0% found this document useful (0 votes)
48 views11 pages

Computernotes

HTML, Cyber security etc

Uploaded by

shindemrunali15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
48 views11 pages

Computernotes

HTML, Cyber security etc

Uploaded by

shindemrunali15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 11
vilen Soffeoare. a = ‘ — 7 ilo co —_ O| Sytem softoay @ catlinn Sofhoarre @ erating TT General [| system”, . [pape soffube | ; : : ee Lagan | al px ester ‘ |G taniaed | OM itilities Sof fuera & Types of Soltoase @ Sy lem _softoare “is sxasponsible fx managing ling haxdwave ces so that oth 4 Fs of systoon Ptoae @ Operating Systoro : = 1s most ‘nga fh basic scl of cftionre x quived for “computer fo Lundin. = Tt. hard inaxe muovides same common servicer Jou the users. ! = Receiving: inpi tp tt ine gp Ed Keeping track ef Liloe Lb dinedtonia nthe hod dik (other dosage adeutees 8 po ou! b, sniot- pp on See ee ee ees ———___ riglite = fay / Dos, Uni Windeos , Line bud : O (Language Proesica =A comprilor program ig created! LL such C4 Java, Dy ther ~The Indices in there programs, cana he seccale i by the compute they need. convex a HLL mograna “info the machi xara tae, an *b% yun ona caapuer. @) tits nel xeadt each en of the: scurce protan, cee ib ee atte anguoge. and tan oxenite jt can interpreter. convert all’ insbrustims 7 HLE magia, n ot one. gn: 4 Ge ¢ Crt Uh, Progam = High level language te OF are ctivare oman that ave used) Ge day Ti day mnidmice and efit sunning ab atonghle gdm cuca Lada iy ae stim Fat Nostin Antivir, Pg enktion Disk clean ip plo is asél of one O41 move. prog used ta_penfcuma a spel ask. ex. mai 2 apelcatiod_» =e Steet pe ages (Ms Petal), Stock Cabral Product defails Sold, belting - sf tivare pms: in ovganpat' abet a came i ization, at Comptnioa 5 Type el Application Sofhnace U OSpaihic_purpare oy Cuilomized solhoavre u especte » solve ar al css an_indivi organization. _ AGenval purpose Softioare ~ to selve commen promo such 4 formatting Jat, Creating table / chash’, graphy MS Offs suite tneluds Ms Word Mc feel & Ms Poroerpoint - GQ. D What is pcan) i) Lh afte ? “i) What tre Types af solfioare 7 w) Wail « pele on System Software . v) While eo note _en “Language Processor. vi) Write _noli_one Nbhy Ary Lijit Paoprares vw) Write notion Anpbattion re {> ——fompul ns—are_conneed log relher with Lhe. objedin ——Llike_prinles: ing ‘swith__each_al — le he elioorbed. Such, compiler selisp is “c allel = ——__ Computer Neda se | 7 or_mow —cormunieciting | —_anel Linh eal er _then they axe_said «A complex thet is _ok cannecled fo any oll cll Glink He splec. ig— + Tues of — Compuilor_Nefwork — Loci Area Netioork (LAN) isthe anus ne aad in which the computor are located ~ pithin a chovt distance Like “a room building ox campus * 4 tx. ben is_of 2 nelal Tn Office a Tn_LAN _comn ubers are social pl. using « + LANs ate. generally oda chy alae (penn ox uaa Lines” of Uoiees fata is ‘transferred at: cxxgan| ation) @ Metropolitan Prea_Netiverh (MAN) ree connec cal OF 6. nelives fo i the lane “of a cify. ff cover _an ‘ oka. city /faton - A ae bx_an rganizalion reually one this nthuoox! eTt_prevides a high =speed —_cennedisily avd date tiansfer vole +b capes fiat te its olf id at_drecls of cibiy ave pelworked or When aa ers of an caganisalione that pas ite aoe in soul ipl cities _axe™ connected then they will wm MAN. —@ Wide oo Heionh Cian) I = lage qecgpphicl aren such ac” “Zo corti nent. * = Grnected using Telephone tones or seilellite = rranstenved sou speed than LN. & Advurlages of Mpa 1 ci red in Ly hit Span “gi tim . fre" fast oommounicabions 2) Th is moans 2c, ial Coat inslantly Db sales scot of Co! ub. hardeoare, rrequuived in co ee ox. ingle rainkere cain be Ceca amaeng all bs itd 5 i n | eseeverhie cupplice x Disadvantages of Nilo @ Sault (eget comple ccun ing the coli neltoonh eople + may nat “se ahle to wor. @ People on delete dd ro misuse if no secuitity @ Thveate form Gompuiler Vireser - @ Costly. : —Dala Tremsmission TD oclinah ie aueabed (gu —the- unpre ch ——_Avansmittine lh a on _inlondlion fvore_one. “chrnpullne fo anathir. = To_ovdex ford Ai ‘transmission fo _orcure, = dlablished helineon __— mmuntection chen _the ture machines « =hhi channel an be oslablished hy sing Lol re le lant de, nt ith . x upon Lind a dela required ab hh peeomttted the y Wired neti ring fecha et 2iied —sshere the dal is Lean wit Paro the place. te another ibaugh a (poual peda a tale whve hen ence culled wired» Goa ae Wiveless fuel —dheL at rommunieattion is hat uses Cebechrarnagnstl < maven (like ‘Infraved, microwave; and ‘radio waves). ti —tran it a h n ni bles fence the name tnixel 7 tik a thleréd Chat didaace a Siiete tod) ov connects ae 0. spoabe: ‘le phones at Timited wie {i Tie todead fect Laplops smart phoney omait TV... reduces cot Hoxil 2 Q ee @( Thue Fake) Se DA comput nélwork xeducee the cost of computer hardware. "tn a nelwork — §1) Lh onnnuil ih ~ firm Wide ren Nebdork @ The clive! pana La gecpraphical area, connecting rountries: and continents @ MAN stands 7 for © ful form of LAN 5 &® ih “Lyp f netiven firmed whent Conpitere A Nnecce. ! © lhich tyne of: network twill be foomed when 1 snplfors of Delhiv” Mumbai lp Pune Waris ave connected ) at Se LS) [ a N. | @ Live Lino - exaraple Lan @ What me didnnce Limit in Law and loaw (@ Whet is Lan? -& or MAN ov WAN. @ ba high geod netioork « @ The Internct is" the —‘huorld's largest : 2) is_miethod where th! data is transnitiad) Kom one. place te avether throu a thy ica medi unr 0 Mesilion Tio types of Data transmiscion with examples: lat is Compe Niwa ) Uthat exe lift “lypes of canal network, = 7 ya Salt . — ——_ Today, ove: im seems iets using lhe Internet 4 - Sox one pi adapta ‘oa the other (like com wil nous chamele “shonping wehsiter advertise their pwducts _ - some use email’ andl a Whi cg all “Tees thing: we _selden seals ‘Whol is Cyber Threat } D_Goker Threat js any act ox incident woladed tothe tyher werd ox Tita thal can cau ontpuler z ; a: : | for ex, (ompuler ming unctable, computer Le |__aating leleed, cxtial_pexs nal? informuition = being: chon abe. | Some common Cyhen Threat = OMalware (Malicious software \ isa wliware thal is used to disrupt omoiitr operation goiter sensitive. inhumadlion or gain aces fy | vale Ampuiter systems ! @ Virus’ - A compulor virus isa sebhivaxe Srogram it taal an sepia tell and _cpread from -one computor d viti et: mally fle | i) Worn = | ~ is @ software param thal” activel | frapsmits itself’ owr a neluoork “to inlec! a compilers bil tunlibe « virus if has the capability travel. without “any human _atlion (@Tivian Horse - ~ eg version of virus programmed to deceive the utex by appearing t6 be a aonuin Nee image. ac vider. Whtn wed if devbum maliious adivil, — era / Teh, nabs Pal Tr ae + Like mabing copies ol iksol!’ toa ing information oe ly ening L J heir he cute J A Spyware includes softioase thal aw installed on iz oars hil aw lormattio joure Compule Y ——0n_omotder to waitfoat yous bnaalidge ~pan While using email, wa sqra_unworilad 2mails came te vou mw muling some. produél which moy 23. genuine % ees. These unweuiled email ave “cotfoo at Spam Heching agains individuals or oreuntyations wv Criminal Hacking _'s [Soko4] The_mmress of breabing inla rompuler networks nd sollecind the personal delaile of othoxs iit is dane tux ethical * yoason's ie called hacking However, if i is ‘done with mal = inteat it is called cracking - * Criminal, Hackers or (Crackers vise hachino Upon as & crime x Phishing Sis atjeot Gime, where Fraudulent websin ase wed to trick” vou into giving away conftsentral personal intormalion such as ‘credit cand fumbers, accund werrame, and passwords --- A phishing attempt usually huts with an ome! asbing you by click on a web link to check somefuing apd} "your hank account : ASably Prowasing the Web Some lafely lips OQ Avoid guegherable Cavhsile: a - mind ful of the att yo. tink lich aN Th fall Dal Vu lo are Run virus Seen perielr ally Dse Broweille . Download ” coftivare fam truded sites only. A be taudhiour while giving oul _pexsonal _cléteile a_lhat ts a Secuye Website ? A = website je cre thet uses: an evtra_/; F (tunity (1 bnown as the S§LiSeure Sochel layer) to hosp youre Sen tive action wake J ex, https :'6'stends fr becure? # How to Prilect your Taeritih,’? Mabe cure you sect privacy celina: xa fhe te _cuck ur clo ie Sem your iabrmiation Pastword “Pry _impovlant step te protecting Your ingamakiry online and on your cena Uhre Password Make sunt that your Musword ts set shrora_ mixedl with caps) Hlowercas Its, numbers Oh symbols +o oot ie come passmord fey cliflowent accourth + Don't shave Your! password + + Je sure no ono watthos you when you enter your Pass Loon : ips a criminal procter, col Tatenet te syle meitica lly “har e x Cyber sfidbing is_one of several dybercrimes that have been nabbed by the Tndonnot. Tt overlaps with cy her bullying wher luring in thet in any one of them almost” the tame techniques ave _useo! for A vidtin of y hex Stalking should fates Kllowing topos OTE you cxe_minor, inform your parasite about Hy tharaccmen’ ox Soma. elie adult you truck @ ble a wmplint with the ryher cfatber's a & (olled widene, document of it to laol baw pnrkgrcement p Teche ae leged wos to slap Ee SMtelkor @ In Case of the Gher Crime the vicina should “preserve and ~ alewohes Aewatslacel all the digita) eviolences a Tipe. creen shafts, videos, Enreilt “The vidtem Shoulel contact 9 lodge & hrmal imine! emplaint with the local police, The laced police will gutele or hand ‘over the car te the bir rath, por fuatier. psrocess and legal odion. inst fhe primi a nad

You might also like