You are on page 1of 51

GOVERNMENT POLYTECHNIC - 111

CHANNAPATNA-562160

DEPARTMENT OF COMPUTER SCIENCE &


ENGINEERING

IT SKILLS LAB MANUAL


COURSE CODE: 20CS01P

SAVITHA N MTech
Lecturer
Department of computer science and engineering
LOG SHEET
STUDENT NAME: _ _ _ _ _ _ _ _ _ _ _ _ _ _ REGISTER NO: _ _ _ _ _ _ _ _ _ _ _ _ _ _
BRANCH: _ _ _ _ _ _ _ _ _ _ _ _ _ _

Sl. Task/Experiment/Program Date


No
Write an algorithm for programmable problems
• Add/subtract two numbers
1 • Find the largest/smallest of 3 numbers
• Calculate and print sum of 'N' numbers
Design a flowchart for programmable problems
• Add/subtract two numbers
2 • Find the largest/smallest of 3 numbers
• Calculate and print sum of 'N' numbers
Design and create simple game using MIT-
3 scratch/Code.org
Design and create simple android application (MIT App
4 Inventor)
Design and create webpage for displaying your poem (Title, header,
5
paragraph, formatting tags)
6 Design and create webpage for your wish list
Design and create webpage using HTML and CSS about an awesome animal
7
(Use necessary CSS tags)
Design and create to demonstrate the concept of Hyperlinking of 2 or more
8
web pages
10 Design and create personal webpage with dashboard. [ Creating your own Blog]

Design and create web page about advantages of Business process automation with
11 respect to your branch of engineering.
12 Create a workflow for education loan approval in bank/Diploma admission process(use
any tool)
13 Create user account and demonstrate use of Google drive,Google docs,Google Co-
Lab(use Jupyter notebook)
14 Demonstrate Internet of Things using with examples
a. Smart home b. Smart city c. Smart farming

15 Installation of Antivirus software


16 Demonstration and hands on browser settings
17 Demonstration and hands on privacy settings and
password policy
Demonstration of common security threats (using videos)
18
a. Phishing b. DoS attack c. Man in the middle attack
d. Spamming e. virus

SIGN OF STUDENT: _ _ _ _ _ _ _ _ _ _ _ _ SIGN OF COURSE IN-CHARGE: : _ _ _ _ _ _ _ _ _ _ _ _


IT SKILLS LAB MANUAL

PRACTICAL SKILL EXERCISES


1. Write an algorithm for programmable problems
Add/subtract two numbers
Step 1: Start
Step 2: Declare variables num1, num2 and sum
Step 3: Read values for num1 and num2.
Step 4: Add num1 and num2 and assign the result to sum.
sum=num1+num2
Step 5: Display sum
Step 6: Stop

Find the largest/smallest of 3 numbers

Step 1: Start
Step 2: Input a, b, c
Step 3: Let max=a
Step 4: if b> max? then max=b
Step 5: if c> max? then max=c
Step 6: Print max
Step 7: Stop

Calculate and print sum of 'N' numbers


Step 1: Start
Step 2: Read the value of n.
Step 3: Set i = 1 , Sum = 0
Step 4: if ( i> n ) go to 7
Step 5: Sum = Sum + i
Step 6: i = i + 1
Step 7: go to step 4
Step 8: Display the value of Sum
Step 9: Stop

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 3


IT SKILLS LAB MANUAL

2. Design a flowchart for programmable problems


Example for Reference:
• Add/subtract two numbers
• Find the largest/smallest of 3 numbers
• Calculate and print sum of 'N' numbers

• Add two numbers

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 4


IT SKILLS LAB MANUAL

• Find the largest of 3 numbers

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 5


IT SKILLS LAB MANUAL

• Calculate and print sum of ‘N’ number

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 6


IT SKILLS LAB MANUAL

3. Design and create simple game using MIT-scratch/Code.org


Scratch: is an event-driven visual programming language developed by MIT. In Scratch, we can
create our own interactive stories, games, and animations using building blocks. In this platform, we
do not need to write code to perform operations, things are done just by drag and drop, just like
visual basic.
Uses of Scratch:
➢ Scratch is made to learn basics programming concepts with fun.
➢ It is a tool for creating interesting games, stories, and more block-based programming.
➢ It has its own paint editor and sound builder.
➢ Anyone can start learning programming from Scratch even they do not have previous
knowledge about programming languages and programming concepts.
Advantages of scratch
• The interface design of scratch is simple so that it is easier to understand for kids as well as for adults.
• It allows students to develop 21st-century skills with the help of technology.
• It is generally designed for kids. So that they can easily learn a new computer language.
• It is free to use.
Disadvantages of scratch
• Scratch is open so anybody on the internet can get your work without your permission.
• Teachers can not monitor what student is creating in the scratch.
Elements of Scratch
There are the following four main elements of Scratch and they are:
1. Programming Palette
2. Stage Area
3. Sprites
4. Script
5.
Programming Palette
It contains all the essential tools which are required to program a sprite to do or say something. Every element of
a program, such as a loop, condition available in the programming palette.

Blocks
It contains puzzle-piece shapes that are used to create code in Scratch. These blocks are connected to each other
vertically like puzzle pieces. Every block has its own shape that prevents syntax errors. Once these blocks are
connected, they are called scripts. These are the following six different shapes available in Scratch: Hat, Stack,
Boolean, Reporter, C, and Cap.

Stage Area
This is a place where everything takes place, such as animations, turtle graphics either in a small or normal size,
with a full-screen option also available. It uses X and Y coordinates to monitor action with 0, 0 being the stage
center. All the action by a sprite is performed here.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 7


IT SKILLS LAB MANUAL

Sprites
These are the main characters of the program. It is a graphical element that is programmed using a programming
palette. All the action is performed on the sprites. By default, with a cat avatar display on the sprite panel, users
can also draw their own sprite.

Script
In the script, everything defines what kind of operation should be done by sprites. It tells the characters what to
do or say. Every single sprite is programmed with a script.
Make your character jump [JUMPING GAME]
• Open scratch.mit.edu website, Go to create.
• Open panel and select a character (your choice) and select background (your choice).
• Go to motion and select change by 10 and go to control, select repeat 10 to give motion.
• Go to motion and select change by -10 and go to control, select repeat 10 and join both.
• Go to events and select when space key pressed. And place it on the top.
• Go to sound and select start sound and place in between space key press and repeat 10.
Create 2 backdrops

• Click on the stage icon and click on backdrop


• Rename the 1st backdrop as LOST in costume section
• Type the text T as You LOST!!!
• Duplicate the lost backdrop and rename as WON
• Type the text T as You WON!!!
Make a moving obstacle
• Select any obstacle (egg) change size into smaller by changing size into 80.
• Place the egg at the x axis line and go to motion and select go to x& y and drag the egg to –x
position and go to motion and select glide x sec to x & y.
• Go to control and select forever and place on the go to x.
• Go to events and select when clicked, change the glide into 3 sec.
Stop the game when it runs on to the egg.
• Go to control and select stop all and wait until, go to sensing and select touching mouse
pointer and change mouse pointer into chick.
• Go to events, select when clicked and place at the top of wait until.
• Go to chick panel and go to motion, select go to x and y and go to events, select when clicked.
• Once the egg touches the chick before the score is 5 then change the backdrop to LOST

Keep Score
• Go to chick panel and go to variable, select make variable and give score as variable and select

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 8


IT SKILLS LAB MANUAL
change score by 1 and place at the end of code and set score to 0 and place after go to x & y.

• Once the Score becomes 5 then change the backdrop to WON and stop the game.
CODE SECTION

1. CHICK

2. EGG

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 9


IT SKILLS LAB MANUAL

OUTPUT:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 10


IT SKILLS LAB MANUAL

4. Design and create simple android application (MIT App Inventor)


TEXT-TO-SPEECH

1. Go to the App Inventor home page: www.appinventor.mit.edu


2. Click the orange "Create Apps" button in the menu bar.
3. Log in to App Inventor with your Gmail username and password.
4. Start a new project by clicking the "Start new project" button.
5. Type in the project name (underscores are allowed, spaces are not) and click OK. App Inventor
opens the Designer window. The "Designer" is where you create the Graphical User Interface
(GUI) or the look and feel of your app.
6. Add a TextBox - Click and hold on the word "TextBox" in the Palette. Drag your mouse over
to the Viewer. Release the mouse. A new TextBox will appear on the Viewer.
7. Add a button - Click and hold on the word "Button" in the Palette. Drag your mouse over to the
Viewer. Release the mouse. A new button will appear on the Viewer.
8. Change the Text on the Button- In the properties panel, change the text for the Button. Under
the Text property, select "Text for Button 1", delete it and type in "TEXT-TO- SPEECH".
9. Add a Text-to-Speech component to your app- Go to the Media drawer in the Palette anddrag
outa“TextToSpeech”component.DraganddropitontotheViewer.Notice that it is present under
"Non-visible components". It's more like a tool that is available to the app.
10. Switch over to the Blocks Editor- It's time to tell your app what to do. The Blocks Editor is
where you program the behavior of your app.
11. Click and hold the when Button1.Click do event block. Drag it over to the Viewer and drop
it there. It is called an "Event Handler".
12. Click and hold the call TextToSpeech1.Speak block. Drag it over to the Viewer and drop it
there. This is the block that will make the phone speak. Because it is inside the Button.Click, it
will run when the button on your app is clicked.
13. Click and hold TextBox1.Text and plug it into the socket labeled “message”
14. The app is now ready for testing – Download the MIT AI2 Companion app from play store
and install it. Click on Connect in the menu bar and select AI Companion and scan the QR
code. Be sure your both devices are connected to the same Wi-Fi network. You can also test by
clicking on Build and selecting App(save .apk to my computer).

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 11


IT SKILLS LAB MANUAL

5. Design and create webpage for displaying your poem (Title, header, paragraph, formatting
tags)
<html>
<head>
<title>poem</title>
</head>
<body>
<h1 align="center">TWINKLE TWINKLE LITTLE STAR </h1>
<h2> jane taylor 1806 </h2>
<p> Twinkle Twinkle little <b><i>star!</i></b><br/> how i wonder
what you are <br/>up above the world so high! <br/> like a
<big>diamod</big> in the sky </p>
<hr color="blue">
<img src="star.png" width ="300" height="300" >
<br>
</body>
</html>

OUTPUT:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 12


IT SKILLS LAB MANUAL

6. Design and create webpage for your wish list (what you want to do). Also list the challenges and
opportunities along with the images to present your dreams (List ordered and unordered, Image,
Table)
<html>
<head>
<title>WISH LIST </title>
</head>
<body>
<h1 align="center"> MY WISH LIST </h1>
<br> <br> <br>

<table border="10">
<tr>
<th>wish list</th>
<th>Image </th>
<th>Brand name </th>
</tr>

<tr>
<td><ol><li>LAPTOP</td>
<td> <li> <img src="laptop.jpeg" width="100" height="100"> </td>
<td> <ul> <li> LENEVO
<li> Hp
<li> DELL </td> </ul>
</tr>
<tr>
<td><ol start="2"><li>SMART PHONE</li></td>
<td> <li> <img src="phone.gif" width="100" height="100"> </li></td>
<td> <ul> <li> SAMSUNG
<li> OPPO
<li> ONE PLUS
<li> APPLE </li></td> </ul>
</tr>
</table>
<br>
</body>
</html>
OUTPUT:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 13


IT SKILLS LAB MANUAL

7. Design and create webpage using HTML and CSS about an awesome animal (Use necessary
CSS tags).
<html>
<head>
<title>AWESOME ANIMAL</title>
<style type="text/css">
.c1{background-color:yellow}
.c2{color:red}
.c3{font:30pt 'calibri'}
.c4{color:green}
</style>
</head>
<body class="c1">
<center>
<h1>TIGER</h1>
<p><span class="c4"> <b>Tiger is the largest member of the cat family.</b> </span> <br/>
<span class="c2"><b>It is territorial and generally solitary.<br/>
Tiger cubs stay with their mother for 2 years before they become independent</span></b><br/>
Tiger population is decreasing due to <span class="c3">POUCHING</span>, habitat destruction
and habitat fragmentation</p>
<img src="tiger.jif" width="200" height="200">
<br>
</center>
</body>
</html>

OUTPUT:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 14


IT SKILLS LAB MANUAL

8. Design and create web page for a travel book/recipe book with more than 3
pages, table to list places/recipes (iframe,hyperlink).

Homepage.html

<html>
<head>
<title>Travel Book</title>
</head>
<body bgcolor="purple">
<center>
<font size="7" color="yellow">MY TRAVEL BOOK WEBSITE</font>
<font size="4" color="yellow">
<marquee>Welcome to my Travel book website</marquee><br>
<iframe src="frame1.html" name="f1" style="width:30%;height:80%;"></iframe>
<iframe src="frame2.html" name="f2" style="width:65%;height:80%;"></iframe>
<marquee>Contact for more details: Shri.Sai travels, Channapatna</marquee>
</font>
</center>
</body>
</html>

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 15


IT SKILLS LAB MANUAL

frame1.html
<html>
<body bgcolor="lightpink">
<font size="6">
<center>
<table border="2" bordercolor="blue" cellpadding="10">
<tr>
<th bgcolor="lightgreen">*TOURIST PLACES*</th>
</tr>
<tr>
<td><a href="gokak.html" target="f2">Gokak Falls</a></td>
</tr>
<tr>
<td><a href="mysore.html" target="f2">Mysore Palace</a></td>
</tr>
<tr>
<td><a href="bijapur.html" target="f2">Bijapur Gumbaz</a></td>
</tr>
</table>
</center>
</font>
</body>
</html>

frame2.html
<html>
<body bgcolor="lightpink">
</body>
</html>

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 16


IT SKILLS LAB MANUAL

gokak.html
<html>
<body>
<center>
<font color="white">
<h1>GOKAKFALLS</h1>
</font>
<img src="gokak.jpg" width="400" height="200">
<table border="2" cellpadding="20">
<caption>
<font size="5" color="white">INFORMATION ABOUT GOKAK FALLS
</font>
</caption>
<tr bgcolor="yellow">
<th>FOOD</th>
<th>HALT</th>
<th>GUIDE</th>
<th>TOURISTBUS</th>
</tr>
<tr bgcolor="lightyellow">
<td>Available</td>
<td>Available</td>
<td>Available</td>
<td>Available</td>
</tr>
</table>
</center>
</body>
</html>

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 17


IT SKILLS LAB MANUAL

mysore.html
<html>
<body>
<center>
<font color="white">
<h1>MYSORE PALACE</h1>
</font>
<img src="mysore.jpg" width="400" height="200">
<table border="2" cellpadding="20">
<caption>
<font size="5" color="white">INFORMATION ABOUT MYSORE PALACE
</font>
</caption>
<tr bgcolor="yellow">
<th>FOOD</th>
<th>HALT</th>
<th>GUIDE</th>
<th>TOURISTBUS</th>
</tr>
<tr bgcolor="lightyellow">
<td>Available</td>
<td>Available</td>
<td>Available</td>
<td>Available</td>
</tr>
</table>
</center>
</body>
</html>

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 18


IT SKILLS LAB MANUAL

bijapur.html
<html>
<body>
<center>
<font color="white">
<h1>BIJAPUR GUMBAZ</h1>
</font>
<img src="bijapur.jpg" width="400" height="200">
<table border="2" cellpadding="20">
<caption>
<font size="5" color="white">INFORMATION ABOUT BIJAPUR</font>
</caption>
<tr bgcolor="yellow">
<th>FOOD</th>
<th>HALT</th>
<th>GUIDE</th>
<th>TOURISTBUS</th>
</tr>
<tr bgcolor="lightyellow">
<td>Available</td>
<td>Available</td>
<td>Available</td>
<td>Available</td>
</tr>
</table>
</center>
</body>
</html>

OUT PUT

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 19


IT SKILLS LAB MANUAL

9. Design and create web page with JavaScript to design a simple calculator to perform the
following operation: Sum, Product, Difference and Quotient.
<html>
<head>
<title>CALCULATOR</title>
<script type="text/javascript">
var a,b,r;

function add()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(a);
b=parseFloat(b);
r=a+b;
document.myform.result.value=r;
}

function sub()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(a);
b=parseFloat(b);
r=a-b;
document.myform.result.value=r;
}

function mul()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(a);
b=parseFloat(b);
r=a*b;
document.myform.result.value=r;
}

function div()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(a);
b=parseFloat(b);
r=a/b;
document.myform.result.value=r;
}
</script>
</head>

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 20


IT SKILLS LAB MANUAL
<body>
<form name="myform">
<center>
<h1>ARITHMETIC OPERATIONS </h1>
<h2><u>Enter a number in each text box</u></h2><br/><br/>
NUMBER 1: <input type="text" name="n1" value=""><br/>
NUMBER 2: <input type="text" name="n2" value=""><br/><br/>
<input type="button" value= "ADDITION" onclick="add()">
<input type="button" value= "SUBTRACTION" onclick="sub()">
<input type="button" value= "MULTIPLICATION" onclick="mul()">
<input type="button" value= "DIVISION" onclick="div()">
<br><br>
<br><br>
<font color="red">RESULT</font>
<input type="text" name="result" value="">
</center>
</form>
</body>
</html>

OUTPUT:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 21


IT SKILLS LAB MANUAL

10. Design and create a personal webpage with dashboard.

Personal web pages are world wide web pages created by an individual to contain content of
a personal nature rather than content pertaining to a company, organization, or institution.
Many personal pages only include information of interest to friends and family of the author.

“Blog is a journal or diary written for public viewing on a website and consisting typically
of personal reflections, commentary on current events, etc. arranged chronologically”

Dashboard – the “home base” of WordPress. This is what you seen when you log in, and it contains
whatever widgets you’ve chosen to show onit.

Posts – the heart and soul of WordPress. This is where you’ll go when you want to write a blog
post or edit an existing one.

Media – a central repository for any pictures, sound files, video, and other pieces of media that
you upload to your site. Here you can browse through and edit media you’ve uploaded to your
posts and upload even more.

Pages – here you can create Pages, which is what you’ll be using for the main content on your site.
Pages are different from Posts because they will show up in your site’s main navigation instead of
going on your list of blog posts. This makes Pages good for “timeless” content like your biography,
work history, and contactinfo.

Comments – here you can see the comments on your blog (if you decide to have one). Here we

can use Blogger or Wix website to create the blog.

When we click on https://www.Blogger.com,we see the image as shown below, then click on
create your blog by signing in via Gmail.

• We first need Gmail id in order to create our blog.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 22


IT SKILLS LAB MANUAL

• Next after log in with your Gmail account, Create a new blog give the name of the blog
• Then create the new post, give the name of the post and type the content of the post about personal
reflections, commentary on current events, etc. arranged chronologically
• After writing the post now you can PUBLISH the post
• At last, you can share the blog to your family and friends.

OUTPUT

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 23


IT SKILLS LAB MANUAL

11. Design and create web page about advantages of business process automation with respect to
your branch of engineering.
<html>
<head>
<title> Advantages of business process automation </title>
<style>
h1
{
color: red;
}
h2
{
color: White;
}
p
{
color: green;
}
</style>
</head>
<body bgcolor="pink">
<h1> Advantages of business process automation with respect to Electrical and Electronics
Engineering</h1>
<h2> Transportation</h2>
<p> Driver for ola and Uber as well as those who deliver for app like ola and Uber </p>
<h2> Healthcare</h2>
<p> Automation in Healthcare have helped to increase the quality of patient care</p>
<h2> Online Marketing</h2>
<p> Automation in Online Marketing helps to customer to purchase and sell goods or products
using online applications </p>
<h2>Telecommunication</h2>
<p> Automation in Telecommunication helps to automate office system, customer service, billing
system etc. </p>
</body>
</html>
OUTPUT:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 24


IT SKILLS LAB MANUAL

12. Create a workflow for education loan approval in bank/diplomaadmission process (Use
any tool)
Here we have used Trello tool to build workflow for Education Loan Approval.

Loan application Procedure:

Step 1: Students parents/guardian approaches the bank with application for education loan.
Manager verifies the application and sends it to loan processing officer.
Step 2: Officer interviews the application and gives report to manager.
Step 3: Manager checks the report from Officer and accepts or rejects the loan proposal.
Step 4: If manager accepts the proposal, the client must submit necessary documents to the bank.
Step 5: Manager then approves the loan and sends pay order to college.

Workflow using Trello Software:


Step1: Login to Trello using your Gmail account using the link https://trello.com/en/login by clickingon
Continue with Google.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA Page 25


IT SKILLS LAB MANUAL

Step 2: Give appropriate Team name like Education Loan and select type from the dropdown.
Step 3: Click on create new board. Give board name as Loan Processing and select the board visibilityfrom the
dropdown. Visibility Options are- Private, Team and Public.

Step 4: Create Lists by clicking on Add List button. Here we have created five lists as follows.
i) Manager Verification
ii) Officer Verification
iii) Manager Approval
iv) Client Record Submission
v) Pay Order to College.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

Step 5: Create a card for every loan applicant with the applicant’s name as the card name in theappropriate list.

Step 6: You can add one or more labels for every card for quick analysis of the status. Here we havecreated three
labels in different colors.
• Green color → All Good
• Yellow color → Under Process
• Red color → Rejected

Step 7: You can set due date for every card by clicking on edit icon in each card.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
Introduction to cloud

Fundamentals of cloud

Definition

Cloud computing is the delivery of different services through the Internet, including data storage, servers,
databases, networking, and software.

Cloud computing is a technology that uses the internet for storing and managing data on remote servers, and then
access data via the internet. One such example is Google cloud – It is a suite of public cloud services offered by
Google.

Cloud Service Models

There are three types of cloud service models

1. Infrastructure as a Service (IaaS)


2. Platform as a Service (PaaS)
3. Software as a Service (SaaS)

Infrastructure as a Service (IaaS)


It is a computing infrastructure managed over the internet. The main advantage of using IaaS is that it helps users to
avoid the cost and complexity of purchasing and managing the physical servers.

Platform as a Service (PaaS)


PaaS cloud computing platform is created for the programmer to develop, test, run, and manage the applications.

Software as a Service (SaaS)


SaaS is also known as "on-demand software". It is a software in which the applications are hosted by a cloud
service provider. Users can access these applications with the help of internet connection and web browser.

Cloud deployment types

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

Private Cloud
It is a cloud-based infrastructure used by stand-alone organizations. It offers greater control over security. Private
clouds are perfect for organizations that have high-security requirements, high management demands, and
availability requirements.

Public Cloud

This type of cloud services is provided on a network for public use. Customers have no control over the location of
the infrastructure. It is based on a shared cost model for all the users, or in the form of a licensing policy such as
pay per user.

Community Cloud

It is a mutually shared model between organizations that belong to a particular community such as banks,
government organizations, or commercial enterprises. Community members generally share similar issues of
privacy, performance, and security. This type of deployment model of cloud computing is managed and hosted
internally or by a third-party vendor.

Hybrid Cloud

This model incorporates the best of both private and public clouds, but each can remain as separate entities. A
hybrid cloud is ideal for scalability, flexibility, and security. A example of this scenario of an organization who
uses the private cloud to secure their data and interacts with its customers using the public cloud.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
13. Create user account and demonstrate use of Google drive, Google docs, Google Co-lab(Usage
of Jupyter Notebook)

User account in Gmail:


1. Open up your web browser and go to the Gmail home page: http://www.gmail.com.
2. Click Create an account.
3. Fill your basic information like first name and last name
4. Type an email name into the „choose your username‟ box. If the email name requested is not
available, accept one of the alternatives and check its availability once more.
5. Create password of least 8 characters long and fill the rest of your information like birth date,
Gender and mobile number.
6. Enter a CAPTCH word and fill the location.
7. Need to ensure that the „I agree to the Google terms of service and Privacy Policy‟ is ticked. Then
click next step.
8. Now your email account is created and sign in with email id and password

Sending, Receiving of E-Mails:


1. Click on compose, a new message window will appear type To address email id, write a subject of
your message. Type the message on body of window, click on attach file -> select the attachment to
upload (word file, pdf, image etc.) and press send button.
2. Double click on inbox messages to open and click on uploaded attachment to download.

DEMONSTRATION LINKS (YOUTUBE VIDEOS):


1) Creating G-mail account: https://www.youtube.com/watch?v=_JFkz3WV4dQ

Google drive:
1. Go to drive.google.com on your computer, go to drive.google.com. You‟ll see "My Drive," which
has: Files and folders you upload or sync
2. Upload files and folders to Google Drive
Can upload files from your computer using File Upload option or create files in Google Drive.
3. Share and organize files
Can share files or folders, so other people can view, edit, or comment on them.
4. To see files that other people have shared with you, go to the "Shared with me" section
DEMONSTRATION LINKS (YOUTUBE VIDEOS):
How to use Google Drive: https://www.youtube.com/watch?v=82CUzgqUxKU

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

Google Docs
1. Open the Docs home screen at docs.google.com.
2. Click on “Start a new document," click Blank New.
3. Formatting Text
Using Google Docs toolbar, you can change the text, the font style and even assign specific font style
for particular sections of the text. Along with this, Google Docs provides editing options like
paragraph spacing and alignment.
4. Creating table of contents
On your Google Docs click where you want the table of contents to be placed. Click Insert on the menu
bar and select Table of contents. You can choose with page numbers or with blue links. In case you
want to delete the table, right-click and select delete.
5. Inserting images and tables
Choose Image from the Insert tab and select the following option – Upload, Take a snapshot, By URL,
Your albums, Google Drive and Search. Make sure that the image you select must be less than 50 MB
and should be one of the following file formats – .gif, .jpg or .png.To undo or redo an action, at the top,
click Undo or Redo.
6. Share & work with others
Can share files and folders with people and choose whether they can view, edit, or comment.

DEMONSTRATION LINKS (YOUTUBE VIDEOS):

How to use Google DOCs: https://www.youtube.com/watch?v=xJiUTXGv3PE

Google Colabs (Google Co-laboratory)


1. Open https://colab.research.google.com to open your Google colab.
2. Click on the NEW PYTHON 3 NOTEBOOK link at the bottom of the screen. A new notebook
would open up as shown in the screen below.
3. To rename the notebook, click on this name and type in the desired name in the edit box.
4. Enter a trivial Python code in the code window and execute it.
5. To execute the code, click on the arrow on the left side of the code window.
6. To add more code to your notebook selects Insert / Code Cell.
7. Click on the Delete cell option and the current cell will be deleted.

DEMONSTRATION LINKS (YOUTUBE VIDEOS):

How to use Google Co-Lab: https://www.youtube.com/watch?v=i-HnvsehuSw

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

OUTPUT:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

Sending Mail:

Google Drive:

Google Docs:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

Google Co Labs:

New document in Google Co labs:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

Delete a cell in Google Co labs:

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

14.Demonstrate Internet of Things using with examples


a. Smart home
b. Smart city
c. Smart farming

What is Internet of Things (IoT)

Internet of Things (IoT) refers to a system of interrelated, internet-connected objects thatare able to
collect and transfer data over a wireless network without human intervention. In simple words Internet
of Things means taking all the things (devices) in the world andconnecting them to the internet.

Internet of Things vs Internet

The primary difference between the Internet of Things and the Internet are the pillars forthe concepts:
• The Internet of Things focuses on physical objects.
• The Internet o focuses on four constituents: people, things, data and processes.

Examples of “IoT” systems are


I) Smart Home
II) Smart City
III) Smart Farming etc.

I) SMART HOME: What Is a Smart Home?


• A smart home refers to a convenient home setup where appliances and devices can be automatically
controlled remotely from anywhere with an internet connection using a mobile or other networked
device.
• Devices in a smart home are interconnected through the internet, allowing the user to control functions
such as security access to the home, temperature, lighting, anda home theater remotely.
How Smart Homes Work?
• A smart home’s devices are connected with each other and can be accessed through one central point—
a Smartphone, tablet, laptop, or game console.
• Door locks, televisions, thermostats, home monitors, cameras, lights, and even appliances such as the
SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA
IT SKILLS LAB MANUAL
refrigerator can be controlled through one home automation system.
• The system is installed on a mobile or other networked device, and the user can create time schedules for
certain changes to take effect.

• Smart Lighting: Smart lights helps in saving energy by adapting the lighting to the ambient
condition and switching ON/OFF or diming the light when needed.
• Smart Appliances: Modern Homes have a number of appliances such as TV, Refrigerator, and
Music System etc. It helps to make management easier and also provide status information to the
user remotely.
• Intrusion Detection: This system use security cameras, sensors to detect intrusion and raise alert.
Alert can be in the form of an SMS or email sent to user.
• Smoke or Gas Detection: Smoke detectors are installed in Homes to detect smoke that is typically
an early sign of fire. Alerts can be in the form of signals to fire alarm, Gas detectors can detect the
presence of harmful gases such as CO, LPG etc.

Examples of Smart Home systems and devices.


1) Amazon Alexa
2) Google Assistant
3) Sony Smart TV
4) Perfect Bake pro
5) Amazon Echo etc.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
II) SMART CITY
• A “Smart city” is a city that uses technology to provide services and solve city problems.
• A smart city does things like improve transportation and accessibility, improve social services, promote
sustainability, and give its citizens a voice.
• The main purpose of the Smart Cities Mission is to drive economic growth and improve the quality of
life of people by enabling local area development and harnessing technology, especially technology that
leads to Smart outcomes.

• Smart Parking: It makes the search for parking space easier and convenient for drivers.
Smart parking is powered by IOT system that detects the number of empty parking slot
and sends information over the internet. To smart application back ends.
• Smart Roads: Smart Roads are equipped with the sensors can provide information on
driving condition, travel time estimating and alert in case of poor driving condition,
traffic condition and accidents.
• Structural Health Monitoring: I use a network of sensors to monitor the vibration
level in the structures such as bridges and buildings.
• Surveillance: This infrastructure helps in public transport and events in cites is required
to ensuresafety and security.
Advantages of Smart Cities Examples of Smart Cities in India
1) Making more effective and data-based 1) New Delhi
decisions: 2) Mumbai
2) Better transport services. 3) Bengaluru
3) Efficient public services. 4) Belagavi
4) Reduction of the environmental footprint 5) Kolkata
5) Increase in digital equity 6) Chennai
6) New economic development opportunities 7) Hyderabad etc.
7) Infrastructure improvement

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
III) SMART FARMING (SMART AGRICULTURE)
• A “Smart Farming” is an emerging concept that refers to managing farms using modern Information and
Communication Technologies to increase the quantity and quality of products while optimizing the
human labor required.
• The goal of “Smart Farming” research is to ground a decision making support system for farm
management. By providing them with the benefits of technological advancements, smart farming aims
to reduce the heavy workload of the farm workers, hence improving their quality of life.

• Smart Irrigation: It helps to determine moisture amount in soil.


• Green house control: The use of IOT sensors enables them to get accurate real time information
on greenhouse condition such as lighting, temperature soil condition and humidity.
• Monitoring of climate condition: Smart auricular gadgets, farming sensors are used to map
climate conditions, choose appropriate crops etc.
• Crop Management: It helps to monitor crop growth and effectively prevent any diseases or
infestations that can harm your yield.

Advantages of Smart Farming


1) Increased Production.
2) Water Conservation.
3) Real-Time Data and Production Insight.
4) Lowered Operation Costs.
5) Increased Quality of Production.
6) Accurate Farm and Field Evaluation.
7) Improved Livestock Farming.

DEMONSTRATION LINKS (YOUTUBE VIDEOS):


1) Internet of Things (IoT): https://www.youtube.com/watch?v=h0gWfVCSGQQ
2) SMART HOME: https://www.youtube.com/watch?v=EzCVpaEb0kQ
3) SMART CITY: https://www.youtube.com/watch?v=Br5aJa6MkBc
4) SMART FARMING: https://www.youtube.com/watch?v=DEqwIKwMM9k

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
15. Installation of Antivirus software

To install an antivirus program on your computer, follow the steps below.

Step 1: If you purchased the antivirus program from a retail store, insert the CD or DVDinto the computer's disc
drive.
Step 2: If you downloaded the antivirus program on the Internet, find the downloadedfile on your computer.
Step 3: Unzip the file to extract and access the installation files. Double click onsetup.exe or install.exe file.
Step 4: On the first screen you have to choose the type of installation:
• Regular installation • Custom installation
Step 5: Read and Accept End User License Agreement.
Step 6: Then, click Install to proceed with default installation
Step 7: Wait while setup installs Antivirus on your PC
Step 8: Once the installation is complete, click Continue
Step 9: Click on Scan to start scanning and to detect viruses, malware, and bad browseradd-ons, and other
issues on your PC.

DEMONSTRATION LINKS (YOUTUBE VIDEOS):


Installation of Antivirus: https://www.youtube.com/watch?v=rk0WcOT-Z2Y

Free “Avasta” Antivirus installation

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

16. Demonstration and hands on browser setting.

The different examples of web browser are Google chrome, Internet Explorer, Mozilla Firefox etc.
Here the following steps involves browser setting for Google chrome for secure browsing.
1. Setting the default browser: Go to Setting and click the make Google chrome My Default Browser
button.
2. Auto download updates: Google chrome automatically updates whenever it detects the latest new
version of browser is available.
3. Enable phishing and malware protection: Go to Advanced Settings-> Privacy-> enable phishing
and malware protection.
4. Don’t sync: Disconnect your email account from your browser under the “Personal Stuff” tab.
Syncing your email account with your Chrome browser means that personal information such as
passwords, auto fill data, preferences, and more is stored on Google’sservers.
5. Configure content settings: Click Content settings under the Privacy section and do the following.
Cookies: Select Keep local data only until I quit my browser and Block third-party cookies and site
data.”.
JavaScript: Select “Do not allow any site to run JavaScript.”
Pop-ups: Select “Do not allow any site to show pop-ups.
Location: Select “Do not allow any site to track my physical location.”
7. Do not Save Passwords: Go to setting-> Passwords and turnoff offer to save passwords.
8. Camera Access: Got o Setting-> Advanced-> content setting->camera and turn on Ask before
accessing (recommended).
9. Microphone Access: Got o Setting-> Advanced-> content setting->Microphone and turn on Ask
before accessing (recommended).
10. Automatic Downloads: Go to Setting-> Advanced-> content setting->Automatic downloads and
turn on Ask when a site tries to download files after the first file (recommended).

DEMONSTRATION LINKS (YOUTUBE VIDEOS):


Browser Settings in Chrome: https://www.youtube.com/watch?v=9lIMSzrjUrU

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL

17. Demonstration and hands on Privacy setting and Password Policy.


“GOOGLE CHROME” PRIVACY SETTINGS
Step 1 : Open Google chrome browser.
Step 2 : Click Menu bar in the top right corner of the screen.

Step 3 : Select settings from the dropdown menu.


Step 4 : Here different settings options of browser appears
(Eg. Appearance, Privacy & Security, Search Engine etc.)

Step 5 : Click on Privacy & Security.


Step 6 : Under "Privacy and security," choose what settings you want to Turn ON andOFF.
Step 7: On clicking “Clear browsing data” we can delete information from ourbrowsing activity, like
our history, cookies, or saved passwords.
Step 8: On clicking “Cookies and other site data” we can control how Chromehandles cookies and
tracking.
Step 9: On clicking “Security” we can manage safe browsing and protection.
Step 10: On clicking “Site Settings” we can control how Chrome handles contentand permissions for a
site.

“GOOGLE CHROME” PASSWORD SETTINGS


Step 1 : Open Google chrome browser.
Step 2 : Click Menu bar in the top right corner of the screen.

Step 3 : Select settings from the dropdown menu.


Step 4 : Here different settings options of browser appears
(Eg. Autofill, Appearance, Privacy & Security, Search Engine etc.)

Step 5 : Click on “Autofill”


Step 6 : Under "Autofill" choose what settings you want to Turn ON and OFF.
Step 7: By enabling “Offer to save passwords” browser will ask to save yourpassword before login and
vice versa.
Step 8: By enabling “Auto Sign-in” browser will automatically sign in to websites
using stored credentials.
Step 9: On clicking “Check passwords” will keep your passwords safe from databreaches and other
security issues.
Step 10: We can “View and manage saved passwords of our Google Account”.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
DEMONSTRATION LINKS (YOUTUBE VIDEOS):

1) Privacy Setting in Chrome:


https://www.youtube.com/watch?v=zMXI6waGFp4

2) Password Setting Policy in Chrome:


https://www.youtube.com/watch?v=pT1Vcq9AVCo

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
18. Demonstration of common security threats (using videos)
a. Phishing
b. DoS attack
c. Man in the middle attack
d. Spamming
e. Virus
COMPUTER SECURITY
• Computer Security is the process of detecting and preventing any unauthorized use of your
laptop/computer. It involves the process of safeguarding against trespassers from using your personal
or office based computer resources with malicious intent or for their own gains, or even for gaining any
access to them accidentally.
• Cyberspace (internet, work environment, intranet) is becoming a dangerous place for all organizations
and individuals to protect their sensitive data or reputation. This is because of the numerous people and
machines accessing it.

COMMON SECURITY THREATS


a. Phishing
b. DoS attack
c. Man in the middle attack
d. Spamming
e. Virus
a. Phishing:
Phishing is a online method of criminals trying to steal your personal information likelogin credentials,
credits and numbers using deceptive e-mails and numbers.

COMMON “PHISHING” ATTACKS

➢ Email phishing: In this type of phishing the fraudster sends email or links to hundreds or thousands of
people to steal their personal data or information.
SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA
IT SKILLS LAB MANUAL
➢ Spear Phishing: In this type of phishing the fraudster sends email or link to a specific person or
organization from a trustworthy source to steal the personal data.
➢ CEO fraud: In this type of phishing the fraudster spoof company email accounts to send email or links to
their employees to steal their personal data.
➢ Vishing: In this type of phishing the fraudster makes a voice call, in order to induce users to reveal
personal information by claiming to be from a reputable company.
➢ Smashing: In this type of phishing the fraudster sends a message, in order to induce users to reveal
personal information by claiming to be from a reputable company.
➢ Pharming: In this type of phishing the fraudster installs malicious code in your computer which
automatically redirects you to fake websites without your knowledge.

HOW TO PREVENT PHISHING


1. Two factor authentication (2FA).
2. Strict password management policies.
3. Not clicking on external e-mail links.

b. DoS (Denial of Services)/DDoS (Distributed DoS)


• DoS/DDoS is an online method of criminals trying to shut down a machine or network & making it
inaccessible to the user.
COMMON “DoS” ATTACKS
➢ Volume band attack: In this type of attack the fraudster tries to saturate the bandwidth of the target site,
creates traffic jam which makes it impossible to user data to reach its target site (some times in excess
of100gbps).It includes TCP floods, UDP floods, ICMP flood.
➢ Protocol attack: In this type of attack the fraudster tries to consume network resources like servers,
firewall, load balances by targeting protocols (layer 3 & 4) with malicious connection requests.
➢ Application layer attack: In this type of attack the fraudster tries to attack the application itself focusing
on specific issues, resulting in the application not being able to work properly.
PREVENTIONS OF “DoS” ATTACK
1. Secure your network infrastructure.

2. Practice basic network security.

3. Understanding the warning signs.

4. Leverage the cloud.


c. Man In The Middle attack
It is a cyber attack where the attacker secretly alters the communications between twoparties who believe that
they are directly communicating with each other.

COMMON TECHNIQUES OF MAN IN THE MIDDLE


Sniffing: In this attack the attackers use packet capture tool to inspect packets at lowlevel using specific
wireless devices.
Packet Injection: In this attack the attackers injects malicious packets into datacommunication stream, so that is
get mixed into valid (original) data.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
Session Hijacking: In this attack the attackers corrupt valid computer session to gainunauthorized access to
information or services in a computer system.
Email Hijacking: In this attack the attackers or hackers use tactic to target emailaccounts of large
organization

PREVENTIONS OF “MAN IN THE MIDDLE” ATTACK


1. Use of Virtual Private Network (VPN).
2. Network security.
3. Install active virus and malware protection.
4. Secure your communication.

d. Spamming
Spamming is an online method of criminals trying to send unwanted message (spam) to large number of users
for the purpose of commercial or any other prohibited purposes.
COMMON “SPAMMING” ATTACKS
➢ Ads: In this method the fraudster send emails / message offering product andservices such as
weight loss pills and fairness cream etc.
➢ Chain letters: In this method the fraudster send emails / messages telling exitingstories and to pass
the same message to 100 or more people giving intuitions.
➢ Money scam:In this method the fraudster send emails / message asking smallamount money to
receive big rewards in future.
➢ Porn spam: In this method the fraudster sends pornography emails / message usingerotic images and
videos.
➢ Email spoofing : In this method the fraudster uses email phishing attack methods.PREVENTION OF
“SPAMMING” ATTACK
1. Never post your email address publically.

2. Think before you click on the link.

3. Do not reply to spam messages.

4. Avoid using your personal or business email address for registering onlinecontest.

e. Malware (Malicious Software)


Malware is a computer program written with the intent to damage/ disable device /system and network. It is used
to steal date, bypass access control and harm computers and network devices they are connected.
COMMON TYPES OF “MALWAREs”
1. Virus:
Viruses are designed to damage the target computer by corrupting data, reformatting your hard disk or
completely shutting down the system. The full form of virus is “Vital Information Resources Under Seize”, they
can also be used to steal information, steal many render advertisements and more.
Types of viruses i) Boot virus ii) Program file virus.

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT SKILLS LAB MANUAL
2. Worm:
Worms are designed to replicate itself on the target computer and to infect other computers without requiring
action from anyone.

3. Trojan Horse:
Trojan Horse are designed to trick you into downloading and installing malware , as soon as you install Trojan,
the criminals access your system and can steal personal information and can install more malware to modify
files and to destroy your data.

4. Spyware:
Spyware are designed by the criminals to track your browsing habits and internet activity, spying capabilities
can include activities like monitoring collecting login credentials, financial information and many more.

5. Ransom ware:
Ransom wares are designed by the criminals that hold your data and demands payment to release the data back
to you. It restricts user access to computer by either encrypting files on the hard disk or shutting down the
system until the criminal is paid by the user.

DEMONSTRATION LINKS (YOUTUBE VIDEOS):

1) Computer Security: https://www.youtube.com/watch?v=d30n-YxOHo4


2) Phishing attack: https://www.youtube.com/watch?v=PR0c-gJ20kA
3) DoS attack: https://www.youtube.com/watch?v=PTJ6UZz1pPQ
4) Man in the Middle attack: https://www.youtube.com/watch?v=dEaDgOZY80Y
5) Spamming attack: https://www.youtube.com/watch?v=B47mwZAJXls
6) Virus attack: https://www.youtube.com/watch?v=n8mbzU0X2nQ

SAVITHA N, LECTURER, DEPT. CS&E, GPT CHANNAPATNA


IT Skills Lab Manual, GPT, Chanpatna. Dept. Of CSE

Rashmi T N, Lecturer, CSE. Page 18


IT Skills Lab Manual, GPT, Chanpatna. Dept. Of CSE

19. Demonstrate of common Security Threats:


1. Phishing:

Phishing is a type of social engineering attack used to steal user data including login details and credit card
details. It occurs when an attacker as a trusted entity, dupes a victim into opening an email, instant message
or text message. The recipient is then tricked into clicking a malicious link or the revealing of sensitive
information.

Video Link: https://www.youtube.com/watch?v=Y7zNlEMDmI4

2. DOS(Denial of Service) attack:


A denial of service attack is an attack to shutdown a machine or network, making it inaccessible
to its intended users. DOS attacks accomplish by flooding the target with traffic or sending the
target with traffic or sending it information that triggers a crash.

Video Link: https://www.youtube.com/watch?v=ilhGh9CEIwM

3. Man in the middle attack:


Man in the middle attack allows attackers to securely intercept communications or alter them. Man
in the middle attack finds a way between user and an entity and attempts to hack information Ex:
Email Hijacking.

Video Link: https://www.youtube.com/watch?v=Ua9bUqdjWBc

Rashmi T N, Lecturer, CSE. Page 19


4. Eavesdropping:
IT Skills Lab Manual, GPT, Chanpatna. Dept. Of CSE
Eavesdropping is a theft of information as it is transmitted over a network by a computer,
Smartphone or another connected device.
This attack takes advantages of unsecured network communications to access data as it‟s is being
sent or received by its user.
5. Spamming:
Spamming is the use of messaging system to send a spam to large number of recipients. Sending
an unwanted email or message to another spam includes adverting, instant messaging etc. A person
who creates spam is called a spammer.
6. Virus:
A computer virus is a type of malicious code or program written to alter the way a computer
operators and is designed to spread from one computer to another computer.
A virus cause unexpected or damaging effects such as harming the system software by
corrupting data.
Types of Computer Viruses:
• Resident Virus
• Multipartite Virus
• Direct Action Virus
• File Infector
• Network Virus
• Web Scripting Virus

Rashmi T N, Lecturer, CSE. Page 20

You might also like