Friday, November 7, 2014

Selection of Topic


Blogging



Communication Cycle


Benefits of students blogging


Blogging


What is a Blog?

A blog is a personal website that contains content organized like a journal or a diary. Each entry is dated, and the entries are displayed on the web page in reverse chronological order, so that the most recent entry is posted at the top. Readers catch up with blogs by starting at the top and reading down until they encounter material they’re already read.

Tuesday, April 8, 2014

WINDOWS EXPLORER



TOPIC                        : WINDOWS EXPLORER
Most Computers in the market today have hard disks with capacities of several Gigabytes.
v   But how is all this information stored internally?
v  And more importantly how do you find what you   need from all the information that is stored?
 Let us answer these questions one by one…

All information in computers is stored in files. Every file has Unique name that helps you to identify it. A file name is made up of two components.
Main component
Extension
Main Component:
            * The first part of the file name is the main component. This part precedes the dot and is also called the primary name.
            * The main Component can contain alphabets, numbers, spaces, and other characters like @,$,!,{,(,),[,].
            * A few character s that a file name cannot contain.
They are: \,/,*,?,”,<,>.
2.Extension:
            * This is the second part of the file name.
            * The extension is used to identify the type of the file and is normally up to three to four characters long.
            * Some examples of file extensions are .DOC, .XLS and .java.
WINDOWS EXPLORER:
            * Windows Explorer is a program that helps you to manage your files and folders.
            * To start Windows Explorer, click on
            * You can also start Windows Explorer by right clicking on the start button and then selecting Explorer from the short cut menu.
WORKING WITH THE FOLDER:
            * A small yellow icon represents each folder.
            * A plus sign(+) to the left of the folder icon in Folder Bar indicates the presence of subfolders within this folder.
            * You can see + or – sign only in the Folder Bar.You can click on the plus sign to display a list of the subfolders.
CREATING A NEW FOLDER:
            * Clicking Make a New Folder under File and Folder Task in the Explorer Bar. It will create a new folder in the right pane.
            * You can enter the name that you have chosen for the folder in the highlighted box and then press Enter.
            * First, select the folder under which you want to create the new folder. Then right click anywhere in the empty space in the right pane of the Explorer Window. Click on New from the menu shortcut select Folder from the submenu that appears.
            * You can also obtain same result from the menu bar by clicking File->New->Folder.
CHANGING THE VIEW
            * Windows Explorer allows you to change the way in which information is displayed in the right pane.
            * You can display the list of files and folders using any of the following views.
                        1. Icon View
                        2. Tiles view
                        3. Thumbnails view
                        4.Filmstrip view
                        5. List view
                        6. Details view
            * You click View in the Menu bar or click View button in the Explorer bar.
ICON VIEW:
            * The icon view shows each file and folders icon and its name.
            * This view will not provide any more detail.
TILES VIEW:
            * In this view, the icons are little bigger.
            * In addition icon and its name, this view provides some more additional information for some icons.
THUMBNAILS VIEW:
            * The Thumbnails view works well in folders that contain pictures.
            * Document that contain pictures are not shown as icons but they are displayed as minimized pictures.
FILMSTRIP VIEW:
            * This view is available only in folders that contain pictures such as My Pictures Folder. This view is similar to the Thumbnails view.
            * When you click or point to a picture, an enlarged copy of the picture appears in previous area.
LIST VIEW:
            * This view retains the small icons but displays the files and folders one below the other in columns.
DETAILS VIEW:
            * This view displays details like file size, type, last modified data and time along with file names and small icons.
            * If you cannot find all the information use the scrollbar available in the view.
SELECTING  FILES  AND  FOLDERS:
            * Selecting one file or Folder is very simple. Just click on the File or Folder and it get highlighted.
            * If you want to select more than one folder ,you can do so in any one of the following ways:
1.If the Files or Folders to be selected appear consecutively on the screen then, click on the first File or Folder and point the mouse pointer to the last file or folder in the list hold the shift key down and click.
2.If the Files or Folders to be selected are not displayed consecutively, then click on the first file ,move the mouse pointer to the second file to be selected and click while holding the Ctrl key down.
MOVING FILES AND FOLDERS:
            * If you want to move the selected items then, click on Move the selected items. You will be provided with Move Items list box. You can browse and select the desired destination.
            * Click Move button adjacent to Make New Folder button to store the selected items in the newly created folder.
COPYING FILES AND FOLDERS:
            * Once the files are selected , you can move or copy them using Cut, Copy, and Paste in three different ways.
                        1. Click on the Edit menu and make appropriate choice.
                        2. Right click on any one of the selected folders or files, in the ensuing short cut menu and make suitable selection.
                        3. you can use the keyboard combinations Ctrl + X to cut, Ctrl+C to copy and Ctrl+V to paste.
COPYING FILES TO CDs:
            * Copying files to a CD is often referred to as burning the CD.
General methods for copying Cd:
1.If the dialog box not appear on the screen within a few seconds of inserting the blank disk, open your My Computer Folder. Then right click the drive’s icon and choose Open.
2.Go to the source folder.
3.Select items you want to copy to the cd. Right click any selected items and choose send to a
CD-RW Drive.
4.Each item to be copied will appear as a temporary file.
5.Check whether all files that you want to copy are there. Then click write these files to the CD under CD Writing Tasks in the Explorer bar of the CD’s folder Window.
6.In the first page of CD writing wizard, you can enter a new name for CD.
7.Wait until the wizard burns the data to the CD. Then click Finish button on the last page of the CD Burning Wizard.
RENAMING THE FILES AND FOLDERS:
            * To Rename the file or folder, right click on the file or folder. Select Rename from the Shortcut list, then give the name.
            * From the menu bar, click File-> Rename. Then the name of the selected file gets highlighted. Now type the name and press Enter. Then the name of the file appears in the window.
DELETING FILES AND FOLDERS:
            * Windows Explorer uses a special folder called the Recycle bin to hold deleted files.
            * To delete files, first select them. Then right click on the files and the shortcut menu appears. Select Delete from the shortcut menu and the files will get deleted.
            3.If you do not want to send the deleted items to the Recycle Bin, Shift +  Delete key combination will achieve your goal.


Problem Solving Techniques in C Programming by Jeyapappu

Unit II - Computer Virus & Network Communication



Computer Virus
What is computer virus?
v  It is a parasitic program that infects another legitimate program which is called the host.
v  Computer virus refers to a   program which damages computer systems and/or destroys or erases data files
Important Characteristic of  computer virus is its ability to replicate itself
Computer Virus spreads in the following ways
      Downloading an infected file to your computer
      Receiving an infected disk from another user
      Copying an infected file
What can a virus do?
      It can annoy their victims rather than cause specific damage. They are described as benign.
        Causes damage to computer system if permitted to run.
Computer Viruses are programs that are created for the following purposes. They are:
q  Copy themselves to other programs or areas of disk
q  Replicate rapidly and frequently
q  Display information in the screen
q  Modify, Corrupt or destroy selected files
q  Erase the contents of entire disk
q  Lie dormant for a specified time or until a given condition is met and then becomes active
Types of Computer Virus
      Bimodal, Bipartite or Multipartitie Virus
      Logical Bombs
      Time Bombs
      Boot sector Virus
      Cluster Viruses
      Joke Programs
      Stealth Virus
      Script Virus
      Trojan Horses
      Worm
      Macro Viruses
      Script Virus
      Polymorphic Virus
Bimodal, Bipartite, Multipartite Virus
This typeof virus can infect both files and boot sector of a disk.
Time Bomb
A time bomb is a virus program that performs an activity on a particular date .It hides on a victim’s disk and waits until a specific date before running
Logical Bomb
           A logical bomb is a destructive program that performs an activity when a certain action has occurred. It may be activated by a date, a change to a file or a particular action taken by a user or a program
Worm Virus
A worm is also a destructive program that fills a computer system with self-replicating information. Effective worm copies itself and takes up as much space as possible in the Host’s memory . Worms are commonly spread over Internet .
Boot Sector Virus
      A boot sector virus infects boot sector of computers. During system boot, boot sector virus is loaded into main memory and destroys data stored in hard disk . When the computer is started the virus copies itself into memory where it hides and infects other disks .
  Cluster virus
 This type of virus makes changes to a disk’s file system. If any program is run from the infected disk, the program causes virus to run . This causes illusion that the virus has infected every program on the disk.
Joke Programs
       These are not viruses and do not inflict any damage . Their purpose is to frighten their victims into thinking that a virus has infected and damaged their system. For example a joke program can display a message warning to the user not to touch any keys or the computer’s hard disk will be formatted.
Macro Virus
A macro virus is associated with application software like word and excel. When opening the infected document, macro virus is loaded into main memory and destroys the data stored in hard disk .
Script Virus
Commonly found script viruses are written using the Visual Basic Scripting edition (VBS) and the JavaScript programming languages .

Trojan Horses
Trojan Horse is a destructive program. It usually pretends as computer games or application software. If executed, computer system will be damaged.Trojan Horse usually comes with monitoring tools and key loggers
Polymorphic Virus
This can change itself each time it is copied, making it difficult to isolate .
Stealth Virus
          This virus takes up residence in Computer memory, making it hard to detect.
Antivirus Softwares:
In order to protect our computer systems from the danger of virus infection, we can follow certain precautionary measures as well as some remedial measures. These measures include the use of certain softwares called Antivirus Softwares to protect our files from being infected by computer viruses.
         Antivirus Software is a software that scans computer memory and disks for known viruses and eradicates them. A good Antivirus Program checks for infected files automatically every time you insert any kind of disk or download a file via network or internet connection . It can also scan email messages and attached files . Sophisticated Virus scanners can also alert you if a web page attempts to load suspicious code onto your PC.
Some of the  Popular Anti virus Programs are :
»          McAfee Antivirus
»        Norton Antivirus
»        Virex
»        PC-cillin
»        Avast .
»        Kaspersky Anitvirus.
Actions to prevent virus infection:
v  Always update your anti-virus software at least weekly.
v  Back up your important files and ensure that they can be restored.
v  Change the computer's boot sequence to always start the PC from its hard drive
v  Don't share Drive C: without a password and without read-only restrictions.
v  Empty floppy drives of diskettes before turning on computers, especially laptops.
v  Forget opening unexpected e-mail attachments, even if they're from friends
v  Get trained on your computer's anti-virus software and use it.
v  Have multiple backups of important files. This lowers the chance that all are infected.
v  Install security updates for your operating system and programs as soon as possible.
v  Jump at the chance to learn more about your computer. This will help you spot viruses.

                                                Network Communication
Communication System:
Process describing transfer of information, data, instructions between one or more systems through some media
   Examples
n  people, computers, cell phones, etc.
n  Computer communication systems
Signals passing through the communication channel can be Digital, or analog
n  Analog signals: continuous electrical waves
n  Digital signals: individual electrical pulses (bits)

Communication Model:

 



Characteristics of Communication:
*      must have a Sender and  Receiver
*      A protocol is a set of rules which governs the transfer of data between computers. Protocols allow communication between computers and networks.
*      Handshaking is used to establish which protocols to use. Handshaking controls the flow of data between computers
*      protocols will determine the speed of transmission, error checking method, size of bytes, and whether synchronous or asynchronous
Communication Software:
n  Hypertext Transfer Protocol (HTTP): A client/server application that uses TCP for transport to retrieve HTML pages.
n  Domain Name Service (DNS): A name-to-address translation application that uses both TCP and UDP transport.
n  Telnet: A virtual terminal application that uses TCP for transport.
n  File Transport Protocol (FTP): A file transfer application that uses TCP for transport.
n  Trivial File Transfer Protocol (TFTP): A file transfer application that uses UDP for transport.
n  Network Time Protocol (NTP): An application that synchronizes time with a time source and uses UDP for transport.
n  Border Gateway Protocol (BGP): An exterior gateway routing protocol that uses TCP for transport. BGP is used to exchange routing information for the Internet and is the protocol used between service providers.
Communication Hardware:
Any type of hardware capable of transmitting data, instructions, and information between devices
Examples:
Dial-up modem: uses standard phone lines
ISDN and DSL Modem: Allows digital communication between networks and computers
Cable modem: a modem that transmits and receives data over the cable television (CATV) network
Network interface cards: Adaptor cards residing in the computer to transmit and receive data over the network (NIC) (e.g., Ethernet)
Physical Transmission Media:
A tangible media
n    Examples: Twisted-pair cable, coaxial cable, Fiber-optics, etc.
Twisted-pair cable:
n    One or more twisted wires bundled together (why?)
n    Made of copper
Coax-Cable:
n    Consists of single copper wire surrounded by three layers of insulating and metal materials
n    Typically used for cable TV
Fiber-optics:
n    Strands of glass or plastic used to transmit light
n    Very high capacity, low noise, small size, less suitable to natural disturbances
Networks:
n  Collection of computers and devices connected together
n  Used to transfer information or files, share resources, etc.
n  What is the largest network?
n  Characterized based on their geographical coverage, speed, capacities
n  Networks are categorized based on the following characteristics:
n  Network coverage: LAN, MAN, WAN
n  Network topologies: how the computers are connected together
n  Network technologies
n  Network architecture
LAN:
            Local Area Network is a group of computers connected within a building or a campus (Example: computers located on a single floor or a building or it might link all the computers in a small company. 

MAN:
Metropolitan Area Network – a backbone that connects LANs in a metropolitan area such as a city and handles the bulk of communications activity across that region.  




WAN:
Wide Area Network  covers a large geographical area such as a city or country.  Communication channels include telephone lines, Microwave, satellites, etc.




 Bus Topology :


Star Topology :

Ring Topology :