You are on page 1of 130

LAB DETAILS SHEET

NAME OF THE LABORATORY : ………………………………………………………………………

LAB CODE : ………………………………………………………………………………………………

NAME OF THE STUDENT : ……………………………………………………………………………..

ROLL NUMBER : …………………………………………………………………………………………

YEAR : …………………………………………………………………………………………………….

SEMESTER : ……………………………………………………………………………………………...

BRANCH : ………………………………………………………………………………………………...
Department of Computer Science and Engineering
(Cyber Security)

CERTIFICATE

Certified that this record ..................................................................... lab is the bonafide work

of ………………………………………. bearing Regd.No …..…………………………...

I Year I / II Semester in the Department of computer Science and Engineering(Cyber

Security) during the Academic year 20 - 20 . She / He has successfully completed…….

Experiments.

Laboratory In-Charge Head of the Department

Internal Examiner External Examiner


LAB INDEX SHEET
Name of the Laboratory : …………………………………………………………. Year : …………...

Academic Year : …………………………………………………………….. Semester : …………….

Date of Date of Page


S.No Name of the Experiment Signature Remarks
Experiment Submission No.

10

11
EXPERIMENT DETAILS SHEET
Name of the Laboratory : …………………………………………………… Year : …………...

Academic Year : ……………………………………………………………..Semester : ……………..

S.No Experiment No. Name of the Experiment

10

11
Date Page no
:……………………… :…………
……
Task 1
PC Hardware

Block Diagram of CPU

CPU: CPU is the abbreviation for central processing unit, sometimes referred to simply as the central
processor, but more commonly called a processor, the CPU is the brains of the computer where most
calculations take place. In terms of computing power, the CPU is the most important element of a computer
system.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Control Unit: A control unit (CU) handles all processor control signals. It directs all input and output
flow, fetches code for instructions from micro programs and directs other units and models by
providing control and timing signals.

ALU: An arithmetic logic unit (ALU) is a major component of the central processing unit of a computer
system. It does all processes related to arithmetic and logic operations that need to be done on instruction
words. In some microprocessor architectures, the ALU is divided into the arithmetic unit (AU) and the logic
unit (LU).

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Memory Unit: A Memory Unit is a collection of storage cells together with associated circuits needed
to transfer information in and out of storage.

Word: The memory stores binary information (1's and 0's) in groups of bits called words. A word in
memory is an entity of bits that move in and out of storage as a unit. A memory word is a group of 1's and
0's and may represent a number, an instruction code, one or more alphanumeric characters, or any other
binary coded information.

Byte: A group of eight bits is called a byte. Most computer memories use words whose number of bits is
a multiple of 8. Thus a 16-bit word contains two bytes, and a 32-bit word is made up of 4 bytes. The capacity
of memories in commercial computers is usually stated as the total number of bytes that can be stored.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Primary Memory: Primary memory is computer memory that a processor or computer accesses first
or directly. It allows a processor to access running execution applications and services that are temporarily
stored in a specific memory location. Primary memory is also known as primary storage or main memory.

Secondary Memory: Secondary memory is where programs and data are kept on a long-term basis.
Common secondary storage devices are the hard disk and optical disks. The hard disk has enormous storage
capacity compared to main memory. The hard disk is usually contained inside the case of a computer.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
INPUT DEVICES
In computing, an input device is a piece of computer hardware equipment used to provide data and control
signals to an information processing system such as a computer or information appliance. Examples of input
devices include keyboards, mouse, scanners, digital cameras, joysticks, and microphones.

Keyboard: Keyboards' are a human interface device which is represented as a layout of buttons. Each
button, or key, can be used to either input a linguistic character to a computer, or to call upon a particular
function of the computer. They act as the main text entry interface for most users. Traditional keyboards
use spring-based buttons, though newer Variations employ virtual keys, or even projected keyboards.

Mouse: Pointing devices are the most commonly used input devices today. A pointing device is any
human interface device that allows a user to input spatial data to a computer. In the case of mouse and touch
pad, this is usually achieved by detecting movement across a physical surface. Analog devices, such as 3D
mice, joysticks, or pointing sticks, function by reporting their angle of deflection. Movements of the
pointing device are echoed on the screen by movements of the pointer, creating a simple, intuitive way to
navigate a computer's graphical user interface (GUI).

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Touchpad: It is also known as a track pad, a touchpad is a common substitute for a computer mouse.
Essentially a specialized surface that can detect the movement of the user's finger and use that information
to direct a pointer and control a computer. Touch pads were first introduced for laptops in the 1990's, and
it's now rare to find a laptop without one.

Scanner: The word "scanner" can be used in a number of different ways in the computer world, but here
I am using it to mean a desktop image scanner. Essentially, it's an input device that uses optical technology
to transfer images (or sometimes text) into a computer, where the signal is converted into a digital image.
The digital image can then be edited, emailed, or printed.

Microphone: A microphone captures audio and sends it to the computer, where the audio is converted
to a digital format. Once the audio has been digitized, it can be played back, copied, edited, uploaded, or
emailed. Microphones can be used to record audio, or to relay sounds live as part of a video chat, or audio
stream.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Webcam: Webcams are different from digital cameras in that firstly, they cannot operate independently
from a computer, and secondly, they have no inbuilt memory. Although webcams can capture
photographs and videos, more often they are used to live stream videos.

OUTPUT DEVICES
Computer output devices receive information from the computer, and carry data that has been processed by
the computer to the user. Output devices provide data in myriad different forms, some of which include
audio, visual, and hard copy media. The devices are usually used for display, projection, or for physical
reproduction. Monitors and printers are two of the most commonly-known output devices used with a
computer.

Monitor: This is the most common computer output device. It creates a visual display by the use of which
users can view processed data. Monitors come in various sizes and resolutions.

Common Types of Monitors:

Cathode Ray Tube: This uses phosphorescent dots to generate the pixels that constitute displayed
images.

Flat Panel Screen: This makes use of liquid crystals or plasma to produce output. Light is passed
through the liquid crystals in order to generate pixels. All monitors depend on a video card, which is
positioned either on the computer motherboard or in a special expansion slot. The video card sorts out the
computer data into image details that the monitors can then show.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Printer: This device generates a hard copy version of processed data, like documents and photographs.
The computer transmits the image data to the printer, which then physically recreates the image, typically
on paper.

Types of Printers:

Ink Jet: This kind of printer sprays tiny dots of ink onto a surface to form an image.

Laser: This type utilizes toner drums that roll through magnetized pigment, and then transfers the pigment
onto a surface.

Dot Matrix: Dot matrix printers utilize a print head to set images on a surface, using an ink ribbon. These
printers were commonly used between 1980.

Speakers: Speakers are attached to computers to facilitate the output of sound; sound cards are required
in the computer for speakers to function. The different kinds of speakers range from simple, two-speaker
output devices right the way up to surround-sound multi-channel units.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Headset: This is a combination of speakers and microphone. It is mostly used by gamers, and is also a
great tool for communicating with family and friends over the internet using some VOIP program or other.

Projector: This is a display device that projects a computer-created image onto another surface: usually
some sort of whiteboard or wall. The computer transmits the image data to its video card, which then sends
the video image to the projector.

Plotter: This generates a hard copy of a digitally depicted design. The design is sent to the plotter through
a graphics card, and the design is formed by using a pen. It is generally used with engineering applications,
and essentially draws a given image using a series of straight lines.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 2
Hardware Troubleshooting & Software Troubleshooting
Hardware Troubleshooting:

Sometimes things do not work exactly as planned at this point. Sometimes the system will not power on
at all. Sometimes it will power on, but you get no video. Sometimes you will get beep codes. Sometimes
you hear the fans, but the rest of the PC just sits there and does nothing. If things didn't go according to
plan, troubleshoot the system. Walk mentally through the boot process and check all hardware as it
goes. Think like the computer thinks, if you know what I mean. Here is a list of some of the more
common problems.

1. The power does not even turn on. This sometimes happens on ATX machines and it usuallytracks
down to the fact that the power switch is not properly connected to the motherboard or it is not
connected at all. Find the power switch lead and make sure it is connected to the motherboard, as
described in Step 11. It’s a possibility that simply reversing the lead will do the trick. If this is the not the
case, then make sure the motherboard is not grounded somehow. Make sure that the board is not
touching the case (this is what the spacers are for). Make sure that none of the screws that hold the board
in place is touching anything metal or any of the electrical pathways on the motherboard. If you have any
doubt on this, you can remove each screw one at a time and place a washer on them. You do not need to
remove the motherboard to do this.

2. The PC boots, but it is giving beep codes. This is actually better than having to track everything
down on your own, because at least the PC is giving you a hint as to what is wrong. You can also use
the PC Mechanic Beep Codes E-book available on the PC Mechanic CD to track it down for other
BIOS versions. Often, these beep codes will not tell you exactly what the problem is, but will point you
at the trouble device. This information will then get you pointed in the correct direction.

3. The fans come on, but you get no video or beeps. Sometimes, this is because some key component
may not be plugged in well or may not be operational. Check the memory modules and the processor to
be sure they are firmly installed. You might want to make sure the processor is actually working. One
way that I have used to see if a processor is working is to remove or unplug the CPU fan and place your
fingers on the CPU to see if it heats up real fast. If it does, its OK and don’t let it run this way for long.
If it remains at room temperature for awhile, then there is no juice going through the processor and it
may need replacing. The keyboard doesn’t seem to work. This one doesn’t happen too often, but if it
does, your two trouble sources will be the keyboard itself or the keyboard controller on the
motherboard. Hope it isn’t the second one.

Software Troubleshooting:

BIOS SETUP & DISK


FORMATTING BIOS SETUP

What Is BIOS?
BIOS is an acronym for Basic Input Output System.

Why BIOS?
To run any system, there must be default settings so that the system can load those settings when it is
started or restarted. For a computer system the basic I/O settings and boot process details are
necessary to start a system.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
All these default, predefined settings will be loaded in the BIOS and whenever we start the system,
these settings will be loaded.

How to view BIOS?

Whenever we start the system, we can enter into the BIOS Setup Utility by pressing Del Key.
Sometimes an F1 or F8 key has to be instead of DEL key, depending on the type of BIOS.

When we enter in to this utility we get these following menus/services, depending upon our
mother board. In main Menu, we can view the details such as BIOS Version, Processor Type, and
Speed, RAM Size and the system bus speed and memory speed.

We can change the settings like language system time and date. We can even change the hyper
threading facility if the processor supports this technology.

We must be very careful when we change these settings otherwise it may cause our system
to malfunction.

Here, we can change the settings of PCI devices, Floppy Drives configuration and chipset, USB
peripheral devices and even monitoring the Hardware. Security

We can set the supervisor password, to restrict unauthorized users to enter the BIOS setup
utility. User password can also be set to restrict the unauthorized persons to boot or use the
system.

What is a Password?

How to type a Password?

We can even set the Chassis Intrusion to protect the system devices from removing the components of
the system.

Power

The power settings protect the system from power failures by configuring the ACPI.

For example, after power failure we can stay off the system or Power on the system or else we can even
make the system to restore its previous state by selecting the appropriate options.

Boot

Silent boot : If this option is enabled it displays only the OEM logo and in the background
POST(Power on Self Test) completes. If this is disabled, instead of LOGO, we can view POST
messages

Rapid BIOS Boot: By enabling this option it will decrease the time needed to boot the by skipping
some unnecessary tests.

Here, we can also set the boot sequence from the available devices by selecting Boot Device Priority.

We can even view the Hard Drives and any removable devices and attached to the system.

Exit
By selecting the appropriate options we can exit from the BIOS setup like exiting the setup by saving
or discarding the changes or even by loading optimal or default values.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 3
Flow Charts using RAPTOR Tool

RAPTOR(Rapid Algorithmic Prototyping Tool for Ordered Reasoning)

RAPTOR is a visual programming development environment based on flowcharts. A flowchart is a


collection of connected graphic symbols, where each symbol represents a specific type of instruction to
be executed. The connections between symbols determine the order in which instructions are executed.
These ideas will become clearer as you use RAPTOR to solve problems.

We use RAPTOR in CS110 for several reasons.

• The RAPTOR development environment minimizes the amount of syntax you must learn to write
correct program instructions.
• The RAPTOR development environment is visual. RAPTOR programs are diagrams (directed
graphs) that can be executed one symbol at a time. This will help you follow the flow of instruction
execution in RAPTOR programs.
• RAPTOR is designed for ease of use. (You might have to take our word for this, but other
programming development environments are extremely complex.)
• RAPTOR error messages are designed to be more readily understandable by beginning
programmers.
• Our goal is to teach you how to design and execute algorithms. These objectives do not require a
heavy-weight commercial programming language such as C++ or Java.

RAPTOR Program Structure


A RAPTOR program is a set of connected symbols that represent actions to be
performed. The arrows that connect the symbols determine the order in which the actions
are performed. When executing a RAPTOR program, you begin at the Start symbol and
follow the arrows to execute the program. A RAPTOR program stops executing when
the End symbol is reached. The smallest RAPTOR program (which does nothing) is
depicted at the right. By placing additional RAPTOR statements between the Start and
End symbols you can create meaningful RAPTOR programs.

Introduction to RAPTOR Statements/Symbols

RAPTOR has six (6) basic symbols, where each symbol represents a unique type of
instruction. The basic symbols are shown at the right. The top four statement types,
Assignment, Call, Input, and Output, are explained in this reading, The bottom two
types, Selection and Loops, will be explained in a future reading.

The typical computer program has three basic components:

• INPUT – get the data values that are needed to accomplish the task.
• PROCESSING – manipulate the data values to accomplish the task.
• OUTPUT – display (or save) the values which provide a solution to the task.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
These three components have a direct correlation to RAPTOR instructions as shown in the following
table.

Purpose Symb Name Description


ol
input Allow the user to enter data. Each data value
INPUT statement is stored in a variable.

assignment Change the value of a variable using some


PROCESSING statement type of mathematical calculation.

procedure Execute a group of instructions defined in


call the named procedure. In some cases some of
PROCESSING
the procedure arguments (i.e., variables) will
be changed by the procedure's instructions.

output Display (or save to a file) the value of a


OUTPUT statement variable.

The common thread among these four instructions is that they all do something to variables! To
understand how to develop algorithms into working computer programs, you must understand the concept
of a variable. Please study the next section carefully!

RAPTOR Variables
Variables are computer memory locations that hold a data value. At any given time a variable can only
hold a single value. However, the value of a variable can vary (change) as a program executes. That's why
we call them "variables"! As an example, study the following table that traces the value of a variable
called X.

Description Value of Program


X

• When the program begins, no variables exist. In


RAPTOR, variables are automatically created when Undefined
they are first used in a statement.

• The first assignment statement, X←32, assigns the data 32


value 32 to the variable X.
• The next assignment statement, X←X+1, retrieves the
33
current value of X, 32, adds 1 to it, and puts the result,
33, in the variable X.
• The next assignment statement, X←X*2, retrieves the
current value of X, 33, multiplies it by 2, and puts the 66
result, 66, in the variable X.
During the execution of the previous example program, the variable X stored three distinct values. Please
note that the order of statements in a program is very important. If you re-ordered these three assignment
statements, the values stored into X would be different.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
A variable can have its value set (or changed) in one of three ways:

• By the value entered from an input statement.


• By the value calculated from an equation in an assignment statement.
• By a return value from a procedure call (more on this later).
It is variables, and their changing data values, that enable a program to act differently every time it is
executed.

All variables should be given meaningful and descriptive names by the programmer. Variable names
should relate to the purpose the variable serves in your program. A variable name must start with a letter
and can contain only letters, numerical digits, and underscores (but no spaces or other special characters).
If a variable name contains multiple "words," the name is more "readable" if each word is separated by an
underscore character. The table below shows some examples of good, poor, and illegal variable names.

Good variable names Poor variable names Illegal variable names

tax_rate a (not descriptive) 4sale (does not start with a


letter) sales tax (includes a
sales_tax milesperhour (add space) sales$ (includes invalid
distance_in_mil underscores) my4to (not character)

es descriptive)

mpg
IMPORTANT: If you give each value in a program a meaningful, descriptive variable name, it will help
you think more clearly about the problem you are solving and it will help you find errors in your program.
One way of understanding the purpose of variables is to think of them as a means to communicate
information between one part of a program and another. By using the same variable name in different
parts of your program you are using the value that is stored at that location in different parts of your
program. Think of the variable as a place holder or storage area for values between each use in your
program computations.

When a RAPTOR program begins execution, no variables exist. The first time RAPTOR encounters a
new variable name, it automatically creates a new memory location and associates this variable name
with the new memory. The variable will exist from that point in the program execution until the program
terminates. When a new variable is created, its initial value determines whether the variable will store
numerical data or textual data. This is called the variable's data type. A variable's data type cannot change
during the execution of a program. In summary, variables are automatically created by RAPTOR and can
hold either:

• Numbers e.g., 12, 567, -4, 3.1415, 0.000371, or


• Strings e.g., “Hello, how are you?”, “James Bond”, “The value of x is ”
Common errors when using variables:

Error 1: "Variable does not have a value"

There are two common reasons for this error:

1) The variable has not been given a value. 2) The variable name was misspelled.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Error 2: "Can't assign string to numeric variable "

"Can't assign numeric to string variable "

This error will occur if your statements attempt to change the data type of a variable.

RAPTOR Statements/Symbols

The following four sections provide details about each of the four basic statements: Input, Assignment,
Call, and Output.

Input Statement/Symbol
An input statement/symbol allows the user of a program to
enter a data value into a program variable during program
execution. It is important that a user know exactly what type
of value is expected for input. Therefore, when you define an
input statement you specify a string of text that will be the
prompt that describes the required input. The prompt should
be as explicit as possible. If the expected value needs to be
in particular units (e.g., feet, meters, or miles) you should
mention the units in the prompt.

When you define an input statement, you must specify two


things: a prompt and the variable that will be assigned the
value enter by the user at run-time. As you can see by the
“Enter Input” dialog box at the right there are two types of
input prompts: Text and Expression prompts. An
Expression prompt enables you to mix text and variables together like the following prompt: “Enter a
number between ” + low + “ and ” + high + “: ”.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
At run-time, an input statement will display an input
dialog box, an example of which is shown to the right.
After a user enters a value and hits the enter key (or
clicks OK), the value entered by the user is assigned to
the input statement's variable.

Make sure you distinguish between the "definition of a


statement" and the "execution of a statement". The
dialog box that is used to define a statement is totally
different from the dialog box that is used at run-time when a program is executing.

Assignment Statement/Symbol

The assignment symbol is used to perform a


computation and then store the results in a variable. The
definition of an assignment statement is performed using
the dialog box shown on the right. The variable to be
assigned a value is entering into the "Set" field, and the
computation to perform is enter into the "to" field. The
example on the right sets the value of the variable x to
0.707106781186547.

An assignment statement is displayed inside its


RAPTOR symbol using the syntax:

Variable ← Expression

For example, the statement created by the dialog box to


the right is displayed as:

One assignment statement can only change the value of a


single variable, that is, the variable on the left hand side
of the arrow. If this variable did not exist prior to the
statement, a new variable is created. If this variable did
exist prior to the statement, then its previous value is lost and its new value is based on the computation
that is performed. No variables on the right hand side of the arrow (i.e., the expression) are ever changed
by the assignment statement.

Expressions
The expression (or computation) of an assignment statement can be any simple or complex equation that
computes a single value. An expression is a combination of values (either constants or variables) and
operators. Please carefully study the following rules for constructing valid expressions.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
A computer can only perform one operation at a time. When an expression is computed, the operations of
the equation are not executed from left to right in the order that you typed them in. Rather, the operations
are performed based on a predefined "order of precedence." The order that operations are performed can
make a radical difference in the value that is computed. For example, consider the following two
examples:

x ← (3+9)/3 x ← 3+(9/3)

In the first case, the variable x is assigned a value of 4, whereas in the second case, the variable x is
assigned the value of 6. As you can see from these examples, you can always explicitly control the order
in which operations are performed by grouping values and operators in parenthesis. The exact "order of
precedence" is

1. compute all functions, then


2. compute anything in parentheses, then
3. compute exponentiation (^,**) i.e., raise one number to a power, then
4. compute multiplications and divisions, left to right, and finally
5. compute additions and subtractions, left to right.

An operator or function directs the computer to perform some computation on data. Operators are placed
between the data being operated on (e.g. X/3) whereas functions use parentheses to indicate the data they
are operating on (e.g. sqrt(4.7) ). When executed, operators and functions perform their computation and
return their result. The following lists summarize the built-in operators and functions of RAPTOR.

basic math: +, -, *, /, ^, **, rem, mod, sqrt, log, abs, ceiling, floor

trigonometry: sin, cos, tan, cot, arcsin, arcos, arctan, arccot

miscellaneous: random, Length_of

The following table briefly describes these built-in operators and functions. Full details concerning these
operators and functions can be found in the RAPTOR help screens.

Operation Description Example

+ Addition 3+4 is 7

- subtraction 3-4 is -1

- Negation -3 is a negative 3

* multiplication 3*4 is 12

/ Division 3/4 is 0.75

^ exponentiation, raise a number to a 3^4 is 3*3*3*3=81


power
** 3**4 is 81

rem remainder (what is left over) when 10 rem 3 is 1


the
right operand divides the left operand

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
mod 10 mod 4 is 2

sqrt square root sqrt(4) is 2

log natural logarithm (base e) log(e) is 1

abs absolute value abs(-9) is 9

ceiling rounds up to a whole number ceiling(3.14159) is 4

floor rounds down to a whole number floor(9.82) is 9

sin trig sin(angle_in_radians) sin(pi/6) is 0.5

cos trig cos(angle_in_radians) cos(pi/3) is 0.5

tan trig tan(angle_in_radians) tan(pi/4) is 1.0

cot trig cotangent(angle_in_radians) cot(pi/4) is 1

arcsin trig sin-1(expression), returns radians arcsin(0.5) is pi/6

arcos trig cos-1(expression), returns radians arccos(0.5) is pi/3

arctan trig tan-1(y,x), returns radians arctan(10,3) is 1.2793

arccot trig cot-1(x,y), returns radians arccot(10,3) is 0.29145

random generates a random value in the random * 100 is some


range [1.0, 0.0) value between 0 and
99.9999
Length_of returns the number of characters in a Example ← "Sell now"
string variable Length_of(Example) is
8

The result of evaluating of an expression in an assignment statement must be either a single number or a
single string of text. Most of your expressions will compute numbers, but you can also perform simple
text manipulation by using a plus sign (+) to join two or more strings of text into a single string. You can
also join numerical values with strings to create a single string. The following example assignment
statements demonstrate string manipulation.

Full_name ← "Joe " + "Alexander " + "Smith"

Answer ← "The average is " + (Total / Number)

RAPTOR defines several symbols that represent commonly used constants. You should use these
constant symbols when you need their corresponding values in computations.

pi is defined to be 3.14159274101257.

e is defined to be 2.71828174591064

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Procedure Call Statement/Symbol


A procedure is a named collection of programming
statements that accomplish a task. Calling a procedure
suspends execution of your program, executes the
instructions in the called procedure, and then resumes
executing your program at the next statement. You need
to know two things to correctly use a procedure: 1) the
procedure's name and 2) the data values that the
procedure needs to do its work, which are called
arguments.

RAPTOR attempts to minimize the number of procedure


names you need to memorize by displaying any
procedure name that partially matches what you type
into the "Enter Call" window. For example, after
entering the single letter "d," the lower portion of the
window will list all built-in procedures that start with the
letter "d". The list also reminds you of each procedure's
required arguments. In the example to the right, the
lower box is telling you that the "Draw_Line" procedure
needs 5 data values: the x and y coordinates of the
starting location of the line, (x1, y1), the x and y
coordinates of the ending location of the line, (x2, y2),
and the line's color. The order of the argument values
must match the arguments defined by the procedure. For example, Draw_Line(Blue, 3, 5, 100, 200)
would generate an error because the color of the line must be the last argument value in the argument list.

When a procedure call is displayed in your RAPTOR program you can see the
procedure's name and the argument values that will be sent to the procedure
when it is called. For example, when the first procedure call on the right is
executed it will draw a red line from the point (1,1) to the point (100,200). The
second procedure call will also draw a line, but since the arguments are
variables, the exact location of the line will not be known until the program executes and all the argument
variables have a value

RAPTOR defines too many built-in procedures to describe them all here. You can find documentation on
all built-in procedures in RAPTOR's help screens. In addition, your instructor will introduce relevant
procedures as we tackle various problem solving tasks in the coming lessons.

Output Statement/Symbol

In RAPTOR, an output statement displays a value to the Master Console window when it is executed.
When you define an output statement, the "Enter Output" dialog box asks you to specify three things:

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• Are you displaying text, or the results of an
expression (computation)?
• What is the text or expression to display?
• Should the output be terminated by a new line
character?
The example output statement on the right will display the
text, "The sales tax is" on the output window and
terminate the text with a new line. Since the "End current
line" is checked, any future output will start on a new line
below the displayed text.

When you select the "Output Text" option, the characters


that you type into the edit box will be displayed exactly as
you typed them, including any leading or trailing spaces.
If you include quote marks (") in the text, the quote marks
will be displayed exactly as you typed them.

When you select the "Output Expression" option, the text


you type into the edit box is treated as an expression to be
evaluated. When the output statement is executed at run-
time, the expression is evaluated and the resulting single
value that was computed is displayed. An example output
statement that displays the results of an expression is
shown on the right.

You can display multiple values with a single output statement by using the "Output Expression" option
and building a string of text using the string plus (+) operator. When you build a single string from two or
more values, you must distinguish the text from the values to be calculated by enclosing any text in quote
marks ("). In such cases, the quote marks are not displayed in the output window. For example, the
expression,

"Active Point = (" + x + "," + y + ")"

will display the following if x is 200 and y is 5:

Active Point = (200,5)

Notice that the quote marks are not displayed on the output device. The quote marks are used to surround
any text that is not part of an expression to be evaluated.Your instructor (or a homework assignment) will
often say “Display the results in a user-friendly manner”. This means you should display some
explanatory text explaining any numbers that are output to the MasterConsole window. An example of
"non-user-friendly output" and "user-friendly output" is shown below.

Non-user-friendly output User-friendly output

Example output: 2.5678 Example output: Area = 2.5678 square inches

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Comments in RAPTOR
The RAPTOR development environment, like many other programming languages, allows comments to
be added to your program. Comments are used to explain some aspect of a program to a human reader,
especially in places where the program code is complex and hard to understand. Comments mean nothing
to the computer and are not executed. However, if comments are done well, they can make a program
much easier to understand for a human reader.

To add a comment to a statement, right-click your mouse over the


statement symbol and select the "Comment" line before releasing the
mouse button. Then enter the comment text into the "Enter Comment"
dialog box, an example of which is shown to the right. The resulting
comment can be moved in the RAPTOR window by dragging it, but you
typically do not need to move the default location of a comment.

There are three general types of comments:

• Programmer header – documents who wrote the program, when it was written, and a general
description of what the program does. (Add to the "Start" symbol)
• Section description – mark major sections of your program to make it easier for a programmer to
understand the overall program structure.
• Logic description – explain non-standard logic.
Typically you should not comment every statement in a program. An example program that includes
comments is shown below.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
What you have hopefully learned…

• The basic structure and types of statements of a RAPTOR program.


• What a variable is and how variables are used.
• How to write computations (i.e., expressions) that calculate desired values.
• How to get input values into a program and how to display output values.
• How to add appropriate comments to make a program more readable.

Create a flow chart to print first 50 prime numbers

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 4
Latex & MS Office Tools

Introduction: LATEX (pronounced lay-tek ) is a document preparation system for producing


professional-looking documents, it is not a word processor. It is particularly suited to producing long,
structured documents, and is very good at typesetting equations.

Document Structure: The \documentclass command must appear at the start of every
LATEXdocument. The text in the curly brackets species the document class. Thearticle document class is
suitable for shorter documents such as journal articles and short reports.
The \begin{document} and \end{document} commands enclose the text and commands that make up the
document. Anything typed before \begin{document} is known as the preamble, and will affect the whole
document. Anything typed after \end{document} is ignored.

\documentclass[a4paper,12pt]{article}
\begin{document}
A sentence of text.
\end{document}

Creating a Title: The \maketitle command creates a title. Need to specify the title of the document. If
the date is not specified today's date is used. Author is optional.

\documentclass[a4paper,12pt]{article}
\begin{document}
\title{My First Document}
\author{My Name}
\date{\today}
\maketitle
\end{document}

\today is a command that inserts today's date. It can also type ina different date, for example \date{November 2013}.

Sections: it should divide the document into chapters (if needed), sections and subsections.

\documentclass[a4paper,12pt]{article}
\begin{document}
\section{Introduction}
This is the introduction.
\section{Methods}
\subsection{Stage 1}
The first part of the methods.
\subsection{Stage 2}
The second part of the methods.
\section{Results}
Here are my results.
\end{document}

Labelling: label any of the sectioning commands so they can be referred to in other parts of the document.
Label the section with \label{labelname}.Then type \ref{labelname} or \pageref{labelname}, when want
torefer to the section or page number of the label.

\documentclass[a4paper,12pt]{article}
\begin{document}
\section{Introduction}

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
This is the introduction.
\section{Methods}
\subsection{Stage 1}
\label{sec1}
The first part of the methods.

\subsection{Stage 2}
The second part of the methods.
\section{Results}
Here are my results.
\ref{sec1} on page \pageref{sec1}
\end{document}

Table of Contents: The use sectioning commands it is very easy to generate a table of contents. Type
\tableofcontents where want the table of contents to appear in the document.

\documentclass[a4paper,12pt]{article}
\begin{document}
\title{My First Document}
\author{My Name}
\date{\today}
\maketitle
\pagenumbering{roman}
\tableofcontents
\newpage
\pagenumbering{arabic}
\section{Introduction}
This is the introduction.
\section{Methods}
\subsection{Stage 1}
The first part of the methods.
\subsection{Stage 2}
The second part of the methods.
\section{Results}
Here are my results
\end{document}

Typesetting Text

Font Effects: There are LATEX commands for a variety of font effects:
\documentclass[a4paper,12pt]{article}
\begin{document}

\textit{words in italics} words in italics


\\
\textsl{words slanted} words slanted
\\
\textsc{words in smallcaps} words in smallcaps
\\
\textbf{words in bold} words in bold
\\
\texttt{words in teletype} words in teletype
\\
\textsf{sans serif words} sans serif words
Ramachandra College of Engineering
Date Page no
:……………………… :…………
……
\\
\textrm{roman words} roman words
\\
\underline{underlined words} underlined words
\end{document}

Coloured Text: To put coloured text in the document need to use a package. Many packages can be
used with LATEX to enhance its functionality. Packages are included in the preamble (i.e. before the
\begin{document}command). Packages are activated using the \usepackage[options]{package}command,
where package is the name of the package and options is an optionallist of keywords that trigger special
features in the package.

\documentclass[a4paper,12pt]{article}
\usepackage{color}
\begin{document}

{\color{red}Latex}
\\
{\color{blue}Latex}
\\
{\color{green}Latex}
\\
{\color{yellow}Latex}
\\
{\color{magenta}Latex}

\end{document}

Font Sizes:
There are LATEX commands for a range of font sizes:

\documentclass[a4paper,12pt]{article}
\begin{document}
{\tiny tiny words} tiny words
\\
{\scriptsizescriptsize words} scriptsize words
\\
{\footnotesizefootnotesize words} footnotesize words
\\
{\small small words} small words
\\
{\normalsizenormalsize words} normalsize words
\\
{\large large words} large words
\\
{\Large Large words} Large words
\\
{\LARGE LARGE words} LARGE words
\\
{\huge huge words} huge words

\end{document}

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Lists: LATEX supports two types of lists: enumerate produces numbered lists, while itemize is for bulleted
lists. Each list item is defined by \item. Lists canbe nested to produce sub-lists.

\documentclass[a4paper,12pt]{article}
\begin{document}
\begin{enumerate}
\item First thing
\item Second thing
\begin{itemize}
\item A sub-thing
\item Another sub-thing
\end{itemize}
\item Third thing
\end{enumerate}
\end{document}

Tables:
\documentclass[a4paper,12pt]{article}
\begin{document}
\begin{tabular}{ |p{3cm}||p{3cm}|p{3cm}|p{3cm}| }
\hline
\multicolumn{4}{|c|}{Country List} \\
\hline
Country Name or Area Name& ISO ALPHA 2 Code &ISO ALPHA 3 Code&ISO numeric Code\\
\hline
Afghanistan & AF &AFG& 004\\
Aland Islands& AX & ALA &248\\
Albania &AL & ALB& 008\\
Algeria &DZ & DZA& 012\\
American Samoa& AS & ASM&016\\
Andorra& AD & AND &020\\
Angola& AO & AGO&024\\
\hline
\end{tabular}
\end{document}

Figures: To insert an image in to the LATEX document,which requires the graphicx package. Images
should be PDF, PNG, JPEGor GIF files.

\documentclass[a4paper,12pt]{article}
\usepackage{graphicx}
\graphicspath{ {./images/} }

\begin{document}
The universe is immense and it seems to be homogeneous,
in a large scale, everywhere we look at.

\includegraphics{universe}

There's a picture of a galaxy above


\end{document}
\end{document}

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Equations: One of the main reasons for writing documents in LATEX is because it is reallygood at typesetting
equations. Equations are written in `math mode'.

\documentclass[a4paper,12pt]{article}
\usepackage{amsmath}
\begin{document}

\begin{equation*}
1+2=3
\end{equation*}

\begin{align*}
f(x) &= x^2\\
g(x) &= \frac{1}{x}\\
F(x) &= \int^a_b \frac{1}{3}x^3
\end{align*}

\begin{matrix}
1 & 0\\
0&1
\end{matrix}
\end{document}

Inserting References: LATEX includes features that allows to easily cite references and
createbibliographies in the document.

\documentclass[a4paper,12pt]{article}
\begin{document}
\begin{thebibliography}{9}
\bibitem{latexcompanion}
Michel Goossens, Frank Mittelbach, and Alexander Samarin.
\textit{The \LaTeX\ Companion}.
Addison-Wesley, Reading, Massachusetts, 1993.
\bibitem{einstein}
Albert Einstein.
\textit{ZurElektrodynamikbewegter K{\"o}rper}. (German)
[\textit{On the electrodynamics of moving bodies}].
Annalen der Physik, 322(10):891–921, 1905.
\bibitem{knuthwebsite}
Knuth: Computers and Typesetting,
\\\texttt{http://www-cs-faculty.stanford.edu/\~{}uno/abcde.html}
\end{thebibliography}
\end{document}

Microsoft Word
Microsoft Word is a word processing software package. can use it to type letters, reports, and other
documents. In Word 2007, how a window displays depends on the size of itr window, the size of Itr
monitor and the resolution to which itr monitor is set. Resolution determines how much information itr
computer monitor can display.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Starting MS-Word:

Double click on Microsoft word icon on the desk top.

Click on start ->programs->ms office ->ms word

Quick Access toolbar: The Quick Access toolbar provides it with access to commands it frequently
use. By default Save, Undo, and Redo appear on the Quick Access toolbar. It can use Save sitr file,
Undo to rollback an action it have taken, and Redo to reapply an action it have rolled back.

Ribbon: Use the Ribbon to issue commands. The Ribbon is located near the top of the screen, below the
Quick Access toolbar. At the top of the Ribbon are several tabs; clicking a tab displays several
related command groups. Within each group are related command buttons. It click buttons to issue
commands or to access menus and dialog boxes.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Ruler: Use the ruler to change the format of itr document quickly

Text area: Type document in the text area. The blinking vertical line in the upper-left corner of the
text area is the cursor.

Status bar: The Status bar appears at the very bottom of window and provides such information as the
current page and the number of words in itr document

Using Latex and Word to create project certificate. Features to be covered:-Formatting Fonts in word,
Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and Colors, Inserting
Header and Footer, Using Date and Time option in both LaTeX and Word
Font:The font formatting options that it can configure on the Font tab in the Font dialog box influence
the appearance of the individual characters in itr text

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

A drop cap is a specially formatted letter that appears at the beginning of a paragraph. Word 2007 offers
two styles of drop caps. The first, and more common, begins the paragraph with a large letter that spills
down into the text. Thus, the drop cap displaces the first few lines of the paragraph. The second style
places the large first letter in the margin adjacent to the paragraph.

Header & Footer: On the Insert tab, in the Header & Footer group, click Header or Footer.

Click the header or footer that it want to add to itr document.

To return to the body of itr document, click Close Header and Footer on the Design tab (under Header
& Footer Tools).

The Office Button is the round icon at the top left-hand corner. It
includes the basic File Functions from the older version of Office

• New, Open, Save, Save As, Print, etc.


Click on the Office Button icon. It will see the main file functions
in the pull-down menu.

The Quick Access Toolbar contains shortcuts to


• Save, Undo, and Repeat Tools
Quick • recommend always using MS Office Button >>Save As to
Access make sure itr work is being saved properly
Toolbar
Ribbon The Menu or Toolbar from older versions of MS Office have been
Tabs replaced with Ribbon Tabs.

Ribbon

Ribbon Tabs are broken into sub-sections called Tool Groups.


Example
Tool
Group • Here is the Clipboard Group under the Home Tab

• Basic functions such as Cut, Copy, and Paste are


represented as icons

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• When it hold the mouse over
each icon, a small window will
appear to show it

• The keyboard shortcut for that


Tool

• A description of what that Tool does

• The image to the right shows the window tha appears when
it hold the mouse over the Cut Tool icon

Take some time to explore the Ribbon Tabs and Tool Groups
and learn where to find the Tools it use most frequently.

When it click on the small arrow at


Dialog the bottom right-hand corner of Tool
Box Group box, a Dialog Box appears.

The Dialog Box provides additional


Formatting options related to the
Tool Group that it chose.

The arrow at the bottom of the “Paste” button


indicates that it can drop down a Context Menu.

• The Context Menu provides more options


related to the
Context function it are working with.
Menu
In order to format or edit any inserted object (ex. images, tables,
etc.)
Formatting
Tools Tab 1. It must first select the
object by clicking on the
image or bring the cursor
inside the table.

2. Then the Formatting


Tools Tab appears at the right-hand end of the Ribbon Tabs. It
provides the formatting palettes for the selected object.

Saving Documents In Office 2007 :

1. In the Computing Facilities, files on the Desktop are NOT SAVED when it log off.
• ALWAYS use Save As... to save itr file to a USB Flash Drive, UVicTemp, or CD
• It can also save a file to the Desktop and then send an email to itrself with the file as an
attachment

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
2. If it are NOT running Office 2007 at home and it save a document as 2007 format (*.docx, .xlsx,
pptx), IT WILL NOT BE ABLE TO OPEN IT AT HOME! (see step 3 below)

3. If it have Office 2000 or 2003 or it use a Mac at home or in the Computing Facilities
• It will have to save itr document as an older version
• Go to MS Office Button >>Save As
At the bottom, there is a bar that asks it to “Save as Type:”
Choose the format for the older version (ex. “Word 97-2003 Document (*.doc)” )
• DO NOT CHOOSE the 2007 format: “Word Document (*.docx)” “Excel Document
(*.xlsx)” or “Power PointDocument (*.pptx)

4. If it are using a PC at home running Office 2000 or 2003


• Under New Downloads, choose "Microsoft Office Compatibility Pack for Word..."
• Even with the Compatibility Pack, it might lose data / formatting when it save as an older
version

Microsoft Word Shortcuts

• To Create a New Document: Click the Office Button, select New, and click Create, or press <Ctrl>+
<N>.
• To Open a Document: Click the Office Button and select Open, or press <Ctrl>+ <O>.

• To Save a Document: Click the Save button on the Quick Access Toolbar, or press
<Ctrl>+ <S>.

• To Save a Document with a Different Name: Click the Office Button, select Save As, and enter a
new name for the document.

• To Preview a Document: Click the Office Button, point to the Print list arrow, and select Print
Preview.

• To Print a Document: Click the Office Button and select Print, or press <Ctrl>+ <P>.

• To Undo: Click the Undo button on the Quick Access Toolbar or press <Ctrl>+ <Z>.

• To Close a Document: Click the Close button or press <Ctrl>+ <W>.

• To Get Help: Press <F1>to open the Help window. Type itr question and press <Enter>.

• To Exit Word: Click the Office Button and click Exit Word.

• To Cut or Copy Text: Select the text it want to cut or copy and click the Cut or Copy button
in the Clipboard group on the Home tab.
• To Paste Text: Place the insertion point where it want to paste and click the Paste button in the
Clipboard group on the Home tab.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• To Format Selected Text: Use the commands in the Font group on the Home tab, or click the Dialog
Box Launcher in the Font group to open the Font dialog box.

• To Copy Formatting with the Format Painter: Select the text with the formatting it want to copy and
click the Format Painter button in the Clipboard group on the Home tab. Then, select the text it
want to apply the copied formatting to.

• To Change Paragraph Alignment: Select the paragraph(s) and click the appropriate alignment button
( Align Left, Center, Align Right, or Justify) in the Paragraph group on the Home tab.

• To Indent a Paragraph: Click the Increase Indent button in the Paragraph group on the Home
tab.

• To Decrease an Indent: Click the Decrease Indent button in the Paragraph group on the Home
tab.

• To Add a Tab Stop: Click the Tab alignment box on the Ruler until it see the type of tab it want to
insert. Then, click on the Ruler where it want to insert the tab stop.

• To Adjust or Remove a Tab Stop: Click and drag the tab stop to the desired position on the Ruler.
Click and drag the tab stop off the Ruler to remove it.

• To Change Paragraph Line Spacing: Click the Line Spacing button in the Paragraph group on
the Home tab and select an option from the list.
• To Create a Bulleted or Numbered List: Select the paragraphs it want to bullet or number and click
the Bullets or Numbering button in the Paragraph group on the Home tab.

• To Change a Document’s Margins: Click the Page Laitt tab on the Ribbon, click the Margins button
in the Page Setup group, and select a setting.

• To Change Page Orientation: Click the Page Laitt tab on the Ribbon, click the Orientation button,
and select an option from the list.

• To Insert a Header or Footer: Click the Insert tab on the Ribbon and click the Header or Footer
button in the Header & Footer group.

• To Insert a Manual Page Break: Click the Insert tab on the Ribbon and click the Page Break button
in the Page Setup group.

• To Insert a Section Break: Click the Page Laitt tab on the Ribbon, click the Breaks button in the
Page Setup group, and select the type of break it want to insert.

• To Correct a Spelling Error: Right-click the error and select a correction from the contextual menu.
Or, press <F7>to run the Spell Checker.

• To Find Text: Click the Find button in the Editing group on the Home tab.

• To Replace Text: Click the Replace button in the Editing group on the Home tab.

Click where it want to insert the date or time.

On the Insert tab, in the Text group, click Quick Parts.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Hyperlink: It is a colored and underlined text or a graphic that it click to go to a file, a location in a
file , HTML page on the world wide b, or an HTML page in an internet.

Spell check: It automatically checks for spelling and grammatical errors

Table: A table consists of rows and columns

Creation of a table:

• Click where it want to create a table.


• On the Table menu, point to Insert, and then click Table.
• Under Table size, select the number of columns and rows.
• Under AutoFit behavior, choose options to adjust table size.
• To use a built-in table format, click AutoFormat
Cell alignment:

• Click the cell that contains text it want to align.


• On the Tables and Borders toolbar, select the option for the horizontal and
• Vertical alignment it want for example, Align Bottom Center or Align Top Right

Word Art:

• On the Drawing toolbar, click Insert WordArt


• Click the WordArt effect it want, and then click OK
• In the Edit WordArt Text dialog box, type the text it want
• Do any of the following:

➢ To change the font type, in the Font list, select a font.


➢ To change the font size, in the Size list, select a size
➢ To make text bold, click the Bold button.
➢ To make text italic, click the Italic button.

Microsoft PowerPoint 2007

• PowerPoint is a application used for the creation of presentations. These presentations are laid out in a
"storyboard" type fashion, where individual slides are created and formatted with text and images.
Power Point presentations are widely used in classrooms as note outlines for teachers, and for project
presentations by students.

• The point of the slides in PowerPoint presentations is NOT to fit as much detailed information as it can
onto a single slide. Rather, each slide should contain elements that briefly sum up the major idea(s) of
what it will be presenting for the duration of the slide. The style in which it create slides is completely
up to it.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• PowerPoint allows it to choose from a wide variety of formats that include sections such as titles,
lists, images, or charts. Any of these can be incorporated into itr presentation.

• The main thing to keep in mind, ho ver, is that an audience will be viewing this material; it must be
large enough to read, yet not so large that it takes up far too much of the screen to include relevant
information. All Writing Program computer classrooms come equipped with PowerPoint already
installed on the computers.

• It is best to outline itr entire presentation before working too much on the style and laitt of itr
presentation. When left to the end it is much less time consuming to work on the style and format of itr
slides. Keep in mind the content of itr presentation is the most important part of it!

• Keep it points short and straightforward. Points should be complimentary to itr oral presentation.

• PowerPoint allows it to add a lot of distracting sounds and excessive animations to itr presentation. It
is best to keep all animation as simple as possible and only use sounds if absolutely necessary.

• Stay away from unusual fonts. If it are presenting on an unfamiliar computer the font it have chosen
may not work. Arial and Times New Roman are common fonts.

• Think of contrast. If it use a dark background use light-colored text and vice versa.

• Refrain from using backgrounds that will obscure itr text colour.

• The MS Office Button contains the main file functions New, Open, Save, Save as, Print, Print Preview,
etc.
• The Quick Access Toolbar contains shortcuts to Save, Undo, and Repeat
• Each Ribbon Tab displays a Ribbon that provides a set of Tool Groups.
• The Ribbon Tab and the Tool Groups in the Ribbon correspond to the Menu and Toolbar in Word 2000
and 2003
• The Name of each Tool Group is listed at the bottom of the Group
Example - In the Home Tab, the third Tool Group is named Font
• The name "Font" is under the Font Tool Group
• To change the Tool Groups being displayed in the Ribbon
• Click on the appropriate Ribbon Tab
• Example - The Home Tab contains Tool Groups for the most commonly used Tools Clipboard, Font,
Paragraph, and Style tools in Word

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• Some Tool Group boxes have a small arrow in the bottom right-hand corner. If it click on this arrow,
PowerPoint will open a Dialog Box which offers more options and settings related to that Tool Group
• In PowerPoint2007, it will find that tools with similar uses are organized so that they are usually found
within the same Tool Group or at least within one Ribbon. If it do not find a tool in the Ribbon it think
it should be in, try exploring the other Ribbon Tabs.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
MS Office Button >> New -- New Presentation
Create a new presentation window opens up
• The MS Office Button is located in the top left
corner of the Word 2007 Window
• To start a new file from scratch:
• Choose “Blank Document” and press “Create”.
• There are templates available on the left panel
for creating a presentation of a
• specific type (ie. photo album or calendar).

Open an existing presentation MS Office Button >> Open


• Find itr presentation in the “Open” window.
• PowerPoint2007 will open files created with
older versions of PowerPoint
• (*.ppt) as ll as PowerPoint 2007 files (*.pptx)

Open a file from a different PowerPoint2007 will automatically convert a


version or format document from a compatibleversion of PowerPoint

• Itr document will open in Compatibility Mode


• This will prevent it from using certain tools in
Office 2007 which are not compatible with
Office 2000 or 2003
• When it finish editing a document, be VERY
CAREFUL to save any converted documents
in their original format
• Please read the Important Notes below
regarding saving in Office 2007

MS Office Button >> Save


Save the current document Please read the Important Notes above regarding
saving in Office 2007
Save a document under a MS Office Button >> Save As...
different name, version, or In the bars at the bottom of the Save As... sub
format window:
• Give it document a new name in “File Name:”
• Select the version and format from “Save as type:”

Add a new slide Home Tab >> Slides >> New Slide
• Click on New Slide button. It adds a new slide in
the default laitt "Titleand Content.”
• Click on the arrow at the bottom corner of the
New Slide button. It can select the slide laitt from
the Default Design pallet.
• Click Laitt button. It can select and change the
slide laitt.
• Click Delete button to delete the current slides.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Viewing Slides in PowerPoint 2007 Workspace

Laitt of frames in When it first open a new presentation in Power Point


“Normal the main window has three frames:
• The right biggest frame shows the Current Slide.
View” • The left frame has two tabs:
Slides tab displays the slides as thumbnails
Outline tab displays a written outline of each
slide of itr presentation.
• The bottom frame is for Notes to remind it of
points for each slide.

Different views allow it to View Tab >> Presentation Views


manage differentaspects of itr Normal View - A window splits into Slide, Notes, and
presentation. the left frame where it can choose either Slides
Thumbnails or Slides Outline. Allows it to focus on a
slide and see everything about the slide at once.
Slide Sorter - Gives thumbnails of all the slides in the
presentation. Lets it see the big picture. Allows it to
sort, move, add and delete slides easily. Useful near
end of a project
Notes Page - Displays a page laitt of the notes and the
slide. Allows it to
rearrange the notes and compare them to the content
of itr slide.
Slide Show - Plays the presentation from the
beginning.

Inserting and Formatting Text and Objects

Home Tab >> Drawing >> Text Box


• In PowerPoint all text is contained in Text Boxes.
• Click on Text Box button >> Click anywhere in
Add text with text
the slide.
boxes
• Drag circle corner points or square side points of
the text boxto change its size.
• Click within the box to type text.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Format text box


Select the text box. The Drawing Tools Tab appears.
Click on the Format tab. Format the selected text box in
Shape Styles:
• Shape Fill -- Changes the fill color
• Shape Outline -- Changes the color, width, line style
of outline
• Shape Effects -- Applies visual effects (shadow,
bevel, etc.) to the text box

Insert Tab >> Text >> WordArt


Add WordArt --
Click on the WordArt button >> Select the style it
fancy text
like
A WordArt Text Box appears in the slide.Type in.

Formatting process is basically the same as formatting "text


box," "WordArt," or "Shape."

Format an image and


Clip Art
• Select objects (image or clip art). Picture Tool Tab
appears.
• Format objects using Adjust Group, Picture Styles Group
and Arrange
• Group.
• Move objects: See the instruction of "Move Text Box"

Formatting Slide Design

Design Tabs >> Background >> Background Styles


• Click on the Format Background button at the bottom.
• Format Background window appears.
• It can set the color, solid or gradient, transparency or
Change the
choose
background
• picture/texture fill
• Click on Close button to apply changes only to the
current slide
• Click on Apply to All to apply changes to all the slide

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Change the theme Design Tabs >> Themes
• Move the cursor over the theme buttons to preview
different themes on itr current slide.
• Click on any theme button to choose the theme,
which will be applied to all the slides in itr
presentation.
• Colors -- Changes the color scheme of the current
theme
• Fonts -- Changes the font of the current theme
• Effects -- Changes the effects of the current theme
Formatting Presentation in Slide Master
The Slide Master acts as a template for itr entire presentation.
Altering anything on the Slide Master will change it for all the slides in itr
presentation

Finishing Steps
Change the order of View Tab >> Presentation Views >> Slide Sorter
the slides • It can easily change the order, if it have a lot of
slides.Or, select Slides tab in the left frame in the
Normal View. It can see thumbnails of the slides in itr
presentation.
• Click on a slide thumbnail and drag up and down to
change the order.
Make notes Write itr notes in the bottom frame in Normal view.
To Print itr notes:
• Office Button >> Print >> Print What:
• Select "Note Pages" NOTE: Notes are not visible
during the slide show

Manual Presentation:
Present the slide View Tab >> Presentation Views >> Slide Show
show • To move to the next slide in itr presentation do one of
the following:
• Click the left mouse button
• Hit the spacebar
• se the arrow keys on the keyboard. Up and left go
back, right and down go forward.
• Click on the Esc key on keyboard to go back to
Normal view.
• Automatic Presentation:
• Animations Tab>> Transition to this Slide >>
Advance Slide
• Click on the check box for "Automatically After."
• Set the time to automatically change to the next slide
after a certain duration of time.
• This feature is useful if it are under a time constraint
or if it want to present in a more movie-like style.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Microsoft Excel 2007
Microsoft Excel is an electronic spreadsheet that runs on a personal computer. it can use it to organize your
data into rows and columns and to perform mathematical calculations quickly.

Excel 2007 has eight standard ribbon tabs

Home Tab

ICONS DESCRIPTIONS
Clipboard
Pastes the contents of the clipboard in the cursor’s current location

Places the currently selected item on the clipboard, it will be removed from its
current location once it is pasted in a new location

Copies the currently selected item to the clipboard


Copies the formatting of the currently selected item to apply to the next selected
item
Shows the clipboard and other options

Fonts

Font
Font size
Increase font size
Decrease font size
Bold
Italics
Underline (the arrow will give you line options)
Apply the last used border (the arrow will give you border
options)
Apply the last used cell color (the arrow will give you color
options)
Apply the last used font color (the arrow will give you color
options)
More font options

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Alignment

Align contents to top, middle, or bottom


Change the angle of the text in the cell
Align cell contents to left, center, or right
Increase or decrease indent
Make all cell contents visible by wrapping to multiple lines
Merges selected cells into one cell and centers the contents (the
arrow provides more options)
More alignment options

Some Advanced Icons

Number format (i.e. currency, percentage, date)


Accounting number format currency (alternate currencies are
available using the arrow)
Display cell contents as a percentage
Display the cell value with a thousand’s separating comma
Increase or decrease the number of decimal places
More number options
Automatically format cells based on the cell contents

Format the selected cells as a table

Format cells by using pre-defined styles

Insert cell, row, or column


Delete cell, row, or column
Various cell, row, or column formatting options
Autosum (the arrow provides other common formulas)
Fill
Clear
Arrange and view data by sorting or filtering

Find text, formatting, or type of information

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Insert Tab

Insert pivot table Insert another type


or pivot chart of chart

Insert table Insert a hyperlink


to a website

Insert a picture Insert a text box


from a file

Insert Microsoft Insert a header


clip art and/or a footer

Insert shapes or Insert Word Art


drawing canvas

Insert a Smart Art Insert a signature


diagram line

Insert a column Insert a range of


chart other types of
objects

Insert a line chart Insert a symbol

Insert a pie chart Insert an area


chart

Insert a bar chart Insert a scatter


chart

Page Layout Tab

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Formulas Tab

Data Tab

Review Tab

View Tab

A CRICKET SCORECARD IN EXCEL 2007

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
For Deciding Which Team to Bat First
• A19=IF(A3=1, A6,E6)
• J9=IF(A3=1,A6,E6)
• H19=IF(A3=1,E6,A6)

First Batting Team Details:

• Runs:: H12=H59+J15
• Wickets:: I12=COUNT(M48:M58)
• OversPlayed:: J12=COUNT(B71:B80,D71:D80,F71:F80,H71:H80,J71:J80)
• No Balls:: H15=SUM(J63:J67)
• Wide Balls:: I15=SUM(I63:I67)
• Extra Runs:: J15=SUM(H15:I15)

Second Batting Team Details:


• Runs:: K12=H102+M15
• Wickets:: L12=COUNT(M91:M101)
• OversPlayed:: M12==COUNT(B114:B123,D114:D123,F114:F123,H114:H123,J114:J123)
• No Balls:: K15=SUM(J106:J110)
• Wide Balls:: L15=SUM(I106:I110)
• Extra Runs:: M15=SUM(K15:L15)

1st INNINGS COMPLETE GAME DETAILS

Total Score: H59=SUM(H48:H58)


Balls Faced: J59=SUM(J48:J58)
Total No. Of 6’s: L59=SUM(L48:L58)
Total Maidens: I59=SUM(I48:I58)
Total No. Of 4’s: K59=SUM(K48:K58)
Bowlers Economy Opening: K63=IF(E63,G63/(E63*6),"")
Bowlers Economy 1ST : K64 =IF(E64,G64/(E64*6),"")
Bowlers Economy 2ND : K65=IF(E65,G65/(E65*6),"")
Bowlers Economy 3RD : K66=IF(E66,G66/(E66*6),"")
Bowlers Economy 4TH : K67=IF(E67,G67/(E67*6),"")

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
2ND INNINGS COMPLETE GAME DETAILS

Required RunRate: M89 =H59/C8


Total Score: H102 =SUM(H91:H101)
Balls Faced: J102 =SUM(J91:J101)
Total No. Of 6’s: L102 =SUM(L91:L101)
Total Maidens: I102 =SUM(I91:I101)
Total No. Of 4’s: K102 =SUM(K91:K101)

Bowlers Economy Opening: K106 =IF(E106,G106/(E106*6),"")


Bowlers Economy 1ST : K107 =IF(E107,G107/(E107*6),"")
Bowlers Economy 2ND : K108 =IF(E108,G108/(E108*6),"")
Bowlers Economy 3RD : K109 =IF(E109,G109/(E109*6),"")
Bowlers Economy 4TH : K110 =IF(E110,G110/(E110*6),"")

The Graphs in the above tables are based on the no. of runs per over.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 5
Operating System Installation

Installing LINUX:
Step 1: Write the downloaded ISO file into USB drive or in DVD and boot your system with USB Drive /
DVD & will get below welcome Screen.

Step 2: Click on ‘Install Ubuntu‘Option

Step 3: Prepare to Install Ubuntu, make sure your system has enough free space (at least 6.4 GB),
connected to Internet & power source Click on Continue

Step 4: Installation Type: You can select default option, in which data on disk will be erased, if you want
your customize partition table, then select ‘Something else’ option. If you want encrypt the drive, then
select ‘Encrypt the new Ubuntu installation for security‘.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Step 5: Create Partitions as per your requirement. In my case i am creating /boot – 500 MB, swap-2048
MB and / – 10240 MB. Click on Install Now

Step 6: Select your Respective Time Zone

Step 7: Select Keyboard Layout

Click on Continue

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Step 8: Set the Hostname and User Name with the password.

Click on Continue

Step 9: Installation Started as shown below

Step 10: After the installation is completed, it will ask you to reboot the Machine.

Step 11: Login prompt after installation – Use same credentials that you have set during installation

Step 12: Screen after the Entering the Credentials

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 6
Basic Commands

GENERAL COMMAND SYNTAX


The commands in Linux have the following syntax://{ $command options arguments }

Linux Basic Commands:


1. pwd
“pwd” command prints the absolute path to current working directory.
{ $pwd

/home/Raghu }

2. cal
Displays the calendar of the current month.

{ $cal

July 2012
Su Mo Tu We Th Fr Sa
1234567
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28

29 30 31 }
‘cal ’ will display calendar for the specified month and year.

{ $cal 08 1991
August 1991
Su Mo Tu We Th Fr Sa
123
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31 }

3. clear

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
This command clears the screen.

4. echo
This command will echo whatever provide it.
{ $ echo "linoxide.com"

linoxide.com }
The ‘echo’ command is used to display the values of a variable. One such variable is ‘HOME’. To check
the value of a variable precede the variable with a $ sign.
{ $ echo $HOME/home/Raghu }

5. date
Displays current time and date.

{ $ date
Fri Jul 6 01:07:09 IST 2012 }
If interested only in time, can use 'date +%T' (in hh:mm:ss):

{ $ date +%T
01:13:14 }

6. tty
Displays current terminal.

{ $tty
/dev/pts/0 }

7. whoami
This command reveals the user who is currently logged in.

{ $whoami
Raghu }

8. id
This command prints user and groups (UID and GID) of the current user.

{ $ id

uid=1000(raghu) gid=1000(raghu)
groups=1000(raghu),4(adm),20(dialout),24(cdrom),46(plugdev),112(lpadmin),120(admin),122(sambas
hare) }
By default, information about the current user is displayed. If another username is provided as an
argument, information about that user will be printed:

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
{ $ id root
uid=0(root) gid=0(root) groups=0(root) }

BASIC HELP COMMANDS


1. help
With almost every command, ‘--help’ option shows usage summary for that command.
{ $ date --help
Usage: date [OPTION]... [+FORMAT] or: date [-u|--utc|--universal] [MMDDhhmm[[CC]YY][.ss]]
Display the current time in the given FORMAT, or set the system date. }

2. whatis
This command gives a one line description about the command. It can be used as a quick reference for
any command.
{$ whatis date
date (1) - print or set the system date and time }
{ $whatiswhatis
whatis (1) - display manual page descriptions }

3. man
‘--help’ option and ‘whatis’ command do not provide thorough information about the command. For more
detailed information, Linux provides man pages and info pages. To see a command's manual page, man
command is used.

{ $ man date }
The man pages are properly documented pages. They have following sections:
NAME: The name and one line description of the command.
SYNOPSIS: The command syntax.

DESCRIPTION: Detailed description about what a command does.


OPTIONS: A list and description of all of the command's options.
EXAMPLES: Examples of command usage.

FILES: Any file associated with the command.


AUTHOR: Author of the man page
REPORTING BUGS: Link of website or mail-id where can report any bug.
SEE ALSO: Any commands related to the command, for further reference.
With -k option, a search through man pages can be performed. This searches for a pattern in the name and
short description of a man page.
{ $ man -k gzip

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
gzip (1) - compress or expand files
lz (1) - gunzips and shows a listing of a gzip'dtar'd archive
tgz (1) - makes a gzip'd tar archive
uz (1) - gunzips and extracts a gzip'dtar'd archive
zforce (1) - force a '.gz' extension on all gzipfiles }
4. info
Info documents are sometimes more elaborate than the man pages. But for some commands, info pages are
just the same as man pages. These are like web pages. Internal links are present within the info pages. These
links are called nodes. Info pages can be navigated from one page to another through these nodes.
{ $ info date }
Linux Filesystem commands

BASIC FILESYSTEM COMMANDS


1. Change Directories
{ $ cd [path-to-directory] }
Change the current working directory to the directory provided as argument. If no argument is given to
‘cd’, it changes the directory to the user's home directory. The directory path can be an absolute path or
relative to current directory. The absolute path always starts with /. The current directory can be checked
with ‘pwd’ command (remember?)
{ $pwd
/home/raghu
$ cd /usr/share/

$ pwd
/usr/share
$ cd doc
$ pwd
/usr/share/doc }
In the first ‘cd’ command, absolute path (/usr/share) is used, and with second command, relative path
(doc) is used.

2. Listing File And Directories


{ $ ls [files-or-directories] }
List files and/or directories. If no argument is given, the contents of current directory are shown.
{ $ ls
example file1.txt file2.txt file3.txt }

If a directory is given as an argument, files and directories in that directory are shown.
{ $ ls /usr

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
bin games include lib lib64 local sbin share src }
‘ls -l’ displays a long listing of the files.

{ $ ls -l
total 4
drwxr-xr-x 2 raghuraghu 4096 2012-07-06 12:52 example
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file1.txt
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file2.txt
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file3.txt }

In this long listing, the first character is 'd' or '-'. It distinguishes between file types. The entries with a '-'
(dash) are regular files, and ones with 'd' are directories. The next 9 characters are permissions ('rwxr-xr-x'
in first listing). The number following the permissions is the link count. Link count follows user and group
owner. In the above example, the file owner is 'raghu' and group owner is 'raghu' as well. Next is the size
of the file. And then time stamp before the name of file (or directory).
By default, hidden files or directories are not shown, to see hidden files as well, -a option is used. Hidden
files in Linux start with a period sign (.). Any file that starts with a period is hidden. So, to hide a file, just
need to rename it (and put a period before it).
{ $ ls -la odesk
total 16
drwxr-xr-x 4 raghuraghu 4096 2012-07-06 13:46 .
drwxr-xr-x 11 raghuraghu 4096 2012-07-06 13:15 ..

drwxr-xr-x 2 raghuraghu 4096 2012-07-06 12:52 example


-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file1.txt
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file2.txt
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file3.txt
drwxr-xr-x 2 raghuraghu 4096 2012-07-06 13:46 .hiddendir
-rw-r--r-- 1 raghuraghu 0 2012-07-06 13:46 .hiddenfile1.txt
-rw-r--r-- 1 raghuraghu 0 2012-07-06 13:46 .hiddenfile2.txt }

If want to see the properties of a directory instead of the files contained in it, use -d (with -l) option:
{ $ ls -ldodesk/
drwxr-xr-x 4 raghuraghu 4096 2012-07-06 13:46 odesk/ }

DATE AND TIME COMMAND WITH EXAMPLES


date command is used to display the system date and time. date command is also used to set date and time
of the system. By default the date command displays the date in the time zone on which unix/linux operating
system is configured. must be the super-user (root) to change the date and time.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Syntax:
{ date [OPTION]... [+FORMAT]

date [-u|--utc|--universal] [MMDDhhmm[[CC]YY][.ss]] }

Options with Examples


1. date (no option) : With no options, the date command displays the current date and time, including
the abbreviated day name, abbreviated month name, day of the month, the time separated by colons, the
time zone name, and the year.

Command:
{ $date
Output:
Tue Oct 10 22:55:01 PDT 2017 }
Note : Here unix system is configured in pacific daylight time.

2. -u option:Displays the time in GMT(Greenwich Mean Time)/UTC(Coordinated Universal Time ) time


zone.
Command:
{ $date -u
Output :
Wed Oct 11 06:11:31 UTC 2017 }

3. –date or -d option: Displays the given date string in the format of date. But this will not affect the
system’s actual date and time value.Rather it uses the date and time given in the form of string.
Syntax:
{ $date --date=" string " }

Command:
{ $date --date="2/02/2010"
$date --date="Feb 2 2010" }

Output:
{ Tue Feb 2 00:00:00 PST 2010
Tue Feb 2 00:00:00 PST 2010 }

4. Using –date option for displaying past dates: Date and time of 2 years ago.
Command:
{ $date --date="2 year ago" }

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Output:
{ Sat Oct 10 23:42:15 PDT 2015 }

*Date and time of 5 seconds ago.

Command:
{ $date --date="5 sec ago" }

Output:
{ Tue Oct 10 23:45:02 PDT 2017 }
*Date and time of previous day.

Command:
{ $date --date="yesterday" }
Output:
{ Mon Oct 9 23:48:00 PDT 2017 }
*Date and time of 2 months ago.
Command:

{ $date --date="2 month ago" }

Output:
{ Thu Aug 10 23:54:51 PDT 2017 }
*Date and time of 10 days ago.

Command:
{ $date --date="10 day ago" }
Output: { Sat Sep 30 23:56:55 PDT 2017 }

5. Using –date option for displaying future date: Date and time of upcoming particular week
day.
Command:
{ $date --date="next tue" }

Output:
{ Tue Oct 17 00:00:00 PDT 2017 }
*Date and time after two days.

Command:
{ $date --date="2 day" }

Output:
{ Fri Oct 13 00:05:52 PDT 2017 }

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
*Date and time of next day.

Command:
{ $date --date="tomorrow" }

Output:
{ Thu Oct 12 00:08:47 PDT 2017 }
*Date and time after 1 year on the current day.

Command:
{ $date --date="1 year" }

Output:
{ Thu Oct 11 00:11:38 PDT 2018 }

6. -s or –set option: To set the system date and time -s or –set option is used.
Syntax:
{ $date --set="date to be set" }

Command:
{ $date }

Output:
{ Wed Oct 11 15:23:26 PDT 2017 }

Command:
{ $date --set="Tue Nov 13 15:23:34 PDT 2018"

$date }

Output:
{ Tue Nov 13 15:23:34 PDT 2018 }

7. –file or -f option: This is used to display the date string present at each line of file in the date and
time format.This option is similar to –date option but the only difference is that in –date we can only
give one date string but in a file we can give multiple date strings at each line.
Syntax:
{ $date --file=file.txt
$cat >>datefile
Sep 23 2018
Nov 03 2019 }

Command:
{ $date --file=datefile
Output:
Ramachandra College of Engineering
Date Page no
:……………………… :…………
……
Sun Sep 23 00:00:00 PDT 2018
Sun Nov 3 00:00:00 PDT 2019 }

8. -r option: This is used to display the last modified timestamp of a datefile .


Syntax:
{ $date -r file.txt }

We can modify the timestamp of a datefile by using touch command.


{ $touch datefile }
{ $date
Wed Oct 11 15:54:18 PDT 2017
//this is the current date and time
$touch datefile

//The timestamp of datefile is changed using touch command.


This was done few seconds after the above date command’s output.
{ $date
Wed Oct 11 15:56:23 PDT 2017
//display last modified time of datefile }

9. List of Format specifiers used with date command:


{ %D: Display date as mm/dd/yy.
%d: Display the day of the month (01 to 31).
%a: Displays the abbreviated name for weekdays (Sun to Sat).
%A: Displays full weekdays (Sunday to Saturday).
%h: Displays abbreviated month name (Jan to Dec).
%b: Displays abbreviated month name (Jan to Dec).
%B: Displays full month name(January to December).
%m: Displays the month of year (01 to 12).
%y: Displays last two digits of the year(00 to 99).
%Y: Display four-digit year.
%T: Display the time in 24 hour format as HH:MM:SS.
%H: Display the hour.
%M: Display the minute.
%S: Display the seconds. }

Syntax:
{ $date +%[format-option] }
Examples:
Command:
{ $date "+%D" }

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Output:
{ 10/11/17 }

Command:
{ $date "+%D %T" }

Output:
{ 10/11/17 16:13:27 }

Command:
{ $date "+%Y-%m-%d" }

Output:
{ 2017-10-11 }

Command:
{ $date "+%Y/%m/%d" }

Output:
{ 2017/10/11 }

Command:
{ $date "+%A %B %d %T %y" }

Output:
{ Thursday October 07:54:29 17 }

BASIC FILTERS AND TEXT PROCESSING


1. awk
Awk is a remarkable pattern scanning and processing language, it can be used to build useful filters in
Linux. can start using it by reading through our Awk series Part 1 to Part 13.
Additionally, also read through the awk man page for more info and usage options:
{ $ man awk }

2. sed
sed is a powerful stream editor for filtering and transforming text. We’ve already written a two useful
articles on sed, that can go through it here:
How to use GNU ‘sed’ Command to Create, Edit, and Manipulate files in Linux
15 Useful ‘sed’ Command Tips and Tricks for Daily Linux System Administration Tasks
The sed man page has added control options and instructions:

{ $ man sed }

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
3. grep, egrep, fgrep, rgrep
These filters output lines matching a given pattern. They read lines from a file or standard input, and print
all matching lines by default to standard output.
Note: The main program is grep, the variations are simply the same as using specific grep options as
below (and they are still being used for backward compatibility):
{ $egrep = grep -E

$ fgrep = grep -F
$ rgrep = grep -r }
Below are some basic grep commands:
{ tecmint@TecMint ~ $ grep "aaronkilik" /etc/passwd
aaronkilik:x:1001:1001::/home/aaronkilik:
tecmint@TecMint ~ $ cat /etc/passwd | grep "aronkilik"
aaronkilik:x:1001:1001::/home/aaronkilik: }

4. head
head is used to display the first parts of a file, it outputs the first 10 lines by default. can use the -n num
flag to specify the number of lines to be displayed:
{ tecmint@TecMint ~ $ head /var/log/auth.log
Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session opened for user root by (uid=0)

Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session closed for user root
Jan 2 10:51:34 TecMintsudo: tecmint : TTY=unknown ; PWD=/home/tecmint ; USER=root ;
COMMAND=/usr/lib/linuxmint/mintUpdate/checkAPT.py
Jan 2 10:51:34 TecMintsudo: pam_unix(sudo:session): session opened for user root by (uid=0)

Jan 2 10:51:39 TecMintsudo: pam_unix(sudo:session): session closed for user root

Jan 2 10:55:01 TecMint CRON[4099]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 2 10:55:01 TecMint CRON[4099]: pam_unix(cron:session): session closed for user root
Jan 2 11:05:01 TecMint CRON[4138]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 2 11:05:01 TecMint CRON[4138]: pam_unix(cron:session): session closed for user root
Jan 2 11:09:01 TecMint CRON[4146]: pam_unix(cron:session): session opened for user root by (uid=0)
}
{ tecmint@TecMint ~ $ head -n 5 /var/log/auth.log
Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session closed for user root

Jan 2 10:51:34 TecMintsudo: tecmint : TTY=unknown ; PWD=/home/tecmint ; USER=root ;


COMMAND=/usr/lib/linuxmint/mintUpdate/checkAPT.py

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Jan 2 10:51:34 TecMintsudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan 2 10:51:39 TecMintsudo: pam_unix(sudo:session): session closed for user root }

5. tail :tail outputs the last parts (10 lines by default) of a file. Use the -n num switch to specify the
number of lines to be displayed.
The command below will output the last 5 lines of the specified file:
{ tecmint@TecMint ~ $ tail -n 5 /var/log/auth.log
Jan 6 13:01:27 TecMintsshd[1269]: Server listening on 0.0.0.0 port 22.
Jan 6 13:01:27 TecMintsshd[1269]: Server listening on :: port 22.
Jan 6 13:01:27 TecMintsshd[1269]: Received SIGHUP; restarting.

Jan 6 13:01:27 TecMintsshd[1269]: Server listening on 0.0.0.0 port 22.


Jan 6 13:01:27 TecMintsshd[1269]: Server listening on :: port 22. }
The following command will enable monitor changes in the specified file:
{ tecmint@TecMint ~ $ tail -f /var/log/auth.log
Jan 6 12:58:01 TecMintsshd[1269]: Server listening on :: port 22.
Jan 6 12:58:11 TecMintsshd[1269]: Received SIGHUP; restarting.

Jan 6 12:58:12 TecMintsshd[1269]: Server listening on 0.0.0.0 port 22.


Jan 6 12:58:12 TecMintsshd[1269]: Server listening on :: port 22.
Jan 6 13:01:27 TecMintsshd[1269]: Received SIGHUP; restarting.
Jan 6 13:01:27 TecMintsshd[1269]: Server listening on 0.0.0.0 port 22.

Jan 6 13:01:27 TecMintsshd[1269]: Server listening on :: port 22.

Jan 6 13:01:27 TecMintsshd[1269]: Received SIGHUP; restarting.

Jan 6 13:01:27 TecMintsshd[1269]: Server listening on 0.0.0.0 port 22.


Jan 6 13:01:27 TecMintsshd[1269]: Server listening on :: port 22. }
Read through the tail man page for a complete list of usage options and instructions:
{ $ man tail }

6. sort
sort is used to sort lines of a text file or from standard input.
Below is the content of a file named domains.list:
{ tecmint@TecMint ~ $ cat domains.list
tecmint.com
tecmint.com

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
news.tecmint.com
news.tecmint.com
linuxsay.com
linuxsay.com
windowsmint.com
windowsmint.com }
run a simple sort command to sort the file content like so:
{ tecmint@TecMint ~ $ sort domains.list

linuxsay.com

linuxsay.com
news.tecmint.com
news.tecmint.com
tecmint.com
tecmint.com
windowsmint.com
windowsmint.com }

7. uniq
uniq command is used to report or omit repeated lines, it filters lines from standard input and writes the
outcome to standard output.

After running sort on an input stream, can remove repeated lines with uniq as in the example below.
To indicate the number of occurrences of a line, use the -c option and ignore differences in case
{ tecmint@TecMint ~ $ cat domains.list
tecmint.com
tecmint.com
news.tecmint.com
news.tecmint.com
linuxsay.com
linuxsay.com
windowsmint.com }
tecmint@TecMint ~ $ sort domains.list | uniq -c
2 linuxsay.com
2 news.tecmint.com

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
2 tecmint.com
1 windowsmint.com e comparing by including the -i option: }

8. fmt
fmt simple optimal text formatter, it reformats paragraphs in specified file and prints results to the
standard output.
The following is the content extracted from the file domain-list.txt:
1.tecmint.com 2.news.tecmint.com 3.linuxsay.com 4.windowsmint.com
To reformat the above content to a standard list, run the following command with -w switch is used to
define the maximum line width:
{ tecmint@TecMint ~ $ cat domain-list.txt
1.tecmint.com 2.news.tecmint.com 3.linuxsay.com 4.windowsmint.com
tecmint@TecMint ~ $ fmt -w 1 domain-list.txt
1.tecmint.com
2.news.tecmint.com
3.linuxsay.com
4.windowsmint.com }

9. pr
pr command converts text files or standard input for printing. For instance on Debian systems, list all
installed packages as follows:
{ $dpkg -l }
To organize the list in pages and columns ready for printing, issue the following command.
{ tecmint@TecMint ~ $ dpkg -l | pr --columns 3 -l 20
2017-01-06 13:19 Page 1
Desired=Unknown/Install ii adduser ii apg

| Status=Not/Inst/Conf- ii adwaita-icon-theme ii app-install-data

|/ Err?=(none)/Reinst-r ii adwaita-icon-theme- ii apparmor


||/ Name ii alsa-base ii apt
+++-=================== ii alsa-utils ii apt-clone

ii accountsservice ii anacron ii apt-transport-https

ii acl ii apache2 ii apt-utils


ii acpi-support ii apache2-bin ii apt-xapian-index
ii acpid ii apache2-data ii aptdaemon

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
ii add-apt-key ii apache2-utils ii aptdaemon-data
2017-01-06 13:19 Page 2
ii aptitude ii avahi-daemon ii bind9-host
ii aptitude-common ii avahi-utils ii binfmt-support
ii apturl ii aview ii binutils
ii apturl-common ii banshee ii bison
ii archdetect-deb ii baobab ii blt
ii aspell ii base-files ii blueberry

ii aspell-en ii base-passwd ii bluetooth


ii at-spi2-coreii bash ii bluez

ii attr ii bash-completion ii bluez-cups


ii avahi-autoipd ii bc ii bluez-obexd
.....}The flags used here are:
--column defines number of columns created in the output.

-l specifies page length (default is 66 lines).

10. tr
This tool translates or deletes characters from standard input and writes results to standard output.
The syntax for using tr is as follows:
{ $ tr options set1 set2 }
Take a look at the examples below, in the first command, set1( [:upper:] ) represents the case of input
characters (all upper case).
Then set2([:lower:]) represents the case in which the resultant characters will be. It’s same thing in the
second example and the escape sequence \n means print output on a new line:

{ tecmint@TecMint ~ $ echo "WWW.TECMINT.COM" | tr [:upper:] [:lower:]


www.tecmint.com
tecmint@TecMint ~ $ echo "news.tecmint.com" | tr [:lower:] [:upper:]

11. more
more command is a useful file perusal filter created basically for certificate viewing. It shows file content
in a page like format, where users can press [Enter] to view more information.
can use it to view large files like so:

{ tecmint@TecMint ~ $ dmesg | more


[ 0.000000] Initializing cgroupsubsyscpuset
[ 0.000000] Initializing cgroupsubsyscpu

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
[ 0.000000] Initializing cgroupsubsyscpuacct
[ 0.000000] Linux version 4.4.0-21-generic (buildd@lgw01-21) (gcc version 5.3.1 20160413 (Ubuntu
5.3.1-14ubuntu2) ) #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016 (Ubuntu 4.4.0-21.37-generic
4.4.6)
[ 0.000000] Command line: BOOT_IMAGE=/boot/vmlinuz-4.4.0-21-generic root=UUID=bb29dda3-
bdaa-4b39-86cf-4a6dc9634a1b ro quiet splash vt.handoff=7
[ 0.000000] KERNEL supported cpus:
[ 0.000000] Intel GenuineIntel
[ 0.000000] AMD AuthenticAMD
[ 0.000000] Centaur CentaurHauls

[ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256


[ 0.000000] x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers'
[ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
[ 0.000000] x86/fpu: Using 'eager' FPU context switches.

[ 0.000000] e820: BIOS-provided physical RAM map:


[ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009d3ff] usable
[ 0.000000] BIOS-e820: [mem 0x000000000009d400-0x000000000009ffff] reserved
[ 0.000000] BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
[ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000a56affff] usable
[ 0.000000] BIOS-e820: [mem 0x00000000a56b0000-0x00000000a5eaffff] reserved
[ 0.000000] BIOS-e820: [mem 0x00000000a5eb0000-0x00000000aaabefff] usable

--More--NEWS.TECMINT.COM } }

12. less
less is the opposite of more command above but it offers extra features and it’s a little faster with large
files.
Use it in the same way as more:

{ tecmint@TecMint ~ $ dmesg | less


[ 0.000000] Initializing cgroupsubsyscpuset
[ 0.000000] Initializing cgroupsubsyscpu
[ 0.000000] Initializing cgroupsubsyscpuacct

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
[ 0.000000] Linux version 4.4.0-21-generic (buildd@lgw01-21) (gcc version 5.3.1 20160413 (Ubuntu
5.3.1-14ubuntu2) ) #37-Ubuntu SMP Mon Apr 18 18:33:37 UTC 2016 (Ubuntu 4.4.0-21.37-generic
4.4.6)
[ 0.000000] Command line: BOOT_IMAGE=/boot/vmlinuz-4.4.0-21-generic root=UUID=bb29dda3-
bdaa-4b39-86cf-4a6dc9634a1b ro quiet splash vt.handoff=7
[ 0.000000] KERNEL supported cpus:
[ 0.000000] Intel GenuineIntel
[ 0.000000] AMD AuthenticAMD
[ 0.000000] Centaur CentaurHauls
[ 0.000000] x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256

[ 0.000000] x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers'
[ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
[ 0.000000] x86/fpu: Using 'eager' FPU context switches.
[ 0.000000] e820: BIOS-provided physical RAM map:

[ 0.000000] BIOS-e820: [mem 0x0000000000000000-0x000000000009d3ff] usable


[ 0.000000] BIOS-e820: [mem 0x000000000009d400-0x000000000009ffff] reserved
[ 0.000000] BIOS-e820: [mem 0x00000000000e0000-0x00000000000fffff] reserved
[ 0.000000] BIOS-e820: [mem 0x0000000000100000-0x00000000a56affff] usable
[ 0.000000] BIOS-e820: [mem 0x00000000a56b0000-0x00000000a5eaffff] reserved
[ 0.000000] BIOS-e820: [mem 0x00000000a5eb0000-0x00000000aaabefff] usable
:}

BASIC FILE COMPRESSION COMMANDS


Both Linux and UNIX include various commands for Compressing and decompresses (read as expand
compressed file). To compress files can use gzip, bzip2 and zip commands. To expand compressed file
(decompresses) can use and gzip -d, bunzip2 (bzip2 -d), unzip commands.

Compressing files

Syntax Description Example(s)


Gzip compress the size of the gzip mydata.doc
Gzip {Filename}
given files using Lempel-Ziv
coding (LZ77). Whenever gzip *.jpg
possible, each file is replaced
by one with the extension .gz. ls –l

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
bzip2 {filename} bzip2 compresses files using bzip2 mydata.doc
the Burrows-Wheeler block
sorting text compression bzip2 *.jpg
algorithm, and Huffman ls –l
coding. Compression is
generally considerably better
than that achieved by bzip
command (LZ77/LZ78-
based compressors).
Whenever possible, each file
is replaced by one with the
extension .bz2.

zip {.zip-filename} zip is a compression and file zip mydata.zip mydata.doc


{filename-to-compress} packaging utility for
Unix/Linux. Each file is zip data.zip *.doc
stored in single .zip {.zip- ls –l
filename} file with the
extension .zip.

tar -zcvf {.tgz-file} {files} The GNU tar is archiving tar -zcvf data.tgz *.doc
utility but it can be use to
tar -jcvf{.tbz2-file} {files} compressing large file(s). tar -zcvf pics.tar.gz *.jpg
GNU tar supports both *.png
archive compressing through tar -jcvfdata.tbz2 *.doc
gzip and bzip2. If have
more than 2 files then it is ls –l
recommended to use tar
instead of gzip or bzip2.

-z: use gzip compress

-j: use bzip2 compress

Decompressing files

Syntax Description Example(s)


gzip -d {.gz file} Decompressed a file that is gzip -d mydata.doc.gz
created using gzip
gunzip {.gz file} command. File is restored to gunzip mydata.doc.gz
their original form using this
command.

bzip2 -d {.bz2-file} Decompressed a file that is bzip2 -d mydata.doc.bz2


created using bzip2
bunzip2 {.bz2-file} command. File is restored to gunzip mydata.doc.bz2
their original form using this
command.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
unzip {.zip file} Extract compressed files in a unzip file.zip
ZIP archive.
unzip data.zip resume.doc

tar -zxvf {.tgz-file} Untar or decompressed a tar -zxvf data.tgz


file(s) that is created using
tar -jxvf{.tbz2-file} tar compressing through tar -zxvf pics.tar.gz *.jpg
gzip and bzip2 filter tar -jxvfdata.tbz2

List the contents of an archive/compressed file: Some time just wanted to look at files inside
an archive or compressed file. Then all of the above command supports file list option.

Syntax Description Example(s)


gzip -l {.gz file} List files from a GZIP gzip -l mydata.doc.gz
archive

unzip -l {.zip file} List files from a ZIP archive unzip -l mydata.zip

tar -ztvf{.tar.gz} List files from a TAR tar -ztvf pics.tar.gz


archive
tar -jtvf{.tbz2} tar -jtvfdata.tbz2

MISCELLANEOUS: apt-get command with Examples


apt-get is a command-line tool which helps in handling packages in Linux. Its main task is to retrieve the
information and packages from the authenticated sources for installation, upgrade and removal of packages
along with their dependencies. Here APT stands for the Advanced Packaging Tool.

Syntax:
{ apt-get [options] command
or
apt-get [options] install|remove pkg1 [pkg2 ...]
or
apt-get [options] source pkg1 [pkg2 ...] }

update : This command is used to synchronize the package index files from their sources again. need to
perform an update before upgrade or dist-upgrade.
{ apt-get update }
upgrade : This command is used to install the latest versions of the packages currently installed on the
user’s system from the sources enumerated in /etc/apt/sources.list. The installed packages which have new
packages available are retrieved and installed. need to perform an update before the upgrade, so that apt-
get knows that new versions of packages are available.
{ apt-get upgrade }

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
dselect-upgrade : This is used alongwith the Debian packaging tool, dselect. It follows the changes made
by dselect to the Status field of available packages, and performs any actions necessary to realize that state.
{ apt-get dselect-upgrade }
dist-upgrade : This command performs the function of upgrade, and also handles changing dependencies
with new versions of packages. If necessary, the apt-get command will try to upgrade important packages
at the expense of less important ones. It may also remove some packages in this process.
{ apt-get dist-upgrade }
install : This command is used to install or upgrade packages. It is followed by one or more package names
the user wishes to install. All the dependencies of the desired packages will also be retrieved and installed.
The user can also select the desired version by following the package name with an ‘equals’ and the desired
version number. Also, the user can select a specific distribution by following the package name with a
forward slash and the version or the archive name (e.g. ‘stable’, ‘testing’ or ‘unstable’). Both of these
version selection methods have the potential to downgrade the packages, so must be used with care.
{ apt-get install [...PACKAGES] }
remove : This is similar to install, with the difference being that it removes the packages instead of
installing. It does not remove any configuration files created by the package.
{ apt-get remove [...PACKAGES] }
purge :This command removes the packages, and also removes any configuration files related to the
packages.
{ apt-get purge [...PACKAGES] }
check : This command is used to update the package cache and checks for broken dependencies.
{ apt-get check }
download : This command is used to download the given binary package in the current directory.
{ apt-get download [...PACKAGES] }

clean : This command is used to clear out the local repository of retrieved package files. It removes
everything but not the lock file from /var/cache/apt/archives/partial/ and /var/cache/apt/archives/.
{ apt-get clean }
autoremove : Sometimes the packages which are automatically installed to satisfy the dependencies of
other packages, are no longer needed then autoremove command is used to remove these kind of packages.
{ apt-get autoremove }

Options:
–no-install-recommends : By passing this option, the user lets apt-get know not to consider recommended
packages as a dependency to install.
{ apt-get --no-install-recommends [...COMMAND] }
–install-suggests : By passing this option, the user lets apt-get know that it should consider suggested
packages as dependencies to install.
{ apt-get --install-suggests [...COMMAND] }

-d or –download-only : By passing this option, the user specifies that apt-get should only retrieve the
packages, and not unpack or install them.
Ramachandra College of Engineering
Date Page no
:……………………… :…………
……
{ apt-get -d [...COMMAND] }
-f or –fix-broken : By passing this option, the user specifies that apt-get should attempt to correct the
system with broken dependencies in place.
{ apt-get -f [...COMMAND] }
-m or –ignore-missing or –fix-missing : By passing this option, the user specifies that apt-get should
ignore the missing packages ( packages that cannot be retrieved or fail the integrity check ) and handle the
result.
{ apt-get -m [...COMMAND] }

–no-download : By passing this command, the user disables downloading for apt-get. It means that it
should only use the .debs it has already downloaded.
{ apt-get [...COMMAND] }
-q or –quiet : When this option is specified, apt-get produces output which is suitable for logging.

{ apt-get [...COMMAND] }
-s or –simulate or –just-print or –dry-run or –recon or –no-act : This option specifies that no action
should be taken, and perform a simulation of events that would occur based on the current system, but do
not change the system.
{ apt-get -s [...COMMAND] }
-y or –yes or –assume-yes : During the execution of apt-get command, it may sometimes prompt the user
for a yes/no. With this option, it is specified that it should assume ‘yes’ for all prompts, and should run
without any interaction.
{ apt-get -y [...COMMAND] }
–assume-no :With this option, apt-get assumes ‘no’ for all prompts.

{ apt-get --assume-no [...COMMAND] }


–no-show-upgraded : With this option, apt-get will not show the list of all packages that are to be
upgraded.
{ apt-get --no-show-upgraded [...COMMAND] }
-V or –verbose-versions : With this option, apt-get will show full versions for upgraded and installed
packages.
{ apt-get -V [...COMMAND] }
–show-progress : With this option, apt-get will show user-friendly progress in the terminal window when
the packages are being installed, removed or upgraded.
{ apt-get --show-progress [...COMMAND] }
-b or –compile or –build : With this option, apt-get will compile/build the source packages it downloads.
{ apt-get -b [...COMMAND] }
–no-upgrade : With this option, apt-get prevents the packages from being upgraded if they are already
installed.
{ apt-get --no-upgrade [...COMMAND] }

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
–only-upgrade : With this option, apt-get will only upgrade the packages which are already installed, and
not install new packages.
{ apt-get --only-upgrade [...COMMAND] }
–reinstall : With this option, apt-get reinstalls the packages that are already installed, at their latest versions.
{ apt-get --reinstall [...COMMAND] }
–auto-remove or –autoremove : When using apt-get with install or remove command, this option acts like
running the autoremove command.
{ apt-get install/remove --autoremove [...PACKAGES] }
-h or –help : With this option, apt-get displays a short usage summary.
{ apt-get -h }

Output:

-v or –version : With this option, apt-get displays it’s current version number.
{ apt-get [...COMMAND] }

Output:

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Vi editor
The VI editor is the most popular and classic text editor in the Linux family. Below, are some reasons
which make it a widely used editor –
• It is available in almost all Linux Distributions
• It works the same across different platforms and Distributions
• It is user-friendly. Hence, millions of Linux users love it and use it for their editing needs
• Nowadays, there are advanced versions of the vi editor available, and the most popular one is VIM
which is Vi Improved. Some of the other ones are Elvis, Nvi, Nano, and Vile. It is wise to learn vi
because it is feature-rich and offers endless possibilities to edit a file.
• To work on VI editor, need to understand its operation modes. They can be divided into two main
parts.

Command mode
• The vi editor opens in this mode, and it only understands commands
• In this mode, can, move the cursor and cut, copy, paste the text
• This mode also saves the changes have made to the file
• Commands are case sensitive. should use the right letter case.

Insert mode
• This mode is for inserting text in the file.
• can switch to the Insert mode from the command mode by pressing 'i' on the keyboard.
• Once are in Insert mode, any key would be taken as an input for the file on which are currently
working.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• To return to the command mode and save the changes have made need to press the Esc key.
Starting the vi editor
To launch the VI Editor -Open the Terminal (CLI) and type
{ vi<filename_NEW> or <filename_EXISTING> }
&If specify an existing file, then the editor would open it for to edit. Else, can create a new file.

Creating a new file

Vi editor opens in the


command mode

Press “I” to enter the insert mode

Add
content

Press esc to enter command

Check the content of file

Vi editor commands:
Note: Should be in the "command mode" to execute these commands. VI editor is case-sensitive type the
commands in the right letter-case.

Keystrokes Action

i Insert at cursor (goes into insert mode)

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
a Write after cursor (goes into insert mode)

A Write at the end of line (goes into insert mode)

ESC Terminate insert mode

u Undo last change

U Undo all changes to the entire line

o Open a new line (goes into insert mode)

dd Delete line

3dd Delete 3 lines.

D Delete contents of line after the cursor

C Delete contents of a line after the cursor and insert new text. Press
ESC key to end insertion.

dw Delete word

4dw Delete 4 words

CW Change word

X Delete character at the cursor

r Replace character

R Overwrite characters from cursor onward

s Substitute one character under cursor continue to insert

S Substitute entire line and begin to insert at the beginning of the line

~ Change case of individual character

Make sure press the right command otherwise will end up making undesirable changes to the file. Also
enter the insert mode by pressing a, A, o, as required.

Moving within a file: need to be in the command mode to move within a file. The default keys for
navigation are mentioned below else; also use the arrow keys on the keyboard.

keystroke Use

Shift+zz Save the file and quit

:w Save the file but keep it open

:q Quit without saving

:wq Save the file and quit

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 7
Orientation and Connectivity Boot Camp
To configure TCP/IP settings
1. Open Network Connections.
2. Click the connection you want to configure, and then, under Network Tasks, click Change
settings of this connection.
3. Do one of the following:
o If the connection is a local area connection, on the General tab, under This connection
uses the following items, click Internet Protocol (TCP/IP), and then click Properties.
o If this is a dial-up, VPN, or incoming connection, click the Networking tab. In This
connection uses the following items, click Internet Protocol (TCP/IP), and then click
Properties.
4. Do one of the following:
o If you want IP settings to be assigned automatically, click Obtain an IP address
automatically, and then click OK.
o If you want to specify an IP address or a DNS server address, do the following:
Click Use the following IP address, and in IP address, type the IP address.
Click Use the following DNS server addresses, and in Preferred DNS server and
Alternate DNS server, type the addresses of the primary and secondary DNS
servers.
5. To configure DNS, WINS, and IP Settings, click Advanced.
Notes
 To open Network Connections, click Start, point to Settings, click Control Panel, and then
double-click Network Connections.
 You should use automated IP settings (DHCP) whenever possible, for the following reasons:
o DHCP is enabled by default.
o If your location changes, you do not have to modify your IP settings.
o Automated IP settings are used for all connections, and they eliminate the need to
configure settings such as DNS, WINS, and so on.

To make a local area connection


 If you have a network adapter installed, and have set up a home or small office network, you are
connected to a local area network (LAN). You are also connected to a LAN if your Windows XP
Professional computer is part of a corporate network. When you start your computer, your
network adapter is detected and the local area connection automatically starts. Unlike other types
of connections, the local area connection is created automatically, and you do not have to click
the local area connection in order to start it.
To make an Internet connection
1. Open
Network Connections.
2. Under Network Tasks, click Create a new connection, and then click Next.
3. Click Connect to the Internet, and then click Next.
4. Choose one of the following:
o If you already have an account with an Internet service provider (ISP), click Set up my
connection manually and then click Next.
o If you have a CD from an ISP, click Use the CD I got from an ISP and then click Next.
o If you do not have an Internet account, click Choose from a list of Internet service
providers (ISPs) and then click Next.
5. From your choice above, click one of the following:
Set up my connection manually
o If you are connecting to your ISP using a standard 28.8 Kbps, 56 Kbps, or ISDN modem,
click Connect using a dial-up modem, click Next, and follow the instructions in the
wizard.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
o If your DSL or cable modem ISP connection requires a user name and password, click
Connect using a broadband connection that requires a user name and password, click
Next, and then follow the instructions in the wizard.
o If your DSL or cable modem ISP connection is always on and does not require you to
type a user name and password, click Connect using a broadband connection that is
always on, click Next, and then click Finish.
Use the CD I got from an ISP
o Click Next, and then click Finish. Insert the CD provided by your ISP and follow the
instructions.
Choose from a list of Internet service providers (ISPs)
o To create an Internet account using MSN Explorer, click Get online with MSN, and then
click Finish. Follow the instructions in MSN Explorer.
o To choose an ISP, click Select from a list of ISPs, click Finish, and then double-click
Refer me to more Internet service providers. Follow the instructions in the wizard.

Web Browsers and Surfing the Web:


• The internet is a network of computer networks worldwide•The web is a tool used to retrieve
information published on the internet•To navigate the web we use a browser I.E. Internet Explorer,
Mozilla Fire Fox …etc

Internet Addresses
• Each computer on the internet has its own address
•E-mail addresses discussed in e-mail classes
• Each document, essay, image, etc. On the WWW has its own address
• To find a web document, follow a link or key in a web address (URL)
• Highlighted words or text in a WWW document
• Moves you to a place within same document, or to a web page elsewhere
• An electronic document stored on a web server
• Uses HTML (Hypertext Markup Language)
• May include text, sound, animation, images
• Usually has links to other Web pages or different parts of the same Web site
• Example: http://www.yahoo.com
Customizing the Web Browser
• LAN Proxy Settings
• Bookmarks
• Search Toolbars
• Pop-up blockers
• Managing Plug-ins
Proxy Server
• A server that sits between a client application, such as a Web browser, and a real server.
• It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the
request to the real server.
Specifying Proxy Settings in Internet Explorer

• Goto Tools->Internet Options in main menu


• Click on the Connections tab
• Click on Lan Settings button
• Specify the proxy server address and port in the Proxy server section
• If you want to specify different proxies for different servers or you do not want to use proxy servers for
some addresses, click on Advanced
–You can provide different proxy address and ports for different servers
–You can enter addresses for which you do not want to use proxy servers
Navigating the Web Using Internet Explorer

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• Moving within a page:
– Page up/down keys
– Up/down arrow keys
– Scroll bar on the right side
–Clicking on hypertext links (may be text, images, URL)
–Using the navigation, location or menu tool

Adding a Favorite

• To add a page to your list of favorite pages


–Go to the page that you want to add to your Favorites list.
–On the Favorites menu, click Add to Favorites.
–Type a new name for the page if you want to.
• To open one of your favorite pages, on the Favorites menu, click the page you want to open.
• As your list of favorite pages grows, you can organize them by moving them into subfolders
Tasks
• Configure Your Browser to access the Internet
• Customize the browser
–Security Settings
–Privacy Settings
–Pop-up Blocking
–Search Toolbar
• Manage Bookmarks

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 8
Networking Commands
1. ping

The ping command is a Command Prompt command used to test the abily of the source computer to reach
a specified destination computer. The ping commanfrrdtd is usually used as a simple way to verify that a
computer can communicate over the network wh another computer or network device.

The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages
to the destination computer and waing for a response. How many of those responses are returned, and how
long takes for them to return, are the two major pieces of information that the ping command provides.

For example, it might find that there are no responses when pinging a network printer, only to find out that
the printer is offline and s cable needs replaced. Or maybe need to ping a router to verify that r computer
can connect to , to eliminate AS A possible cause for a networking issue.

Ping Command Examples: ping -n 5 -l 1500 www.google.com


In this example, the ping command is used to ping the hostname www.google.com. The -n option tells the
ping command to send 5 ICMP Echo Requests instead of the default of 4, and the -l option sets the packet
size for each request to 1500 bytes instead of the default of 32 bytes.

The result displayed in the Command Prompt window will look something like this:

Reply from 172.217.1.142: bytes=1500 time=30ms TTL=54

Reply from 172.217.1.142: bytes=1500 time=30ms TTL=54

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Reply from 172.217.1.142: bytes=1500 time=29ms TTL=54

Reply from 172.217.1.142: bytes=1500 time=30ms TTL=54

Reply from 172.217.1.142: bytes=1500 time=31ms TTL=54

Ping statistics for 172.217.1.142:

Packets: Sent = 5, Received = 5, Lost = 0 (0% loss),

Approximate round trip times in milli-seconds:

Minimum = 29ms, Maximum = 31ms, Average = 30ms

The 0% loss reported under Ping statistics for 74.217.1.142 explains that each ICMP Echo Request message
sent to www.google.com was returned. This means that, as far as this network connection goes, can
communicate wh Google's webse just fine.

2. ssh

ssh stands for “Secure Shell”. is a protocol used to securely connect to a remote server/system. ssh is secure
in the sense that transfers the data in encrypted form between the host and the client. transfers inputs from
the client to the host and relays back the output. ssh runs at TCP/IP port 22.

Syntax: sshuser_name@host(IP/Domain_name)

Example: Accessing ubuntu machine via windows10 command prompt using ssh.

ssh command consists of 3 different parts:

ssh command instructs the system to establish an encrypted secure connection wh the host machine.

user_name represents the account that is being accessed on the host.

host refers to the machine which can be a computer or a router that is being accessed. can be an IP address
(e.g. 192.168.1.24) or domain name(e.g. www.domainname.com).

Note: After logging into the host computer, commands will work as if they were wrten directly to the host
terminal. Using a public-private key pair or SSH key pair to login into the remote host is more secure as
compared to using passwords. For generating public-private keys use the command:

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
ssh-keygen:
The private key must remain hidden while the public key must be copied to the remote host. After copying
the public key to the remote host the connection will be established using SSH keys and not the password.

Options:
• -1: Forces ssh to use protocol SSH-1 only.
• -2: Forces ssh to use protocol SSH-2 only.
• -4: Allows IPv4 addresses only.
• -6: Allows IPv6 addresses only.
• -A: Authentication agent connection forwarding is enabled.
• -a: Authentication agent connection forwarding is disabled.
• -C: Compresses all data (including stdin, stdout, stderr, and data for forwarded X11 and TCP
connections) for a faster transfer of data.
• -f: Requests ssh to go to background just before command execution.
• -g: Allows remote hosts to connect to local forwarded ports.
• -n: Prevents reading from stdin.
• -p port_number: Port to connect to on the remote host.
• -q: Suppresses all errors and warnings
• -V: Display the version number.
• -v: Verbose mode. echoes everything is doing while establishing a connection. is very useful in
the debugging of connection failures
• -X: Enables X11 forwarding (GUI Forwarding).
• -c cipher_spec: Selects the cipher specification for encrypting the session. Specific cipher algorhm
will be selected only if both the client and the server support .
SSH is significantly more secure than the other protocols such as telnet because of the encryption of the
data. There are three major encryption techniques used by SSH:

Symmetrical encryption: This encryption works on the principle of the generation of a single key for
encrypting as well as decrypting the data. The secret key generated is distributed among the clients and the
hosts for a secure connection. Symmetrical encryption is the most basic encryption and performs best when
data is encrypted and decrypted on a single machine.

Asymmetrical encryption: This encryption is more secure because generates two different keys:
Public and Private key. A public key is distributed to different host machines while the private key is kept
securely on the client machine. A secure connection is established using this public-private key pair.

Hashing: One-way hashing is an authentication technique which ensures that the received data is
unaltered and comes from a genuine sender. A hash function is used to generate a hash code from the
data. is impossible to regenerate the data from the hash value. The hash value is calculated at the sender as
well as the receiver’s end. If the hash values match, the data is authentic.

3. ifconfig

ifconfig (interface configuration) command is used to configure the kernel-resident network interfaces. is
used at the boot time to set up the interfaces as necessary. After that, is usually used when needed during
debugging or when need system tuning. Also, this command is used to assign the IP address and netmask
to an interface or to enable or disable a given interface.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Syntax:

ifconfig [...OPTIONS] [INTERFACE]

Options: -a : This option is used to display all the interfaces available, even if they are down.Syntax: ifconfig
-a

Output:

-s : Display a short list, instead of details.Syntax: ifconfig -s

Output:

➢ -v : Run the command in verbose mode – log more details about execution.
➢ Syntax:
ifconfig -v

Output:

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

• up : This option is used to activate the driver for the given interface

Syntax:
ifconfig interface up

• down : This option is used to deactivate the driver for the given interface.
Syntax:

ifconfig interface down

• add addr/prefixlen : This option is used to add an IPv6 address to an interface.


Syntax:

ifconfig interface add addr/prefixlen

• del addr/prefixlen : This option is used to remove an IPv6 address to an interface.


Syntax:

ifconfig interface del addr/prefixlen

• [-]arp : This option is used to enable/disable the use of ARP protocol on an interface.
Syntax:

ifconfig interface [-]arp

• [-]promisc : This option is used to enable/disable the promiscuous mode on an interface. If is


selected, all the packets on the network will be received by the interface.
Syntax:

ifconfig interface[-]promisc.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• [-]allmulti : This option is used to enable/disable allmulticast mode for an interface. If is selected,
all the multicast packets will be received by the interface.
Syntax:

ifconfig interface [-]allmulti

• mtuN : The user uses this parameter to set the Maximum Transfer Un(MTU).
Syntax:

ifconfig interface [-]allmulti

• –help : Display help related to ifconfig command.


Syntax:

ifconfig --help

Output:

4. scp
scp stands for Secure Copy Protocol. is a secure file transfer protocol that copies files to and from hosts.
uses Secure Shell (SSH) to keep the files protected while in trans.

scp is a command line utily, meaning will have to use Terminal (Mac) or Command Prompt (Windows).

Use of scp: Since scp uses SSH, the transferred data will be encrypted. This keeps r information from
being compromised during trans.

scp is operated by wring single commands into the command line, making a good option for repeatedly
updated files.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Basic Syntax:
The basic syntax of scp looks like this:

$ scpsource_file_pathusername@hostname:destination_file_path

And if were moving file.txt in folder1 on host1 to localFolder in r local Documents:

$ scp folder1/file.txt username@host1:Documents/localFolder

Common scp Commands

-B |Enables batch mode, which keeps scp from asking for passwords.

-C |Enables compression. See common use cases.

Do not confuse wh -c, which is lowercase and has an alternate meaning.

-l |Lims the bandwidth used. Uses Kb/s.

-p |Maintains the access times, modification times, and modes of the original file.

-q |Enables quiet mode, which prevents the progress meter, diagnostic messages, and warning messages
from appearing.

-r |Used to copy entire directories recursively. See common use cases.

-v |Enables verbose mode. See common use cases .

Common Use Cases :


Verbose Output

This is used when a program is giving problems, such as failing or not completing a request.

The verbose output shows all the processes going on in the background, thus allowing to sift through and
find where the program is running into a problem.

Add -v when want to see the verbose output.

$ scp -v/file.txt username@host.com:/root/file2.txt

Transfer Multiple Files

can transfer multiple files by putting file names at the beginning:

$ scp file1.txt file2.txt username@remotehost:/destination/file/path/

Or putting them at the end:

$ scpusername@host:/destination/file/path/\{file1.txt,file2.txt} .

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
$ scproot@123.456.7.8:~/\{file1.txt,file2.txt} .

Copy Entire Directory

The -r stands for “recursive.” This is used when need the application to work as a whole and run through
processes a number of times.

This is needed when copying an entire directory.

Add -v if would like to see the processes working in the background.

Local to remote:

$ scp -r /local/file/path username@host:/remote/file/path

Remote to local:

$ scp -r username@host:/remote/file/path /local/file/path

Copy Files Across Two Remote Hosts

can copy files to two remote hosts.

$ scp username1@host1:/remote/file/path/file1.txt username2@host2:/remote/file/path/

Speed Up the Transfer wh Compression

The -vrC stand for -v, -r, and -C. This option can speed up transfer time and save bandwidth. Use -C to
enable compression. The files will be decompressed when they reach their destination.

$ scp -vrCusername@host:/destination/file/path

Preserve File Attributes

can preserve the file’s access times, modification times, and modes by using -p.

$ scp -C -p ~/file.txt username@host:/file/path/file.txt

5. netstat

Netstat is a common command line TCP/IP networking utily available in most versions of Windows, Linux,
UNIX and other operating systems. Netstat provides information and statistics about protocols in use and
current TCP/IP network connections. (The name derives from the words network and statistics.)

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
The Windows help screen (analogous to a Linux or UNIX man page) for netstat reads as follows:

Displays protocol statistics and current TCP/IP network connections.

NETSTAT -a -b -e -n -o -p proto -r -s -v interval

-a Displays all connections and listening ports.

-b Displays the executable involved in creating each connection or listening port. In some cases well-
known executables host multiple independent components, and in these cases the sequence of components
involved in creating the connection or listening port is displayed. In this case the executable name is in []
at the bottom, on top is the component called, and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless have sufficient permissions.

-e Displays Ethernet statistics. This may be combined wh the -s option.

-n Displays addresses and port numbers in numerical form.

-o Displays the owning process ID associated wh each connection.

-p proto Shows connections for the protocol specified by proto; proto may be any of: TCP, UDP,
TCPv6, or UDPv6. If used wh the -s option to display per-protocol statistics, proto may be any of: IP, IPv6,
ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6.

-r Displays the routing table.

-s Displays per-protocol statistics. By default, statistics are shown for IP, IPv6, ICMP, ICMPv6, TCP,
TCPv6, UDP, and UDPv6; the -p option may be used to specify a subset of the default.

-v When used in conjunction wh -b, will display sequence of components involved in creating the
connection or listening port for all executables.

interval Redisplays selected statistics, pausing interval seconds between each display. Press
CTRL+C to stop redisplaying statistics. If omted, netstat will print the current configuration information
once.

Careful perusal of this information informs the reader that netstat not only documents active TCP and UDP
connections and related port addresses but that can also tie established TCP or UDP connections to the
executable files, runtime components, and process IDs that opened or use them. Netstat can also provide
counts of byteunicast and non-unicast packets, discards, errors, and unknown protocols. Netstat can also
show connections for transport layer protocols for IPv4 and IPv6, display routing table contents, and can
redisplay selected statistics at regular intervals.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Netstat can be a helpful forensic tool when trying to determine what processes and programs are active on
a computer and involved in networked communications. can provide telltale signs of malware compromise
under some circumstances and is a good tool to use to observe what kinds of communications are underway
at any given time.

6. ipstat

Two new commands for observing various types of network traffic on a server are introduced in this release:
ipstat and tcpstat.

The ipstat command is used to gather and report statistics about IP traffic on a server based on the selected
output mode and sort order that is specified in the command syntax. This command enables to observe
network traffic at the IP layer, aggregated on source, destination, higher-layer protocol, and interface. Use
this command when want to observe the amount of traffic between one server and other servers.

The tcpstat command is used to gather and report statistics on TCP and UDP traffic on a server based on
the selected output mode and sort order that is specified in the command syntax. This command enables to
observe network traffic at the transport layer, specifically for TCP and UDP. In addion to the source and
destination IP addresses, can observe the source and destination TCP or UDP ports, the PID of the process
that is sending or receiving the traffic, and the name of the zone in which that process is running.

The following are some of the ways in which can use the tcpstat command:

Identify the largest sources of TCP and UDP traffic on a server.

Examine the traffic that is being generated by a particular process.

Examine the traffic that is being generated from a particular zone.

Determine which process is bound to a local port.

Note - The previous list is not exhaustive. There are several other ways in which can use the tcpstat
command. See the tcpstat (1M) man page for more information.

To use the ipstat and tcpstat commands, one of the following privileges is required:

Assume the root role

Be explicly assigned the dtrace_kernel privilege

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Be assigned eher the Network Management or the Network Observabily rights profile

The following examples show various ways in which can use these two commands to observe network
traffic. For detailed information, see the tcpstat (1M) and ipstat (1M) man pages.

The following example shows output from the ipstat command when run wh the –c option. Use the –c
option to print newer reports after previous reports, whout overwring the previous report. The number 3 in
this example specifies the interval for displaying data, which is the same as if the command were invoked
as ipstat 3.

# ipstat -c 3

SOURCE DEST PROTO INT BYTES

zucchini antares TCP net0 72.0

zucchini antares SCTP net0 64.0

antares zucchini SCTP net0 56.0

amadeus.foo.example.com 10.6.54.255 UDP net0 40.0

antares zucchini TCP net0 40.0

zucchini antares UDP net0 16.0

antares zucchini UDP net0 16.0

Total: bytes in: 192.0 bytes out: 112.0

By comparison, the following example shows output of the tcpstat command when used wh the –c option:

# tcpstat -c 3

ZONE PID PROTO SADDR SPORT DADDR DPORT BYTES

global 100680 UDP antares 62763 agamemnon 1023 76.0

global 100680 UDP antares 775 agamemnon 1023 38.0

global 100680 UDP antares 776 agamemnon 1023 37.0

global 100680 UDP agamemnon 1023 antares 62763 26.0

global 104289 UDP zucchini 48655 antares 6767 16.0

global 104289 UDP clytemnestra 51823 antares 6767 16.0

global 104289 UDP antares 6767 zucchini 48655 16.0

global 104289 UDP antares 6767 clytemnestra 51823 16.0

global 100680 UDP agamemnon 1023 antares 776 13.0

global 100680 UDP agamemnon 1023 antares 775 13.0

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
global 104288 TCP zucchini 33547 antares 6868 8.0

global 104288 TCP clytemnestra 49601 antares 6868 8.0

global 104288 TCP antares 6868 zucchini 33547 8.0

global 104288 TCP antares 6868 clytemnestra 49601 8.0

Total: bytes in: 101.0 bytes out: 200.0

The following addional examples show other ways in which can observe traffic on r network by using the
ipstat and tcpstat commands.

7. nslookup

The nslookup command is a powerful tool for diagnosing DNS problems. know ’re experiencing a DNS
problem when can access a resource by specifying s IP address but not s DNS name. For example, if can
get to www.ebay.com by typing 66.135.192.87 in r browser’s address bar but not by typing www.ebay.com,
have a DNS problem.

The simplest use of nslookup is to look up the IP address for a given DNS name.

C:>nslookup ebay.com

Server: ns1.orng.twtelecom.net

Address: 168.215.210.50

Non-authorative answer:

Name: ebay.com

Address: 66.135.192.87C:>

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
As can see, just type nslookup followed by the DNS name want to look up. Nslookup issues a DNS query
to find out. This DNS query was sent to the server named ns1.orng.twtelecom.net at 168.215.210.50. then
displayed the IP address that’s associated wh ebay.com: namely, 66.135.192.87.

In some cases, may find that using an nslookup command gives the wrong IP address for a host name. To
know that for sure, of course, have to know wh certainty what the host IP address should be.

For example, if know that r server is 203.172.182.10 but Nslookup returns a completely different IP address
for r server when query the server’s host name, something is probably wrong wh one of the DNS records.

If use nslookup whout any arguments, the nslookup command enters a subcommand mode. displays a
prompt character (>) to let know that ’re in nslookup subcommand mode rather than at a normal Windows
command prompt.

In subcommand mode, can enter various subcommands to set options or to perform queries. can type a
question mark (?) to get a list of these commands.

The Most Commonly Used nslookup Subcommands

Subcommand What Does


• Name - Queries the current name server for the specified name.
• server - name Sets the current name server to the server specify.
• root - Sets the root server as the current server.
• set type=x - Specifies the type of records to be displayed, such as A,
CNAME, MX, NS, PTR, or SOA. Specify ANY to display all
records.
• set debug -Turns on Debug mode, which displays detailed information query.
• set nodebug- Turns off Debug mode.
• set recurse - Enables recursive searches.
• set norecurse- Disables recursive searches.
• Ex- Exs the nslookup program and returns to a commandprompt.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Usage: nslookup operates in interactive or non-interactive mode. When used interactively by invoking
whout arguments or when the first argument is - (minus sign) and the second argument is a hostname or
Internet address of a name server, the user issues parameter configurations or requests when presented wh
the nslookup prompt (>). When no arguments are given, then the command queries the default server. The
- (minus sign) invokes subcommands which are specified on the command line and should precede
nslookup commands. In non-interactive mode, i.e. when the first argument is a name or Internet address of
the host being searched, parameters and the query are specified as command line arguments in the
invocation of the program. The non interactive mode searches the information for a specified host using the
default name server.

8. traceroute

Traceroute is a command which can show the path a packet of information takes from r computer to one
specify. will list all the routers passes through until reaches s destination, or fails to and is discarded. In
addion to this, will tell how long each 'hop' from router to router takes.

In Windows, select Start > Programs > Accessories > Command Prompt. This will give a window like the
one below.

Enter the word tracert, followed by a space, then the domain name.

The following is a successful traceroute from a home computer in New Zealand to mediacollege.com:

Firstly tells that 's tracing the route to mediacollege.com, tells the IP address of that domain, and what the
maximum number of hops will be before times out.

Next gives information about each router passes through on the way to s destination.

1 is the internet gateway on the network this traceroute was done from (an ADSL modem in this case)

2 is the ISP the origin computer is connected to (xtra.co.nz)

3 is also in the xtra network

4 timed out

5 - 9 are all routers on the global-gateway.net.nz network (the domain that is the internet gateway out of
New Zealand)

10 - 14 are all gnaps.net in the USA (a telecom supplier in the USA)

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
15 - 17 are on the nac network (Net Access Corporation, an ISP in the New York area)

18 is a router on the network mediacollege.com is hosted on

and finally, line 19 is the computer mediacollege.com is hosted on (sol.rhost.co.nz)

Each of the 3 columns are a response from that router, and how long took (each hop is tested 3 times). For
example, in line 2, the first try took 240ms (240 milliseconds), the second took 421 ms, and the third took
70ms.

will notice that line 4 'timed out', that is, there was no response from the router, so another one was tried
(202.50.245.197) which was successful.

will also notice that the time took quadrupled while passing through the global-gateway network.

This is extremely useful when trying to find out why a webse is unreachable, as will be able to see where
the connection fails. If have a webse hosted somewhere, would be a good idea to do a traceroute to when
is working, so that when fails, can do another traceroute to (which will probably time out if the webse is
unreachable) and compare them. Be aware though, that will probably take a different route each time, but
the networks passes through will generally be very similar.

If the example above had continued to time out after line 9, could suspect that global-gateway.co.nz was
the problem, and not mediacollege.com.If timed out after line 1, would know there was a problem
connecting to r ISP (in this case would not be able to access anything on the internet).

is generally recommended that if have a webse that is unreachable, should use both the traceroute and
ping commands before contact r ISP to complain. More often that not, there will be nothing to r ISP or
hosting company can do about .

9. telnet

Telnet is a network protocol that provides a command-line interface to communicate wh a device. Telnet is
used most often for remote management but also sometimes for the inial setup for some devices, especially
network hardware such as swches and access points. Telnet is also used to manage files on a webse.

telnet works:
Telnet originally was used on terminals. These computers require only a keyboard because everything on
the screen displays as text. The terminal provides a way to remotely log on to another device, just as if
were sting in front of and using like any other computer.

Nowadays, Telnet can be used from a virtual terminal, or a terminal emulator, which is essentially a modern
computer that communicates wh the same Telnet protocol. One example of this is the telnet command,
available from the Command Prompt in Windows. The telnet command uses the Telnet protocol to
communicate wh a remote device or system.

Telnet commands can also be executed on other operating systems such as Linux, Mac, and Unix, in the
same way as telnet commands are executed in Windows.

Telnet is not the same as other TCP/IP protocols such as HTTP, which transfers files to and from a server.
Instead, the Telnet protocol has log on to a server as if were an actual user, then grants direct control and
all the same rights to files and applications as the user that 're logged in as.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Note:-Although not the same as Telnet, if 're looking for a way to communicate wh another computer
remotely, see this list of free remote access programs.

Use Telnet to talk to an artificially intelligent psychotherapist named Eliza. After connecting to Telehack
wh the command below, enter eliza when asked to choose one of the listed commands.

telnet telehack.com

Watch an ASCII version of the full Star Wars Episode IV movie by entering this in Command Prompt:

telnet towel.blinkenlights.nl:Beyond the fun things that can be done in Telnet are a number of Bulletin
Board Systems. A BBS provides a way to message other users, view news, share files, and more. Telnet
BBS Guide lists hundreds of servers that can connect to using Telnet.

10. ftp

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
FTP (File Transfer Protocol) is a standard network protocol used to exchange files between computers on
a private network or through the Internet.

There are three ways in which FTP is commonly accessed:

• Command-line FTP client.


• Web browser.
• Graphical FTP clients.
The first two are straightforward methods that allow to directly use a Web browser (such as Google
Chrome, Firefox, Internet Explorer) or an FTP client application (such as FTP Voyager®) to connect to the
FTP server to exchange files. Using the command-line interface, need to enter a set of commands to send
or receive files from other computers.

Windows, Mac OS X, and Linux operating systems have built-in command-line clients that can be used for
establishing an FTP connection. To iniate an FTP connection from Windows, type ftp at the command
prompt, and press enter.

Here is a list of the most commonly used FTP commands in the Windows command-line prompt.

FTP, by self, is not a reliable way to exchange sensive business information because is prone to secury
attacks. Due to the limations of FTP, organizations generally use FTPS and SFTP protocols for file transfer.
The technology of managed file transfer (MFT) supports these high-secury protocols and replaces basic
FTP and other ad hoc file transfer solutions. Serv-U® MFT Server is an enterprise-grade software that
provides comprehensive secury, automation, and centralized control over file transfer across the
organization. is widely preferred by leading businesses due to s high secury, flexibily, and easy-to-use
interface. Using Serv-U MFT Server, can make secure file transfers using SFTP, FTPS, and HTTPS over
IPv4 and IPv6 networks.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
11. arp

The ARP Command is used to Find IP to MAC Address Mappings

ARP, which stands for Address Resolution Protocol is a protocol used to map a MAC address (or hardware
address) to an IP address. is responsible for resolving the IP address to the MAC address of the destination
computer or device during network communication.

The MAC address is what is used to determine the destination of the information being sent. Keep in mind
that if the destination computer is not on the same network then ARP will learn the MAC address of the
next hop used to get to the next network and so on until reaches s final destination. Once this information
is obtained will be kept in the ARP table or cache of that computer to be used for future network
communication.

When one computer needs to communicate wh another will use the destination computers IP address to
determine if that computer is on the same network or subnet as self.

Once determines that the computer is on the same network then will send out an ARP broadcast for the
MAC address of the destination computer.

If ’s not on the same network then will send that broadcast to the default gateway or router which will use
s routing table to determine where to send the packet based on the destination IP address.

The packet will still contain the IP address of the destination computer is trying to reach. The following
illustration shows an ARP broadcast for computers on the same network.

using the arp command: When a computer resolves a MAC address to an IP address then will keep
that mapping information in s memory for a short amount of time. don't want to have this ARP cache last
too long because things change on the network and then will not have the most up to date information. can
use the ARP command to view and modify these entries in the ARP cache or table. Use can also use ARP
to find duplicate IP addresses and to find invalid entries in the ARP table.

The ARP command uses various swches for different functions. Here are the available swches for the
Windows ARP command.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• -a - Displays current ARP entries by interrogating the current protocol data. If inet_addr is specified,
the IP and Physical addresses for only the specified computer are displayed. If more than one
network interface uses ARP, entries for each ARP table are displayed.

• -g - Same as -a.
• -v - Displays current ARP entries in verbose mode. All invalid entries and entries on the loop-back
interface will be shown.
• inet_addr - Specifies an internet address.
• -N if_addr - Displays the ARP entries for the network interface specified by if_addr.
• -d - Deletes the host specified by inet_addr. inet_addr may be wildcarded wh to delete all hosts.
• -s - Adds the host and associates the Internet address inet_addr wh the Physical address eth_addr.
The Physical address is given as 6 hexadecimal bytes separated by hyphens. The entry is permanent.
• eth_addr - Specifies a physical address.
• if_addr - If present, this specifies the Internet address of the interface whose address translation
table should be modified. If not present, the first applicable interface will be used.
As can see from the list of swches there are various functions can perform using ARP. One of the most
commonly used swches is –a which will show all the cached ARP entries on r computer. If want to find
the entries from a specific network interface assuming have more than one then would use the –N swch.
To add a permanent entry to the ARP table use the –s command and specify the IP address and MAC
address.

Here is an example of the ARP command output wh the -a swch.

ARP is not going to be too useful on r home network because of s simplicy but in a corporate
environment that has multiple networks\subnets can come in real handy to troubleshoot host to host
communication problems.

The "arp" Command:-arp displays and modifies entries in the Address Resolution Protocol (ARP)
cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or
Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter
installed on r computer. Used whout parameters, arp displays help.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
can use the arp command to view and modify the ARP table entries on the local computer. This may
display all the known connections on r local aream network segment (if they have been active and in the
cache). The arp command is useful for viewing the ARP cache and resolving address resolution problems.

Syntax (Inet means Internet address)

arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s
InetAddrEtherAddr [IfaceAddr]]

Here are the swch definions:

-a [InetAddr] [-NIfaceAddr] : Displays current ARP cache tables for all interfaces. To display the ARP
cache entry for a specific IP address, use arp -a wh the InetAddr parameter, where InetAddr is an IP address.
To display the ARP cache table for a specific interface, use the -N IfaceAddr parameter where IfaceAddr
is the IP address assigned to the interface. The -N parameter is case-sensive.

-g [InetAddr] [-NIfaceAddr] :Identical to -a.

-dInetAddr [IfaceAddr] : Deletes an entry wh a specific IP address, where InetAddr is the IP address.
To delete an entry in a table for a specific interface, use the IfaceAddr parameter where IfaceAddr is the
IP address assigned to the interface. To delete all entries, use the asterisk (*) wildcard character in place
of InetAddr. So "arp -d *" will flush r ARP cache.

-sInetAddrEtherAddr [IfaceAddr] : Adds a static entry to the ARP cache that resolves the IP address
InetAddr to the physical address EtherAddr. To add a static ARP cache entry to the table for a specific
interface, use the IfaceAddr parameter where IfaceAddr is an IP address assigned to the interface.

Displays help at the command prompt.

Using arp on Windows:-

To run the arp command in Windows click START> RUN> CMD. Now enter 'arp -a' at the > prompt:

12. wget

ARP stands for Address Resolution Protocol. This protocol is used by network nodes to match IP addresses
to MAC addresses. The original specification was RFC 826. That has since been updated by RFC 5227,
and RFC 5494.

The protocol functionally divided into two parts:

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
One part determines a physical address when sending a packet

Other part answers requests from other machines

So ARP provides method for hosts send message to destination address on physical network. Ethernet
hosts must convert a 32-b IP address into a 48-b Ethernet address. The host checks s ARP cache to see if
address mapping from IP to physical address is known:

If mapping is known, physical address is placed in frame and sent

If mapping is not known, broadcast message is sent and awas a reply

Target machine, recognizing IP address matches s own, returns answer

ARP is transparent to bridging - bridging will send ARP broadcasts. Routers do not propagate Ethernet
broadcasts – a router is Network Level device

The ARP protocol format looks like this:

The operation of the ARP protocol looks like this:

1. Process begins wh caches being empty

2. Host 2 knows that wants to send a packet to Host 1 (eg Default GW)

3. Host 2 has to send a broadcast ARP message (destination FF:FF:FF:FF:FF:FF) requesting an answer for
192.168.1.1.

4. Host 1 responds wh s MAC address

5. Host 1 and 2 both insert this received information into their ARP caches for future use

13. route

Using the route command displays or modifies the computer's routing table. For a typical computer that
has a single network interface and is connected to a local area network (LAN) that has a router, the routing
table is pretty simple and isn't often the source of network problems. Still, if 're having trouble accessing
other computers or other networks, can use the route command to make sure that a bad entry in the
computer's routing table isn't the culpr.For a computer wh more than one interface and that's configured to

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
work as a router, the routing table is often a major source of trouble. Setting up the routing table properly
is a key part of configuring a router to work.

14. host

A host (also known as "network host") is a computer or other device that communicates wh other hosts on
a network. Hosts on a network include clients and servers -- that send or receive data, services or
applications.

Hosts typically do not include intermediary network devices like swches and routers, which are instead
often categorized as nodes. A node is also a broader term that includes anything connected to a network,
while a host requires an IP address. In other words, all hosts are nodes, but network nodes are not hosts
unless they require an IP address to function.

On a TCP/IP network, each host has a host number that, together wh a network identy, forms s own unique
IP address. In the Open Systems Interconnection (OSI) model, protocols in the transport layer, also known
as Layer 4, are responsible for communication between hosts. Hosts use various protocols to communicate,
including transmission control protocol (TCP) and User Datagram Protocol (UDP).

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 9
Basic HTML Tags

Basic HTML

Tag Description
<!DOCTYPE> Defines the document type
<html> Defines an HTML document
<head> Defines information about the document
<title> Defines a title for the document
<body> Defines the document's body
<h1> to <h6> Defines HTML headings
<p> Defines a paragraph
<br> Inserts a single line break
<hr> Defines a thematic change in the content
<!--...--> Defines a comment

Formatting

Tag Description
Not supported in HTML5. Use <abbr> instead.
<acronym>
Defines an acronym
<abbr> Defines an abbreviation or an acronym
<address> Defines contact information for the author/owner of a document/article
<b> Defines bold text
<bdo> Overrides the current text direction
Not supported in HTML5. Use CSS instead.
<big>
Defines big text
<cite> Defines the title of a work
<del> Defines text that has been deleted from a document
Represents the defining instance of a term
<dfn>
<em> Defines emphasized text
Not supported in HTML5. Use CSS instead.
<font>
Defines font, color, and size for text

<mark> Defines marked/highlighted text


<meter> Defines a scalar measurement within a known range (a gauge)
<pre> Defines preformatted text

<small> Defines smaller text


Not supported in HTML5. Use <del> or <s> instead.
<strike>
Defines strikethrough text

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
<strong> Defines important text
<sub> Defines subscripted text
<sup> Defines superscripted text
<time> Defines a date/time
<u> Defines text that should be stylistically different from normal text
<var> Defines a variable
<wbr> Defines a possible line-break

Form and input:

Tag Description
Defines an HTML form for user
<form>
input
Defines an input
<input>
control
Defines a multiline input control
<textarea>
(text area)
<button> Defines a clickable button
<select> Defines a drop-down list
Defines a group of related options
<optgroup>
in a drop-down list
Defines an option in a drop-down
<option>
list
Defines a label for an <input>
<label>
element
Frames

Tag Description
Not supported in HTML5.
<frame>
Defines a window (a frame) in a frames et
Not supported in HTML5.
<frameset>
Defines a set of frames
Not supported in HTML5.
<noframes> Defines an alternate content for users that do not
support frames
<iframe> Defines an inline frame

Images

Tag Description
<img> Defines an image

<figcaption> Defines a caption for a <figure> eleme nt

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Links

Tag Description
<a> Defines a hyperlink
Defines the relationship between a document and an
<link>
external resource (most used to link to style sheets)
<nav> Defines navigation links

Lists

Tag Description
<ul> Defines an unordered list
<ol> Defines an ordered list
<li> Defines a list item
<dl> Defines a description list
<dt> Defines a term/name in a description list

Tables

Tag Description
<table> Defines a table
<caption> Defines a table caption
<th> Defines a header cell in a table
<tr> Defines a row in a table
<td> Defines a cell in a table
<thead> Groups the header content in a table
<tbody> Groups the body content in a table
<tfoot> Groups the footer content in a table
Specifies column properties for each column within a
<col>
<colgroup> element
Specifies a group of one or more columns in a table
<colgroup>
for formatting

Styles and Semantics

Tag Description
<style> Defines style information for a document
<div> Defines a section in a document
<span> Defines a section in a document
<header> Defines a header for a document or section
<footer> Defines a footer for a document or section
<main> Specifies the main content of a document
<section> Defines a section in a document
<article> Defines an article

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
<aside> Defines content aside from the page content
Defines additional details that the user can view or
<details>
hide
<dialog> Defines a dialog box or window
<summary> Defines a visible heading for a <details> element
Links the given content with a machine-readable
<data>
translation

Meta Info

Tag Description
<head> Defines information about the document
<meta> Defines metadata about an HTML document
Specifies the base URL/target for all relative URLs
<base>
in a document
Not supported in HTML5. Use CSS instead.
<basefont> Specifies a default color, size, and font for all text in
a document

Programming

Tag Description
<script> Defines a client-side script
Defines an alternate content for users that do not
<noscript>
support client-side scripts
Not supported in HTML5. Use <embed> or <object>
<applet> instead.
Defines an embedded applet
Defines a container for an external (non-HTML)
<embed>
application
<object> Defines an embedded object
<param> Defines a parameter for an object

<html>

<head>

<title>sample</title>

</head>

<body>

<table border=1 align="center">

<tr>

<th>Photo</th>

<th>Name</th>

<th>Address</th>

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
<th>Education Details</th>

</tr>

<tr>

<td><img src="1.jfif" height=60 width=60 ></td>

<td align="center">sai</td>

<td align="center">Eluru</td>

<td align="center">B.Tech</td>

</tr>

</table>

<h1 align="left">Skill set</h1>

<li>Programming Languages

<ol>C</ol>

<ol>C++</ol>

<ol>Java</ol>

</li>

<li>Operating Systems

<ol>Windows OS</ol>

<ol>Linux OS</ol>

</li>

</body>

</html>

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 10
Web Browser usage and advanced settings like LAN, proxy, Content, Privacy,
Security, Cookies, Extensions/plugins
A web browser (commonly referred to as a browser) is a software application for accessing information on
the World Wide Web. When a user requests a particular webse, the web browser retrieves the necessary
content from a web server and then displays the resulting web page on the user's device.

A web browser is not the same thing as a search engine, though the two are often confused. For a user, a
search engine is just a webse, such as Google Search, Bing, or DuckDuckGo, that stores searchable data
about other webses. However, to connect to a webse's server and display s web pages, a user must have a
web browser installed.

As of March 2019, more than 4.3 billion people use a browser, which is about 55% of the world's
population. The three most popular browsers are Chrome, Firefox, and Safari. The purpose of a web
browser is to fetch information resources from the Web and display them on a user's device.

This process begins when the user inputs a Uniform Resource Locator (URL), such
as https://en.wikipedia.org/ , into the browser. Virtually all URLs on the Web start wh
eher http: or https: which means the browser will retrieve them wh the Hypertext Transfer Protocol. In
the case of https: , the communication between the browser and the web server is encrypted for the
purposes of security and privacy. Another URL prefix is file: which is used to display local files already
stored on the user's device.

WorldWideWeb was the first web browser


Once a web page has been retrieved, the browser's rendering engine displays on the user's device. This
includes image and video formats supported by the browser.
Web pages usually contain hyperlinks to other pages and resources. Each link contains a URL, and when is
clicked, the browser navigates to the new resource. Thus, the process of bringing content to the user begins
again.

LAN (Local Area Network)

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
A local area network (LAN) is a computer network that interconnects computers within a limed area such
as a residence, school, laboratory, university campus or office building. By contrast, a wide area
network (WAN) not only covers a larger geographic distance, but also generally involves leased
telecommunication circus.
Ethernet and Wi-Fi are the two most common technologies in use for local area networks. In a wireless
LAN, users have unrestricted movement within the coverage area. Wireless networks have become popular
in residences and small businesses, because of their ease of installation. Most wireless LANs use Wi-Fi as
is built into smart phones , tablet computers and laptops. Guests are often offered Internet access via
a hotspot service.
Proxy server
In computer networks, a proxy server is a server (a computer system or an application) that acts as
an intermediary for requests from clients seeking resources from other servers. A client connects to the
proxy server, requesting some service, such as a file, connection, web page, or other resource available from
a different server and the proxy server evaluates the request as a way to simplify and control s
complexity. Proxies were invented to add structure and encapsulation to distributed systems.
• A proxy server may reside on the user's local computer, or at any point between the user's
computer and destination servers on the Internet.
• A proxy server that passes unmodified requests and responses is usually called a gateway or
sometimes a tunnelling proxy.
• A forward proxy is an Internet-facing proxy used to retrieve data from a wide range of sources
(in most cases anywhere on the Internet).
• A reverse proxy is usually an internal-facing proxy used as a front-end to control and protect
access to a server on a private network. A reverse proxy commonly also performs tasks such as
load balancing, authentication, decryption and caching

Privacy
During the course of browsing, the browser stores cookies received from various webses. Some of them
contain login credentials or se preferences. However, others are used for tracking user behaviour over long
periods, so browsers typically provide settings for removing cookies when existing the browser Finer-
grained management of cookies usually requires a browser extension

Private browsing is a privacy feature in some web browsers. When operating in such a mode, the browser
creates a temporary session that is isolated from the browser's main session and user data. Browsing
history is not saved, and local data associated wh the session, such as cookies, are cleared when the session
is closed. These modes are designed primarily to prevent data and history associated wh a particular
browsing session from persisting on the device, or being discovered by another user of the same device.

The start page for private browsing mode in Firefox.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Security
Web browsers are popular targets for hackers, who explores security holes to steal information,
destroy files, and other malicious activies. Browser vendors regularly patch these secury holes, so users are
strongly encouraged to keep their browser software updated. Other protection measures are antivirus
software and avoiding known-malicious webses. Browser secury is the application of Internet
secury to web browsers in order to protect networked data and computer systems from breaches of privacy
or malware. Secury explos of browsers often use JavaScript — sometimes wh cross-se scripting (XSS) —
sometimes wh a secondary payload using Adobe Flash.Secury explos can also take advantage
of vulnerabilies (secury holes) that are commonly exploed in all browsers (including Mozilla
Firefox, Google Chrome, Opera, Microsoft Internet Explorer,and Safari).
The contents of a web page are arbrary and controlled by the enty owning the domain named displayed in
the address bar. If HTTPS is used, then encryption is used to secure against attackers wh access to the
network from changing the page contents en route. When presented wh a password field on a web page, a
user is supposed to look at the address bar to determine whether the domain name in the address bar is the
correct place to send the password. For example, for Google's single sign-on system (used on e.g.
ittube.com), the user should always check that the address bar says "https://accounts.google.com" before
inputting their password.
Extensions /Plugins
A browser extension is a small software module for customizing a web browser. Browsers typically allow
a variety of extensions, including user interface modifications, ad blocking, and cookie management.
Browser plug-ins are a separate type of module. The main difference is that extensions are usually
just source code, but plug-ins are always executables (i.e. object code). As of 2019, plug-ins have
been deprecated by most browsers, while extensions are widely used. The most popular browser, Google
Chrome, has thousands of extensions available but only one plug-in: the Adobe Flash Player that is disabled
by default. Although not part of the browser per se, browser plugins and extensions extend the attack
surface, exposing vulnerabilies in Adobe Flash Player, Adobe (Acrobat) Reader, Java plugin,
and ActiveX that are commonly exploed. Malware may also be implemented as a browser extension, such
as a browser helper object in the case of Internet Explorer. Browsers like Google Chrome and
Mozilla Firefox can block—or warn users of—insecure plugins.
Cookies
Cookies are messages that web servers pass to itr web browser when it vis Internet ses. browser stores each
message in a small file, called cookie.txt. When it request another page from the server, itr browser sends
the cookie back to the server. These files typically contain information about itr vis to the web page, as well
as any information it've volunteered, such as itr name and interests.
The term "cookie" is an allusion to a Unix program called Fortune Cookie that produces a different message,
or fortune, each time runs.
Cookies are most commonly used to track webse activy. When it vis some ses, the server gives it a cookie
that acts as itr identification card. Upon each return vis to that se, itr browser passes that cookie back to the
server. In this way, a web server can gather information about which web pages are used the most, and
which pages are gathering the most repeat hs.
Cookies are also used for online shopping. Online stores often use cookies that record any personal
information it enter, as well as any ems in itr electronic shopping cart, so that it don't need to re-enter this
information each time it vis the se.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Antivirus Instllation
• To install an antivirus program on itr computer, follow the steps below.
• If it purchased the antivirus program from a retail store, insert the CD or DVD into the computer's
disc drive. The installation process should start automatically, wh a window opening to help guide
it through the install process.
• If it downloaded the antivirus program on the Internet, find the downloaded file on itr computer. If
the downloaded file is a zip file, unzip the file to extract and access the installation files. Look for a
file named setup.exe, install.exe, or something similar, then double-click that file. The installation
process should start, wh a window opening to help guide it through the install process.
• In the installation process window, follow the steps provided to install the antivirus program. The
install process will provide recommended options so the antivirus program will function properly,
which in most cases can be accepted as is. The one exception is if the install process recommends
that it also install any toolbars for Internet browsers or other helpful programs for itr computer. If
prompted to install other software along wh the antivirus program, uncheck all boxes or decline the
install of those extra programs. No addional programs should be needed for the antivirus program
to install and run successfully on itr computer.
• When the install process is complete, close out of the install window.
• If used, remove the CD or DVD from the computer's disc drive.
• The antivirus program is now installed and ready to use. While may not be required, is
recommended that it restart itr computer so that any modified settings in the operating system can
take effect correctly.
• After being installed, it may also receive a prompt to update the antivirus program. is highly
recommended that it update , even if it do not receive a prompt to do so. Proceed to the next section
below for help on how to update the antivirus program.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……

Configuring a firewall

Step 1: Secure itr firewall


If an attacker is able to gain administrative access to itr firewall is “game over” for itr network secury.
Therefore, securing itr firewall is the first and most important step of this process. Never put a firewall into
production that is not properly secured by at least the following configuration actions:

Update itr firewall to the latest firmware.

• Delete, disable, or rename any default user accounts and change all default passwords. Make sure
to use only complex and secure passwords.

• If multiple administrators will manage the firewall, create addional administrator accounts wh limed
privileges based on responsibilies. Never use shared user accounts.

Step 2: Archect itr firewall zones and IP addresses


In order to protect the valuable assets on itr network, it should first identify what the assets (for example,
payment card data or patient data) are. Then plan out itr network structure so that these assets can be grouped
together and placed into networks (or zones) based on similar sensivy level and function.

For example, all of itr servers that provide services over the internet (web servers, email servers, virtual
private network (VPN) servers, etc.) should be placed into a dedicated zone that will allow limed inbound
traffic from the internet (this zone is often called a demilarized zone or DMZ). Servers that should not be
accessed directly from the internet, such as database servers, must be placed in internal server zones instead.
Likewise, workstations, point of sale devices, and voice over Internet protocol (VOIP) systems can usually
be placed in internal network zones.

Generally speaking, the more zones it create, the more secure itr network. But keep in mind that managing
more zones requires addional time and resources, so it need to be careful when deciding how many network
zones it want to use.

If it are using IP version 4, Internal IP addresses should be used for all of itr internal networks. Network
address translation (NAT) must be configured to allow internal devices to communicate on the Internet
when necessary

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Step 3: Configure access control lists
Now that it have established itr network zones and assigned them to interfaces, it should determine exactly
which traffic needs to be able to flow into and out of each zone.This traffic will be permted using firewall
rules called access control lists (ACLs), which are applied to each interface or subinterface on the firewall.
Make itr ACLs specific to the exact source and/or destination IP addresses and port numbers whenever
possible. At the end of every access control list, make sure there is a “deny all” rule to filter out all
unapproved traffic. Apply both inbound and outbound ACLs to each interface and subinterface on itr
firewall so that only approved traffic is allowed into and out of each zone.

Step 4: Configure itr other firewall services and logging


If itr firewall is also capable of acting as a dynamic host configuration protocol (DHCP) server, network
time protocol (NTP) server, intrusion prevention system (IPS), etc., then go ahead and configure the services
it wish to use. Disable all the extra services that it don’t intend to use.

To fulfill PCI DSS requirements, configure itr firewall to report to itr logging server, and make sure that
enough detail is included to satisfy requirement 10.2 through 10.3 of the PCI DSS.

Step 5: Test itr firewall configuration


In a test environment, verify that itr firewall works as intended. Don’t forget to verify that itr firewall is
blocking traffic that should be blocked according to itr ACL configurations. Testing itr firewall should
include both vulnerabily scanning and penetration testing.Once it have finished testing itr firewall, itr
firewall should be ready for production. Always remember to keep a backup of itr firewall configuration
saved in a secure place so that all of itr hard work is not lost in the event of a hardware failure.

Now remember, this is just an overview to help it understand the major steps of firewall configuration.
When using tutorials, or even if it decide to configure itr own firewall, be sure to have a secury expert review
itr configuration to make sure is set up to keep itr data as safe as possible.

Firewall management
Wh itr firewall in production, it have finished itr firewall configuration, but firewall management has just
begun. Logs must be monitored, firmware must be updated, vulnerability scans must be performed, and
firewall rules must be reviewed at least every six months. Last of all, be sure to document itr process and be
diligent about performing these ongoing tasks to ensure that itr firewall continues to protect itr network.

Blocking pop-ups

Google does a pretty good job about keeping pop-up windows under control in s Chrome browser. A sea of
pop-up windows invading itr tradtional browsing experience indicates a problem, that itr default settings are
in disarray. Thankfully, we have a few handy Google Chrome tips for dealing wh these annoying
advertisements, and it can run through them in barely any time at all.
Below we list a number of detailed methods for how to stop pop-ups in Chrome, including running malware
scans and creating an exception list. The easiest way to start, though, is making sure Chrome is up to date.
Navigate to chrome://settings/help and run any available updates, as Chrome shuts down pop-
ups originally tied to a specific setting, so they'll be blocked no matter what. It can learn about other new
Chrome book features here. However, managing pop-up blocking in Chrome browser begins wh five basic
actions.
• Select Settings from the Chrome menu.
• Search 'Pop'
• Click Se Settings.
• Click Pop-ups and redirects.
• Toggle the Pop-ups option to Blocked, or delete exceptions.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Enable Chrome's Pop-Up Blocking Feature

1. Click on Chrome's menu icon in the upper-right corner of the browser and click on Settings

2. Type "Pop" into the Search settings field.

3. Click Se Settings.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
4. Under Popups should say Blocked. If says Allowed, click Pop-ups and redirects.

5. Turn off the swch next to Allowed.

Email creation and usage

Follow the steps below to create email account at gmail.com for free:

• Click on the Free Sign Up Button


• Enter all mandatory fields (First Name, Last Name, Gender, etc.)
• Type in itr desired Email Address out of our huge selection of 200 available domains (e.g.
biker.com, accountant.com, chef.net, etc.)
• Choose a secure Password (at least 8 characters, mixing letters, numbers, lower and upper case, and
using special characters)
• Select itr Secury Question, type in itr Answer
• Verify itr registration by typing the numbers in the captcha picture
• Click the "Accept" - Button underneath

1. Vis the Gmail webse. Gmail is Google Mail, and it will need a Google account to access . Signing
up for a Google account is free.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
2. Click the “Create an Account” button. This will open the “Create a new Google Account” page. Here
it will need to enter itr personal information.
• Make sure to enter itr real first and last name if it are using the email address to correspond wh
people it know or wh businesses. The name will appear in emails that it send.
• Enter a username that it will remember. Itr username is itr email address. Make sure that is
appropriate if it are going to be giving to people who might take offense.
• Create a good password. Make sure that is strong but easy to remember so that it won’t have
problems reentering .
3. Enter the Captcha and agree to the Terms of Service. The Captcha is what the system uses to make
sure that it are an actual person and not an automated program.

4. Click Next Step to continue. It will be taken to the “Create itr profile” page. This page is the basic
starting point for itr Google profile. If it don’t want to create one, move on to the next step. It will still have
a profile, but will only be itr name.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
5. Log in to itr email. Vis the Gmail page to log in wh itr new username and password. It will be taken to
the Gmail interface.

usage
Despe all the methods of communication email is still popular and has become as necessary as a phone
number or mailing address. Similar to calling somebody, email has become a standard mode of
communication wh the expectation being that everybody should have an email address. Email started out as
a simple communication tool but is now used for much more than that.
In many ways, email has made my life easier. allows me to:

• Contact people all over the world for free (or inexpensively)
• Communicate wh more than one person at a time
• Document interactions (e.g. the highly prized CYA paper-trail)
• Leave messages any time of day whout bothering people

was only when people started using in alternative ways that things started to get messy, really
messy. Instead of looking for a different model email kept evolving to meet new demands and expectations
such as

• Working collaboratively
• Sending attachments
• Keeping a conversation together for multiple people(e.g. thread)
• Searching capabilies
• Automating actions wh rules
• Integrating calendars and appointments, etc.

was almost possible to live in itr email. Some of these new demands were a natural f for this mode of
communication, while others stretched the limations and made seem really clunky. For example, sharing
digal photos through email was never a good solution. The attachments are large to send and can quickly
clog up an inbox making problematic for both the sender and the recipient(s).
Business and organizational use: Email has been widely accepted by business, governments and
non-governmental organizations in the developed world, and is one of the key parts of an 'e-revolution' in
workplace communication (wh the other key plank being widespread adoption of highspeed Internet). A
sponsored 2010 study on workplacecommunication found 83% of U.S. knowledge workers felt email was
crical to their success and productivy at work.
has some key benefs to business and other organizations, including:
• Facilating logistics: Much of the business world relies on communications between people who
are not physically in the same building, area, or even country; setting up and attending an in-person
meeting, telephone call, or conference call can be inconvenient, time-consuming, and costly. Email
provides a method of exchanging information between two or more people wh no set-up costs and
that is generally far less expensive than a physical meeting or phone call.
• Helping wh synchronization: Wh real time communication by meetings or phone calls,
participants must work on the same schedule, and each participant must spend the same amount of

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
time in the meeting or call. Email allows asynchrony: each participant may control their schedule
independently.
• Reducing cost: Sending an email is much less expensive than sending postal mail, or long distance
telephone calls, telex or telegrams.
• Email marketing:Email marketing via "opt-in" is often successfully used to send special sales
offerings and product information. Depending on the recipient's culture, email spamemail sent
whout permission—such as an "opt-in"—is likely to be viewed as unwelcome ".
Personal use: Many users access their personal email from friends and family members using a personal
computer in their house or apartment.

Creating a digal profile on LinkedIn

Everything on LinkedIn begins wh the profile. There are many parts to creating a great one; here’s how to
do , as well as some tips to keep in mind.
Start wh the Basics: When creating a profile, make sure the email address is one it often check; this is val
to ensure receipt of connection requests, messages and more. Basic demographic information, such as
location, is self-explanatory. Be sure to add a phone number—the more ways a connection or potential
employer has to get in touch, the better! ’s also possible to begin adding contacts at this early stage of the
game by allowing LinkedIn to access itr email contact list.
While filling out the demographic information, LinkedIn will ask about current employment status. Those
who are unemployed might consider using phrases like “currently looking for employment opportunies” or
“advertising student seeking challenging employment opportunies.” This shows forward thinking and
optimism for the future.

Choose Account Type: This is where it must make a choice between the Basic LinkedIn experience, which
is free, or the Premium option, which provides many more features but costs a fee. Whin the Premium
option, there are several other options to choose from, including Professional, Jobseeker and more. Each
has a different price point and offers different benefs. Think about itr intended use of LinkedIn when
choosing the account type that’s best for itr suation; remember that each offers a one-month free trial, so ’s
possible to cancel if turns out the first choice wasn’t the best one.

Add a Photo: When comes to photos on LinkedIn, professional is the name of the game. Add a professional
headshot or one that simply looks that way—sometimes even a photograph taken wh a smartphone is
professional enough to use. However, there is reason to look toward professional headshots first; those wh
a photo taken by a pro get 14 times more views than those wh a ho-hum pic.

Use a photo that is at least 200x200 pixels; anything less and will appear distorted and blurry. Remember
that those who add a high-qualy photo to their profile get 21 times more profile views and up to 36 times
more messages than those who keep the boilerplate look.

Talk about Experience : For jobseekers, this is where the juice is—so make sure the experience listed
reflects everything it can do. It can import a resume, or it can choose to add each posion manually. Many
will begin by importing a resume and then tweaking each posion to add more content, optimize wh
keywords and make all more readable than the typical dry, bare bones resume might be. Always list the
employment experience starting wh the most current.

Time for Skills!: Shoot for a bare minimum of five skills; the more listed, the better. It can currently add
up to 50 skills. Those who have at least five skills on their profile are contacted 33 times more often by
recruers and other LinkedIn members, and receive 17 times more profile views. Make a point of listing
skills in the order of proficiency and expertise; those skills are used to connect jobseekers wh recruers and
other connections, so ’s important to keep the most highly-honed skills front and center.
Ramachandra College of Engineering
Date Page no
:……………………… :…………
……
A Nod to Education: When including education, be sure to include all schools attended; this will allow for
easier connections wh old classmates, alumni groups and the like. In addion, include any education that
wasn’t necessarily through a universy or college, such as a corporate training seminar or a certification
earned through an organization or association related to itr field.

Summarize All: Wring a summary can be tricky. Here are a few points to keep in mind when wring the
best possible summary to get the most attention:

• Don’t be afraid to show personaly! A whopping 40 percent of recruers will love a peek into itr
attude.
• Make sure ’s at least 40 words; this makes more likely to show up in searches.
• Drop a note about specialties in there, as those keywords will show up in searches too.
• Talk about experience, but talk about itr goals as well.

The Headline Matters: The headline is what will show up right beside itr name on LinkedIn, as well as
results on some search engines. ’s an excellent chance to make a great first impression, so say as much as
possible in only a few words. Make snappy and interesting so connections want to click and find out more.
Weave in keywords if possible. Here are a few examples:
• Civil Engineering Student, Graduating 2020 | CAD, Survey and Blueprint Expert
• Nuclear Engineering Professional |Lateral Opportunies Welcome
• Talent Acquision Manager at Award-Winning Eco-StartUp

Add Addional Information: LinkedIn offers the opportuny to add a variety of interests to the profile, so
go for ! Those interests might catch the eye of a recruer. Keep in mind that hobbies can sometimes translate
into skills that are excellent in a working environment; for example, a hobby of building model planes
translates into intense attention to detail, or an obsession wh woodworking translates into taking the time
to get a job done right the first time.

Double-Check, Ed and Check Again: Now that the profile is almost complete, go back and double-check
everything. Make sure the dates of employment and education are correct. Look for grammar mistakes and
typos—a glaring typo can pull attention away from the message. Use professional language at all times. At
the “view profile as” function, toggle between “public view” and “personal connections” to see what
appears for each segment.
Finally, perhaps drop the summary and any other paragraphs throughout the profile into an online checker,
such as Hemingway or Grammarly, to review anything it might have missed.

Ask Someone to Look Over: One set of eyes isn’t enough. Ask friends to take a look at the profile to
make sure ’s appealing and includes everything pertinent. College students can talk to their career services
center to get help wh this; professionals can turn to colleagues or professional services to ensure they’re on
the right track.

Create a Personalized URL: A personalized URL makes much easier for others to find it. Those wh a
common name might discover that their particular URL is already taken; however, adding a location or
numbers behind the name can be a good alternative. To do this, click the “gear” next to the public profile
link, then click the pencil message next to the URL. The personalized URL must be between five and 30
characters.

Start Building a Network : Now ’s time to start making connections!


“LinkedIn is all about professional connections,” said Kristan Wheaton, a professor at Mercyhurst Universy
who educates students on how to use the service. “New users should connect to anyone that they know and
anyone wh whom they have a professional connection. This includes professors, recruers, friends of the
family, people in itr industry—basically anyone.”

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Update Regularly: Using LinkedIn on a regular basis is recommended, as this helps keep it in the loop
wh colleagues and happenings in the field. Go back once a week or so to check out messages, respond to
requests for recommendations, make endorsements, comment on articles, send a congratulatory note or
update itr profile if new things have been happening.

Post Content: Finally, don’t forget to start posting content. Keep the content to things that are pertinent
to itr field, such as interesting articles, fun statistics or compelling new innovations. Start a blog if it feel
it can keep up wh on a regular basis. Just make sure any content posted is as professional as possible.

Source code on Ghub


GHub is an American company that provides hosting for software development version control using G. is
a subsidiary of Microsoft, which acquired the company in 2018 for $7.5 billion. offers all of the distributed
version control and source code management (SCM) functionaly of G as well as adding s own features.
provides access control and several collaboration features such as bug tracking, feature requests, task
management, and wikis for every project.
GHub offers plans for free, professional, and enterprise accounts. Free GHub accounts are commonly used
to host open source projects. As of January 2019, GHub offers unlimed private reposories to all plans,
including free accounts. As of May 2019, GHub reports having over 37 million users and more than
100 million reposories (including at least 28 million public reposories), making the largest host of source
code in the world.
If it are on a personal Windows machine, download and install g for itr operating system. Below are some
recommended installation instructions, to keep things simple. However, if it know what these options do,
and want to change them to su it, go ahead

• For “Select Components”, check:

➢ “G Bash Here”
➢ “G GUI Here”
➢ “G LFS (Large File Support)”
➢ “Associate .g* …”
➢ “Associate .sh …”

• When prompted to choose the default edor, pick Nano (a simple terminal edor) or Notepad++ (a
simple graphical edor):
• For “Adjust itr PATH environment”, select: “Use G from G Bash only”
• For “Choose HTTPS transport backend”, select: “Use the OpenSSL library”
• For “Configure the line ending conversions”, select: “Checkout Windows-style,…”
• For “Configure the terminal emulator …”, select: “Use MinTTY …”
• For “Configure extra options”, select: “Enable file system caching”
• “Enable G Credential Manager”

Hackerrank
HackerRank is a technology companythat focuses on competive programming challenges for both
consumers and businesses, where developers compete by trying to program according to provided
specifications. HackerRank's programming challenges can be solved in a variety of programming languages
(including Java, C++, PHP, Python, SQL, JavaScript) and span multiple computer science domains.
On the consumer side, when a programmer subms a solution to a programming challenge, their submission
is scored on the accuracy of their output. Programmers are then ranked globally on the
HackerRank leaderboard and earn badges based on their accomplishments to drive competion among users.
In addion to individual programming challenges, HackerRank also hosts contests (often referred to by

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
HackerRank as "CodeSprints") where users compete on the same programming challenges during a set
period of time and are then ranked at the conclusion of the event. HackerRank is part of the
growing gamification trend whin competive computer programmingand the consumer-side of their webse
is free for coders to use.

In addion to supporting a variety of popular (and some obscure) programming languages, HackerRank
categorizes most of their programming challenges into a number of core computer science domains

• Artificial Intelligence: involves developing AI bots and using them against others.
• Algorhms: Tradional algorhmic challenges.
• Functional Programming: use functional programming abstractions to solve challenges.
• Machine Learning: use predictive modeling and analysis to solve challenges.

Codechef
CodeChef is a competive programming webse. is a non-prof educational iniative of Directi, aimed at
providing a platform for students, itng software professionals to practice, hone their programming skills
through online contests Apart from this, the 'CodeChef For Schools' program aims to reach out to itng
students and inculcate a culture of programming in Indian schools.
CCDSAP (CodeChef Certified Data Structures and Algorhms Programm): CCDSAP is a certification
programme by CodeChef which tests candidates' proficiency in data structures and algorhms. The
programme offers three difficulty levels, namely Foundation, Advanced, and Expert. The first CCDSAP
certification exam was held on November 19, 2017 followed by the second and third exams on 21 January
2018 and 18 March 2018.
Go For Gold: The Go For Gold iniative was launched by Directi and CodeChef wh an aim to help an
Indian team win gold at the ACM-ICPC World Finals. As part of this iniative,any Indian team at the ACM-
ICPC World Finals securing a higher rank than the current highest secured by an Indian team will be
awarded the Go For Gold cup and a cash prize calculated using their 'golden formula'.
Host Itr Contest: allows schools, universies, corporate instutions to host their own programming contest
on the CodeChef platform. Corporates can use the CodeChef platform for various purposes like
campus/lateral hiring, internal employee engagement, branding, employee re-skill programs.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
HackerEarth
HackerEarth provides enterprise software solutions that help organisations wh their technical recrument
needs. HackerEarth has conducted 1000+ hackathons and 10,000+ programming challenges to date. Since
s inception, HackerEarth has built a developer base of over 3 million+. HackerEarth has raised close to $5
million in funding over three rounds. Today, more than 750 customers worldwide use s Assessments
platform, including Amazon, Walmart Labs, Thoughtworks, SocieteGenerale,
HP, VMware, DBS, HCL, GE, Wipro, Barclays, Pney Bowes, Intel, and L&T Infotech.
HackerEarth Assessments: HackerEarth Assessments is a technical recrument platform that helps
organizations hire developers using automated technical talent tests. The proprietary tech assessment
platform vets technical talent through skill-based evaluation and analytics. Companies also use
the B2B product for lateral recrument and universy hiring.
Challenges: HackerEarth Challenges include hackathons, programming challenges, and coding
competions for developers and companies.
Practice: HackerEarth Practice offers programming tutorials (data structures, algorhms,
math, Python, machine learning, etc.) and practice problems for developers to hone their skills. Code Monk
v2.0 is a curated list of topics to help aspiring coders improve their programming skills.

Google hangout
Google Hangouts is a communication software product developed by Google. Originally a feature
of Google+, Hangouts became a standalone product in 2013, when Google also began integrating features
from Google+ Messenger and Google Talk into Hangouts. In 2017, Google began developing Hangouts into
a product aimed at enterprise communication. Hangouts is now part of the G Sue line of products and
consists of two primary products: Google Hangouts Meet and Google Hangouts Chat. Google has also
begun integrating features of Google Voice, s IP telephony product, into Hangouts, stating that Hangouts is
designed to be "the future" of Voice. Google will shut down the consumer version of Hangouts in June
2020.
Hangouts allows conversations between two or more users. The service can be accessed online through
the Gmail or Google+ webses, or through mobile apps available for Android and iOS (which were
distributed as a successor to their existing Google Talk apps). However, because uses a proprietary
protocolinstead of the XMPP open standard protocol used by Google Talk, most third-party applications
which had access to Google Talk do not have access to Google+ Hangouts.
Chat histories are saved online, allowing them to be synced between devices. A "watermark" of a
user's avatar is used as a marker to indicate how far they have read into the conversation. Photos can be
shared during conversations, which are automatically uploaded into a private Google+ album. Users can
also now use color emoji symbols in their messages.

Skype
Skype is a telecommunications application that specializes in providing video chat and voice calls between
computers, tablets, mobile devices, the Xbox One console, and smartwatches via the Internet. Skype also
provides instant messaging services. Users may transm text, video, audio and images. Skype allows video
conference calls.
At the end of 2010, there were over 660 million worldwide users, wh over 300 million estimated active each
month as of August 2015. At one point in February 2012, there were 34 million users concurrently online
on Skype.
Registered users of Skype are identified by a unique Skype Name and may be listed in the Skype
directory.[55] Skype allows these registered users to communicate through both instant messaging and voice
chat. Voice chat allows telephone calls between pairs of users and conference calling and uses a proprietary
audio codec. Skype's text chat client allows group chats, Remoticons, storing chat history, and eding of
previous messages.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Offline messages were implemented in a beta build of version 5 but removed after a few weeks whout
notification. The usual features familiar to instant messaging users—user profiles, online status indicators,
and so on—are also included.

GoToMeeting
GoToMeeting is a web-hosted service created and marketed by LogMeIn. is an online meeting, desktop
sharing, and video conferencing software package that enables the user to meet wh other computer users,
customers, clients or colleagues via the Internet in real time. In late 2015, Crix announced plans to spin-off
the GoToMeeting business as a stand-alone subsidiary wh a market value around $4 billion.In July
2016, Crix and LogMeIn announced plans to merge the GoTo family of products.
GoToMeeting is designed to broadcast the desktop view of a host computer to a group of computers
connected to the host through the Internet. Transmissions are protected wh high-secury encryption and
optional passwords. By combining a web-hosted subscription service wh software installed on the host
computer, transmissions can be passed through highly restrictive firewalls.
GoToMeeting is competing in a marketplace for web and video conferencing, where businesses and
professionals can meet virtually.
GoToMeeting is sold in multiple free-paid edions. GoToMeeting feature now include:

• Mobile apps for iPad, iPhone and Android devices


• Encryption and authentication secury provided by a Secure Sockets Layer (SSL) Web se wh
end-to-end 128-b Advanced Encryption Standard (AES) encryption and optional passwords
• Specific application sharing for showing only selected programs wh attendees
• Multi-monor support for a client PC
• Meeting recording and playback for recording and saving meetings to a user desktop for
later review
• Total audio package provides toll based phone or conferencing via VoIP.
• GoToMeeting hosts up to 100.
• Video conferencing
• In room solutions wh GoToConference and InRoom Link

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Archive.org for accessing archived resources on the web
The Internet Archive is an American digal library wh the stated mission of "universal access to all
knowledge." provides free public access to collections of digized materials, including webses, software
applications/games, music, movies/videos, moving images, and millions of public-domain books. In addion
to s archiving function, the Archive is an activist organization, advocating for a free and open Internet.
The Internet Archive allows the public to upload and download digal material to s data cluster, but the bulk
of s data is collected automatically by s web crawlers, which work to preserve as much of the public web as
possible. s web archive, the Wayback Machine, contains hundreds of billions of web captures. The Archive
also oversees one of the world's largest book digization projects.
The Archive is a 501(c) (3) nonprof operating in the United States. has an annual budget of $10 million,
derived from a variety of sources: revenue from s Web crawling services, various partnerships, grants,
donations, and the Kahle-Austin Foundation.
s headquarters are in San Francisco, California. From 1996 to 2009, were in the Presidio of San Francisco,
a former U.S. milary base. Since 2009, headquarters have been at 300 Funston Avenue in San Francisco, a
former Christian Science Church.
At some points in time, most of s staff worked in s book-scanning centres; as of 2019, 100 paid operators
worldwide perform scanning. The Archive has data centres in three Californian cies: San
Francisco, Redwood Cy, and Richmond. To prevent losing the data in case of e.g. a natural disaster, the
Archive attempts to create copies of (parts of) the collection at more distant locations, currently including
the Bibliotheca Alexandrian Egypt and a facily in Amsterdam. The Archive is a member of the International
Internet Preservation Consortium and was officially designated as a library by the state of California in
2007.
The Internet Archive capalized on the popular use of the term "WABAC Machine" from a segment of The
Adventures of Rocky and Bullwinkle cartoon (specifically Peabody's Improbable History), and uses the
name "Wayback Machine" for s service that allows archives of the World Wide Web to be searched and
accessed. This service allows users to view some of the archived web pages. The Wayback Machine was
created as a joint effort between Alexa Internet and the Internet Archive when a three-dimensional index
was built to allow for the browsing of archived web content. Millions of web ses and their associated data
(images, source code, documents, etc.) are saved in a database. The service can be used to see what previous
versions of web ses used to look like, to grab original source code from web ses that may no longer be
directly available, or to vis web ses that no longer even exist. Not all web ses are available because many
web se owners choose to exclude their ses. As wh all ses based on data from web crawlers, the Internet
Archive misses large areas of the web for a variety of other reasons. A 2004 paper found international biases
in the coverage, but deemed them "not intentional".

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Search Engines and Netiquette:
Search Engines
• Software that lets a user specify search terms. The search engine then finds sites that contain those
terms.
• Over time a search engine builds a database of searchable terms that can be matched to web sites.
• Examples:
–www.google.com–www.altavista.com–www.AskJeeves.com
Query
• Terms entered into a form of a search engine’s web page.
• Not necessarily phrased as a question since words such as “what”, “a”, “is” etc. would be ignored.
• Enter specific keywords.
• Make sure your spelling is correct.
Methods of searching
• Use more than one word.
• Use quotes
• Use boolean queries
• Use + sign or - sign
• Use * (wild card)
Boolean Query
AND, OR, NOT
• A AND B–results in sites containing both A and B
• A OR B
–results in sites containing A or B, or both A and B
• A AND NOT B
–results in sites containing A and excludes sites containing both A and B.
Stemming
Some search engines will return results that include variations on the endings of words.
• computer
• computers
• computed
Using boolean queries
• shelf AND ice
–results in URLs of pages containing the word “shelf” and
the word “ice” (in any order).
• shelf OR ice
–Results in URLs of pages containing the words “shelf” and ”ice”, or just the word “shelf” or just the
word “ice”.
• computers NOT notebook
–Results in URLs of pages containing the word “computers” but not containing the word “notebook”.
Metasearch Engines
• Performs a search by using more than one search engine to do the search.
–www.metasearch.com

–www.metacrawler.com
–www.dogpile.com
–www.infind.com
White Pages
• Used for finding individuals
–www.bigfoot.com
–www.four11.com
–www.whowhere.com
Types of Links
• Text Hyperlink
• Image Hyperlink

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
• Mailto Hyperlink – launches a mailer
• Intra-document Link (Internal link) - links to another location within the same page.
To open a web page in a new browser window.
• Right-mouse click on the link of interest and then select “Open in new window”.
• Click on the original browser window on the task bar below in order to continue viewing the original
web page while that page loads
• This speeds up your search since you can view one page while another is loading.
Tasks
• Write search engines to find the following
–To find pages related to Computer Science or Computer Programming
–Who invented Laser
–To find information about AND & OR gates
–To find information about apple(the fruit, NOT Apple computers)
–To search for word School of IT in jntu.ac.in
Netiquette
"Netiquette" is network etiquette, the do's and don'ts of online communication. Netiquette covers both
common courtesy online and the informal "rules of the road" of cyberspace.
What is Netiquette?

Simply stated, it's network etiquette -- that is, the etiquette of cyberspace.

“Etiquette” means “the forms required by good breeding or prescribed by authority to be required in
social or official life.”

In other words, Netiquette is a set of rules for behaving properly online.


The golden rule: Do unto others as you'd have others do unto you. Imagine how you'd feel if you were in
the other person's shoes. Stand up for yourself, but try not to hurt people's feelings.
Electronic communication lacks the facial expression, gestures and tone of voice to convey your meaning.
It’s easy to misinterpret meaning of words.
Would you say it to the person's face?
If the answer is no, rewrite and reread. Repeat the process till you feel sure that you'd feel as comfortable
saying these words to the live person as you do sending them through cyberspace.
Remember, when you communicate through cyberspace your words are written. Chances are they're
stored somewhere. They can come back and haunt you. You don't have to be engaged in criminal activity
to want to be careful. Any message you send could be saved or forwarded by its recipient. You have no
control over where it goes. Standards of behavior may be different in some areas of cyberspace, but they
are not lower than in real life. Be ethical.
If you encounter an ethical dilemma in cyberspace, consult the code you follow in real life.
If you use shareware, pay for it. Paying for shareware encourages more people to write shareware. The
few dollars probably won't mean much to you, but they benefit all of cyberspace in the long run.
Breaking the law is bad Netiquette.
If you're tempted to do something that's illegal, chances are it's also bad Netiquette.
Netiquette varies from domain to domain. What's perfectly acceptable in one area may be dreadfully rude
in another.
Netiquette is different in different places, so it's important to know where you are.
Lurk before you leap
When you enter a domain of cyberspace that's new to you, take a look around. Spend a while listening to
the chat or reading the archives. Get a sense of how the people who are already there act. Then go ahead
and participate.
Bandwidth is the information-carrying capacity of the wires and channels that connect everyone in
cyberspace. It also refers to the storage capacity of a host system.
If you accidentally post the same note to the same newsgroup five times, you are wasting both time (of
the people who check each copy) and bandwidth (by sending repetitive information over the wires and
requiring it to be stored somewhere).

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
You are not the center of cyberspace. Don’t expect instant responses to all your questions, and don't
assume that all readers will agree with -- or care about --your passionate arguments.
Ensure your message is worth the time it takes to open it.
Before you copy people on your messages, ask yourself whether they really need to know. If the answer
is no, don't waste their time. If the answer is maybe, think twice before you hit the send key.
Take advantage of your anonymity. You won't be judged by color, weight, age or dress sense. You will,
however, be judged by the quality of your writing. So spelling and grammar do count.
Know what you're talking about and make sense. Pay attention to the content of your writing. Ensure your
notes are clear and logical.
Be pleasant and polite. Avoid offensive language, and don't be confrontational for the sake of
confrontation.
If you must swear, think up creative alternatives
The strength of cyberspace is in its numbers. The Internet itself was founded and grew because academics
wanted to share information. Don't be afraid to share what you know.
If you ask a question and anticipate a lot of answers, it’s customary to request replies by email instead of
to the group. Share the results of your questions with others, so everyone benefits from the experts who
took the time to write to you.
If you’re an expert, or you've researched a topic that you think would be of interest to others, write it up
and post it. Sharing your knowledge is fun. And it makes the world a better place
opinion without holding back any emotion.
Netiquette does not forbid flaming. Flaming is a long-standing network tradition (and Netiquette never
messes with tradition).
Netiquette does forbid the perpetuation of flame wars that can dominate the tone and destroy the
camaraderie of a discussion group.
While flame wars can initially be amusing, they’re an unfair monopolization of bandwidth.
Some people in cyberspace have more power than others. There are wizards in MUDs (multi-user
dungeons), experts in every office, and system administrators in every system.

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
Task 11
Cyber hygiene
Types of Internet Threats
• Viruses
• Network Worms
• Trojans
• Spyware / Adware
• Other Malware
• Other Threats
Viruses
• Main purpose is to spread and infect files
• Attach to a file and replicate when file is executed
• More than 100 000 known viruses exists in the world today
• Several hundred new viruses are discovered every month
Network Worms
• Self-replicating Viruses that reside in the active memory of a computer.
• Worms Send themselves out to the Internet from infected systems.
• Either include tiny e-mail server or search for unprotected shared network drives to unload.
Trojan Programs
• Programs that installs themselves stealthly via Internet & provide access for malicious use
• Threats enabled by (/through) Trojans
–DDos attacks
–Data stealing
–Distributed spam eMails
• Do not replicate
Spyware / Adware
• Cookies – Track you online
• Browser Hijackers – Changes default home page
• Tracking Cookies – Gathers info of web usage
• Trickles – Reinstalls spyware when deleted
• Keyloggers – Records anything you type!
• Data-Mining
• List goes on...
Other Threats
• Phishing
–Confidential information stealing by fraud emails & web sites (author falsified)

–Several millions of Phishing messages have been sent world wide


–Fastest growing threat today
• SPIM
–Instant Messaging SPAM
–Estimated: 4 billion SPIM's during 2004
Diagnosing Infections
• Slow computer, system reboots
• Mouse moves by itself
• Browser goes to unexpected web sites
• Slow internet access
• Endless popup ads
• New desktop toolbars
Diagnosing Infections
• Disabled antivirus scanner or firewall
• Check startup program group regularly for software you didn’t install
• Check Add/Remove programs for software you didn’t install (make a list of installed items on a new

Ramachandra College of Engineering


Date Page no
:……………………… :…………
……
machine and check the list regularly)
Diagnosing Infections
• Check running services monthly
• Check running processes in Task Manager
• Monitor open ports
• Monitor outgoing and incoming connections
Updating
• Few pieces of software are perfect. Many have security flaws that can allow an intruder to take over
your system.
• When the flaws are discovered, the vendor generally fixes them and places patches on their Web sites.–
https://www.Microsoft.com/Security (Windows, Internet Explorer, Outlook, etc.)
–http://www/redhat.com/solutions/security/ (Red Hat Linux)
–http://securityresponse.symantec.com/ (Norton Anti-Virus)
• Some vendors provide a tools for Automatic Updates
Anti-Virus Software
• Examples
–Norton Anti-Virus
–Mc Afee Anti-Virus
–AVG Anti-Virus
AntiSpyware Tools
• Only Software tools exist at the moment
• Programs are trying to detect distinctive signs that spyware places on system
• Popular software
–Lavasoft: Ad-Aware SE
–Spybot: Search & Destroy
Firewalls
• Monitor network traffic and Block access by configured rules
• Software Vs. Hardware
• Stateful inspection
–Examine the headers & content of each passing network packet

Ramachandra College of Engineering

You might also like