Sie sind auf Seite 1von 125

SWCET IT WORKSHOP LAB

Introduction

1
SWCET IT WORKSHOP LAB

INTRODUCTION

The objective of IT Workshop is to impart basic computer usage and maintenance skills and to
introduce you to a suite of productivity tools that will aid in your day to day activities. IT
workshop works in a learning-by-doing mode. It concentrates more on hands-on experience for
the participants rather theoretical classes. It enables the participant to make the best use of
Microsoft Office Suite in their day-to-day requirements and make use of it to improve the
standards in the educational environment. The IT Workshop prepares the participant to have a
hands-on experience in maintaining and troubleshooting a PC by themselves.

Computer Hardware, Windows & Linux


Hardware comprises all of the physical parts of a computer, as distinguished from the data it
contains or operates on. Software provides instructions for the hardware to accomplish tasks.

Windows is a range of closed source proprietary commercial operating environments for


personal computers and also servers. This range was first introduced by Microsoft in 1985 and
eventually has come to dominate the world of personal computer market. All recent versions of
Windows are full-fledged operating systems.

2
SWCET IT WORKSHOP LAB

Linux is a computer operating system. It is among the most famous examples of free software
and of open-source development. Initially, Linux was largely developed and used by individual
enthusiasts.

Productivity Tools

Microsoft Office is a suite of productivity programs created by Microsoft and developed


for Microsoft Windows and Apple Macintosh operating systems. In addition to the office
applications, it includes associated servers and Web-based services.
Office is considered to be the de facto standard for productivity programs, and has many
features not present in other suites. However, the reverse is also true, with other programs
having capabilities that Office doesn't.

Microsoft Office suite includes Word, Power Point, Excel, Publisher, and Outlookin most of its
versions.

Internet and World Wide Web

Internet & World Wide Web module introduces the different ways of hooking on to the
internet from home and workplace and effectively usage of the internet. Usage of web browsers,
email, newsgroups and discussion forums would be covered.

3
SWCET IT WORKSHOP LAB

PC Hardware

4
SWCET IT WORKSHOP LAB

TASK - 1
Identification Of The Peripherals Of A Computer, Components In A CPU And Its
Functions. Draw The Block Diagram Of The CPU Along With The Configuration Of
Each Peripheral. ASSEMBLING AND DISASSEMBLING OF PC

Computer Hardware

Introduction to Computer Hardware:

Hardware is the physical appearance of the devices or tools. It is what which we can touch and
feel.

Computer Hardware consists of the Monitor, CPU, Keyboard, Mouse and all other devices
connected to the computer either externally or internally.
A typical computer (personal computer, PC) consists of a desktop or tower case (chassis) and
the following parts:

1. CPU The central processing unit contains the heart of any computer, the processor. The
processor is fitted on to a Mother Board. The Mother Board contains various
components, which support the functioning of a PC.

2. System board/Motherboard which holds the Processor, Random Access Memory and
other parts, and has slots for expansion cards

5
SWCET IT WORKSHOP LAB

3. RAM (Random Access Memory)- for program execution and short term data-storage,
so the computer doesn't have to take the time to access the hard drive to find something.
More RAM can contibute to a faster PC.

4. Buses : PCI bus, PCI-E bus, ISA bus (outdated), USB, AGP

5. Power Supply - a case that holds a transformer, voltage control and fan

6. Storage controllers, of IDE, SCSI or other type, that control hard disk, floppy disk,
CD-ROM and other drives; the controllers sit directly on the motherboard (on-board) or
on expansion cards

7. Video display controller that produces the output for the computer display

8. Computer bus controllers (parallel, serial, USB, Fire wire) to connect the computer to
external peripheral devices such as printers or scanners
6
SWCET IT WORKSHOP LAB

9. Some type of a removable media writer:

10. CD - the most common type of removable media, cheap but fragile.

CD-ROM, , CD-RW, CD-R, DVD, DVD-ROM., DVD-RW, DVD-R,

11. Floppy disk

12. Tape Drive - mainly for backup and long-term storage

13. Internal storage - keeps data inside the computer for later use.

14. Hard disk - for medium-term storage of data.

15. Disk array controller


7
SWCET IT WORKSHOP LAB

16. Sound card - translates signals from the system board into analog voltage levels, and
has

terminals to plug in speakers.

17. Networking - to connect the computer to the Internet and/or other computers

18. Modem - for dial-up connections

19. Network card - for DSL/Cable internet, and/or connecting to other computers.

20. Other peripherals: In addition, hardware can include external components of a computer
system. The following are either standard or very common. Input, Keyboard, Pointing devices,
Mouse, Trackball, Joystick, Game pad.

21.Output : The ouput devices are:

Printer, Speakers, Monitor, Networking, Modem, Network card

8
SWCET IT WORKSHOP LAB

9
SWCET IT WORKSHOP LAB

ASSEMBLING AND DISASSEMBLING OF PC

How to Build Your Own PC


For many, building a computer is scarier than working on a car. Saving money isn’t the
only benefit to building your own computer. In addition, you will acquire knowledge otherwise
required for an upgrade further down the road. You’ll also get exactly what you want. Before
you can sit down at your new computer desk though, you’ll need to actually build the system.
Piecing a computer together may sound like a tough task, but if you take a couple of
precautions, there is nothing to worry about. Most components include warranties and a toll-free
number. If you suspect a particular piece of hardware is causing dissention in the ranks, don’t
hesitate to ask for help.

Before We Begin:
In order to ensure everything goes smoothly, gather a few important tools. A head screwdriver
is a must and needle-nosed pliers are often helpful. Buy quality thermal grease to keep the
processor in contact with the heat sink. If you don’t have an anti-static wrist band, make a
conscious effort to touch a ground point every so often (exposed metal on the case works fine)
to keep electrostatic discharge from damaging any of your components.

Step One: Case Preparation


You need to make sure your case is ready to accept the insides of a computer. After
opening the empty case (usually accomplished by removing two screws on one side), lay the
case on its side, so the motherboard can be dropped into place. If the case includes screws and
cables, take those out and set them aside. There should be a set of copper colored spacers in the
bag of screws – we’ll use those to mount the motherboard above the metal plate on the side of
the case. You may need to lay your motherboard down in the case to determine where the

10
SWCET IT WORKSHOP LAB

copper spacers are needed, but be extra careful – if you add a spacer that doesn’t correspond to
a mounting hole in the motherboard, you risk a short-circuit.

Next, you’ll want to check the thin, metal plate towards the rear of the case that includes
holes for the PS/2, serial, parallel, and USB ports. If it matches the configuration of your
motherboard, you’re set. If not, you’ll need to remove the plate by sliding it out. Again, be
careful; the sides of the plate are sharp. Once the proper plate is in place, set the case aside for a
moment and focus on the motherboard.

Step Two: Populate the Motherboard


Working on a motherboard that has already been mounted can get tricky, so it is best to
install the processor and memory before the board is installed in a case. Both the Pentium 4 and
Athlon XP plug into a processor socket with no force, so there should be no reason to apply
pressure when installing the processor. First, lift the arm adjacent to the socket. Then align the
processor with the socket according to the pattern of pins on the socket interface. There is only
one way the processor will fit, so again, do not apply pressure while inserting the chip. Finally,
close the arm, securing the processor on the motherboard. Now, using the thermal grease
mentioned previously, apply a thin film over the processor’s core.

11
SWCET IT WORKSHOP LAB

The process isn’t nearly as graceful for Athlon XP owners. In fact, be forewarned that
the processor core is sensitive to pressure, so if you feel you may be pushing too hard to affix
the heat sink, take a quick break to re-evaluate your strength, tough guy. There is only one way
that a Socket A heat sink should fit, so be sure that the larger end of the socket aligns with the
cut-out section of the heat sink. One end will clip easily onto the motherboard, while the other
will require more persuasive coercion. In the following picture, I’ve demonstrated a technique
for attaching a heat sink. Use a screwdriver to push down on the clip while pulling outwards
with a set of pliers.

Step Three: Fixing Memories:


Depending on what type of motherboard you’ve got, there may be some variation in
how memory is installed. Still, there are a few general rules of thumb you’ll want to abide by.
First, don’t immerse the modules in water.

Second, pay close attention to the type of RAM supported by your motherboard. Some
boards support both PC133 and DDR memory, but the majority is constrained to a single
standard. If DDR is your poison of choice, note that the modules will only fit into the 184-pin
slots one way. Boards that support 16-bit RDRAM require that two modules be used at a time.
If the board has four slots and you’ve only got two modules, be sure that the remaining two are
terminated with a CRIMM module (usually included with i850 motherboards). The installation
12
SWCET IT WORKSHOP LAB

process itself is simple: pull the plastic clips on each end of the slot, inset the module according
to the slot’s keying, and apply equal force to the entire module until it clicks into place. Repeat,
if necessary.

Step Four: Fixing your motherboard


Since the motherboard now houses a processor and memory, it can be installed in the
already-been-prepped case. Line up the mounting holes with the copper spacers and use the
included screws to mount the board. Now that your custom machine is taking shape, it may be a
good time to step back for a break. Relax, meditate, take some pictures, watch Friends, or have
a Big Blue Banana.

Step Five: Prepare the Cables


Most motherboards include two IDE cables and a floppy drive connector. While the
interior of the case is still clean (thus reasonably accessible), attach the cables to the
motherboard. Note that one end of the cable has two connectors close together – this end
attaches to your IDE device of choice, while the other end goes to the motherboard. Each cable
13
SWCET IT WORKSHOP LAB

should be marked with a red wire to indicate Pin 1. It is imperative to match Pin 1 on the cable
with Pin 1 on the motherboard and again with Pin 1 on the hard disk drive or CD-ROM.

Conventional IDE cables are fine for the most part, but in the interest of cleanliness,
we’ve developed a soft spot for round cables. Not only do these cables take up less room, but
they are also easier to tuck away, promoting better air flow throughout your case.

Step Six: Install Your Media


With the cables out of the way, you can now install your hard disk drive, CD-ROM
drive and floppy disk drive. First, you’ll want to make sure each drive is designated as a
‘master’ or ‘slave’ drive using the jumpers on the back of each drive. If you’ve got one hard
drive and one CD-ROM, you’ll see the best performance from both devices if each is installed
onto its own channel. In that case, both drives can be set as ‘masters.’ With the addition of a
CD-RW drive, you would want to assign one drive as a ‘master’ and one as a ‘slave,’ leaving
the hard drive on its own channel.
Now, you’re ready to add a CD-ROM drive. You may have a metal panel preventing
you from inserting the drive into a 5.25" slot. If so, remove the panel by rocking it back and
forth until it comes loose. If your case uses rails, attach them to the drive and slide it into the
chassis. Otherwise, use the included screws to secure the drive.

14
SWCET IT WORKSHOP LAB

The floppy drive can be installed using the same method, only use one of the external
3.5" inch bays. Attach the appropriate cable and secure the drive using the same small screws.
Finally, install your hard disk drive in an internal 3.5" bay. Many cases sport detachable disk
drive bays that often ease installation, but if we were really looking for the easy way out, we
would have picked up a G4 Cube. Attach the ends of each cable to the corresponding drive. For
instance, the end of the primary IDE cable should run to the hard drive. Similarly, the end of the
secondary cable should go to the secondary ‘master’ drive, while the second connector attaches
to the secondary ‘slave.’

Step Seven: In Go the Cards


Expansion cards add capabilities beyond what integrated sound and graphics can do.
Additionally, you can buy cards that add SCSI, USB 2.0, Gigabit networking – even cable
television support!

Unless your new system is to be used exclusively for business, it’s a safe bet that a new
graphics card will find its way into your AGP slot (the brown one in the middle of the
15
SWCET IT WORKSHOP LAB

motherboard). Nowadays, graphics cards are cooled by heat sinks and fans, much like
processors. It should come as no surprise, then, that high-end cards generate lots of heat. When
I build a computer, I typically leave the white PCI slot closest to the video card empty for plenty
of air flow. Installing the card itself is a snap – position the card over the slot and push down
gently until it is fully inserted. Use one of the screws included with the case to secure the card
to the chassis. Use the same procedure to install each of your other cards. If you haven’t yet
purchased them, consider an upgraded sound card and network card, at the least.

Step Eight: Connecting the Connectors


In order for your computer to turn on when you hit the power button, you need to
connect the switches and light emitting diodes (LEDs) from your case to the motherboard. The
connectors themselves are usually labeled, but it can be a little harder to locate the pins on the
motherboard. Your best source for this data is the manual included with the board. Once you
have the connectors, well, connected, we can move on to the next step. Don’t worry; we’ll test
the lights and switches a little later.Dont forget refer to the motherboard manual while
connecting the connectors

Step Nine: Power supply


We’ve waited a long time for this – simply, I have no desire to play with hardware
actively fed by an electrical socket. I have no desire to look like Carrot Top, so I never add
power until I’m done under the proverbial hood. We’re pretty much done though, so go ahead
and connect the large 4-pin power connectors to the hard disk drive and CD-ROM drive. The
small 4-pin Molex connector is required for the floppy disk drive.

16
SWCET IT WORKSHOP LAB

If you’ve got a Pentium 4 processor, not only will you need to connect the ATX power
connector, but you’ll also require a 4-pin 12V auxiliary connector. Athlon XP-compatible
motherboards only need power from the standard ATX connector. At this point, feel free to
connect the case’s power supply to a wall socket.

Step Ten: Check Properly


Before you put the cover back on the case, it would be wise to test the machine. Connect a
keyboard and mouse to the motherboard and a display to the video card. Press the power button
and immediately hit the ‘Delete’ key to enter the motherboard’s BIOS. Check the front of the
case to ensure both the power and hard drive lights are functioning (you will probably need disk
17
SWCET IT WORKSHOP LAB

activity before you can check the hard drive LED). Eject the CD-ROM tray to check power to
the drive. Finally, check the BIOS to make sure the drives are configured as you originally
intended. This, unfortunately, is where we part ways – for tips on configuring your BIOS,
reference your motherboard’s manual.

Hopefully you haven’t electrocuted yourself. I think you’d agree that building a new computer
is a learning experience, regardless if it’s your first time or fiftieth. There is always something
that can go wrong, and if you build new machines for long enough, anything and everything
will happen. If things don’t go your way the first time, be patient and troubleshoot the problem.
Always remember to keep manuals of all components with you while fixing your PC.

18
SWCET IT WORKSHOP LAB

TASK 2

Install Operating System Like MS Windows And Linux On The Personal


Computer.

Installation Of Windows Xp
Installing Windows XP can take up to two hours. To make the process more manageable, it has
been broken up into several sections. When you are ready, install Windows XP:
• Part 1: Begin the installation
• Part 2: Continue the installation
• Part 3: Complete the installation

Part 1: Begin the installation


1 Insert the Windows XP CD into your computer and restart your computer.
.
2 If prompted to start from the CD, press SPACEBAR. If you miss the prompt (it only appears
. for a few seconds), restart your computer to try again.

3. Windows XP Setup begins. During this portion of setup, your mouse will not work, so you
must use the keyboard. On the Welcome to Setup page, press ENTER.

19
SWCET IT WORKSHOP LAB

4 On the Windows XP Licensing Agreement page, read the licensing agreement. Press the
. PAGE DOWN key to scroll to the bottom of the agreement. Then press F8.

5 This page enables you to select the hard disk drive on which Windows XP will be installed.
. Once you complete this step, all data on your hard disk drive will be removed and cannot be
recovered. It is extremely important that you have a recent backup copy of your files before
continuing. When you have a backup copy, press D, and then press L when prompted. This
deletes your existing data.
6 Press ENTER to select Unpartitioned space, which appears by default.
.

20
SWCET IT WORKSHOP LAB

7 Press ENTER again to select Format the partition using the NTFS file system, which
. appears by default.

8 Windows XP erases your hard disk drive using a process called formatting and then copies the
. setup files. You can leave your computer and return in 20 to 30 minutes.

21
SWCET IT WORKSHOP LAB

Part 2: Continue the installation


. Windows XP restarts and then continues with the installation process. From this point forward,
you can use your mouse. Eventually, the Regional and Language Options page appears.
Click Next to accept the default settings. If you are multilingual or prefer a language other than
English, you can change language settings after setup is complete.
1 On the Personalize Your Software page, type your name and your organization name. Some
0 programs use this information to automatically fill in your name when required. Then,
. click Next.

22
SWCET IT WORKSHOP LAB

1 On the Your Product Key page, type your product key as it appears on your Windows XP CD
1 case. The product key is unique for every Windows XP installation. Then, click Next.
.

1 On the Computer Name and Administrator Password page, in the Computer name box, type a
2 name that uniquely identifies your computer in your house, such as FAMILYROOM or
. TOMS. You cannot use spaces or punctuation. If you connect your computer to a network, you
will use this computer name to find shared files and printers. Type a strong password that you
can remember in the Administrator password box, and then retype it in the Confirm
password box. Write the password down and store it in a secure place. Click Next.

23
SWCET IT WORKSHOP LAB

1 On the Date and Time Settings page, set your computer’s clock. Then, click the Time
3 Zone down arrow, and select your time zone. Click Next.
.

1 Windows XP will spend about a minute configuring your computer. On the Networking
4 Settings page, click Next.
.

24
SWCET IT WORKSHOP LAB

15. On the Workgroup or Computer Domain page, click Next.

Part 3: Complete the installation


16. Windows XP will spend 20 or 30 minutes configuring your computer and will
automatically restart when finished. When the Display Settings dialog appears, clickOK.

25
SWCET IT WORKSHOP LAB

17. When the Monitor Settings dialog box appears, click OK.

18. The final stage of setup begins. On the Welcome to Microsoft Windows page, click Next.

19. On the Help protect your PC page, click Help protect my PC by turning on Automatic
Updates now. Then, click Next.

26
SWCET IT WORKSHOP LAB

Windows XP will then check if you are connected to the Internet:

• 20. If you are connected to the Internet, select the choice that describes your network
connection on the Will this computer connect to the Internet directly, or through a
network? Page. If you’re not sure, accept the default selection, and click Next.

• If you use dial-up Internet access, or if Windows XP cannot connect to the Internet, you
can connect to the Internet after setup is complete. On the How will this computer
connect to the Internet? page, click Skip.

27
SWCET IT WORKSHOP LAB

21. Windows XP Setup displays the Ready to activate Windows? page. If you are connected to
the Internet, click Yes, and then click Next. If you are not yet connected to the Internet,
click No, click Next, and then skip to step 24. After setup is complete, Windows XP will
automatically remind you to register your copy of Windows XP.

22. On the Ready to register with Microsoft? page, click Yes, and then click Next.

28
SWCET IT WORKSHOP LAB

23. On the Collecting Registration Information page, complete the form. Then, click Next.

24. On the Who will use this computer? page, type the name of each person who will use the
computer. You can use first names only, nicknames, or full names. Then click Next. To
add users after setup is complete or to specify a password to keep your account private,
read Create and customize user accounts.

29
SWCET IT WORKSHOP LAB

25. You will get a Thank you screen to confirm setup is complete. Click finish.

26. Log in, to your PC for the first time.

30
SWCET IT WORKSHOP LAB

27. You now need to check the device manager to confirm that all the drivers has been loaded
or if there are any conflicts. From the start menu select Start -> Settings -> Control Panel. Click
on the System icon and then from the System Properties window select the Hardware tab, then
click on Device Manager.

31
SWCET IT WORKSHOP LAB

If there are any yellow exclamation mark "!" next to any of the listed device, it means
that no drivers or incorrect drivers has been loaded for that device. In our case we have a Video
Controller (VGA card) which has no drivers installed.

Your hardware should come with manufacturer supplied drivers. You need to install these
drivers using the automatic setup program provided by the manufacturer or you need to
manually install these drivers. If you do not have the drivers, check the manufacturers website
to download them.

To install a driver manually use the following procedure:

(a) From the device manager double click on the device containing the exclamation mark.

(b) This would open a device properties window.

(c) Click on the Driver tab.

(d) Click Update Driver button. The Wizard for updating device driver pops up as shown
below:

32
SWCET IT WORKSHOP LAB

You now get two options. The first option provides an automatic search for the required
driver. The second option allows you to specify the location of the driver. If you don't know the
location of the driver chooses the automatic search which would find the required driver from
the manufacturer supplied CD or Floppy disk. Windows would install the required driver and
may ask you to restart the system for the changes to take affect. Use this procedure to install
drivers for all the devices that contain an exclamation mark. Windows is completely setup when
there are no more exclamation Marks In The Device Manager.

Installation Of Linux

STEP 1: Juzt-Reboot Installation


- Install Juzt-Reboot using "Advanced Install"
- Partition your hard drive from the Juzt-Reboot FDISK menu.

Partition: Attribute: Name: Size: File System:


1. [B or C] [Redhat] [6000] [Linux]
2. [P] [Redhat] [1000] [Linux S/W]

[B] - Backup Restoration Boot Partition

[C] - No Restoration Boot Partition

[P] - Private Data Partition (Named the same as the boot partition)

Note: Partition sizes can be set to whatever required.


- When FDISK install operation is completed press [ESC Key] to save & exit.
- System will now reboot and the Juzt-Reboot multi boot menu will appear, place Linux disk in
CDROM drive and select boot partition from menu by pressing [Enter Key] to begin install.

33
SWCET IT WORKSHOP LAB

STEP 2: Begin Linux RedHat Install > Press Enter to “boot”.

STEP 3: Select Skip if asking for CD testing.

STEP 4: Click “Next” and select language.

34
SWCET IT WORKSHOP LAB

STEP 5: Setup Keyboard.

35
SWCET IT WORKSHOP LAB

STEP 6: Mouse Configuration.

STEP 7: Install Type > Custom.

36
SWCET IT WORKSHOP LAB

STEP 8: Disk Partitioning >Manually partition with Disk Druid.

STEP 9: Ignore two warnings & click “Yes” when asked to format SWAP
partition.

37
SWCET IT WORKSHOP LAB

38
SWCET IT WORKSHOP LAB

STEP 10: PartitioningEdit /dev/hda1, select“/”for mount point and format


this partition as ext3.Edit /dev/hda2, format this partition as “swap” > Click
Next and Continue. You will then get format warnings message click format.

39
SWCET IT WORKSHOP LAB

40
SWCET IT WORKSHOP LAB

41
SWCET IT WORKSHOP LAB

42
SWCET IT WORKSHOP LAB

STEP 11: Boot Loader Configuration > Change boot loader > Select “Use
LILO as the boot loader. Click OK and enable the check box of “Configure
advanced boot loader options”. Click NEXT to continue.

43
SWCET IT WORKSHOP LAB

STEP 12: Configure advanced boot loader options > Install Boot record on:
“/dev/hda1 First sector of boot partition. If boot sector is over than 8.4GB,
the check box of “Force LBA32” must be enabled.

44
SWCET IT WORKSHOP LAB

STEP 13: Network Configuration > Setup your network surroundings.

STEP 14: Firewall Configuration > Setup your preferred Firewall settings.

45
SWCET IT WORKSHOP LAB

STEP 15: Additional Language Support > Setup your preferred settings.

STEP 16: Time Zone Selection > Select your Location account Configuration.

46
SWCET IT WORKSHOP LAB

STEP 17: Account Configuration > Setup your Root password 6+ characters.

STEP 18: Authentication Configuration > Setup your preferred settings.

47
SWCET IT WORKSHOP LAB

48
SWCET IT WORKSHOP LAB

STEP 19: Start to Install > Insert next CD till install completed.

STEP 20: Boot Disk Creation > Create if required.

49
SWCET IT WORKSHOP LAB

STEP 21: Graphical X Interface Configuration > Select a preferred setting.

STEP 22: Customize Graphical Configuration > Select a preferred setting .

50
SWCET IT WORKSHOP LAB

STEP 23: Installation completed > exit.

51
SWCET IT WORKSHOP LAB

TASK 3
Hardware Troubleshooting
Most common problems in computer hardware are loose connections. So first try to tie up all
peripherals, connectors properly before do anything

The most reliable way is, try to isolate the problem by using compatible peripherals from other
computers. (If you are a trainee hardware technician, it’s better to have extra standard PC
peripherals with you for testing purpose). In this way you can isolate the defective part(s) easily
rather than guessing. But of course, keeps in your mind that, if you isolate the defective part(s)
don’t forget to fully test the PC with new part(s). It because’ sometimes there may be another
problem in addition to this defective part(s). And don’t forget to Re-test the faulty part. And
always do test one at a time.

Here are some precautions before the Diagnose or troubleshooting.

1. Never replace a Computer peripheral, when main power code is connected to the power supply.
2. Never touch a Computer peripheral with wet or sweat hands. Keep your hands clean when you
handle them.
3. If you can always use an anti-statistic computer repair kit.
4. Always use the proper tools.
5. Never use teeth to clean or cut wires or any other electronic, electric parts.
6. Always have a good power codes/ extension board and earthling system with your house/Office
power system.

No Power

1. If computer doesn’t power up at all, Reset the BIOS first and try.
2. If still not power up, disconnect all the peripherals and wire harnesses except, Processor, and
power supply, then try to switch on from mother board’s front panel connector.
3. If still not power up change the power supply and try.
4. If still not power up remove the mother board with processor from Casing and lay it on
antistatic surface and plug a power supply and try.
5. If still it’s happening same problem, replace the processor and try.
6. If it’s not work it because faulty mother board.

52
SWCET IT WORKSHOP LAB

Power Comes but no Display

1. Remove the RAM card from the mother board and clean it with rubber eraser and re-plug it and
try.
2. Replace a RAM card and try.
3. If it’s having both separate and On board VGA, pull the separate VGA card and try with On-
board’s VGA out.
4. If it’s having a separate VGA card, Remove the VGA card from the mother board and clean it
with rubber eraser and re-plug and try.
5. If it has only separate VGA card replace the VGA card and try.
6. Reset the BIOS and try.
7. If still not Display, disconnect all the peripherals and wire harnesses except, Processor, RAM
card (VGA card, if available) and power supply, and then try to switch on from mother board’s
front panel connector. (If computer has separate VGA card and on-board VGA as well, proceed
with onboard VGA until isolate the defective part).
8. If still no display, remove the mother board with processor, RAM card and VGA card from
Casing and lay it on antistatic surface and plug a power supply and try.
9. Replace the processor and try.
10. Replace the Power supply and try.
11. Still it’s not display means faulty mother board.

Display comes, OS not loading.

1. Check if any abnormal sound comes from the Hard Disk drive. (If so it’s a faulty HDD).
2. Check whether Cooling FANs are working in order.
3. Re-plug all HDD connectors and try.
4. Replace the HDD interface cable and try.
5. Check whether HDD is detected by Mother board (Drive details on the BIOS) if not use a
another HDD port (SATA or IDE) on mother board.
6. Reset the BIOS and try.
7. If you have a spare HDD attach it with the faulty PC and check whether mother board detects it.
8. Try to start with safe mode or Last known good configuration mode, by pressing F8 at the
startup, if it’s restating.
9. Check the HDD mode (ACHI or IDE) on Advance chip set settings in the BIOS and set the
proper setting.
10. Detach if PC has DVD drives, additional Add-On cards and USB cables and try.
11. Replace the RAM card and try.
53
SWCET IT WORKSHOP LAB

12. If it’s a windows PC, Remove the HDD from the faulty PC and attach it with healthy PC as a
secondary HDD. If that HDD is having a problem with file system, it will run the scan disk
utility automatically. After run the scan disk, shut down the testing PC gently and re attach the
faulty PC and try.
13. If you are in a position to reinstall the PC at once without doing any software solution do it right
now or do fresh OS installation with another HDD.
14. If it’s a hardware error in most cases now you will face it while installing the OS. In such case
you have to replace and try with RAM, HDD, Processor and (Separate VGA if you have).

Computer is restarting or getting off, automatically. (Occasionally).

1. First before replacing anything checks the all Cooling FANs are working properly.
2. Re-plug all the Connecters tiredly and Clean all the contacts of RAM, VGA and Other Add-On
cards with rubber eraser.
3. Disconnect the HDD and switch on the PC and let it run. If it runs for considerable time, most
probably power supply is OK.
4. Then re-Attach the HDD and Run a scan disk for HDD and check.
5. Run a third party RAM test.
6. Disconnect USB cables or any other Add-On card and test.
7. If it’s having a separate VGA card On-board VGA card, try on On-board VGA card. Otherwise
replace the VGA card and Try.
8. Disable any Power saving feature or Screen server on the OS and try.
9. Update the Latest BIOS version for Mother Board.
10. If still happens you have to replace RAM, VGA card, Processor, HDD, HDD interface cables
ultimately power supply. Replace one at a time and check.
11. After replacing a peripheral, here is some test run I always do for detect these types of errors.
Create a note pad Document and write this syntax ( Dir /s “pres Enter” a.bat) save it on the
desktop and exit while re-naming this file as a.bat (.TXT extension should be .BAT) then
double click on that icon and it will run. Right click again and again on this icon. Then it will
run number of sessions. 50 sessions is enough. In this way you can make the busy on PC and
test whether Problem is Solve or not.

How we deal with faulty parts?


If you found faulty VGA card, RAM card and Mother Boards, don’t forget to wash with fresh
water and dry it well and try again. (If not they have any warranty).

54
SWCET IT WORKSHOP LAB

Same time if you have a facility to resold the circuit boards of defective Computer part’s (Chips
and Chip’s soldering spots) (such as Mother boards, RAM cards, VGA cards, Processors, HDDs
Circuit boards) from a heat blower, do it and try. And most of the time you may see defective
capacitors, in that case if have a little ability to replace the Cap, can do it by yourself (If not
they have any warranty).

if you got defective power supplies don’t discard it. Open the power supply box and re-sold the
circuit board and try. (If not they have any warranty).

55
SWCET IT WORKSHOP LAB

TASK 4

Software Troubleshooting
Unable to install a software program

1. Verify the diskettes or CD are readable by reading the files on the drive. For
example, MicrosoftWindows users can explore the drive in Windows explorer. If the
CD attempts to AutoPlay, you may need to right-click the drive and click Explore to
browse the drive. If you are having problems with reading a CD, see document
CH000212.

2. If the CD reads fine with no errors, verify your computer meets the minimum
requirements of the software program. If your computer does not have enough disk drive
space or does not meet the requirements, the program will not install.

3. Make sure the program or utility you are installing is compatible with the version of
operating system you have on your computer. For example, many older utilities such as
a virus protection program may only work with a specific version of Microsoft
Windows.

4. If you are getting stopped at the CD-KEY or Serial Number verification, verify you are
entering your correct number. If you lost your number or key or it does not work, you
will need to contact the developer of the program. Computer Hope will not provide any
users with an alternate identification number.

Error during installation

1. Verify your computer meets the requirements of the program or utility. For example, if
your computer runs out of disk space during the installation, this would cause an error
during the installation.

2. If you are running Microsoft Windows 95 or higher try installing the program from Safe
Mode.

3. Verify the CD is clean and contains no significant scratches. Information about how to
clean a CD and a CD-ROM can be found on our cleaning page.

Program or utility does not load or has an error when it attempts to load

56
SWCET IT WORKSHOP LAB

1. Verify the program or utility documentation makes no mention of the error you are
experiencing. Many times the error and explanation to how to resolve the error are
already documented.

2. Verify no patches or updates are available from the developer of the program or utility.
In some cases the software program may require an update before it can be successfully
run on your computer.

3. Make sure all other programs are closed when you run the program or utility. If the
program successfully runs after closing all other programs, it's possible that the program
may have issues with other programs.

4. Make sure the computer has been rebooted at least once after the program has been
installed. In some cases it may be required.

5. Verify your computer has the correct date. In some cases a program may rely on the date
and if that date is incorrectly set it may cause issues. Additional information about
setting the date can be found on document CH000554.

6. If following the above recommendations does not resolve your issues, reinstall the
program or utility.

57
SWCET IT WORKSHOP LAB

Internet and
World Wide
Web

58
SWCET IT WORKSHOP LAB

TASK 5
Orientation And Connectivity Boot Camp
To configure TCP/IP settings

1. Open Network Connections.

2. Click the connection you want to configure, and then, under Network Tasks, click
Change settings of this connection.

3. Do one of the following:


o If the connection is a local area connection, on the General tab, under This
connection uses the following items, click Internet Protocol (TCP/IP), and then
click Properties.

59
SWCET IT WORKSHOP LAB

4. Do one of the following:


o If you want IP settings to be assigned automatically, click Obtain an IP address
automatically, and then click OK.

5. To configure DNS, WINS, and IP Settings, click Advanced.

 To open Network Connections, click Start, point to Settings, click Control Panel, and
then double-click Network Connections.
 You should use automated IP settings (DHCP) whenever possible, for the following
reasons:
o DHCP is enabled by default.
o If your location changes, you do not have to modify your IP settings.

60
SWCET IT WORKSHOP LAB

o Automated IP settings are used for all connections, and they eliminate the need
to configure settings such as DNS, WINS, and so on.

To make a local area connection

To make an Internet connection

1. Open Network Connections.

2. Under Network Tasks, click Create a new connection, and then click Next.

61
SWCET IT WORKSHOP LAB

3. Click Connect to the Internet, and then click Next.

4. Choose one of the following:


o If you do not have an Internet account, click Choose from a list of Internet
service providers (ISPs) and then click Next.
5. From your choice above, click one of the following:

Set up my connection manually

o If you are connecting to your ISP using a standard 28.8 Kbps, 56 Kbps, or ISDN
modem, click Connect using a dial-up modem, click Next, and follow the
instructions in the wizard.
o If your DSL or cable modem ISP connection requires a user name and password,
click Connect using a broadband connection that requires a user name and
password, click Next, and then follow the instructions in the wizard.
o If your DSL or cable modem ISP connection is always on and does not require
you to type a user name and password, click Connect using a broadband
connection that is always on, click Next, and then click Finish.

Use the CD I got from an ISP

o Click Next, and then click Finish. Insert the CD provided by your ISP and follow
the instructions.

62
SWCET IT WORKSHOP LAB

Choose from a list of Internet service providers (ISPs)

o To create an Internet account using MSN Explorer, click Get online with MSN,
and then click Finish. Follow the instructions in MSN Explorer.
o To choose an ISP, click Select from a list of ISPs, click Finish, and then double-
click Refer me to more Internet service providers. Follow the instructions in the
wizard.

Sending of E-Mail
Following are the steps to send E- Mail
Step 1: Type yahoomail.com in address bar

Step 2: You will get a screen shown below


Enter your Email ID E.g. example@yahoo.com
Enter your Password E.g. ********* and then click Sign In button

63
SWCET IT WORKSHOP LAB

Step 3: Press compose message. This is located in the top left. It opens up a tab where you can
write your email, add emoticons/smileys, etc.

Step 4: Write who it's to. If you have the person in your contacts, you can write their name from
there. If not, you can write their full email. It can be to ANY email, it doesn't have you be a
"@yahoo" address.

64
SWCET IT WORKSHOP LAB

Step 5: Type the subject.

Step 6: Type the message in the bottom box. You can type as short or as complex as you want.

65
SWCET IT WORKSHOP LAB

Step 7: Press send. Then you have sent your email!

66
SWCET IT WORKSHOP LAB

TASK 6
Web Browsers And Surfing The Web
The internet is a network of computer networks worldwide. The web is a tool used to
retrieve information published on the internet. To navigate the web we use a browser I.E.
Internet Explorer, Mozilla Fire Fox …etc.

Internet Addresses

•Each computer on the internet has its own address


•E-mail addresses discussed in e-mail classes
•Each document, essay, image, etc. On the WWW has its own address
•To find a web document, follow a link or key in a web address (URL)
•Highlighted words or text in a WWW document
•Moves you to a place within same document, or to a web page elsewhere

•An electronic document stored on a web server


•Uses HTML (Hypertext Markup Language)
•May include text, sound, animation, images
•Usually has links to other Web pages or different parts of the same Web site
•Example: http://www.yahoo.com
Customizing the Web Browser

•LAN Proxy Settings


•Bookmarks
•Search Toolbars
•Pop-up blockers
•Managing Plug-in

67
SWCET IT WORKSHOP LAB

Navigating the Web Using Internet Explorer


Moving within a page
– Page up/down keys
– Up/down arrow keys
– Scroll bar on the right side
–Clicking on hypertext links (may be text, images, URL)
–Using the navigation, location or menu tool

Internet Explorer Toolbar Buttons

Previ St Favorit Ema


ous Previ op Refre es Histoil Websit Go to
Page ous shHomep On/Offry Pag Print e URL the
Page On/Oe Page reques
age
ff ted
Websit
e

Adding a Favorite
•To add a page to your list of favorite pages
–Go to the page that you want to add to your Favorites list.
–On the Favorites menu, click Add to Favorites.
–Type a new name for the page if you want to.
•To open one of your favorite pages, on the Favorites menu, click the page you want to open.
•As your list of favorite pages grows, you can organize them by moving them into subfolders
Tasks
•Configure Your Browser to access the Internet
•Customize the browser
–Security Settings
–Privacy Settings
–Pop-up Blocking
–Search Toolbar
•Manage Bookmarks
68
SWCET IT WORKSHOP LAB

TASK 7
Search Engines And Netiquette

Search Engines
•Software that lets a user specify search terms. The search engine then finds sites that contain
those terms.
•Over time a search engine builds a database of searchable terms that can be matched to web
sites.

Query
•Terms entered into a form of a search engine’s web page.
•Not necessarily phrased as a question since words such as “what”, “a”, “is” etc. would be
ignored.
•Enter specific keywords.
•Make sure your spelling is correct.

Methods of searching
•Use more than one word.
•Use quotes
•Use boolean queries
•Use + sign or - sign
•Use * (wild card)
oolean Query
AND, OR, NOT
•A AND B–results in sites containing both A and B
•A OR B
–results in sites containing A or B, or both A and B
•A AND NOT B
–results in sites containing A and excludes sites containing both A and B.
Stemming
Some search engines will return results that include variations on the endings of words.
•computer
•computers
•computed
69
SWCET IT WORKSHOP LAB

Using boolean queries


•shelf AND ice
–results in URLs of pages containing the word “shelf” and the word “ice” (in any order).
•shelf OR ice
–Results in URLs of pages containing the words “shelf” and ”ice”, or just the word “shelf” or
just the word “ice”.
•computers NOT notebook
–Results in URLs of pages containing the word “computers” but not containing the word
“notebook”.

Metasearch Engines
•Performs a search by using more than one search engine to do the search.
–www.metasearch.com
–www.metacrawler.com
–www.dogpile.com

White Pages
•Used for finding individuals
–www.bigfoot.com
–www.whowhere.com
Types of Links
•Text Hyperlink
•Image Hyperlink
•Mailto Hyperlink – launches a mailer
•Intra-document Link (Internal link) - links to another location within the same page.

To open a web page in a new browser window.


•Right-mouse click on the link of interest and then select “Open in new window”.
•Click on the original browser window on the task bar below in order to continue viewing the
original web page while that page loads., This speeds up your search since you can view one
page while another is loading.

70
SWCET IT WORKSHOP LAB

Tasks
•Write search engines to find the following
–To find pages related to Computer Science or Computer Programming
–Who invented Laser
–To find information about AND & OR gates
–To find information about apple(the fruit, NOT Apple computers)
–To search for word School of IT in jntu.ac.in

Netiquette
"Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette
covers both common courtesy online and the informal "rules of the road" of cyberspace.
What is Netiquette?
Simply stated, it's network etiquette --
that is, the etiquette of cyberspace.
“Etiquette” means “the forms required by good breeding or prescribed by authority to be
required in social or official life.” In other words, Netiquette is a set of rules for behaving
properly online. The golden rule: Do unto others as you'd have others do unto you. Imagine how
you'd feel if you were in the other person's shoes. Stand up for yourself, but try not to hurt
people's feelings.
Electronic communication lacks the facial expression, gestures and tone of voice to
convey your meaning. It’s easy to misinterpret meaning of words.
Would you say it to the person's face?
If the answer is no, rewrite and reread. Repeat the process till you feel sure that you'd feel as
comfortable saying these words to the live person as you do sending them through cyberspace.
Remember, when you communicate through cyberspace your words are written. Chances are
they're stored somewhere. They can come back and haunt you. You don't have to be engaged in
criminal activity to want to be careful. Any message you send could be saved or forwarded by
its recipient. You have no control over where it goes.Standards of behavior may be different in
some areas of cyberspace, but they are not lower than in real life.
Be ethical.
If you encounter an ethical dilemma in cyberspace, consult the code you follow in real
life. If you use shareware, pay for it. Paying for shareware encourages more people to write
shareware. The few dollars probably won't mean much to you, but they benefit all of cyberspace
in the long run. Breaking the law is bad Netiquette.If you're tempted to do something that's
illegal, chances are its also bad Netiquette. Netiquette varies from domain to domain. What's
perfectly acceptable in one area may be dreadfully rude in another.Netiquette is different in
71
SWCET IT WORKSHOP LAB

different places, so it's important to know where you are.Lurk before you leap. When you enter
a domain of cyberspace that's new to you, take a look around. Spend a while listening to the
chat or reading the archives. Get a sense of how the people who are already there act. Then go
ahead and participate.
Bandwidth is the information-carrying capacity of the wires and channels that connect
everyone in cyberspace. It also refers to the storage capacity of a host system. If you
accidentally post the same note to the same newsgroup five times, you are wasting both time (of
the people who check each copy) and bandwidth (by sending repetitive information over the
wires and requiring it to be stored somewhere).You are not the center of cyberspace. Don’t
expect instant responses to all your questions, and don't assume that all readers will agree with -
- or care about -- your passionate arguments. Ensure your message is worth the time it takes to
open it.
Before copy people on your messages, ask yourself whether they really need to know. If the
answer is no, don't waste their time. If the answer is maybe, think twice before you hit the send
key.
Take advantage of your anonymity. You won't be judged by color, weight, age or dress
sense. You will, however, be judged by the quality of your writing. So spelling and grammar do
count. Know what you're talking about and make sense. Pay attention to the content of your
writing. Ensure your notes are clear and logical.
Be pleasant and polite. Avoid offensive language, and don't be confrontational for the
sake of confrontation. If you must swear, think up creative alternatives. The strength of
cyberspace is in its numbers. The Internet itself was founded and grew because academics
wanted to share information. Don't be afraid to share what you know.
If you ask a question and anticipate a lot of answers, it’s customary to request replies by email
instead of to the group. Share the results of your questions with others, so everyone benefits
from the experts who took the time to write to you.
If you’re an expert, or you've researched a topic that you think would be of interest to
others, write it up and post it. Sharing your knowledge is fun. And it makes the world a better
placeopinion without holding back any emotion.
Netiquette does not forbid flaming. Flaming is a long-standing network tradition (and
Netiquette never messes with tradition).
Netiquette does forbid the perpetuation of flame wars that can dominate the tone and
destroy the camaraderie of a discussion group.
While flame wars can initially be amusing, they’re an unfair monopolization of bandwidth.
Some people in cyberspace have more power than others. There are wizards in MUDs (multi-
user dungeons), experts in every office, and system administrators in every system.

72
SWCET IT WORKSHOP LAB

TASK 8

Cyber Hygiene

It refers to steps that computer users can take to improve their cyber security and better protect
them online.

A firewall is a device or set of devices designed to permit or deny network transmissions


based upon a set of rules and is frequently used to protect networks from unauthorized access
while permitting legitimate communications to pass.

Many personal computer operating systems include software-based firewalls to protect


against threats from the public Internet. Many routers that pass data between networks contain
firewall components and, conversely, many firewalls can perform basic routing functions.

Unfortunately, the 'human factor' continues to be an area of vulnerability for today's


companies. Cyber criminals have also wised up to this fact and many of their activities are
designed to exploit this. Here are a few of the key cyber risks facing businesses:

Spearphishing

Cyber criminals use so-called spearphishing attacks, in which they send employees
targeted emails - often from an email address that matches the name of a colleague, supervisor
or chief executive-that contains malicious code. One click is all it takes for an attacker to steal
an employee's administrative passwords, turn their machine into a recording device, and see
everything they do.

Vishing

When someone emails an employee, pretending to be their bank, or requests personal or


sensitive information, this is called phishing. The same process over a telephone system or
Voice over IP (VoIP) is called Vishing. With the ease of access to VoIP and more consumers
using it, this cybercrime is on the increase.

Mobile threats

Hackers realise that IT departments do not always run an anti-virus solution on their
mobile endpoints. So they target them. Malware is being created to steal data from Android
devices. To keep this under control, companies need to put security policies in place which
include the installation of antivirus solutions on all mobile devices.
73
SWCET IT WORKSHOP LAB

The impact of any one of these cybercrimes is significant. This can include scaring off
potential or existing customers, damaging stock value, or incurring potential legal liabilities.
And it seems the most technical of companies can fall foul of this threat. Microsoft, the world's
largest software company, recently admitted to being hacked. The security intrusion was
'similar' to ones reported by Apple and Facebook. Both companies said computers used by
employees were attacked after visiting a software developer website infected with malicious
software.

So, what can a company do to protect itself and its employees? The most important
priority is to make sure they are 'cyber ready' by nurturing a security aware culture. Part of
this, is to educate the workforce on the importance of security vigilance and how it is relevant to
them. This also means addressing cyber security issues at home too. Most people begin to pay
a lot more attention when they know it might affect them or their loved ones.

The security messages also need to be kept simple. There shouldn't be the assumption
that everyone is clued up on how to stay safe online. It's usually best to work to the lowest
common denominator. And make sure the subject is engaging. Most people are relieved to
finally speak to someone in the know. They are also usually fascinated when they discover how
relevant the topic of security is to them. So, it's a good idea for the security team to be as
accessible as possible: to get out there and mingle.

By bringing the subject to the forefront of employees' minds, there is the chance for
socialisation. This means the issues and dilemmas faced by all are discussed at different levels
across the company without having to be prompted by the security team. By uniting the
workforce in this way to follow simple cyber hygiene practice, the company can reap the
benefits by protecting the business and its assets.

Common personal firewall features

 Protects the user from unwanted incoming connection attempts


 Alert the user about outgoing connection attempts
 Allows the user to control which programs can and cannot access the local
network and/or Internet
 Hide the computer from port scans by not responding to unsolicited network traffic
 Monitor applications that are listening for incoming connections
 Monitor and regulate all incoming and outgoing Internet users
 Prevent unwanted network traffic from locally installed applications

74
SWCET IT WORKSHOP LAB

 Provide the user with information about an application that makes a connection attempt
 Provide information about the destination server with which an application is attempting to
communicate

Tips to secure your personal computer and prevent cybercrime

 Update operating systems and software to the latest versions to protect yourself from
"malware" - malicious software that can be installed on your machine without your
knowledge.
 Even emails from people you know may contain malware links or attachments if an account
has been hacked; be careful when following links and visit websites by entering the
addresses directly into your browser.
 Encrypt sensitive data.
 Change passwords regularly.
 Don not provide personal information on social networking sites such as address or birthday
 Do not log into personal accounts over public WIFI networks.
 Do not plug unknown USB devices into your computer.

Virus
A virus is a self-replicating program that spreads by inserting copies of itself into
programs or documents that already exist on a computer. The name comes from an analogy
with biological viruses. These cannot reproduce by themselves but make use of the functions of
infected cells to spread. Similarly, a computer virus makes use of the executable code in
legitimate programs to carry out its purposes. A virus may be designed to be destructive to a
system or to be a prank. In either case, the virus will rapidly reproduce itself until the system
may be overwhelmed. Viruses spread to other systems when infected programs are copied to
another machine. Documents with executable code like Word macros can also be vectors of
infection. A very common method of spreading viruses is by attachments to email . Today a
variant of a virus known as a worm is more often used.

Worm

Viruses and worms are often lumped together in the single category of virus but there is
technical distinction. A worm differs from a virus in that it contains all the code it needs to carry
out its purposes and does not depend on using other programs. Most recent instances of
malware have been worms, spread primarily by email. Worms are designed to replicate rapidly
and to use the Internet or other networks to spread with great facility. They may contain code to

75
SWCET IT WORKSHOP LAB

damage or erase files or may carry other malicious payloads. On a number of occasions, large
numbers of computer systems have been brought down by worms. In addition to the damage
from whatever payload they carry, the sheer number of worm copies can bring systems to a halt.

A very common method of spreading is by use of any email addresses on an infected


computer. The worm searches address books, temporary Internet caches and other possible
sources of email addresses. The worm then mails out random infected fake messages. It may
use the addresses it finds not only as recipients but also may spoof mail to show them as
senders. It may also combine random pieces of addresses into new fake addresses. All the
messages will contain an attachment that is infected. None of this activity may be known by the
owner of the infected machine and may go on for weeks or months. A single infected machine
can send out thousands of worm-carrying messages
Installation of Antivirus

"Antivirus" is protective software designed to defend your computer against malicious software.
Malicious software or "malware" includes: viruses, Trojans, key loggers, hijackers, dialers, and
other code that vandalizes or steals your computer contents. In order to be an effective defense,
your antivirus software needs to run in the background at all times, and should be kept updated
so it recognizes new versions of malicious software.

HOW TO INSTALL AVAST PRO ANTIVIRUS?

STEP1: Click on the link below or copy & paste it in to your internet broswer's address
bars.
http://download.cnet.com/Avast-Pro-Antivirus/3000-2239_4-10181058.html?tag=mncol;2

76
SWCET IT WORKSHOP LAB

STEP2: Click on Download Now button.

STEP 3: Wait for the yellow bar to appear and then right click and choose download the
file.

STEP4 : Click on Run & wait the program to be downloaded and run.

77
SWCET IT WORKSHOP LAB

STEP 5: Once download is finished this screen wil come up, click on Next.

STEP6 : Uncheck participation and check custom installation & click Next to continue

78
SWCET IT WORKSHOP LAB

STEP 6.1 Click on Next

STEP 7 : Choose Install in trial mode and click on Next

79
SWCET IT WORKSHOP LAB

STEP 8 : Choose Custom setting and uncheck Network Shield

Click on Next to continue

80
SWCET IT WORKSHOP LAB

Program will install itself

Avast will do a quick scan

81
SWCET IT WORKSHOP LAB

Setup will finish

This window will appear, close it.

82
SWCET IT WORKSHOP LAB

Double click on the license file that is in the attachment " License.avastlic ".

Say yes at this window

83
SWCET IT WORKSHOP LAB

Your installation has been completed, click OK to close.

84
SWCET IT WORKSHOP LAB

TASK 9

Develop Home Page

Creating Html Page

Step -1: we need to start the HTML page with HTML


tags like <html>….<html>….<html>.
Here we can create the title of the page and headers using
following tags . < title>……….< title>
Headers: <h1>, <h2>, <h3>, <h4>, <h5>, <h6>, <h7>.
Step-2: To create the paragraph we use the tag <P>…</p>
Step-3: To create the table we use the tag <table>…</table>
Table tag has the properties like BROADER , ALIGN ,BGCOLOR, Etc..
<tr>..</tr> tag for creating the table row .
<td>..</td> tag for creating the table data.
Step -4: To create the ordered list in the html we use the following tags.
<ul>….</ul> tag for unordered list.
<ol>….</ol> tag for ordered list.
<li>….</li> tag for list value.

HTML code:

<html>
<body>
<center><image src="E:\wasiya01\logo.jpg" width="300px"
height="150px" >
<table border="12" >
<tr>
<th>NAME</th> <td>SWCET</td>
</tr>
<tr>
<th>Roll No</th> <td>13951A----</td>
</tr>
<tr>
<th>BRANCH</th> <td>CSE</td>
</tr>
<tr>

<th>COURSE YEAR</th> <td>SECOND YEAR FIRST SEMESTER-


CSE/IT</td> </tr>
<tr>

85
SWCET IT WORKSHOP LAB

<th>ADDRESS</th>
<td><CENTER>SHADAN WOMENS COLLEGE OF ENGINEERING AND
TECHNOLOGY<BR> KHAIRTABAD</BR><BR>HYDERABAD-
500004</CENTER></td>
</tr>
<tr>
<th>KNOWN LANGUAGES</th> <td>Telugu, English & Hindi</td> </tr>
<tr>
<th>Phone No </th> <td>040-23305553</td> </tr>
<tr>
<th>E-Mail</th> <td>swcetl5@gmail.com</td>
</tr>
</table>
</body>
</html>

86
SWCET IT WORKSHOP LAB

Microsoft Word
Orientation

87
SWCET IT WORKSHOP LAB

TASK -10

Microsoft Word Orientation

Microsoft word
Start > Programs > Microsoft Office > Microsoft Word

88
SWCET IT WORKSHOP LAB

MICROSOFT WORD

USING MS WORD/LaTex
Formatting fonts, drop cap, applying text effects, using character spacing,
borders, and colors, inserting header and footer, using date and time options
using MS Word.

WORKSHEET-1
Sun rolls out network products
BY Brian Robinson
June 2nd 05

O .
fficials at SUN MICROSYSTEMS INC .. introduced a slew of products to boost delivery of network
services, including a new file system for the Solaris operating system, a second release of an identity
management solution and a subscription-based model

Sun's new Dynamic File System provides "16 billion times more capacity" than current
file systems, said Sun's chief executive officer Scott McNealy, making it infinitely scalable.

Solari s10
The file system, which is included as a part of , also automates many of
the tasks that systems administrators now have to do by hand. Creating and growing file
systems has been cut from 28 to just five separate tasks, for example, while adding
mirrored file systems and storage space for users will now take as little as 10 seconds.

The second release of the identity-management solution has three new products
based on the software acquired by Sun with its recent purchase of Waveset
Technologies Inc. The Sun Java System Identity Manager combines user
provisioning with metadirectory capabilities, which Sun claims is an industry first,
enabling administrators to manage identity permissions and profiles and
simultaneously synchronize services for those directories across the enterprise.

The other products include an access manager to help manage access to internal and external
Web-based resources, and an enterprise version of the Sun Java System Directory
Server that includes , load balancing, security and integration with
Microsoft Corp.'s Active Directory.

Sun's Preventive Services is aimed at the data center and is an attempt at what
McNealy called a more simplified way of pricing services than through complex
outsourcing contracts. It includes a portfolio of more than 100 services that
managers can use to find issues that might affect network performance and for
which they pay one price.

I
n general, many of the new announcements also included references to other kinds of
subscription-based pricing, which Sun officials see as a trend among users who increasingly
don't want to own the technology themselves.

Other items introduced June 1 included an array of low-cost storage products, software to
collect and manage data produced by radio-frequency identity systems and a pricing system
aimed specifically at Third World and developing markets through which Sun's Java
Enterprise System would be sold on a per-citizen basis using the United Nation's ranking for
a country's development status.
Robinson is a freelance journalist based in Portland, Ore. He can be reached at
hullite@mindspring.com.
Top 3/11/2015
11:50:28 AM

89
SWCET IT WORKSHOP LAB

Sun rolls out network1 products


BY Brian Robinson
June 2nd 2005 3

O .
fficials at SUN MICROSYSTEMS INC .. introduced a slew of products to boost delivery of network
services, including a new file system for the Solaris operating system, a second release of an identity
management solution and a subscription-based model
that assigns a single price to more than 100 services.
4
2 Sun's new Dynamic File System provides "16 billion times more capacity" than current
file systems, said Sun's chief executive officer Scott McNealy, making it infinitely scalable.
5
Solari s10
The file system, which is included as a part of , also automates many of
the tasks that systems administrators now have to do by hand. Creating and growing file
systems has been cut from 28 to just five separate tasks, for example, while adding
mirrored file systems and storage space for users will now take as little as 10 seconds.
7
6
The second release of the identity-management solution has three new products
based on the software acquired by Sun with its recent purchase of Waveset
Technologies Inc. The Sun Java System Identity Manager combines user
provisioning with metadirectory capabilities, which Sun claims is an industry first,
enabling administrators to manage identity permissions and profiles and
simultaneously synchronize services for those directories across the enterprise.

The other products include an access manager to help manage access to internal and
external Web-based resources, and an enterprise version of the Sun Java System Directory
Server that includes , load balancing, security and integration with Microsoft
Corp.'s Active Directory. 8

Sun's Preventive Services is aimed at the data center and is an attempt at what
McNealy called a more simplified way of pricing services than through complex
9
outsourcing contracts. It includes a portfolio of more than 100 services that
managers can use to find issues that might affect network performance and for
which they pay one price.

I
n general, many of the new announcements also included references to other kinds of
subscription-based pricing, which Sun officials see as a trend among users who increasingly
don't want to own the technology themselves.
Other items introduced June 1 included an array of low-cost storage products, software to
10 collect and manage data produced by radio-frequency identity systems and a pricing system aimed
specifically at Third World and developing markets through which Sun's Java
Enterprise System would be sold on a per-citizen basis using the United Nation's ranking
for a country's development status.

Robinson is a freelance journalist based in Portland, Ore. He can be reached at


hullite@mindspring.com.

Top 11

12

3/11/2015 11:50:28

90
SWCET IT WORKSHOP LAB

Procedure:

1. Set font to:


a. Heading 1 + 16 pt, Bold, Black
i. Select the text you want to change.
ii. On the Format menu open, click Styles and Formatting and select
Heading1.
iii. On the Format menu, click Font, and then click the Font tab and modify the
Font Size, Style and Color.
b. Normal + Verdana, 9.5 pt, Bold, Italic, Dark Blue
i. Select the text you want to change.
ii. On the Format menu open, click Styles and Formatting and select
Normal.
iii. On the Format menu, click Font, and then click the Font tab and modify the
Font, Size, Style and Color.
c. "nd" as superscript
i. Select the text you want to change.
ii. On the Format menu, click Font, and then click the Font tab and select the
Effect.
2. Drop cap
a. Click the paragraph that you want to begin with a "drop cap," a large dropped
initial capital letter.
b. On the Format menu, click Drop Cap.
c. Click Dropped.
3. Set font to:
a. Emboss and Text Color white
i. Select the text you want to change.
ii. On the Format menu, click Font, and then click the Font tab and select the
Effect and Font Color.
b. Grey text shading
i. Select the text you want to change.
ii. On the Format menu, click Borders and Shading, and then click the Shading
tab.
iii. Select Color and click OK.
iv. Alternatively, use the shading button in the toolbar. Select the text and click
on the toolbar.
4. Set font to:
a. Normal + Verdana, Bold, Italic, Black
i. Select the text you want to change.
ii. On the Format menu open, click Styles and Formatting and select
Normal.
iii. On the Format menu, click Font, and then click the Font tab and modify the
Font, Size, Style and Color.
iv.
b. Light green text shading.
i. Select the text you want to change.
i. On the Format menu, click Borders and Shading, and then click the Shading
tab.
ii. Select Color and click OK.
iii. Alternatively, use the shading button in the toolbar. Select the text and click
on the toolbar.
5. Set font to:

91
SWCET IT WORKSHOP LAB

a. Raised and Expanded character spacing


i. Select the text you want to change
ii. On the Format menu, click Font, and then click the Character Spacing tab
and Click Expanded in the Spacing box, and then specify how much space
you want in the By box.
b. Border the given text
i. Select the text you want to change.
ii. On the Format menu, click Borders and Shading, and then click the Borders
tab.
iii. Click Text under Apply to.
6. Strikethrough Font effect
a. Select the text you want to change.
b. On the Format menu, click Font, and then click the Font tab and select the Effect.
7. Underline styling
a. Select the text you want to change.
b. On the Format menu, click Font, and then click the Font tab and select the Underline
Styles.
8. Outline Font
a. Select the text you want to change.
b. On the Format menu, click Font, and then click the Font tab and select the Effect.
9. Paragraph indentation
a. Justify With 1 Inch Right Margin
i. Select the paragraphs in which you want to change spacing.
ii. On the Format menu, click Paragraph, and then click the Indents and
Spacing tab.
iii. Modify Alignment, Indentation and spacing.
iv. View in the Preview section before applying.
v. Alternatively, the toolbar can be used for paragraph alignment.
b. Left Align
c. Justify With 1 Inch Right Margin
d. Center Align
e. Right Align
10. Drop Cap Column
a. Click the paragraph that you want to begin with a "drop cap," a large dropped
initial capital letter.
b. On the Format menu, click Drop Cap.
c. Right Click and select Hyperlink.
d. Under Link to, click Place in This Document. In the list, select the heading or
bookmark you want to link to.
11. Insert Date And Time In Footer
a. On the View menu, click Header and Footer to open the header or footer area on
a page.
b. On the Insert menu, click Date and Time. Select the Date format and
Check/Uncheck Update Automatically option and click OK.
c. When you finish, click Close on the Header and Footer toolbar
i. Create a different first page header or footer
ii. Create different headers or footers for odd and even pages
iii. Create a different header or footer for part of a document

92
SWCET IT WORKSHOP LAB

TASK 11: CREATING PROJECT USING MS WORD /LaTex


Formatting styles, Inserting tables, Bullets and numbering, Changing Text
Directions, Cell alignment, Footnote, Hyperlink, Symbols, Spell Check, Track
Changes using MS Word.

3/11/2015 11:50:28 AM

93
SWCET IT WORKSHOP LAB

JNT University
Job Performance Review Guide
Employee
Review
Employee Name Period
Manag
Department er

Performance goals and objectives


Zero to 2 months 2 to 4 months 4-6 months

 Become familiar with your  Make certain defined goals and  Review performance goals to see if
department’s business goals. criteria are realistic. Renegotiate if you are on target. Reprioritize work
necessary. accordingly.
 Work with your manager to define
and document your goals. Include  Are you focusing your time on the
what you are expected to produce goals you committed to? If not,
by your first review, activities either work with your manager to
needed to accomplish results, and change your goals or reevaluate
success criteria. how you spend your time.
NOTES/ACTIONS

Skills and knowledge development


Zero to 2 months 2 to 4 months 4-6 months

a. Understand the specific skills and d. Attend one of the sessions in the f. Attend at least one more session
knowledge you need. Use the job Administrator certification in the Administrator certification
profile as your guide. program. See the training program.
resource site for courses.
b. Build a skill development plan g. Create a timeline with associated
based on the goals agreed to e. Review your development plan
tasks that you will follow in order
by you and your manager. and suggested curriculum for
additional skills and training. to attain the skills outlined in your
c. Complete the new administrator personal development plan.
orientation.

NOTES/ACTIONS

Processes and Methods


Zero to 2 months 2 to 4 months 4-6 months

94
SWCET IT WORKSHOP LAB

Employee
Employee Name Review Period

Department Manager

ncommonwor
Familiarize yourself with work  Identify and eliminate unnecessary

functionalityi
processes and methods used in

kprocesses.
Gettoknow

S e ekt o si m pl i f y an y wo rk pr o c es se si no r de rt oc ut cy cl e ti m e.
your job. Be clear on who owns

thepeople
whowork
those processes and how you variation in the way you perform

cross-
can support process goals. work processes.
Set clear timelines for task due  Ensure that your work
dates. Keep timelines up to date.
responsibilities are clear, defined,
and realistic.


Feedback1
Zero to 2 months 2 to 4 months 4-6 months

Are you giving feedback to others


Are you getting the feedback you
who need it?
need? Is feedback timely, specific,
Understand the different types of and
frequent? Compare actual
feedback and the ways in which you performance Compare actual and expected
will receive feedback. and expected performance. performance.

2
All Rights Reserved by SVEC, IT . Any part of the content can be used or reproduced only with
the permissions from the authors.
1

95
SWCET IT WORKSHOP LAB

JNT University 1
Job Performance Review Guide

Employee
Review
Employee Name Period
Manag
Department er
Performance goals and objectives
Zero to 2 months 2 to 4 months 4-6 months
2
 Become familiar with your  Make certain defined goals and  Review performance goals to see if
department’s business goals. criteria are realistic. Renegotiate if you are on target. Reprioritize work
necessary. accordingly.
 Work with your manager to define
and document your goals. Include  Are you focusing your time on the
what you are expected to produce goals you committed to? If not,
by your first review, activities either work with your manager to
needed to accomplish results, and change your goals or reevaluate
success criteria. how you spend your time.

3 Skills and knowledge development


Zero to 2 months 2 to 4 months 4-6 months

h. Understand the specific skills


and k. Attend one of the sessions in the m. Attend at least one more session
knowledge you need. Use the
job Administrator certification in the Administrator certification 4
profile as your guide. program. See the training program.
resource site for courses.
Create a timeline with
i. Build a skill development plan n. associated
based on the goals agreed to l. Review your development plan tasks that you will follow in
and suggested curriculum order
by you and your manager. for
to attain the skills outlined in
additional skills and training. your
j. Complete the new administrator personal development
plan.
orientation.
NOTES/ACTIONS
5
1
Kindly provide your feedback.
2
© shadan womens
college of engineering and
technology, 2017-18

96
SWCET IT WORKSHOP LAB

Employee
Employee Name
Review Period
Department
Manager
Processes and Methods
8Zero to 2 months

m
m

w
u
n

o
n

o
n

k
p

o
c

c
e

e
s
s

s
r

m
t
i

l
i
t

i
w

.
y

n
y

k
p

n
o

y
a

c
e

e
s
s

s
r

r
i

t
i

.
Familiarize yourself with 4-6 months
2 to 4 months
work processes and
Identify and eliminate 6

Gettoknow
methods used in your job.
Be clear on who owns those unnecessary
processes and how you can
support process goals. variation in the way you perform
work processes.
Set clear timelines for task
due dates. Keep timelines Ensure that your work
responsibilities are clear,
up to date. defined,
Feedback1 and realistic.
Zero to 2 months

Understand the different types


of feedback and the ways in 2 to 4 months 4-6 months
which you will receive Are you getting the feedback you Are you giving feedback to others
feedback. need? Is feedback timely,
specific, and who need it?
frequent? Compare actual
performance Compare actual and expected
and expected performance.
7
8

97
SWCET IT WORKSHOP
LAB

Procedure:

1. Table:
b. Border Style
i. Select table
ii. On the Format menu, click Borders and Shading, and
then click the Borders tab
iii. Click Paragraph under Apply to, click Options, and
then select the options you want.
c. Cells Split
i. On the Table menu, click Split Cells
ii. Select the number of columns or rows you want
to split the selected cells into.
d. Cells Merge
i. Select cell to merge
ii. On the Table menu, click Merge Cells
e. Cell Shading
i. Select cell to Shade
ii. Right click, select borders and shading, shading tab, select color.

2. Paragraph Border
a. Select Paragraph
b. On the Format menu, click Borders and Shading, and then
click the Borders tab
c. Click Paragraph under Apply to, click Options, and then
select the options you want.

3. Bullets and numbering


a. Select the text that you want to change
b. On the Formatting toolbar, click Bullets and Numbering
c. In numbers tab choose style and click on continue previous list.

4. Paragraph Bordering
a. Select Paragraph
b. On the Format menu, click Borders and Shading, and then click the
Borders tab
c. Click Paragraph under Apply to, click Options, and then select the
options you want.

98
SWCET IT WORKSHOP
LAB

5. Bullets
a. Select the text that you want to change
b. On the Formatting toolbar, click Bullets and Numbering
c. In bulleted tab choose style.

6. Text Direction
a. Click the table cell that contains the text you want to change
b. On the Format menu, click Text Direction and Click the orientation you
want

7. Cell Alignment
a. Click the cell that contains text you want to align
b. On the Tables and Borders toolbar, select the option for the horizontal and
vertical alignment you want— for example, Align Bottom Center or
Align Top Right

8. Footnote
a. On the Insert menu, point to Reference, and then click Footnote
b. In the Number format box, click the format you want and click Insert.
c. Word inserts the note number and places the insertion point next to the
note number. Type the note text.

99
SWCET IT WORKSHOP
LAB

Task 12

CREATING A NEWSLETTER USING WORD/


LaTex
Table of content, News columns, Images from files and clipart, Drawing toolbar and Word
Art, Formatting Images, Textboxes and Paragraphs using MS Word.

100
SWCET IT WORKSHOP LAB

Why is Lucerne
publishing a great
place to work?
A great place to work  Dynamic people

 Team-oriented environment

 Exciting location

 Excellent benefits

 Competitive salaries

 Opportunity for advancement

Enjoy your work

Contact us at:
Why do our
Lucerne Publishing
employees
1234 Maple Street
enjoy working
Suite 567
at?
Seattle, WA 33445
Phone: (123) 555-0123
Lucerne Publishing is an Equal Fax: (123) 555-0145
http:://www.lucernepublishing.com
Opportunity Employer.

101
SWCET IT WORKSHOP LAB

Company Profile If you’re looking for a career at an


Lucerne Publishing, family owned extraordinary company in an exciting Benefits Overview
since 1965, is a leader in the city, Lucerne Publishing is the place for Lucerne Publishing offers a
publishing industry. you! Meet our Employees comprehensive benefits plan designed to
meet the needs of all our employees:
When we opened our doors more than Why do our employees enjoy working
35 years ago, we had a staff of 3. In at Lucerne Publishing? We asked, and
2002, we had more than 1,000 this is what they had to say:  Medical insurance

employees in 10 cities worldwide.  Dental insurance
“Working at Lucerne Publishing for 
Lucerne Publishing is a dynamic  Vision insurance
the last five years has been a dream 
company known for its casual, team-  401(k) retirement plan with
come true. The company is built on
oriented work environment. We provide matching contributions
opportunities for career growth and the belief that the employees are the 
advancement to employees at all levels. key to success.”  Short-term and long-term
In addition, Lucerne offers excellent disability coverage

benefits and competitve salaries. -Michael, Marketing Specialist  Life insurance

Our corporate headquarters is located in “The opportunites for growth at  Flexible spending accounts

Seattle, Washington, where our Lucerne Publishing are tremendous.  Two weeks paid vacation
employees enjoy the best of city life and 
the great outdoors. Seattle is known for
I have a career with this company,  Eight paid holidays
not just a job.” 
its music, fine dining, and night life. Of
 Profit sharing
course, if you prefer the outdoors, the 
beautiful Pacific Northwest offers a -Susan, Administrative Assistant  Tuition reimbursement
wonderful playground with mountains,
rivers, lakes, and the ocean. Whatever “Lucerne Publishing cares about
your pleasure, from skiing to sailing, you the employees. The support that
can find it here. I’ve received while working here -Vicki, Quality Assurance Specialist
has been incredible.”
For information on open
positions or to submit your
For information on open positions -Vicki,
resume, please visit our Web Quality Assurance Specialist or to submit
site at: your resume, please

www.lucernepublishing.com visit our Web site:


http://www.lucernepublishing.
com

102
SWCET IT WORKSHOP LAB

Why is Lucerne
publishing a great
place to work?
3
 Dynamic people
1  Team-oriented environment
A great place to work
 Exciting location
 Excellent benefits 5

 Competitive salaries
 Opportunity for advancement

Enjoy your work

4
2
Contact us at:
Why do our
employees Lucerne Publishing
enjoy working 1234 Maple Street
at?
6 Suite 567 Seattle,
WA 33445
Phone: (123) 555-0123
Fax: (123) 555-0145
http:://www.lucernepublishing.com
Lucerne Publishing is an Equal
Opportunity Employer.

103
SWCET IT WORKSHOP LAB

7
Company Profile If you’re looking for a career at an Benefits Overview
Lucerne Publishing, family owned extraordinary company in an exciting
since 1965, is a leader in the city, Lucerne Publishing is the place for
publishing industry. you! Meet our Employees
Lucerne Publishing offers a
When we opened our doors more than Why do our employees enjoy working comprehensive benefits plan designed
35 years ago, we had a staff of 3. In at Lucerne Publishing? We asked, and to meet the needs of all our employees:
2002, we had more than 1,000 this is what they had to say:
employees in 10 cities worldwide.
 Medical insurance
“Working at Lucerne Publishing for 
Lucerne Publishing is a dynamic the last five years has been a dream  Dental insurance
company known for its casual, team- 
come true. The company is built on  Vision insurance
oriented work environment. We provide 
opportunities for career growth and the belief that the employees are the  401(k) retirement plan with
advancement to employees at all levels. key to success.” matching contributions
In addition, Lucerne offers excellent 
benefits and competitve salaries. -Michael, Marketing Specialist  Short-term and long-term
disability coverage

Our corporate headquarters is located in “The opportunites for growth at  Life insurance
Seattle, Washington, where our 
Lucerne Publishing are tremendous.  Flexible spending accounts
employees enjoy the best of city life and
I have a career with this company, 
the great outdoors. Seattle is known for  Two weeks paid vacation
its music, fine dining, and night life. Of not just a job.” 
course, if you prefer the outdoors, the  Eight paid holidays

beautiful Pacific Northwest offers a -Susan, Administrative Assistant  Profit sharing
wonderful playground with mountains, 
rivers, lakes, and the ocean. Whatever “Lucerne Publishing cares about  Tuition reimbursement
your pleasure, from skiing to sailing, you the employees. The support that
can find it here.
I’ve received while working here
has been incredible.”
-Vicki, Quality Assurance Specialist
For information on open
positions or to submit your
resume, please visit our Web
site at:
www.lucernepublishing.com
For information on open
positions or to submit your
8 9 resume, please visit our Web
site at:
www.lucernepublishing.com
104
SWCET IT WORKSHOP LAB

105
SWCET IT WORKSHOP LAB

Procedure:

1. Word Art
a. On the Drawing toolbar, click Insert WordArt.
b. Click the WordArt effect you want, and then click OK.
c.
2. Clipart
a. On the Insert menu, point to Picture, and then click Clip Art
b. Search for box, type a word or phrase that describes the clip you want.
c. Or insert from a file by Selecting From File instead of Clip Art in “point a”.
3. Textbox, Text Formatting And Paragraph Border
a. On the Drawing toolbar, click Text Box.
b. Click or drag in your document where you want to insert the text box.
4. Textbox Over Image, Auto Shape
a. Insert the image and the text box.
b. Select the image.
c. On the Drawing toolbar, click Draw, point to Order, and then click Send to
Back.
d. Alternatively, Right Click on the object and point to Order, and then click
Send to Back.
5. Drawing
a. Use the AutoShapes by clicking on it, or use the shapes present in the
Drawing toolbar.
b. Resize and Rotate using the handle. Drag the rotate handle on the object in the
direction you want to rotate it. Use various resize handles to get your custom
shape.
c. Right click and select Format AutoShape to modify the color and pattern.
6. Textbox
7. Columns
a. Select the text.
b. On the Format menu click Columns.
c. Drag to select the number of columns you want.
d. Check the Line between option.
8. Text Box
Hyperlink

106
SWCET IT WORKSHOP LAB

CREATING A FEEDBACK FPRM USING


WORD/LaTex
Forms, Text Fields, Inserting objects, Mail Merge using MS Word.

Feedback Form
Date: 3/11/2015

Faculty Name: SIMRAH SANA Subject: DSP Year/Semester: III/IV 1st Sem

Optional

Student Name: Roll Number: Branch: CSE

Review Guidelines

Complete this peer review, using the following scale: NA = Not Applicable
1 = Unsatisfactory
2 = Marginal
3 = Meets Requirements
4 = Exceeds Requirements
5 = Exceptional

Evaluation
(5) = (4) = Exceeds (3) = Meets (2) = (1) =
Exceptional Requirements Requirements Marginal Unsatisfactory

Required Skills And


Knowledge in the Class

Response To Questions

Ability To Learn And


Teach New Skills

English Speaking Skills

Making Students To
Involve In The Class
The Way Syllabus is
Covered

107
SWCET IT WORKSHOP LAB

1
Feedback Form
Date: 3/11/2015
5

Faculty Name: SIMRAH SANA Subject: DSP Year/Semester: III/IV 1st Sem

Optional

Student Name: Roll Number: Branch: CSE


3
2
Review Guidelines

Complete this peer review, using the following scale: NA = Not Applicable
1 = Unsatisfactory
2 = Marginal
3 = Meets Requirements
4 = Exceeds Requirements
5 = Exceptional

Evaluation
(5) = (4) = Exceeds (3) = Meets (2) = (1) =
Exceptional Requirements Requirements Marginal Unsatisfactory

Required Skills And


Knowledge in the Class

Response To Questions
4
Ability To Learn And
Teach New Skills

English Speaking Skills

Making Students To
Involve In The Class
The Way Syllabus is
Covered

108
SWCET IT WORKSHOP LAB

Procedure:
1. Insert Date from “Date and Time” Option.
2. Form Field – Text Form Field
a. To display the Forms toolbar, point to Toolbars on the View menu, and then click Forms.
b. In the document, click where you want to insert the form field.
c. Click Text Form Field.
3. Form Field – Drop-Down Form Field
a. In the document, click where you want to insert the form field.
b. Click Drop-Down Form Field.
c. If needed, a user can scroll through the list to view additional choices.
d. To edit these fields, you must use the Form Field Options button on the Forms toolbar.
4. Form Field – Check Box Form Field
a. In the document, click where you want to insert the form field.
b. Click Check Box Form Field.
c. To edit these fields, you must use the Form Field Options button on the Forms toolbar.
5. Mail Merge
a. On the Tools menu, point to Letters and Mailings, and then click Mail Merge.
b. Word displays the Mail Merge task pane.
c. Select type as “Letters” and click “Next: Starting Document”.
d. Click Use the current document, and Click “Next: Select recipients”.
e. Under Select recipients, click Use an existing list.
f. Click Browse.
g. In the Select Data Source dialog box, locate and click the data source you want.
h. Browse for the given “List.txt” file., and Click Open.
i. All of the entries in the data source appear in the Mail Merge Recipients dialog box,
where you can refine the list of recipients to include in the merge.
j. Click Next: Write your letter.
k. Click on the location where you want to put a merge field. Click on more items.
l. Select and Insert the merge field at that location.
m. Click Next: Preview your letters.
n. To preview the items in order, click the arrow buttons.
o. To exclude a particular recipient from the merge, click Exclude this recipient.
p. Click Next: Complete the merge.
q. You can either print all the letters or Edit individual letters
i. Click Edit individual letters.
ii. To merge all the documents, click All.
iii. Save it to a separate document for future use.

109
SWCET IT WORKSHOP LAB

TASK 13
Spreadsheet Orientation

MICROSOFT EXCEL

Microsoft Excel is one of the most widely used Spreadsheet applications for performing
financial, statistical and computational analysis for the purpose of business and
administration.
The tool is so flexible enough to get integrated with other applications for providing the
best output. For instance, it can be integrated to web servers and the students marks,
percentile etc. calculated can be generated onto the web. Similarly it can be integrated
with the other Office Applications for providing Charts, Statistics etc. It can also be
used as a backend database for any applications involving high-end calculation of the
data that is stored.
Method1: Method2:
1. Click on start button 1. Click on Start button
2. Click on programs 2. click run
3. Click on Ms-office 3. type the Excel
4. Click on Excel 4. After click ok button

Excel is an electronic spreadsheet program that can be used for storing, organizing and
manipulating data

Work Book: Collection of sheets is nothing but work book.


Work sheet: Collection of cells [65536x256]
Cells: Combination of rows & columns
Row: Horizontal line [1, 2,3,……]
Column: Vertical line [A, B, C, ……………..]
Cell address: Column name followed by Row name
Ex :( A1, B10, H2, C3…)

New Work Book: (ctrl+N)


1. Click on file menu
2. click on new [It will appears
dialog box]
3. Click on blank work book
4. Default file
name(bok1,book2,….)
5. Extension Excel file.XLS

Close the Work book: (ctrl+w)


1. Click on the file menu
2. click on close

Save the work Book(Ctrl+s):

110
SWCET IT WORKSHOP LAB

1. Click on file menu


2. Click on Save
3. Type the file name
DEFAULT SETTING

1. Sheets --3
2. Font -Arial
3. Font size -10
4. Row Hight-12.75
5. Column Width-8.43
6. Font Style regular
7. Font Color-Black
8. Text alignment-Left
9. Numbering alignment =-Right alignment

Insert the work Sheet:

1. Click on the insert menu


2. Click in work sheet
Delete the work Sheet:
1. Click on the edit menu
2. Click on delete sheet

Rename the work sheet:

1. Click on format menu


2. Click on the sheet
3. Click on the rename
4. type the sheet name
5. After press enter key

111
SWCET IT WORKSHOP LAB

Navigation in spread Sheet

To move the cell pointer to the left row Side -- (left arrow)
To move the cell pointer to the up row Side - up arrow)
To move the cell pointer to the down t row Side -- (down arrow)
To move the cell pointer to the right row Side (right arrow)

To move the cell pointer to the first column in same row (“HOME”)
To move the cell pointer to the last column in last row (“CTRl+RIGHT ARROW”)) To move the cell
pointer to the first column in same row CTRl+LEFT ARROW”)) To move the cell pointer to the same
row column same row (CTRl+LEFT ARROW”)

112
SWCET IT WORKSHOP LAB

Task 14

Calculating GPA

FUNCTIONS:

1. Text functions
2. Date and Time Functions
3. Math functions
4. Logical functions

TEXT FUNCTIONS
1 CONCATENATE (): Single text item after join
the arguments

Syn: =CONCATENATE(text1,text2)
EX: =CONCATENATE(A2," : ",B2) or =CONCATENATE(raju," ",m)
After press enter key o/p: raju m

2 EXACT():true arguments are initial else or false case sentence


Syn: =EXACT(text1,text2)
Ex: =EXACT("cnu","somu")
Output: fasle.

3 . FIND():position of the first arguments with in second the third arguments can used to
specified the string point of search.
Syn: =FIND(find text1,within text2,start number)
Ex: = =FIND("computers","aptech computers",2)
Out put:8

4 LEFT():No of characters specified by the second argument counting the left strart
Syn: =LEFT("text",number)
Ex: =LEFT("computers",3)
Out put :com

5 RIGHT():No of characters specified by the second argument counting the left strart
Syn: = RIGHT ("text",number)
Ex: = RIGHT ("computers",3)
Out put :ers

113
SWCET IT WORKSHOP LAB

6 LOWER():upper case character in a string converted to lower case


Syn : =LOWER("text")
Ex: =LOWER("COMPUTERS")
Out put : computer

7 UPPER():upper case character in a string converted to upper case


Syn : = UPPER ("text")
Ex: = UPPER ("computer ")
Out put : COMPUTERS computer

Mathematical Function:
Ex:

NAMES SYNTAX SYNATX


SUM =A1+B1+C1 =SUM(A1:E1)
= =AVERAGE(A1
AVERAGE (A1+B1+C1)/3 :C1)
=MAX(A1+B1
MAX +C10 =MAX(A1:C1)
FACT =FACT(A1) =FACT(B1)
MUTLIFLICAT =MMULT(A1,B
ION =A1*B1 1)

114
SWCET IT WORKSHOP LAB

MARKS SHEET
Aim: Create a marks sheet for 10 students using EXCEL.
Steps:

1 Open MS-EXCEL by clicking on START Button, go to Programs then click on


Microsoft Office then select Microsoft Office Excel 2007.
2 Write the title name is Sree Chaitanya College of Engineering at (A1 address)
3 Write the sub title name is I.B.Tech IT MARKS SHEET at (A2 address).
4 Now write the requirements fields for calculation of marks, like S.No,H.T.No,subjects,Grand
Total & Percentage from A3 to O3 cells as follows
E E CP PHY/CHE ELC
S.No H.T.No ENG PHY CHE M-1 MM CPDS ED LAB LAB LAB ITWS G.TOT %

5 Write S.no’s from 1-10 in A4 - A13 cell addresses and H.T.No’s from B4- B13.

5 Now enter the marks in C4 – M13 cell addresses.


7 Now in the G.Total cell,select N4 cell and apply the formula for adding the marks
contained in C4 –M4 cell addresses in the formula bar as

fx= C4+D4+E4+F4+G4+H4+I4+J4+K4+L4+M4 then press ENTER key.

8 Select the N4 cell and drag towards down for further students calculations.

9 Now calculate the Percentage.For that select O4 cell and type % calculation formula in
Formula bar as fx=N4/1000*100
10 Select the O4 cell and drag towards down for further students results.
11 Now the % appears in decimal values,now in order to appear the values as rounded
values,select the O4 cell then right click the mouse button , select Format cells then Numbers
and now make decimal places to 0(zero) then click OK.Now again drag for other cell values to
be rounded.

115
SWCET IT WORKSHOP LAB

12 Now for keeping the borders,select cells from A1 – O13 and select All Borders on the
home Menu.
13 Now for saving click on OFFICE button and click on Save and type file name as
“Marks Sheet”,then click OK.
OUTPUT:

SHADAN WOMENS COLLEGE OF ENGINEERING & TECHNOLOGY


I B.Tech IT MARKS SHEET

E E CP PHY/CHE ELC
S.No H.T.No ENG PHY CHE M-1 MM CPDS ED LAB LAB LAB ITWS G.TOT %

1 10L51A1213 71 42 54 66 80 67 86 73 70 67 70 746 75

2 10L51A1215 62 64 71 46 60 66 70 69 51 46 67 672 67

3 10L51A1216 52 62 63 49 78 58 97 71 58 55 69 712 71

4 10L51A1217 72 43 51 47 34 68 61 67 69 58 60 630 63

5 10L51A1219 76 62 28 38 61 52 27 73 65 57 63 602 60

6 10L51A1224 78 65 27 19 49 50 31 65 64 62 59 569 57

7 10L51A1225 69 52 76 42 72 62 54 65 72 56 67 687 69

8 10L51A1229 70 85 90 46 76 79 79 71 68 57 73 794 79

9 10L51A1236 75 62 47 46 78 52 41 70 64 57 71 663 66

10 10L51A1237 72 69 85 21 60 70 77 66 45 66 60 691 69

116
SWCET IT WORKSHOP LAB

TIME TABLE
Aim: Create your class time table by using different formatting styles.
Steps:

1. Open MS-EXCEL by clicking on START Button,go to Programs then click on Microsoft


Office then select Microsoft Office Excel 2007.
2. Write the title name is Sree Chaitanya College of Engineering at (A1 address)
3. Write the sub title name is I.B.Tech IT TIME TABLE FOR ACADEMIC YEAR
2011-2012 at (A2 address)
4. Write the date is =Today() at G3 address
5. Write the fields A4 address to J4 address location
6.
In the above format the DAY/TIME will appear as above by right clicking the mouse button on
A4 cell and go to Format cells and select Alignment .In that under the Text control select tick on
wrap text then click on OK button

7. Write the MON at A5 address location and drag cell with auto fill option up sat(A10
address)

8. Write subject name MM fill all cells if you have lab hour’s like ITWS LAB, Enter the
lab name leave 2 cells.
9. If any break or lunch leave the cell
Formatting Styles:
10. Select the cell A1 to J1, click on HOME then click the merge and center button, set font
size to 16.
11. Select the cell A2 to J2, click on HOME then click the merge and center button, set font
size is 12.
12. Select the cell address G5 to G10, click on merge and center button, then type
“LUNCH” and click on orientation button & select “Vertical Text”.

117
SWCET IT WORKSHOP LAB

13. Fill the cells with particular subjects according to schedule.


14. Write “MM” in B5, “M-1” in C5 and so on.
15. Select D5&D6, click on merge & center button then type “BREAK”, click on
orientation & select “”Vertical Text”.
16. Select H5, I5,J5 cells & type “PHY/CHE LAB”.
17. Repeat above steps for the remaining cells B5 to J5.
18. At last select A1 to J10 cells and keep borders by clicking on Borders Button and select
All Borders.
19. At last save the file by clicking on office button then “save”, give file name as Time Table
then press “ok”.
OUTPUT:

118
SWCET IT WORKSHOP LAB

TASK 15
Microsoft Power Point

PowerPoint is a presentation tool in which the presentation is displayed as a slide show.


Finished presentations can be shown as:
As slides in slide projector
As overheads on an overhead projector
As a web page
From a screen projector linked to a computer
Open Microsoft PowerPoint 2007:
1. Click on Start button,
2. goto All programs,
3. click on Microsoft Office,
4. select Microsoft Office Power Point2007.
Creating a New Presentation:
After opening MS PowerPoint 2007, select “Blank Presentation”and click on Create.

Saving your Presentation:


1. To save your document, simply click on the MS 2007 logo in the top left‐hand
corner and the menu bar that you see on your right here will drop down giving you
various options, including saving.
2. When you save a workbook in MS Excel 2007, it automatically saves with “.pptx”as
its extension.
3. However, you can also save your presentation so that it’s readable by earlier
versions of MS PowerPoint (97 – 2003) by simply selecting “PowerPoint 97‐2003
Presentation”when choosing what file type to save as (please see the screenshot below).

Getting Help in MS PowerPoint 2007:

119
SWCET IT WORKSHOP LAB

• To get help in Excel 2007, look for the help icon in the top right‐hand corner
of the screen and click on it.
You will be presented with a window that looks like the one here below.

Slide Master
1. On the master slide you can set the default “look”for each slide.
NOTE, the slide master is different than a theme in the sense that the slide master is
used to add default content (which can include background pictures) to your
presentation and a theme is used toadd a default art style to your presentation.
2. •All objects that you place on the master slide will be placed oneach slide.
3. •The master slide contains placeholders that can be formatted.
4. •You can set the attributes for the text (Size, Weight, Font) andyou can also set
the background images and background colour.
5. •You can also set the style of bullets to be used.
6. To access the slide master, go to the Viewtab and select “Slide Master”

120
SWCET IT WORKSHOP LAB

Inserting a Slide:

To insert a new slide…


–From the Hometab, select “New Slide”

‐As well, you can right‐click between any 2 slides in the preview frame located on the
left‐hand side of the Normal view and select “New Slide”

121
SWCET IT WORKSHOP LAB

Deleting a Slide:
To delete a slide…
–Select the slide you’d like to delete (eg. by highlighting it) and selecting “Delete
“from the Hometab –As well, you can right‐click on any slide in the preview frame
located on the left‐hand side of the Normal view and select “Delete Slide”

Inserting Pictures:

To insert pictures…
–From the Inserttab you can insert pictures from your computer, clip art, shapes, etc…
–Also, when you have a blank slide (or parts of a blank slide), you can also click on
options within these blank compartments to insert pictures.

Inserting Charts:

To insert charts…
–From the Inserttab you can insert pictures from your computer, clip art, shapes, etc…
–Also, when you have a blank slide (or parts of a blank slide), you can also click on
options within these blank compartments to insert charts.

•Once you’ve selected to insert a chart, it will ask you choose what kind of chart you’d
like to insert.

•After you’ve picked a type, the screen will split in half with the chart on one side and an
excel spreadsheet on the other

122
SWCET IT WORKSHOP LAB

–To modify the chart, make changes in the data presented in the
spreadsheet – Charts from Excel can also be copied and pasted into
PowerPoint
Inserting Tables:

To insert a table…
–From the Insert tab, select “Table “and a box will drop down giving you more options
for inserting a table. –Also, when you have a blank slide (or parts of a blank slide), you
can also click on options w/n these blank compartments to insert tables

•Normal viewis the default view

•Slide Sorter displays all the slides in consecutive order as thumbnails.


•Notes Page is similar to the normal view except the slides are reduced in size
and located in the upper portion of the screen with the lower portion of the
screen being allocated for adding notes to the slide.

•Slide show is the presentation where the slides are enlarged to fit the entire screen.
Animations

123
SWCET IT WORKSHOP LAB

•All sorts Animation Effects can be added to your slides and the best way to find
out what works best for your presentation is to play around and experiment with
all the different options.
•But first, a cautionary note. Many bad presentations will overly rely on animations (and
other stylistic effects) to keep the audience interested (probably because the presentation
itself was less than riveting). The best presentations are the ones that effectively use
animations as an aid in presenting information, rather than distracting from it. In short, a
good rule of thumb to remember would be “Less is more.” •Animating objects on a
slide…
1.Go to the Animationstab.
2.Select/Highlight an object on the slide (this could be the title, the main body of text,
a textbox, a picture, a shape, a chart, a table, a bullet point, etc…
3.Click on “Custom Animation”

124
SWCET IT WORKSHOP LAB

EXAMPLE OUTPUT

 Linux:
 processes stored in Linked List
 FIFO scheduler schedules jobs using queue
 function calls push memory onto stack

 Extension of Linked List structure:


 Each node connects to multiple nodes
 Example usages include file systems, Java
class hierarchies
 Fast searchable collections

Das könnte Ihnen auch gefallen