4. • Virus (Vital Information Recourses
Under Seize) is a small program or a
small code segment that is capable of
attaching itself to existing programs of
files and infect them as well as
replicate itself without users
knowledge or permission. It spreads
by external devices like CDs, pen
drives, or email and executes when an
infected program is executed. If an
infected computer gets in contact gets
in contact with an un infected
computer virus may pass onto the
uninfected system and destroy the
files.
6. This type of virus
infects the
master boot
record of the
system by either
moving to
another sector or
replacing it with
infected one.
7. This type of virus
infects the
executable files
or files containing
executable code
such as .exe,
.com, .dll, .sys,
etc.
I
N
F
E
C
T
I
N
G
V
I
R
U
SThese viruses add their code to
executables, which when infected may
send viral code other executables.
When the
infected file is
opened or
used the
virus may
overwrite the
file and cause
permanent
damage to
the content of
the
overwritten
file.
8. This type of virus changes its code as it propagates
from one file to another. Therefore, each copy that is
generated appears different from others. This makes
the polymorphic virus difficult to be detected by the
antivirus.
9. Stealth VirusThis type of
virus attempts
to conceal its
presence from
the user
and/or
antivirus
software by
using various
techniques.
10. A multipartite virus is a
computer virus that infects
multiple different target
platforms, and remains
recursively infective in each
target.
V
I
R
U
S It attempts to attack both
the boot sector and the
executable, or programs,
files at the same time.
This type of virus can re-infect a system over and
over again if all parts of the virus are not
11. Worms
A computer worm is a
standalone malware co
mputer program that
replicates itself in order
to spread to other
computers. Often, it
uses a computer
network to spread itself,
relying on security
failures on the target
computer to access it.
Unlike a computer virus,
it does not need to
attach itself to an
existing program.
Both worms and viruses tend
to fill computer memory with
useless data thereby
preventing you from using
memory space for legal
applications or programs.
12. T
R
O
J
A
N
Trojan horse is a program
that appears to be legal and
useful but concurrently does
something unexpected like
destroying existing
programs and files . As it
does not replicate itself in
the computer it is not a
virus.
However it usually opens
a way for the other
malicious software like
viruses to enter into the
computer system. It may
also allow unauthorized
users access the
information stored in the
computer.
h
o
r
s
e
s
13. Spyware is any technology that aids
in gathering information about a
person or organization without their
knowledge.
On the Internet spyware is programming that is put in
someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties.
14. Spam refers to the unsolicited or
unwanted mail or message sent to a
large number of individuals. It is
forced on to the people who would
otherwise choose not to receive such
mails.
In addition it may
also be used to
spreading viruses or
15. It may flood the e-mails box
due to which no other mail can
be received.
The recipient time is
wasted in reading a
the unwanted e-
mails.
Network
bandwidth is
wasted in sending
such mails.
16. A hacker is someone who seeks and exploits
weaknesses in a computer system or
computer network. Hackers may be motivated
by a multitude of reasons, such as profit,
protest, or challenge.
The hackers that break
into the computer security
with non-malicious
reasons are known as
The hackers who break into the
computer security without
administration for ulterior purposes
such as theft, terrorism, etc. are
17.
18. An antivirus program
scans the hard the
hard disc for viruses.
After scanning the
software removes the
viruses, so that the
computer is able to
perform efficiently
again.
Most anti-
virus
software
have
an auto
update
feature that
enables the
computer to
download
the definition
of new
viruses.
The updating
of a antivirus
software is
important
because the
virus
'creators’ are
always in the
process of
developing
The updated virus definitions is
should always be maintained so
that users can operate their
computers without any problem.
19. Data loss is
very
common to
all
Some failure such as hardware
failure, software failure, or natural
disaster may occur resulting in
data loss.
Data backup refers to making duplicate copies of your data and storing them onto some
permanent storage device such as pen drive, portable hard disc, DVD, CD, etc.
The data backup is essential for
recovering the data as quickly,
and with as little damaging impact
on users, as possible.
21. Full
Backup
Method
This is the basic
backup method
that backups up
all the files on the
computer the
computer system.
Generally
performed on a
weekly or monthly
basis.
Consumes a lot of
time as of time as
well as secondary
memory.
22. Incremental
Backup
Method
This method backs up
only those files that
have been modified
since the most recent
backup, thereby
making each backup an
increment to the last
backup.
A single backup is
not sufficient to
restore all the
files, which makes
the restoring
process slower. It consumes
less time and
memory
space to take
a backup.
23. Differential
Backup
Method
This method backs up
all the files that have
any difference from
the last backup.
Restoring files require
the full backup and
only the last
differential backup.
This makes restoring
little faster than
incremental backup.
Backing up is slower
and storage
requirement is higher
than incremental
backup.
24. Mirror
Backup
Method
The mirror backup
method copies the
files or folders being
backed up without
any compressions.
It keeps each file
separate in the
destination thereby
making the
destination a mirror
of the source.
The feature makes
this methods fastest
of all methods.
However, it requires
more storage space
as compared to other
methods.
25. Firstly, this method not only
enables you to recover data
after file corruption or
computer failure, but you can
also recover data even if a
natural disaster
has destroyed everything at
your place.
Secondly, you can access your data anywhere in the
world and at anytime. In addition, the files to be backed
up are encrypted
by your computer before being sent to the remote
This ensures the protection of
your data from unauthorized
access.
However, it is not affordable
for individual users or small
business to subscribe for
online backup services.
26. Sometimes, you lose
important data because of
disk failure, accidental
deletion of files, etc
A recover tool
enables you to
recover lost
data.
The situation even
becomes worse if
you are not having
backup of data.
27. Suppose you friend forgot his passport at your house
and went away. You want to send it to him but you don’t
want anyone else to steal the passport.
How will you do it?
This
picture
is a hint
to the
puzzle.
This
picture
is a hint
to the
puzzle.
28. You will put the passport in a
box and lock it with a lock and
key. This key will Remain with
you. Then you send the box to
your friend. Your friend will put
another lock on it with another
key that will remain with him.
He will send it back. You will
unlock your lock with your key
and send it back to him. He will
unlock his lock with his key and
take his passport.
Encryption and
decryption works
in the same way.
29. A firewall is a software or hardware-based
network security system that controls the
incoming and outgoing network traffic by
analyzing the data packets and determining
whether they should be allowed through or
not, based on applied rule set.
Many personal
computer oper
ating
systems includ
e software-
based firewalls
to protect
against threats
from the public
Internet.
Many routers t
hat pass data
between
networks
contain firewall
components
and,
conversely,
many firewalls
can perform
basic routing
functions.
30. All Traffic in either
direction must pass
through the firewall.
The firewall
itself is immune
to penetration.
Only traffic
authorized by the
local security policy
must be allowed to
31. Social Networking refers
to the grouping of
individuals to share their
common interests or
activities
Nowadays, online social networking
is gaining popularity and a number
of websites (known as social sites)
are available for creating online
communities.
32. Introduction
To
ICT
ICT has become the integral part of our
working and living environments and
will continue to be a powerful resource
for business.
ICT stands for Information and
Communication Technologies.
These technologies include
computers, internet,
broadcasting technologies (radio
and television) and telephony.
Due to globalization and other factors,
these technologies are changing and
improving dad by day.
33. Benefits of ICT
ICT provides several significant
benefits and today , it has been used
everywhere and in every field including
education, healthcare, governance,
etc.
Some important
benefits of ICT are
as follows:-
• Education
• Healthcare
• Governance
34. The use of sounds effects,
comic characters and scripted
act attracts the students and
helps them to understand the
lessons by getting involved
with the lessons being
delivered. This keeps the
process of learning new
concepts very lively.
Education
The introduction of ICT
in education has made
the learning fun and
interesting for student
now a days.
Many
illustrations
are given in
the form of
video clips
which help
students to
understand
quickly.
35. This technology has made the scope for error very minor and helps the
doctor to perform surgeries remotely
The scanners process
the data present in
them in a readable
format,
microprocessors help
to control many
medical devices like
pacemaker and the
computer-guided
lasers are used for
various kinds of
surgeries.
36. Governance
All or most of the information
generated by the government
is easily accessible through
the electronic media, such as
Internet, mobile phones, etc.
The use of ICT in governance
practices offers better interaction
between government, its
institutions and people. This
leads enhanced governance
practices and effective
This increases the
transparency of
government and
administration to the
business as well as its
citizens.