0% found this document useful (0 votes)
77 views7 pages

Malicious Code: Internet Threats

This document discusses various internet threats such as malware, spam, and phishing. It defines different types of malware like viruses, worms, Trojans, spyware, and adware. The document also discusses malicious code and different types like viruses, Trojan horses, logic bombs, and trapdoors/backdoors. Worms are also defined as programs that copy and spread themselves through a network.

Uploaded by

Ej Vivas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views7 pages

Malicious Code: Internet Threats

This document discusses various internet threats such as malware, spam, and phishing. It defines different types of malware like viruses, worms, Trojans, spyware, and adware. The document also discusses malicious code and different types like viruses, Trojan horses, logic bombs, and trapdoors/backdoors. Worms are also defined as programs that copy and spread themselves through a network.

Uploaded by

Ej Vivas
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Internet Threats

1. Malware – stands for malicious software Types: Virus,


Worm, Trojan, Spyware, Adware
2. Spam – unwanted email mostly from bots or advertisers. It
can be used to send malware.
3. Phishing – Its goal is to acquire sensitive personal
information like passwords and credit card details.
MALICIOUS CODE
It is also known as a rogue program. It is a threat to
computing assets by causing undesired effects in the
programmer’s part.

Various Kinds of Malicious Code


Virus – a program that can pass on the malicious code to
the other programs by modifying them, attaches itself to
the program, usually files with .doc, .xls and .exe
extensions.
Trojan Horse – a program which can be perform useful
and expected action. Must be installed by users or
intruders before it can affect the system’s assets.
Logic Bomb – a malicious code that goes off when a
specific condition occurs.
Trapdoor or Backdoor – a feature in a program that allows
someone to access the program with special privileges.
Worm – a program that copies and spreads itself through
a network.

Mail Merge and Label Generation Using Microsoft Word


Is a process to create personalized letters and pre-addressed envelopes or mailing
labels for mass mailings from a form letter – a word processing document which
contains fixed text, which will be the same in each output document, and
variables, which act as placeholders that are replaced by text from the data
source.
The data source is typically a spreadsheet or a database which has a field or
column for each variable in the template.
When the mail merge is run, the word processing system creates an output
document for each row in the database, using the fixed text exactly as it appears
in the template, but substituting the data variables in the template with the
values from the matching columns.
As the name suggests, this feature allows you to create documents and combine
or merge them with another documents or data file.
It is commonly used when sending out advertising materials to various recipients.

Two Components of Mail Merge

FORM DOCUMENT

the first component of our mail merged document. It generally the document that
contains the main body of the message we want to convey or send. The main
body of the message is the part of the form document that remains the same no
matter whom you send it to from among your list.

PLACE HOLDER - also referred to as data fields or merge fields.


»this mark the position on your form document where individual data or
information will be inserted.
»the place holder are denoted or marked by the text with double-headed arrows
(<< >>) on each side and with a gray background.

LIST OR DATA FILE


this is where the individual information or data that needs to be plugged in
(merged) to the form of document is placed and maintained.
NOTE: One of the best things about the mail merge feature is that it allows data
file to be created from within the Microsoft Word application itself, or gets data
from a file in Microsoft Excel or other data formats.
Fields that needed to be filled up on the form documents can easily be
maintained without accidentally altering the form or main document. You can
easily add, remove, modify, or extract your data more efficiently by using other
data management applications like Excel or Access and import them during the
mail merge process.

Integrating Images and External Material in Word Processors

Kinds of Materials
• Pictures and Online Pictures
These are electronic or digital pictures or photographs you
have used in any local storage device.
Commonly used types
Picture files:
.jpg
- pronounced as "jay-peg", and is the short form for .jpeg or
Joint Photographic Experts Group.
- it identifies the kind of data compression process that is
uses to make it more compatible and portable through the
Internet.

.gif
-this stands for Graphics Interchange Format.
- this type of image file is capable of displaying
transparencies.
- it is good for blending with other materials or elements in
your document.
it is also capable of displaying simple animation.

.png
- this is pronounced as "ping" . It stands for Portable
Network Graphics.
- it was built around the capabilities of .GIF.
basically for the purpose of transporting images on the
Internet as faster rates.
• Clip Art
This is generally a .GIF type; line art drawing or images used
as generic representative for ideas and objects that you
might want to integrate in your document.
• Shapes
These are printable objects or materials that you can
integrate your documents to enhance its appearance or to
allow you to have some tools to use for composing and
representing ideas or messages.
If you are designing the layout for a poster or other graphic
material for advertising, you might find this useful.

• Smart Art
These are predefined sets or different shapes grouped
together to form ideas that are orgnizational or structural
in nature.
If you want to grahically represent an organization, process,
relationships, or flow for infographic documents, then you
will find easy and handy to use.

• Chart
Allows you to represent data characteristics and trends.
This is quiet useful when you are preparing reports and
correlate and present data in graphical manner.

• Screenshot
Sometimes, creating reports or manual for training or
procedures will require the integration of a more
realistic image of what you are discussing on your report
or manual.

Image Placement

In Line with Text


This is the default setting for images that are inserted or
integrated in your document.
Square
This setting allows the images you inserted to be placed
anywhere within the paragraph with the text going around
the image in a square pattern like a frame.
Tight
This is almost the same as the Square setting, but here the
text "hugs" or conforms to the general shape of the image.
Through
This setting allows the text on your document to follow even
tighter, taking the contours and shapes of the image.
Top and Bottom
This setting pushes the texts away vertically to the top
and/or the bottom of the image occupies a whole text line on
its own.
Behind Text
This allows your image to be dragged and placed anywhere
on your document but with all the texts floating in front of
it.
In Front of Text
This setting allows your image to be placed right on the top
of the text as if your image was dropped right on it.

You might also like