Inputs Outputs Storage: Kits:: Markapur Department of Computer Science and Engineering
Inputs Outputs Storage: Kits:: Markapur Department of Computer Science and Engineering
Experiment 1:
Identification of peripherals of a PC, Laptop, Server and Smart Phones: Prepare a
report containing the block diagram along with the configuration of each component and
its functionality, Input/ Output devices, I/O ports and interfaces, main memory, cache
memory and secondary storage technologies, digital storage basics, networking
components and speeds.
Peripherals are devices that are not the computer's core architecture involved in memory and
processing. Peripherals include input hardware, output hardware and storage devices.
A typical desktop computer could include:
Connections
Peripherals connect to the processor hardware through the motherboard. External devices will
connect to the motherboard via USB, FireWire or through a wireless connection such
as Bluetooth.
Inputs: Input devices send signals into the computer that have to be interpreted by
the operating system using drivers. Some of the most common input devices include:
Keyboard - used to enter characters and data into computers. A QWERTY keyboard uses the
standard layout for English-speaking countries. The Dvorak keyboard layout is an alternative
and was designed to avoid awkward key combinations. Keys on a keyboard
send binary information into the computer which is interpreted using
the ASCII or Unicode character sets.
Mouse - used to control a pointer on the screen of a computer.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 1
22JU1A6149
CPU
Sensors
Sensors are used in many systems including security, temperature control, motion and eye
tracking. They are also used in games controllers and to help scientists research medical
conditions.
Motion sensors send a beam of light out and can detect if the beam is broken. They may also
use radio or sound waves, which will be reflected back if they are interrupted. However, most
security systems use passive sensors. These don't send signals out, but wait to receive a signal
in. The most commonly used passive sensor is an infra-red sensor. Since all human beings emit
infra-red energy, as soon as a person walks within reach of an infra-red sensor they will be
detected.
Outputs
There are thousands of different output hardware devices. Some of the most common examples
include:
Screen - used to give us access to the programs and the file system through a command
line interface (CLI) or a graphical user interface (GUI). Most screens make use
of LED or LCD technology.
Printer - used to print photographs, images and text onto paper and card. There are three
main categories of printer: ink-jet, dot-matrix and laser.
3D printers print out very thin layers of plastic one layer at a time to build up a 3D
object. 3D printing has been used in heart surgery and space technology research.
Inputs and outputs combined
Some peripherals operate as both inputs and outputs.
Soundcard - used to receive and give out any sound more complicated than a basic
beep. A soundcard is usually inside the computer connected to the motherboard. Hi-spec
soundcards can be external and connected by FireWire or USB. Powerful external
soundcards are used in music recording studios to process live music recordings.
Microphone - used to record sounds and communicate over the internet. Microphones
convert analogue sound into digital sound. Voice activation devices allow us to give
voice commands to a computer. Therefore, voice control can be used instead of a mouse
or keyboard to interact with a screen reader.
Touchscreen - used to control a device with fingers or a stylus. The touchscreen allows
a more intuitive form of interaction with a computer screen through icons. It also outputs
images. Touchscreens can be used to help with security, eg some smartphones can use
fingerprint recognition technology to unlock a phone screen.
Interactive white board - a touch-sensitive surface linked to a computer and a
projector. The user can interact with the projection using their finger or a special pen.
Multi-touch table - the whole surface of a table is the interface. The surface is a semi-
transparent material such as glass or Perspex. A data projector is located beneath the
table top and an infrared camera detects objects interacting with the surface.
Haptic feedback - gives outputs that the user can sense based on inputs, eg games
controllers often have a rumbling sensation to reflect an explosion or collision onscreen.
and is read from the disc by another laser. The discs are cheap, but they are vulnerable to
scratches. They cannot store as much data as a hard drive. A CD stores up to 800 MB, a DVD
holds up to 4.7 GB and a Blu-ray holds up to 50 GB.You need to have a CD, DVD or Blu-ray
writer on your computer to write information to the discs. CD, DVD and Blu-ray discs are
useful for creating film or music discs which are compatible with hardware such as DVD
players.
Tape storage:Big businesses and science projects, which process thousands of bytes of data
every second, often use tape storage to back up their data. It is a very cheap and reliable way to
store large amounts of data.
Major computer network components
Computer network requires the following devices (some of them are optional):-
• Network Interface Card (NIC) • Hub • Switches
• Cables and connectors • Router • Modem
Size Equal to
Bit 1 Bit
Nibble 4 Bits
The computer memory is mentioned in terms of
Byte 8 Bits
bytes only. KiloByte 1024 Bytes
MegaByte 1, 024 Kilobytes
GigaByte 1, 024 Megabytes
TeraByte 1, 024 Gigabytes
PetaByte 1, 024 Terabytes
ExaByte 1, 024 Petabytes
EXPERIMENT 3:
Linux Operating System commands: General command syntax Basic help commands
Basic File system commands Date and Time Basic Filters and Text processing Basic File
compression commands
Miscellaneous: apt-get, vi editor
A LINUX command may or may not have arguments. An argument can be an option or a
filename. The general format for LINUX commands is:
Help command as told before just displays information about shell built-in commands. Here‘s
the syntax for it:
$helphelp
-doption : It is used when you just want to get an overview about any shell built-in command
i.e it only gives short description.
-soption : It just displays only a short usage synopsis for each topic matching.
iii)Basic File system commands:CLI stands for command line interface. It is a program that
allows users to type text commands instructing the computer to do specific tasks.
6. mv command:
The primary use of the mv command is to move files, although it can also be used to rename
files.The arguments in mv are similar to the cp command. You need to type mv, the file‘s
name, and the destination‘s directory. For example: mv file.txt /home/username/Documents.
To rename files, the Linux command is mv oldname.extnewname.ext
7. mkdir command:
Use mkdir command to make a new directory — if you type mkdirkits it will create a
directory called kits.There are extra mkdir commands as well:
To generate a new directory inside another directory, use this Linux basic
command mkdirkits/Newfile
use the p (parents) option to create a directory in between two existing directories. For
example, mkdir -p kits/2020/Newfile will create the new ―2020‖ file.
8. rmdir command:
If you need to delete a directory, use the rmdir command. However, rmdir only allows you to
delete empty directories.
9. rm command:
The rm command is used to delete directories and the contents within them. If you only want
to delete the directory — as an alternative to rmdir — use rm -r.
Note: Be very careful with this command and double-check which directory you are in. This
will delete everything and there is no undo.
10.man command
Man stands for manual which is a reference book of a Linux operating system. It is similar to
HELP file found in popular software.To get help on any command that you do not understand,
you can type
iv)Date and Time :date command is used to display the system date and time. date command
is also used to set date and time of the system. By default the date command displays the date
in the time zone on which unix/linux operating system is configured.You must be the super-
user (root) to change the date and time.
Syntax:
date [OPTION]... [+FORMAT]
date [-u|--utc|--universal] [MMDDhhmm[[CC]YY][.ss]]
Options with Examples
date (no option) :With no options, the date command displays the current date and time,
including the abbreviated day name, abbreviated month name, day of the month, the time
separated by colons, the time zone name, and the year.
Command: $date
-u Option:Displays the time in GMT(Greenwich Mean Time)/UTC(Coordinated Universal
Time )time zone.
Command: $date -u
–date or -d Option: Displays the given date string in the format of date. But this will not
affect the system‘s actual date and time value.Rather it uses the date and time given in the form
of string.
Syntax: $date --date=" string "
Command:
$date --date="2/02/2010"
$date --date="Feb 2 2010"
–file or -f Option: This is used to display the date string present at each line of file in the date
and time format.This option is similar to –date option but the only difference is that in –date
we can only give one date string but in a file we can give multiple date strings at each line.
Syntax: $date --file=file.txt
$cat >>datefile
Command:
$date --file=datefile
8:-r Option: Thisis used to display the last modified timestamp of a datefile .
Syntax:
$date -r file.txt
We can modify the timestamp of a datefile by using touch command.
2. head :Displays the first n lines of the specified text files. If the number of lines is not
specified then by default prints first 10 lines.
Syntax:head [-number_of_lines_to_print] [path]
3. tail :It works the same way as head, just in reverse order. The only difference in tail is, it
returns the lines from bottom to up.
Syntax:tail [-number_of_lines_to_print] [path]
4. sort :Sorts the lines alphabetically by default but there are many options available to modify
the sorting mechanism. Be sure to check out the man page to see everything it can do.
Syntax:sort [-options] [path]
5. uniq :Removes duplicate lines. uniq has a limitation that it can only remove continuous
duplicate lines(although this can be fixed by the use of piping). Assuming we have the
following data.
Syntax:uniq [options] [path]
6. wc :wc command gives the number of lines, words and characters in the data.
Syntax:wc [-options] [path]
Example
Crate a file of 512MB size
# fallocate -l 512M um.img
Create archive
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 16
22JU1A6149
1 vi filename
Creates a new file if it already does not exist, otherwise opens an
existing file.
2 vi -R filename
Opens an existing file in the read-only mode.
3 view filename
Opens an existing file in the read-only mode.
Following is an example to create a new file testfile if it already does not exist in the current
working directory −
$vitestfile
Operation Modes
While working with the vi editor, we usually come across the following two modes −
Command mode − This mode enables you to perform administrative tasks such as
saving the files, executing the commands, moving the cursor, cutting (yanking) and
pasting the lines or words, as well as finding and replacing. In this mode, whatever you
type is interpreted as a command.
Insert mode − This mode enables you to insert text into the file. Everything that's typed
in this mode is interpreted as input and placed in the file.
vi always starts in the command mode. To enter text, you must be in the insert mode for
which simply type i. To come out of the insert mode, press the Esc key, which will take you
back to the command mode.
Getting Out of vi
The command to quit out of vi is :q. Once in the command mode, type colon, and 'q', followed
by return. If your file has been modified in any way, the editor will warn you of this, and not
let you quit. To ignore this message, the command to quit out of vi without saving is :q!. This
lets you exit vi without saving any of the changes.
The command to save the contents of the editor is :w. You can combine the above command
with the quit command, or use :wq and return.
The easiest way to save your changes and exit vi is with the ZZ command. When you are in
the command mode, type ZZ. The ZZ command works the same way as the :wq command.
If you want to specify/state any particular name for the file, you can do so by specifying it after
the :w. For example, if you wanted to save the file you were working on as another filename
called filename2, you would type :w filename2 and return.
Apt-get:
apt-get is a command-line tool which helps in handling packages in Linux. Its main task is to
retrieve the information and packages from the authenticated sources for installation, upgrade
and removal of packages along with their dependencies. Here APT stands for the Advanced
Packaging Tool.
Syntax:
apt-get [options] command
or
apt-get [options] install|remove pkg1 [pkg2 ...]
or
apt-get [options] source pkg1 [pkg2 ...]
Most Used Commands: You need to provide one of the commands below, if -h option is not
used.
update : This command is used to synchronize the package index files from their
sources again. You need to perform an update before you upgrade or dist-upgrade.
Ex:apt-get update
install : This command is used to install or upgrade packages.
Ex:apt-get install [...PACKAGES]
remove : This is similar to install, with the difference being that it removes the packages
instead of installing. It does not remove any configuration files created by the package.
Ex:apt-get remove [...PACKAGES]
download : This command is used to download the given binary package in the current
directory.
Ex : apt-get download [...PACKAGES]
1.Ping Command: This utility is commonly used to check whether your connection to the
server is healthy or not.This command is also used in -
Command Syntax:- ping hostname="" or="" ; You may Press Ctrl + c to exit from the pi
ng loop.
2.SSH Command: SSH which stands for Secure Shell, It is used to connect to a remote
computer securely. Compare to Telnet, SSH is secure wherein the client /server connection is
authenticated using a digital certificate and passwords are encrypted. Hence it's widely used by
system administrators to control remote Linux servers.
3.Ifconfig command :this command is one of the most important commands to configure and
display the network card configuration.If you simply type ifconfig it will display network
configuration like below. It saves all the network configurations in /etc/sysconfig/network-
scripts/ifcfg-eth0 interface wise.
4.scp command :This command is a frequently used command to copy files between servers.
SCP stands for secure copy. While cp is being used inside the Linux system. FTP is not secure
for file transactions there it comes SCP. You can copy files securely to and from remote hosts.
Syntax:$sudoscp /location1/file1.txt user@targethost:/home/
This will copy file from your local server to target server at /home directory.
5.netstat command :this command is useful command-line tools to print network connections
routing tables interface statistics and multicast memberships.
Syntax:$sudonetstat –r --Kernel IP routing table
$ sudonetstat –i--Kernel Interface table
6.nslookup command :This command is also very useful command for finding DNS related
information.
DNS is a tool used for name resolution IP to host and host to IP as it is easy to remember name
versus remembering IP Address which is 32-bit address if we consider IP Version 4.
Syntax:$nslookup google.com
Non-authoritative answer:
Name: google.com
Address: 172.217.10.238
7.traceroute command:This command in Linux as the name suggests prints the route packets
tracing to destination network host using your present network and DNS infrastructure.
Syntax: $ sudotraceroute google.com
8.Telnet command:It helps to connect to remote linux computer. To run program remotely
and condut administrator. This utility is similar to the remote desktop feature found in the
window machine .
syntax: telnet hostname=” ” or =” “
9.hostname command :This command in Linux does the work as its name. If you need to
check your server name you can simply type hostname and it will print hostname for you.
Syntax:
$ hostname
10.FTP Command:FTP is file transfer protocol. It's the most preferred protocol for data
transfer amongst computers.You can use FTP to –
Logging in and establishing a connection with a remote host
Upload and download files
Navigating through directories
Browsing contents of the directories
The syntax to establish an FTP connection to a remote host is -
ftp hostname="" or=""
11.arp command: it means Address Resolution Protocal.it displays and modify the internet to
Ethernet address translation tables used by the arp. Syntax: arp[-v][-i if][-H type] –a
[hostname]
12.wget commands: This command is a free Linux command-line utility that is non-
interactive in nature and used to download files from the web. It supports protocols like
HTTP, HTTPS, and FTP.
Syntax :$wget<source url>
13.route command: This command in Linux is another useful command to display and modify
IP routing configurations. Syntax:$sudo routeKernel IP routing table
Auto-detect proxy settings for this network: Choose this if you want Firefox to
automatically detect the proxy settings for your network.
Use system proxy settings: Choose this if you want to use the proxy settings configured
for your operating system.
Manual proxy configuration: Choose this if you have a list of one or more proxy servers.
Ask your system administrator for the configuration information. Each proxy requires a
hostname and a port number.
o If the same proxy name and port number are used for all protocols, check Use this
proxy server for all protocols.
o No Proxy For: List of hostnames or IP addresses that will not be proxied. Use
<local> to bypass proxying for all hostnames which do not contain periods.
Automatic proxy configuration URL: Choose this if you have a proxy configuration
(.pac) file. Enter the URL and click okay to save changes and load the proxy
configuration. file: and data: schemes can also be used here (e.g. file:///c:/proxy.pac or
data:,functionFindProxyForURL(){return "HTTPS example.com:3443";}).
o Reload: The reload button will load the currently available proxy configuration.
Enable DNS over HTTPS: This setting enables DNS Over HTTPS (DoH) using the
specified server. For more information, see Firefox DNS-over-HTTPS.
Note: The Connection Settings dialog will also show extensions that control how Firefox
connects to the internet. You can disable these extensions by clicking Disable Extension.
b) Extensions
Extensions, or add-ons, can modify and enhance the capability of a browser. Extensions for
Firefox are built using the WebExtensions API cross-browser technology.
An extension adds features and functions to a browser. It‘s created using familiar web-based
technologies—HTML, CSS, and JavaScript. It can take advantage of the same web APIs as
JavaScript on a web page, but an extension also has access to its own set of JavaScript APIs.
This means that you can do a lot more in an extension than you can with code in a web page.
The technology for extensions in Firefox is, to a large extent, compatible with the extension
API supported by Chromium-based browsers, Then the we will talk about the
firefoxextentions.
To disable extensions
Click the Firefox menu icon in the upper right of the browser toolbar.
Choose Add-ons
c)Plugins
A plugin is a software add-on that is installed on a program, enhancing its capabilities. For
example, if you wanted to watch a video on a website, you may need a plugin to do so. If the
plugin is not installed, your browser will not understand how to play the video.
To disable plugins
Click the Firefox menu icon in the upper right of the browser toolbar.
Choose Add-ons
From the left navigation pane, choose Plugins.
Choose Never Activate for each plugin that you wish to disable.
Alternatively, if you wish to disable all plugins as a troubleshooting measure, you may
choose to Create a new Mozilla Firefox Profile
To enable plugins
Click the Firefox menu icon in the upper right of the browser toolbar.
Choose Add-ons
From the left navigation pane, choose Plugins.
Choose Always Activate or Ask to Activate for each plugin, as needed.
d)Security Settings
Enhanced Tracking Protection in Firefox for desktop :
Enhanced Tracking Protection in Firefox automatically protects your privacy while you
browse.
The shield to the left of the address bar tells if you if Firefox is blocking trackers and scripts on
a site.
- Purple: Firefox blocked trackers and harmful scripts on a site. Open the shield to
see what was blocked.
- Gray and crossed out: Enhanced Tracking Protection is turned off on a site. Open
the shield and toggle the switch to turn it back on.
Click on the shield to see what Firefox has blocked.
e)Content blocking :
"Content blocking" is a collection of privacy features in Firefox 69 and below. This became
"Enhanced Tracking Protection" in Firefox 70.
By default, Firefox protects you from being tracked in private windows using a list of known
trackers provided by Disconnect. Firefox allows some trackers so websites can function
properly. You can change your settings to block trackers all the time, to block trackers from
Disconnect‘s level 2 list, or to not block any trackers at all.
To adjust your settings:
1. Click the menu button .
2. Click Content Blocking.
This takes you to the Content Blocking section in your Firefox Options Privacy &
Security panel.
You can also set Firefox to always send websites a Do Not Track signal.
Custom settings
Aggressive protection
1. Select Custom.
2. Select In all windows from the drop-down on the right.
3. Click the Change block list link.
The Block Lists pop-up displays.
4. Select Level 2 block list. Blocks all detected trackers. Some websites or content may not
load properly.
5. Click Save Changes.
6. Select the Cookies checkbox if not already selected.
Third-Party Trackers is selected by default. Select more aggressive cookie protections
from the dropdown, such as blocking all third-party cookies or even blocking all
cookies.
7. Select the Cryptominers checkbox.
8. Select the Fingerprinters checkbox.
9. Click the Reload All Tabs button to apply these changes on all your open tabs.
Remove all protections
You can also remove all the protections offered by content blocking, which effectively disables
the feature.
1. Select the Custom radio button.
2. Deselect the Trackers checkbox.
3. Deselect the Cookies checkbox.
4. Deselect the Cryptominers checkbox.
5. Deselect the Fingerprinters checkbox.
6. Click the Reload All Tabs button to apply these changes on all your open tabs.
Allow or block media autoplay in Firefox
Firefox prevents media from playing automatically on websites you visit, unless you grant
permission. Learn more about this feature.
To always allow or block autoplay for all media with audio or video:
1. Click the menu button and select Options.
2. Select the Privacy & Security panel and go down to the Permissionssection
(or enter autoplay in the Find in Options search box).
The default Block Audio setting will prevent autoplay for all media with sound.
o
o The Block Audio and Video setting will prevent autoplay for all media, including
video, even though audio is muted.
o The Allow Audio and Video setting will allow all media to autoplay.
5. After you have made your selection, click Save Changes.
The setting you select will apply to all media for all websites, except for specific autoplay site
settings.
LAN Settings
1. Setup LAN on PC
Note: Do not connect the LAN cable until instructed.
On the PC, click Start, then Control Panel, then Network Connections
Click Local Area Connection
In the dialog box,, click on Properties
Select Internet Protocol(TCP/IP) then click Properties
Click OK
Click Close
Click Close
Cookie settings
Firefox can be set to not accept cookies. To turn on cookies:
1. Click the menu button and select Options.
2. Select the Privacy & Security panel. This is where you can view your settings for
Enhanced Tracking Protection, which includes cookies.
o If Standard is selected, this is the default setting and, except for trackers, all
cookies are enabled. For more information, see Trackers and scripts Firefox
blocks in Enhanced Tracking Protection.
o If Strict is selected, either choose Standard or switch to Custom.
o If Custom is selected, either uncheck Cookies (this will allow all cookies) or select
the setting to only block Cross-site and social media trackers.
3. Close the about:preferences page. Any changes you've made will automatically be
saved.
Check sites that are blocked from setting cookies
1. Click the menu button and select Options.
2. Select the Privacy & Security panel and scroll down to the Cookies and Site Data
section.
If deleting cookies for the site with the problem did not fix the error, clear all the cookies
stored on your computer and clear the Firefox cache:
1. Click the Library button on your toolbar. (If you don't see it there, click the menu button
then click Library.) Click History and select Clear Recent History….
2. In the TimeRangetoclear: drop-down, select Everything.
3. Below the drop-down menu, select both Cookies and Cache. Make sure other items you
want to keep are not selected.
4. Click Clear Now.
Firewall Configuration:
Just as a firewall in a building attempts to prevent a fire from spreading, a computer firewall
attempts to prevent computer viruses from spreading to your computer and to prevent
unauthorized users from accessing your computer. A firewall exists between your computer
and the network. It determines which services on your computer remote users on the network
can access. A properly configured firewall can greatly increase the security of your system. It
is recommended that you configure a firewall for any Red Hat Enterprise Linux system with an
Internet connection.
I)Security Level Configuration Tool
During the Firewall Configuration screen of the Red Hat Enterprise Linux installation, you
were given the option to enable a basic firewall as well as to allow specific devices, incoming
services, and ports.
After installation, you can change this preference by using the Security Level Configuration
Tool.
To start the application, select Main Menu Button (on the Panel) => System Settings =>
Security Level or type the command system-config-securitylevel from a shell prompt (for
example, in an XTerm or a GNOME terminal).
•Enable firewall — This option configures the system to reject incoming connections that are
not in response to outbound requests, such as DNS replies or DHCP requests. If access to
services running on this machine is needed, you can choose to allow specific services through
the firewall.
Blocking pop-ups:
How to stop pop-ups in Windows 10 in your browser
Microsoft Edge has a built-in pop-up blocker that can be activated by following these steps:
1. Open Microsoft Edge and click the three horizontal dotes in the top right corner, or press
Alt-X, to open the options menu.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 31
22JU1A6149
2. Click "Settings."
Open Settings from Edge's options menu.
3. Click "Privacy and Security," which is the little padlock tab along the left hand side of the
bar.
4. Scroll to the bottom of the Security options until you find the "Security" section. There, turn
on "Block pop-ups."
Toggle the "Block pop-ups" option from the bottom of the "Privacy & security" menu
How to stop Windows 10's system pop-ups
Windows 10 itself will often create pop-ups to try and sell you new products, download their
software, or give you reminders. If you want to shut these down, there are a number of settings
you should shut off.
To disable reminders about buying OneDrive or Microsoft Office:
1. Open your File Explorer. You can do this by opening any folder.
2. Click the "View" tab at the top of the window.
3. Click "Options" — at the right of the menu bar — and select "Change Folder and Search
Options."
4. In the new window that opens, select the "View" tab. In the Advanced Settings options,
uncheck "Show Sync Provider Notifications."
Search for "Notifications and actions" to open it. Ross James/Business Insider
2. Turn off "Get notifications from apps and other senders."
3. Uncheck the third box, which begins "Show me the Windows experience..."
Uncheck the toggle switch and the boxes. The first two boxes will be grayed out by the toggle
switch.
Setting Up a Gmail Account:Setting up a Gmail account is easy. You will begin by creating a
Google account, and during the quick signup process you will choose your Gmail account
name. In this lesson, we'll show you how to set up your Google account for Gmail, add and
edit contacts, and edit your mail settings.
Setting up a Gmail account: To create a Gmail address, you'll first need to create a Google
account. Gmail will redirect you to the Google account signup page. You'll need to provide
some basic information like your name, birth date, gender, and location. You will also need
to choose a name for your new Gmail address. Once you create an account, you'll be able to
start adding contacts and adjusting your mail settings.
To create an account:
1. Go to www.gmail.com.
2. Click Create account.
3. The signup form will appear. Follow the directions and enter the required information.
4. Review Google's Terms of Service and Privacy Policy, click the check box, then
click Next step.
5. Here, you'll have an opportunity to set up recovery options. Recovery options are
helpful if you forget your password or if someone tries to access your account. If you
don't want to set up recovery options at this time, click Done.
6. Your account will be created, and the Google welcome page will appear.
Just like with any online service, it's important to choose a strong password—in other words,
one that is difficult for someone else to guess. For more information, check out our Creating
Strong Passwords lesson.
Signing in to your account: When you first create your account, you will be automatically signed
in. Most of the time, however, you'll need to sign in to your account and sign out when you're
done with it. Signing out is especially important if you're using a shared computer (for
example, at a library or office) because it prevents others from viewing your emails.
To sign in:
1. Go to www.gmail.com.
2. Type your user name (your email address) and password, then click Sign in.
To sign out:
In the top-right corner of the page, locate the circle that has your first initial (if you've already
selected an avatar image, it will show the image instead). To sign out, click the circle and
select Sign out.
Productivity Tools:
Experiment 6: Basic HTML tags, Introduction to HTML5 and its tags, Introduction to CSS3
and its properties. Preparation of a simple website/ homepage,
Assignment: Develop your home page using HTML Consisting of your photo, name, address
and education details as a table and your skill set as a list.
Features to be covered:- Layouts, Inserting text objects, Editing text objects, Inserting Tables,
Working with menu objects, Inserting pages, Hyper linking, Renaming, deleting, modifying
pages, etc.,
HTML contains lots of predefined tag. Some of them are described below:
Document structure tag:
•HTML tag: It is the root of the html document which is used to specify that the document is
html.
Syntax: <html> Statements... </html>
•Head tag: Head tag is used to contain all the head element in the html file. It contains the
title, style, meta, …etc tag.Contains elements describing the document.Syntax:<head>
Statements... </head>
•Body tag: It is used to define the body of html document. It contains image, tables, lists, …
etc.
The content of your HTML page.Syntax:<body> Statements... </body>
•Title tag: It is used to define the title of html document.Syntax:<title> Statements... </title>
<tittle>tab name</tittle>
•Anchor tag: It is used to link one page to another page.Syntax:<a href="..."> Statements...
</a>
•List tag: It is used to list the content. Syntax:<li> Statements... </li>
•Ordered List tag: It is used to list the content in a particular order. Syntax:<ol>
Statements... </ol>
EX:<ol>
<li>List item 1</li>
<li>List item 2</li>
<li>List item 3</li>
<li>List item 4</li>
</ol>
•Unordered List tag: It is used to list the content without order. Syntax:<ul> Statements...
</ul>
EX:<ul>
<li>List item 1</li>
<li>List item 2</li>
<li>List item 3</li>
<li>List item 4</li>
</ul>
•Comment tag: It is used to set the comment in html document. It is not visible on the
browser.
Syntax:<!-- Statements... -->
•Center tag: It is used to set the content into the center. Syntax:<center> Statements...
</center>
•Font tag: It is used to specify the font size, font color and font-family in html document.
Syntax:<font> Statements ... <font>
<font face="Times New Roman">Example</font>
Empty (Non-Container) Tags:
•Line break tag: It is used to break the line. Syntax:<br>
•Image tag: It is used to add image element in html document. Syntax:<img>
<img src="gfg.jpg" width="40" height="40" border="0">
•Link tag: It is used to link the content from external source. Syntax:<link>
<head>
<link rel="stylesheet" type="text/css" href="style.css">
</head>
•Horizontal rule tag: It is used to display the horizontal line in html document.Syntax:<hr/>
Tables Tags: Table tag is used to create a table in html document.
Syntax:<table> Statements... </table>
<table border="4" cellpadding="2" cellspacing="2" width="100%">
<tr><td>Column 1</td>
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 38
22JU1A6149
<td>Column 2</td></tr></table>
•Tr tag: It is used to define row of html table.Syntax:<tr> Statements... </tr>
<table>
<tr>
<th>Month</th><th>Savings</th>
</tr>
<tr>
<td>January</td><td>$100</td>
</tr>
</table>
•Th tag: It defines the header cell in a table. By default it set the content with bold and center
property.
Syntax:<th> Statements ... <th>
<table>
<tr>
<th>Month</th><th>Savings</th>
</tr>
<tr>
<td>January</td><td>$100</td>
</tr>
</table>
•Td tag: It defines the standard cell in html document.Syntax:<td> Statements ... <td>
<table>
<tr>
<td>Cell A</td><td>Cell B</td>
</tr>
</table>
Input Tags:
•Form tag: It is used to create html form for user.Syntax:<form> Statements ... <form>
<form action="mailto:[email protected] ">
Name: <input name="Name" value="" size="80"><br>
Email: <input name="Email" value="" size="80"><br>
<br><center><input type="submit"></center>
</form>
•Submit input tag: It is used to take the input from the user. Syntax:<input>
<form method=post action="/cgibin/example.cgi">
<input type="text" style="color: #ffffff;
font-family: Verdana; font-weight: bold;
fontsize: 12px; background-color: #72a4d2;"
size="10" maxlength="30">
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 39
22JU1A6149
<th>Year of Study</th>
<th>Percentage</th>
</tr>
<tr>
<td>B.Tech(CSE)</td>
<td>KITS COLLEGE</td>
<td>2020</td>
<td>Pursuing</td>
</tr>
<tr>
<td>Intermediate </td>
<td>Sri Chaitanya</td>
<td>2018</td>
<td>89%</td>
</tr>
<td>SSC</td>
<td> Sri Chaitanya </td>
<td>2016</td>
<td>85%</td>
</tr>
</table>
<h1>Technical Skills:</h1>
<ultype=disc>
<li>Programming Languages : C, JAVA</li>
<li>Operating Systems : Windows </li>
<li>Database Systems : Oracle</li>
<li>Web Technologies
</ul>
</body>
</html>
INTERNET OF THINGS
IOT Overview:IoT (Internet of Things) is an advanced automation and analytics system which exploits
networking, sensing, big data, and artificial intelligence technology to deliver complete systems for a
product or service. These systems allow greater transparency, control, and performance when applied to
any industry or system.
IoT systems have applications across industries through their unique flexibility and ability to
be suitable in any environment. They enhance data collection, automation, operations, and
much more through smart devices and powerful enabling technology.
IoT exploits recent advances in software, falling hardware prices, and modern attitudes towards
technology. Its new and advanced elements bring major changes in the delivery of products,
goods, and services; and the social, economic,and political impact of those changes.
IoT − Key Features: The most important features of IoT include artificial intelligence,
connectivity, sensors, active engagement, and small device use. A brief review of these
features is given below −
Small Devices − Devices, as predicted, have become smaller, cheaper, and more
powerful over time. IoT exploits purpose-built small devices to deliver its precision,
scalability, and versatility.
IoT – Advantages:
The advantages of IoT span across every area of lifestyle and business. Here is a
list of some of the advantages that IoT has to offer −
Improved Customer Engagement − Current analytics suffer from blind-spots and
significant flaws in accuracy; and as noted, engagement remains passive. IoT
completely transforms this to achieve richer and more effective engagement with
audiences.
Technology Optimization − The same technologies and data which improve the
customer experience also improve device use, and aid in more potent improvements to
technology. IoT unlocks a world of critical functional and field data.
Reduced Waste − IoT makes areas of improvement clear. Current analytics give us
superficial insight, but IoT provides real-world information leading to more effective
management of resources.
Enhanced Data Collection − Modern data collection suffers from its limitations and its
design for passive use. IoT breaks it out of those spaces, and places it exactly where
humans really want to go to analyze our world. It allows an accurate picture of
everything.
IoT – Disadvantages:
Though IoT delivers an impressive set of benefits, it also presents a significant
set of challenges. Here is a list of some its major issues −
Security − IoT creates an ecosystem of constantly connected devices communicating
over networks. The system offers little control despite any security measures. This
leaves users exposed to various kinds of attackers.
Privacy − The sophistication of IoT provides substantial personal data in extreme detail
without the user's active participation.
Complexity − Some find IoT systems complicated in terms of design, deployment, and
maintenance given their use of multiple technologies and a large set of new enabling
technologies.
Flexibility − Many are concerned about the flexibility of an IoT system to integrate
easily with another. They worry about finding themselves with several conflicting or
locked systems.
Compliance − IoT, like any other technology in the realm of business, must comply
with regulations. Its complexity makes the issue of compliance seem incredibly
challenging when many consider standard software compliance a battle.
Iot Protocols:
IoT communication protocols are modes of communication that protect and
ensure optimum security to the data being exchanged between connected devices. The IoT
devices are typically connected to the Internet via an IP (Internet Protocol) network.
IoT protocols and standards can be broadly classified into two separate categories.
IoT network protocols are used to connect devices over the network. These are the
set of communication protocols typically used over the Internet. Using IoT network protocols,
end-to-end data communication within the scope of the network is allowed. Following are the
various IoT Network protocols:
Smart street lighting is the practical use case of LoRaWanIoT protocol. The street lights can be
connected to a LoRa gateway using this protocol. The gateway, in turn, connects to the cloud
application that controls the intensity of light bulbs automatically based on the ambient
lighting, which helps in reducing the power consumption during day-times.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 44
22JU1A6149
• Bluetooth:
Bluetooth is one of the most widely used protocols for short-range
communication. It is a standard IoT protocol for wireless data transmission. This
communication protocol is secure and perfect for short-range, low-power, low-cost, and
wireless transmission between electronic devices. BLE (Bluetooth Low Energy) is a low-
energy version of Bluetooth protocol that reduces the power consumption and plays an
important role in connecting IoT devices.
Bluetooth protocol is mostly used in smart wearables, smartphones, and other mobile devices,
where small fragments of data can be exchanged without high power and memory. Offering
ease of usage, Bluetooth tops the list of IoT device connectivity protocols.\
• ZigBee:
ZigBee is an IoT protocol that allows smart objects to work together. It is commonly
used in home automation. More famous for industrial settings, ZigBee is used with apps that
support low-rate data transfer between short distances. Street lighting and electric meters in
urban areas, which provides low power consumption, use the ZigBee communication
protocol. It is also used with security systems and in smart homes.
MQTT is mainly used in devices which are economical and requires less power and memory.
For instance, fire detectors, car sensors, smart watches, and apps for text-based messaging.
reduces space usage. The protocol uses binary data format EXL (Efficient XML
Interchanges).
AMQP protocol is mainly used in the banking industry. Whenever a message is sent by a
server, the protocol tracks the message until each message is delivered to the intended
users/destinations without failure.
M2M communication protocols are used for smart homes, automated vehicle authentication,
vending machines, and ATM machines.
Other than the instant messaging apps such as Google Talk and WhatsApp, XMPP is also used
in online gaming, news websites, and Voice over Internet Protocol (VoIP).
Iot Applications:
1. Wearable’s: Virtual glasses, fitness bands to monitor for example calorie expenditure and
heart beats, or GPS tracking belts, are just some examples of wearable devices that we have
been using for some time now. Companies such as Google, Apple, Samsung and others have
developed and introduced the Internet of Things and the application thereof into our daily lives.
2. Health: The use of wearable‘s or sensors connected to patients, allows doctors to monitor a
patient's condition outside the hospital and in real-time. Through continuously monitoring
certain metrics and automatic alerts on their vital signs, the Internet of Things helps to improve
the care for patients and the prevention of lethal events in high-risk patients.
4. Agriculture: Smart farms are a fact. The quality of soil is crucial to produce good crops,
and the Internet of Things offers farmers the possibility to access detailed knowledge and
valuable information of their soil condition. Through the implementation of IoT sensors, a
significant amount of data can be obtained on the state and stages of the soil. Information such
as soil moisture, level of acidity, the presence of certain nutrients, temperature and many other
chemical characteristics, helps farmers control irrigation, make water use more efficient,
specify the best times to start sowing, and even discover the presence of diseases in plants and
soil.
the supply service, report results and offer courses of action to the company that provides the
service.
1. Device-to-Device:
Device-to-device communication represents two or more devices that directly
connect and communicate between one another. They can communicate over many types of
networks, including IP networks or the Internet, but most often use protocols like Bluetooth, Z-
Wave, and ZigBee.
2. Device-to-Cloud:
3. Device-to-Gateway:
Office Tools:
Experiment 7: Demonstration and Practice on Text Editors like Notepad++, Sublime
Text, Atom, Brackets, Visual code, etc
1.BRACKETS:
Brackets is a source code editor with a primary focus on web development.[5] Created
by Adobe Systems, it is free and open-source software licensed under the MIT License, and is
currently maintained on GitHub by Adobe and other
Quick Edit
Quick Docs
Live Preview
JSLint
LESS support[15]
Open source[16]
Extensibility
Functionality:
Run this file and leave all the default options selected.
2.NOTEPAD++:
INSTALLATION OF NOTEPAD++
to add plugins. In fact, new versions of Notepad have incorporated various plugins, and 10
user-created plugins are now included in the program by default.
3.Sublime Text :
The binary file of Sublime Text is free to download and be evaluated. However, it
requires a purchased license for your continuous use. If you will use the program
individually then, you must select and buy the personal license. This is a one-off purchase that
comes with 3 years of updates. Once the 3-year updates are done, you will be required to do an
upgrade to keep on receiving further updates.
If the program is for an organization, the business license is the right one to be
bought. Unlike the personal license, this can be purchased on an annual tiered subscription
basis. The amount is based on the number of seats you‘ll get—for example, there exists a 10-
seat license, an 11 to 25-seat license, and a 26 to 50-seat license. Any seats more than fifty will
have a fixed price of the highest amount.
FEATURES
Despite the tool‘s minimal style and lightweight size, Sublime Text is heavily-packed with
exceptional features. However, these are placed in the form of plugins and extensions that can
be a bit of a hassle—especially for beginner users of this coding editor. Nevertheless, it is still
the ideal text editor for large projects as it is capable of opening and editing multiple files
simultaneously in the fastest way possible.
Not only does its incredible navigation feature called ―GoTo Anything‖ enables you to access
any element of your code immediately, but it also gives you permission to zoom out and view
their code as one solid page instead of unnecessarily scrolling through lines individually. More
importantly, this is highly customizable for any style of coding you want to achieve.
INSTALLATION ON WINDOWS
Step 1 − Download the .exe package from the official website as shown below −
https://www.sublimetext.com/3
Step 2 − Now, run the executable file. This defines the environment variables. When
you run the executable file, you can observe the following window on your screen.
Click Next.
Step 3 − Now, choose a destination location to install Sublime Text3 and click Next.
Step 4 − Verify the destination folder and click Install.
Step 5 − Now, click Finish to complete the installation.
Step 6 − Upon a success
4.ATOM:
Atom is a free and open-source text and source code editor for macOS, Linux,
and Microsoft Windows with support for plug-ins written in JavaScript, and embedded Git
Control, developed by GitHub. Atom is a desktop application built using web
technologies. Most of the extending packages have free software licenses and are community-
built and maintained. Atom is based on Electron (formerly known as Atom Shell), a framework
that enables cross-platform desktop applications using Chromium and Node.js.[12][13] It is
written in CoffeeScript and Less.
Atom was released from beta, as version 1.0, on 25 June 2015. Its developers call it a
"hackable text editor for the 21st Century". It is fully customizable in HTML, CSS, and
JavaScript
PACKAGES:
Like most other configurable text editors, Atom enables users to install third-party packages
and themes to customize the features and looks of the editor. Packages can be installed,
managed and published via Atom's package manager apm. Syntactic highlighting support for
other languages than the default, can be installed through the packages, as well as the auto-
complete function.
Features:
Cross-platform editing
Built-in package manager
Smart auto-completion
File system browser
Multiple panes
Find and replace
INSTALLATION:
To install ATOM code editor in Windows you can download the executable file and follow the
installer instructions to install the editor.
1.2. Linux Users:
To install ATOM code editor in Linux operating system you can download the .deb file (atom-
amd64.deb) and can run the following command on the terminal to install it in your Linux
machine.
sudodpkg -i /path/to/deb/file
For Example, my .deb file is in the Downloads directory so the command will become
sudodpkg -i Downloads/atom-amd64.deb
After running the above command run the following com
AIM:
To create a document applying the above mentioned techniques.
Software Requirement: MS-WORD
Hardware Requirement: Personal computer
THEORY:
Header and Footer:
1. To create a header, enter text or graphics in the header areaor click button on the header and
footer tool bar.
2. To create footer, click switch between header and footer.
3. Then click exit.
Date and Time:
Insert a date field that automatically updates so that the current date isdisplayed when you open
or print the file.
Insert a time field that automatically updates so that the current timeis displayed when you
open or print the file.
Border:
On the format menu, click borders and shadings.
To specify that the border appears on a particular side of a page, such as only
at the top, click custom under setting.
To specify a particular page or section for the borders to appear, click the
option you want to apply.
To specify the exact position o f the border on the page. Finally, click OK.
Color:
Select the text you want to make a different color.
To apply the color most recently applied to text, click font color.
To apply different colors, click the arrow on the right of the font color button,
select the color you want and then click the button.
PROCEDURE:
First click start button on the status bar. Then select program and againselect Microsoft word.
On the menu bar click the file option. Then again clicknew. Then enter the text not less than
100 words. A header appears at the top and
The footer appears at the bottom of each page. On the view menu, click headerand footer
option. From dialogue box, make the required changes and then clickOK. On the format menu,
click borders and shading s make required changes andthe click OK. Select the text you want
and make the different color. Click onright of the font color button, and then select the color
you want and then click onthe button.
Table :A table consists of rows and columns.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 57
22JU1A6149
Cell Alignment: Aligns contents written in a table in the top left corner or top rightcorner or in
the center etc...
Foot Note: Foot notes are used to comments on, or provide references for text in adocument.
Hyperlink:It is a colored and underlined text or a graphic that you click to go to a file,
alocation in a file, an HTML page on the World Wide Web, or an HTML page in an intranet.
Symbols:You may not be able to enter certain symbols into your word document, as thereis a
limitation on the keys on the key board. Creating these new symbols especiallywhen working
with mathematical terms it becomes very difficult .For example wecan insert symbols such
as≡,≈, ,..
Spell check: It automatically checks for spelling and grammatical errors
Bullets and Numbering:In Microsoft word we can easily create bulleted or numbered list
ofitems.
Formatting Styles:A style is a set of rules to be followed for the effective document.Style can
be applied to text, paragraph, table or a list.
Changing text direction:You can change the text orientation in drawing objects, such as text
boxes,shapes, and callouts, or in table cells so that the text is displayed vertically
orhorizontally.
Track changes:A track change is an excellent feature of Microsoft word as it enables auser or
reviewer to keep track of the changes that have taken a period. Changes likeinsertion, deletion
or formatting changes can be kept track of.
Procedure:
Changing Text direction:
1. Click the drawing object or table cell that contains the text you want to change.
2. On the Format menu, click Text Direction.
3. Click the orientation you want.
Table:
1. Click where you want to create a table.
2. On the Table menu, point to Insert, and then click Table.
3. Under Table size, select the number of columns and rows.
4. Under AutoFit behavior, choose options to adjust table size.
5. To use a built-in table format, click AutoFormat.
Select the options you want
Cell Alignment:1. Click the cell that c ontains text you want to align.
2. On the Tables and Borders toolbar, select the option for the horizontal and vertical alignment
you want— for example, Align Bottom Center or Align Top Right.
Foot Note: 1. In print layout view, click where you want to insert the note reference mark.
2. On the Insert menu, point to Reference, and then click Footnote.
3. Click Footnotes or Endnotes.
By default, Word places footnotes at the end of each page and endnotes atthe end of the
document. You can change the placement of footnotes and endnotes by making a selection in
the Footnotes or Endnotes box.
4. In the Number format box, click the format you want.
5. Click Insert.
Word inserts the note number and places the insertion point next to the note number.
6. Type the note text.
7. Scroll to your place in the document and continue typing.
As you insert additional footnotes or endnotes in the document, Word automatically applies the
correct number format.
Hyper link:
Select the text or picture you want to display as the hyperlink, and then click Insert Hyperlink
on the Standard toolbar
Do one of the following:
1. Link to an existing file or web page:
1. Under Link to, click Existing File or Web Page.
2. In the Address box, type the address you want to link to or, in the
Look in box, click the down arrow, and navigate to and select the file
2. Link to a file you haven‗t created yet Under Link to, click Create New Document.
3. In the Name of new document box, type the name of the new file.
4. Under When to edit, click either Edit the new document later or Edit the new document now
An e-mail address:
1. Select the text or picture you want to display as the hyperlink, and then click Insert
Hyperlink on the Standard toolbar
2. Under Link to, click E-mail Address.
3. Either type the e-mail address you want in the E-mail address box, or select an e-mail
address in the recently used e-mail addresses box.
4. In the Subject box, type the subject of the e-mail message A specific location in another
document
1. Insert a bookmark in the destination file or Web page.
2. Open the file that you want to link from, and select the text or object you want to display as
the hyperlink.
3. On the Standard toolbar, click Insert Hyperlink .
4. Under Link to, click Existing File or Web Page.
5. In the Look in box, click the down arrow, and navigate to and select the file that you want to
link to.
6. Click Bookmark, select the bookmark you want, and then click OK.
Symbol:
1. Click where you want to insert the symbol.
2. On the Insert menu, click Symbol, and then click the Symbols tab.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 59
22JU1A6149
Spell check:
1. O n the Standard toolbar, click Spelling and Grammar .
2. When Word finds a possible spelling or grammatical problem, make your changes in the
Spelling and Grammar dialog box.
Bullets and Numbering:
1. Type 1. to start a numbered list or * (asterisk) to start a bulleted list, and then press
SPACEBAR or TAB.
2. Type any text you want.
3. Press ENTER to add the next list item.
Word automatically inserts the next number or bullet.
4. To finish the list, press ENTER twice, or press BACKSPACE to delete the last bullet or
number in the list
Formatting Styles:
1. Select the words, paragraph, list, or table you want to change.
2. If the Styles and Formatting task pane is not open, click Styles and Formatting on the
Formatting toolbar
3. Click the style you want in the Styles and Formatting task pane. If the style you want is not
listed, click All Styles in the Show box
Track Changes:
1.Open the document you want to revise. 2. On the Tools menu, click Track Changes.
and cropping. Generally the text in a document follows a standard orientation (line after line).
A text box provides a different orientation to the text with in a document. It can arrange the
text in anywhere and can be resized and moreover moved to any section of the document or
even outside.When you are formatting a paragraph, you do not need to highlight the entire
paragraph. Placing the cursor anywhere in the paragraph enables you to format it. After you set
a paragraph format, subsequent paragraphs will have the same format unless you change the
format
PROCEDURE:
Table of contents:
1. Click where you want to insert the table of contents.
2. On the Insert menu, point to Reference, and click Index and Tables.
3. Click the Table of Contents tab.
4. To use one of the available designs, click a design in the Formats box.
5. Select any other table of contents options you want.
Newspaper columns:
1. Select the entire or part of document to be converted into a newsletter-style
2. Click on format menu , select columns
3. Any desired number of columns are presets-one or two or three or left or right be can be
selected.
4. Width and spacing can be fixed and equal columns width can be checked for uniformity
5. If newspaper columns are to be separated by a line, then check line between
6. Under apply to will be whole document if entire document is selected else we have to select
a selected text.
7. Click ok
5. If you don't know the exact file name, you can substitute wildcard characters for one or more
real characters. Use the asterisk (*) as a substitute for zero or more characters in a file name.
Use the question mark (?) as a substitute for a single character in a file name.
6. In the Results box, click the clip to insert it.
Drawing Toolbar and Word Art:
1. Click in your document where you want to create the drawing.
2. On the Insert menu, point to Picture, and then click New Drawing. A drawing canvas is
inserted into your document.
3. Use the Drawing toolbar to add any shapes or pictures that you want
WORD ART:
1.On the Drawing toolbar, click Insert WordArt .
2.Click the WordArt effect you want, and then click OK.
3.In the Edit WordArt Text dialog box, type the text you want.
4.Do any of the following:
To change
To make text bold, click the Bold
Formatting Images:
1. Formatting of the images can be achieved by selecting the image and double click on the
picture, format picture dialog box appears.
2. The same can be achieved by selecting the tools menu > customize>tool bars tab>picture
and click close.
Basic formatting features of an image Resize a drawing
1. Select the drawing canvas
2. On the Drawing Canvas toolbar, do one of the following:
To make the drawing canvas boundary larger without changing the size of the objects on the
canvas, click Expand .
To make the drawing canvas boundary fit tightly around the drawing objects or pictures, click
Fit .
To scale the drawing and make the objects and canvas proportionately smaller or larger, click
Scale Drawing, and then drag the edges of the canvas.
Resize a picture or shape
1. Position the mouse pointer over one of the sizing handles
2. Drag the sizing handle until the object is the shape and size you want.
To increase or decrease the size in one or more directions, drag the mouse away from or
toward the center, while doing one of the following:
To keep the center of an object in the same place, hold down CTRL while dragging the mouse.
To maintain the object's proportions, drag one of the corner sizing handles.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 62
22JU1A6149
To maintain the proportions while keeping the center in the same place, hold down CTRL
while dragging one of the corner sizing handles.
Crop a picture
1. Select the picture you want to crop.
2. On the Picture toolbar, click Crop .
3. Position the cropping tool over a cropping handle and then do one of the following:
To crop one side, drag the center handle on that side inward.
To crop equally on two sides at once, hold down CTRL as you drag the center handle on either
side inward.
To crop equally on all four sides at once, hold down CTRL as you drag a corner handle
inward.
4. On the Picture toolbar, click Crop to turn off the Crop command.
Text Box:
1. On the Drawing toolbar, click Text Box .
2. Click or drag in your document where you want to insert the text box
3. You can use the options on the Drawing toolbar to enhance a text box—
for example, to change the fill color— just as you can with any other drawing object
Paragraphs: Change line spacing
Select the text you want to change.
1. On the Formatting toolbar, point to Line Spacing, and then do one of the following:
To apply a new setting, click the arrow, and then select the number that you want.
To apply the most recently used setting, click the button.
To set more precise measurements, click the arrow, click More,and then select the options you
want under Line Spacing.
Change spacing before or after paragraphs
1. Select the paragraphs in which you want to change spacing.
2. On the Format menu, click Paragraph, and then click the Indents and Spacing tab.
3. Under Spacing, enter the spacing you want in the Before or After box.
Change paragraph direction
1. Place the insertion point in the paragraph that you want to change, or select several
paragraphs.
2. Do one of the following:
To have text begin from the left, click Left-to-Right on the Formatting toolbar.
To have text begin from the right, click Right-to-Left on the Formatting toolbar.
When you change the paragraph direction, Microsoft Word leaves justified and centered text as
it is. In the case of left-aligned or right -aligned text, Word flips the alignment to its opposite.
For example, if you have a left-to-right paragraph
that is right aligned, such as the date at the top of a letter, clicking Right-to-Left results in a
right-to-left paragraph that is left aligned.
Forms:
Using Microsoft word one can create an organized and structured document with a provision to
enter the required information into it. A document of such nature is called a form.
Inserting objects:
Insert an object such as drawing word art text effects or an equation at the inserting point.
Fields:
It inserts a field at the inserting font fields are used to insert a variety of information
automatically. Select table in table select insert. In that select insert table a box containing
number of rows and columns will appear. Select six colors
and four rows and click o.k. Given the first row as date, problem repeatedstudent‗s signature
action recommended problem status and councilors sign. Insert the objects in the feedback
form and apply the text fields in the form.
Forms:
1. Design the form by sketching a layout first, or use an existing form template as a guide.
Tables, text boxes, borders, and shading are all design elements that can help you create a well-
designed form that's easy to use.
2. On t he Standard toolbar, click New Blank Document .
3. Add the text or graphics you want. For example, enter the questions youwant answered, and
list the available choices.
4. To insert a text box where users can enter their responses, click the document, and then click
Text Form Field on the Forms toolbar. If you need more space, you can insert multiple text
boxes side by side. To insert check boxes that list choices, such as Yesand No, click the
document, and then click Check Box Form Field on the Forms toolbar.
5. Save the form.
Insert line numbers:
1. On the File menu, click Page Setup, and then click the Layout tab.
2. In the Apply to box, click Whole document.
3. Click Line Numbers.
4. Select the Add line numbering check box, and then select the options you want.
Slide 3 – Address
Slide 4 – Hobbies
Slide 5 – Friends
SLIDE LAYOUT:
1. On the format menu, click slide layout.
2. On the slides tab in normal view, select the slides; you want to apply a layout too.
3. In the slide layout task pane, point to layout you and then click it.
4. A new slide can also be inserted within the task pane. Point the layout you want the slide to
have, click the arrow and then click the insert newslide.
INSERT TEXT:
1. Text can be added to layout.
2. Align text in the top, middle or bottom of a cell.
3. Align text on the right or left, or in the center of a cell.
4. Change cell margins.
5. Insert a tab in a table.
6. To make the symbol command available, in normal view, place the insertion point on the
outbox tab or in a text place holders on the slide.
7. On the insert menu, click symbol.
8. To change fonts, click a name in the font box.
FORMATTING TEXT:1. Select the text you want to format as superscript or subscript.
2. On the format menu, click font.
3. To show or hide text formatting, on the standard toolbar, click show formatting.
BULLETS AND NUMBERINGS:
1. Select the lines of text that you want to add bullets or numbering to.
2. Click bullets or numbering.
AUTOSHAPES:
1. Select the auto shape that has the text you want to position.
2. Double-click the selection rectangle of the auto shape or text box and then click the text box
tab in the format dialog box.
3. In the text anchor point box, click the position you want the text to start in.
LINES AND ARROWS:
1. In Microsoft power point, double click the chart.
2. Double click the chart item you want to change.
3. On the patterns tab, do one or both of the following.
4. To change the colors, patterns or lines, select the options you want.
5. To specify a fill effect, click fill efeect and then select the options you want on the gradient,
text patterns or picture tabs. To return to the slide, click outside the about
HYPERLINK:
1. Select the text or object that you want to represent the hyperlink.
2. Click insert hyperlink.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 65
22JU1A6149
CLIP ART:
1. On the insert menu, point to structure and then click clipart.
2. In the clipart task pane, in the search for box, type a word or phrase that describes the clip,
you want to type in all or some of the file menus of the clip.
3. In the results box, click the clip to insert it.
AUDIO VIDEO OBJECTS:
1. On the slide show menu, click setup show. Under performance check box. If your computer
has their capability, office PowerPoint will attempt to use it.
2. Animation performance will be much better with a video card that has Microsoft direct 3D.
CHART:
1. Click the slide where you want to place the embedded object.
2. On the insert menu, click chart.
3. Click a cell on the data sheet and then type the information you want
To return to the slide, click outside the chart
Format Cell:
1. Change the font and font size.
2. Change the text color.
3. Make selected text or numbers bold, italic or underlined.
4. Create a new style.
Auto fit:
1. Combine cells horizontally or vertically to make one large cell.
2. Add borders to cells.
3. Shade cells with colors.
4. Change the column width and row height
5. Change the font, font size or colors of text.
6. Align text vertically at the top, center and bottom of cell.
Formatting the text:
1. Select the text you want to format.
2. On the format menu click cells and then click number tab.
3. In the catalog box click text.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 67
22JU1A6149
PROCEDURE:
First click start button of the screen on status bar. Click on programs and then Microsoft excel.
To get a new blank work sheet go to programs and then click on excel sheet. On the file menu
click page setup and then click sheet tab click gridlines. In this way do the required changes
using format cell, make the required changes using formatting text also make the required
changes. Enter the data in the data in the worksheet consisting of week name person name and
timings 7 a.m. to 3 p.m. Make all the above changes to the text.
Calculating GPA - .Features to be covered:- Cell Referencing, Formulae in spreadsheet –
average, std. deviation, Charts, Renaming and Inserting worksheets, Hyper linking,
Count function, Sorting, Conditional formatting.
THEORY:
1. On the chart menu click chart type
2. Text direction. Click the arrow down next to the text direction button. For right to left click
right to left. For left to right reading order, click left to right. For reading order that is
consistent with the language of the first entered character, click context. For reading order that
is inconsistent with the language of the first entered character, click control.
3. In the tools menu click options and then click chart tab.
4. To show all worksheet data in the chart even if some rows and columns are hidden, clear the
plot visible cells by check box.
5. To prevent hidden rows and columns from displaying in the chart, select the plot cells only
check box.
Hyper Linking:
1. Create a worksheet: On the file menu, click new, and then click blank workbook task pane.
2. Insert a worksheet: C lick worksheet on the insert menu. Right click on sheet tab and then
click insert double click the template for the type of sheet you want.
3. Hyperlink: Using hyperlink we can insert one more sheet in the present sheet
4. Count function: Create a blank worksheet press control +c. In the worksheet select cell A
and press control +c. On the tools menu point to formula auditing and then click formula
auditing menu.
Worksheet:
1. In the file menu go to menu then a new worksheet is created.
2 To add a single worksheet, click worksheet on the Insert menu. To add multiple worksheets
hold down shift and then click the number of worksheet tasks to add in an open workbook
Sort:
1. Click a cell in the list you want to sort.
2. On the Data menu click sort.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 68
22JU1A6149
3. Under first key sort click the custom sort order you want and then click ok.
4. Click any other sorting option you want.
PROCEDURE:
Formulae in Excel:
First click on start button at the bottom of the screen on status bar. Click on programs and then
on Microsoft excel. Then open a new document. Give the main heading and subheading by
changing the size so that they look in block
letters. Enter the data. To calculate go to Insert menu in the menu bar and then click on
function and then ok. Then select the data to which you want to calculate mean. Then you get
the required answer. In same way, sample means standard
deviation lower count limit and upper count limit. Go to insert menu and click on function and
select the required operation to be done and select the data and calculate. Formulas for all the
above are given below.
Mean = (s1 + s2 + s3 + s4 + s5)/5;
Sample mean = avg (mean)
Standard deviation = (mean, sample, mean)
Sample standard deviation= avg (Standard deviation)
Lower count limit = sample mean – sample standard deviation.
Upper count limit = Sample mean + Sample Standard deviation
Hyper linking:
First click on start button of the screen on status bar. Click onprograms and then Ms-excel. To
get a new blank worksheet go to programs andthen click on excel sheet. Rename the first sheet
as student by right clicking on sheet 1 and renaming. Insert hyperlink insert and click on
hyperlink. Then go to sheet 2 and rename as CSE type in particulars of ECE right click on
sheet 3. Then go to sheet -4 rename as IT. In this type all the four sheets are created.
WORKSHEET
First click on start button at the bottom of the screen on status bar .Click on programs and then
Ms-excel. Then enter the data as given. Enter the student‗s names, Subjective wise marks, total
and avg. Then calculate the total and avg by using formula. Then go to Data menu and click
sort. Under first key sort, click custom sort order needed i.e. ascending order or alphabetical
order and then click o.k. Then the required worksheet is prepared.
Count Function
Some of the content in this topic may not be applicable to some languages.
1. To count words in selected text only, select the text you want.
If you don't select any text, Microsoft Word counts the words in the whole document.
KITS :: MARKAPUR DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING 69
22JU1A6149
2. On the Tools menu, click Word Count. Word displays counts for words, paragraphs, lines,
and characters.
3. To add or remove footnotes and endnotes from the count, select or clear they Include
footnotes and endnotes check box.
What is LaTeX?
FAST professional output – highest quality Platform, version independent (Unix, Win)
Device independent output (.dvi) Pre-set standard formats for all types of documents Freely
available Secure – never lose your files, both old and new Concentrate on content, leave the
style to LaTeX. Source code for large docs comparatively small.
LaTeX Skeleton :
\documentclass[options]{class}
\begin{document}
Hello, world!
\end{document}
Creating Document:
Creating documents with LaTeX is simple and fun. In contrast to Word, you start off with a
plain text file (.tex file) which contains LaTeX code and the actual content (i.e. text). LaTeX
uses control statements, which define how your content should be formatted. Before you can
see what the final result looks like, the LaTeX compiler will take your .tex file and compile it
into a .pdf file. A basic example document can be created with the following code:
\documentclass{article}
\begin{document}
Hello World!
\end{document}
Most commands are very straightforward to use. I personally think there will be few usecases
to manually adjust the settings of the font, because the environments usually do this job for you
automatically, I just included this for completeness.
1.Font Size:
The following commands allow you to change the font size in LaTeX. The commands work
relative to the default document font size.
2.Font Style
These commands enable you to change the font itself to different styles. Note that there are two
ways to obtain italic text, where \emph should be preferred over \textit since it's the command
to emphasize text in general. The underline command doesn't really change your font, but it's
sometimes used to highlight text anyway. Those commands enable you to use Bold, Italic,
Underline, Typewriter fonts and much more in LaTeX.
\documentclass[options]{class}
\title
\maketitle % commit title info to paper.
\begin{document}; \end{document}
\begin{abstract}; \end{abstract}
\include{filename} % call another file here.
\begin{equation}; \end{equation}
\usepackage{packagename}
\section{sectionname}
\underline{text}
\emph{text} % set text to italics
\textbf{text} % set text to bold
\bfseries % switches to bold from here.