You are on page 1of 17

How to protect a document or worksheet:

You want to protect to a work sheet or any document from unauthorized persons. 2. First go to the start menu->programs->Microsoft office. 3. Then open the ms-word or ms-power point or ms-excel. 4. And then select tools in the menu bar in which select options then click it. 5. And then display options window. 6. Type password in password to open box for protecting a document or work sheet. 7. If you want to modify the workbook, then type password to modify. 8. Then click ok.
1.

9.

And display a window, you can reenter password to open. And click ok.

10. Then display a window, you can reenter the password to proceed. And click ok. 11. Then your workbook has protected. 12. If you open your worksheet or document then display a window for password. Then enter your password and click ok. 13. Again a window displays, then type password for write access, or open read only. Then click ok and open your document.

Windows task manager:


When the system is hanging, the processor takes more time to close the application. Then we use the windows task manager. So press ctrl+ shift+ esc. (or) Right click on the taskbar, select task manager then click. Then a window appears i.e., windows task manager in which select your application, then click on end task button.

New task button is used for opens a new window. If you want to see the system background processes in which having CPU and memory (it appears how much memory is used for that application). Select processes tab in the windows task manager window. Then processes are appearing.

Remote access:

In the processes tab also we kill the application Remote access means we can access our computer or server by using remote access method. In Run command we should type services.msc.so that services window appears. In that we find Remote desktop help session manager If we start that application we can access our computer in the local area network any where. We can also operate the desktop by using IP address, but we should give a user Id &password to it. Then the go to start->accessories->communications->remote desktop connection.

In that we should give IP address of the system, which we want to access the system. A window opens with that system is on &we can access it.

VMware player:
The full form of VMware player is VIRTUAL MACHINE player. This is used to install different and no. of operating system in a single system. This is mainly used for install an operating system in an existing operating system. For example we are using the windows XP.

So first we install VMware player and start installing of Red hat Linux operating system".

But it requires a hardware requirement and a space in hard disk. It should also have enough RAM memory capability also.

Compact disk (CD):

CD stands for compact disk. The readable surface of a Compact Disk includes a spiral track wound tightly enough to cause light to different into a full visible spectrum. Media type: optical disk. Capacity: Typically up to 700MB (up to 80 minutes audio). Read: 780mn wavelength (infrared and red). Write: 1200 Kb/s. Developed by: Philips, Sony. Usage: Audio and data storage. CDs contain data in tracks. Long time we are using the CD that may be damaged. So, display will be corrupted. So, CDs are not put in rough place.

Formatting a system:
Problem: The system is running very slow and attacked With virus

Solution: 1. Download a new and good anti virus software and install in the virus attacked system and also download updates for it. 2. Full scan the system for the first time when the updates are being downloaded. 3. Also remove unwanted softwares from the add/remove programs. So that your system will be speed. 4. After the full scan also, if the system is in the same manner only. That means the system is totally attacked with heavy virus. 5. The only method is formatting the system: i. First take the backup if any files are needed. ii. Insert a bootable CD in the CD/DVD drive and restart the computer. iii. It will ask DO YO WANT TO BOOT FROM CD. iv. Then press enter. v. The window will start installing set up files. vi. After that we should make partitions, we should delete the old drives and create new partitions. vii. Then press enter to start installing, and always install in NTFS format not in FAT. viii. Because FAT is the oldest version and NTFS is new one. ix. After some time it will ask for product key, so enter the product key and also do settings such as time, user accounts and so on... x. Then the windows is now completely formatted and free with virus and now you install motherboard drivers and required softwares.

Firewall: Gateway:

IP address and classes:

Internet Protocol Address (or IP Address) is a unique address that computing devices use to identify itself and communicate with other devices in the Internet Protocol network. Any device connected to the IP network must have a unique IP address within its network. An IP address is analogous to a street address or telephone number in that it is used to uniquely identify a network device to deliver mail message, or call ("view") a website. Dotted Decimals: The traditional IP Addresses (IPv4) uses a 32-bit number to represent an IP address, and it defines both network and host address.

An IP address is written in "dotted decimal" notation, which is 4 sets of numbers separated by period each set representing 8-bit number ranging from (0-255). An example of IPv4 address is172.16.254.1, which is the IP address assigned to topwebhosts.org. An IPv4 address is divided into two parts: network and host address. The network address determines how many of the 32 bits are used for the network address, and remaining bits for the host address. The host address can further divided into subnet work and host number.
(a)

IPv4 addresses:

IP Address Classes:
Cla 1st ss Octet Decima l Range 1st Octet High Order Bits
0 10 110 1110 1111

Network/Hos Default Number of t Subnet Mask Networks ID(N=Netwo rk, H=Host)


N.H.H.H N.N.H.H N.N.N.H 255.0.0.0 255.225.0.0 255.225.225.0 126 (27 2) 16,382 (214 2)

Hosts per Network (Usable Addresses)


16,777,214 (224 2) 65,534 (216 2)

A B C D E

1-126 128-191 192-223 224-239 240-254

2,097,150 (221 2) 254 (28 2)

Reserved for multicasting Experimental; used for research

Note: Class A addresses 127.0.0.0 to 127.255.255.255 cannot be used and is reserved for loopback and diagnostic functions.

Class A: Network/Host ID is: N.H.H.H (N=Network, H=Host). 1-126 0 can not be used as Net ID 127 is reserved for loop back functions 7 126(2 -2)Different Networks 24 16.777.214(2 -2)Hosts per Network(usable address) Class B: N.N.H.H 128-191 The first IP Address is the NET ID The last IP Address is the Broadcast Address 16.384 Different Networks 65543 Hosts per Network

Class C: N.N.N.H 192-223 The first IP Address is the NET ID The last IP Address is the Broadcast Address 2.097.152 Different Networks 254 Hosts per Network CLASS D: Used for multicast broadcasts

Multicast: To transmit a single message to a select group of recipients.


A simple example of multicasting is sending an e-mail message to a mailing list. Teleconferencing and videoconferencing also use multicasting.

CLASS E: Experimental addresses not available to the public

Subnet Masking:
Smaller broadcast domains More manageable networks Save IP Addresses Default Subnet Mask: CLASS A - 255.0.0.0 CLASS B - 255.255.0.0 CLASS C - 255.255.255.0

Private Addresses:
class Private Networks
A B

Subnet Mask Address Range


10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255

10.0.0.0 255.0.0.0 172.16.0.0 - 172.31.0.0 255.240.0.0

192.168.0.0

255.255.0.0

192.168.0.0 - 192.168.255.255

There are certain address in each class that are not assigned. These are called private addresses. Private addresses are not routed on the internet. Network Address Translation (NAT) can be used to connect these Private Networks to the Internet.

Removal of passwords :

1.To remove the system administration password (BIOS password), there is a way of removing it that is removal of CMOS battery. 2.Remove the CMOS battery and keep it a side for 5 to 10 minutes .so that the password will be removed.

NOTE:-The user passwords will be not go. And the data will be also same.

Linux operating system:

This Linux operating system is the open source operating system. Linux operating systems are two types one is rpm based & another is debian based.

Examples for the rpm: Red Hat, Centos, etc. for the debian: BOSS, UBUNTU and etc.

First Indian version open source operating system is BOSS (bharath open source system software) developed by C-DAC. The extension of the file format is also different from the other operating systems .That is why the main reason that the Linux operating system will not get the virus vey easily. Linux operating system cannot execute (.EXE) files so the virus cannot run in this operating system.

Compare to Microsoft Linux operating system is free of cost available and all the features are available. All other kind of databases and office softwares also available free of cost in Linux. We can also write the C and C++ programming in Linux but we have to use it by commands only.

For compiling, running of program, and to write the program we totally use the commands. All the softwares like open office, Bluetooth, etcare inbuilt in this operating system. We also have the Indian operating system that called BOSS Operating system .

Proxy server:
It is used to connect the network to many computers.

Server Room:
a) This server room provides internet connection to all the systems (which are required) in ETDC Complex. b) This server consist of mainly 4
i. ii. iii. iv. v.

Anti Virus server. Domain server. Testing server. KVM switch. Outlook server.

Anti Virus Server:-This server is used to save the antivirus updates in all over the company. When updates are downloaded in the server system, and when the clients turn ON the system the updates are received to their systems. Testing Server:-This is used for the testing of software in the IT Services. KVM Switch:-It is used for connecting all the servers together. Mail Server:-This server is used to receive the mails from others .Firsts the mail comes to the main server and then it is forwarded to the others which the mail belongs too.

You might also like