SlideShare a Scribd company logo
1 of 37
Arush Vatsal Unadkat
Malicious Software are
the programs that
generate threats to the
computer system and
stored data.
Virus
Worm
s
Trojan
Horses
Spyware
Malicious Software
• Virus (Vital Information Recourses
Under Seize) is a small program or a
small code segment that is capable of
attaching itself to existing programs of
files and infect them as well as
replicate itself without users
knowledge or permission. It spreads
by external devices like CDs, pen
drives, or email and executes when an
infected program is executed. If an
infected computer gets in contact gets
in contact with an un infected
computer virus may pass onto the
uninfected system and destroy the
files.
Viruses
Boot Sector
File Infecting
PolymorphicStealth
Multipartite
This type of virus
infects the
master boot
record of the
system by either
moving to
another sector or
replacing it with
infected one.
This type of virus
infects the
executable files
or files containing
executable code
such as .exe,
.com, .dll, .sys,
etc.
I
N
F
E
C
T
I
N
G
V
I
R
U
SThese viruses add their code to
executables, which when infected may
send viral code other executables.
When the
infected file is
opened or
used the
virus may
overwrite the
file and cause
permanent
damage to
the content of
the
overwritten
file.
This type of virus changes its code as it propagates
from one file to another. Therefore, each copy that is
generated appears different from others. This makes
the polymorphic virus difficult to be detected by the
antivirus.
Stealth VirusThis type of
virus attempts
to conceal its
presence from
the user
and/or
antivirus
software by
using various
techniques.
A multipartite virus is a
computer virus that infects
multiple different target
platforms, and remains
recursively infective in each
target.
V
I
R
U
S It attempts to attack both
the boot sector and the
executable, or programs,
files at the same time.
This type of virus can re-infect a system over and
over again if all parts of the virus are not
Worms
A computer worm is a
standalone malware co
mputer program that
replicates itself in order
to spread to other
computers. Often, it
uses a computer
network to spread itself,
relying on security
failures on the target
computer to access it.
Unlike a computer virus,
it does not need to
attach itself to an
existing program.
Both worms and viruses tend
to fill computer memory with
useless data thereby
preventing you from using
memory space for legal
applications or programs.
T
R
O
J
A
N
Trojan horse is a program
that appears to be legal and
useful but concurrently does
something unexpected like
destroying existing
programs and files . As it
does not replicate itself in
the computer it is not a
virus.
However it usually opens
a way for the other
malicious software like
viruses to enter into the
computer system. It may
also allow unauthorized
users access the
information stored in the
computer.
h
o
r
s
e
s
Spyware is any technology that aids
in gathering information about a
person or organization without their
knowledge.
On the Internet spyware is programming that is put in
someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties.
Spam refers to the unsolicited or
unwanted mail or message sent to a
large number of individuals. It is
forced on to the people who would
otherwise choose not to receive such
mails.
In addition it may
also be used to
spreading viruses or
It may flood the e-mails box
due to which no other mail can
be received.
The recipient time is
wasted in reading a
the unwanted e-
mails.
Network
bandwidth is
wasted in sending
such mails.
A hacker is someone who seeks and exploits
weaknesses in a computer system or
computer network. Hackers may be motivated
by a multitude of reasons, such as profit,
protest, or challenge.
The hackers that break
into the computer security
with non-malicious
reasons are known as
The hackers who break into the
computer security without
administration for ulterior purposes
such as theft, terrorism, etc. are
An antivirus program
scans the hard the
hard disc for viruses.
After scanning the
software removes the
viruses, so that the
computer is able to
perform efficiently
again.
Most anti-
virus
software
have
an auto
update
feature that
enables the
computer to
download
the definition
of new
viruses.
The updating
of a antivirus
software is
important
because the
virus
'creators’ are
always in the
process of
developing
The updated virus definitions is
should always be maintained so
that users can operate their
computers without any problem.
Data loss is
very
common to
all
Some failure such as hardware
failure, software failure, or natural
disaster may occur resulting in
data loss.
Data backup refers to making duplicate copies of your data and storing them onto some
permanent storage device such as pen drive, portable hard disc, DVD, CD, etc.
The data backup is essential for
recovering the data as quickly,
and with as little damaging impact
on users, as possible.
Full Backup
Method
Incremental
Backup Method
Differential
Backup Method
Mirror Backup
Method
Full
Backup
Method
This is the basic
backup method
that backups up
all the files on the
computer the
computer system.
Generally
performed on a
weekly or monthly
basis.
Consumes a lot of
time as of time as
well as secondary
memory.
Incremental
Backup
Method
This method backs up
only those files that
have been modified
since the most recent
backup, thereby
making each backup an
increment to the last
backup.
A single backup is
not sufficient to
restore all the
files, which makes
the restoring
process slower. It consumes
less time and
memory
space to take
a backup.
Differential
Backup
Method
This method backs up
all the files that have
any difference from
the last backup.
Restoring files require
the full backup and
only the last
differential backup.
This makes restoring
little faster than
incremental backup.
Backing up is slower
and storage
requirement is higher
than incremental
backup.
Mirror
Backup
Method
The mirror backup
method copies the
files or folders being
backed up without
any compressions.
It keeps each file
separate in the
destination thereby
making the
destination a mirror
of the source.
The feature makes
this methods fastest
of all methods.
However, it requires
more storage space
as compared to other
methods.
Firstly, this method not only
enables you to recover data
after file corruption or
computer failure, but you can
also recover data even if a
natural disaster
has destroyed everything at
your place.
Secondly, you can access your data anywhere in the
world and at anytime. In addition, the files to be backed
up are encrypted
by your computer before being sent to the remote
This ensures the protection of
your data from unauthorized
access.
However, it is not affordable
for individual users or small
business to subscribe for
online backup services.
Sometimes, you lose
important data because of
disk failure, accidental
deletion of files, etc
A recover tool
enables you to
recover lost
data.
The situation even
becomes worse if
you are not having
backup of data.
Suppose you friend forgot his passport at your house
and went away. You want to send it to him but you don’t
want anyone else to steal the passport.
How will you do it?
This
picture
is a hint
to the
puzzle.
This
picture
is a hint
to the
puzzle.
You will put the passport in a
box and lock it with a lock and
key. This key will Remain with
you. Then you send the box to
your friend. Your friend will put
another lock on it with another
key that will remain with him.
He will send it back. You will
unlock your lock with your key
and send it back to him. He will
unlock his lock with his key and
take his passport.
Encryption and
decryption works
in the same way.
A firewall is a software or hardware-based
network security system that controls the
incoming and outgoing network traffic by
analyzing the data packets and determining
whether they should be allowed through or
not, based on applied rule set.
Many personal
computer oper
ating
systems includ
e software-
based firewalls
to protect
against threats
from the public
Internet.
Many routers t
hat pass data
between
networks
contain firewall
components
and,
conversely,
many firewalls
can perform
basic routing
functions.
All Traffic in either
direction must pass
through the firewall.
The firewall
itself is immune
to penetration.
Only traffic
authorized by the
local security policy
must be allowed to
Social Networking refers
to the grouping of
individuals to share their
common interests or
activities
Nowadays, online social networking
is gaining popularity and a number
of websites (known as social sites)
are available for creating online
communities.
Introduction
To
ICT
ICT has become the integral part of our
working and living environments and
will continue to be a powerful resource
for business.
ICT stands for Information and
Communication Technologies.
These technologies include
computers, internet,
broadcasting technologies (radio
and television) and telephony.
Due to globalization and other factors,
these technologies are changing and
improving dad by day.
Benefits of ICT
ICT provides several significant
benefits and today , it has been used
everywhere and in every field including
education, healthcare, governance,
etc.
Some important
benefits of ICT are
as follows:-
• Education
• Healthcare
• Governance
The use of sounds effects,
comic characters and scripted
act attracts the students and
helps them to understand the
lessons by getting involved
with the lessons being
delivered. This keeps the
process of learning new
concepts very lively.
Education
The introduction of ICT
in education has made
the learning fun and
interesting for student
now a days.
Many
illustrations
are given in
the form of
video clips
which help
students to
understand
quickly.
This technology has made the scope for error very minor and helps the
doctor to perform surgeries remotely
The scanners process
the data present in
them in a readable
format,
microprocessors help
to control many
medical devices like
pacemaker and the
computer-guided
lasers are used for
various kinds of
surgeries.
Governance
All or most of the information
generated by the government
is easily accessible through
the electronic media, such as
Internet, mobile phones, etc.
The use of ICT in governance
practices offers better interaction
between government, its
institutions and people. This
leads enhanced governance
practices and effective
This increases the
transparency of
government and
administration to the
business as well as its
citizens.
Societal Impacts Of IT (Class X)

More Related Content

What's hot

Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
Rimple Darra
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
Sadaf Walliyani
 
Security environment
Security environmentSecurity environment
Security environment
Jay Choudhary
 

What's hot (20)

Social impacts information technology
Social impacts information technologySocial impacts information technology
Social impacts information technology
 
Computer Security and safety
Computer Security and safety Computer Security and safety
Computer Security and safety
 
Computer worms viruses and Prevention
Computer worms viruses and PreventionComputer worms viruses and Prevention
Computer worms viruses and Prevention
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Application of IT
Application of ITApplication of IT
Application of IT
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Information warfare, assurance and security in the energy sectors
Information warfare, assurance  and security in the energy sectorsInformation warfare, assurance  and security in the energy sectors
Information warfare, assurance and security in the energy sectors
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Security environment
Security environmentSecurity environment
Security environment
 
cyber security presentation.pptx
cyber security presentation.pptxcyber security presentation.pptx
cyber security presentation.pptx
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
cyber security legal perspective
cyber security legal perspectivecyber security legal perspective
cyber security legal perspective
 
Operating system overview concepts ppt
Operating system overview concepts pptOperating system overview concepts ppt
Operating system overview concepts ppt
 
Data and software privacy
Data and software privacyData and software privacy
Data and software privacy
 

Similar to Societal Impacts Of IT (Class X)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
phanleson
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
KRT395
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
richarddxd
 

Similar to Societal Impacts Of IT (Class X) (20)

Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Presentation2
Presentation2Presentation2
Presentation2
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
computer security
computer securitycomputer security
computer security
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computing safety
Computing safetyComputing safety
Computing safety
 
4 threatsandvulnerabilities
4 threatsandvulnerabilities4 threatsandvulnerabilities
4 threatsandvulnerabilities
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
Computervirus
Computervirus Computervirus
Computervirus
 

Recently uploaded

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Recently uploaded (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Societal Impacts Of IT (Class X)

  • 2. Malicious Software are the programs that generate threats to the computer system and stored data.
  • 4. • Virus (Vital Information Recourses Under Seize) is a small program or a small code segment that is capable of attaching itself to existing programs of files and infect them as well as replicate itself without users knowledge or permission. It spreads by external devices like CDs, pen drives, or email and executes when an infected program is executed. If an infected computer gets in contact gets in contact with an un infected computer virus may pass onto the uninfected system and destroy the files.
  • 6. This type of virus infects the master boot record of the system by either moving to another sector or replacing it with infected one.
  • 7. This type of virus infects the executable files or files containing executable code such as .exe, .com, .dll, .sys, etc. I N F E C T I N G V I R U SThese viruses add their code to executables, which when infected may send viral code other executables. When the infected file is opened or used the virus may overwrite the file and cause permanent damage to the content of the overwritten file.
  • 8. This type of virus changes its code as it propagates from one file to another. Therefore, each copy that is generated appears different from others. This makes the polymorphic virus difficult to be detected by the antivirus.
  • 9. Stealth VirusThis type of virus attempts to conceal its presence from the user and/or antivirus software by using various techniques.
  • 10. A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. V I R U S It attempts to attack both the boot sector and the executable, or programs, files at the same time. This type of virus can re-infect a system over and over again if all parts of the virus are not
  • 11. Worms A computer worm is a standalone malware co mputer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Both worms and viruses tend to fill computer memory with useless data thereby preventing you from using memory space for legal applications or programs.
  • 12. T R O J A N Trojan horse is a program that appears to be legal and useful but concurrently does something unexpected like destroying existing programs and files . As it does not replicate itself in the computer it is not a virus. However it usually opens a way for the other malicious software like viruses to enter into the computer system. It may also allow unauthorized users access the information stored in the computer. h o r s e s
  • 13. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.
  • 14. Spam refers to the unsolicited or unwanted mail or message sent to a large number of individuals. It is forced on to the people who would otherwise choose not to receive such mails. In addition it may also be used to spreading viruses or
  • 15. It may flood the e-mails box due to which no other mail can be received. The recipient time is wasted in reading a the unwanted e- mails. Network bandwidth is wasted in sending such mails.
  • 16. A hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The hackers that break into the computer security with non-malicious reasons are known as The hackers who break into the computer security without administration for ulterior purposes such as theft, terrorism, etc. are
  • 17.
  • 18. An antivirus program scans the hard the hard disc for viruses. After scanning the software removes the viruses, so that the computer is able to perform efficiently again. Most anti- virus software have an auto update feature that enables the computer to download the definition of new viruses. The updating of a antivirus software is important because the virus 'creators’ are always in the process of developing The updated virus definitions is should always be maintained so that users can operate their computers without any problem.
  • 19. Data loss is very common to all Some failure such as hardware failure, software failure, or natural disaster may occur resulting in data loss. Data backup refers to making duplicate copies of your data and storing them onto some permanent storage device such as pen drive, portable hard disc, DVD, CD, etc. The data backup is essential for recovering the data as quickly, and with as little damaging impact on users, as possible.
  • 21. Full Backup Method This is the basic backup method that backups up all the files on the computer the computer system. Generally performed on a weekly or monthly basis. Consumes a lot of time as of time as well as secondary memory.
  • 22. Incremental Backup Method This method backs up only those files that have been modified since the most recent backup, thereby making each backup an increment to the last backup. A single backup is not sufficient to restore all the files, which makes the restoring process slower. It consumes less time and memory space to take a backup.
  • 23. Differential Backup Method This method backs up all the files that have any difference from the last backup. Restoring files require the full backup and only the last differential backup. This makes restoring little faster than incremental backup. Backing up is slower and storage requirement is higher than incremental backup.
  • 24. Mirror Backup Method The mirror backup method copies the files or folders being backed up without any compressions. It keeps each file separate in the destination thereby making the destination a mirror of the source. The feature makes this methods fastest of all methods. However, it requires more storage space as compared to other methods.
  • 25. Firstly, this method not only enables you to recover data after file corruption or computer failure, but you can also recover data even if a natural disaster has destroyed everything at your place. Secondly, you can access your data anywhere in the world and at anytime. In addition, the files to be backed up are encrypted by your computer before being sent to the remote This ensures the protection of your data from unauthorized access. However, it is not affordable for individual users or small business to subscribe for online backup services.
  • 26. Sometimes, you lose important data because of disk failure, accidental deletion of files, etc A recover tool enables you to recover lost data. The situation even becomes worse if you are not having backup of data.
  • 27. Suppose you friend forgot his passport at your house and went away. You want to send it to him but you don’t want anyone else to steal the passport. How will you do it? This picture is a hint to the puzzle. This picture is a hint to the puzzle.
  • 28. You will put the passport in a box and lock it with a lock and key. This key will Remain with you. Then you send the box to your friend. Your friend will put another lock on it with another key that will remain with him. He will send it back. You will unlock your lock with your key and send it back to him. He will unlock his lock with his key and take his passport. Encryption and decryption works in the same way.
  • 29. A firewall is a software or hardware-based network security system that controls the incoming and outgoing network traffic by analyzing the data packets and determining whether they should be allowed through or not, based on applied rule set. Many personal computer oper ating systems includ e software- based firewalls to protect against threats from the public Internet. Many routers t hat pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions.
  • 30. All Traffic in either direction must pass through the firewall. The firewall itself is immune to penetration. Only traffic authorized by the local security policy must be allowed to
  • 31. Social Networking refers to the grouping of individuals to share their common interests or activities Nowadays, online social networking is gaining popularity and a number of websites (known as social sites) are available for creating online communities.
  • 32. Introduction To ICT ICT has become the integral part of our working and living environments and will continue to be a powerful resource for business. ICT stands for Information and Communication Technologies. These technologies include computers, internet, broadcasting technologies (radio and television) and telephony. Due to globalization and other factors, these technologies are changing and improving dad by day.
  • 33. Benefits of ICT ICT provides several significant benefits and today , it has been used everywhere and in every field including education, healthcare, governance, etc. Some important benefits of ICT are as follows:- • Education • Healthcare • Governance
  • 34. The use of sounds effects, comic characters and scripted act attracts the students and helps them to understand the lessons by getting involved with the lessons being delivered. This keeps the process of learning new concepts very lively. Education The introduction of ICT in education has made the learning fun and interesting for student now a days. Many illustrations are given in the form of video clips which help students to understand quickly.
  • 35. This technology has made the scope for error very minor and helps the doctor to perform surgeries remotely The scanners process the data present in them in a readable format, microprocessors help to control many medical devices like pacemaker and the computer-guided lasers are used for various kinds of surgeries.
  • 36. Governance All or most of the information generated by the government is easily accessible through the electronic media, such as Internet, mobile phones, etc. The use of ICT in governance practices offers better interaction between government, its institutions and people. This leads enhanced governance practices and effective This increases the transparency of government and administration to the business as well as its citizens.

Editor's Notes

  1. Needs Editing
  2. spam
  3. hacker
  4. Antivirus software
  5. Data backup and recovery
  6. Backup methods
  7. Social networking
  8. Introduction to ICT
  9. Benefits of ICT