G H RAISONI UNIVERSITY,
AMRAVATI
Course: Computer Fundamental
and Troubleshooting
Course Code: UNCSPR104
Semester/Branch: II SEM, FIRST YEAR
B. Tech CSE
Semester / Branch:
II SEM, FIRST YEAR B. TECH.
Department of First Year Engineering
G H RAISONI UNIVERSITY, AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G. H. RAISONI UNIVERSITY, AMRAVATI
Department of First Year Engineering
LIST OF PRACTICALS
Sr.
Title of Practical
No
1. To identify the peripherals of a computer, components in a CPU and its functions.
2. Assembling and Disassembling of different parts of computers.
3. To study of different kinds of network cables and network devices.
4. To connect and configure computer in LAN.
To execute of different Networking commands (like ping, ssh, ifconfig, scp,
5. netstat, ipstat,
nslookup, traceroute, telnet, host, ftp, arp, wget,route.)
6. Install MS windows operating system on the personal computer.
7. Install Linux operating system on the personal computer.
8. To detect and solve computer problem using Hardware Troubleshooting
9. To detect and solve computer problem using Software Troubleshooting
To explore and Analysis the Security Vulnerabilities for hacking a websites /
10. WebApplications, E-commerce services, Web Browser, Antivirus installation,
malware, configuring a firewall and cyber laws etc.
11. Open Ended: Email creation and usage, Creating digital Profile on LinkedIn.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 01.
Title/ Aim To identify the peripherals of a computer, components in a CPU and its
functions.
1. Cabinet
It is used to install all hardware devices like(mother board, SMPS,
HDD,CD ROM, FDD).
2. Monitor
Program
It has Start, Restart Button, Led’s, Audio and USB Connecters are
available at front side.
Monitor of a computer is like a television screen.
It displays text characters and graphics in colors or in shades of grey.
The monitor is also called as screen or display or CRT (cathode ray
tube). In the monitor the screen will be displayed in pixels format.
i. 800 by 600 pixels
ii. 1024 by 768 pixels
3. Key Board:
Key board is like a type writer, which contains keys to feed the data or
information into the computer.
Keyboards are available in two modules. These are
iii. standard key board with 83-88 keys
iv. enhanced key board with 104 keys or above
G H RAISONI UNIVERSITY,
AMRAVATI
4. Mouse:
Every mouse has one primary button (left button) and one secondary
button (right button).
The primary button is used to carry out most tasks, where as secondary
button is used in special cases you can select commands and options.
5. Printer
A device that prints images (numbers,alphabets, graphs, etc…) on paper
is known as Printer.There are six types of printers that are : inkjet
printers, laser printers, solid ink printers, continuous ink printers, LED
printers, dot matrix printers and A3 printers.
inkjet printers,
G H RAISONI UNIVERSITY,
AMRAVATI
laser printers,
6. Speakers:
Speakers make your system much more delightful to use entertain you
while you are working on computer.
7. Scanner :
Scanner used to scan images and text
8. System board/Motherboard
This is the major part of the PC hardware
It manages all transactions of data between CPU peripherals.
which holds the Processor, Random Access Memory and other parts, and
has slots for expansion cards It is rectangle shape
G H RAISONI UNIVERSITY,
AMRAVATI
9. Socket 478:
It use 478 – PIN MICROPGA package it is used installing CPU.
It is square type design.
10. CPU (Processor)
The central processing unit contains the heart of any computer, the
processor. The processor is fitted on to a Mother Board. The Mother
Board contains various components, which support the functioning of
a PC.It is brain of the computer. It is square shape.
G H RAISONI UNIVERSITY,
AMRAVATI
11. Ram Slots and Rams:
Ram slots are used to install the rams It is large rectangle shape and
each ending has small clips.
There two type ram slots
SD Ram;-------------Two Gaps
DDR Ram----------One Gap
12. North Bridge:
b. It is also called as controller
c. It converts electronic signals to binary values and
binary values to electronic signals
d. It is near by socket 478
e. It placed middle of the mother board
G H RAISONI UNIVERSITY,
AMRAVATI
13. South Bridge:
It is controls major components mother board and it back bone of the
input out devices.
It is communicates PCI slots, IDE-1, IDE-2, BIOS chip.
It near by CMOS battery
14. CMOS Battery:
Computer is using a coin shape battery
It generates the clock signal and it manage system continues time.
15. Primary & Secondary(IDE-1 & IDE-2) :
It is also called as IDE-1, IDE-2.
It is used to connect Hard Disk Dive.
G H RAISONI UNIVERSITY,
AMRAVATI
16. BIOS Chip :
BIOS controls how the operating system and hardware wok together
BIOS identification is BIOS name is available on chip or mother board.
17. ATX Power connecter:
ATX power connecter is used to connect ATX power plug( This is from
SMPS).
ATX Power connecter has 20/24 pins available.
It is white color and it has ATX name is available on Mother Board.
18. AGP Slot & AGP Card :
AGP Slot is used install the AGP card.
AGP back view same as VGA port(15-female pins) and used to
connecting the monitors.
This slot is above PCI slots and its color is Black or Brown.
G H RAISONI UNIVERSITY,
AMRAVATI
19. Input & Output ports :
IO ports are used to connecting IO device such as key boards, mouse,
monitor, printer, scanner, speakers etc.
20. CI Slots &PCI(Expansion) Cards :
PCI slots are used to install the PCI cards such as
LAN (Ethernet) Card--- Back view Ethernet
port
Sound Card- Back view Audio pin connectors)
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
21. Bus Cables or Data cables :
A Bus is a collection of wires through which data is transmitted from
one device to another device cables are two types IDE cable : it used
to connect HDD, CD ROM, DVD ROM FDD cable: it used to connect
FDD (braking or manufacture defecting)
22. Hard Disk Drive:
The hard disk drive is the main, and usually largest, data storage device
in a computer.The operating system, software titles and most other files
are stored in the hard disk drive.
G H RAISONI UNIVERSITY,
AMRAVATI
23.SMPS:
A switched-mode power supply (SMPS), also known as a switching- mode power sup
Conclusion In this way, we successfully performed identification of peripherals of a
computer, components in a CPU and its functions.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 02.
Title/ Aim Assembling and Disassembling of different parts of computers.
Program Code
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
In this way, we successfully performed Assembling and Disassembling of
Conclusion different parts of computers.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 03.
Title/ Aim To study of different kinds of network cables and network devices.
1. Unshielded Twisted-Pair Cable
Program Code
2. Shielded Twisted-Pair Cable
G H RAISONI UNIVERSITY,
AMRAVATI
3. Coaxial Cable
4. Fibre Optic Cables
G H RAISONI UNIVERSITY,
AMRAVATI
Network Devices
• Repeater • Hub • Switch • Bridge • Router •
Gateway
Repeater
Hub
Switch
G H RAISONI UNIVERSITY,
AMRAVATI
Bridge
Router
G H RAISONI UNIVERSITY,
AMRAVATI
Gateway
In this way, we successfully performed identification of different kinds of
Conclusion network cables and network devices.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 04.
Title/ Aim To connect and configure computer in LAN.
Program Code Setting up the LAN
1. Determine the number of computers you want to connect.
2. Determine your network layout.
3. Obtain the network hardware.
4. Connect your modem to the WAN port on router.
the er.
5. Connect the switch to a LAN port on the
rout
Connecting Your PC
uter.
Find the Ethernet port on your PC. port.
Plug one end of an Ethernet cable into your comp
Plug the other end of the cable into an open LAN
Test out your network (router only).
Enable file and printer sharing.
LAN (Local Area Network) is a data communication
network that locally connects network devices such
as workstations, servers, routers, etc. to share the
resources within a small area such as a building or
campus. Physical or wireless connections are set up
between workstations to share the resources.
Ethernet and Wi-fi are the most important on.
technologies of LAN. Personal networks at home,
school, office, etc. are examples of LAN. These are
generally privately-owned networks.
d.
Requirements to set up LAN Network:
Workstation/Personal devices: laptop,
computer, mobile phones, etc.
Network devices: router, switch, modem (if not
already present in the router)
Sharing resources: printers, disk drives, etc.
Cables: Ethernet cables, wires for connecting
other devices (in case of wired LAN)
Internet connection: Wi-Fi (in case of wireless
LAN)
Instructions to set up LAN Network:
G H RAISONI UNIVERSITY,
AMRAVATI
Following steps should be followed to set up a LAN
network:
1. Identify services: Identify the network services
such as printers, disk drives, data, etc. that will
be shared among workstations.
2. Identify devices: Identify devices such as
computers, mobile phones, laptops, etc. with a
unique address that will be connected to the
network.
3. Plan connections: Design the network by
laying out cable wires between network devices
or by making wireless connections. Wired LAN
is set up using Ethernet cables while wireless
LAN is set up using Wi-Fi that connects
network devices without making any physical
connection. A wired LAN network is more
secure than a wireless LAN network but it is
difficult to relocate.
4. Select networking device: Select switch or
router with enough ports to connect all
workstations within the network. The choice of
networking device is based on the requirements
of the network.
5. Configure ports: Configure WAN ports
according to the information provided
by ISP (Internet Service Provider). Also,
configure LAN ports of cable routers such that
there are enough addresses available for all the
workstations within the network. A cable router
acts as DHCP (Dynamic Host Configuration
Server) server that automatically allocates
addresses to all the devices connected to the
network.
6. Make connections: Connect all the devices
using wires to configure a LAN network.
Standard Ethernet cables are used to connect
workstations and servers while Ethernet
crossover cable is used to connect the switch to
cable routers by connecting the standard port of
the switch with router’s LAN port. For wireless
LAN, connect all the devices to Wi-Fi
with SSID (Service Set Identifier) provided by
the router or switch to configure the LAN
network.
7. Test the network: Test each of the workstation
connected to the network and ensure every
workstation have access to network services.
Tips for LAN Set-Up:
1. Make a comprehensive plan about connections
before making actual connections to avoid
confusion.
2. Carefully identify the requirements and size of
the network and plan accordingly.
3. Smartly choose the networking device which
provides more flexibility to the network.
4. Ensure the cable length is not more than 100
meters.
5. Avoid laying cables in air ducts unless fire
G H RAISONI UNIVERSITY,
AMRAVATI
rated.
6. Perform detailed testing after network set up to
analyze the actual performance of the network.
Applications of LAN:
1. Resource sharing: LAN network allows
workstations connected to the network to share
resources such as printers, scanners, CD drives,
etc. which reduces the cost of the set up of the
network.
2. Software sharing: LAN network allows to
share a single copy of licensed software among
workstations connected to the network instead
of purchasing separate software for each
computer.
3. Internet sharing: LAN network facilitates
sharing of internet connection among all the
devices connected to the network.
4. Data sharing: LAN network allows different
workstations to share the data and files with
each other. It also allows access to data stored
on the central server.
5. Communication: Devices connected to a LAN
network can communicate with each other.
Advantages of LAN:
1. It is an easy and cheap way of communication
within a small geographical location.
2. It is easy to expand the network by connecting
workstations to a central server.
3. It is easy to manage the resources and data from
the central server.
4. It is more secure since data is stored on a central
server which denies illegal access to data.
5. It has high data transmission rates.
Disadvantages of LAN:
1. It has a high initial setup cost.
2. It violates the privacy of network users as
administrators have access to all their data and
files.
3. It can face security issues if the central server is
not properly secured.
4. It needs regular maintenance to deal with issues
such as software installations, hardware failures,
cable disturbances, etc.
5. It restricts the size of the network.
Assigning IP Addresses (No Router)
Right-click on your network connection.
Click Open Network and Sharing Center.
Click the Ethernet link at the top of the window.
Click Properties.
Click Internet Protocol Version 4 (TCP/IPv4).
Click Properties.
Click the Use the following IP address radio
butt Type 192.168.1. 50 into the IP address
field.
Type 255.255.0. 0 into the Subnet mask field.
Type 192.168.0. 0 into the Default gateway
G H RAISONI UNIVERSITY,
AMRAVATI
fiel
Click OK .
Open the Internet Protocol Version 4 properties on the next computer.
Click the Use the following IP radio button.
address
G H RAISONI UNIVERSITY,
AMRAVATI
Type 192.168.1. 51 into the IP address field.
Enter the same values for Subnet mask and Default gateway.
Give each additional computer a unique IP.
In this way, we successfully performed connecting and configuring computer
Conclusion in LAN.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 05.
Title/ Aim To execute of different Networking commands (like ping, ssh, ifconfig, scp, netstat, ipstat,
nslookup, traceroute, telnet, host, ftp, arp, wget,route.)
Program 1. ping
Code
The ping command is used to test connectivity between two hosts. It sends ICMP echo
request messages to the destination. The destination host replies with ICMP reply
messages. If the ping command gets a reply from the destination host, it displays the reply
along with round-trip times.
The ping command uses the following syntax.
ping destination host IP or name
The following command tests connectivity between the host computer and Google's
server.
ping google.com
The following image shows the output of this command.
If you specify the hostname as an argument, the ping command uses the configured DNS
client service to automatically translate the hostname into the IP address.
2. ssh
In this example we access Ubuntu or Red hat Linux machine via the Windows command
prompt using `ssh`
For example: If our IP address is “10.143.90.2” and username is “Jayesh”
Syntax to use ssh to connect to a remote server:
ssh [email protected]
Add your username in place of “Jayesh” and add your IP address in place of
“10.143.90.2”
G H RAISONI UNIVERSITY,
AMRAVATI
ssh to linux system from windows
3. ifconfig
Find Your Ip Address in Linux Using `ifconfig` Command
To view information about all network interfaces on your Linux system, simply execute
the following command:
ifconfig
Finding IP Address in Linux Using `ifconfig`
This command will provide a comprehensive list of all network interfaces along with
their respective IP addresses, MAC addresses, and other relevant details.
G H RAISONI UNIVERSITY,
AMRAVATI
4. scp
How to Securely copy a file from a local machine to a remote machine in Linux
Syntax:
scp [file_name] remoteuser@remotehost:/remote/directory
Here
file_name = The name of the file that needs to be copied.
remoteuser =The username of the remote host.
remotehost = The IP address or hostname of the remote host.
/remote/directory = The directory where the file should be copied on the
remote machine.
For example: If we want to copy a file name “test.txt” from local system to a
“remoteuser” = “Jayesh”
“remotehost” = “10.143.90.2”
“/remote/directory” = “/home/jayesh”
Syntax:
scp test.txt [email protected]:/home/jayesh
copied file from local system to remote system
To Verify: Use `ls` command in the location we copied file.
5. netstat
This command displays active connections, ports on which the computer is listening,
Ethernet statistics, the IP routing table, and IP statistics.
The output of this command is organized in rows and columns. Each row represents a new
connection or an entry in the output. It contains four columns. These columns provide the
following information about the row.
Proto: - This column displays the name of the protocol (TCP or UDP).
Local Address : - This column displays the IP address of the local computer and the port
number being used. If the port is not yet established, the port number is shown as an
asterisk (*).
G H RAISONI UNIVERSITY,
AMRAVATI
Foreign Address : - This column displays the IP address and port number of the remote
computer to which the port is connected.
State : - This column displays the status of the connection.
The following image shows the sample output of this command.
Options and parameters
The following table lists some common options of the netstat command.
Option Description
-a Displays all active TCP connections and the TCP and UDP ports on which the
computer is listening.
-e Displays Ethernet statistics, such as the number of bytes and packets sent and
received.
-n Displays active TCP connections, however, addresses and port numbers are
expressed numerically and no attempt is made to determine names.
-o Displays active TCP connections and includes the process ID (PID) for each
connection.
-p Shows connections for the protocol specified by Protocol. In this case, the
Protocol can be TCP, UDP, tcpv6, or udpv6.
-s Displays statistics by protocol. By default, statistics are shown for the TCP,
UDP, ICMP, and IP protocols.
-r Displays the contents of the IP routing table.
G H RAISONI UNIVERSITY,
AMRAVATI
6.ipstat
The ipstat command is used to gather and report statistics about IP traffic on a server
based on the selected output mode and sort order that is specified in the command syntax.
This command enables you to observe network traffic at the IP layer, aggregated on
source, destination, higher-layer protocol, and interface.
It shows output from the ipstat command when run with the –c option. Use the –c option
to print newer reports after previous reports, without overwriting the previous report. The
number 3 in this example specifies the interval for displaying data, which is the same as if
the command were invoked as ipstat 3.
# ipstat -c 3
SOURCE DEST PROTO INT BYTES
zucchini antares TCP net0 72.0
zucchini antares SCTP net0 64.0
antares zucchini SCTP net0 56.0
amadeus.foo.example.com 10.6.54.255 UDP net0 40.0
antares zucchini TCP net0 40.0
zucchini antares UDP net0 16.0
antares zucchini UDP net0 16.0
Total: bytes in: 192.0 bytes out: 112.0
7.nslookup
The NSLOOKUP command is used to troubleshoot network connectivity issues in the
G H RAISONI UNIVERSITY,
AMRAVATI
system. Using the nslookup command, we can access the information related to our
system’s DNS server, i.e., domain name and IP address.
Command to enter in Prompt - nslookup
8.tracert
This command is used to diagnose path-related problems. On an IP network, routers
exchange IP packets between the source and the destination. They take IP packets from
the source host and forward them in a sequence until they reach the destination host. The
sequence of routers between the source and destination is known as the path. A path
consists of all routers in a sequence that IP packets sent from the source host traverse to
reach the destination host.
The tracert command prints the path. If all routers on the path are functional, this
command prints the full path. If a router is down on the path, this command prints the path
up to the last operational router.
The tracert command uses the following syntax.
tracert Destination Name or IP address
The following command traces the path to the host named www.google.co.in.
tracert www.google.co.in
The following image shows the output of this command.
The following table lists some important options of the tracert command.
Option Description
-d Do not resolve the IP addresses of intermediate routers to their names.
-h Specifies the maximum number of hops (routers) to search on the path. The default i s 30
hops.
-w Specifies the amount of time in milliseconds to wait for a reply message from the router.
If not received within the time-out, an asterisk (*) is displayed. The default time-out is
4000 (4 seconds).
G H RAISONI UNIVERSITY,
AMRAVATI
9. Telnet
Checking the Status of a Port
For example
If you wanted to test if the server at 210.55.73.51 was listening on Port 3389 (RDP,
Remote Desktop Protocol), you would open a command prompt, and enter the
following command:
telnet 210.55.73.51 3389
Figure 1: An example Telnet command
If the port is Open, you will see a blank screen. This means that the connection is
successful.
Figure 2: A blank window indicates the connection was successful
If the port is closed, you will receive a Connect failed message.
G H RAISONI UNIVERSITY,
AMRAVATI
Figure 3: The Connect Failed message
10. hostname
The HOSTNAME command displays the hostname of the system. The hostname
command is much easier to use than going into the system settings to search for it.
Command to enter in Prompt - hostname
11. ftp
Transfers files between a local and a remote host.
To invoke the ftp command, log in to the system canopus, print the working directory,
change the working directory, set the file transfer type to ASCII, send a local file to the
remote host, change the working directory to the parent directory, and then quit, enter:
G H RAISONI UNIVERSITY,
AMRAVATI
12.arp
To send IP packets, a computer needs two addresses. These addresses are the MAC
address and the IP address. A MAC address is the physical or hardware address of the
NIC. An IP address is the logical or software address of NIC. If a computer knows the IP
address of the destination computer but it does not know the MAC address of the
destination computer, it uses the ARP protocol to know the MAC address of the
destination computer.
The ARP protocol broadcasts a given IP address over a local network. The corresponding
host responds to the broadcast with its MAC address. To avoid repetition, ARP stores the
answer in a table known as ARP table . ARP maintains a separate ARP table for each
NIC.
To view the ARP table, you can use the following command.
By default, this command displays the ARP table of the active NIC. If multiple NICs are
installed on the computer, you can use the -a option with this command. If the -a option is
used, the ARP command displays all ARP tables.
The following image shows the output of the arp command when used with the -a option.
G H RAISONI UNIVERSITY,
AMRAVATI
To display the ARP cache entry for a specific IP address, specify the IP address with the -
G H RAISONI UNIVERSITY,
AMRAVATI
N option. For example, the following command displays the ARP cache table for the
interface that is assigned the IP address 192.168.42.171.
Arp -a -N 192.168.42.171
The following image shows the output of the above command.
13. wget
To simply download a webpage:
wget http://example.com/sample.php
14. route
The route command, Linux administrators and users can establish static routes, enabling
precise control over network connectivity and optimizing data transmission.
To add a default gateway.
sudo route add default gw 169.254.0.0
add default gateway
This assigns a gateway address to which all the packets that do not belong to the
network are forwarded.
G H RAISONI UNIVERSITY,
AMRAVATI
Note: In this case the, we wish to choose 169.254.0.0 as the default gateway. You may
choose as per your need.
Conclusion In this way, we successfully executed different Networking commands (like ping, ssh,
ifconfig, scp, netstat, ipstat, nslookup, traceroute, telnet, host, ftp, arp, wget,route.)
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 06.
Title/ Aim Install MS windows operating system on the personal computer.
Procedure Step 1. Check Requirements for Installing Windows 10
First and foremost, you should ensure your PC meets the
minimum Windows 10 system requirements. For that, you should go to
Microsoft's official site for reference.
Step 2. Create a Backup
If your computer is not new, before starting the Windows 10 installation
process, it's vital to back up your files.This is important because
installation might erase the data on your computer's hard drive.
Step 3. Create a Windows 10 Installation USB Drive
It's time to go to Windows 10 download page to download Windows 10
ISO after you've verified your computer's compatibility and backed up
your data. After downloading Windows 10 ISO, you need to make a
bootable USB drive. You need an empty USB with at least 8GB of
storage space to make it a bootable USB drive.
Step 4. Boot Your PC from Installation USB Drive
Insert the bootable USB drive into your computer and restart it. Press the
key corresponding to your computer's boot menu when it restarts. Press
Enter to begin the installation after selecting the USB drive as the boot
device.
In addition, you must choose your language, time zone, and keyboard
preferences and agree to the license terms.
Boot your PC with the USB drive.
Press any key to boot from the device on the prompt.
Click Next on the "Windows Setup".
G H RAISONI UNIVERSITY,
AMRAVATI
Click Install now.
Step 5. Install Windows 10 and Finish Configurations
The installation of Windows 10 will start once you have booted from
the USB drive. You need to follow the on-screen guide to install
Windows 10.
Step 6. Personalize Windows 10 Settings
After Windows 10 has been installed, you will be asked to
customize your settings, which includes setting up your Microsoft
account, selecting your privacy preferences, and personalizing your
desktop.
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
Step 7. Install Drivers and Software
After customizing your personal settings, you should install any required
drivers and software. This includes any software you need to run on
your computer and any drivers for the hardware on your computer, such
as your graphics card.
In this way, we successfully installed MS windows operating system on
Conclusion the personal computer.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 07.
Title/ Aim Install Linux operating system on the personal computer.
Procedure Steps to Install Linux Operating System (Fedora 9):
1) Insert Fedora CD/DVD in optical drive of your computer and boot
from it. Then you wil get the following Fedora welcome screen. Select
“Install or upgrade an existing system” and press enter key. Wait for a
while for the system to load.
2) Select “Skip” button to start the installation.
Then Anaconda (the Fedora installer) will load and you'll see the welcome
screen. Click the “Next” button
3) Choose your language. A warning message about the hard
drive partitions may appear. If so, click on “Yes” button.
G H RAISONI UNIVERSITY,
AMRAVATI
A warning message about the hard drive partitions may appear. If so,
click on “Yes” button
Setup your network
A) If you have a DHCP network (dynamic IP address), click on “Next”
button, but if you have a static IP address (ask your provider if you're
not sure) click on “Edit” button and follow the instructions given below:
B) If you have an IPv4 address, make sure it's enabled. If you have an IPv6
address, make sure it's enabled too (if you don't have an IPv6 address,
uncheck the 'Enable IPv6 support' option).
C) Check the "Manual configuration" option and enter your IP address and
the Netmask, Gateway, primary and secondary DNS as shown in the
following screens
Do the same for the IPv6 address (if you have one). Click on “OK”
button, once you've finished.
G H RAISONI UNIVERSITY,
AMRAVATI
G H RAISONI UNIVERSITY,
AMRAVATI
Select your location (Country)
Click on “Next” button, once you have done with the network
configuration to select your location (country) and time zone.
Enter root password.Click on “next” button to enter the root (System
Administrator) password. Thelonger, the better
Install Your Operating System
(WINDOWS/LINUX)
*Select
Disk
Here comes the partitioning part! If you have an empty hard drive, all you
have to do is click “Next” button (make sure the "Remove all partitions on
selected drives and create default layout" option is selected). If you don't
have an empty hard drive and you still want to install Fedora 9 on your
machine, then make sure you select the "Usefree space on the selected drives
and create default layout" option (Note: 10 GB minimum of free space is
required). Click on “Next” button.
G H RAISONI UNIVERSITY,
AMRAVATI
Note: Encryption is supported in this release and you can enable it with a
single mouse click, by checking the "Encrypt system" option!
Note: Click the 'Write changes to disk' button when asked
The hard disk matted and the partitions will be created
*Select the desired packages
G H RAISONI UNIVERSITY,
AMRAVATI
Install Your Operating
System
G H RAISONI UNIVERSITY,
AMRAVATI
Format the partitions and copy the packages into your hard disk
Click on “Next” button and everything will be done automatically and watc
how the partitions are formatted and the software packages are copied t
your hard drive. The installation process will take about 8-10 minut
(depending on your computer specs and the selected packages).
31
Restart your computer after successful installation
When the installation is over, you will get a "Congratulations, the
installation is complete" screen. Click on “Reboot” button and your
computer will automatically restart.
G H RAISONI UNIVERSITY,
AMRAVATI
Note: Remove the DVD from your optical drive. Now Fedora 9 Linux
operating system will start for the first time.
G H RAISONI UNIVERSITY,
AMRAVATI
The system will boot...
And, before you reach the Fedora desktop, you must do a
one-time general system configuration. Now log in to your
new Linux operating system.
33
In this way, we successfully installed Linux operating system on the personal
Conclusion computer.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 08.
Title/ Aim To detect and solve computer problem using Software Troubleshooting
Procedure
1. Free up RAM by closing other open programs.
Every piece of software uses Random Access Memory (RAM). The more
software that's running on your computer, the more RAM it uses. This can be
especially problematic if you're using older machines that don't have a lot of
RAM. So if a software program refuses to load or is running slowly, the first
thing to do is to close all other open applications.
If you want to find out which open applications might be hogging your RAM,
Windows operating systems (OS) have tools that display this information:
In Windows, hit Ctrl+Alt+Delete, then choose the Start Task Manager option.
From the window that appears, click the Processes tab, then click the Memory
menu item. This sorts all open processes based on the amount of RAM they're
using. You can shut down a runaway process by clicking the End Process
button. Before you do that, you may want to do a bit of research on the
process to ensure that you don't accidentally stop a critical process or program.
2. Restart the software.
Software problems can stem from a conflict with other programs or simply from
difficulties the software encountered when starting up. Shutting the program
down and restarting it can sometimes resolve these issues.
3. Shut down and restart your computer.
If restarting the problematic program doesn't resolve the issue, try rebooting
your computer. Once the computer has fully restarted, re-launch the application
in question and see if the problem has been resolved.
5. Undo any recent hardware or software changes.
Changes to software and hardware can sometimes cause software problems,
such as:
Conflicts with other software: Newly installed software may
conflict with other software..
Changes to computer settings: Undo any recent changes to your
computer's settings, and try launching the software again. For example,
the Windows Control Panel includes an option to "Set Program
Access and Defaults," which allows you to disable access to certain
applications. If you accidentally disable access to a program here, the
program may not run.
Conflicts with new or improperly configured hardware, such as
scanners and printers. If you've recently connected new hardware to
one of your computers, try disconnecting the hardware and see if that
G H RAISONI UNIVERSITY,
AMRAVATI
corrects the software issue.
6. Uninstall the software, then reinstall it.
Sometimes, software problems occur because critical application files have
been removed, updated, or deleted.
To ensure that all the necessary files are intact, you can completely uninstall the
problematic software, then reinstall it. Even if you remove a program using its
built-in uninstall wizard (if it includes one), it's still a good idea to check your
hard drive's Program Files folder — usually located on the C drive — for any
remnants of the program, and delete any files or folders you find.
Before reinstalling, check to see if there's a new version of the program
available. The vendor or developer might have introduced bug fixes that address
the issue you're having.
7. Look for software patches.
Software vendors may also fix bugs by issuing patches — small software
updates that address known problems. Even if you're using the most current
version of the software, there may be a more recent patch available for that
version.
8. Scan for viruses and malware.
Viruses, spyware, and other forms of malicious software (or "malware") can
cause software to freeze, crash, or quit working entirely.
If tips 1 through 8 haven't helped solve your software problem, you may also
want to scan the computer using both antivirus and anti-malware tools to find
and remove viruses and malware. Use the most thorough scan mode available,
and remember to restart your machine if the antivirus or anti-malware programs
found any threats.
9. Check for a firewall conflict.
Some organizations may choose to install personal firewall software on each
computer, rather than a centralized hardware or software-based firewall.
Personal firewalls can be an important line of defense against hackers and other
security threats, but they can also cause software conflicts.
Firewalls frequently display messages asking whether it should allow a program
to run or block it. Therefore, it's possible to accidentally tell the personal
firewall to block a program from running. Check the firewall's settings to see if
the problematic software was added to the firewall's list of programs to block.
If so, change the firewall's settings to allow the software to run, then check to
see if you're still having issues with your software.
10. Boot up in Safe Mode.
Some software malfunctions can be caused by OS settings or other system
problems. Windows and Mac operating systems both offer a troubleshooting
G H RAISONI UNIVERSITY,
AMRAVATI
environment known as Safe Mode. Safe Mode disables non-critical applications
and processes, which theoretically makes it easier to isolate problems.
Most Windows computers allow you to enter Safe Mode by pressing the F8 key
as your computer is booting up. On a Mac, enter Safe Mode by pressing the
Shift key while your computer boots up (or immediately after it boots up).
Once your computer is in Safe Mode, launch the problematic software and try
to replicate the problem you had while your computer was in normal mode. If
you don't have the same problem in safe mode, there's a good chance that the
issue was caused by your OS or another program, not by the application you
are troubleshooting.
11. Defragment your hard drive.
As a final troubleshooting step, you might defragment your computer's hard
drive. Defragmenting rearranges your hard drive's file structure so that the
system runs more efficiently. Defragmenting will probably be most useful if
you're experiencing overall sluggishness on your computer, because
defragmenting is meant to make your entire system run faster. Note that
defragmenting a hard drive applies primarily to Windows-based computers.
Most recent Windows editions — including XP, Vista, and Windows 7 —
include a built-in disk-defragmentation tool. To launch it, go to Start > All
Programs > Accessories > System Tools > Disk Defragmenter. Be aware that
defragmenting a hard drive can be time-consuming, so make sure to perform
this task when you will be away from your computer for a few hours.
In this way, we successfully detect and solve computer problem using
Conclusion Software Troubleshooting.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 09.
Title/ Aim To detect and solve computer problem using
Hardware Troubleshooting
Procedure Some of the most common PC hardware problems that need
troubleshooting are:
Your computer won’t turn on.
Your computer turns on, but still doesn’t
work. Your computer screen freezes.
Your computer has insufficient memory.
You get a CMOS error.
Your operating system is missing or your hard drive isn’t detected.
You get the blue screen of death.
Problem #1: Your Computer Won’t Turn On
This is a common problem that often offers a simple solution.Try
plugging into different power outlets. It isn’t uncommon to blow a fuse,
especially with more power-hungry systems.
Is either the monitor, mouse, or keyboard the only thing not working? If
so, try plugging in a different one to see if that does the job. Most of the
time, replacing one of these is cheaper than attempting a repair.
Once you’ve completed the above steps, it’s time to look at the tower.
Are the lights on in the front or back of the tower? If not, the power
supply unit (PSU) may be turned off.
Next, you can open up your tower and look at the motherboard. Most
have a small LED light built in to show if power is running to the
motherboard. If it’s turned off, you can either try using a PSU tester, or
replace the PSU. Never try to open a PSU and try to repair it yourself as
this is extremely dangerous.
Problem #2: Your Computer Turns On, But Still Doesn’t
Work If power is obviously flowing to the computer system
and its
peripherals, there may be a component issue. When you first turn on the
computer, do you hear or see anything out of the ordinary? Many
times the computer’s Power-On Self-Test (POST) will let you know
what’s going on with the machine.
G H RAISONI UNIVERSITY,
AMRAVATI
Beep Codes-If you hear any beeps when your computer turns on, they
can help you troubleshoot common PC hardware problems. Here’s a list
G H RAISONI UNIVERSITY,
AMRAVATI
of beep codes
No beep but the system turns on and runs fine - Under normal
circumstances, most computer systems will beep one short beep when
turned on. If yours doesn’t, your “beeper” may have died out.
No beep - The power supply is not plugged in or turned on. Or, the
power supply is completely dead.
Steady, short beeps - The power supply may be bad or the voltages might
be wrong. A replacement would usually be necessary.
Steady, long beeps - The power supply has gone bad.
Long, continuous beep - Your Random Access Memory (RAM) sticks
may have gone bad. If there is more than one stick installed, try taking
one out to see if the computer boots. If it does not, try the same thing
with the other stick. This will tell you which stick has gone bad and you
can replace or upgrade accordingly. If there is only one stick installed,
you will need to replace or upgrade it to fix the problem.
One long, two short beeps - There has been a video card failure. Your
first action is to try reseating the video card. This often solves the
problem when the computer system is connected to projectors
because the VGA/DVI/Video cable gets moved so often that the card
can be slowly unplugged. If reseating doesn’t work, replace the video
card.
Problem #3: Your Computer Screen Freezes
When your computer freezes and isn’t responsive to your mouse or
keyboard, the first thing to do is just wait. Sometimes it will just take a
few minutes for your computer to process. Then, end-task the non-
responding program. If that doesn’t work, turn off the computer by
holding down the power button and then rebooting into Safe Mode
(don’t forget about saving your work first, if you can).
If you’ve tried all of this and your computer still won’t unlock, you may
be dealing with either defective hardware or a defective device driver.
If this is your case, replace the defective piece immediately so it doesn’t
cause further damage.
Another thing you could be dealing with is a virus that is
overwhelming your system. Run a virus scan, remove the virus, recover or
reinstall damaged files or software, and implement the latest security
software.
Problem #4: Your Computer Has Insufficient Memory
Receiving an “insufficient memory or disk space” error message can
usually be solved (at least temporarily) by closing extra windows to
free up some RAM. If you’ve done that and the error still comes up,
you can try rebooting your computer and installing the latest operating
G H RAISONI UNIVERSITY,
AMRAVATI
system
G H RAISONI UNIVERSITY,
AMRAVATI
update.
If you really don’t have enough available memory and space (which
can be checked in Windows 10 by pressing the Windows-R button and
typing perform in the Open field to run the Performance Monitor), you
can uninstall or delete any unused or unnecessary files, especially those
of the video/music type. Your final solution is to add more RAM.
Problem #5: You Get a CMOS Error
The CMOS (complementary metal-oxide semiconductor) is an onboard
chip that stores information ranging from the time and date to system
hardware settings. If you get a CMOS alert message showing up on your
screen, it’s likely you need to replace the CMOS battery located on the
motherboard. Remove it carefully, insert a new battery that is exactly
the same as the old one, and enter the CMOS values to the defaults.
Problem #6: Your Operating System Is Missing or Your Hard Drive Isn’t
Detected
If the message “Missing Operating System” shows up on your screen,
there are four possibilities the problem could be (and four ways to solve
it):
1. The basic input/output system (BIOS) doesn’t detect Windows’
hard disk, or the disk failed. If you know how, take out the hard
drive and reconnect it. If that doesn’t work, the hard drive’s interface
is forbidden or the hard drive is seriously damaged.
Restart the computer and watch for the message telling you which
key to strike to go into the BIOS. The key can vary from system to
system so you may need to use a search engine to find the
instructions for your system. Be sure to strike the specified key as
soon as you see the message.
In the BIOS highlight the hard drive and set it to “Auto”. If it’s still
invisible, you need a hard drive repair or replacement.
2. The BIOS settings are incorrect. Set the BIOS back to Default
State.
3. The Master Boot Record (MBR) is damaged or corrupted.
Rebuild the MBR using either the Windows installation disk, the
Windows repair disk, or a bootable partitioning tool.
4. The Windows boot file partition isn’t active. Start the computer
using a bootable partitioning tool. If that doesn’t work, set the
wrong partition to ‘inactive’ and activate the correct partition.
Problem #7: The Blue Screen of Death
The blue screen of death (BSOD) appears when Microsoft Windows
G H RAISONI UNIVERSITY,
AMRAVATI
has an unrecoverable, critical error that causes a crash and subsequent
data loss. This can be caused by the low-level software in Windows
crashing.
When the BSOD occurs, the computer automatically creates a
minidump file and restarts the computer. If the blue screen appears
again, follow the prompts, identify and search for the error code
online, and learn how to fix the problem.
Some of the common solutions are to:
Make sure your computer isn’t overheating. If it is, close unused
applications, check the fan is working properly, and conduct a good
dusting after the computer is turned off before trying other solutions
for an overheating PC.
Boot into Safe Mode before trying to fix a problem.
Test your hardware components and check the computer’s memory
for errors.
Check for incorrectly installed or buggy drivers. Install updated drivers.
Scan for Malware that is causing the crash.
Reset or reinstall Windows.
Use System Restore to get your computer back to its previous state. If it
works, you probably have a software problem on your hands.
In this way, we successfully detect and solve computer problem using
Conclusion Hardware Troubleshooting.
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 10.
Title/ Aim To explore and Analysis the Security Vulnerabilities for hacking a websites /
Web Applications, E-commerce services, Web Browser, Antivirus installation,
malware, configuring a firewall and cyber laws etc.
Procedure A vulnerability in security refers to a weakness or opportunity in an information
system that cyber criminals can exploit and gain unauthorized access to a
computer system. Vulnerabilities weaken systems and open the door to
malicious attacks.
Improper firewall configuration can result in attackers gaining unauthorized
access to protected internal networks and resources. As a result, cyber
criminals are constantly on the lookout for networks that have outdated
software or servers and are not protected. .
The default settings on most firewalls and protocols like the File Transfer
Protocol (FTP) do not provide the necessary level of protection to keep
networks secure from cyberattacks. Organizations must ensure basic firewall
configuration meets the unique needs of their networks.
How to prevent it:
Here are simple things you should know to prevent an e-skimming attack:
Use antivirus and anti-malware software
Implement multi-factor authentication
Create strong, unique passwords on all systems
Don’t click on suspicious links
Update and patch all systems with the latest security software
Configure firewall
Educate employees about safe cyber practices
Monitor and analyze Web Logs to look for unknown domains
Conclusion In this way, we successfully explored and analyzed the Security Vulnerabilities
G H RAISONI UNIVERSITY,
AMRAVATI
Practical No. 11.
Title/ Aim Open Ended: Email creation and usage, Creating digital Profile on
LinkedIn
Procedure
Steps to creating your own email account-
1. From your Internet browser, navigate to the sign-up page for
your email provider. you can use a trusted provider such as Gmail
(from Google).
2. Enter your details to open an email account. These often include:
G H RAISONI UNIVERSITY,
AMRAVATI
Name First and last
This is the email address you’d like to create. Choose a name
Desired login that is easy for you to remember, spell and type. Once create this,
Login your you can’t change it. Many people will use their ated by a
Name name separ dot, such as
[email protected], as nizable
this is recog and easy for others to email you.
Create a password that is secure, which is often not easy to r emember,
spell or share. Use at least eight characters with a combination of
upper case, lower case, letters, numbers and symbols. For example,
Password
a password such as “password999” is easy for a person or automated
bot to guess. But a password such as “a3#b975!d” is much arder.
h Write this password down and store that in a safe place.
Phone This can be used as an extra security measure in case you n’t get
number ca into your email account in the future.
3. Follow th e rest of the steps as
required.
Some sign-u
location. You
p forms will also ask for things such as your birthday and
be a helpful may also be asked to create a security question, which
can
way for you to recover a forgotten
4. Accept
th
password. e “Terms of Service.”
You’l also
usually one be asked to read and accept the terms of their service. This is
of the final steps.
4. Start
using your new email account!
G H RAISONI UNIVERSITY,
AMRAVATI
You can easily log in from any computer, phone or tablet that has
Internet access.
****************************************************************
LinkedIn is a social networking website for professionals. It is the world
largest professional network with millions of members. Whether you are
a marketing executive, a magazine editor, a journalist, a business owner
or even a first-year college student looking for their first job after
graduating, LinkedIn is the right social media platform for you. Linkedln
is for anybody and everybody who is interested in taking their
professional like more seriously by looking for new opportunities to
grow their career and to connect with other professionals. So to make
your own LinkedIn profile today, follow these easy steps:
Steps to create a LinkedIn profile:
Step 1: Go to the official website of LinkedIn i.e. in.linkedin.com
G H RAISONI UNIVERSITY,
AMRAVATI
Step 2: Click on the join in or sign up button on the top right corner
Step 3: A new page will open
Step 4: Fill up the details, like your first and last name, email address and
password
Step 5: Click on Join now or Agree and
Join Step 6: A security check will pop up
Step 7: A new page will appear
Step 8: Fill up the required details including your country, Province, and
city/district
G H RAISONI UNIVERSITY,
AMRAVATI
Step 9: Click on the Next button
Step 10: A new page will appear in front of
you Step 11: Fill up the required information
Step 12: Click on either I’m a student’ or Continue’
Step 13: A new page will appear asking you the confirmation code, sent
to your email address
G H RAISONI UNIVERSITY,
AMRAVATI
Step 14: After confirming the code, click on Agree and confirm
Step 15: Your home page will open
In this way, we successfully created email and digital Profile on LinkedIn.
Conclusion