Fcpit File (for Ptu B.tech 1st Yr Students)

  • Uploaded by: Cutie
  • 0
  • 0
  • May 2020
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Fcpit File (for Ptu B.tech 1st Yr Students) as PDF for free.

More details

  • Words: 15,466
  • Pages: 105
Practical 1: Familiarization of the computer system and on hand practice on power on and power off. Hardware (comper), equipment involved in the function of a computer. Computer hardware consists of the components that can be physically handled. The function of these components is typically divided into three main categories: input, output, and storage. Components in these categories connect to microprocessors, specifically, the computer’s central processing unit (CPU), the electronic circuitry that provides the computational ability and control of the computer, via wires or circuitry called a bus. Software, on the other hand, is the set of instructions a computer uses to manipulate data, such as a word-processing program or a video game. These programs are usually stored and transferred via the computer's hardware to and from the CPU. Software also governs how the hardware is utilized; for example, how information is retrieved from a storage device. The interaction between the input and output hardware is controlled by software called the Basic Input Output System software (BIOS). Although microprocessors are still technically considered to be hardware, portions of their function are also associated with computer software. Since microprocessors have both hardware and software aspects they are therefore often referred to as firmware The main parts of a computer that we'll be focusing on are the Power Supply, Access Slots, Motherboard, Hard Drive, CPU, RAM, CD-Rom, and Floppy Drive. First, let's look at two simple diagrams of the inside of a computer.

Quickly, you may recognize some parts of you computer just from these simple diagrams. The first diagram is of a tower computer, which currently is popular for the home PC. The second 1

diagram is a desktop computer, which normally is used for space as you can easily place the monitor on top of it and have the whole computer compact in one easy spot. POWER SUPPLY The power supply is vital to the computer as it is the source of power. The power supply is usually a small metal box in the top corner of a case (tower). ACCESS SLOTS Access slots or expansion slots are openings in a computer where a circuit board can be inserted to add new capabilities to the computer. Examples of drives that may go here would be modems, USB drives, networking cards, video adapters, and sound cards. These expansions are easy to install along with being very useful to your computer to allow you to do new things, such as network computers together.

MOTHERBOARD The motherboard has been an integral part of most personal computers for more than 20 years. The motherboard contains various circuit cards performing various functions all plug into many similar sockets on a common circuit board. Each circuit card performs a unique function in the computer and gets its power from the socket. The motherboard contains many circuits and slots, but let's focus on some of the important ones. The motherboard is home to the processor (CPU) along with the access slots and RAM. If we look at the diagram above I've labeled the parts of the motherboard that I wanted to discuss. The objects labeled 1 are the access slots. 2 is the processor slot and 3 are slots to hold memory (RAM). CPU The CPU, or processor, is the heart of your computer no matter what type (PC, Server, and Laptop). There are many brands for processors such as Intel and Athlon all with different processors for your computer. The CPU processes everything that your computer does, therefore the better the processor, the faster the computer. RAM 2

Random Access Memory (RAM) is the form of memory contained in most computers. RAM is considered "random access" because you can access any memory cell directly if you know the row and column that intersect at that cell. When an application is running it stores its information in the RAM. When you close the application the information is deleted from the RAM. This is why you need certain amounts of RAM to run applications. The more RAM you have the faster your computer will be, and the more applications you'll be able to run without loosing speed. HARD DRIVE Nearly every desktop computer and server in use today contains one or more hard-disk drives. These hard disks do one thing well - they store changing digital information in a relatively permanent form. They give computers the ability to remember things when the power goes out. A hard drive stores all your files and information in a permanent form unlike storing it in RAM (which is temporary). The larger your hard disk (drive) the more information and files you're able to store. Today's average hard drive is 40 GB although slowly 80 GB hard drives are becoming used more often. CD-ROM The CD-Rom is quite simple, it reads CD's. CD-Rom completely stands for Compact Disk Read Only Memory. The revolution of CD's is that they hold much more data than a floppy disk, although are not as flexible when it comes to rewriting and storing personal data. Using CD-RW you can make your own CD's and use them more like a floppy disk. These are becoming more and more popular although you still need a CD-Rom to read them.

FLOPPY DRIVE A floppy drive reads the popular floppy disk. Floppy disk are easy to use, rewritable, compact, and great for storing information. The floppy drive is simple and allows you to read, write to, and write over information stored on a floppy disk. Now you have a basic knowledge of the parts of your own PC. In the future you'll be able to read more advanced articles and have an understanding of the parts of a PC.

3

STEPS TO SWITCH ON THE COMPUTER: 1) Switch on the UPS. 2) Switch on the monitor. 3) Press the power key of the CPU to start the machine. STEPS TO SWITCH OFF THE COMPUTER: 1) Click on START. 2) Select TURN OFF YOUR COMPUTER OPTION option. 3) Click on SHUT DOWN to turn off. 4) Switch off the monitor. 5) Switch off the UPS.

Practical 2: Loading window, closing, maximizing, icon shifting & ordering. To start Windows installation: Put Windows XP CD and restart your computer. You will see “Press any key to boot from CD …” so you must push any button on your keyboard to proceed. 4

Now Windows XP installation will start by itself. Please pay attention to the lower part of the screen. Important commands will be displayed that you need to use in installation process. If drivers for hard disk controller (SATA, SCSI) is needed, you must press “F6” and do three following steps: 1. Insert diskette and press “Enter” 2. Choose adequate driver and press “Enter” 3. Press “Enter” to continue installation process

In this windows press “Enter” to continue the installation or press “F3” to cancel the installation 5

Then follows Windows Xp license, and if you agree with these rules and want to continue installation press “F8”, but if you don’t agree and want to cancel installation press “F3”

If you install Windows XP in computer that already have installed Windows XP, then you will see window and I recommend press “Esc” (don’t repair) in it. If you choose to press “R” than only the windows files will be rewrited and viruses will stay in your computer. So press “Esc” In this step we can divide disk in many pieces (partitions) if you need it. 1. If there is any partitions you can delete the with “D” 2. With “C” you can create new partitions Choose partition where you want to install Windows XP and press “Enter”

6

Choose file system what you want format your disk. I usually advise to choose NTFS. If you don’t want to wait long time you can choose NTFS (Quick) and press “Enter”

Your hard disk will be formatted and after that files will be copied to your hard disk. When all files will be copied, computer will restart. After restart don’t press any key when you see “Press any key to boot from CD …” Just wait and Windows installation will continue. After some time a windows will appear “Regional and Language Options”. Click customize if needed, but if you don’t need to customize click “Next” to continue Windows XP installation. You can customize it later after installation if you want.

7

Fill the fields Name and Organization, when it is done click “Next”

Write in your Windows XP license number (serial) and click “Next” 8

Fill the computer’s name and administrator’s password if needed. Then click “Next”

Choose your time zone and make sure that clock is correct. Then click “Next” Windows XP installation will continue after that. 9

If you want to configure network’s configurations you can do it here, but you can do it after installation as well. So you can choose ‘Typical settings’ and click “Next”. In next window click “Next”

10

Windows XP installation will continue and after that computer will restart again. After booting in follow short wizard that offer you to activate windows and create user accounts.

Then choose “skip” and about windows registering in their site you can answer “No” So you finally have installed Windows XP in your hard drive by now. Important things to do after installation: 1. Please install firewall and antivirus before you plug in your internet cable. 2. After the installation process of Windows XP you can continue installing drivers and any software you need. MINIMIZING & MAXIMIZING WINDOW A window can be maximized and minimized by clicking the minimize and maximize button. are displayed on the right-top corner of the window on the title bar. A minimized button has hyphen (-) symbol when u click it, windows will be iconized and icon will be moved to the task bar of the Desktop. A maximize button is a small rectangular area (). When you click it, then your windows will occupy whole monitor screen i.e. it will cover up the whole desktop.

CLOSING WINDOW

11

If you do not want to work more with your opened window, then you can close it by clicking the close button, close button is next to the maximize button on the right top corner of the title bar. It has X (cross0 sign in the small rectangular box. It is also called cross icon.

ICON SHIFTING & ORDERING Drag and Drop is an action which helps the user to copy and to move an icon or an object from one window to another, one folder to another etc. To drag & Drop an object on to another object is to move the mouse pointer onto the source icon or source object which you want to drag, the by pressing down the mouse left button, holding it down, move towards the destination object. When your dragged object moves onto destination object, then drop the source object onto the target object by removing your hands from the mouse button. So, dropping is to release of the mouse button from the target position when you completely drag an object. Ordering of icons on the Desktop is done by right clicking the mouse on the blank area of Desktop. Then from the pop-up menu so displayed, select the ‘Arrange icons by’ option. From the further displayed menu you can choose any one option according to which you want to arrange the icons and the various options for ordering are: Arrange icon by-name, size, and type, modified.

Practical 3: Changing drives and searching files and understanding file extensions. Changing Drives Above you can see the three different types of drives, floppy drives, hard drives and network connected drives. The floppy drive is located in the front of the machine. This is where you insert your 3.5 inch disk. The hard drives are contained inside the machine. They have much more capacity than a floppy drive, and are considerably faster. The hard drives contain the local system information for the particular machine. The final type of drive is a network connected drive. These drives reside inside another computer and are accessed via the network. The network drives typically contain programs that are run by all of the machines on a network. A directory window shows the directory structure of the current drive. The icon for the current drive is surrounded by a rectangle. You can change drives by clicking on another drive icon in the directory window. Double clicking a drive icon will display it without closing your current drive. You can also open a drive by using the Select Drive command on the disk menu. When you change to a different drive, the names of the files and directories on that drive are displayed in the directory window. This is file manager with multiple drives being displayed:

12

Moving or Copying Files and Directories To move files and folders from one folder to another, simply select the files hat are going to be moved. Then hold down the left mouse button and 'drag' the files to the destination folder. The folder with become highlighted when you have placed the mouse in the correct location. Once you have highlighted the destination, release the mouse button. The system will ask if you want to move the files. If you are certain that this is what you want to do, then click on the yes button. Otherwise click on the no button.

13

Copying files works the same as moving the files, with a few small differences. First of all, you must hold down the SHIFT key when copying files. This will cause a '+' to appear in the pointer. This indicates that you are going to copy files, not move them. To copy files, follow the same steps as above, but hold the SHIFT key while releasing the mouse button.

14

It is possible to copy and move files from one drive to another. To do this, simply make certain that the files you want to copy and the destination folder are both visible on the screen. You then select the files to move or copy, and drag them to the destination. When moving files between drives, you must hold down the CTRL key. NOTE: The default action for operations on the same drive is to move the files. The default action for operations between drives is to copy the files.

Searching for files If you don't remember which folder you saved a file in, you can search for it. To search for a file Click Start, and then click Search.

15

In the left pane, click the type of file you want to search for, or click All files and folders.

16

Based on the type of file you chose to search for, specify your criteria. If you know part of the file name, type it. Then click Search.

Windows XP searches your computer, which may take several minutes. Windows XP then displays the search results, which you can browse just like files in a folder. Once you are done searching, click Yes, finished searching. If you want to view any of the search results, double-click the file and it will open in the relevant application. You can do this as many times as necessary to find the file you need. `

Practical 4: Saving files protecting and unprotecting. 17

Saving Files When you save a file, you must pay close attention to several things at once. You must first notice which disk drive you are saving to. Secondly, you must be concerned with which folder you are saving to within that drive. Finally, you must give the file a meaningful filename and let the application handle the extension for you. Save As When you first save a file, you are presented with a “Save As” dialog box. This box gives you all the controls you need to specify exactly where and under what name your file is saved. Windows itself provides a generic Save As dialog that can be used by applications, such as that from Notepad as shown below.

Selecting a Drive Perhaps the most important new feature is the buttons on the left-hand side that permit easy selection of the saving location. “My Documents” is the most common location, If you are working directly off removable media such as a Zip drive, or looking for a particular area, it is best to click on the button labeled with the machine name, e.g., CTLdev in the above graphic. While picking a saving location is easier with Windows 2000 than before, it is well to realize that the “Save As” dialogs always have some default drive, folder and filename to which, if you simply click the “Save” button, they will save your file. The problem is they only give you a clear look at the filename and folder portion. They don’t immediately indicate where the folder is located. It could be on any drive, and it could be at the root of that drive or in some folder or subfolder. Since, for example, you could have any number of “Scratch” folders, even on a single 18

drive (provided they were in separate folders themselves), it becomes very important to know which “Scratch” you are viewing. An attempt has been made to configure the lab’s applications to automatically select the My Documents (i.e., H:\My Documents) by default. However, many programs insist on defaulting to whatever drive and folder was used last. So, unless you are sure, you need to check; otherwise, you may end up saying, “The computer lost my file!” There are two basic methods of determining the location to which you are saving. One method uses the mouse and the other the keyboard; once you know them both, you may use whichever suits your situation, or even some combination of the two.

How to Password Protect Files in Windows It's too bad there is no obvious method to add a password to a file on a Windows XP system. But there are several ways to get the job done, with varying levels of inconvenience. Let's look at a few ways to do password protection: If you have Microsoft Office, you can protect your documents with a password. To do so, first open the document. In Office 2007, click the Office button, move the cursor down toPrepare, then click Encrypt Document. (In older Office versions: Click Tools, thenProtect Document.) Now enter a password in the dialog box and press OK. Re-enter the password and press OK again. The next time you try to open the document, you will be prompted for this password. So what if you don't have MS Office, or you want to protect something that's not an Office document? There are hidden files in Windows, but anyone with a mouse and a few brain cells to rub together can easily find hidden files.

Password Protection Via Compressed Files There is another way to add password protection to any file on a Windows XP system. It involves using compressed (zipped) folders, and it a little clunky, but it works for all files, not just Office documents. To begin, open Windows Explorer and navigate to the file you want to protect. Right-click on the file, select Send To, then select Compressed (zipped) Folder.

19

A new folder will be created, with an icon showing a zipper on a file. Double-click to open the zipped folder, clickFile, then Add a Password. Enter the password twice and press OK. You're done, except that you now have the original file, and the zipped file with password. So delete the original file. From now on, when you open the zipped folder, Windows will prompt you for the password.

This way, you can have one password protected folder for all your sensitive files, instead of creating a zipped folder for each file. To do so, right-click in the empty space on thedesktop (or in any open folder), select New, and then click Compressed (zipped) Folder. Enter a name for the compressed folder, press ENTER, and you'll see a new folder icon marked with a zipper. Add a password like we did above. Now you can use drag and drop to move one or many files to the password protected folder.

20

Practical 5: Formatting floppies and practice on virus recognition and protection. How to format a floppy in windows Step 1: Insert the floppy you would like to erase into the floppy drive of your computer. Step 2: Click on the Start button, then click on run. Step 3. The run dialog box should now be shown. Type explorer in the Open: field and press the OK button. Alternatively, you can press down on the Windows key on your keyboard, which is generally located between your left Control and Alt keys and looks like a small flag, and while holding that key down press once on the letter E. Both methods will open Windows Explorer . After Windows Explorer is opened you should see a screen similar to Figure 1 below.

21

Step 3: Click once on My Computer as show in Figure 1 above to highlight it. Step 4: Click once on the Floppy Drive, usually the A: drive. It should now be highlighted. Step 5: Click on the File menu and then click on the Format option as shown in Figure 2 below.

Step 6: After you click once on Format as shown in Figure 2 above. You will see a screen similar to Figure 3 below.

22

Step 7: Type in a descriptive name in the Volume Label field for this floppy or leave it blank. This is optional, so it is up to you. Step 8: Place a checkmark in the Quick Format box designated by the red box in Figure 3 above. Step 9: Press the Start button. You will get a confirmation box as shown in Figure 4 below.

Step 10: If you want to continue formatting this floppy press the OK button, otherwise press Cancel. Step 11: Windows will now format your floppy. If it has problems Quick Formatting the floppy, then it will tell you so, you should tell it continue formatting the floppy. When it is done formatting, you will be presented with a screen as shown in Figure 5 below telling you the format is complete.

23

Step 12: Press OK and then Close. Your floppy is now ready to be used.

Virus Recognition and Protection Virus (computer), a self-duplicating computer program that spreads from computer to computer, interfering with data and software. Just as biological viruses infect people, spreading from person to person, computer viruses infect personal computers (PCs) and servers, the computers that control access to a network of computers. Some viruses are mere annoyances, but others can do serious damage. Viruses can delete or change files, steal important information, load and run unwanted applications, send documents via electronic mail (e-mail), or even cripple a machine’s operating system (OS), the basic software that runs the computer.

HOW OCCUR

INFECTIONS

A virus can infect a computer in a number of ways. It can arrive on a floppy disk or inside an email message. It can piggyback on files downloaded from the World Wide Web or from an Internet service used to share music and movies. Or it can exploit flaws in the way computers exchange data over a network. So-called blended-threat viruses spread via multiple methods at the same time. Some blended-threat viruses, for instance, spread via e-mail but also propagate by exploiting flaws in an operating system. Traditionally, even if a virus found its way onto a computer, it could not actually infect the machine—or propagate to other machines—unless the user was somehow fooled into executing the virus by opening it and running it just as one would run a legitimate program. But a new breed of computer virus can infect machines and spread to others entirely on its own. Simply by connecting a computer to a network, the computer owner runs the risk of infection. Because the Internet connects computers around the world, viruses can spread from one end of the globe to the other in a matter of minutes. TYPES VIRUSES

OF

24

There are many categories of viruses, including parasitic or file viruses, bootstrap-sector, multipartite, macro, and script viruses. Then there are so-called computer worms, which have become particularly prevalent. A computer worm is a type of virus. However, instead of infecting files or operating systems, a worm replicates from computer to computer by spreading entire copies of itself. Parasitic or file viruses infect executable files or programs in the computer. These files are often identified by the extension .exe in the name of the computer file. File viruses leave the contents of the host program unchanged but attach to the host in such a way that the virus code is run first. These viruses can be either direct-action or resident. A direct-action virus selects one or more programs to infect each time it is executed. A resident virus hides in the computer's memory and infects a particular program when that program is executed. Bootstrap-sector viruses reside on the first portion of the hard disk or floppy disk, known as the boot sector. These viruses replace either the programs that store information about the disk's contents or the programs that start the computer. Typically, these viruses spread by means of the physical exchange of floppy disks. Multipartite viruses combine the abilities of the parasitic and the bootstrap-sector viruses, and so are able to infect either files or boot sectors. These types of viruses can spread if a computer user boots from an infected diskette or accesses infected files. Other viruses infect programs that contain powerful macro languages (programming languages that let the user create new features and utilities). These viruses, called macro viruses, are written in macro languages and automatically execute when the legitimate program is opened. Script viruses are written in script programming languages, such as VBScript (Visual Basic Script) and JavaScript. These script languages can be seen as a special kind of macro language and are even more powerful because most are closely related to the operating system environment. The 'ILOVEYOU' virus, which appeared in 2000 and infected an estimated 1 in 5 personal computers, is a famous example of a script virus. Strictly speaking, a computer virus is always a program that attaches itself to some other program. But computer virus has become a blanket term that also refers to computer worms. A worm operates entirely on its own, without ever attaching itself to another program. Typically, a worm spreads over e-mail and through other ways that computers exchange information over a network. In this way, a worm not only wreaks havoc on machines, but also clogs network connections and slows network traffic, so that it takes an excessively long time to load a Web page or send an e-mail. ANTI-VIRAL TACTICS Preparation Prevention

and

Computer users can prepare for a viral infection by creating backups of legitimate original software and data files regularly so that the computer system can be restored if necessary. Viral infection can be prevented by obtaining software from legitimate sources or by using a quarantined computer—that is, a computer not connected to any network—to test new software. Plus, users should regularly install operating system (OS) patches, software updates that mend the sort of flaws, or holes, in the OS often exploited by viruses. Patches can be downloaded from 25

the Web site of the operating system’s developer. However, the best prevention may be the installation of current and well-designed antiviral software. Such software can prevent a viral infection and thereby help stop its spread. Virus Detection Several types of antiviral software can be used to detect the presence of a virus. Scanning software can recognize the characteristics of a virus's computer code and look for these characteristics in the computer's files. Because new viruses must be analyzed as they appear, scanning software must be updated periodically to be effective. Other scanners search for common features of viral programs and are usually less reliable. Most antiviral software uses both on-demand and on-access scanners. On-demand scanners are launched only when the user activates them. On-access scanners, on the other hand, are constantly monitoring the computer for viruses but are always in the background and are not visible to the user. The on-access scanners are seen as the proactive part of an antivirus package and the on-demand scanners are seen as reactive. On-demand scanners usually detect a virus only after the infection has occurred and that is why they are considered reactive. Antivirus software is usually sold as packages containing many different software programs that are independent of one another and perform different functions. When installed or packaged together, antiviral packages provide complete protection against viruses. Within most antiviral packages, several methods are used to detect viruses. Checksumming, for example, uses mathematical calculations to compare the state of executable programs before and after they are run. If the checksum has not changed, then the system is uninfected. Checksumming software can detect an infection only after it has occurred, however. As this technology is dated and some viruses can evade it, checksumming is rarely used today. Most antivirus packages also use heuristics (problem-solving by trial and error) to detect new viruses. This technology observes a program’s behavior and evaluates how closely it resembles a virus. It relies on experience with previous viruses to predict the likelihood that a suspicious file is an as-yet unidentified or unclassified new virus. Other types of antiviral software include monitoring software and integrity-shell software. Monitoring software is different from scanning software. It detects illegal or potentially damaging viral activities such as overwriting computer files or reformatting the computer's hard drive. Integrity-shell software establishes layers through which any command to run a program must pass. Checksumming is performed automatically within the integrity shell, and infected programs, if detected, are not allowed to run. Containment Recovery

and

Once a viral infection has been detected, it can be contained by immediately isolating computers on networks, halting the exchange of files, and using only write-protected disks. In order for a computer system to recover from a viral infection, the virus must first be eliminated. Some antivirus software attempts to remove detected viruses, but sometimes with unsatisfactory results. More reliable results are obtained by turning off the infected computer; restarting it from a write-protected floppy disk; deleting infected files and replacing them with legitimate files from backup disks; and erasing any viruses on the boot sector. 26

VIRAL STRATEGIES The authors of viruses have several strategies to circumvent antivirus software and to propagate their creations more effectively. So-called polymorphic viruses make variations in the copies of themselves to elude detection by scanning software. A stealth virus hides from the operating system when the system checks the location where the virus resides, by forging results that would be expected from an uninfected system. A so-called fast-infector virus infects not only programs that are executed but also those that are merely accessed. As a result, running antiviral scanning software on a computer infected by such a virus can infect every program on the computer. A so-called slow-infector virus infects files only when the files are modified, so that it appears to checksumming software that the modification was legitimate. A so-called sparseinfector virus infects only on certain occasions—for example, it may infect every tenth program executed. This strategy makes it more difficult to detect the virus. By using combinations of several virus-writing methods, virus authors can create more complex new viruses. Many virus authors also tend to use new technologies when they appear. The antivirus industry must move rapidly to change their antiviral software and eliminate the outbreak of such new viruses. VIRUS-LIKE PROGRAMS

COMPUTER

There are other harmful computer programs that can be part of a virus but are not considered viruses because they do not have the ability to replicate. These programs fall into three categories: Trojan horses, logic bombs, and deliberately harmful or malicious software programs that run within a Web browser, an application program such as Internet Explorer and Netscape that displays Web sites. A Trojan horse is a program that pretends to be something else. A Trojan horse may appear to be something interesting and harmless, such as a game, but when it runs it may have harmful effects. The term comes from the classic Greek story of the Trojan horse found in Homer’s Iliad. A logic bomb infects a computer’s memory, but unlike a virus, it does not replicate itself. A logic bomb delivers its instructions when it is triggered by a specific condition, such as when a particular date or time is reached or when a combination of letters is typed on a keyboard. A logic bomb has the ability to erase a hard drive or delete certain files. Malicious software programs that run within a Web browser often appear in Java applets and ActiveX controls. Although these applets and controls improve the usefulness of Web sites, they also increase a vandal’s ability to interfere with unprotected systems. Because those controls and applets require that certain components be downloaded to a user’s personal computer (PC), activating an applet or control might actually download malicious code.

27

Practical 6: Practice with file manager & control panel. The control panel is required to customize Windows based Operating systems environment by doing some settings like adjusting screen display and its color settings, modem adjustment, increasing/decreasing the speed of mouse, set/reset password, set key repeat rate, enhance the fonts and their size etc.

Control panel is a Windows based operating systems application used for maintenance of your system. The control panel is a folder full of icons. To operate any operation, control panel should be opened. In the Control Panel, you can do the following operations: (i) (ii) (iii) (iv) (v) (vi) (vii) (viii) (ix) (x) (xi) (xii)

Add new hardware i.e. Plug and Play. Add/remove programs Setting the date and time Customizing your screen display To set the font To set Keyboard, Joystick, mouse, Modem and Printers. To set multimedia and sound system. To set Regional Setting To set the passwords To set network and ODBC or 32 bit ODBC. To set the system properties. To set the power of your system.

28

Practical 7: Practice with MS-Word, operating and closing document, Preparation of document, setting of document, familiarization with various tools, mail-merge practice. Introduction to MS-Word: History-Evolution of Word: Many concepts and ideas of word were brought from bravo, the original GUI word processor developed at Xerox PARC. Bravo’s creator Charles Simonyi left Xerox PARC to work for Microsoft in 1981. Simonyi hired Richard Brodie, who had worked with him on Bravo, away from PARC that summer. On February 1, 1983, development on what was originally named Multi-Tool Word began. Having renamed it Microsoft Word, Microsoft released the program October 25, 1983, for the IBM PC. Free demonstration copies of the application were bundled with the November 1983 issue of PC World, making it the first program to be distributed on-disk with a magazine. However, it was not well received, and sales lagged behind those of rival products such as WordPerfect. Word featured a concept of “What You See Is What You Get”, or WYSIWYG, and was the first application with such features as the ability to display bold and italics text on an IBM PC. Although MS-DOS was a character based system, Microsoft Word was the first word processor for the IBM PC that showed actual line breaks and typeface markups such as bold and 29

italics directly on the screen while editing, although this was not a true WYSIWYG system because available displays did not have the resolution to show actual typefaces. Other DOS word processors, such as WordStar and WordPerfect, used simple text-only display with markup codes on the screen or sometimes, at the most, alternative colors. Word 2007 is the most recent version of Word. This release includes numerous changes, including a new XML-based file format, a redesigned interface, an integrated equation editor, bibliographic management, and support for structured documents. It also has contextual tabs, which are functionally specific only to the object with focus, and many other features like Live Preview (which enables you to view the document without making any permanent change(s), Mini Toolbar, Super-tooltips, Quick Access toolbar, SmartArt, etc. File Formats: Word document formats (.DOC) as of early 2000s were a de facto standard of document file formats due to their popularity. Though usually just referred to as “Word document format”, this term refers primarily to the range of formats used by default in Word version 2-2003. In addition to the default Word binary formats, there are actually a no of optional alternate file formats that Microsoft has used over the years. Rich Text Formats (RTF) was an early effort to create a format for interchanging formatted text between applications. RTF remains an optional format for word that retains most formatting and all content of the original document. Later, after HTML appeared, Word supported an HTML derivative as an additional fullfidelity roundtrip format similar to RTF, with the additional capability that the file could be viewed in a web browser. Word 2007 uses the new Microsoft Office Open XML format as its default format, but retains the older Word 97-2003 format as an option. It also supports (for output only) PDF and XPS format. COMPONENTS OF WORD WINDOW When user opens a Microsoft Word window on the screen, it has number of different parts. These parts are given as under: (a) (b) (c) (d) (e) (f) (g) (h) (i)

Title Bar Menu Bar Tool Bar The Ruler Status Area or Status Bar Scroll Bar Frame Working Area or Document Window Area View Button Bar

30

The main ones are explained as below: (a) Title Bar: The title bar of the MS-Word window displays the name of the program as

“Microsoft Word”. It also displays the name of the document, which is currently opened. If we are creating a new document, then it will be “document1” in the title bar with the “Microsoft Word”. When after typing the textual information you save the document by pressing the Ctrl+S key combination from the keyboard, it will ask you for the name of the document. When you assign the name of the document, it will replace “Document1” with your entered name. You can move the window anywhere on the screen by moving the mouse to title bar. Here click the left mouse button once and by holding the mouse, you drag it anywhere. (b) Menu Bar: The next line or bar of the Word window contains the menu bar. Word’s menus are pulled down from the Menu Bar, located across the top of the screen. The menu bar contains several menu items on the menu pads. Various menus are File, Edit, View, Insert, Format, Tools, Table, and Window and Help having menu pads. Menus are accessed by picking a menu name from the menu pad with the mouse pointer or by pressing Alt+X key combination from the keyboard, where X is the underlined letter in the menu name. On selecting a particular menu pad, Word displays the corresponding pull-down menu. Once a menu is pulled down, you can pick one of the selections with the mouse pointer or again by typing the underlined letter of the desired selection. These various types of menu selections on the pull down menu are also called Menu commands. When a menu command is highlighted, you can get Help information about that selected command by pressing the Function key F1. Now we will study various Pull-down menus as: 31

1. File: The File menu displays several menu commands. The File menu is used to perform a

variety of file and printing operations. The main menu selections or commands in the File pull down menu are New, Open, Close, Save, Save As…, Save All, Properties…, Templates…, Page setup…, Print Preview, Print, Send, Exit and some currently used and saved document files. We can create a new document by selecting New command or pressing the Ctrl+N key combination from the keyboard. You can open an existing document by clicking the open menu command and close it by selecting and clicking the close menu command or menu option. You can save your text or document by clicking the Save Command. If you want to save your document in another drive or directory, then click the Save As command. If you want to save all opened documents then select the Save All command. The properties selection displays information about the current document. You can set the templates by clicking the Templates command. You can set the size, margins and orientation of a page by selecting Page setup command. You can print the document and also take print preview before printing by selecting Print and Print Preview Commands respectively. You can send your document to E-mail by selecting Send to command or option. Ellipses (…) following a menu items or commands indicate that dialogue boxes appear after the menu selection that performs an operation. Exit selection will quit the user from MS-Word. Word also displays recently saved files at the bottom of the file menu. You can open a recently used file by picking it with mouse pointer or by typing the corresponding number. 2. Edit: The Edit menu displays several menu selections as Undo, Clear, Repeat, Cut, Copy,

Paste, Paste Special, Select all, Find, replace, Go to, Auto text, and Book mark. The Edit Menu is used to delete, Copy and move blocks of the text. It also includes Undo (to cancel last executed command) and Repeat the selection (i.e. redo operation). It will also find and replace the text. The paste special selections used to link pasted objects from other applications. You can move to any page with the help of Go to command. The Bookmark selection inserts reference points within a document. Auto text does the alignment of the text. 3. View: The View menu displays the menu commands such as Normal, Outline, Page Layout, Footer, Footnotes, Annotations, and Zoom. The view menu lets you to display your document in no. of ways including Normal, Outline, Page layout, Master Document(which gives you the document’s underlying structure) and Full screen. You can select any one of these views and take the decision which is better for the viewing the information or textual data. View can also turn off and on the display of the tool bars, the ruler, footnotes and annotations. It can also zoom the page size to different percentages. View is used to create, edit header and footers and also set. 4. Insert: The Insert menu displays the several menu commands of Break, Page Number, Annotations, Date and Time, Field, Symbol, Form Field, Footnote, Caption, CrossReference, Index and Tables, File, Frame, Picture, Object and Database. Insert selection gives you the ability to insert a variety of things into your document. This menu is used to insert page and section breaks, page numbers, the current date and time, footnotes, 32

annotations, special symbols, forms, files, pictures, frames, objects, including equations, databases and captions for figures, tables or equations. You can also identify text for an index or table of contents. 5. Format: The Format menu displays menu commands like Font, Paragraph, Tabs, Bullets and Numbering, Heading Numbering, Auto format, Style gallery, Style, Frame, Picture and Drawing objects. The format menu lists options for setting and modifying various fonts, one or all paragraphs formats, to set the borders and apply shading on Borders, to insert or delete columns, to set Bullets and set the Numbers, to set heading numbering, to do auto formation, to apply various style settings, set picture in text and apply drawing objects. 6. Tools: The Tool menu has the main selections as Spelling, Grammar, Thesaurus, Hyphenation, Language, Word count, Auto correct, Mail Merge, Envelopes and Labels, Protect Document, Revisions, Macro, Customize, and Options. In this the user can use the built in spelling checker, grammatical error remover and Thesaurus. User can count the words in the document, set the special characters corresponding to different languages, turns hyphenation on or off, prepares the envelopes and labels, mail merge the documents, create and run macros, customize the various toolbars menus and shortcut keys. It can also protect and unprotect document and set the many Word options. 7. Table: The Table menu displays the selections of Insert row, Delete row, Merge cells, Split cells, Select row, Select column, Select table, Table Autoformat, Cell height and width, Headings, Convert table or text, Sort, Formula, Split Table, and Gridlines. 8. Window: The window menu displays several menu commands like New Window, Arrange All, Split, and some document filenames. The window menu is used to create, arrange and select document windows when more than one document is open. 9. Help: The Help menu comprises of Microsoft Word Help topics, Answer Wizard, The Microsoft Network, Word perfect Help, and about Microsoft Word. By using the help menu option, one can review the information about Word operations. You can press F1 at any selection and get the required help. We can use the Help index and search features to locate specific information. The Answer Wizard can be useful for direct Help. (c) Tool bars: Each Office application comes with a set of tool bars. Word 6.0 and its advanced versions come with several predefined toolbars. Each tool bar has a set of tools that are appropriate for a particular type of task. By default, the standard and Formatting toolbars are displayed but you can display other toolbars at any time by selecting these from the View menu. You can also hide all the toolbars if you want to see more of your document on the screen. The main toolbars in Word 6 for Windows 3.x (3.0/3.1/3.11) are standard, formatting, Border, Database, Drawing, Forms, Microsoft, Word for Windows 2.0 and Tip Wizard . PAGE SETUP (MARGINS AND GUTTERS): Clicking the file menu displays the page setup command. The page setup command will set the margins (top, bottom, left, right, set gutter), define the paper size and its orientations (portrait or landscape), and find the paper source (tray and others) and set the page layout. To work with page setup, first of all click the file menu and select page setup command. When you click this command, a page setup dialog box will be displayed. 33

CHANGING STYLE, FONTS AND FONT STYLE: Styles: Ms-Word comes with a number of built in styles (several paragraph styles and flow character styles) that can be applied to both the document heading and normal text. A style is a named set of formatting characteristics which can quickly and easily paragraph and character formatting to text. You define the style by giving it a name and various paragraphs or character formatting properties. The paragraph or selected text automatically takes on the formatting characteristics assigned to the style. The primary purpose of style is to simplify and standardize formatting. You can create any number of styles according to your requirement. Ms-Word has mainly two types of styles as: Paragraph style and character styles. A paragraph style applies to an entire paragraph and improves the paragraph’s appearance. Some common paragraph formatting characters are line spacing, Indent icon, Tab stops, Border and Font properties. Every paragraph has a style. The default paragraph style is called normal. Character style applies only to selection of text rather than the entire paragraph but you can apply it to whole paragraph. Some common character Paragraph styles are Type face, Face size, Bold, Italics and Underline. 34

Applying style to a text: You can apply a style to a paragraph before or after you type the text in the paragraph. To apply style to a paragraph or character move the mouse pointer to the desired location and highlight the text to which you want to apply style if text is already written otherwise when you type the text, it will automatically take the selected style. Now select the style from the style drop-down list in the Formatting toolbar. This list provides you a preview of each style within the list including the type face and font characteristics. You can also apply style by pressing the Ctrl+Shift+N key combination and to activate the Font drop-down list press the Ctrl+Shift+F key combinations. Also we can apply style by selecting the style command from the Format menu.

PAGE BREAKS: MS-Word automatically warps text to the following page based on page margins, paragraphs indents and other criteria. You can insert a manual page break any time you want to force Word to start a new page. To insert a page break, move the cursor where you want to set the page break. Now there are two ways to set page breaks between the continuous texts. First you can select Break Command from the Insert menu and click the break command. If it is not selected then you can click the Page Break radio button and click the ok button form the break dialog box. 35

HEADERS AND FOOTERS: Header and Footer appear at the top and bottom respectively of a document. Header is a special text, which is often used for repeating the title of document from a page to page and entering page numbers at the top of the document. Also graphics symbol can be displayed at Header. Title of the book is shown on every page of the book work as Header. Footers are often used for the same purpose but at the bottom of a document. You have to enter the text for a header or footer only once. Headers and Footers are also useful for placing backgrounds and watermarks on a page. Auto text: Cut and Copy both store information on the Clipboard. Each time you store new information on the Clipboard, the old information is lost. If you wish to store text permanently so you can use it repeatedly, use Auto text. For this purpose following are the steps: a. Type the following: Auto text information is stored permanently. b. Highlight “Auto text information is stored permanently.” c. Choose Insert> Auto text> New from the menu. d. Microsoft Word suggests a name. The suggestion displays in the dialogue box. Change the name by typing AT in the Please Name Your Auto text Entry Field. e. Click OK. f. Click anywhere in the text area to remove the highlighting. g. Place the cursor between the period in the sentence you just typed and the paragraph marker. h. Press the spacebar twice to leave two blank spaces. i. Type AT. j. Press F3. k. Your text should now read: “Auto text information is stored permanently. Auto text is stored permanently.” The Tab Key: The default tab setting for Microsoft Word is .5 inches. When you press the Tab Key, the cursor moves ½ inches across the page and an arrow appears on the screen. The arrow is a non printing character, when you print your document the arrow does not print. Press the Tab key a few times. Note how the cursor moves across the page. Printing the document file: We can print a document, table, chart or any text or graphics materials from the document file. Note that before using the Print command, document should be opened. Also note that before 36

using the Print command, you should take the view of your printed document using the print preview facility.

PREVIEWING Documents: Previewing is the procedure to view the document before printing i.e. in other words Previewing a document means viewing a screen representation of one or more pages before you print them. To print preview a document, the procedure can be taken as: a. Select the Print Preview option from the file menu. Alternatively, click on the Print Preview button on the standard toolbar. b. Use the magnifier button or select the Zoom options from the view menu to enlarge the document. When you use Print Preview, several preview buttons are displayed on the Print Preview toobar Background printing: Some printing jobs take hours to complete. In such situations, you can use the background printing utility offered by Word. Background printing enables you to do other things while the printer prints in the background. You can also check and control the status of multiple print jobs. In background printing, the system sends the print jobs to a file on the hard disk rather than directly to the printer. It then sends it to the printer in the background.

MAIL MERGE The term mail merge is typically used to describe the process of merging some form of address data base with a form of letter to create a group of individual letters. It is a good feature of the Microsoft Word. Mail merge is used to print letters, envelopes, mailing labels etc. Mail merging uses two files. Actually Mail merging means to combine two different files in one at the time of printing. Mail merge uses the main file or main document and picks the first Name, address from the data files or label files and combine these file into one. Similarly it picks the second address and combines it with general letter and creates the second letter. Again similarly it will continue this process until last address in the data file.

37

How to create a mail merge file:

a) b) c) d)

e)

Mail merge list summarizes the steps involved in performing a mail merge operation: Create the Main letter: It has the general body of letter. Create the Data source: It has the label address of the letter. Define merge files in the main document: User defines merge fields in the main document. These fields tell the Ms-Word where to insert specific data items from the data source. Merge the data with the Main document: when the main document and the data source are ready, you can merge two. The result is a single document containing all the personalized documents with page break separating one document from another. Print the document: as all personalized documents are placed in a single document file, you can print all documents in one operation. Types of documents you can create: The main document in a mail merge operation is the one that contains the boilerplate text and graphics, which are the same in all resulting documents. There are few types of main documents used in Mail merge:-

38

i. Form letter: when you want to create a form letter, Ms-Word merges the main document and the data source to create a single document that contains all he personalized letters, with each letter in its own section. ii. Envelopes: Ms-Word automates the process of creating envelopes, enabling you to specify the envelope type, print options and other variables. iii. Labels: Word allows you to specify the type of label having size, number per page etc. and then creates a main document consisting of page label. Each label cell contains the fields to insert the address information. The resulting merged document contains multiple pages of labels all in one section. iv. Catalog: a catalog is much like a form letter which has resulting merged document contains all the data in one section instead of individual sections.

Practical 8: Practice with C++ with the help of simple exercises giving on hand practice and understanding of various features. 39

C++ is a general-purpose programming language. It is regarded as a middle-level language, as it comprises a combination of both high-level and low-level language features.[1] It was developed by Bjarne Stroustrup starting in 1979 at Bell Labs as an enhancement to the C programming language and originally named "C with Classes". It was renamed to C++ in 1983. C++ is widely used in the software industry. Some of its application domains include systems software, application software, device drivers, embedded software, high-performance server and client applications, and entertainment software such as video games. Several groups provide both free and proprietary C++ compiler software, including the GNU Project, Microsoft, Intel, Borland and others. The language began as enhancements to C, first adding classes, then virtual functions, operator overloading, multiple inheritance, templates, and exception handling among other features. After years of development, the C++ programming language standard was ratified in 1998 as ISO/IEC 14882:1998. That standard is still current, but is amended by the 2003 technical corrigendum, ISO/IEC 14882:2003. The next standard version (known informally as C++0x) is in development. C++ is a statically typed, free-form, multi-paradigm, compiled language where compilation creates machine code for a target machine hardware. Stroustrup began work on 'C with Classes' in 1979. The idea of creating a new language originated from Stroustrup's experience in programming for his Ph.D. thesis. Stroustrup found that Simula had features that were very helpful for large software development, but the language was too slow for practical use, while BCPL was fast but too low-level to be suitable for large software development. When Stroustrup started working in AT&T Bell Labs, he had the problem of analyzing the UNIX kernel with respect to distributed computing. Remembering his Ph.D. experience, Stroustrup set out to enhance the C language with Simula-like features. C was chosen because it was general-purpose, fast, portable and widely used. Besides C and Simula, some other languages that inspired him were ALGOL 68, Ada, CLU and ML. At first, the class, derived class, strong type checking, inlining, and default argument features were added to C via Cfront. The first commercial release occurred in October 1985.[2] In 1983, the name of the language was changed from C with Classes to C++ (++ being the increment operator in C and C++). New features were added including virtual functions, function name and operator overloading, references, constants, user-controlled free-store memory control, improved type checking, and BCPL style single-line comments with two forward slashes (//). In 1985, the first edition of The C++ Programming Language was released, providing an important reference to the language, since there was not yet an official standard. In 1989, Release 2.0 of C++ was released. New features included multiple inheritance, abstract classes, static member functions, const member functions, and protected members. In 1990, The Annotated C++ Reference Manual was published. This work became the basis for the future standard. Late addition of features included templates,exceptions, namespaces, new casts, and a Boolean type. As the C++ language evolved, a standard library also evolved with it. The first addition to the C++ standard library was the stream I/O library which provided facilities to replace the traditional C functions such as printf and scanf. Later, among the most significant additions to the standard library, was the Standard Template Library. 40

C++ continues to be used and is still one of the preferred programming languages to develop professional applications. The language has gone from being mostly Western, to attracting programmers from all over the world.[3] Language standard In 1998, the C++ standards committee (the ISO/IEC JTC1/SC22/WG21 working group) standardized C++ and published the international standard ISO/IEC 14882:1998 (informally known as C++98[4]). For some years after the official release of the standard, the committee processed defect reports, and published a corrected version of the C++ standard, ISO/IEC 14882:2003, in 2003. In 2005, a technical report, called the "Library Technical Report 1" (often known as TR1 for short), was released. While not an official part of the standard, it specified a number of extensions to the standard library, which were expected to be included in the next version of C++. Support for TR1 is growing in almost all currently maintained C++ compilers. While the C++ language is royalty-free, the standard document itself is not freely available. According to Stroustrup: "the name signifies the evolutionary nature of the changes from C".[5] During C++'s development period, the language had been referred to as "new C", then "C with Classes". The final name is credited to Rick Mascitti (mid-1983) and was first used in December 1983. When Mascitti was questioned informally in 1992 about the naming, he indicated that it was given in a tongue-in-cheek spirit. It stems from C's "++" operator (which increments the value of a variable) and a common naming convention of using "+" to indicate an enhanced computer program. There is no language called "C plus".ABCL/c+ was the name of an earlier, unrelated programming language. Standard library The 1998 ANSI/ISO C++ standard consists of two parts: the core language and the C++ standard library; the latter includes most of the Standard Template Library (STL) and a slightly modified version of the C standard library. Many C++ libraries exist which are not part of the standard, and, using linkage specification, libraries can even be written in languages such as C, Fortran, Pascal, or BASIC. Which of these are supported is compiler dependent. The C++ standard library incorporates the C standard library with some small modifications to make it optimized with the C++ language. Another large part of the C++ library is based on the STL. This provides such useful tools as containers (for example vectors and lists), iterators to provide these containers with array-like access and algorithms to perform operations such as searching and sorting. Furthermore (multi)maps (associative arrays) and (multi)sets are provided, all of which export compatible interfaces. Therefore it is possible, using templates, to write generic algorithms that work with any container or on any sequence defined by iterators. As in C, the features of the library are accessed by using the #include directive to include a standard header. C++ provides 69 standard headers, of which 19 are deprecated. The STL was originally a third-party library from HP and later SGI, before its incorporation into the C++ standard. The standard does not refer to it as "STL", as it is merely a part of the standard library, but many people still use that term to distinguish it from the rest of the library (input/output streams, internationalization, diagnostics, the C library subset, etc.). Most C++ compilers provide an implementation of the C++ standard library, including the STL. Compiler-independent implementations of the STL, such as STLPort, also exist. Other projects 41

also produce various custom implementations of the C++ standard library and the STL with various design goals. Language features C++ inherits most of C's syntax and the C preprocessor. The following is a Hello world program which uses the C++ standard library stream facility to write a message to standard output:[6][7] #include int main() { std::cout << "Hello, world!"; } Operators and operator overloading C++ provides more than 30 operators, covering basic arithmetic, bit manipulation, indirection, comparisons, logical operations and more. Almost all operators can be overloaded for userdefined types, with a few notable exceptions such as member access (. and .*). The rich set of overloadable operators is central to using C++ as a domain specific language. The overloadable operators are also an essential part of many advanced C++ programming techniques, such as smart pointers. Overloading an operator does not change the precedence of calculations involving the operator, nor does it change the number of operands that the operator uses (any operand may however be ignored). Templates See also: generic programming and template metaprogramming C++ templates enable generic programming. C++ supports both function and class templates. Templates may be parameterized by types, compile-time constants, and other templates. C++ templates are implemented by instantiation at compile-time. To instantiate a template, compilers substitute specific arguments for a template's parameters to generate a concrete function or class instance. Templates are a powerful tool that can be used for generic programming, template metaprogramming, and code optimization, but this power implies a cost. Template use may increase code size, since each template instantiation produces a copy of the template code: one for each set of template arguments. This is in contrast to run-time generics seen in other languages (e.g. Java) where at compile-time the type is erased and a single template body is preserved. Templates are different from macros: while both of these compile-time language features enable conditional compilation, templates are not restricted to lexical substitution. Templates are aware of the semantics and type system of their companion language, as well as all compile-time type definitions, and can perform high-level operations including programmatic flow control based on evaluation of strictly type-checked parameters. Macros are capable of conditional control over compilation based on predetermined criteria, but cannot instantiate new types, recurse, or perform type evaluation and in effect are limited to pre-compilation text-substitution and text42

inclusion/exclusion. In other words, macros can control compilation flow based on pre-defined symbols but cannot, unlike templates, independently instantiate new symbols. Templates are a tool for static polymorphism (see below) and generic programming. In addition, templates are a compile time mechanism in C++ which is Turing-complete, meaning that any computation expressible by a computer program can be computed, in some form, by a template metaprogram prior to runtime. In summary, a template is a compile-time parameterized function or class written without knowledge of the specific arguments used to instantiate it. After instantiation the resulting code is equivalent to code written specifically for the passed arguments. In this manner, templates provide a way to decouple generic, broadly-applicable aspects of functions and classes (encoded in templates) from specific aspects (encoded in template parameters) without sacrificing performance due to abstraction. Objects C++ introduces object-oriented (OO) features to C. It offers classes, which provide the four features commonly present in OO (and some non-OO) languages: abstraction, encapsulation, inheritance, andpolymorphism. Objects are instances of classes created at runtime. The class can be thought of as a template from which many different individual objects may be generated as a program runs. Encapsulation Encapsulation is the hiding of information. C++ implements encapsulation by allowing all members of a class to be declared as either public, private, or protected. A public member of the class is accessible to any function. A private member is accessible only to functions that are members of that class and to functions and classes explicitly granted access permission by the class ("friends"). A protected member is accessible to members of classes that inherit from the class in addition to the class itself and any friends. The OO principle is that all of the functions (and only the functions) that access the internal representation of a type should be encapsulated within the type definition. C++ supports this (via member functions and friend functions), but does not enforce it: the programmer can declare parts or all of the representation of a type to be public, and is allowed to make public entities that are not part of the representation of the type. Because of this, C++ supports not just OO programming, but other weaker decomposition paradigms, like modular programming. It is generally considered good practice to make all data private or protected, and to make public only those functions that are part of a minimal interface for users of the class. This hides all the details of data implementation, allowing the designer to later fundamentally change the implementation without changing the interface in any way.[8][9] Inheritance Inheritance allows one data type to acquire properties of other data types. Inheritance from a base class may be declared as public, protected, or private. This access specifier determines whether unrelated and derived classes can access the inherited public and protected members of the base class. Only public inheritance corresponds to what is usually meant by "inheritance". The other two forms are much less frequently used. If the access specifier is omitted, a "class" inherits privately, while a "struct" inherits publicly. Base classes may be declared as virtual; this is 43

called virtual inheritance. Virtual inheritance ensures that only one instance of a base class exists in the inheritance graph, avoiding some of the ambiguity problems of multiple inheritance. Multiple inheritance is a C++ feature sometimes considered controversial. Multiple inheritance allows a class to be derived from more than one base class; this can result in a complicated graph of inheritance relationships. For example, a "Flying Cat" class can inherit from both "Cat" and "Flying Mammal". Some other languages, such as Java or C#, accomplish something similar (although more limited) by allowing inheritance of multiple interfaces while restricting the number of base classes to one (interfaces, unlike classes, provide only declarations of member functions, no implementation or member data). Polymorphism Polymorphism enables one common interface for many implementations, and for objects to act differently under different circumstances.

C++ supports several kinds of static (compile-time) and dynamic (run-time) polymorphisms. Compile-time polymorphism does not allow for certain run-time decisions, while run-time polymorphism typically incurs a performance penalty.

Static polymorphism Function overloading allows programs to declare multiple functions having the same name (but with different arguments). The functions are distinguished by the number and/or types of their formal parameters. Thus, the same function name can refer to different functions depending on the context in which it is used. The type returned by the function is not used to distinguish overloaded functions. When declaring a function, a programmer can specify default arguments for one or more parameters. Doing so allows the parameters with defaults to optionally be omitted when the function is called, in which case the default arguments will be used. When a function is called with fewer arguments than there are declared parameters, explicit arguments are matched to parameters in left-to-right order, with any unmatched parameters at the end of the parameter list being assigned their default arguments. In many cases, specifying default arguments in a single function declaration is preferable to providing overloaded function definitions with different numbers of parameters. Templates in C++ provide a sophisticated mechanism for writing generic, polymorphic code. In particular, through the Curiously Recurring Template Pattern it's possible to implement a form of static polymorphism that closely mimics the syntax for overriding virtual functions. Since C++ templates are type-aware and Turing-complete they can also be used to let the compiler resolve recursive conditionals and generate substantial programs through template metaprogramming. Dynamic polymorphism Inheritance Variable pointers (and references) to a base class type in C++ can refer to objects of any derived classes of that type in addition to objects exactly matching the variable type. This allows arrays 44

and other kinds of containers to hold pointers to objects of differing types. Because assignment of values to variables usually occurs at run-time, this is necessarily a run-time phenomenon. C++ also provides a dynamic_cast operator, which allows the program to safely attempt conversion of an object into an object of a more specific object type (as opposed to conversion to a more general type, which is always allowed). This feature relies on run-time type information (RTTI). Objects known to be of a certain specific type can also be cast to that type with static_cast, a purely compile-time construct which is faster and does not require RTTI. Virtual member functions Ordinarily when a function in a derived class overrides a function in a base class, the function to call is determined by the type of the object. A given function is overridden when there exists no difference, in the number or type of parameters, between two or more definitions of that function. Hence, at compile time it may not be possible to determine the type of the object and therefore the correct function to call, given only a base class pointer; the decision is therefore put off until runtime. This is called dynamic dispatch. Virtual member functions or methods[10] allow the most specific implementation of the function to be called, according to the actual run-time type of the object. In C++, this is commonly done using virtual function tables. If the object type is known, this may be bypassed by prepending a fully qualified class name before the function call, but in general calls to virtual functions are resolved at run time. In addition to standard member functions, operator overloads and destructors can be virtual. A general rule of thumb is that if any functions in the class are virtual, the destructor should be as well. As the type of an object at its creation is known at compile time, constructors, and by extension copy constructors, cannot be virtual. Nonetheless a situation may arise where a copy of an object needs to be created when a pointer to a derived object is passed as a pointer to a base object. In such a case a common solution is to create a clone() (or similar) function and declare that as virtual. The clone() method creates and returns a copy of the derived class when called. A member function can also be made "pure virtual" by appending it with = 0 after the closing parenthesis and before the semicolon. Objects cannot be created of a class with a pure virtual function and are called abstract data types. Such abstract data types can only be derived from. Any derived class inherits the virtual function as pure and must provide a non-pure definition of it (and all other pure virtual functions) before objects of the derived class can be created. An attempt to create an object from a class with a pure virtual function or inherited pure virtual function will be flagged as a compile-time error.

45

Practical 9: Implementation of simple programs.

1.

WAP to print hello on screen

#include #include void main() { clrscr(); cout<<"HELLO"; getch(); }

output

46

2.

WAP to find sum of two numbers

#include #include void main() { int a,b,c; clrscr(); cout<<"enter first number : "; cin>>a; cout<<"enter second number : "; cin>>b; c=a+b; cout<<"sum of two numbers is : "<
}

output

3.

WAP to find product of two numbers

#include #include void main() { int a,b,c; clrscr(); cout<<"enter first number : "; cin>>a; cout<<"enter second number : "; cin>>b; c=a*b; cout<<"product of numbers is : "<
}

output

4.

WAP to swap two numbers using third variable

#include #include void main() { int a,b,c; clrscr(); cout<<"enter first number : "; cin>>a; cout<<"enter second number : "; cin>>b; c=a; a=b; b=c; 49

cout<
output

5.

WAP to find area of circle

#include #include void main() { float r,a; clrscr(); cout<<"enter radius of circle : "; cin>>r; a=3.14*r*r; cout<<"area of circle is

: "<
getch(); } 50

output

6.

WAP to find square root of any number

#include #include #include<math.h> void main() { long float a,b; clrscr(); cout<<"enter any number

: ";

cin>>a; b=sqrt(a); cout<<"square root of number is : "<
output

7.

WAP to find area of triangle using hero`s formula

#include #include #include<math.h> void main() { long float a,b,c,s,area; clrscr(); cout<<"enter the value of three sides of triangle : "; cin>>a>>b>>c; s=(a+b+c)/2; area=sqrt(s*(s-a)*(s-b)*(s-c)); cout<<"area of triangle is

: "<<area;

getch(); 52

}

output

8.

WAP to swap two numbers without using third variable

#include #include void main() { long int a,b; clrscr(); cout<<"enter first number : "; cin>>a; cout<<"enter second number : "; cin>>b; a=a+b; b=a-b; a=a-b; cout<
getch(); }

output

9.

WAPto find area & circumference of circle, volume & circumference of sphere and average of three numbers

#include #include void main() { long float r,r1,a,c,v1,c1,x,y,z,average; clrscr(); cout<<"enter radius of circle : "; cin>>r; cout<<"enter radius of sphere : "; cin>>r1; cout<<"enter any three numbers : "; cin>>x>>y>>z; a=3.14*r*r; c=2*3.14*r; 54

v1=(4/3)*3.14*r1*r1*r1; c1=4*3.14*r1*r1; average=(x+y+z)/3; cout<<"area of circle is

: "<
cout<<"cirumference of circle is : "<
: "<
cout<<"cirumference of sphere is : "<
output

55

10.

WAP to print

5

on screen

10 9 #include #include void main() { int a=5,b,c; clrscr(); cout<
output

11.

WAP to find reverse of any number

#include #include void main() { long int r,s,n; clrscr(); cout<<endl<<"enter any number : "; cin>>n; s=0; while(n>0) { r=n%10; s=s*10+r; n=n/10; } 57

Cout<
output

58

12.

WAP to print

4

on screen

20 22 #include #include void main() { int a=5,b,c; clrscr(); cout<
output 59

13.

WAP to convert integer number to float number

#include #include void main() { int a; float b,c; clrscr(); cout<<"enter any two numbers not completely divisible : "; cin>>a>>b; c=a/b; cout<<"output :"<
output

60

14.

WAP to find greatest of three numbers using nested if statement

#include #include void main() { int a,b,c; clrscr(); cout<<"enter first number a : "; cin>>a; cout<<"enter second number b : "; cin>>b; cout<<"enter third number c : "; cin>>c; if(a>b&&b>c) cout<<"a is greatest"; else if(b>a&&b>c) 61

cout<<"b is greatest"; else cout<<"c is greatest"; getch(); }

output

62

15.

WAP to find total marks and percentage

#include #include void main() { float a,b,c,d,e,t,p; clrscr(); cout<<"enter marks in engg. mathematics : "; cin>>a; cout<<"enter marks in FCPIT

: ";

cin>>b; cout<<"enter marks in EME

: ";

cin>>c; cout<<"enter marks in chemistry

: ";

cin>>d; cout<<"enter marks in E.D.

: ";

cin>>e; t=a+b+c+d+e; 63

p=(t/150)*100; cout<<"total marks cout<<"pecentage of marks

: "<
getch(); }

output

64

16.

WAP to print 12 as

1 2

#include #include void main() { int a,b,c; clrscr(); cout<<"enter any two digit number : "; cin>>a; b=a/10; c=a%10; cout<
output 65

17.

WAPto calculate sum of values enter to corresponding years

#include #include void main() { long int a,b,c,d,e,t; clrscr(); cout<<"enter value corresponding to year 1992 : "; cin>>a; cout<<"enter value corresponding to year 1994 : "; cin>>b; cout<<"enter value corresponding to year 1996 : "; cin>>c; cout<<"enter value corresponding to year 2000 : "; cin>>d; cout<<"enter value corresponding to year 2007 : "; cin>>e; t=a+b+c+d+e; 66

cout<<"sum of all corresponding value are

: "<
getch(); }

output

67

18.

WAP to caluclate bonus of employee using nested if statement

# include # include void main() { clrscr(); int code; float salary, bonus; cout<<" enter the code of employee ="; cin>>code; cout<<" enter the salary of employee ="; cin>>salary; if(code==1) { if(salary>5000) { bonus=.05*salary; } else { 68

bonus=0.02*salary; } } else { bonus=0.10*salary; } cout<<" bonus is:"<
output

69

19.

WAP to find grade of student using switch case statement

#include #include void main() { clrscr(); int p,c,m,t,per; char g; cout<<"enter the marks of 3 subjects: "; cin>>p>>c>>m; t=p+c+m; per=t/3; switch(per/10) { case 10: case 9: case 8: g='A'; cout<<"distinction"; break; 70

case 7: case 6: g='B'; cout<<"first division"; break; case 5: case 4: g='C'; cout<<"second division"; break; ; default: g='F'; cout<<"fail"; } cout<<" grade is = "<
output

71

20.

WAP to check number is palindrome or not

#include #include void main() { clrscr(); int a,b,c=0,temp; cout<<"enter the number : "; cin>>a; temp=a; while(temp>0) { b=temp%10; temp=temp/10; c=c*10+b; } cout<<"reverse

: "<
if(a==c) cout<<"palindrome"; else cout<<"not palindrome"; 72

getch(); }

output

73

21.

WAP to show the working of a preliminary calculator:

#include #include #include<math.h> void main() { int n, n1, n2, c, x; float r=0; xyz: clrscr(); gotoxy(36,2);cout<<"CALCULATOR"; cout<<"\n1.Addition\n2.Subtraction\n3.Multiplication\n4.Division\n5.Exit"; cout<<"\nEnter Choice(1,2,3,4,5) :"; cin>>c; switch(c) { case 1 :cout<<"How many numbers?\n";cin>>n; for (x=1; x<=n; x++) {

cout<<"\nEnter value :";cin>>n1; r = r+n1;

}

cout<<"\nSum is :"<
case 2 :cout<<"Enter first number :";cin>>n1; cout<<"\nEnter second number :";cin>>n2; r = n1 - n2; cout<<"\nDifference :"<>n; for (x=1; x<=n; x++) {

cout<<"Enter Value :";cin>>n1; r = r*n1;

}

cout<<"Product :"<>n1; cout<<"\nEnter second value :";cin>>n2; r = n1/n2; cout<<"Result is :"<
75

Output:

76

22. WAP to print Fibonacci series #include #include void main() { clrscr(); int n; cout<<"enter the last limit for the series(>2)"; cin>>n; int a=1,b=1,c=0; cout<
output: 77

23.

WAP to print table of a number:

#include #include 78

void main() { clrscr(); int n,i; cout<<"\nEnter a Number :"; cin>>n; for(i=1; i<=10; ++i) cout<<"\n "<
Output:

24. WAP to print the following pattern for n rows * * * * * * 79

* * * #include #include void main( ) { int i,j,x,u,k,l; clrscr( ); for(i=1;i<=5;i++) { for(j=40-i;j>=1;j--) { cout<<" "; } for(x=1;x<=i;x++) { cout<<"*"<<" "; } cout<<"\n"; } for(u=4;u>=1;u--) { for(k=40-u;k>=1;k--) { cout<<" "; } for(l=1;l<=u;l++) { cout<<"*"<<" "; 80

} cout<<"\n"; } getch( ); } Output:

25.WAP to calculate factorial of a no. #include #include 81

void main( ) { clrscr( ); float fac=1;int n; cout<<"enter number"; cin>>n; for(int i=n;i>=1;i--) { fac=fac*i; } cout<<"\n the fatorial of "<
Output:

26.

WAP to do addition of matrix:

#include #include 82

#include void main() { clrscr(); int m[3][3] = {{1,1,1},{2,2,2},{3,3,3}}, n[3][3] = {{1,1,1},{2,2,2},{3,3,3}}; int r, c; cout<<"Matrix M\n--------\n"; for (r=0; r<3; r++) { for (c=0; c<3; c++) { cout<<setw(3)<<m[r][c]; } cout<<"\n"; } cout<<"\nMatrix N\n--------\n"; for (r=0; r<3; r++) { for (c=0; c<3; c++) { cout<<setw(3)<
} cout<<"\n"; } getch(); }

Output:

27. WAP for multiplication of matrix: #include #include #include<stdlib.h> 84

#include void main() { clrscr(); int x[20][20], y[20][20], z[20][20], m, n, p, q, k, r, c; cout<<"Enter size of matrix X (for row and column) :"; cin>>m>>n; cout<<"\n\nEnter size of matrix Y (for row and column) ;"; cin>>p>>q; if (n!=p) { cout<<"\n\nMultiplication is not possible."; getch(); exit(0); } else { for (r=0; r<m; r++) { for (c=0; c>x[r][c]; } } for (r=0; r
{ cout<<"Enter value for matrix Y : "; cin>>y[r][c]; } } for (r=0; r<m; r++) { for (c=0; c
cout<<setw(5)<
Output:

87

28. WAP to find the sum of rows and columns of a matrix: 88

#include #include #include void main() { clrscr(); int a[4][4]= {{1,5,6,3},{5,2,6,3},{3,4,1,7},{6,8,2,0}}, r, c, tr=0, tc=0; for (r=0; r<4; r++) { for (c=0; c<4; c++) { cout<<setw(4)<
"<
tr=0; } cout<<"-----------------\n"; for (r=0; r<4; r++) { for (c=0; c<4; c++) { tc = tc + a[c][r]; } cout<<setw(4)<
getch(); }

Output:

WAP to input 2 numbers and swap them(application of call by reference method of functions) 29.

#include 90

#include void swap_ref (int &a, int &b) { int t=0; t=a; a=b; b=t; } void main() { int x,y; cout<<"Enter Values for x and y :\n"; cin>>x>>y; swap_ref(x,y); cout<<"x="<<x<<" y="<
Output:

91

30. WAP to illustrate the working of structures. #include 92

#include

struct distance { int feet; int inches; };

int main() { clrscr(); distance length1,length2; void prnsum(distance l1, distance l2); cout<<"Enter length 1:"<<"\n"; cout<<"feet:"; cin>>length1.feet; cout<<"\n"<<"inches:"; cin>>length1.inches; cout<<"\n\n enter length 2: "<<"\n"; cout<<"feet:"; cin>>length2.feet; cout<<"\n"<<"inches:"; cin>>length2.inches; prnsum(length1, length2); } void prnsum(distance l1, distance l2) { distance l3; l3.feet=l1.feet+l2.feet+(l1.inches+l2.inches)/12; l3.inches=(l1.inches+l2.inches)%12; 93

cout<<"\n\n Total Feet:"<
31. WAP to illustrate single level inheritance. #include #include<stdio.h> //for gets #include //for clrscr const int LEN = 25; class employee { 94

char name[LEN]; long enumb; public: void getdata() { cout<<"Enter Name pleez : "; gets(name); cout<<"Enter Employee No.:" ; cin>>enumb; } void putdata() { cout<<"Name is :"<>basic; } }; class Manager : public employee

//manager is derived

{ private : char title[LEN]; public : void getdata() { employee :: getdata(); getbasic(); 95

cout<<"Enter Title : "; gets(title); cout<<"\n"; } void putdata() { employee::putdata(); cout<<"\nTitle is : "<
output:

96

32. WAP using classes and objects to simulate result preparation system for 20 students. the data for each student include roll no, name and marks in 3 subjects. the percentage marks and grade are to be calculated from the above info. the percentage marks are the average marks and the grade system is calculated as follows:

percentage marks

grade

<50

F 97

>50<60

D

>60<75

C

>75<90

B

>90<100

A

#include const int obj=2; const int size=3; class student { int rollno; char name[21]; float marks[size]; float perc; char grade;

public: void getval(void) { char ch; cout<<"enter data"; cout<<"\n"<<"roll no:"; cin>>rollno; cin.get(ch); cout<<"\n"<<"Name:"; cin.getline(name,21); for(inti=0,i<size,i++) { cout<<"\n"<<"enter marks for subject"<<(i+1)<<":"; cin>>marks[i]; 98

} cout<<"\n"; } void calculate(void); void prnresult (void); };

void student::calculate(void) { float total; total= marks[0]+marks[1]+marks[2]; perc=total/3;

if(perc<50) grade='F'; else if(perc<60) grade='D'; else if(perc<75) grade='C'; else if(perc<90) grade='B'; else grade='A'; }

void student:: prnresult(void) { cout<<"\n" cout<<"rollno: "<
cout.write(name,21); cout<<"\n"; cout<<"marks in subject 1: "<<marks[0]<<"\n"; cout<<"marks in subject 2: "<<marks[1]<<"\n"; cout<<"marks in subject 3: "<<marks[2]<<"\n"; cout<<"total marks: "<<(marks[0]+marks[1]+marks[2])<<"\n"; cout<<"percentage marks:"<
100

output:

101

10. Internet Browsing Internet: The internet is a network of computer networks that makes it possible for any computer connected to it to send and receive data from any other computer connected to it. America Online, CompuServe, etc. are examples of Internet service providers. They make it physically possible for users to send and access data from the Internet. They allow you to send and receive data to and from their computers or routers which are connected to the Internet. It supports: • • •

Multimedia Information (text, movies, pictures, sound, programs…). Hypertext Information (information that contains link to other information resources). Graphic user Interface (so users can point and click to request information instead o typing in text commands).

The server software for the World Wide Web is called HTTP server (or informally a Web server). Examples are Mac HTTP, CERN HTTP, and NCSA HTTP. The client software for World Wide Web is called a Web Browser. Examples are: Netscape, Internet Explorer, and Lynx. These examples are particular “brands” of software that have a similar function, just like Lotus 123 and Excel are both spreadsheet software packages. There are many different information protocols/services besides HTTP (HyperText Transfer Protocol). Some of these are: • • •

E-mail (STMP) - for sending information electronic mail messages. Usenet News (NNTP) – for having electronic group discussions. File Transfer Protocol (FTP) – for transferring files between computers. 102

• • •

Telnet – for running programs on remote computers. WAIS – for searching remote collections of indexed information Gopher – for browsing remote text information through a menu interface.

The internet has actually redefined the concept of information resources and the process of conducting research. Today, the term information resource encompasses not only materials available in libraries such as books, periodicals, and audiovisual materials, but also includes email messages stored in discussion group archives, electronic books, online magazines, journals and encyclopedia articles from Internet-accessible databases or research services, sound files, maps, digital photographs, streaming audio or video files that can be downloaded to your home computer, interactive tutorials offering a variety of multimedia features, or a new type of resource that may be created tomorrow. Although computers are now the primary means of accessing the Internet, other devices are being used, such as cell phones, personal digital assistants, and pagers, which can send and receive e-mail and access the Web. Soon, a variety of appliances, including your car on your TV set, may be connected to the network, communicating with each other, and providing access to information. The internet has expanded at a very fast pace in the past few couple of years.

Internet connectivity: To have a dial up connection, following are required: • • • • • • •

Computer Modem. Configuration: 28.8 kbps TCP/IP software, e.g. Win95 Dial-up Networking, Trumpet Winsock Internet application software, e.g. Netscape Navigator, Internet Explorer ISP dial-up telephone number. ISP DNS name-server address. ISP mail-server address.

To go online your computer must be equipped with a modem a device that translates the digital signals from your computer into analog signals that travel over a standard phone line. Those are the scratchy sounds you hear from a modem’s speaker. A modem on the other end of the line understands it and converts it sounds back into digital information. Modems come in different speeds and are measured in bps or bits per second. A 28.8 Kbps modem transmits data at speeds upto 28,800 bits per second. A 56 Kbps modem is twice as fast, sending and receiving data at a rate of upto 56000 bits per second. To connect an external modem to your computer, you’ll need a serial modem cable. Most likely, your computer will have a connector on the back labelled serial. This connector comes in two varieties : 9-pin(male) or 25-pin (female). If you have only one of these ports, it will 103

probably be COM1. If you have two, one will be COM1, and the other will be COM2. After you plug in your modem, you can sign up for Internet service. Usually your setup program will try and find your modem and its COM port. If it can’t , it will ak you which COM port your modem is attached to. If you don’t know, the easiest thing to do is try them all. Even if you have all serial ports, you may be able to select one of the four COM ports. Also, there are some other devices that use the COM ports. In some computers, the mouse is plugged into a serial port. This is known as a serial mouse. If you’ve got a serial mouse plugged into COM1, then just plug the modem into COM2. If you don’t have a second COM port, you can purchase a card that goes inside your computer that will give you a second COM port. If this is necessary, you should check with the manufacturer of your computer.

Working of Internet: PROTOCOLS You might take for granted that when you retrieve a file of information or send an email message across the Internet it will always reach its destination. But sometimes it doesn’t, because the process for sending information is extremely complex. In order for the Internet to work in connecting many different types of computers, software and files together, standardized rules called protocols must be used, that define how computers communicate. A good example of an early communications protocol was Morse Code. The protocol for Morse Code used standardized dots and dashes to communicate over telegraph lines by transmitting electrical impulses. These connections are made with a series of protocols called TCP/IP. The TCP/IP protocols define the Internet a packet switched network. With a packet switched conection, there is no single, unbroken connection between sender and receiver, like there is with the telephone system. A packet –switched network does not require two computers to establish a dedicated, unbroken connection for data transfer. It instead breaks the data into small units or packets and transfer the packets over any phone or data lines that are currently available. When you ask your browser to go to a specific Internet address, or when yo click on a hyperlink, the sending computer breaks the data you have asked for into packets. Each packet contains a piece of the data. Each packet is labeled with the addresses of the sending and receiving computers along with some instructions on how to put the data back together again once it has reached its destination. The data in these small packets is transferred over phone lines or data lines. The packets take different routes through a complex series of routes. Each router examines the destination address and decides the best way to get the packets to their destination. The packets eventually all reach their destination, your computer, and are put back together again, using the instructions they have been labeled with. This is why sometimes takes a while to load the data, before information appears on your screen. Of course, the speed of the data transfer depends on the type of network connection or modem you use.

104

All Internet functions depend on Protocols, which standardize how the data for those functions are transferred. Such protocols include :

HTTP- Hypertext Protocol

Transfer Protocol for accessing World Wide Web documents

FTP- File Transfer Protocol

Protocol for transferring computer to another

files

from

one

GOPHER

Protocol for accessing documents via Gopher Menus (archiac,no longer widely used)

Telnet

Protocol that allows user to logon to a remote computer

105

Related Documents

Ptu
November 2019 11
Btech
June 2020 9
Btech
July 2020 6
Btech
May 2020 12
Yr
November 2019 32

More Documents from ""