CS Print Out
Transcript of CS Print Out
-
7/31/2019 CS Print Out
1/48
HARDWARE TROUBLESHOOTING
UNDERSTANDING THE SYSTEM BEEP CODES
Beep codes
The bio performs a POST when the system is turned on. This test is used to ensure
that the system is functioning properly and to gather information about what the
system contains. When a problem is identified with the system during the post, the
bios will normally produce an error message. However, in some cases the problem is
detected so early in the test that the bios cannot even access the video card to print
the message! The three most popular types of bios are those made by (AMI,
AWARD, and PHOENIX). The Phoenix company bios is famous for its complicated
beep patterns that are actually in up to four groups one or more beeps and then a
pause, followed by as three more patterns.
Common Beep Codes
Beeps Probable Causes
One short beep Normal startup
One long beep Keyboard error
One short, one long beep Monitor problem
Two short beeps The POST numeric code appears on the
monitorRepeating short beeps or a continuousbeep
Power problem
One long, one short beep System board problem
One long, two or three short beeps Monitor/Display error
One beep, followed by three,Four or five beeps
System board problems, possibly withDMA,CMOS setup chip, timer, or system bus
Two beeps, followed by three, Four orfive beeps
First 64K of RAM has errors
Three beeps, followed by three, Four orfive beeps
Keyboard controller or video controllerfailed
Four beeps, followed by two, Three orfour beeps
Serial or parallel port, system timer, ortime of day problem
-
7/31/2019 CS Print Out
2/48
WINDOWS DEVICE MANAGER
What is Device Manger?
Device Manager provides you with a graphical view of the hardware that is installed
on your computer. You can use Device Manager to update the drivers (or software)for hardware devices, modify hardware settings, and troubleshoot problems.
The windows device manager made its debut in Windows 95, took a brief leave ofabsence in Windows NT 4.0 and has been in every subsequent release of windowssince then. It can be accessed by following these simple steps.
1. Right click on My Computers2. Select Properties3. Click the General tab.4. Click the Device manager button.
In windows XP1. Right click on My computers2. Select Properties3. Click Hardware tab4. Click device manager button
Here are some of the tasks you can perform using the Device manager.
Check the current status of hardware. Look for symbols next to a particular
device to see if there are problems with it. Configure device properties and settings
Uninstall and reinstall hardware
Update, views and roll back device drivers.
COMMON PROBLEMS IN HARDWARE
General Hardware Troubleshooting Tips
Regardless of the problem there are a few steps that must be taken whenevertroubleshooting a hardware problem. These may seem rather insulting to mostpeople, but one must never forget to do them; if they are not done you might verywell waste allot of time and possibly create a new problem from fiddling around inyour computer chasing down a phantom. Here are some quick steps:
1. Power Cords - Make sure that all of the power cords are firmly in place on allof the devices that could possibly be causing or attributing to the symptomsyou are experiencing . Then trace the cords back to the wall and make surethat the other end of the cord is attached to a power outlet or surge protector.
2. Outlet Power- It is not uncommon to blow a fuse; if the outlet in question isnot receiving power than you should not expect any of the devices connected
to the computer to receive power. You can test this simply by looking at thedevice and seeing if any LEDs (Light Emitting Diodes) are lit.
-
7/31/2019 CS Print Out
3/48
3. Power Button - This step goes hand-in-hand with the last step. Also, somedevices have two power switches on them, and both must be in the "on"position in order for the device to work (i.e. there is a power button both on thefront, and on the back of most computers).
4. Communication Connections - Once you've settled that the power to your
devices is fine, the next step is to make sure that the device has all of theconnections needed for it to communicate. This step consists of making surethat these cables are firmly connected at each end, and that they areconnected at the correct port/interface. Do not forget to check internalconnections; if your computer has been bumped it is possible for someconnections inside to pop loose.
5. Device Configuration - This steps provides both hardware and softwareconfiguration. There may be jumpers or switches on the hardware that needto be configured. If these accidentally got moved or switched the device wouldfail to work properly.
6. Follow Instructions - Computers are not evasive when they report errors; all
too often we just do not understand them.Many times there are suggestionson how to fix a problem accompanied with an error message. Simply followthe steps the message suggests; even if the suggestion seems to beridiculous follow it so that you can discard it as a possibility.
7. Windows Recognition - If you go into the Control Panel, open the Systemdialog, click on the Hardware tab, and then open the Device Manager, you willsee a tree-like structure of all of the hardware that is attached to yourcomputer. The dialog that opens will inform you if the operating system ishaving any know troubles with the device.
8. Update Drivers - If possible, try connecting to the internet and going to themanufacture's web site to download the latest drivers for your hardware (thisrequires that you now the model specifications of your hardware).
9. Refresh Device Manager/Reinstall Device - This step falls into the "I don'tcare what the problem is, I just want it fixed" category. Open the devicemanager again and delete the devices that are not working properly. You willprobably be prompted to restart your computer, if not restart it manually.When the computer restarts the hardware you deleted will be detected againand be reinstalled with the default configurations. If you cannot find the devicein the device manager try to uninstall all software that came with it and
What are the common causes of hardware Failure?
AGE: Nothing lasts forever. This holds especially true for technology. Age hasmultiple effects on devices. Some break because they get old, others becomeobsolete. Most manufactures establish a life expectancy for their devices anywherefrom one year to five years. Hardware also ages quickly because of cost factors.Faulty Development: Here problems range from out-of-box failures to poorly andcheaply designed, second-rate devices. Cheap, second-rate devices not only break
easier than more reliable, common devices.
-
7/31/2019 CS Print Out
4/48
Incompatible devices: Just because a piece of hardware works in one computerdoesnt mean it will work in another one. Be sure to read all system requirementswhen buying new hardware and make sure that your existing equipment iscompatible.Damage: For some reason, most things on this planet dont like to be bumped,
kicked, dropped, stomped, cut and scratched. This is especially true for tech devices.Tech devices are extremely intricate, containing millions of microscopic transistors,tons of interconnected working parts, and complex power management features.
You're having a problem with your PC. No matter what the problem, the firststep is always to reboot your computer: There are a number of ways to reboot(restart) your computer.
If in Windows and the system is not frozen, click start, click shut down, click
restart.
If in Windows and the system is frozen, on your keyboard, hold down ctrl, alt,and delete all at the same time. In Windows operating systems prior to
Windows XP, press ctrl, alt, and delete a second time. In Windows XP, if
possible, click Shut down.
If these methods are unsuccessful or not viable, you may reboot manually. On
some systems, there is a reboot button located on the front of the PC. This is
a very small button, usually located beneath the power button. If there is no
reboot button or if the reboot button does not respond, press the main power
button and keep it held in for about five seconds. The PC should shut off
automatically.
Once it does, boot the machine.
The last resort is to unplug the power on the back of the PC. Wait a moment,
then plug it back in and try to reboot.
Once a computer has been restarted, if it does not work normally you should follow
the basic troubleshooting procedures listed below
MONITOR
Screen is dark or tinted
If the monitor screen is too dark or if the entirety of the screen is tinted, first trychanging the display.1. Right click anywhere on the blank desktop.2. Click Properties.3. Click Settings.4. Under Color Quality, try changing the settings.If this does not work, try changing the settings on your monitor. The brightness menubuttons are located below the screen on most monitors. Try making the screenlighter or darker. If this still does not work, the problem may be with either yourmonitor or the video card located inside the PC. If another monitor is available, tryhooking it up to your PC. If there are still problems, the video card is to blame and
must be replaced. If the problems are resolved, the monitor will need to be replaced.
-
7/31/2019 CS Print Out
5/48
DISPLAYIf only a portion of your screen is tinted or warped in any way, the problem needs notroubleshooting asyour monitor's tube is going out. The monitor will need to be replaced.
Screen is Fuzzy1. Remove any electronic devices such as fans or electric pencil sharpeners
from the proximity of the monitor.2. Ensure the monitor is plugged tightly to the computer.
Monitor Not Responding (No Power)1. Ensure all power sources are plugged in and turned on. Check the power cord
going from the back of the monitor to the power strip and the power cordgoing from the power strip to the wall.
2. Make sure the power strip is turned on.3. Try plugging the monitor directly into the wall. If the monitor then works, the
power strip has gone bad and will need to be replaced. If not, the monitor
must be replaced.
Error on Monitor Reading "No Signal"This error means that the monitor is not plugged in to the PC. Double check thecable and make sure theCable going from the monitor to the PC is plugged in and is in the appropriate place.
KEYBOARD
Computer Does Not Recognize Keystrokes
If the keyboard does not work at all:
1. Check the back of the PC to make sure the keyboard is correctly connected.
Remove the cable and reconnect it, then reboot your PC.
2. If the problem persists, you will need a new keyboard.
If only some of the keys work:
1. Run your hand firmly over the keys to ensure none of the keys are stuck.
2. Follow the steps listed above.
The keyboard beeps when any of the keys are pressed:1. Check to see if anything is resting on the keys and remove that object.
2. Follow the steps listed at the top of this page.
Keys on Keyboard Move Stiffly/Not At All
The keyboard is probably dirty. Lift the keyboard up, turn it over, and firmly tap to
remove any excess
Material that may resting beneath the keys. Then, using a can of compressed air,
clean out the keyboard as best you can. If the problem persists, the keyboard may
need to be replaced. This is a common problem that can be easily avoided. Please
do not consume any food or beverages over the keyboard and keep these things out
of "spilling distance." Loose make-up should not be applied over the keyboard.
MOUSE
-
7/31/2019 CS Print Out
6/48
Cannot Move Mouse CursorCheck the cable going from the mouse to the back of the PC to make sure it isconnected appropriately.Remove then reconnect the mouse and reboot the computer. If the mouse is still not
recognized, try another mouse in its place.
Mouse Cursor Difficult to MoveIf the mouse is physically difficult to move, either the mouse pad has worn and needsto be replaced or the mouse itself needs to be cleaned.To clean the mouse:
1. Turn the mouse over so that you can see the bottom2. Remove the plastic holder covering the ball by twisting it clockwise until it
comes off.3. Remove the ball.4. Cleanse the inner rollers with a cotton swab dipped in alcohol. You may also
scrape off any accumulated lint if no alcohol or swabs are available.
FLOPPY DRIVES
Error Reading Floppy DisksMore and more often, floppy disks and floppy drives are being phased out of thecomputing world. The reasons are 1) floppy disks do not have the necessary room to
store large documents, and 2) floppy disks are unreliable.There are many errors associated with floppy disks. An error message may accusethe floppy disk of having no content, of needing to be formatted, or of having acorrupt or partial file. In most of these cases, there is little that can be done to saveor restore the data on the disk. One option:1. Go to My Computer and double click.2. Right click Floppy A3. Click scan for viruses.
What should I do if my computer wont boot?
Make sure your power is working: Check your power cord is plugged inproperly. Check your wall sockets and check the PC power supply. Checkyour power on light of your system.
Try turning the power switch on and off on your computer a few minutes.
Make sure your monitor is power on.
Make sure your computer runs the POST. Look for any sort of output on yourscreen and a single beep.
Unplug everything that plugs into your computer on the outside with theexception of the power cord. Try booting it up while listening for any beeps,still its not responding then remove the computer side cover and remove theram, processor, video card all PCI cards and driver cables.
Make sure that your hard drive is working correctly. Check the hard disk.What should I do if my hard drive is having problems?
-
7/31/2019 CS Print Out
7/48
Check the hard disk connectivity in bios. Check the hard disk power supplyand bus cable.
The results of these tests will give you a good indication of whether your harddrive is any good.
Run the CHECKDISK utility to scan and repair any errors. You can run thisutility from windows.
How can I help prevent hard drive failure?
Proper Ventilation: Keep your devices vents open and clear from debris.Properly cooling your devices internal components is paramount.
Physical impact: Dont drop your device or subject it to severe shock. This cancause damage to the drivers platters and reading heads.
Voltage: Use a protector or UPS. This will prevent any voltage spikes or drops
from damaging your computer. RAID: Purchase and install drive mirroring hardware. Basically this is a card
you install in your pc.
Why wont my monitor turn on?
Make sure the monitor is actually turned on. Is the power light on?
Check the power cord of monitor. Some computers have an on-board videocard and a third party video card. Make sure your monitor is connected rightconnector on the desktop or laptop.
Check to make sure that the connector pins arent bent or broken.
Make sure you have power. Verify the monitor is plugged into a power source.If it is plugged into a power strip or UPS, make sure that power strip or UPS ispower on.
Check the monitor power switch on.
Make sure the power button is working perfectly.
Try to replace the card.
Get help of monitor manufactures or computer tech supporters.
Why does My Monitor Make Noise?
CRT monitors traditionally make noise when turned on or when the resolution /refresh rate is changed. This noise is usually a buzzing or clicking sound. The noise
is caused by the voltage changes that occur. They are perfectly normal. If your
monitor is making noise even when you do not change resolution /refresh rates, this
may indicate a hardware problem and you should have your monitor serviced.
What should I do if My Device Cant Read or Write to a CD/DVD?
First check your Drive, Is it CD drive or DVD drive.
Check your inserted disk CD/DVD.
-
7/31/2019 CS Print Out
8/48
Older CD & DVD players may not be able to read recordable media. Evennewer players may not be able to. Consult your owners manual for moreinformation.
Insert a disc into the drive and see if any LEDs light up on the drive. Inaddition check to see if the ejects mechanism works properly. If no lights are
visible on the front of the drive, check the power connection on the drive. A dirty laser lens can cause the drive to have difficulty reading the disc.
Is your computer mounted sideways? Most drives have catches to allowsideways mounting, but they do not always work.
What can I do if my Floppy drive wont work?
Your floppy drive LED should blink when you are booting your machine. If itdoesnt, you should check to make sure it is plugged into the power supply.
Make sure the drive is being detected by the BIOS.
Check your floppy disk, and change it.
What should I do if My computer Keeps shutting Off?
Make sure that you have a good constant flow of power to your PC.
Make sure your power supply is providing enough current to feed thecomputer and all of its accessories.
Check any recent hardwares installed.
Install all windows critical updates.
Check your bios configurations.
Install or Repair the Operating System.
What should I do if My Desktop computer has NO Sound?
Make sure your speakers are on.
Verify the Speaker are connected to power and switched on.
Pump up the volume.
Verify the volume is turned up and not muted.
Make sure the speakers are connected to the proper outlet jack.
PINK OR RED MICROPHONE
INPUTGREEN LINE OUTPUT
LIGHT BLUE LINE INPUT
If you hear crackling from the computer speaker, the cables and connectorsare loose or need replacement.
Open device manager check the status of the sound card.
-
7/31/2019 CS Print Out
9/48
CHECK LIST TO IDENTIFY THE DEFECT IN COMPUTER
OPTIMIZING PERFORMANCE
Optimizing Windows is the process of fine-tuning its performance. Both Windows XPand Windows 2000 include some utilities that help optimize the OS performance. Inthis section, we will discuss how the OS can be fine-tuned for optimum performanceVirtual memory.Windows operating systems use virtual memory to temporarily store data when it isrunning out of the physical memory (RAM) in the computer. This data is stored in afile on the hard disk (which is known as swap file or paging file). For most Windowsinstallations, the OS automatically manages the size of the paging file. You canmanually increase or decrease the size of this file or split the file across multiple harddisks depending on your requirements. If you feel that the system performance ispoor, you can increase the size of this file or divide the file into multiple disks. The
following steps explain how you canchange the virtual memory settings in Windows XP:
1. Click Start Control Panel System.2. Click the Advanced tab.3. Click the Settings button in the Performance area.4. Click Advanced.5. Click Change in the Virtual Memory area.6. Enter the Initial size and Maximum size and click Set.7. Close all windows.
DEFRAGMENTING HARD DISKS.
Defragmenting hard disks helps improve their read/write performance. Hard disks
become fragmented when some applications are installed or after a large number of
files are moved or deleted. Fragmentation refers to the state of a hard disk when it
no longer has contiguous space available
to store new files or folders. The Disk Defragmenter utility can analyze hard disks
and defragment them to free up contiguous space. Disk Defragmenter works on
FAT, FAT32, and NTFS volumes.
There are several ways to access the Disk Defragmenter:
Click Start All Programs Accessories System Tools Disk Defragmenter.
Open Windows Explorer; open the properties of disk or volume. Select the
Tools tab. Click Defragment
Temporary files: The Disk Cleanup utility in Windows XP is used to free up disk
space by deleting temporary files and folders from the disk or volume. This utility can
be accessed from Windows Explorer or from the System Tools folder under
Accessories in the All Programs menu. Disk Cleanup essentially gives you options to
delete several types of files. These files include:
Program files downloaded from the Internet, including ActiveX controls andJava Applets.
-
7/31/2019 CS Print Out
10/48
Temporary Internet files to clear the computer cache. These files are stored in
the Temporary Internet Files Folder.
Temporary Files located in the Temp folder.
Files stored in the Recycle Bin.
MSCONFIG: The msconfig.exe is a command-line tool that eventually opens a GUIcalled the System Configuration utility. This utility displays the current systemconfiguration and allows you to safely change system settings. The settings that youcan change include the following: System startup options for diagnosing startup problems. Advanced boot options to start the system in a selected diagnostic mode.
-
7/31/2019 CS Print Out
11/48
SOFTWARE TROUBLESHOOTING
SOFTWARE
Computer hardware such as the MOBO CPU, ADAPTER CARDS, DISPLAYDEVICE AND I/O DEVICES, are only a part of the entire computer system. To makethis hardware work we need software that acts as interface between human beingsand the hardware.
Software can be classified into 3 major categories as follows.
1. Operating systems: The piece of software is responsible for controlling a PCand other devices. It manages memory, printing, networking, those silly smileyfaces you send using AIM, disk drivers, and a myriad of other things. You seethe hardware through the operating system.
2. BIOS: BIOS stands for basic input/output system. Its what a device uses untilit loads the operating system. Most of you have seen the black and whitescreens that scroll past as you boot up your computer. That is the BIOs hardat work, waiting for the operating system to grab the baton.
3. Drivers: Drivers are a type of software that allows the operating system tocommunicate with hardware. Every single piece of hardware inside of and
connected to you PC needs a driver or it will not work.4. Applications: Applications is the software program that takes commands
from the user for a specific task, executes them and produces the results.
Type of Software Installations
When software is installed, the installer may add, modify, or delete files,registry entries, or even text within files. There are many different types of softwareinstallation packages:
Single executable installation: This is probably what comes to mind when you
think of software installations. It consists of a single, compressed file that includes allof the instructions that are needed to install the program.
Web-based installation: This type of installation has become very popular inrecent years, most likely because of the proliferation of broadband internet access.
Media based installation: This type of installation places all of the necessaryfiles on a span of discs. Also included is an executable file that knows where to copythe files and what changes to make to the system.
Windows installer: Windows installer was introduced with Windows 2000. It caninstall, repair, and remove software using instructions that are provided in MSI files.
-
7/31/2019 CS Print Out
12/48
-
7/31/2019 CS Print Out
13/48
Types of Operating Systems
An operating system of any kind is one of the biggest software applications around
(some with over 45 million lines of code). The operating system is what peopleinteract with and the environment on which other programs run. Operating system allfall into one or more of the following categories:
GUI: The graphical user interface operating system is what most of you will befamiliar with. It consists of graphics and icons that are manipulated using a mouse orother input device.Multiprocessing: These operating systems are designed to use more than oneprocessor. Once only a privilege of supercomputers, you can now find thesepowerful operating systems running servers in a doctors office.
Multiuser: The multiuser operating system allows many people to use it all at onceor at different times.
Multitasking: A multitasking operating system can run multiple programs at the sametime.
Multithreading: A multithreading operating system allows different parts of softwareto be run concurrently.
Troubleshooting Techniques
In order to troubleshoot problems related to the operating system, you mustunderstand the Windows boot sequence, the advanced boot options available, andbasic diagnostic procedures. Additionally, you must have good knowledge of usingbuilt-in troubleshooting utilities. Familiarity with different types of error messages andcommon operational problems will help you resolve problems easily and quickly.
Understanding boot sequence:The following discussion explains the boot sequence in both Windows XP andWindows 2000:
Pre-boot Sequence. When the computer is started, it performs a pre-bootsequence in the following manner:1. A POST is performed to check the hardware components, which include
Physical memory (RAM), video, and the keyboard. In case the computer BIOSsupports Plug and Play (PnP), the configuration of PnP-compatible hardwaredevices is performed.
2. The Master Boot Record (MBR) is loaded from the selected boot device. TheMBR in turn loads the NTLDR file from the boot device. In case the computerhas a Small Computer System Interface (SCSI) device as the boot devicewithout its own BIOS, the NTBOOTDD.SYS file is loaded.
Boot sequence. NTLDR takes charge of the process from here on and performsthe following steps:
-
7/31/2019 CS Print Out
14/48
1. NTLDR switches the processor to 32-bit flat memory mode and loads the filesystems driver to access the FAT, FAT32, or NTFS partitions.
2. NTLDR reads the BOOT.INI file and selects an operating system. If multipleoperating systems are installed on the computer, the BOOT.INI file prompts
the user to select an operating system. If the MS-DOS operating system isselected, NTLDR loads the boot sector from the BOOTSECT.DOS file.
3. NTLDR calls on the NTDETECT.COM file to perform hardware detection,which displays error messages if any hardware problems exist. If thecomputer has more than one hardware profile, the user is given a choice toselect an appropriate profile.
UNDERSTANDING THE ADVANCED BOOT OPTIONS
Some of the Windows startup problems can be resolved using the Advanced Boot
Options during the startup phase. The most commonly used advanced optionsinclude Safe Mode, Last Known Good Configuration and Recovery Console. WhenWindows fails to complete the boot process, you can access any of these options bypressing the F8 key immediately after the POST is complete.
Safe ModeIn the Safe Mode, Windows XP loads with minimum basic system services anddevice drivers sufficient to boot the operating system. These components include thekeyboard, mouse, hard disks, the VGA monitor, and other most essential systemservices. Safe Mode provides access to all system and deviceConfiguration options so that you can enable or disable components one by one andtry to pinpoint the problem.
Safe Mode with NetworkingSafe Mode with Networking is similar to Safe Mode except that networking devices,drivers, and services are also initialized.Safe Mode with Command PromptSafe Mode with Command Prompt loads the command interpreter, just like in MS-DOS, instead of the GUI.Last Known Good ConfigurationThe Last Known Good Configuration option loads the last used system configuration
that allows you to return the system to the previous working configuration. Windowssaves two types of configurations in the Registry: Default and Last Known Good. TheDefault configuration is saved to the registry when you shut down the system.Enable Boot LoggingThis mode enables the boot logging option that stores the boot process informationin a file named NTBTLOG.TXT. This file is stored in the /WINNT directory and ishelpful is diagnosing startup problems.Enable VGA ModeThis mode loads Windows with basic VGA device drivers and other normalconfiguration. This mode is helpful in diagnosing problems with the display driver.
System Restore (Windows XP)
-
7/31/2019 CS Print Out
15/48
The System Restore in Windows XP helps restore the system to a working stateafter you make changes to the system settings or install applications that make itunstable. It uses system restore points to store a snapshot of system settings atregular intervals. When you run the System Restore, a calendar is displayed in whichyou can pick a particular System Restore point. The System Restore can be
accessed in one of the following methods:
1. Open the Help and Support Center, located in the Start menu. Under Pick aTask, click Undo Changes to Your Computer Using System Restore.
2. Click Start All Programs Accessories System Tools System Restore.
You can also create System Restore points manually when you expect to makechanges to your system. The following steps explain how you can create a SystemRestore point:
1. Click Start All Programs Accessories System Tools System Restore.
2. Click Create A Restore Point. Click Next.3. Type a name to identify the restore point in the Restore Point Description box.4. Click Create.
Common error messagesThe following sections cover some more common error messages that you are likelyto encounter:
Missing NTLDRThe NTLDR is missing error is accompanied by a Press Any Key to Restartmessage. This error is caused if any of the system startup files are missing or havebecome corrupt. The files that can cause this error include NTLDR,NTDETECT.COM, and BOOT.INI. You can restore these files by using the RecoveryConsole, an Emergency Repair Disk (ERD in Windows 2000), or by using the setupCD-ROM and selecting the Repair option when the installation starts. You can alsorestore these files using a system restore utility in Windows XP.
Invalid Boot DiskThis error is displayed when the system BIOS cannot access the disk partition that issupposed to contain system startup files. You might have to reinstall the OS toaddress this problem.
Operating System Not FoundThis error means that the BIOS cannot find an operating system on the configuredboot partition or boot device. This error is common in new computers that do have aboot partition configured in the BIOS and on which no OS has been installed so far.
Inaccessible Boot DeviceThis error is displayed when the computer finds a critical error with a boot device.This can be due to a malfunctioning device driver or to some resource conflicts.
What are the common causes of software failure?
The worst kind of software failure you can have is when your computer refuses to
-
7/31/2019 CS Print Out
16/48
start up because your operating system (windows) refuses to work. The other type offailure you might experience is that an application refuses to run. Both of these typesof failures can really stop you tracks and ruin your day. Here are some of thecommon causes of software failure should put on the top of your troubleshooting list:Registry problems: The good news with windows is that it has a built in database
and control system to keep track of all the software and critical information that liveson your PC. This feature is called the Registry. When the Registry has a bad hairday. Your pc might not start up or an important program installed on your pc mightnot work.Improper Installation: Software can be really fussy. If it isnt installed just right itmight not ever run at all or it might run inconsistently.A recent software installation: It might seem that just out of the blue youroperating system or an important application starts acting up. This problem willoccurs because youve recently done something such as install some new software,a new hardware device like a printer, or attacking virus.Expired Software: Many programs that users install on their PCs are often
downloaded from the Internet. Many are trail versions. Subscription based softwaremay continue to work after it expires but not fully.Viruses: Viruses can create havoc on a PC because of the importance of viruses,weve devoted an entire chapter to them.Poorly written code: Software developers tell you, their products are flawed. Theyare riddled with code flaws, bugs and security holes.
SOFTWARE PROBLEMS
What should I do if my operating system will not start?
Investigate all of hardware failure problems: You might just get lucky and discoverthe problem is due to a faulty power cord.
Try to return your system to an earlier state: This solution will work only of yourcomputer is still booting up and you are using Windows Xp. If you installed somenew software or hardware drivers recently. You can then use the Windows systemRestore feature to restore your computer without losing any of your personal data.Use the windows Setup CD that came with your PC: This is another importantsolution that can be used if you are running Windows XP. Windows XP setup CDprovides a repair option that can fix startup problems, problem with system files and
more. With this software we can repair and recover the OS.Try to fix a Registry boot problem: Your computer may be suffering from having acorrupted registry. This is a problem that we fix with reinstall Windows.Use the windows upgrade feature: This is another nice trick you can try if you arerunning windows XP. Insert the Bootable CD, boot from it and run theInstall/Upgrade option. This option will install windows XP, but it will treat theinstallation as an upgrade and therefore it will be repair and install programs.Perform a clean install of Windows: If youve tried everything else and you stillcant get you PC to boot, youll need to use your windows setup CD and performclean install.
What can I do if my computer boots really slowly?
-
7/31/2019 CS Print Out
17/48
Remove some of the programs that get loaded when windows startup using withMSCONFIGClean the Registry using a commercial registry cleaning utility.Check your antivirus software and scan the entire system. If the virus is thereremove it.
What should I do if I cant run an application?Application shortcut: Check the shortcut of application and make sure the shortcutis pointing the correct executable file.Software Expiration: The software will typically run for a year or so and then expire.If you have a program that suddenly stops working, make sure you check to see thatthe software hasnt expired.Administrative privileges: Some applications will not run unless you haveadministrative privileges on the computer you are running it on. You must take theadministrative permissions to access the applications.Repair: Some programs allow you to repair an installation by running a special
utility. Reinstall the application and access it.DLLs: (Dynamic Link Libraries) these files are that application share to providefamiliar functionality. When youre opening an application it displays some DLL filemissing. This can make programs that are dependent upon them not work properly.Contact your software manufacture if you suspect DLL problems.
What should I do before installing software?
Check the Compatibility of your PC.Reboot the PC to clear memory errorsBefore installing the application you have to delete the temporary files in the TEMPFolder.Before installing the application make sure you have administrative privileges on thecomputer.Do not open the applications or files when youre installing applications.Turn of you screen saver because it may also cause you to cancel yourinadvertently.When youre installing application on laptop check battery power status.When application installing is processing keep your kids away from the keyboard.
How do I start a Software Install?
Auto run: This method involves putting a CD-ROM in your device and closing it.Your drive will blink and make whirling noises signifying that it is reading data off ofthe disc. You should shortly see a splash screen for the program you are installing.Executable file: Executable files are another way to start an installation. They aretypically named setup.exe, update.exe, or a host of other names.Archive: Some programs are archived inside of another file such as a ZIP file. In acase, you should extract the contents of the archive to a normal folder and then runthe install program.
What should I do if I cant find a program after installing it?
Start Menu: This should be the first place you look. Just click start in the lower left
-
7/31/2019 CS Print Out
18/48
hand corner.Program File folder: Most window applications install under this main folder. Youcan find the folder by double-clicking my computer and then Local disk (C :). You willsee a folder named Program files.Root of your hard disk: Some software will create a folder on the root of your C:
drive.On a different partition or hard drive: If you have multiple partitions or multiple driversthe software may have been inadvertently installed there.
Why cant I install/Uninstall Software?Microsoft created different levels of permissions in order to accomplish this:Are you an administrator? To install software you need to be a member of theAdministrators or Power Users group.Are you in Terminal Services? Terminal services are a technology that allowsmultiple people to log into a server and access a Windows Desktop.Are you logged on as administrator? Some programs require that you are actually
logged on as the administrator account.
What can I do if my software install fails?
Reboot and retryCheck the event log: The event log keeps a history of errors and warnings that aregenerated by the software and hardware installed on your computer.Check the install log: During most software installs, a record is kept of all of actionsand error messages that were generated during the installation. It can be found inroot of your C: drive and is usually named install.logMake sure your system is up-to-date or notClear you temp file folderDisable you antivirus program: Disabling the real-time scanning of your antivirussoftware may help in installing stubborn software.Install the software using safe mode booting.
How can I uninstall software?
Use the Add/Remove Programs feature: Add/Remove programs can be found inwindows control panel. This method is the preferred method of uninstalling softwareon the windows operating system.
Use the program files menu: Find the program in the program files menu.Click startSelect all programsFind the program you want to uninstallClick the uninstall option.Use an uninstall file: These files can usually be found in the softwares folder in theprogram files folder.Contact the software company
What can I do if my uninstall fails?
Reboot the PCClear your system temporary files in the TEMP folder. Click start- select run- type
-
7/31/2019 CS Print Out
19/48
%TEMP%Use safe mode BootingContact the software company.
How can I Update Windows?
You have two options can manually update or use automatic updates.Click start- then RUN, type in wupdmgr.exe and click okClick start and then click windows updateGo to HYPERLINK "http://windowsupdate.microsoft.com"http://windowsupdate.microsoft.com
Updates come in several different types:Critical Update: These are important security updates that Microsoft releases inresponse to vulnerabilities in its Windows operating Systems.Recommended Updates: These consist of regularly released updates to windows,
Internet Explorer and other Microsoft products.Windows Tools: These are utilities and other tools offered by Microsoft for use bysystem administrators.Internet and Multimedia Updates: These are the latest versions of InternetExplorer, windows Media Player, and other Microsoft Software.Additional Windows Downloads: These are miscellaneous updates for desktopsettings and other Windows features.Click Review and install updates and select the ones you want to install.
How can I install updated drivers?It can be done from the Device manager using the Hardware Update Wizard.Open the Device MangerRight Clicking My computerClick propertiesSelecting the hardware tabClick Device manager
If its and INF file, you can right click on it and choose install. INF files contain all ofthe necessary information to install a driver for a particular piece of hardware.Most drivers come packaged into an installer program.
What is a device driver?A software routine that links device to the OS. It acts like a translator between adevice and the OS.
Device drivers
Device drivers are system programs, which are responsible for proper
functioning of devices. Every device, whether it is a printer, monitor, mouse or
keyboard, has a driver program associated with it for its proper functioning.
Whenever a new device is added to the computer system, a new device driver
must be installed before the device is used. In modern operating systems, mosthardware drivers, such as the keyboard driver, come with the operating system.
-
7/31/2019 CS Print Out
20/48
A driver acts like a translator between the device and program (typically, an
operating system) that uses the device. For example, when a user prints a
document, the processor issues a set of genetic commands to the printer driver,
and the driver translates those commands into the specialized instructions that
the printer understands. Note that each device has its own set of specializedcommands that only its driver understands. A device driver is not an
independent program; it assists and is assisted by the operating system for the
proper functioning of the device.
How can I Rollback a Driver?You will still be able to revert to the last driver that was installed. Follow these simpleinstructions:Open Device Manger, You should be an expert in this by now.Right click the device in question
Click PropertiesClick the Driver tabClicks roll back Drivers.
Windows Optional Components
IIS: Internet Information Services (IIS) allows you to run a website from yourcomputer. Although this may be overkill for the majority of the readers of this book, itmay prove useful in some situations, such as in a small to medium office. You canshare information with co-workers using an internet website.FAX Services: Windows Fax services allow you to send and receive faxes via your
PC without the use of third-party software such as WINFAX.
To Install Windows Optional ComponentsOpen the Windows Control Panel.Double-Click Add or Remove ProgramsClick Add/Remove Windows componentsCheck off any Components you want to install and Click next.
How can I Prevent My Self from Deleting Critical System Files?Right click startClick ExploreClick Tools in the upper MenuClick Folder OptionsCheck Hide protected operating system filesCheck Do not show hidden files and foldersUncheck Display the contents of system foldersClick OK.
-
7/31/2019 CS Print Out
21/48
COMPUTER VIRUS/ANTIVIRUS
Computer Virus
A virus is a piece of programming code usually disguised as something else that
causes some unexpected and usually undesirable event. A virus is often designed
so that it is automatically spread to other computers. Viruses can be transmitted as
attachments to and e-mail, as downloads, or be present ona diskette of CD. It must
be remembered that a computer virus does not spread on its own, rather it requires
some carrier to transport it from one place to another.
Categories of Computer Viruses
The three broad categories of viruses are as follows:
File Infectors
System Infectors
Macro Viruses
1. File Infectors: Some file infector viruses attach themselves to program files
while some can infect any program for which execution is requested. When
the program is loaded, the virus is loaded as well. Other file infector viruses
arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.
2. System infectors: These viruses infect executable code found in certain
system areas on a disk. They attach to the DOS boot sector on diskettes or
the Master Boot record on hard disks. A typical scenario is to receive a
diskette from an innocent source that can be read without triggering the boot
disk virus. However, if you leave the diskette in the drive, and then turn the
computer off or reload the operating system, the computer will look first in
youre A drive, find the diskette with its boot disk virus, load it, and make it
temporarily impossible to use your hard disk. This is why you should makesure you have a bootable floppy.
3. Macro Viruses: These are among the most common viruses, and they tend
to do the least damage. Macro viruses infect your Microsoft Word application
and typically insert unwanted words or phrases.
Symptoms of a Virus
Some common symptoms for a virus are as follows:
1. The computer begins to run slowly
-
7/31/2019 CS Print Out
22/48
2. Unusual messages and graphics appear on your screen for inexplicable
reasons
3. Music, not associated with any of the current programs, begins to play
4. Some of the program and/or data files have either been corrupted, or theyhave become difficult to locate.
5. Unknown files or sub-directories have been created.
6. The sizes/dates of executable files change automatically.
7. The computer does not remember CMOS settings.
8. The disk volume label has been changed unexpectedly.
9. The hardware devices begin to exhibit unusual behavior.
WORM:
A worm, like a virus, is a program that is designed that is designed to harm the
computer and destroy data stored on a computer. Worms are considered more
harmful that viruses because they rely less on human behavior in order to spread
themselves from one computer to another.
TROJAN HORSES:
A Trojan horse, or simply a Trojan, is a malicious program that is embedded inside alegitimate application. The application appears to be very useful, interesting and
harmless to the user until it is executed. Trojans are different from other computer
viruses in that they must be executed by the victim user who fails for the interesting
software.
Anti-Virus Software:
Anti-virus software protects your computer from unexpected virus attack. Apart from
protecting your system, anti-virus performs the following tasks:
Detects the name of virus and its type.
Detects the name of infected file or folder and mentions the exact location of
infected file or folder on your computer and removes the virus from the
computer.
Most of the anti-virus softwares come with Alert feature. This feature keeps a
vigil on your computer and as soon as some virus-like activity is found, the
Alert feature displays a message box and alters the user.
By changing the settings of anti-virus, you can instruct it to scan the computeron a regular basis.
-
7/31/2019 CS Print Out
23/48
The names of some popular anti-virus softwares are listed below:
Norton Anti-Virus:
This anti-virus software is most widely used and can easily be purchased from the
market. Norton anti-virus has direct patch up with software firm Symantec, whichspecially deals in anti-virus operations.
McAfee
Software giant Microsoft used this anti-virus software for its email website Hotmail.
Whenever you open some email or download some file from hotmail, the McAfee
anti-virus software automatically checks the files for viruses.
HOW TO INSTALL ANTIVIRUS
Heres what to do before installing your antivirus software:
Back up your files: I dont mean copy them to another directory on the same hard
drive that would be like making copies of important documents and putting them
in the same drawer. Convenient until you have a fire. Instead, copy everything to
another computer, or to a CD-ROM that you have verified is readable on another
computer.
Reboot your system: Stop all of your other programs
Open the Antivirus software CD in the OS
Open the setup file (Executable file)
Install your new anti-virus program. Follow the instructions carefully. If you
become dazed and confused, stop the install, and get some help.
After completing Installing restart your computer
Open the Antivirus Application and update through Internet
After completing update process
Scan the all Hard Drives.
Virus Information:
This section provides a list of the latest viruses and their symptoms. You canuse this section to prepare yourself for facing the latest virus threats.
Virus name: W32.KazaA.Benjimin
This new type of worm spreads via a computer network known as KaZaA.Whenever a contact is made with this type of worm, a message is displayed to
the user which forces him to believe that this worm is a new game or utility toenhance the performance of computer.
-
7/31/2019 CS Print Out
24/48
Virus name: W32.Klez.H
W32.Klez.H is file type worm, which infects files by renaming them with arandom extension and copying itself as the name of the original file. It isnetwork aware and detects all open shares and copies itself to them with
random filenames.
Virus name: W32.Nimda
W32.Nimda is a very highly infectious worm, which creates.EML and .NWS filesin all folders that are accessed by the user. This is a network aware virus andcreates the .EML and/or .NWS files in the shared folders of other computers aswell. When any of these files are opened in Outlook, the virus automaticallygets executed on computers without the outlook patch.
Virus name: W32.Sircam
This is a network aware trojan. It installs itself as a hidden file in theRECYCLED folder with the name SIRC32.EXE.It changes the registry toexecute the virus whenever any .EXE file is run.
Virus name: CHM.Britney-Pics.Worm
This is a worm that arrives in emails as a CHM (Compiled HTML) attachment.The subject of the mail is RE: Britney Pics. It spreads through e-mails by using
addresses it collect from the Microsoft Outlook Address Book.
How to avoid Virus?
If we follow some simple safety measures, we can easily protect our computersfrom getting corrupted by viruses. For this keep the following tips in mind:
First of all you must prepare yourself against viruses by knowing abouttheir symptoms, behavior, general working and their common source oforigin.
On a regular basis collect information about the latest virus threats. Youcan find such information from websites like www.s-cop.com andwww.symantec.com.
Never download files from unfamiliar or doubtful websites.
Do not open any suspicious or unfamiliar email. Simply delete it.
Maintain a separate folder for downloading files from the Internet. Oncethe download is complete, scan the folder with anti-virus software. Oncethe scan is complete, move the file to some other location on your
computer.
http://www.s-cop.com/http://www.symantec.com/http://www.s-cop.com/http://www.symantec.com/ -
7/31/2019 CS Print Out
25/48
Scan your computer thoroughly on a regular basis and never stop thescanning operation in the middle.
Update your anti-virus software regularly from the Internet to empower itagainst new viruses.
Always scan a floppy disk before using it because it may also containviruses.
Take regular back-ups of files so that a possible damage is minimized if avirus attack does occur.
Create strong passwords so that virus could not guess the password andbreach the security settings of your computer.
Maintain a strict security level for browsing the Internet.
Remove files having extension .TMP and .CHK regularly.
What is malicious code and software?
Malicious codes are the software programs that generate threats to the
computer system and precious data. This code can be in the form of viruses,
worms, Trojan horses, Logic bombs, and other uninvited software. Viruses are
a small segment of code, which replicates by attaching copies of itself toexisting executables files. The new copy of the virus is executed when a user
executes the new host program.
SCANNING HARD DISK FOR VIRUSES
To Open the Antivirus Software:
Start Button- Mouse Cursor Place over the Programs Option- Select the
Antivirus Software-Click it.
The main window of Antivirus appears.
Select the Scan drivers Option and click it.
By default antivirus software selects all drives present on computer for
scanning
Select the which drive do you want to scan
Next click the scan button
Antivirus starts scanning selected drives for viruses
-
7/31/2019 CS Print Out
26/48
After completing the scanning, antivirus display a Summary window.
This window mentions how many files or folders scanned by antivirus, number
of infected files detected by antivirus, files repaired and deleted by antivirus.
After viewing the scan summary, click the finished button.
-
7/31/2019 CS Print Out
27/48
INTERNET
What is internet?
The internet is a global collection of computer networks that are linked together by
devices called routers, modems and use a common set of protocols for data
transmission known the TCP/IP (Transmission control protocol/Internet protocol).
The Primary purpose of the Internet is to facilitate the sharing of information. This
global network links thousands of computers at universities, research institutions,
government agencies and business houses throughout the world. Using a small pc
at your home and telephone connection, you can access information from any place
in the world through internet. There are many different tools used on the Internet to
make this possible. Some of the more common tools
1. Email
2. Information store house
3. FTP (File Transfer protocol)
4. Telnet
5. Entertainment
6. Online Shopping/Electronic Commerce
Email: Electronic mail is a fast easy and economical way to send messages to
anymore having an Internet account. Through this most widely used feature on
Internet you can exchange messages with your family, friends and business
associates around the world. Along with the messages one can also send pictures,
audio and animation.
Information Storehouse: You can easily access information from internet regarding
any subject. Internet is very much like a library with enormous information on any
subject.
FTP: There are thousands of free programs and softwares available on Internet.
You can transfer them to your hard disk through a process called File Transfer
Protocol.
Telnet:Telnet is an Internet exploration tool that allows your PC to connect to
another network and login as if you were a user on that system. You can
communicate with a wide variety of remote systems with which you have an
account. Telnet is widely used to access databases and explore public access
computer systems. Libraries frequently use Telnet. When you search for
-
7/31/2019 CS Print Out
28/48
resources, and an item is not found in one library, another library needs to be
searched. The Telnet application helps you to do this.
Entertainment: Hundreds of simple games are available for free on internet, Like
chess, football, etc. Internet also allows you to review the current movies as well as
indulge in interactive conversation with people around the world.
Online Shopping/Electronic Commerce: Online shopping means buying or selling
on the Net. You can order goods and services on internet such as computers,
softwares, books, dress, vegetable etc.
EQUIPMENT REQUIRED FOR AN INTERNET CONNECTION
Computer:Any good IBM compatible pc and unix or windows os, computer that has
good storage space and minimum configuration of pc.
Modem: The term modem is derived from Modulator/Demodulator. A modem is a
hardware device that is used to convert digital signals from a computer to analog
signals (modulation) in order to transmit them over analog lines. At the receiving end,
it converts the analog signals back to digital signals (demodulation) so that a
computer can understand them. It can be built onto the MOBO of the computer can
be installed as an extension card, or can be and external device. External modems
can either be connected to one of the serial ports or to the USB port of the computer.
Web Browser: The software used to navigate through the web is known as a
browser. The most popular browser types today are Netscape Navigator andMicrosoft Internet Explorer. Before you start working on the Internet, make sure you
have a web browser in your computer, otherwise you will not be able to surf the net.
The Microsoft Internet Explorer comes installed along with MSOFFICE.
Telephone Line: It is essential to have a telephone connection to get connected to
Internet. All the data and information pass through the telephone lines as analogue
signals.
ISP (Internet Service Providers): If you have a computer with a web browser, a
modem and a telephone line connected to your computer, you now need an Internetconnection. You can get and Internet connection from various Internet Service
Providers. EX: BSNL, VSNL, MTNL.
INTERNET TERMINOLOGY
TCP/IP
TCP/IP is the protocol suite that is designed especially for the Internet. Basically, the
TCP/IP handles network communications between network nodes (computers
connected to each other over the Internet).The suite is actually composed of several
-
7/31/2019 CS Print Out
29/48
protocols including IP, which handles the movement of data between host computers
and TCP, which manages the movement of data between applications.
URL (Uniform Resource Locator)
A URL is the address of a resource accessible on the Internet. The type of resourcedepends on the Internet application protocol. Using the World Wide Webs protocol,
the HTTP and the resource can be and HTML page.
The URL contains the name of the protocol required to access the resource, a
domain name that identifies a specific computer on the Internet and hierarchical
description of a file location on that computer.
Here is an example of URL: http://www.google.com.
HTTP: (Hyper Text Transfer Protocol)
HTTP is a protocol used by the WWW. The main task of HTTP is deals with the
messages format and transmission and what actions Web Servers and browsers
should take in response to various commands. The main standards that controls how
the WWW works is HTML, which deals with how Web pages are formatted and
displayed.
Modem
Modem: The term modem is derived from Modulator/Demodulator. A modem is a
hardware device that is used to convert digital signals from a computer to analog
signals (modulation) in order to transmit them over analog lines. At the receiving end,
it converts the analog signals back to digital signals (demodulation) so that a
computer can understand them. It can be built onto the MOBO of the computer can
be installed as an extension card, or can be and external device. External modems
can either be connected to one of the serial ports or to the USB port of the computer.
Network
A network is a group of interconnected systems sharing services and interacting by
means of a shared communications link. A network therefore, requires two or more
individual systems with something to share (data). The individual systems must be
connected through a phyiscal pathway called the transmission medium. All systems
on the physical pathway must follow a set of common communication rules for data
to arrive at its intended destination and for the sending and receiving systems to
understand each other. The rules that govern computer communication are called
protocol.
Types of Internet Connection:
http://www.google.com/http://www.google.com/http://www.google.com/ -
7/31/2019 CS Print Out
30/48
The must be connected to a telephone line to access the web. However modems do
not need a special telephone line. Most people use their regular phone line to
connect to the Internet. Apart from a normal telephone line, you could also use other
channels to connect to the web. Some of the other common types of Internet access,
available for the use these days, are briefed below:
Dial-up: A dial up connection is the access method that uses telephone lines to
connect to the Internet. It is the most common way that individuals who use home
computer connect to the Internet. To connect to the Internet by using dial up, the
user needs to specify a username, a password, and a telephone number. After the
connection is established, the user can start browsing sites on the Internet.
ISDN: It stands for Integrated Services Digital Network and is more common in
business and ISDN involves the digitization of telephone network so that voice,
graphics, text and other data can be provided to users from a single terminal over
existing telephone wiring. Digital connections have fewer errors in transmission,
which means speed of downloading graphics, web pages, sound and so on is
increased to four times faster than with dial-up modems.
DSL: Digital subscriber Line service is provided through the existing phone line,
but it works differently than regular analog modem dial-up access. DSL operates
over normal telephone lines and it can be used simultaneously with the telephone.
DSL can increase the connection speed by as much as ten fold form a standard
dial-up modem.
Broadband: This type of access is good for remote locations, where ISDN, cable or
DSL are not available. It gives a decent download speed, but to upload data, the
user sill needs a regular analog modem to dial in, via a phone line. Satellite
connection can be either a two way service or a one-way service. In case of two-way
satellite service, the data is transmitted via satellite to a dish antenna at the users
house. In one way system, the user needs a conventional modem and telephone link
to an ISP. Satellite connection is expensive but sometimes is the only fast option for
people who are beyond the service area of cable and DSL providers.
Internet Softwares:
TCP/IP: It is the basic communication protocol of the Internet. It allows programs on
users computer to communicate properly over the Internet. Usually when you are
setup with direct access to the Internet, Your computer is provided with a copy of the
TCP/IP program. Similarly every other computer that you may send messages to or
get information from also has a copy of TCP/IP.
Dialer Software: This software is provided by the ISP to instruct the modem to dial
the phone number and to identify the users machine to the access providers system
for access to the network.
-
7/31/2019 CS Print Out
31/48
Browser: To use the Internet a web browser is essential. This program allows the
user to view the information available on the World Wide Web.
Internet Relay chats
The internet relay chat (IRC) feature of internet lets you instantly communicate withpeople around the world. Using IRC you can converse on the Net with one or more
individuals simultaneously by simply typing replies to lines coming in from the other
individuals. This is a great way to meet people and exchange ideas.
During Internet conversations, if you type text, it immediately appears on the screen
of every person involved in that conversation. Unlike talking on the telephone, the
IRC lets you chat with friends and colleagues in other cities, states or countries
without your having to pay long distance charges.
TYPES OF CHAT
1. TEXT BASED CHAT: It is the oldest and most popular mode of chat on the
Internet. This mode enables you to have conversation with one or more
people. During chat when you type text, the text appears on the computer
screen of every person participating in your conversation. The test gets
transferred quickly across the Internet through the modem. So you do not
need a high-speed modem for text based chat.
2. WEB BASED CHAT: In this type of conversation, you make use of
multimedia. In fact, multimedia chat is a new feature of the Internet. Thisfeature enables you to have voice conversations and communicate with other
people through live video over the Internet. Since sound and video signals get
transferred slowly across Internet, it is recommended that you use a high
speed modem for web based chat. However, web-based chat is not functional
in India as yet because of the narrow band-width available for use in India.
Browsing the WWW
When you open the Internet Explorer browser, the home page of Microsoft will open
by default. If you have the Netscape browser, the home page of Netscape
Incorporation opens on your screen by default.
Each Web page on the web has a unique address. This address is called a URL
(Uniform Resource Locator). The URLs of web pages start with http:// where http
stands for hyper text transfer Protocol. To view a particular website, you will have to
provide an address that is a URL of that website.
1. Open the Internet Explorer and it displays the homepage of Microsoft.
2. Move the mouse-pointer inside the Address box and click the left mouse
button.
-
7/31/2019 CS Print Out
32/48
3. Now type the URL http://www.google.com and then press the Enter key.
List of Popular Websites
www.rediff.com
www.timesofindia.com
www.hindustantimes.com
www.navbharattimes.com
www.filmfare.com
www.msn.com
www.google.com
www.cards4you.com
www.bluemountains.com
www.yahoo.com
www.hotmail.com
www.ibm.com
http://www.google.com/http://www.rediff.com/http://www.timesofindia.com/http://www.hindustantimes.com/http://www.navbharattimes.com/http://www.filmfare.com/http://www.msn.com/http://www.google.com/http://www.cards4you.com/http://www.bluemountains.com/http://www.yahoo.com/http://www.hotmail.com/http://www.ibm.com/http://www.google.com/http://www.rediff.com/http://www.timesofindia.com/http://www.hindustantimes.com/http://www.navbharattimes.com/http://www.filmfare.com/http://www.msn.com/http://www.google.com/http://www.cards4you.com/http://www.bluemountains.com/http://www.yahoo.com/http://www.hotmail.com/http://www.ibm.com/ -
7/31/2019 CS Print Out
33/48
Introduction of WWW
The Web is a vast collection of information that is stored on the computers that make
up the Internet. The term World Wide Web is often used interchangeably with the
terms WWW and W3. It consists of huge collections of pages containing information,
images, sounds and video clips stored in computers around the world. It is basically
a collection of millions of files stored on thousands of computers which are
connected through the internet. The information provided is regularly updated. Each
page is called Website. The very first page of any web site is known as its Home
page.
A link is any text, image or figure, which when clicked takes us to some other webpage or some other section of the same web page. These links are commonly known
as hyperlink or hypertext links.
Evolution of the World Wide Web:
The Arpanet (Advanced Research Projects Association Network) was born with four
host computers (in the Research Department of the US Department of Defense)
connected to each other. However as time passed the number of computers
connected to the Internet increased. The number soon reached 3, 00,000 in 1990.
And then the number of host, connected to the Internet crossed over 109 millions injust a decade. It was in 1991, that the emergences of e-commerce led the business
to enter the Internet world. The NFSnet was responsible for this major development.
Basic Features:
1. Client and Server: In a client/server scenario, we have a client program,
which interacts with a server program. When talking in context of Web, the
server is called the web server and all the computers connected to the Web
server are the Web clients. A web server is a repository of all the files on the
web. It is the duty of the web server to store, retrieve and manage these files
http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/ -
7/31/2019 CS Print Out
34/48
on the web. All the host computers requesting the web server for these files
are the web clients.
2. HTTP: Hyper Text Transfer protocol is a set of rules that are responsible for
the transmission of web pages- on the web. In other words, it is the standard
language that tells how the client and the web server are going to
communicate with each other. It has been exclusively designed for the World
Wide Web. When a request is made from web client to the web server, the
server uses this protocol to fulfill the request made.
3. URLs: A URL is the address of a resource accessible on the Internet. The
URL contains the name of the protocol required to access the resource, a
domain name a file located on that computer. You can instantly display a web
page if you know its URL. For example, http://www.wileydreamtech.com is a
URL.
4. HTML: Hyper Text Markup language (HTML) is a computer language used to
create web pages. Thus, a web page is an HTML document made up of text
and various HTML tags. It is the browser, who is responsible to transfer the
tags in the HTML document and display the document as a web page.
However, each web browser interprets the HTML tags differently. When a
web browser does not understand a tag or attribute, the information is usually
ignored. The HTML tags tell a Web browser about the structure and
formatting of a web page.
5. XML: Extensible markup Language (XML) WAS DEVELOPED BY THE W3C
to create information formats and share both the format and the information
on the web. It was not supposed to replace HTML, but to extend the power of
HTML by separating data from presentation.
6. Java and Java Script: In java, there are small programs known as applets
that can be sent on the web. Java Script is a scripting language that is an
extension of HTML. Using Java script small programs called scripts can be
embedded in web pages.
7. VB Script: This is a scripting language that `closely resembles Microsofts
Visual Vasic. Like java script, VB script can embed small programs on web.
8. Multimedia: These days all kinds of files graphics, sound, video and
animationare being used over the Web. Technologies such as Shockwave
and Java allow these files to be transferred to your system and played over
there.
WWW Browsers
A browser is a computer program that accesses web pages and displaysthem on the computer screen. It is the basic software that is needed to find, retrieve,
http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.wileydreamtech.com/http://www.wileydreamtech.com/ -
7/31/2019 CS Print Out
35/48
view, and send information over the Internet. In fact, to access the World Wide Web,
the user requires a web browser.
When you open the Internet Explorer browser, the home page of Microsoft will open
by default. If you have the Netscape browser, the home page of Netscape
Incorporation opens in your screen by default.
Browsers are two types:
1. Graphical browsers: It allows retrieval of text, images, audio and
video. Navigation is accomplished by pointing and clicking with a
mouse on highlighted words and graphics. Both Netscape navigator
and internet explorer and Graphical browsers.
2. Text browsers: It provides access to the web in text-only mode.
Navigation is accomplished by highlighting emphasized words on thescreen with the arrow up and down keys, and then pressing the Enter
key to follow the link.
Mosaic
This was the first Web browser and was developed by the National center for
Supercomputing Applications (NCSA) at the University of Illinois at Urbana-
Champaign. It is available for Macintosh, Window and X Windows platforms. This
software is available free on the Internet and can be downloaded from
ftp.ncsa.uiuc.eduby any anonymous FTP.
Netscape Navigator
Netscape Navigator was released in 1994 and is one of the fastest Web
browsers currently available in the market. It is available in different versions for
UNIX, Windows and Macintosh platforms and has built-in the e-mail and
Newsgroups facilities.
Microsoft Internet Explorer
This is based on NCSA Mosaic and is distributed under a licensing agreementwith Spyglass Inc. This is shareware software and can be downloaded from the
Internet. It comes in different versions for various Windows products. We will discuss
Internet Explorer 3.0 in detail.
Web Servers
A web server can be any computer, which stores various web pages andcontains the web server software. The web pages on the server are mostly HTMLdocuments. The web client (i.e. a browser, like Internet Explorer and Netscape)makes a request to the web server.:
ftp://ftp.ncsa.uiuc.edu/ftp://ftp.ncsa.uiuc.edu/ -
7/31/2019 CS Print Out
36/48
Whenever you have to look up a web page, you type that URL into yourbrowser and press return. After a while, no matter where in the words that URL lives,the page appears on computer screen. Your browser forms a connection to a Webserver, requests a page and receives it. If you want to get into a bit more detail, hereare the basic steps that occur being the scenes:
The browser broke the URL you typed into three parts:
1. The protocol (http)
2. The server name (www.mypage.com)
3. The file name (web-server.htm)
The browser communicates with a www.mypage.com to translate the server nameinto an IP Address, which it uses to connect to the server at that IP address onport80. Following the HTTP protocol, the browser sends a request to the server,
asking for the file http://www.mypage.com/web-server.htm. The server then sent theHTML text for the Web page to the browser. The browser read the HTML tags andformatted the page onto your computer screen.
Internet Information Server (IIS): This is a product of Microsoft and runs onWindows NT or Windows 2000. It is the most widely used web server. One of thereasons for its popularity is that it is easy to set up. IIS offers various tools. Thesetools are as follows:
1. Microsoft Transaction Server: It is used for building distributedapplications.
2. Index Server: Index Server is used for indexing and searching web pagesand Microsoft word documents.
3. Site Analyst: The site Analyst carries out the task of site management.
IIS supports a large number of features. Some of the important features are---crash protection, support for active server pages and java, script debuggingand content management. IIS is also being used for providing support forHTTP.
HTTP (Hyper Text Transfer Protocol)
Protocols are the rules that describe how clients and servers communicatewith each other over a network. Hyper Text Transfer Protocol is a protocolused by the WWW. It can be defined as a set of rules that signify how the webpages are transmitted over the web. These include text files, sound files,music files, graphics, etc.
Some of the commands that help in the communication between the browserand the web server are listed below
1. GET: This command initiates the server to retrieve the information locatedat the path specified in the URL.
http://www.mypage.com/http://www.mypage.com/web-server.htm.http://www.mypage.com/http://www.mypage.com/web-server.htm. -
7/31/2019 CS Print Out
37/48
2. HEAD: This command is exactly the same as the GET command. The onlydifference is that unlike the GET command, The server retrieves only thedocument header to the browser. The body of the document is ignored.The HTML document is divided into 2 parts:
The Head and the Body.
3. Post: The post method instead of reading the page, writes the page.However, instead of replacing the existing date, the new date is appendedto it in some generalized sense.
The transaction in HTTP uses the TCP/IP protocol. Given below are thevarious phases which a transaction must undergo:
Connection: This is the first phase of the Transaction cycle. In this phase, aconnection is established between the browser and the web server. Thebrowser requests the server for the connection and the server on receiving
the request establishes a connection.
Request: Once a connection has been established, the client sends a requestto the server, specifying the files it needs to access.
Response: The server searches its database, finds the web pages requestedby the client and sends the results back to the client.
Close: When the server has processed the request made by the client, theconnection is no more needed. The client delivers a request to the server toclose the connection.
Uniform Resource Locator
A Uniform Resource Locator (URL) is the address of a resource accessible onthe Internet. The URL contains the name of the protocol required to accessthe resource, a domain name that identifies a specific computer on theInternet, and a hierarchical description of a file located on that computer.
Example of URL: http://www.yahoo.com
Search Engines
A search engine is a software program that searches a particular piece ofinformation, according to the specified criteria. We all know amount ofinformation available on the Web is huge. Most of us are not even aware ofthe names of the sites available on net. Even if we know the names of a fewsites, The is way a search engines makes a hunt for the specified criteriathrough its own database. In a survey conducted by Neilsen /Net Ratings, itwas found that for the year 2002, the two most popular search engines fornavigating the Web were yahoo and MSN.
Components of the Google search
-
7/31/2019 CS Print Out
38/48
There are three components that work together to provide us with the search results.These arethe Robot, the Database and the Search Form. Let us now have a lookat these components one by one:
1. Robot: Also known as Spider or Bot, this is a program that
automatically navigates the various hypertext structures on the Web. Itmakes a move like a robot spider and retrieves and lists the variousweb pages. The robot works by categorizing the web pages and storinginformation about the web site and the web pages in a database.
2. Database: A database is a repository to store and manage theinformation (here on the web). Oracle, Microsoft SQL Server, IBM DB2are some of the Database Management systems that are used toconfigure and manage the databases. The search engines make a listof the web pages and sites using these databases. Remember thatdifferent sites have different databases. Therefore, the search results
will vary, depending on the database used by a particular site.
3. Search Form: This is an interactive form, which is used by a visitor tomake a request for some information. This mainly consists of a text boxand a submit button. The visitor usually types the topics related to hisor her search and clicks the script, which then searches the databaseusing the criteria specified by the visitor. The result of the search, oftenknown as the result-set is sent by the web server to the browser fordisplay. The sequence in which, the web pages are listed, depends onthe alphabetical order of the sites, amount spent on theiradvertisements by their owners, link popularity etc.
IP ADDRESSING
The task of assigning a network address to your network and a host address to each
of your servers and workstations is known as IP Addressing. An IP address is a four-
part number in which each part represents an eight bit binary number. The four parts
are known as octets or bytes and are separated by periods. The total length of an IP
Address is 32 bits. A simple example of IP Address is listed here under. IP
addresses are assigned and controlled by an organization called Internet Assigned
Numbers Authority (IANA). There are two current versions of IP addressing IPv4 and
IPv6. A part of the IP addresses is known as the network address, or network ID,and the rest of it is known is the host address or host ID.
Example: 192.68.1.15
Subnet Mask
The subnet Mask is used to identify which part of the IP address is the network
address and which part is the host address. The subnet mask is telling the network
that the first eight bits of the corresponding IP address are to used as the network
address. The last 24 bits in this example are to be used as the host address.
Different classes of IP Addressing
-
7/31/2019 CS Print Out
39/48
PUBLIC IP ADDRESSES
A-CLASS: 1.0.0.0 TO 126.255.255.255 Default subnet mask: 255.0.0.0
1 NID- 3HID
B-CLASS: 128.0.0.0 TO 191.255.255.255 Default Subnet Mast: 255.255.0.02NID 2HID
C-CLASS: 192.0.0.0 TO 223.255.255.255 Default Subnet Mask: 255.255.255.0
3NID 1HID
D-CLASS: 224.0.0.0 TO 239.255.255.255 Default Subnet Mask:
255.255.255.255 Multicast
E-CLASS: 240.0.0.0 TO 255.255.255.255 Reserved for Experimental usage
PRIVATE IP ADDRESSES:
A-CLASS: 10.0.0.0 TO 10.255.255.255
B-CLASS: 172.16.0.0 TO 172.31.255.255
C-CLASS: 192.168.0.0 TO 192.168.255.255
Domain
A domain name is one that follows the at sign (@) in an email address, such as
hotmail.com. The domain names have different words, separated by periods thatindicate different levels of organization. The size of the organization increases from
left to right. For Example, the domain indianrail.gov is meant for Indian railways,
which is part of Indian government and comes under its direct jurisdictions.
Domain can be categorized into two broad categories: Three letter top-level
domains and two-letter top level domains.
Three Letter Top-Level Domains
TLD MEANING EXAMPLES
.com Commercial Business, acompany
Hotmail.com
.net Network provider, ISP Usa.net
.gov Government agency Indianrail.gov
.edu Educational Institution Stanford.edu
.org Non-profit institution Redcross.org
.mil U.S. Military Army.mil
.int International Itu.int
Two Letter Top Level Domains: these are country codes
TLD COUNTRY EXAMPLES
-
7/31/2019 CS Print Out
40/48
In India www.drc.in
Us United states Nasdap.us
Uk United Kingdom Bbc.uk
De Germany (Deutschland) Sgi.de
Jp Japan www.nihon-u.ac.jp
Sending and Receiving E-mails using Outlook Express
Outlook Express is a message - or E-mail handling software. This comes along
with the Internet Explorer. The Electronic Mail is sent and received in the form of text
or images to different Internet Users. The Internet Explorer mail and news program,
Outlook express is used to exchange Email messages.
Receiving an Email
1. You will notice a mail button present on the standard toolbar of Internet
Explorer
2. Then click the left mouse button on the mail button.
3. Inside the pull down menu click on the read mail option
4. Immediately a Microsoft outlook express logo appears on the screen for a few
seconds.
5. Now to view all the Emails you have received, move the mouse pointer over
the inbox option inside the Folders box and click the left mouse button.
6. If you wish to read the contents of a particular mail, in our case a mail that has
come from Microsoft Outlook Express, Just move the Mouse-Pointer to it and
double-click the left mouse button.
Replying to and Email using Outlook Express
1. Click on the particular mail which has to be replied to.
2. Now click on the reply button.
3. Type the message in the mail.
4. Now send the mail to To Email address.
Sending an Email using Outlook express
1. Click on the new mail button present on the standard toolbar.
2. Inside the pull down menu click on the any letter option, Instantly a new
message box gets displayed on the screen.
3. Now type the Email address of the person to whom you wish to send a
message.
http://www.drc.in/http://www.drc.in/ -
7/31/2019 CS Print Out
41/48
4. Then press the tab key two times to move the cursor in the box beside the
Subject option.
5. Next, type a brief description for the subject of Email.
6. Then pres s tab key from the keyboard to move the cursor into the typingarea.
7. Now type the message in the mail.
8. When you are ready to send your message, click on the send button.
9. Click on the Outbox option present inside the Outlook window. Instantly all the
mails present inside the outbox get displayed.
HOW TO CREATE EMAIL ID:
1. Connect your computer to the Internet.2. Step 2Open a Web browser and type in the Web address of the company with whichyou want to get an email ID. Yahoo is free and very easy to set up3. Step 3Click on "Sign up." On the Yahoo page this says "Don't have a Yahoo ID?" aboveit.4. Step 4Fill out your personal information. This includes your name, date of birth, genderand country. Most companies do not ask for your specific address.
5. Step 5Get out a pen and paper and