Ar23 It Workshop Lab
Ar23 It Workshop Lab
2
Task 1: Students will be working on basic power point utilities and tools which help them create basic power point
presentations. PPT Orientation, Slide Layouts, Inserting Text, Word Art, Formatting Text, Bullets and Numbering,
Auto Shapes, Lines and Arrows in PowerPoint.
Task 2: Interactive presentations - Hyperlinks, Inserting –Images, Clip Art, Audio, Video, Objects, Tables and Charts.
Task 3: Master Layouts (slide, template, and notes), Types of views (basic, presentation, slide slotter, notes etc), and
Inserting – Background, textures, Design Templates, Hidden slides.
Virtualization and AI Tools:
Task 1: Introduce to Docker.
Task 2: AI Tools-Gen AI, Open AI, Google Bard, MS Bing, DALL.E image generator.
Reference Books:
1. Comdex Information Technology course tool kit, Vikas Gupta, WILEY Dream tech, 2003
2. The Complete Computer upgrade and repair book, Cheryl A Schmidt, WILEY Dream tech, 2013, 3rd edition
3. Introduction to Information Technology, ITL Education Solutions limited, Pearson Education, 2012, 2nd edition
4. PC Hardware - A Handbook, Kate J. Chase, PHI (Microsoft)
5. LaTeX Companion, Leslie Lamport, PHI/Pearson.
6. IT Essentials PC Hardware and Software Companion Guide, David Anfins on and Ken Quamme. – CISCO Press,
Pearson Education, 3 rd edition
7. IT Essentials PC Hardware and Software Labs and Study Guide, Patrick Regan– CISCO Press, Pearson Education,
3 rd edition
CO-1 1 - 2 2 3 - - - - - 2 - - 2 -
CO-2 1 - 2 2 3 - - - - - 2 - - 2 -
CO-3 1 - 2 2 3 - - - - - 2 - - 2 -
CO-4 1 - 2 2 3 - - - - - 2 - - 2 -
CO-5 1 - 2 2 3 - - - - - 2 - - 2 -
3
PC Hardware & Software Installation
Task 1: Identify the peripherals of a computer, components in a CPU and its functions. Draw the block diagram.
of the CPU along with the configuration of each peripheral and submit to your instructor.
Aim: Identification of peripherals of a PC, Laptop, Server and Smart Phones: Prepare a report containing the block
diagram along with the configuration of each component and its functionality, Input/ Output devices, I/O ports and
interfaces, main memory, cache memory and secondary storage technologies, digital storage basics, networking
components and speeds.
Hardware is the physical appearance of the devices or tools. It is what which we can touch and feel.
Computer Hardware consists of the Monitor, CPU, Keyboard, Mouse and all other devices connected to the
computer either externally or internally.
4
1. Use & keyboard
2. Usb
3. Parallel port
4. Cpu chip
5. Ram slots
6. Floppy controller
7. Ide controller
8. Pci slot
9. Isa slot
10. Cmos battery
11. Agp slot
12. Cpu slot
13. Power supply plug in
INTRODUCTION TO COMPUTER:
Computer is an electronic device which takes the input information from the input device and generates the
output information and it will be displayed on the output.
It enables arithmetic computations, data processing, information management (storage) and knowledge
reasoning in an efficient manner.
The word computer is derived from the word compute which means „to calculate‟. So a computer generally
considered to be calculating device that perform operations at very faster rates.
5
BLOCK DIAGRAM OF COMPUTER
Basically the computer system has three major components. These are
● System Unit
● Central Processing Unit (Processor)
Memory Unit. (Main memory and Auxiliary storage).
● Input Unit.
● Output Unit.
Procedure:
1. Cabinet:
a. Key board is like a type writer, which contains keys to feed the data or information into
the computer
7
4. Mouse:
a. Every mouse has one primary button (left button) and one secondary button (right button).
b. The primary button is used to carry out most tasks, where as secondary button is used in special
cases you can select commands and options
5. Printer:
a. A device that prints images ii. Inkjet printer
(numbers, alphabets, graphs, etc…) on paper is known as Printer.
Speakers:
a. Speakers make your system much more delightful to use entertain you while you are working on
computer
8
iii. Laser printer
Scanner :
System board/Motherboard
a. This is the major part of the PC
hardware
d. It is rectangle shape
9
Socket 478:
a. It use 478 – PIN MICROPGA
package it is used installing CPU
g.
c.
11
17. CI Slots &PCI(Expansion) Cards :
a. PCI slots are used to install the PCI cards such as
12
ii. TV Tuner(Internal) Card -🡪 Dish Pin connecter
13
19. ATX Power connecter:
a. ATX power connecter is used to
connect ATX power plug( This is from SMPS)
b. ATX Power connecter has 20/24
pins available.
c. It is white color and it has ATX
name is available on Mother Board
d.
e.
14
23. CD ROM Drive & CD-Writer:
a. CD-Rom (Compact
Disk Read only Memory) Drive is a
device that reads the information
from Compact Disks (CD).
b. CD-Writer is used to
write the data into Compact Disks.
c. Identification is the
panel name is CD Writer
24. Floppy Disk Drive:
a. The floppy disk drive
is used to read the information
stored in floppy disks.
b. Floppy disks also
c. Identification is
smaller than CD writer.
25. SMPS:
a. SMPS is used to
supply the power to Mother Board
HDD,CD ROM, FDD
b. In SMPS holds a
Identification is the rectangular box shape and panel name is switching mode
2
7
Task 2: Every student should disassemble and assemble the PC back to working condition. Lab
instructors should verify the work and follow it up with a Viva. Also students need to go through the
video which shows the process of assembling a PC. A video would be given as part of the course content.
OBJECTIVES
1. plan and prepare for assembling a computer
2. identify the Occupational Health and Safety policies and procedures related to the system requirements.
3. identify different tools, equipment and testing devices needed to carry out the assembly work.4. identify different materials
necessary to complete the work in accordance with established procedures and checked against systems
requirements.5. perform the assembly process or procedures of a computer hardware.6. check and analyze the BIOS for
configuration to ensure that the system is assembled properly.7. perform the disassembly process or procedures of a computer
hardware.
3.2 INTRODUCTION
This instruction will teach you how to make a personal desktop computer. There are some steps for you to follow. But first,
you will have to prepare the following:
TOOLS
Phillips Screwdriver Standard Screwdriver Mechanical Pliers Longnose PliersAnti-static Wrist Strap or Wrist Band
Monitor
(please refer to Table1.2 on page 10)
Keyboard
(please refer to Table1.12 on page 9)
Mouse
(please referto Table 1.12 onpage 9)
EQUIPMENT
Working Table with rubber matUninterruptible PowerSupply (UPS) -
Rechargeablepower supply but only lasts for30 minutes.
3.3 PREPARATION
Proper preparation is the key to a successful build. Before you begin, make sure:
you have all the tools you will need,
secure a clear, well-lit workspace,
verify that everything that is supposed to be there is actually present, and
read the manuals if it’s a new unit.
Step 2: Connect the CPU cooler to the Motherboard. Be sure to apply thermal paste to the CPU before installing the cooling
fan.
Step 3: Attach the RAM (memory)modules on its corresponding slots in the motherboard.
Step 4: Open the case and mount the power supply.
Step 5: Suitably position the Motherboard and install it in the case.
Step 6: Mount the Hard disk and connect it to the power supply and the motherboard.
Step 7: Connect the SATA (or IDE) connectors to the drives and to the Motherboard.
Step 8: Connect the case switches to the motherboard.
Step 9: Connect the 20 or 24-pin ATX connector and the 4-pin power supply control connector to the motherboard.
Step 10: Cover the case and stand it upready for connecting it to the main peripherals.
Step 11: Connect the VGA cable of the monitor to the VGA port of the motherboard located at the back of the system unit.
Step 12: Connect the keyboard and mouse cord to the back of the system unit.
Step 13: Connect one power cord to the system unit and one to the monitor.
Step 14: Plug-in the power cords to the UPS.
Step 15:Plug-in the UPS to the power source outlet.
Step 16: Switch on the UPS then turn on the computer.
Step 17: Check the BIOS for configuration. Press
F1, F2 or Delete
keys upon booting to enter the BIOS Setup then check the contents. If the Hard Drive is detected, then the computer is
properly assembled.
3.6 PROCEDURES ON DISASSEMBLING COMPUTER HARDWARE
Follow the
“
Safety
Precautions” then perform the “Steps on Assembling Procedures” in reverse order, starting from “Step 16”.
3.7 HOW TO CHANGE COMPUTER BIOS SETTINGS
Knowing how to access and change settings in your BIOS can save you a lot of headaches when trouble shooting a computer.
The method varies for every computer, but this guide will show you how to access and change your BIOS settings.
METHOD 1 OF 3: Enter the BIOS
1.
Boot the computer.
As the
manufacturer’s logo appears, press
the designated setup button to enter the BIOS. The key varies by manufacturer. Typical setups keys areF2, F10, F12, and Del.
he key will be displayed on the screen with the manufacturer’s logo.
Once you press any key in order to boot from CD, you will get the following screen.
Step 2: At this stage it will ask you to press F6 if you want to install a third party RAID
or SCSI driver. If you are using an IDE Hard Drive then you do not need to press F6. If
you are using a SCSI or SATA Hard drive then you must press F6 otherwise Windows
will not detect your Hard Drive during the installation. Please make sure you have the
Raid drivers on a floppy disk. Normally the drivers are supplied on a CD which you can
copy to a floppy disk ready to be installed. If you are not sure how to do this then please
read your motherboard manuals for more information.
Step 3: You will then get a Windows XP Professional Setup screen. You have the option
to do a new Windows install, Repair previous install or quit. Since we are doing a new
install we just press Enter to continue.
Step 4:You will be presented with the End User Licensing Agreement. Press F8 to
accept and continue
Step 5: Setup will search for existing Windows installations. You will see the next ―repair or
install fresh copy‖ screen appears only if a Windows installation currently exists on your
machine. If you‘re installing on a brand-new hard drive, skip to Step 5.
Step 6: In order to install a Fresh Copy, Press ESC. You will be given a list of partitions
available on your hard drive. Use the cursor keys to select an item not labeled as
unpartitioned space.
Press the D key to delete the selected partition. If you receive the following
prompt, press Enter to continue. Otherwise, proceed to the next step.
Step 10: When prompted for the size of the partition, press Enter to accept the default
recommendation.
Step 11: Repeat steps 9 and 10 for each unpartitioned space with a size greater than 8
MB.
Step 12: Upon returning to the partition list, select the item labeled as ―C: Partition1
[New (Raw)]‖ and press Enter.
Step 13: At the following prompt, select the option to Format the partition using the
NTFS file system. Press Enter to continue.
Step 14: The setup program will now proceed to format the drive. This may take a
while depending on the size of the drive.
Step 15: Once the format procedure has completed, files should begin to be
automatically copied from the installation CD.
Step 16: Once all necessary files have been copied, the system will be automatically
restarted. You may now remove the CD. If you choose to leave the CD in the drive, do
not press any key when prompted to press any key to boot from CD.
Step 17: The Windows setup program will now complete the installation. The content
and appearance of the remaining screens may differ based on the exact version and
distribution of Windows XP you are installing. From this point, you will follow the on
screen prompts.
Step 18: The default settings on this screen should be correct for the U.S. Click Next. If
you live outside the US, you will probably need to modify the default settings.
Step 19:Enter your name and, optionally, your organization. Click Next.
Step 20:Enter the Windows XP product key and click Next. The Key is located on the
back of the CD folder in the Retail versions, and on a holographic label with the OEM
versions purchased with a piece of hardware. Write this key down and secure it in a safe
place in case the original is misplaced or destroyed through natural causes.
Step 21:Enter a name for the computer. This may be anything you like. This should be a
unique name for the computer, especially if it is to be connected to a network. In
Windows XP Professional you will be prompted to enter an administrator password.
Do not leave any of your system passwords blank!
For security purposes, it is recommended you choose a password that contains mixed case
letters, numbers and symbols, and is not based on a dictionary word. Here are some
examples: 1.dR9f?a9e 2. b7$Pruc?
Step 22:Set the date, time, and time zone. Click Next.
Step 23:Setup will scan for a network. If you receive the following prompt, select
Typical Settings and click Next.
Step 24: If you are prompted for workgroup or domain settings, for home you will
choose your workgroup, if a network is already established and you intend to
connect to it, use the existing workgroup name, otherwise, leave the default
entries and click Next.
Step 25: Setup will continue and will eventually reboot. If you have left the CD in
the drive, do not press any key when prompted to press any key to boot from CD.
Step 26: Before the Welcome screen, if your graphic adapters are properly
configured, Windows will present you with a message that it adjusts the screen
resolution to a pre- defined optimized standard. You will be able to change this
later on. Or else, If you do, click OK. The screen may flicker for a moment and ask
you whether you can see the image. If you can, click Yes.
Step 27: When you see the welcome screen, click Next to continue.
Step 28: You will be asked about Automatic Updates. Choose 'help protect my
PC by turning on automatic updates now' and press next.
Step 29: After the Automatic Updates configuration, you will be asked about
Internet Connections. Will this computer connect to the internet directly, or
through a network?If you are connected to a router or LAN then choose: 'Yes, this
computer will connect through a local area network or home network'. If you have
dial up modem choose: 'No, this computer will connect directly to the internet'.
Then click Next. Or else you can click on Skip.
Step 30: You will now be prompted to register your copy of Windows. Since we have
not connected to the network yet, select No and click Next. If prompted to activate
Windows, choose the appropriate option to skip this step as well. Windows will prompt
you to do this later if it is required.
Step 31: Add users that will sign on to this computer and click next.
Step 32: You will get a Thank you screen to confirm setup is complete. Click finish.
Step 33: After a few seconds, you will see the Windows desktop. Basically, the
installation itself is finished. Congratulations!
VMware provides cloud computing infrastructure and platform virtualization software and
services. VMware is a publicly-traded company that provides mainly virtualization software.
Virtualization means creating a virtual version of a device or any resource like an operating
system. There are various products that VMware offers. Each one has a different kind of features
and offerings.
VMWARE Course Bundle contains - 5 Courses
VMware’s product line has the following main categories.
• Desktop virtualization software
Each category mentioned above has multiple products which VMware offers. One of the common
categories from above which is used by individuals is Desktop virtualization.
Installation of the VMware software – VMware Workstation. VMware Workstation falls into the
category of Desktop Virtualization.
Installation of software product by VMware.
VMware Workstation
VMware Workstation was the first product launched by VMware. It is the most popular software
that offers running multiple instances of operating systems on a single physical personal
computer. It enables users to set up and run various virtual machines on a single physical machine
and use them simultaneously with the actual physical machine.
Steps to Install VMware
The detailed steps for installing VMware Workstation.
Step 1. To download and install the VMware product, visit the official website of VMware.
https://www.vmware.com/in.html
Hover on the Downloads tab; here, you will find various products.
The idea of products,
Fusion is an application for running multiple applications on Mac.
Workstation Player is for running a second OS on Windows or Linux PC for free for personal use.
The present installation is VMware Workstation Pro for installation demo purposes. VMware
Workstation is available with the latest version as 15.
Step 2. Click on Free Product Trials & Demo >> Workstation Pro. You will be redirected to the
download page. (Similarly, you can select any product you want to install.)
Click on Download Now according to your Operating System. The present choice is Workstation
15 Pro for Windows.
While downloading, ensure you have a proper internet connection, as the file may be large.
Step 3. Once the download is complete, run the .exe to install VMware Workstation. A popup will
appear.
Step 4. After Initialization gets completed, Click on Next.
Step 7. On the next screen, some checkboxes are populated; check them as per your
eequirement. Click on Next.
AIM: To install BOSS on the computer and configure the system for dual booting with
Windows and BOSS.
Precautions:
1. Back up any existing data or documents on the hard disk where you plan to install.
2. Gather information about your computer and any needed documentation, before
starting the installation.
3. Create partition-table space for BOSS on your hard disk.
4. Set up the first boot drive to DVD drive (through CMOS setup) and restart your
system.
5. Insert the BOSS GNU/Linux DVD into the drive
6. Boot the installation system.
7. Select installation language.
8. Activate the ethernet network connection, if available.
Installation:
To boot your computer from disc:
1. Switch on the computer.
2. Insert the disc into the DVD drive.
3. A screen appears to ask for a booting option.,
a) Start BOSS Live
b) Install BOSS-Graphical
c) Install BOSS-Text Mode
d) Advance options
e) Help
1. Booting through “Start BOSS Live” will take you a tour around BOSS virtually. Using
this Live Boot you can check out the BOSS desktop and its applications and once you are
satisfied with BOSS., you can come back and choose for “Install BOSS-Graphical” or “Install
BOSS-Text Mode”.
The installation program displays a list of languages which are supported by BOSS GNU/Linux.
Select the Language as “English” / “Tamil” / “Hindi” (or any other). Click “Continue” to
proceed.
Next the country selection screen appears. Select the appropriate country from the list. Click
“Continue” and proceed further
The installation program displays a list of the keyboard layouts supported by BOSS GNU/Linux.
Highlight the correct layout on the list, and select “Next”.
Configuring Network Automatically If you have a DHCP Server, then the Network will be
automatically configured. There is no need 15 for the user to bother about the network
configuration. Configuring Network Manually If that is not the case, you need to manually
configure the network. When the DHCP server is not available, the following screen appears
which means you need to configure manually
Disk Partitioning
Setup If you are new to Linux, you may want to use the automatic partitioning method. If you
are a more experienced Linux user, use the manual partitioning method for more control over
your system configuration, or select and modify the automatically defined partitions.
The screen below shows the way you would like to partition. These are the following ways in
which you can partition the hard disk
a) Automatic partitioning
b) LVM partitioning
c) Manual partitioning.
Automatic Partitioning
By selecting automatic partitioning, you will not have to use partitioning tools to assign
mount points, create partitions or allocate space for your installation. You will be provided
with two options in automatic partition -
Format entire Hard Disk
Use Existing Hard disk Space
LVM partitioning
LVM is a tool for logical volume management which includes allocating disks, resizing logical
volumes. The Logical Volume Manager (LVM) enables flexible distribution of hard disk space
over several file systems. As it is difficult to modify partitions on a running system, LVM was
developed. It provides a virtual pool (Volume Group — VG for short) of
memory space from which logical volumes (LV) can be generated if needed. The operating
system accesses these instead of the physical partitions. The screen shots are as follows:
Manual Partitioning
Creating a new partition To partition manually , the following screenshots will help you
setting up the partition.
1. A screen with the name “Partition disks” will be displayed. In that click “Manual” and
then click “Continue
After clicking “Manual” a screen will be displayed which contains an overview of your
currently configured partitions. Click on free space and then click “Continue”.
Create new partition for BOSS GNU/Linux by double clicking “Create a new partition”
A screen appears showing the maximum size that can be assigned for this partition.
In this screen change the size to your required size. The minimum should be 5.0 GB. 26 Then click
“Continue”.
Select the type for the new partition.
GRUBINSTALLATION
Once the installation process gets completed, the system restarts automatically
Internet & Connectivity:
TASK 1 : Orientation & Connectivity Boot Camp: Students should get connected to their
Local Area Network and access the Internet. In the process they configure the TCP/IP setting.
Finally students should demonstrate how to access the websites and email.
AIM: To learn Local Area Network and access the Internet. In the process they configure the
TCP/IP setting. Finally students should demonstrate, to the instructor, how to access the websites
and email
PROCEDURE:
1. Go to start>control Panel
If you do not have an internet account click choose from a list of ISPs and then click next
If you have an account click Set up my connection manually
If you have a CD from the ISP click use the CD I got from an ISP and then click next
7. Follow the next steps as per the option you select
TEST DATA: No Test data for this Experiment
ERROR: No Errors for this Experiment
RESULT: In this way we can learn surfing the web
TASK 2 : Web Browsers, Surfing the Web: Students customize their web browsers
with the LAN proxy settings, bookmarks, search toolbars and pop up blockers.
Also, plug-ins like Macromedia Flash and JRE for applets should be Configured.
AIM: To learn to surf the web
Software Requirement: Local Area Network to access the Internet
Hardware Requirement: Personal computer
Theory :
When we need any kind of information most of the time we get help from the Internet, and we
get information. The Internet provides us with useful information easily; we use mobile phones,
computers, and tablets. We searched for a lot of things in our daily life, so we get information
from all over the world, but we can not get information by just only getting connected to the
Internet. We need a platform where we can search for our questions. The platform that provides
such kinds of services is called a web browser, without a web browser the internet will not be
able to provide information.
What is a Web Browser?
The web browser is an application software to explore www (World Wide Web).
It provides an interface between the server and the client and requests to
the server for web documents and services. It works as a compiler to render
HTML which is used to design a webpage. Whenever we search for anything on the internet, the
browser loads a web page written in HTML, including text, links, images, and other items such
as stylesheet and JavaScript functions.
Examples of web browsers : Google Chrome, Microsoft Edge, Mozilla Firefox, and Safari etc.
What is LAN ?
LAN stands for Local Area Network. It is a group of interconnected computing devices within a
limited area such as a residence, school, laboratory, university campus, or office building. By
contrast, a wide area network (WAN) not only covers a larger geographic distance, but also
generally involves leased telecommunication circuits.
LANs are typically used to share resources such as files, printers, and Internet access. They can
also be used to play multiplayer games and stream multimedia content.
LANs are typically created using Ethernet cables, which are connected to network switches. The
switches then forward data packets between the devices on the LAN.
LANs can be further divided into two types:
● Peer-to-peer LANs: In a peer-to-peer LAN, all of the devices on the LAN are equal.
There is no central server, and all of the devices can share resources directly with each
other.
● Client-server LANs: In a client-server LAN, there is a central server that provides
resources to the other devices on the LAN. The client devices can access the server's
resources, but they cannot share resources directly with each other.
LANs are a valuable tool for businesses and organizations of all sizes. They can help to improve
productivity, collaboration, and communication.
Here are some of the benefits of using a LAN:
● Shared resources: LANs allow users to share files, printers, and other resources. This
can save money and improve efficiency.
● Improved communication: LANs can be used to send and receive emails, instant
messages, and other forms of communication. This can help to improve
collaboration and productivity.
● Remote access: LANs can be used to access files and resources from anywhere in the
world. This can be helpful for businesses that have employees who work remotely.
● Security: LANs can be used to implement security measures such as firewalls and
intrusion detection systems. This can help to protect your data from unauthorized access.
If you are considering implementing a LAN in your business or organization, there are a few
things to keep in mind:
● The size of your network: The size of your network will determine the type of
equipment you need and the cost of the implementation.
● Your budget: The cost of implementing a LAN can vary depending on the size and
complexity of your network.
● Your security needs: The level of security you need will determine the type of security
measures you implement.
Once you have considered these factors, you can begin to plan your LAN implementation.
What is a proxy, and why would you need it ?
Setting up a proxy in your web browser adds an extra layer of privacy and security
when you go online.
To configure Chrome proxy settings, complete the following:
2. Go to System.
3. Click Open your computer’s proxy settings.
As Chrome doesn’t have in-app proxy server settings, you’ll be redirected to your operating
system’s native proxy settings.
4. Once redirected, add your proxy details.
On Windows, enable the "use a proxy server" option and specify the address and port
What is a Bookmark ?
1. A saved link to a website or web page
In computing, a bookmark, also known as a favorite or a saved link, is a saved web address that is
stored in a user's web browser. Bookmarks are used to save web pages that the user wants to revisit
later. When a user bookmarks a web page, the browser creates a record of the page's URL and title.
The user can then access the bookmarked page by clicking on the bookmark in the browser's
toolbar or bookmarks menu.
2. Bookmarks are a convenient way to keep track of your favorite websites and web
pages. They can also be used to organize your bookmarks into folders. For example,
you could create a folder for your favorite news websites, another folder for your
favorite shopping sites, and so on.
3. Most web browsers allow you to import and export bookmarks. This can be useful if you
are switching to a new web browser or if you want to backup your bookmarks.
4. In the "Other search engines" section, click the three dots next to the search engine you
want to add to the toolbar and select "Add as shortcut."
5. The search engine will now be added to the toolbar.
Customizing web browser with the pop up blockers :
A pop-up blocker is a software program or web browser extension that prevents unwanted pop-up
windows from appearing on your screen. Pop-up windows are small windows that open on top
of your current web page, often without your consent. They are often used for advertising, but
they can also be used to spread malware or phishing scams.
Customizing your web browser's pop-up blocker can help you control which websites are
allowed to open new windows or tabs.
Here are some steps on how to customize your pop-up blocker in Google Chrome web browser:
1. Open Chrome and click the three dots in the top right corner of the window.
2. Select Settings from the Menu
3. Click on the "Privacy and security" icon in the left-hand panel.
4. Click Site Settings in the Security and Privacy section.
3. Choose the appropriate version of the JRE for your operating system. For example, if you
are using Windows 10, you would choose the "Java SE 19" version.
Indexing: Once the crawlers have downloaded all of the pages on the web, the search engine
indexes the content of the pages. The index is a massive database of all of the words and phrases
on the web. When a user enters a search query, the search engine uses the index to find websites
that contain the query terms.
Ranking: The final step in the search engine process is ranking. The search engine uses a complex
algorithm to rank the websites that match the user's query. The algorithm takes into account a
number of factors, such as the relevance of the website's content to the query, the quality of the
website's content, and the popularity of the website. The websites that are most relevant to the
user's query are ranked at the top of the list.
Search engines play an essential role in helping users find information on the web. They are
constantly evolving and improving, and they are an indispensable tool for anyone who uses the
internet.
Additional functions of search engines
In addition to the basic functions of crawling, indexing, and ranking, search engines also offer a
number of other features that can help users find information. These features include:
● Search operators: Search operators are special symbols or phrases that can be used to
refine a search query. For example, the AND operator can be used to find websites that
contain two or more words, while the OR operator can be used to find websites that
contain one or the other of two words.
● Advanced search: Advanced search pages allow users to filter their search results by a
number of criteria, such as date, language, and website type.
● Related searches: Related searches are suggestions for other searches that users may be
interested in. These suggestions are based on the user's current search query.
● Spelling suggestions: Spelling suggestions are corrections for misspellings that the
search engine has detected in the user's query.
These features can help users to find the information they need more quickly and easily.
Netiquette
Netiquette is a set of rules for polite and respectful behavior online. It is important to follow
netiquette to avoid offending others and to create a positive online environment.
Here are some of the basic rules of netiquette:
● Be respectful of others. Treat others online as you would treat them in person. Avoid
using offensive language or making personal attacks.
● Be honest and truthful. Do not lie or misrepresent yourself online.
● Respect privacy. Do not share personal information about others without their permission.
● Be mindful of your online presence. What you post online can have a lasting impact, so
be careful about what you share.
● Be responsible for your actions. Take responsibility for what you say and do online.
2. Review the search results. Google will return a list of websites that match your search
query. The results will be ranked in order of relevance, with the most relevant websites at
the top of the list. You can also use the filters on the left side of the page to narrow down
your results by date, language, and other criteria.
3. Click on a result to open the website. To learn more about a particular website, click
on its link in the search results. This will open the website in a new tab or window.
4. Refine your search if necessary. If you are not satisfied with the search results, you can
refine your search by using Google's advanced search options. These options allow you to
filter your results by date, language, website type, and other criteria.
4. Review the search results. Yahoo Search will return a list of websites that match your search
query. The results will be ranked in order of relevance, with the most relevant websites at the top
of the list. You can also use the filters on the left side of the page to narrow down your results by
date, language, and other criteria.
5. Click on a result to open the website. To learn more about a particular website, click on its
link in the search results. This will open the website in a new tab or window.
6. Refine your search if necessary. If you are not satisfied with the search results, you can
refine your search by using Yahoo Search's advanced search options. These options allow you
to filter your results by date, language, website type, and other criteria.
How to Use Ask.Com Search Engine
1. Open a web browser and go to Ask.com. You can type "ask.com" into the address bar and
press Enter.
2. Enter your search query into the search bar. The search bar is located at the top of
the Ask.com homepage. Type in the words or phrases you are looking for and
press Enter.
Ask.com search bar
3. Review the search results. Ask.com will return a list of websites that match your search
query. The results will be ranked in order of relevance, with the most relevant websites at
the top of the list. You can also use the filters on the left side of the page to narrow down
your results by date, language, and other criteria.
4. Click on a result to open the website. To learn more about a particular website, click
on its link in the search results. This will open the website in a new tab or window.
5. Refine your search if necessary. If you are not satisfied with the search results, you can
refine your search by using Ask.com's advanced search options. These options can be
found by clicking on the "Advanced Search" link located below the search bar.
Task 4: Cyber Hygiene: Students would be exposed to the various threats on the
internet and would be asked to configure their computer to be safe on the
internet. They need to customize their browsers to block pop ups, block active x
downloads to avoid viruses and/or worms
THEORY:
Antivirus:
Antivirus software is a program that either comes installed on your
computer or that you purchase and install yourself. It protects your
computer against most viruses, worms, Trojan horses and other unwanted
invaders that can make your computer sick.
Firewall:
A firewall is a special software or hardware designed to protect a private
computer network from unauthorized access. A firewall is a set of related
programs located at a network gateway server which protects the
resources of the private network from users from other networks.
Choose a setting
Click OK
Click on Turn on
Firewall:
THEORY:
Define search engine. List the various search engines. Navigate through
any of the search engine like Google and explore its features.
What is Antivirus software? List a few popular anti virus kits available.
Explain the functionality of the firewall quoting a few examples