Computer Fundamentals and PC Software-1007
Computer Fundamentals and PC Software-1007
Computer Fundamentals and PC Software-1007
6. What are the key elements of a Windows Desktop? Give a note on these key elements.
7. Define a pivot table. Explain briefly the procedure of constructing pivot table in MS-EXCEL.
10. Define Cryptanalysis. Explain in detail the different types of attacks on cryptosystems.
Section C
8. Windows Explorer
Information in your computer is saved as a file. A file is defined as a collection of related information or records.
Files can be grouped and placed under directories. Grouping of files in directories and sub-directories provides an
order to the information placed on your computer. It is much like the files stored in cabinets to classify and group
them for easy access. Comparing these, we could say that the cabinet drawers can be related to the directories and
sub-directories, and the physical files can be related to the computer files stored in these directories.
Windows terms directories and sub-directories as Folders and Sub-folders.
The folder structure of Windows can be understood as an inverted tree with the root being at the top having
folders, sub-folders and files under it – the number of folders and files limited only by the disk capacity.
Represented diagrammatically it would look something like this :
The Windows Explorer is a utility that allows you to perform various disk and file management activities like
creating folder(s), creating, copying, renaming and deleting file(s) etc. It represents the contents in a graphical
form giving an easy and quick view of your computer contents.
Steps to Access the Windows Explorer
Select Start -> All Programs -> Accessories -> Windows Explorer
This will start the Explorer and display the following screen :
Tree View
Windows Explorer displays all items in a tree structure. A plus sign (+) next to an item indicates that it can be
expanded further (like in case of a folder), and a minus sign (−) indicates that it is the expanded view. You can
click on the plus sign to reveal or expand the contents of the item. Items that neither have a plus or a minus sign
indicate that they are the lowest level in the tree hierarchy.
Standard Toolbar
It is the toolbar that provide access to the most commonly used functions.
Selected Item
The item that has the current focus (usually highlighted in blue).
Address Bar
Displays the path of the selected item. This item could be a file, folder, or the drive itself.
Left/Right Pane
The explorer Window is divided into two panes – left and right. The left pane is used to select a drive or folder,
the contents of which are displayed in the right pane.
Creating Folders
Steps to Create a New Folder
1. Select the drive, e.g. ‘C’ (or folder in case you are creating a sub-folder) in Windows Explorer under which
you wish to create the new folder. This can be done by clicking once on the drive name.
2. From the File menu, point to New and click on Folder. A new folder appears with a temporary name ‘New
Folder’ in the selected location.
3. Type the name for the new folder, and press Enter.
It may be useful to know that folder/file names can be up to255 characters, including spaces. These,
however, cannot contain the following characters :
/ \ : , * ? ‘ “ < > |
Thus, it is advisable to keep the names simple and without any special character.
Alternatively, you can also initiate the New -> Folder menu by right clicking in the right pane of Windows
Explorer. The screen that appears on doing the same is shown below.
Opening Files/Folders
Files or Folders can be opened by double clicking on the same. Opening a Folder simply means displaying the
contents of the folder (its sub-folders and files).
As a general rule, the file opens with the application it was created and the extension of the file name is an
indication of the application, for example, January.xls indicates that the file is an Excel file.
Steps to Open a File/Folder
1. Select the desired file (or folder) from Windows Explorer; and
2. Double click on the file (or folder) to open it.
Copying Files
Files and/or folders can be copied using the ‘Click and Drag’ method.
Steps to Copy a File/Folder
1. Click on the file (or folder) you want to move to another location.
2. Keep the mouse button pressed on the highlighted file, drag it to the folder you want to drag it to, and then
release the mouse button.
You will notice that using this method, if you drag the file (or folder) to the same disk, it will result in moving it
while if you drag it to another disk it will be copied.
To copy a file using Click and Drag from one folder to another on the same disk, select the desired file, drag the
file using the right mouse button and when you reach the desired location simply right click and select Copy here
option.
You can copy more than one file in a single copy operation. These files could be displayed in continuation or
scattered across the folder (discontinuous). Described below is how to handle each of these situations.
Continuous Range
You can select a continuous range of files as follows :
1. Click on the first file in the range;
2. Press down the Shift key and while holding down the shift key click on the last file in the range. The
selected range will now be highlighted; and
3. You can now cut and copy them in another location or use the Click and Drag method to do the same.
Separate Files
You can select a discontinuous range of files as follows :
1. Click on the first file you want to copy; and
2. Hold down the Ctrl key and while doing so click on another file. You can select more files in the same
manner.
Renaming Files/Folders
Renaming a file (or folder) is assigning a new name to it. The steps below detail how this can be done.
Steps to Rename a File/Folder
1. Select the desired file (or folder) from Windows Explorer;
2. From the File menu click on Rename. The focus moves to the earlier highlighted file (or folder) whose
name is to be changed; and
3. Type the desired name and press Enter.
Deleting Files/Folders
Deleting a File (or folder) moves it to the Recycle Bin. Follow the steps below to delete :
Steps to Delete a File/Folder
1. Select the desired file (or folder) from Windows Explorer;
2. From the File menu click on Delete. This displays a dialogue box asking for confirmation to delete; and
3. Select ‘Yes’ from the dialogue box to confirm or select ‘No’ in case you change your mind.
Changing Folder Views
The files/folders in the Windows Explorer can be displayed using different view forms. You can choose the one
that suits you the most.
Steps to Change the Folder Views
Select the View menu. Various display options are available to select from. These include Thumbnails, Tile, Icon,
List and Details. Each of these is shown below.
Thumbnails
In this view, each file or folder is displayed as a thumbnail with the name underneath.
Tile
Files and folders are tiled with the name and details displayed to their right.
Icon
In this view, each file or folder is shown as a small icon with the name or description below it. The items are
arranged horizontally in this view.
List
This is a view analogous to the Icon view but the icons are arranged vertically rather than horizontally.
Details
This is the default view. It provides details like the item name, size, type and date modified. You can change the
size of column widths by dragging the borders (left, right) between the column headings. You can also sort
(ascending, descending) the display based on any of these columns by clicking on the corresponding heading.
< TOP >
9. Creating a Macro in MS-WORD
• Open a new Word document
• Type in a few words of text. Anything you like
• Highlight your text, or just a single word of the text
• From the menu bar, click on Tools
• From the drop down menu click on Macro
• A sub menu appears
• Click on Record New Macro .When you click on Record New Macro, you get the Macro dialogue box
popping up.
There are four areas to the Record Macro dialogue box: Macro Name, Assign macro to, Store macro in, and
Description.
The first thing to do is to give your macro a name. At the moment it is called "Macro1". That's not a very
descriptive name for what we want our macro to do. We'll call our macro FontChanger. Notice that we haven't put
a space between the two words. This is because macros don't like having spaces between words. You have to put
the name of your macro as all one word.
So go ahead and type in FontChanger as the Macro name, instead of Macro1.
The next section is "Assign macro to". You are given the choice of either Toolbars or Keyboard. Ignore this
section for now. We'll see later how to assign our macro to a toolbar, and to the keyboard.
The next section is "Store macro in". At the moment it reads All Documents (Normal.dot). Remember what
Normal.dot is? That's the basic template for all Microsoft Word documents. In other words, the macro we create
will be available to any new Word document. You can change this so that the macro is created in only the
document you're working on. Click the black down arrow to see the title of the document you have open.
The final section is Description. This is just a record of when the macro was created, and who created it. You can
change this to anything you like. Malicious folk creating nasty macros will definitely change these details.
Once you have given your macro a name, click the OK button. a dialogue box will appear. When you click the OK
button, you are returned to your Word document. But now you will see a strange toolbar floating over your page.
And the mouse pointer will be different.
• Click on Format from the menu bar
• From the drop down menu, click on Font
• The Font dialogue box appears
• Select Arial as your font
• Select Bold
• Select size 16
• Click the OK button on the Font dialogue box
• You are returned to your page
• Click the Stop button on your floating Macro Recorder
• The macro will stop recording, and the process is finished: You have recorded the macro.
< TOP >
10. Cryptanalysis and Attacks on Cryptosystems
Cryptanalysis is the art of deciphering encrypted communications without knowing the proper keys. There are
many cryptanalytic techniques. Some of the more important ones for a system implementor are described below.
&LSKHUWH[WRQO\DWWDFN: This is the situation where the attacker does not know anything about the contents
of the message, and must work from ciphertext only. In practice it is quite often possible to make guesses about
the plaintext, as many types of messages have fixed format headers. Even ordinary letters and documents begin in
a very predictable way. For example, many classical attacks use frequency analysis of the ciphertext, however,
this does not work well against modern ciphers. Modern cryptosystems are not weak against ciphertext-only
attacks, although sometimes they are considered with the added assumption that the message contains some
statistical bias.
Known-plaintext attack: The attacker knows or can guess the plaintext for some parts of the ciphertext. The task
is to decrypt the rest of the ciphertext blocks using this information. This may be done by determining the key
used to encrypt the data, or via some shortcut. One of the best known modern known-plaintext attacks is linear
cryptanalysis against block ciphers.
&KRVHQSODLQWH[WDWWDFN: The attacker is able to have any text he likes encrypted with the unknown key.
The task is to determine the key used for encryption.
A good example of this attack is the differential cryptanalysis which can be applied against block ciphers and in
some cases also against hash functions.
Some cryptosystems, particularly RSA, are vulnerable to chosen-plaintext attacks. When such algorithms are used,
care must be taken to design the application or protocol so that an attacker can never have chosen plaintext
encrypted.
Man-in-the-middle attack: This attack is relevant for cryptographic communication and key exchange protocols.
The idea is that when two parties, A and B, are exchanging keys for secure communication, an adversary positions
himself between A and B on the communication line. The adversary then intercepts the signals that A and B send
to each other, and performs a key exchange with A and B separately. A and B will end up using a different key,
each of which is known to the adversary. The adversary can then decrypt any communication from A with the key
he shares with A, and then resends the communication to B by encrypting it again with the key he shares with B.
Both A and B will think that they are communicating securely, but in fact the adversary is hearing everything.
The usual way to prevent the man-in-the-middle attack is to use a public-key cryptosystem capable of providing
digital signatures. For set up, the parties must know each other's public keys in advance. After the shared secret
has been generated, the parties send digital signatures of it to each other. The man-in-the-middle fails in his attack,
because he is unable to forge these signatures without the knowledge of the private keys used for signing.
This solution is sufficient if there also exists a way to securely distribute public keys. One such way is a
certification hierarchy such as X.509. It is used for example in IPSec.
Correlation
Correlation between the secret key and the output of the cryptosystem is the main source of information to the
cryptanalyst. In the easiest case, the information about the secret key is directly leaked by the cryptosystem. More
complicated cases require studying the correlation (basically, any relation that would not be expected on the basis
of chance alone) between the observed (or measured) information about the cryptosystem and the guessed key
information.
Attack against or using the underlying hardware: in the last few years as more and more small mobile crypto
devices have come into widespread use, a new category of attacks has become relevant which aims directly at the
hardware implementation of the cryptosystem.
The attacks use the data from very fine measurements of the crypto device doing, say, encryption and compute
key information from these measurements. The basic ideas are then closely related to those in other correlation
attacks. For instance, the attacker guesses some key bits and attempts to verify the correctness of the guess by
studying correlation against her measurements.
Several attacks have been proposed such as using careful timings of the device, fine measurements of the power
consumption, and radiation patterns. These measurements can be used to obtain the secret key or other kinds
information stored on the device.
This attack is generally independent of the used cryptographical algorithms and can be applied to any device that
is not explicitly protected against it.
Faults in cryptosystems can lead to cryptanalysis and even the discovery of the secret key. The interest in
cryptographical devices lead to the discovery that some algorithms behaved very badly with the introduction of
small faults in the internal computation.
For example, the usual implementation of RSA private-key operations are very suspectible to fault attacks. It has
been shown that by causing one bit of error at a suitable point can reveal the factorization of the modulus i.e. it
reveals the private key.
Similar ideas have been applied to a wide range of algorithms and devices. It is thus necessary that
cryptographical devices are designed to be highly resistant against faults and against malicious introduction of
faults by cryptanalysts.
< TOP >
11. Managing Files and folders in Windows
Almost all Windows 2000 tasks involve working with files and folders. The work you do with files and folders
falls into three categories:
Organizing and managing files and folders
You can perform basic file and folder tasks, such as creating, deleting, copying, and moving files and folders, and
more advanced tasks, such as changing file and folder properties and managing shared folders.
Searching for files and folders
You can narrow the focus of your file and folder searches by including additional search criteria, such as the date,
type, file size, or case sensitivity. You can also broaden the scope of your file searches by using wildcard
characters, and specifying literal text or regular expressions.
Securing your files and folders
You can secure files and folders using Windows 2000 Professional security features, such as user and group
accounts, Group Policy, shared folder and printer permissions, auditing, and user rights. If you have an NTFS
drive installed, you can set file and folder permissions and encrypt files and folders.
To open a file or folder
1. Open My Computer, and then double-click the drive that contains the file.
2. Double-click the file or folder you want to open.
To save a file
1. On the File menu of the program you are working in, click Save.
2. If you haven't saved your file before, type a name for the file in File name.
To create a new folder
1. Open Windows Explorer.
2. Click the drive or folder in which you want to create a new folder.
3. On the File menu, point to New, and then click Folder.
4. Type a name for the new folder, and then press ENTER
To copy or move a file or folder
1. Open Windows Explorer.
2. Click the drive or folder you want to work with.
3. Click the file or folder you want to copy or move.
4. On the Edit menu, click Copy. Or, click Cut to move the item.
5. Open the folder or disk where you want to copy or move the item.
6. On the Edit menu, click Paste.
To copy a file or folder to a floppy disk
1. Insert the floppy disk into the disk drive.
2. Open Windows Explorer.
3. Click the file or folder you want to copy.
4. On the File menu, point to Send To, and then click 3 1/2 Floppy (A).
To delete a file or folder
1. Open Windows Explorer
2. Click the file or folder you want to delete.
3. On the File menu, click Delete.
To delete or restore files in the Recycle Bin
1. On the desktop, double-click Recycle Bin.
Do one of the following:
To restore an item, right-click it, and then click Restore.
To restore all of the items, on the Edit menu, click Select All, and then on the File menu, click Restore.
To delete an item, right-click it, and then click Delete.
To delete all of the items, on the File menu, click Empty Recycle Bin.
To search for a file or folder
1. Click Start, point to Search, and then click For Files or Folders.
2. In Search for files or folders named, type all or part of the file name or folder you want to find.
3. To search for files containing specific text, in Containing text, type the text you want to find.
4. In Look in, click the drive, folder, or network you want to search.
To specify additional search criteria, click Search Options, and then click one or more of the following
options to narrow your search:
Select Date to look for files that were created or modified on or between specific dates
Select Type to look for files of a specific type, such as a text or WordPad document.
Select Size to look for files of a specific size.
Select Advanced Options to specify additional search criteria.
5. Click Search Now.
< TOP >