Pdf24 Merged (4)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

Lab Manual

Of

IT ESSENTIALS WORKSHOP
Subject Code: 114ES

AY: 2024-25, Semester-I

Name of Student :dddd


ID No. : ddddd
Semester :
Batch :
Faculty Name :

BACHELOR OF ENGINEERING
in
INFORMATION TECHNOLOGY

Birla Vishvakarma Mahavidyalaya Engineering College


(An Autonomous Institution)
Vallabh Vidhyanagar-388120
BIRLA VISHVAKARMA MAHAVIDYALAYA
ENGINEERING COLLEGE
(An Autonomous Institution)
Information Technology Department
AY: 2024-25, Semester-1

INDEX
Sr.
Title Date Sign
No.
Introduction to Computers:
1. o Identifying internal and external parts, input/output
peripherals, hardware ports and connectors.

Introduction to Operating Systems


o Understanding system settings in Linux and
2. Windows. Simple system administration in Linux and
Windows (e.g., user creation, network setting).
o Understanding BIOS settings.

Basic IT Troubleshooting, Email and Communication:


o Basics and Installation of operating system, concept
of dual booting.
3. o Diagnosing and solving common hardware and
software issues and understanding of device drivers.
o Setting up and managing email accounts,
understanding netiquette

Word & Spreadsheet Basics :


4. o Introduction to word processing software like
Microsoft Word/ Google Docs, Microsoft Excel/
Google Sheets
Introduction to Programming:
5. o Basics of programming logic, understanding
variables, and simple coding exercises.
Cybersecurity Awareness:
o Basics of online security, recognizing phishing
6. attempts, and protecting personal information.
o Understanding of malware, viruses, protection
aspects, firewalls, Ethical Hacking etc.
Basic Networking:
7. o Understanding networks, IP addresses, MAC
Address
o Basic network troubleshooting.
Introduction to Cloud Computing:
8. o Understanding cloud services and storage, using
cloud-based applications.
Introduction to Databases:
9. o Basics of database management systems and SQL
queries.
No-Code Website Design:
10. o Design simple website without code (Google Sites
or Wix )
BIRLA VISHVAKARMA MAHAVIDYALAYA
ENGINEERING COLLEGE
(An Autonomous Institution)
Information Technology Department
AY: 2024-25, Semester-I

CERTIFICATE

This is to certify that Mr. / Mrs. ____________________________________________________ of

Class/Sem. ____________ ID No________________________ has satisfactorily completed his/her term

work in Month of ________________________ for the term ending in 2024-25. Number of Practical certified

________________ out of ____________ in the subject of 114ES: IT ESSENTIALS WORKSHOP.

Date: / /

Signature of Teacher
Introduction of computer compounds

1.Hard disk: -

➢ A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-
mechanical data storage deta storage diviec that stores and retrieves digital
data using magnetic storage with one or more rigid rapidly rotating platters coated with
magnetic material.
➢ The platters are paired with magnetic heads, usually arranged on a moving actuator arm,
which read and write data to the platter surfaces.[1] Data is accessed in a random-
access manner, meaning that individual blocks of data can be stored and retrieved in any
order. HDDs are a type of non-volatile storage, retaining stored data when powered off.
➢ Modern HDDs are typically in the form of a small rectangular box .
➢ Hard disk store different types of data like 216gb,512gb,1tb etc.for avery storag there
diffrent hard disk.
2.Motherbord:-

➢ The motherboard provides the structure for all other components and connects them,
while also providing a way to distribute power, deliver information and connect to
devices such as a printer or mouse.
➢ It controls how data transfers and what type of monitor or screen device to use, for
example. It houses the CPU, memory and secondary storage devices such as hard drives.
➢ The first thing that a computer technician may do to troubleshoot any motherboard issues
is to take the PC apart and inspect all the connections for corrosion.
➢ They may also check the power supply and make sure the computer is receiving
electricity.
3.Ram: -

➢ RAM is where data lives temporarily while it's being actively used by programs, such as
when a user launches a computer application. A technician may know how to identify the
type of RAM in a computer, how to replace it if it's defective and how to diagnose
problems with copying data from one location in memory to another.
➢ A technician should have knowledge about the different RAMs that are available and they
may also know what types of errors might affect a computer's RAM operation. A
technician may backup all computer files before fixing RAM to avoid losing critical
programs and documents.
4.Rom: -

➢ ROM is a type of read only memory that can be erased and reprogrammed repeatedly, up
to 10000 times. It is also known as Flash EEPROM as it is similar to flash memory.
➢ It is erased and reprogrammed electrically without using ultraviolet light. Access time is
between 45 and 200 nanoseconds.
➢ In the chip, the current travels through all possible pathways. The programmer can choose
one particular path for the current by burning unwanted fuses by sending a high voltage
through them.
➢ The user has the opportunity to program it or to add data and instructions as per his
requirement. Due to this reason, it is also known as the user-programmed ROM as a user
can program it.
5.Input device: -

➢ In computing, an input device is a piece of equipment used to provide data and control
signals to an information processing system, such as a computer or information appliance.
Examples of input devices include keyboards, computer mice, scanners, cameras,
joysticks, and microphones.
➢ Ther are many input devices in the picture but main input devices is key bord and mouse
this details are given bellow

(i)Keyboard
➢ A keyboard is a human interface device which is represented as a matrix of buttons. Each
button, or key, can be used to either input an alphanumeric character to a computer, or to
call upon a particular function of the computer. It acts as the main text entry interface for
most users.
➢ There are many types of keyboards but mainly use keyboard is normal keyboard it has
108 keys in keyboard.

(ii) Mouse
➢ A mouse is used to select items on the screen and to give instructions to your computer to
perform tasks. A mouse has at least two buttons, called the left mouse button and the right
mouse button. Most models of mouse also include a scroll wheel which allows you to
easily scroll web pages.
6.Output: -

➢ An output device is any piece of computer hardware that converts information or data into
a human-perceptible form or, historically, into a physical machine-readable form for use
with other non-computerized equipment.

(i) Monitor
➢ A monitor in the context of an output device is a hardware component that displays visual
information from a computer. It renders text, images, and videos for users to interact with.
Monitors come in various types like LCD, LED, and OLED, providing different
resolutions and colour quality.

(ii) Printer
➢ A printer in an output device receives digital data from a computer and converts it into a
physical, readable format, typically on paper. Common printer types include inkjet, laser,
and thermal printers. They are essential for producing hard copies of documents, images,
and reports.

(iii) Speakers
➢ Speakers in output devices convert electrical signals into sound. They are used in
computers, smartphones, and audio systems to play music, speech, or notifications.
Speakers come in various sizes and configurations, including built-in, external, and
wireless models, delivering audio output ranging from basic sound to high-quality
surround systems.
1. ARP : Displays the ARP cache entry for a specific IP address.
2. DIR : Displays directory of files and directories stored on disk.

3. CHCP : Display the number of active console code page.


4. GPRESULT : Display group policy settings and resultant set of policy for a user.

5. DATE : Display / change system date.


♦ Program to find of the two number

⮚Output :

❖ Swap the teo number


⮚Output:
FESTIVAL OF INDIA

A festival is a special event or celebration, often marked by rituals, festivities, and


gatherings. It typically honors a cultural, religious, or seasonal theme and can
involve music, dance, food, and various activities that bring people together in
joy and community spirit. Festivals are a way to express traditions and celebrate
important occasions.

➢ Here are some Indian festivals:


1. Diwali
2. Holi
3. Durga Puja
4. Navratri
5. Ganesh Chaturthi
6. Pongal
7. Onam
8. Makar Sankranti
9. Baisakhi
10. Raksha Bandhan
11. Christmas
12. Janmashtami
Etc….
Diwali and Ganesh Chaturthi are my favourite festival.

1. Diwali:-
Diwali is known as the Festival of Lights, celebrated by Hindus,
Sikhs, Jains, and some Buddhists. It symbolizes the victory of light
over darkness and good over evil. The festival typically involves
lighting oil lamps (diyas), decorating homes, exchanging gifts,
and enjoying festive meals. It usually takes place in October or
November and is marked by fireworks, prayers, and family
gatherings.

People exchange gifts and sweets, and many perform rituals to


honor Lakshmi, the goddess of wealth and prosperity.

The festival lasts for five days, with the main day being the third
day, known as Lakshmi Puja.
2. Ganesh Chaturthi:-

Ganesh Chaturthi is a Hindu festival celebrating the birth of


Lord Ganesha, the elephant-headed god of wisdom,
prosperity, and good fortune. Typically observed in August or
September, the festival lasts for ten days, with the main
celebrations occurring on the first day.

People bring home beautifully crafted Ganesha idols,


decorate them, and offer prayers, sweets, and flowers.
Community processions and public celebrations are common,
featuring music, dance, and cultural events. On the final day,
known as Anant Chaturdashi, the idols are immersed in water
bodies, symbolizing the cycle of creation and dissolution.

Ganesh Chaturthi fosters a sense of unity and devotion among


participants, making it a vibrant and joyous occasion.
Name: Kateshiya Shyam Hematbhai

Gender: Male
Age : 18
BOD: 21\01\2007
Adress: krushanagar jay socity street no.2 ,Jamnagar
Collage: Birla vishvkarma Mahavidhalya
Region: India
Religon: Hindu
Branch:Information techonology
Hobby: Reading
Lauguage known : English,Hindi,Gujarati
What is SQL?

SQL stands for structure of queries It is a domain-specific language used for managing and

manipulating relational databases. SQL is essential for interacting with databases, and it provides a

standardized way to perform tasks such as querying data, updating data, inserting data, and deleting

data in a relational database management system (RDBMS).

Key Components

1. Database: A structured collection of data.


2. DBMS: Software that interacts with the database, applications, and users to capture and analyze
data.
3. SQL (Structured Query Language): A standard language for querying and manipulating
databases.

Types of DBMS

1. Hierarchical DBMS: Data is organized in a tree-like structure.


2. Network DBMS: More flexible than hierarchical; allows multiple relationships between data
entities.
3. Relational DBMS: Data is stored in tables (relations); SQL is commonly used. Examples include
MySQL, PostgreSQL, and Oracle.
4. Object-oriented DBMS: Stores data in the form of objects, similar to object-oriented
programming.
DATABASE PROGRAM
INPUT:-

OUTPUT:-
Commands:-

(1)IPCONFIG

(2)PING:-
(3)TRACERT ROOP:-
IP ADRESS
 An IP address, or Internet Protocol address, is an essential element of networking that
permits devices to communicate over the Internet. It works in the following way:
 What is an IP address?

 An Internet Protocol (IP) address is the unique identifying number assigned to every device
connected to the internet. An IP address definition is a numeric label assigned to devices that
use the internet to communicate.

 Purpose of IP Addresses
 Identification: Any device connected to a network requires a unique identifier so that
data sent from or received at the correct destination.
 Location Addressing: IP addresses allow one to locate different devices within a
network and help in routing data.

 Types of IP Addresses
 (1). IPv4 (Internet Protocol version 4)
 Format: Consists of four decimal values separated by dots, for example, 192.168.0.1.
 Structure: Every value is an 8-bit quantity ranging from 0 to 255. Hence, it supports
approximately 4.3 billion distinct addresses.
 Classes: The topmost digits of an IP address classifies it into classes: A, B, C, D, E. This
aids in the administration and assignment of these networks.

 (2). IPv6 (Internet Protocol version 6)


 Format: It uses eight groups of four hexadecimal digits separated by colons, for
example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334.
 Capacity: Supports about 340 undecillion unique addresses (3.4 x 10^38), thus
overcome the limitations of IPv4.
 Features: Includes auto-configuration and other enhanced security protocols.
 Static vs Dynamic IP Addresses
 Static IP Address: Assingment to a device is permanent, not changing. Commonly
used in servers or devices that need to stay connected all the time for
communication. Can be used for services such as the internet and web and email.
 Dynamic IP Address: An IP assigned temporally by a DHCP server. Since such
addresses change over time, then they are normally changed when a device
reconnects to the network.

 Public vs. Private IP Address

 Public IP Address: An address that is accessible through the Internet. Your Internet
Service Provider (ISP) assigns it and other devices can access it from the Internet.
 Private IP Address: Utilizes in a private network. It's not routable through the Internet
and is reserved for inside communication within the networks. Some of the usual
ranges are:
 10.0.0.0 to 10.255.255.255
o 172.16.0.0 thru 172.31.255.255
o 192.168.0.0 thru 192.168.255.255

 How IP Addresses Work


 Packet Switching: Any data over the Internet is divided into packets. Every packet
contains the destination IP address, that routers use to route the packet to its
destination.
 Routing: Routers inspect the destination IP address of incoming packets, and decide
the best course to take them based on the routing tables.
 IP Address Assignment
 IANA: Global management of IP address allocation
o Regional Registries: Regional Registries aids in the distribution of IP addresses
to ISPs, organizations for example, ARIN, RIPE NCC

 IP Address Security
 IP Spoofing: Miscreant's method of sending packets from a False or Spoofed IP
Address. Leads to attacks or unauthorised access.
 VPNs can make a public IP address private, so that the privacy and security of the
network increase.

 Conclusion
 from IPv4 to IPv6, the value and considerations related to IP addressing continue to
increase in value Understanding IP addresses serves as a foundation for working and
managing networks by end users in the enterprise, corporate environments, and
infrastructure supporting the Internet. As the technology continues to evolve, with a
perhaps specific change.
MAC ADDRESS

 A MAC address is a unique identifier assigned to network interfaces for


communications on a physical network segment. It exists at the Data Link Layer (Layer
2) of the OSI model, thus being an essential tool in communication between two
devices at a local network level.

 Format of a MAC Address


 Format: A MAC address typically consists of six pairs of hexadecimal digits separated
by colons, hyphens, or dots. For example: `00:1A:2B:3C:4D:5E`.
 Length: It is 48 bits long (6 bytes) and has each hexadecimal digit represent four bits
in length, which makes a total of \\(2^{48}\\) possible addresses although some of
those are reserved.
 Components
 OUI: The first three octets consist of 24 bits that identify who manufactured the
network interface card. This component is assigned by the IEEE.Network Interface
Controller Specific (NIC Specific): Manufacturers assign the last three octets. In this
manner, manufacturers will devise unique addresses for their device.Functions of
MAC Address

 Local Identification: MAC uses for identification of devices in the same local area
network. They ensure that data packets reach the right device in the network.
 Data Link Layer Operations: MAC addresses are used for communication between
different devices within an Ethernet or Wi-Fi network at the Data Link Layer.
 Address Resolution Protocol (ARP): To communicate with some other device on the
same network, a device would use ARP to map that target device's IP address into its
MAC address.

 Types of MAC Addresse


 Unicast: an address that identifies a single network interface. This is the most
typically used to access a device in the context of a point-to-point communication
between devices.
 Multicast: an address that identifies group of devices. The packets that get
transmitted to the multicast address receive at all devices belonging to that group.
 Broadcast: special address (`FF:FF:FF:FF:FF:FF`) receives all the devices on the local
network segment.
 Key Considerations
 Static vs. Dynamic: MAC addresses are generally static, assigned by a manufacturer to
the hardware itself. At times, these can be spoofed or changed using software.
 Privacy: MAC addresses can be used to track devices. Hence, in public spaces such as
Wi-Fi, there are privacy concerns. Most modern devices support MAC address
randomization to improve user privacy.
 Layer 2 Protocols: Whereas MACs are necessary for direct Layer 2 communication,
they cannot be routed over the internet. I must utilize IP addresses; this is at Layer 3
and refers to the packet routing between the different networks.
 Conclusion
 In summary, the MAC address is a very important number for network
communication and can be thought of as a distinct number assigned to devices to
uniquely identify them inside a local network. Having knowledge about how MAC
addresses work helps individuals understand the path that data takes and how it is
received in both the wired and wireless environment.
DEFAULT GETWAY
It appears you want to know about the default gateway. A default gateway is the device that
routes traffic from your local network to other networks such as the Internet. Here's how
you can find the default gateway on different systems,

1.Windows

Open Command Prompt by simply typing cmd in the search bar.

Type ipconfig then press Enter.

Look for the line which says "Default Gateway" under your network connection.

2.macOS

Open System Preferences.

Click on "Network.

Select your network connection and select "Advanced."

Select the "TCP/IP" tab and scroll down to locate the "Router" address; it is your default
gateway.

3.Linux

Open a terminal.

Type ip route and press Enter.

Locate the line that begins with "default via, which points to your default gateway.

Router Interface

Or simply open your web interface to your router to locate the default gateway:

Open up a web browser and type in the IP address of your router (usually 192.168.1.1 or
192.168.0.1).

Log in with your admin username/password,

Go to LAN and find the piece on default gateway

If you have any questions at all or want more info.


SUBNET PASS

It sounds like you may be asking about subnetting, or maybe subnet masks. Subnetting is
dividing an overall network into smaller sub-networks to make it easier to manage. This is a
general overview of subnet masks and how they function:

Subnet Mask

A subnet mask determines which part of an IP address is the network part and which is the
host part. It often comes in two forms: decimal, such as 255.255.255.0, and CIDR notation,
such as /24.

1. Common Subnet Masks

/8 (255.0.0.0): Supports 16,777,216 hosts

/16 (255.255.0.0): Supports 65,536 hosts

/24 (255.255.255.0): Supports 256 hosts

/30 (255.255.255.252): Supports 2 hosts point-to-point links.


INFORMATION ABOUT PROTOCAL

HTTPS:-
HTTPS is the abbreviated form of Hypertext Transfer Protocol Secure. It is an HTTP extension
used to secure data transfer over a computer network, primarily the internet. The key
features of HTTPS are as follows:

Key Features of HTTPS:

1.Encryption: HTTPS encrypts the information exchanged between the user's browser and
the web server. That makes it difficult for those who should not to intercept or read the
information transmitted - like passwords, credit card numbers, and personal details.

2.Data Integrity: Guarantees that data is sent and received without alterations or
modifications in the course of transmission so that the integrity of the information would be
preserved.

3. Authentication: It authenticates whether the accessed website is legitimate or not. This


avoids man-in-the-middle attacks by someone who would want to intercept or impersonate
the communication between a user and the intended website.

How HTTPS Works


1. SSL/TLS Protocols: For establishing a secure connection, HTTPS employs SSL or TLS, which
is a protocol, between the browser and the server.

2. Handshake Process:

The client (browser) initiates a request for a secure link with the server.

The server then responds with its digital certificate that contains the server's public key

The client verifies the certificate with the trusted Certificate Authorities (CAs).

If verified, the client and server generate a shared session key, which they will use for
encryption to establish a secure sessior

3. Secure Messaging: Once the secure connection is established then data is sent over the
web securely.
FDP
This appears to be a question related to "FDP." The meaning of such an abbreviation could
be different depending on the context. Here are just a few examples:

1.FDP (Federal Democratic Party): A political party in some countries that often supports
democratic governance and federalism.

2. FDP (Functional Data Processing): This is used in the field of information technology and
refers to methods of handling and processing data.

3. FDP (Finance and Development Planning): This sometimes refers to an economic planning
and management framework.

4.FDP (Freie Demokratische Partei): Free Democratic Party is a liberal political party in
Germany.

You might also like