SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Arush Vatsal Unadkat
Malicious Software are
the programs that
generate threats to the
computer system and
stored data.
Virus
Worm
s
Trojan
Horses
Spyware
Malicious Software
• Virus (Vital Information Recourses
Under Seize) is a small program or a
small code segment that is capable of
attaching itself to existing programs of
files and infect them as well as
replicate itself without users
knowledge or permission. It spreads
by external devices like CDs, pen
drives, or email and executes when an
infected program is executed. If an
infected computer gets in contact gets
in contact with an un infected
computer virus may pass onto the
uninfected system and destroy the
files.
Viruses
Boot Sector
File Infecting
PolymorphicStealth
Multipartite
This type of virus
infects the
master boot
record of the
system by either
moving to
another sector or
replacing it with
infected one.
This type of virus
infects the
executable files
or files containing
executable code
such as .exe,
.com, .dll, .sys,
etc.
I
N
F
E
C
T
I
N
G
V
I
R
U
SThese viruses add their code to
executables, which when infected may
send viral code other executables.
When the
infected file is
opened or
used the
virus may
overwrite the
file and cause
permanent
damage to
the content of
the
overwritten
file.
This type of virus changes its code as it propagates
from one file to another. Therefore, each copy that is
generated appears different from others. This makes
the polymorphic virus difficult to be detected by the
antivirus.
Stealth VirusThis type of
virus attempts
to conceal its
presence from
the user
and/or
antivirus
software by
using various
techniques.
A multipartite virus is a
computer virus that infects
multiple different target
platforms, and remains
recursively infective in each
target.
V
I
R
U
S It attempts to attack both
the boot sector and the
executable, or programs,
files at the same time.
This type of virus can re-infect a system over and
over again if all parts of the virus are not
Worms
A computer worm is a
standalone malware co
mputer program that
replicates itself in order
to spread to other
computers. Often, it
uses a computer
network to spread itself,
relying on security
failures on the target
computer to access it.
Unlike a computer virus,
it does not need to
attach itself to an
existing program.
Both worms and viruses tend
to fill computer memory with
useless data thereby
preventing you from using
memory space for legal
applications or programs.
T
R
O
J
A
N
Trojan horse is a program
that appears to be legal and
useful but concurrently does
something unexpected like
destroying existing
programs and files . As it
does not replicate itself in
the computer it is not a
virus.
However it usually opens
a way for the other
malicious software like
viruses to enter into the
computer system. It may
also allow unauthorized
users access the
information stored in the
computer.
h
o
r
s
e
s
Spyware is any technology that aids
in gathering information about a
person or organization without their
knowledge.
On the Internet spyware is programming that is put in
someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties.
Spam refers to the unsolicited or
unwanted mail or message sent to a
large number of individuals. It is
forced on to the people who would
otherwise choose not to receive such
mails.
In addition it may
also be used to
spreading viruses or
It may flood the e-mails box
due to which no other mail can
be received.
The recipient time is
wasted in reading a
the unwanted e-
mails.
Network
bandwidth is
wasted in sending
such mails.
A hacker is someone who seeks and exploits
weaknesses in a computer system or
computer network. Hackers may be motivated
by a multitude of reasons, such as profit,
protest, or challenge.
The hackers that break
into the computer security
with non-malicious
reasons are known as
The hackers who break into the
computer security without
administration for ulterior purposes
such as theft, terrorism, etc. are
An antivirus program
scans the hard the
hard disc for viruses.
After scanning the
software removes the
viruses, so that the
computer is able to
perform efficiently
again.
Most anti-
virus
software
have
an auto
update
feature that
enables the
computer to
download
the definition
of new
viruses.
The updating
of a antivirus
software is
important
because the
virus
'creators’ are
always in the
process of
developing
The updated virus definitions is
should always be maintained so
that users can operate their
computers without any problem.
Data loss is
very
common to
all
Some failure such as hardware
failure, software failure, or natural
disaster may occur resulting in
data loss.
Data backup refers to making duplicate copies of your data and storing them onto some
permanent storage device such as pen drive, portable hard disc, DVD, CD, etc.
The data backup is essential for
recovering the data as quickly,
and with as little damaging impact
on users, as possible.
Full Backup
Method
Incremental
Backup Method
Differential
Backup Method
Mirror Backup
Method
Full
Backup
Method
This is the basic
backup method
that backups up
all the files on the
computer the
computer system.
Generally
performed on a
weekly or monthly
basis.
Consumes a lot of
time as of time as
well as secondary
memory.
Incremental
Backup
Method
This method backs up
only those files that
have been modified
since the most recent
backup, thereby
making each backup an
increment to the last
backup.
A single backup is
not sufficient to
restore all the
files, which makes
the restoring
process slower. It consumes
less time and
memory
space to take
a backup.
Differential
Backup
Method
This method backs up
all the files that have
any difference from
the last backup.
Restoring files require
the full backup and
only the last
differential backup.
This makes restoring
little faster than
incremental backup.
Backing up is slower
and storage
requirement is higher
than incremental
backup.
Mirror
Backup
Method
The mirror backup
method copies the
files or folders being
backed up without
any compressions.
It keeps each file
separate in the
destination thereby
making the
destination a mirror
of the source.
The feature makes
this methods fastest
of all methods.
However, it requires
more storage space
as compared to other
methods.
Firstly, this method not only
enables you to recover data
after file corruption or
computer failure, but you can
also recover data even if a
natural disaster
has destroyed everything at
your place.
Secondly, you can access your data anywhere in the
world and at anytime. In addition, the files to be backed
up are encrypted
by your computer before being sent to the remote
This ensures the protection of
your data from unauthorized
access.
However, it is not affordable
for individual users or small
business to subscribe for
online backup services.
Sometimes, you lose
important data because of
disk failure, accidental
deletion of files, etc
A recover tool
enables you to
recover lost
data.
The situation even
becomes worse if
you are not having
backup of data.
Suppose you friend forgot his passport at your house
and went away. You want to send it to him but you don’t
want anyone else to steal the passport.
How will you do it?
This
picture
is a hint
to the
puzzle.
This
picture
is a hint
to the
puzzle.
You will put the passport in a
box and lock it with a lock and
key. This key will Remain with
you. Then you send the box to
your friend. Your friend will put
another lock on it with another
key that will remain with him.
He will send it back. You will
unlock your lock with your key
and send it back to him. He will
unlock his lock with his key and
take his passport.
Encryption and
decryption works
in the same way.
A firewall is a software or hardware-based
network security system that controls the
incoming and outgoing network traffic by
analyzing the data packets and determining
whether they should be allowed through or
not, based on applied rule set.
Many personal
computer oper
ating
systems includ
e software-
based firewalls
to protect
against threats
from the public
Internet.
Many routers t
hat pass data
between
networks
contain firewall
components
and,
conversely,
many firewalls
can perform
basic routing
functions.
All Traffic in either
direction must pass
through the firewall.
The firewall
itself is immune
to penetration.
Only traffic
authorized by the
local security policy
must be allowed to
Social Networking refers
to the grouping of
individuals to share their
common interests or
activities
Nowadays, online social networking
is gaining popularity and a number
of websites (known as social sites)
are available for creating online
communities.
Introduction
To
ICT
ICT has become the integral part of our
working and living environments and
will continue to be a powerful resource
for business.
ICT stands for Information and
Communication Technologies.
These technologies include
computers, internet,
broadcasting technologies (radio
and television) and telephony.
Due to globalization and other factors,
these technologies are changing and
improving dad by day.
Benefits of ICT
ICT provides several significant
benefits and today , it has been used
everywhere and in every field including
education, healthcare, governance,
etc.
Some important
benefits of ICT are
as follows:-
• Education
• Healthcare
• Governance
The use of sounds effects,
comic characters and scripted
act attracts the students and
helps them to understand the
lessons by getting involved
with the lessons being
delivered. This keeps the
process of learning new
concepts very lively.
Education
The introduction of ICT
in education has made
the learning fun and
interesting for student
now a days.
Many
illustrations
are given in
the form of
video clips
which help
students to
understand
quickly.
This technology has made the scope for error very minor and helps the
doctor to perform surgeries remotely
The scanners process
the data present in
them in a readable
format,
microprocessors help
to control many
medical devices like
pacemaker and the
computer-guided
lasers are used for
various kinds of
surgeries.
Governance
All or most of the information
generated by the government
is easily accessible through
the electronic media, such as
Internet, mobile phones, etc.
The use of ICT in governance
practices offers better interaction
between government, its
institutions and people. This
leads enhanced governance
practices and effective
This increases the
transparency of
government and
administration to the
business as well as its
citizens.
Societal Impacts Of IT (Class X)

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security ritik shukla
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityMd Nishad
 
Tcs cybersecurity for healthcare
Tcs cybersecurity for healthcareTcs cybersecurity for healthcare
Tcs cybersecurity for healthcareComtech TCS
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service AttacksHansa Nidushan
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information securityAYESHA JAVED
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 
Digital Security
Digital SecurityDigital Security
Digital Securityaccenture
 
Social Impact of Information Technology
Social Impact of Information TechnologySocial Impact of Information Technology
Social Impact of Information TechnologySanjeev Gupta
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka JhaAnushka Jha
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amosAmos Oyoo
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...Intellipaat
 

Was ist angesagt? (20)

Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Tcs cybersecurity for healthcare
Tcs cybersecurity for healthcareTcs cybersecurity for healthcare
Tcs cybersecurity for healthcare
 
Basics of Denial of Service Attacks
Basics of Denial of Service AttacksBasics of Denial of Service Attacks
Basics of Denial of Service Attacks
 
Cyber security Information security
Cyber security Information securityCyber security Information security
Cyber security Information security
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
Social Impact of Information Technology
Social Impact of Information TechnologySocial Impact of Information Technology
Social Impact of Information Technology
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber security by Anushka Jha
Cyber security by Anushka JhaCyber security by Anushka Jha
Cyber security by Anushka Jha
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
White Hat vs Black Hat vs Grey Hat | Difference Between Black Hat White Hat G...
 
Cyber security ppt
Cyber security pptCyber security ppt
Cyber security ppt
 

Ähnlich wie Societal Impacts Of IT (Class X)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 

Ähnlich wie Societal Impacts Of IT (Class X) (20)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Presentation2
Presentation2Presentation2
Presentation2
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
computer security
computer securitycomputer security
computer security
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computing safety
Computing safetyComputing safety
Computing safety
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 

Kürzlich hochgeladen

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Kürzlich hochgeladen (20)

Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Societal Impacts Of IT (Class X)

  • 2. Malicious Software are the programs that generate threats to the computer system and stored data.
  • 4. • Virus (Vital Information Recourses Under Seize) is a small program or a small code segment that is capable of attaching itself to existing programs of files and infect them as well as replicate itself without users knowledge or permission. It spreads by external devices like CDs, pen drives, or email and executes when an infected program is executed. If an infected computer gets in contact gets in contact with an un infected computer virus may pass onto the uninfected system and destroy the files.
  • 6. This type of virus infects the master boot record of the system by either moving to another sector or replacing it with infected one.
  • 7. This type of virus infects the executable files or files containing executable code such as .exe, .com, .dll, .sys, etc. I N F E C T I N G V I R U SThese viruses add their code to executables, which when infected may send viral code other executables. When the infected file is opened or used the virus may overwrite the file and cause permanent damage to the content of the overwritten file.
  • 8. This type of virus changes its code as it propagates from one file to another. Therefore, each copy that is generated appears different from others. This makes the polymorphic virus difficult to be detected by the antivirus.
  • 9. Stealth VirusThis type of virus attempts to conceal its presence from the user and/or antivirus software by using various techniques.
  • 10. A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. V I R U S It attempts to attack both the boot sector and the executable, or programs, files at the same time. This type of virus can re-infect a system over and over again if all parts of the virus are not
  • 11. Worms A computer worm is a standalone malware co mputer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Both worms and viruses tend to fill computer memory with useless data thereby preventing you from using memory space for legal applications or programs.
  • 12. T R O J A N Trojan horse is a program that appears to be legal and useful but concurrently does something unexpected like destroying existing programs and files . As it does not replicate itself in the computer it is not a virus. However it usually opens a way for the other malicious software like viruses to enter into the computer system. It may also allow unauthorized users access the information stored in the computer. h o r s e s
  • 13. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
  • 14. Spam refers to the unsolicited or unwanted mail or message sent to a large number of individuals. It is forced on to the people who would otherwise choose not to receive such mails. In addition it may also be used to spreading viruses or
  • 15. It may flood the e-mails box due to which no other mail can be received. The recipient time is wasted in reading a the unwanted e- mails. Network bandwidth is wasted in sending such mails.
  • 16. A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The hackers that break into the computer security with non-malicious reasons are known as The hackers who break into the computer security without administration for ulterior purposes such as theft, terrorism, etc. are
  • 17.
  • 18. An antivirus program scans the hard the hard disc for viruses. After scanning the software removes the viruses, so that the computer is able to perform efficiently again. Most anti- virus software have an auto update feature that enables the computer to download the definition of new viruses. The updating of a antivirus software is important because the virus 'creators’ are always in the process of developing The updated virus definitions is should always be maintained so that users can operate their computers without any problem.
  • 19. Data loss is very common to all Some failure such as hardware failure, software failure, or natural disaster may occur resulting in data loss. Data backup refers to making duplicate copies of your data and storing them onto some permanent storage device such as pen drive, portable hard disc, DVD, CD, etc. The data backup is essential for recovering the data as quickly, and with as little damaging impact on users, as possible.
  • 21. Full Backup Method This is the basic backup method that backups up all the files on the computer the computer system. Generally performed on a weekly or monthly basis. Consumes a lot of time as of time as well as secondary memory.
  • 22. Incremental Backup Method This method backs up only those files that have been modified since the most recent backup, thereby making each backup an increment to the last backup. A single backup is not sufficient to restore all the files, which makes the restoring process slower. It consumes less time and memory space to take a backup.
  • 23. Differential Backup Method This method backs up all the files that have any difference from the last backup. Restoring files require the full backup and only the last differential backup. This makes restoring little faster than incremental backup. Backing up is slower and storage requirement is higher than incremental backup.
  • 24. Mirror Backup Method The mirror backup method copies the files or folders being backed up without any compressions. It keeps each file separate in the destination thereby making the destination a mirror of the source. The feature makes this methods fastest of all methods. However, it requires more storage space as compared to other methods.
  • 25. Firstly, this method not only enables you to recover data after file corruption or computer failure, but you can also recover data even if a natural disaster has destroyed everything at your place. Secondly, you can access your data anywhere in the world and at anytime. In addition, the files to be backed up are encrypted by your computer before being sent to the remote This ensures the protection of your data from unauthorized access. However, it is not affordable for individual users or small business to subscribe for online backup services.
  • 26. Sometimes, you lose important data because of disk failure, accidental deletion of files, etc A recover tool enables you to recover lost data. The situation even becomes worse if you are not having backup of data.
  • 27. Suppose you friend forgot his passport at your house and went away. You want to send it to him but you don’t want anyone else to steal the passport. How will you do it? This picture is a hint to the puzzle. This picture is a hint to the puzzle.
  • 28. You will put the passport in a box and lock it with a lock and key. This key will Remain with you. Then you send the box to your friend. Your friend will put another lock on it with another key that will remain with him. He will send it back. You will unlock your lock with your key and send it back to him. He will unlock his lock with his key and take his passport. Encryption and decryption works in the same way.
  • 29. A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Many personal computer oper ating systems includ e software- based firewalls to protect against threats from the public Internet. Many routers t hat pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
  • 30. All Traffic in either direction must pass through the firewall. The firewall itself is immune to penetration. Only traffic authorized by the local security policy must be allowed to
  • 31. Social Networking refers to the grouping of individuals to share their common interests or activities Nowadays, online social networking is gaining popularity and a number of websites (known as social sites) are available for creating online communities.
  • 32. Introduction To ICT ICT has become the integral part of our working and living environments and will continue to be a powerful resource for business. ICT stands for Information and Communication Technologies. These technologies include computers, internet, broadcasting technologies (radio and television) and telephony. Due to globalization and other factors, these technologies are changing and improving dad by day.
  • 33. Benefits of ICT ICT provides several significant benefits and today , it has been used everywhere and in every field including education, healthcare, governance, etc. Some important benefits of ICT are as follows:- • Education • Healthcare • Governance
  • 34. The use of sounds effects, comic characters and scripted act attracts the students and helps them to understand the lessons by getting involved with the lessons being delivered. This keeps the process of learning new concepts very lively. Education The introduction of ICT in education has made the learning fun and interesting for student now a days. Many illustrations are given in the form of video clips which help students to understand quickly.
  • 35. This technology has made the scope for error very minor and helps the doctor to perform surgeries remotely The scanners process the data present in them in a readable format, microprocessors help to control many medical devices like pacemaker and the computer-guided lasers are used for various kinds of surgeries.
  • 36. Governance All or most of the information generated by the government is easily accessible through the electronic media, such as Internet, mobile phones, etc. The use of ICT in governance practices offers better interaction between government, its institutions and people. This leads enhanced governance practices and effective This increases the transparency of government and administration to the business as well as its citizens.

Hinweis der Redaktion

  1. Needs Editing
  2. spam
  3. hacker
  4. Antivirus software
  5. Data backup and recovery
  6. Backup methods
  7. Social networking
  8. Introduction to ICT
  9. Benefits of ICT