0% found this document useful (0 votes)
25 views

It Skill Manual

Uploaded by

advika9696
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

It Skill Manual

Uploaded by

advika9696
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

II KAMMAVARI SANGAM II

K.S. GROUP OF INSTUITIONS

K S POLYTECHNIC

(Approved by: A.I.C.T.E AND Govt of Karnataka)


Department of Computer Science and Engg
LAB MANUAL

SUBJECT NAME: IT SKILLS


CODE: 20CS 01P

Submitted by:
Name:
Reg no:
Sem:
UNIT 1
INTRODUCTION TO BASICS OF CODING

WEEK1
TABLE OF CONTENTS:
1 Introduction To Basics Of Coding
1.1 Introduction To Computer Programming
1.2 Algorithms -With Examples
1.3 Flowcharts -Simple Programs
1.4 Practical Skill Exercise
1.4.1 Write An Algorithm For Programmable Problems
1.5 Introduction To Application Development
1.5.1 Mit App Inventor:
1.6 Practical Skill Exercise
1.6.1 Design A Text-To-Speech App By Using Mit App Inventor.
1.6.2 Design A Simple Calculator App By Using Mit App Inventor.
1.6.3 Design And Create Simple Game Using Mit-Scratch/Code.Org.
1.7 Activity
1
1.1. Introduction To Computer Programming:
A computer programming is a sequence of instructions written using a computer programming
language like C, C++ or java to perform a specified task by the computer.

1.2 Algorithm:
An algorithm is a set of computation steps performed to obtain the solution for a given problem.
OR
A procedure for solving a mathematical problem (as of finding the greatest common divisor) in a finite
number of steps that frequently involves repetition of an operation.
OR
A step-by-step procedure for solving a problem or accomplishing some end.
a) Add / subtract two numbers.
Step 1: Start
Step 2: Input A & B
Step 3: Add A& B
Step 4: C=A+B
Step 5: Print C
Step 6: Stop
1.3 Flowchart:
A flowchart is a graphical representation of steps. It was originated from computer science as a tool
for representing algorithms and programming logic but had extended to use in all other kinds of
processes.

Benefits:
1. It helps to clarify complex processes.
2. It helps team members gain a shared understanding of the process and use this knowledge to
collect data, identify problems, focus discussions, and identify resources.
3. It serves as a basis for designing new processes.

Flowchart Symbols:
Symbol Name Function / Description

Terminator The terminator symbol


represents the starting or
ending point of the system.
Process A rectangle represents a
process

Document This represents a printout,


such as a document or a
report.

Decision A diamond represents a


decision or branching point.
Lines coming out from the
diamond indicates different
possible situations, leading to
different sub-processes.
Data It represents information
OR entering or leaving the
Input / Output system.

On-Page Reference This symbol would contain a


letter inside. It indicates that
the flow continues on a
matching symbol containing
the same letter somewhere
else on the same page.
Off-Page Reference This symbol would contain a
letter inside. It indicates that
the flow continues on a
matching symbol containing
the same letter somewhere
else on a different page.
Flow / Arrow Lines represent the flow of
the sequence and direction of
a process.

a) add / subtract two numbers.


1.4 Practical Skill Programs:

• write an algorithm for programmable problems:

a) Algorithm for adding two numbers.

Step 1: Start
Step 2: Input A & B
Step 3: Add A& B
Step 4: C=A+B
Step 5: Print C
Step 6: Stop

Flow chart for adding two numbers.

b) Algorithm for subtracting two numbers.

Step 1: Start
Step 2: Input A & B
Step 3: subtract A& B
Step 4: C=A-B
Step 5: Print C
Step 6: Stop
Flow chart for subtracting two numbers.

c) Find The Largest / Smallest Of 3 Numbers.


Step 1: Start
Step 2: read three numbers A, B & C
Step 3: if A>B, then go to step 6
Step 4: if B>C, then print B and go to step 8
Step 5: print C is greatest & go to step 8
Step 6: if A>C, then print A is greatest & go
to step 8
Step 7: print C is greatest.
Step 8: End
c) find the largest / smallest of 3 numbers.
d) Algorithm to Calculate and print sum of 'N' numbers.
Step 1: Start
Step 2: Input n values
Step 3: i=1, sum=0
Step 4: if(i>=n) then go to Step 8 end if
Step 5: sum=sum+i
Step 6: i=i+1
Step 7: Go to Step 4
Step 8: Print value of sum
Step 9: Stop

e) Algorithm to Calculate and print sum of 'N' numbers


1.5 Introduction To Application Development:
Application development is the process to making software for smart phones/ desktops, most
commonly for Android and iOS. The software can be downloaded from a mobile app store or accessed
through a mobile web browser.
App development is rapidly growing. From retail, telecommunications and e-commerce to
insurance, healthcare and government, organizations across industries must meet user expectations for real-
time, convenient ways to conduct transactions and access information.
The steps included in developing a computer application are:
• Planning- which involves identifying a need, solution options, and considering the features of
competing applications.
• Analysis- which involves documenting the functional requirements for the app
• Design- which involves defining how the app will work and what features and components it will
have.
• Construction- which is where the actual programming occurs using the requirements and design as
a guideline.
• Testing- which involves trying out the app looking for errors
• Implementation- which involves making the app available for people to use.
• Support- which involves monitoring the user experience.

1.5.1 MIT App Inventor:


MIT App Inventor is a free, cloud-based service that allows you to make your own mobile apps using a
blocks based programming language. You can access App Inventor using a web browser (Chrome, Firefox,
and Safari). Blocks-based tool facilitates the creation of complex high-impact apps in significantly less
time.

Getting Started With MIT App Inventor:


1. Setup Instructions - If you are using a smart phone or tablet device and you have a wireless
internet connection, you can start building apps without downloading any software to your computer.
You'll develop apps on the website: appinventor.mit.edu.
2. Designer and Blocks Editor - The Designer window is where you lay out the look and feel of the
app and specify what functionalities it should have. You can choose things for the user interface like
Buttons, Images, Text box and functionalities like Text-to-Speech, Sensors, GPS.
Blocks editor is where you program the behaviour of your app. There are inbuilt blocks like math, logic etc
and below this you will have blocks for each component of your app)
App Inventor Designer:
The Designer view gives you a visual representation of the application you are building.

Fig: The Designer view of the AI2 platform

The Blocks view provides a space for building the application logic using various logic
components called Blocks.
.

Fig: The Blocks view of the AI2 platform


1.6 Practical Skill:
1. Design a Text-To-Speech app by using MIT App inventor.
1. Go to the App Inventor home page: www.appinventor.mit.edu
2. Click the orange "Create Apps" button in the menu bar.
3. Log in to App Inventor with your Gmail username and password.
4. Start a new project by clicking the "Start new project" button.
5. Type in the project name (underscores are allowed, spaces are not) and click OK. App Inventor
opens the Designer window. The "Designer" is where you create the Graphical User Interface
(GUI) or the look and feel of your app.
6. Add a TextBox-Click and hold on the word "TextBox" in the Palette. Drag your mouse over to
the Viewer. Release the mouse. A new TextBox will appear on the Viewer.
7. Add a button - Click and hold on the word "Button" in the Palette. Drag your mouse over to the
Viewer. Release the mouse. A new button will appear on the Viewer.
8. Change the Text on the Button- In the properties panel, change the text for the Button Under the
Text property, select "Text for Button I", delete it and type in "TEXT-TO SPEECH".
9. Add a Text-to-Speech component to your app- Go to the Media drawer in the Palette an drag
out a "TextToSpeech" component. Drag and drop it onto the Viewer. Notice that it present
under "Non-visible components". It's more like a tool that is available to the app.
10.Switch over to the Blocks Editor-It's time to tell your app what to do. The Blocks Editor is where you
program the behaviour of your app.
11. Click and hold the when Button1.Click do event block. Drag it over to the Viewer and drop it
there. It is called an "Event Handler".
12. Click and hold the call TextToSpeech1.Speak block. Drag it over to the Viewer and drop it
there. This is the block that will make the phone speak. Because it is inside the Button.Click, it
will run when the button on your app is clicked.
13.Click and hold TextBox1.Text and plug it into the socket labeled "message".
14. The app is now ready for testing-Download the MIT AI2 Companion app from play store and install
it. Click on Connect in the menu bar and select AI Companion and scan the QR code. Be sure your both
devices are connected to the same Wi-Fi network. You can also test by clicking on Build and selecting
App (save .apk to my computer).
2. Design a simple calculator app by using MIT App inventor
1. Go to the App Inventor home page: www.appinventor.mit.edu
2. Click the orange "Create Apps" button in the menu bar.
3. Log in to App Inventor with your Gmail username and password.
4. Start a new project by clicking the "Start new project" button.
5. Type in the project name (underscores are allowed, spaces are not) and click OK.
App Inventor opens the Designer window. The "Designer" is where you create the Graphical User
Interface (GUI) or the look and feel of your app.
6. Add 2 TextBox for 2 numbers - Click and hold on the word "TextBox" in the
Palette. Drag your mouse over to the Viewer. Release the mouse. A new TextBox will appear on
the Viewer.
7. Add 4 buttons (ADD, SUB, MUL, DIV) - Click and hold on the word "Button" in
the Palette. Drag your mouse over to the Viewer. Release the mouse. A new button will appear on
the Viewer.
8. Change the Text on the Buttons to ADD, SUB, MUL AND DIV.
9. Add a label to display the result-Click and hold on the word "Label" in the Palette.
Drag your mouse over to the Viewer. Release the mouse. A new Label will appear on the Viewer.
10.Switch over to the Blocks Editor-It's time to tell your app what to do. The Blocks Editor is
where you program the behaviour of your app.
11. Click and hold the when Button1.Click do event block. Drag it over to the Viewer
and drop it there. It is called an "Event Handler".
12. Click and hold set Labell.text to block. Drag it over to the Viewer and drop it inside
the Button. Click.
13. Select the addition block from Math and plug it into the socket of the Label block.
14.Click and hold TextBox1.Text and plug it into the first socket of the addition block.
15.Click and hold TextBox2.Text and plug it into the second socket of the addition block.
16. Repeat the same steps for subtraction, multiplication and division by choosing the
appropriate blocks.
17. The app is now ready for testing - Download the MIT AI2 Companion app from play store
and install it. Click on Connect in the menu bar and select Al Companion and scan the QR code. Be
sure your both devices are connected to the same Wi-Fi network. You can also test by clicking on
Build and selecting App(save .apk to my computer).
3. Design and create simple game using MIT-scratch/Code.org Make your character jump
[JUMPING GAME]

• Open scratch.mit.edu website, Go to create.

• Open panel and select a character (your choice) and select background (your choice).

• Go to motion and select change by 10 and go to control, select repeat 10 to give motion.
• Go to motion and select change by -10 and go to control, select repeat 10 and join both.

• Go to events and select when space key pressed. And place it on the top.

• Go to sound and select start sound and place in between space key press and repeat 10.
Create 2 backdrops

• Click on the stage icon and click on backdrop • Rename the 1st backdrop as LOST in costume

section

• Type the text T as You LOST!!!

• Duplicate the lost backdrop and rename as WON

• Type the text T as You WON!!!


Make a moving obstacle

• Select any obstacle (egg) change size into smaller by changing size into 80.

• Place the egg at the x axis line and go to motion and select go to x& y and drag the egg to –x
position and go to motion and select glide x sec to x & y.

• Go to control and select forever and place on the go to x.

• Go to events and select when clicked, change the glide into 3 sec.
Stop the game when it runs on to the egg.

• Go to control and select stop all and wait until, go to sensing and select touching mouse pointer
and change mouse pointer into chick.

• Go to events, select when clicked and place at the top of wait until.

• Go to chick panel and go to motion, select go to x and y and go to events, select when clicked.
• Once the egg touches the chick before the score is 5 then change the backdrop to LOST Keep
Score

• Go to chick panel and go to variable, select make variable and give score as variable and select
change score by 1 and place at the end of code and set score to 0 and place after go to x & y.

• Once the Score becomes 5 then change the backdrop to WON and stop the game.

CODE SECTION
1. CHICK
2. EG
G

OUTPUT:
UNIT2
DESIGN & DEVELOP WEB PAGES
WEEK2
TABLE OF CONTENTS:
2
2.1 Basic Web Technologies
2.1.1 Web Browser
2.1.2 Web Server
2.1.3 Client Server Model
2.1.4 URL
2.1.5 SEO Techniques
2.1.6 Domain Names And Domain Name System

2.2 Creating Web Pages With HTML5-Static Web Pages


2.2.1 Introduction To HTML
2.2.2 Html Basic Tags
2.2.3 Heading Tags
2.2.4 Elements
2.2.5 Attributes
2.2.6 Insert Images
2.2.7 Html Tables
2.2.8 List
2.2.9 Linking Document
2.2.10 Formatting Tags
2.3 Formatting Web Pages With Style Sheets (Css)
2.3.1 Introduction To CSS
2.3.2 CSS Style Attributes
2.3.3 CSS Colour Property
2.4 Creating A Web Page Dynamic Using Javascript
2.4.1 Dynamic Web Pages And Introduction To Js
2.4.2 Basic Syntax
2.4.3 Functions
2.4.4 Events
2.5 Practical Skill Exercise
2.5.1 Design and create webpage for displaying your poem (Title, header, paragraph,
formatting
tags)
2.5.2 Design and create webpage for your wish list (what you want to do). Also list the
challenges and opportunities along with the images to present your dreams (List ordered and
unordered, Image, Table)
2.5.3 Design and create webpage using HTML and CSS about an awesome animal (Use
necessary CSS tags).
2.5.4 Design and create to demonstrate the concept of Hyperlinking of 2 or more web pages
2.5.5 Design and create web page with JavaScript to design a simple calculator to perform
the
following operation: Sum, Product, Difference and Quotient.
2.6 ACITIVITY

2
2.1 Basic Web Technologies:
2.1.1 Web Browser:
• Web browser takes you anywhere on the internet. It retrieves information from other parts of the
web and displays it on your desktop or mobile device.
• The information is transferred using the hypertext transfer protocol, which defines how text, images
and video are transmitted on the web.

2.1.2 Web Server:

Every websites sits on a computer known as Web server. The server is always connected to the
internet. Every webserver that is connected to the internet is given a unique address made up of
series of four numbers between zero and 256 separated by periods. For example, 128.157.164.132

2.1.3 Client Server Model:

In client server computing, the clients requests a resource and the server provides that resource. A
server may serve multiple clients at the same time. Both the client and server usually communicate
via a computer network.

2.1.4 URL:

URL stands for Uniform resource locator. It is used to specify addresses on the internet. A URL
will have the following format. https://www.example.com/image/apple.jpg

2.1.5 SEO Techniques:


SEO stands for “Search engine optimization”. In simple terms, SEO means the process of
improving your website to increase its visibility in google, Microsoft bing.

2.1.6 Domain Names & Domain Name System:

• The domain in system (DNS) is the phone book of the internet.


• Humans access information online through domain names, like nytimes.com
• Web browsers interact through internet protocol (IP) addresses. DNS translates domain names to IP
address so browsers can load internet resources.

2.2 Creating Web Pages With HTML5 – Static Web Pages:


2.2.1 Introduction to HTML:

• HTML stands for Hyper Text Markup Language


• HTML is the standard markup language for creating Web pages
• HTML describes the structure of a Web page
• HTML consists of a series of elements
• HTML elements tell the browser how to display the content
• HTML elements label pieces of content such as "this is a heading", "this is a paragraph", "this is a
link", etc.

 A Simple HTML Document

<!DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>

<h1>My First Heading</h1>


<p>My first paragraph.</p>

</body>
</html>

The <!DOCTYPE html> declaration defines that this document is an HTML5 document
The <html> element is the root element of an HTML page
The <head> element contains meta information about the HTML page
The <title> element specifies a title for the HTML page (which is shown in the browser's
title bar or in the page's tab)
The <body> element defines the document's body, and is a container for all the visible
contents, such as headings, paragraphs, images, hyperlinks, tables, lists, etc.
The <h1> element defines a large heading.
The <p> element defines a paragraph.

2.2.2 HTML Tags:


Tag is a command that tells the web browser how to display the text, audio, graphics or vide on a web
page.

 Key Points:
• Tag names are written within angle brackets <Tag Name>
• Most of the tags usually occur in pair: the start tag and the closing tag.
• The closing tag is specified including a forward slash (/).
• Some tags are the empty Ie, they don't have the closing tag.
• Tags are not case sensitive.
• The starting and closing tag name must be the same. For example, <b> hello </i> is invalid as both
are different.

2.2.3 Heading Tags:


Any document starts with the heading. You can use different sizes for your headings HTML has 6
levels of headings, which uses the elements <h1>, <h2>, <h3>, <h4>, <h5> and <h6> while
displaying any heading, browser adds one line before and one line after that heading.

2.2.4 Elements:
An element is defined by starting tag. If the element contains other content, it ends with a closing
tag, where the element name is preceded by forward slash as shown below with few tags.

Start Tag Content End Tag

<P> This is paragraph content </p>

<h1> This is heading content </h1>

2.2.5 Attribute:
An attribute is used to define the characteristics of an HTML element and displays inside the
element’s opening tag. All attributes are made up of 2 parts – a name and a value o The name is
property you want to set. For example the paragraph <p> element in the example carries an
attribute whose name is align which you can use to indicate the alignment of paragraph on the
page.
o The value is what you want the value of the property to be set and always put within
quotations.

2.2.6 HTML Images:

You can insert any image in your webpage by using <img> tag. You can set image width and
height based on your requirement using width and height attributes.
<img src=”hampi.jpg” height=”200” width=”500”>

2.2.7 HTML Tables:

The HTML tables are created using the <table> tag in which :
▪ <tr> tag is used to create table rows
▪ <td> tag is used to create data cells. The elements under <td> are regular and left aligned by
default.
▪ <th> tag is used to create table heading.

2.2.8 List:
HTML offers 3 ways for specifying for list of information all lists must contain one or more list
elements. List may contain.
▪ <ul> an unordered list. This will list items using plain bullets.
▪ <ol> an ordered list this will use different schemes of numbers to list your items.
▪ <dl> a description list. The element encloses the list a list of groups of terms and
descriptions.

2.2.8 Linking Documents:


A link is specified using HTML tag <a>. This tag is called anchor tag and anything between
the opening <a> tag and the closing </a> tag becomes part of the link, and a user can click that
part to reach to the linked document. Following is the simple syntax to use <a> tag. <a href =
www.google.com> click here for Google </a>

2.2.9 Formatting Tags :


Formatting elements where designed to display special types of text:

▪ <b> - Bold text


▪ <strong> - Important text
▪ <i> - Italic text
▪ <u> - Underline text
▪ <em> - Emphasized text
▪ <mark> - Marked text
▪ <small> - Smaller text
▪ <del> - Deleted text
▪ <ins> - Inserted text
▪ <sub> - Subscript text
▪ <sup> - Super script text

2.3 Formatting Web Pages With Style Shades (CSS)


2.3.1 Introduction To CSS
Cascading style shaded (CSS) is used to format the layout of webpage. With CSS you can control the
colour, font, the size of the text, the spacing between elements, how elements are positioned and laid out,
what background images are background colours are to be used, different displays for different devises and
screen sizes and much more.
2.3.2 CSS Style Attributes :
▪ Inline – By using the style attribute inside HTML elements
▪ Internal – by using a <style> element in the <head> section
▪ External – by using a <link> element to link an external CSS

2.3.3 CSS Colour Property :


The CSS font – family property defines the font to be used
The CSS font – size property defines the text size to be used
The CSS border – property defines a border around an HTML element
The CSS padding property defines a padding (space) between the text and the border
The CSS margin property defines a margin (outside) the border

2.4 Creating A Dynamic Webpage Using Javascript


2.4.1 Dynamic Webpage And Introduction To JS:
JavaScript makes HTML pages more dynamic & interactive.
The HTML <script> tag is used to define a client-side script (JavaScript).
To select HTML element JavaScript most often uses the document.getElementById() method.

2.4.2 JavaScript Syntax:


JavaScript syntax is the set of rules, how JavaScript programs are constructed:
var x,y,z; //declare variables
x=5; y=6; //Assign
Values z=x+y;
//compute values
All JavaScript identifiers are case sensitive.

2.4.3 JavaScript Function:


A JavaScript function is a block of code designed to perform a particular task. A JavaScript function is
defined with the function keyword, followed by a name, followed by parentheses().
Function names can contain letters, digits, underscores, and dollar signs.

2.4.4 Events:

HTML events are “things” that happen to HTML elements.


2.5 Practical Skills:
2.5.1 Design and create webpage for displaying your poem (Title, header, paragraph,
formatting tags)
<html>
<head>
<title>poem</title>
</head>
<body>
<h1 align="center">TWINKLE TWINKLE LITTLE STAR </h1>
<h2> jane taylor 1806 </h2>
<p> Twinkle Twinkle little star!<br/> how i wonder what you are
<br/> up above the world so high! <br/> like a diamod in the
sky </p>
<hr color="blue">
<image src="C:\ENV\star.png" width ="300"
height="300" > <br>
</body>
</html>

OUTPUT:
2.5.2 Design and create webpage for your wish list (what you want to do). Also list the challenges
and opportunities along with the images to present your dreams (List ordered and unordered,
Image, Table)
<html>
<head>
<title>WISH LIST </title>
</head>
<body>
<h1 align="center"> MY WISH LIST </h1>
<br> <br> <br>

<table border="10">
<tr>
<th>wish list</th>
<th>Image </th>
<th>Brand name </th>
</tr>

<tr>
<td><ol><li>LAPTOP</li></td>
<td> <li> <image src="C:\ENV\laptop.jpeg" width="100" height="100">
</li></td> <td> <ul> <li> LENEVO </li>
<li> Hp </li>
<li> DELL </li> </td> </ul>
<
/
t
r
>
<
t
r
>
<td><ol start="2"><li>SMART PHONE</li></td>
<td> <li> <image src="C:\ENV\phone.jfif" width="100" height="100">
</li></td> <td> <ul> <li> SAMSUNG </li>
<li> OPPO </li>
<li> ONE PLUS </li>
<li> APPLE </li></td> </ul>
</tr>
</table>
<br>
</body>
</html>

OUTPUT:
2.5.3 Design and create webpage using HTML and CSS about an awesome animal (Use
necessary CSS tags).
<html>
<head>
<title>AWESOME ANIMAL</title>
<style type="text/css">
.c1{background-color:yellow}
.c2{color:red}
.c3{font:30pt 'calibri'}
.c4{color:green}
</style>
</head>
<body class="c1">
<center>
<h1>TIGER</h1>
<p><span class="c4"> <b>Tiger is the largest member of the cat family.</b> </span> <br/>
<span class="c2"><b>It is territorial and generally solitary.<br/>
Tiger cubs stay with their mother for 2 years before they become independent</span></b><br/>
Tiger population is decreasing due to <span class="c3">POUCHING</span>, habitat
destruction and habitat fragmentation</p>
<image src="C:\ENV\image\tiger.jfif" width="200"
height="200"> <br>
</center>
</body>
</html>

OUTPUT:
2.5.4 Design and create to demonstrate the concept of Hyperlinking of 2 or more web
pages
Since we have already created the html pages for poem.html, wishlist.html and CSS.html
pages so we will link these 3 webpages

Step1. Open notepad and write the below program and save as hyperlink.html

<html>
<head>
<title>HYPERLINK</title>
</head>
<body>
<h1> HYPERLINK DEMO </h1>
<br><br>
<a href="wish.html">WISH LIST LINK </a> <br> <br>
<a href="css.html">TIGER CSS LINK </a><br> <br>
<a href="poem.html">POEM LINK </a> <br> <br>
</body>
</html>

Step2. Open all 3 webpages poem.html, wishlist.html and CSS.html before the end of body tag
add this tag.

<a href="hyperlink.html">back</a>
2.5.5 Design and create web page with JavaScript to design a simple calculator to
perform the following operation: Sum, Product, Difference and Quotient.
<html>
<head>
<title>CALCULATOR</title>
<script
type="text/javascript"
> var a,b,r;

function add()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(a
);
b=parseFloat(
b); r=a+b;
document.myform.result.value=r;
}

function sub()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(
a);
b=parseFloat(
b); r=a-b;
document.myform.result.value=r;
}

function mul()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(a
);
b=parseFloat(
b); r=a*b;
document.myform.result.value=r;
}

function div()
{
a=document.myform.n1.value;
b=document.myform.n2.value;
a=parseFloat(a);
b=parseFloat(b);
r=a/b;
document.myform.result.value=r;
}
</script>
</head>
<body>
<form name="myform">
<center>
<h1>ARITHMETIC OPERATIONS </h1>
<h2><u>Enter a number in each text box</u></h2><br/><br/>
NUMBER 1: <input type="text" name="n1" value=""><br/>
NUMBER 2: <input type="text" name="n2" value=""><br/><br/>
<input type="button" value= "ADDITION" onclick="add()">
<input type="button" value= "SUBTRACTION" onclick="sub()">
<input type="button" value= "MULTIPLICATION" onclick="mul()">
<input type="button" value= "DIVISION" onclick="div()">
<br><br>
<br><br>
<font color="red">RESULT</font>
<input type="text" name="result" value="">
</center>
</form>
</body>
</html>
OUTPUT:
UNIT 3
BUSINESS PROCESS AUTOMATION/ERP
WEEK 3
TABLE OF CONTENTS:
3
3.1 Introduction to business process automation
3.1.1 Business process automation examples
3.1.2 Benefits of business process automation
3.1.3 Why should you automate business processes

3.2 Introduction to enterprise resource planning (ERP)


3.2.1 What is Enterprise Resource Planning (ERP)
3.2.2 Primary Benefits
3.2.3 History & Evolution
3.2.4 ERP Applications
3.2.5 ERP System Examples

• Oracle cloud ERP


• SAP S/4HANA
3.3 Types of organisational structures
3.3.1 Hierarchical org structure
3.3.2 Functional org structure
3.3.3 Team org structure
3.4 Workflow
3.5 Practical skills
3.5.1 Design & create personal web page with dashboard (Create your own blog)
3.5.2 Design & create web page about advantages of business process automation with
respect to your branch of engineering
3.5.3 Create a workflow for education loan approval in bank/diploma admission (use any
tool)
3.5.4 Demonstrate ERP with ERPNext demo for manufacturing, retail and service sector
(Use any Other tools)
3.
3.1 Introduction to business process automation:
 Business process automation is the use of technology to automate manual, repetitive tasks so that
employees can focus on critical tasks.
 Automating business process minimizes costs, increases efficiency & streamlines processes from
simple to complex.
 Business process automation (BPA) is the use of advanced technology to complete business processes
with minimal human intervention.
 A business process is an activity , or a set of activities, used to accomplish a specific organizational
goal, such as producing a product , assimilating new employees or bringing on new customers.

3.1.1 Business process automation examples:


1) Onboarding new employees:
 Integrating a new employee is an important business process that involves many low level but
meticulous tasks, from filling out employee forms &scheduling training sessions to completing tax
documents& setting up bank accounts.
 Automating the process eliminates much of the paperwork, ensures all steps are completed and keeps
relevant managers and employees informed.

2) Marketing automation:
Marketing automation software allows companies to target customers with automated marketing
messages across channels including email, websites, social media,& text messages to generate sales
leads.

3.1.2 Benefits of business process automation:


Business process automation drives efficiencies and standardization that in turn bring many business
benefits, including the following:
Increased productivity
Lower costs
Reduced error rates
Greater employee satisfaction
Higher revenues
Better customer service
3.1.3 Why should you automate business processes?
• Business process automation eliminates the bottlenecks that lead to lost time and revenue.
Top reasons why it’s a great idea to automate your business:
1. Reduce your business costs:
By automating your business, you save a lot of business costs by,
▪ Decreasing the labour costs of staff and workforce allocation and spending less money on employee
onboarding.

2. Less time spent on repetitive administrative tasks:


▪ Imagine if your employees could focus all their time on the major projects that need their
attention, instead of wasting valuable hours on tedious tasks that could easily be automated.
▪ An automated business process removes repetitive and time-consuming tasks from your
employees’ schedules- you can even give your employees role-based access to still oversee all the
tasks.

3. Minimize human errors and improve quality:


▪ No matter how much training you provide, mistakes will be made during your business
operations that could be avoided by automating tasks.

4. Improve customer satisfaction:


▪ A great customer experience should be your business top priority.
▪ If you want to keep your client satisfaction rates high, you must automate as many of your
business processes as possible.
▪ Machines are much more reliable since they’ll never take a sudden sick leave or forget to
complete a task.
▪ If you want consistency in the quality of your business customer experience and to
showcase your
company’s operational excellence, that’s exactly what business automation will help you to achieve.

5. Decrease work related stress:


▪ Saving time is one thing, but automation also gives you peace of mind.
▪ Automation tools make sure to keep the whole system simplified and it can save you a
whole lot of work-related stress.

Here’s how;
▪ Automation software come with integrations to various other tools, so you don’t have to
struggle with multiple platforms or processes.

6. Streamline processes:
▪ One of the great outcomes of a process automation system is streamlined processes. Clear
accountability, customizable notifications, valuable insights, and faster turnaround times make it
easier to eliminate wasteful activities and focus on enhancing tasks that add value.

3.2 INTRODUCTION TO ENTERPRISE RESOURCE PLANNING(ERP):


3.2.1 What Is Enterprise Resource Planning (ERP)?
• Enterprise resource planning (ERP) refers to a type of software that organizations use to manage
day-to-day business activities such as accounting, procurement, project management, risk
management and compliance, & supply chain operations.
• ERP software is a large suite of integrated applications that manage everyday business processes
and automate back – office functions.
• Its designed to centralize and optimize operations with its connectivity while reducing manual
labour.

3.2.2 Primary Benefits:


Several advantages come with owing this software:

• Saves costs: instead of inputting information for every department in your company, you only
have to input it once, saving plenty of time and money.
• Better planning: gain in-depth real time insights on projects and assignments to allocate the ideal
amount of employees, tools and other resources with precision.
• Enhances customer service: govern customer satisfaction rates and other client-based KPIs so you
can know what’s needs improvement and what isn’t successful.

3.2.3 History & Evolution:

• The term ERP was first used in the 1990s by the Gartner Group, but enterprise resource planning
systems actually have their roots deep in the manufacturing industry, and can trace their history
back to the 1960s.

At this time, manufacturers needed a better way to manage, track, and control their inventory.
3.2.4 ERP Applications:
• Program Management
• Functional Consulting
• Technical Consulting
• Implementation / Optimization
• Migration
• Upgrade
• Interface Programming
• Customizations

3.2.5 ERP System examples:


Here are examples of ERP systems that can help you automate your company processes.

1) Oracle ERP cloud:

• Our first example of an ERP system is probably one you’ve heard of before. Founded in 2012,
Oracle ERP Cloud is a modern, dynamic software that’s used by a wide range of customers.
• The suite of cloud applications leverages artificial intelligence (AI) and machine learning to
automate everyday tasks.
• This flexible tool can be configured to meet a range of needs and can be used by any businesses,
regardless of their size, industry, or geography. Their core verticals include financial services,
healthcare, higher education, manufacturing, and retail.

Top Benefits:
Oracle ERP Cloud offers various strengths that set it apart from its ERP competitors.
• Dashboard with Accounting Infolets
Manage integrated info tiles into work areas to supervise operations, track transaction progress and
detect issues and exceptions that may need addressing. • Language Support
Streamline internationalization support by translating numbers, dates, names and addresses into 26
languages.

• Timely Collections
The strategy management apparatus guarantees on-time collections from overdue clients automatically. It
works with days sales outstanding (DSO), broken promise count and other collections metrics and formulas
for you to better perceive the progress of outstanding receivables, productivity and prospective problem
areas.

• Financial Data
Gain real-time authorization to accounting information.

Primary features:
1.Oracle Financials Cloud
2. Oracle Accounting Hub Cloud
3. Oracle Procurement Cloud
4. Oracle Project Portfolio Management Cloud
5. Oracle Risk Management Cloud

2) SAP S/4 HANA:


• SAP S/4 HANA revolutionizes business processes with a cloud ERP solution that has embedded
analytics, robot process automation (RPA), artificial intelligence (AI) capabilities and more.
• The system leverages cutting-edge technology, big data and works with industry-specific
requirements to help businesses evolve alongside their marketplace.
• It’s designed for large businesses and offers a fourteen-day free trial with the Fioro user experience,
rolebased guided tours, capabilities and workflows.

Top benefits:
• Sales Performance Management
Employ variable-compensation programs with incentive and commission direction as you stay mindful of
sales performance and upkeeping tactful plans.
• Real-Estate Management
Review lease agreements, investments and constructions projects. You can also inspect, manage and
restore infrastructures.
• Inventory Material Monitoring
The situations-handling extension offers different solutions through the monitor material coverage app to
cover issues related to net requirements, individual customers and direct procurement segments for all
materials.
• Credit Standing
Boost credit standing with suppliers through additional funds and enhanced payment conditions.

• Machine Learning
In essence, the machine learning tools offer buffer-level adjustments with lead time on stock transfer
ingredients to guarantee inventory is kept at satisfactory values while reducing capital.

Primary Features:
• Asset Management
Permit asset planning, scheduling and maintenance operations. Perform planned and unplanned
maintenance tasks to boost production and allow technicians to locate, report and rectify malfunctions and
emergencies. Maintenance planners can superintend critical and time-sensitive work throughout various
procedures and spare parts to analyze costs, breakdown rates and damages. • Procurement
Evaluate purchase orders, requisitions, invoices, contracts and supplier performance with real-time
information. Gather, study and obtain every sourcing data point in one system while carrying out automatic
and manual sequences to govern all procurement file types.
• Manufacturing
You can coordinate manufacturing jobs such as material requirements, inventory and more while
simultaneously modifying schedules as necessary. Develop intricate assembly plans and manage
everything from BOMs to layout and machine models.

3.3 Types Of Organizational Structures:


Organization’s structure is the backbone of all the operating procedures and workflows at any
company.
It determines the place & the role of each employee in the business & is key to organizational
development.
a) Hierarchical Structure:
• You must already have an idea of what a hierarchical structure is. It’s the most common
organizational structure type that follows a direct chain of command.
• A chain of command, in this case, goes from senior management to general employees through a
range of executives on the departmental and team level.
• The highest-level executive has the highest power over the decision-making process.

b) Functional Structure:
• A functional structure groups employees into different departments by work specialization. Each
department has a designated leader highly experienced in the job functions of each employee
supervised by them.

• Most often, it implements a top-down (centralized) decision-making process where department


managers report to upper management.

• Ideally, leaders of different teams communicate regularly and coordinate their strategies while
lower-level employees have little idea of the processes taking place outside their department.
• The main challenge companies with a functional structure face is the lack of coordination between
departments.
• Employees may lose the larger company context when focusing on very specific tasks and failing to
interact with members of other departments.
• To create a functional organizational structure that works, you’ll need to train leaders to foster
collaboration across departments.

c) Team Structure:

• A team-based organizational structure creates small teams that focus on delivering one product or
service.
• These teams are capable of solving problems and making decisions without bringing in third
parties.
• Team members are responsible for managing their workload and have full control over the project.
• Team-based organizations are distinguished by little formalization and high flexibility. This
structure works well for global organizations and manufacturers.
3.4 WORKFLOW:
An ERP workflow is a logical blueprint that describes how ERP applications manage business
processes. An ERP workflow: Provides real-time visibility of operations. Gives business leaders a
quick view of their global supply chain. Helps identify challenges and opportunities, enabling you
to make faster business.

What Is Sequence Diagram?


Sequence diagrams are interaction diagrams that detail how operations are carried out.
They capture the interaction between objects in the context of a collaboration.
Sequence diagrams are time focus and they show the order of the interaction visually by using the
vertical axis of the diagram to represent time what messages are sent and when.

3.5 Practical Skills :


3.5.1 Design And Create A Personal Webpage With Dashboard.
Personal web pages are world wide web pages created by an individual to contain
content of a personal nature rather than content pertaining to a company, organization,
or institution. Many personal pages only include information of interest to friends and
family of the author.

“Blog is a journal or diary written for public viewing on a website and consisting
typically of personal reflections, commentary on current events, etc. arranged
chronologically”.

2.6 Dashboard – the “home base” of WordPress. This is what you seen when you log in, and it
contains whatever widgets you’ve chosen to show on it.

2.7 Posts – the heart and soul of WordPress. This is where you’ll go when you want to write a
blog post or edit an existing one.

2.8 Media – a central repository for any pictures, sound files, video, and other pieces of media
that you upload to your site. Here you can browse through and edit media you’ve uploaded to
your posts and upload even more.

2.9 Pages – here you can create Pages, which is what you’ll be using for the main content on
your site. Pages are different from Posts because they will show up in your site’s main
navigation instead of going on your list of blog posts. This makes Pages good for “timeless”
content like your biography, work history, and contact info.

2.10 Comments – here you can see the comments on your blog (if you decide to have one). Here

we can use Blogger or Wix website to create the blog.

When we click on https://www.Blogger.com,we see the image as shown below, then click
on create your blog by signing in via Gmail.
2.10.1 We first need Gmail id in order to create our blog.

• Next after log in with your Gmail account, Create a new blog give the name of the blog
• Then create the new post, give the name of the post and type the content of the post about personal
reflections, commentary on current events, etc. arranged chronologically
• After writing the post now you can PUBLISH the post • At last, you can share the blog to your
family and friends.

OUTPUT
3.5.2 Design And Create Web Page About Advantages Of Business Process
Automation With Respect To Your Branch Of Engineering.
<html>
<head>
<title> Advantages of business process automation </title>
<
s
t
y
l
e
>
h
1
{
color: red;
}
h
2
{
color: White;
}
p
{
color: green;
}
</style>
</head>
<body bgcolor="pink">
<h1> Advantages of business process automation with respect to Computer
Science</h1> <h2> Transportation</h2>
<p> Driver for ola and Uber as well as those who deliver for app like ola and Uber
</p> <h2> Healthcare</h2>
<p> Automation in Healthcare have helped to increase the quality of patient care</p>
<h2> Online Marketing</h2>
<p> Automation in Online Marketing helps to customer to purchase and sell goods or
products using online applications </p>
<h2>Telecommunication</h2>
<p> Automation in Telecommunication helps to automate office system, customer service,
billing system etc. </p>
</body>
</html>

OUTPUT:
3.5.3 Create A Workflow For Diploma Admission Process
(Use Any Tool)

• Login to trello using Gmail account using the link www.trello.com.


• A Homepage of trello will be displayed on page.
• Click on create new board.
• Give a board name as Diploma Admission Process and select visibility option as team.
• Create a List by click on add list button. Here we have created four list as follows.
1. Admission Verification
2. Document verification
3. Verified by DTE.
4. Approved by DTE.
• Click on add card for each list created and explain the steps involved in each process.
• Click on labels to add labels for each list. Green colour-> Completed.
Yellow colour->under
process. Red colour->
Rejected.
• Go to menu and change background • Save workflow and Logout from trello.

OUTPUT:

3.5.4 Demonstrate ERP With ERP Next Demo For Manufacturing, Retail, And
Service Sector (Use Any Other ERP Tools).
1. Open up your web browser and go to the www.odoo.com website t, login with your email id.
Then Home page of odoo will display.
Odoo Manufacturing Flow:
1. Creating a manufacturing order click on Manufacturing->operation-> Manufacturing Order, click on
Create button.
2. Enter the details in the form
• Product: Select product to manufacture in odoo manufacturing.
• Quantity to Produce: Add the total quantity to produce.
• Bill of material: add bill of material.
• Deadline: Add deadline for production of the order.
• Plan form: add planned date for production of the order.
• Components: Raw material for production the product.
3. After adding all the details click on mark as to-do button for processing the order.
4. Click on Check availability->Produce.

Odoo Sales Flow:


1. Fill the details of customer field.
2. Click on Menu Item->configuration ->settings. Click on Quotation & Sales section -> Quotation
template and save it.
3. To create your quotation->menu->Configuration tab-> Quotation template->click on create then
template will create.
4. Add items under Lines section as per your requirement by click on Add an Item.Optional
Products, select add a line.
5. Click on Confirmation to choose the Confirmation Mode and Confirmation Mail.
6. Confirmation mode, you can choose the various options like Online signature, Online
Payment
7. Online Payment: Now a customer can make an online payment and confirm the order
automatically.
8. Confirmation Mail: This email will be sent on Confirmation.
UNIT-4
INTRODUCTION TO CLOUD COMPUTING AND IOT
CONCEPTS
WEEK 4
TABLE OF CONTAINS:
4
4.1 Fundamentals
Of Cloud 4.1.1
What Is Cloud?
4.1.2 What Is Cloud Computing?
4.1.3 Advantages And Disadvantages Of Cloud Computing
4.2 Cloud Service Models
4.2.1 Iaas(Infrastructure-As-A-Service)
4.2.2 Paas(Platform-As-A Service)
4.2.3 Saas(Software-As-A-Service)
4.3 Cloud Deployment Types
4.3.1 Public

4.3.2
Private
4.3.3
Hybrid
4.4 Cloud Services:
4.4.1 Google Drive
4.4.2 Google Docs
4.4.3 Google Co-Lab
4.5 practical skill
4.5.1 Create User Account And Demonstrate Use Of Google Drive, Google Docs, Google Co-
Lab (Usage Of Jupyter Notebook)
4.6 Internet Of Things
4.6.1 Introduction To Iot
4.6.2 Iot Application
4

4.1 Fundaments Of Cloud:

4.1.1 What Is Cloud?


The term cloud refers to a network or a internet. In other words, we can say that cloud is
something, which is present at remote location.
Application such as AWS (amazon web service), google drive, e-mail, & etc. works on cloud
computing principle.

There are the following operations that we can do using cloud computing,
1 developing new applications and services.
2 storage, backup, and recovery of data
3 hosting blogs and websites
4 delivery of software on demand
5 analysis of data
6 streaming videos & audios

4.1.2 What Is Cloud Computing?


Cloud computing is on-demand access, via the internet, to computing resources, application
servers(physical servers and virtual servers), data storage, development tools, networking
capabilities, and more hosted at a remote data center managed by a cloud services provider .
Cloud computing refers to manipulating, configuring, and accessing the applications online.it offers
online data storage, infrastructure and applications.

4.1.3 Advantages And Disadvantages Of Cloud Computing:


Advantages Of Cloud Computing:
1) Back-up and restore data
Once the data is stored in the cloud, it is easier to get back-up and restore that data using the cloud.
2) Improved collaboration
Cloud applications improve collaboration by allowing groups of people to quickly and easily share
information in the cloud via shared storage.

3) Excellent accessibility
Cloud allows us to quickly and easily access store information anywhere, anytime in the whole
world, using an internet connection. An internet cloud infrastructure increases organization
productivity and efficiency by ensuring that our data is always accessible.

4) Low maintenance cost


Cloud computing reduces both hardware and software maintenance costs for organizations.

5) Mobility
Cloud computing allows us to easily access all cloud data via mobile.

6) IServices in the pay-per-use model


Cloud computing offers Application Programming Interfaces (APIs) to the users for access services
on the cloud and pays the charges as per the usage of service.

7) Unlimited storage capacity


Cloud offers us a huge amount of storing capacity for storing our important data such as documents,
images, audio, video, etc. in one place.

8) Data security
Data security is one of the biggest advantages of cloud computing. Cloud offers many advanced
features related to security and ensures that data is securely stored and handled.

Disadvantages Of Cloud Computing


A list of the disadvantage of cloud computing is given below -
1) Internet Connectivity
As you know, in cloud computing, every data (image, audio, video, etc.) is stored on the cloud, and
we access these data through the cloud by using the internet connection. If you do not have good
internet connectivity, you cannot access these data. However, we have no any other way to access
data from the cloud.
2) Vendor lock-in
Vendor lock-in is the biggest disadvantage of cloud computing. Organizations may face problems
when transferring their services from one vendor to another. As different vendors provide different
platforms, that can cause difficulty moving from one cloud to another.
3) Limited Control
As we know, cloud infrastructure is completely owned, managed, and monitored by the service
provider, so the cloud users have less control over the function and execution of services within a
cloud infrastructure.

4) Security
Although cloud service providers implement the best security standards to store important
information. But, before adopting cloud technology, you should be aware that you will be sending all
your organization's sensitive information to a third party, i.e., a cloud computing service provider.
While sending the data on the cloud, there may be a chance that your organization's information is
hacked by Hackers.

4.2 Cloud Service Models:


There are certain services and models working behind the scenes making the cloud computing
feasible and accessible to end users.
Based on these services provided cloud computing can be divided into three main models.
Software -as -a -Service (SaaS)
Infrastructure -as -a -Service (IaaS)
Platform -as-a-Service (PaaS)
These three services make up the cloud computing stack, with SaaS on the top, PaaS in the middle,
and IaaS on the bottom.
4.2.1 Software-as-a-service (SaaS) involves the licensure of a software
application to customers. Licenses are typically provided
through a pay-as-you-go model or on-demand. This type of system can be found in Microsoft
Office's 365.

4.2.2 Infrastructure-as-a-service (IaaS) involves a method for delivering


everything from operating systems to servers and storage through IP-
based connectivity as part of an on-demand service. Clients can avoid
the need to purchase software or servers, and instead procure these
resources in an outsourced, on-demand service. Popular examples of the
IaaS system include IBM Cloud and Microsoft Azure.

4.2.3 Platform-as-a-service (PaaS) is considered the most complex of the


three layers of cloud-based computing. PaaS shares some similarities
with SaaS, the primary difference being that instead of delivering
software online, it is actually a platform for creating software that is
delivered via the Internet. This model includes platforms like
Salesforce.com and Heroku.
4.3 Cloud Deployment Types:
• Cloud computing can also be categorized based on the deployment models:
These classifications are based on the ability of an organization to manage business needs and secure
assets.

1. Public cloud
2. Private cloud
3. Hybrid cloud

1 Public Cloud:
• Public cloud provides their services on servers and storage on the Internet.
• These are operated by third-party companies, who handle and control all the
hardware, software and the general infrastructure.
• Client access services through accounts that can be accessed by just about any one

2 Private Cloud:
• Private clouds are reserved for specific client usually one business or organisation.
• The firm’s data service centre may host the cloud compute service.
• Many private cloud computing services are provided on a private network.

3 Hybrid Cloud:
• Hybrid clouds are as the name implies, a combination of both public and private
services.
• This type of model allows the user more flexibility and helps optimise the users
infrastructure and security
4.4 Cloud Service:
Cloud services are infrastructure, platforms, or software that are hosted by third-party
providers and made available to users through the internet.
Cloud services facilitates the flow of user data from the front-end client’s (e.g. users servers,
tablets, desktops, laptops-anything on the users’ ends), through the internet, to the provider’s
systems, and back. Users can access cloud services with nothing more than a computer, operating
system, and internet connectivity or virtual private network (VPN)

EX: - Google drive, Dropbox, AWS, Microsoft Azure, google docs, google maps, google meet,
google co-lab, etc….
4.4.1 Google Drive:
Google drive is a file storage and synchronization service developed by Google. Launched on April
24, 2012, Google Drive allows users to store files in the cloud, synchronization files across devices,
and share files.
Google accounts user gets 15GB of free storage, shared across google drive, Gmail & google office
suit for additional storage you can upgrade for premium plan.
4.4.2 Google Docs:
Google docs is an online word processor included as part of the free, web-based Google Docs editors
suit offered by Google. Which also includes Google Sheets, Google Slides, Google Drawings, Google
Forms, Google Sites, and Google Keep. Google Docs is similar to MS work but not that advance.
4.4.3 Google Co-Lab:
What is Collaboratory?
Collaboratory, or “Collab” for short, allows you to write and execute Python in your browser, with
• Zero configuration required
• Free access to GPUs • Easy sharing
Whether you’re a student, a data scientist or an AI researcher, Collab can make your work easier.

Steps to use google Collab:-


1.Visit to this link tpps://colab.research.google.com/ to user google collab.
2.Then sign in with yours google account.
3.Click to file> New notebook.
4.Then you are all set to write a Python program.
5.It will save to yours google drive.
4.5 Practical Skill:
4.5.1 Create User Account And Demonstrate Use Of Google Drive,

Google Docs, Google Co-Lab (Usage Of Jupyter Notebook) User

account in Gmail:
1. Open up your web browser and go to the Gmail home page: http://www.gmail.com.
2. Click Create an account.
3. Fill your basic information like first name and last name
4. Type an email name into the „choose your username‟ box. If the email name requested is not
available, accept one of the alternatives and check its availability once more.
5. Create password of least 8 characters long and fill the rest of your information like birth date,
Gender and mobile number.
6. Enter a CAPTCH word and fill the location.
7. Need to ensure that the „I agree to the Google terms of service and Privacy Policy‟ is ticked.
Then click next step.
8. Now your email account is created and sign in with email id and password.

Sending, Receiving of E-Mails:


1. Click on compose, a new message window will appear type to address email id, write a
subject of your message. Type the message on body of window, click on attach file ->
select the attachment to upload (word file, pdf, image etc.) and press send button.
2. Double click on inbox messages to open and click on uploaded attachment to download.

Google Drive:
1. Go to drive.google.com on your computer, go to drive.google.com. You’ll see "My Drive,"
which has: Files and folders you upload or sync.
2. Upload files and folders to Google Drive
Can upload files from your computer using File Upload option or create files in Google Drive.
3. Share and organize files.
Can share files or folders, so other people can view, edit, or comment on them.
4. To see files that other people have shared with you, go to the "Shared with me" section.

Google Docs
1. Open the Docs home screen at docs.google.com.
2. Click on “Start a new document," click Blank New.
3. Formatting Text
Using Google Docs toolbar, you can change the text, the font style and even assign
specific font style for particular sections of the text. Along with this, Google Docs
provides editing options like paragraph spacing and alignment.
4. Creating table of contents
On your Google Docs click where you want the table of contents to be placed. Click
Insert on the menu bar and select Table of contents. You can choose with page numbers
or with blue links. In case you want to delete the table, right-click and select delete.
5. Inserting images and tables
Choose Image from the Insert tab and select the following option – Upload, Take a
snapshot, By URL, Your albums, Google Drive and Search. Make sure that the image
you select must be less than 50 MB and should be one of the following file formats –
.gif, .jpg or .png.To undo or redo an action, at the top, click Undo or Redo.
6. Share & work with others. Can share files and folders with people and choose whether they
can view, edit, or comment.

Google Co-Labs (Google Co-laboratory)


1. Open https://colab.research.google.com to open your Google co-lab.
2. Click on the NEW PYTHON 3 NOTEBOOK link at the bottom of the screen. A new
notebook would open up as shown in the screen below.
3. To rename the notebook, click on this name and type in the desired name in the edit box.
4. Enter a trivial Python code in the code window and execute it.
5. To execute the code, click on the arrow on the left side of the code window.
6. To add more code to your notebook selects Insert / Code Cell.
7. Click on the Delete cell option and the current cell will be deleted.

OUT PUT:
Sending Mail:

Google Drive:

Google Docs:
Google Co Labs:

New document in Google Co labs:


Delete a cell in Google Co labs:
4.6 Internet Of Things (IOT) :
4.6.1 Introduction to IOT:
The internet of things describes physical objects, that are embedded with sensors, processing
ability, software, and other technologies, and that connect and exchange data with other devices and
systems over the internet or other communications networks.
OR
Whichever hardware device connected to internet or network is called Internet of things.
EX:- smart device (like light, fan, automated curtains), Wi-Fi, mobile phone, etc…

4.6.2 IOT Application:

A . Smart Home:
• Smart Lighting: Smart lights helps in saving energy by adapting the lighting to
the ambient condition and switching ON/OFF or diming the light when needed.
• Smart Appliances: Modern Homes have a number of appliances such as TV,
Refrigerator, and Music System etc. It helps to make management easier and also
provide status information to the user remotely.
• Intrusion Detection: This system use security cameras, sensors to detect
intrusion and raise alert.
Alert can be in the form of an SMS or email sent to user.
• Smoke or Gas Detection: Smoke detectors are installed in Homes to detect
smoke that is typically an early sign of fire. Alerts can be in the form of signals to
fire alarm, Gas detectors can detect the presence of harmful gases such as CO,
LPG etc.

B Smart City:
• Smart Parking: It makes the search for parking space easier and convenient for
drivers. Smart parking is powered by IOT system that detects the number of
empty parking slot and sends information over the internet. To smart application
back ends.
• Smart Roads: Smart Roads are equipped with the sensors can provide
information on driving condition, travel time estimating and alert in case of poor
driving condition, traffic condition and accidents.
• Structural Health Monitoring: I use a network of sensors to monitor the
vibration level in the structures such as bridges and buildings.
• Surveillance: This infrastructure helps in public transport and events in cites is
required to ensure safety and security.

C Smart Farming:
• Smart Irrigation: It helps to determine moisture amount in soil.
• Green house control: The use of IOT sensors enables them to get accurate real
time information on greenhouse condition such as lighting, temperature soil
condition and humidity.
• Monitoring of climate condition: Smart auricular gadgets, farming sensors are
used to map climate conditions, choose appropriate crops etc.
• Crop Management: It helps to monitor crop growth and effectively prevent any
diseases or infestations that can harm your yield.
UNIT 5
CYBERSECURITY AND SAFETY
WEEK 5
TABLE OF CONTAINS:
5
5.1 Introduction to Cyber Security and Cyber Safety
5.1.1 What Is Cyber Security?
5.1.2 Types of Cyber Threats Malware
5.1.3 Brief Awareness on Cyber Safety Measures
5.1.4 Identification of Basic Security Issues in Mobile Phones And Personal Computers.
5.2 Firewall Concepts
5.2.1 Types of Firewalls
5.2.2 Firewall Features
5.3 Practical Skill
5.3.1 Installation of Antivirus Software
5.3.2 Demonstrate and Hands on Browser Setting.
5.3.3 Demonstrate and Hands on Privacy Setting and Password Policy
5.3.4 Demonstrate of Common Security Threats.

5.1.1 What Is Cyber Security?


Cyber security is the practice of defending computers, servers, mobile devices, electronic
systems, networks, and data from malicious attacks.
Its also known as information technology security or electronic information security. The
term applies in a variety of contexts, from business to mobile computing, and can be divided into a
few common categories.
Network security is the practice of securing a computer network from intrudes, whether
targeted attackers
or opportunities malware.

5.1.2 Types Of Cyber Threats Malware:


Malware means malicious software. One of the most common cyber threats, malware is
software that a cybercriminal or hacker has created to disrupt or damage a legitimate user’s computer.
Often spread via an unsolicited email attachment or legitimate-looking download, malware may be
used by cybercriminals to make money or in politically motivated cyber-attacks.
There are a number of different types of malwares, including:
Virus:
A self-replicating program that attaches itself to clean file and spreads throughout a computer system,
infecting files with malicious code.
Trojans:
A type of malware that is disguised as legitimate software. Cybercriminals trick users into uploading
trojans onto their computer where they cause damage or collect data.
Spyware:
A program that secretly records what a user does, so that cybercriminals can make use of this
information. For example, spyware could capture credit card details.
Ransomware:

Malware which locks down a user’s files and data, with the threat of erasing it unless a ransom is
paid.
Adware:
Advertising software which can be used to spread malware.
Botnets:
Networks of malware infected computers which cybercriminals use to perform tasks online without

The user’s permission


.

5.1.3 Brief Awareness On Safety Measures:


1. Keep your software up to date.
2. Use anti-virus protection & firewall.
3. Use strong passwords & use a password management tool.
4. Learn about phishing scams-be very suspicious of emails, phone calls, and flyers.
5. Protect your sensitive personal identification information.
6. Use your mobile devices securely. 7. Backup your data regularly
8. Don’t use public Wi-Fi.
9. Review your online accounts & credit reports regularly for changes.

5.1.4 Identification of Basic Security Issues In Mobile Phones And Personal


Computers:
Big problem plaguing mobile computing is credential verification. As other users share
username and passwords, it poses as a major threat to security.
This being a very sensitive issue, most companies are very reluctant to implement mobile computing
to the dangers of misrepresentation.
The problem of identity theft is very difficult to contain or eradicate. issues with unauthorized access
to data and information by hackers, is also an enormous problem.
Outsiders gain access to steal vital data from companies, which is a major hindrance in rolling out
mobile computing services.

5.2 Firewall Concepts:


Firewalls have existed since the late 1980’s and started out as packet filters, which were networks
setup to examine packets, or bytes, transferred between computers. Though the packet filtering
firewalls are still in use today, firewalls have come a long way as technology has developed
throughout the decades.

5.2.1 Types Of Firewalls :


1.Packet Fileting:
A small amount of data is analysed and distributed according to the filer standards.
2.Proxy Service:
Network security system that protects while filtering messages at the application layer.
3.Stateful Inspection:
Dynamic packet filtering that monitors active connections to determine which network
packets to allow through the firewall.
4.Next Generation Firewall:
NGFW combines packet inspection with stateful inspection and also includes some variety of
deep packet inspection, as well as other network security systems, such as an IDS/IPS, malware
filtering and antivirus.

5.2.2 Firewall Features:


• Network threat prevention
• Application and identity-based control
• Hybrid cloud support
• Scalable performance
5.3 Practical Skill:
5.3.1 Installation Of Antivirus Software
There are many antivirus software are available in market like Avast, Mcfree, 360Total
Security, Kaspersky, AVG etc.
Here we are considering 360TotalSecurity antivirus for installation.
1. Open the web browser and download free 360TotalSecurity antivirus.
2. Locate your program under the “Products” tab on the 360 Total Security website. Click the
“Download” button to download the anti-virus software for free.
3. Once the program downloads, locate the installer file and double click to open. 360 Total
Security: 360TS_Setup_Mini
4. Select your language option and click “Install” to continue the installation process.
5. After installation click on start to setup antivirus.
6. Using antivirus software can perform operation like virus scan, clean-up, speed up etc.

OUTPUT:
5.3.2 Demonstration And Hands On Browser Setting.

The different examples of web browser are Google chrome, Internet Explorer, Mozilla
Firefox etc.
Here the following steps involves browser setting for Google chrome for secure browsing.
1. Setting the default browser: Go to Setting and click the make Google chrome My
Default Browser button.
2. Auto download updates: Google chrome automatically updates whenever it detects the
latest new version of browser is available.
3. Enable phishing and malware protection: Go to Advanced Settings-> Privacy->
enable phishing and malware protection.
4. Don’t sync: Disconnect your email account from your browser under the “Personal
Stuff” tab. Syncing your email account with your Chrome browser means that personal
information such as passwords, auto fill data, preferences, and more is stored on
Google’sservers.
5. Configure content settings: Click Content settings under the Privacy section and do the
following. Cookies: Select Keep local data only until I quit my browser and Block third-
party cookies and site data.”.
JavaScript: Select “Do not allow any site to run
JavaScript.” Pop-ups: Select “Do not allow any site to
show pop-ups.
Location: Select “Do not allow any site to track my physical location.”
7. Do not Save Passwords: Go to setting-> Passwords and turnoff offer to save passwords.
8. Camera Access: Got o Setting-> Advanced-> content setting->camera and turn on Ask
before accessing (recommended).
9. Microphone Access: Got o Setting-> Advanced-> content setting->Microphone and turn
on Ask before accessing (recommended).
10. Automatic Downloads: Go to Setting-> Advanced-> content setting->Automatic
downloads and turn on Ask when a site tries to download files after the first file
(recommended).
5.3.2 Demonstration And Hands On Privacy Setting And Password Policy.

1. Password Protect for Everything: The entire digital device like computer, tablets,
smart phones or any other gadget with personal data on them should be password
protected for increased security.
2. Keep the Computer Virus free: The operating system is up to date with latest
security patches, run an antivirus program to watch for virus.
3. Secure you’re Browser: Browser is the one to interact with digital world, so it is
necessary to do all security setting to keep browser safe.
4. Use only trusted software: Make sure that new software to install in system or mobile
device should be licensed.
5. Use only secure Wi-Fi Connection: Make sure to use secured internet connection so
that data should be safe.

5.3.3 Demonstrate Of Common Security Threats:

1. Phishing:

Phishing is a type of social engineering attack used to steal user data including login
details and credit card details. It occurs when an attacker as a trusted entity, dupes a
victim into opening an email, instant message or text message. The recipient is then
tricked into clicking a malicious link or the revealing of sensitive information.

Video Link: https://www.youtube.com/watch?v=Y7zNlEMDmI4

2. DOS(Denial of Service) attack:


A denial of service attack is an attack to shutdown a machine or network, making it
inaccessible to its intended users. DOS attacks accomplish by flooding the target
with traffic or sending the target with traffic or sending it information that triggers a
crash.

Video Link: https://www.youtube.com/watch?v=ilhGh9CEIwM

3. Man in the middle attack:


Man in the middle attack allows attackers to securely intercept communications or
alter them. Man in the middle attack finds a way between user and an entity and
attempts to hack information Ex:
Email Hijacking.

Video Link: https://www.youtube.com/watch?v=Ua9bUqdjWBc


4. Eavesdropping:
Eavesdropping is a theft of information as it is transmitted over a network by a
computer, Smartphone or another connected device.
This attack takes advantages of unsecured network communications to access data as
it‟s is being sent or received by its user.

5. Spamming:
Spamming is the use of messaging system to send a spam to large number of
recipients. Sending an unwanted email or message to another spam includes
adverting, instant messaging etc. A person who creates spam is called a spammer.

6. Virus:
A computer virus is a type of malicious code or program written to alter the way a
computer operators and is designed to spread from one computer to another computer.
A virus cause unexpected or damaging effects such as harming the system software
by corrupting data.

Types of Computer Viruses:


• Resident Virus
• Multipartite Virus
• Direct Action Virus
• File Infector
• Network Virus
• Web Scripting Virus

You might also like