Wednesday, March 10, 2021

Overview of a computer system (Computer Fundamental)

 1. Data and Data processing:

Data: Data is a collection of Facts and Figures.

Data Processing: Data processing refers to the transformation raw data into meaningful output. There are three types of data processing methods.

1. Manual data processing

2. Mechanical data processing

3. Electronic data processing.

Data processing Cycle:

1. Data Collection

2. Preparation

3. Input

4. Processing

5. Output

Information: It is the processed form of data, which makes some sense and helps in reaching a conclusion. E.g. Time Table, Report card, Phone book etc.

Computer Architecture:

[Processor(CPU)- (Control Unit, Arithmetic Logic Unit, Register Unit) ⇆ Memory, Input, Output)]

1.2 Hardware: All the physical components of computer system are called hardware. E.g. Keyboard, Mouse, Monitor, CPU, Scanner, Printer.

Component of hardware: 

1. Input device: The device which gives the data/instruction into the machine to process/communicate to obtain result as input. E.g. Keyboard, mouse, joystick, scanner, light pen, OCR, OMR, MICR, Bar Code Reader, Tracker, Touch pad, Biometric reader, smart card, , web cam, microphone, remote, x-ray, punch card etc.

→ Mouse: It is direct and pointing device. (used only GUI), developed by Douglas Engelbart in 1964.

→ Keyboard: Most common useful input device. developed by Christopher Sholes in 1968.

→ Scanner: drawing or photograph/text to convert it into digital form.

2. Processing device: CPU(Central Processing Unit) is the brain of computer. Heart of computer. It has three unit part section.

i. Control Unit (CU): The Unit controls the operation of all part of computer. nerve center, supervisor, transfer, convert, manage coordinates the different unit.

ii. Arithmetic and logical unit (ALU): Actually processing unit/calculating unit, worker unit, arithmetic operation -, +, *, <, >, + etc.

iii. Memory Unit (MU)/Register/Primary memory: The unit which is used to store data/program/while processing/working on. It is temporary memory.

CPU Machine cycle: (Fetch, Decode, Execute, Store/sequence)

3. Output device: The device gives the processed result. E.g. Monitor, printer, plotter, projector, LCD, COM, speaker. Types of output device: Softcopy and hardcopy.

→ Monitor: It is softcopy output device. developed by Allen B. Dumont in 1920.

→ Printer: It is most common hardcopy output device. It is External output device.

Types of Printer: Impact and non impact printer

i. Impact printer: produce more sound slow printer, Dot matrix and Daisy printer its speed is CPS (character per second)
Line, Drum, Band printer, its speed LPM (Line per minute) use in mainframe computer

ii) non-impact printer: It is fastest printer than other printer E.g. Laser printer, Ink-jet printer, electro static printer. speed measured by PPM (page per minute)

Types of printer based on speed:

i. Character/serial printer: Speed measure in CPS(Character Per Minute), Slow print, E.g. (dot matrix, daisy wheel, golf ball) printer.

ii. Line printer: Used in the mainframe computer, it cannot print /produce graphics/image, speed 200-600 LPM (Line Per Minute), E.g. (band, wheel, chain, drum, cylinder, bar, comb) printer, etc.

iii. Page Printer:  Common used printer, one page a time, best quality printer, speed PPM (Page Per Minute), E.g. (laser, ink-jet, thermal, solid ink, LCD/LED) printer.

Plotter: A plotter typically used to print large form graph, maps, engineering drawing, flex board, banners, big poster etc. high quality graphics, used in CAD flex board, poster, banner, CAE print map.

4. Input-Output device: Those device which can accept input and also produce output.
 
→ Touch screen: give the choose option/ input and output (both operation).
   
 → Modem: A modem converts the digital signal into the analog (modulator) and convert the analog into digital (demodulator). transmission media/network media. speed of modem is measured in Bound (bit) bit per second. communication channel/phone.
    
→ Headset: Used in application area of head set of Internet chat.

→ Fax: combination of scanner and printer.
    
→ Network card (NIC)/LAN card: It is used to link network computer for transmitting data.
    
→ Sound card/audio card: It is part of computer which manage it's audio input and produce output (audio).

5. Storage device: Computer Memory - Computer memory is any physical device capable of storing information temporary or permanently.

Types of Memory: 

Primary Memory: Any component that attach with system board that is called internal memory or the electronic circuit which hold data/ instruction in a computer unit run to be processed. It also called main memory, real memory, online memory. E.g. semiconductor memory (RAM,ROM), Bubble memory, Flash memory.

    Internal Memory
    A. Volatile memory: Volatile memory is a memory that loses its content when the computer hardware device loses the power/ power off or lost data automatically when power cut off. E.g. RAM, Resister, cache memory, virtual memory.
RAM: Temporary memory it allow read/write operation.
Types of  RAM:  Static RAM - expensive than DRAM, doesn't need refreshing circuit for rewrite data, faster than other RAM/DRAM.
                               Dynamic RAM: Cheap and slow SRAM, need refresh.  
  Cache memory: Faster memory than RAM and ROM but slow than Resister, types of cache (L1-L6), fastest is L1.
Virtual memory: It is method of illusion physical memory/ secondary memory.

B. Non- volatile memory: The contents of memory can't be lost/don't lose automatically when power off. E.g. ROM, Flash memory etc.

ROM: The code instruction written in ROM is called Firmware, fixed memory, program only manufacture time & it allow read only.
Types of ROM:  

i) PROM (Programmable Read Only Memory): - also called blank chip, write once time ROM, fixed memory.

ii) EPROM (Erasable Programmable Read Only Memory) :- reprogrammable chip/ROM, user can program many times/erase and write that, high voltage.

iii) EEPRPM(Electrically Alterable Programmable ROM) :-  reprogrammable chip with electric charge, it is also called flash memory (BIOS).

iv) EAPROM (Electrically Alterable Programmable ROM) : - store the CMOS setting, it can change by electrical current charge , but change one bit at a time.

v) Flash Memory (BIOS) : - Firmware: A program is store write in ROM chips, combination of hardware and software it is accessible during booting, it holds large amount of data. 

Secondary Memory: Data, program and information are permanently store, outside of mother board, system board with cable. E.g. Punch card, paper tape, magnetic tape,, flash drive, floppy disk, hard disk, zip disk, pen drive, super disk, CD, DVD, magnetic, optical disk, MO disk, Blu ray disk (random, direct access).

Hard Disk: made with metallic oxide in both side, faster and more space than floppy, developed by IBM team and Reynold Johnson at 1956.

Zip disk size: 100 MB, 250 MB and than 750 MB.

Floppy disk size: It can store Minimum 360 KB and Maximum store 1.44 MB.

CD (Compact Disk): Build by James Russel (1965),CD have 680 MB - 700 MB, direct random access.

DVD (Digital Video Disk) : made in 1995 by Philips company , DVD have 4.7 GB space, random/direct access.

6. Port: This is interacting point of two points. It connects point of computer and other device, such as CD ROM, Modem, Printer, Monitor, Mouse, Keyboard, Peripheral device.

Types Of Port: 
i) Serial Port: modem and oldest mouse, 1 bit at a time, 9 pin 25 pin (two types), speed 115 KB per second.

ii) Parallel Port: female port in computer, 25 holes/pin and used to connect printer, scanner port printer.

iii) IEEE port: Faster than serial port, 8 bit at a time.

iv) PS/2 Port: It is used to connect old computer mouse and keyboard.
v) USB (universal serial bus): It was introduce in 1997, plug and paly interface, automatic run drive, support 127 type device, speed 12 Megabit per second.

vi) VGA port: Connect monitor to computer video card, 15 holes, serial port it has holes.
 
vii) LPT port(line printer port): speed 8 bit at a time.

viii) SCSI port (Small computer system interface): scanner, USB, Zip drive connects, type (SCSI 1,SCSI 2,SCSI 3), speed: SCSI 1- 8 bit, SCSI 2 -16 bit, SCSI 3 - 32 bit per second.

ix) Midi Port (Musical instrument data interface) : connect midi keyboard, musical port.

x) Fire ware port: transfer large amount of data at very fast, speed 400-800 megabit per second.

xi) LAN port: Connect to network.

xii) AT (Advance Technology)/Din 5 port:  It is used connect AT Keyboard, 5 pin.

xiii) Game port:  15 pins.

xiv) Modem port: replace by USB port.

xv) Socket port: connect micro phone speaker to sound.

xvi) Rj-45 (Registered Jack): 8 pin, cat 5 cables.

xvii) RJ-11 port: used in phone cable.

xviii) Virtual port/ logical port: It it a number used in network.

Layout of Disk/Filing System:
        1. FAT file system (File allocation Table) oldest : FAT 12 support by MS DOS 4.0                 version and 8,3 file name.
        2. NTFS (New Technology File System) latest : Windows NT, 2000, XP, Vista, 7, 8,                 10 support the NTFS file system. 

Computer Software: The collection of instruction or logical components that instruct the hardware to perform specific task. E.g. DOS, Windows, MS word, excel tally etc.

Types of software: System Software and Application software

System Software: The software are dedicated to manage computer itself that is called system software. E.g. utility tool, DOS, Windows, Driver, language translator.

Application Software: A set of program that perform specific task/ activities for the user end user. E.g. word, excel tally, CAD etc.

Types of application system: Tailor and Package software

Tailor software: The software designed for single user needs requirements that is called tailor software. E.g. content management, bill management etc.

Package software: It is general purpose software for several/ multiple user/ to common requirements. E.g. word processing, presentation, database etc.

Computer Programming language:

1. Low level language: i) Machine level language/1GL/First generation language (0,1), ii) Assembly language (2GL/second generation language) symbolic/mnemonic code.

2. High level language: i) Procedure oriented language (3 GL) object oriented, ii) Non-procedure (problem) oriented language (4 GL), iii) Natural Language (5 GL).

Language Translator: Assembler, Compiler and Interpreter.

Different ware suffix term:
a. Firmware: The code/instruction is written in ROM chip is called Firmware.

b. Live ware: Like human ware but work in online.

c. Shareware: The copyright act program available in internet.

d. Human ware: Human ware is a hardware and software that emphasized user capability and design the user interface.

e. Freeware: The proprietary software that is available for used no cost with full version.

f. people ware: A personal who design, program and maintain the computer equipment.

g. Malware: The malicious program that disturb computer operation gather their sensitive information E.g. Trojan horse. 









Computer Networking Setup

BASIC  NETWORKING

1. What is a computer Network?
Ans: Two or more computers connected together and sharing resources.

2. What are network resources?
Ans: Any kind of software, hardware or information which can be set with sharing is called network resource. E.g. file/folder, drivers, optical drivers, printer/scanner, internet sharing (modem or router), windows desktop)

3. What is sharing?
Ans: This is the permission given to network users so that they can access our local resources.

4. Types of networks?
Ans: a. LAN: - Local area networks involved around the PC revolution and provide high-speed, fault- tolerant data networks that cover a relatively small geographic area or that is confined to a single building or group of buildings.
b. WAN: - The wide area networks cover broader geographic areas, often using transmission facilities provided by common carriers, such as telephone companies, to interconnect a number of LANs.
c. MAN: - The Special (WAN) can be used to connect number of computers from one location (city) to another city by using microwave transmission.
d. Internet: Public
e. Intranet (Internal network) Private network
f. Extranet (external network (Private network
g. VPN (Virtual Private Network) RRAS (Routing and Remote Access Server)

5. Requirement to create a network
               
 1. Planning and designing
          - LAN/WAN
          -Number of computers
          - Speed
          -Model (work group/ domain network)
 2. Network devices (Cable, Switch, Router, and Network Card)

3. All compute must be instated with network operating system (NT, 200, 2003, 2008, 2012)

4. All computers must use a common network protocol

i) Topology: - It defines the shape of network. There are two types of topology. 
a) Physical topology: - It defines how the network is physically connected. 
b) Logical topology: - It defines how communication takes places with the network.
a) Physical topology: -                                   
1. Bus topology: -

Specifications:                                      
i) Speed: 10 Mbps
ii) Cable: RGB/RGB58, connector: AUI/BNC                            
iii) Number of computers: 100|30                                  
iv) Distance: 500m|200m
                                                                                                                                           
2. Ring Topology: -
Specifications:                                                                                       
i) Speed: 10 Mbps
ii) Cable: RGB/RGB58, connector: AUI/BNC                            
iii) Number of computers: 100|30
iv) Distance: 500m|200m
               
3. Star Topology: -
             Specifications:
Speed: 10/100 |1000 Mbps
Cable: UTP/PTP
Connector: RJ-45                                                                     
Number of computers: 1024 Per Hub
Distance: 100m computer to switch                                                                               

4. Wireless: -                                          

5. Mesh Topology: -
 b) Logical topology: -

1. Bus: - This is the commonly used logical topology
- In this when one computer sends a message it can be seen by all computers but only destination computer will use it.
- If two or more computer were to send a message at once, a collision will occur solving down the network.

2. Ring: - This was used in token ring network.
- In this network a single token is passed among all computers and only computer with token can send.
- This network there are no send.
- In this network there are no collision.

3. Cellular (wireless): - this is same as logical bus but there is no physical connection.

6. Network devices: -

1. Network adapter (LAN and NIC: - All computers must have at least one LAN port (RJ45) Speed (10/100/1000Mbps)

2. Repeater: - It is used to extend distance of a single cable connection.

3. HUB: - This is the central device used in star networks
                - It allows us to connect more than two computers.
                - It comes according to speed 10/100/1000 Mbps and number of ports.

4. Bridge: - It is used to interconnect hubs.
                - It auto store physical address and performs traffic filtering.

5. Switch: - It functions both as hub and bridge.
    - It allows us to connect multiple computers and it can also perform traffic filtering using MAC address.

6. Router: - It allows us to inter connect different networks together.
                - If performs traffic filtering using logical address.

7. Network Cable: -

1. Coaxial cable: -Used in bus and ring networks.
                There are two types
                a) RGB (Thick net)
                Distance: 500m
                Connector AUI (Affachment Unit Interface)
                b) RGB58 (Thick net)
                Distance: 200m
                Connector BNC (British Naval Connectors)
               
 2. Twisted pair cables: - there are two types
                        a) UTP Unshielded. T. P (Green)
                        b) STP Shielded. T. P (White)
Category: -
Cat1: 1 Mbps
Cat2: 4 Mbps
Cat3: 10 Mbps
Cat4: 16 Mbps
Cat5: 100 Mbps
Cat5e: 1000 Mbps
Cat6: 4-10 Gbps

3. Coaxial cable: -
®     It is used for higher distances
®     It transfer data of data from in light signals
®     There is no interface
®     There are two types:
®     SMF – Single Mode Fiber
®     MMF – Multi Mode Fiber
®     Distance: - 5 km.

8. Crimping/ Clamping: -
®     This is the process of connectivity RJ 45 to STP/UTP cables.
®     There are methods:
a) Cross over: - This is used when interconnecting same types of devices.
E.g. Computer to Hub
Hub to Hub
Switch to Switch
Switch to Hub
b) Straight through: - This is used when interconnecting different devices.
E.g. Computer to Hub
Computer to Switch

Computer to Router.
 1. Cross over to color table: -
Pin
End1
End2
1
White/Orange
White/Green
2
Orange
Green
3
White/Green
White/Orange
4
Blue
Blue
5
White/Blue
White/Blue
6
Green
Orange
7
White/Brown
White/Brown
8
Brown
Brown

2. Straight through to color table: -
Pin
End1
End2
1
White/Orange
White/Orange
2
Orange
Orange
3
White/Green
White/Green
4
Blue
Blue
5
White/Blue
White/Blue
6
Green
Green
7
White/Brown
White/Brown
8
Brown
Brown


9. MAC Address (Media Access Control): -
®     It is also called hardware/physical address.
®     It is a unique 6 byte address located in every network and (LAN/WLAN)
®     It allows network cards to be able to send receive data in a network
®     Mac is set during manufacturing.
®     To view Mac address
Open Dos
Use the following command get mac
00-BC-2F-EG-12-34
IEEE (Institute of Electronics and Electrical Engineers)

10. IP (Internet Protocol) Address: -
®     It is also called logical address
®     It is also a unique 32 bit address given to each network computer.
®     There are two ways to set IP address: -
a) Manually (Static IP)
b) Automatically through (Dynamic Host Configuration Protocol) Dynamic IP
®     There are five classes of IP address:
®     Class A, Class B, Class C, Class D, Class E.
®     Class A, B, C used in networking and class D used for multi cast and E used for research.
®     IP is divided into four octets which are separated by dots.
®     The class of IP is defined by value given in 1st octet.
®     Each class of IP has two parts: Network ID All computers in the same network must have same network ID number and Host ID All computers must have unique host ID number.
Class
1st octet range
Network ID octet
Host ID octet
No. of Hosts
A
1-126
1st only
2nd , 3rd, 4th
1,67,77,214
B
128-191
1st and 2nd
3rd, and 4th
65,534
C
192-223
1st, 2nd, and 3rd
4th only
254
D
224-239
-
-
-
E
240-255
-
-
-


11. Steps to set of IP Address: -
Step1: Open control panel.
Step2: Open Network and sharing center.
Step3: Form left panel and select change Adapter Setting
Step4: Open properties of Ethernet (Local area connection)
Step5: From list select Internet protocol (IPv4 and click on properties.
Step6: Select option use the following IP address
Step7: Type required IP and select inside subnet it will be auto set.
Step8: Ok and close.

12. Ipconfig command: - this can be used to view IP address
                Syntax: ipconfig [Enter]
                Syntax: ipconfig/all [Enter]

13. Ping command: - This is used to check connection between network devices.
                Syntax: ping ip address
                Example: ping 192.168.o.1 [Enter]
                (Note: If we get reply 4 times and loss = 0% then connection is working.
If there is a problem message: destination host unreachable is request timed out.)
Syntax: tracert google.com

14. IP address are divided into two categories
a) Public IP: - These addresses are used in the internet. We have to purchase them.
b) Private IP: - These addresses are free it can only be used to create local network. These addresses cannot be used within internet.
Private IP
Public IP
Class A: 10.0.0.0 to 10.255.255.255
1-9, 11-126
Class B: 172.16.0.0 to 172.31.255.255
128.0.0.0 to 172.32.0.0 to 191.255.255.255
Class C: 192.168.0.0 to 192.168.255.255, 192.168.255.255
192.0.0.0 to 192.167.255.255, 192.169.0.0 to223.255.255.254

15. Creating Workgroup network (Peer to Peer): -
1. We need to set a common workgroup name for all computers. (Up to 20 computers)
Steps of create workgroup on network.
Step1: Open computer properties.
Step2: Select advances system setting.
Step3: Select computer name tab click on change.
Step4: Give a name for computer and work group name.
Step5: Click on ok > ok> and restart on computer.
2. We need to change security setting of windows to allow communication.
Steps:
Step1: Open control panel.
Step2: Open administrative tools.
Step3: Open local security policy.
Step4: From left panel open local policies and select security settings.
                i) Network access: allow anonymous SID/Name translation (set to enable)
ii) Network access: do not allow anonymous enumeration of SAM accounts (Disable).
iii) Network access: sharing and security model for local accounts (Classic).
3. We need to enable file and printer sharing
Steps:
Step1: Open control panel.
Step2: Open network and sharing center.
Step3: From left panel select change advanced sharing settings.
Step4: turn on network discovery.
Step5: turn on file and printing sharing.
Step6: Save and close.
4. All administrator accounts of all computers must be set with a password. Blank passwords don’t work in networking accessing network computers.
Method1:
                a) Open computer icon
                b) Open network icon
                c) Open required computer name
Method2:
                Go to RUN and use following command
                \\computername [Enter]
Method3:
                Go to RUN and use following command
                \\ipaddress [Enter]

16. Sharing resources: -
Method1:
                a) Open properties of folder > select sharing tab.
                b) Select advance sharing
                c) Select option shares this folder and gives a share name.
                d) If necessary give permissions (default setting is read only)
                e) Ok > ok.
Method2:
                a) Open computer management
                b) Open shared folders and right click on shares > select new share.
                c) In welcome screen click next.
                d) Click on browse and select folder to share.
                e) Click next and give a name.
                f) Give permission > Finished.

17. Hidden sharing: -
®     This is used to hide shared folders.
®     This is useful to share folder for private use only.
®     When sharing a folder give a $ sign at end of the share name.
®     To open a hidden shared folder we need to know its name then go to run.
®     \\computer\sharename$ >ok.

18. Network drive: - This is used to connect share folder of any network computer.
Step1: Open network.
Step2: Open required computer name.
Step3: right click on the required folder and select map network drive > Finished.

19. Remote desktop connection: -
®     This is used to connect to network computers OS and it will allow us to use all files, programs and devices connected to that device.
®     In order to connect the remote computer must allow remote desktop connections.
Step1: Open computer properties.
Step2: Select remote setting.
Step3: Allow remote desktop > ok > close.
Steps to connect
-          Go to RUN and type mstsc >ok
-          Give remote computer IP address or computer name > connect.
-          Give user name and password > ok.

20. Printer sharing: -
®     Printer device is connected directly to a system which will be called print server.
®     The driver software must be installed then we can share it to all other network computers.
Steps:
1. Open control panel.
2. Open devices and printers.
3. Right click on printer and select printer properties
4. Ok > close.
Steps to connect to network printer:
1. Open network.
2. Open print server computer.
3. Open printer name> message to connect select > Yes.

21. DSL (Digital Subscriber Line)/ADSL (Advance Digital Subscriber Line) router setup: -
Step1: Make sure we have received Dynamic IP from router.
Step2: Open any browser and address bar type IP of router and press enter.
Step3: To set of internet Quick start.
Step4: PPPoE
VPI: 8, VCI: 81
Step5: SSID (Service set identifier): Wi-Fi name
Encryption: WPA 2
Pre shared key: password
To Wi-Fi password change: Maintainer: User name or password:

22. Steps to create server:
                Step1: Install server Operating System.
                Step2: Set IP address.
                Step3: Give same ID prefer DNS server.
                Step4: Start > Administrative tools > Server manager.
                Step5: Open Roles > Add Roles.
                Step6: Tick to active directory domain services > Add > Next > Next > Install.
                Step7: From roles select Active directory domain services.
    Step8: Run the active directory domain services installation wizard (dcpromo.exe).
                Step9: Welcome screen click next.
                Step10: Select create a new domain in a new forest.
                Step11: Type the fully domain name [mei.com] > next.
                Step12: Select forest functional level > next.
                Step13: Domain functional level > next > next > next.
    Step14: Directory service password > next > finish > restart computer.

23. Steps to remove servers:
 Step1: Run > dcpromo.exe > Ok >next.
 Step2: Click tick delete domain >next > next.
 Step3: Tick delete all > next.
 Step4: Give new password for administrator password > next > next.
Step5: Finish and restart computer.
Step6: Open server manager.
Step7: Roles > Remove Roles.
Step8: Remove.

24. Adding client computers to domain:
Step1: Set IP address > in DNS server give IP of domain controller.
Step2: Open computer properties > Select change setting > select change > give a name for computer > select domain and type domain name > ok.
Step3: Type user name and password server.
Step4: After finished and restart computer.

25. Creating domain user accounts:
                Step1: Start > Administrative tools > Active directory users computers.
                Step2: Open domain name > select users > right click on users > new > user.
                Step3: Give full name and user name > next.
Step4: give password (Capital latter, small latter, number, symbol (minimum 8 characters)

26. Making user as administrator:
                Step1: Open active directory users and computers.
                Step2: Open properties of user accounts.
                Step3: Select member of.
                Step4: click on Add (domain administrative)
                Step5: From list select domain administrative > Set primary group.                           
                Step6: Select domain users Remove

27. Creating domain user groups:
                Step1: Open active directory users and computers
                Step2: right click on user folder select group.
                Step3: Give a name for group > ok.
Step4: Open group > Members > Add > name.

28. Managing user accounts: - to change user information right click on user account and select properties.
1. General tab:
-          First name, last name, email, website.
2. Accounts:                                                                                                    
- we can change user logion name.
- accounts expire.
- Log on To: This can be used to control which computer user can login.
- Logon hours: this can be used to control logon timing of user.

29. Home folder: - this is a network drive which is auto connected to any computer that user logon To. This folder is stored in server
                Step1: create a folder in server.
                Step2: Share this folder and give share permission on and full control.
Step3: Select security > click on edit > Click on Add domain users > give control allow.
Step4: Active directory user and computers.
Step5: Open properties of user accounts.
Step6; Select profile > Connect \\IPAddress or computer name\sharename\%username%

30. Group Policy: - In a domain network we can apply group policy to all client computers from central location (Server).
                Step1: Open active directory users and computers.
                Step2: right click on domain name > new > organizational unit.
                Step3: Give a name > ok.
                Step4: Add users to this folder.
                Step5: Start > Administrator tools > group policy management.
                Step6: Open network name.
                Step7: Open domain folder > open domain name.
Step8: Select organizational folder right click and select create a GPO in this domain.
Step9: Give a name.
Step10: Right click and select edit.

31. Rooming profile: -
Steps:
1: Create a folder in a server with any name.
2: Share this folder and give share permissions full control.
3: In security tab add domain users and give full control allow.
4: Open active directory users and computers > Open properties of required user account.
5: Select profile tab.
6: In profile path give location of folder. \\ipaddress\foldername\%useername%.

Microsoft Excel

Limitation of Excel: Maximum number of Row: 65,536(office 2003) and 1048576(office 2007) Maximum number of column: 256 (office 2003) and 163...