An operational state in a computer that lets other users in the network copy files and use the printer.
Just because you have more than one computer doesn't mean you have to have a printer for each computer We will now show you how to share a printer between several computers on a network.
installation of Window 10 on desktop computers.Umar Hayat
Step by step procedure to install windows 10 on your computers. Windows 10 is latest operating system by Microsoft. It has mixed features of windows 7 and windows 8.
Installation of Microsoft Office 2016 with slideshowsUmar Hayat
Step by step procedure of installation of Microsoft Office 2016 on windows 7,8 and 10. MS Office is popular office tools package for handling office work.
An operational state in a computer that lets other users in the network copy files and use the printer.
Just because you have more than one computer doesn't mean you have to have a printer for each computer We will now show you how to share a printer between several computers on a network.
installation of Window 10 on desktop computers.Umar Hayat
Step by step procedure to install windows 10 on your computers. Windows 10 is latest operating system by Microsoft. It has mixed features of windows 7 and windows 8.
Installation of Microsoft Office 2016 with slideshowsUmar Hayat
Step by step procedure of installation of Microsoft Office 2016 on windows 7,8 and 10. MS Office is popular office tools package for handling office work.
Here is a brief introduction on User Account, which will help you to understand the basics of windows user account and how to create user account in windows 7. Hope it will help you all. And if any question and queries then feel free to ask.
Internet and the World Wide Web: What is Internet? Introduction to internet and its applications, E-mail, telnet, FTP, e-commerce, video conferencing, e-business. Internet service providers, domain name server, internet address, World Wide Web (WWW): World Wide Web and its evolution, uniform resource locator (URL), browsers – internet explorer, Netscape navigator, opera, Firefox, chrome, Mozilla. search engine, web saver – apache, IIS, proxy server, HTTP protocol
The word troubleshooting is simply about the logical and systematic search for locating and fixing of errors or causes of errors in the affected device. This term aims for the solution to restore the failed product or processes to its working state.
Microsoft announced Windows 10 to buy back into the market that it had lost with the launch of Windows 8 and 8.1. This slideshare talks about new features in the Operating System and how it could be a game changer for Windows and Microsoft as well.
There are also discussions about how the Windows 10 OS has changed the way Operating Systems are distributed and tested, applications being made cross platform compatible and many new software components complementing existing hardwares.
This is a simple tutorial about windows 10. This includes basic operations of windows 10 OS. This includes how to open start, visual Desktop, Microsoft edge and so many features of windows 10.
Introduction, Installation Operating System and ApplicationVichhaiy Serey
The contents of this slide is all about introduction to Operating System (OS) and application, how to install it and some other basic maintenance techniques and tips
Here is a brief introduction on User Account, which will help you to understand the basics of windows user account and how to create user account in windows 7. Hope it will help you all. And if any question and queries then feel free to ask.
Internet and the World Wide Web: What is Internet? Introduction to internet and its applications, E-mail, telnet, FTP, e-commerce, video conferencing, e-business. Internet service providers, domain name server, internet address, World Wide Web (WWW): World Wide Web and its evolution, uniform resource locator (URL), browsers – internet explorer, Netscape navigator, opera, Firefox, chrome, Mozilla. search engine, web saver – apache, IIS, proxy server, HTTP protocol
The word troubleshooting is simply about the logical and systematic search for locating and fixing of errors or causes of errors in the affected device. This term aims for the solution to restore the failed product or processes to its working state.
Microsoft announced Windows 10 to buy back into the market that it had lost with the launch of Windows 8 and 8.1. This slideshare talks about new features in the Operating System and how it could be a game changer for Windows and Microsoft as well.
There are also discussions about how the Windows 10 OS has changed the way Operating Systems are distributed and tested, applications being made cross platform compatible and many new software components complementing existing hardwares.
This is a simple tutorial about windows 10. This includes basic operations of windows 10 OS. This includes how to open start, visual Desktop, Microsoft edge and so many features of windows 10.
Introduction, Installation Operating System and ApplicationVichhaiy Serey
The contents of this slide is all about introduction to Operating System (OS) and application, how to install it and some other basic maintenance techniques and tips
Design an Implementation of A Messaging and Resource Sharing Softwarenilabarai
In this article it has been looked how to program using sockets by implementing an echo server along with a client that is used to send and receive string messages. It will start off by giving a quick introduction to TCP/IP fundamentals and then explain how sockets fit into the diagram. Most network application can be divided into two pieces: a client and a server. A client is the side that initiates the communication process, where as the server responds to incoming client requests. There would be contains three types of service from this software, that is Message Transfer service, Voice Transfer service and File Transfer service. All this sorts are the design issue of this software.
Telnet and SSH configuration on ubuntu and windows. this presentation show how we can configure telnet and ssh on windows and linux and what additional software we will have to required.
Setting up VoIP management server using a communication framework and let the users from LTE networks to register and make voice calls over IP system as well as video session.
This webinar series is designed to help internal auditors looking to equip themselves with competencies and confidence to handle audit of IT controls and information security, and learn about the emerging technologies and their underlying risks
The series focuses on contemporary IT audit approaches relevant to Internal Auditors and the processes underlying risk based IT audits.
Session 5 of 10
This Webinar focuses on Controlling Ports and Network Devices
• Ports and Protocols
• Network Mappers
• Protocol Attacks
• Use of Firewalls
• Identifying Network Boundaries
• NIST 800 framework and CIS
• Switches and Routers
• Routing Protocols
• Switch Security
• Hardening the Network
• Good Network Administration
• Internet Control Message Protocol
• Anti-spoofing and logging
• Configuring a secure network perimeter
• Secure IOS-based Routers using automated features
• Securing Desktops, Notebooks, Servers and Mobile Devices
Solution about automating end to end server testYu Tao Zhang
As we known, you have to test the server which installed on your virtual server, whatever Linux or Windows, after you provisioned a virtual server in your cloud or IT infrastructure.
In the solution, I provided the automated methods to archive above test goals.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
3. Network Protocols:
◦ A protocol is a set of rules and guidelines for communicating data. Rules are
defined for each step and process during communication between two or more
computers. Networks have to follow these rules to successfully transmit data.
4. Common typesofprotocols:
◦ The Internet Protocol is used in concert withother protocols within the Internet
ProtocolSuite.
◦ Prominent members of which include:
Transmission Control Protocol (TCP)
Hypertext TransferProtocol (HTTP)
File TransferProtocol (FTP)
Secured Shell (SSH)
Telnet
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol version 3 (POP3)
5. HTTP:
◦ (HyperText Transfer Protocol) The
communications protocol used to connect
to Web servers on the Internet or on a
local network (intranet). The primary
function of HTTP is to establish a
connection with the server and send HTML
pages back to the user's browser.
6. File Transfer Protocol(FTP):
◦ FTP(File Transfer Protocol) is the simplest and most secure way
to exchange files over the internet
◦ Transferring files from a client computer to a server computer is
Called “Uploading” and transferring from a server to a client
“Downloading”.
◦ To access an FTP server, user must be able to connect to the
internet or an intranet (via modem or local area Network) With
an FTP client program
◦ Businesses use FTP to send files between computers, while
websites use FTP for the uploading and downloading of files
from their website's servers.
7. Secure Shell(SSH):
◦ SSH, also known as Secure Shell or
Secure Socket Shell, is a network
protocol that gives users, particularly
system administrators, a secure way
to access a computer over an
unsecured network. SSH also refers
to the suite of utilities that
implement the SSH protocol.
8. Telnet:
◦ Telnet is a simple, text-based network protocol that is used for accessing remote computers
over TCP/IP networks like the Internet. Telnet was created and launched in 1969 and,
historically speaking, you can say that it was the first Internet
◦ Telnet services enable user to login to another computer on internet from their local computer
◦ Using :
Computing power of remote computing
Software on remote computer
Database of remoter computer
◦ This action is called “Remote Login”.
9. Simple Mail Transfer Protocol(SMTP):
◦ SMTP or Simple Mail Transfer Protocol is an application that is used to send, receive, and relay outgoing
emails between senders and receivers. When an email is sent, it's transferred over the internet from one
server to another using SMTP. In simple terms, an SMTP email is just an email sent using the SMTP server.
10. Post Office Protocol version 3 (POP3):
◦ Post Office Protocol 3, or POP3, is the most commonly used protocol for receiving email over
the internet. ... POP3 is a one-way client-server protocol in which email is received and held on
the email server. The "3" refers to the third version of the original POP protocol.
15. Hyper-V
◦ Hyper-V is virtualization software that, well, virtualizes software. It can not only virtualize operating
systems but also entire hardware components, such as hard drives and network switches. Unlike Fusion
and Virtualbox, Hyper-V is not limited to the user’s device. You can use it for server virtualization, too.
◦ Hypervisor: A hypervisor, also known as a virtual machine monitor or VMM, is software that creates and
runs virtual machines (VMs). A hypervisor allows one host computer to support multiple guest VMs by
virtually sharing its resources, such as memory and processing.
◦ Example: VMware and Hyper-V are two key examples of hypervisor, with VMware owned by Dell and
Hyper-V created by Microsoft. VMware software is made for cloud computing and virtualization, and it
can install a hypervisor on your physical servers to allow multiple virtual machines to run at the same
time.
17. Installation of Window 2012 Server
◦ System Requirements
• Although most of the servers nowadays probably have the necessary requirements for Windows Server 2012. It
will certainly be useful to know them in case you want to upgrade from an older system.
The main requirements are:
CPU socket minimum 1.4 GHz (64-bit processor) or faster for single core and
Microsoft recommends is 3.1 GHz (64-bit processor) or faster multi-core.
RAM memory minimum is 2GB, but Microsoft recommends 8GB.
160 GB hard disk with a 60 GB system partition space in your hard disk.
One important thing to note here is that the installation process itself will verify your computer hardware and let
you know if it qualifies for a Windows Server 2012 installation. If not, then you will need to upgrade your
hardware.
18. Installation
Step 1 − We can download the evaluation ISO of Windows Server 2012 R2 from the following
link − https://www.microsoft.com/en-us/evalcenter/evaluate-windows-server-2012-r2
But you will need to sign in first with a Microsoft account like Hotmail for example in order to
complete the download and the good thing is that the evaluation period will last for 180 days, so
you will have enough time to know if it will be the right product for you or not.
At the end, if you decide to buy the license of your Windows server 2012 R2. You can purchase it
online via a Microsoft online store found in
− https://www.microsoftstore.com/store/msusa/en_US/list/Windows-
Server/categoryID.70676900?icid=BusinessR_Software_80_Windows_Server_112315
19. Installation
◦ Step 2 − After downloading the ISO of Microsoft, create a boot USB driver which can be created with the Microsoft tool
called Windows USB/DVD Download Tool and can be downloaded from the following link
− https://www.microsoft.com/en-us/download/windows-usb-dvd-download-tool
◦ After downloading the EXE file, open it and select the ISO file location and then click next like in the following
screenshot, and wait up to the end when the Boot USB is created.
20. Installation
◦ Step 3 − After completing the above given steps, plug-in the USB to the server and wait for a while till it loads the files.
This will continue for about a couple of minutes as shown in the following screenshot.
21. Installation
Step 4 − After the files are loaded, you will
see the screen of language settings of
installation, keyboard, time and currency
format. Generally, all the default ones are also
good enough to start with. Click Next.
23. Installation
◦ Step 6 − Once you have clicked on Install Now, the setup will start and it will load all the files
and the screen will look as shown in the following screenshot.
24. Installation
◦ Step 7 − Wait until the files are loaded and then you will see the following screen. Let’s
select Windows Server 2012 DataCenter Evaluation (Server with GUI) and click Next.
25. Installing
◦ Step 8 − Click “I accept the license terms” and then click on the Next button as shown in the
following screenshot.
26. Installing
◦ Step 9 − The following screen will appear.
In “Driver Options” you can create a new
partition, delete or format the Hard disk.
After you have done this process then you
can select the partition where the
Windows server 2012 R2 will be installed
in our case we have one partition. Once
all this is done, then click on Next.
27. Installing
◦ Step 10 − Let’s wait until this process
finishes during this time and then the
server will reboot.
28. Installing
◦ Step 11 − Once the reboot is
done the following screen will
appear. Set the password for the
server and then click on “Finish”.
29. Installing
◦ Step 12 − It will take some minutes until the setup finishes completely.
30. Installing
◦ Step 13 − Once all this is done, you have
completed the installation process and
the following screen will appear.
◦ Congratulations!!!
31. Questions:
1- Why do we Need to create Virtual Machine?
2- What is Port?
3- what is HHTP?
4- difference b/w SSH and Telnet.
5- Difference b/w SMTP and POP3
32. Answers:
1. The main purpose of VMs is to operate multiple operating systems at the same time, from the same piece of
hardware
For Example: Without virtualization, operating multiple systems — like Windows and Linux — would require two
separate physical units. ... Hardware requires physical space that isn't always available.
2. A port is a virtual point where network connections start and end. Ports are software-based and managed by a
computer's operating system. Each port is associated with a specific process or service.
For Example: An example of the use of ports is the delivery of email. A server used for sending and receiving email
generally needs two services. The first service is used to transport email to and from other servers. This is
accomplished with the Simple Mail Transfer Protocol (SMTP). A standard SMTP service application listens on TCP port
25 for incoming requests. The second service is usually either the Post Office Protocol (POP) or the Internet Message
Access Protocol (IMAP) which is used by email client applications on users' personal computers to fetch email
messages from the server. The POP service listens on TCP port number 110.
33. MCQS:
1- SSH stands for?
Super Secure Shell Simple Secure Shell Socket Secure Shell Secure Socket Shell
2- In which protocol Port 80 is used?
HTTP FTP SMTP NONE
3- Receiving of Mail is function of?
SMTP FTP POP3 HTTP
4- Hypervisor is also known as?
VM VMM VM-Ware NONE
5- Hyper-V is owned by?
Windows Dell Microsoft Linux
34. MCQS
6. VMware owned by?
Dell Microsoft HP Lenovo
7. SMTP use port for mail?
25 80 443 404
8. Protocols are, set of rules to govern?
Communication Standard Wired Communication NONE
9. Which of the following best describes uploading information?
Sorting data on a disk drive Sending information to a
host computer
Receiving information from
a host computer
Sorting data on a hard
drive
10. When the mail server sends mail to other mail servers it becomes ___ ?
SMTP client SMTP server Peer Master