Professional Documents
Culture Documents
Meti
Meti
BY:
AMAR [ 4HG21CS004 ]
ABSTRACT
During this internship, the intern gained valuable experience in a variety of areas. The intern
was introduced to the basics of C programming, including data types, control structures, and
functions. Additionally, the intern learned how to use Microsoft Word, Excel, and Office to
create and edit documents, spreadsheets, and presentations. The intern also gained knowledge
in the areas of networking and mailing, including how to set up and configure networks and
how to use email effectively. Overall, the internship provided the intern with a broad range of
i
ACKNOWLEDGEMENT
The completion of any internship involves the efforts of many people. We have been
lucky to have received a lot of help, support from all directions during this internship,
so with the gratitude we take this opportunity to acknowledge all those who guide and
encouraged us.
We are extremely grateful to our principal Dr.T Rangaswamy B.E, M.Sc (Res), Ph.D for
Dept. of CS&E and to all the faculty of CS&E Department for their guidance. It’s a
great pleasure to acknowledge for their help and encouragement rendered towards the
successful completion of internship.
BY:
AMAR [ 4HG21CS004 ]
ii
Contents
1 Introduction to C 1
1.2 History of C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Overview of C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.3.3 Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.3.4 C Tokens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1.1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.1.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.0.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.1 Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.2 Structures: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
iii
CONTENTS CONTENTS
4.3 Unions: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
5 Pointers 27
5.3.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6 File Handling 31
6.9.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
I Microsoft Office 36
7 MS Excel 37
7.2.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
8 MS Word 41
8.3.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
iv
CONTENTS CONTENTS
9 MS Power point 46
9.1.1 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
10 MS Access 50
10.1.2 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
11.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
11.2 Networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
11.2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
v
List of Figures
2.1 Operators in C . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
7.4 Macros . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
8.2 Ribbon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
8.4 Keyboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
10.1 Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
10.2 Queries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
10.3 Forms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
10.4 Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
vi
List of Tables
vii
LIST OF TABLES LIST OF TABLES
Calendar
viii
Fundamentals of C Programming Language and MS Office 2022-23
Chapter 1
Introduction to C
A computer is a programmable device that can store, retrieve, and process data. It was originally
used to describe humans who performed numerical calculations using me- chanical calculators,
such as the abacus and slide rule. However, with the invention of electronic computers, the
term came to refer to machines that could perform a wide range of tasks. Today’s computers
are electronic devices that accept data (input), process that data, produce output, and store
(storage) the results. They can perform a wide range of tasks, from simple calculations to
complex simulations and data analysis. A computer system typically includes hardware, an
operating system (main software), and peripheral equipment needed for full operation.
The generations in computer terminology describe a change in technology (on which the com-
puter system is designed) of a computer that is/was being used. The word “generation” was
used to differentiate between various hardware technologies. There are five generations of com-
Computers can be classified into different types based on their purpose, size, and power.
Here are some of the most common types of computers:
• Supercomputers: These are the fastest and most powerful computers available.
They are used for complex scientific calculations and simulations.
• Mainframe Computers: These are large computers that are used by large organiza-
tions to manage large amounts of data and run multiple applications simultaneously.
• Minicomputers: These are smaller than mainframe computers but larger than mi-
crocomputers. They are used in small businesses and organizations.
• Microcomputers: These are the most common type of computer and include desk-
tops, laptops, tablets, and smartphones.
• Workstation Computers: These are high-performance computers that are used for
specialized applications such as video editing, 3D modeling, and scientific simula-
tions.
• Server Computers: These are computers that provide services to other computers
on a network.
1.2 History of C
1.3 Overview of C
• Documentation :This section consists of the description of the program, the name of the
• Preprocessor Section :All the header files of the program will be declared in the prepro-
• Definition :Preprocessors are the programs that process our source code before the process
of compilation. There are multiple steps which are involved in the writing and execution
• Global Declaration :The global declaration section contains global variables, function dec-
• Main() Function :Every C program must have a main function. The main() function
of the program is written in this section. Operations like declaration and execution are
• Sub Programs :User-defined functions are called in this section of the program.
In C programming language, data types are used to define the type of a variable before
it is used in a program. A data type determines the size and type of values that can be
stored in a variable
1.3.3 Variables
A variable in C is a memory location with some name that helps store some form of
data and retrieves it when required. We can store different types of data in the variable
and reuse the same variable for storing some other data any number of times. C Variable
Syntax
datatype variable name = value; // defining single variable
or
datatype variable name1, variable name2; // defining multiple variable
Example:
int var; // variable definition
var = 10; // initialization
or
int var = 10; // variable declaration and definition
1.3.4 C Tokens
• Keywords
• Identifiers
• Constants
• Strings
• Special Symbols
• Operators
Keywords:
The keywords are pre-defined or reserved words in a programming language. Each key-
word is meant to perform a specific function in a program.
C language supports 32 keywords which are given below:
Identifiers :
Identifiers are used as the general terminology for the naming of variables, functions, and
arrays. These are user-defined names consisting of an arbitrarily long sequence of letters
and digits with either a letter or the underscore() asaf irstcharacter.Identif iernamesmustdif f erinspell
Constants:
The constants refer to the variables with fixed values. They are like normal variables but with
the difference that their values can not be modified in the program once they are defined.
Chapter 2
operators: Operators are symbols that trigger an action when applied to C variables and
other objects. The data items on which operators act are called operands. Depending on the
number of operands that an operator can act upon, operators can be classified as follows:
• Unary Operators: Those operators that require only a single operand to act upon are
• Binary Operators: Those operators that require two operands to act upon are called
– Arithmetic operators
– Relational Operators
– Logical Operators
– Assignment Operators
• Ternary Operator: The operator that requires three operands to act upon is called the
2.1.1 INTRODUCTION
C language possesses such decision making capabilities by supporting the following state-
ments:
– If statement
– Switchstatement
– goto statement
– Loop statement
These statements are popularly known as decision making statements. Also known as
control statements.
1.if statement: This type of statement would enable a programmer to choose various
instruction sets on the basis of the available condition. The instruction sets will only get
executed when the evaluation of the condition turns out to be true. In case the evaluation
of the condition is false, there will be an execution of a different instruction set. These
are also known as decision control statements. These are of the following types:
if (Expression)
Statement1;
Statement2;
If else:
In this statement, the execution of an array of instructions occurs only when the available
condition is correct. The verification of the next condition occurs when this first condition
is incorrect. In case all of the specifications fail even after the verification, then there will
be an execution of the default block statements. The remainder of the program’s ladder
is shown below.
If (condition 1)
Statement 1 (s1)
Else if (condition 2)
Statement 2 (s2);
else if (condition 3)
Statement 3 (s3)
. . .
Else
Statement 4 (s4)
Example
#include <stdio.h>
int main() {
int number
scanf("%d", &number);
if (number > 0) {
} else {
return 0;
Switch statement
The C language offers its users with a selection statement in various ways in case a program
multi-way type of selection statement that would resolve this issue. The switch declaration
comes into play when more than three alternatives (conditions) exist in a program. This
command then switches between all the available blocks on the basis of the expression
Switch (expression A)
case A:
Statement A ;
Break;
case B:
Statement B ;
Break;
case C:
Statement C ;
Break;
. . . .
case Z:
Statement Z ;
Break;
Default:
Statement 1 ; Break; }
Example
#include <stdio.h>
int main() {
int choice;
printf("Menu:\n");
printf("3. Exit\n");
scanf("%d", &choice);
switch (choice) {
case 1:
printf("Hello\n");
break;
case 2:
printf("World\n");
break;
case 3:
break;
default:
printf("Invalid choice\n");
break;
return 0;
The C language also comes with a very unusual operator for its programmers – the con-
ditional operator.
(condition 1)?
expression 1:
expression 2;
Here, the execution of the expression 1 will only occur when the given condition is valid.
In case this statement is incorrect, then the execution of the expression 2 will occur.
Goto Statement
The Goto statement is especially known in the case of jumping control statements. We
mainly use the goto statement when we want to transfer a program’s control from any
one block to another. Also, we use the goto keyword for the declaration of the goto
statement.
Looping statements
the program to meet the necessary requirements. In such instances, it becomes difficult
to rewrite and repeat everything. And that is exactly where we would like to create loops
using the looping declarations. Loop control statements help in such types of situations
While loop
Do while loop
For loop
While loop
While loop does not depend upon the number of iterations. In for loop the number of
iterations was previously known to us but in the While loop, the execution is terminated
on the basis of the test condition. If the test condition will become false then it will break
Syntax:
initialization expression;
update expression;
Do while loop
The do-while loop is similar to a while loop but the only difference lies in the do-while
loop test condition which is tested at the end of the body. In the do-while loop, the loop
Syntax:
update expression;
For loop
write a loop that will be executed a specific number of times. for loop enables programmers
Syntax:
Statement; }
Example
#include <stdio.h>
int main() {
// 1. While Loop
int i = 1;
printf("While Loop:\n");
while (i <= 5) {
i++;
printf("\n");
// 2. For Loop
printf("For Loop:\n");
printf("\n");
// 3. Do-While Loop
printf("Do-While Loop:\n");
int k = 1;
do {
k++;
printf("\n");
printf("Nested Loop:\n");
printf("\n");
return 0;
2.1.2 Summary
In this chapter we learned about history of C programming language. Next we saw char-
structure. Moving ahead ,we learned about various C tokens used in C program. Further
we learned about basic data types used in c program and their storage size. Further more
we learned about different control statements used in c program and there application
with an example . In addition to that we learned about various loops used in c program
Chapter 3
memory locations. It allows the efficient organization and access of multiple values using
a single variable name. Arrays are declared using the following syntax:
Array elements are accessed using an index, which starts from 0 for the first element, 1
for the second, and so on. For example, to access the third element of an integer array
Initializing Arrays:
int numbers[5] = 10, 20, 30, 40, 50; If not initialized explicitly, array elements are set to
arrays. These are arrays of arrays, allowing data to be stored in rows and columns or
higher dimensions. For example, a 2D array can be declared and initialized as follows:
Example
Example
#include <stdio.h>
int main() {
int matrix[3][3] = {
{1, 2, 3},
{4, 5, 6},
{7, 8, 9}
};
printf("Matrix elements:\n");
printf("%d\t", matrix[i][j]);
return 0;
Strings in C Programming
array. It is terminated by a null character (”), which marks the end of the string. Strings
For example:
C provides a set of standard string handling functions, declared in the string.h header, to
strlen(): Calculates the length of a string (excluding the null character). strcpy(): Copies
one string to another. strcat(): Concatenates (appends) one string to the end of another.
Example
#include <stdio.h>
#include <string.h>
int main() {
char input[100];
char copy[100];
strcpy(copy, input);
char append[200];
strcat(append, input);
char compareStr[100];
scanf("%s", compareStr);
if (cmpResult == 0) {
} else {
char searchStr[100];
scanf("%s", searchStr);
if (found != NULL) {
} else {
return 0;
Inputting strings using scanf() and outputting strings using printf() require special format
char name[50];
scanf(”
printf(”Hello,
However, these functions may encounter issues with spaces and buffer overflows, requiring
3.0.1 Summary
In first section of this chapter we learned about the array data structure. After in-
troduction ,array declaration ,different ways of array intialization and accessing array
elements were thought. Next we learned about different types of arrays,it includes one-
ample for each. In next section ,we learned about basics of string. Following the introdu-
tion, we learned about different string operations with an example for each operation. -
Chapter 4
4.1 Functions
Functions in C are blocks of code that perform specific tasks and can be called from
other parts of the program. Sure! Here’s a brief explanation of the types of functions in
C:
2.User-Defined Functions::
one of which is ”call by value.” Call by value involves passing the actual value of the
argument to the function, rather than a reference to the original variable. This means
that any modifications made to the parameter inside the function do not affect the original
where a reference to the actual data (memory location) is passed to a function as an ar-
gument, rather than a copy of the data itself. This means that any changes made to the
parameter within the function will directly affect the original data outside the function as
well.
Example
#include <stdio.h>
return a + b;
int main() {
scanf("%d", &num1);
scanf("%d", &num2);
return 0;
4.2 Structures:
Structures are used to represent a record.Structures are useful for creating more complex
data structures and for representing real-world entities with multiple attributes. They are
Syntax of Structures:
dataType member1;
...
dataType member2;
};
Structure Declaration
we specify its member variables along with their datatype. We can use the struct keyword
Syntax:
The above syntax is also called a structure template or structure prototype and no memory
Initialize Structure
Structure members cannot be initialized with the declaration. For example, the following
Access structure
Example
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
struct Student {
char* name;
int roll_number;
int age;
double total_marks;
};
int main()
int i = 0, n = 5;
student[0].roll_number = 1;
student[0].name = "Geeks1";
student[0].age = 12;
student[0].total_marks = 78.50;
student[1].roll_number = 5;
student[1].name = "Geeks5";
student[1].age = 10;
student[1].total_marks = 56.84;
student[2].roll_number = 2;
student[2].name = "Geeks2";
student[2].age = 11;
student[2].total_marks = 87.94;
printf("Student Records:\n\n");
return 0;
4.3 Unions:
A union is a special data type available in C that allows to store different data types in
Syntax of Unions:
member definition;
member definition;
member definition; }
Example
#include <stdio.h>
union Result {
int intValue;
float floatValue;
};
int main() {
return 0;
4.3.1 Summary
At the beginning of this chapter we saw introduction about functions. After that we
learned about basic of function. Next we learned about function declaration,function call
and function defination . Further we saw an example program of adding two numbers using
function. In the next section this chapter we were introduced about derived data type i.e
structures. In strucutures we learned about its basic syntax ,declaration of variables and
different ways of initializing and accessing structure members. In the last section of this
chapterwe were introduced about derived data type i.e union. In unions we learned about
its basic syntax ,declaration of variables and different ways of initializing and accessing
structure members.
Chapter 5
Pointers
1. Declaration: Pointers are declared using an asterisk (‘*‘) before the variable name,
2. Initialization: Pointers can be initialized with the address of another variable using
3. Dereferencing: To access the value pointed to by a pointer (i.e., the value at the
4. Null Pointer: A pointer can be set to ‘NULL‘ to indicate that it doesn’t currently
Pointers are powerful and essential for advanced C programming, enabling dynamic mem-
ory allocation, passing parameters to functions by reference, and implementing data struc-
tures like linked lists. In C, pointers and arrays have a close relationship. Here are some
expression, it implicitly acts as a pointer to the first element of the array. - For example,
if you have an integer array ‘int arr[5];‘, the expression ‘arr‘ represents a pointer to the
2. Pointer Arithmetic and Array Elements: - Since arrays are stored in contiguous
memory locations, you can use pointer arithmetic to access elements in an array. - For
example, if ‘ptr‘ is a pointer to an integer array, ‘ptr + 1‘ points to the second element,
with the address of the first element of an array. For example, ‘int *ptr = arr;‘ initializes
the pointer ‘ptr‘ with the address of the first element of the ‘arr‘ array.
are actually passing a pointer to the first element of the array. - Therefore, functions can
Example:
include <stdio.h>
int main() {
int *ptr;
ptr = &number;
*ptr = 99;
return 0;
allowing them to access and modify data at the memory address pointed to by the pointer.
This enables functions to work with the original data and not just a copy.
dynamically on the heap using functions like ‘malloc‘ and ‘calloc‘. This allows for flexible
memory usage, especially when the size of data is not known at compile-time.
3. Function Pointers: Pointers can also point to functions, known as function pointers.
Function pointers allow for selecting and calling different functions at runtime, providing
flexibility and extensibility to programs. They are often used in advanced programming
Example
#include <stdio.h>
struct Point {
int x;
int y;
};
point->x = x;
point->y = y;
int main() {
initializePoint function
initializePoint(pointerToMyPoint, 3, 4);
printPoint function
printPoint(pointerToMyPoint);
return 0;
1. Structures: - Structures are user-defined data types that can hold multiple variables
of different data types under one name. - Each variable within a structure is called a
member or field. - Structures provide a convenient way to organize related data and pass
you can avoid making copies of large structures when passing them as function arguments,
used for dynamic memory allocation of structures on the heap using functions like ‘malloc‘.
- Dynamic allocation allows you to create structures at runtime and manage memory
efficiently.
5.3.1 Summary
A pointer is nothing but a memory location where data is stored. A pointer is used to
access the memory location. There are various types of pointers such as a null pointer,
wild pointer, void pointer and other types of pointers. Pointers can be used with array
and string to access elements more efficiently. We can create function pointers to invoke a
pointer arithmetic. Pointers can also point to function which make it easy to call different
functions in the case of defining an array of pointers. When you want to deal different
Chapter 6
File Handling
So far the operations using the C program are done on a prompt/terminal which
is not stored anywhere. The output is deleted when the program is closed. But in
the software industry, most programs are written to store the information fetched
from the program. The use of file handling is exactly what the situation calls for.
In order to understand why file handling is important, let us look at a few features
of using files:
– Reusability: The data stored in the file can be accessed, updated, and deleted
anywhere and anytime providing high reusability.
– Efficient: A large amount of input may be required for some programs. File
handling allows you to easily access a part of a file using few instructions which
saves a lot of time and reduces the chance of errors.
– Storage Capacity: Files allow you to store a large amount of data without
having to worry about storing everything simultaneously in a program.
Binary Files
A file can be classified into two types based on the way the file stores the data. They
– Text Files
– Binary Files
C file operations refer to the different possible operations that we can perform on a file
in C such as:
– Creating a new file – fopen() with attributes as “a” or “a+” or “w” or “w+”
The fopen() function can not only open a file but also can create a file if it does
not exist already. For that, we have to use the modes that allow the creation of a
file if not found such as w, w+, wb, wb+, a, a+, ab, and ab+.
Syntaxa:
FILE *fptr; fptr = fopen(”filename.txt”, ”w”);
The file read operation in C can be performed using functions fscanf() or fgets().
Both the functions performed the same operations as that of scanf and gets but
with an additional parameter, the file pointer. There are also other functions we
can use to read from a file. Such functions are listed below:
Function Description
fscanf() Use formatted string and variable arguments list to take input from a file.
fgets() Input the whole line from the file.
fgetc() Reads a single character from the file.
fread() Reads the specified bytes of data from a binary file.
The file write operations can be performed by the functions fprintf() and fputs()
with similarities to read operations. C programming also provides some other func-
tions that can be used to write data to a file such as:
Function Description
fprintf() Similar to printf().
fputs() Prints the whole line in the file and a newline at the end.
fputc() Prints a single character into the file.
The fclose() function is used to close the file. After successful file operations, you
must always close a file to remove it from the memory.
Syntax of fclose()
fclose(filep ointer);
6.9.1 Summary
File handling in C involves manipulating files using file pointers and functions from
the standard library. Key operations include opening, reading, writing, and closing
files. You specify file modes like ”r” for reading or ”w” for writing. Error handling
is crucial, and files can be in binary or text mode.
Part I
Microsoft Office
Chapter 7
MS Excel
Microsoft Excel was first introduced on September 30, 1985. It was developed by Mi-
crosoft Corporation and initially released for the Apple Macintosh computer. Excel
is part of the Microsoft Office suite, which also includes other popular productivity
software like Microsoft Word and Microsoft PowerPoint.
Shortcut keys
The use of shortcut keys in Excel is one of the main features of this powerful
spreadsheet program. MS Excel has an extensive range of shortcut keys that help
users reduce their working time. The keyboard shortcuts are essential alternatives
to using a mouse or a touchscreen to perform most excel commands instantly.
Since Excel has a pretty long list of shortcut keys, we discuss the few essential Excel
shortcuts keys below:
2. Data Entry and Manipulation: You can easily enter data into the cells, edit
it, and perform various data manipulation tasks like copying, cutting, and pasting
data.
3.Charts and Graphs: You can create various types of charts and graphs to
visually represent and analyze data. Excel offers a wide range of chart options for
better data visualization.
4.Formulas and Functions: Excel provides a powerful formula engine that en-
ables you to create calculations using mathematical operators and built-in functions.
Formulas allow you to perform complex calculations and automate tasks.
5.Data Analysis Tools: Excel provides tools like pivot tables, data validation, and
filters that help you analyze and summarize data, find patterns, and gain insights
from large datasets.
6.Conditional Formatting: This feature lets you apply formatting to cells based
on specific conditions. It’s useful for highlighting important data or visualizing data
trends.
7.Data Import and Export: You can import data from various sources like text
files or databases, and export Excel files to different formats, making it easy to share
and exchange data.
8.Formatting and Styling: Excel allows you to format cells, rows, and columns
to customize the appearance of your data. You can change fonts, colors, and apply
borders to make your data more visually appealing.
10.Data Protection: Excel offers features for protecting sensitive data, such as
setting passwords to protect sheets or workbooks, ensuring data security.
11. Data Validation: You can define rules to control the type and range of data
that users can enter in cells, reducing the risk of errors in your data.
12.Macros: Advanced users can create and run macros, which are sets of recorded
actions, to automate repetitive tasks and streamline workflows.
7.2.1 Summary
Chapter 8
MS Word
Tttle bar
This is a close-up view of the Title Bar, where file information is located. Notice
the three buttons on the right side, controlling program features. The Ribbon Menu
System The tabbed Ribbon menu system is how you navigate through Word and
access the various Word commands. If you have used previous versions of Word,
Ribbon
The Ribbon system replaces the traditional menus. Above the Ribbon in the upper-
left corner is the Microsoft Office Button. From here, you can access important
options such as New, Save, Save As, and Print. By default the Quick Access Toolbar
is pinned next to the Microsoft Office Button, and includes commands such as Undo
and Redo.
Toolbars provide ”shortcuts” to commands also found in the Menu Bar. Toolbars
are usually located just below the Menu Bar and exist to offer another way to
perform the same task. The most commonly used commands in MS Word are also
the most accessible. Some of these commands are:
Keyboard
In order to use MS Word effectively, you must input commands using both the
mouse and the keyboard. The above image of a keyboard may closely resemble (if it
is not identical to) the keyboard in front of you; learning just a few certain keys will
help to improve your efficiency in typing as well as present you with more options
within the program. The following is a list of commonly used keys that have special
functions in MS Word (key functions can change depending on which program you
are using):
3. Shift: This key, when pressed WITH another key, will perform a secondary
function.
5. Tab: This key will force the cursor to indent, or jump forward 10 spaces.
6. Caps Lock: This key will present the capitalized version of each letter key.
7. Control (Ctrl): This key, when pressed WITH another key, performs as short-
cut.
9. Number keypad: This is a redundant keypad existing only for user preference.
10. Arrow keys: Like the mouse, these keys are used to navigate through the
document.
Text Entry and Editing: Users can easily enter and modify text in a document,
allowing for seamless content creation and revision.
Images and Graphics: Users can insert images, illustrations, and other graphics
Tables and Charts: MS Word allows users to create tables and insert charts for
organizing and presenting data in a structured manner.
Headers and Footers: Users can add headers and footers to their documents,
which appear at the top and bottom of each page, respectively.
Review and Collaboration: MS Word has features for tracking changes, adding
comments, and enabling real-time collaboration with others during document edit-
ing.
Spelling and Grammar Checking: The software includes built-in spelling and
grammar checking tools to help users identify and correct errors in their text.
9.Page Layout: Users can control the page layout, paper size, orientation, and
page margins to achieve the desired document appearance.
8.3.1 Summary
Chapter 9
MS Power point
Features of MS PowerPoint
2.Slide Design and Formatting: The software offers a wide range of pre-designed
templates and customizable themes, enabling users to create professionally designed
slides with consistent formatting.
4.Slide Show Mode: Users can present their slides in a full-screen mode, using
tools like presenter view, annotations, and timers to assist during the presentation.
7.Charts and Diagrams: Users can easily create various types of charts, graphs,
and diagrams to visualize data and information effectively.
8.Notes and Handouts: Users can add speaker notes to each slide for reference
during the presentation and generate handouts for the audience to take away.
Microsoft PowerPoint was introduced on April 20, 1987, for the Apple Macintosh
computer. Since its inception, it has become a standard tool for creating and deliv-
ering presentations in various fields and industries. Its intuitive interface, extensive
features, and seamless integration with other Microsoft Office applications make it
a preferred choice for individuals, educators, business professionals, and speakers
for creating compelling and impact full presentations.
9.1.1 Summary
Chapter 10
MS Access
It helps the users for managing the related data more efficiently than Microsoft Excel
or other applications of spreadsheets. Users can easily analyze the large amount of
data stored in it.
It is not used to create large or enterprise-level databases but mainly used to cre-
ate small databases. For the large databases, Microsoft provides the SQL server
database engine.
Tables
Access, firstly, you have to create a table in that database. You can also relate a
specific table to other tables, and easily define the primary key in that table.
Relationships
Relationships are the links or connections, which are formed between the one or
more tables in the database. There exist following four types of relationships:
1.One-to-One Relationship
2.One-to-Many Relationship
3.Many-to-One Relationship
4.Many-to-Many Relationship
Queries
Queries are the commands, which are used to retrieve the data or information from
the database. It also allows you to insert the information in the MS Access database.
Forms It is an object or a component, which helps the users for entering the data
in the table of any database by an interface. Any user can easily display the data
of the database.
Reports When the users inserted the data in the database, then they can easily
view their information in an organized manner by running the reports. Unlike forms,
the reports cannot be edited.
Macros
Macros are used for performing the repetitive tasks on reports and forms in the MS
Access database. It also allows the user for adding functionalities to forms, controls,
and reports.
Modules
Modules are used to perform the automating routine operations and user-defined
functions which are written in VBA. Any user can easily use these modules from
anywhere in the MS Access database.
10.1.2 Summary
MS Access is used to store large amount data in an organised and efficient manner.
It allows you to create tables,forms, queries and reports to manage your data.Ms
Access can be used to develop application software and is generally used data archi-
tects, software developers and manage account bills.Store data in the form of tables
and edit or customise them later as per the requirement of the user
Chapter 11
11.1 Introduction
There are three basic types of email protocols: SMTP, POP3, and IMAP. SMTP
(Simple Mail Transfer Protocol) is used to send mails over the internet. It is efficient
and reliable for sending emails. POP (Post Office Protocol) is used to retrieve email
for a single client. It allows to access mail offline and thus, needs less internet time.
IMAP (Internet Message Access Protocol) is used to retrieve mails for multiple
clients. It allows to access email without downloading them and also supports email
download1.
Networking emails are a social lubricant that keeps the business world working.
An email for networking can create a new connection or maintain an old one that
can transform your career. Writing a networking email can be challenging as you
must strike the right tone, making a personal connection but staying professional2.
In a hybrid work environment, sending an effective introductory email is a critical
Email protocols are a collection of protocols that are used to send and receive
emails properly. The email protocols provide the ability for the client to transmit
the mail to or from the intended mail server. Email protocols are a set of commands
for sharing mails between two computers. Email protocols establish communication
between the sender and receiver for the transmission of email. Email forwarding
includes components like two computers sending and receiving emails and the mail
server. There are three basic types of email protocols. Types of Email Protocols:
Three basic types of email protocols involved for sending and receiving mails are:
– SMTP
– POP3
– IMAP
Simple Mail Transfer Protocol is used to send mails over the internet. SMTP is an
application layer and connection-oriented protocol. SMTP is efficient and reliable
for sending emails. SMTP uses TCP as the transport layer protocol. It handles the
sending and receiving of messages between email servers over a TCP/IP network.
This protocol along with sending emails also provides the feature of notification
for incoming mails. When a sender sends an email then the sender’s mail client
sends it to the sender’s mail server and then it is sent to the receiver mail server
through SMTP. SMTP commands are used to identify the sender and receiver email
addresses along with the message to be sent.
Some of the SMTP commands are HELLO, MAIL FROM, RCPT TO, DATA,
QUIT, VERIFY, SIZE, etc. SMTP sends an error message if the mail is not delivered
to the receiver hence, reliable protocol.
Post Office Protocol is used to retrieve email for a single client. POP3 version
is the current version of POP used. It is an application layer protocol. It allows
to access mail offline and thus, needs less internet time. To access the message it
has to be downloaded. POP allows only a single mailbox to be created on the mail
server. POP does not allow search facilities
Some of the POP commands are LOG IN, STAT, LIST, RETR, DELE, RSET, and
QUIT.
Internet Message Access Protocol is used to retrieve mails for multiple clients.
There are several IMAP versions: IMAP, IMAP2, IMAP3, IMAP4, etc. IMAP is an
application layer protocol. IMAP allows to access email without downloading them
and also supports email download. The emails are maintained by the remote server.
It enables all email operations such as creating, manipulating, delete the email with-
out reading it. IMAP allows you to search emails. It allows multiple mailboxes to
be created on multiple mail servers and allows concurrent access. Some of the IMAP
commands are: IMAPL OGIN, CREAT E, DELET E, REN AM E, SELECT, EXAM IN E, andL
11.2 Networking
11.2.1 Introduction
There are several types of computer networks, including LAN (Local Area Net-
work), WAN (Wide Area Network), WLAN (Wireless Local Area Network), MAN
(Metropolitan Area Network), PAN (Personal Area Network), SAN (Storage Area
Network), and CAN (Campus Area Network). Each type of network serves different
needs and is defined by its geographic location, the protocols it uses to communi-
cate, the physical arrangement of its components, how it controls traffic, and its
purpose.
– Nodes: Nodes are devices that are connected to a network. These can include
computers, Servers, Printers, Routers, Switches, and other devices.
– Protocol: A protocol is a set of rules and standards that govern how data is
transmitted over a network. Examples of protocols include TCP/IP, HTTP,
and FTP.
– DNS: The Domain Name System (DNS) is a protocol that is used to translate
human-readable domain names (such as www.google.com) into IP addresses
that computers can understand.
– LAN: A Local Area Network (LAN) is a network that covers a small area,
such as an office or a home. LANs are typically used to connect computers
and other devices within a building or a campus.
– WAN: A Wide Area Network (WAN) is a network that covers a large geo-
graphic area, such as a city, country, or even the entire world. WANs are used
to connect LANs together and are typically used for long-distance communi-
cation.
– Cloud Networks: Cloud Networks can be visualized with a Wide Area Net-
work (WAN) as they can be hosted on public or private cloud service providers
and cloud networks are available if there is a demand. Cloud Networks consist
of Virtual Routers, Firewalls, etc.
These are just a few basic concepts of computer networking. Networking is a vast
and complex field, and there are many more concepts and technologies involved
in building and maintaining networks. Now we are going to discuss some more
concepts on Computer Networking.
11.2.5 Summary
Chapter 12
Conclusion
The duration of the internship, we were exposed to a wide array of subjects that
collectively enriched our understanding and skill set. Under the guidance of expe-
rienced professionals, we delved into the fundamental concepts of C programming,
equipping us with a comprehensive grasp of its principles and real-world applica-
tions. This foundational knowledge served as a springboard for exploring more
advanced topics.
We also delved into practical aspects, such as data manipulation with arrays and
strings, the intricate world of memory management using pointers, and the essential
art of file handling for persistent data storage. Additionally, our hands-on experience
with Microsoft Office tools enhanced our ability to create and present content effec-
tively. Lastly, the significance of networking and mailing was highlighted, giving us
insight into the seamless communication and information sharing crucial in today’s
interconnected world. These diverse insights collectively broadened our horizons
and positioned us for future success in programming and beyond..
Bibliography
[1] References:
– Tutorials point
– ANCI C E.BALAGURUSAMY