computer-workshop
computer-workshop
Computer Workshop
There are many different peripheral devices, but they fall into three
general categories:
1. Input devices, such as a mouse and a keyboard.
2. Output devices, such as a monitor and a printer.
3. Storage devices, such as a hard drive or flash drive.
The control unit controls the way input and output devices, the
Arithmetic, and Logic Unit, and the computer’s memory respond to the
instruction sent to the CPU. It fetches the input, converts it in a decoded
form, and then sends it for processing to the computer’s processor,
where the desired operation is performed. There are two types of
Control units – the Hardwire CU and the Microprogrammable CU.
The Arithmetic and Logical Unit is responsible for arithmetical and logical
calculations as well as taking decisions in the system. It is also known as
the mathematical brain of the computer. The ALU makes use of registers
for the calculations. It takes input from input registers, performs
operations on the data, and stores the output in an output register.
Functions of ALU:
i. It is mainly used to make decisions like performing arithmetic and
logical operations.
ii. It acts as a bridge between the computer’s primary memory and the
secondary memory. All information that is exchanged between the
primary and secondary memory passes through the ALU.
3. Registers:-
Functions of Registers:
i. Input registers are used to carry the input.
ii. Output registers are used to carry the output.
iii. Temporary registers store data temporarily.
iv. Address registers store the address of the memory.
v. The program counter stores the address of the instructions.
vi. Data registers hold the memory operand.
vii. Instruction registers hold the instruction codes.
4. Cache:-
Functions of Cache:
i. They reduce the amount of time needed to fetch and execute
instructions.
ii. They store data temporarily for later use.
5. Buses:-
Functions of Bus:
i. It is used to share data between different devices.
ii. It supplies power to different components of the system.
6. Clock:-
As the name suggests, the clock controls the timing and speed of the
functions of different components of the CPU. It sends out electrical
signals which regulate the timing and speed of the functions.
Functions of Clock:
i. It maintains the synchronization of the components of the computer
system.
ii. It keeps track of the current date and time.
6. Installing SMPS:-
Switch mode power supply, SMPS: The term switch mode power
supply is generally used to indicate an item that can be connected to
the mains, or other external supply and used to generate the source
power. In other words it is a complete power supply.
Switch mode regulator: This typically refers just to the electronic
circuit that provides the regulation. A switch mode regulator will be
part of the overall switch mode power supply.
Switch mode regulator controller: Many switch mode regulator
integrated circuits do not contain he series switching element. This
will be true if the current or voltage levels are high, because an
external series switching element would be able to better handle the
higher current and voltage levels, as well as the resultant power
dissipation.
9. CD-ROM Drive:-
• CD-ROM drive is similar to installing a hard disk.
• 1st check that the jumper configuration is correct.
• Fix the screw.
1. Coaxial Cable:-
The Twisted pair cable is one type of Ethernet cable. These are used for
connection in the local area networks. The Twisted pair cables are
connected to the local router or a modem so that we can provide
internet access to the local devices. One end of the Twisted pair cable
consists of the interface card and the other end plugs are connected to a
router sitch or a modem.
(iii) Obtain the network hardware:- To create a LAN, you'll need a router
and/or a network. These pieces of hardware are the "hub" of your LAN,
and all of your computers will be connected to them.
The easiest way to create a LAN where every computer has access to
the internet is to use a router, and then add a network switch if the
router doesn't have enough ports. A router will automatically assign
an IP address to every computer that is connected to it.
Switches are similar to routers but do not automatically assign IP
addresses. Switches typically have many more Ethernet ports than a
router has.
(iv) Connect your modem to the WAN port on the router:- This port may
be labeled "INTERNET" instead. This will provide internet access to every
computer that is connected to your LAN.
You can skip this if you're setting up a LAN without internet access.
You don't need a router at all to create a LAN, but it makes things
easier. If you just use a network switch, you'll need to manually
assign IP addresses to each computer after connecting them.
(v) Connect the switch to a LAN port on the router:- If you're using a
network switch to connect more computers, connect it to one of the LAN
ports on the router. You can use any open port on the switch to make the
connection. When connected, the router will provide IP addresses for
every computer that is connected to either device.
(i) Find the Ethernet port on your PC:- You can usually find this on the
back of your desktop tower, or along the side or back of a laptop.
Slim laptops may not have an Ethernet port, in which case you'll need
to either use a USB Ethernet adapter or connect wirelessly if your
router allows it.
(ii) Plug one end of an Ethernet cable into your computer:- Make sure
you're using an Ethernet cable (RJ45), not a telephone cable (RJ11).
(iii) Plug the other end of the cable into an open LAN port:- This can be
any open LAN port on either the router or the switch, depending on your
LAN setup.
(iv) Test out your network (router only):- If you're using a router, your
work is complete. Once all of the computers are connected to a LAN
port, they will be assigned IPs automatically and will appear on the
network. If you set up your LAN for gaming, you should be able to start
your LAN game and have each computer connect.
If you're using a switch and no router, you'll still need to assign IP
addresses to each computer.
(v) Enable file and printer sharing:- You won't be able to access resources
on a networked computer until file and printer sharing is enabled. You
can select specific files, folders, and drives to share on each computer, as
well as share access to printers.
(i) Right-click on your network connection. You'll see this in your System
Tray. If you are connecting your computers through a switch with no
router, you'll need to assign each computer on the network its own
individual IP address. This process is handled automatically if you're
using a router.
Think of an IP address as a mailing address. Each computer on the
network needs a unique IP address so that information sent across
the network reaches the correct destination.
(iii) Click the Ethernet link at the top of the window. You'll see this next
to "Connections."
(v) Click Internet Protocol Version 4 (TCP/IPv4). Make sure you don't
uncheck it, just highlight it.
(xi) Click OK. This will save the settings for that computer. This computer
is now configured on your network with a unique IP address.
(xiv) Type 192.168.1.51 into the IP address field. Notice that the final
group of numbers has incremented by 1.
(xv) Enter the same values for Subnet mask and Default gateway. These
values should be the same as they were on the first computer
(255.255.0.0 and 192.168.0.0 respectively).
(xvi) Give each additional computer a unique IP. Repeat these steps for
each additional computer, incrementing the IP address by 1 each time
(up to 255). The "Subnet mask" and "Default gateway" fields should be
the same on each computer.
In order to install a new operating system, the following ways are needed
to be followed:
2. Boot from your installation disc:- Insert the installation disc into your
optical; drive, and reboot your computer. Normally a computer boots
from the hard drive first, so you will need to adjust some settings in
your BIOS in order to boot from the disc drive. You can enter the
BIOS by hitting the designated Setup key during the boot process.
The key will be displayed on the same screen as your manufacturer's
logo.
Common Setup keys include F2, F10, F12, and Del/Delete.
Once you are in the Setup menu, navigate to the Boot section. Set
your DVD/CD drive as the first boot device. If you are installing from
a USB drive, make sure that the drive is inserted and then select it as
the first boot device.
Once you've selected the correct drive, save your changes and exit
Setup. Your computer will reboot.
5. Enter your product key:- If you are installing Windows 8, you will
need to enter your product key before you can begin the installation.
Older Windows versions will ask for the product key after installation
is complete. Linux users will not need a product key unless it is a
purchased version such as Red Hat.
6. Choose your installation type:- Windows will give you the option of
Upgrading or performing a Custom installation. Even if you are
upgrading an older version of Windows, it is highly recommended
that you choose Custom and start from scratch. This will minimize
problems that may arise later from combining old settings and new
ones.
If you are installing Linux, you will be given the option to install
alongside your existing operating system (Windows), or to erase the
disk and install Linux by itself. Choose the option that best meets
your needs. If you choose to install alongside Windows, you will be
given the option to choose how much hard disk space you want to
designate for Linux.
7. Format your partitions:- If you are installing Windows, you will need
to choose which hard drive partition you want to install it on.
Deleting partitions will wipe the data on the partition and return the
space to the Unallocated section. Select the unallocated space and
create a new partition.
If you are installing Linux, the partition needs to be formatted in the
Ext4 format.
11. Install your drivers and programs:- Once the installation is complete,
you will be taken to your new desktop. From here, you can begin
installing your programs and make sure that your drivers are installed
and up to date. Make sure to install an antivirus program if you are
going to be connecting to the internet.
There are several ways to install application software like MS Office, VLC
Media PLayer, Win rar on a personal computer. Some of them are listed
below:
From the mid-1990s through the late 2000s, the most common way to
get new software was to purchase a CD-ROM. You could then insert the
disc, and the computer would walk you through the installation.
Now, almost all software has moved away from this model. Many new
computers no longer include a CD-ROM for this reason. However, if you
do need to install software from a CD-ROM, simply insert the disc into
your computer, then follow the instructions.
Today, the most common way to get new software is to download it from
the Internet. Applications like Microsoft Office and Adobe Photoshop can
now be purchased and downloaded right to your computer. You can also
install free software this way. For example, if you wanted to install the
Google Chrome web browser, you can visit this page and click the
Download button.
The installation file will be saved to your computer in .exe format.
Pronounced dot e-x-e, this is the standard extension for installation files
on Windows computers. You can follow the steps below to install an
application from an .exe file.
Step 3: A dialog box will appear. Follow the instructions to install the
software:-
Step 4: The software will be installed. You can now open the application
from the Start menu (Windows 7) or the Start Screen (Windows 8):-
The easiest way to find new software is to search the Web. For example,
if you were looking for a way to edit some personal photos on your
computer, you could run a Google search for free photo-editing software.
If you're not exactly sure what kind of software you're looking for, try
describing the tasks you want to complete. For example, if you wanted a
way to create to-do lists and organize your appointments, you might
search for something like free calendar organizer software.
If you're using Windows 8, you can download and install software from
the Windows Store. The Windows Store is meant to simplify the process
of locating and installing software from third-party developers—when
you find an app in the Windows store, you won't have to do any extra
work to install it.
Step 2: Write some HTML code in the notepad using the given format-
<!DOCTYPE html>
<html>
<body>
<h1>First Heading</h1>
<p>First Paragraph</p>
</body>
</html>
Step 3: Save the HTML page using .htm or .html file extension.
Sample Code:-
Output:-
Web Browser:
What is it?
A web browser takes you anywhere on the internet. It retrieves
information from other parts of the web and displays it on your desktop
or mobile device. The information is transferred using the Hypertext
Transfer Protocol, which defines how text, images and video are
transmitted on the web.
Hyperlinks?
Hyperlinks allow users to follow a path to other pages or sites on the
web. Every webpage, image and video has its own unique Uniform
Resource Locator (URL), which is also known as a web address. When a
browser visits a server for data, the web address tells the browser where
to look for each item that is described in the html, which then tells the
browser where it goes on the web page.
Cookies?
Websites save information about you in files called cookies. They are
saved on the computer for the next time you visit that site. For example,
the username and password of a page or the targeted content in for, of
ads.
Privacy?
Nearly all major browsers have a private browsing setting. These exist to
hide the browsing history from other users on the same computer. Many
people think that private browsing or incognito mode will hide both their
identity and browsing history from internet service providers,
governments and advertisers but these settings just clear the history on
your system, which is helpful if you’re dealing with sensitive personal
information on a shared or public computer.
Example
Search Engine:
Many search engines such as Google and Bing provide customized results
based on the user's activity history. This leads to an effect that has been
called a filter bubble. The term describes a phenomenon in which
websites use algorithms to selectively guess what information a user
would like to see, based on information about the user (such as location,
past click behaviour and search history). As a result, websites tend to
show only information that agrees with the user's past viewpoint. This
puts the user in a state of intellectual isolation without contrary
information.
Example
Cyber Hygiene:
What is it?
Cyber hygiene, or cybersecurity hygiene, is a set of practices
organizations and individuals perform regularly to maintain the health
and security of users, devices, networks and data. The goal of cyber
hygiene is to keep sensitive data secure and protect it from theft or
attacks. The concept works similarly to personal hygiene.
Why is it important?
An enterprise's security posture refers to the overall strength of its
cybersecurity program, and therefore how well it is positioned to handle
existing and emerging threats. Basic cyber hygiene goes a long way
toward achieving optimal cybersecurity.
Poor cyber hygiene can lead to security incidents, data compromise and
data loss. The consequences of a data breach may include financial loss,
government fines, operational downtime, organizational upheaval,
damage to the organization's reputation and legal liability.
Images from files and clipart, Drawing toolbar and Word Art, Formatting
Images, Textboxes, Paragraphs in word.