Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
71%
(7)
71% found this document useful (7 votes)
17K views
64 pages
COMPUTER APPLICATION Cyber Beans Class 9th
Computer Application Cyber beans publication class 9th
Uploaded by
karan281r
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save COMPUTER APPLICATION Cyber Beans Class 9th For Later
Download
Save
Save COMPUTER APPLICATION Cyber Beans Class 9th For Later
71%
71% found this document useful, undefined
29%
, undefined
Embed
Share
Print
Report
71%
(7)
71% found this document useful (7 votes)
17K views
64 pages
COMPUTER APPLICATION Cyber Beans Class 9th
Computer Application Cyber beans publication class 9th
Uploaded by
karan281r
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save COMPUTER APPLICATION Cyber Beans Class 9th For Later
Carousel Previous
Carousel Next
Download
Save
Save COMPUTER APPLICATION Cyber Beans Class 9th For Later
71%
71% found this document useful, undefined
29%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 64
Search
Fullscreen
v; i COMPUTER NETWORKING pill waaris a werwont sudents in your aay Ife, ou come across different types of networks. For example, ifyoulookaround, you will find: ‘+ Network of roads, interstate highways, railway tracks, canals, cables, ete,, which are spread across andinterconnected to each other. <4 Communication network of telephone system that enables you to talk to anyone, anywhere, and anytime. Example. network of Banks/ATMs, that allow you to access ‘your accountanywhere around the globe. 4+ Radio/Television network that broadcast programs, live across the globe, + Network of hospitals, schools, and malisall aver the country. similarly, when two or more computers are connected with each other, they together form @ computer network. These linked computers share information with each other over thenetwork ‘he Internet is 2 global system of interconnected computer networks that enables users to share Information and variousresources with each other. The advent ofthe Internet has proved to be a boon tothis world. It is one of the largest information databases and has become a vital part of our life. It uses common interfaces to provide @ physical backbone for many interesting applications. The booming technologies of the modern age have made our life much easier and more connected across the globe via the interconnected networks. (All computer NETWORK AND ITS COMPONENTS ‘Acomputer networks a group of computers and peripheral devices, connected through a data communication system. ‘A computer network facilitates the sharing of hardware and software resources among different users working on different computers. These shared resources can be data files, any application software or hardware devices like printers, modems, etc. For example, if one of the computers in a network has a printer attached to it, then all the computers in that network can access the printer and use it to print the documents as shown in Figure 6.1, where Computer Aand 8 ina network can give the print command to the printer attached with Computer C. — e Se SS EE Figure 6.1: A Computer Network| NEED OF NETWORKING 3 Gil tian information and communication technologies has generated the need to we the same gy, i i sonions One way of doings iso keep the samedatafilesat separatelocations acrosst alte This ing, eae Sere rs which are present at the sar 1 transferring of data from one computer to multiple computers which are pres same or a comers uous data transfer isa costly affair which resutsin redundancy of data and increased storagecgy. locations. The co aoa tna data communication system, a message's transferred from one point to another via am ender crx the medium carries the message, and the ‘receiver’ sometimes called as sink, receives the message, message, the medium’ carries sage, Let us understand with the help of an example. Suppose, you want to communicate with your friend, Since you @® )>” have some information to pass on to your friend, soin this es ee communication system, you willbe the sender. A sender needs a cartier to transmit information to the receiver. So, airis the carrier or the communication medium and your friend isthe receiver, who receives the information. Example nis called a sender, various mediums fig Similarly, in case of a computer network, the computer which sends informal cables, Wi-Fi, Bluetooth, radio waves, etc. that are used to transmit information are the carriers or communication medium, and the computer which receives the information is the receiver. wolved in the communication, Whena computers communicates over a network, three components ar ') Sender: senderis a computer, workstation, mobile phone, or tablet that sends the data through the web browser, ) Communication Medium (Cartier): It is the physical path through which the message travels from the sender to the receiver. Itcan bea cable, wireless device, or protocols. lil) Receiver: A receiver is a device that receives the data message. It can also be a computer, workstation, tablet, or mobile phone. ADVANTAGES OF NETWORK Ina computer network, information is usually stored at a central location. The aim of networking is to share resources, and effectiveness in an organization. The key advantages of Computer network brings more efficiency, economy, networking are: Hardware Sharing: In a network, we can share almost every peripheral device, such as a printer, scanner, modem, CD writer, etc, among several computers. Allthese devices are attached toa remote server, whichis shared among multiple computers. Thisreduces the cost ofhardware. Software Sharing: Every application software can be installed on the main server rather than 23 installing it on every computer individually. Computers in a network can use the required software ; from the server. This technique savescost.as wellastime. Efficiency of Hardware and Software Resources: In a network, modifications in software or hardware are done at a single point. Since the resources are installed at a single point, all ‘modifications are done at that point rather than in individual computers. Reduces Redundancy: Since people use the same data in a common workplace, they can share it over a network by saving and storing it centrally. This also reduces the redundancy of the same data, tonputes wm Kips o>of the sannes aun le hard coples } and paper Saves Paper and Time: Networks also reduce the need for generating, multip! sas th fie People working Ina common workplace can share reports through the network which save oa vidual computer. A corps stems can enjoy te Internet Sharing: A network reduces the cost of installing Internet facility on an ind balls: Internet connection is powerful enough to provide Internet access to all computers in a network. the benefits f the Internet in anctwork mn Server security: Since the server contains all the software, the security of the server Is of great importance. cea bares stale a Security issues faced are: weak passwords, open network ports, old software version, poor physical security, unnecessary accounts, Bll tres oF NeTWoRK Thereare four basic types of computer networks: 1.LAN 2.MAN 3. WAN 4. PAN 1. LOCALAREA NETWORK (LAN) 8 small area, like a room, office building, or a campus, The ‘maximum range of LAN can be 10 Kilometers. The number of computers in a LAN varies from 2 to 1000. The hardware as well as software resources are shared through LAN. Local Area Network is used when two or more computers or peripheral device: connected ALAN consists of the following components: + Twoormorecomputers, ure 62: Local Area Network, + Software tocontrol the operation of computers + Peripheral deviceslike Printers, Scanners, ete + Cablesto connect the computers, 2. METROPOLITAN AREA NETWORK (MAN) Metropolitan Area Network is much larger than a LAN setup andis spread across city Since it can cover an entire city, itis called MAN. The most common example of a MAN type network in our daily life is Cable Television Network. The main purpose of a MAN is also to share hardware and software resources. The maximum range of MAN. can beSokm. Figure 63: WIDE AREANETWORK (WAN) beep armada as Wide Area Network comes into the picture when we have two or more computers located at far away places, linked by communication facilities, like telecommunication or satellite signals. The most common example of a WAN network in our daily life is the Internet which is generally used in houses, schools, banks and private and public sector. The main characteristic of a WAN is that it requires a public telecommunication media to transfer data, Figure 6.4: Wide Area Network 4. PERSONAL AREA NETWORK (PAN) This type of computer network is mainly created for an individual person. It consists of a desktop/laptop computer, a ‘mobile phone, and/or a handheld computing device, such as a PDA or a Smartphone. You can use these networks to semi an Kis <>transfer files Including e-mail, calendar appointments, digital photos, and musle, Personal area networks generally cover a range of less than 10 meters {about30 feet). (ll network components SERVER: A server is a powerful computer with high speed and great processing capability, There can be multiple servers in a computer network. Servers can link Other Figure 6.5: Persona Ar computers or electronic devices together to provide important services to both private and public users, For example, when you entera query ina search engine, the query is sent from your computer over Internet to the servers that store all the relevant web pages. The results are then sent back by the servers tg computer, Its always advisable to have servers with dedicated functionality such as web servers, print seryer, database servers. CLIENT: A clientis a computer system which uses a network to access a remote service from the server. It can access the applications orinformation from the main server. Aclientis also known asa node. NETWORK INTERFACE CARD (NIC): It is a small piece of computer hardware which facilitates the communication between different computers over a network. The NIC» identifies every single node in a network by providing a unique physical address to it. This addressis stored on a chip, which is mounted on the card. MODE OF CONNECTION: Computer networks can be classified on the basis of both hardware and software technology, which is used to interconnect the individual devices in a network, such as optical fiber, Ethernet, or wireless LAN. All the nodes in a network are connected through tas, hardware components, such as NICS, Bridges, Hubs, Switches, and Routers. These hardware components are furthe connected to each other by cables. Figure 6.6: Nie MODEM: A modem enables you to connect your computer to the available Intene connection over the existing telephone lines. It converts the digital signals of a computerins | | analog signals to enable their transmission via phone lines. At the destination, the resin modem further converts the analog signal into digital signals so that the data cant eee understood at the receiving end. Modems are available in two categories: Internal mode and External modem, Internal modem comes as a separate part that is installed on the (Peripheral Component Interconnect) slots available on the motherboard, and exten modemis connected externally toa computer. Figure 6.7: Modem HUB: A hub is a networking device that is used to connect multiple computers and computing devices directly to the network by using cables. Each connection is called a port. The connections are established using a fibre optic cable. When the hub receives data at one of its ports, it distributes the data to the other ports in the network. Typically, a hub sends all the data it receives toall the connected ports. Figure 6.8: Hub SWITCH: Switches contain many ports to connect different network segments. The) similar to hubs, but offer greater performance. When a network contains a large numb devices, switches are needed instead of hubs to make sure the communications bet! devices do not slow down. Unlike hub, a switch is aware of the addresses assigned toe? Figure 6.9: Switch _its portsand sends the incoming data i taal ans KiPS 05> receives only tothe correct port.aren: A Repeater is 9 communication device, paren: used to aepemiatea signal itrecelves electronic signals, cleans them, and rege them. Signals tend to distort when transmitted over cera ances, Repeaters are needed so thatthe signals can trvel tons Keagerdistanceswiththesamestrengthorevenatahigherpower, FdWe 6.10: Repeater ROUTER: A Router is a communication device that is used to connect two different networks, such as two LANs or @ LAN and a WAN. It plays a vital role in controlling the traffic and Keeping the network efficient. It chooses the best route for RE ena the data packets tobe transmitted at the receiver'send, garewAY:A Gateway isa network point thatactsas.an entrance to jrother network using different protocols thereby giving us jreedom and convenience to enjoy online. It allows usto carry out various online activities such as sending e-mail, browsing through ‘web pages, buying things online, and more. It is a shared connection between 2 local area network and a larger system i.e, Fis" 612 Gateway WAN. It basically works as the messenger agent that takes data from one system, interprets it, and transfers it to another system. Itis also called Packet converter. BRIDGE: A Bridges a repeater with add-on functionality of filtering content by reading the addresses of source and destination. It is used to interconnect two LANs working fon the same protocol and provides communication between them. It also prevents unnecessary traffic from entering the network and reduces congestion. Figure 6.13: Bridge Gill transmission mepIuM Data can be transmitted from one location to another by using wires or without the use of GUIDED MEDIA (Wired Media) Ethernet Cables ‘An Etheret cable is one of the most popular form of network cable used in wired networks. This cable resembles a phone cable but is larger than the phone cable and has eight wires. Ethernet cables connect various devices such as PCs, routers, and switches within a local area network. The advantage of these | ‘ablesis that they have less power consumption but the drawback | with these cables is that the computer requires an Ethernet |. ‘adapter card on the motherboard to connect the Ethernet cable. | SS € These cables also have their limitations, both in the distance that _—__ Figure 6.14 Ethernet they canstretch and theirdurability. see Cable Ens Is used as a general ‘term for all kinds of technologies which enable users to create, access, and ‘manipulate information, ICT 2 combination of information and ‘communication technology | what do you understand by data communication? | | [iE || which hardware and software devices can be shared on a computer network? sezaee wn Kis <>'nere are mainly two types of Ethernet cable: Crossover cable: Its basically designed for connecting two computers without a hub or router Straight-through cable: This type of cable has got both its ends identical toeach other. Itisused to connecta compu arouter oraswitch. er, Coaxial Cables ‘Coaxial cable is used in the transmission of video, communications, and audio. Its mainly used by the cable television industry to connect TVs to a cable TV service. However, this cable can also be used in networks and has high bandwidth and greater transmission capacity. A | Coaxial cable consists of central copper wire surrounded by insulation and then a shield of | braided wire. mates jure 6.15: Coax Ca [tisrelatively inexpensive and can transmitdata at higher rates. Italso provides better immunity against electromagne ie disturbances. The only disadvantage associated with Coaxial cable sits high installation and maintenance costs, The two main types of Coaxial cable are: Baseband Coa: I cable: It supports quick transmission of a single signal ata time. Itis mainly used for LANs, Broadband Coaxial cable: Ittransmits multiple signalsat the same time and is used for longer distances, Optical Fibre cable Fibre optics is a popular technology that has a larger capacity to transfer data at a very high speed. A fibre optic eb Consists of a central glass core containing a bundle of glass threads, surrounded by several layers of protective materials The glass threads are capable of transmitting data converted into light signals at extremely high speed, A Fibre optic cable is highly resistant to signal interference and provides better data transmission by providing hig! bandwidth. Presently, a Fibre optic cable is @ popular technology for local area networks, But in the future, almost communications will employ fibre optics. However, itis fragile and the maintenance costis high UNGUIDED MEDIA (Wireless Media) Long Distance Communication Medium Satellite Satellite plays a significant role in modern day communication. It creates a communication channel between a source transmitter and a receiver at different locations on the Earth, The 3round station with the help of a dish antenna sends signal to the satellite, it amplifies the eceived signal and sends it back to the ground station for relay, Communication Satellites use different signals like microwave, digital, and analog signals. WiMax WiMax stands for Worldwide Interoperability for Microwa¥t Access. It is a telecommunication protocol that provides fixed a mobile internet services. WiMax requires a tower called wine Base Station, that is connected to the Internet using a standa" wired high-speed connection, The connectivity between the towel and the end user is provided through microwave link. WiM® vin Kips <> .technology provides high speed connection upto 75 Mbps o eee janyansoreeblesitons overan area of 30 miles or thes a . cerir usa Microwave | Microwave is @ wireless communication technolog i logy that uses high frequency bea {ideo, and data information. although the transmission is fast butstamealtc re or cane is limited to ine-of sig int978 and driven by Robert ellot Kahn and ‘inton Gray Cer. communications. Many TV and telephone communications in the world are transmitted over long distances using microwave signals. Micro phasis . Microwave signals are widely used in technology. ¥ radar Radio wave: Radio waves isa wireless transmission medium that distributes radio signals through the at. Radio waves are a lely used as signals on radio communication. A transmitter is used to send the broadcast signal and a receiver is needed to accept the signal. Radio waves have lower frequencies and longer wavelength. Radio waves can have a frequency range from 300gigahertz (GHz) toaslow as 30 hertz (Hz). Short Distance Communication Medium Bluetooth waves to connect electronic devices wirelessly. It allows users to talk \ short-range communication between phones, computers, and other | | network devices, It is mainly used for personal area networks with a : transmission range of 10 meters to 240 meters depending on the bluetooth version in use. This technology eliminates the use of cables and adapters and uses wireless services. The presence of Bluetooth icon @ indicates that the device is enabled with Bluetooth. Infrared Technology Infrared technology is a short range communication technology that covers approximately 5 meters of distance. It is used to exchange information between computers, cellular telephones, and faxes by emitting infrared waves through infrared LEDs. Infrared communication can take place between two devices at a time. Infrared network signals cannot penetrate walls or other obstructions and work only in a direct line of sight. These waves or signals are focused intoa narrow beam through a plastic lens, which is further converted into electronic signals by the receiver, Remote controlis the most common example of infrared communication. WiFi 4 stands for Wireless Fidelity. It creates a Wireless Local Area Network that uses radio ion. A secure, reliable, and fast wireless connection is Wi. waves to send the inform: invented by Oliver joie in 1880, “The actual protocols of the TEF/IP model are cellectvely called the Internet Protocol Suit, which has been designed by the internet Engineering Task Force ern, | Hypertext Transfer Protocol Secure (HTTPS) Isthe secure version of HTTP, the protocol over which data is sent between your browser ‘and the website that you are connected to. Here all, ‘communications between ‘browser and the website are encrypted. ‘The File Transfer Protocol (FTP) was originally designed by ‘Abhay Bhushan and published in 1971. sea san KiPS GODastablished between the electronic devices and the Internet by using this technology. The devices requirg : 9 adapter connected to them to capture the Wi-Fisignals. Wi-Fi offers the following advantages: + Wi iihas replaced the wired medium completely and can be used to connect to the Internet anywhere, atany + Itis relatively inexpensive and can also be accessed at places where cables cannot be installed. al + One .can connect multiple devices through Wi However, there are some limitations too. + Ithashigh power consumption. + Itisslowerthan the wired medium. + Thetransmission breaks or slows down when there isnoise interference. B | NETWORK PROTOCOLS We vein a world where millions of people across the globe speak hundreds of different languages. We wouldnag able to communicate worldwide, if there are no ‘standards! governing the way we communicate and the way machines process data. These standards are nothing but sets of rules which are followed by everyone, ‘These set of certain rules which determine how data should be transferred over networks, compressed, presenteds the screen and so on. These sets of rules are called Protocols. Likewise, there are many other protocols, each one governing the way a certain technology works. Hence, the: asicnge of protocolsis to standardize the processes and ways of communicating over a computer network. Let uslearn about most common protocols and their unique features. TCP/IP TCP/IP (Transmission Control Protocol/internet sre: ae aa coe TRS TEP praca Protocol) is @ suite of communication protocols ts ters THO TEP poe! used to connect various computers on the =e fe Internet. It provides end-to-end data —_ communication specifying how data should be broken into pieces called packets, transmitted, — ™ and routed from one network to another until they reach their destination. TCP/IP is a Figure 6.17: Working of TCP/IP combination of two separate protocols: TCP or Transfer Control protocol is used for a reliable and foolproof data transi mission over the network. Itis responsith for dividing the data into packets at the sender's ‘and for assembling these packets at their correct destinal Por internet Protocol provides a sequence number to each of these packets so that they might reach their destination Correctorder. Also, ithandles the addressing of each packet so thatitis delivered to the correct destination. HTTP HTTP or Hyper Text Transfer Protocol determines how different programs exchange data over the internet. Itdefinesho ‘ ious messages are formatted and transmitted, and what actions web servers and browsers should take in response to vaio. ‘commands. Let us understand the meaning of Hyper Text. att wn Kips
‘awebsite usually contalns some text, images, “jndsometimes sound effects as well, Whenever jou open sucha website, do you only see text or pietures? We usually see the complete website, f wre | (ER tes i 1 une per Textisa system in which different types of Aesponse Message gocuments/files, such as images, sound effects, iIFckons renee (et Browser) LurtP ove TCM tates (eve) ‘and text are linked to each other. These documents can easily be accessed using a Web browser. FIP F1P or File Transfer Protocol isa standard Internet Protocol. itis one of the simplest and easiest ways to exchange files between two or more computers on the Internet, using FTP client and FTP server software. FTP uses Internet's TCP/IP protocols to download software/ programs to our computer, from other sources. The source can be a web server or a remote host over the Internet. You can use FTP either using a GUI based FTP software or via MS-DOS prompt. Nowadays, Internet browsers have an in- built feature to make FTP requests to other servers. To access any file or content using FTP, a user needs to login on Figueo 610; Working of HTTP. onerent \ CO) Ss 5s Figure 6.19: Working of the FTP the FTP server and provide his/her credentials, The FTP software allows the user to drag and drop the file between the remote and local host. Some of the files are always available free for public use/download, Such files can easily be accessed using the anonymous FTP. * Moris - go Meson a | Sentng Pc ——> Mal Queue a ‘Server ee | Mail Queue > PoP3 Server —— Receiving PC Figure 6.20: Working of SMTP along with POP smtp SMTP (Simple Mail Transfer Protocol) is common protocol used for sending e-mails between two the most or more servers. This protocol has a limited ability to queue the messages at the receiver's end. Hence, we need some other protocols for e-mail retrieval. It is generally used to send messages from a mail client to a mail server. POP and IMAP are e-mail retrieval protocols. Hence, we always need to specify both SMTP and POP/IMAP servers, whenever we configure our e-mail application. IMAP AND POP IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) are the two most popular Internet standard protocols for retrieving e-mails. In today's world, almost every single e-mail client supportsboth these protocols due to their wide accepta The utili itty. xy of IMAP or POP protocols varies with respect to their usage in different environments, When configuringan e- ‘mail application, itis essential to specify both the sending protocol i.e. SMTP and the receiving protocol POP or IMAP. win KIDSBill cLoup computinc | Sloud is something that is present at a remote | = location. Cloud is defined as a set of hardware, emma oo networks, storage, interfaces, and services, | toes we, ro ce combined together to deliver different aspects of Sey eae: ‘cnsaua par werent computing as a service over a network or the | #upwih your IAP _ematwin ar =e Se Internet. All you need is an adequately featured a A = device that allows you to connect to the cloud. | oa _[- = Cloud can provide services over the network, ie, | ==] coe | Re either on the public networks, or on private | al x networks, .e,, WAN, or LAN. | (iim) i Applications, such as e-mail, web conferencing, | ZI™N customer relationship management (CRM), all | run on the cloud. Google Docs, Microsoft | UC, campiier UB wusitat OneDrive, Dropbox, etc. aresomeofthecommon | =f examples of free or low-cost online storage forthe | users. Thus, as an individual user, most of us are already using the cloud services. Bu ——— ——— — Figure 6.21: Working of IMAP and POP Cloud Computing is made up of two words, Cloud, and Computing. Cloud is a metaphor for the Internet, henceit mes ‘computing on the Internet. Thus, Cloud Computing refers to manipulating, configuring, and accessing the applicatio online. It offers online data storage, infrastructure, and applications. TYPES OF CLOUD There are four different types of cloud based on their ownership, size, and access. These are: PUBLICCLOUD Apublic cloud is provisioned for open use by the general public. It has no boundaries and the cloud infrastructurecan used by anyone, anywhere over the Internet. PRIVATE CLOUD, A private cloud is owned and used by a single organization over a private network. It centralizes the resources oft organization so that they can be accessed easily by its various departments and offices at different locations. HYBRID CLOUD Ahybrid cloud is a combination of both private and public cloud. This type of cloud offers benefits of multiple deployment models such as the controlled environmentin private clouds and rapid elasticity of public clouds, cin) COMMUNITY CLOUD The community cloud is provisioned for use by a group of consumers from different organizations who share the same concerns (e.g., application, : . \ security requirements, policy, and efficiency demands). It may be owned, managed, and operated by one or more" organizationsin the community or athird party. head yn KIPS <>jill aovanTaces OF cLoUD COMPUTING cosTSAVINGS yh cloud Computing based on pay-per-use model, businesses or consumers can significantly ower the company’s IT vpenses and requirements t lso provides access to numerous storage fclties and applications, which in turn save expen theconsumer from spendinga lot of money on theserver, setup, and installation cost RELIABILITY loud Computing is much more reliable, when it comes to data management, backup, and recovery from failures. It provides youwith eedundantIT resources, utomaticdata backup, 2s wellas quick fallover mechanism, UNLIMITED FREESTORAGE ‘loud provides unlimited free and secure storage space to store large amounts of information, Users can also choose ‘amongst the public, private, or hybrid cloud, depending on theirsecurity needs. [ACCESSIBILITY Cloud allows easy access to cloud-based services and applications through Internet-enabled devices such as desktops, laptops, tablets, or mobile phones. [ill pisapvantaces OF CLouD ComPuTING TECHNICAL ISSUES Cloud may provide accessibility to services and applications anytime and from anywhere, but there are times when this system encounters serious technical problems, which may lead to the entire business processes being temporarily suspended. SECURITY Although cloud service providers implement the best security standards and encryption methods, but storing the company’s sensitive data and important files on third-party cloud providers, always opens up security risks. VENDORLOCK-IN Although cloud service providers assure that the cloud willbe flexible to use and integrate but switching from one cloud service to another is not so simple. It may lead to portability and support issues. It is the same as switching from one mobile service provider to another or like switching from Android to iOSin mobile phones. UMITED CONTROL Since the cloud infrastructure is entirely owned, managed and monitored by the service provider, the consumer has very little control over the applications, data, and services. Tl sociat networKine In the present scenario, due to hectic schedules, people hardly get enough time to socialise with friends and relatives. Social networking websites are a solution to this problem. Social networking is the grouping of individuals into specific Broups, who share common interests and/or activities. The social networking websites help people in establishing social relationships, and function like an online community of internet users. In a social networking website, every user has a Profile, which contains information about them, The users can also join communities in these sites, where they can share Photos, messages, and je0s. They have the facility of inviting other people to join these websites. In addition, user sa Kips >to comments from friends and other users. n orderto protect user privacy, these Fee eerie ons that alow usersto choose those who can view thelr profile contact them, ad them ag aoa arene ond soon. The traditional social networking websites usually have an open membership, whi sre er amne can become a member kespectve of thelr vews and interests Nowadoy, rg orn tonsa ae te soda networking webstesaramediumtocreateprotiestoadvertsethelrproductsandserices, profiles often havea section dedicated Some major social networking sites in useare: FACEBOOK Facebook with nearly 2 billion active users continues to lead the Social Networking sites. It allows a the registered users to create their profile, post comments, exchange information, share links, photographs, chat, play games, etc. Although initially it was PC based, Facebook is now availableas phones and Tablets. pre-installed app on most of the mot ‘TWITTER Messages sent with this app were initially restricted to 140 characters. This was due to the fact that on the earlier versions of mobile phones, the SMS was limited to 140 characters. With the advent of Smartphones, users began to find this too restrictive. Twitter has now changed the character limit from 140 to 280. OTHER SOCIALNETWORKING APPS. Instagram is another app used for social networking, This app specializes in sharing of photographs by the users. Linkedin isa networking app specializing in the sharing of business and professional information Reddit is a social news aggregation app. Registered users can upload news, stories, or links, and other users can rate these stories by voting them up or down. The stories with the most up-votes are moved to the top of the category. | So | Breddit | ._netagrem Linkeatn Reddit ) Figure 6.22: Social Networking Apps Today the whole world is connected through the internet where the latest information can be shared and spread. With the increase of different media channels and portability of new telecommunications and computing technologies, we have stepped into a world where media constantly surrounds us. Bll vata ano Inrormation Data refers to a collection of numbers, characters, symbols, images, etc., which can be processed by a computer. t relates to facts, events, and transactions. Data carries no meaning in its raw form. It must be processed and interpreted toextract meaningful information. UNDERSTANDING DATA, INFORMATION, AND KNOWLEDGE The main difference les in the level of abstraction. While data is the lowest level of abstraction, information is the nett level, and knowledge is the highest level of abstraction among all three. Data is unstructured and carries no means Data mustbe interpreted and processed in order to make information. For example, the height of Mt. Everestisgene"alY Seapes wen Kis <>corsideredas "data", abook on Mit, Everest’ geological characterises maybe con: sidered as "information", containing practical information, suchas the best w: avant ‘AY foreach Mt, Everest's peak may he considered as "knowledge". DIFFERENCE BETWEEN DATA AND INFORMATION iesused for reference or analysis, 4 Numbers characters, symbols, images, etc, which can be processed bya computer. ¢ representation of information. + Interpreted bya human ora machine, to derive its meaning Forexample, Marks such as 67, 88, 90, and 77 are considered as data, Informationis + Knowledge derived from study, experience (by the senses), or instructions. + Communication ofintelligence. + Theinterpretation of facts, concepts, etc., in some context that is exchangeable amongst people. +. themeaningful output, which we get after processing the data. For example, if we relate the marks with a boy whose names Rohit, a student of class IX, who has scored 67 in English, 88 inMaths, 80in Physics, and 77 in Chemistry, then it becomes information. ill mucmmenia In today’s advanced society, the concept of vitimedia is present in many facets of life. fi Multimedia can be termed as the combination of different types of media (e.g. text, audio, graphics, animation, video, and interactivity) to convey information. Multimedia involves the use of computers to present text, graphics, video, animation, and sound in an integrated way. Multimedia can include a range of formats, from 2 simple PowerPoint slide show to a complex interactive simulation (Learning Gireuits). In most cases, it enhances a user's experience and results in easier and faster understanding of the presented information. BEI muctimepia Formats Multimedia elements (like sounds or videos) are stored in media files, The most common way to discover the media tyr is to look at the file extension. When a browser finds the file extension .htm or .htmi, it will assume that the file is HTML page. Picture formats are recognized by extensions like .gif and .jpg. Sounds stored in the AU format have t ‘extension .au. MP3 files were originally developed for video by the Moving Pictures Experts Group. We can say that M files are the sound part of the MPEG video format and one of the most popular sound formats for music recording. samt wan Kipsstoredin MEDS browsers. Videos: Me ft. vyeloped by Microsof Scored by Microsoft. Videos sto¥e* inthe AVI format have the extension ay” 4 in the Windows Media format hy the w widely supported by a ‘Video interleave (AVI) format was Windows Media format was 3150 extension aviv. I] auLTIMEDIA ELEMENTS nd animation. t - s including text, graphics, sound, video, and animation: Let us learn thy ‘Multimedia comprises of several element significanceand use ofeach multimedia element the most fundamental element of ary compose and edit the red from CDs and the be used to add visual TEXT: Text is perhaps multimedia project. We can use applications te text. Text-based information can also be gather Internet. Applications, such as Photoshop can effects to text in order to create an appealing presentation. GRAPHICS: Graphics can be incorporated into a multimedia project I? the form of photographs or designs. Graphic images can be imported | from a variety of resources, such as the Internet, digital camera, ‘scanner, or resource CDs such as Art Mania 12,000. Original graphic designs can be created with applications, such as Hyper Studio, Movie ‘Maker, and Photoshop. ‘SOUND: sound can be added to a multimedia presentation from a variety of sources. Original sounds can be recorded usinga microphone along with special programs such as Hyper Studio, Movie Maker, or Smart Sound. These application ‘as welll as QuickTime Pro can be used to import sounds from an audio CD or the Internet. VIDEO: Moving images or video can be incorporated into a multimedia project in the form of QuickTime move, QuickTimePro, Hyper Studio, and Movie Maker can be used with a camcorder or VCR to create and edit QuickTime ‘movies. These programs can also import movies from the Internet and from resource like CDs. Movies that can depcta 360-degree panorama ora movable object can also be incorporated into a multimedia project. ANIMATION: Graphics that contain movement are often referred to as animation. Animation files can be downloaded from the Internet in the form of animated GIF files and viewed with QuickTime Pro, Hyper Studio, and Movie Mabe Hyper Studio and Movie Maker can alsobe used to create and edit both frame and path animation. BBIl appuications oF muLtiMEDIA We can find applications of multimedia in various fields including advertisements, art, education, entertainmet engineering, medicine, mathematics, business, and scientific research. Some of them are discussed below: ENTERTAINMENT AND FINE ARTS: Multimedia is widely used in the entertainment industry, especially toaddsPec# effects in movies and animations. Multimedia games area popular source of entertainment. Some video gamesalsu multimedia features. Multimedia applications that allow users to participate actively instead of just siting 2 pas recipients are called Interactive Multimedia Applications. There are multimedia artists who have the ability to blend techniques using different media, that help in incorporating interaction with the viewer. Another approach ental the creation of multimedia that can be displayedinan art galley. Digital recording material sedi galleries toimpartthe information. often used in museumsands™EDUCATION: In Education, multimedia is used to produce Computer-Based Training courses (popularly failed C37) and reference books lke encyclopedia. ACBT help the user to go through a series of presentations, textabout a particular topic, and associated illustrations in various information formats. Edutainment is ‘an informal term used to describe the blend of education with entertainment, especially multimedia entertainment. ‘Tneidea of media convergence is also becoming a major factorin education, particularly higher education. Media convergence is rapidly changing the curriculum in universities all over the world. This is formally used in distant learning programs conducted by the organizations like Ignovete. JOURNALISM: Newspaper companies all over the world are trying to embrace the new phenomenon of multimedia technology by implementing its practices in their work. News reporting is not limited to traditional media outlets. Freelance journalists can make use of different types of media to produce multimedia pieces for their news stories. News agencies can now engage global audiences and tell stories using technology, which develops new communication techniques for both media producers and consumers. ENGINEERING: Software engineers use multimedia in Computer Simulations for entertainment and industrial training. Multimedia is used to design software interfaces which can be used for creative professionals and software engineers. For example, a scientist can look at a molecular model of a particular substance and manipulate it to arrive at a new substance. INDUSTRY: In the Industrial sector, multimedia is used to present important information to clients, shareholders, superiors, and co-workers. Multimedia is also helpful in providing employee training, Other industrial segments, such as marketing, branding, positioning, etc., use multimedia to redefine the traditional approach of their respective businesses, MEDICINE: In Medical sector, doctors can be trained by showing virtual surgeries. They can also simulate how the human body is affected by diseases spread through virus and bacteria, and then develop techniques to prevent them. + A computer network is a group of computers and peripheral devices connected through data communication system to facilitate the sharing of hardware and software resources among different users. The network components are server, client, networkinterface card, and mode of connection. Intranet refers to a computer network within an organization. Extranet refers to a computer network that allows controlled access from the outside for specific business or educational purposes. + Modem stands for Modulator Demodulator. There are two types of Modems: Internal modem and External modem. a tenia ym Kips <2)‘There are four basictypes of computer networks: LAN, MAN, WAN, PAN. Internet is @ network of billions of computers which are connected to each other to share inforntion yy resources. Transmission media can be classified into two categories : Guided media and Unguided media, Guided media uses physical wires. They are clasified on the basis of material used, such as Twisted Pai yg Coaxial able, and Optical Fiber cable. Unguided media uses wireless media for transmission. The common ways to establish wireless networys Bluetooth wireless technology, Infrared wireless technology, and Wi-Fi. Data refers toa collection of numbers, characters, symbols, or images which can be processed by a computer, Informations the knowledge derived from the study, experience (by the senses), orinstructions. Multimedia can be termed as the combination of several types of media, ie., text, audio, graphics, animation andvideo. \WiMaxstands for Worldwide Interoperability for Microwave Access. Microwave is a wireless communication technology that uses high frequency beams of radio vraves to provide high speed signal transmission that can send and receive voice, video, and data information. ; * Radio wavesisa wireless transmission medium that distributes rac o signals through the air, TCP/IP (Transmission Control Protocol/internet Protocol) isa suite of communication protocols used to conned. | various computers on the Internet. FTP or File Transfer Protocolis a standard Internet Protocol for transferring files between computers, In Education, multimedia is used to produce Computer-Based Training courses popularly called CBT and reference books like the encyclopedia BRAIN DEVELOPER === SECTION 1: OBJECTIVE TYPE QUESTIONS-(SOLVED) A. Multiple Choice Questions: 1. The computers which are located at far away locations use the system for date ‘communication. a. Cable b. Hubs . Routers d. Telecommunication 2. Which one of the following is not an advantage of networking? a. Software sharing b. Security Internet sharing _d, Dependence on elect 3. A.computer system, which can access a remote service from a server using a network is called a. Server b. NIC c. Node 4d. Bridges. 4, Which of the following is not a basic hardware component which connects the nodes in a network? a. Hub b.isp ©. Bridge 4. Switch cian "310. cra 12. 13. 14. 15. 16. 17, 18, 19, 20. 21. ’A computer network restricted to the employees of an organization is known as a. Extranet b. Intranet . Modem 4. Server ‘ converts digital signal to analog signal and vice versa. eee b. Modem WiFi 4. Extranet ‘Acomputer network, which is used for communication among cor each other is called 1g computers and their peripherals close to a. WAN b. PAN MAN 4. None of these ‘The maximum number of computers in a LAN can be 2.10 b. 100 c. 1000 4. 10000 ‘The maximum range of MAN can be km. a.10 b. 20 40 a Which of the following is not a web browser? a. Google Chrome —_b. Mozilla Fire Fox Yahoo d. Internet Explorer ~~ fefers to a collection of numbers, characters, symbols, and images. a, Information b. Data . Knowledge d. All of these instead of electronic signals to Optical Fiber is a networking medium that transmits send data. a. Light rays b. Infrared rays c. Radio waves d. All of these Optical Fibre cable and Coaxial cables are the categories of a. Guided media b. Wireless media c. Unguided media —_d. All of these cable transmits multiple signals at the same time and is used for longer distances. c. Ethernet d. None of these a. Broadband Coaxial b. Twisted Pair Which of the following is not an example of wireless media? a. Bluetooth b. Infrared cc. WiFi 4d. Optical Fiber Which is the most widely used form of wiring medium that transmits transmission over longer distances and at higher bandwidth? a. Ethernet b, Coaxial cable . Optical Fiber cabled. None of these Identify the odd term amongst the following group: Coaxial cable d. Bluetooth technology a. Ethernet Cables _b. Optical Fiber provides free or low cost online storage for the users. c. Google Play Stored, None of these a. Reddit b. Drop box A cloud which is accessible to both private and public users is called . cloud. a. Private b. Public c.Hybrid d. Community A protocol used for exchanging files between computers. a. TCP/IP b. FTP HTTP d. None of these are the two most popular Internet standard protocols for retrieving e-mails. a. TCP/IP b, HTTP/FTP cc IMAP/POP d. None of these ‘ saat tiene Inw nnwer radio waves to connect electronic devices wirelessh23. expe a 10. 11. 2, 43. 14. 45. 16. 17 a. Radio wave b.Micro wave c Wi-FI A communication device, a. Hub 4. None of these. Used to regenerate a signal. b. Switch c. Repeater 4. None of these Video stored in MPEG format have the extension. a.avi b. wmv mpg 4. None of these Fillin the blanks: TRE err ‘identifies every single node in a network by providing a unique physical address tot, {AM roonsonsnnn FOFEFS £0 & Computer network within an organization An . Fefers to a computer network that allows controlled access from outside for speq business or educational purpose. Acable modem connects to the Internet using a access through a telephone line. The maximum range of LAN can be... Km. —— ~ 1S 2 type of network that requires a telecommunication media or satellite signals to tra data. ‘The actual protocols of TCP/IP model are called Bluetooth technology sends information within its personal space called the... cable's basically designed for connecting to computers without a hub ora router, technology requires a line-of-sight connection between transmitter and receive State True or False: Data communication means sending data manually from one computer to another, Networking of computers reduces the redundancy of the same data, Ina network, internet facility must be installed in every computer, ALAN is much larger than a MAN The maximum range of LAN can be 50 km. Cloud is defined as a set of services available to private individual / organization only. A Gateway is a network point that acts as an entrance to another network. IP or Internet Protocol provides a sequence number to each of tht reach their destination in the correct order. \@ packet so that they might Internet browsers have an in-built feature to make FTP requests to other servers. In case of guided media, there is no physical path for data transmission. Cables are the most common medium for communication. Coaxial cable was invented by Oliver Heaviside in 1880. Fiber Optic cable transmits electronic signals. The term node may refer to any device connected to a network. ‘Transmission of computerized data from one location to another is called communication, Picture formats are recognized by the extension like .gif and .jpg Sounds stored in AU format have the extension .mp3ae Ans: ie Ans: os a Ans: all the applications or information from the main s 4, Whatis a Modem? Mention its ‘Ans: ‘Ans: 40) 5.06) 6H) 7.0) % ‘ a LY ee ee Hey a7) Mle) 840) 200m) hy day Ty ‘ Fin hts | ietworcintertocecard = intranet. B.Extranet a. tradnand scen s wis seope vine despre gerossowee — 10Inrared Wire 5 ous apt ose State Tue or Flee ae 2am Mn AB Rit) a ism 36) 7.18 A. Midge Choice Gunton SECTION 2: THEORY QUESTIONS-(SOLVED) Whats a computer network? ‘a computer network is @ group of computers and peripheral Communication system. Itfacilitates the sharing of hardvare an watenae rented theasgs 2 date CMA UES, what is Networking? Explain any three advantages of netwe Networking is the practice of linking two ar mare computing devines tage! hardware and software resources among different users, Networving uring in any organization. The three advantages of netwa 1. Software Sharing: Every application software can e ‘on every computer individually. Computers in 2 network can This technique saves cost as well astime. 2. Reduces Redundancy: In a common work place, since network by saving and storing it centrally. This reduces 3. Internet Sharing: A network reduces the cost of inst corporate internet connection is powerful enough to Allthe systems can enjoy the benefits of the intern! Explain the functions of server and cli ss of computers wi Aserver is a powerful computer or 2 5 can link other computers or electronic devices to network to both private and public users vie the [A client is a computer system which u: Modem stands for Modulator-Demodulator. We know that nd" i.e. Binary Language. ‘The modem from the sender's side (Terminal/Web Server) modulates the digit: ‘ompatible with the telephone line, i.e. analog signals. The receiving modem 2} this analog signal back into digital data. Hence, 2 modem modulates a5 w There are two types of modems: Internal modem and External modem. ‘Whatis the Internet? Briefly explain any three uses of the Interne ‘The Internet is @ worldwide network of computers that uses common communication standards and Interfaces to provide the physical backbone for a number of interesting applications. Computers on the Internet use remote server machines to share files and devices with the user machines. The uses of the Internet are as follows: 1. Business: These organizations use the Internet ta provide complex financial databases. Meetings can be scheduled and conducted through video conferencing facility. Railways, airways and hotel reservations can be made through the Internet. 2. Forum for discussion: The internet is used as a platform for discussion with like-minded people. Several professionals connect to various forums to discuss the latest techniques in their fieid of specialization. Saas wan Kips <2>ternet. It allows you 3. Maing eters: Electron mailis one of the most popular featurm of Ep Lis eal on i aa ae epccive moezages free of cost, You can aso attach pletures, videos, a receive mess send it to anyone around the world. '_iBerentiate between Bluetooth technology os: CS eres! ‘ang ang hnolooy, and Infrared wireless te Po littsd sd for data communication 1. Intended for data and voice communication. _| Intended for day eile rea Network to connect Tees Personal Aree Network to estaba | | multiple devices. 6 3. Te does not not require line-of-sight for It requires line-of-sight for transmission, transmission, | 4. Can penetrate solid objects. | Cannot penetrate solid objects. | 5. Uses low power radio waves to connect | electronic devices wirelessly. | Uses wireless technology in devices or systems “that convey data through infrared (IR) radiation 6. [Range varies from 10 meters to 240 meters. _| Spans very short distances(Range upto § meters) What is the role of transmission medium in a network? Ans: Computer network, being a communication system for computers requires one or more transmitters arg receivers, a communication channel, anda message. | Data transmission occurs between transmitters and receivers over a transmission medium. | ‘The computers and other devices that communicate with each other on a network are called nodes. Cablesare the most common medium for communication. Other mediums include Optical Fiber, Infrared light beams arg Bae tte What is a Coaxial cable? Ans:_A Coaxial cable is used in the transmission of video, communications, and audio. It is maiply used by the ats | television industry to connect TVs to a cable TV service. However, this cable can also be used in networks eng has high bandwidth and greater transmission capacity. A Coaxial cable consists of central copper we surrounded by insulation and then a shield of braided wire. The two main types of Coaxial cable are: Baseband Coaxial cable: It supports quick transmission of a single signal at a time. Itis mainly used for Lats. Broadband Coaxial cable: It transmits multiple signals at the same time and is used for longer distances. 3. What is Wi-Fi? ) | Ans: Wi-Fi stands for Wireless Fidelity. It creates a Wireless Local Area Network that uses radio waves to sendtt information. A secure, reliable, and fast wireless connection is established between the electronic deviceset4 the Internet by using this technology. The devices require a wireless adapter connected to them to capturet™ Wi-Fi signals. 10. Differentiate between data, information, and knowledge with a help of real life example. ns: The main difference between the three lies in the level of abstraction, While data is the lowest level! abstraction, information is the next level, and knowledge is the highest level of abstraction among alt Dats on its own carries no meaning, Datais to be interpreted and processed to get converted into informa For example, the principal of the school wants the details of students who have scored less than 40% mats aggregate. The principal asks the coordinator to fetch the details of such students from the school ofee2™ prepare a concise report. In this example, the school coordinator will get the data from the schoo! office in raw form. He will exe required data; the collected data will be treated as information by the coordinator. Finally, the report NMC) principal will get, is knowledge. With the acquired knowledge, rect) ‘measures to improve the performance of the students, i armas vin KIS the principal can plan some ©{Node Dummy 5. 6. 2 8, 9. SECTION 3: APPLICATION BASED QUESTIONS-(SOLVED) teacher Is explaining networking to the students in a computer tab. Yhat vill she call e computer system in dnetwork which accesses the main computer for allits applications ina computer lab? Which type of quided media will you suggest to be used by the cable operatorin your city? Which type of network will You recommend in a school for data and hardware sharing? Which type of network is used by your local telephone exchang: Ra au avis SECTION 4: APPLICATION BASED QUESTIONS-(UNSOLVED) Ranjit wants to transfer pictures of a schoo! play from his mobile to Manish’s mobile. Suggest eny two wireless mode of transmission which he can use for the same, Which type of network do we use in our homes while connecting 2 computer system and peripheral device like aprinter? Pepsi company has its corporate office in one part of the city while the production unit isin another part of the same city. Which type of network is most suitable for communication between both the units? Which type of network is used by the Indian Railways for providing their online services? Raman is travelling by train and has to complete an urgent client assignment. Which wireless med use to send the fie to his client? Your Uncle has five offices in different cities, He wants to connect his computers via networkin: officies. Which type of networking will you suggest him to go for? SECTION 5: SHORT ANSWER TYPE QUESTIONS-(UNSOLVED) What is Intranet and how is it different from Extranet? Write the full form of the following a. NIC b. ISP c. LAN d. MAN e. WAN f. PAN Who designed FTP originally? When was it published? Write a short note on WiMax. Give two examples of each: b. Transmission d. Wireless Networking Technology a. Modem . Fiber cable What is the maximum data transmission range of bluetooth technology? What do you understand by the Radio wave? Name any three network components. What are the three types of cables used in wired networking technology? 10. Write an application of Coaxial cable, Why is it called Coaxial cable? 4. SECTION 6: LONG ANSWER TYPE QUESTIONS-(UNSOLVED) Differentiate between LAN, MAN, and WAN. Describe the different types of networks. Explain the types of modem. Explain any four advantages of networking. Learning Computers ia should he 1g at various wo Kips 3Cyber Safety © Cyber Safetysane to ustoday andhas become 2 vita Part OF Of. latabases availabe performed through personalinteraction ear ne shared anise -mscomputersand dataave BECOME.an inp! edly, the Internets thea ifwe are aware and ue, meres soe fhe ret orn sad ler and more convenient place to live it i tou beng oie do jer to this question may be Yes, transformed the worldinto small ind worms may infect oUF COMPLET. SO, We aly, impossible to think even a single d2¥ isitsafe?. The answ malware, 2 jad or run onour computer. sfand visit trustworthy links with awareness i, ‘The unprecedented increase in the use of ty Sensitive information loss, online frauds part of our life, i resource for us, but the question arises, right tools. While using the internet, many types of viruses, seed to be extra careful about the program which we downlo: ‘We may get alot of benefits from the internet without any risk, if we su good to be techno savvy, but it is equally important to be safe online. srmation to several threats: Internet and related services has exposed our info scams, and crimes have become a common cause of concern in this chapter, we will earn about the possible threats to our computer and how to protect our personal information from these threats by taking preventive measures. Bl] wnatis cvBeR SAFETY? You must have seen your parents visit the bank to operate the locker. What purpose does the locker solve? Your mother keeps her jewellery and valuables in the locker. Your father keeps important ‘and confidential documents in the locker. The locker provides a safe and secure environment for the belongings. What will happen if your parents leave the jewellery, valuables, and documents outside the locker by mistake? They will be stolen and misused. Similarly, when you access the Internet, you key-in a lot of personal information on the websites you visit and the social networking websites that you are a part of. Though this information and details are Password protected, yeta lot of them can be accessed by other people. This unsecured information and details can be stolen and misused by thieves on the internet. Thisis called cyber theft. Cyber theft is stealing confidential, personal, and financial information, such as passwords, bank details, credit card details, etc. j froma personal computer or device and misusingit to harm the user.to provent cyber theft, you need to Keep most of your personal, financial information, and online data safe. This is knownascybersafety. ll wearts ONLINE IDENTITY? hats the first step to join any social media like Twitter, Facebook, WhatsApp or Instagram? You fst hve to create alogin, which requires tokey-inallot of personalinformation such as, Internet identity (1D, also yourname, date of birth, address, ete known as online identity is ; a social identity that an This information creates your online identity or social identity on_ | Iternet user establishes in the internet, People actually look at your online identity when they | me comantsand see your profile on the social networking sites, Remember, you have to be very careful as to what and with whom, you are exchanging the information online. IDENTITY THEFT When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as identity theft. In other words, you can say that Identity theft isany ind of deception, scam, or crime that results in the loss cofpersonal data, including the loss of usernames, passwords, banking inform: Unique Identity Number (UID), which is then used without your permission to commit fraud and other crimes. In today's world, the biggest challenge for every Internet user is to safeguard his or her identity, which is constantly under threat from cyber thieves, hackers, and keyloggers. n, credit card numbers, Aadhar ID or Identity Protection While Using the Internet Listed below are some of the waysin which you can be a victim of identity theft a. Phishing: It is the act of illegally acquiring personal and sensitive information such as, online banking details, credit card details, and other login details, of an individual by sending malicious e-mails or by creating web pages that can collect this information as they appear to come from very famous organizations. b. Dumpster Diving: It is a technique used to retrieve personal information of a user from his discarded documents. Cyber thieves search your trash to get information about your bills, credit cards, and other personalinformation, like codes or passwords, which they can use to carry out an attack on a computer network, © Shoulder Surfing: tis obtaining personal information, such asa PIN at an ATM machine, personal details while filling pa form, or the lock code of a smartphone through direct observation by looking over a person's shoulder. This happens in crowded places such as banks, ATMs, and while travelling by metro and bus. Binoculars and vision- enhancing devices can also be used to get details froma distance. d. Employment Scam: It is giving to a job seeker a false hope of employment with better salary by paying a certain amount of money. The thieves keep tracking the accounts of job seekers who are actively updating their CVs. An email is then sent to the id offering them a good job with an attractive salary. In return, the job seeker has to sharea lot of personal details, which also includes the bank details and transfer some amount to them. These details are sari an Kips?mal details foridentity thefts See the screen capture, a rey it or perso then used to gain aecoss to their bank accounts OF P below in Figure 7.1 and Figure 7.?. ez tom nich enact Wp rane ere ‘tre fd bo mora om Fon ‘Sense ors non a ace wm te SE 2 | reer ; = ego Figure 7.2: Employment Scam son's personal information using a fake name oF fake company. Its the practice of obtaining a per : le who use it to steal that person's online identity. then selling thatinformation to peopl BB] many ways WEBSITES TRACK YOU derstand this. Suppose, you are looking for coaching classes online. afte How do we get tracked? Itis important to un e day or so, you start receiving emails from various websites that offer you online tutorials, coaching material, ange home tuitions. Although, you did not surf or register on any of these sites, then how come these websites got the deta, of the data you were looking for online, thisis because when you surf the net, the websites keep a track of your actives and use the data you share to track you. These websites also collect information about the type of websites and page, you are visiting, your location, what you usually read or search for on the Internet, etc. This basically can be termed, onlinetracking. TRACKING SCRIPT “The Google Anais How do these websites keep a track online? Tracking scripts are used for this purpose. | shows the usage pater | toa site's ouner wher Tracking scripts can be deployed on any website and can track visitors easily. Tracking script ante une! wees identifies the number of people using your site and their characteristics. These scripts are proadeast the number designed in a way that these can be downloaded and cached safely in a browser. There are | people that usetheste and some of thi characteris, also many ways available to configure tracking scripts. The most common tracking scripts are Google Analytics and Quantcast. Fortunately, there are many built-in browser options which may save you from tracking. Here are the ways by which websites can track you. 1. Address: How do you receive a letter through post? It is because of your 4 Postal address, which is unique. Similarly, when the data is | ‘e*eee! 4 fers transferred from one computer to the other in anetwork,itisdone | a with the help of @ unique numerical address assigned to the | hardware (computer, router, printer, tc) connected to the ec | Internet. This is called an IP Address. P address isan acronym for |___esralon Addons 101102682) Internet Protocol address. tis similarto ourhome or office address Figure 7.3: IP Address which is unique. Whenever youvvsita website, the device you use shares an IP address with the website. Withthehel®™ this Ip address, awebsite can roughly estimate your geographical location Your IP address might look lke this:161.102,65.121 as shownin Figure7.3, seat wan Kips 2> 32 Cookies: {cookies are soll data les which are sent by the website you vist and ate generated by your browsor These are then gored on you device, Cookies are Used to track your record of visit to a particular website/webpage, A website recogndses your withthe help of cookies, wlien you agatn visit that website, Siar, when you uso your edit card for any transaction, 2 cookie wil store your login information, Diferent web brenvses have dforant privacy settings, You cango to your browser's settings and choose private browsing, This will provide you control over which kind of cookles youwillscceet tryoudo not want te allow cookies, you may disable them qypesof Cookies + Bist Party Cookies: These kinds of cookies information ete. for the frequently visited websites. For example, when You tse your card to recharge your phone, the ste storesall the login information and you only have to enter the password or CVCnumber, sre generally used to store your login id, password, autofill + Third Party Cookies: These are the cookie: browsing history. These. * that websites store to get details of your search history and web ‘are most often used by adv ertising companies to track youacross multiple websites that you Session Cookies: These are temporary cookies thatare deleted after you close down your browser. 3. Super/ Persistent Cookies Super cookies are the type of ‘tracking cookies’ which are designed to permanently reside on a user's device. These are inserted into the HTTP header by an Internet Servi of g user These are also know! nd remove: ice Provider (ISP) to gather data about the browsing history and habits 8 8s Unique Identifier Headers. Unlike web cookies, Super cookies are difficult for the userstodatect from thelr browser or device as they can camoutlag which can prevent their detection. These 3d to target users for specific adv eertising and promotional purposes but can be a potential privacy threat tothe users, Thus, without the user's consent, passing such information about their subscribers can be unethical on the cookies are partoft 4, HTTPReferrer While browsing @ website, when you click on the website link to open the source of information you requested for, the alike your IP address, location, machine type, web browser, etc. issentto the linked website. The website will not only setup cookie In your browser but also record the URL of the website where you came from. So, HTTP Referrer can be defined 2s en online source, which increases the visits and the number of visitors to a website. It may include search ‘engines, links from other websites, social media, online advertisements, email marketing campaigns, and links built into software, A referrer log is also maintained, which can lead to the referring page and the link that was clicked to reach a rewwebsite, Google «s ‘When you dick on this ink, anew page/webse opens up. Your information lke I ares, location, et, wil alsobeprovdedtothewebste. apt etl Compr Booka teenie na sas aeeeneaee: Sr eae Figure 7.4: HTTP Referror7 5. User Agent User agent refers to the software program such as your browser or a session initiating application (Eg, iy other web-calling application). When you initiate a web session, these applications pass your informatio, CO application type, operating system used, software source, version, ete. This information can be tracked aaa web serversto determine the user's web activities and behaviour ‘Store jebsite by typing “my user agent” in your bron You can find out the details that are sent by your browser to 3 Wi are displayed (Figure 7.5 and Fgureng My you press the Enter key, the details similar to the screenshot given below details include the browser name, its version data, ete. 7 care 7 | | Nour eer ageti ‘my user agent Dats atoa tet i and operatig se reuse ® Browse Information: YourPadies day slong with 3 fag Your eser agen nee epi the cam Mozilla/S.0 (Windows NT 6.1; Win64: x64) AppleWebkiv837.36 | =" [seer | (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36 arr] browseranddce Figure 7.5: My User Agent With all these trackers that are mentioned above, auser's browsing habits, devices used, interests, and identtiesse tracked. So, the question arises that is there any way by which you can access the web without revealing uchat yourselves? Yes! Further section reveals the inform le browsing the web, a user may wish to hide his identity ontheweb.a nto the above question. Inthe sections above, you have seen that whil information may be used for: 1, Tracking our web movements. 2. Attacking our profilein the cyber world. “The following methods can be used to protect our personal informatio Will anonymous BROWSING We need to hide our identity either intentionally or due to governmental and professional restriction’ requests, originating from our machine, carry @ lot about our identity with them, we need to be aware of thew fh this information can be concealed from the third-party proxy server or unauthorized vendo: ®Y |e eliminate all these factors and browse the net without revealing any persona! inform is essential to encryptthe data to hide one’sidentity. since al whict anonymous browsing, interests. Thisis why | ll Private BROWSING Jing also known as “Incognito Mode”, is a means by which we can safeguard our i ig incognito browsing mode in our web browsers, we can prever ity nd Private browsi details when online. By enabln ailsasinthe autofilfeature + Savingofourdet tal saving of usernameand passwords 4+ saving of browsing history wh + Acide i yenaccessingthe web from a publicdomain‘Tough private browsing restrlets the hntormation hein sunt out fon your device, Wt stil does not make You completely anonymais, Your 15P can stl trackyour behaviourthrough your IP address To activate the Incognito mode, epen your rower, Select the Fhe » News private Window or New Incognito Window, 11 Window. Figure 2.7 shows Google Chrome tn opens the incognita conn Window, Different browsers may have different names for the incognito mode tle Shift eN chrome Firefox: Ctrl Shift P Internet Explorer: Ctrl Shitty P Figure 1: Shuone tnozrstbe eve ‘Most of us book our flight Uckets and hotel rooms anki particular date fora particular destination, 4 When we He penerated, Suppo, dus king cookie book the tickets oF the hotel room in that brow tickets or the hotel, you see that the Drices have Increased. This is bee Example and know that you have to travel on a particular date, On the otfier hand, in inten tariffs do not change as the site is unable to checkil you ha ve visited the site before 1, Proxy Server Aproxy servers a dedicated computer or a software syste which acts as.an intermnediary betwee suchas a computer, and another server [rom which a user or elient requesting 3 get the information on the proxy server and you can still browse the site without disclosing your Examples of proxy servers are Apache, HAProxy, Nginx, etc Remember, many applications or web servers deny access to requests, which have 0 the web. Proxy Sorvor Internet Figure 7.8: Proxy Server let's take the example of a school to | understand how proxy server works. In a school computer lab, a proxy server can be Installed to check the browsing activities of | students. A student sends request to the Bonet Petes Website, whichisfirstanalysed and checked by | SFE Ebro eta sathncetnte ony senee |, SE Thus,itadministers the websites visited bythe | kisi Students and also protect them from bogus sites byblockingthem. Proxy Server and Firewall st wm Kips 2?2. Virtual Private Network (VPN) \VPN allows you to hide your true identity by encrypting the data and web traffic, thus making it impossible for any third party to decode it. A VPN changes your IP address and connects you to a server with a different IP and location. As 2 result, no browsing cookies are saved. AVPN has many useful features such as a military-level encryption and firewall, which makes it an excellent tool for online privacy and |e er aes security. That is the reason many people, businesses, governments, and military organizations use VPNs. ‘trying to access your sensitive Nowadays, you can set upa VPN at home to protect yourself from hackers trying fata is Cisco's VPN client and server software. Figure 7.1 Encrypting Data Through vey from other dangers of the Internet. Example of VPI HOWTO PROTECT OUR DATA AND IDENTITY ONLINE? ‘The internet has changed our lives in countless positive ways, butitalsohasa darkside. Every three seconds, someone's identity is stolen. With social media channels like Facebook and Twitter remaining as Popular as ever, cyber criminals are able to access a wealth of, personal information ontine. Even people who think they are being cautious with their privacy settings could be vulnerable to a cyber attack ~ particularly if they allow third-party applications to access their profiles. Once a user's information such as location, cate of birth, and family connections has been logged, this can be used hackinto their other accounts, such as banking and online storage. !f your confidential information is in so much danger, then how can you protect it online? The best way is tolinity data sharing online. The following ways can help you limit your data exposure online. + Exclude important personal information from your social media profiles: Details like your phone number, aie children’s age, or school can al help hackers to collect more information. For example, oon any social website selective in adding or not adding ‘friends’, minimize the details in your ‘About Me! section, and be selectivezt hitting the 'like' button. All ofthese will make you harder to be found, * Check your social media privacy settings: For a more secure profile on any social website, change the stint “Friends Only” for all posts. * Protect your online passwords andi strengthen them too: Many of us use passwords which we would not forget, like 1234, our birth dates, or our home towns. But the rule is, if they are easy to remember, they aree Crack, too, So, select a password which s difficult tobe traced, but which you can remember. Always use a? whichisa combination of letters, numbers and special characters, + Check your phone's privacy settings: Turning your GPS location settings to “off” can also keep your familys abouts more private. Computers wit MIPS4 Watch out for ‘phishing’ e-mails: Spam email is getting increasingly refined, Never react toany messages with account data or passwords. Banks will never request for such data ifaletse falls callthe bank specifically to check or, even better, delete the emall, + Keep your communication network secure: Secure your password s0 that the hackers in the local area ea ‘malicious activity. The GPS lobal Postioning Stes sett bsed it proves Gea oeton he tine eermaton, | Weuserso wars any shecktheweb | cguendecperates after the hitp. It does not, then donot | “tieptonyer (internet reception !nnot use your connection to carry out 4+ Check forthe https//: Before entering payment details into any website, address has an 's' ~ which stands for secure seit. ‘+ Monitor the posts you get online: Beware of anything suspicious in the mail ike pre- approved credit cards that you have not applied for and other money related offers + Protect your computer and smartphone with strong, up-to-date security software: If your computer or phone is infected with malicious software, other safeguards are of little help because you have given the criminals the key to all your online actions. Also be surethat any operating system updates are installed, Third party application ie provided by some other vendor and not the manufacturer of the + Use two-factor authentication whenever possible: You should switch all your most . important online accounts, such as e-mail accounts and social media profiles to a two- stepauthentication. This means that each connection or log-in will need to be verified by text message or e-mail, as well as with the traditional password making it much harder for hackers to get in. Two-step authentication also has the advantage of warning you in the event of an intrusion. You will then know that it's time to change your password. jeaeeineea Sil \ i: Free and open Wi-Fi, and hotspots can serve in cutting your Spam refers to bulk of data charges and are helpful in completing work efficiently. They are also notoriously Eerie insecure, and criminals can easily use their flaws in order to see what you are doing \Unknown sources. online and access your accounts. If you need to go online in public, using your phone and acellular connection isa much more secure option. +. Stayaway from public Wi ?ASSWORD \ password is just like a key to your personal information. It guards your personal information 4 rom potential online risks. Your secure presence in the cyber space is completely attributed othe strength of your passwords and your ability to keep them safe. Several means besides phishing and spyware are used to gain access to your secure username passwords. ‘When you create passwords with Any malacious combinations of letters and programme ona computer or mobile numbersthatareuniqueforeach | : jevice, such as virus, online account, you will make it | orm trojan horse, more difficult to unlock your Spyware, ete. identity — keeping your | arecollectively called Malware. information safe and secure. Compare win KIDS <3{van the best protective armour, the chances of anything getting through are greatly mini ised. It means that toimpossible to get through your data and information. We ave astrongpassword, tts ‘What makesa strong password?" Jow the next question viany people choose a password that is easy to remember = like an address, pet's name or special date~and us, ind aver agaln, The attackers try these combinations first because they are the pleces of information that ae ga aban, foprotect yourpasswords online, follow these tips to make them strong: + Makesure that the password is minimum eight characters long, + Use combination of upper and lower-case letters. Include at least one numeric character and one special charac, + te creative, Use the first letter of each word of a memorable sentence or phrase, then make it even tougher by ing, some of the letters to numbers. For example, the phrase, “All that glitters is not gold” can be written AGingOLS. Never use personal information like your name, birthday, driving license number or passport number. + Never store your pa sword on your computer orin your mobile phone. ‘When youare signing in to your account, deselect the auto selected option, “keep me signed in” or “remember me’, Clear yourbrowsing history or cache after online banking and shopping, so that no one can access it. + Alwaysensure that the sites genuine and secured before providing your credentials. + Avoid using passwords like words spelt backwards, misspelt words, abbreviations, and single dictionary words that are easy to figure out. Do not repeat numbers (5555) and letters (bbbb). Do not include simple sequences (abedefg or 56789) or letters hat appearin a row on yourkeyboard (qwerty), instead use complex sequence like a2b3c5d7qywert. +. Always create a unique password for each account. Avoid using the same password for multiple sites to prevent data loss, + ‘Theanswers you provide for the security questions, should be as strongas your passwords, + Payattention tothe browser's security sign: Ifyou detect anything suspicious, refrain from using that resource. Password strength, Password strength is the measure of a password's efficiency to resist password cracking attacks. The strength of 3 passwords determined by: Length: The number of characters the password contains. Complexity: The use of combination of letters, numbers, and symbols. Unpredictability: Level of difficulty that the attacker cannot guessit easily haeLetusnowlookat practical example. Wevilluse three passwords namely: 2. Paryantidat Pacers vee @ o tiie paionbultt ono on or ian a ros ret | “The pasture a hangars | ieee terete Bassnnet (opr) se the password use is Aaryanlida ard te srengh 1. tis very neat ———————— fpannwordis | TAD) Posner CRACKING A PASSWORD The following are the most common password cracking techniques in use: + Dictionary attack: In t users while creating pa: password used by the u: resources. + Brute force attack: This technique is similar to the Dictionary attack but with a litle difference that it detects the password using algorithm, which uses alpha-numeric combinations. So, in this method, in place of dictionary words, alphanumeric combinations are used to gu password eventually. he password. Although this techniques slow but it uncovers theuser + Rainbow table attac In hashed password technique, swords are secured by indus password. Using an algorithm, Rainbow technique reduces these hashes to recover the then generates anew string which can be used to guess the user password. + Phi i hashes in the original inal password stringand ing: Phishing isthe act of sending an e-mail or a message to 2 user with the intention to steal the confidential information. In other words, in Phishing, the target is contacted by an email, telephone or text message by someone claiming as a legitimate person, or institution to lure the individual into providing sensitive data like personal information, bank details, credit card details, etc. Spidering: Spidering uses programs, which can scan the pages of a website one by one, and in this process, it scans ‘and extracts the useful information and stores it in search engine's database. The information in the database can then be used to extract useful information related to 2 company or institution, etc, kins B| is KW business identity prOots, etc ae yer, si ; comprises a major part of confident or privacy loss. Confidentiality g¢ i rns jon which cannot be 5 acco rotecting tis infor ing ofthis information 0 ie 1 ped secon accesses re yRCONFIDENTIALINFORMATION: identiat information, winch will help ‘The informati Information such as bank sonal. Pl important and pers vn cause finan of information a5 I information ensuresthaton! ‘BEST PRACTICES TO PROTECT ied to protect the cont you to safeguard your informatio, The best practices u include: 1. Buildstrongpasswords ne accounts. Astrong password: passwordsforall your onl <, as well asdigitsand punctuation. Itisimportantto.create strong .se and lowercase characters + should contain both upperca! Should be atleast eight characters long, slang, dialect, oFjarg0"- Should not be a word in any language ‘names of family members Should notbe based on personalinformation, sandsoon. Praca: Should be hard to guess buteasytoremember. 2. Usemultifactorauthentication ficient to secure web accounts, Multifactor authentication is oneof ‘AuserID and strong password alone are not s which adds an extra layer of protection. the simplest andthe most effective waysto secure data, For example, when user entersa UserlD and Password, the website sends an OTP tothe user's mobile device. 3. Besuspicious of unsolicited e-mail Be aware of nuisance ads and unsolicited e-mails from unknown sources. Try not to open any attachments that re alongwith such messages and do not reply to such messages, ieee that seem to be legible but are not the original ones. These sites may ask us for our personal and coni ae data, At times there are sites that send wrong messages and befool us that it originated from an organization we work with or from a cor “ are . etki 7 moaion we deal with. Always confirm to protect yourself from this situation « urce specifically to validate from whom it was sent. Ri 4 int. Remember, the priman i sending such mails/messagesis totrack your private information. oie 4, Be Aware of your Online Posting eee se ee neo ever post any personal details or one’s ocatio" Sy abit of sharing the location evs 7 ible, toy tracking feature off. Thiswill not allow anyone to know your current locati keep the mobile tracking or loca ion. 5. Protect your mobile devices Outdated software can leave i our mobile devi aaa bile devices open to security vulnerabi ie external attack, keep updating the mobile softw: aries Reema to pres bi are on a regular basi jinal exploiting a hole in your system. Most devices simplify thi . This will mitigate the risk of a cybe™ options for apps, as well as notification syst is process for us by te n operating system update is available. win KiPSEngage nsafowob browsing just ike our phone requires updates on a regular basis, so does our web browser, An | CAPTCHAis Completely cutdated browser can open up security gaps that cyber criminals may take advantage of | Wome Publi Tung test. tis used to itferetiat between appears, Both could be spyware used to plant tracking cookies on our machine, which | Comutersand Humans. . * Computers or bots are not canstealour information, direct us o bogus phishingsites, and pound us with pop-ups soa os In accessing.our data. Do not open any link from unknown sources or any pop up that capable of solving 2 Usesafe sites tosurf the internet ‘captcha, CAPTCHA is mainly used asa security ‘Always use the sites that start with ‘https:\\'. The letter's' specifies thatitisasafesiteto | cheek ensue only human uses login toa stem. bebrowsed. This should be taken into consideration, especially when online transactions are tobe made. This helps in checking the credibility ofthe website, Usefirewall ‘firewall sa network security system that monitors and controls incomingand outgoing network traffic based on predetermined security rules. A firewall may be implemented . hardware, software, or a combination of both. It safeguards our computer system | orpreteretoone time | and data from any unauthorized external source. | Password sent tthe user's . | device to cross check 9, Avoid using computers in public his/her authenticity. Avoid using computers in public places like cybercafé or labs, to access private data lke e-mails or sharing the private information like credit/debit card details. n case, you have tousethe publicsystems, make sure that: + Private browsing option is used. + Always log out properly after the workis done, Web indexing refers to ‘adding the web page + Remove the account from the systemafterlogout. Information to search engine's database that can be used by them to display in search results for relevant queries. + Nevershare any personal information. + Never save any personal passwords on the system. + Delete the browsing history. (Bl onuine sarety The Internet has revolutionized communication and it has become the lifeline of any organization. With the rapid growth of the internet and its applications in diverse fields, security risks have also increased. It is the duty of every Netizen, to use the Internet and its, services responsibly, so that one can take precautions to keep their computers and online datasafe. ‘The creeper virus was the first malware which was | developed in 1971. ‘To stop this malware from spreading, a program called “Reaper” was developed. ‘While working online, a system may get infected with various harmful programs known as MALWARE. Malware is a combination of two words, malicious and software. Malware is @ malicious program that enters into a computer and damages it without the user's knowledge. it not only interrupts the normal working of a computer, but also steals important information of a user. There can be variety of malware programs. Some common ones are: [moe The term Netizen describes a person actively + Adware: Adware are programs that send unwanted advertisements to the user's computer. These advertisements generally appear in the form of pop ups, which can Sa cid disrupt user's working, So, itis advised that before installing or downloading any | communtiesor he software, use a legitimate site and read the installation agreement thoroughly. Learning camputers win KIPS.+ Spyware: Spjrele mais cotarethat seretyronors Ne et" Computing activities, These programe ean collect variow® NOES personal information, such as eats the aie en aa ae Visiting web pages by the user oF changin : stem These ors hve eb to an len tered ve and snoop other appliations, such as chat programs or word pro%essoF While doing s0, they consistently transmit this information in the background to someone else who will either sell the information to another party oruse it for the advertising/marketing purpo” + Virus: A virus is a contagious program or code that attacks the a om and causes damage to data and files on a system. It adversely f ‘ ing any part of a affects the performance of the user’s system by attacking any pat computer software such 25 boot block, operating system, files, and Figure 7.1: Diteren Types ot tag application software that support macros or system areas. Most often thi Is spread by sharing software or filesbetween computers. ies 0 in consumi + Worm: A worm is a program which can create rnultiple copies of itself and can consume large portion of yy. memory. Ibis a malware that has the ability to self-replicate and spread across machines and networks onits oy, + Trojan Horse: Trojan Horses one of the most dangeraus malwares. tis a program (e.g. spreadsheet orgame)tha first glance seems to be useful but once it is activated, it harms the system by deleting files or by modifying us, information, Denial-of-service attack: It is a harmful program meant to slow dow a system. It can block a computer netic, and makes the software inaccessible to the user. Example: AOL, Yahoo or your business network can became unavailable. Roothit: A malware designed to remotely control your system without being noticed. Once installed it will em access and modify sensitive system information without being tracked by any security program, Backdoors: This software helps the other malware to enter your system and harmit. Keyloggers: These are software designed to capture keystrokes without being identified by the user or secs program. + Ransomware: Sends messages on auser's system that the system is locked and the user will not be able towne) ‘until one pays a certain amount. itis not a real notification rather an infe moneys totally fake and even ifone pays the amount, he still will not be abl Ill vamace causep By MALWARE ction of the system itself, This request” le to work onhis system. For example, in98Bin the USA, the Morris Worm attacked over 6000 mi ieee ays about 10% of al the computers on the network, tee on aea tah tote bee Bitate a Cehate GE dsnerpsngspiee the netwere is & cralarare Soho dorm: aed + alae con sien damm 2 computer network by flooding the network with Maat OO LIILT ‘tusers’ documents and cen damage different files crucial for the working |) Mears the cnbegnation of the spster in Windows operat pontowate a0 vhtarace, Kiewtog the registry i pattnicatie, Mich Mae rong EET ee system, the registry keeps track of a system's crmation can adversely affect the working of the system and its ring Windows registry. ‘ware secretly monitors the user's computing. T st surfing habits s® programs can collect various ited web pages of the user. + Sats sete iehoreration by atterng security settings: Ifthe operting system is not updated regularly, a abuts an take 2 ‘and tan alter security settings of the user's operating system. This allows annvooed occ5t0 othe system rasa SEFET I MERSURES Malware Bats nt ory sunesinn Serie artnet ‘but also affect the way in which our computer system nctionality disruotions, modified speed, etc. are some of the other | that we ensure our safety in the cyber-world. A rnatwrare + Seuurity Prograrns: in should: ist. The anti-virus should be regularly updated. It tine the system, Instat 3. sites through appropriate settingsin the browsers should ahoted 4 Seuure Internet access: or uploading inform jon on the Internet. Only secure sites ‘sonal information should be shared or saved (even accidentally) ‘om un-euthorized sources should be avoided. onany mebnite. Installation 4+ Hepular security updates: te shouldbe paid tosecurity updates applications and operating system updated at all times. Special attention rity bulletins for each software or application being used. 4 uoid Spams: Mails fro Any attachments in such ma .d and un-warranted sources should be deleted without reading or downloading. should never be downloaded or installed onto the system. + Backups: Taking eu reqjulaty is 9 good practice. This not only protects us against data loss but also helps to tore the integrity of the data. Make sure that the data is encrypted by using encryption software to protect from Unauthorized access, Scanning All Portable devices: Scan all portable storage devices before use as these are the most common sources Ofinfection in computers. Disable cookies, if possible: For the safety of our personal information, we must disable cookies on our browser. Netiquettes: Cyber world is an ever-increasing mesh, where thousands of users ‘and machines are added to the less network each day, In such a worl, it becomes imperative that it's users follow certain ‘guidelines ensuring seam Slow of information, i , ? ae Indulginyor promoting eyber-crimesincluding cyber bullying, cyber stalking, flaming, ete should beavoi with the The eyber-world is a fairly safe place, but it ean become extremely dangerous when we tend to connect unknown, sem Kips
You might also like
BLUE PRINT CLASS IX (2024-25) SOCIAL SCIENCE
PDF
0% (3)
BLUE PRINT CLASS IX (2024-25) SOCIAL SCIENCE
1 page
HTML Notes Class 10th Cbse
PDF
No ratings yet
HTML Notes Class 10th Cbse
22 pages
Class 9 RD Sharma Book PDF
PDF
14% (7)
Class 9 RD Sharma Book PDF
4 pages
802-Information Technology Class - XI (REVISED)
PDF
60% (5)
802-Information Technology Class - XI (REVISED)
71 pages
CBSE CLass 10 Information Technology Answer Key 2023 Set 4 89
PDF
No ratings yet
CBSE CLass 10 Information Technology Answer Key 2023 Set 4 89
14 pages
Information Technology Class 9 TRB
PDF
100% (3)
Information Technology Class 9 TRB
160 pages
Class 10 Communication Skills
PDF
100% (2)
Class 10 Communication Skills
7 pages
402 Vocational IX - (OpenOffice) Answer Key PART B
PDF
100% (2)
402 Vocational IX - (OpenOffice) Answer Key PART B
31 pages
235computer Networking - Class 9th Grade Computer Science Project Free PDF Download
PDF
50% (2)
235computer Networking - Class 9th Grade Computer Science Project Free PDF Download
17 pages
Cyber Ethics Notes
PDF
No ratings yet
Cyber Ethics Notes
7 pages
Advanced Features of Word Processor Q-A
PDF
No ratings yet
Advanced Features of Word Processor Q-A
10 pages
Class 11 CS ch2 Notes
PDF
100% (3)
Class 11 CS ch2 Notes
8 pages
Case Study Practice Sheet 1
PDF
No ratings yet
Case Study Practice Sheet 1
11 pages
Class 8
PDF
100% (2)
Class 8
10 pages
Class X - 402, Sample Paper - 1
PDF
100% (2)
Class X - 402, Sample Paper - 1
3 pages
Practical File of Computer Networks
PDF
50% (2)
Practical File of Computer Networks
29 pages
HTML Notes For Class 10 Cbse
PDF
50% (6)
HTML Notes For Class 10 Cbse
7 pages
Case Based Questions
PDF
No ratings yet
Case Based Questions
4 pages
Electronic Spreadsheet Practical File (3) - 1
PDF
100% (1)
Electronic Spreadsheet Practical File (3) - 1
13 pages
IT 402 LibreOffice-9 Sample Paper_1
PDF
No ratings yet
IT 402 LibreOffice-9 Sample Paper_1
3 pages
IT Code 402 Notes: CBSE Class 10
PDF
No ratings yet
IT Code 402 Notes: CBSE Class 10
7 pages
10th Formula Sheet
PDF
100% (2)
10th Formula Sheet
2 pages
Web Application and Security Class 10
PDF
100% (1)
Web Application and Security Class 10
6 pages
417 - Ai - MS 2022-23
PDF
No ratings yet
417 - Ai - MS 2022-23
9 pages
Communication Skills Class 10 Notes PDF (1)
PDF
No ratings yet
Communication Skills Class 10 Notes PDF (1)
33 pages
Lab Manual Activities of Term-2 Class 10
PDF
0% (2)
Lab Manual Activities of Term-2 Class 10
10 pages
Class-10-IT-PYQs-E-Book-Readers-Venue-2025-03-03-05-04-6
PDF
100% (1)
Class-10-IT-PYQs-E-Book-Readers-Venue-2025-03-03-05-04-6
40 pages
Class 9 AI Artificial Neural Networks
PDF
No ratings yet
Class 9 AI Artificial Neural Networks
5 pages
Class 9 Data Literacy Notes
PDF
100% (1)
Class 9 Data Literacy Notes
7 pages
IX Practical File Python
PDF
75% (4)
IX Practical File Python
5 pages
Subjective Questions-Employability Skills
PDF
100% (2)
Subjective Questions-Employability Skills
18 pages
Class 9 Digital Presentation Notes
PDF
100% (1)
Class 9 Digital Presentation Notes
7 pages
Class 10 Book Solution RDBMS
PDF
0% (3)
Class 10 Book Solution RDBMS
6 pages
Preboard - Computer Application (165) Class 10 - Watermark
PDF
100% (1)
Preboard - Computer Application (165) Class 10 - Watermark
4 pages
Entreprenuer Skills - MCQ
PDF
100% (1)
Entreprenuer Skills - MCQ
6 pages
CBSE Class 10 Blueprint 2023-1
PDF
67% (3)
CBSE Class 10 Blueprint 2023-1
10 pages
Information Technology (402) : Chapter 1: Methods of Communication
PDF
100% (1)
Information Technology (402) : Chapter 1: Methods of Communication
10 pages
HOLIDAY HW Class 10
PDF
100% (1)
HOLIDAY HW Class 10
15 pages
Es Unit 1 Communication Skills Brain Developeres (Qa)
PDF
100% (2)
Es Unit 1 Communication Skills Brain Developeres (Qa)
4 pages
Internet Services Notes
PDF
No ratings yet
Internet Services Notes
49 pages
Class: Xi Session: 2022-23 Computer Science (083) Practice Paper-1 (Theory) Maximummarks:70 Time Allowed: 3 Hrs General Instructions
PDF
100% (1)
Class: Xi Session: 2022-23 Computer Science (083) Practice Paper-1 (Theory) Maximummarks:70 Time Allowed: 3 Hrs General Instructions
48 pages
It SQP and Solutions
PDF
No ratings yet
It SQP and Solutions
14 pages
Class Notes: IX Word Processing-Setting Up Writer and Formatting Documents (SESSION-2) IT
PDF
No ratings yet
Class Notes: IX Word Processing-Setting Up Writer and Formatting Documents (SESSION-2) IT
3 pages
Isucceed Sample Question Paper 16 Maths 9
PDF
No ratings yet
Isucceed Sample Question Paper 16 Maths 9
4 pages
Green Skills Class 10
PDF
100% (2)
Green Skills Class 10
4 pages
Class 10 Program With Solution Final 2024-25
PDF
No ratings yet
Class 10 Program With Solution Final 2024-25
21 pages
4W Canvas On Transportation Problem in Remote Areas
PDF
100% (1)
4W Canvas On Transportation Problem in Remote Areas
1 page
Class 9
PDF
50% (2)
Class 9
21 pages
उत्तरसङ्केताः संस्कृत Code 119
PDF
50% (2)
उत्तरसङ्केताः संस्कृत Code 119
15 pages
Green Skills Class XII
PDF
No ratings yet
Green Skills Class XII
7 pages
Computer Solutions of Comdex Class 9
PDF
48% (44)
Computer Solutions of Comdex Class 9
5 pages
CodeBotics-Book-5 Answers
PDF
0% (1)
CodeBotics-Book-5 Answers
24 pages
Class IX - Chapter 2 AI Project Cycle Notes
PDF
50% (6)
Class IX - Chapter 2 AI Project Cycle Notes
11 pages
Mega Olympia Combat ( - MOC - )
PDF
No ratings yet
Mega Olympia Combat ( - MOC - )
9 pages
Class XI-CS-PT1 Sample Question Paper-I
PDF
100% (1)
Class XI-CS-PT1 Sample Question Paper-I
2 pages
Q1-Create A Poster For "Air Pollution" in Ms-Word With The Following Features. 1.fontface 2.fontsize 3.fontcolor 4. Header &footer 5. Images
PDF
No ratings yet
Q1-Create A Poster For "Air Pollution" in Ms-Word With The Following Features. 1.fontface 2.fontsize 3.fontcolor 4. Header &footer 5. Images
2 pages
Class IX - Viva - Questions
PDF
75% (8)
Class IX - Viva - Questions
3 pages
Class-10 DIGITAL DOCUMENTATION (Advance)
PDF
No ratings yet
Class-10 DIGITAL DOCUMENTATION (Advance)
74 pages
Green Skills Class 11-IT
PDF
100% (1)
Green Skills Class 11-IT
3 pages
Networking Online
PDF
No ratings yet
Networking Online
97 pages