Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

ETC LAB MANUAL

Name : TIRTH PATEL

Branch : ICT-B

Enrollment No. : 211310132004

Batch : B-2
Activity 1
Script :
"restaurant metting"

Characters:

1. John (Manager of the restaurant)


2. Sarah (Server)
3. Michael (Chef)
4. Emily (Marketing Manager)
5. David (General Manager)

(The scene opens with John and Sarah sitting at a table in the restaurant. Michael and Emily are sitting
across from them, and David is standing at the head of the table)

David: (looking around the table) Alright, let's get started. John, do you have any updates for us on the
restaurant's performance?

John: (nodding) Yes, I do. Our sales have been up for the last month, and we're seeing a steady increase
in customer traffic.

David: (smiling) That's great news. What do you attribute that to?

John: (shrugging) I think it's a combination of things. We've been promoting some of our new menu
items on social media, and we've also been getting some good reviews online.

David: (nodding) Excellent. Emily, what have you been doing to drive those reviews?

Emily: (smiling) We've been working on building relationships with some local food bloggers and
influencers. We've also been offering discounts to customers who leave positive reviews on our website.
David: (nodding) Good strategy. And Michael, how are the kitchen operations going?

Michael: (nodding) They're going well. We're keeping up with the demand and our food quality is
consistent.

David: (nodding) That's great to hear. And Sarah, how are things on the floor?

Sarah: (smiling) They're going well. Our servers are providing great customer service and our tables are
turning over quickly.

David: (nodding) Excellent. (looking around the table) So, it sounds like we're all in agreement that
things are going well. Let's keep up the good work and continue to look for ways to improve. Any other
business to discuss?

(Everyone shakes their heads)

David: (smiling) Alright, then. Meeting adjourned.

(The scene ends with everyone getting up and leaving the table)
Activity 2
Letter Writing :

1) complaint letter :

Head of Instrumentation & Control Department


Institute of Technology,
Nirma University
SG Highway, Ahmedabad
382482

11 April, 2021

Mr. A.K. Rao,


Head Consumer Care Division,
T & L Company
Race Course, Baroda.

Sub: Maintenance problem with Flow Control System


Ref: Our purchase order No.IT/NU/IC/PO/19/dt. 10/1/2013
Dear Sir,
We have started a new laboratory with various computerized control systems. Earlier,
we have purchased computerized pressure and temperature control systems from your company.
Vide above reference, we have purchased a computerized flow control system from you. It was
successfully installed in our laboratory on 15th March.
Recently, during the laboratory experiments, some problem is reported. The pump for
the system is not working. As the semester is in the final stage, please, send your service engineer
at the earliest, so that the students will not suffer.
It is surprising to have this type of fault in the first quarter of the one year guarantee
period.

Thanking you,
Yours sincerely,
Tirth
Professor & Head
Instrumentation & Control Engineering

2) Sample Adjustment Letter

Sales Executive,
Modern Instruments,
GIDC Electronic Estate,
Gandhinagar

19th April, 2013

The Director,
BR Institute of Technology,
Opposite Vaishnodevi Temple,
S G Highway
Ahmedabad 382 482

Sub: Supply of Electronics Instruments.


Ref: Your letter No. BRI/EE/20 dt. 10/4/2013

Dear Sir,
We have received your above referred letter dt. 10/4/2013.
We are highly thankful to you for placing an order worth rupees five lakh for various
electronic test and measuring instruments vide your letter No. BRI/EE/EC/ 15 dt. 30/1/2013. Out of this
order for 15 items, we have already procured 14 items. For the item, sr. no. 10 oscilloscope, we have
placed order with M/s. Techtronics, Bangalore. Due to recent strike by the truck operators, the dispatch
of this oscilloscope was delayed. We have received a message from the company that now they have
dispatched the same. We are hopeful of getting it in three days. After initial checking at our level, we
promise you to procure it at your premises by the end of this week.

The delay has been due to unforeseen circumstances beyond our control. Please, bear with
us. I hope this single incidence should not come in way of our future dealings. It is our pleasure, to work
for a new, upcoming educational institute like yours. After getting this last item please, clear our bill at
the earliest.
Yours sincerely,
Tirth
Sales Executive

Activity 3

Group Discussion :
Topic : Faminism

➢ feminism means the belief in the social, political, and economic equality of the sexes. It's about
dismantling the patriarchal systems that have oppressed women for so long and creating a more
equal and just society.
➢ I think one of the main goals of feminism should be to empower women and give them agency over
their own lives. This includes things like reproductive rights, equal pay, and ending violence against
women.
➢ Feminism improves the economic state of country as women started working,workforce expanded
greatly.
➢ Most importantly, it is essential for young people to get involved in the feminist movement. This
way, we can achieve faster results. It is no less than a dream to live in a world full of equality.
➢ One in three women are raped globally once in their lifetime
➢ We need improve education because oppression against women happens only in uneducated and
underprivileged areas of the world.
Activity 5

Book Review :

Introduction:
Title: Sherlock Holmes
Genre: Detective fiction
Author : Arthur Conan Doyle
Arthur Conan Doyle was a British writer and physician. He write a series of Sherlock Holmes.
Background of the Book:
Sherlock Holmes : Sherlock Holmes is a fictional detective of the 19th and early 20th centuries , who first
appeared in publication in 1887. He was devised by British author and physician Sir Arthur Conan Doyle. A
brilliant London-based detective. Holmes is famous for his prowess at using logic and astute observation to
solve cases.

Summary:
Sir Arthur Conan Doyle's The Adventures of Sherlock Holmes is a collection of twelve short stories. Each
tale features the criminal investigations of fictional detective Sherlock Holmes, as seen through the first-
person perspective of his partner, Dr. John H. Watson. The individual stories were serialized in The Strand
Magazine between 1891 to 1892, increasing Doyle's popularity. Most of the tales attempt to identify and
rectify social injustices among European aristocrats in the twentieth century.

In “A Scandal in Bohemia,” the Bohemian King enlists Holmes to recover a salacious photograph of him in
the company of Irene Adler, a famous opera singer. If this photo is exposed, it will ruin the King’s chances
of marrying the King of Scandinavia’s daughter. Holmes disguises himself at Adler’s wedding to her true
love, coyly locating the hidden photograph in the process. When Holmes returns with the King to obtain
the photo, they learn Adler has fled the country with the photo. Adler leaves behind a self-portrait for the
King, but he gives it to Holmes as a souvenir.

“The Read-Headed League,” finds Holmes in the company of pawnbroker Jabez Wilson. Wilson has been
hired by Duncan Ross to be part of the Red-Headed League, mainly because of his hair color. The job takes
time away from his pawnshop, and after two years, Wilson becomes suspicious. Holmes makes several
inquiries, namely to Wilson’s helper, Vincent Spaulding. At night, Holmes and a few others discover a
tunnel connecting to the bank’s basement. Holmes and his companions catch Ross and Spaulding stealing
money red-handed. Spaulding is revealed to be the notorious robber John Clay.

In “A Case of Identity,” Holmes is asked to locate Hosmer Angel, the missing fiancé of Mary
Sutherland, who disappeared en route to the church on their wedding day. More curious, a letter left by
Hosmer seemed to foreshadow his disappearance. Holmes deduces that Hosmer is Mary’s disapproving
stepfather in disguise, concocting a complicated ruse in order to retain access to Mary’s wealthy
inheritance. Since no criminal charges can be filed, Holmes opts not to inform Mary of his discovery, issuing
the stepfather a warning.

“The Boscombe Valley Mystery” begins as Inspector Lestrade seeks Holmes’s help after his son, James, has
been accused of murdering landowner Charles McCarthy. McCarthy was a fellow expat with John Turner,
whose daughter Alice is engaged to James. Alice believes James is innocent, and Holmes concludes a third
culprit was present. Assuming the case is closed, Turner confesses to the murder, claiming he was being
blackmailed by McCarthy, who threatened to expose Turner’s criminal history. Holmes does not identify
the third person, but James is acquitted.

In “The Five Orange Pips,” Holmes is hired by John Openshaw, whose uncle died in 1883, two months after
receiving a letter featuring K.K.K. inscribed with five orange pips. Openshaw’s father received the same
letter upon his death in 1885. Now, Openshaw has received a letter. Holmes implores Openshaw to do as
the letter instructs. The next morning, Openshaw is found dead. Holmes concludes that the crimes were
committed by the Ku Klux Klan, which extorted money from people, including Openshaw’s uncle. Holmes
sends the letter with five orange pips to the police, but the sailboat the KKK was operating from is
discovered to have sunk.

“The Man with the Twisted Lip” involves the disappearance of businessman Neville St. Claire. His wife hires
Holmes, claiming she saw Neville’s face in an opium-den window. While inspecting the den, Holmes finds a
beggar inside the room next to Neville’s clothing. Neville’s coat is found packed with coins outside the
window near the River Thames. The beggar is arrested, and a few days later, Neville’s wife receives a letter
from her husband. Holmes proves Neville was the beggar in disguise, living a double life that afforded him
more wealth than his day job.

“The Adventure of Blue Carbuncle” picks up when a blue carbuncle is stolen from a hotel, resulting in the
arrest of an ex-con. When Holmes’s friend discovers the gemstone stuffed in the throat of a Christmas
goose, Holmes tracks down the bird’s owner, determining he isn’t the culprit after presenting him with a
different goose. Holmes investigates a tight-lipped dealer, but when Holmes notices another man asking
the dealer similar questions, Holmes learns the man is the hotel manager. The manager confesses to the
crime, but Holmes lets him free on the grounds that prison could lead to further criminality.

“The Adventure of the Speckled Band” finds Helen Stoner afraid of being murdered by her stepfather.
Helen moves into the bedroom of her sister, who was killed before her wedding two years earlier.
Holmes learns that, as long as neither daughter marries, Helen’s stepfather will inherit his full annuity.
Holmes and Watson investigate at night, during which a snake enters Helen’s bedroom through a
ventilator. Holmes beats the snake with a rod. The snake slithers into the next room and murders Helen’s
stepfather.
“The Adventure of the Engineer’s Thumb” commences following Watson’s surgery to repair a chopped-off
thumb. Engineer Victor Hatherley relays how he suffered a similar fate to Holmes and Watson. Hired to
press fuller’s earth into bricks, Hatherley is attacked by his boss, who severs his thumb with a cleaver, when
Hatherley discovers the press is actually used to counterfeit coins instead of making bricks. When Holmes
arrives at the press location, he finds the place ablaze and the gang already gone.

“The Adventure of the Noble Bachelor” begins with the disappearance of Hatty Doran, the new bride of
Lord St. Simon. When Hatty’s wedding dress and ring are found floating in the Serpentine, Holmes
investigates. Holmes determines that Hatty is at a nearby hotel with a male commoner who had picked her
up and left the bouquet at her wedding ceremony. The commoner turns out to be Frank, Hatty’s husband
whom she thought had died in America. Holmes discovers their ruse just as they plan to confess to Lord St.
Simon.

“The Adventure of the Beryl Coronet” starts when, after hearing a noise, a banker finds his silent son,
Arthur, holding a damaged beryl coronet inside their home. From the footprints found in the snow outside,
Holmes deduces the banker’s niece plotted to steal the coronet with a blackguard. Arthur interrupted the
crime midway, damaging the coronet in the ensuing scuffle. Out of love for his cousin, Arthur refuses to
identify the culprit.

In “The Adventure of the Copper Beeches,” Holmes is summoned by the newly appointed governess
Victoria Hunter. Following eerie occurrences, Holmes deduces that someone has been imprisoned in the
sealed-off wing of the house. When Holmes and company enter the wing, the room is empty. The prisoner
is revealed to be the daughter of Hunter’s boss, who paid Hunter to impersonate the missing girl so that
her fiancé would think she had lost interest in marriage. Still, the employer’s daughter reunites with her
fiancé and marries him.

Review:

Sherlock Holmes and his assistant Dr. Watson have captivated audiences for generations. This collection of
twelve short stories is fantastic. From stolen jewels to mysterious circumstances and brilliant crimes, The
Adventures of Sherlock Holmes has it all. The Adventures of Sherlock Holmes is full of mesmerizing
deductions and wonderful short adventures. I highly recommend this collection of short stories for every
Sherlock Holmes fan and anyone searching for great mystery novels or short stories.
Activity 6

Report Writing :

Accident Report
Ms. Tirth patel
Flat No. 202, Sivalik Residency, Opp. kankariya Lake, Maninagar,
Ahmedabadtirth7577@gmail.com
+91 1234567890
Date: January 17, 2023
Mr. Mahesh Patel,
Principal,
DP College of Engineering, Opp. Gopal Tower, SG Highway,
Ahmedabad
principal@dpcollege.edu +91
9876543210

Greetings,
I am writing to inform you about an unfortunate incident that occurred on January 17, 2023, while I
was on my way to college. I am a second-year student of DP College of Engineering, and my name is tirth
patel. I am writing to inform you about an accident that occurred on January 17, 2023, on my way to college.
I was on my way to college on my scooter when a car suddenly came out of nowhere and hit me. The
accident was severe, and I was rushed to the hospital by some kind-hearted people who saw the accident
happen. I sustained multiple injuries, including a broken arm and leg. I was hospitalized for a few days, and I
am still recovering from my injuries.
I would like to request your assistance in this matter. I would like to request for a leave of absence for
the next few weeks to recover from my injuries. I would also like to request for a scholarship or financial aid
to help me pay for my medical expenses.
I hope you understand the gravity of the situation, and I would be grateful for any assistance you
can provide. Please let me know if you need any additional information or documents. Thank you for your
time and consideration.

Sincerely,
Tirth patel
Activity 7
Case Study :
Introduction :
As the computer technology advances, it has its darker side also; HACKERS. In today world the size of the
internet is growing at a very fast rate, a large amount of data is moving online, therefore, data security is
the major issue. The internet has led to the increase in the digitization of various processes like banking,
online transaction, online money transfer, online sending and receiving of various forms of data, thus
increasing the risk of the data security. Nowadays a large number of companies, organizations, banks, and
websites are targeted by the various types of hacking attacks by the hackers. Generally, after hearing the
term hacker we all think of the bad guys who are computers experts with bad intensions, who tries to steal,
leak or destroy someone's confidential or valuable data without their knowledge. They are the persons
with very high computer skills who tries to break into someone else security for gaining access to their
personal information, but all the times it is not like that. To overcome the risk of being hacked by the
hackers we have Ethical Hackers in the industry, who are also computer experts just like the hackers but
with good intensions or bounded by some set of rule and regulations by the various organizations. These
are the persons who try to protect the online moving data by the various attacks of the hackers and
keeping it safe with the owner. Further, this paper tells you more about hackers, ethical hackers and Linux
operating system (kali Linux) and aware you about some attacks performed by the hackers on the internet.
Purpose to study :
By learning ethical hacking, you can play a vital role in securing the systems and data from threats and
attacks. As an ethical hacker, you can: Conduct investigations and analyses of the target systems to identify
any security or system vulnerabilities from the hacker's point of view and suggest a remedy.
Results :
The result of a network penetration test or security audit is an ethical hacking, or pen test report. Ethical
name is acceptable, or they can be used interchangeably. This report details the results of hacking activity,
the types of tests performed, and the hacking methods used. The results are compared against the
expectation initially agreed upon with the customer. Any vulnerability identified are detained
countermeasures are suggested. This document is usually delivered to the organization in hard-copy
format, for security reasons. The details of the ethical hacking report must be kept confidential, because
they highlight the organization's security risk and vulnerabilities. If this document falls into the wrong
hands, the results could be disastrous for the organization. It would essentially the roadmap to all the
security weakness of an organization.

Conclusion :
Hacking has both its benefits and risks. Hackers are very diverse. They may bankrupt a company or may
protect the data, increasing the revenues for the company. The battle between the ethical or white hat
hackers and the malicious or black hat hackers is a long war, which has no end. While ethical hackers help
to understand the companies’ their security needs, the malicious hackers intrudes illegally and harm the
network for their personal benefits. which may allow a malicious hacker to breach their security system.
Ethical Hackers help organizations to understand the present hidden problems in their servers and
corporate network. Ethical Hacking is a tool, which if properly utilized, can prove useful for understanding
the weaknesses of a network and how they might be exploited. This also concludes that hacking is an
important aspect of computer world. It deals with both sides of being good and bad. Ethical hacking plays a
vital role in maintaining and saving a lot of secret information, whereas malicious hacking can destroy
everything. What all depends is the intention of the hacker. It is almost impossible to fill a gap between
ethical and malicious hacking as human mind cannot be conquered, but security measures can be tighten

References :

➔ Kimberly Graves. “CEH: Certified Ethical Hacker Study Guide”, John Wiley & Sons, Inc.
➔ C. Palmer.“Ethical Hacking”, IBM SYSTEMS JOURNAL, VOL 40, NO 3, 2001
Steven DeFino, Larry Greenblatt. “CEH: Certified Ethical Hacker Review Guide version7.1”
Activity 8
1)Agenda of the meeting :

Xyz institute of technology


S.G. highway
Ahmedabad

March 1,2020
A meeting with all faculty members of computer engineering department,xyz institute
will be held on Tuesday, March 1,2020 in board room at 02.00 p.m.
Regional managers of MNO.
AGENDA:
1. To organize a two-days national conference.
2. To finalize the sub themes for the research papers.
3. To finalize various dates for preparing call for papers.
4. To form various committees and assign responsibilities to members for conducting conference.

HOD-CE
Xyz institute of technology

2)Minutes of Meeting:

Pink Square Mall

Minutes of the Eighth Meeting of the Executive Committee held at 6 p.m. on Friday, 24 JUNE 2020 at
Seminar Hall, Ashoka Hotel, Jaipur.

Present
Shri Narain Das Baweja Chairperson
Shri Satish Girotra Executive Committee Members
Shri Ajit Agrawal Executive Committee Members
Shri Ashok Saxena Executive Committee Members
Shri Ravi Arora Executive Committee Members
Shri Raghav Dixit Executive Committee Member

In Attendance
Shri Anubhav Nagpal, Secretary
Shri Utkarsh Sinha, People’s Officer

No. of Minutes Subject of Minutes Details of Minutes

1 Confirmation of the minutes of The minutes of the previous


the last meeting were distributed and approved
by the members with
consensus.
2 Appointment of the Manager at Mr. Arun Lohiya presented the
Mansarovar Branch details of the interviews held
for the selection of manager
for the Mansarovar Branch and
read the recommendations of
the interview panel to appoint
Mr. Akash Jain to this post.
3 Opening a retail outlet Mr Satish Girotra, one of the
comprising major brands of executive members, came up
shoes and sports goods with the proposal of opening a
retail outlet comprising major
brands of shoes and sports
goods of companies like
Adidas, Nike on the second
floor; the proposal was
accepted as a positive step for
the growth of the mall.
4 Announcement of the festive The committee decided to
discount declare the new year festive
offer as proposed by Raghav
Dixit, Sales Manager of
Vishali Nagar Branch. Details
given in the attached sheet.
5 Decision to be made regarding As discussed and approved by
decoration of the committee, decoration of
Pink Square branches across all the branches was given to
the city Glitters and Sparkles
Decorations, Ajmer Road,
Jaipur.
6 Date of next meeting The next meeting will be
scheduled for 17 August 2020.

Chairman
Shri Narain Das Baweja

You might also like