SlideShare uma empresa Scribd logo
1 de 37
Arush Vatsal Unadkat
Malicious Software are
the programs that
generate threats to the
computer system and
stored data.
Virus
Worm
s
Trojan
Horses
Spyware
Malicious Software
• Virus (Vital Information Recourses
Under Seize) is a small program or a
small code segment that is capable of
attaching itself to existing programs of
files and infect them as well as
replicate itself without users
knowledge or permission. It spreads
by external devices like CDs, pen
drives, or email and executes when an
infected program is executed. If an
infected computer gets in contact gets
in contact with an un infected
computer virus may pass onto the
uninfected system and destroy the
files.
Viruses
Boot Sector
File Infecting
PolymorphicStealth
Multipartite
This type of virus
infects the
master boot
record of the
system by either
moving to
another sector or
replacing it with
infected one.
This type of virus
infects the
executable files
or files containing
executable code
such as .exe,
.com, .dll, .sys,
etc.
I
N
F
E
C
T
I
N
G
V
I
R
U
SThese viruses add their code to
executables, which when infected may
send viral code other executables.
When the
infected file is
opened or
used the
virus may
overwrite the
file and cause
permanent
damage to
the content of
the
overwritten
file.
This type of virus changes its code as it propagates
from one file to another. Therefore, each copy that is
generated appears different from others. This makes
the polymorphic virus difficult to be detected by the
antivirus.
Stealth VirusThis type of
virus attempts
to conceal its
presence from
the user
and/or
antivirus
software by
using various
techniques.
A multipartite virus is a
computer virus that infects
multiple different target
platforms, and remains
recursively infective in each
target.
V
I
R
U
S It attempts to attack both
the boot sector and the
executable, or programs,
files at the same time.
This type of virus can re-infect a system over and
over again if all parts of the virus are not
Worms
A computer worm is a
standalone malware co
mputer program that
replicates itself in order
to spread to other
computers. Often, it
uses a computer
network to spread itself,
relying on security
failures on the target
computer to access it.
Unlike a computer virus,
it does not need to
attach itself to an
existing program.
Both worms and viruses tend
to fill computer memory with
useless data thereby
preventing you from using
memory space for legal
applications or programs.
T
R
O
J
A
N
Trojan horse is a program
that appears to be legal and
useful but concurrently does
something unexpected like
destroying existing
programs and files . As it
does not replicate itself in
the computer it is not a
virus.
However it usually opens
a way for the other
malicious software like
viruses to enter into the
computer system. It may
also allow unauthorized
users access the
information stored in the
computer.
h
o
r
s
e
s
Spyware is any technology that aids
in gathering information about a
person or organization without their
knowledge.
On the Internet spyware is programming that is put in
someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties.
Spam refers to the unsolicited or
unwanted mail or message sent to a
large number of individuals. It is
forced on to the people who would
otherwise choose not to receive such
mails.
In addition it may
also be used to
spreading viruses or
It may flood the e-mails box
due to which no other mail can
be received.
The recipient time is
wasted in reading a
the unwanted e-
mails.
Network
bandwidth is
wasted in sending
such mails.
A hacker is someone who seeks and exploits
weaknesses in a computer system or
computer network. Hackers may be motivated
by a multitude of reasons, such as profit,
protest, or challenge.
The hackers that break
into the computer security
with non-malicious
reasons are known as
The hackers who break into the
computer security without
administration for ulterior purposes
such as theft, terrorism, etc. are
An antivirus program
scans the hard the
hard disc for viruses.
After scanning the
software removes the
viruses, so that the
computer is able to
perform efficiently
again.
Most anti-
virus
software
have
an auto
update
feature that
enables the
computer to
download
the definition
of new
viruses.
The updating
of a antivirus
software is
important
because the
virus
'creators’ are
always in the
process of
developing
The updated virus definitions is
should always be maintained so
that users can operate their
computers without any problem.
Data loss is
very
common to
all
Some failure such as hardware
failure, software failure, or natural
disaster may occur resulting in
data loss.
Data backup refers to making duplicate copies of your data and storing them onto some
permanent storage device such as pen drive, portable hard disc, DVD, CD, etc.
The data backup is essential for
recovering the data as quickly,
and with as little damaging impact
on users, as possible.
Full Backup
Method
Incremental
Backup Method
Differential
Backup Method
Mirror Backup
Method
Full
Backup
Method
This is the basic
backup method
that backups up
all the files on the
computer the
computer system.
Generally
performed on a
weekly or monthly
basis.
Consumes a lot of
time as of time as
well as secondary
memory.
Incremental
Backup
Method
This method backs up
only those files that
have been modified
since the most recent
backup, thereby
making each backup an
increment to the last
backup.
A single backup is
not sufficient to
restore all the
files, which makes
the restoring
process slower. It consumes
less time and
memory
space to take
a backup.
Differential
Backup
Method
This method backs up
all the files that have
any difference from
the last backup.
Restoring files require
the full backup and
only the last
differential backup.
This makes restoring
little faster than
incremental backup.
Backing up is slower
and storage
requirement is higher
than incremental
backup.
Mirror
Backup
Method
The mirror backup
method copies the
files or folders being
backed up without
any compressions.
It keeps each file
separate in the
destination thereby
making the
destination a mirror
of the source.
The feature makes
this methods fastest
of all methods.
However, it requires
more storage space
as compared to other
methods.
Firstly, this method not only
enables you to recover data
after file corruption or
computer failure, but you can
also recover data even if a
natural disaster
has destroyed everything at
your place.
Secondly, you can access your data anywhere in the
world and at anytime. In addition, the files to be backed
up are encrypted
by your computer before being sent to the remote
This ensures the protection of
your data from unauthorized
access.
However, it is not affordable
for individual users or small
business to subscribe for
online backup services.
Sometimes, you lose
important data because of
disk failure, accidental
deletion of files, etc
A recover tool
enables you to
recover lost
data.
The situation even
becomes worse if
you are not having
backup of data.
Suppose you friend forgot his passport at your house
and went away. You want to send it to him but you don’t
want anyone else to steal the passport.
How will you do it?
This
picture
is a hint
to the
puzzle.
This
picture
is a hint
to the
puzzle.
You will put the passport in a
box and lock it with a lock and
key. This key will Remain with
you. Then you send the box to
your friend. Your friend will put
another lock on it with another
key that will remain with him.
He will send it back. You will
unlock your lock with your key
and send it back to him. He will
unlock his lock with his key and
take his passport.
Encryption and
decryption works
in the same way.
A firewall is a software or hardware-based
network security system that controls the
incoming and outgoing network traffic by
analyzing the data packets and determining
whether they should be allowed through or
not, based on applied rule set.
Many personal
computer oper
ating
systems includ
e software-
based firewalls
to protect
against threats
from the public
Internet.
Many routers t
hat pass data
between
networks
contain firewall
components
and,
conversely,
many firewalls
can perform
basic routing
functions.
All Traffic in either
direction must pass
through the firewall.
The firewall
itself is immune
to penetration.
Only traffic
authorized by the
local security policy
must be allowed to
Social Networking refers
to the grouping of
individuals to share their
common interests or
activities
Nowadays, online social networking
is gaining popularity and a number
of websites (known as social sites)
are available for creating online
communities.
Introduction
To
ICT
ICT has become the integral part of our
working and living environments and
will continue to be a powerful resource
for business.
ICT stands for Information and
Communication Technologies.
These technologies include
computers, internet,
broadcasting technologies (radio
and television) and telephony.
Due to globalization and other factors,
these technologies are changing and
improving dad by day.
Benefits of ICT
ICT provides several significant
benefits and today , it has been used
everywhere and in every field including
education, healthcare, governance,
etc.
Some important
benefits of ICT are
as follows:-
• Education
• Healthcare
• Governance
The use of sounds effects,
comic characters and scripted
act attracts the students and
helps them to understand the
lessons by getting involved
with the lessons being
delivered. This keeps the
process of learning new
concepts very lively.
Education
The introduction of ICT
in education has made
the learning fun and
interesting for student
now a days.
Many
illustrations
are given in
the form of
video clips
which help
students to
understand
quickly.
This technology has made the scope for error very minor and helps the
doctor to perform surgeries remotely
The scanners process
the data present in
them in a readable
format,
microprocessors help
to control many
medical devices like
pacemaker and the
computer-guided
lasers are used for
various kinds of
surgeries.
Governance
All or most of the information
generated by the government
is easily accessible through
the electronic media, such as
Internet, mobile phones, etc.
The use of ICT in governance
practices offers better interaction
between government, its
institutions and people. This
leads enhanced governance
practices and effective
This increases the
transparency of
government and
administration to the
business as well as its
citizens.
Societal Impacts Of IT (Class X)

Mais conteúdo relacionado

Mais procurados

Management Information System
Management Information SystemManagement Information System
Management Information SystemPraveen Minz
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Protection and security
Protection and securityProtection and security
Protection and securitymbadhi
 
Applications of Computer
Applications of ComputerApplications of Computer
Applications of ComputerAdeel Rasheed
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering EthicsKapil Rajpurohit
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.Monica Khatri
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information SystemsLuis Borges Gouveia
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and AttacksSachin Darekar
 
Software components
Software componentsSoftware components
Software componentsAmir_Mukhtar
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technologyguest5fd01d
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer EngineeringBESOR ACADEMY
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولSaadDongus
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers TheoryMakaha Rutendo
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
What is computer hardware and software
What is computer hardware and softwareWhat is computer hardware and software
What is computer hardware and softwareparag dhok
 

Mais procurados (20)

Management Information System
Management Information SystemManagement Information System
Management Information System
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Protection and security
Protection and securityProtection and security
Protection and security
 
Ppt123
Ppt123Ppt123
Ppt123
 
Applications of Computer
Applications of ComputerApplications of Computer
Applications of Computer
 
Software Engineering Ethics
Software Engineering EthicsSoftware Engineering Ethics
Software Engineering Ethics
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Impact Of IT on Society.
Impact Of IT on Society.Impact Of IT on Society.
Impact Of IT on Society.
 
Computer Science & Information Systems
Computer Science & Information SystemsComputer Science & Information Systems
Computer Science & Information Systems
 
Information security and Attacks
Information security and AttacksInformation security and Attacks
Information security and Attacks
 
Software components
Software componentsSoftware components
Software components
 
Computer Technology
Computer TechnologyComputer Technology
Computer Technology
 
Computer Fundamentals
Computer FundamentalsComputer Fundamentals
Computer Fundamentals
 
Introduction to Computer Engineering
Introduction to Computer EngineeringIntroduction to Computer Engineering
Introduction to Computer Engineering
 
امن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلولامن الشبكات المخاطر والحلول
امن الشبكات المخاطر والحلول
 
Computers: Questions & Answers Theory
Computers: Questions & Answers TheoryComputers: Questions & Answers Theory
Computers: Questions & Answers Theory
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
What is computer hardware and software
What is computer hardware and softwareWhat is computer hardware and software
What is computer hardware and software
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 

Semelhante a Societal Impacts Of IT (Class X)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilitiesricharddxd
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 

Semelhante a Societal Impacts Of IT (Class X) (20)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Presentation2
Presentation2Presentation2
Presentation2
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
computer security
computer securitycomputer security
computer security
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computing safety
Computing safetyComputing safety
Computing safety
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 

Último

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Último (20)

Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Societal Impacts Of IT (Class X)

  • 2. Malicious Software are the programs that generate threats to the computer system and stored data.
  • 4. • Virus (Vital Information Recourses Under Seize) is a small program or a small code segment that is capable of attaching itself to existing programs of files and infect them as well as replicate itself without users knowledge or permission. It spreads by external devices like CDs, pen drives, or email and executes when an infected program is executed. If an infected computer gets in contact gets in contact with an un infected computer virus may pass onto the uninfected system and destroy the files.
  • 6. This type of virus infects the master boot record of the system by either moving to another sector or replacing it with infected one.
  • 7. This type of virus infects the executable files or files containing executable code such as .exe, .com, .dll, .sys, etc. I N F E C T I N G V I R U SThese viruses add their code to executables, which when infected may send viral code other executables. When the infected file is opened or used the virus may overwrite the file and cause permanent damage to the content of the overwritten file.
  • 8. This type of virus changes its code as it propagates from one file to another. Therefore, each copy that is generated appears different from others. This makes the polymorphic virus difficult to be detected by the antivirus.
  • 9. Stealth VirusThis type of virus attempts to conceal its presence from the user and/or antivirus software by using various techniques.
  • 10. A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. V I R U S It attempts to attack both the boot sector and the executable, or programs, files at the same time. This type of virus can re-infect a system over and over again if all parts of the virus are not
  • 11. Worms A computer worm is a standalone malware co mputer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Both worms and viruses tend to fill computer memory with useless data thereby preventing you from using memory space for legal applications or programs.
  • 12. T R O J A N Trojan horse is a program that appears to be legal and useful but concurrently does something unexpected like destroying existing programs and files . As it does not replicate itself in the computer it is not a virus. However it usually opens a way for the other malicious software like viruses to enter into the computer system. It may also allow unauthorized users access the information stored in the computer. h o r s e s
  • 13. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
  • 14. Spam refers to the unsolicited or unwanted mail or message sent to a large number of individuals. It is forced on to the people who would otherwise choose not to receive such mails. In addition it may also be used to spreading viruses or
  • 15. It may flood the e-mails box due to which no other mail can be received. The recipient time is wasted in reading a the unwanted e- mails. Network bandwidth is wasted in sending such mails.
  • 16. A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The hackers that break into the computer security with non-malicious reasons are known as The hackers who break into the computer security without administration for ulterior purposes such as theft, terrorism, etc. are
  • 17.
  • 18. An antivirus program scans the hard the hard disc for viruses. After scanning the software removes the viruses, so that the computer is able to perform efficiently again. Most anti- virus software have an auto update feature that enables the computer to download the definition of new viruses. The updating of a antivirus software is important because the virus 'creators’ are always in the process of developing The updated virus definitions is should always be maintained so that users can operate their computers without any problem.
  • 19. Data loss is very common to all Some failure such as hardware failure, software failure, or natural disaster may occur resulting in data loss. Data backup refers to making duplicate copies of your data and storing them onto some permanent storage device such as pen drive, portable hard disc, DVD, CD, etc. The data backup is essential for recovering the data as quickly, and with as little damaging impact on users, as possible.
  • 21. Full Backup Method This is the basic backup method that backups up all the files on the computer the computer system. Generally performed on a weekly or monthly basis. Consumes a lot of time as of time as well as secondary memory.
  • 22. Incremental Backup Method This method backs up only those files that have been modified since the most recent backup, thereby making each backup an increment to the last backup. A single backup is not sufficient to restore all the files, which makes the restoring process slower. It consumes less time and memory space to take a backup.
  • 23. Differential Backup Method This method backs up all the files that have any difference from the last backup. Restoring files require the full backup and only the last differential backup. This makes restoring little faster than incremental backup. Backing up is slower and storage requirement is higher than incremental backup.
  • 24. Mirror Backup Method The mirror backup method copies the files or folders being backed up without any compressions. It keeps each file separate in the destination thereby making the destination a mirror of the source. The feature makes this methods fastest of all methods. However, it requires more storage space as compared to other methods.
  • 25. Firstly, this method not only enables you to recover data after file corruption or computer failure, but you can also recover data even if a natural disaster has destroyed everything at your place. Secondly, you can access your data anywhere in the world and at anytime. In addition, the files to be backed up are encrypted by your computer before being sent to the remote This ensures the protection of your data from unauthorized access. However, it is not affordable for individual users or small business to subscribe for online backup services.
  • 26. Sometimes, you lose important data because of disk failure, accidental deletion of files, etc A recover tool enables you to recover lost data. The situation even becomes worse if you are not having backup of data.
  • 27. Suppose you friend forgot his passport at your house and went away. You want to send it to him but you don’t want anyone else to steal the passport. How will you do it? This picture is a hint to the puzzle. This picture is a hint to the puzzle.
  • 28. You will put the passport in a box and lock it with a lock and key. This key will Remain with you. Then you send the box to your friend. Your friend will put another lock on it with another key that will remain with him. He will send it back. You will unlock your lock with your key and send it back to him. He will unlock his lock with his key and take his passport. Encryption and decryption works in the same way.
  • 29. A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Many personal computer oper ating systems includ e software- based firewalls to protect against threats from the public Internet. Many routers t hat pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
  • 30. All Traffic in either direction must pass through the firewall. The firewall itself is immune to penetration. Only traffic authorized by the local security policy must be allowed to
  • 31. Social Networking refers to the grouping of individuals to share their common interests or activities Nowadays, online social networking is gaining popularity and a number of websites (known as social sites) are available for creating online communities.
  • 32. Introduction To ICT ICT has become the integral part of our working and living environments and will continue to be a powerful resource for business. ICT stands for Information and Communication Technologies. These technologies include computers, internet, broadcasting technologies (radio and television) and telephony. Due to globalization and other factors, these technologies are changing and improving dad by day.
  • 33. Benefits of ICT ICT provides several significant benefits and today , it has been used everywhere and in every field including education, healthcare, governance, etc. Some important benefits of ICT are as follows:- • Education • Healthcare • Governance
  • 34. The use of sounds effects, comic characters and scripted act attracts the students and helps them to understand the lessons by getting involved with the lessons being delivered. This keeps the process of learning new concepts very lively. Education The introduction of ICT in education has made the learning fun and interesting for student now a days. Many illustrations are given in the form of video clips which help students to understand quickly.
  • 35. This technology has made the scope for error very minor and helps the doctor to perform surgeries remotely The scanners process the data present in them in a readable format, microprocessors help to control many medical devices like pacemaker and the computer-guided lasers are used for various kinds of surgeries.
  • 36. Governance All or most of the information generated by the government is easily accessible through the electronic media, such as Internet, mobile phones, etc. The use of ICT in governance practices offers better interaction between government, its institutions and people. This leads enhanced governance practices and effective This increases the transparency of government and administration to the business as well as its citizens.

Notas do Editor

  1. Needs Editing
  2. spam
  3. hacker
  4. Antivirus software
  5. Data backup and recovery
  6. Backup methods
  7. Social networking
  8. Introduction to ICT
  9. Benefits of ICT