You are on page 1of 20

IT SKILLS

(1 &2)Write an algorithm and flowchart for programmable problems Example for Reference: • Add/subtract two numbers •
Find the largest/smallest of 3 numbers • Calculate and print sum of 'N' numbers

1. Add/subtract two numbers

Algorithm:

step 1: Start
Step 2: Declare variables num1, num2 and sum.
Step 3: Read values for num1, num2.
Step 4: Add num1 and num2 and assign the result to a variable sum.
Step 5: Display sum
Step 6: Stop
Flowchart:
 

2.Find the largest/smallest of 3 numbers

 Algorithm :
o  Step 1 : Start
o  Start 2 : Input A, B, C
o  Start 3 : Let max = A
o  Start 4 : if B > max then max = B
o  Start 5 : if C > max then max = C
o  Start 6 : Output max is largest
o  Start 7 : Stop

Flowchart :
3.Calculate and print sum of 'N' numbers

Algorithm:
    Step 1 : Start
    Step 2 : Assign sum=0 and i=0
    Step 3 : Read limit of number , n
    Step 4 : Repeat steps 5 to 6 until i=n reached
    Step 5 : Compute sum=sum+i
    Step 6 : Compute i=i+1
    Step 7 : Print sum
    Step 8 : Stop

  Flowchart :

3.Design and create simple game using MIT-scratch/Code.org

Refer https://scratch.mit.edu/

4.Design and create simple android application (MIT App Inventor)


Refer https://studio.code.org/projects

5. Design and create webpage for displaying your poem (Title, header, paragraph, formatting tags)

<html>
<head>
<title>Simple poem</title>
</head>
<body>
<h1 align=”center”>the fat cat</h1>
<p align=”left”>
<i> I had a cat </i></br>
<i> who was soft </i></br>
<i> he could not even </i></br>
<i> sit on a mat </i></br></p>
</body>
</html>
6.Design and create webpage for your wish list (What you want to do). Also list challenges and opportunities
along with images to present your dreams (List ordered and unordered, Image, table\

//pgm6.html

<html>

<head>

<title>web page using table and lists</title>


</head>
<body>
<table border="4">
<tr>
<td>
<img src="Tulips.jpg" width=100% height=100% alt="HTML" />
</td>
<td>
<img src="Desert.jpg" width=100% height=100% alt="Javascript" />
</td>
<td>
<img src="Jellyfish.jpg"width=100% height=100% alt="css" />
</td>
</tr>
<tr>
<td>
<h2>HTML</h2>
<p>I started out with HTML. I can create simple websites, just like this one.</p>
</td>
<td>
<h2>Javascript</h2>
<p>something about javascript.</p>
</td>
<td>
<h2>css</h2>
<p>cascading style sheet</p>
</td>
</tr>
</table>
<h2>What I have learned today</h2>
<ul>
<li>How to create tables</li>
<li>How to merge cells</li>
<li>What does semantics mean</li>
<li>How to create an unordered list</li>
</ul>
<h2>My subjects</h2>
<ol>
<li>computer fundamentals</li>
<li>mathamatics</li>
<li>electricals</li>
<li>it skills</li>
</ol>
</body>
</html>

7. Design and create webpage using HTML and CSS about an awesome animal (Use necessary CSS tags)
//pgm7.html
<html>
<head>
<link rel="stylesheet" type="text/css" href="1.css">
</head>
<body>
<h1> Awesome Animal</h1>
<img src="Koala.jpg" />
description about any animal you like
</body>
</html>

//1.css
body
{
background-color:pink;
}
h1
{
color:maroon;
font-size:50px;
}
img {
border-radius: 50%;
float:right;
height:170px;
width:170px;
margin-right:15px
}

8. Design and create web page for a travel book/recipe book with more than 3 pages, table to list
places/recipes (iframe, hyperlink)
//receipe.html
<html>
<head>
<title>Project: Recipe book</title>
</head>
<body>

<h1> Recipe Book</h1>


<h2>Contents:</h2>
<ol>
<h1>PARTA</h1>
<li><a href="parta.html"> <img src="parta.jpg"/ width="50%" height="25%"/></br></a></li>

<h1>GOBI MANCHRIAN</h1>
<li><a href="gobi.html"><img src="gobi.jpg"/ width="50%" height="25%" /></br></a></li>

<h1>HAKKA NODDLES</h1>
<li><a href="hakka noddles.html"><img src="hakkanoddles.jpeg" width="50%" height="25%" </a></li>

</ol>
</body>

</html>

//parta,html
<h2 ><U>PARATA</h2>
<ul>
<li>Time: _</li>
<li>Serves: _</li>
</ul>
<h3>Ingredients quantity</h3>
<p><strong>Step 1:</strong>firstly, in a large kadai heat 4 tsp oil and saute 2 clove garlic,1 inch ginger
and 1 green chilli on high flame.
also, saute ¼ onion and 2 tbsp spring onion on high flame.
further add ½ capsicum and continue to saute till they slightly change colour.
additionally add 2 tbsp tomato sauce, 1 tsp chilli sauce, 2 tsp vinegar, 2 tsp soy sauce, ¼ tsp pepper and ¼ tsp salt.
mix well and saute for a minute.
add cornflour slurry.
give a good mix until the gravy slightly thickens and turns translucent.
</p></br>
<a href="hakka noddles.html">next reciepe</a></em></br>
<a href="recipe.html">home page</a></em>

//hakkanoddles.html
<h2 ><u>HAKKA NODDLES</h2>
<ul>
<li>Time: 9:00_</li>
<li>Serves: 9:15</li>
</ul>
<h3>Ingredients quantity</h3>
<p><strong>Step 1:</strong>firstly, in a large kadai heat 4 tsp oil and saute 2 clove garlic,1 inch ginger and 1
green chilli on high flame.also, saute ¼ onion and 2 tbsp spring onion on high flame.
further add ½ capsicum and continue to saute till they slightly change colour.
additionally add 2 tbsp tomato sauce, 1 tsp chilli sauce, 2 tsp vinegar, 2 tsp soy sauce, ¼ tsp pepper and ¼ tsp salt.
mix well and saute for a minute.
add cornflour slurry.
give a good mix until the gravy slightly thickens and turns translucent.
</p></br>
<a href="gobi.html">next receipe</a></em></br>
<a href="recipe.html">home page</a></em>

//gobi.html
<h2 ><U>GOBI MANCHURAIAN</h2>
<ul>
<li>Time: _</li>
<li>Serves: _</li>
</ul>
<h3>Ingredients quantity</h3>
<p><strong>Step 1:</strong>firstly, in a large kadai heat 4 tsp oil and saute 2 clove garlic,1 inch ginger and
1 green chilli on high flame.
also, saute ¼ onion and 2 tbsp spring onion on high flame.
further add ½ capsicum and continue to saute till they slightly change colour.
additionally add 2 tbsp tomato sauce, 1 tsp chilli sauce, 2 tsp vinegar, 2 tsp soy sauce, ¼ tsp pepper and ¼ tsp salt.
mix well and saute for a minute.add cornflour slurry.give a good mix until the gravy slightly thickens and turns
translucent.</p></br>
<a href="parta.html">next receipe</a><em></br>
<a href="recipe.html">home page</a></em>
9. Design and create web page with JavaScript to design a simple calculator to perform the following
operations: sum, product, difference and quotient
//pgm9.html
<html>
<head>
<script>
//function that display value
function dis(val)
{
document.getElementById("result").value+=val
}

//function that evaluates the digit and return result


function solve()
{
var x = document.getElementById("result").value
var y = eval(x)
document.getElementById("result").value = y
}

//function that clear the display


function clr()
{
document.getElementById("result").value = ""
}
</script>
</head>
<!-- create table -->
<body>
<div>Calculator<div>
<table border="1">
<tr>
<td colspan="3"><input type="text" id="result"/></td>
<td><input type="button" value="c" onclick="clr()"/> </td>
</tr>
<tr>
<!-- create button and assign value to each button -->

<td><input type="button" value="1" onclick="dis('1')"/> </td>


<td><input type="button" value="2" onclick="dis('2')"/> </td>
<td><input type="button" value="3" onclick="dis('3')"/> </td>
<td><input type="button" value="/" onclick="dis('/')"/> </td>
</tr>
<tr>
<td><input type="button" value="4" onclick="dis('4')"/> </td>
<td><input type="button" value="5" onclick="dis('5')"/> </td>
<td><input type="button" value="6" onclick="dis('6')"/> </td>
<td><input type="button" value="-" onclick="dis('-')"/> </td>
</tr>
<tr>
<td><input type="button" value="7" onclick="dis('7')"/> </td>
<td><input type="button" value="8" onclick="dis('8')"/> </td>
<td><input type="button" value="9" onclick="dis('9')"/> </td>
<td><input type="button" value="+" onclick="dis('+')"/> </td>
</tr>
<tr>
<td><input type="button" value="." onclick="dis('.')"/> </td>
<td><input type="button" value="0" onclick="dis('0')"/> </td <!-- solve function call function solve to evaluate )
<td><input type="button" value="=" onclick="solve()"/> </td>
<td><input type="button" value="*" onclick="dis('*')"/> </td>
</tr>
</table>
</body>
</html>

10 Design and create a personal webpage with dashboard

11. Design and create web page about advantages of business process automation with respect to your
branch of engineering
//pgm11.html
<html>
<head>
<title>buisness process automation</title>
</head>
<body>
<h2 style="text-align:center;"><U>advantages of buisness process automation</u></h2>
<h3>Computer science</h3>
<ul>
<li>
Transportation: From self-driving cars to driverless trains and subways being developed in certain countries,
Drivers for Lyft and Uber, as well as those who deliver for apps like Postmates, </li>.
<li>Healthcare: Automation advancements in healthcare have helped increase the quality of patient care and
interactions. Some healthcare automation examples include automatic medication refill reminders or using an AI
app to screen initial symptoms before making an appointment with a healthcare provider.</li>.
<li>Online marketing: Automation processes are behind the algorithms that make purchase suggestions for you
when you sign into an online account or after making a transaction. Automation can also help marketers run
messaging testing to see which marketing campaign resonates more with consumers</li>.
<li>Reporting: Almost every business relies on reporting of some kind. From stock and inventory to sales and lead
conversions, reporting is essential to a successful business, </li>.
<li>Customer service: Telephone prompts were the beginning to customer service automation and as more people
found themselves typing instead of calling, the next logical move was to automate online chat to help provide
customer service in a medium that customers preferred. </li>
</ul>
</body>
</html>
12.Create a workflow for education loan approval in bank/diploma admission process (Use any tool)

13. Demonstrate ERP with ERPNext Demo for manufacturing, retail and service sector (Use any other ERP
erp and erp next on retail

ERPstands for Enterprise Resource Planning and refers to software and systems used to plan and manage all the
core supply chain, manufacturing, services,
ERPNext is a generic ERP software used by manufacturers, distributors and services companies. It includes
modules like accounting, CRM, sales, purchasing, website, e-commerce, point of sale, manufacturing, warehouse,
project management, inventory, and services. Also, it has domain specific modules like schools, healthcare,
agriculture, and non-profit.[4]

1.Each customer has their own process, control mechanism. Most of these are defined more than 20 years ago and
still they follow it.

2. Each one has their own workflow and approval process?—?for example

Some wants to create a Sales Order, Check with Finance whether they received money or not? After receipt then
confirm SO and release to production.

.3. The workflow has to be flexible as each one can have their own status comments and with their own
“wordings” to track and control the process .

4. How to integrate the same with ERP and make sure it too understands these comments is illustrated in the
below website

https://erpnext.com/open-source-sales-purchase

14.Create user account and demonstrate use of Google drive, Google docs ,Google Co-lab (Usage of Jupyter
Notebook)

Google drive
Access and sync your content from any device
1.Backup and Sync
Back up all of your content to the cloud – easily access your files in Google Drive and your photos in Google
Photos
2.Drive for desktop
Access all of your Google Drive content directly from your Mac or PC, without using up disk space

Google docs
Google Docs is Google's browser-based word processor. You can create, edit, and share documents online and
access them from any computer with an internet connection.
Google Co-lab
Colab notebooks allow you to combine executable code and rich text in a single document, along with images,
HTML, LaTeX and more.
Usage of Jupyter
Jupyter is a free, open-source, interactive web tool known as a computational notebook, which researchers
can use to combine software code, computational output, explanatory text and multimedia resources in a single
document.

15.Demonstrate Internet of Things using with examples a. Smart home b. Smart city c. Smart farming .
1.Smart Farming
It can be structured in seven application areas:

 Fleet management: tracking of farm vehicles

 Arable farming large and small field farming

 Livestock monitoring
 Indoor farming: greenhouses and stables

 Fish farming

 Forestry

 Storage monitoring: water tanks, fuel tanks

2. Smart home

Location-based smart devices


Smart home devices can be remotely controlled through smartphone apps and preferences can be auto-managed.
For instance, when you are approaching your home and are within a given radius, the system can set up your room
with your own preference of lights, curtains and AC temperature.
Voice-enabled devices
Smart devices can be linked with such devices as Google Assistant and Amazon Alexa to provide voice-control
options across all home automation systems
Smart security systems
Security systems include facial recognition, motion detection, voice recognition and biometric access control.
Facial recognition
Smart home devices include Wi-Fi-enabled devices with video feed security features. You can remotely access
these features on a smartphone from any location. Smart systems incorporate facial recognition technology into
connected video cameras.
Motion detection
Motion sensors can detect random movement through video surveillance like detecting intruders and warning
home-owners.
Biometric access control
These usually take photos of the user’s fingertips via optical scanners and store them for matching, or use two-
factor authentication using fingerprints and passwords.
Voice recognition
AI-based voice recognition employs Natural Language Processing (NLP). This technology isolates a person’s
voice from background noises, converts the audio to a digital file, sends it to the cloud for NLP analysis and
triggers an appropriate action
3.What a smart city is
The concept of the smart city lies in the use of technology to facilitate new experiences for its inhabitants to make
living more comfortable and secure, among others.
Smart water management
With AI, it is possible to streamline the use of water and power in a city. Smart grid technology can be employed
to better manage the use of power and water metering to locate leaks and prevent excess use of water.
Smart lighting
. Use of smart lighting can certainly reduce consumption of energy by allowing lighting only those areas when
needed.
Smart traffic management
Some congested cities in the world have adopted smart traffic solutions to control the flow of traffic. Road-surface
sensors and CCTV cameras are installed to send real-time updates about traffic flow to a central traffic
management system
Smart parking
. Smart parking creates a real-time parking map by using road surface sensors embedded in the ground on parking
area. This can reduce the time to wait, to find an empty slot for parking, which, in turn.
Smart waste management
Use of AI technology not only provides smart waste management but also provides a sustainable waste
management system. For instance, smart sensors fitted on waste bins send notifications to authorities to dispatch
waste collection trucks as soon as they are about to be full.
Smart policing
For example, a network of cameras and sensors can be installed in every corner to help identify people who
commit crime, smoke in prohibited zones or seem suspicious. Cameras can be used to monitor crowd density,
vehicle movement and cleanliness in a particular area, among others.
Smart governance
Smart city infrastructure is not complete without smart governance. Smart governance implies the use of
information and communication technology intelligently to reduce corruption in governments and public
administration organisations.
Smart nation
Smart Nation concept was launched by the government of Singapore in 2014. Its main goal is to harness
information and communication technologies, networks and Big Data tech to create tech-enabled solutions. AI
plays an important role in the journey towards creating a smart nation. Currently, Singapore has identified five
national AI projects—transport and logistics, smart cities and estates, healthcare, education and safety and
security. These projects can bring about many changes through the creation of new solutions to almost all the
challenges faced today.

16.Installation of Antivirus software


Antivirus is a kind of software used to prevent, scan, detect and delete viruses from a computer. Once installed,
most antivirus software runs automatically in the background to provide real-time protection against virus attacks.
Install any software available free lihe Avast, avg,nortan
17. Demonstration and hands on browser setting

18.Demonstration and hands on privacy settings and password policy

Best practices for password policy


 Configure a minimum password length.
 Enforce password history policy with at least 10 previous passwords remembered.
 Set a minimum password age of 3 days.
 Enable the setting that requires passwords to meet complexity requirements. This setting can be disabled for
passphrases but it is not recommended.
 Reset local admin passwords every 180 days. 
 For domain admin accounts, use strong passphrases with a minimum of 15 character
Privacy setting

1.Don’t fill out your social media profile.

 The more information you share online, the easier it’s going to be for someone to get their hands on it.
Don’t cooperate.
 Take a look at your social media profiles and keep them barren—the people who need to know your birth
date, email address and phone number already have them. And what exactly is the point of sharing
everything about yourself in your Facebook profile? If you care about your privacy, you won’t do it.

2. Be choosy about sharing your social security number—even the last 4 digits.

 Think twice about sharing your social security number with anyone, unless it’s your bank, a credit bureau, a
company that wants to do a background check on you or some other entity that has to report to the IRS. If
someone gets their hands on it and has information such your birth date and address they can steal your
identity and take out credit cards and pile up other debt in your name.

3. Lock down your hardware.

 Set up your PC to require a password when it wakes from sleep or boots up. Sure, you may trust the people
who live in your house, but what if your laptop is stolen or you lose it?

4. Turn on private browsing.

 If you don’t want anyone with physical access to your computer to see where you’re hanging out online you
should enable “private browsing,” a setting available in each major web browser. It deletes cookies,
temporary Internet files and browsing history after you close the window.

5. Use a password vault that generates and remembers strong and unique passwords.

 Most people know better than to use the same password for more than one website or application. In reality,
it can be impossible to remember a different one for the dozens of online services you use. The problem
with using the same password in more than one place is if someone gets their hands on your password—say,
through a phishing attack—they can access all your accounts and cause all sorts of trouble.

6. Use two-factor authentication.

 You can lock down your Facebook, Google, Dropbox, Apple ID, Microsoft, Twitter and other accounts with
two-factor authentication. That means that when you log in, you’ll also need to enter a special code that the
site texts to your phone. Some services require it each time you log in, other just when you’re using a new
device or web browser. The Electronic Frontier Foundation has a great overview of what’s available.

7. Set up a Google alert for your name.

 This is a simple way to keep an eye on anything someone might be saying about you on the web. It’s just a
matter of telling Google what to look for (in this case, your name), as well as what kinds of web pages to
search, how often to search and what email address the search engine giant should use to send you
notifications. Set up a Google alert here.

8. Pay for things with cash.

 According to Business Insider, credit card companies are selling your purchase data to advertisers. Don’t
want companies knowing how much booze you’re buying or other potentially embarrassing habits? Buy
things the old fashioned way—with coins and bills.
 9. Keep your social network activity private.

 Check your Facebook settings and make sure only friends can see what you’re doing. Go to the settings cog
in the upper right hand corner of your screen, then click on Privacy Settings >> Who can see my stuff.

10. Don’t give our your zip code when making credit card purchases.

 Often stores will ask for your zip code when you’re checking out with a credit card. Don’t give it to them
unless you want to donate your details to their marketing database, warns Forbes. By matching your name,
taken from your credit card, with your zip code, companies can more easily mine more information,
including your address, phone number and email. address.

11. Lie when setting up password security questions.

 “What is your mother’s maiden name?” or “In what city were you born?” are common questions websites
often ask you to answer so as to supposedly keep your account safe from intruders. In reality, there’s
nothing secure about such generic queries. That’s because someone who wants access to your account could
easily do some Internet research to dig up the answers.

19.Demonstration of common security threats (using videos) a. Phishing b. DoS attack c. Man in the middle
attack d. Spamming e. Virus

1. Phishing attacks are the practice of sending fraudulent communications that appear to come from a
reputable source. It is usually done through email. The goal is to steal sensitive data like credit card and login
information, or to install malware on the victim's machine.
Example:
 Phishing Email
 Fake Websites. ...
 CEO Fraud. ...
 Content Injection. ...
 Session Hijacking. ...
 Malware.
2.A Denial-of-Service (DoS) attack is an attack meant to shut down a machine or network, making it inaccessible to
its intended users
 buffer overflow attacks – the most common DoS attack. ...
 ICMP flood – leverages misconfigured network devices by sending spoofed packets that ping every
computer on the targeted network, instead of just one specific machine. ...
 SYN flood – sends a request to connect to a server, but never completes the handshake.
3.A Man-in-the-Middle (MITM) attack happens when a hacker inserts themselves between a user and a website. ...
For example, a fake banking website may be used to capture financial login information. The fake site is “in
the middle” between the user and the actual bank website
4.Spamming attacks are defined as an organized and unauthorized use of an app to send thousands of messages to
their users. These messages are sent by fake or hacked profiles, and often include unreal advertisements and links to
which real users are asked to click onWhen you send a million people an email to try to make money online by
selling them a worthless product, this is an example of a time when you spam. Spam is a brand of canned ham, or
mass marketing junk emails sent out to millions of recipients without their request.
5. computer virus is a malicious software program loaded onto a user's computer without the user's knowledge and
performs malicious actions. ... It can self-replicate, inserting itself onto other programs or files, infecting them in the
process.

You might also like