Pdf24 Merged (4)
Pdf24 Merged (4)
Pdf24 Merged (4)
Of
IT ESSENTIALS WORKSHOP
Subject Code: 114ES
BACHELOR OF ENGINEERING
in
INFORMATION TECHNOLOGY
INDEX
Sr.
Title Date Sign
No.
Introduction to Computers:
1. o Identifying internal and external parts, input/output
peripherals, hardware ports and connectors.
CERTIFICATE
work in Month of ________________________ for the term ending in 2024-25. Number of Practical certified
Date: / /
Signature of Teacher
Introduction of computer compounds
1.Hard disk: -
➢ A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-
mechanical data storage deta storage diviec that stores and retrieves digital
data using magnetic storage with one or more rigid rapidly rotating platters coated with
magnetic material.
➢ The platters are paired with magnetic heads, usually arranged on a moving actuator arm,
which read and write data to the platter surfaces.[1] Data is accessed in a random-
access manner, meaning that individual blocks of data can be stored and retrieved in any
order. HDDs are a type of non-volatile storage, retaining stored data when powered off.
➢ Modern HDDs are typically in the form of a small rectangular box .
➢ Hard disk store different types of data like 216gb,512gb,1tb etc.for avery storag there
diffrent hard disk.
2.Motherbord:-
➢ The motherboard provides the structure for all other components and connects them,
while also providing a way to distribute power, deliver information and connect to
devices such as a printer or mouse.
➢ It controls how data transfers and what type of monitor or screen device to use, for
example. It houses the CPU, memory and secondary storage devices such as hard drives.
➢ The first thing that a computer technician may do to troubleshoot any motherboard issues
is to take the PC apart and inspect all the connections for corrosion.
➢ They may also check the power supply and make sure the computer is receiving
electricity.
3.Ram: -
➢ RAM is where data lives temporarily while it's being actively used by programs, such as
when a user launches a computer application. A technician may know how to identify the
type of RAM in a computer, how to replace it if it's defective and how to diagnose
problems with copying data from one location in memory to another.
➢ A technician should have knowledge about the different RAMs that are available and they
may also know what types of errors might affect a computer's RAM operation. A
technician may backup all computer files before fixing RAM to avoid losing critical
programs and documents.
4.Rom: -
➢ ROM is a type of read only memory that can be erased and reprogrammed repeatedly, up
to 10000 times. It is also known as Flash EEPROM as it is similar to flash memory.
➢ It is erased and reprogrammed electrically without using ultraviolet light. Access time is
between 45 and 200 nanoseconds.
➢ In the chip, the current travels through all possible pathways. The programmer can choose
one particular path for the current by burning unwanted fuses by sending a high voltage
through them.
➢ The user has the opportunity to program it or to add data and instructions as per his
requirement. Due to this reason, it is also known as the user-programmed ROM as a user
can program it.
5.Input device: -
➢ In computing, an input device is a piece of equipment used to provide data and control
signals to an information processing system, such as a computer or information appliance.
Examples of input devices include keyboards, computer mice, scanners, cameras,
joysticks, and microphones.
➢ Ther are many input devices in the picture but main input devices is key bord and mouse
this details are given bellow
(i)Keyboard
➢ A keyboard is a human interface device which is represented as a matrix of buttons. Each
button, or key, can be used to either input an alphanumeric character to a computer, or to
call upon a particular function of the computer. It acts as the main text entry interface for
most users.
➢ There are many types of keyboards but mainly use keyboard is normal keyboard it has
108 keys in keyboard.
(ii) Mouse
➢ A mouse is used to select items on the screen and to give instructions to your computer to
perform tasks. A mouse has at least two buttons, called the left mouse button and the right
mouse button. Most models of mouse also include a scroll wheel which allows you to
easily scroll web pages.
6.Output: -
➢ An output device is any piece of computer hardware that converts information or data into
a human-perceptible form or, historically, into a physical machine-readable form for use
with other non-computerized equipment.
(i) Monitor
➢ A monitor in the context of an output device is a hardware component that displays visual
information from a computer. It renders text, images, and videos for users to interact with.
Monitors come in various types like LCD, LED, and OLED, providing different
resolutions and colour quality.
(ii) Printer
➢ A printer in an output device receives digital data from a computer and converts it into a
physical, readable format, typically on paper. Common printer types include inkjet, laser,
and thermal printers. They are essential for producing hard copies of documents, images,
and reports.
(iii) Speakers
➢ Speakers in output devices convert electrical signals into sound. They are used in
computers, smartphones, and audio systems to play music, speech, or notifications.
Speakers come in various sizes and configurations, including built-in, external, and
wireless models, delivering audio output ranging from basic sound to high-quality
surround systems.
1. ARP : Displays the ARP cache entry for a specific IP address.
2. DIR : Displays directory of files and directories stored on disk.
⮚Output :
1. Diwali:-
Diwali is known as the Festival of Lights, celebrated by Hindus,
Sikhs, Jains, and some Buddhists. It symbolizes the victory of light
over darkness and good over evil. The festival typically involves
lighting oil lamps (diyas), decorating homes, exchanging gifts,
and enjoying festive meals. It usually takes place in October or
November and is marked by fireworks, prayers, and family
gatherings.
The festival lasts for five days, with the main day being the third
day, known as Lakshmi Puja.
2. Ganesh Chaturthi:-
Gender: Male
Age : 18
BOD: 21\01\2007
Adress: krushanagar jay socity street no.2 ,Jamnagar
Collage: Birla vishvkarma Mahavidhalya
Region: India
Religon: Hindu
Branch:Information techonology
Hobby: Reading
Lauguage known : English,Hindi,Gujarati
What is SQL?
SQL stands for structure of queries It is a domain-specific language used for managing and
manipulating relational databases. SQL is essential for interacting with databases, and it provides a
standardized way to perform tasks such as querying data, updating data, inserting data, and deleting
Key Components
Types of DBMS
OUTPUT:-
Commands:-
(1)IPCONFIG
(2)PING:-
(3)TRACERT ROOP:-
IP ADRESS
An IP address, or Internet Protocol address, is an essential element of networking that
permits devices to communicate over the Internet. It works in the following way:
What is an IP address?
An Internet Protocol (IP) address is the unique identifying number assigned to every device
connected to the internet. An IP address definition is a numeric label assigned to devices that
use the internet to communicate.
Purpose of IP Addresses
Identification: Any device connected to a network requires a unique identifier so that
data sent from or received at the correct destination.
Location Addressing: IP addresses allow one to locate different devices within a
network and help in routing data.
Types of IP Addresses
(1). IPv4 (Internet Protocol version 4)
Format: Consists of four decimal values separated by dots, for example, 192.168.0.1.
Structure: Every value is an 8-bit quantity ranging from 0 to 255. Hence, it supports
approximately 4.3 billion distinct addresses.
Classes: The topmost digits of an IP address classifies it into classes: A, B, C, D, E. This
aids in the administration and assignment of these networks.
Public IP Address: An address that is accessible through the Internet. Your Internet
Service Provider (ISP) assigns it and other devices can access it from the Internet.
Private IP Address: Utilizes in a private network. It's not routable through the Internet
and is reserved for inside communication within the networks. Some of the usual
ranges are:
10.0.0.0 to 10.255.255.255
o 172.16.0.0 thru 172.31.255.255
o 192.168.0.0 thru 192.168.255.255
IP Address Security
IP Spoofing: Miscreant's method of sending packets from a False or Spoofed IP
Address. Leads to attacks or unauthorised access.
VPNs can make a public IP address private, so that the privacy and security of the
network increase.
Conclusion
from IPv4 to IPv6, the value and considerations related to IP addressing continue to
increase in value Understanding IP addresses serves as a foundation for working and
managing networks by end users in the enterprise, corporate environments, and
infrastructure supporting the Internet. As the technology continues to evolve, with a
perhaps specific change.
MAC ADDRESS
Local Identification: MAC uses for identification of devices in the same local area
network. They ensure that data packets reach the right device in the network.
Data Link Layer Operations: MAC addresses are used for communication between
different devices within an Ethernet or Wi-Fi network at the Data Link Layer.
Address Resolution Protocol (ARP): To communicate with some other device on the
same network, a device would use ARP to map that target device's IP address into its
MAC address.
1.Windows
Look for the line which says "Default Gateway" under your network connection.
2.macOS
Click on "Network.
Select the "TCP/IP" tab and scroll down to locate the "Router" address; it is your default
gateway.
3.Linux
Open a terminal.
Locate the line that begins with "default via, which points to your default gateway.
Router Interface
Or simply open your web interface to your router to locate the default gateway:
Open up a web browser and type in the IP address of your router (usually 192.168.1.1 or
192.168.0.1).
It sounds like you may be asking about subnetting, or maybe subnet masks. Subnetting is
dividing an overall network into smaller sub-networks to make it easier to manage. This is a
general overview of subnet masks and how they function:
Subnet Mask
A subnet mask determines which part of an IP address is the network part and which is the
host part. It often comes in two forms: decimal, such as 255.255.255.0, and CIDR notation,
such as /24.
HTTPS:-
HTTPS is the abbreviated form of Hypertext Transfer Protocol Secure. It is an HTTP extension
used to secure data transfer over a computer network, primarily the internet. The key
features of HTTPS are as follows:
1.Encryption: HTTPS encrypts the information exchanged between the user's browser and
the web server. That makes it difficult for those who should not to intercept or read the
information transmitted - like passwords, credit card numbers, and personal details.
2.Data Integrity: Guarantees that data is sent and received without alterations or
modifications in the course of transmission so that the integrity of the information would be
preserved.
2. Handshake Process:
The client (browser) initiates a request for a secure link with the server.
The server then responds with its digital certificate that contains the server's public key
The client verifies the certificate with the trusted Certificate Authorities (CAs).
If verified, the client and server generate a shared session key, which they will use for
encryption to establish a secure sessior
3. Secure Messaging: Once the secure connection is established then data is sent over the
web securely.
FDP
This appears to be a question related to "FDP." The meaning of such an abbreviation could
be different depending on the context. Here are just a few examples:
1.FDP (Federal Democratic Party): A political party in some countries that often supports
democratic governance and federalism.
2. FDP (Functional Data Processing): This is used in the field of information technology and
refers to methods of handling and processing data.
3. FDP (Finance and Development Planning): This sometimes refers to an economic planning
and management framework.
4.FDP (Freie Demokratische Partei): Free Democratic Party is a liberal political party in
Germany.