design Templates,
Hidden slides.
Course Outcomes
Bibliography
TEXT BOOKS:
IT Essentials PC Hardware and Software Companion Guide, Davis Anfinson
and Ken Quamme, 3rd Edition, CISC Press, Pearson Education
REFERENCES:
1. LaTeX Companion, Leslie Lamport, PHI/Pearson
2. The Complete Computer Upgrade and Repair Book, 3rd Edition, Cheryl
A. Schmidt, Wiley Dreamtech
3. Introduction to Information Technology, ITL Education Solutions limited,
Pearson Education
ONLINE RESOURCES:
https://www.youtube.com/watch?v=ctAVC2JwEwI
https://www.youtube.com/watch?v=ZXAPCy2c33o
ASSESSMENT
Staff should maintain the assessment register and Head of the department should
monitor it.
Total 40
Computer peripherals are external devices that connect to and extend the functionality of a computer, including input
devices like keyboards and mice, output devices like monitors and printers, and storage devices like hard drives and flash
drives.
Input Devices:
Keyboards: Used for typing text and commands into the computer.
A keyboard is an input device used to enter text and commands into a computer or other
electronic device, featuring a set of keys arranged in a specific layout like QWERTY, allowing
users to type letters, numbers, and symbols.
Function:
Input Device
Character Input
Command Execution
Key Types :
Alphanumeric Keys
Control Keys
Function Keys
Navigation Keys
Numeric Keypad
Special Keys
Modifier Keys
Mice: Used for navigating the screen and interacting with graphical elements.
A computer mouse is a handheld input device used to control a cursor on a computer screen, allowing users
to navigate and interact with a graphical user interface (GUI) by clicking buttons, scrolling, and moving the
cursor.
Function:
Pointing
Clicking
Scrolling
Dragging
Types of Mice:
Mechanical Mice
Optical Mice
Wireless Mice
Wired Mice
A microphone, or "mic" for short, is a transducer that converts sound waves into electrical signals,
allowing you to capture and transmit audio.
Purpose: Microphones capture sound vibrations (sound waves) and transform them into electrical
signals that can be recorded, amplified, or transmitted.
How it works:The sound waves cause a diaphragm (a thin, flexible membrane) inside the microphone to vibrate. These
vibrations are then converted into electrical signals by the microphone's internal mechanism.
Webcams: Used for video input, such as video conferencing or recording videos.
A webcam – short for ‘web camera’ – is a digital camera that’s connected to a computer. It can send live
pictures from wherever it’s sited to another location by means of the internet. Many desktop computer
screens and laptops come with a built-in camera and microphone, but if yours doesn’t, you can add a
separate webcam at any time.
There are various types. Some are plugged into computers through USB ports, but others are wireless (wifi). Other features
might include:
an integral microphone
the ability to pan and tilt
in-built sensors that can detect movement and start recording
a light that, when on, will let you know that the camera is in use.
Scanners: Used to convert physical documents into digital images.
A scanner is a device that converts physical documents, images, or objects into a digital format,
allowing them to be stored, edited, and shared electronically.
A scanner is commonly known as an input device that captures magazine pages, texts, posters and
photographic prints through computer software. Scanners are hand-held devices that help in
scanning objects in both black-and-white and colour images.
Scanners can be used for printing high-resolution printings that are commonly used for different purposes like education,
work etc. High-resolution scanners are capable of assisting people with detailed and meticulous details for implementing
them for proper purposes. Scanners are generally software-operated and come with features like resizing and modifying
pictures and documents based on the purpose of the scanning.
Output Devices:
A computer monitor is an output device that displays visual information, like text, images, and videos, generated by a
computer, acting as the primary interface for users to see and interact with the computer's output.
Types:
LCD (Liquid Crystal Display): The most common type, known for their thin, lightweight design and good image
quality.
LED (Light Emitting Diode): Uses LED backlighting for LCD panels, offering better brightness and energy efficiency.
OLED (Organic Light Emitting Diode): Offers excellent contrast, color accuracy, and fast response times, but can be
more expensive.
CRT (Cathode Ray Tube): Older technology, bulky, and less common now.
Types:
Inkjet Printers: Use ink cartridges to spray tiny droplets of ink onto paper, forming text and images.
Laser Printers: Employ a laser beam to create an image on a drum, which is then transferred to paper using toner (a
dry ink).
Thermal Printers: Use heat to transfer images from a heat-sensitive paper or film, commonly used for receipts and
labels.
3D Printers: Create three-dimensional objects by layering materials, like plastic or metal, based on a digital design.
Dot Matrix Printers: Impact printers that use pins to strike a ribbon and create an image on paper, characterized by a
dot-matrix pattern.
Impact vs. Non-Impact:
Impact Printers: (like dot matrix) physically strike the paper to create an image.
Non-Impact Printers: (like inkjet and laser) use non-physical methods to create the image, such as spraying ink or
using a laser beam.
Speakers: Used for audio output, such as playing music or hearing sound effects. A speaker, or loudspeaker, is a
device that converts electrical signals into sound waves, allowing you to hear audio from various devices
Headphones: Used for personal audio output. Headphones are small speakers worn over or in the ears to allow
private listening to audio, converting electrical signals into sound, and come in various types like over-ear, on-ear,
and in-ear models.
Projectors: Used to display images and videos on a large screen. A projector is an output device that displays images
or videos onto a surface, like a screen or wall, by projecting light through a lens, making it suitable for presentations,
movies, and other visual displays.
Storage Devices:
Hard Disk Drives (HDDs): Used for storing large amounts of data.
Solid State Drives (SSDs): Used for storing data, offering faster performance than HDDs.
Flash Drives (USB Drives): Portable storage devices for transferring data between computers.
Graphics Cards: Used for processing and displaying graphics and video.
RAM: Random Access Memory, used to store data and instructions that the computer is currently using.
InputAll the data received by the computer goes through the input
unit. The input unit comprises different devices like a mouse,
keyboard, scanner, etc. In other words, each of these devices acts as
a mediator between the users and the computer.
The data that is to be processed is put through the input unit. The
computer accepts the raw data in binary form. It then processes the
data and produces the desired output.
Input
The data that is to be processed is put through the input unit. The computer accepts the raw data in binary form. It then
processes the data and produces the desired output.
Central Processing Unit or the CPU, is the brain of the computer. It works the same way a human brain works. As the brain
controls all human activities, similarly the CPU controls all the tasks.
Moreover, the CPU conducts all the arithmetical and logical operations in the computer.
Now the CPU comprises of two units, namely – ALU (Arithmetic Logic Unit) and CU (Control Unit). Both of these units work in
sync. The CPU processes the data as a whole.
The Arithmetic Logic Unit is made of two terms, arithmetic and logic. There are two primary functions that this unit
performs.
1. Data is inserted through the input unit into the primary memory. Performs the basic arithmetical operations on it,
like addition, subtraction, multiplication, and division. It performs all sorts of calculations required on the data. Then,
it sends back data to the storage.
2. The unit is also responsible for performing logical operations like AND, OR, Equal to, Less than, etc. In addition to
this, it conducts merging, sorting, and selection of the given data.
CU – Control Unit
The control unit as the name suggests is the controller of all the activities/tasks and operations. All this is performed inside
the computer.
The memory unit sends a set of instructions to the control unit. Then the control unit in turn converts those instructions.
After that these instructions are converted to control signals.
These control signals help in prioritizing and scheduling activities. Thus, the control unit coordinates the tasks inside the
computer in sync with the input and output units.
Memory Unit
All the data that has to be processed or has been processed is stored in the memory unit. The memory unit acts as a hub of
all the data. It transmits it to the required part of the computer whenever necessary.
The memory unit works in sync with the CPU. This helps in faster accessing and processing of the data. Thus, making tasks
easier and quicker.
Primary Memory
This type of memory cannot store a vast amount of data. Therefore, it is only used to store recent data. The data stored in
this is temporary. It can get erased once the power is switched off. Therefore, is also called temporary memory or main
memory.
RAM stands for Random Access Memory. It is an example of primary memory. This memory is directly accessible by the CPU.
Secondary Memory
As explained above, the primary memory stores temporary data. Thus it cannot be accessed in the future. For permanent
storage purposes, secondary memory is used. It is also called permanent memory or auxiliary memory. The hard disk is an
example of secondary memory. Even in a power failure data does not get erased easily.
VirtualBox a free and open-source virtualization software by Oracle is used to run various operating systems within your
existing Windows 10 environment. This enables you to test new software, explore different operating systems, or even run
legacy applications that might not be compatible with your current system.
Virtualization essentially creates a virtual machine a software program that mimics a physical computer. This virtual machine
can then run its operating system, separately from the host machine. This allows you to experiment with different operating
systems without affecting your primary system or provides a safe environment to test untrusted software. Here are some of
the key benefits of using VirtualBox:
Install and run various operating systems like Linux, macOS, or older versions of Windows within your Windows 10
environment.
Test new software or applications in a sandboxed environment without risking your main system.
Keep legacy applications that might not be compatible with your current operating system functional.
VirtualBox allows you to allocate specific resources like RAM and CPU cores to each VM optimizing resource
utilization.
Installing VirtualBox in Windows 10
Open your preferred web browser then navigate to the official VirtualBox download page. Under “Windows hosts” click
the link to download virtualbox for Windows 10.
2. Locate the
downloaded installer
file in
your Downloads folder or wherever you saved it. Double-click the installer file to launch the VirtualBox Setup Wizard. In
the welcome screen, click “Next” to proceed with the installation.
3. The next screen presents customization options for the virtual box installation which include:
4. Once you’ve reviewed the customization options click “Next” to proceed then a Warning Network interface option
appears click “Yes” to proceed with the installation.
5. Ready to Install wizard appears, Click “Install” to begin the installation.
6. After the installation is complete, click “Finish” to complete the installation process.
Step 7: Get/Download the Windows 10 ISO File
Step 9. Start Virtualbox.(launch the Software and Click New in the Manager Window.)
Step 11. Select Windows 10 As the Version. (Choose 'Windows 10 (64bit)' If You Have a 64-bit ISO).
Step 12. Hit Next, Then Set the Memory Size. Select the Amount of RAM.
Step 13. Create a Virtual Hard Drive. on the Following Screen Choose to 'Create a Virtual Hard Drive Now' and Click Create.
Step 15. You’ll Be Asked If You Want the New Virtual Hard Drive to Be Dynamically Allocated or a Fixed Size. Choose Any
Option and Click Next.
Step 17. When Done,Select Created Virtual Machine and Then Click the Start Button in the Manager.
Activate windows by entering a product key. If you don't have product key click "I don't have a product Key". (You'll be
prompted to enter your license key but you can skip this step for now (useful if you don't actually have a Windows 10
key). Otherwise enter The Product Key.)
Select the Operating System You Want to Install and Click Next.
Step 24. Choose the 'Custom: Install Windows Only (advanced)' Option.
Step 25. Choose the Drive Where You Want to Install Windows.
Step 32. Select the Right Keyboard Layout and Click Yes.
Step 39. Choose Privacy Settings for Your Device and Click "Accept".
Step 40. Windows 10 Will Finalize Everything and You Can Begin Exploring.
If your computer successfully boots into Windows, you're all set to move on to the next step.
(iii) Every student should install Linux on the computer using Virtual Machine.
Install Ubuntu
Whether it was already there or you worked through the steps above, at this point you have Windows installed. Now use the
Ubuntu installation media you created earlier to boot into Ubuntu. Insert the media and boot your computer from it. Again,
the exact sequence of keys to access the boot menu varies from one computer to another, so check your documentation if
you're not sure. If all goes well, you see the following screen once the media finishes loading:
Here, you can select between Try Ubuntu or Install Ubuntu. Don't install just yet; instead, click Try Ubuntu. After it finishes
loading, you should see the Ubuntu desktop.
Once you're ready to go, double-click on the Install Ubuntu 20.04 LTS icon on the desktop to launch the installer.
Choose the language you want to use for the installation process, then click Continue.
Next, choose the keyboard layout. Once you've made your selection, click Continue.
You have a few options on the next screen. You can choose a Normal or a Minimal installation. For most people, Normal
installation is ideal. Advanced users may want to do a Minimal install instead, which has fewer software applications installed
by default. In addition, you can choose to download updates and whether or not to include third-party software and drivers.
I recommend checking both of those boxes. When done, click Continue.
The following screen may appear. If you installed Windows from scratch and left unallocated space on the disk, Ubuntu will
automatically set itself up in the empty space, so you won't see this screen. If you already had Windows 10 installed and it's
taking up the entire drive, this screen will appear and give you an option to select a disk at the top. If you have just one disk,
you can choose how much space to steal from Windows and apply to Ubuntu. You can drag the vertical line in the middle left
and right with your mouse to take space away from one and gives it to the other. Adjust this exactly the way you want it,
then click Install Now.
You should see a confirmation screen indicating what Ubuntu plans on doing. If everything looks right, click Continue.
Ubuntu installs in the background, but you still have some configuration to do. While Ubuntu tries its best to figure out your
location, you can click on the map to narrow it down to ensure your time zone and other things are set correctly.
Next, fill in the user account information: your name, computer name, username, and password. Click Continue when you're
done.
Setting up a web browser involves configuring proxy settings, bookmarks, toolbars, pop-up blockers, and plugins
for optimal functionality and security.
1. Opening your browser's settings (often found under a menu labeled "Settings," "Preferences," or a gear
icon).
3. Entering the proxy server address and port number provided by your network administrator. This
1. Check for necessity: Many modern websites no longer use Flash. Check if the websites you need to
2. Download and install: If needed, download the appropriate plug-in from the official website (be
3. Enable the plug-in: In your browser's settings, find the section for plug-ins or extensions. Ensure that
Flash and JRE are enabled. Note that enabling Java can pose security risks, so only do this if absolutely
necessary.
Successfully customizing a web browser involves configuring LAN proxy settings (if needed), managing
bookmarks, choosing a search toolbar, enabling pop-up blockers, and installing and enabling necessary
plug-ins like JRE (with caution). Remember to always download software from trusted sources.
A search engine is a software system that provides hyperlinks to web pages and other relevant
information on the Web in response to a user's query. The user inputs a query within a web browser or a
mobile app, and the search results are often a list of hyperlinks, accompanied by textual summaries and
images.
With billions of websites online today, there is a lot of information on the Internet. Search engines make
this information easier to find. Let's look at the basics of using a search engine, as well as some
techniques you can use to get better search results.
Search Engine Components Generally there are three basic components of a search engine as listed
below:
IT Workshop Lab Manual Page 27
1. Web Crawler
2. Database
3. Search Interfaces
Web crawler It is also known as spider or bots. It is a software component that traverses the web to
gather information.
Database All the information on the web is stored in database. It consists of huge web resources.
Search Interfaces This component is an interface between user and the database. It helps the user to
search through the database.
Web crawler, database and search interface are the major components of a search engine that actually
makes search engine to work. Search engines make use of Boolean expressions AND, OR, NOT to restrict
and widen the results of a search. Following are the steps that are performed by the search engine:
The search engine looks for the keyword in the index for pre-defined database instead of going
directly to the web to search for the keyword.
It then uses software to search for the information in the database. This software component is
known as web crawler.
Once web crawler finds the pages, the search engine then shows the relevant web pages as a result.
These retrieved web pages generally include title of page, size of text portion, first several sentences
etc.
These search criteria may vary from one search engine to the other. The retrieved information is ranked
according to various factors such as frequency of keywords, relevancy of information, links etc.
There are many different search engines you can use, but some of the most popular
include Google, Yahoo!, and Bing. To perform a search, you'll need to navigate to a search engine in
your web browser, type one or more keywords—also known as search terms—then press Enter on your
keyboard. In this example, we'll search for recipes.
Most browsers also allow you to perform a web search directly from your address bar, although some have a
separate search bar next to the address bar. Simply type your search terms and press Enter to run the search.
Search suggestions
If you're having trouble thinking of new search terms, you can use search suggestions instead. These will
usually appear as you're typing, and they're a great way to find new keywords you might not have tried
otherwise. To use a search suggestion, you can click it with your mouse, or select it with the arrow keys
on your keyboard.
If you're still having trouble finding exactly what you need, you can use some special characters to help
refine your search. For example, if you want to exclude a word from a search, you can type a hyphen (-)
at the beginning of a word. So if you wanted to find cookie recipes that don't include chocolate, you
could search for recipes cookies -chocolate.
You can also search for exact words or phrases to narrow down your results even more. All you need to
do is place quotation marks (" ") around the desired search terms. For example, if you search
for recipes "sugar cookies", your search results will only include recipes for sugar cookies, instead of any
cookies that happen to use sugar as an ingredient.
Content-specific searches
There may be times when you're looking for something more specific, like a news article, picture, or video. Most
search engines have links at the top of the page that allow you to perform these unique searches.
In the example below, we've used the same search terms to look for images instead of websites. If you see an image
you like, you can click to visit the website it originally came from.
Advertisements
One final thing to note: Most search engines include advertisements with search results. For example,
you can see advertisements at the top of the search results below.
These ads are based on your search terms, and they often look similar to other search results. While they
may be useful in some cases, it's usually more helpful to focus on the actual search results.
Every time you click a link on a website or type a web address into your browser, it’s a URL. URL stands
for Uniform Resource Locator. Think of it like a street address, with each portion of the URL as different
parts of the address, and each giving you different information. Let’s examine each component of a URL
and what we can learn from it.
Scheme
Every URL begins with the scheme. This tells your browser what type of address it is so the browser
connects to it correctly. There are many types of schemes, but for typical web browsing you will mostly
see http and https. Your browser usually won’t show the scheme in the address bar, and usually you
don’t need to type the scheme when typing a web address; instead, you can just begin with the domain
name. The scheme is still always part of the URL; it just isn’t being displayed.
Domain name
In most URLs, the www domain can be omitted. Google.com and www.google.com lead to the same
page. However, other subdomains cannot be omitted. For example, all pages
under news.google.com require the news subdomain in the URL.
File path
The file path—often just called the path—tells your browser to load a specific page. If you don’t specify
a path and only enter
a domain name, your browser is still
loading a specific page; it’s just
loading a default page, which
usually will help you navigate to
other pages.
URLs that end with the domain name without a file path usually will load a homepage or an index page
that's designed to help you navigate to specific pages on the site. Often, if you can’t remember the file
path for a specific page, you can go to the homepage and search for it.
Parameters
Anchor
Also appearing after the path, the anchor tells your browser to scroll to or load a specific part of the
page. Usually
the anchor begins with a
hashtag and is used to direct
your browser to a specific part of a
very long page, much like a
bookmark.
Different anchors don’t load
different pages; they simply tell the browser to display different parts of the page.
A whole URL
When combined, these elements make up a URL, although not all URLs will have all five parts.
(iii) Students would be exposed to the various threats on the internet and would be
asked to configure their computer to be safe on the internet.
Cyber Hygiene:
Cyber hygiene is about developing good habits to protect yourself and your devices from online threats,
just like personal hygiene protects your physical health. Here's a breakdown of what you should know
and do:
1. Understand the Threats:
Viruses
Network Worms
Trojans
Spyware / Adware
Other Malware
Other Threats
Viruses
A virus is a program that replicates itself, usually by attaching itself to other files and programs. A worm
IT Workshop Lab Manual Page 36
is a program that does not infect other programs but makes copies of itself. Trojan horse programs do
not replicate nor make copies of themselves, but rely on other "manual" methods of distribution. We
use the term "viruses" on this page to cover all forms of infections.
All viruses are different. Some activate on a certain day, but remain dormant until then. Others begin
the attack as soon as the machine has been infected. Viruses can be very damaging and some are just
annoying.
More than 1,00,000 known viruses exists in the world today Several hundred new viruses are discovered
every month
A good way to protect yourself is to have a virus protection program and keep it up- to-date.
Before running a download from an unknown site, or opening an email attachment, always be sure to
scan it to ensure that it is not infected. If you do not know the source of a file do not open it. Even if
you know the person who sent you a file, if you were not expecting it you may want to contact them
before opening it. This is because many viruses automatically send themselves out to addresses it finds
in files on the infected computer.
Anti-virus program:
An anti-virus program is designed to protect your computer from possible virus infections. Most
viruses are designed to operate in the background in a way that the user will not notice. Virus protection
programs search for, detect, and attempt to remove these viruses.
Due to the nature of the operating system, Linux, and other UNIX-like operating systems are not as
susceptable to viruses. Thus an anti-virus program is not necessary.
Network Worms
Network Worm is a Self-replicating Viruses that reside in the active memory of a computer. A worm is
a computer program that has the ability to copy itself from machine to machine. Worms use up
computer processing time and network bandwidth when they replicate, and often carry payloads that
do considerable damage. Worms send themselves out to the Internet from infected systems. Either
include tiny e-mail server or search for unprotected shared network drives to unload.
Trojan Programs:
Trojan, is a standalone malicious program that does not attempt to infect files unlike a computer
virus or replicate itself with the intent of infecting other computers unlike a computer worm. Trojan
horses can make copies of themselves, steal information, or harm their host computer systems
Trojan horses are often destructive programs that masquerade as benign applications. Unlike viruses
and worms, Trojan horses do not replicate themselves, but they can be just as destructive. One of the
most insidious types of Trojan horse is a program that claims to get rid of viruses but instead introduces
viruses onto the computer.
Spyware / Adware:
Other malware:
• Flooders
• Nukers … Etc.
Other Threats:
• Phishing
◻ Confidential information stealing by fraud emails & web sites (author falsified)
• SPIM
Diagnosing Infections:
Solutions to Overcome:
Anti-Virus Software:
Antivirus software is used to prevent, detect, and remove malware, including but not limited to
the computer viruses, computer worms, Trojan horses, spyware and adware. Computer security,
including protection from social engineering techniques, is commonly offered in products and services
• Norton Anti-Virus
• McAfee Anti-Virus
• AVG Anti-Virus
INSTALLATION OF ANTI-VIRUS
Head over to the Microsoft Security Essentials page and download the software. Double-click on
the installer to begin the installation process.
The installation should be pretty self-explanatory. Just follow the steps it gives you. Make sure
you've checked the box to turn on the Windows Firewallwhen prompted, and give the whole
thing a few minutes to install.
When it's done, it will ask you to run a scan. Hit yes, and it will download the latest
virus definitions and run its first scan. All of this will take a few minutes, so just leave the program
alone and let it do its thing.
When it's finished it's scan (hopefully without finding anything), it will begin monitoring your
computer. Click the "Change My Scan Schedule" button to schedule a regular scan of your
computer. I usually like to run mine on Sunday at 2:00 AM, when I know I'll be sleeping. Save
your settings and you're done!
Now, Microsoft Security Essentials will run in the background, constantly monitoring your computer
for any viruses. If it catches anything, it will let you know and tell you how to proceed. It will also run a
scan during the time you've scheduled it for, so make sure your computer's running at that time (in the
above case, Sunday at 2 AM). You can check to make sure it's running by going to your system tray in
the bottom-right corner and looking for the green castle icon.
Remember, good anti-virus software is important, but even more important is practicing safe
browsing habits. The best way to avoid viruses is to make sure you don't download them in the first
place. Don't click on anything that claims its anti-virus software unless you know where it came from,
don't click on any suspicious Facebook posts, and make sure that you don't click on any fake email
links. If you get an email from ebay.com, hover over the link and look at the bottom of your
screen to make sure it actually goes to somewhere at www.ebay.com—if it goes somewhere else,
it's probably going to harm your computer.
In very simple terms, a firewall is a device or program that allows you to monitor and control what comes
into and goes out of your network. Almost every major business will use a firewall to protect its internal
network from the outside world.
Traditionally firewalls were, and in many cases still are, very expensive, dedicated pieces of hardware
that use something called a "ruleset" to either allow or disallow connections through it. An effective
firewall will do this at the "packet" level, that is it looks at every piece of data, or packet, individually
before deciding to either allow it or drop it.
Firewall forces every piece of information entering or leaving the castle to pass over a single
drawbridge, where they could be inspected by the I/O police. The diagram below shows a very basic
small network and firewall.
Windows Firewall
A number of significant changes have been made to Windows Firewall (formerly called Internet
Connection Firewall or ICF) in Service Pack 2 - all designed to help improve computer security.
Prior to Service Pack 2, Windows XP shipped with the firewall disabled by default. Activating the firewall
meant having to either run a wizard or navigate through the Network Connections folder to turn it on
manually.
With installation of Service Pack 2, Windows Firewall is turned on by default, providing improved default
levels of protection on all new installations and upgrades. This also helps protect any new network
connections as they are added to the system.
When someone on the Internet or on a network tries to connect to your computer, we call that attempt
an "unsolicited request." When your computer gets an unsolicited request, Windows Firewall blocks the
connection. If you run a program such as an instant messaging program that needs to receive
information from the Internet or a network, the firewall asks if you want to block or unblock (allow) the
IT Workshop Lab Manual Page 41
connection. You should see a window like the one below.
Each time you allow an exception for a program to communicate through Windows Firewall, your
computer is made more vulnerable. To allow an exception is like poking a hole through the firewall. If
there are too many holes, there's not much wall left in your firewall. Hackers often use software that
scans the network looking for computers with unprotected connections. If you have lots of exceptions
and open ports, your computer can become more vulnerable.
To help decrease your security risk:
• Only allow an exception when you really need it.
• Never allow an exception for a program that you don't recognize.
• Remove an exception when you no longer need it.
Sometimes you might want someone to be able to connect to your computer, despite the risk - such as
when you use VNC to let support staff to connect to your computer.
If the program (or service) that you want to allow is not listed in the Add a Program dialog box click
Browse , locate the program that you want to add, and then double- click it. (Programs are usually
stored in the Program Files folder on your computer.) The program will appear under Programs , in the
Add a Program dialog box.
By default when you enable an exception it will unblock access from all computers that are on the same
network as you, e.g. the whole Internet. You can restrict this access to only those systems or networks
that you trust. You do this by changing the scope of the exception.
1. On the Exceptions tab, under Programs and Services, select the program or service that you
want to change the scope of, and then click Edit.
2. Click Change scope on Edit a Program.
3. Select Custom list in Change Scope. Then add the details of the hosts and/or networks you wish to
unblock.
Windows Update:
You might need to have a computer administrator account to perform some tasks. Windows Update is
the online extension of Windows that helps you keep your computer up to date. Microsoft offers
important updates-which include security updates and other critical issues—to help protect your
computer against new viruses and other security threats that can spread over the Internet or a network.
Other updates contain enhancements such as upgrades and tools that can help your computer run
more smoothly. Windows Update scans your computer and provides you with a tailored selection of
updates that apply only to the software and hardware on your computer.
• To open Windows Update, click Start, click All Programs, and then click Windows Update.
• The first time you go to the Windows Update Web site, click Yes when prompted to install any
required software or controls.
• To use Windows Update, you need to establish a connection to the Internet.
• For more information, click Related Topics.
Procedure:
• To open System, click Start, click Control Panel, click Performance and Maintenance, and then
click System.
• Automatic updates provides high-priority updates, which include security and other critical
updates that can help protect your computer. It's a good idea to visit the Windows Update Web
site (http://www.microsoft.com/) on a regular basis to get optional updates, such as
recommended software and hardware updates, that can help improve your computer's
performance.
•
Experiment 3: LaTeX and WORD
LaTeX is a powerful typesetting system, especially for technical documents and mathematical content,
while Microsoft Office (or its FOSS equivalent, LibreOffice) is a general-purpose word processing
suite. LaTeX focuses on the quality of the final output, while MS Office prioritizes ease of use and
WYSIWYG (What You See Is What You Get) editing.
To work with LaTeX, we’ll need a TeX distribution and a LaTeX editor:
TeX distribution: This includes the LaTeX typesetting system as well as various tools and packages. Some
popular TeX distributions include Tex Live and MikTeX.
LaTeX editor: While it is possible for users to create LaTeX documents using a plain text editor (e.g.,
NotePad or NotePad++), specialized LaTeX editors provide a more user-friendly interface with features
like syntax highlighting and error checking. Some LaTeX editors include TeXShop (for macOS users);
TeXworks, TeXstudio, LyX (for both Windows and Linux users); or Overleaf (an online and collaborative
LaTeX editor that doesn’t require local software installation).
The first step is to create a new LaTeX project. You can do this on your own computer by creating a new
.tex file; alternatively, you can start a new project in Overleaf.
Let’s start with the simplest working example, which can be opened directly in Overleaf:
\documentclass{article}
\begin{document}
First document. This is a simple example, with no extra parameters or packages included.
\end{document}
Adding images
Adding images
1. Use the Insert Figure button( ), located on the editor toolbar, to insert an image into Visual
Editor or Code Editor.
\documentclass{article}
\usepackage{graphicx} %LaTeX package to import graphics
\graphicspath{{images/}} %configuring the graphicx package
\begin{document}
The universe is immense and it seems to be homogeneous,
on a large scale, everywhere we look.
Ordered lists
Ordered lists use the same syntax as unordered lists but are created using the enumerate environment:
\documentclass{article}
\begin{document}
\begin{enumerate}
\item This is the first entry in our list.
\item The list numbers increase with each entry we add.
\end{enumerate}
\end{document}
This example produces the following output:
One of the main advantages of LaTeX is the ease with which mathematical expressions can be
written. LaTeX provides two writing modes for typesetting mathematics:
inline math mode used for writing formulas that are part of a paragraph
display math mode used to write expressions that are not part of a text or paragraph and are
typeset on separate lines
\documentclass[12pt, letterpaper]{article}
\begin{document}
In physics, the mass-energy equivalence is stated
by the equation $E=mc^2$, discovered in 1905 by Albert Einstein.
\end{document}
When you create a document in Word, you can choose to start from a blank document or let a template
do much of the work for you. From then on, the basic steps in creating and sharing documents are the
same. And Word's powerful editing and reviewing tools can help you work with others to make your
document great.
2. On the Home tab, click the drop-down arrow next to the Font box. A menu of font styles will
appear.
3. Select the font style you want to use.
When creating a professional document or a document that contains multiple paragraphs, you'll want to
select a font that's easy to read. Along with Calibri, standard reading fonts include Cambria, Times New
Roman, and Arial.
To change the font color:
1. Select the text you want to modify.
3. Select the font color you want to use. The font color will change in the document.
Your color choices aren't limited to the drop-down menu that appears. Select More Colors at the bottom
of the menu to access the Colors dialog box. Choose the color you want, then click OK.
2. On the Home tab, click the Change Case command in the Font group.
3. A drop-down menu will appear. Select the desired case option from the menu.
To highlight text:
Highlighting can be a useful tool for marking important text in your document.
1. Select the text you want to highlight.
2. From the Home tab, click the Text Highlight Color drop-down arrow. The Highlight Color menu
appears.
3. Select the desired highlight color. The selected text will then be highlighted in the document.
If you need to highlight several lines of text, changing the mouse into a highlighter may be a helpful
alternative to selecting and highlighting individual lines. Click the Text Highlight Color command, and
the cursor changes into a highlighter. You can then click and drag the highlighter over the lines you want
to highlight.
To change text alignment:
By default, Word aligns text to the left margin in new documents. However, there may be times when
you want to adjust text alignment to the center or right.
1. Select the text you want to modify.
2. On the Home tab, select one of the four alignment options from the Paragraph group. In our
example, we've selected Center Alignment.
\documentclass[16pt,a4paper]{scrartcl} %class
\usepackage[landscape,left=2cm,right=2cm,top=2cm,bottom=2cm]{geometry} %for layout
\usepackage{setspace} % for spacing between lines
\usepackage{graphicx} %for including images
\usepackage{eso-pic} %package for including background image
\usepackage{color}
\definecolor{a}{rgb}{0,0.08,0.45}
\definecolor{red}{rgb}{0.5,0,0}
%---------------------------------------------------------------
\newcommand\BackgroundPic{
\put(0,0){
\parbox[b][\paperheight]{\paperwidth}{%
\vfill
\centering
}}
\end{minipage}
\hfill
%=============================
\begin{minipage}[r]{1.0in}
\includegraphics[width=1.2\linewidth]{\photo} %here include right side image
\end{minipage}
\hfill
%=============================
\vspace{4cm}
\doublespacing
\noindent{{\bfseries This is to certified that {{\underline{\name}}} student of {{\underline{\dep}}}
department
of VNR VJIET,Hyderabad has successfully completed Semester Project work on the day \underline{ 15 },in
the month of \underline{ June }, the year\underline{ 2024 }.
}}
\noindent
%\beginskip
{\singlespacing
\vfill
\begin{minipage}[l]{2.8in}
\sigskip \signature{}{\bfseries\color{a} Mr. D.Srinivasa Rao \\ \bfseries\color{a} Co-ordinator }
\end{minipage}
\hfill
\begin{minipage}[c]{2.8in}
\sigskip \signature{}{\bfseries\color{a} Mr. Srikanth Reddy \\ \bfseries\color{a} Co-ordinator }
\end{minipage}
\hfill
\begin{minipage}[r]{2.8in}
data.csv
Name Dep photo
CSE-(DS,CyS) and AI
Rajdeep & DS img/image1.jpeg
CSE-(DS,CyS) and AI
Reena & DS img/image2.jpeg
CSE-(DS,CyS) and AI
Rajan verma & DS img/image3.jpeg
CSE-(DS,CyS) and AI
Sham kumar & DS img/image4.jpeg
CSE-(DS,CyS) and AI
Rita Verma & DS img/image1.jpeg
1. Using a certificate template — This is the easier way to generate certificates in Word. All you
need to do is choose a template and edit the text.
2. Without using a template — This is a lengthier method since you’re starting with a blank page.
You must choose every design element, from borders to text boxes, and fix the alignment.
This step-by-step guide will teach you how to create a certificate in Word with a template.
Step 1: Open a new Word document
Launch the Microsoft Word application from your Desktop or the taskbar. Once you’ve opened the
application, you’ll see a blank document. If you don’t, click on File, and from the side menu, click
on New on the Home tab to open a fresh document for editing.
Next, select a certificate template that fits your requirements and click Create. It should now open the
template as a new document.
Select a Template
Unable to find your preferred border? Click on Custom under Setting, and select your favorite border
design. Finally, click OK to apply your chosen border.
Does your organization have specific brand colors? If so, it's recommended to select your brand colors
for your certificates. To do this, under the Design tab, expand the Colors option.
Next, hover over a theme that best fits your brand colors. Select your theme and Save changes. This
action will automatically change the default colors on your certificate template to the chosen theme.
To edit content:
Start by updating the certificate title. Click inside the title box to edit.
In the Home tab, you can find the current font style and size. Click on the font name to access a
drop-down menu. Scroll down and choose your favorite font. You could also change the font size
if you’d like.
Type your personalized text, such as “Certificate of Award,” “Certificate of Achievement,” etc. Add a
message to highlight the recipient’s achievements and more.
Repeat the same steps for the rest of the content on your template.
You now have your very own certificate that’s ready to download and send.
Like the previous method, under the Design tab, select Page Borders. Now, in the pop-up menu,
select Page Border and choose either Style or Art (for professional certificates, choose only Style).
Select your preferred border color under the Color dropdown, and choose the line width. Finally, select
the Box option under Setting, and click on OK to apply the changes.
Add Borders
Step 3: Add text boxes for certificate content
To add a text box, under the Insert tab of the main menu, click on Text Box and select Simple Text Box.
Next, start placing text boxes on your blank canvas, and modify content using your preferred font styles,
sizes, colors, and more.
Once complete, you can save and preview the certificate. Download the file to print your certificate once
you’re satisfied with your design.
The HOME Tab includes commands related to the Clipboard, font selections, paragraph
The INSERT tab includes what you need to add pages, tables, illustrations, links, headers and
footers, text objects, and symbols in your document.
The PAGE LAYOUT tab contains the commands for working with themes page backgrounds,
The REFERENCES tab includes special elements you will use when you create longer or
more complete documents.
The MAILINGS tab is a new addition in the Office Word 2007 interface. Here you can find
everything you need to creating, previewing, and producing a mail merge project.
The Office Button is the round icon at the top left-hand corner. It includes the
Click on the Office Button icon. You will see the main file functions in the pull-down
menu.
From these options you can Create a File, you can open existed files, save a file, Save
As option to save another copy with another name, print option, close option, etc.
Ruler and Scroll Bar (Top) Ruler and Scroll Bar (Bottom)
THEORY:
Border:
To specify a particular page or section for the borders to appear, click the option you
want to apply. To specify the exact position of the border on the page.
To apply the color most recently applied to text, click font color.
To apply different colors, click the arrow on the right of the font color button, select the color
Result: Creation of project Certificate using MS Word completed successfully by applying different
options.
Procedure:
d. To edit these fields, you must use the Form Field Options button on the
Forms toolbar.
Forms toolbar.
5. Mail Merge
a. On the Tools menu, point to Letters and Mailings, and then click
Mail Merge.
AIM:
THEORY:
Table:
Cell Alignment:
Aligns contents written in a table in the top left corner or top right corner
or in the center etc...
Foot Note:
Foot notes are used to comments on, or provide references for text in a document.
Hyperlink:
It is a colored and underlined text or a graphic that you click to go to a file, a location in
a file, an HTML page on the World Wide Web, or an HTML page in an intranet.
Symbols:
You may not be able to enter certain symbols into your word document, as there is a
limitation on the keys on the key board. Creating these new symbols especially when
Formatting Styles:
o A style is a set of rules to be followed for the effective document.
o Style can be applied to text, paragraph, table or a list.
You can change the text orientation in drawing objects, such as text boxes, shapes,
and callouts, or in table cells so that the text is displayed vertically or horizontally.
Track changes:
Procedure:
1. Click the drawing object or table cell that contains the text you want to
change.
2. On the Format menu, click Text Direction.
3. Click the orientation you want.
Table:
Cell Alignment:
Foot Note:
1. In print layout view, click where you want to insert the note reference mark.
2. On the Insert menu, point to Reference, and then click Footnote.
3. Click Footnotes or Endnotes.
By default, Word places footnotes at the end of each page and endnotes at the
end of the document. You can change the placement of footnotes and endnotes
by making a selection in the Footnotes or Endnotes box.
Word inserts the note number and places the insertion point next to the note
number.
Hyper link:
Select the text or picture you want to display as the hyperlink, and then click Insert
Hyperlink on the Standard toolbar
3. In the Name of new document box, type the name of the new file.
4. Under When to edit, click either Edit the new document later or Edit the
new document now
An e-mail address:
1. Select the text or picture you want to display as the hyperlink, and then
click Insert Hyperlink on the Standard toolbar
2. Under Link to, click E-mail Address.
3. Either type the e-mail address you want in the E-mail address box, or select an
e-mail address in the recently used e-mail addresses box.
4. In the Subject box, type the subject of the e-mail message A
1. Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then
press SPACEBAR or TAB.
2. Type any text you want.
3. Press ENTER to add the next list item.
4. To finish the list, press ENTER twice, or press BACKSPACE to delete the last
bullet or number in the list
Formatting Styles:
style you want is not listed, click All Styles in the Show box
Track Changes:
o. To exclude a particular recipient from the merge, click Exclude this recipient.
q. You can either print all the letters or Edit individual letters
THEORY:
Table of contents:
Newspaper columns:
Inserting a picture (graphic) from a file and clipart may be required for a
document. This picture could be a scanned photograph or any other digitally produced
IT Workshop Lab Manual Page 76
one. This pictures can be modified , resized, cropped and enhanced.
One can create his/her own drawings in Microsoft word. Ms word provides a full
Word Art in Microsoft word enables you to create special and decorative text.
PROCEDURE:
Table of contents:
Newspaper columns:
3. Any desired number of columns are presets-one or two or three or left or right
b\can be selected.
4. Width and spacing can be fixed and equal columns width can be checked for
uniformity
5. If newspaper columns are to be separated by a line, then check line between
6. Under apply to will be whole document if entire document is selected else we have
7. Click ok
CLIP ART:
1. On the Insert menu, point to Picture, and then click Clip Art.
2. In the Clip Art task pane, in the Search for box, type a word or phrase that
describes the clip you want or type in all or some of the file name of the
clip.
3. To narrow your search, do one or both of the following:
To limit search results to a specific collection of clips, in the Search
in box, click the arrow and select the collections you want to search.
To limit search results to a specific type of media file, in the Results
should be box, click the arrow and select the check box next to the
types of clips you want to find.
4. Click Go.
5. If you don't know the exact file name, you can substitute wildcard
characters for one or more real characters. Use the asterisk (*) as a substitute for
zero or more characters in a file name. Use the question mark (?) as a substitute
for a single character in a file name.
3. Use the Drawing toolbar to add any shapes or pictures that you
want
WORD ART:
3. In the Edit WordArt Text dialog box, type the text you want.
2. The same can be achieved by selecting the tools menu > customize>tool
bars tab>picture and click close.
Resize a drawing
o To scale the drawing and make the objects and canvas proportionately
smaller or larger, click Scale Drawing, and then drag the edges of the
canvas.
To increase or decrease the size in one or more directions, drag the mouse
away from or toward the center, while doing one of the following:
o To keep the center of an object in the same place, hold down CTRL
while dragging the mouse.
o To maintain the object's proportions, drag one of the corner sizing
IT Workshop Lab Manual Page 79
handles.
o To maintain the proportions while keeping the center in the same place,
hold down CTRL while dragging one of the corner sizing handles.
Crop a picture
1. Select the picture you want to crop.
2. On the Picture toolbar, click Crop .
3. Position the cropping tool over a cropping handle and then do one of the
following:
o To crop one side, drag the center handle on that side inward.
o To crop equally on two sides at once, hold down CTRL as you drag
the center handle on either side inward.
o To crop equally on all four sides at once, hold down CTRL as you
drag a corner handle inward.
4. On the Picture toolbar, click Crop to turn off the Crop command.
Text Box:
1. On the Drawing toolbar, click Text Box .
2. Click or drag in your document where you want to insert the text box
3. You can use the options on the Drawing toolbar to enhance a text box— for
example, to change the fill color— just as you can with any other drawing
object
Paragraphs: Change line spacing
Select the text you want to change.
1. On the Formatting toolbar, point to Line Spacing, and then do one of the
following:
o To apply a new setting, click the arrow, and then select the number that
you want.
oTo apply the most recently used setting, click the button.
Forms:
Using Microsoft word one can create an organized and structured document with a
provision to enter the required information into it. A document of such nature is called a
form.
Mail Merge:
It helps us to produce from letters mailing labels envelopes catalogs and others
types of merged document. It is so found in the tools option on the menu bar. In tools
we have letters and mailing. In letters and mailing we have mail merge mail merge tool
box envelopes tables and letters wizard. In mail merge select the required document
you are working on. A window for customizing the data base structure appears. This file
contains the names, address details with contact numbers etc of people you wish to
send the letters.
Inserting objects:
Insert an object such as drawing word art text effects or an equation at the
inserting point.
Fields:
It inserts a field at the inserting font fields are used to insert a variety of
information automatically. Select table in table select insert. In that select insert table a
box containing number of rows and columns will appear. Select six colors and four rows
and click o.k. Given the first row as date, problem repeated
objects in the feedback form and apply the text fields in the form.
PROCEDURE:
Mail Merge:
1. Open a document and type the complete body of the letter and format it as
required.
2. Create a data source and choose mail merge from tool bar a window is
displayed.
3. Click on create button and choose from letter options. Then a window is
displayed.
4. Click active window choose currently active document. Click on data and
create data source option.
5. A window for customizing the data base structure appears and this file
contains the names address details with contact number etc. we can add or
remove fields from this file.
6. Once the list of fields is finalized a window of same is displayed and types the
required file names and click on save button.
8. Click on the o.k. to finish entering the records mail merge tool bar is displayed.
9. Place the curser at the place where you wish to insert names and click on
insert mail merge button. A drop list is displayed all fields created would be
shown.
10. By highlighting to desired file and click on it we can insert the field into the
main document and go to begin the mail merge click on mail merge.
Forms:
1. Design the form by sketching a layout first, or use an existing form template as a
guide. Tables, text boxes, borders, and shading are all design elements that can
help you create a well-designed form that's easy to use.
1. On the File menu, click Page Setup, and then click the Layout tab.
2. In the Apply to box, click Whole document.
3. Click Line Numbers.
4. Select the Add line numbering check box, and then select the options you want.
TITLE:
Slide 1 – contents
3 – Address Slide 4 –
Hobbies Slide 5 –
Friends
AIM:
THEORY:
SLIDE LAYOUT:
3. In the slide layout task pane, point to layout you and then click it.
4. A new slide can also be inserted within the task pane. Point the layout you
want the slide to have, click the arrow and then click the insert new slide.
FORMATTING TEXT:
1. Select the lines of text that you want to add bullets or numbering to.
2. Click bullets or numbering.
AUTOSHAPES:
1. Select the auto shape that has the text you want to position.
2. Double-click the selection rectangle of the auto shape or text box and then
click the text box tab in the format dialog box.
3. In the text anchor point box, click the position you want the text to start in.
5. To specify a fill effect, click fill efeect and then select the options you
want on the gradient, text patterns or picture tabs.
PROCEDURE:
First click on start button at the button of the screen on status bar. Click on programs and
then Microsoft PowerPoint. Go to file and new. Then you find different pattern of slides on right side of
your screen. Then select which is completely empty. Then enter the contents in the first slide as per given
information, name in the second slide, Address in the third slide, Hobbies in the fourth slide and friends in
the fifth slide. Except first slide, all the second, third, fourth, fifth slides should be inserted. When you select
pattern of slide from a new slide, on slide which you selected you will find an arrow towards its right side,
click that arrow and then again click insert slide. Then save it. Then adjust the layout. Then format the text
then give bullets or numbering to the text if required. Go to auto shapes. Select more auto shapes and
insert wherever required. Then again go to insert option and select new slides. And select chart and a chart
with datasheet appear. Give the name, roll no, marks in three subjects and calculate the total. Then save
the file.
TEST DATA: No Test data for this Experiment
techniques
THEORY:
HYPERLINK:
(iii) Select the text or object that you want to represent the hyperlink.
INSERT IMAGES:
CLIP ART:
CHART:
IT Workshop Lab Manual Page 87
1. Click the slide where you want to place the embedded object.
2. On the insert menu, click chart.
3. Click a cell on the data sheet and then type the information you
want
To return to the slide, click outside the chart.
PROCEDURE:
First click on start button at the bottom of the screen on status bar.
Click on programs and then Microsoft power point goes to file menu.
Then you find different pattern of slides on right side of your screen.
Then select which is completely empty. Then enter the name of your college in bold
letters.
List of all the available courses in the third slide, extra co-curricular activities in the
fourth slide except first slide, all the second, third, fourth slide should be inserted.
When you select pattern of slide from a new slide, on slide which you selected, you will
find an arrow towards it right side click that arrow and then again click insert slide.
Then save it the select the slide show and then select the view show option.
Then review the presentation in slide show by selecting next and after completing the
slide show then click end show.
Click on start button at the button of the screen on status bar, click on programs and
then Microsoft power point. Go to file menu.
On insert menu and select table option and give no. of rows and no. of columns and
give the name, Roll no and marks in three subjects and find the total