0% found this document useful (0 votes)
15 views73 pages

Inputs Outputs Storage: Kits:: Markapur Department of Computer Science and Engineering

The document outlines the identification and configuration of peripherals for PCs, laptops, servers, and smartphones, detailing their functionalities, input/output devices, and storage technologies. It also covers the installation procedure for the Linux operating system, including language selection, keyboard configuration, and disk partitioning. Additionally, it describes major computer network components and digital data storage methods, emphasizing the importance of various storage devices and their capacities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views73 pages

Inputs Outputs Storage: Kits:: Markapur Department of Computer Science and Engineering

The document outlines the identification and configuration of peripherals for PCs, laptops, servers, and smartphones, detailing their functionalities, input/output devices, and storage technologies. It also covers the installation procedure for the Linux operating system, including language selection, keyboard configuration, and disk partitioning. Additionally, it describes major computer network components and digital data storage methods, emphasizing the importance of various storage devices and their capacities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 73

22JU1A6149

Experiment 1:
Identification of peripherals of a PC, Laptop, Server and Smart Phones: Prepare a
report containing the block diagram along with the configuration of each component and
its functionality, Input/ Output devices, I/O ports and interfaces, main memory, cache
memory and secondary storage technologies, digital storage basics, networking
components and speeds.
Peripherals are devices that are not the computer's core architecture involved in memory and
processing. Peripherals include input hardware, output hardware and storage devices.
A typical desktop computer could include:

 inputs - mouse, keyboard, webcam, games controller


 outputs - screen, printer, speakers, headphones
 storage - hard drive

Connections
Peripherals connect to the processor hardware through the motherboard. External devices will
connect to the motherboard via USB, FireWire or through a wireless connection such
as Bluetooth.
Inputs: Input devices send signals into the computer that have to be interpreted by
the operating system using drivers. Some of the most common input devices include:
Keyboard - used to enter characters and data into computers. A QWERTY keyboard uses the
standard layout for English-speaking countries. The Dvorak keyboard layout is an alternative
and was designed to avoid awkward key combinations. Keys on a keyboard
send binary information into the computer which is interpreted using
the ASCII or Unicode character sets.
Mouse - used to control a pointer on the screen of a computer.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1
22JU1A6149

Digital camera/web cam - used to capture and create images.


Scanners - used to copy physical printed materials into the computer. Scanners are often
incorporated into printers.
Printer- A device that prints images (numbers, alphabets, graphs, etc…) on paper is known as
Printer.
We have different types of printers to take printouts. These are as follows: i)Dot matrix printer
ii)Inkjet printer
System board/MotherboardThis is the major part of the PC hardware.It manages all
transactions of data between CPU peripherals. which holds the Processor, Random Access
Memory and other parts, & has slots for expansion cards.It is rectangle shape
Socket 478:It use 478 – PIN MICROPGA package it is used installing CPU.It is square type
design.
CPU:The central processing unit contains the heart of any computer, the processor. The
processor is fitted
on to a Mother Board. The Mother Board contains various components, which support the
functioning
of a PC.It is brain of the computer. It is square shape.
Input & Output ports: IO ports are used to connecting IO device such as key boards, mouse,
monitor, printer, scanner,
speakers etc...

Key board Cabinet Monitor Mouse

Printer Speakers Scanner


KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 2
22JU1A6149

Mother board Socket

CPU

Sensors
Sensors are used in many systems including security, temperature control, motion and eye
tracking. They are also used in games controllers and to help scientists research medical
conditions.
Motion sensors send a beam of light out and can detect if the beam is broken. They may also
use radio or sound waves, which will be reflected back if they are interrupted. However, most
security systems use passive sensors. These don't send signals out, but wait to receive a signal
in. The most commonly used passive sensor is an infra-red sensor. Since all human beings emit
infra-red energy, as soon as a person walks within reach of an infra-red sensor they will be
detected.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 3


22JU1A6149

Outputs
There are thousands of different output hardware devices. Some of the most common examples
include:
 Screen - used to give us access to the programs and the file system through a command
line interface (CLI) or a graphical user interface (GUI). Most screens make use
of LED or LCD technology.

 Printer - used to print photographs, images and text onto paper and card. There are three
main categories of printer: ink-jet, dot-matrix and laser.
 3D printers print out very thin layers of plastic one layer at a time to build up a 3D
object. 3D printing has been used in heart surgery and space technology research.
Inputs and outputs combined
Some peripherals operate as both inputs and outputs.
 Soundcard - used to receive and give out any sound more complicated than a basic
beep. A soundcard is usually inside the computer connected to the motherboard. Hi-spec
soundcards can be external and connected by FireWire or USB. Powerful external
soundcards are used in music recording studios to process live music recordings.
 Microphone - used to record sounds and communicate over the internet. Microphones
convert analogue sound into digital sound. Voice activation devices allow us to give
voice commands to a computer. Therefore, voice control can be used instead of a mouse
or keyboard to interact with a screen reader.
 Touchscreen - used to control a device with fingers or a stylus. The touchscreen allows
a more intuitive form of interaction with a computer screen through icons. It also outputs
images. Touchscreens can be used to help with security, eg some smartphones can use
fingerprint recognition technology to unlock a phone screen.
 Interactive white board - a touch-sensitive surface linked to a computer and a
projector. The user can interact with the projection using their finger or a special pen.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 4


22JU1A6149

 Multi-touch table - the whole surface of a table is the interface. The surface is a semi-
transparent material such as glass or Perspex. A data projector is located beneath the
table top and an infrared camera detects objects interacting with the surface.
 Haptic feedback - gives outputs that the user can sense based on inputs, eg games
controllers often have a rumbling sensation to reflect an explosion or collision onscreen.

Storage:Storage is non-volatile disk space, and is sometimes called auxiliary


memory, secondary memory or external memory. Storage devices, like an external hard
drive are used to store files like photos, program files and any other information that needs to
kept long term. The data on a storage drive needs to be loaded into RAM before it can be used.
Internal storage:Most computers have internal storage space.The internal storage drive stores
the operating system and software applications. It is normally a hard disk drive (HDD) or a
solid state drive (SSD).
External storage:External HDDs and SSDs can also be used to store data. USB memory
sticks, memory cards, CDs and DVDs are convenient external storage media. They are
normally connected to a computer using USB or FireWire connections.
Hard disk drive (HDD):Hard drives can store large amounts of data - 200 GB to 1 TB is
common in desktop computers.
A magnetic disk drive consists of a number of platters (disks) coated in a magnetic material.
They spin at around 7200 rpm. The data is encoded into bits and written onto the surface as a
series of changes in the direction of the magnetization. The data is read by detecting the
changes in direction.
Flash memory and solid state drives SSDs:Flash memory is a type of non-
volatile ROM memory called EEPROM (electronically erasable programmable read only
memory). This is a form of static RAM.
Optical and tape storage:Optical storage and tape storage are useful for storing backup
information.
Optical storage:CD, DVD and Blu-ray discs are forms of optical storage. They are a useful
lightweight media for transporting data and programs. Data is written onto the disc by a laser
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 5
22JU1A6149

and is read from the disc by another laser. The discs are cheap, but they are vulnerable to
scratches. They cannot store as much data as a hard drive. A CD stores up to 800 MB, a DVD
holds up to 4.7 GB and a Blu-ray holds up to 50 GB.You need to have a CD, DVD or Blu-ray
writer on your computer to write information to the discs. CD, DVD and Blu-ray discs are
useful for creating film or music discs which are compatible with hardware such as DVD
players.
Tape storage:Big businesses and science projects, which process thousands of bytes of data
every second, often use tape storage to back up their data. It is a very cheap and reliable way to
store large amounts of data.
Major computer network components
Computer network requires the following devices (some of them are optional):-
• Network Interface Card (NIC) • Hub • Switches
• Cables and connectors • Router • Modem

1. Network Interface Card


Network adapter :It is a device that enables a computer to talk with other computer/network.
Using unique hardware addresses (MAC address) encoded on the card chip, the data-link
protocol employs these addresses to discover other systems on the network so that it can
transfer data to the right destination.
There are two types of network cards: wired and wireless. The wired NIC uses cables and
connectors as a medium to transfer data, whereas in the wireless card, the connection is made
using antenna that employs radio wave technology. All modern laptop computers incorporated
wireless NIC in addition to the wired adapter.
Network Card Speed: Network Interface card, one of the main computer network
components, comes with different speeds, 10Mbps, 100Mbps, and 1000Mbps, so on. Recent
standard network cards built with Gigabit (1000Mbps) connection speed. It also supports to
connect slower speeds such as 10Mbps and 100Mbps. However, the speed of the card depends
on your LAN speed.
2. Hub: Hub is a device that splits a network connection into multiple computers. It is like a
distribution center. When a computer request information from a network or a specific
computer, it sends the request to the hub through a cable. The hub will receive the request and
transmit it to the entire network. Each computer in the network should then figure out whether
the broadcast data is for them or not. Currently Hubs are becoming obsolete and replaced by
more advanced communication devices such as Switchs and Routers.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 6


22JU1A6149

3. Switch:Switch is a telecommunication device grouped as one of computer network


components. Switch is like a Hub but built in with advanced features. It uses physical device
addresses in each incoming messages so that it can deliver the message to the right destination
or port.
4. Cables and connectors:Cable is one way of transmission media which can transmit
communication signals. The wired network typology uses special type of cable to connect
computers on a network.
There are a number of solid transmission Media types, which are listed below.
Twisted pair :
It is classified as Category 1, 2, 3, 4, 5, 5E, 6 and 7. Category 5E, 6 and 7 are high-speed cables
that can transmit 1Gbps or more. -
Coaxial cable: Coaxial cable more resembles like TV installation cable. It is more expensive
than twisted-pair cable but provide high data transmission speed.
Fiber-optic cable: It is a high-speed cable which transmits data using light beams through a
glass bound fibers. Fiber-optic cable is high data transmission cable comparing to the other
cable types. But the cost of fiber optics is very expensive which can only be purchased and
installed on governmental level.
5. Router: When we talk about computer network components, the other device that used
to connect a LAN with an internet connection is called Router. When you have two
distinct networks (LANs) or want to share a single internet connection to multiple computers,
we use a Router.
Digital Data Storage: Digital data storage is essentially the recording of digital information in
a storage medium, usually by electronic means. The storage device typically enables a user to
store large amounts of data in a relatively small physical space and makes sharing that
information with others easy. The device may be capable of holding the data either temporarily
or permanently. Digital data storage devices have many uses Digital data storage media
generally fall into one of five categories: magnetic storage devices, optical storage devices,
flash memory devices, online/cloud storage, and paper storage
Digital Data Storage Devices for Computers
1. Hard Drive Disk 2.Floppy Disks
3. DVD and Blu-ray Discs 4. Tapes
5. Compact Discs (CDs) 6.Secure Digital Cards (SD Card)s
7. Solid-State Drives (SSDs) 8.Cloud Storage
9. Punch Cards 10.USBFlash Drives.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 7


22JU1A6149

Size Equal to
Bit 1 Bit
Nibble 4 Bits
The computer memory is mentioned in terms of
Byte 8 Bits
bytes only. KiloByte 1024 Bytes
MegaByte 1, 024 Kilobytes
GigaByte 1, 024 Megabytes
TeraByte 1, 024 Gigabytes
PetaByte 1, 024 Terabytes
ExaByte 1, 024 Petabytes

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 8


22JU1A6149

Experiment 2:Operating System installation:


Installing an Operating System such as Linux on Computer hardware.

Software Requirement: Linux Compact Discs


Hardware Requirement: Personal computer
PROCEDURE:
1. Language Selection:
 Using your mouse select the language you would prefer to use for the installation
 Click next to continue.
2. Key Board Configuration:
 Using your mouse select the correct layout type for the keyboard youwould prefer to use
for the installation and as the system default.
 Once you have made the selection click next to continue.
3. Mouse Configuration:
 If you have a PS/2, USB or Bus mouse you do not need to pick a port anddevice. If you
have a serial mouse, you should choose the correct port anddevice that your serial mouse
is on.
 The Emulate 3 buttons checkbox allows you to use a two-button mouse asif it had three
buttons. If you select this check box you can emulate athird ―middleǁ button by
pressing both mouse buttons simultaneously.
4. Installation Type:
 Choose the type of installation you would like to perform.
 Your options are Personal desktop, Workstation, Server, Custom andupgrade
5. Disk partition Setup:
 You can chose automatic partitioning or manual partitioning using DiskDruid of Disk
 Automatic partitioning allows you to perform an installation without having to partition
your drives yourself.
 Automatic partitioning allows you to have some control concerning what data is
removed from your system. Remove all Linux partitions on this system.
 Your options are:
 Remove all partitions on this system
 Keep all partitions and use existing free space.
 To partition manually choose either Disk druid or fdisk partitioning tool.
 Lick next once you have made your selections.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 9


22JU1A6149

6. Partitioning your system:


 If you chose automatic partitioning and did not select Review skip ahead
 If you choose automatic partitioning and selected review you can either accept the
current partition settings (click next) or modify the setup using Disk Druid,the manual
partition tool.
 If you choose manual partition with disk skip ahead.
 At this point you must tell the installation program where to install Linux. This is done
by defining mount points for one or more disk partitions in which Linux will be
installed.
7. Adding Partitions:
To add a new partition select new button, a dialogue box appears.
Select the options and click ok
8. Boot Loader Configuration:
 Boot loader is the first software program that runs when a computer starts.
 The installation program provides two boot loaders GRUB ( GR and Unified Boot
Loader) which is the default and LILO If you do not want GRUB as your boot loader
click Change Boot Loader.
 You can then choose to install LILO or choose not to install boot loader at all by
clicking Do not install boot loader on the change boot loader button.
 Network devices are automatically detected and displayed in Network Devices list,
 Select a network device and click Edit Here you can configure IP address and net mask
of the device.
9. Firewall configuration: Offers firewall protection for enhanced protection.
A properly configured firewall can greatly increase the security of the system.
10. Time zone configuration: You can set your time zone by selecting your computers
physical location or by specifying your time zones offset from Universal Time.
11. Account Configuration:Allows to set Root password or user accounts Root count is
similar to the administrator password that you set up in Win NT.
Click add button to add a new non-rot user. Enter the details and click OK.
12. Packing group selection: You can select package groups which groups components
together or individual packages or a combination of the two.
TEST DATA: No Test data for this Experiment
ERROR: No Errors for this Experiment.
RESULT: Installing the OS of Linux is completed
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 10
22JU1A6149

EXPERIMENT 3:
Linux Operating System commands: General command syntax Basic help commands
Basic File system commands Date and Time Basic Filters and Text processing Basic File
compression commands
Miscellaneous: apt-get, vi editor

i)General command syntax:

A LINUX command may or may not have arguments. An argument can be an option or a
filename. The general format for LINUX commands is:

Syntax: command option(s) filename(s)

ii) Basic help commands:

Help command as told before just displays information about shell built-in commands. Here‘s
the syntax for it:

// syntax for help command

$help [-dms] [pattern ...]

Using help command:

$helphelp

help: help [-dms] [pattern...]

Display information about builtin commands.

Options for help command

-doption : It is used when you just want to get an overview about any shell built-in command
i.e it only gives short description.

-moption : It displays usage in pseudo-manpage format.

-soption : It just displays only a short usage synopsis for each topic matching.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 11


22JU1A6149

iii)Basic File system commands:CLI stands for command line interface. It is a program that
allows users to type text commands instructing the computer to do specific tasks.

1) Listing files (ls):


The ls command is used to view the contents of a directory. By default, this command will
display the contents of your current working directory.
You can use with the ls command:
 ls -R will list all the files in the sub-directories as well
 ls -a will show the hidden files
 ls -al will list the files and directories with detailed information like the permissions,
size, owner, etc.
2. pwd command:
Use the pwd command to find out the path of the current working directory (folder) you‘re
in. Basically a path of all the directories that starts with a forward slash (/).
 An example of an absolute path is /home/username.
3. cd command:
To navigate through the Linux files and directories, use the cd command. It requires either the
full path or the name of the directory, depending on the current working directory that you‘re
in.
Syntax:cdflodername or directory name
Some shortcuts to help you navigate quickly:
 cd .. (with two dots) to move one directory up
 cd to go straight to the home folder
 cd- (with a hyphen) to move to your previous directory
4. Cat command:
Cat (short for concatenate) It is used to list the contents of a file on the standard output (sdout).
To run this command, type cat followed by the file‘s name and its extension.
EX: cat file.txt.
Here are other ways to use the cat command:

 cat > filename creates a new file


 cat filename1 filename2>filename3 joins two files (1 and 2) and stores the output of
them in a new file (3)
 to convert a file to upper or lower case use, cat filename | tr a-z A-Z>output.txt
5. cp command:
Use the cp command to copy files from the current directory to a different directory. Ex: the
command cp scenery.jpg /home/username/Pictures would create a copy
of scenery.jpg (from your current directory) into the Pictures directory.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 12


22JU1A6149

6. mv command:
The primary use of the mv command is to move files, although it can also be used to rename
files.The arguments in mv are similar to the cp command. You need to type mv, the file‘s
name, and the destination‘s directory. For example: mv file.txt /home/username/Documents.
To rename files, the Linux command is mv oldname.extnewname.ext
7. mkdir command:
Use mkdir command to make a new directory — if you type mkdirkits it will create a
directory called kits.There are extra mkdir commands as well:

 To generate a new directory inside another directory, use this Linux basic
command mkdirkits/Newfile
 use the p (parents) option to create a directory in between two existing directories. For
example, mkdir -p kits/2020/Newfile will create the new ―2020‖ file.

8. rmdir command:

If you need to delete a directory, use the rmdir command. However, rmdir only allows you to
delete empty directories.

9. rm command:

The rm command is used to delete directories and the contents within them. If you only want
to delete the directory — as an alternative to rmdir — use rm -r.

Note: Be very careful with this command and double-check which directory you are in. This
will delete everything and there is no undo.

10.man command

Man stands for manual which is a reference book of a Linux operating system. It is similar to
HELP file found in popular software.To get help on any command that you do not understand,
you can type

Syntax:man command name.

ex: man pwd

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 13


22JU1A6149

iv)Date and Time :date command is used to display the system date and time. date command
is also used to set date and time of the system. By default the date command displays the date
in the time zone on which unix/linux operating system is configured.You must be the super-
user (root) to change the date and time.
Syntax:
date [OPTION]... [+FORMAT]
date [-u|--utc|--universal] [MMDDhhmm[[CC]YY][.ss]]
Options with Examples
date (no option) :With no options, the date command displays the current date and time,
including the abbreviated day name, abbreviated month name, day of the month, the time
separated by colons, the time zone name, and the year.
Command: $date
-u Option:Displays the time in GMT(Greenwich Mean Time)/UTC(Coordinated Universal
Time )time zone.
Command: $date -u
–date or -d Option: Displays the given date string in the format of date. But this will not
affect the system‘s actual date and time value.Rather it uses the date and time given in the form
of string.
Syntax: $date --date=" string "
Command:
$date --date="2/02/2010"
$date --date="Feb 2 2010"
–file or -f Option: This is used to display the date string present at each line of file in the date
and time format.This option is similar to –date option but the only difference is that in –date
we can only give one date string but in a file we can give multiple date strings at each line.
Syntax: $date --file=file.txt
$cat >>datefile
Command:
$date --file=datefile
8:-r Option: Thisis used to display the last modified timestamp of a datefile .
Syntax:
$date -r file.txt
We can modify the timestamp of a datefile by using touch command.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 14


22JU1A6149

List of Format specifiers used with date command:


%D: Display date as mm/dd/yy.
%d: Display the day of the month (01 to 31).
%a: Displays the abbreviated name for weekdays (Sun to Sat).
%A: Displays full weekdays (Sunday to Saturday).
%h: Displays abbreviated month name (Jan to Dec).
%b: Displays abbreviated month name (Jan to Dec).
%B: Displays full month name(January to December).
%m: Displays the month of year (01 to 12).
%y: Displays last two digits of the year(00 to 99).
%Y: Display four-digit year.
%T: Display the time in 24 hour format as HH:MM:SS.
%H: Display the hour.
%M: Display the minute.
%S: Display the seconds.
Syntax:
$date +%[format-option]
Ex:$date+%[H]

v)Basic Filters and text processors


Filters in Linux:
Filters are programs that take plain text(either stored in a file or produced by another program)
as standard input, transforms it into a meaningful format, and then returns it as standard output.
Linux has a number of filters.
Some of the most commonly used filters are:

1. cat :Displays the text of the file line by line.


Syntax:cat [path]

2. head :Displays the first n lines of the specified text files. If the number of lines is not
specified then by default prints first 10 lines.
Syntax:head [-number_of_lines_to_print] [path]

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 15


22JU1A6149

3. tail :It works the same way as head, just in reverse order. The only difference in tail is, it
returns the lines from bottom to up.
Syntax:tail [-number_of_lines_to_print] [path]
4. sort :Sorts the lines alphabetically by default but there are many options available to modify
the sorting mechanism. Be sure to check out the man page to see everything it can do.
Syntax:sort [-options] [path]
5. uniq :Removes duplicate lines. uniq has a limitation that it can only remove continuous
duplicate lines(although this can be fixed by the use of piping). Assuming we have the
following data.
Syntax:uniq [options] [path]
6. wc :wc command gives the number of lines, words and characters in the data.
Syntax:wc [-options] [path]

7. nl :nl is used to number the lines of our text data.


Syntax:nl [-options] [path]

Vi)Basic File compression commands


File compression is a routine task for most of the Administrators and normal users, to save disk
space and to move data from one location to another safer location, this compression utility is
used. from historical point of view tar utility was developed to get sequential data backup and
it was stored in magnetic tape drives. To send data via internet the compression utility play an
important role, it can hold multiple files together and will reduce the overall file size, this can
save both the time and internet bandwidth, Linux comes with very quick and effective tools
which can reduce file sizes from 40 to 80 percent. In this article we will discuss top 15 utilities
in Linux available for users.
1)tar file compression
The word tar is extracted from tape archive, this is most popular compression and
decompression tool for Linux administrators, it is used to archive in multiple file formats
like gzip, bzip2 or lzip etc.
# apt-get install tar

Example
Crate a file of 512MB size
# fallocate -l 512M um.img
Create archive
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 16
22JU1A6149

# tar -cvfz um.tar.gz um.img


-c – to create archive, -v – verbose, -f for archiving file, -z to compress files in gzip format.
2. gzip file compression
The gzip tool is most popular and fast file compression utility in Linux. Gzip tool keep original
file name the extension of compressed file .gz and time stamp. Usually comes as inbuilt
package for all distributions but can be install easily.
# apt-get installgzip
Examples
# gzipexamplefile
To get details about compressed file
# gzip -l examplefile.gz
compressed uncompressed ratio uncompressed_name
203559 209715200 99.9% examplefile

Starting the vi Editor


The following table lists out the basic commands to use the vi editor −
Sr.No. Command & Description

1 vi filename
Creates a new file if it already does not exist, otherwise opens an
existing file.

2 vi -R filename
Opens an existing file in the read-only mode.

3 view filename
Opens an existing file in the read-only mode.
Following is an example to create a new file testfile if it already does not exist in the current
working directory −
$vitestfile
Operation Modes
While working with the vi editor, we usually come across the following two modes −
 Command mode − This mode enables you to perform administrative tasks such as
saving the files, executing the commands, moving the cursor, cutting (yanking) and

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 17


22JU1A6149

pasting the lines or words, as well as finding and replacing. In this mode, whatever you
type is interpreted as a command.
 Insert mode − This mode enables you to insert text into the file. Everything that's typed
in this mode is interpreted as input and placed in the file.
vi always starts in the command mode. To enter text, you must be in the insert mode for
which simply type i. To come out of the insert mode, press the Esc key, which will take you
back to the command mode.

vii)Miscellaneous: vi editor, apt-get:

Getting Out of vi
The command to quit out of vi is :q. Once in the command mode, type colon, and 'q', followed
by return. If your file has been modified in any way, the editor will warn you of this, and not
let you quit. To ignore this message, the command to quit out of vi without saving is :q!. This
lets you exit vi without saving any of the changes.
The command to save the contents of the editor is :w. You can combine the above command
with the quit command, or use :wq and return.
The easiest way to save your changes and exit vi is with the ZZ command. When you are in
the command mode, type ZZ. The ZZ command works the same way as the :wq command.
If you want to specify/state any particular name for the file, you can do so by specifying it after
the :w. For example, if you wanted to save the file you were working on as another filename
called filename2, you would type :w filename2 and return.

Apt-get:
apt-get is a command-line tool which helps in handling packages in Linux. Its main task is to
retrieve the information and packages from the authenticated sources for installation, upgrade
and removal of packages along with their dependencies. Here APT stands for the Advanced
Packaging Tool.
Syntax:
apt-get [options] command
or
apt-get [options] install|remove pkg1 [pkg2 ...]
or
apt-get [options] source pkg1 [pkg2 ...]

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 18


22JU1A6149

Most Used Commands: You need to provide one of the commands below, if -h option is not
used.
 update : This command is used to synchronize the package index files from their
sources again. You need to perform an update before you upgrade or dist-upgrade.
Ex:apt-get update
 install : This command is used to install or upgrade packages.
Ex:apt-get install [...PACKAGES]
 remove : This is similar to install, with the difference being that it removes the packages
instead of installing. It does not remove any configuration files created by the package.
Ex:apt-get remove [...PACKAGES]
 download : This command is used to download the given binary package in the current
directory.
Ex : apt-get download [...PACKAGES]

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 19


22JU1A6149

Networking and Internet:


Experiment 4: Networking Commands: ping, ssh, ifconfig, scp, netstat, ipstat, nslookup,
traceroute, telnet, host, ftp, arp, wget,route

1.Ping Command: This utility is commonly used to check whether your connection to the
server is healthy or not.This command is also used in -

 Analyzing network and host connections


 Tracking network performance and managing it
 Testing hardware and software issues

Command Syntax:- ping hostname="" or="" ; You may Press Ctrl + c to exit from the pi
ng loop.

2.SSH Command: SSH which stands for Secure Shell, It is used to connect to a remote
computer securely. Compare to Telnet, SSH is secure wherein the client /server connection is
authenticated using a digital certificate and passwords are encrypted. Hence it's widely used by
system administrators to control remote Linux servers.

syntax :SSH username@ip-address or hostname

3.Ifconfig command :this command is one of the most important commands to configure and
display the network card configuration.If you simply type ifconfig it will display network
configuration like below. It saves all the network configurations in /etc/sysconfig/network-
scripts/ifcfg-eth0 interface wise.

4.scp command :This command is a frequently used command to copy files between servers.
SCP stands for secure copy. While cp is being used inside the Linux system. FTP is not secure
for file transactions there it comes SCP. You can copy files securely to and from remote hosts.
Syntax:$sudoscp /location1/file1.txt user@targethost:/home/
This will copy file from your local server to target server at /home directory.
5.netstat command :this command is useful command-line tools to print network connections
routing tables interface statistics and multicast memberships.
Syntax:$sudonetstat –r --Kernel IP routing table
$ sudonetstat –i--Kernel Interface table
6.nslookup command :This command is also very useful command for finding DNS related
information.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 20


22JU1A6149

DNS is a tool used for name resolution IP to host and host to IP as it is easy to remember name
versus remembering IP Address which is 32-bit address if we consider IP Version 4.
Syntax:$nslookup google.com
Non-authoritative answer:
Name: google.com
Address: 172.217.10.238
7.traceroute command:This command in Linux as the name suggests prints the route packets
tracing to destination network host using your present network and DNS infrastructure.
Syntax: $ sudotraceroute google.com
8.Telnet command:It helps to connect to remote linux computer. To run program remotely
and condut administrator. This utility is similar to the remote desktop feature found in the
window machine .
syntax: telnet hostname=” ” or =” “
9.hostname command :This command in Linux does the work as its name. If you need to
check your server name you can simply type hostname and it will print hostname for you.
Syntax:
$ hostname
10.FTP Command:FTP is file transfer protocol. It's the most preferred protocol for data
transfer amongst computers.You can use FTP to –
 Logging in and establishing a connection with a remote host
 Upload and download files
 Navigating through directories
 Browsing contents of the directories
 The syntax to establish an FTP connection to a remote host is -
 ftp hostname="" or=""

11.arp command: it means Address Resolution Protocal.it displays and modify the internet to
Ethernet address translation tables used by the arp. Syntax: arp[-v][-i if][-H type] –a
[hostname]
12.wget commands: This command is a free Linux command-line utility that is non-
interactive in nature and used to download files from the web. It supports protocols like
HTTP, HTTPS, and FTP.
Syntax :$wget<source url>
13.route command: This command in Linux is another useful command to display and modify
IP routing configurations. Syntax:$sudo routeKernel IP routing table

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 21


22JU1A6149

Experiment 5: Internet Services:


1)Web Browser usage and advanced settings like LAN, proxy, content, privacy, security,
cookies, extensions/ plugins
WEB Browser:
A web browser takes you anywhere on the internet, letting you see text, images and video from
anywhere in the world.A web browser takes you anywhere on the internet. It retrieves
information from other parts of the web and displays it on your desktop or mobile device. The
information is transferred using the Hypertext Transfer Protocol, which defines how text,
images and video are transmitted on the web.

This Photo by Unknown Author is licensed under CC BY-SA-NC


―A web browser, or simply "browser," is an application used to access and view websites.
Common web browsers include Microsoft Internet Explorer, Google Chrome, Mozilla Firefox,
and Apple Safari, Opera ,Maxthon‖.
Features & Tools Settings
The web browser supports & uses the many features to surf the web. They are,
a)Proxy Settings: A proxy acts as an intermediary between your computer and the Internet. It
intercepts all requests to the Internet to see if it can fulfill the request using its cache. Proxies
are used to improve performance, filter requests, and hide your computer from the Internet to
improve security.
Connection settings to use a proxy can be set in Firefox Options as follows:
1. Click the menu button and select Options.
2. In the General panel, go to the Network Settings section.
3. Click Settings…. The Connection Settings dialog will open.

 No proxy: Choose this if you don't want to use a proxy.


KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 22
22JU1A6149

 Auto-detect proxy settings for this network: Choose this if you want Firefox to
automatically detect the proxy settings for your network.
 Use system proxy settings: Choose this if you want to use the proxy settings configured
for your operating system.
 Manual proxy configuration: Choose this if you have a list of one or more proxy servers.
Ask your system administrator for the configuration information. Each proxy requires a
hostname and a port number.
o If the same proxy name and port number are used for all protocols, check Use this
proxy server for all protocols.
o No Proxy For: List of hostnames or IP addresses that will not be proxied. Use
<local> to bypass proxying for all hostnames which do not contain periods.
 Automatic proxy configuration URL: Choose this if you have a proxy configuration
(.pac) file. Enter the URL and click okay to save changes and load the proxy
configuration. file: and data: schemes can also be used here (e.g. file:///c:/proxy.pac or
data:,functionFindProxyForURL(){return "HTTPS example.com:3443";}).
o Reload: The reload button will load the currently available proxy configuration.
 Enable DNS over HTTPS: This setting enables DNS Over HTTPS (DoH) using the
specified server. For more information, see Firefox DNS-over-HTTPS.
Note: The Connection Settings dialog will also show extensions that control how Firefox
connects to the internet. You can disable these extensions by clicking Disable Extension.

b) Extensions

Extensions, or add-ons, can modify and enhance the capability of a browser. Extensions for
Firefox are built using the WebExtensions API cross-browser technology.
An extension adds features and functions to a browser. It‘s created using familiar web-based
technologies—HTML, CSS, and JavaScript. It can take advantage of the same web APIs as
JavaScript on a web page, but an extension also has access to its own set of JavaScript APIs.
This means that you can do a lot more in an extension than you can with code in a web page.
The technology for extensions in Firefox is, to a large extent, compatible with the extension
API supported by Chromium-based browsers, Then the we will talk about the
firefoxextentions.
To disable extensions
 Click the Firefox menu icon in the upper right of the browser toolbar.
 Choose Add-ons

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 23


22JU1A6149

 From the left navigation pane, choose Extensions.


 Choose Disable for each extension that you wish to turn off
 Alternatively, if you wish to disable all extensions as a troubleshooting measure, you
may choose to Create a new Mozilla Firefox Profile
To enable extensions
 Click the Firefox menu icon in the upper right of the browser toolbar.
 Choose Add-ons
 From the left navigation pane, choose Extensions.
 Choose Enable for each extension you wish to turn on.

c)Plugins
A plugin is a software add-on that is installed on a program, enhancing its capabilities. For
example, if you wanted to watch a video on a website, you may need a plugin to do so. If the
plugin is not installed, your browser will not understand how to play the video.

To disable plugins
 Click the Firefox menu icon in the upper right of the browser toolbar.
 Choose Add-ons
 From the left navigation pane, choose Plugins.
 Choose Never Activate for each plugin that you wish to disable.
 Alternatively, if you wish to disable all plugins as a troubleshooting measure, you may
choose to Create a new Mozilla Firefox Profile
To enable plugins
 Click the Firefox menu icon in the upper right of the browser toolbar.
 Choose Add-ons
 From the left navigation pane, choose Plugins.
 Choose Always Activate or Ask to Activate for each plugin, as needed.

d)Security Settings
Enhanced Tracking Protection in Firefox for desktop :
Enhanced Tracking Protection in Firefox automatically protects your privacy while you
browse.
The shield to the left of the address bar tells if you if Firefox is blocking trackers and scripts on
a site.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 24


22JU1A6149

 - Purple: Firefox blocked trackers and harmful scripts on a site. Open the shield to
see what was blocked.

 - Gray: No known trackers or harmful scripts were detected on a site.

 - Gray and crossed out: Enhanced Tracking Protection is turned off on a site. Open
the shield and toggle the switch to turn it back on.
 Click on the shield to see what Firefox has blocked.

e)Content blocking :
"Content blocking" is a collection of privacy features in Firefox 69 and below. This became
"Enhanced Tracking Protection" in Firefox 70.
By default, Firefox protects you from being tracked in private windows using a list of known
trackers provided by Disconnect. Firefox allows some trackers so websites can function
properly. You can change your settings to block trackers all the time, to block trackers from
Disconnect‘s level 2 list, or to not block any trackers at all.
To adjust your settings:
1. Click the menu button .
2. Click Content Blocking.
This takes you to the Content Blocking section in your Firefox Options Privacy &
Security panel.

3. Choose your content blocking settings:


 Standard: Blocks known trackers in private windows, third-party tracking cookies and
cryptominers. This is the default setting. To restore to defaults at anytime, select
Standard.
 Strict: Blocks known trackers in all windows, third-party tracking cookies,
fingerprinters, and cryptominers.
 Custom: Lets you choose what to block. You can also turn off all content blocking using
the Custom radio button.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 25


22JU1A6149

You can also set Firefox to always send websites a Do Not Track signal.
Custom settings
Aggressive protection

1. Select Custom.
2. Select In all windows from the drop-down on the right.
3. Click the Change block list link.
The Block Lists pop-up displays.
4. Select Level 2 block list. Blocks all detected trackers. Some websites or content may not
load properly.
5. Click Save Changes.
6. Select the Cookies checkbox if not already selected.
Third-Party Trackers is selected by default. Select more aggressive cookie protections
from the dropdown, such as blocking all third-party cookies or even blocking all
cookies.
7. Select the Cryptominers checkbox.
8. Select the Fingerprinters checkbox.
9. Click the Reload All Tabs button to apply these changes on all your open tabs.
Remove all protections
You can also remove all the protections offered by content blocking, which effectively disables
the feature.
1. Select the Custom radio button.
2. Deselect the Trackers checkbox.
3. Deselect the Cookies checkbox.
4. Deselect the Cryptominers checkbox.
5. Deselect the Fingerprinters checkbox.
6. Click the Reload All Tabs button to apply these changes on all your open tabs.
Allow or block media autoplay in Firefox
Firefox prevents media from playing automatically on websites you visit, unless you grant
permission. Learn more about this feature.
To always allow or block autoplay for all media with audio or video:
1. Click the menu button and select Options.
2. Select the Privacy & Security panel and go down to the Permissionssection
(or enter autoplay in the Find in Options search box).

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 26


22JU1A6149

3. Click the Settings… button next to Autoplay.


4. Use the Default for all websites drop-down menu to select how you want Firefox to
handle media autoplay for all websites.

The default Block Audio setting will prevent autoplay for all media with sound.
o
o The Block Audio and Video setting will prevent autoplay for all media, including
video, even though audio is muted.
o The Allow Audio and Video setting will allow all media to autoplay.
5. After you have made your selection, click Save Changes.
The setting you select will apply to all media for all websites, except for specific autoplay site
settings.
LAN Settings
1. Setup LAN on PC
Note: Do not connect the LAN cable until instructed.
 On the PC, click Start, then Control Panel, then Network Connections
 Click Local Area Connection
 In the dialog box,, click on Properties
 Select Internet Protocol(TCP/IP) then click Properties

 Select Use the following IP address


 Enter an IP address and Subnet mask. For example:
 IP address: 141.121.74.0
 Subnet mask: 255.255.0.0

 Click OK
 Click Close
 Click Close

Cookie settings
Firefox can be set to not accept cookies. To turn on cookies:
1. Click the menu button and select Options.
2. Select the Privacy & Security panel. This is where you can view your settings for
Enhanced Tracking Protection, which includes cookies.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 27


22JU1A6149

o If Standard is selected, this is the default setting and, except for trackers, all
cookies are enabled. For more information, see Trackers and scripts Firefox
blocks in Enhanced Tracking Protection.
o If Strict is selected, either choose Standard or switch to Custom.
o If Custom is selected, either uncheck Cookies (this will allow all cookies) or select
the setting to only block Cross-site and social media trackers.
3. Close the about:preferences page. Any changes you've made will automatically be
saved.
Check sites that are blocked from setting cookies
1. Click the menu button and select Options.
2. Select the Privacy & Security panel and scroll down to the Cookies and Site Data
section.

3. Click Manage Permissions….


o The Exceptions - Cookies and Site Data dialog box that opens will show you
which sites you have blocked from storing cookies.
4. Make sure the site you're trying to access isn't listed.
o If it is listed, click on its entry, then click Remove Website.
5. Close the about:preferences page. Any changes you've made will automatically be
saved.
Clear history for that site
The cookies and temporary data already stored on your computer may be causing the problem.
Delete them, then test for your problem:
1. Click the Library button on your toolbar. (If you don't see it there, click the menu button
then click Library.) Click History and then click the Show All History bar at the
bottom to open the Library window.
2. Search for the website you want to remove from your history by typing its name in the
Search History field in the top-right corner and then pressing Enter.
3. Then, in the search results, right-click on the site you want to remove, and select Forget
About This Site.
All history items (browsing and download history, cookies, cache, active logins, passwords,
saved form data, exceptions for cookies, images, pop-ups) for that site will be removed.

4. Finally, close the Library window.


Clear all cookies and the cache
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 28
22JU1A6149

If deleting cookies for the site with the problem did not fix the error, clear all the cookies
stored on your computer and clear the Firefox cache:
1. Click the Library button on your toolbar. (If you don't see it there, click the menu button
then click Library.) Click History and select Clear Recent History….
2. In the TimeRangetoclear: drop-down, select Everything.
3. Below the drop-down menu, select both Cookies and Cache. Make sure other items you
want to keep are not selected.
4. Click Clear Now.

2)Antivirus installation, configuring a firewall, blocking pop-ups


install Antivirus Software step by step:

a)How to Install Avast Free Antivirus?


 Go to the official site and download the software by specifying your OS version.
 Wait till the download process is complete and then run the file by following how to
install antivirus software step by step guide.
 Click the Avast Security option on the next page and follow the prompts displayed to
install the avast Antivirus software on your system.
 The app will launch once the installation process is complete.
 Go to the Status Menu available on the left panel of the window.
 Tap the Start button available near the Full System Scan option. Once the scan process is
over, follow the Antivirus Setup prompts to rectify the threats detected.

b)How to Install Mcafee Antivirus In Windows 10?


 First, go to the manufacturer‘s site and download the McAfee Antivirus Setup on your
system.
 Run the .dmg file on your system and install it using the prompts that appear on your
screen.
 Go to the My Account option and tap the Sign In option.
 Enter the login credentials in the respective places and tap the Log In option.
 Select the Are You a New User? Register Now option to create an account with
MacAfee.
 Subscribe to a Protection Plan once you log in. Comply with the End User License
Agreement and configure the software based on your choice.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 29


22JU1A6149

c)How to Install Eset Nod32 Antivirus?


 To install the ESET NOD32 antivirus on your system, follow the instructions given
below.
 Download the ESET NOD32 antivirus software from the official site of ESET.
 Open the downloaded ESET NOD32 antivirus file to begin the installation process.
 Select your region in the drop-down menu and click the Continue button available at the
bottom of the Install ESET NOD32 Antivirus screen.
 Click the I Accept button on the End-user License Agreement screen.
 On the Choose an activation screen, click the Use a purchased License Key option
followed by Continue.
 Set the required preferences and click the Continue button to complete the installation
process.
 Click Install, followed by the Done button on the Installation Successful screen.

Firewall Configuration:
Just as a firewall in a building attempts to prevent a fire from spreading, a computer firewall
attempts to prevent computer viruses from spreading to your computer and to prevent
unauthorized users from accessing your computer. A firewall exists between your computer
and the network. It determines which services on your computer remote users on the network
can access. A properly configured firewall can greatly increase the security of your system. It
is recommended that you configure a firewall for any Red Hat Enterprise Linux system with an
Internet connection.
I)Security Level Configuration Tool
During the Firewall Configuration screen of the Red Hat Enterprise Linux installation, you
were given the option to enable a basic firewall as well as to allow specific devices, incoming
services, and ports.
After installation, you can change this preference by using the Security Level Configuration
Tool.
To start the application, select Main Menu Button (on the Panel) => System Settings =>
Security Level or type the command system-config-securitylevel from a shell prompt (for
example, in an XTerm or a GNOME terminal).

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 30


22JU1A6149

Security Level Configuration Tool

II) Enabling and Disabling the Firewall


Select one of the following options:
•Disable firewall — Disabling the firewall provides complete access to your system and does
no security checking. Security checking is the disabling of access to certain services. This
should only be selected if you are running on a trusted network (not the Internet) or plan to do
more firewall configuration later.

•Enable firewall — This option configures the system to reject incoming connections that are
not in response to outbound requests, such as DNS replies or DHCP requests. If access to
services running on this machine is needed, you can choose to allow specific services through
the firewall.

Blocking pop-ups:
How to stop pop-ups in Windows 10 in your browser
Microsoft Edge has a built-in pop-up blocker that can be activated by following these steps:
1. Open Microsoft Edge and click the three horizontal dotes in the top right corner, or press
Alt-X, to open the options menu.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 31
22JU1A6149

2. Click "Settings."
Open Settings from Edge's options menu.
3. Click "Privacy and Security," which is the little padlock tab along the left hand side of the
bar.
4. Scroll to the bottom of the Security options until you find the "Security" section. There, turn
on "Block pop-ups."

Toggle the "Block pop-ups" option from the bottom of the "Privacy & security" menu
How to stop Windows 10's system pop-ups
Windows 10 itself will often create pop-ups to try and sell you new products, download their
software, or give you reminders. If you want to shut these down, there are a number of settings
you should shut off.
To disable reminders about buying OneDrive or Microsoft Office:
1. Open your File Explorer. You can do this by opening any folder.
2. Click the "View" tab at the top of the window.
3. Click "Options" — at the right of the menu bar — and select "Change Folder and Search
Options."
4. In the new window that opens, select the "View" tab. In the Advanced Settings options,
uncheck "Show Sync Provider Notifications."

Uncheck the "Show Sync Provider Notifications" box.


5. Select "Apply" to save your changes.
To stop ads on your lock screen:
1. Open the Start menu, search for "Themes and related settings" and click it when it appears in
your search results.
Open your "Themes and Related Settings" menu. Ross James/Business Insider

2. Select "Lock Screen" from the menu on the left.


3. Turn off the toggle switch that's labeled "Get fun facts, tips and more..." just below the
"Choose your Picture" options.

Tell Windows that you don't want fun facts or tips.


And finally, to stop push notifications from programs:
1. Open the Start menu. Search for "Notifications & actions settings" and click it when it
appears in your search results.

Search for "Notifications and actions" to open it. Ross James/Business Insider
2. Turn off "Get notifications from apps and other senders."
3. Uncheck the third box, which begins "Show me the Windows experience..."

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 32


22JU1A6149

Uncheck the toggle switch and the boxes. The first two boxes will be grayed out by the toggle
switch.

Email creation and usage:Gmail

Setting Up a Gmail Account:Setting up a Gmail account is easy. You will begin by creating a
Google account, and during the quick signup process you will choose your Gmail account
name. In this lesson, we'll show you how to set up your Google account for Gmail, add and
edit contacts, and edit your mail settings.
Setting up a Gmail account: To create a Gmail address, you'll first need to create a Google
account. Gmail will redirect you to the Google account signup page. You'll need to provide
some basic information like your name, birth date, gender, and location. You will also need
to choose a name for your new Gmail address. Once you create an account, you'll be able to
start adding contacts and adjusting your mail settings.
To create an account:
1. Go to www.gmail.com.
2. Click Create account.

3. The signup form will appear. Follow the directions and enter the required information.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 33


22JU1A6149

4. Review Google's Terms of Service and Privacy Policy, click the check box, then
click Next step.

5. Here, you'll have an opportunity to set up recovery options. Recovery options are
helpful if you forget your password or if someone tries to access your account. If you
don't want to set up recovery options at this time, click Done.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 34


22JU1A6149

6. Your account will be created, and the Google welcome page will appear.

Just like with any online service, it's important to choose a strong password—in other words,
one that is difficult for someone else to guess. For more information, check out our Creating
Strong Passwords lesson.
Signing in to your account: When you first create your account, you will be automatically signed
in. Most of the time, however, you'll need to sign in to your account and sign out when you're
done with it. Signing out is especially important if you're using a shared computer (for
example, at a library or office) because it prevents others from viewing your emails.
To sign in:
1. Go to www.gmail.com.
2. Type your user name (your email address) and password, then click Sign in.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 35


22JU1A6149

To sign out:
In the top-right corner of the page, locate the circle that has your first initial (if you've already
selected an avatar image, it will show the image instead). To sign out, click the circle and
select Sign out.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 36


22JU1A6149

Productivity Tools:
Experiment 6: Basic HTML tags, Introduction to HTML5 and its tags, Introduction to CSS3
and its properties. Preparation of a simple website/ homepage,
Assignment: Develop your home page using HTML Consisting of your photo, name, address
and education details as a table and your skill set as a list.
Features to be covered:- Layouts, Inserting text objects, Editing text objects, Inserting Tables,
Working with menu objects, Inserting pages, Hyper linking, Renaming, deleting, modifying
pages, etc.,

HTML contains lots of predefined tag. Some of them are described below:
Document structure tag:
•HTML tag: It is the root of the html document which is used to specify that the document is
html.
Syntax: <html> Statements... </html>
•Head tag: Head tag is used to contain all the head element in the html file. It contains the
title, style, meta, …etc tag.Contains elements describing the document.Syntax:<head>
Statements... </head>
•Body tag: It is used to define the body of html document. It contains image, tables, lists, …
etc.
The content of your HTML page.Syntax:<body> Statements... </body>
•Title tag: It is used to define the title of html document.Syntax:<title> Statements... </title>
<tittle>tab name</tittle>

Content container tag:


•Heading tag: It is used to define the heading of html document.
Syntax:
<h1> Statements... </h>
<h2> Statements... </h2>
<h3> Statements... </h3>
<h4> Statements... </h4>
<h5> Statements... </h5>
<h6> Statements... </h6>
•Paragraph tag: It is used to define paragraph content in html document. Syntax:<p>
Statements... </p>
•Emphasis tag: It is used to renders as emphasized text.Syntax: <em> Statements... </em>
•Bold tag: It is used to specify bold content in html document. Syntax:<b> Statements... </b>
•Italic tag: It is used to write the content in italic format.Syntax:<i> Statements... </i>
•Small (text) tag: It is used to set the small font size of the content.Syntax:<small>
Statements... </small>
•Underline tag: It is used to set the content underline. Syntax:<u> Statements... </u>
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 37
22JU1A6149

•Anchor tag: It is used to link one page to another page.Syntax:<a href="..."> Statements...
</a>
•List tag: It is used to list the content. Syntax:<li> Statements... </li>
•Ordered List tag: It is used to list the content in a particular order. Syntax:<ol>
Statements... </ol>
EX:<ol>
<li>List item 1</li>
<li>List item 2</li>
<li>List item 3</li>
<li>List item 4</li>
</ol>
•Unordered List tag: It is used to list the content without order. Syntax:<ul> Statements...
</ul>
EX:<ul>
<li>List item 1</li>
<li>List item 2</li>
<li>List item 3</li>
<li>List item 4</li>
</ul>
•Comment tag: It is used to set the comment in html document. It is not visible on the
browser.
Syntax:<!-- Statements... -->
•Center tag: It is used to set the content into the center. Syntax:<center> Statements...
</center>
•Font tag: It is used to specify the font size, font color and font-family in html document.
Syntax:<font> Statements ... <font>
<font face="Times New Roman">Example</font>
Empty (Non-Container) Tags:
•Line break tag: It is used to break the line. Syntax:<br>
•Image tag: It is used to add image element in html document. Syntax:<img>
<img src="gfg.jpg" width="40" height="40" border="0">
•Link tag: It is used to link the content from external source. Syntax:<link>
<head>
<link rel="stylesheet" type="text/css" href="style.css">
</head>
•Horizontal rule tag: It is used to display the horizontal line in html document.Syntax:<hr/>
Tables Tags: Table tag is used to create a table in html document.
Syntax:<table> Statements... </table>
<table border="4" cellpadding="2" cellspacing="2" width="100%">
<tr><td>Column 1</td>
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 38
22JU1A6149

<td>Column 2</td></tr></table>
•Tr tag: It is used to define row of html table.Syntax:<tr> Statements... </tr>
<table>
<tr>
<th>Month</th><th>Savings</th>
</tr>
<tr>
<td>January</td><td>$100</td>
</tr>
</table>
•Th tag: It defines the header cell in a table. By default it set the content with bold and center
property.
Syntax:<th> Statements ... <th>
<table>
<tr>
<th>Month</th><th>Savings</th>
</tr>
<tr>
<td>January</td><td>$100</td>
</tr>
</table>
•Td tag: It defines the standard cell in html document.Syntax:<td> Statements ... <td>
<table>
<tr>
<td>Cell A</td><td>Cell B</td>
</tr>
</table>
Input Tags:
•Form tag: It is used to create html form for user.Syntax:<form> Statements ... <form>
<form action="mailto:[email protected] ">
Name: <input name="Name" value="" size="80"><br>
Email: <input name="Email" value="" size="80"><br>
<br><center><input type="submit"></center>
</form>
•Submit input tag: It is used to take the input from the user. Syntax:<input>
<form method=post action="/cgibin/example.cgi">
<input type="text" style="color: #ffffff;
font-family: Verdana; font-weight: bold;
fontsize: 12px; background-color: #72a4d2;"
size="10" maxlength="30">
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 39
22JU1A6149

<input type="Submit" value="Submit">


</form>
•Dropdown option tag: It is used to select an option froma drop-down list.
Syntax: <option> Statements ... <option>
<form method=post action="/cgibin/example.cgi">
<center> Select an option:<select>
<option>option 1</option>
<option selected>option 2</option>
<option>option 3</option>
</form>
•Radio button tag: It is used to select only one option from the given options.
Syntax:<input>
<form method=post action="/cgibin/example.cgi">
Select an option:<br>
<input type="radio" name="option"> Option 1
<input type="radio" name="option" checked> Option 2
<input type="radio" name="option"> Option 3
AIM:
To create a your web page using HTML
Software Requirement: Notepad, Any web browser
Hardware Requirement: Personal computer
CODE:
<html>
<head>
<title> details</title>
</head>
<body>
<imgsrc="photo.jpg" height=100 width=100>
<h1>NAME :CSE</h1>
<h1><pre>
Address:
KITS COLLEGE
DEVARAJU GATTU
MARKAPUR-500033
</pre></h1>
<h1> Educational Details</h1>
<table border=1>
<tr>
<th>Course </th>
<th>Name of the Institutation</th>
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 40
22JU1A6149

<th>Year of Study</th>
<th>Percentage</th>
</tr>
<tr>
<td>B.Tech(CSE)</td>
<td>KITS COLLEGE</td>
<td>2020</td>
<td>Pursuing</td>
</tr>
<tr>
<td>Intermediate </td>
<td>Sri Chaitanya</td>
<td>2018</td>
<td>89%</td>
</tr>
<td>SSC</td>
<td> Sri Chaitanya </td>
<td>2016</td>
<td>85%</td>
</tr>
</table>
<h1>Technical Skills:</h1>
<ultype=disc>
<li>Programming Languages : C, JAVA</li>
<li>Operating Systems : Windows </li>
<li>Database Systems : Oracle</li>
<li>Web Technologies
</ul>
</body>
</html>

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 41


22JU1A6149

Internet of Things (IoT): IoT fundamentals, applications, protocols, communication


models, architecture, IoT devices

INTERNET OF THINGS
IOT Overview:IoT (Internet of Things) is an advanced automation and analytics system which exploits
networking, sensing, big data, and artificial intelligence technology to deliver complete systems for a
product or service. These systems allow greater transparency, control, and performance when applied to
any industry or system.
IoT systems have applications across industries through their unique flexibility and ability to
be suitable in any environment. They enhance data collection, automation, operations, and
much more through smart devices and powerful enabling technology.

IoT exploits recent advances in software, falling hardware prices, and modern attitudes towards
technology. Its new and advanced elements bring major changes in the delivery of products,
goods, and services; and the social, economic,and political impact of those changes.

IoT − Key Features: The most important features of IoT include artificial intelligence,
connectivity, sensors, active engagement, and small device use. A brief review of these
features is given below −

 AI − IoT essentially makes virtually anything ―smart‖, meaning it enhances every


aspect of life with the power of data collection, artificial intelligence algorithms, and
networks. This can mean something as simple as enhancing your refrigerator and
cabinets to detect when milk and your favorite cereal run low, and to then place an
order with your preferred grocer.
 Connectivity − New enabling technologies for networking, and specifically IoT
networking, mean networks are no longer exclusively tied to major providers. Networks
can exist on a much smaller and cheaper scale while still being practical. IoT creates
these small networks between its system devices.
 Sensors − IoT loses its distinction without sensors. They act as defining instruments
which transform IoT from a standard passive network of devices into an active system
capable of real-world integration.
 Active Engagement − Much of today's interaction with connected technology happens
through passive engagement. IoT introduces a new paradigm for active content,
product, or service engagement.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 42


22JU1A6149

 Small Devices − Devices, as predicted, have become smaller, cheaper, and more
powerful over time. IoT exploits purpose-built small devices to deliver its precision,
scalability, and versatility.

IoT – Advantages:
The advantages of IoT span across every area of lifestyle and business. Here is a
list of some of the advantages that IoT has to offer −
 Improved Customer Engagement − Current analytics suffer from blind-spots and
significant flaws in accuracy; and as noted, engagement remains passive. IoT
completely transforms this to achieve richer and more effective engagement with
audiences.
 Technology Optimization − The same technologies and data which improve the
customer experience also improve device use, and aid in more potent improvements to
technology. IoT unlocks a world of critical functional and field data.
 Reduced Waste − IoT makes areas of improvement clear. Current analytics give us
superficial insight, but IoT provides real-world information leading to more effective
management of resources.
 Enhanced Data Collection − Modern data collection suffers from its limitations and its
design for passive use. IoT breaks it out of those spaces, and places it exactly where
humans really want to go to analyze our world. It allows an accurate picture of
everything.

IoT – Disadvantages:
Though IoT delivers an impressive set of benefits, it also presents a significant
set of challenges. Here is a list of some its major issues −
 Security − IoT creates an ecosystem of constantly connected devices communicating
over networks. The system offers little control despite any security measures. This
leaves users exposed to various kinds of attackers.
 Privacy − The sophistication of IoT provides substantial personal data in extreme detail
without the user's active participation.
 Complexity − Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new enabling
technologies.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 43


22JU1A6149

 Flexibility − Many are concerned about the flexibility of an IoT system to integrate
easily with another. They worry about finding themselves with several conflicting or
locked systems.
 Compliance − IoT, like any other technology in the realm of business, must comply
with regulations. Its complexity makes the issue of compliance seem incredibly
challenging when many consider standard software compliance a battle.

Iot Protocols:
IoT communication protocols are modes of communication that protect and
ensure optimum security to the data being exchanged between connected devices. The IoT
devices are typically connected to the Internet via an IP (Internet Protocol) network.

IoT protocols and standards can be broadly classified into two separate categories.

1. IoT Network Protocols:

IoT network protocols are used to connect devices over the network. These are the
set of communication protocols typically used over the Internet. Using IoT network protocols,
end-to-end data communication within the scope of the network is allowed. Following are the
various IoT Network protocols:

• HTTP (HyperText Transfer Protocol):


HyperText Transfer Protocol is the best example of IoT network protocol. This
protocol has formed the foundation of data communication over the web. It is the most
common protocol that is used for IoT devices when there is a lot of data to be published.
However, the HTTP protocol is not preferred because of its cost, battery-life, energy saving,
and more constraints.

• LoRaWan (Long Range Wide Area Network):


It is a long-range low power protocol that provides signal detection below the
noise level. LoRaWan connects battery operated things wirelessly to the Internet in either
private or global networks. This communication protocol is mainly used by smart cities, where
there are millions of devices that function with less power and memory.

Smart street lighting is the practical use case of LoRaWanIoT protocol. The street lights can be
connected to a LoRa gateway using this protocol. The gateway, in turn, connects to the cloud
application that controls the intensity of light bulbs automatically based on the ambient
lighting, which helps in reducing the power consumption during day-times.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 44
22JU1A6149

• Bluetooth:
Bluetooth is one of the most widely used protocols for short-range
communication. It is a standard IoT protocol for wireless data transmission. This
communication protocol is secure and perfect for short-range, low-power, low-cost, and
wireless transmission between electronic devices. BLE (Bluetooth Low Energy) is a low-
energy version of Bluetooth protocol that reduces the power consumption and plays an
important role in connecting IoT devices.

Bluetooth protocol is mostly used in smart wearables, smartphones, and other mobile devices,
where small fragments of data can be exchanged without high power and memory. Offering
ease of usage, Bluetooth tops the list of IoT device connectivity protocols.\

• ZigBee:
ZigBee is an IoT protocol that allows smart objects to work together. It is commonly
used in home automation. More famous for industrial settings, ZigBee is used with apps that
support low-rate data transfer between short distances. Street lighting and electric meters in
urban areas, which provides low power consumption, use the ZigBee communication
protocol. It is also used with security systems and in smart homes.

2. IoT Data Protocols:


IoT data protocols are used to connect low power IoT devices. These protocols
provide point-to-point communication with the hardware at the user side without any Internet
connection. Connectivity in IoT data protocols is through a wired or a cellular network. Some
of the IoT data protocols are:

• Message Queue Telemetry Transport (MQTT):


One of the most preferred protocols for IoTdevices, MQTT collects data from
various electronic devices and supports remote device monitoring. It is a subscribe/publish
protocol that runs over Transmission Control Protocol (TCP), which means it supports event-
driven message exchange through wireless networks.

MQTT is mainly used in devices which are economical and requires less power and memory.
For instance, fire detectors, car sensors, smart watches, and apps for text-based messaging.

• Constrained Application Protocol (CoAP):


CoAP is an internet-utility protocol for restricted gadgets. Using this protocol, the
client can send a request to the server and the server can send back the response to the client in
HTTP. For light-weight implementation, it makes use of UDP (User Datagram Protocol) and
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 45
22JU1A6149

reduces space usage. The protocol uses binary data format EXL (Efficient XML
Interchanges).

CoAP protocol is used mainly in automation, mobiles, and microcontrollers.


The protocol sends a request to the application endpoints such as appliances at homes and
sends back the response of services and resources in the application.

• Advanced Message Queuing Protocol (AMQP):


AMQP is a software layer protocol for message-oriented middleware
environment that provides routing and queuing. It is used for reliable point-to-point connection
and supports the seamless and secure exchange of data between the connected devices and the
cloud. AMQP consists of three separate components namely Exchange, Message Queue, and
Binding. All these three components ensure a secure and successful exchange and storage of
messages. It also helps in establishing the relationship of one message with the other.

AMQP protocol is mainly used in the banking industry. Whenever a message is sent by a
server, the protocol tracks the message until each message is delivered to the intended
users/destinations without failure.

• Machine-to-Machine (M2M) Communication Protocol :


It is an open industry protocol built to provide remote application
management of IoT devices. M2M communication protocols are cost-effective and use public
networks. It creates an environment where two machines communicate and exchange data.
This protocol supports the self-monitoring of machines and allows the systems to adapt
according to the changing environment.

M2M communication protocols are used for smart homes, automated vehicle authentication,
vending machines, and ATM machines.

• Extensible Messaging and Presence Protocol (XMPP):

The XMPP is uniquely designed. It uses a push mechanism to exchange


messages in real-time. XMPP is flexible and can integrate with the changes seamlessly.
Developed using open XML (Extensible Markup Language), XMPP works as a presence
indicator showing the availability status of the servers or devices transmitting or receiving
messages.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 46


22JU1A6149

Other than the instant messaging apps such as Google Talk and WhatsApp, XMPP is also used
in online gaming, news websites, and Voice over Internet Protocol (VoIP).

Iot Applications:

The applications of IoT technologies are multiple, because it is adjustable to


almost any technology that is capable of providing relevant information about its own
operation, about the performance of an activity and even about the environmental conditions
that we need to monitor and control at a distance.

1. Wearable’s: Virtual glasses, fitness bands to monitor for example calorie expenditure and
heart beats, or GPS tracking belts, are just some examples of wearable devices that we have
been using for some time now. Companies such as Google, Apple, Samsung and others have
developed and introduced the Internet of Things and the application thereof into our daily lives.

2. Health: The use of wearable‘s or sensors connected to patients, allows doctors to monitor a
patient's condition outside the hospital and in real-time. Through continuously monitoring
certain metrics and automatic alerts on their vital signs, the Internet of Things helps to improve
the care for patients and the prevention of lethal events in high-risk patients.

3. Traffic monitoring:The Internet of things can be very useful in the management of


vehicular traffic in large cities, contributing to the concept of smart cities. When we use our
mobile phones as sensors, which collect and share data from our vehicles through applications
such as Waze or Google Maps, we are using the Internet of Things to inform us and at the
same time contribute to traffic monitoring, showing the conditions of the different routes, and
feeding and improving the information on the different routes to the same destination, distance,
estimated time of arrival.

4. Agriculture: Smart farms are a fact. The quality of soil is crucial to produce good crops,
and the Internet of Things offers farmers the possibility to access detailed knowledge and
valuable information of their soil condition. Through the implementation of IoT sensors, a
significant amount of data can be obtained on the state and stages of the soil. Information such
as soil moisture, level of acidity, the presence of certain nutrients, temperature and many other
chemical characteristics, helps farmers control irrigation, make water use more efficient,
specify the best times to start sowing, and even discover the presence of diseases in plants and
soil.

5. Water supply: A sensor, either incorporated or adjusted externally to water meters,


connected to the Internet and accompanied by the necessary software, helps to collect, process
and analyze data, which allows understanding the behavior of consumers, detecting faults in
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 47
22JU1A6149

the supply service, report results and offer courses of action to the company that provides the
service.

Iot Communication models:

1. Device-to-Device:
Device-to-device communication represents two or more devices that directly
connect and communicate between one another. They can communicate over many types of
networks, including IP networks or the Internet, but most often use protocols like Bluetooth, Z-
Wave, and ZigBee.

2. Device-to-Cloud:

Device-to-cloud communication involves an IoT device connecting directly to an


Internet cloud service like an application service provider to exchange data and control
message traffic. It often uses traditional wired Ethernet or Wi-Fi connections, but can also use
cellular technology.

3. Device-to-Gateway:

In the Device-to-Gateway model, IoT devices basically connect to an intermediary


device to access a cloud service. This model often involves application software operating on a
local gateway device (like a smartphone or a ―hub‖) that acts as an intermediary between an
IoT device and a cloud service.

4. Backend Data Sharing:

Back-End Data-Sharing essentially extends the single device-to-cloud


communication model so that IoT devices and sensor data can be accessed by authorized third
parties. Under this model, users can export and analyze smart object data from a cloud service
in combination with data from other sources, and send it to other services for aggregation and
analysis.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 48


22JU1A6149

Office Tools:
Experiment 7: Demonstration and Practice on Text Editors like Notepad++, Sublime
Text, Atom, Brackets, Visual code, etc

1.BRACKETS:

Brackets is a source code editor with a primary focus on web development.[5] Created
by Adobe Systems, it is free and open-source software licensed under the MIT License, and is
currently maintained on GitHub by Adobe and other

Brackets provides several features[14] including:

 Quick Edit
 Quick Docs
 Live Preview
 JSLint
 LESS support[15]
 Open source[16]
 Extensibility

Functionality:

Displays number of times a function is called next to the function‘s definition.


 Logs all arguments received, values returned, and exceptions thrown by
a function call within Brackets
INSTALLATION:

Brackets is available from the brackets.io website.

Run this file and leave all the default options selected.

After the installation is complete, start Brackets;

it will look something like this:

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 49


22JU1A6149

2.NOTEPAD++:

Notepad++ is a free, open-source text and source code editor. Written in


the C++ programming language, Notepad++ prides itself in paring down on unnecessary
features and streamlining processes to create a light and efficient text notepad program. In
practical terms, this means high speed and an accessible, user-friendly interface.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 50


22JU1A6149

INSTALLATION OF NOTEPAD++

 Step 1:- Go to the following website: - http://notepad-plus-


plus.org/download/v6.6.1.html
 Step 2:- Click on ‗Notepad++ Installer‘.
 Step 3:- A ‗account user control‘ window opens. Click ‗yes‘.
 Step 4:- Click ‗Ok
 Step 5:- Click ‗Next‘
 Step 6:- Click ‗I Agree‘.
 Step 7:-Click ‗Next‘
 Step 8: - Click ‗Install‘
 Step 9:- Click ‗Finish‘
HOW TO USE NOTEPAD++
If you're using Notepad++ as a plain text editor, using the program is as simple as opening it
open and starting to type. Notepad++ includes a ton of default features that will make the
writing and editing process much easier. This includes an autosave feature, line bookmarks,
and the option to create a tabbed document interface.
These tools are particularly useful if you're editing your existing text, as they make marking
and finding areas of your document a breeze. While certainly not a replacement for a more-
feature heavy word processor, Notepad boasts major utility for writing for such a simple
program.
Though it's an excellent text editor on its own, coding is where Notepad++ really shines.
Notepad has a built-in ability to read a understand a whole host of code languages like C++,
STL, Python, and many more.
You can also use Notepad++ to convert files written in one coding language to another.
Simply transfer the code from one file into Notepad, and you'll easily be able to rewrite the
code into a new language of your choice using Notepad's intuitive conversion features.
Notepad allows for code folding, syntax highlighting, and autocompletion in some cases.
You can use the navigation features like split-screen and synchronized scrolling to move
through your code with ease. You can then search your code, make edits on the fly, and do it
all in a sleek, lightweight interface. It also boasts far more command features than other
competitors such as Textpad.
Notepad++ also supports plugins and other add-ons, many created by users that take
advantage of the program's open-source code. Notepad, in particular, makes it extremely easy

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 51


22JU1A6149

to add plugins. In fact, new versions of Notepad have incorporated various plugins, and 10
user-created plugins are now included in the program by default.

3.Sublime Text :

Sublime Text is a free minimalist coding editor developed by Sublime HQ for


desktop use. This development and IT program enable you to solely focus on your code,
leaving all the other types of eye-candy out. This pared-back coding tool should never be
underestimated as it is capable of supporting most programming languages and can work with
multiple documents at the same time—each one on a different tab.

The binary file of Sublime Text is free to download and be evaluated. However, it
requires a purchased license for your continuous use. If you will use the program
individually then, you must select and buy the personal license. This is a one-off purchase that

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 52


22JU1A6149

comes with 3 years of updates. Once the 3-year updates are done, you will be required to do an
upgrade to keep on receiving further updates.

If the program is for an organization, the business license is the right one to be
bought. Unlike the personal license, this can be purchased on an annual tiered subscription
basis. The amount is based on the number of seats you‘ll get—for example, there exists a 10-
seat license, an 11 to 25-seat license, and a 26 to 50-seat license. Any seats more than fifty will
have a fixed price of the highest amount.
FEATURES

Despite the tool‘s minimal style and lightweight size, Sublime Text is heavily-packed with
exceptional features. However, these are placed in the form of plugins and extensions that can
be a bit of a hassle—especially for beginner users of this coding editor. Nevertheless, it is still
the ideal text editor for large projects as it is capable of opening and editing multiple files
simultaneously in the fastest way possible.
Not only does its incredible navigation feature called ―GoTo Anything‖ enables you to access
any element of your code immediately, but it also gives you permission to zoom out and view
their code as one solid page instead of unnecessarily scrolling through lines individually. More
importantly, this is highly customizable for any style of coding you want to achieve.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 53


22JU1A6149

INSTALLATION ON WINDOWS

 Step 1 − Download the .exe package from the official website as shown below −
https://www.sublimetext.com/3

 Step 2 − Now, run the executable file. This defines the environment variables. When
you run the executable file, you can observe the following window on your screen.
Click Next.
 Step 3 − Now, choose a destination location to install Sublime Text3 and click Next.
 Step 4 − Verify the destination folder and click Install.
 Step 5 − Now, click Finish to complete the installation.
Step 6 − Upon a success

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 54


22JU1A6149

4.ATOM:

Atom is a free and open-source text and source code editor for macOS, Linux,
and Microsoft Windows with support for plug-ins written in JavaScript, and embedded Git
Control, developed by GitHub. Atom is a desktop application built using web
technologies. Most of the extending packages have free software licenses and are community-
built and maintained. Atom is based on Electron (formerly known as Atom Shell), a framework
that enables cross-platform desktop applications using Chromium and Node.js.[12][13] It is
written in CoffeeScript and Less.
Atom was released from beta, as version 1.0, on 25 June 2015. Its developers call it a
"hackable text editor for the 21st Century". It is fully customizable in HTML, CSS, and
JavaScript
PACKAGES:

Like most other configurable text editors, Atom enables users to install third-party packages
and themes to customize the features and looks of the editor. Packages can be installed,
managed and published via Atom's package manager apm. Syntactic highlighting support for
other languages than the default, can be installed through the packages, as well as the auto-
complete function.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 55


22JU1A6149

Features:
 Cross-platform editing
 Built-in package manager
 Smart auto-completion
 File system browser
 Multiple panes
 Find and replace
INSTALLATION:

1. Installation of ATOM Code Editor


To start working with ATOM go to
https://atom.io and download the ATOM setup as per your OS.

1.1. Windows User:

To install ATOM code editor in Windows you can download the executable file and follow the
installer instructions to install the editor.
1.2. Linux Users:

To install ATOM code editor in Linux operating system you can download the .deb file (atom-
amd64.deb) and can run the following command on the terminal to install it in your Linux
machine.

sudodpkg -i /path/to/deb/file
For Example, my .deb file is in the Downloads directory so the command will become

sudodpkg -i Downloads/atom-amd64.deb
After running the above command run the following com

sudo apt-get install -f


This will install the Atom code editor in your machine. Now you can search for the Atom from
the search menu or in your program files.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 56


22JU1A6149

Experiment 8: Demonstration and practice on Microsoft Word, Power Point

AIM:
To create a document applying the above mentioned techniques.
Software Requirement: MS-WORD
Hardware Requirement: Personal computer
THEORY:
Header and Footer:
1. To create a header, enter text or graphics in the header areaor click button on the header and
footer tool bar.
2. To create footer, click switch between header and footer.
3. Then click exit.
Date and Time:
Insert a date field that automatically updates so that the current date isdisplayed when you open
or print the file.
Insert a time field that automatically updates so that the current timeis displayed when you
open or print the file.
Border:
 On the format menu, click borders and shadings.
 To specify that the border appears on a particular side of a page, such as only
at the top, click custom under setting.
 To specify a particular page or section for the borders to appear, click the
option you want to apply.
 To specify the exact position o f the border on the page. Finally, click OK.
Color:
 Select the text you want to make a different color.
 To apply the color most recently applied to text, click font color.
 To apply different colors, click the arrow on the right of the font color button,
select the color you want and then click the button.
PROCEDURE:
First click start button on the status bar. Then select program and againselect Microsoft word.
On the menu bar click the file option. Then again clicknew. Then enter the text not less than
100 words. A header appears at the top and
The footer appears at the bottom of each page. On the view menu, click headerand footer
option. From dialogue box, make the required changes and then clickOK. On the format menu,
click borders and shading s make required changes andthe click OK. Select the text you want
and make the different color. Click onright of the font color button, and then select the color
you want and then click onthe button.
Table :A table consists of rows and columns.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 57
22JU1A6149

Cell Alignment: Aligns contents written in a table in the top left corner or top rightcorner or in
the center etc...
Foot Note: Foot notes are used to comments on, or provide references for text in adocument.
Hyperlink:It is a colored and underlined text or a graphic that you click to go to a file,
alocation in a file, an HTML page on the World Wide Web, or an HTML page in an intranet.
Symbols:You may not be able to enter certain symbols into your word document, as thereis a
limitation on the keys on the key board. Creating these new symbols especiallywhen working
with mathematical terms it becomes very difficult .For example wecan insert symbols such
as≡,≈, ,..
Spell check: It automatically checks for spelling and grammatical errors
Bullets and Numbering:In Microsoft word we can easily create bulleted or numbered list
ofitems.
Formatting Styles:A style is a set of rules to be followed for the effective document.Style can
be applied to text, paragraph, table or a list.
Changing text direction:You can change the text orientation in drawing objects, such as text
boxes,shapes, and callouts, or in table cells so that the text is displayed vertically
orhorizontally.
Track changes:A track change is an excellent feature of Microsoft word as it enables auser or
reviewer to keep track of the changes that have taken a period. Changes likeinsertion, deletion
or formatting changes can be kept track of.
Procedure:
Changing Text direction:
1. Click the drawing object or table cell that contains the text you want to change.
2. On the Format menu, click Text Direction.
3. Click the orientation you want.
Table:
1. Click where you want to create a table.
2. On the Table menu, point to Insert, and then click Table.
3. Under Table size, select the number of columns and rows.
4. Under AutoFit behavior, choose options to adjust table size.
5. To use a built-in table format, click AutoFormat.
Select the options you want
Cell Alignment:1. Click the cell that c ontains text you want to align.
2. On the Tables and Borders toolbar, select the option for the horizontal and vertical alignment
you want— for example, Align Bottom Center or Align Top Right.
Foot Note: 1. In print layout view, click where you want to insert the note reference mark.
2. On the Insert menu, point to Reference, and then click Footnote.
3. Click Footnotes or Endnotes.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 58


22JU1A6149

By default, Word places footnotes at the end of each page and endnotes atthe end of the
document. You can change the placement of footnotes and endnotes by making a selection in
the Footnotes or Endnotes box.
4. In the Number format box, click the format you want.
5. Click Insert.
Word inserts the note number and places the insertion point next to the note number.
6. Type the note text.
7. Scroll to your place in the document and continue typing.
As you insert additional footnotes or endnotes in the document, Word automatically applies the
correct number format.
Hyper link:
Select the text or picture you want to display as the hyperlink, and then click Insert Hyperlink
on the Standard toolbar
Do one of the following:
1. Link to an existing file or web page:
1. Under Link to, click Existing File or Web Page.
2. In the Address box, type the address you want to link to or, in the
Look in box, click the down arrow, and navigate to and select the file
2. Link to a file you haven‗t created yet Under Link to, click Create New Document.
3. In the Name of new document box, type the name of the new file.
4. Under When to edit, click either Edit the new document later or Edit the new document now
An e-mail address:
1. Select the text or picture you want to display as the hyperlink, and then click Insert
Hyperlink on the Standard toolbar
2. Under Link to, click E-mail Address.
3. Either type the e-mail address you want in the E-mail address box, or select an e-mail
address in the recently used e-mail addresses box.
4. In the Subject box, type the subject of the e-mail message A specific location in another
document
1. Insert a bookmark in the destination file or Web page.
2. Open the file that you want to link from, and select the text or object you want to display as
the hyperlink.
3. On the Standard toolbar, click Insert Hyperlink .
4. Under Link to, click Existing File or Web Page.
5. In the Look in box, click the down arrow, and navigate to and select the file that you want to
link to.
6. Click Bookmark, select the bookmark you want, and then click OK.
Symbol:
1. Click where you want to insert the symbol.
2. On the Insert menu, click Symbol, and then click the Symbols tab.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 59
22JU1A6149

3. In the Font box, click the font that you want.


4. Double-click the symbol that you want to insert.
5. Click Close

Spell check:
1. O n the Standard toolbar, click Spelling and Grammar .
2. When Word finds a possible spelling or grammatical problem, make your changes in the
Spelling and Grammar dialog box.
Bullets and Numbering:
1. Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then press
SPACEBAR or TAB.
2. Type any text you want.
3. Press ENTER to add the next list item.
Word automatically inserts the next number or bullet.
4. To finish the list, press ENTER twice, or press BACKSPACE to delete the last bullet or
number in the list
Formatting Styles:
1. Select the words, paragraph, list, or table you want to change.
2. If the Styles and Formatting task pane is not open, click Styles and Formatting on the
Formatting toolbar
3. Click the style you want in the Styles and Formatting task pane. If the style you want is not
listed, click All Styles in the Show box
Track Changes:
1.Open the document you want to revise. 2. On the Tools menu, click Track Changes.

Table of contents: Table of contents displays a list of headings in a created document. It


basically provides an outline of the entire document created
Newspaper columns: One can create a newspaper columns document by specifying the
number of new letter-style column required and then adjust their width , and add vertical lines
between columns.
Images from files and clipart:Inserting a picture (graphic) from a file and clipart may be
requiredfor a document. This picture could be a scanned photograph or any other
digitallyproduced one. This pictures can be modified , resized, cropped and enhanced.
Drawing toolbar and Word Art: One can create his/her own drawings in Microsoft word.
Msword provides
afull fledged drawing tool bar.Word Art in Microsoft word enables you to create special and
decorative text.
Formatting Images, Textboxes and Paragraphs:Formatting an image includes selecting
appropriate color, size, layout

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 60


22JU1A6149

and cropping. Generally the text in a document follows a standard orientation (line after line).
A text box provides a different orientation to the text with in a document. It can arrange the
text in anywhere and can be resized and moreover moved to any section of the document or
even outside.When you are formatting a paragraph, you do not need to highlight the entire
paragraph. Placing the cursor anywhere in the paragraph enables you to format it. After you set
a paragraph format, subsequent paragraphs will have the same format unless you change the
format
PROCEDURE:
Table of contents:
1. Click where you want to insert the table of contents.
2. On the Insert menu, point to Reference, and click Index and Tables.
3. Click the Table of Contents tab.
4. To use one of the available designs, click a design in the Formats box.
5. Select any other table of contents options you want.
Newspaper columns:
1. Select the entire or part of document to be converted into a newsletter-style
2. Click on format menu , select columns
3. Any desired number of columns are presets-one or two or three or left or right be can be
selected.
4. Width and spacing can be fixed and equal columns width can be checked for uniformity
5. If newspaper columns are to be separated by a line, then check line between
6. Under apply to will be whole document if entire document is selected else we have to select
a selected text.
7. Click ok

Inserting images from files and clip art:


1. Click where you want to insert the picture.
2. On the Insert menu, point to Picture, and then click From File.
3. Locate the picture you want to insert.
4. Double-click the picture you want to insert.
CLIP ART:1.On the Insert menu, point to Picture, and then click Clip Art.
2. In the Clip Art task pane, in the Search for box, type a word orphrase that describes the clip
you want or type in all or some of thefile name of the clip.
3. To narrow your search, do one or both of the following: To limit search results to a specific
collection of clips, in the
Search in box, click the arrow and select the collections you want to search. To limit search
results to a specific type of media file, in the Results should be box, click the arrow and select
the check box next to the types of clips you want to find. 4. Click Go.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 61


22JU1A6149

5. If you don't know the exact file name, you can substitute wildcard characters for one or more
real characters. Use the asterisk (*) as a substitute for zero or more characters in a file name.
Use the question mark (?) as a substitute for a single character in a file name.
6. In the Results box, click the clip to insert it.
Drawing Toolbar and Word Art:
1. Click in your document where you want to create the drawing.
2. On the Insert menu, point to Picture, and then click New Drawing. A drawing canvas is
inserted into your document.
3. Use the Drawing toolbar to add any shapes or pictures that you want
WORD ART:
1.On the Drawing toolbar, click Insert WordArt .
2.Click the WordArt effect you want, and then click OK.
3.In the Edit WordArt Text dialog box, type the text you want.
4.Do any of the following:

To change
To make text bold, click the Bold

Formatting Images:
1. Formatting of the images can be achieved by selecting the image and double click on the
picture, format picture dialog box appears.
2. The same can be achieved by selecting the tools menu > customize>tool bars tab>picture
and click close.
Basic formatting features of an image Resize a drawing
1. Select the drawing canvas
2. On the Drawing Canvas toolbar, do one of the following:
To make the drawing canvas boundary larger without changing the size of the objects on the
canvas, click Expand .
To make the drawing canvas boundary fit tightly around the drawing objects or pictures, click
Fit .
To scale the drawing and make the objects and canvas proportionately smaller or larger, click
Scale Drawing, and then drag the edges of the canvas.
Resize a picture or shape
1. Position the mouse pointer over one of the sizing handles
2. Drag the sizing handle until the object is the shape and size you want.
To increase or decrease the size in one or more directions, drag the mouse away from or
toward the center, while doing one of the following:
To keep the center of an object in the same place, hold down CTRL while dragging the mouse.
To maintain the object's proportions, drag one of the corner sizing handles.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 62
22JU1A6149

To maintain the proportions while keeping the center in the same place, hold down CTRL
while dragging one of the corner sizing handles.

Crop a picture
1. Select the picture you want to crop.
2. On the Picture toolbar, click Crop .
3. Position the cropping tool over a cropping handle and then do one of the following:
To crop one side, drag the center handle on that side inward.
To crop equally on two sides at once, hold down CTRL as you drag the center handle on either
side inward.
To crop equally on all four sides at once, hold down CTRL as you drag a corner handle
inward.
4. On the Picture toolbar, click Crop to turn off the Crop command.
Text Box:
1. On the Drawing toolbar, click Text Box .
2. Click or drag in your document where you want to insert the text box
3. You can use the options on the Drawing toolbar to enhance a text box—
for example, to change the fill color— just as you can with any other drawing object
Paragraphs: Change line spacing
Select the text you want to change.
1. On the Formatting toolbar, point to Line Spacing, and then do one of the following:
To apply a new setting, click the arrow, and then select the number that you want.
To apply the most recently used setting, click the button.
To set more precise measurements, click the arrow, click More,and then select the options you
want under Line Spacing.
Change spacing before or after paragraphs
1. Select the paragraphs in which you want to change spacing.
2. On the Format menu, click Paragraph, and then click the Indents and Spacing tab.
3. Under Spacing, enter the spacing you want in the Before or After box.
Change paragraph direction
1. Place the insertion point in the paragraph that you want to change, or select several
paragraphs.
2. Do one of the following:
To have text begin from the left, click Left-to-Right on the Formatting toolbar.
To have text begin from the right, click Right-to-Left on the Formatting toolbar.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 63


22JU1A6149

When you change the paragraph direction, Microsoft Word leaves justified and centered text as
it is. In the case of left-aligned or right -aligned text, Word flips the alignment to its opposite.
For example, if you have a left-to-right paragraph
that is right aligned, such as the date at the top of a letter, clicking Right-to-Left results in a
right-to-left paragraph that is left aligned.
Forms:
Using Microsoft word one can create an organized and structured document with a provision to
enter the required information into it. A document of such nature is called a form.
Inserting objects:
Insert an object such as drawing word art text effects or an equation at the inserting point.
Fields:
It inserts a field at the inserting font fields are used to insert a variety of information
automatically. Select table in table select insert. In that select insert table a box containing
number of rows and columns will appear. Select six colors
and four rows and click o.k. Given the first row as date, problem repeatedstudent‗s signature
action recommended problem status and councilors sign. Insert the objects in the feedback
form and apply the text fields in the form.
Forms:
1. Design the form by sketching a layout first, or use an existing form template as a guide.
Tables, text boxes, borders, and shading are all design elements that can help you create a well-
designed form that's easy to use.
2. On t he Standard toolbar, click New Blank Document .
3. Add the text or graphics you want. For example, enter the questions youwant answered, and
list the available choices.
4. To insert a text box where users can enter their responses, click the document, and then click
Text Form Field on the Forms toolbar. If you need more space, you can insert multiple text
boxes side by side. To insert check boxes that list choices, such as Yesand No, click the
document, and then click Check Box Form Field on the Forms toolbar.
5. Save the form.
Insert line numbers:
1. On the File menu, click Page Setup, and then click the Layout tab.
2. In the Apply to box, click Whole document.
3. Click Line Numbers.
4. Select the Add line numbering check box, and then select the options you want.

Creating Power Point:


Create a power point presentation consists of slide layouts inserting text,
formatting text, bullets and numbering of five slides with following information‘s.
Slide 1 – contents
Slide 2 – Name
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 64
22JU1A6149

Slide 3 – Address
Slide 4 – Hobbies
Slide 5 – Friends
SLIDE LAYOUT:
1. On the format menu, click slide layout.
2. On the slides tab in normal view, select the slides; you want to apply a layout too.
3. In the slide layout task pane, point to layout you and then click it.
4. A new slide can also be inserted within the task pane. Point the layout you want the slide to
have, click the arrow and then click the insert newslide.
INSERT TEXT:
1. Text can be added to layout.
2. Align text in the top, middle or bottom of a cell.
3. Align text on the right or left, or in the center of a cell.
4. Change cell margins.
5. Insert a tab in a table.
6. To make the symbol command available, in normal view, place the insertion point on the
outbox tab or in a text place holders on the slide.
7. On the insert menu, click symbol.
8. To change fonts, click a name in the font box.
FORMATTING TEXT:1. Select the text you want to format as superscript or subscript.
2. On the format menu, click font.
3. To show or hide text formatting, on the standard toolbar, click show formatting.
BULLETS AND NUMBERINGS:
1. Select the lines of text that you want to add bullets or numbering to.
2. Click bullets or numbering.
AUTOSHAPES:
1. Select the auto shape that has the text you want to position.
2. Double-click the selection rectangle of the auto shape or text box and then click the text box
tab in the format dialog box.
3. In the text anchor point box, click the position you want the text to start in.
LINES AND ARROWS:
1. In Microsoft power point, double click the chart.
2. Double click the chart item you want to change.
3. On the patterns tab, do one or both of the following.
4. To change the colors, patterns or lines, select the options you want.
5. To specify a fill effect, click fill efeect and then select the options you want on the gradient,
text patterns or picture tabs. To return to the slide, click outside the about
HYPERLINK:
1. Select the text or object that you want to represent the hyperlink.
2. Click insert hyperlink.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 65
22JU1A6149

3. Under link to, click place in this document.


INSERT IMAGES:
1. Click where you want to insert the picture.
2. On the drawing tool bar, click insert picture.
3. Locate the folder that contains the picture that you want to insert, and then click the picture
file.

CLIP ART:
1. On the insert menu, point to structure and then click clipart.
2. In the clipart task pane, in the search for box, type a word or phrase that describes the clip,
you want to type in all or some of the file menus of the clip.
3. In the results box, click the clip to insert it.
AUDIO VIDEO OBJECTS:
1. On the slide show menu, click setup show. Under performance check box. If your computer
has their capability, office PowerPoint will attempt to use it.
2. Animation performance will be much better with a video card that has Microsoft direct 3D.
CHART:
1. Click the slide where you want to place the embedded object.
2. On the insert menu, click chart.
3. Click a cell on the data sheet and then type the information you want
To return to the slide, click outside the chart

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 66


22JU1A6149

Experiment 9: Demonstration and practice on Microsoft excel


Spreadsheet Orientation: Accessing, overview of toolbars, saving spreadsheet files, Using
help and resources. Creating a Scheduler:-Gridlines, Format Cells, Summation, auto fill,
Formatting Text.
Software Requirement: MS-EXCEL
Hardware Requirement: Personal computer
Grid lines:
1. Click the worksheet.
2. On the file menu, click page setup and the click the sheet tab.
3. Click gridlines.
4. Select the sheets on which you want to change the gridlines color.
5. On the Tools menu click options click the color you want in the color box.
6. To use the default gridlines color click automatic.
7. Lines you can add to a chart that make it easier to view and evaluate data.
Gridlines extend from the tick marks on an axis across a plot area.

Format Cell:
1. Change the font and font size.
2. Change the text color.
3. Make selected text or numbers bold, italic or underlined.
4. Create a new style.

Auto fit:
1. Combine cells horizontally or vertically to make one large cell.
2. Add borders to cells.
3. Shade cells with colors.
4. Change the column width and row height
5. Change the font, font size or colors of text.
6. Align text vertically at the top, center and bottom of cell.
Formatting the text:
1. Select the text you want to format.
2. On the format menu click cells and then click number tab.
3. In the catalog box click text.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 67
22JU1A6149

4. Enter the numbers in the formatted cells.


5. Click ok.
6. Then press enter and reenter the data.

PROCEDURE:
First click start button of the screen on status bar. Click on programs and then Microsoft excel.
To get a new blank work sheet go to programs and then click on excel sheet. On the file menu
click page setup and then click sheet tab click gridlines. In this way do the required changes
using format cell, make the required changes using formatting text also make the required
changes. Enter the data in the data in the worksheet consisting of week name person name and
timings 7 a.m. to 3 p.m. Make all the above changes to the text.
Calculating GPA - .Features to be covered:- Cell Referencing, Formulae in spreadsheet –
average, std. deviation, Charts, Renaming and Inserting worksheets, Hyper linking,
Count function, Sorting, Conditional formatting.
THEORY:
1. On the chart menu click chart type
2. Text direction. Click the arrow down next to the text direction button. For right to left click
right to left. For left to right reading order, click left to right. For reading order that is
consistent with the language of the first entered character, click context. For reading order that
is inconsistent with the language of the first entered character, click control.
3. In the tools menu click options and then click chart tab.
4. To show all worksheet data in the chart even if some rows and columns are hidden, clear the
plot visible cells by check box.
5. To prevent hidden rows and columns from displaying in the chart, select the plot cells only
check box.
Hyper Linking:
1. Create a worksheet: On the file menu, click new, and then click blank workbook task pane.
2. Insert a worksheet: C lick worksheet on the insert menu. Right click on sheet tab and then
click insert double click the template for the type of sheet you want.
3. Hyperlink: Using hyperlink we can insert one more sheet in the present sheet
4. Count function: Create a blank worksheet press control +c. In the worksheet select cell A
and press control +c. On the tools menu point to formula auditing and then click formula
auditing menu.
Worksheet:
1. In the file menu go to menu then a new worksheet is created.
2 To add a single worksheet, click worksheet on the Insert menu. To add multiple worksheets
hold down shift and then click the number of worksheet tasks to add in an open workbook
Sort:
1. Click a cell in the list you want to sort.
2. On the Data menu click sort.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 68
22JU1A6149

3. Under first key sort click the custom sort order you want and then click ok.
4. Click any other sorting option you want.

PROCEDURE:
Formulae in Excel:
First click on start button at the bottom of the screen on status bar. Click on programs and then
on Microsoft excel. Then open a new document. Give the main heading and subheading by
changing the size so that they look in block
letters. Enter the data. To calculate go to Insert menu in the menu bar and then click on
function and then ok. Then select the data to which you want to calculate mean. Then you get
the required answer. In same way, sample means standard
deviation lower count limit and upper count limit. Go to insert menu and click on function and
select the required operation to be done and select the data and calculate. Formulas for all the
above are given below.
Mean = (s1 + s2 + s3 + s4 + s5)/5;
Sample mean = avg (mean)
Standard deviation = (mean, sample, mean)
Sample standard deviation= avg (Standard deviation)
Lower count limit = sample mean – sample standard deviation.
Upper count limit = Sample mean + Sample Standard deviation
Hyper linking:
First click on start button of the screen on status bar. Click onprograms and then Ms-excel. To
get a new blank worksheet go to programs andthen click on excel sheet. Rename the first sheet
as student by right clicking on sheet 1 and renaming. Insert hyperlink insert and click on
hyperlink. Then go to sheet 2 and rename as CSE type in particulars of ECE right click on
sheet 3. Then go to sheet -4 rename as IT. In this type all the four sheets are created.
WORKSHEET
First click on start button at the bottom of the screen on status bar .Click on programs and then
Ms-excel. Then enter the data as given. Enter the student‗s names, Subjective wise marks, total
and avg. Then calculate the total and avg by using formula. Then go to Data menu and click
sort. Under first key sort, click custom sort order needed i.e. ascending order or alphabetical
order and then click o.k. Then the required worksheet is prepared.
Count Function
Some of the content in this topic may not be applicable to some languages.
1. To count words in selected text only, select the text you want.
If you don't select any text, Microsoft Word counts the words in the whole document.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 69
22JU1A6149

2. On the Tools menu, click Word Count. Word displays counts for words, paragraphs, lines,
and characters.
3. To add or remove footnotes and endnotes from the count, select or clear they Include
footnotes and endnotes check box.

Experiment10: Demonstration of LaTeX

What is LaTeX?

A typesetting program written by Leslie Lamport of MIT. Pronounced ―Lah-tek, or Lay-


tek‖ Uses TeX engine written by Donald E. Knuth Designed for roducing beautiful books,
thesis‘s, papers, articles... De facto standard for writing academic papers.Current version
LaTeX2e

Why LaTeX, not MS Word?

FAST professional output – highest quality Platform, version independent (Unix, Win)
Device independent output (.dvi) Pre-set standard formats for all types of documents Freely
available Secure – never lose your files, both old and new Concentrate on content, leave the
style to LaTeX. Source code for large docs comparatively small.

LaTeX Skeleton :

% my first LaTeX file

\documentclass[options]{class}

\begin{document}

Hello, world!

\end{document}

How To Run LaTeX

Compose/Edit --Compile --> TeXnicCenter myfile.tex> LaTeX myfile.tex

View -> xdvi myfile.dvi (UNIX)

yap myfile.dvi (Windows)


KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 70
22JU1A6149

Dvi --> PostScript dvips myfile

View PostScript gv myfile (UNIX)

Use gsview (Windows)

Creating Document:

Creating documents with LaTeX is simple and fun. In contrast to Word, you start off with a
plain text file (.tex file) which contains LaTeX code and the actual content (i.e. text). LaTeX
uses control statements, which define how your content should be formatted. Before you can
see what the final result looks like, the LaTeX compiler will take your .tex file and compile it
into a .pdf file. A basic example document can be created with the following code:

\documentclass{article}
\begin{document}
Hello World!
\end{document}

Basic Text Formatting:

1. Font Size 2.Font Style

Most commands are very straightforward to use. I personally think there will be few usecases
to manually adjust the settings of the font, because the environments usually do this job for you
automatically, I just included this for completeness.

1.Font Size:
The following commands allow you to change the font size in LaTeX. The commands work
relative to the default document font size.

Name Symbol Command

Tiny TextText {\tiny Text}

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 71


22JU1A6149

Small TextText {\small Text}

Normal TextText {\normalsize Text}

Large TextText {\large Text}

Huge TextText {\huge Text}

2.Font Style

These commands enable you to change the font itself to different styles. Note that there are two
ways to obtain italic text, where \emph should be preferred over \textit since it's the command
to emphasize text in general. The underline command doesn't really change your font, but it's
sometimes used to highlight text anyway. Those commands enable you to use Bold, Italic,
Underline, Typewriter fonts and much more in LaTeX.

Name Symbol Command

Bold TextText \textbf{Text}

Italic TextText \textit{Text}

Typewriter TextText \texttt{Text}

Sans-Serif TextText \ltexts{fText}

Serif (Roman) TextText \textrm{Text}

Underline Text––––––Text_ \underline{Text}

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 72


22JU1A6149

important ―layout‖ commands in Latex

 \documentclass[options]{class}
 \title
 \maketitle % commit title info to paper.
 \begin{document}; \end{document}
 \begin{abstract}; \end{abstract}
 \include{filename} % call another file here.
 \begin{equation}; \end{equation}
 \usepackage{packagename}
 \section{sectionname}

Important formatting commands

 \underline{text}
 \emph{text} % set text to italics
 \textbf{text} % set text to bold
 \bfseries % switches to bold from here.

KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 73

You might also like