0% found this document useful (0 votes)
20 views86 pages

Ar23 It Workshop Lab

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views86 pages

Ar23 It Workshop Lab

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 86

IT WORKSHOP

AR23- (Common to all branches of Engineering)


L T P C
0 0 2 1
Course Objectives:
1. To introduce the internal parts of a computer, peripherals, I/O ports, connecting cables
2. To demonstrate configuring the system as Dual boot both Windows and other Operating Systems Viz. Linux,
BOSS
3. To teach basic command line interface commands on Linux.
4. To teach the usage of Internet for productivity and self-paced life-long learning
5. To introduce Compression, Multimedia and Antivirus tools and Office Tools such as Word processors, Spread
sheets and Presentation tools.
Course Outcomes:
CO1: Perform Hardware troubleshooting.
CO2: Understand Hardware components and inter dependencies.
CO3: Safeguard computer systems from viruses/worms.
CO4: Document/ Presentation preparation.
CO5: Perform calculations using spreadsheets.
PC Hardware & Software Installation
Task 1: Identify the peripherals of a computer, components in a CPU and its functions. Draw the block diagram of the
CPU along with the configuration of each peripheral and submit to your instructor.
Task 2: Every student should disassemble and assemble the PC back to working condition. Lab instructors should
verify the work and follow it up with a Viva. Also students need to go through the
which shows the process of assembling a PC. A video would be given as part of the course content.
Task 3: Every student should individually install MS windows on the personal computer. Lab instructor should verify
the installation and follow it up with a Viva.
Task 4: Every student should install Linux on the computer. This computer should have windows installed. The
system should be configured as dual boot (VMWare) with both Windows and Linux. Lab instructors should verify the
installation and follow it up with a Viva
Task 5: Every student should install BOSS on the computer. The system should be configured as dual boot (VMWare)
with both Windows and BOSS. Lab instructors should verify the installation and follow it up with a Viva
Internet & World Wide Web
Task1: Orientation & Connectivity Boot Camp: Students should get connected to their Local Area Network and access
the Internet. In the process they configure the TCP/IP setting. Finally students should demonstrate, to the instructor,
1
how to access the websites and email. If there is no internet connectivity preparations need to be made by the
instructors to simulate the WWW on the LAN.
Task 2: Web Browsers, Surfing the Web: Students customize their web browsers with the LAN proxy settings,
bookmarks, search toolbars and pop up blockers. Also, plug-ins like Macromedia Flash and JRE for applets should be
configured.
Task 3: Search Engines & Netiquette: Students should know what search engines are and how to use the search
engines. A few topics would be given to the students for which they need to search on Google. This should be
demonstrated to the instructors by the student.
Task 4: Cyber Hygiene: Students would be exposed to the various threats on the internet and would be asked to
configure their computer to be safe on the internet. They need to customize their browsers to block pop ups, block
active x downloads to avoid viruses and/or worms
LaTeX and WORD
Task 1 – Word Orientation: The mentor needs to give an overview of LaTeX and Microsoft (MS) office or equivalent
(FOSS) tool word: Importance of LaTeX and MS office or equivalent (FOSS) tool Word as word Processors, Details of
the four tasks and features that would be covered in each, Using LaTeX and word – Accessing, overview of toolbars,
saving files, Using help and resources, rulers, format painter in word.
Task 2: Using LaTeX and Word to create a project certificate. Features to be covered:- Formatting Fonts in word,
Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and Colors, Inserting Header and Footer,
Using Date and Time option in both LaTeX and Word.
Task 3: Creating project abstract Features to be covered:-Formatting Styles, Inserting table, Bullets and Numbering,
Changing Text Direction, Cell alignment, Footnote, Hyperlink, Symbols, Spell Check, Track Changes.
Task 4: Creating a Newsletter: Features to be covered:- Table of Content, Newspaper columns, Images from files and
clipart, Drawing toolbar and Word Art, Formatting Images, Textboxes, Paragraphs and Mail Merge in word.
EXCEL
Excel Orientation: The mentor needs to tell the importance of MS office or equivalent (FOSS) tool Excel as a
Spreadsheet tool, give the details of the four tasks and features that would be covered in each. Using Excel –
Accessing, overview of toolbars, saving excel files, Using help and resources.
Task 1: Creating a Scheduler - Features to be covered: Gridlines, Format Cells, Summation, auto fill, Formatting Text
Task 2: Calculating GPA -Features to be covered:- Cell Referencing, Formulae in excel – average, std. deviation,
Charts, Renaming and Inserting worksheets, Hyper linking, Count function, LOOKUP/VLOOKUP
Task 3: Split cells, freeze panes, group and outline, Sorting, Boolean and logical operators, Conditional formatting
POWER POINT

2
Task 1: Students will be working on basic power point utilities and tools which help them create basic power point
presentations. PPT Orientation, Slide Layouts, Inserting Text, Word Art, Formatting Text, Bullets and Numbering,
Auto Shapes, Lines and Arrows in PowerPoint.
Task 2: Interactive presentations - Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects, Tables and Charts.
Task 3: Master Layouts (slide, template, and notes), Types of views (basic, presentation, slide slotter, notes etc), and
Inserting – Background, textures, Design Templates, Hidden slides.
Virtualization and AI Tools:
Task 1: Introduce to Docker.
Task 2: AI Tools-Gen AI, Open AI, Google Bard, MS Bing, DALL.E image generator.
Reference Books:
1. Comdex Information Technology course tool kit, Vikas Gupta, WILEY Dream tech, 2003
2. The Complete Computer upgrade and repair book, Cheryl A Schmidt, WILEY Dream tech, 2013, 3rd edition
3. Introduction to Information Technology, ITL Education Solutions limited, Pearson Education, 2012, 2nd edition
4. PC Hardware - A Handbook, Kate J. Chase, PHI (Microsoft)
5. LaTeX Companion, Leslie Lamport, PHI/Pearson.
6. IT Essentials PC Hardware and Software Companion Guide, David Anfins on and Ken Quamme. – CISCO Press,
Pearson Education, 3 rd edition
7. IT Essentials PC Hardware and Software Labs and Study Guide, Patrick Regan– CISCO Press, Pearson Education,
3 rd edition

Correlation of COs with POs & PSOs:


PO-1 PO-2 PO-3 PO-4 PO-5 PO-6 PO-7 PO-8 PO-9 PO-10 PO-11 PO-12 PSO-1 PSO-2 PSO-3

CO-1 1 - 2 2 3 - - - - - 2 - - 2 -

CO-2 1 - 2 2 3 - - - - - 2 - - 2 -

CO-3 1 - 2 2 3 - - - - - 2 - - 2 -

CO-4 1 - 2 2 3 - - - - - 2 - - 2 -

CO-5 1 - 2 2 3 - - - - - 2 - - 2 -

3
PC Hardware & Software Installation

Task 1: Identify the peripherals of a computer, components in a CPU and its functions. Draw the block diagram.

of the CPU along with the configuration of each peripheral and submit to your instructor.

Aim: Identification of peripherals of a PC, Laptop, Server and Smart Phones: Prepare a report containing the block
diagram along with the configuration of each component and its functionality, Input/ Output devices, I/O ports and
interfaces, main memory, cache memory and secondary storage technologies, digital storage basics, networking
components and speeds.

Introduction to Computer Hardware:

Hardware is the physical appearance of the devices or tools. It is what which we can touch and feel.
Computer Hardware consists of the Monitor, CPU, Keyboard, Mouse and all other devices connected to the
computer either externally or internally.

The Mother Board


There are primarily two types of motherboards, AT motherboard, and ATX motherboard. AT motherboards.
The AT and ATX motherboards differ in the form factor. Full AT is 12" wide x 13.8" deep, and Baby AT is
8.57" wide x 13.04" deep. Full-ATX is 12" wide x 9.6" deep and Mini-ATX is 11.2" wide x 8.2" deep. Other
major differences include power supply connector, and keyboard connector. AT has 5-pin large keyboard
connector, whereas ATX has 6-pin mini connector. Similarly, AT has single row two connectors +/-5V, and
+/-12V, whereas ATX motherboard has double row single connector providing +/-5V, +/-12V, and +3.3V.
The important constituent components of an ATX Motherboard are given below:

4
1. Use & keyboard
2. Usb
3. Parallel port
4. Cpu chip
5. Ram slots
6. Floppy controller
7. Ide controller
8. Pci slot
9. Isa slot
10. Cmos battery
11. Agp slot
12. Cpu slot
13. Power supply plug in

INTRODUCTION TO COMPUTER:

Computer is an electronic device which takes the input information from the input device and generates the
output information and it will be displayed on the output.
It enables arithmetic computations, data processing, information management (storage) and knowledge
reasoning in an efficient manner.
The word computer is derived from the word compute which means „to calculate‟. So a computer generally
considered to be calculating device that perform operations at very faster rates.

5
BLOCK DIAGRAM OF COMPUTER

Basically the computer system has three major components. These are
● System Unit
● Central Processing Unit (Processor)
Memory Unit. (Main memory and Auxiliary storage).
● Input Unit.
● Output Unit.

Aim: To identify the computer hardware parts

Procedure:

1. Cabinet:

a. It is used to install all


hardware devices like(mother board, SMPS,
HDD,CD
ROM, FDD) C
a

b. It has Start, Restart Button, b

Led‟s, Audio and USB Connecters are available


at front side.
Monitor :
a. Monitor of a computer is like
6
a television screen.
b. It displays text characters and
graphics in colors or in shades of grey.
c. The monitor is also called as
screen or display or CRT (cathode ray tube).
In the monitor the screen will be displayed in
pixels format.
i. 800 by 600pixels
ii. 1024 by 768
pixels . d.
3. Key Board:

a. Key board is like a type writer, which contains keys to feed the data or information into
the computer

b. Keyboards are available in two modules. These are


i. standard key board with 83-88 keys
ii. enhanced key board with 104 keys or above

7
4. Mouse:
a. Every mouse has one primary button (left button) and one secondary button (right button).

b. The primary button is used to carry out most tasks, where as secondary button is used in special
cases you can select commands and options

5. Printer:
a. A device that prints images ii. Inkjet printer
(numbers, alphabets, graphs, etc…) on paper is known as Printer.

b. We have different types of printers to take printouts. These are as follows:


i. Dot matrix printer

Speakers:
a. Speakers make your system much more delightful to use entertain you while you are working on
computer

8
iii. Laser printer

Scanner :

a. Scanner used to scan images and text

System board/Motherboard
a. This is the major part of the PC
hardware

b. It manages all transactions of


data between CPU peripherals.

c. which holds the Processor,


Random Access Memory and other parts, and
has slots for expansion cards

d. It is rectangle shape

9
Socket 478:
a. It use 478 – PIN MICROPGA
package it is used installing CPU

b. It is square type design.


10. CPU
a. The central processing unit contains
the heartof any
computer, the

processor. The processor is fitted on to a Mother


Board. The Mother Board contains various
components, which support the functioning of a
PC.

b. It is brain of the computer


It is square shape d.
f.

g.

11. North Bridge:


a. It is also called as controller
b. It converts electronic signals to
binary values and binary values to electronic
signals
c. It is near by socket 478
d. It placed middle of the mother board

12. South Bridge:


a. It is controls major components
mother board and it back bone of the input out
devices
b. It is communicates PCI slots, IDE-
10
1, IDE-2, floppy connecter, BIOS chip.
c. It near by CMOS battery
13. CMOS Battery:
a. Computer is using a coin
shape battery
b. It generates the clock signal
and it manage system continues time

14. Primary & Secondary(IDE-1 & IDE-2) :


a. It is also called as IDE-1, IDE-2.
b. It used to connecting Hard Disk
Dive, CD ROM, DVD ROM.

c.

15. Input & Output ports :


a. IO ports are used to connecting IO device such as key boards, mouse, monitor,
printer, scanner, speakers etc...

16. AGP Slot & AGP Card :


a. AGP Slot is used install the AGP card.
b. AGP back view same as VGA port(15-female pins) and used to connecting the monitors
c. This slot is above PCI slots and its color is Black or Brown

11
17. CI Slots &PCI(Expansion) Cards :
a. PCI slots are used to install the PCI cards such as

LAN (Ethernet) Card---🡪Back view Ethernet port

i. Sound Card-🡪 Back view Audio pin connectors)

12
ii. TV Tuner(Internal) Card -🡪 Dish Pin connecter

b. PCI Slots are white or yellow color


c. PCI Card has Single gap only

18. BIOS Chip :


a. BIOS controls how the operating
system and hardware wok together
b. BIOS identification is BIOS
name is available on chip or mother board

13
19. ATX Power connecter:
a. ATX power connecter is used to
connect ATX power plug( This is from SMPS)
b. ATX Power connecter has 20/24
pins available.
c. It is white color and it has ATX
name is available on Mother Board
d.
e.

20. Floppy connecter:


a. Floppy connecter is used to
connect Floppy Disk Drive.
b. This is beside of ATX power
connecter and Name FDD is available on the
mother board.

21. Bus Cables or Data cables :


a. A Bus is a collection of wires
through which data is transmitted from one
device to another device cables are two types
b. IDE cable : it used to connect
HDD, CD ROM, DVD ROM
c. FDD cable: it used to connect
FDD (braking or manufacture defecting)

22. Hard Disk Drive:


b. The operating system, software
a. The hard disk drive is the main, and titles and most other files are stored in the hard disk
usually largest, data storage device in a computer drive
c. Identifications is the panel name is
Hard Disk dive

14
23. CD ROM Drive & CD-Writer:
a. CD-Rom (Compact
Disk Read only Memory) Drive is a
device that reads the information
from Compact Disks (CD).
b. CD-Writer is used to
write the data into Compact Disks.
c. Identification is the
panel name is CD Writer
24. Floppy Disk Drive:
a. The floppy disk drive
is used to read the information
stored in floppy disks.
b. Floppy disks also
c. Identification is
smaller than CD writer.
25. SMPS:
a. SMPS is used to
supply the power to Mother Board
HDD,CD ROM, FDD
b. In SMPS holds a
Identification is the rectangular box shape and panel name is switching mode

2
7
Task 2: Every student should disassemble and assemble the PC back to working condition. Lab
instructors should verify the work and follow it up with a Viva. Also students need to go through the
video which shows the process of assembling a PC. A video would be given as part of the course content.

OBJECTIVES
1. plan and prepare for assembling a computer
2. identify the Occupational Health and Safety policies and procedures related to the system requirements.
3. identify different tools, equipment and testing devices needed to carry out the assembly work.4. identify different materials
necessary to complete the work in accordance with established procedures and checked against systems
requirements.5. perform the assembly process or procedures of a computer hardware.6. check and analyze the BIOS for
configuration to ensure that the system is assembled properly.7. perform the disassembly process or procedures of a computer
hardware.
3.2 INTRODUCTION
This instruction will teach you how to make a personal desktop computer. There are some steps for you to follow. But first,
you will have to prepare the following:
TOOLS
Phillips Screwdriver Standard Screwdriver Mechanical Pliers Longnose PliersAnti-static Wrist Strap or Wrist Band

Flash light/Head mounted light Eye Protector Glasses


MATERIALS
Motherboard-
the main board in the computer also called the system board.
Central processing Unit (CPU)

(Please refer to image 1.1 on page 10)
Random access memory (RAM)

Used to temporarily hold data and programs while the CPU processes both.
Hard drive

The main secondary storage device of a PC.


Power supply

a box inside the computer case that supplies power to the motherboard and other installed devices.
SATA and/or IDE Cables-
connects Hard drive or CD-ROM drive to the motherboard.
Power Cable-
Provides connection between power source and the system unit.
Case-
houses the hardware components of a computer.
00:0303:44

Monitor
(please refer to Table1.2 on page 10)
Keyboard
(please refer to Table1.12 on page 9)
Mouse
(please referto Table 1.12 onpage 9)
EQUIPMENT
Working Table with rubber matUninterruptible PowerSupply (UPS) -
Rechargeablepower supply but only lasts for30 minutes.
3.3 PREPARATION
Proper preparation is the key to a successful build. Before you begin, make sure:

you have all the tools you will need,

secure a clear, well-lit workspace,

gather all the components you’ll be using,


verify that everything that is supposed to be there is actually present, and
read the manuals if it’s a new unit.

3.4 SAFETY PRECAUTIONS


Safety precautions are important for your own security.Please read the following
Occupational Health and Safety
policies and procedures thoroughly.1. Do not work alone so that there's someone who cantake care of you in case of
emergency.2. Take away any liquid near your working area to avoidgetting electrocuted or accidentally damaging
computerparts.3. Be careful with tools that may cause short circuit.4. Always ground or discharge yourself before
touching any part of the computer.5. Do not use excessive force if things don't quite slip into place.6. Hold the components
on the edges and do not touch the Integrated Circuit (IC)
parts.7. Always wear personal protective equipment (PPE).8. Contingency measures should be recognized.
3.5 PROCEDURES ON ASSEMBLING COMPUTER HARDWARE
STEPS AND PROCEDURE PICTURE REPRESENTATIONS
Step 1:
Prepare the Motherboard then install the CPU on it.

Step 2: Connect the CPU cooler to the Motherboard. Be sure to apply thermal paste to the CPU before installing the cooling
fan.
Step 3: Attach the RAM (memory)modules on its corresponding slots in the motherboard.
Step 4: Open the case and mount the power supply.
Step 5: Suitably position the Motherboard and install it in the case.
Step 6: Mount the Hard disk and connect it to the power supply and the motherboard.
Step 7: Connect the SATA (or IDE) connectors to the drives and to the Motherboard.
Step 8: Connect the case switches to the motherboard.
Step 9: Connect the 20 or 24-pin ATX connector and the 4-pin power supply control connector to the motherboard.
Step 10: Cover the case and stand it upready for connecting it to the main peripherals.
Step 11: Connect the VGA cable of the monitor to the VGA port of the motherboard located at the back of the system unit.
Step 12: Connect the keyboard and mouse cord to the back of the system unit.
Step 13: Connect one power cord to the system unit and one to the monitor.
Step 14: Plug-in the power cords to the UPS.
Step 15:Plug-in the UPS to the power source outlet.
Step 16: Switch on the UPS then turn on the computer.
Step 17: Check the BIOS for configuration. Press
F1, F2 or Delete
keys upon booting to enter the BIOS Setup then check the contents. If the Hard Drive is detected, then the computer is
properly assembled.
3.6 PROCEDURES ON DISASSEMBLING COMPUTER HARDWARE
Follow the

Safety
Precautions” then perform the “Steps on Assembling Procedures” in reverse order, starting from “Step 16”.
3.7 HOW TO CHANGE COMPUTER BIOS SETTINGS
Knowing how to access and change settings in your BIOS can save you a lot of headaches when trouble shooting a computer.
The method varies for every computer, but this guide will show you how to access and change your BIOS settings.
METHOD 1 OF 3: Enter the BIOS
1.
Boot the computer.
As the
manufacturer’s logo appears, press
the designated setup button to enter the BIOS. The key varies by manufacturer. Typical setups keys areF2, F10, F12, and Del.
he key will be displayed on the screen with the manufacturer’s logo.

2.Rapidly strike the setup key.


Newer computers can boot very fast. Once you figure out your setup key, rapidly press it when booting the computer. This
will give you a greater chance of entering the BIOS. You may have torepeat the process several times if you have difficulty
with the timing.
NOTE: If you are running Windows 8and cannot access the BIOS, see the Entering Windows 8 Boot Options section.
3. Wait for your BIOS to load.
After successfully hitting the setup key, the BIOS will load. This should only take a few moments. When the loading is
complete, you will be taken to the BIOS settings menu.

METHOD 2 OF 3: Adjust Settings


1. Navigate the BIOS.
Everymanufacturer has a different layout fortheir BIOS menu, but most sharesome common settings. These includepower
settings, date and time settings,boot order, and more.
NOTE: BIOS menus do not supportmouse input. You will need tonavigate the menus using yourkeyboard. Most BIOS allow
you tomove through menus with the arrowkeys, while some use specific keys forspecific menus, or + and

keys fornavigation.
2. Change your settings carefully.
When adjusting settings in your BIOS,be sure that you certain what thesettings will affect. Changing settingsincorrectly can
lead to system orhardware failure.
3. Change the boot order.
If you wantto change what device to boot from,enter the Boot menu. From here, youcan designate which device thecomputer
will attempt to boot fromfirst. This is useful for booting from adisc to install or repair an operatingsystem.

4. Create a BIOS password.


You can create a password that will lock the computer from booting unless the correct password is entered.
5. Change your date and time.
Your
BIOS’s clock will dictate your
Windows clock. If the battery has been recently replaced, your clock willmost likely have been reset. You can adjust your
clock settings from theBIOS.
6. Change fan speeds and system voltages.
These options are for advanced users only. In this menu, you can overclock your CPU, potentially giving more performance.
This should be performed only if you
are comfortable with your computer’s
hardware. Check out our [[Overclock a PC | guide on overclocking] for more information.

7. Save and exit.


When you are finishedadjusting your settings, you will needto save and exit in order for yourchanges to take effect. When
yousave and restart, your computer willreboot with the new settings.

METHOD 3 OF 3: Enter Windows 8 Boot Options


1. Understand what is new withWindows 8 booting.
Windows 8often boots too quickly to manuallyenter the BIOS menu via the setupkey. If you are running a solid statedrive,
you may have as little as .2seconds to successfully press thesetup key. Windows 8 allow you toenter a new Advanced Startup
menuthat replaces the functions of theBIOS.
NOTE: This method only works if youhave a UEFI-enabled motherboard. Theseare relatively recent releases, so oldersystems
running Windows 8 will have toenter BIOS the old manual way.
2. Open Windows Settings.
You can dothis by pressing the Windows key + Cto open the sidebar. Click the Settingsbutton in the sidebar. Once theSettings
menu is open, select theGeneral tab.
3. Restart with Advanced startup.
Under the Advanced startup section inthe General settings, click RestartNow. This will reboot the computerinto the Advanced
Startup menu.
NOTE: Alternatively, you can hold downthe Shift key while clicking the Restartbutton in the Shut Down menu.
4. Adjust your settings.
To access the BIOS settings, click the Troubleshoot
button. This will open the “Advanced options” menu. From this menu, you
can adjust your BIOS settings byclicking UEFI Firmware Settings. If
you don’t see this option, you do not
have a UEFI-enabled motherboard.
5. Change the boot device.
If like to boot from a disc or another drive, return to the main Advanced Startup menu. Click the
“Use a device” button. This will allow
you to select which device you would like to boot from, such as your DVD drive or a flash drive.
3.7.1 Tips

A useful task is to check the boot order. If you have the OS on the hard drive, make sure that the hard drive is thefirst in the
boot order. This can save a few seconds off boot time.

Keep a copy of your motherboard's documentation (a.k.a. User Manual) with you in case you can't get in or out ofthe BIOS,
or you need help changing something.

Backup your BIOS settings by recording them on paper once your PC is running and before you make anychanges to them.
3.7.2 Warnings

Don't change anything if you don't know what you're doing.

If you are going to flash the BIOS after, do NOT attempt this. If you have already changed settings, you mustreset your BIOS.
Instructions on how to reset your BIOS can be found here:
Reset Your BIOS
Task 3: Every student should individually install MS windows on the personal computer. Lab instructor
should verify the installation and follow it up with a Viva.
Aim: Operating system installation –Install operating system like windows, Linux along
with necessary device Drivers
Operating System:
The operating system is the most important program that runs on a computer. Every
general-purpose computer must have an operating system to run other programs. Operating
systems perform basic tasks, such as recognizing input from the keyboard, sending output to
the display screen, keeping track of files and directories on the disk, and controlling peripheral
devices such as disk drives and printers.
It is an interface between the user and the system where the system consists of
hardware and software components
Difference between Dos & MS Windows:
DOS Windows
Definition DOS (Disk Operating System) Windows is a range of graphical interface
are simple text command operating systems that are developed and
operating systems that were sold by Microsoft.
popular from 1981 to 1995.
GUI DOS used a text based Windows uses graphics, images and text.
interface that required text and
codes to operate
Input System Text is used as the basic input Uses a mouse for all operating system
system commands. input.
Multitasking DOS is unable to run multiple Windows is a multitasking operating
processes at the same time. system; allowing more than one process to
work simultaneously.
Storage Size The highest amount of storage Window systems offer storage space up to 2
size available is 2GB. terabyte.
Demands on Booting up system is DOS is Booting up Windows is more demanding
System Resources less demanding on the CPU. on the CPU.
Registry and Swap DOS uses a directory system, Windows uses a different registry compared
Files where all the files are to DOS, making it difficult to manually
contained within a particular delete programs. An excessive number of
directory or a subdirectory. temporary files and file fragments can
cause the system to slow down or crash.
Current Uses More ideally used for Used worldwide as the most popular
prototyping, testing, and operating system.
making automated systems.
Price DOS is free Windows is costly
Steps for installing a MS Windows XP:
Windows XP (codename Whistler, also known as Windows NT 5.1) is the latest desktop
version of the Microsoft Windows operating system. It was made publicly available on
October 25, 2001.
Two editions of Windows XP are most commonly available:
 Windows XP Home Edition which is targeted at home users
 Windows XP Professional which has additional features such as dual-processor
support and the ability to join a domain, a grouping of centrally managed
Windows computers. The letters "XP" originate from the word "Experience".
Prepare the Boot Sequence
In order to boot from CD/DVD-ROM you need to set the boot sequence. Look for the
boot sequence under your BIOS setup and make sure that the first boot device is set to
CD/DVD-ROM. You can then perform the following steps to install Windows XP:
Step 1: Start your PC and place your Windows-XP CD in your CD/DVD-ROM drive. Your
PC should automatically detect the CD and you will get a message saying "Press any key to
boot from CD". Soon as computer starts booting from the CD your will get the following
screen:

Once you press any key in order to boot from CD, you will get the following screen.

Step 2: At this stage it will ask you to press F6 if you want to install a third party RAID
or SCSI driver. If you are using an IDE Hard Drive then you do not need to press F6. If
you are using a SCSI or SATA Hard drive then you must press F6 otherwise Windows
will not detect your Hard Drive during the installation. Please make sure you have the
Raid drivers on a floppy disk. Normally the drivers are supplied on a CD which you can
copy to a floppy disk ready to be installed. If you are not sure how to do this then please
read your motherboard manuals for more information.
Step 3: You will then get a Windows XP Professional Setup screen. You have the option
to do a new Windows install, Repair previous install or quit. Since we are doing a new
install we just press Enter to continue.
Step 4:You will be presented with the End User Licensing Agreement. Press F8 to
accept and continue

Step 5: Setup will search for existing Windows installations. You will see the next ―repair or
install fresh copy‖ screen appears only if a Windows installation currently exists on your
machine. If you‘re installing on a brand-new hard drive, skip to Step 5.

Step 6: In order to install a Fresh Copy, Press ESC. You will be given a list of partitions
available on your hard drive. Use the cursor keys to select an item not labeled as
unpartitioned space.
Press the D key to delete the selected partition. If you receive the following
prompt, press Enter to continue. Otherwise, proceed to the next step.

Step 7: Press the L key to confirm the deletion.

Step 8: Repeat steps 5-7 until all space is labeled as unpartitioned.


Step 9: Use the cursor keys to select an unpartitioned space. Press the C key to create a
new partition.

Step 10: When prompted for the size of the partition, press Enter to accept the default
recommendation.

Step 11: Repeat steps 9 and 10 for each unpartitioned space with a size greater than 8
MB.
Step 12: Upon returning to the partition list, select the item labeled as ―C: Partition1
[New (Raw)]‖ and press Enter.

Step 13: At the following prompt, select the option to Format the partition using the
NTFS file system. Press Enter to continue.

Step 14: The setup program will now proceed to format the drive. This may take a
while depending on the size of the drive.

Step 15: Once the format procedure has completed, files should begin to be
automatically copied from the installation CD.
Step 16: Once all necessary files have been copied, the system will be automatically
restarted. You may now remove the CD. If you choose to leave the CD in the drive, do
not press any key when prompted to press any key to boot from CD.

Step 17: The Windows setup program will now complete the installation. The content
and appearance of the remaining screens may differ based on the exact version and
distribution of Windows XP you are installing. From this point, you will follow the on
screen prompts.
Step 18: The default settings on this screen should be correct for the U.S. Click Next. If
you live outside the US, you will probably need to modify the default settings.

Step 19:Enter your name and, optionally, your organization. Click Next.

Step 20:Enter the Windows XP product key and click Next. The Key is located on the
back of the CD folder in the Retail versions, and on a holographic label with the OEM
versions purchased with a piece of hardware. Write this key down and secure it in a safe
place in case the original is misplaced or destroyed through natural causes.
Step 21:Enter a name for the computer. This may be anything you like. This should be a
unique name for the computer, especially if it is to be connected to a network. In
Windows XP Professional you will be prompted to enter an administrator password.
Do not leave any of your system passwords blank!
For security purposes, it is recommended you choose a password that contains mixed case
letters, numbers and symbols, and is not based on a dictionary word. Here are some
examples: 1.dR9f?a9e 2. b7$Pruc?

Step 22:Set the date, time, and time zone. Click Next.

Step 23:Setup will scan for a network. If you receive the following prompt, select
Typical Settings and click Next.
Step 24: If you are prompted for workgroup or domain settings, for home you will
choose your workgroup, if a network is already established and you intend to
connect to it, use the existing workgroup name, otherwise, leave the default
entries and click Next.

Step 25: Setup will continue and will eventually reboot. If you have left the CD in
the drive, do not press any key when prompted to press any key to boot from CD.
Step 26: Before the Welcome screen, if your graphic adapters are properly
configured, Windows will present you with a message that it adjusts the screen
resolution to a pre- defined optimized standard. You will be able to change this
later on. Or else, If you do, click OK. The screen may flicker for a moment and ask
you whether you can see the image. If you can, click Yes.

Step 27: When you see the welcome screen, click Next to continue.

Step 28: You will be asked about Automatic Updates. Choose 'help protect my
PC by turning on automatic updates now' and press next.
Step 29: After the Automatic Updates configuration, you will be asked about
Internet Connections. Will this computer connect to the internet directly, or
through a network?If you are connected to a router or LAN then choose: 'Yes, this
computer will connect through a local area network or home network'. If you have
dial up modem choose: 'No, this computer will connect directly to the internet'.
Then click Next. Or else you can click on Skip.

Step 30: You will now be prompted to register your copy of Windows. Since we have
not connected to the network yet, select No and click Next. If prompted to activate
Windows, choose the appropriate option to skip this step as well. Windows will prompt
you to do this later if it is required.

Step 31: Add users that will sign on to this computer and click next.

Step 32: You will get a Thank you screen to confirm setup is complete. Click finish.
Step 33: After a few seconds, you will see the Windows desktop. Basically, the
installation itself is finished. Congratulations!

VMware provides cloud computing infrastructure and platform virtualization software and
services. VMware is a publicly-traded company that provides mainly virtualization software.
Virtualization means creating a virtual version of a device or any resource like an operating
system. There are various products that VMware offers. Each one has a different kind of features
and offerings.
VMWARE Course Bundle contains - 5 Courses
VMware’s product line has the following main categories.
• Desktop virtualization software

• Server virtualization software

• Cloud management software

Each category mentioned above has multiple products which VMware offers. One of the common
categories from above which is used by individuals is Desktop virtualization.
Installation of the VMware software – VMware Workstation. VMware Workstation falls into the
category of Desktop Virtualization.
Installation of software product by VMware.
VMware Workstation
VMware Workstation was the first product launched by VMware. It is the most popular software
that offers running multiple instances of operating systems on a single physical personal
computer. It enables users to set up and run various virtual machines on a single physical machine
and use them simultaneously with the actual physical machine.
Steps to Install VMware
The detailed steps for installing VMware Workstation.
Step 1. To download and install the VMware product, visit the official website of VMware.
https://www.vmware.com/in.html
Hover on the Downloads tab; here, you will find various products.
The idea of products,
Fusion is an application for running multiple applications on Mac.
Workstation Player is for running a second OS on Windows or Linux PC for free for personal use.
The present installation is VMware Workstation Pro for installation demo purposes. VMware
Workstation is available with the latest version as 15.
Step 2. Click on Free Product Trials & Demo >> Workstation Pro. You will be redirected to the
download page. (Similarly, you can select any product you want to install.)

Click on Download Now according to your Operating System. The present choice is Workstation
15 Pro for Windows.
While downloading, ensure you have a proper internet connection, as the file may be large.
Step 3. Once the download is complete, run the .exe to install VMware Workstation. A popup will
appear.
Step 4. After Initialization gets completed, Click on Next.

Step 5. Accept the terms and click Next


Step 6. On the next screen, It will ask for additional features; it is not mandatory to check this box.
Click on Next.

Step 7. On the next screen, some checkboxes are populated; check them as per your
eequirement. Click on Next.

Step 8. At this step, VMware Workstation is ready to install. Click on Install.


Step 9. At this step, you can see installation taking place. The installation will take some time;
wait for it to install properly.

AIM: To install BOSS on the computer and configure the system for dual booting with
Windows and BOSS.
Precautions:
1. Back up any existing data or documents on the hard disk where you plan to install.
2. Gather information about your computer and any needed documentation, before
starting the installation.
3. Create partition-table space for BOSS on your hard disk.
4. Set up the first boot drive to DVD drive (through CMOS setup) and restart your
system.
5. Insert the BOSS GNU/Linux DVD into the drive
6. Boot the installation system.
7. Select installation language.
8. Activate the ethernet network connection, if available.
Installation:
To boot your computer from disc:
1. Switch on the computer.
2. Insert the disc into the DVD drive.
3. A screen appears to ask for a booting option.,
a) Start BOSS Live
b) Install BOSS-Graphical
c) Install BOSS-Text Mode
d) Advance options
e) Help

1. Booting through “Start BOSS Live” will take you a tour around BOSS virtually. Using
this Live Boot you can check out the BOSS desktop and its applications and once you are
satisfied with BOSS., you can come back and choose for “Install BOSS-Graphical” or “Install
BOSS-Text Mode”.
The installation program displays a list of languages which are supported by BOSS GNU/Linux.
Select the Language as “English” / “Tamil” / “Hindi” (or any other). Click “Continue” to
proceed.
Next the country selection screen appears. Select the appropriate country from the list. Click
“Continue” and proceed further
The installation program displays a list of the keyboard layouts supported by BOSS GNU/Linux.
Highlight the correct layout on the list, and select “Next”.
Configuring Network Automatically If you have a DHCP Server, then the Network will be
automatically configured. There is no need 15 for the user to bother about the network
configuration. Configuring Network Manually If that is not the case, you need to manually
configure the network. When the DHCP server is not available, the following screen appears
which means you need to configure manually

Click on “Continue” to proceed towards Manual Network configuration


Select “Configure Network Manually” and set the IP address and configure the network.

Disk Partitioning
Setup If you are new to Linux, you may want to use the automatic partitioning method. If you
are a more experienced Linux user, use the manual partitioning method for more control over
your system configuration, or select and modify the automatically defined partitions.

The screen below shows the way you would like to partition. These are the following ways in
which you can partition the hard disk
a) Automatic partitioning
b) LVM partitioning
c) Manual partitioning.
Automatic Partitioning
By selecting automatic partitioning, you will not have to use partitioning tools to assign
mount points, create partitions or allocate space for your installation. You will be provided
with two options in automatic partition - 
Format entire Hard Disk 
Use Existing Hard disk Space
LVM partitioning
LVM is a tool for logical volume management which includes allocating disks, resizing logical
volumes. The Logical Volume Manager (LVM) enables flexible distribution of hard disk space
over several file systems. As it is difficult to modify partitions on a running system, LVM was
developed. It provides a virtual pool (Volume Group — VG for short) of
memory space from which logical volumes (LV) can be generated if needed. The operating
system accesses these instead of the physical partitions. The screen shots are as follows:
Manual Partitioning
Creating a new partition To partition manually , the following screenshots will help you
setting up the partition.
1. A screen with the name “Partition disks” will be displayed. In that click “Manual” and
then click “Continue
After clicking “Manual” a screen will be displayed which contains an overview of your
currently configured partitions. Click on free space and then click “Continue”.

Create new partition for BOSS GNU/Linux by double clicking “Create a new partition”
A screen appears showing the maximum size that can be assigned for this partition.
In this screen change the size to your required size. The minimum should be 5.0 GB. 26 Then click
“Continue”.
Select the type for the new partition.

Click “Done setting up the partition” and then click “Continue”


After selecting the partition for the “/”, you need to select a partition for the “swap” space. If you
are already having Linux installed on your system then you will be having a swap space in your
system. If so no need of another swap space. The swap should be double the RAM size. If there
is no swap space then create a new swap space. The screen shots are as follows:

Create a swap area of 1 GB from free space.

Click “Create a new partition” and then click “Continue”.


Specify the partition size for swap area as 1.0 GB.
Select the type for the new partition.
Specify whether the partition should be at the beginning or at the End.
Change default file system ext4 to swap by double clicking “Ext4 journaling file system” in the
screen shown below
Double click “swap area”
Creation of swap area is completed. Click “Done setting up the partition” and then click 31
“Continue”

Write the changes to the disk by clicking “Yes”.


Above all steps are same for deleting or resizing the partition but choosing the option may vary
according to your requirement.
Create User Account
Next step is to create a user account and setting password for the user. You can use this user
account for logging into BOSS GNU/Linux. And this user will be used for auto login to BOSS
GNU/Linux after certain time period.

Setup user name


Setup user account password

GRUBINSTALLATION

Once the installation process gets completed, the system restarts automatically
Internet & Connectivity:

TASK 1 : Orientation & Connectivity Boot Camp: Students should get connected to their
Local Area Network and access the Internet. In the process they configure the TCP/IP setting.
Finally students should demonstrate how to access the websites and email.

AIM: To learn Local Area Network and access the Internet. In the process they configure the
TCP/IP setting. Finally students should demonstrate, to the instructor, how to access the websites
and email

Software Requirement: Local Area Network to access the Internet


Hardware Requirement: Personal computer
THEORY: The internet is a worldwide, publicly owned network of interconnected computer
networks.
LOCAL AREA NETWORK: LANs are privately owned networks within a single building or
campus of up to few kilometers in size.
WIDE AREA NETWORK: A WAN is a network that connects computers across a large
geographic area such as a city or country.
TCP/IP(Transmission Control Protocol/Internet Protocol): Collection of methods used to
connect servers on the internet and to exchange data.
HTML (Hyper Text Markup Language): The coding used to control the look of documents on
the web.
HTTP (HyperText Transfer Protocol): Part of a url that identifies the location as one that uses
HTML IP (Internet Protocol): A format for contents and addresses of packets of information
sent over the internet.
IP ADDRESS: An identifier for a computer or device on a TCP/IP network SEARCH ENGINE:
A program that searches documents located on the Internet for keywords or phrases entered by a
person browsing the net.
Internet Connection requirements:
TCP/IP protocol
Client Software
ISP Account
Means of communication to the net:
telephone Modem
Ethernet
ISDN(Integrated Services Digital Network)
DSL(Digital Subscriber Line)
Satellite

PROCEDURE:
1. Go to start>control Panel

2. open Network Connections


3. Click create a new connection and then click next

4. The new connection wizard window opens , click next to continue


5. Choose one of the options in the next dialog box

6. Choose one of the three options in the next dialog box

If you do not have an internet account click choose from a list of ISPs and then click next
If you have an account click Set up my connection manually
If you have a CD from the ISP click use the CD I got from an ISP and then click next
7. Follow the next steps as per the option you select
TEST DATA: No Test data for this Experiment
ERROR: No Errors for this Experiment
RESULT: In this way we can learn surfing the web
TASK 2 : Web Browsers, Surfing the Web: Students customize their web browsers
with the LAN proxy settings, bookmarks, search toolbars and pop up blockers.
Also, plug-ins like Macromedia Flash and JRE for applets should be Configured.
AIM: To learn to surf the web
Software Requirement: Local Area Network to access the Internet
Hardware Requirement: Personal computer
Theory :
When we need any kind of information most of the time we get help from the Internet, and we
get information. The Internet provides us with useful information easily; we use mobile phones,
computers, and tablets. We searched for a lot of things in our daily life, so we get information
from all over the world, but we can not get information by just only getting connected to the
Internet. We need a platform where we can search for our questions. The platform that provides
such kinds of services is called a web browser, without a web browser the internet will not be
able to provide information.
What is a Web Browser?
The web browser is an application software to explore www (World Wide Web).
It provides an interface between the server and the client and requests to
the server for web documents and services. It works as a compiler to render
HTML which is used to design a webpage. Whenever we search for anything on the internet, the
browser loads a web page written in HTML, including text, links, images, and other items such
as stylesheet and JavaScript functions.
Examples of web browsers : Google Chrome, Microsoft Edge, Mozilla Firefox, and Safari etc.

What is LAN ?

LAN stands for Local Area Network. It is a group of interconnected computing devices within a
limited area such as a residence, school, laboratory, university campus, or office building. By
contrast, a wide area network (WAN) not only covers a larger geographic distance, but also
generally involves leased telecommunication circuits.
LANs are typically used to share resources such as files, printers, and Internet access. They can
also be used to play multiplayer games and stream multimedia content.
LANs are typically created using Ethernet cables, which are connected to network switches. The
switches then forward data packets between the devices on the LAN.
LANs can be further divided into two types:
● Peer-to-peer LANs: In a peer-to-peer LAN, all of the devices on the LAN are equal.
There is no central server, and all of the devices can share resources directly with each
other.
● Client-server LANs: In a client-server LAN, there is a central server that provides
resources to the other devices on the LAN. The client devices can access the server's
resources, but they cannot share resources directly with each other.
LANs are a valuable tool for businesses and organizations of all sizes. They can help to improve
productivity, collaboration, and communication.
Here are some of the benefits of using a LAN:
● Shared resources: LANs allow users to share files, printers, and other resources. This
can save money and improve efficiency.
● Improved communication: LANs can be used to send and receive emails, instant
messages, and other forms of communication. This can help to improve
collaboration and productivity.
● Remote access: LANs can be used to access files and resources from anywhere in the
world. This can be helpful for businesses that have employees who work remotely.
● Security: LANs can be used to implement security measures such as firewalls and
intrusion detection systems. This can help to protect your data from unauthorized access.
If you are considering implementing a LAN in your business or organization, there are a few
things to keep in mind:
● The size of your network: The size of your network will determine the type of
equipment you need and the cost of the implementation.
● Your budget: The cost of implementing a LAN can vary depending on the size and
complexity of your network.
● Your security needs: The level of security you need will determine the type of security
measures you implement.
Once you have considered these factors, you can begin to plan your LAN implementation.
What is a proxy, and why would you need it ?

Setting up a proxy in your web browser adds an extra layer of privacy and security
when you go online.
To configure Chrome proxy settings, complete the following:

1. Launch Chrome, select the three dots, and click Settings.

2. Go to System.
3. Click Open your computer’s proxy settings.

As Chrome doesn’t have in-app proxy server settings, you’ll be redirected to your operating
system’s native proxy settings.
4. Once redirected, add your proxy details.
On Windows, enable the "use a proxy server" option and specify the address and port

5. Configure Proxy settings.


Windows has three ways to set up a proxy:
1. Automatically 2. By setting up a script 3. Manually.
Automatic proxy setup

Ahile in Proxy settings, turn on Automatically detect settings.

Enabling the automatic settings detection


When you enable this option, Windows will automatically detect authorized proxy server settings
using the Web Proxy Auto-Discovery Protocol (WPAD). Organizations authorize (impose) such
settings on computers connected to their internal networks to restrict access and protect digital
assets.
If you use a personal computer or want to add a proxy manually, turn this setting off.
2. Setting up a script
While in Proxy settings, enable Use setup script and enter an address.

Enabling the script setup


After clicking Save, the proxy configuration will be imported from a specified list.
3. Manual proxy setup
To configure a proxy manually, enable Use a proxy server and specify the following details:
Residential Proxies
Proxy type: HTTP, HTTPS, or SOCKS5
Proxy host: pr.oxylabs.io
Proxy port: 7777
You can also use country-specific entries. For example, if you enter fr-pr.oxylabs.io under IP
address and 40000 under Port, you’ll acquire a French exit node.

Create, view & edit bookmarks

What is a Bookmark ?
1. A saved link to a website or web page
In computing, a bookmark, also known as a favorite or a saved link, is a saved web address that is
stored in a user's web browser. Bookmarks are used to save web pages that the user wants to revisit
later. When a user bookmarks a web page, the browser creates a record of the page's URL and title.
The user can then access the bookmarked page by clicking on the bookmark in the browser's
toolbar or bookmarks menu.
2. Bookmarks are a convenient way to keep track of your favorite websites and web
pages. They can also be used to organize your bookmarks into folders. For example,
you could create a folder for your favorite news websites, another folder for your
favorite shopping sites, and so on.
3. Most web browsers allow you to import and export bookmarks. This can be useful if you
are switching to a new web browser or if you want to backup your bookmarks.

Let Chrome remember your favorite and frequently visited websites.


When you sync to Chrome, you get saved items, like bookmarks and passwords, on all your
devices.
Add a bookmark
● On your computer, open Chrome.
● Go to the site you want to visit again in the future.
● To the right of the address bar, click Star Bookmark on this page.
Find a bookmark
Important: The easiest way to open a bookmark is to click on it in the Bookmarks bar. To turn the
bookmarks bar on or off,click More Bookmarks Show bookmarks bar.
If you don’t have the bookmarks bar turned on or your bookmark isn't there, there are 3 ways to
find your bookmarks.
From the address bar
● On your computer, open Chrome.
● In the address bar, enter @bookmarks.
● Press tab or space. You can also click Search bookmarks Search in the suggestions.
● Enter keywords for the bookmark you want.

● Select your bookmark from the list.


From the menu
● On your computer, open Chrome.
● At the top right, click More More and then Bookmarks.
● Click a bookmark.
From the navigation panel
● At the top right of your browser, click the Side panel .
● Click the Down arrow Down arrow and then Bookmarks.
Edit a bookmark
1. On your computer, open Chrome.
2. At the top right, click More Bookmarks Bookmark Manager.
3. To the right of a bookmark, click the Down arrow Edit.
Delete a bookmark

Important: After you delete a bookmark, you can't get it back.

1. On your computer, open Chrome.

2. At the top right, click More Bookmarks Bookmark Manager.

3. To the right of a bookmark, click the Down arrow Delete.

Organize your bookmarks


Move your bookmarks into a folder
1. On your computer, open Chrome.
2. At the top right, click More Bookmarks Bookmark Manager.
3. Drag a bookmark up or down, or drag a bookmark into a folder on the left. You can
also copy and paste your bookmarks in the order you want.
If you use the bookmarks bar, you can drag your bookmarks into the order you want.
Put your bookmarks in folders
1. On your computer, open Chrome.
2. At the top right, click More Bookmarks Bookmark Manager.
3. At the top right, click More Add a new folder.
If you use the bookmarks bar, you can add a folder by right-clicking the bookmarks bar. Click
Add Folder.
Alphabetize your bookmarks
1. On your computer, open Chrome.
2. At the top right, click More Bookmarks Bookmark Manager.
3. At the top right, click More Sort by name.
Customizing your web browser's search toolbar
Customizing your web browser's search toolbar can help you quickly access your favorite search
engines and make searching the web more efficient.
Here are some steps on how to customize your search toolbar in Google Chrome web browser :
1. Open Chrome and click the three dots in the top right corner of the window.
Select Settings from the Menu
2. Scroll down to the "Search engine" section.

3. Click on the "Manage search engines" button.

4. In the "Other search engines" section, click the three dots next to the search engine you
want to add to the toolbar and select "Add as shortcut."
5. The search engine will now be added to the toolbar.
Customizing web browser with the pop up blockers :
A pop-up blocker is a software program or web browser extension that prevents unwanted pop-up
windows from appearing on your screen. Pop-up windows are small windows that open on top
of your current web page, often without your consent. They are often used for advertising, but
they can also be used to spread malware or phishing scams.
Customizing your web browser's pop-up blocker can help you control which websites are
allowed to open new windows or tabs.
Here are some steps on how to customize your pop-up blocker in Google Chrome web browser:
1. Open Chrome and click the three dots in the top right corner of the window.
2. Select Settings from the Menu
3. Click on the "Privacy and security" icon in the left-hand panel.
4. Click Site Settings in the Security and Privacy section.

5. Scroll down and select Pop-ups and redirects.


6. Choose what you want to do:
(i) Allow all pop-ups
Select Sites can send pop-ups and use redirects

(ii)Allow pop-ups only from specific sites

1. Click Add next to Allowed to send pop-ups and use redirects.

2. Type https://[*.]wix.com and click Add


7. The website will now be added to the exceptions list.
Customizing the web browsers with plug-ins like Macromedia Flash
In computing, a plug-in (or plugin, add-in, addin, add-on, or addon) is a software component that
adds a specific feature to an existing computer program. When a program supports plug-ins, it
enables
customization. Plugins are widely used in web browsers, as well as in other types of software,
such as media players and content management systems.
How plugins work:
Plugins work by communicating with the host program through an interface called an
application programming interface (API). The API allows the plugin to access the host
program's data and functionality, and to provide its own functionality to the user.
Benefits of plugins:
Customization: Plugins allow users to customize their software to meet their specific needs.
Extensibility: Plugins allow software developers to extend the functionality of their software
without having to modify the core code.
Innovation: Plugins encourage innovation by allowing developers to create new and innovative
features for software.
Examples of plugins:
Web browser plugins: Flash, Shockwave, QuickTime, Silverlight
Media player plugins: Winamp plugins, VLC plugins
Content management system plugins: WordPress plugins, Drupal plugins, Joomla plugins
Security considerations:
Plugins can pose a security risk if they are not properly vetted. It is important to only install
plugins from trusted sources, and to keep your plugins up to date.
Here are the steps on how to customize web browsers with plug-ins like Macromedia Flash:
1. Open Chrome and click on the three dots in the top right corner of the window.
2. Select "Settings" from the menu.
3. Click on the "Extensions" tab.

4. In the "Search Chrome Web Store" field, type "Macromedia Flash".


5. Click on the "Macromedia Flash Player" extension.

6. Click on the "Add to Chrome" button.


7. The Macromedia Flash Player extension will now be installed and enabled in Chrome.
Customizing your web browser with plug-ins like the JRE for Applets
Customizing your web browser with plug-ins like the Java Runtime Environment (JRE) for
Applets allows you to run Java applets, which are interactive programs that can be
embedded in web pages. Google Chrome:
Chrome has dropped support for NPAPI plugins, including Java, since version 45. As a result,
the JRE plugin is not available for Chrome. However, there are alternative ways to run Java
applets in Chrome. One option is to use a browser extension like RunApplets. Another option is
to use a cloud-based Java applet service like JSFiddle or AppletPanel.
Microsoft Edge:
Similar to Chrome, Edge has also dropped support for NPAPI plugins, including Java. As a
result, the JRE plugin is not available for Edge. However, there are alternative ways to run Java
applets in Edge. One option is to use a browser extension like RunApplets. Another option is to
use a cloud-based Java applet service like JSFiddle or AppletPanel.
Mozilla Firefox:
Firefox still supports NPAPI plugins, including Java. To install the JRE plugin for Firefox,
follow these steps:
1. Download the JRE from the Oracle website.
To download the JRE from the Oracle website, follow these steps:
1. Go to the Oracle Java SE Downloads page:
https://www.oracle.com/java/technologies/dowloads
/
2. Click on Java archive

3. Choose the appropriate version of the JRE for your operating system. For example, if you
are using Windows 10, you would choose the "Java SE 19" version.

(i) the page of Java archive


(ii)Scroll down Until you find “JAVA SE 19” version in the page

4. Click on the "Download" button for the appropriate version.

(i) the page of JAVA SE 19 Archive Downloads

(ii)Scroll down until you find appropriate version and click on it


5. Accept the Oracle Technology Network License Agreement. Choose the download method.
can either download the JRE directly to your computer or save it to a file for later installation.
6. Once the download is complete, open the file and follow the installation instructions.

2. Once the JRE is installed, restart Firefox.


3. To verify that the JRE plugin is installed, go to the Firefox Add-ons Manager and make sure
that the "Java (TM) Platform plugin" is enabled.
Task 3: Search Engines & Netiquette: Students should know what search engines are and
how to use the search engines. Usage of search engines like Google, Yahoo, ask.com and
others should be demonstrated by students.
AIM: To know what search engines are and how to use the search engines.
Software Requirement: Local Area Network to access the Internet Hardware
Requirement: Personal computer
A search engine is an information retrieval system designed to help users find information on the
World Wide Web. Search engines work by crawling the web and indexing the content of
websites. When a user enters a search query, the search engine uses its index to find websites that
match the query. The search results are then presented to the user in a ranked list, with the most
relevant websites at the top of the list.
Search engines are software programs that help users find information on the World Wide Web.
They work by crawling the web and indexing the content of websites. When a user enters a search
query, the search engine uses its index to find websites that match the query. The search results
are then presented to the user in a ranked list, with the most relevant websites at the top of the list.
Here are some of the key functions of a search engine:
Crawling: The first step in the search engine process is crawling. Crawlers, also known as spiders
or bots, are software programs that visit websites and download their content. The crawlers then
follow links on the pages they download to discover new pages. This process is repeated until the
crawlers have discovered and downloaded all of the pages on the web.

Indexing: Once the crawlers have downloaded all of the pages on the web, the search engine
indexes the content of the pages. The index is a massive database of all of the words and phrases
on the web. When a user enters a search query, the search engine uses the index to find websites
that contain the query terms.
Ranking: The final step in the search engine process is ranking. The search engine uses a complex
algorithm to rank the websites that match the user's query. The algorithm takes into account a
number of factors, such as the relevance of the website's content to the query, the quality of the
website's content, and the popularity of the website. The websites that are most relevant to the
user's query are ranked at the top of the list.

Search engines play an essential role in helping users find information on the web. They are
constantly evolving and improving, and they are an indispensable tool for anyone who uses the
internet.
Additional functions of search engines

In addition to the basic functions of crawling, indexing, and ranking, search engines also offer a
number of other features that can help users find information. These features include:

● Search operators: Search operators are special symbols or phrases that can be used to
refine a search query. For example, the AND operator can be used to find websites that
contain two or more words, while the OR operator can be used to find websites that
contain one or the other of two words.
● Advanced search: Advanced search pages allow users to filter their search results by a
number of criteria, such as date, language, and website type.
● Related searches: Related searches are suggestions for other searches that users may be
interested in. These suggestions are based on the user's current search query.
● Spelling suggestions: Spelling suggestions are corrections for misspellings that the
search engine has detected in the user's query.

These features can help users to find the information they need more quickly and easily.
Netiquette
Netiquette is a set of rules for polite and respectful behavior online. It is important to follow
netiquette to avoid offending others and to create a positive online environment.
Here are some of the basic rules of netiquette:
● Be respectful of others. Treat others online as you would treat them in person. Avoid
using offensive language or making personal attacks.
● Be honest and truthful. Do not lie or misrepresent yourself online.
● Respect privacy. Do not share personal information about others without their permission.
● Be mindful of your online presence. What you post online can have a lasting impact, so
be careful about what you share.
● Be responsible for your actions. Take responsibility for what you say and do online.

How to use Search Engine


Using a search engine is a simple but effective way to find information on the internet. Here are
the basic steps on how to use a search engine:
1. Open a web browser and go to the search engine's website. There are many popular
search engines, such as Google, Bing, and Yahoo!. Simply type the search engine's name
into the address bar and press Enter.
2. Enter your search query into the search bar. The search bar is typically located at the
top of the search engine's homepage. Type in the words or phrases you are looking
for and press Enter.
3. Review the search results. The search engine will return a list of websites that match your
search query. The results will be ranked in order of relevance, with the most relevant
websites at the top of the list.
4. Click on a result to open the website. To learn more about a particular website, click
on its link in the search results. This will open the website in a new tab or window.
5. Refine your search if necessary. If you are not satisfied with the search results, you can
refine your search by using search operators or advanced search options.
Here are some additional tips for using search engines effectively:
● Use specific keywords: When entering your search query, use specific keywords that are
relevant to what you are looking for. For example, instead of searching for "information
on cats," try searching for "breed information for domestic cats."
● Use quotation marks: If you want to search for an exact phrase, put the phrase in
quotation marks. For example, searching for "best cat breeds for apartments" will
only return results that contain that exact phrase.
● Use Boolean operators: Boolean operators can be used to combine search terms in a
more sophisticated way. For example, searching for "cats AND apartments" will only
return results that contain both of those words.
● Use advanced search options: Most search engines offer advanced search options that
allow you to filter your results by date, language, website type, and other criteria.
How to Use Google Search Engine
1. Open a web browser and go to the Google website. You can type "google.com" into the
address bar and press Enter.
Google Search Engine Home Page Enter your search query into the search bar. The search bar is
located at e top of the Google homepage. Type in the words or phrases you are looking for and
press Enter.

2. Review the search results. Google will return a list of websites that match your search
query. The results will be ranked in order of relevance, with the most relevant websites at
the top of the list. You can also use the filters on the left side of the page to narrow down
your results by date, language, and other criteria.

3. Click on a result to open the website. To learn more about a particular website, click
on its link in the search results. This will open the website in a new tab or window.
4. Refine your search if necessary. If you are not satisfied with the search results, you can
refine your search by using Google's advanced search options. These options allow you to
filter your results by date, language, website type, and other criteria.

How to Use Yahoo Search Engine


1. Open a web browser and go to Yahoo Search. You can type "yahoo.com" into the address bar and
press Enter.
2. Enter your search query into the search bar. The search bar is located at the top of the
Yahoo Search homepage. Type in the words or phrases you are looking for and press
Enter.
3.

Yahoo Search engine


homepage

4. Review the search results. Yahoo Search will return a list of websites that match your search
query. The results will be ranked in order of relevance, with the most relevant websites at the top
of the list. You can also use the filters on the left side of the page to narrow down your results by
date, language, and other criteria.
5. Click on a result to open the website. To learn more about a particular website, click on its
link in the search results. This will open the website in a new tab or window.
6. Refine your search if necessary. If you are not satisfied with the search results, you can
refine your search by using Yahoo Search's advanced search options. These options allow you
to filter your results by date, language, website type, and other criteria.
How to Use Ask.Com Search Engine

1. Open a web browser and go to Ask.com. You can type "ask.com" into the address bar and
press Enter.
2. Enter your search query into the search bar. The search bar is located at the top of
the Ask.com homepage. Type in the words or phrases you are looking for and
press Enter.
Ask.com search bar

3. Review the search results. Ask.com will return a list of websites that match your search
query. The results will be ranked in order of relevance, with the most relevant websites at
the top of the list. You can also use the filters on the left side of the page to narrow down
your results by date, language, and other criteria.
4. Click on a result to open the website. To learn more about a particular website, click
on its link in the search results. This will open the website in a new tab or window.

Ask.com search results page

5. Refine your search if necessary. If you are not satisfied with the search results, you can
refine your search by using Ask.com's advanced search options. These options can be
found by clicking on the "Advanced Search" link located below the search bar.

Task 4: Cyber Hygiene: Students would be exposed to the various threats on the
internet and would be asked to configure their computer to be safe on the
internet. They need to customize their browsers to block pop ups, block active x
downloads to avoid viruses and/or worms

PURPOSE: To learn various threats on the internet and configure the


computer to be safe on the internet.

THEORY:
Antivirus:
Antivirus software is a program that either comes installed on your
computer or that you purchase and install yourself. It protects your
computer against most viruses, worms, Trojan horses and other unwanted
invaders that can make your computer sick.
Firewall:
A firewall is a special software or hardware designed to protect a private
computer network from unauthorized access. A firewall is a set of related
programs located at a network gateway server which protects the
resources of the private network from users from other networks.

PROCEDURE:Installing Symantec antivirus for Windows:

 Insert Symantec antivirus CD into your CD drive

 Double click on the Symantec-setup.exe

 The installer will open

 Click next to proceed

 License agreement will open. Click I accept the terms of the


license agreement and then click next.

 Follow the instruction on the screen to complete the installation.

Get Computer Updates:

 Click start settingscontrol panel,

 Click Automatic Updates icon to open Automatic Updates dialog box


 Check the box Keep my computer up to date

 Choose a setting

 Click OK

Block Pop ups:

 In the Internet explorer open toolspop-up blocker

 Click on Turn on

Pop- up blocker Windows

Firewall:

 Goto Startcontrol panelNetwork and


Connectionswindows firewall

 In the general tab check the On(recommended) box


 If you don’t want any exceptions check on Don’t allow exceptions
box

PURPOSE: Test to simulate all the tasks related to Internet Security

THEORY:

 Identify and explain the components required to establish a network

 Establish internet connection and create a new email id , send


mail and attachment file to other mail account

 Define search engine. List the various search engines. Navigate through
any of the search engine like Google and explore its features.

 Download a file from the internet. Write the various steps


involved in downloading

 What is Antivirus software? List a few popular anti virus kits available.
 Explain the functionality of the firewall quoting a few examples

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy