Professional Documents
Culture Documents
YEAR : …………………………………………………………………………………………………….
SEMESTER : ……………………………………………………………………………………………...
BRANCH : ………………………………………………………………………………………………...
Department of Computer Science and Engineering
(Cyber Security)
CERTIFICATE
Experiments.
10
11
EXPERIMENT DETAILS SHEET
Name of the Laboratory : …………………………………………………… Year : …………...
10
11
Date Page no
:……………………… :…………
……
Task 1
PC Hardware
CPU: CPU is the abbreviation for central processing unit, sometimes referred to simply as the central
processor, but more commonly called a processor, the CPU is the brains of the computer where most
calculations take place. In terms of computing power, the CPU is the most important element of a computer
system.
ALU: An arithmetic logic unit (ALU) is a major component of the central processing unit of a computer
system. It does all processes related to arithmetic and logic operations that need to be done on instruction
words. In some microprocessor architectures, the ALU is divided into the arithmetic unit (AU) and the logic
unit (LU).
Word: The memory stores binary information (1's and 0's) in groups of bits called words. A word in
memory is an entity of bits that move in and out of storage as a unit. A memory word is a group of 1's and
0's and may represent a number, an instruction code, one or more alphanumeric characters, or any other
binary coded information.
Byte: A group of eight bits is called a byte. Most computer memories use words whose number of bits is
a multiple of 8. Thus a 16-bit word contains two bytes, and a 32-bit word is made up of 4 bytes. The capacity
of memories in commercial computers is usually stated as the total number of bytes that can be stored.
Secondary Memory: Secondary memory is where programs and data are kept on a long-term basis.
Common secondary storage devices are the hard disk and optical disks. The hard disk has enormous storage
capacity compared to main memory. The hard disk is usually contained inside the case of a computer.
Keyboard: Keyboards' are a human interface device which is represented as a layout of buttons. Each
button, or key, can be used to either input a linguistic character to a computer, or to call upon a particular
function of the computer. They act as the main text entry interface for most users. Traditional keyboards
use spring-based buttons, though newer Variations employ virtual keys, or even projected keyboards.
Mouse: Pointing devices are the most commonly used input devices today. A pointing device is any
human interface device that allows a user to input spatial data to a computer. In the case of mouse and touch
pad, this is usually achieved by detecting movement across a physical surface. Analog devices, such as 3D
mice, joysticks, or pointing sticks, function by reporting their angle of deflection. Movements of the
pointing device are echoed on the screen by movements of the pointer, creating a simple, intuitive way to
navigate a computer's graphical user interface (GUI).
Scanner: The word "scanner" can be used in a number of different ways in the computer world, but here
I am using it to mean a desktop image scanner. Essentially, it's an input device that uses optical technology
to transfer images (or sometimes text) into a computer, where the signal is converted into a digital image.
The digital image can then be edited, emailed, or printed.
Microphone: A microphone captures audio and sends it to the computer, where the audio is converted
to a digital format. Once the audio has been digitized, it can be played back, copied, edited, uploaded, or
emailed. Microphones can be used to record audio, or to relay sounds live as part of a video chat, or audio
stream.
OUTPUT DEVICES
Computer output devices receive information from the computer, and carry data that has been processed by
the computer to the user. Output devices provide data in myriad different forms, some of which include
audio, visual, and hard copy media. The devices are usually used for display, projection, or for physical
reproduction. Monitors and printers are two of the most commonly-known output devices used with a
computer.
Monitor: This is the most common computer output device. It creates a visual display by the use of which
users can view processed data. Monitors come in various sizes and resolutions.
Cathode Ray Tube: This uses phosphorescent dots to generate the pixels that constitute displayed
images.
Flat Panel Screen: This makes use of liquid crystals or plasma to produce output. Light is passed
through the liquid crystals in order to generate pixels. All monitors depend on a video card, which is
positioned either on the computer motherboard or in a special expansion slot. The video card sorts out the
computer data into image details that the monitors can then show.
Types of Printers:
Ink Jet: This kind of printer sprays tiny dots of ink onto a surface to form an image.
Laser: This type utilizes toner drums that roll through magnetized pigment, and then transfers the pigment
onto a surface.
Dot Matrix: Dot matrix printers utilize a print head to set images on a surface, using an ink ribbon. These
printers were commonly used between 1980.
Speakers: Speakers are attached to computers to facilitate the output of sound; sound cards are required
in the computer for speakers to function. The different kinds of speakers range from simple, two-speaker
output devices right the way up to surround-sound multi-channel units.
Projector: This is a display device that projects a computer-created image onto another surface: usually
some sort of whiteboard or wall. The computer transmits the image data to its video card, which then sends
the video image to the projector.
Plotter: This generates a hard copy of a digitally depicted design. The design is sent to the plotter through
a graphics card, and the design is formed by using a pen. It is generally used with engineering applications,
and essentially draws a given image using a series of straight lines.
Sometimes things do not work exactly as planned at this point. Sometimes the system will not power on
at all. Sometimes it will power on, but you get no video. Sometimes you will get beep codes. Sometimes
you hear the fans, but the rest of the PC just sits there and does nothing. If things didn't go according to
plan, troubleshoot the system. Walk mentally through the boot process and check all hardware as it
goes. Think like the computer thinks, if you know what I mean. Here is a list of some of the more
common problems.
1. The power does not even turn on. This sometimes happens on ATX machines and it usuallytracks
down to the fact that the power switch is not properly connected to the motherboard or it is not
connected at all. Find the power switch lead and make sure it is connected to the motherboard, as
described in Step 11. It’s a possibility that simply reversing the lead will do the trick. If this is the not the
case, then make sure the motherboard is not grounded somehow. Make sure that the board is not
touching the case (this is what the spacers are for). Make sure that none of the screws that hold the board
in place is touching anything metal or any of the electrical pathways on the motherboard. If you have any
doubt on this, you can remove each screw one at a time and place a washer on them. You do not need to
remove the motherboard to do this.
2. The PC boots, but it is giving beep codes. This is actually better than having to track everything
down on your own, because at least the PC is giving you a hint as to what is wrong. You can also use
the PC Mechanic Beep Codes E-book available on the PC Mechanic CD to track it down for other
BIOS versions. Often, these beep codes will not tell you exactly what the problem is, but will point you
at the trouble device. This information will then get you pointed in the correct direction.
3. The fans come on, but you get no video or beeps. Sometimes, this is because some key component
may not be plugged in well or may not be operational. Check the memory modules and the processor to
be sure they are firmly installed. You might want to make sure the processor is actually working. One
way that I have used to see if a processor is working is to remove or unplug the CPU fan and place your
fingers on the CPU to see if it heats up real fast. If it does, its OK and don’t let it run this way for long.
If it remains at room temperature for awhile, then there is no juice going through the processor and it
may need replacing. The keyboard doesn’t seem to work. This one doesn’t happen too often, but if it
does, your two trouble sources will be the keyboard itself or the keyboard controller on the
motherboard. Hope it isn’t the second one.
Software Troubleshooting:
What Is BIOS?
BIOS is an acronym for Basic Input Output System.
Why BIOS?
To run any system, there must be default settings so that the system can load those settings when it is
started or restarted. For a computer system the basic I/O settings and boot process details are
necessary to start a system.
Whenever we start the system, we can enter into the BIOS Setup Utility by pressing Del Key.
Sometimes an F1 or F8 key has to be instead of DEL key, depending on the type of BIOS.
When we enter in to this utility we get these following menus/services, depending upon our
mother board. In main Menu, we can view the details such as BIOS Version, Processor Type, and
Speed, RAM Size and the system bus speed and memory speed.
We can change the settings like language system time and date. We can even change the hyper
threading facility if the processor supports this technology.
We must be very careful when we change these settings otherwise it may cause our system
to malfunction.
Here, we can change the settings of PCI devices, Floppy Drives configuration and chipset, USB
peripheral devices and even monitoring the Hardware. Security
We can set the supervisor password, to restrict unauthorized users to enter the BIOS setup
utility. User password can also be set to restrict the unauthorized persons to boot or use the
system.
What is a Password?
We can even set the Chassis Intrusion to protect the system devices from removing the components of
the system.
Power
The power settings protect the system from power failures by configuring the ACPI.
For example, after power failure we can stay off the system or Power on the system or else we can even
make the system to restore its previous state by selecting the appropriate options.
Boot
Silent boot : If this option is enabled it displays only the OEM logo and in the background
POST(Power on Self Test) completes. If this is disabled, instead of LOGO, we can view POST
messages
Rapid BIOS Boot: By enabling this option it will decrease the time needed to boot the by skipping
some unnecessary tests.
Here, we can also set the boot sequence from the available devices by selecting Boot Device Priority.
We can even view the Hard Drives and any removable devices and attached to the system.
Exit
By selecting the appropriate options we can exit from the BIOS setup like exiting the setup by saving
or discarding the changes or even by loading optimal or default values.
• The RAPTOR development environment minimizes the amount of syntax you must learn to write
correct program instructions.
• The RAPTOR development environment is visual. RAPTOR programs are diagrams (directed
graphs) that can be executed one symbol at a time. This will help you follow the flow of instruction
execution in RAPTOR programs.
• RAPTOR is designed for ease of use. (You might have to take our word for this, but other
programming development environments are extremely complex.)
• RAPTOR error messages are designed to be more readily understandable by beginning
programmers.
• Our goal is to teach you how to design and execute algorithms. These objectives do not require a
heavy-weight commercial programming language such as C++ or Java.
RAPTOR has six (6) basic symbols, where each symbol represents a unique type of
instruction. The basic symbols are shown at the right. The top four statement types,
Assignment, Call, Input, and Output, are explained in this reading, The bottom two
types, Selection and Loops, will be explained in a future reading.
• INPUT – get the data values that are needed to accomplish the task.
• PROCESSING – manipulate the data values to accomplish the task.
• OUTPUT – display (or save) the values which provide a solution to the task.
The common thread among these four instructions is that they all do something to variables! To
understand how to develop algorithms into working computer programs, you must understand the concept
of a variable. Please study the next section carefully!
RAPTOR Variables
Variables are computer memory locations that hold a data value. At any given time a variable can only
hold a single value. However, the value of a variable can vary (change) as a program executes. That's why
we call them "variables"! As an example, study the following table that traces the value of a variable
called X.
All variables should be given meaningful and descriptive names by the programmer. Variable names
should relate to the purpose the variable serves in your program. A variable name must start with a letter
and can contain only letters, numerical digits, and underscores (but no spaces or other special characters).
If a variable name contains multiple "words," the name is more "readable" if each word is separated by an
underscore character. The table below shows some examples of good, poor, and illegal variable names.
es descriptive)
mpg
IMPORTANT: If you give each value in a program a meaningful, descriptive variable name, it will help
you think more clearly about the problem you are solving and it will help you find errors in your program.
One way of understanding the purpose of variables is to think of them as a means to communicate
information between one part of a program and another. By using the same variable name in different
parts of your program you are using the value that is stored at that location in different parts of your
program. Think of the variable as a place holder or storage area for values between each use in your
program computations.
When a RAPTOR program begins execution, no variables exist. The first time RAPTOR encounters a
new variable name, it automatically creates a new memory location and associates this variable name
with the new memory. The variable will exist from that point in the program execution until the program
terminates. When a new variable is created, its initial value determines whether the variable will store
numerical data or textual data. This is called the variable's data type. A variable's data type cannot change
during the execution of a program. In summary, variables are automatically created by RAPTOR and can
hold either:
1) The variable has not been given a value. 2) The variable name was misspelled.
This error will occur if your statements attempt to change the data type of a variable.
RAPTOR Statements/Symbols
The following four sections provide details about each of the four basic statements: Input, Assignment,
Call, and Output.
Input Statement/Symbol
An input statement/symbol allows the user of a program to
enter a data value into a program variable during program
execution. It is important that a user know exactly what type
of value is expected for input. Therefore, when you define an
input statement you specify a string of text that will be the
prompt that describes the required input. The prompt should
be as explicit as possible. If the expected value needs to be
in particular units (e.g., feet, meters, or miles) you should
mention the units in the prompt.
Assignment Statement/Symbol
Variable ← Expression
Expressions
The expression (or computation) of an assignment statement can be any simple or complex equation that
computes a single value. An expression is a combination of values (either constants or variables) and
operators. Please carefully study the following rules for constructing valid expressions.
x ← (3+9)/3 x ← 3+(9/3)
In the first case, the variable x is assigned a value of 4, whereas in the second case, the variable x is
assigned the value of 6. As you can see from these examples, you can always explicitly control the order
in which operations are performed by grouping values and operators in parenthesis. The exact "order of
precedence" is
An operator or function directs the computer to perform some computation on data. Operators are placed
between the data being operated on (e.g. X/3) whereas functions use parentheses to indicate the data they
are operating on (e.g. sqrt(4.7) ). When executed, operators and functions perform their computation and
return their result. The following lists summarize the built-in operators and functions of RAPTOR.
basic math: +, -, *, /, ^, **, rem, mod, sqrt, log, abs, ceiling, floor
The following table briefly describes these built-in operators and functions. Full details concerning these
operators and functions can be found in the RAPTOR help screens.
+ Addition 3+4 is 7
- subtraction 3-4 is -1
- Negation -3 is a negative 3
* multiplication 3*4 is 12
The result of evaluating of an expression in an assignment statement must be either a single number or a
single string of text. Most of your expressions will compute numbers, but you can also perform simple
text manipulation by using a plus sign (+) to join two or more strings of text into a single string. You can
also join numerical values with strings to create a single string. The following example assignment
statements demonstrate string manipulation.
RAPTOR defines several symbols that represent commonly used constants. You should use these
constant symbols when you need their corresponding values in computations.
pi is defined to be 3.14159274101257.
e is defined to be 2.71828174591064
When a procedure call is displayed in your RAPTOR program you can see the
procedure's name and the argument values that will be sent to the procedure
when it is called. For example, when the first procedure call on the right is
executed it will draw a red line from the point (1,1) to the point (100,200). The
second procedure call will also draw a line, but since the arguments are
variables, the exact location of the line will not be known until the program executes and all the argument
variables have a value
RAPTOR defines too many built-in procedures to describe them all here. You can find documentation on
all built-in procedures in RAPTOR's help screens. In addition, your instructor will introduce relevant
procedures as we tackle various problem solving tasks in the coming lessons.
Output Statement/Symbol
In RAPTOR, an output statement displays a value to the Master Console window when it is executed.
When you define an output statement, the "Enter Output" dialog box asks you to specify three things:
You can display multiple values with a single output statement by using the "Output Expression" option
and building a string of text using the string plus (+) operator. When you build a single string from two or
more values, you must distinguish the text from the values to be calculated by enclosing any text in quote
marks ("). In such cases, the quote marks are not displayed in the output window. For example, the
expression,
Notice that the quote marks are not displayed on the output device. The quote marks are used to surround
any text that is not part of an expression to be evaluated.Your instructor (or a homework assignment) will
often say “Display the results in a user-friendly manner”. This means you should display some
explanatory text explaining any numbers that are output to the MasterConsole window. An example of
"non-user-friendly output" and "user-friendly output" is shown below.
• Programmer header – documents who wrote the program, when it was written, and a general
description of what the program does. (Add to the "Start" symbol)
• Section description – mark major sections of your program to make it easier for a programmer to
understand the overall program structure.
• Logic description – explain non-standard logic.
Typically you should not comment every statement in a program. An example program that includes
comments is shown below.
Document Structure: The \documentclass command must appear at the start of every
LATEXdocument. The text in the curly brackets species the document class. Thearticle document class is
suitable for shorter documents such as journal articles and short reports.
The \begin{document} and \end{document} commands enclose the text and commands that make up the
document. Anything typed before \begin{document} is known as the preamble, and will affect the whole
document. Anything typed after \end{document} is ignored.
\documentclass[a4paper,12pt]{article}
\begin{document}
A sentence of text.
\end{document}
Creating a Title: The \maketitle command creates a title. Need to specify the title of the document. If
the date is not specified today's date is used. Author is optional.
\documentclass[a4paper,12pt]{article}
\begin{document}
\title{My First Document}
\author{My Name}
\date{\today}
\maketitle
\end{document}
\today is a command that inserts today's date. It can also type ina different date, for example \date{November 2013}.
Sections: it should divide the document into chapters (if needed), sections and subsections.
\documentclass[a4paper,12pt]{article}
\begin{document}
\section{Introduction}
This is the introduction.
\section{Methods}
\subsection{Stage 1}
The first part of the methods.
\subsection{Stage 2}
The second part of the methods.
\section{Results}
Here are my results.
\end{document}
Labelling: label any of the sectioning commands so they can be referred to in other parts of the document.
Label the section with \label{labelname}.Then type \ref{labelname} or \pageref{labelname}, when want
torefer to the section or page number of the label.
\documentclass[a4paper,12pt]{article}
\begin{document}
\section{Introduction}
\subsection{Stage 2}
The second part of the methods.
\section{Results}
Here are my results.
\ref{sec1} on page \pageref{sec1}
\end{document}
Table of Contents: The use sectioning commands it is very easy to generate a table of contents. Type
\tableofcontents where want the table of contents to appear in the document.
\documentclass[a4paper,12pt]{article}
\begin{document}
\title{My First Document}
\author{My Name}
\date{\today}
\maketitle
\pagenumbering{roman}
\tableofcontents
\newpage
\pagenumbering{arabic}
\section{Introduction}
This is the introduction.
\section{Methods}
\subsection{Stage 1}
The first part of the methods.
\subsection{Stage 2}
The second part of the methods.
\section{Results}
Here are my results
\end{document}
Typesetting Text
Font Effects: There are LATEX commands for a variety of font effects:
\documentclass[a4paper,12pt]{article}
\begin{document}
Coloured Text: To put coloured text in the document need to use a package. Many packages can be
used with LATEX to enhance its functionality. Packages are included in the preamble (i.e. before the
\begin{document}command). Packages are activated using the \usepackage[options]{package}command,
where package is the name of the package and options is an optionallist of keywords that trigger special
features in the package.
\documentclass[a4paper,12pt]{article}
\usepackage{color}
\begin{document}
{\color{red}Latex}
\\
{\color{blue}Latex}
\\
{\color{green}Latex}
\\
{\color{yellow}Latex}
\\
{\color{magenta}Latex}
\end{document}
Font Sizes:
There are LATEX commands for a range of font sizes:
\documentclass[a4paper,12pt]{article}
\begin{document}
{\tiny tiny words} tiny words
\\
{\scriptsizescriptsize words} scriptsize words
\\
{\footnotesizefootnotesize words} footnotesize words
\\
{\small small words} small words
\\
{\normalsizenormalsize words} normalsize words
\\
{\large large words} large words
\\
{\Large Large words} Large words
\\
{\LARGE LARGE words} LARGE words
\\
{\huge huge words} huge words
\end{document}
\documentclass[a4paper,12pt]{article}
\begin{document}
\begin{enumerate}
\item First thing
\item Second thing
\begin{itemize}
\item A sub-thing
\item Another sub-thing
\end{itemize}
\item Third thing
\end{enumerate}
\end{document}
Tables:
\documentclass[a4paper,12pt]{article}
\begin{document}
\begin{tabular}{ |p{3cm}||p{3cm}|p{3cm}|p{3cm}| }
\hline
\multicolumn{4}{|c|}{Country List} \\
\hline
Country Name or Area Name& ISO ALPHA 2 Code &ISO ALPHA 3 Code&ISO numeric Code\\
\hline
Afghanistan & AF &AFG& 004\\
Aland Islands& AX & ALA &248\\
Albania &AL & ALB& 008\\
Algeria &DZ & DZA& 012\\
American Samoa& AS & ASM&016\\
Andorra& AD & AND &020\\
Angola& AO & AGO&024\\
\hline
\end{tabular}
\end{document}
Figures: To insert an image in to the LATEX document,which requires the graphicx package. Images
should be PDF, PNG, JPEGor GIF files.
\documentclass[a4paper,12pt]{article}
\usepackage{graphicx}
\graphicspath{ {./images/} }
\begin{document}
The universe is immense and it seems to be homogeneous,
in a large scale, everywhere we look at.
\includegraphics{universe}
\documentclass[a4paper,12pt]{article}
\usepackage{amsmath}
\begin{document}
\begin{equation*}
1+2=3
\end{equation*}
\begin{align*}
f(x) &= x^2\\
g(x) &= \frac{1}{x}\\
F(x) &= \int^a_b \frac{1}{3}x^3
\end{align*}
\begin{matrix}
1 & 0\\
0&1
\end{matrix}
\end{document}
Inserting References: LATEX includes features that allows to easily cite references and
createbibliographies in the document.
\documentclass[a4paper,12pt]{article}
\begin{document}
\begin{thebibliography}{9}
\bibitem{latexcompanion}
Michel Goossens, Frank Mittelbach, and Alexander Samarin.
\textit{The \LaTeX\ Companion}.
Addison-Wesley, Reading, Massachusetts, 1993.
\bibitem{einstein}
Albert Einstein.
\textit{ZurElektrodynamikbewegter K{\"o}rper}. (German)
[\textit{On the electrodynamics of moving bodies}].
Annalen der Physik, 322(10):891–921, 1905.
\bibitem{knuthwebsite}
Knuth: Computers and Typesetting,
\\\texttt{http://www-cs-faculty.stanford.edu/\~{}uno/abcde.html}
\end{thebibliography}
\end{document}
Microsoft Word
Microsoft Word is a word processing software package. can use it to type letters, reports, and other
documents. In Word 2007, how a window displays depends on the size of itr window, the size of Itr
monitor and the resolution to which itr monitor is set. Resolution determines how much information itr
computer monitor can display.
Starting MS-Word:
Quick Access toolbar: The Quick Access toolbar provides it with access to commands it frequently
use. By default Save, Undo, and Redo appear on the Quick Access toolbar. It can use Save sitr file,
Undo to rollback an action it have taken, and Redo to reapply an action it have rolled back.
Ribbon: Use the Ribbon to issue commands. The Ribbon is located near the top of the screen, below the
Quick Access toolbar. At the top of the Ribbon are several tabs; clicking a tab displays several
related command groups. Within each group are related command buttons. It click buttons to issue
commands or to access menus and dialog boxes.
Ruler: Use the ruler to change the format of itr document quickly
Text area: Type document in the text area. The blinking vertical line in the upper-left corner of the
text area is the cursor.
Status bar: The Status bar appears at the very bottom of window and provides such information as the
current page and the number of words in itr document
Using Latex and Word to create project certificate. Features to be covered:-Formatting Fonts in word,
Drop Cap in word, Applying Text effects, Using Character Spacing, Borders and Colors, Inserting
Header and Footer, Using Date and Time option in both LaTeX and Word
Font:The font formatting options that it can configure on the Font tab in the Font dialog box influence
the appearance of the individual characters in itr text
A drop cap is a specially formatted letter that appears at the beginning of a paragraph. Word 2007 offers
two styles of drop caps. The first, and more common, begins the paragraph with a large letter that spills
down into the text. Thus, the drop cap displaces the first few lines of the paragraph. The second style
places the large first letter in the margin adjacent to the paragraph.
Header & Footer: On the Insert tab, in the Header & Footer group, click Header or Footer.
To return to the body of itr document, click Close Header and Footer on the Design tab (under Header
& Footer Tools).
The Office Button is the round icon at the top left-hand corner. It
includes the basic File Functions from the older version of Office
Ribbon
• The image to the right shows the window tha appears when
it hold the mouse over the Cut Tool icon
Take some time to explore the Ribbon Tabs and Tool Groups
and learn where to find the Tools it use most frequently.
1. In the Computing Facilities, files on the Desktop are NOT SAVED when it log off.
• ALWAYS use Save As... to save itr file to a USB Flash Drive, UVicTemp, or CD
• It can also save a file to the Desktop and then send an email to itrself with the file as an
attachment
3. If it have Office 2000 or 2003 or it use a Mac at home or in the Computing Facilities
• It will have to save itr document as an older version
• Go to MS Office Button >>Save As
At the bottom, there is a bar that asks it to “Save as Type:”
Choose the format for the older version (ex. “Word 97-2003 Document (*.doc)” )
• DO NOT CHOOSE the 2007 format: “Word Document (*.docx)” “Excel Document
(*.xlsx)” or “Power PointDocument (*.pptx)
• To Create a New Document: Click the Office Button, select New, and click Create, or press <Ctrl>+
<N>.
• To Open a Document: Click the Office Button and select Open, or press <Ctrl>+ <O>.
• To Save a Document: Click the Save button on the Quick Access Toolbar, or press
<Ctrl>+ <S>.
• To Save a Document with a Different Name: Click the Office Button, select Save As, and enter a
new name for the document.
• To Preview a Document: Click the Office Button, point to the Print list arrow, and select Print
Preview.
• To Print a Document: Click the Office Button and select Print, or press <Ctrl>+ <P>.
• To Undo: Click the Undo button on the Quick Access Toolbar or press <Ctrl>+ <Z>.
• To Get Help: Press <F1>to open the Help window. Type itr question and press <Enter>.
• To Exit Word: Click the Office Button and click Exit Word.
• To Cut or Copy Text: Select the text it want to cut or copy and click the Cut or Copy button
in the Clipboard group on the Home tab.
• To Paste Text: Place the insertion point where it want to paste and click the Paste button in the
Clipboard group on the Home tab.
• To Copy Formatting with the Format Painter: Select the text with the formatting it want to copy and
click the Format Painter button in the Clipboard group on the Home tab. Then, select the text it
want to apply the copied formatting to.
• To Change Paragraph Alignment: Select the paragraph(s) and click the appropriate alignment button
( Align Left, Center, Align Right, or Justify) in the Paragraph group on the Home tab.
• To Indent a Paragraph: Click the Increase Indent button in the Paragraph group on the Home
tab.
• To Decrease an Indent: Click the Decrease Indent button in the Paragraph group on the Home
tab.
• To Add a Tab Stop: Click the Tab alignment box on the Ruler until it see the type of tab it want to
insert. Then, click on the Ruler where it want to insert the tab stop.
• To Adjust or Remove a Tab Stop: Click and drag the tab stop to the desired position on the Ruler.
Click and drag the tab stop off the Ruler to remove it.
• To Change Paragraph Line Spacing: Click the Line Spacing button in the Paragraph group on
the Home tab and select an option from the list.
• To Create a Bulleted or Numbered List: Select the paragraphs it want to bullet or number and click
the Bullets or Numbering button in the Paragraph group on the Home tab.
• To Change a Document’s Margins: Click the Page Laitt tab on the Ribbon, click the Margins button
in the Page Setup group, and select a setting.
• To Change Page Orientation: Click the Page Laitt tab on the Ribbon, click the Orientation button,
and select an option from the list.
• To Insert a Header or Footer: Click the Insert tab on the Ribbon and click the Header or Footer
button in the Header & Footer group.
• To Insert a Manual Page Break: Click the Insert tab on the Ribbon and click the Page Break button
in the Page Setup group.
• To Insert a Section Break: Click the Page Laitt tab on the Ribbon, click the Breaks button in the
Page Setup group, and select the type of break it want to insert.
• To Correct a Spelling Error: Right-click the error and select a correction from the contextual menu.
Or, press <F7>to run the Spell Checker.
• To Find Text: Click the Find button in the Editing group on the Home tab.
• To Replace Text: Click the Replace button in the Editing group on the Home tab.
Hyperlink: It is a colored and underlined text or a graphic that it click to go to a file, a location in a
file , HTML page on the world wide b, or an HTML page in an internet.
Creation of a table:
Word Art:
• PowerPoint is a application used for the creation of presentations. These presentations are laid out in a
"storyboard" type fashion, where individual slides are created and formatted with text and images.
Power Point presentations are widely used in classrooms as note outlines for teachers, and for project
presentations by students.
• The point of the slides in PowerPoint presentations is NOT to fit as much detailed information as it can
onto a single slide. Rather, each slide should contain elements that briefly sum up the major idea(s) of
what it will be presenting for the duration of the slide. The style in which it create slides is completely
up to it.
• The main thing to keep in mind, ho ver, is that an audience will be viewing this material; it must be
large enough to read, yet not so large that it takes up far too much of the screen to include relevant
information. All Writing Program computer classrooms come equipped with PowerPoint already
installed on the computers.
• It is best to outline itr entire presentation before working too much on the style and laitt of itr
presentation. When left to the end it is much less time consuming to work on the style and format of itr
slides. Keep in mind the content of itr presentation is the most important part of it!
• Keep it points short and straightforward. Points should be complimentary to itr oral presentation.
• PowerPoint allows it to add a lot of distracting sounds and excessive animations to itr presentation. It
is best to keep all animation as simple as possible and only use sounds if absolutely necessary.
• Stay away from unusual fonts. If it are presenting on an unfamiliar computer the font it have chosen
may not work. Arial and Times New Roman are common fonts.
• Think of contrast. If it use a dark background use light-colored text and vice versa.
• Refrain from using backgrounds that will obscure itr text colour.
• The MS Office Button contains the main file functions New, Open, Save, Save as, Print, Print Preview,
etc.
• The Quick Access Toolbar contains shortcuts to Save, Undo, and Repeat
• Each Ribbon Tab displays a Ribbon that provides a set of Tool Groups.
• The Ribbon Tab and the Tool Groups in the Ribbon correspond to the Menu and Toolbar in Word 2000
and 2003
• The Name of each Tool Group is listed at the bottom of the Group
Example - In the Home Tab, the third Tool Group is named Font
• The name "Font" is under the Font Tool Group
• To change the Tool Groups being displayed in the Ribbon
• Click on the appropriate Ribbon Tab
• Example - The Home Tab contains Tool Groups for the most commonly used Tools Clipboard, Font,
Paragraph, and Style tools in Word
Add a new slide Home Tab >> Slides >> New Slide
• Click on New Slide button. It adds a new slide in
the default laitt "Titleand Content.”
• Click on the arrow at the bottom corner of the
New Slide button. It can select the slide laitt from
the Default Design pallet.
• Click Laitt button. It can select and change the
slide laitt.
• Click Delete button to delete the current slides.
Finishing Steps
Change the order of View Tab >> Presentation Views >> Slide Sorter
the slides • It can easily change the order, if it have a lot of
slides.Or, select Slides tab in the left frame in the
Normal View. It can see thumbnails of the slides in itr
presentation.
• Click on a slide thumbnail and drag up and down to
change the order.
Make notes Write itr notes in the bottom frame in Normal view.
To Print itr notes:
• Office Button >> Print >> Print What:
• Select "Note Pages" NOTE: Notes are not visible
during the slide show
Manual Presentation:
Present the slide View Tab >> Presentation Views >> Slide Show
show • To move to the next slide in itr presentation do one of
the following:
• Click the left mouse button
• Hit the spacebar
• se the arrow keys on the keyboard. Up and left go
back, right and down go forward.
• Click on the Esc key on keyboard to go back to
Normal view.
• Automatic Presentation:
• Animations Tab>> Transition to this Slide >>
Advance Slide
• Click on the check box for "Automatically After."
• Set the time to automatically change to the next slide
after a certain duration of time.
• This feature is useful if it are under a time constraint
or if it want to present in a more movie-like style.
Home Tab
ICONS DESCRIPTIONS
Clipboard
Pastes the contents of the clipboard in the cursor’s current location
Places the currently selected item on the clipboard, it will be removed from its
current location once it is pasted in a new location
Fonts
Font
Font size
Increase font size
Decrease font size
Bold
Italics
Underline (the arrow will give you line options)
Apply the last used border (the arrow will give you border
options)
Apply the last used cell color (the arrow will give you color
options)
Apply the last used font color (the arrow will give you color
options)
More font options
Data Tab
Review Tab
View Tab
• Runs:: H12=H59+J15
• Wickets:: I12=COUNT(M48:M58)
• OversPlayed:: J12=COUNT(B71:B80,D71:D80,F71:F80,H71:H80,J71:J80)
• No Balls:: H15=SUM(J63:J67)
• Wide Balls:: I15=SUM(I63:I67)
• Extra Runs:: J15=SUM(H15:I15)
The Graphs in the above tables are based on the no. of runs per over.
Installing LINUX:
Step 1: Write the downloaded ISO file into USB drive or in DVD and boot your system with USB Drive /
DVD & will get below welcome Screen.
Step 3: Prepare to Install Ubuntu, make sure your system has enough free space (at least 6.4 GB),
connected to Internet & power source Click on Continue
Step 4: Installation Type: You can select default option, in which data on disk will be erased, if you want
your customize partition table, then select ‘Something else’ option. If you want encrypt the drive, then
select ‘Encrypt the new Ubuntu installation for security‘.
Click on Continue
Click on Continue
Step 10: After the installation is completed, it will ask you to reboot the Machine.
Step 11: Login prompt after installation – Use same credentials that you have set during installation
/home/Raghu }
2. cal
Displays the calendar of the current month.
{ $cal
July 2012
Su Mo Tu We Th Fr Sa
1234567
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 }
‘cal ’ will display calendar for the specified month and year.
{ $cal 08 1991
August 1991
Su Mo Tu We Th Fr Sa
123
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31 }
3. clear
4. echo
This command will echo whatever provide it.
{ $ echo "linoxide.com"
linoxide.com }
The ‘echo’ command is used to display the values of a variable. One such variable is ‘HOME’. To check
the value of a variable precede the variable with a $ sign.
{ $ echo $HOME/home/Raghu }
5. date
Displays current time and date.
{ $ date
Fri Jul 6 01:07:09 IST 2012 }
If interested only in time, can use 'date +%T' (in hh:mm:ss):
{ $ date +%T
01:13:14 }
6. tty
Displays current terminal.
{ $tty
/dev/pts/0 }
7. whoami
This command reveals the user who is currently logged in.
{ $whoami
Raghu }
8. id
This command prints user and groups (UID and GID) of the current user.
{ $ id
uid=1000(raghu) gid=1000(raghu)
groups=1000(raghu),4(adm),20(dialout),24(cdrom),46(plugdev),112(lpadmin),120(admin),122(sambas
hare) }
By default, information about the current user is displayed. If another username is provided as an
argument, information about that user will be printed:
2. whatis
This command gives a one line description about the command. It can be used as a quick reference for
any command.
{$ whatis date
date (1) - print or set the system date and time }
{ $whatiswhatis
whatis (1) - display manual page descriptions }
3. man
‘--help’ option and ‘whatis’ command do not provide thorough information about the command. For more
detailed information, Linux provides man pages and info pages. To see a command's manual page, man
command is used.
{ $ man date }
The man pages are properly documented pages. They have following sections:
NAME: The name and one line description of the command.
SYNOPSIS: The command syntax.
$ pwd
/usr/share
$ cd doc
$ pwd
/usr/share/doc }
In the first ‘cd’ command, absolute path (/usr/share) is used, and with second command, relative path
(doc) is used.
If a directory is given as an argument, files and directories in that directory are shown.
{ $ ls /usr
{ $ ls -l
total 4
drwxr-xr-x 2 raghuraghu 4096 2012-07-06 12:52 example
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file1.txt
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file2.txt
-rw-r--r-- 1 raghuraghu 0 2012-07-06 12:52 file3.txt }
In this long listing, the first character is 'd' or '-'. It distinguishes between file types. The entries with a '-'
(dash) are regular files, and ones with 'd' are directories. The next 9 characters are permissions ('rwxr-xr-x'
in first listing). The number following the permissions is the link count. Link count follows user and group
owner. In the above example, the file owner is 'raghu' and group owner is 'raghu' as well. Next is the size
of the file. And then time stamp before the name of file (or directory).
By default, hidden files or directories are not shown, to see hidden files as well, -a option is used. Hidden
files in Linux start with a period sign (.). Any file that starts with a period is hidden. So, to hide a file, just
need to rename it (and put a period before it).
{ $ ls -la odesk
total 16
drwxr-xr-x 4 raghuraghu 4096 2012-07-06 13:46 .
drwxr-xr-x 11 raghuraghu 4096 2012-07-06 13:15 ..
If want to see the properties of a directory instead of the files contained in it, use -d (with -l) option:
{ $ ls -ldodesk/
drwxr-xr-x 4 raghuraghu 4096 2012-07-06 13:46 odesk/ }
Command:
{ $date
Output:
Tue Oct 10 22:55:01 PDT 2017 }
Note : Here unix system is configured in pacific daylight time.
3. –date or -d option: Displays the given date string in the format of date. But this will not affect the
system’s actual date and time value.Rather it uses the date and time given in the form of string.
Syntax:
{ $date --date=" string " }
Command:
{ $date --date="2/02/2010"
$date --date="Feb 2 2010" }
Output:
{ Tue Feb 2 00:00:00 PST 2010
Tue Feb 2 00:00:00 PST 2010 }
4. Using –date option for displaying past dates: Date and time of 2 years ago.
Command:
{ $date --date="2 year ago" }
Command:
{ $date --date="5 sec ago" }
Output:
{ Tue Oct 10 23:45:02 PDT 2017 }
*Date and time of previous day.
Command:
{ $date --date="yesterday" }
Output:
{ Mon Oct 9 23:48:00 PDT 2017 }
*Date and time of 2 months ago.
Command:
Output:
{ Thu Aug 10 23:54:51 PDT 2017 }
*Date and time of 10 days ago.
Command:
{ $date --date="10 day ago" }
Output: { Sat Sep 30 23:56:55 PDT 2017 }
5. Using –date option for displaying future date: Date and time of upcoming particular week
day.
Command:
{ $date --date="next tue" }
Output:
{ Tue Oct 17 00:00:00 PDT 2017 }
*Date and time after two days.
Command:
{ $date --date="2 day" }
Output:
{ Fri Oct 13 00:05:52 PDT 2017 }
Command:
{ $date --date="tomorrow" }
Output:
{ Thu Oct 12 00:08:47 PDT 2017 }
*Date and time after 1 year on the current day.
Command:
{ $date --date="1 year" }
Output:
{ Thu Oct 11 00:11:38 PDT 2018 }
6. -s or –set option: To set the system date and time -s or –set option is used.
Syntax:
{ $date --set="date to be set" }
Command:
{ $date }
Output:
{ Wed Oct 11 15:23:26 PDT 2017 }
Command:
{ $date --set="Tue Nov 13 15:23:34 PDT 2018"
$date }
Output:
{ Tue Nov 13 15:23:34 PDT 2018 }
7. –file or -f option: This is used to display the date string present at each line of file in the date and
time format.This option is similar to –date option but the only difference is that in –date we can only
give one date string but in a file we can give multiple date strings at each line.
Syntax:
{ $date --file=file.txt
$cat >>datefile
Sep 23 2018
Nov 03 2019 }
Command:
{ $date --file=datefile
Output:
Ramachandra College of Engineering
Date Page no
:……………………… :…………
……
Sun Sep 23 00:00:00 PDT 2018
Sun Nov 3 00:00:00 PDT 2019 }
Syntax:
{ $date +%[format-option] }
Examples:
Command:
{ $date "+%D" }
Command:
{ $date "+%D %T" }
Output:
{ 10/11/17 16:13:27 }
Command:
{ $date "+%Y-%m-%d" }
Output:
{ 2017-10-11 }
Command:
{ $date "+%Y/%m/%d" }
Output:
{ 2017/10/11 }
Command:
{ $date "+%A %B %d %T %y" }
Output:
{ Thursday October 07:54:29 17 }
2. sed
sed is a powerful stream editor for filtering and transforming text. We’ve already written a two useful
articles on sed, that can go through it here:
How to use GNU ‘sed’ Command to Create, Edit, and Manipulate files in Linux
15 Useful ‘sed’ Command Tips and Tricks for Daily Linux System Administration Tasks
The sed man page has added control options and instructions:
{ $ man sed }
$ fgrep = grep -F
$ rgrep = grep -r }
Below are some basic grep commands:
{ tecmint@TecMint ~ $ grep "aaronkilik" /etc/passwd
aaronkilik:x:1001:1001::/home/aaronkilik:
tecmint@TecMint ~ $ cat /etc/passwd | grep "aronkilik"
aaronkilik:x:1001:1001::/home/aaronkilik: }
4. head
head is used to display the first parts of a file, it outputs the first 10 lines by default. can use the -n num
flag to specify the number of lines to be displayed:
{ tecmint@TecMint ~ $ head /var/log/auth.log
Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session closed for user root
Jan 2 10:51:34 TecMintsudo: tecmint : TTY=unknown ; PWD=/home/tecmint ; USER=root ;
COMMAND=/usr/lib/linuxmint/mintUpdate/checkAPT.py
Jan 2 10:51:34 TecMintsudo: pam_unix(sudo:session): session opened for user root by (uid=0)
Jan 2 10:55:01 TecMint CRON[4099]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 2 10:55:01 TecMint CRON[4099]: pam_unix(cron:session): session closed for user root
Jan 2 11:05:01 TecMint CRON[4138]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 2 11:05:01 TecMint CRON[4138]: pam_unix(cron:session): session closed for user root
Jan 2 11:09:01 TecMint CRON[4146]: pam_unix(cron:session): session opened for user root by (uid=0)
}
{ tecmint@TecMint ~ $ head -n 5 /var/log/auth.log
Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session opened for user root by (uid=0)
Jan 2 10:45:01 TecMint CRON[3383]: pam_unix(cron:session): session closed for user root
5. tail :tail outputs the last parts (10 lines by default) of a file. Use the -n num switch to specify the
number of lines to be displayed.
The command below will output the last 5 lines of the specified file:
{ tecmint@TecMint ~ $ tail -n 5 /var/log/auth.log
Jan 6 13:01:27 TecMintsshd[1269]: Server listening on 0.0.0.0 port 22.
Jan 6 13:01:27 TecMintsshd[1269]: Server listening on :: port 22.
Jan 6 13:01:27 TecMintsshd[1269]: Received SIGHUP; restarting.
6. sort
sort is used to sort lines of a text file or from standard input.
Below is the content of a file named domains.list:
{ tecmint@TecMint ~ $ cat domains.list
tecmint.com
tecmint.com
linuxsay.com
linuxsay.com
news.tecmint.com
news.tecmint.com
tecmint.com
tecmint.com
windowsmint.com
windowsmint.com }
7. uniq
uniq command is used to report or omit repeated lines, it filters lines from standard input and writes the
outcome to standard output.
After running sort on an input stream, can remove repeated lines with uniq as in the example below.
To indicate the number of occurrences of a line, use the -c option and ignore differences in case
{ tecmint@TecMint ~ $ cat domains.list
tecmint.com
tecmint.com
news.tecmint.com
news.tecmint.com
linuxsay.com
linuxsay.com
windowsmint.com }
tecmint@TecMint ~ $ sort domains.list | uniq -c
2 linuxsay.com
2 news.tecmint.com
8. fmt
fmt simple optimal text formatter, it reformats paragraphs in specified file and prints results to the
standard output.
The following is the content extracted from the file domain-list.txt:
1.tecmint.com 2.news.tecmint.com 3.linuxsay.com 4.windowsmint.com
To reformat the above content to a standard list, run the following command with -w switch is used to
define the maximum line width:
{ tecmint@TecMint ~ $ cat domain-list.txt
1.tecmint.com 2.news.tecmint.com 3.linuxsay.com 4.windowsmint.com
tecmint@TecMint ~ $ fmt -w 1 domain-list.txt
1.tecmint.com
2.news.tecmint.com
3.linuxsay.com
4.windowsmint.com }
9. pr
pr command converts text files or standard input for printing. For instance on Debian systems, list all
installed packages as follows:
{ $dpkg -l }
To organize the list in pages and columns ready for printing, issue the following command.
{ tecmint@TecMint ~ $ dpkg -l | pr --columns 3 -l 20
2017-01-06 13:19 Page 1
Desired=Unknown/Install ii adduser ii apg
10. tr
This tool translates or deletes characters from standard input and writes results to standard output.
The syntax for using tr is as follows:
{ $ tr options set1 set2 }
Take a look at the examples below, in the first command, set1( [:upper:] ) represents the case of input
characters (all upper case).
Then set2([:lower:]) represents the case in which the resultant characters will be. It’s same thing in the
second example and the escape sequence \n means print output on a new line:
11. more
more command is a useful file perusal filter created basically for certificate viewing. It shows file content
in a page like format, where users can press [Enter] to view more information.
can use it to view large files like so:
--More--NEWS.TECMINT.COM } }
12. less
less is the opposite of more command above but it offers extra features and it’s a little faster with large
files.
Use it in the same way as more:
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x01: 'x87 floating point registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x02: 'SSE registers'
[ 0.000000] x86/fpu: Supporting XSAVE feature 0x04: 'AVX registers'
[ 0.000000] x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format.
[ 0.000000] x86/fpu: Using 'eager' FPU context switches.
[ 0.000000] e820: BIOS-provided physical RAM map:
Compressing files
tar -zcvf {.tgz-file} {files} The GNU tar is archiving tar -zcvf data.tgz *.doc
utility but it can be use to
tar -jcvf{.tbz2-file} {files} compressing large file(s). tar -zcvf pics.tar.gz *.jpg
GNU tar supports both *.png
archive compressing through tar -jcvfdata.tbz2 *.doc
gzip and bzip2. If have
more than 2 files then it is ls –l
recommended to use tar
instead of gzip or bzip2.
Decompressing files
List the contents of an archive/compressed file: Some time just wanted to look at files inside
an archive or compressed file. Then all of the above command supports file list option.
unzip -l {.zip file} List files from a ZIP archive unzip -l mydata.zip
Syntax:
{ apt-get [options] command
or
apt-get [options] install|remove pkg1 [pkg2 ...]
or
apt-get [options] source pkg1 [pkg2 ...] }
update : This command is used to synchronize the package index files from their sources again. need to
perform an update before upgrade or dist-upgrade.
{ apt-get update }
upgrade : This command is used to install the latest versions of the packages currently installed on the
user’s system from the sources enumerated in /etc/apt/sources.list. The installed packages which have new
packages available are retrieved and installed. need to perform an update before the upgrade, so that apt-
get knows that new versions of packages are available.
{ apt-get upgrade }
clean : This command is used to clear out the local repository of retrieved package files. It removes
everything but not the lock file from /var/cache/apt/archives/partial/ and /var/cache/apt/archives/.
{ apt-get clean }
autoremove : Sometimes the packages which are automatically installed to satisfy the dependencies of
other packages, are no longer needed then autoremove command is used to remove these kind of packages.
{ apt-get autoremove }
Options:
–no-install-recommends : By passing this option, the user lets apt-get know not to consider recommended
packages as a dependency to install.
{ apt-get --no-install-recommends [...COMMAND] }
–install-suggests : By passing this option, the user lets apt-get know that it should consider suggested
packages as dependencies to install.
{ apt-get --install-suggests [...COMMAND] }
-d or –download-only : By passing this option, the user specifies that apt-get should only retrieve the
packages, and not unpack or install them.
Ramachandra College of Engineering
Date Page no
:……………………… :…………
……
{ apt-get -d [...COMMAND] }
-f or –fix-broken : By passing this option, the user specifies that apt-get should attempt to correct the
system with broken dependencies in place.
{ apt-get -f [...COMMAND] }
-m or –ignore-missing or –fix-missing : By passing this option, the user specifies that apt-get should
ignore the missing packages ( packages that cannot be retrieved or fail the integrity check ) and handle the
result.
{ apt-get -m [...COMMAND] }
–no-download : By passing this command, the user disables downloading for apt-get. It means that it
should only use the .debs it has already downloaded.
{ apt-get [...COMMAND] }
-q or –quiet : When this option is specified, apt-get produces output which is suitable for logging.
{ apt-get [...COMMAND] }
-s or –simulate or –just-print or –dry-run or –recon or –no-act : This option specifies that no action
should be taken, and perform a simulation of events that would occur based on the current system, but do
not change the system.
{ apt-get -s [...COMMAND] }
-y or –yes or –assume-yes : During the execution of apt-get command, it may sometimes prompt the user
for a yes/no. With this option, it is specified that it should assume ‘yes’ for all prompts, and should run
without any interaction.
{ apt-get -y [...COMMAND] }
–assume-no :With this option, apt-get assumes ‘no’ for all prompts.
Output:
-v or –version : With this option, apt-get displays it’s current version number.
{ apt-get [...COMMAND] }
Output:
Vi editor
The VI editor is the most popular and classic text editor in the Linux family. Below, are some reasons
which make it a widely used editor –
• It is available in almost all Linux Distributions
• It works the same across different platforms and Distributions
• It is user-friendly. Hence, millions of Linux users love it and use it for their editing needs
• Nowadays, there are advanced versions of the vi editor available, and the most popular one is VIM
which is Vi Improved. Some of the other ones are Elvis, Nvi, Nano, and Vile. It is wise to learn vi
because it is feature-rich and offers endless possibilities to edit a file.
• To work on VI editor, need to understand its operation modes. They can be divided into two main
parts.
Command mode
• The vi editor opens in this mode, and it only understands commands
• In this mode, can, move the cursor and cut, copy, paste the text
• This mode also saves the changes have made to the file
• Commands are case sensitive. should use the right letter case.
Insert mode
• This mode is for inserting text in the file.
• can switch to the Insert mode from the command mode by pressing 'i' on the keyboard.
• Once are in Insert mode, any key would be taken as an input for the file on which are currently
working.
Add
content
Vi editor commands:
Note: Should be in the "command mode" to execute these commands. VI editor is case-sensitive type the
commands in the right letter-case.
Keystrokes Action
dd Delete line
C Delete contents of a line after the cursor and insert new text. Press
ESC key to end insertion.
dw Delete word
CW Change word
r Replace character
S Substitute entire line and begin to insert at the beginning of the line
Make sure press the right command otherwise will end up making undesirable changes to the file. Also
enter the insert mode by pressing a, A, o, as required.
Moving within a file: need to be in the command mode to move within a file. The default keys for
navigation are mentioned below else; also use the arrow keys on the keyboard.
keystroke Use
Internet Addresses
• Each computer on the internet has its own address
•E-mail addresses discussed in e-mail classes
• Each document, essay, image, etc. On the WWW has its own address
• To find a web document, follow a link or key in a web address (URL)
• Highlighted words or text in a WWW document
• Moves you to a place within same document, or to a web page elsewhere
• An electronic document stored on a web server
• Uses HTML (Hypertext Markup Language)
• May include text, sound, animation, images
• Usually has links to other Web pages or different parts of the same Web site
• Example: http://www.yahoo.com
Customizing the Web Browser
• LAN Proxy Settings
• Bookmarks
• Search Toolbars
• Pop-up blockers
• Managing Plug-ins
Proxy Server
• A server that sits between a client application, such as a Web browser, and a real server.
• It intercepts all requests to the real server to see if it can fulfill the requests itself. If not, it forwards the
request to the real server.
Specifying Proxy Settings in Internet Explorer
Adding a Favorite
The ping command is a Command Prompt command used to test the abily of the source computer to reach
a specified destination computer. The ping commanfrrdtd is usually used as a simple way to verify that a
computer can communicate over the network wh another computer or network device.
The ping command operates by sending Internet Control Message Protocol (ICMP) Echo Request messages
to the destination computer and waing for a response. How many of those responses are returned, and how
long takes for them to return, are the two major pieces of information that the ping command provides.
For example, it might find that there are no responses when pinging a network printer, only to find out that
the printer is offline and s cable needs replaced. Or maybe need to ping a router to verify that r computer
can connect to , to eliminate AS A possible cause for a networking issue.
The result displayed in the Command Prompt window will look something like this:
The 0% loss reported under Ping statistics for 74.217.1.142 explains that each ICMP Echo Request message
sent to www.google.com was returned. This means that, as far as this network connection goes, can
communicate wh Google's webse just fine.
2. ssh
ssh stands for “Secure Shell”. is a protocol used to securely connect to a remote server/system. ssh is secure
in the sense that transfers the data in encrypted form between the host and the client. transfers inputs from
the client to the host and relays back the output. ssh runs at TCP/IP port 22.
Syntax: sshuser_name@host(IP/Domain_name)
Example: Accessing ubuntu machine via windows10 command prompt using ssh.
ssh command instructs the system to establish an encrypted secure connection wh the host machine.
host refers to the machine which can be a computer or a router that is being accessed. can be an IP address
(e.g. 192.168.1.24) or domain name(e.g. www.domainname.com).
Note: After logging into the host computer, commands will work as if they were wrten directly to the host
terminal. Using a public-private key pair or SSH key pair to login into the remote host is more secure as
compared to using passwords. For generating public-private keys use the command:
Options:
• -1: Forces ssh to use protocol SSH-1 only.
• -2: Forces ssh to use protocol SSH-2 only.
• -4: Allows IPv4 addresses only.
• -6: Allows IPv6 addresses only.
• -A: Authentication agent connection forwarding is enabled.
• -a: Authentication agent connection forwarding is disabled.
• -C: Compresses all data (including stdin, stdout, stderr, and data for forwarded X11 and TCP
connections) for a faster transfer of data.
• -f: Requests ssh to go to background just before command execution.
• -g: Allows remote hosts to connect to local forwarded ports.
• -n: Prevents reading from stdin.
• -p port_number: Port to connect to on the remote host.
• -q: Suppresses all errors and warnings
• -V: Display the version number.
• -v: Verbose mode. echoes everything is doing while establishing a connection. is very useful in
the debugging of connection failures
• -X: Enables X11 forwarding (GUI Forwarding).
• -c cipher_spec: Selects the cipher specification for encrypting the session. Specific cipher algorhm
will be selected only if both the client and the server support .
SSH is significantly more secure than the other protocols such as telnet because of the encryption of the
data. There are three major encryption techniques used by SSH:
Symmetrical encryption: This encryption works on the principle of the generation of a single key for
encrypting as well as decrypting the data. The secret key generated is distributed among the clients and the
hosts for a secure connection. Symmetrical encryption is the most basic encryption and performs best when
data is encrypted and decrypted on a single machine.
Asymmetrical encryption: This encryption is more secure because generates two different keys:
Public and Private key. A public key is distributed to different host machines while the private key is kept
securely on the client machine. A secure connection is established using this public-private key pair.
Hashing: One-way hashing is an authentication technique which ensures that the received data is
unaltered and comes from a genuine sender. A hash function is used to generate a hash code from the
data. is impossible to regenerate the data from the hash value. The hash value is calculated at the sender as
well as the receiver’s end. If the hash values match, the data is authentic.
3. ifconfig
ifconfig (interface configuration) command is used to configure the kernel-resident network interfaces. is
used at the boot time to set up the interfaces as necessary. After that, is usually used when needed during
debugging or when need system tuning. Also, this command is used to assign the IP address and netmask
to an interface or to enable or disable a given interface.
Options: -a : This option is used to display all the interfaces available, even if they are down.Syntax: ifconfig
-a
Output:
Output:
➢ -v : Run the command in verbose mode – log more details about execution.
➢ Syntax:
ifconfig -v
Output:
• up : This option is used to activate the driver for the given interface
Syntax:
ifconfig interface up
• down : This option is used to deactivate the driver for the given interface.
Syntax:
• [-]arp : This option is used to enable/disable the use of ARP protocol on an interface.
Syntax:
ifconfig interface[-]promisc.
• mtuN : The user uses this parameter to set the Maximum Transfer Un(MTU).
Syntax:
ifconfig --help
Output:
4. scp
scp stands for Secure Copy Protocol. is a secure file transfer protocol that copies files to and from hosts.
uses Secure Shell (SSH) to keep the files protected while in trans.
scp is a command line utily, meaning will have to use Terminal (Mac) or Command Prompt (Windows).
Use of scp: Since scp uses SSH, the transferred data will be encrypted. This keeps r information from
being compromised during trans.
scp is operated by wring single commands into the command line, making a good option for repeatedly
updated files.
$ scpsource_file_pathusername@hostname:destination_file_path
-B |Enables batch mode, which keeps scp from asking for passwords.
-p |Maintains the access times, modification times, and modes of the original file.
-q |Enables quiet mode, which prevents the progress meter, diagnostic messages, and warning messages
from appearing.
This is used when a program is giving problems, such as failing or not completing a request.
The verbose output shows all the processes going on in the background, thus allowing to sift through and
find where the program is running into a problem.
$ scpusername@host:/destination/file/path/\{file1.txt,file2.txt} .
The -r stands for “recursive.” This is used when need the application to work as a whole and run through
processes a number of times.
Local to remote:
Remote to local:
The -vrC stand for -v, -r, and -C. This option can speed up transfer time and save bandwidth. Use -C to
enable compression. The files will be decompressed when they reach their destination.
$ scp -vrCusername@host:/destination/file/path
can preserve the file’s access times, modification times, and modes by using -p.
5. netstat
Netstat is a common command line TCP/IP networking utily available in most versions of Windows, Linux,
UNIX and other operating systems. Netstat provides information and statistics about protocols in use and
current TCP/IP network connections. (The name derives from the words network and statistics.)
-b Displays the executable involved in creating each connection or listening port. In some cases well-
known executables host multiple independent components, and in these cases the sequence of components
involved in creating the connection or listening port is displayed. In this case the executable name is in []
at the bottom, on top is the component called, and so forth until TCP/IP was reached. Note that this option
can be time-consuming and will fail unless have sufficient permissions.
-p proto Shows connections for the protocol specified by proto; proto may be any of: TCP, UDP,
TCPv6, or UDPv6. If used wh the -s option to display per-protocol statistics, proto may be any of: IP, IPv6,
ICMP, ICMPv6, TCP, TCPv6, UDP, or UDPv6.
-s Displays per-protocol statistics. By default, statistics are shown for IP, IPv6, ICMP, ICMPv6, TCP,
TCPv6, UDP, and UDPv6; the -p option may be used to specify a subset of the default.
-v When used in conjunction wh -b, will display sequence of components involved in creating the
connection or listening port for all executables.
interval Redisplays selected statistics, pausing interval seconds between each display. Press
CTRL+C to stop redisplaying statistics. If omted, netstat will print the current configuration information
once.
Careful perusal of this information informs the reader that netstat not only documents active TCP and UDP
connections and related port addresses but that can also tie established TCP or UDP connections to the
executable files, runtime components, and process IDs that opened or use them. Netstat can also provide
counts of byteunicast and non-unicast packets, discards, errors, and unknown protocols. Netstat can also
show connections for transport layer protocols for IPv4 and IPv6, display routing table contents, and can
redisplay selected statistics at regular intervals.
Netstat can be a helpful forensic tool when trying to determine what processes and programs are active on
a computer and involved in networked communications. can provide telltale signs of malware compromise
under some circumstances and is a good tool to use to observe what kinds of communications are underway
at any given time.
6. ipstat
Two new commands for observing various types of network traffic on a server are introduced in this release:
ipstat and tcpstat.
The ipstat command is used to gather and report statistics about IP traffic on a server based on the selected
output mode and sort order that is specified in the command syntax. This command enables to observe
network traffic at the IP layer, aggregated on source, destination, higher-layer protocol, and interface. Use
this command when want to observe the amount of traffic between one server and other servers.
The tcpstat command is used to gather and report statistics on TCP and UDP traffic on a server based on
the selected output mode and sort order that is specified in the command syntax. This command enables to
observe network traffic at the transport layer, specifically for TCP and UDP. In addion to the source and
destination IP addresses, can observe the source and destination TCP or UDP ports, the PID of the process
that is sending or receiving the traffic, and the name of the zone in which that process is running.
The following are some of the ways in which can use the tcpstat command:
Note - The previous list is not exhaustive. There are several other ways in which can use the tcpstat
command. See the tcpstat (1M) man page for more information.
To use the ipstat and tcpstat commands, one of the following privileges is required:
The following examples show various ways in which can use these two commands to observe network
traffic. For detailed information, see the tcpstat (1M) and ipstat (1M) man pages.
The following example shows output from the ipstat command when run wh the –c option. Use the –c
option to print newer reports after previous reports, whout overwring the previous report. The number 3 in
this example specifies the interval for displaying data, which is the same as if the command were invoked
as ipstat 3.
# ipstat -c 3
By comparison, the following example shows output of the tcpstat command when used wh the –c option:
# tcpstat -c 3
The following addional examples show other ways in which can observe traffic on r network by using the
ipstat and tcpstat commands.
7. nslookup
The nslookup command is a powerful tool for diagnosing DNS problems. know ’re experiencing a DNS
problem when can access a resource by specifying s IP address but not s DNS name. For example, if can
get to www.ebay.com by typing 66.135.192.87 in r browser’s address bar but not by typing www.ebay.com,
have a DNS problem.
The simplest use of nslookup is to look up the IP address for a given DNS name.
C:>nslookup ebay.com
Server: ns1.orng.twtelecom.net
Address: 168.215.210.50
Non-authorative answer:
Name: ebay.com
Address: 66.135.192.87C:>
In some cases, may find that using an nslookup command gives the wrong IP address for a host name. To
know that for sure, of course, have to know wh certainty what the host IP address should be.
For example, if know that r server is 203.172.182.10 but Nslookup returns a completely different IP address
for r server when query the server’s host name, something is probably wrong wh one of the DNS records.
If use nslookup whout any arguments, the nslookup command enters a subcommand mode. displays a
prompt character (>) to let know that ’re in nslookup subcommand mode rather than at a normal Windows
command prompt.
In subcommand mode, can enter various subcommands to set options or to perform queries. can type a
question mark (?) to get a list of these commands.
8. traceroute
Traceroute is a command which can show the path a packet of information takes from r computer to one
specify. will list all the routers passes through until reaches s destination, or fails to and is discarded. In
addion to this, will tell how long each 'hop' from router to router takes.
In Windows, select Start > Programs > Accessories > Command Prompt. This will give a window like the
one below.
Enter the word tracert, followed by a space, then the domain name.
The following is a successful traceroute from a home computer in New Zealand to mediacollege.com:
Firstly tells that 's tracing the route to mediacollege.com, tells the IP address of that domain, and what the
maximum number of hops will be before times out.
Next gives information about each router passes through on the way to s destination.
1 is the internet gateway on the network this traceroute was done from (an ADSL modem in this case)
4 timed out
5 - 9 are all routers on the global-gateway.net.nz network (the domain that is the internet gateway out of
New Zealand)
Each of the 3 columns are a response from that router, and how long took (each hop is tested 3 times). For
example, in line 2, the first try took 240ms (240 milliseconds), the second took 421 ms, and the third took
70ms.
will notice that line 4 'timed out', that is, there was no response from the router, so another one was tried
(202.50.245.197) which was successful.
will also notice that the time took quadrupled while passing through the global-gateway network.
This is extremely useful when trying to find out why a webse is unreachable, as will be able to see where
the connection fails. If have a webse hosted somewhere, would be a good idea to do a traceroute to when
is working, so that when fails, can do another traceroute to (which will probably time out if the webse is
unreachable) and compare them. Be aware though, that will probably take a different route each time, but
the networks passes through will generally be very similar.
If the example above had continued to time out after line 9, could suspect that global-gateway.co.nz was
the problem, and not mediacollege.com.If timed out after line 1, would know there was a problem
connecting to r ISP (in this case would not be able to access anything on the internet).
is generally recommended that if have a webse that is unreachable, should use both the traceroute and
ping commands before contact r ISP to complain. More often that not, there will be nothing to r ISP or
hosting company can do about .
9. telnet
Telnet is a network protocol that provides a command-line interface to communicate wh a device. Telnet is
used most often for remote management but also sometimes for the inial setup for some devices, especially
network hardware such as swches and access points. Telnet is also used to manage files on a webse.
telnet works:
Telnet originally was used on terminals. These computers require only a keyboard because everything on
the screen displays as text. The terminal provides a way to remotely log on to another device, just as if
were sting in front of and using like any other computer.
Nowadays, Telnet can be used from a virtual terminal, or a terminal emulator, which is essentially a modern
computer that communicates wh the same Telnet protocol. One example of this is the telnet command,
available from the Command Prompt in Windows. The telnet command uses the Telnet protocol to
communicate wh a remote device or system.
Telnet commands can also be executed on other operating systems such as Linux, Mac, and Unix, in the
same way as telnet commands are executed in Windows.
Telnet is not the same as other TCP/IP protocols such as HTTP, which transfers files to and from a server.
Instead, the Telnet protocol has log on to a server as if were an actual user, then grants direct control and
all the same rights to files and applications as the user that 're logged in as.
Use Telnet to talk to an artificially intelligent psychotherapist named Eliza. After connecting to Telehack
wh the command below, enter eliza when asked to choose one of the listed commands.
telnet telehack.com
Watch an ASCII version of the full Star Wars Episode IV movie by entering this in Command Prompt:
telnet towel.blinkenlights.nl:Beyond the fun things that can be done in Telnet are a number of Bulletin
Board Systems. A BBS provides a way to message other users, view news, share files, and more. Telnet
BBS Guide lists hundreds of servers that can connect to using Telnet.
10. ftp
Windows, Mac OS X, and Linux operating systems have built-in command-line clients that can be used for
establishing an FTP connection. To iniate an FTP connection from Windows, type ftp at the command
prompt, and press enter.
Here is a list of the most commonly used FTP commands in the Windows command-line prompt.
FTP, by self, is not a reliable way to exchange sensive business information because is prone to secury
attacks. Due to the limations of FTP, organizations generally use FTPS and SFTP protocols for file transfer.
The technology of managed file transfer (MFT) supports these high-secury protocols and replaces basic
FTP and other ad hoc file transfer solutions. Serv-U® MFT Server is an enterprise-grade software that
provides comprehensive secury, automation, and centralized control over file transfer across the
organization. is widely preferred by leading businesses due to s high secury, flexibily, and easy-to-use
interface. Using Serv-U MFT Server, can make secure file transfers using SFTP, FTPS, and HTTPS over
IPv4 and IPv6 networks.
ARP, which stands for Address Resolution Protocol is a protocol used to map a MAC address (or hardware
address) to an IP address. is responsible for resolving the IP address to the MAC address of the destination
computer or device during network communication.
The MAC address is what is used to determine the destination of the information being sent. Keep in mind
that if the destination computer is not on the same network then ARP will learn the MAC address of the
next hop used to get to the next network and so on until reaches s final destination. Once this information
is obtained will be kept in the ARP table or cache of that computer to be used for future network
communication.
When one computer needs to communicate wh another will use the destination computers IP address to
determine if that computer is on the same network or subnet as self.
Once determines that the computer is on the same network then will send out an ARP broadcast for the
MAC address of the destination computer.
If ’s not on the same network then will send that broadcast to the default gateway or router which will use
s routing table to determine where to send the packet based on the destination IP address.
The packet will still contain the IP address of the destination computer is trying to reach. The following
illustration shows an ARP broadcast for computers on the same network.
using the arp command: When a computer resolves a MAC address to an IP address then will keep
that mapping information in s memory for a short amount of time. don't want to have this ARP cache last
too long because things change on the network and then will not have the most up to date information. can
use the ARP command to view and modify these entries in the ARP cache or table. Use can also use ARP
to find duplicate IP addresses and to find invalid entries in the ARP table.
The ARP command uses various swches for different functions. Here are the available swches for the
Windows ARP command.
• -g - Same as -a.
• -v - Displays current ARP entries in verbose mode. All invalid entries and entries on the loop-back
interface will be shown.
• inet_addr - Specifies an internet address.
• -N if_addr - Displays the ARP entries for the network interface specified by if_addr.
• -d - Deletes the host specified by inet_addr. inet_addr may be wildcarded wh to delete all hosts.
• -s - Adds the host and associates the Internet address inet_addr wh the Physical address eth_addr.
The Physical address is given as 6 hexadecimal bytes separated by hyphens. The entry is permanent.
• eth_addr - Specifies a physical address.
• if_addr - If present, this specifies the Internet address of the interface whose address translation
table should be modified. If not present, the first applicable interface will be used.
As can see from the list of swches there are various functions can perform using ARP. One of the most
commonly used swches is –a which will show all the cached ARP entries on r computer. If want to find
the entries from a specific network interface assuming have more than one then would use the –N swch.
To add a permanent entry to the ARP table use the –s command and specify the IP address and MAC
address.
ARP is not going to be too useful on r home network because of s simplicy but in a corporate
environment that has multiple networks\subnets can come in real handy to troubleshoot host to host
communication problems.
The "arp" Command:-arp displays and modifies entries in the Address Resolution Protocol (ARP)
cache, which contains one or more tables that are used to store IP addresses and their resolved Ethernet or
Token Ring physical addresses. There is a separate table for each Ethernet or Token Ring network adapter
installed on r computer. Used whout parameters, arp displays help.
arp [-a [InetAddr] [-N IfaceAddr]] [-g [InetAddr] [-N IfaceAddr]] [-d InetAddr [IfaceAddr]] [-s
InetAddrEtherAddr [IfaceAddr]]
-a [InetAddr] [-NIfaceAddr] : Displays current ARP cache tables for all interfaces. To display the ARP
cache entry for a specific IP address, use arp -a wh the InetAddr parameter, where InetAddr is an IP address.
To display the ARP cache table for a specific interface, use the -N IfaceAddr parameter where IfaceAddr
is the IP address assigned to the interface. The -N parameter is case-sensive.
-dInetAddr [IfaceAddr] : Deletes an entry wh a specific IP address, where InetAddr is the IP address.
To delete an entry in a table for a specific interface, use the IfaceAddr parameter where IfaceAddr is the
IP address assigned to the interface. To delete all entries, use the asterisk (*) wildcard character in place
of InetAddr. So "arp -d *" will flush r ARP cache.
-sInetAddrEtherAddr [IfaceAddr] : Adds a static entry to the ARP cache that resolves the IP address
InetAddr to the physical address EtherAddr. To add a static ARP cache entry to the table for a specific
interface, use the IfaceAddr parameter where IfaceAddr is an IP address assigned to the interface.
To run the arp command in Windows click START> RUN> CMD. Now enter 'arp -a' at the > prompt:
12. wget
ARP stands for Address Resolution Protocol. This protocol is used by network nodes to match IP addresses
to MAC addresses. The original specification was RFC 826. That has since been updated by RFC 5227,
and RFC 5494.
So ARP provides method for hosts send message to destination address on physical network. Ethernet
hosts must convert a 32-b IP address into a 48-b Ethernet address. The host checks s ARP cache to see if
address mapping from IP to physical address is known:
ARP is transparent to bridging - bridging will send ARP broadcasts. Routers do not propagate Ethernet
broadcasts – a router is Network Level device
2. Host 2 knows that wants to send a packet to Host 1 (eg Default GW)
3. Host 2 has to send a broadcast ARP message (destination FF:FF:FF:FF:FF:FF) requesting an answer for
192.168.1.1.
5. Host 1 and 2 both insert this received information into their ARP caches for future use
13. route
Using the route command displays or modifies the computer's routing table. For a typical computer that
has a single network interface and is connected to a local area network (LAN) that has a router, the routing
table is pretty simple and isn't often the source of network problems. Still, if 're having trouble accessing
other computers or other networks, can use the route command to make sure that a bad entry in the
computer's routing table isn't the culpr.For a computer wh more than one interface and that's configured to
14. host
A host (also known as "network host") is a computer or other device that communicates wh other hosts on
a network. Hosts on a network include clients and servers -- that send or receive data, services or
applications.
Hosts typically do not include intermediary network devices like swches and routers, which are instead
often categorized as nodes. A node is also a broader term that includes anything connected to a network,
while a host requires an IP address. In other words, all hosts are nodes, but network nodes are not hosts
unless they require an IP address to function.
On a TCP/IP network, each host has a host number that, together wh a network identy, forms s own unique
IP address. In the Open Systems Interconnection (OSI) model, protocols in the transport layer, also known
as Layer 4, are responsible for communication between hosts. Hosts use various protocols to communicate,
including transmission control protocol (TCP) and User Datagram Protocol (UDP).
Basic HTML
Tag Description
<!DOCTYPE> Defines the document type
<html> Defines an HTML document
<head> Defines information about the document
<title> Defines a title for the document
<body> Defines the document's body
<h1> to <h6> Defines HTML headings
<p> Defines a paragraph
<br> Inserts a single line break
<hr> Defines a thematic change in the content
<!--...--> Defines a comment
Formatting
Tag Description
Not supported in HTML5. Use <abbr> instead.
<acronym>
Defines an acronym
<abbr> Defines an abbreviation or an acronym
<address> Defines contact information for the author/owner of a document/article
<b> Defines bold text
<bdo> Overrides the current text direction
Not supported in HTML5. Use CSS instead.
<big>
Defines big text
<cite> Defines the title of a work
<del> Defines text that has been deleted from a document
Represents the defining instance of a term
<dfn>
<em> Defines emphasized text
Not supported in HTML5. Use CSS instead.
<font>
Defines font, color, and size for text
Tag Description
Defines an HTML form for user
<form>
input
Defines an input
<input>
control
Defines a multiline input control
<textarea>
(text area)
<button> Defines a clickable button
<select> Defines a drop-down list
Defines a group of related options
<optgroup>
in a drop-down list
Defines an option in a drop-down
<option>
list
Defines a label for an <input>
<label>
element
Frames
Tag Description
Not supported in HTML5.
<frame>
Defines a window (a frame) in a frames et
Not supported in HTML5.
<frameset>
Defines a set of frames
Not supported in HTML5.
<noframes> Defines an alternate content for users that do not
support frames
<iframe> Defines an inline frame
Images
Tag Description
<img> Defines an image
Links
Tag Description
<a> Defines a hyperlink
Defines the relationship between a document and an
<link>
external resource (most used to link to style sheets)
<nav> Defines navigation links
Lists
Tag Description
<ul> Defines an unordered list
<ol> Defines an ordered list
<li> Defines a list item
<dl> Defines a description list
<dt> Defines a term/name in a description list
Tables
Tag Description
<table> Defines a table
<caption> Defines a table caption
<th> Defines a header cell in a table
<tr> Defines a row in a table
<td> Defines a cell in a table
<thead> Groups the header content in a table
<tbody> Groups the body content in a table
<tfoot> Groups the footer content in a table
Specifies column properties for each column within a
<col>
<colgroup> element
Specifies a group of one or more columns in a table
<colgroup>
for formatting
Tag Description
<style> Defines style information for a document
<div> Defines a section in a document
<span> Defines a section in a document
<header> Defines a header for a document or section
<footer> Defines a footer for a document or section
<main> Specifies the main content of a document
<section> Defines a section in a document
<article> Defines an article
Meta Info
Tag Description
<head> Defines information about the document
<meta> Defines metadata about an HTML document
Specifies the base URL/target for all relative URLs
<base>
in a document
Not supported in HTML5. Use CSS instead.
<basefont> Specifies a default color, size, and font for all text in
a document
Programming
Tag Description
<script> Defines a client-side script
Defines an alternate content for users that do not
<noscript>
support client-side scripts
Not supported in HTML5. Use <embed> or <object>
<applet> instead.
Defines an embedded applet
Defines a container for an external (non-HTML)
<embed>
application
<object> Defines an embedded object
<param> Defines a parameter for an object
<html>
<head>
<title>sample</title>
</head>
<body>
<tr>
<th>Photo</th>
<th>Name</th>
<th>Address</th>
</tr>
<tr>
<td align="center">sai</td>
<td align="center">Eluru</td>
<td align="center">B.Tech</td>
</tr>
</table>
<li>Programming Languages
<ol>C</ol>
<ol>C++</ol>
<ol>Java</ol>
</li>
<li>Operating Systems
<ol>Windows OS</ol>
<ol>Linux OS</ol>
</li>
</body>
</html>
A web browser is not the same thing as a search engine, though the two are often confused. For a user, a
search engine is just a webse, such as Google Search, Bing, or DuckDuckGo, that stores searchable data
about other webses. However, to connect to a webse's server and display s web pages, a user must have a
web browser installed.
As of March 2019, more than 4.3 billion people use a browser, which is about 55% of the world's
population. The three most popular browsers are Chrome, Firefox, and Safari. The purpose of a web
browser is to fetch information resources from the Web and display them on a user's device.
This process begins when the user inputs a Uniform Resource Locator (URL), such
as https://en.wikipedia.org/ , into the browser. Virtually all URLs on the Web start wh
eher http: or https: which means the browser will retrieve them wh the Hypertext Transfer Protocol. In
the case of https: , the communication between the browser and the web server is encrypted for the
purposes of security and privacy. Another URL prefix is file: which is used to display local files already
stored on the user's device.
Privacy
During the course of browsing, the browser stores cookies received from various webses. Some of them
contain login credentials or se preferences. However, others are used for tracking user behaviour over long
periods, so browsers typically provide settings for removing cookies when existing the browser Finer-
grained management of cookies usually requires a browser extension
Private browsing is a privacy feature in some web browsers. When operating in such a mode, the browser
creates a temporary session that is isolated from the browser's main session and user data. Browsing
history is not saved, and local data associated wh the session, such as cookies, are cleared when the session
is closed. These modes are designed primarily to prevent data and history associated wh a particular
browsing session from persisting on the device, or being discovered by another user of the same device.
Configuring a firewall
• Delete, disable, or rename any default user accounts and change all default passwords. Make sure
to use only complex and secure passwords.
• If multiple administrators will manage the firewall, create addional administrator accounts wh limed
privileges based on responsibilies. Never use shared user accounts.
For example, all of itr servers that provide services over the internet (web servers, email servers, virtual
private network (VPN) servers, etc.) should be placed into a dedicated zone that will allow limed inbound
traffic from the internet (this zone is often called a demilarized zone or DMZ). Servers that should not be
accessed directly from the internet, such as database servers, must be placed in internal server zones instead.
Likewise, workstations, point of sale devices, and voice over Internet protocol (VOIP) systems can usually
be placed in internal network zones.
Generally speaking, the more zones it create, the more secure itr network. But keep in mind that managing
more zones requires addional time and resources, so it need to be careful when deciding how many network
zones it want to use.
If it are using IP version 4, Internal IP addresses should be used for all of itr internal networks. Network
address translation (NAT) must be configured to allow internal devices to communicate on the Internet
when necessary
To fulfill PCI DSS requirements, configure itr firewall to report to itr logging server, and make sure that
enough detail is included to satisfy requirement 10.2 through 10.3 of the PCI DSS.
Now remember, this is just an overview to help it understand the major steps of firewall configuration.
When using tutorials, or even if it decide to configure itr own firewall, be sure to have a secury expert review
itr configuration to make sure is set up to keep itr data as safe as possible.
Firewall management
Wh itr firewall in production, it have finished itr firewall configuration, but firewall management has just
begun. Logs must be monitored, firmware must be updated, vulnerability scans must be performed, and
firewall rules must be reviewed at least every six months. Last of all, be sure to document itr process and be
diligent about performing these ongoing tasks to ensure that itr firewall continues to protect itr network.
Blocking pop-ups
Google does a pretty good job about keeping pop-up windows under control in s Chrome browser. A sea of
pop-up windows invading itr tradtional browsing experience indicates a problem, that itr default settings are
in disarray. Thankfully, we have a few handy Google Chrome tips for dealing wh these annoying
advertisements, and it can run through them in barely any time at all.
Below we list a number of detailed methods for how to stop pop-ups in Chrome, including running malware
scans and creating an exception list. The easiest way to start, though, is making sure Chrome is up to date.
Navigate to chrome://settings/help and run any available updates, as Chrome shuts down pop-
ups originally tied to a specific setting, so they'll be blocked no matter what. It can learn about other new
Chrome book features here. However, managing pop-up blocking in Chrome browser begins wh five basic
actions.
• Select Settings from the Chrome menu.
• Search 'Pop'
• Click Se Settings.
• Click Pop-ups and redirects.
• Toggle the Pop-ups option to Blocked, or delete exceptions.
1. Click on Chrome's menu icon in the upper-right corner of the browser and click on Settings
3. Click Se Settings.
Follow the steps below to create email account at gmail.com for free:
1. Vis the Gmail webse. Gmail is Google Mail, and it will need a Google account to access . Signing
up for a Google account is free.
4. Click Next Step to continue. It will be taken to the “Create itr profile” page. This page is the basic
starting point for itr Google profile. If it don’t want to create one, move on to the next step. It will still have
a profile, but will only be itr name.
usage
Despe all the methods of communication email is still popular and has become as necessary as a phone
number or mailing address. Similar to calling somebody, email has become a standard mode of
communication wh the expectation being that everybody should have an email address. Email started out as
a simple communication tool but is now used for much more than that.
In many ways, email has made my life easier. allows me to:
• Contact people all over the world for free (or inexpensively)
• Communicate wh more than one person at a time
• Document interactions (e.g. the highly prized CYA paper-trail)
• Leave messages any time of day whout bothering people
was only when people started using in alternative ways that things started to get messy, really
messy. Instead of looking for a different model email kept evolving to meet new demands and expectations
such as
• Working collaboratively
• Sending attachments
• Keeping a conversation together for multiple people(e.g. thread)
• Searching capabilies
• Automating actions wh rules
• Integrating calendars and appointments, etc.
was almost possible to live in itr email. Some of these new demands were a natural f for this mode of
communication, while others stretched the limations and made seem really clunky. For example, sharing
digal photos through email was never a good solution. The attachments are large to send and can quickly
clog up an inbox making problematic for both the sender and the recipient(s).
Business and organizational use: Email has been widely accepted by business, governments and
non-governmental organizations in the developed world, and is one of the key parts of an 'e-revolution' in
workplace communication (wh the other key plank being widespread adoption of highspeed Internet). A
sponsored 2010 study on workplacecommunication found 83% of U.S. knowledge workers felt email was
crical to their success and productivy at work.
has some key benefs to business and other organizations, including:
• Facilating logistics: Much of the business world relies on communications between people who
are not physically in the same building, area, or even country; setting up and attending an in-person
meeting, telephone call, or conference call can be inconvenient, time-consuming, and costly. Email
provides a method of exchanging information between two or more people wh no set-up costs and
that is generally far less expensive than a physical meeting or phone call.
• Helping wh synchronization: Wh real time communication by meetings or phone calls,
participants must work on the same schedule, and each participant must spend the same amount of
Everything on LinkedIn begins wh the profile. There are many parts to creating a great one; here’s how to
do , as well as some tips to keep in mind.
Start wh the Basics: When creating a profile, make sure the email address is one it often check; this is val
to ensure receipt of connection requests, messages and more. Basic demographic information, such as
location, is self-explanatory. Be sure to add a phone number—the more ways a connection or potential
employer has to get in touch, the better! ’s also possible to begin adding contacts at this early stage of the
game by allowing LinkedIn to access itr email contact list.
While filling out the demographic information, LinkedIn will ask about current employment status. Those
who are unemployed might consider using phrases like “currently looking for employment opportunies” or
“advertising student seeking challenging employment opportunies.” This shows forward thinking and
optimism for the future.
Choose Account Type: This is where it must make a choice between the Basic LinkedIn experience, which
is free, or the Premium option, which provides many more features but costs a fee. Whin the Premium
option, there are several other options to choose from, including Professional, Jobseeker and more. Each
has a different price point and offers different benefs. Think about itr intended use of LinkedIn when
choosing the account type that’s best for itr suation; remember that each offers a one-month free trial, so ’s
possible to cancel if turns out the first choice wasn’t the best one.
Add a Photo: When comes to photos on LinkedIn, professional is the name of the game. Add a professional
headshot or one that simply looks that way—sometimes even a photograph taken wh a smartphone is
professional enough to use. However, there is reason to look toward professional headshots first; those wh
a photo taken by a pro get 14 times more views than those wh a ho-hum pic.
Use a photo that is at least 200x200 pixels; anything less and will appear distorted and blurry. Remember
that those who add a high-qualy photo to their profile get 21 times more profile views and up to 36 times
more messages than those who keep the boilerplate look.
Talk about Experience : For jobseekers, this is where the juice is—so make sure the experience listed
reflects everything it can do. It can import a resume, or it can choose to add each posion manually. Many
will begin by importing a resume and then tweaking each posion to add more content, optimize wh
keywords and make all more readable than the typical dry, bare bones resume might be. Always list the
employment experience starting wh the most current.
Time for Skills!: Shoot for a bare minimum of five skills; the more listed, the better. It can currently add
up to 50 skills. Those who have at least five skills on their profile are contacted 33 times more often by
recruers and other LinkedIn members, and receive 17 times more profile views. Make a point of listing
skills in the order of proficiency and expertise; those skills are used to connect jobseekers wh recruers and
other connections, so ’s important to keep the most highly-honed skills front and center.
Ramachandra College of Engineering
Date Page no
:……………………… :…………
……
A Nod to Education: When including education, be sure to include all schools attended; this will allow for
easier connections wh old classmates, alumni groups and the like. In addion, include any education that
wasn’t necessarily through a universy or college, such as a corporate training seminar or a certification
earned through an organization or association related to itr field.
Summarize All: Wring a summary can be tricky. Here are a few points to keep in mind when wring the
best possible summary to get the most attention:
• Don’t be afraid to show personaly! A whopping 40 percent of recruers will love a peek into itr
attude.
• Make sure ’s at least 40 words; this makes more likely to show up in searches.
• Drop a note about specialties in there, as those keywords will show up in searches too.
• Talk about experience, but talk about itr goals as well.
The Headline Matters: The headline is what will show up right beside itr name on LinkedIn, as well as
results on some search engines. ’s an excellent chance to make a great first impression, so say as much as
possible in only a few words. Make snappy and interesting so connections want to click and find out more.
Weave in keywords if possible. Here are a few examples:
• Civil Engineering Student, Graduating 2020 | CAD, Survey and Blueprint Expert
• Nuclear Engineering Professional |Lateral Opportunies Welcome
• Talent Acquision Manager at Award-Winning Eco-StartUp
Add Addional Information: LinkedIn offers the opportuny to add a variety of interests to the profile, so
go for ! Those interests might catch the eye of a recruer. Keep in mind that hobbies can sometimes translate
into skills that are excellent in a working environment; for example, a hobby of building model planes
translates into intense attention to detail, or an obsession wh woodworking translates into taking the time
to get a job done right the first time.
Double-Check, Ed and Check Again: Now that the profile is almost complete, go back and double-check
everything. Make sure the dates of employment and education are correct. Look for grammar mistakes and
typos—a glaring typo can pull attention away from the message. Use professional language at all times. At
the “view profile as” function, toggle between “public view” and “personal connections” to see what
appears for each segment.
Finally, perhaps drop the summary and any other paragraphs throughout the profile into an online checker,
such as Hemingway or Grammarly, to review anything it might have missed.
Ask Someone to Look Over: One set of eyes isn’t enough. Ask friends to take a look at the profile to
make sure ’s appealing and includes everything pertinent. College students can talk to their career services
center to get help wh this; professionals can turn to colleagues or professional services to ensure they’re on
the right track.
Create a Personalized URL: A personalized URL makes much easier for others to find it. Those wh a
common name might discover that their particular URL is already taken; however, adding a location or
numbers behind the name can be a good alternative. To do this, click the “gear” next to the public profile
link, then click the pencil message next to the URL. The personalized URL must be between five and 30
characters.
Post Content: Finally, don’t forget to start posting content. Keep the content to things that are pertinent
to itr field, such as interesting articles, fun statistics or compelling new innovations. Start a blog if it feel
it can keep up wh on a regular basis. Just make sure any content posted is as professional as possible.
➢ “G Bash Here”
➢ “G GUI Here”
➢ “G LFS (Large File Support)”
➢ “Associate .g* …”
➢ “Associate .sh …”
• When prompted to choose the default edor, pick Nano (a simple terminal edor) or Notepad++ (a
simple graphical edor):
• For “Adjust itr PATH environment”, select: “Use G from G Bash only”
• For “Choose HTTPS transport backend”, select: “Use the OpenSSL library”
• For “Configure the line ending conversions”, select: “Checkout Windows-style,…”
• For “Configure the terminal emulator …”, select: “Use MinTTY …”
• For “Configure extra options”, select: “Enable file system caching”
• “Enable G Credential Manager”
Hackerrank
HackerRank is a technology companythat focuses on competive programming challenges for both
consumers and businesses, where developers compete by trying to program according to provided
specifications. HackerRank's programming challenges can be solved in a variety of programming languages
(including Java, C++, PHP, Python, SQL, JavaScript) and span multiple computer science domains.
On the consumer side, when a programmer subms a solution to a programming challenge, their submission
is scored on the accuracy of their output. Programmers are then ranked globally on the
HackerRank leaderboard and earn badges based on their accomplishments to drive competion among users.
In addion to individual programming challenges, HackerRank also hosts contests (often referred to by
In addion to supporting a variety of popular (and some obscure) programming languages, HackerRank
categorizes most of their programming challenges into a number of core computer science domains
• Artificial Intelligence: involves developing AI bots and using them against others.
• Algorhms: Tradional algorhmic challenges.
• Functional Programming: use functional programming abstractions to solve challenges.
• Machine Learning: use predictive modeling and analysis to solve challenges.
Codechef
CodeChef is a competive programming webse. is a non-prof educational iniative of Directi, aimed at
providing a platform for students, itng software professionals to practice, hone their programming skills
through online contests Apart from this, the 'CodeChef For Schools' program aims to reach out to itng
students and inculcate a culture of programming in Indian schools.
CCDSAP (CodeChef Certified Data Structures and Algorhms Programm): CCDSAP is a certification
programme by CodeChef which tests candidates' proficiency in data structures and algorhms. The
programme offers three difficulty levels, namely Foundation, Advanced, and Expert. The first CCDSAP
certification exam was held on November 19, 2017 followed by the second and third exams on 21 January
2018 and 18 March 2018.
Go For Gold: The Go For Gold iniative was launched by Directi and CodeChef wh an aim to help an
Indian team win gold at the ACM-ICPC World Finals. As part of this iniative,any Indian team at the ACM-
ICPC World Finals securing a higher rank than the current highest secured by an Indian team will be
awarded the Go For Gold cup and a cash prize calculated using their 'golden formula'.
Host Itr Contest: allows schools, universies, corporate instutions to host their own programming contest
on the CodeChef platform. Corporates can use the CodeChef platform for various purposes like
campus/lateral hiring, internal employee engagement, branding, employee re-skill programs.
Google hangout
Google Hangouts is a communication software product developed by Google. Originally a feature
of Google+, Hangouts became a standalone product in 2013, when Google also began integrating features
from Google+ Messenger and Google Talk into Hangouts. In 2017, Google began developing Hangouts into
a product aimed at enterprise communication. Hangouts is now part of the G Sue line of products and
consists of two primary products: Google Hangouts Meet and Google Hangouts Chat. Google has also
begun integrating features of Google Voice, s IP telephony product, into Hangouts, stating that Hangouts is
designed to be "the future" of Voice. Google will shut down the consumer version of Hangouts in June
2020.
Hangouts allows conversations between two or more users. The service can be accessed online through
the Gmail or Google+ webses, or through mobile apps available for Android and iOS (which were
distributed as a successor to their existing Google Talk apps). However, because uses a proprietary
protocolinstead of the XMPP open standard protocol used by Google Talk, most third-party applications
which had access to Google Talk do not have access to Google+ Hangouts.
Chat histories are saved online, allowing them to be synced between devices. A "watermark" of a
user's avatar is used as a marker to indicate how far they have read into the conversation. Photos can be
shared during conversations, which are automatically uploaded into a private Google+ album. Users can
also now use color emoji symbols in their messages.
Skype
Skype is a telecommunications application that specializes in providing video chat and voice calls between
computers, tablets, mobile devices, the Xbox One console, and smartwatches via the Internet. Skype also
provides instant messaging services. Users may transm text, video, audio and images. Skype allows video
conference calls.
At the end of 2010, there were over 660 million worldwide users, wh over 300 million estimated active each
month as of August 2015. At one point in February 2012, there were 34 million users concurrently online
on Skype.
Registered users of Skype are identified by a unique Skype Name and may be listed in the Skype
directory.[55] Skype allows these registered users to communicate through both instant messaging and voice
chat. Voice chat allows telephone calls between pairs of users and conference calling and uses a proprietary
audio codec. Skype's text chat client allows group chats, Remoticons, storing chat history, and eding of
previous messages.
GoToMeeting
GoToMeeting is a web-hosted service created and marketed by LogMeIn. is an online meeting, desktop
sharing, and video conferencing software package that enables the user to meet wh other computer users,
customers, clients or colleagues via the Internet in real time. In late 2015, Crix announced plans to spin-off
the GoToMeeting business as a stand-alone subsidiary wh a market value around $4 billion.In July
2016, Crix and LogMeIn announced plans to merge the GoTo family of products.
GoToMeeting is designed to broadcast the desktop view of a host computer to a group of computers
connected to the host through the Internet. Transmissions are protected wh high-secury encryption and
optional passwords. By combining a web-hosted subscription service wh software installed on the host
computer, transmissions can be passed through highly restrictive firewalls.
GoToMeeting is competing in a marketplace for web and video conferencing, where businesses and
professionals can meet virtually.
GoToMeeting is sold in multiple free-paid edions. GoToMeeting feature now include:
–www.metacrawler.com
–www.dogpile.com
–www.infind.com
White Pages
• Used for finding individuals
–www.bigfoot.com
–www.four11.com
–www.whowhere.com
Types of Links
• Text Hyperlink
• Image Hyperlink
Simply stated, it's network etiquette -- that is, the etiquette of cyberspace.
“Etiquette” means “the forms required by good breeding or prescribed by authority to be required in
social or official life.”