CS Print Out

download CS Print Out

of 48

Transcript of CS Print Out

  • 7/31/2019 CS Print Out

    1/48

    HARDWARE TROUBLESHOOTING

    UNDERSTANDING THE SYSTEM BEEP CODES

    Beep codes

    The bio performs a POST when the system is turned on. This test is used to ensure

    that the system is functioning properly and to gather information about what the

    system contains. When a problem is identified with the system during the post, the

    bios will normally produce an error message. However, in some cases the problem is

    detected so early in the test that the bios cannot even access the video card to print

    the message! The three most popular types of bios are those made by (AMI,

    AWARD, and PHOENIX). The Phoenix company bios is famous for its complicated

    beep patterns that are actually in up to four groups one or more beeps and then a

    pause, followed by as three more patterns.

    Common Beep Codes

    Beeps Probable Causes

    One short beep Normal startup

    One long beep Keyboard error

    One short, one long beep Monitor problem

    Two short beeps The POST numeric code appears on the

    monitorRepeating short beeps or a continuousbeep

    Power problem

    One long, one short beep System board problem

    One long, two or three short beeps Monitor/Display error

    One beep, followed by three,Four or five beeps

    System board problems, possibly withDMA,CMOS setup chip, timer, or system bus

    Two beeps, followed by three, Four orfive beeps

    First 64K of RAM has errors

    Three beeps, followed by three, Four orfive beeps

    Keyboard controller or video controllerfailed

    Four beeps, followed by two, Three orfour beeps

    Serial or parallel port, system timer, ortime of day problem

  • 7/31/2019 CS Print Out

    2/48

    WINDOWS DEVICE MANAGER

    What is Device Manger?

    Device Manager provides you with a graphical view of the hardware that is installed

    on your computer. You can use Device Manager to update the drivers (or software)for hardware devices, modify hardware settings, and troubleshoot problems.

    The windows device manager made its debut in Windows 95, took a brief leave ofabsence in Windows NT 4.0 and has been in every subsequent release of windowssince then. It can be accessed by following these simple steps.

    1. Right click on My Computers2. Select Properties3. Click the General tab.4. Click the Device manager button.

    In windows XP1. Right click on My computers2. Select Properties3. Click Hardware tab4. Click device manager button

    Here are some of the tasks you can perform using the Device manager.

    Check the current status of hardware. Look for symbols next to a particular

    device to see if there are problems with it. Configure device properties and settings

    Uninstall and reinstall hardware

    Update, views and roll back device drivers.

    COMMON PROBLEMS IN HARDWARE

    General Hardware Troubleshooting Tips

    Regardless of the problem there are a few steps that must be taken whenevertroubleshooting a hardware problem. These may seem rather insulting to mostpeople, but one must never forget to do them; if they are not done you might verywell waste allot of time and possibly create a new problem from fiddling around inyour computer chasing down a phantom. Here are some quick steps:

    1. Power Cords - Make sure that all of the power cords are firmly in place on allof the devices that could possibly be causing or attributing to the symptomsyou are experiencing . Then trace the cords back to the wall and make surethat the other end of the cord is attached to a power outlet or surge protector.

    2. Outlet Power- It is not uncommon to blow a fuse; if the outlet in question isnot receiving power than you should not expect any of the devices connected

    to the computer to receive power. You can test this simply by looking at thedevice and seeing if any LEDs (Light Emitting Diodes) are lit.

  • 7/31/2019 CS Print Out

    3/48

    3. Power Button - This step goes hand-in-hand with the last step. Also, somedevices have two power switches on them, and both must be in the "on"position in order for the device to work (i.e. there is a power button both on thefront, and on the back of most computers).

    4. Communication Connections - Once you've settled that the power to your

    devices is fine, the next step is to make sure that the device has all of theconnections needed for it to communicate. This step consists of making surethat these cables are firmly connected at each end, and that they areconnected at the correct port/interface. Do not forget to check internalconnections; if your computer has been bumped it is possible for someconnections inside to pop loose.

    5. Device Configuration - This steps provides both hardware and softwareconfiguration. There may be jumpers or switches on the hardware that needto be configured. If these accidentally got moved or switched the device wouldfail to work properly.

    6. Follow Instructions - Computers are not evasive when they report errors; all

    too often we just do not understand them.Many times there are suggestionson how to fix a problem accompanied with an error message. Simply followthe steps the message suggests; even if the suggestion seems to beridiculous follow it so that you can discard it as a possibility.

    7. Windows Recognition - If you go into the Control Panel, open the Systemdialog, click on the Hardware tab, and then open the Device Manager, you willsee a tree-like structure of all of the hardware that is attached to yourcomputer. The dialog that opens will inform you if the operating system ishaving any know troubles with the device.

    8. Update Drivers - If possible, try connecting to the internet and going to themanufacture's web site to download the latest drivers for your hardware (thisrequires that you now the model specifications of your hardware).

    9. Refresh Device Manager/Reinstall Device - This step falls into the "I don'tcare what the problem is, I just want it fixed" category. Open the devicemanager again and delete the devices that are not working properly. You willprobably be prompted to restart your computer, if not restart it manually.When the computer restarts the hardware you deleted will be detected againand be reinstalled with the default configurations. If you cannot find the devicein the device manager try to uninstall all software that came with it and

    What are the common causes of hardware Failure?

    AGE: Nothing lasts forever. This holds especially true for technology. Age hasmultiple effects on devices. Some break because they get old, others becomeobsolete. Most manufactures establish a life expectancy for their devices anywherefrom one year to five years. Hardware also ages quickly because of cost factors.Faulty Development: Here problems range from out-of-box failures to poorly andcheaply designed, second-rate devices. Cheap, second-rate devices not only break

    easier than more reliable, common devices.

  • 7/31/2019 CS Print Out

    4/48

    Incompatible devices: Just because a piece of hardware works in one computerdoesnt mean it will work in another one. Be sure to read all system requirementswhen buying new hardware and make sure that your existing equipment iscompatible.Damage: For some reason, most things on this planet dont like to be bumped,

    kicked, dropped, stomped, cut and scratched. This is especially true for tech devices.Tech devices are extremely intricate, containing millions of microscopic transistors,tons of interconnected working parts, and complex power management features.

    You're having a problem with your PC. No matter what the problem, the firststep is always to reboot your computer: There are a number of ways to reboot(restart) your computer.

    If in Windows and the system is not frozen, click start, click shut down, click

    restart.

    If in Windows and the system is frozen, on your keyboard, hold down ctrl, alt,and delete all at the same time. In Windows operating systems prior to

    Windows XP, press ctrl, alt, and delete a second time. In Windows XP, if

    possible, click Shut down.

    If these methods are unsuccessful or not viable, you may reboot manually. On

    some systems, there is a reboot button located on the front of the PC. This is

    a very small button, usually located beneath the power button. If there is no

    reboot button or if the reboot button does not respond, press the main power

    button and keep it held in for about five seconds. The PC should shut off

    automatically.

    Once it does, boot the machine.

    The last resort is to unplug the power on the back of the PC. Wait a moment,

    then plug it back in and try to reboot.

    Once a computer has been restarted, if it does not work normally you should follow

    the basic troubleshooting procedures listed below

    MONITOR

    Screen is dark or tinted

    If the monitor screen is too dark or if the entirety of the screen is tinted, first trychanging the display.1. Right click anywhere on the blank desktop.2. Click Properties.3. Click Settings.4. Under Color Quality, try changing the settings.If this does not work, try changing the settings on your monitor. The brightness menubuttons are located below the screen on most monitors. Try making the screenlighter or darker. If this still does not work, the problem may be with either yourmonitor or the video card located inside the PC. If another monitor is available, tryhooking it up to your PC. If there are still problems, the video card is to blame and

    must be replaced. If the problems are resolved, the monitor will need to be replaced.

  • 7/31/2019 CS Print Out

    5/48

    DISPLAYIf only a portion of your screen is tinted or warped in any way, the problem needs notroubleshooting asyour monitor's tube is going out. The monitor will need to be replaced.

    Screen is Fuzzy1. Remove any electronic devices such as fans or electric pencil sharpeners

    from the proximity of the monitor.2. Ensure the monitor is plugged tightly to the computer.

    Monitor Not Responding (No Power)1. Ensure all power sources are plugged in and turned on. Check the power cord

    going from the back of the monitor to the power strip and the power cordgoing from the power strip to the wall.

    2. Make sure the power strip is turned on.3. Try plugging the monitor directly into the wall. If the monitor then works, the

    power strip has gone bad and will need to be replaced. If not, the monitor

    must be replaced.

    Error on Monitor Reading "No Signal"This error means that the monitor is not plugged in to the PC. Double check thecable and make sure theCable going from the monitor to the PC is plugged in and is in the appropriate place.

    KEYBOARD

    Computer Does Not Recognize Keystrokes

    If the keyboard does not work at all:

    1. Check the back of the PC to make sure the keyboard is correctly connected.

    Remove the cable and reconnect it, then reboot your PC.

    2. If the problem persists, you will need a new keyboard.

    If only some of the keys work:

    1. Run your hand firmly over the keys to ensure none of the keys are stuck.

    2. Follow the steps listed above.

    The keyboard beeps when any of the keys are pressed:1. Check to see if anything is resting on the keys and remove that object.

    2. Follow the steps listed at the top of this page.

    Keys on Keyboard Move Stiffly/Not At All

    The keyboard is probably dirty. Lift the keyboard up, turn it over, and firmly tap to

    remove any excess

    Material that may resting beneath the keys. Then, using a can of compressed air,

    clean out the keyboard as best you can. If the problem persists, the keyboard may

    need to be replaced. This is a common problem that can be easily avoided. Please

    do not consume any food or beverages over the keyboard and keep these things out

    of "spilling distance." Loose make-up should not be applied over the keyboard.

    MOUSE

  • 7/31/2019 CS Print Out

    6/48

    Cannot Move Mouse CursorCheck the cable going from the mouse to the back of the PC to make sure it isconnected appropriately.Remove then reconnect the mouse and reboot the computer. If the mouse is still not

    recognized, try another mouse in its place.

    Mouse Cursor Difficult to MoveIf the mouse is physically difficult to move, either the mouse pad has worn and needsto be replaced or the mouse itself needs to be cleaned.To clean the mouse:

    1. Turn the mouse over so that you can see the bottom2. Remove the plastic holder covering the ball by twisting it clockwise until it

    comes off.3. Remove the ball.4. Cleanse the inner rollers with a cotton swab dipped in alcohol. You may also

    scrape off any accumulated lint if no alcohol or swabs are available.

    FLOPPY DRIVES

    Error Reading Floppy DisksMore and more often, floppy disks and floppy drives are being phased out of thecomputing world. The reasons are 1) floppy disks do not have the necessary room to

    store large documents, and 2) floppy disks are unreliable.There are many errors associated with floppy disks. An error message may accusethe floppy disk of having no content, of needing to be formatted, or of having acorrupt or partial file. In most of these cases, there is little that can be done to saveor restore the data on the disk. One option:1. Go to My Computer and double click.2. Right click Floppy A3. Click scan for viruses.

    What should I do if my computer wont boot?

    Make sure your power is working: Check your power cord is plugged inproperly. Check your wall sockets and check the PC power supply. Checkyour power on light of your system.

    Try turning the power switch on and off on your computer a few minutes.

    Make sure your monitor is power on.

    Make sure your computer runs the POST. Look for any sort of output on yourscreen and a single beep.

    Unplug everything that plugs into your computer on the outside with theexception of the power cord. Try booting it up while listening for any beeps,still its not responding then remove the computer side cover and remove theram, processor, video card all PCI cards and driver cables.

    Make sure that your hard drive is working correctly. Check the hard disk.What should I do if my hard drive is having problems?

  • 7/31/2019 CS Print Out

    7/48

    Check the hard disk connectivity in bios. Check the hard disk power supplyand bus cable.

    The results of these tests will give you a good indication of whether your harddrive is any good.

    Run the CHECKDISK utility to scan and repair any errors. You can run thisutility from windows.

    How can I help prevent hard drive failure?

    Proper Ventilation: Keep your devices vents open and clear from debris.Properly cooling your devices internal components is paramount.

    Physical impact: Dont drop your device or subject it to severe shock. This cancause damage to the drivers platters and reading heads.

    Voltage: Use a protector or UPS. This will prevent any voltage spikes or drops

    from damaging your computer. RAID: Purchase and install drive mirroring hardware. Basically this is a card

    you install in your pc.

    Why wont my monitor turn on?

    Make sure the monitor is actually turned on. Is the power light on?

    Check the power cord of monitor. Some computers have an on-board videocard and a third party video card. Make sure your monitor is connected rightconnector on the desktop or laptop.

    Check to make sure that the connector pins arent bent or broken.

    Make sure you have power. Verify the monitor is plugged into a power source.If it is plugged into a power strip or UPS, make sure that power strip or UPS ispower on.

    Check the monitor power switch on.

    Make sure the power button is working perfectly.

    Try to replace the card.

    Get help of monitor manufactures or computer tech supporters.

    Why does My Monitor Make Noise?

    CRT monitors traditionally make noise when turned on or when the resolution /refresh rate is changed. This noise is usually a buzzing or clicking sound. The noise

    is caused by the voltage changes that occur. They are perfectly normal. If your

    monitor is making noise even when you do not change resolution /refresh rates, this

    may indicate a hardware problem and you should have your monitor serviced.

    What should I do if My Device Cant Read or Write to a CD/DVD?

    First check your Drive, Is it CD drive or DVD drive.

    Check your inserted disk CD/DVD.

  • 7/31/2019 CS Print Out

    8/48

    Older CD & DVD players may not be able to read recordable media. Evennewer players may not be able to. Consult your owners manual for moreinformation.

    Insert a disc into the drive and see if any LEDs light up on the drive. Inaddition check to see if the ejects mechanism works properly. If no lights are

    visible on the front of the drive, check the power connection on the drive. A dirty laser lens can cause the drive to have difficulty reading the disc.

    Is your computer mounted sideways? Most drives have catches to allowsideways mounting, but they do not always work.

    What can I do if my Floppy drive wont work?

    Your floppy drive LED should blink when you are booting your machine. If itdoesnt, you should check to make sure it is plugged into the power supply.

    Make sure the drive is being detected by the BIOS.

    Check your floppy disk, and change it.

    What should I do if My computer Keeps shutting Off?

    Make sure that you have a good constant flow of power to your PC.

    Make sure your power supply is providing enough current to feed thecomputer and all of its accessories.

    Check any recent hardwares installed.

    Install all windows critical updates.

    Check your bios configurations.

    Install or Repair the Operating System.

    What should I do if My Desktop computer has NO Sound?

    Make sure your speakers are on.

    Verify the Speaker are connected to power and switched on.

    Pump up the volume.

    Verify the volume is turned up and not muted.

    Make sure the speakers are connected to the proper outlet jack.

    PINK OR RED MICROPHONE

    INPUTGREEN LINE OUTPUT

    LIGHT BLUE LINE INPUT

    If you hear crackling from the computer speaker, the cables and connectorsare loose or need replacement.

    Open device manager check the status of the sound card.

  • 7/31/2019 CS Print Out

    9/48

    CHECK LIST TO IDENTIFY THE DEFECT IN COMPUTER

    OPTIMIZING PERFORMANCE

    Optimizing Windows is the process of fine-tuning its performance. Both Windows XPand Windows 2000 include some utilities that help optimize the OS performance. Inthis section, we will discuss how the OS can be fine-tuned for optimum performanceVirtual memory.Windows operating systems use virtual memory to temporarily store data when it isrunning out of the physical memory (RAM) in the computer. This data is stored in afile on the hard disk (which is known as swap file or paging file). For most Windowsinstallations, the OS automatically manages the size of the paging file. You canmanually increase or decrease the size of this file or split the file across multiple harddisks depending on your requirements. If you feel that the system performance ispoor, you can increase the size of this file or divide the file into multiple disks. The

    following steps explain how you canchange the virtual memory settings in Windows XP:

    1. Click Start Control Panel System.2. Click the Advanced tab.3. Click the Settings button in the Performance area.4. Click Advanced.5. Click Change in the Virtual Memory area.6. Enter the Initial size and Maximum size and click Set.7. Close all windows.

    DEFRAGMENTING HARD DISKS.

    Defragmenting hard disks helps improve their read/write performance. Hard disks

    become fragmented when some applications are installed or after a large number of

    files are moved or deleted. Fragmentation refers to the state of a hard disk when it

    no longer has contiguous space available

    to store new files or folders. The Disk Defragmenter utility can analyze hard disks

    and defragment them to free up contiguous space. Disk Defragmenter works on

    FAT, FAT32, and NTFS volumes.

    There are several ways to access the Disk Defragmenter:

    Click Start All Programs Accessories System Tools Disk Defragmenter.

    Open Windows Explorer; open the properties of disk or volume. Select the

    Tools tab. Click Defragment

    Temporary files: The Disk Cleanup utility in Windows XP is used to free up disk

    space by deleting temporary files and folders from the disk or volume. This utility can

    be accessed from Windows Explorer or from the System Tools folder under

    Accessories in the All Programs menu. Disk Cleanup essentially gives you options to

    delete several types of files. These files include:

    Program files downloaded from the Internet, including ActiveX controls andJava Applets.

  • 7/31/2019 CS Print Out

    10/48

    Temporary Internet files to clear the computer cache. These files are stored in

    the Temporary Internet Files Folder.

    Temporary Files located in the Temp folder.

    Files stored in the Recycle Bin.

    MSCONFIG: The msconfig.exe is a command-line tool that eventually opens a GUIcalled the System Configuration utility. This utility displays the current systemconfiguration and allows you to safely change system settings. The settings that youcan change include the following: System startup options for diagnosing startup problems. Advanced boot options to start the system in a selected diagnostic mode.

  • 7/31/2019 CS Print Out

    11/48

    SOFTWARE TROUBLESHOOTING

    SOFTWARE

    Computer hardware such as the MOBO CPU, ADAPTER CARDS, DISPLAYDEVICE AND I/O DEVICES, are only a part of the entire computer system. To makethis hardware work we need software that acts as interface between human beingsand the hardware.

    Software can be classified into 3 major categories as follows.

    1. Operating systems: The piece of software is responsible for controlling a PCand other devices. It manages memory, printing, networking, those silly smileyfaces you send using AIM, disk drivers, and a myriad of other things. You seethe hardware through the operating system.

    2. BIOS: BIOS stands for basic input/output system. Its what a device uses untilit loads the operating system. Most of you have seen the black and whitescreens that scroll past as you boot up your computer. That is the BIOs hardat work, waiting for the operating system to grab the baton.

    3. Drivers: Drivers are a type of software that allows the operating system tocommunicate with hardware. Every single piece of hardware inside of and

    connected to you PC needs a driver or it will not work.4. Applications: Applications is the software program that takes commands

    from the user for a specific task, executes them and produces the results.

    Type of Software Installations

    When software is installed, the installer may add, modify, or delete files,registry entries, or even text within files. There are many different types of softwareinstallation packages:

    Single executable installation: This is probably what comes to mind when you

    think of software installations. It consists of a single, compressed file that includes allof the instructions that are needed to install the program.

    Web-based installation: This type of installation has become very popular inrecent years, most likely because of the proliferation of broadband internet access.

    Media based installation: This type of installation places all of the necessaryfiles on a span of discs. Also included is an executable file that knows where to copythe files and what changes to make to the system.

    Windows installer: Windows installer was introduced with Windows 2000. It caninstall, repair, and remove software using instructions that are provided in MSI files.

  • 7/31/2019 CS Print Out

    12/48

  • 7/31/2019 CS Print Out

    13/48

    Types of Operating Systems

    An operating system of any kind is one of the biggest software applications around

    (some with over 45 million lines of code). The operating system is what peopleinteract with and the environment on which other programs run. Operating system allfall into one or more of the following categories:

    GUI: The graphical user interface operating system is what most of you will befamiliar with. It consists of graphics and icons that are manipulated using a mouse orother input device.Multiprocessing: These operating systems are designed to use more than oneprocessor. Once only a privilege of supercomputers, you can now find thesepowerful operating systems running servers in a doctors office.

    Multiuser: The multiuser operating system allows many people to use it all at onceor at different times.

    Multitasking: A multitasking operating system can run multiple programs at the sametime.

    Multithreading: A multithreading operating system allows different parts of softwareto be run concurrently.

    Troubleshooting Techniques

    In order to troubleshoot problems related to the operating system, you mustunderstand the Windows boot sequence, the advanced boot options available, andbasic diagnostic procedures. Additionally, you must have good knowledge of usingbuilt-in troubleshooting utilities. Familiarity with different types of error messages andcommon operational problems will help you resolve problems easily and quickly.

    Understanding boot sequence:The following discussion explains the boot sequence in both Windows XP andWindows 2000:

    Pre-boot Sequence. When the computer is started, it performs a pre-bootsequence in the following manner:1. A POST is performed to check the hardware components, which include

    Physical memory (RAM), video, and the keyboard. In case the computer BIOSsupports Plug and Play (PnP), the configuration of PnP-compatible hardwaredevices is performed.

    2. The Master Boot Record (MBR) is loaded from the selected boot device. TheMBR in turn loads the NTLDR file from the boot device. In case the computerhas a Small Computer System Interface (SCSI) device as the boot devicewithout its own BIOS, the NTBOOTDD.SYS file is loaded.

    Boot sequence. NTLDR takes charge of the process from here on and performsthe following steps:

  • 7/31/2019 CS Print Out

    14/48

    1. NTLDR switches the processor to 32-bit flat memory mode and loads the filesystems driver to access the FAT, FAT32, or NTFS partitions.

    2. NTLDR reads the BOOT.INI file and selects an operating system. If multipleoperating systems are installed on the computer, the BOOT.INI file prompts

    the user to select an operating system. If the MS-DOS operating system isselected, NTLDR loads the boot sector from the BOOTSECT.DOS file.

    3. NTLDR calls on the NTDETECT.COM file to perform hardware detection,which displays error messages if any hardware problems exist. If thecomputer has more than one hardware profile, the user is given a choice toselect an appropriate profile.

    UNDERSTANDING THE ADVANCED BOOT OPTIONS

    Some of the Windows startup problems can be resolved using the Advanced Boot

    Options during the startup phase. The most commonly used advanced optionsinclude Safe Mode, Last Known Good Configuration and Recovery Console. WhenWindows fails to complete the boot process, you can access any of these options bypressing the F8 key immediately after the POST is complete.

    Safe ModeIn the Safe Mode, Windows XP loads with minimum basic system services anddevice drivers sufficient to boot the operating system. These components include thekeyboard, mouse, hard disks, the VGA monitor, and other most essential systemservices. Safe Mode provides access to all system and deviceConfiguration options so that you can enable or disable components one by one andtry to pinpoint the problem.

    Safe Mode with NetworkingSafe Mode with Networking is similar to Safe Mode except that networking devices,drivers, and services are also initialized.Safe Mode with Command PromptSafe Mode with Command Prompt loads the command interpreter, just like in MS-DOS, instead of the GUI.Last Known Good ConfigurationThe Last Known Good Configuration option loads the last used system configuration

    that allows you to return the system to the previous working configuration. Windowssaves two types of configurations in the Registry: Default and Last Known Good. TheDefault configuration is saved to the registry when you shut down the system.Enable Boot LoggingThis mode enables the boot logging option that stores the boot process informationin a file named NTBTLOG.TXT. This file is stored in the /WINNT directory and ishelpful is diagnosing startup problems.Enable VGA ModeThis mode loads Windows with basic VGA device drivers and other normalconfiguration. This mode is helpful in diagnosing problems with the display driver.

    System Restore (Windows XP)

  • 7/31/2019 CS Print Out

    15/48

    The System Restore in Windows XP helps restore the system to a working stateafter you make changes to the system settings or install applications that make itunstable. It uses system restore points to store a snapshot of system settings atregular intervals. When you run the System Restore, a calendar is displayed in whichyou can pick a particular System Restore point. The System Restore can be

    accessed in one of the following methods:

    1. Open the Help and Support Center, located in the Start menu. Under Pick aTask, click Undo Changes to Your Computer Using System Restore.

    2. Click Start All Programs Accessories System Tools System Restore.

    You can also create System Restore points manually when you expect to makechanges to your system. The following steps explain how you can create a SystemRestore point:

    1. Click Start All Programs Accessories System Tools System Restore.

    2. Click Create A Restore Point. Click Next.3. Type a name to identify the restore point in the Restore Point Description box.4. Click Create.

    Common error messagesThe following sections cover some more common error messages that you are likelyto encounter:

    Missing NTLDRThe NTLDR is missing error is accompanied by a Press Any Key to Restartmessage. This error is caused if any of the system startup files are missing or havebecome corrupt. The files that can cause this error include NTLDR,NTDETECT.COM, and BOOT.INI. You can restore these files by using the RecoveryConsole, an Emergency Repair Disk (ERD in Windows 2000), or by using the setupCD-ROM and selecting the Repair option when the installation starts. You can alsorestore these files using a system restore utility in Windows XP.

    Invalid Boot DiskThis error is displayed when the system BIOS cannot access the disk partition that issupposed to contain system startup files. You might have to reinstall the OS toaddress this problem.

    Operating System Not FoundThis error means that the BIOS cannot find an operating system on the configuredboot partition or boot device. This error is common in new computers that do have aboot partition configured in the BIOS and on which no OS has been installed so far.

    Inaccessible Boot DeviceThis error is displayed when the computer finds a critical error with a boot device.This can be due to a malfunctioning device driver or to some resource conflicts.

    What are the common causes of software failure?

    The worst kind of software failure you can have is when your computer refuses to

  • 7/31/2019 CS Print Out

    16/48

    start up because your operating system (windows) refuses to work. The other type offailure you might experience is that an application refuses to run. Both of these typesof failures can really stop you tracks and ruin your day. Here are some of thecommon causes of software failure should put on the top of your troubleshooting list:Registry problems: The good news with windows is that it has a built in database

    and control system to keep track of all the software and critical information that liveson your PC. This feature is called the Registry. When the Registry has a bad hairday. Your pc might not start up or an important program installed on your pc mightnot work.Improper Installation: Software can be really fussy. If it isnt installed just right itmight not ever run at all or it might run inconsistently.A recent software installation: It might seem that just out of the blue youroperating system or an important application starts acting up. This problem willoccurs because youve recently done something such as install some new software,a new hardware device like a printer, or attacking virus.Expired Software: Many programs that users install on their PCs are often

    downloaded from the Internet. Many are trail versions. Subscription based softwaremay continue to work after it expires but not fully.Viruses: Viruses can create havoc on a PC because of the importance of viruses,weve devoted an entire chapter to them.Poorly written code: Software developers tell you, their products are flawed. Theyare riddled with code flaws, bugs and security holes.

    SOFTWARE PROBLEMS

    What should I do if my operating system will not start?

    Investigate all of hardware failure problems: You might just get lucky and discoverthe problem is due to a faulty power cord.

    Try to return your system to an earlier state: This solution will work only of yourcomputer is still booting up and you are using Windows Xp. If you installed somenew software or hardware drivers recently. You can then use the Windows systemRestore feature to restore your computer without losing any of your personal data.Use the windows Setup CD that came with your PC: This is another importantsolution that can be used if you are running Windows XP. Windows XP setup CDprovides a repair option that can fix startup problems, problem with system files and

    more. With this software we can repair and recover the OS.Try to fix a Registry boot problem: Your computer may be suffering from having acorrupted registry. This is a problem that we fix with reinstall Windows.Use the windows upgrade feature: This is another nice trick you can try if you arerunning windows XP. Insert the Bootable CD, boot from it and run theInstall/Upgrade option. This option will install windows XP, but it will treat theinstallation as an upgrade and therefore it will be repair and install programs.Perform a clean install of Windows: If youve tried everything else and you stillcant get you PC to boot, youll need to use your windows setup CD and performclean install.

    What can I do if my computer boots really slowly?

  • 7/31/2019 CS Print Out

    17/48

    Remove some of the programs that get loaded when windows startup using withMSCONFIGClean the Registry using a commercial registry cleaning utility.Check your antivirus software and scan the entire system. If the virus is thereremove it.

    What should I do if I cant run an application?Application shortcut: Check the shortcut of application and make sure the shortcutis pointing the correct executable file.Software Expiration: The software will typically run for a year or so and then expire.If you have a program that suddenly stops working, make sure you check to see thatthe software hasnt expired.Administrative privileges: Some applications will not run unless you haveadministrative privileges on the computer you are running it on. You must take theadministrative permissions to access the applications.Repair: Some programs allow you to repair an installation by running a special

    utility. Reinstall the application and access it.DLLs: (Dynamic Link Libraries) these files are that application share to providefamiliar functionality. When youre opening an application it displays some DLL filemissing. This can make programs that are dependent upon them not work properly.Contact your software manufacture if you suspect DLL problems.

    What should I do before installing software?

    Check the Compatibility of your PC.Reboot the PC to clear memory errorsBefore installing the application you have to delete the temporary files in the TEMPFolder.Before installing the application make sure you have administrative privileges on thecomputer.Do not open the applications or files when youre installing applications.Turn of you screen saver because it may also cause you to cancel yourinadvertently.When youre installing application on laptop check battery power status.When application installing is processing keep your kids away from the keyboard.

    How do I start a Software Install?

    Auto run: This method involves putting a CD-ROM in your device and closing it.Your drive will blink and make whirling noises signifying that it is reading data off ofthe disc. You should shortly see a splash screen for the program you are installing.Executable file: Executable files are another way to start an installation. They aretypically named setup.exe, update.exe, or a host of other names.Archive: Some programs are archived inside of another file such as a ZIP file. In acase, you should extract the contents of the archive to a normal folder and then runthe install program.

    What should I do if I cant find a program after installing it?

    Start Menu: This should be the first place you look. Just click start in the lower left

  • 7/31/2019 CS Print Out

    18/48

    hand corner.Program File folder: Most window applications install under this main folder. Youcan find the folder by double-clicking my computer and then Local disk (C :). You willsee a folder named Program files.Root of your hard disk: Some software will create a folder on the root of your C:

    drive.On a different partition or hard drive: If you have multiple partitions or multiple driversthe software may have been inadvertently installed there.

    Why cant I install/Uninstall Software?Microsoft created different levels of permissions in order to accomplish this:Are you an administrator? To install software you need to be a member of theAdministrators or Power Users group.Are you in Terminal Services? Terminal services are a technology that allowsmultiple people to log into a server and access a Windows Desktop.Are you logged on as administrator? Some programs require that you are actually

    logged on as the administrator account.

    What can I do if my software install fails?

    Reboot and retryCheck the event log: The event log keeps a history of errors and warnings that aregenerated by the software and hardware installed on your computer.Check the install log: During most software installs, a record is kept of all of actionsand error messages that were generated during the installation. It can be found inroot of your C: drive and is usually named install.logMake sure your system is up-to-date or notClear you temp file folderDisable you antivirus program: Disabling the real-time scanning of your antivirussoftware may help in installing stubborn software.Install the software using safe mode booting.

    How can I uninstall software?

    Use the Add/Remove Programs feature: Add/Remove programs can be found inwindows control panel. This method is the preferred method of uninstalling softwareon the windows operating system.

    Use the program files menu: Find the program in the program files menu.Click startSelect all programsFind the program you want to uninstallClick the uninstall option.Use an uninstall file: These files can usually be found in the softwares folder in theprogram files folder.Contact the software company

    What can I do if my uninstall fails?

    Reboot the PCClear your system temporary files in the TEMP folder. Click start- select run- type

  • 7/31/2019 CS Print Out

    19/48

    %TEMP%Use safe mode BootingContact the software company.

    How can I Update Windows?

    You have two options can manually update or use automatic updates.Click start- then RUN, type in wupdmgr.exe and click okClick start and then click windows updateGo to HYPERLINK "http://windowsupdate.microsoft.com"http://windowsupdate.microsoft.com

    Updates come in several different types:Critical Update: These are important security updates that Microsoft releases inresponse to vulnerabilities in its Windows operating Systems.Recommended Updates: These consist of regularly released updates to windows,

    Internet Explorer and other Microsoft products.Windows Tools: These are utilities and other tools offered by Microsoft for use bysystem administrators.Internet and Multimedia Updates: These are the latest versions of InternetExplorer, windows Media Player, and other Microsoft Software.Additional Windows Downloads: These are miscellaneous updates for desktopsettings and other Windows features.Click Review and install updates and select the ones you want to install.

    How can I install updated drivers?It can be done from the Device manager using the Hardware Update Wizard.Open the Device MangerRight Clicking My computerClick propertiesSelecting the hardware tabClick Device manager

    If its and INF file, you can right click on it and choose install. INF files contain all ofthe necessary information to install a driver for a particular piece of hardware.Most drivers come packaged into an installer program.

    What is a device driver?A software routine that links device to the OS. It acts like a translator between adevice and the OS.

    Device drivers

    Device drivers are system programs, which are responsible for proper

    functioning of devices. Every device, whether it is a printer, monitor, mouse or

    keyboard, has a driver program associated with it for its proper functioning.

    Whenever a new device is added to the computer system, a new device driver

    must be installed before the device is used. In modern operating systems, mosthardware drivers, such as the keyboard driver, come with the operating system.

  • 7/31/2019 CS Print Out

    20/48

    A driver acts like a translator between the device and program (typically, an

    operating system) that uses the device. For example, when a user prints a

    document, the processor issues a set of genetic commands to the printer driver,

    and the driver translates those commands into the specialized instructions that

    the printer understands. Note that each device has its own set of specializedcommands that only its driver understands. A device driver is not an

    independent program; it assists and is assisted by the operating system for the

    proper functioning of the device.

    How can I Rollback a Driver?You will still be able to revert to the last driver that was installed. Follow these simpleinstructions:Open Device Manger, You should be an expert in this by now.Right click the device in question

    Click PropertiesClick the Driver tabClicks roll back Drivers.

    Windows Optional Components

    IIS: Internet Information Services (IIS) allows you to run a website from yourcomputer. Although this may be overkill for the majority of the readers of this book, itmay prove useful in some situations, such as in a small to medium office. You canshare information with co-workers using an internet website.FAX Services: Windows Fax services allow you to send and receive faxes via your

    PC without the use of third-party software such as WINFAX.

    To Install Windows Optional ComponentsOpen the Windows Control Panel.Double-Click Add or Remove ProgramsClick Add/Remove Windows componentsCheck off any Components you want to install and Click next.

    How can I Prevent My Self from Deleting Critical System Files?Right click startClick ExploreClick Tools in the upper MenuClick Folder OptionsCheck Hide protected operating system filesCheck Do not show hidden files and foldersUncheck Display the contents of system foldersClick OK.

  • 7/31/2019 CS Print Out

    21/48

    COMPUTER VIRUS/ANTIVIRUS

    Computer Virus

    A virus is a piece of programming code usually disguised as something else that

    causes some unexpected and usually undesirable event. A virus is often designed

    so that it is automatically spread to other computers. Viruses can be transmitted as

    attachments to and e-mail, as downloads, or be present ona diskette of CD. It must

    be remembered that a computer virus does not spread on its own, rather it requires

    some carrier to transport it from one place to another.

    Categories of Computer Viruses

    The three broad categories of viruses are as follows:

    File Infectors

    System Infectors

    Macro Viruses

    1. File Infectors: Some file infector viruses attach themselves to program files

    while some can infect any program for which execution is requested. When

    the program is loaded, the virus is loaded as well. Other file infector viruses

    arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.

    2. System infectors: These viruses infect executable code found in certain

    system areas on a disk. They attach to the DOS boot sector on diskettes or

    the Master Boot record on hard disks. A typical scenario is to receive a

    diskette from an innocent source that can be read without triggering the boot

    disk virus. However, if you leave the diskette in the drive, and then turn the

    computer off or reload the operating system, the computer will look first in

    youre A drive, find the diskette with its boot disk virus, load it, and make it

    temporarily impossible to use your hard disk. This is why you should makesure you have a bootable floppy.

    3. Macro Viruses: These are among the most common viruses, and they tend

    to do the least damage. Macro viruses infect your Microsoft Word application

    and typically insert unwanted words or phrases.

    Symptoms of a Virus

    Some common symptoms for a virus are as follows:

    1. The computer begins to run slowly

  • 7/31/2019 CS Print Out

    22/48

    2. Unusual messages and graphics appear on your screen for inexplicable

    reasons

    3. Music, not associated with any of the current programs, begins to play

    4. Some of the program and/or data files have either been corrupted, or theyhave become difficult to locate.

    5. Unknown files or sub-directories have been created.

    6. The sizes/dates of executable files change automatically.

    7. The computer does not remember CMOS settings.

    8. The disk volume label has been changed unexpectedly.

    9. The hardware devices begin to exhibit unusual behavior.

    WORM:

    A worm, like a virus, is a program that is designed that is designed to harm the

    computer and destroy data stored on a computer. Worms are considered more

    harmful that viruses because they rely less on human behavior in order to spread

    themselves from one computer to another.

    TROJAN HORSES:

    A Trojan horse, or simply a Trojan, is a malicious program that is embedded inside alegitimate application. The application appears to be very useful, interesting and

    harmless to the user until it is executed. Trojans are different from other computer

    viruses in that they must be executed by the victim user who fails for the interesting

    software.

    Anti-Virus Software:

    Anti-virus software protects your computer from unexpected virus attack. Apart from

    protecting your system, anti-virus performs the following tasks:

    Detects the name of virus and its type.

    Detects the name of infected file or folder and mentions the exact location of

    infected file or folder on your computer and removes the virus from the

    computer.

    Most of the anti-virus softwares come with Alert feature. This feature keeps a

    vigil on your computer and as soon as some virus-like activity is found, the

    Alert feature displays a message box and alters the user.

    By changing the settings of anti-virus, you can instruct it to scan the computeron a regular basis.

  • 7/31/2019 CS Print Out

    23/48

    The names of some popular anti-virus softwares are listed below:

    Norton Anti-Virus:

    This anti-virus software is most widely used and can easily be purchased from the

    market. Norton anti-virus has direct patch up with software firm Symantec, whichspecially deals in anti-virus operations.

    McAfee

    Software giant Microsoft used this anti-virus software for its email website Hotmail.

    Whenever you open some email or download some file from hotmail, the McAfee

    anti-virus software automatically checks the files for viruses.

    HOW TO INSTALL ANTIVIRUS

    Heres what to do before installing your antivirus software:

    Back up your files: I dont mean copy them to another directory on the same hard

    drive that would be like making copies of important documents and putting them

    in the same drawer. Convenient until you have a fire. Instead, copy everything to

    another computer, or to a CD-ROM that you have verified is readable on another

    computer.

    Reboot your system: Stop all of your other programs

    Open the Antivirus software CD in the OS

    Open the setup file (Executable file)

    Install your new anti-virus program. Follow the instructions carefully. If you

    become dazed and confused, stop the install, and get some help.

    After completing Installing restart your computer

    Open the Antivirus Application and update through Internet

    After completing update process

    Scan the all Hard Drives.

    Virus Information:

    This section provides a list of the latest viruses and their symptoms. You canuse this section to prepare yourself for facing the latest virus threats.

    Virus name: W32.KazaA.Benjimin

    This new type of worm spreads via a computer network known as KaZaA.Whenever a contact is made with this type of worm, a message is displayed to

    the user which forces him to believe that this worm is a new game or utility toenhance the performance of computer.

  • 7/31/2019 CS Print Out

    24/48

    Virus name: W32.Klez.H

    W32.Klez.H is file type worm, which infects files by renaming them with arandom extension and copying itself as the name of the original file. It isnetwork aware and detects all open shares and copies itself to them with

    random filenames.

    Virus name: W32.Nimda

    W32.Nimda is a very highly infectious worm, which creates.EML and .NWS filesin all folders that are accessed by the user. This is a network aware virus andcreates the .EML and/or .NWS files in the shared folders of other computers aswell. When any of these files are opened in Outlook, the virus automaticallygets executed on computers without the outlook patch.

    Virus name: W32.Sircam

    This is a network aware trojan. It installs itself as a hidden file in theRECYCLED folder with the name SIRC32.EXE.It changes the registry toexecute the virus whenever any .EXE file is run.

    Virus name: CHM.Britney-Pics.Worm

    This is a worm that arrives in emails as a CHM (Compiled HTML) attachment.The subject of the mail is RE: Britney Pics. It spreads through e-mails by using

    addresses it collect from the Microsoft Outlook Address Book.

    How to avoid Virus?

    If we follow some simple safety measures, we can easily protect our computersfrom getting corrupted by viruses. For this keep the following tips in mind:

    First of all you must prepare yourself against viruses by knowing abouttheir symptoms, behavior, general working and their common source oforigin.

    On a regular basis collect information about the latest virus threats. Youcan find such information from websites like www.s-cop.com andwww.symantec.com.

    Never download files from unfamiliar or doubtful websites.

    Do not open any suspicious or unfamiliar email. Simply delete it.

    Maintain a separate folder for downloading files from the Internet. Oncethe download is complete, scan the folder with anti-virus software. Oncethe scan is complete, move the file to some other location on your

    computer.

    http://www.s-cop.com/http://www.symantec.com/http://www.s-cop.com/http://www.symantec.com/
  • 7/31/2019 CS Print Out

    25/48

    Scan your computer thoroughly on a regular basis and never stop thescanning operation in the middle.

    Update your anti-virus software regularly from the Internet to empower itagainst new viruses.

    Always scan a floppy disk before using it because it may also containviruses.

    Take regular back-ups of files so that a possible damage is minimized if avirus attack does occur.

    Create strong passwords so that virus could not guess the password andbreach the security settings of your computer.

    Maintain a strict security level for browsing the Internet.

    Remove files having extension .TMP and .CHK regularly.

    What is malicious code and software?

    Malicious codes are the software programs that generate threats to the

    computer system and precious data. This code can be in the form of viruses,

    worms, Trojan horses, Logic bombs, and other uninvited software. Viruses are

    a small segment of code, which replicates by attaching copies of itself toexisting executables files. The new copy of the virus is executed when a user

    executes the new host program.

    SCANNING HARD DISK FOR VIRUSES

    To Open the Antivirus Software:

    Start Button- Mouse Cursor Place over the Programs Option- Select the

    Antivirus Software-Click it.

    The main window of Antivirus appears.

    Select the Scan drivers Option and click it.

    By default antivirus software selects all drives present on computer for

    scanning

    Select the which drive do you want to scan

    Next click the scan button

    Antivirus starts scanning selected drives for viruses

  • 7/31/2019 CS Print Out

    26/48

    After completing the scanning, antivirus display a Summary window.

    This window mentions how many files or folders scanned by antivirus, number

    of infected files detected by antivirus, files repaired and deleted by antivirus.

    After viewing the scan summary, click the finished button.

  • 7/31/2019 CS Print Out

    27/48

    INTERNET

    What is internet?

    The internet is a global collection of computer networks that are linked together by

    devices called routers, modems and use a common set of protocols for data

    transmission known the TCP/IP (Transmission control protocol/Internet protocol).

    The Primary purpose of the Internet is to facilitate the sharing of information. This

    global network links thousands of computers at universities, research institutions,

    government agencies and business houses throughout the world. Using a small pc

    at your home and telephone connection, you can access information from any place

    in the world through internet. There are many different tools used on the Internet to

    make this possible. Some of the more common tools

    1. Email

    2. Information store house

    3. FTP (File Transfer protocol)

    4. Telnet

    5. Entertainment

    6. Online Shopping/Electronic Commerce

    Email: Electronic mail is a fast easy and economical way to send messages to

    anymore having an Internet account. Through this most widely used feature on

    Internet you can exchange messages with your family, friends and business

    associates around the world. Along with the messages one can also send pictures,

    audio and animation.

    Information Storehouse: You can easily access information from internet regarding

    any subject. Internet is very much like a library with enormous information on any

    subject.

    FTP: There are thousands of free programs and softwares available on Internet.

    You can transfer them to your hard disk through a process called File Transfer

    Protocol.

    Telnet:Telnet is an Internet exploration tool that allows your PC to connect to

    another network and login as if you were a user on that system. You can

    communicate with a wide variety of remote systems with which you have an

    account. Telnet is widely used to access databases and explore public access

    computer systems. Libraries frequently use Telnet. When you search for

  • 7/31/2019 CS Print Out

    28/48

    resources, and an item is not found in one library, another library needs to be

    searched. The Telnet application helps you to do this.

    Entertainment: Hundreds of simple games are available for free on internet, Like

    chess, football, etc. Internet also allows you to review the current movies as well as

    indulge in interactive conversation with people around the world.

    Online Shopping/Electronic Commerce: Online shopping means buying or selling

    on the Net. You can order goods and services on internet such as computers,

    softwares, books, dress, vegetable etc.

    EQUIPMENT REQUIRED FOR AN INTERNET CONNECTION

    Computer:Any good IBM compatible pc and unix or windows os, computer that has

    good storage space and minimum configuration of pc.

    Modem: The term modem is derived from Modulator/Demodulator. A modem is a

    hardware device that is used to convert digital signals from a computer to analog

    signals (modulation) in order to transmit them over analog lines. At the receiving end,

    it converts the analog signals back to digital signals (demodulation) so that a

    computer can understand them. It can be built onto the MOBO of the computer can

    be installed as an extension card, or can be and external device. External modems

    can either be connected to one of the serial ports or to the USB port of the computer.

    Web Browser: The software used to navigate through the web is known as a

    browser. The most popular browser types today are Netscape Navigator andMicrosoft Internet Explorer. Before you start working on the Internet, make sure you

    have a web browser in your computer, otherwise you will not be able to surf the net.

    The Microsoft Internet Explorer comes installed along with MSOFFICE.

    Telephone Line: It is essential to have a telephone connection to get connected to

    Internet. All the data and information pass through the telephone lines as analogue

    signals.

    ISP (Internet Service Providers): If you have a computer with a web browser, a

    modem and a telephone line connected to your computer, you now need an Internetconnection. You can get and Internet connection from various Internet Service

    Providers. EX: BSNL, VSNL, MTNL.

    INTERNET TERMINOLOGY

    TCP/IP

    TCP/IP is the protocol suite that is designed especially for the Internet. Basically, the

    TCP/IP handles network communications between network nodes (computers

    connected to each other over the Internet).The suite is actually composed of several

  • 7/31/2019 CS Print Out

    29/48

    protocols including IP, which handles the movement of data between host computers

    and TCP, which manages the movement of data between applications.

    URL (Uniform Resource Locator)

    A URL is the address of a resource accessible on the Internet. The type of resourcedepends on the Internet application protocol. Using the World Wide Webs protocol,

    the HTTP and the resource can be and HTML page.

    The URL contains the name of the protocol required to access the resource, a

    domain name that identifies a specific computer on the Internet and hierarchical

    description of a file location on that computer.

    Here is an example of URL: http://www.google.com.

    HTTP: (Hyper Text Transfer Protocol)

    HTTP is a protocol used by the WWW. The main task of HTTP is deals with the

    messages format and transmission and what actions Web Servers and browsers

    should take in response to various commands. The main standards that controls how

    the WWW works is HTML, which deals with how Web pages are formatted and

    displayed.

    Modem

    Modem: The term modem is derived from Modulator/Demodulator. A modem is a

    hardware device that is used to convert digital signals from a computer to analog

    signals (modulation) in order to transmit them over analog lines. At the receiving end,

    it converts the analog signals back to digital signals (demodulation) so that a

    computer can understand them. It can be built onto the MOBO of the computer can

    be installed as an extension card, or can be and external device. External modems

    can either be connected to one of the serial ports or to the USB port of the computer.

    Network

    A network is a group of interconnected systems sharing services and interacting by

    means of a shared communications link. A network therefore, requires two or more

    individual systems with something to share (data). The individual systems must be

    connected through a phyiscal pathway called the transmission medium. All systems

    on the physical pathway must follow a set of common communication rules for data

    to arrive at its intended destination and for the sending and receiving systems to

    understand each other. The rules that govern computer communication are called

    protocol.

    Types of Internet Connection:

    http://www.google.com/http://www.google.com/http://www.google.com/
  • 7/31/2019 CS Print Out

    30/48

    The must be connected to a telephone line to access the web. However modems do

    not need a special telephone line. Most people use their regular phone line to

    connect to the Internet. Apart from a normal telephone line, you could also use other

    channels to connect to the web. Some of the other common types of Internet access,

    available for the use these days, are briefed below:

    Dial-up: A dial up connection is the access method that uses telephone lines to

    connect to the Internet. It is the most common way that individuals who use home

    computer connect to the Internet. To connect to the Internet by using dial up, the

    user needs to specify a username, a password, and a telephone number. After the

    connection is established, the user can start browsing sites on the Internet.

    ISDN: It stands for Integrated Services Digital Network and is more common in

    business and ISDN involves the digitization of telephone network so that voice,

    graphics, text and other data can be provided to users from a single terminal over

    existing telephone wiring. Digital connections have fewer errors in transmission,

    which means speed of downloading graphics, web pages, sound and so on is

    increased to four times faster than with dial-up modems.

    DSL: Digital subscriber Line service is provided through the existing phone line,

    but it works differently than regular analog modem dial-up access. DSL operates

    over normal telephone lines and it can be used simultaneously with the telephone.

    DSL can increase the connection speed by as much as ten fold form a standard

    dial-up modem.

    Broadband: This type of access is good for remote locations, where ISDN, cable or

    DSL are not available. It gives a decent download speed, but to upload data, the

    user sill needs a regular analog modem to dial in, via a phone line. Satellite

    connection can be either a two way service or a one-way service. In case of two-way

    satellite service, the data is transmitted via satellite to a dish antenna at the users

    house. In one way system, the user needs a conventional modem and telephone link

    to an ISP. Satellite connection is expensive but sometimes is the only fast option for

    people who are beyond the service area of cable and DSL providers.

    Internet Softwares:

    TCP/IP: It is the basic communication protocol of the Internet. It allows programs on

    users computer to communicate properly over the Internet. Usually when you are

    setup with direct access to the Internet, Your computer is provided with a copy of the

    TCP/IP program. Similarly every other computer that you may send messages to or

    get information from also has a copy of TCP/IP.

    Dialer Software: This software is provided by the ISP to instruct the modem to dial

    the phone number and to identify the users machine to the access providers system

    for access to the network.

  • 7/31/2019 CS Print Out

    31/48

    Browser: To use the Internet a web browser is essential. This program allows the

    user to view the information available on the World Wide Web.

    Internet Relay chats

    The internet relay chat (IRC) feature of internet lets you instantly communicate withpeople around the world. Using IRC you can converse on the Net with one or more

    individuals simultaneously by simply typing replies to lines coming in from the other

    individuals. This is a great way to meet people and exchange ideas.

    During Internet conversations, if you type text, it immediately appears on the screen

    of every person involved in that conversation. Unlike talking on the telephone, the

    IRC lets you chat with friends and colleagues in other cities, states or countries

    without your having to pay long distance charges.

    TYPES OF CHAT

    1. TEXT BASED CHAT: It is the oldest and most popular mode of chat on the

    Internet. This mode enables you to have conversation with one or more

    people. During chat when you type text, the text appears on the computer

    screen of every person participating in your conversation. The test gets

    transferred quickly across the Internet through the modem. So you do not

    need a high-speed modem for text based chat.

    2. WEB BASED CHAT: In this type of conversation, you make use of

    multimedia. In fact, multimedia chat is a new feature of the Internet. Thisfeature enables you to have voice conversations and communicate with other

    people through live video over the Internet. Since sound and video signals get

    transferred slowly across Internet, it is recommended that you use a high

    speed modem for web based chat. However, web-based chat is not functional

    in India as yet because of the narrow band-width available for use in India.

    Browsing the WWW

    When you open the Internet Explorer browser, the home page of Microsoft will open

    by default. If you have the Netscape browser, the home page of Netscape

    Incorporation opens on your screen by default.

    Each Web page on the web has a unique address. This address is called a URL

    (Uniform Resource Locator). The URLs of web pages start with http:// where http

    stands for hyper text transfer Protocol. To view a particular website, you will have to

    provide an address that is a URL of that website.

    1. Open the Internet Explorer and it displays the homepage of Microsoft.

    2. Move the mouse-pointer inside the Address box and click the left mouse

    button.

  • 7/31/2019 CS Print Out

    32/48

    3. Now type the URL http://www.google.com and then press the Enter key.

    List of Popular Websites

    www.rediff.com

    www.timesofindia.com

    www.hindustantimes.com

    www.navbharattimes.com

    www.filmfare.com

    www.msn.com

    www.google.com

    www.cards4you.com

    www.bluemountains.com

    www.yahoo.com

    www.hotmail.com

    www.ibm.com

    http://www.google.com/http://www.rediff.com/http://www.timesofindia.com/http://www.hindustantimes.com/http://www.navbharattimes.com/http://www.filmfare.com/http://www.msn.com/http://www.google.com/http://www.cards4you.com/http://www.bluemountains.com/http://www.yahoo.com/http://www.hotmail.com/http://www.ibm.com/http://www.google.com/http://www.rediff.com/http://www.timesofindia.com/http://www.hindustantimes.com/http://www.navbharattimes.com/http://www.filmfare.com/http://www.msn.com/http://www.google.com/http://www.cards4you.com/http://www.bluemountains.com/http://www.yahoo.com/http://www.hotmail.com/http://www.ibm.com/
  • 7/31/2019 CS Print Out

    33/48

    Introduction of WWW

    The Web is a vast collection of information that is stored on the computers that make

    up the Internet. The term World Wide Web is often used interchangeably with the

    terms WWW and W3. It consists of huge collections of pages containing information,

    images, sounds and video clips stored in computers around the world. It is basically

    a collection of millions of files stored on thousands of computers which are

    connected through the internet. The information provided is regularly updated. Each

    page is called Website. The very first page of any web site is known as its Home

    page.

    A link is any text, image or figure, which when clicked takes us to some other webpage or some other section of the same web page. These links are commonly known

    as hyperlink or hypertext links.

    Evolution of the World Wide Web:

    The Arpanet (Advanced Research Projects Association Network) was born with four

    host computers (in the Research Department of the US Department of Defense)

    connected to each other. However as time passed the number of computers

    connected to the Internet increased. The number soon reached 3, 00,000 in 1990.

    And then the number of host, connected to the Internet crossed over 109 millions injust a decade. It was in 1991, that the emergences of e-commerce led the business

    to enter the Internet world. The NFSnet was responsible for this major development.

    Basic Features:

    1. Client and Server: In a client/server scenario, we have a client program,

    which interacts with a server program. When talking in context of Web, the

    server is called the web server and all the computers connected to the Web

    server are the Web clients. A web server is a repository of all the files on the

    web. It is the duty of the web server to store, retrieve and manage these files

    http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/
  • 7/31/2019 CS Print Out

    34/48

    on the web. All the host computers requesting the web server for these files

    are the web clients.

    2. HTTP: Hyper Text Transfer protocol is a set of rules that are responsible for

    the transmission of web pages- on the web. In other words, it is the standard

    language that tells how the client and the web server are going to

    communicate with each other. It has been exclusively designed for the World

    Wide Web. When a request is made from web client to the web server, the

    server uses this protocol to fulfill the request made.

    3. URLs: A URL is the address of a resource accessible on the Internet. The

    URL contains the name of the protocol required to access the resource, a

    domain name a file located on that computer. You can instantly display a web

    page if you know its URL. For example, http://www.wileydreamtech.com is a

    URL.

    4. HTML: Hyper Text Markup language (HTML) is a computer language used to

    create web pages. Thus, a web page is an HTML document made up of text

    and various HTML tags. It is the browser, who is responsible to transfer the

    tags in the HTML document and display the document as a web page.

    However, each web browser interprets the HTML tags differently. When a

    web browser does not understand a tag or attribute, the information is usually

    ignored. The HTML tags tell a Web browser about the structure and

    formatting of a web page.

    5. XML: Extensible markup Language (XML) WAS DEVELOPED BY THE W3C

    to create information formats and share both the format and the information

    on the web. It was not supposed to replace HTML, but to extend the power of

    HTML by separating data from presentation.

    6. Java and Java Script: In java, there are small programs known as applets

    that can be sent on the web. Java Script is a scripting language that is an

    extension of HTML. Using Java script small programs called scripts can be

    embedded in web pages.

    7. VB Script: This is a scripting language that `closely resembles Microsofts

    Visual Vasic. Like java script, VB script can embed small programs on web.

    8. Multimedia: These days all kinds of files graphics, sound, video and

    animationare being used over the Web. Technologies such as Shockwave

    and Java allow these files to be transferred to your system and played over

    there.

    WWW Browsers

    A browser is a computer program that accesses web pages and displaysthem on the computer screen. It is the basic software that is needed to find, retrieve,

    http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.ibm.com/http://www.wileydreamtech.com/http://www.wileydreamtech.com/
  • 7/31/2019 CS Print Out

    35/48

    view, and send information over the Internet. In fact, to access the World Wide Web,

    the user requires a web browser.

    When you open the Internet Explorer browser, the home page of Microsoft will open

    by default. If you have the Netscape browser, the home page of Netscape

    Incorporation opens in your screen by default.

    Browsers are two types:

    1. Graphical browsers: It allows retrieval of text, images, audio and

    video. Navigation is accomplished by pointing and clicking with a

    mouse on highlighted words and graphics. Both Netscape navigator

    and internet explorer and Graphical browsers.

    2. Text browsers: It provides access to the web in text-only mode.

    Navigation is accomplished by highlighting emphasized words on thescreen with the arrow up and down keys, and then pressing the Enter

    key to follow the link.

    Mosaic

    This was the first Web browser and was developed by the National center for

    Supercomputing Applications (NCSA) at the University of Illinois at Urbana-

    Champaign. It is available for Macintosh, Window and X Windows platforms. This

    software is available free on the Internet and can be downloaded from

    ftp.ncsa.uiuc.eduby any anonymous FTP.

    Netscape Navigator

    Netscape Navigator was released in 1994 and is one of the fastest Web

    browsers currently available in the market. It is available in different versions for

    UNIX, Windows and Macintosh platforms and has built-in the e-mail and

    Newsgroups facilities.

    Microsoft Internet Explorer

    This is based on NCSA Mosaic and is distributed under a licensing agreementwith Spyglass Inc. This is shareware software and can be downloaded from the

    Internet. It comes in different versions for various Windows products. We will discuss

    Internet Explorer 3.0 in detail.

    Web Servers

    A web server can be any computer, which stores various web pages andcontains the web server software. The web pages on the server are mostly HTMLdocuments. The web client (i.e. a browser, like Internet Explorer and Netscape)makes a request to the web server.:

    ftp://ftp.ncsa.uiuc.edu/ftp://ftp.ncsa.uiuc.edu/
  • 7/31/2019 CS Print Out

    36/48

    Whenever you have to look up a web page, you type that URL into yourbrowser and press return. After a while, no matter where in the words that URL lives,the page appears on computer screen. Your browser forms a connection to a Webserver, requests a page and receives it. If you want to get into a bit more detail, hereare the basic steps that occur being the scenes:

    The browser broke the URL you typed into three parts:

    1. The protocol (http)

    2. The server name (www.mypage.com)

    3. The file name (web-server.htm)

    The browser communicates with a www.mypage.com to translate the server nameinto an IP Address, which it uses to connect to the server at that IP address onport80. Following the HTTP protocol, the browser sends a request to the server,

    asking for the file http://www.mypage.com/web-server.htm. The server then sent theHTML text for the Web page to the browser. The browser read the HTML tags andformatted the page onto your computer screen.

    Internet Information Server (IIS): This is a product of Microsoft and runs onWindows NT or Windows 2000. It is the most widely used web server. One of thereasons for its popularity is that it is easy to set up. IIS offers various tools. Thesetools are as follows:

    1. Microsoft Transaction Server: It is used for building distributedapplications.

    2. Index Server: Index Server is used for indexing and searching web pagesand Microsoft word documents.

    3. Site Analyst: The site Analyst carries out the task of site management.

    IIS supports a large number of features. Some of the important features are---crash protection, support for active server pages and java, script debuggingand content management. IIS is also being used for providing support forHTTP.

    HTTP (Hyper Text Transfer Protocol)

    Protocols are the rules that describe how clients and servers communicatewith each other over a network. Hyper Text Transfer Protocol is a protocolused by the WWW. It can be defined as a set of rules that signify how the webpages are transmitted over the web. These include text files, sound files,music files, graphics, etc.

    Some of the commands that help in the communication between the browserand the web server are listed below

    1. GET: This command initiates the server to retrieve the information locatedat the path specified in the URL.

    http://www.mypage.com/http://www.mypage.com/web-server.htm.http://www.mypage.com/http://www.mypage.com/web-server.htm.
  • 7/31/2019 CS Print Out

    37/48

    2. HEAD: This command is exactly the same as the GET command. The onlydifference is that unlike the GET command, The server retrieves only thedocument header to the browser. The body of the document is ignored.The HTML document is divided into 2 parts:

    The Head and the Body.

    3. Post: The post method instead of reading the page, writes the page.However, instead of replacing the existing date, the new date is appendedto it in some generalized sense.

    The transaction in HTTP uses the TCP/IP protocol. Given below are thevarious phases which a transaction must undergo:

    Connection: This is the first phase of the Transaction cycle. In this phase, aconnection is established between the browser and the web server. Thebrowser requests the server for the connection and the server on receiving

    the request establishes a connection.

    Request: Once a connection has been established, the client sends a requestto the server, specifying the files it needs to access.

    Response: The server searches its database, finds the web pages requestedby the client and sends the results back to the client.

    Close: When the server has processed the request made by the client, theconnection is no more needed. The client delivers a request to the server toclose the connection.

    Uniform Resource Locator

    A Uniform Resource Locator (URL) is the address of a resource accessible onthe Internet. The URL contains the name of the protocol required to accessthe resource, a domain name that identifies a specific computer on theInternet, and a hierarchical description of a file located on that computer.

    Example of URL: http://www.yahoo.com

    Search Engines

    A search engine is a software program that searches a particular piece ofinformation, according to the specified criteria. We all know amount ofinformation available on the Web is huge. Most of us are not even aware ofthe names of the sites available on net. Even if we know the names of a fewsites, The is way a search engines makes a hunt for the specified criteriathrough its own database. In a survey conducted by Neilsen /Net Ratings, itwas found that for the year 2002, the two most popular search engines fornavigating the Web were yahoo and MSN.

    Components of the Google search

  • 7/31/2019 CS Print Out

    38/48

    There are three components that work together to provide us with the search results.These arethe Robot, the Database and the Search Form. Let us now have a lookat these components one by one:

    1. Robot: Also known as Spider or Bot, this is a program that

    automatically navigates the various hypertext structures on the Web. Itmakes a move like a robot spider and retrieves and lists the variousweb pages. The robot works by categorizing the web pages and storinginformation about the web site and the web pages in a database.

    2. Database: A database is a repository to store and manage theinformation (here on the web). Oracle, Microsoft SQL Server, IBM DB2are some of the Database Management systems that are used toconfigure and manage the databases. The search engines make a listof the web pages and sites using these databases. Remember thatdifferent sites have different databases. Therefore, the search results

    will vary, depending on the database used by a particular site.

    3. Search Form: This is an interactive form, which is used by a visitor tomake a request for some information. This mainly consists of a text boxand a submit button. The visitor usually types the topics related to hisor her search and clicks the script, which then searches the databaseusing the criteria specified by the visitor. The result of the search, oftenknown as the result-set is sent by the web server to the browser fordisplay. The sequence in which, the web pages are listed, depends onthe alphabetical order of the sites, amount spent on theiradvertisements by their owners, link popularity etc.

    IP ADDRESSING

    The task of assigning a network address to your network and a host address to each

    of your servers and workstations is known as IP Addressing. An IP address is a four-

    part number in which each part represents an eight bit binary number. The four parts

    are known as octets or bytes and are separated by periods. The total length of an IP

    Address is 32 bits. A simple example of IP Address is listed here under. IP

    addresses are assigned and controlled by an organization called Internet Assigned

    Numbers Authority (IANA). There are two current versions of IP addressing IPv4 and

    IPv6. A part of the IP addresses is known as the network address, or network ID,and the rest of it is known is the host address or host ID.

    Example: 192.68.1.15

    Subnet Mask

    The subnet Mask is used to identify which part of the IP address is the network

    address and which part is the host address. The subnet mask is telling the network

    that the first eight bits of the corresponding IP address are to used as the network

    address. The last 24 bits in this example are to be used as the host address.

    Different classes of IP Addressing

  • 7/31/2019 CS Print Out

    39/48

    PUBLIC IP ADDRESSES

    A-CLASS: 1.0.0.0 TO 126.255.255.255 Default subnet mask: 255.0.0.0

    1 NID- 3HID

    B-CLASS: 128.0.0.0 TO 191.255.255.255 Default Subnet Mast: 255.255.0.02NID 2HID

    C-CLASS: 192.0.0.0 TO 223.255.255.255 Default Subnet Mask: 255.255.255.0

    3NID 1HID

    D-CLASS: 224.0.0.0 TO 239.255.255.255 Default Subnet Mask:

    255.255.255.255 Multicast

    E-CLASS: 240.0.0.0 TO 255.255.255.255 Reserved for Experimental usage

    PRIVATE IP ADDRESSES:

    A-CLASS: 10.0.0.0 TO 10.255.255.255

    B-CLASS: 172.16.0.0 TO 172.31.255.255

    C-CLASS: 192.168.0.0 TO 192.168.255.255

    Domain

    A domain name is one that follows the at sign (@) in an email address, such as

    hotmail.com. The domain names have different words, separated by periods thatindicate different levels of organization. The size of the organization increases from

    left to right. For Example, the domain indianrail.gov is meant for Indian railways,

    which is part of Indian government and comes under its direct jurisdictions.

    Domain can be categorized into two broad categories: Three letter top-level

    domains and two-letter top level domains.

    Three Letter Top-Level Domains

    TLD MEANING EXAMPLES

    .com Commercial Business, acompany

    Hotmail.com

    .net Network provider, ISP Usa.net

    .gov Government agency Indianrail.gov

    .edu Educational Institution Stanford.edu

    .org Non-profit institution Redcross.org

    .mil U.S. Military Army.mil

    .int International Itu.int

    Two Letter Top Level Domains: these are country codes

    TLD COUNTRY EXAMPLES

  • 7/31/2019 CS Print Out

    40/48

    In India www.drc.in

    Us United states Nasdap.us

    Uk United Kingdom Bbc.uk

    De Germany (Deutschland) Sgi.de

    Jp Japan www.nihon-u.ac.jp

    Sending and Receiving E-mails using Outlook Express

    Outlook Express is a message - or E-mail handling software. This comes along

    with the Internet Explorer. The Electronic Mail is sent and received in the form of text

    or images to different Internet Users. The Internet Explorer mail and news program,

    Outlook express is used to exchange Email messages.

    Receiving an Email

    1. You will notice a mail button present on the standard toolbar of Internet

    Explorer

    2. Then click the left mouse button on the mail button.

    3. Inside the pull down menu click on the read mail option

    4. Immediately a Microsoft outlook express logo appears on the screen for a few

    seconds.

    5. Now to view all the Emails you have received, move the mouse pointer over

    the inbox option inside the Folders box and click the left mouse button.

    6. If you wish to read the contents of a particular mail, in our case a mail that has

    come from Microsoft Outlook Express, Just move the Mouse-Pointer to it and

    double-click the left mouse button.

    Replying to and Email using Outlook Express

    1. Click on the particular mail which has to be replied to.

    2. Now click on the reply button.

    3. Type the message in the mail.

    4. Now send the mail to To Email address.

    Sending an Email using Outlook express

    1. Click on the new mail button present on the standard toolbar.

    2. Inside the pull down menu click on the any letter option, Instantly a new

    message box gets displayed on the screen.

    3. Now type the Email address of the person to whom you wish to send a

    message.

    http://www.drc.in/http://www.drc.in/
  • 7/31/2019 CS Print Out

    41/48

    4. Then press the tab key two times to move the cursor in the box beside the

    Subject option.

    5. Next, type a brief description for the subject of Email.

    6. Then pres s tab key from the keyboard to move the cursor into the typingarea.

    7. Now type the message in the mail.

    8. When you are ready to send your message, click on the send button.

    9. Click on the Outbox option present inside the Outlook window. Instantly all the

    mails present inside the outbox get displayed.

    HOW TO CREATE EMAIL ID:

    1. Connect your computer to the Internet.2. Step 2Open a Web browser and type in the Web address of the company with whichyou want to get an email ID. Yahoo is free and very easy to set up3. Step 3Click on "Sign up." On the Yahoo page this says "Don't have a Yahoo ID?" aboveit.4. Step 4Fill out your personal information. This includes your name, date of birth, genderand country. Most companies do not ask for your specific address.

    5. Step 5Get out a pen and paper and